xref: /llvm-project/lldb/source/Plugins/Process/gdb-remote/GDBRemoteCommunicationClient.cpp (revision 10f494d2896b8a58f69cc47d0db35d2b84c2fb44)
1 //===-- GDBRemoteCommunicationClient.cpp ----------------------------------===//
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8 
9 #include "GDBRemoteCommunicationClient.h"
10 
11 #include <cmath>
12 #include <sys/stat.h>
13 
14 #include <numeric>
15 #include <optional>
16 #include <sstream>
17 
18 #include "lldb/Core/ModuleSpec.h"
19 #include "lldb/Host/HostInfo.h"
20 #include "lldb/Host/XML.h"
21 #include "lldb/Symbol/Symbol.h"
22 #include "lldb/Target/MemoryRegionInfo.h"
23 #include "lldb/Target/Target.h"
24 #include "lldb/Target/UnixSignals.h"
25 #include "lldb/Utility/Args.h"
26 #include "lldb/Utility/DataBufferHeap.h"
27 #include "lldb/Utility/LLDBAssert.h"
28 #include "lldb/Utility/LLDBLog.h"
29 #include "lldb/Utility/Log.h"
30 #include "lldb/Utility/State.h"
31 #include "lldb/Utility/StreamString.h"
32 
33 #include "ProcessGDBRemote.h"
34 #include "ProcessGDBRemoteLog.h"
35 #include "lldb/Host/Config.h"
36 #include "lldb/Utility/StringExtractorGDBRemote.h"
37 
38 #include "llvm/ADT/STLExtras.h"
39 #include "llvm/ADT/StringSwitch.h"
40 #include "llvm/Support/JSON.h"
41 
42 #if defined(HAVE_LIBCOMPRESSION)
43 #include <compression.h>
44 #endif
45 
46 using namespace lldb;
47 using namespace lldb_private::process_gdb_remote;
48 using namespace lldb_private;
49 using namespace std::chrono;
50 
51 llvm::raw_ostream &process_gdb_remote::operator<<(llvm::raw_ostream &os,
52                                                   const QOffsets &offsets) {
53   return os << llvm::formatv(
54              "QOffsets({0}, [{1:@[x]}])", offsets.segments,
55              llvm::make_range(offsets.offsets.begin(), offsets.offsets.end()));
56 }
57 
58 // GDBRemoteCommunicationClient constructor
59 GDBRemoteCommunicationClient::GDBRemoteCommunicationClient()
60     : GDBRemoteClientBase("gdb-remote.client"),
61 
62       m_supports_qProcessInfoPID(true), m_supports_qfProcessInfo(true),
63       m_supports_qUserName(true), m_supports_qGroupName(true),
64       m_supports_qThreadStopInfo(true), m_supports_z0(true),
65       m_supports_z1(true), m_supports_z2(true), m_supports_z3(true),
66       m_supports_z4(true), m_supports_QEnvironment(true),
67       m_supports_QEnvironmentHexEncoded(true), m_supports_qSymbol(true),
68       m_qSymbol_requests_done(false), m_supports_qModuleInfo(true),
69       m_supports_jThreadsInfo(true), m_supports_jModulesInfo(true),
70       m_supports_vFileSize(true), m_supports_vFileMode(true),
71       m_supports_vFileExists(true), m_supports_vRun(true),
72 
73       m_host_arch(), m_host_distribution_id(), m_process_arch(), m_os_build(),
74       m_os_kernel(), m_hostname(), m_gdb_server_name(),
75       m_default_packet_timeout(0), m_qSupported_response(),
76       m_supported_async_json_packets_sp(), m_qXfer_memory_map() {}
77 
78 // Destructor
79 GDBRemoteCommunicationClient::~GDBRemoteCommunicationClient() {
80   if (IsConnected())
81     Disconnect();
82 }
83 
84 bool GDBRemoteCommunicationClient::HandshakeWithServer(Status *error_ptr) {
85   ResetDiscoverableSettings(false);
86 
87   // Start the read thread after we send the handshake ack since if we fail to
88   // send the handshake ack, there is no reason to continue...
89   std::chrono::steady_clock::time_point start_of_handshake =
90       std::chrono::steady_clock::now();
91   if (SendAck()) {
92     // The return value from QueryNoAckModeSupported() is true if the packet
93     // was sent and _any_ response (including UNIMPLEMENTED) was received), or
94     // false if no response was received. This quickly tells us if we have a
95     // live connection to a remote GDB server...
96     if (QueryNoAckModeSupported()) {
97       return true;
98     } else {
99       std::chrono::steady_clock::time_point end_of_handshake =
100           std::chrono::steady_clock::now();
101       auto handshake_timeout =
102           std::chrono::duration<double>(end_of_handshake - start_of_handshake)
103               .count();
104       if (error_ptr) {
105         if (!IsConnected())
106           error_ptr->SetErrorString("Connection shut down by remote side "
107                                     "while waiting for reply to initial "
108                                     "handshake packet");
109         else
110           error_ptr->SetErrorStringWithFormat(
111               "failed to get reply to handshake packet within timeout of "
112               "%.1f seconds",
113               handshake_timeout);
114       }
115     }
116   } else {
117     if (error_ptr)
118       error_ptr->SetErrorString("failed to send the handshake ack");
119   }
120   return false;
121 }
122 
123 bool GDBRemoteCommunicationClient::GetEchoSupported() {
124   if (m_supports_qEcho == eLazyBoolCalculate) {
125     GetRemoteQSupported();
126   }
127   return m_supports_qEcho == eLazyBoolYes;
128 }
129 
130 bool GDBRemoteCommunicationClient::GetQPassSignalsSupported() {
131   if (m_supports_QPassSignals == eLazyBoolCalculate) {
132     GetRemoteQSupported();
133   }
134   return m_supports_QPassSignals == eLazyBoolYes;
135 }
136 
137 bool GDBRemoteCommunicationClient::GetAugmentedLibrariesSVR4ReadSupported() {
138   if (m_supports_augmented_libraries_svr4_read == eLazyBoolCalculate) {
139     GetRemoteQSupported();
140   }
141   return m_supports_augmented_libraries_svr4_read == eLazyBoolYes;
142 }
143 
144 bool GDBRemoteCommunicationClient::GetQXferLibrariesSVR4ReadSupported() {
145   if (m_supports_qXfer_libraries_svr4_read == eLazyBoolCalculate) {
146     GetRemoteQSupported();
147   }
148   return m_supports_qXfer_libraries_svr4_read == eLazyBoolYes;
149 }
150 
151 bool GDBRemoteCommunicationClient::GetQXferLibrariesReadSupported() {
152   if (m_supports_qXfer_libraries_read == eLazyBoolCalculate) {
153     GetRemoteQSupported();
154   }
155   return m_supports_qXfer_libraries_read == eLazyBoolYes;
156 }
157 
158 bool GDBRemoteCommunicationClient::GetQXferAuxvReadSupported() {
159   if (m_supports_qXfer_auxv_read == eLazyBoolCalculate) {
160     GetRemoteQSupported();
161   }
162   return m_supports_qXfer_auxv_read == eLazyBoolYes;
163 }
164 
165 bool GDBRemoteCommunicationClient::GetQXferFeaturesReadSupported() {
166   if (m_supports_qXfer_features_read == eLazyBoolCalculate) {
167     GetRemoteQSupported();
168   }
169   return m_supports_qXfer_features_read == eLazyBoolYes;
170 }
171 
172 bool GDBRemoteCommunicationClient::GetQXferMemoryMapReadSupported() {
173   if (m_supports_qXfer_memory_map_read == eLazyBoolCalculate) {
174     GetRemoteQSupported();
175   }
176   return m_supports_qXfer_memory_map_read == eLazyBoolYes;
177 }
178 
179 bool GDBRemoteCommunicationClient::GetQXferSigInfoReadSupported() {
180   if (m_supports_qXfer_siginfo_read == eLazyBoolCalculate) {
181     GetRemoteQSupported();
182   }
183   return m_supports_qXfer_siginfo_read == eLazyBoolYes;
184 }
185 
186 bool GDBRemoteCommunicationClient::GetMultiprocessSupported() {
187   if (m_supports_memory_tagging == eLazyBoolCalculate)
188     GetRemoteQSupported();
189   return m_supports_multiprocess == eLazyBoolYes;
190 }
191 
192 uint64_t GDBRemoteCommunicationClient::GetRemoteMaxPacketSize() {
193   if (m_max_packet_size == 0) {
194     GetRemoteQSupported();
195   }
196   return m_max_packet_size;
197 }
198 
199 bool GDBRemoteCommunicationClient::QueryNoAckModeSupported() {
200   if (m_supports_not_sending_acks == eLazyBoolCalculate) {
201     m_send_acks = true;
202     m_supports_not_sending_acks = eLazyBoolNo;
203 
204     // This is the first real packet that we'll send in a debug session and it
205     // may take a little longer than normal to receive a reply.  Wait at least
206     // 6 seconds for a reply to this packet.
207 
208     ScopedTimeout timeout(*this, std::max(GetPacketTimeout(), seconds(6)));
209 
210     StringExtractorGDBRemote response;
211     if (SendPacketAndWaitForResponse("QStartNoAckMode", response) ==
212         PacketResult::Success) {
213       if (response.IsOKResponse()) {
214         m_send_acks = false;
215         m_supports_not_sending_acks = eLazyBoolYes;
216       }
217       return true;
218     }
219   }
220   return false;
221 }
222 
223 void GDBRemoteCommunicationClient::GetListThreadsInStopReplySupported() {
224   if (m_supports_threads_in_stop_reply == eLazyBoolCalculate) {
225     m_supports_threads_in_stop_reply = eLazyBoolNo;
226 
227     StringExtractorGDBRemote response;
228     if (SendPacketAndWaitForResponse("QListThreadsInStopReply", response) ==
229         PacketResult::Success) {
230       if (response.IsOKResponse())
231         m_supports_threads_in_stop_reply = eLazyBoolYes;
232     }
233   }
234 }
235 
236 bool GDBRemoteCommunicationClient::GetVAttachOrWaitSupported() {
237   if (m_attach_or_wait_reply == eLazyBoolCalculate) {
238     m_attach_or_wait_reply = eLazyBoolNo;
239 
240     StringExtractorGDBRemote response;
241     if (SendPacketAndWaitForResponse("qVAttachOrWaitSupported", response) ==
242         PacketResult::Success) {
243       if (response.IsOKResponse())
244         m_attach_or_wait_reply = eLazyBoolYes;
245     }
246   }
247   return m_attach_or_wait_reply == eLazyBoolYes;
248 }
249 
250 bool GDBRemoteCommunicationClient::GetSyncThreadStateSupported() {
251   if (m_prepare_for_reg_writing_reply == eLazyBoolCalculate) {
252     m_prepare_for_reg_writing_reply = eLazyBoolNo;
253 
254     StringExtractorGDBRemote response;
255     if (SendPacketAndWaitForResponse("qSyncThreadStateSupported", response) ==
256         PacketResult::Success) {
257       if (response.IsOKResponse())
258         m_prepare_for_reg_writing_reply = eLazyBoolYes;
259     }
260   }
261   return m_prepare_for_reg_writing_reply == eLazyBoolYes;
262 }
263 
264 void GDBRemoteCommunicationClient::ResetDiscoverableSettings(bool did_exec) {
265   if (!did_exec) {
266     // Hard reset everything, this is when we first connect to a GDB server
267     m_supports_not_sending_acks = eLazyBoolCalculate;
268     m_supports_thread_suffix = eLazyBoolCalculate;
269     m_supports_threads_in_stop_reply = eLazyBoolCalculate;
270     m_supports_vCont_c = eLazyBoolCalculate;
271     m_supports_vCont_C = eLazyBoolCalculate;
272     m_supports_vCont_s = eLazyBoolCalculate;
273     m_supports_vCont_S = eLazyBoolCalculate;
274     m_supports_p = eLazyBoolCalculate;
275     m_supports_x = eLazyBoolCalculate;
276     m_supports_QSaveRegisterState = eLazyBoolCalculate;
277     m_qHostInfo_is_valid = eLazyBoolCalculate;
278     m_curr_pid_is_valid = eLazyBoolCalculate;
279     m_qGDBServerVersion_is_valid = eLazyBoolCalculate;
280     m_supports_alloc_dealloc_memory = eLazyBoolCalculate;
281     m_supports_memory_region_info = eLazyBoolCalculate;
282     m_prepare_for_reg_writing_reply = eLazyBoolCalculate;
283     m_attach_or_wait_reply = eLazyBoolCalculate;
284     m_avoid_g_packets = eLazyBoolCalculate;
285     m_supports_multiprocess = eLazyBoolCalculate;
286     m_supports_qSaveCore = eLazyBoolCalculate;
287     m_supports_qXfer_auxv_read = eLazyBoolCalculate;
288     m_supports_qXfer_libraries_read = eLazyBoolCalculate;
289     m_supports_qXfer_libraries_svr4_read = eLazyBoolCalculate;
290     m_supports_qXfer_features_read = eLazyBoolCalculate;
291     m_supports_qXfer_memory_map_read = eLazyBoolCalculate;
292     m_supports_qXfer_siginfo_read = eLazyBoolCalculate;
293     m_supports_augmented_libraries_svr4_read = eLazyBoolCalculate;
294     m_uses_native_signals = eLazyBoolCalculate;
295     m_supports_qProcessInfoPID = true;
296     m_supports_qfProcessInfo = true;
297     m_supports_qUserName = true;
298     m_supports_qGroupName = true;
299     m_supports_qThreadStopInfo = true;
300     m_supports_z0 = true;
301     m_supports_z1 = true;
302     m_supports_z2 = true;
303     m_supports_z3 = true;
304     m_supports_z4 = true;
305     m_supports_QEnvironment = true;
306     m_supports_QEnvironmentHexEncoded = true;
307     m_supports_qSymbol = true;
308     m_qSymbol_requests_done = false;
309     m_supports_qModuleInfo = true;
310     m_host_arch.Clear();
311     m_host_distribution_id.clear();
312     m_os_version = llvm::VersionTuple();
313     m_os_build.clear();
314     m_os_kernel.clear();
315     m_hostname.clear();
316     m_gdb_server_name.clear();
317     m_gdb_server_version = UINT32_MAX;
318     m_default_packet_timeout = seconds(0);
319     m_target_vm_page_size = 0;
320     m_max_packet_size = 0;
321     m_qSupported_response.clear();
322     m_supported_async_json_packets_is_valid = false;
323     m_supported_async_json_packets_sp.reset();
324     m_supports_jModulesInfo = true;
325   }
326 
327   // These flags should be reset when we first connect to a GDB server and when
328   // our inferior process execs
329   m_qProcessInfo_is_valid = eLazyBoolCalculate;
330   m_process_arch.Clear();
331 }
332 
333 void GDBRemoteCommunicationClient::GetRemoteQSupported() {
334   // Clear out any capabilities we expect to see in the qSupported response
335   m_supports_qXfer_auxv_read = eLazyBoolNo;
336   m_supports_qXfer_libraries_read = eLazyBoolNo;
337   m_supports_qXfer_libraries_svr4_read = eLazyBoolNo;
338   m_supports_augmented_libraries_svr4_read = eLazyBoolNo;
339   m_supports_qXfer_features_read = eLazyBoolNo;
340   m_supports_qXfer_memory_map_read = eLazyBoolNo;
341   m_supports_qXfer_siginfo_read = eLazyBoolNo;
342   m_supports_multiprocess = eLazyBoolNo;
343   m_supports_qEcho = eLazyBoolNo;
344   m_supports_QPassSignals = eLazyBoolNo;
345   m_supports_memory_tagging = eLazyBoolNo;
346   m_supports_qSaveCore = eLazyBoolNo;
347   m_uses_native_signals = eLazyBoolNo;
348 
349   m_max_packet_size = UINT64_MAX; // It's supposed to always be there, but if
350                                   // not, we assume no limit
351 
352   // build the qSupported packet
353   std::vector<std::string> features = {"xmlRegisters=i386,arm,mips,arc",
354                                        "multiprocess+", "fork-events+",
355                                        "vfork-events+"};
356   StreamString packet;
357   packet.PutCString("qSupported");
358   for (uint32_t i = 0; i < features.size(); ++i) {
359     packet.PutCString(i == 0 ? ":" : ";");
360     packet.PutCString(features[i]);
361   }
362 
363   StringExtractorGDBRemote response;
364   if (SendPacketAndWaitForResponse(packet.GetString(), response) ==
365       PacketResult::Success) {
366     // Hang on to the qSupported packet, so that platforms can do custom
367     // configuration of the transport before attaching/launching the process.
368     m_qSupported_response = response.GetStringRef().str();
369 
370     for (llvm::StringRef x : llvm::split(response.GetStringRef(), ';')) {
371       if (x == "qXfer:auxv:read+")
372         m_supports_qXfer_auxv_read = eLazyBoolYes;
373       else if (x == "qXfer:libraries-svr4:read+")
374         m_supports_qXfer_libraries_svr4_read = eLazyBoolYes;
375       else if (x == "augmented-libraries-svr4-read") {
376         m_supports_qXfer_libraries_svr4_read = eLazyBoolYes; // implied
377         m_supports_augmented_libraries_svr4_read = eLazyBoolYes;
378       } else if (x == "qXfer:libraries:read+")
379         m_supports_qXfer_libraries_read = eLazyBoolYes;
380       else if (x == "qXfer:features:read+")
381         m_supports_qXfer_features_read = eLazyBoolYes;
382       else if (x == "qXfer:memory-map:read+")
383         m_supports_qXfer_memory_map_read = eLazyBoolYes;
384       else if (x == "qXfer:siginfo:read+")
385         m_supports_qXfer_siginfo_read = eLazyBoolYes;
386       else if (x == "qEcho")
387         m_supports_qEcho = eLazyBoolYes;
388       else if (x == "QPassSignals+")
389         m_supports_QPassSignals = eLazyBoolYes;
390       else if (x == "multiprocess+")
391         m_supports_multiprocess = eLazyBoolYes;
392       else if (x == "memory-tagging+")
393         m_supports_memory_tagging = eLazyBoolYes;
394       else if (x == "qSaveCore+")
395         m_supports_qSaveCore = eLazyBoolYes;
396       else if (x == "native-signals+")
397         m_uses_native_signals = eLazyBoolYes;
398       // Look for a list of compressions in the features list e.g.
399       // qXfer:features:read+;PacketSize=20000;qEcho+;SupportedCompressions=zlib-
400       // deflate,lzma
401       else if (x.consume_front("SupportedCompressions=")) {
402         llvm::SmallVector<llvm::StringRef, 4> compressions;
403         x.split(compressions, ',');
404         if (!compressions.empty())
405           MaybeEnableCompression(compressions);
406       } else if (x.consume_front("PacketSize=")) {
407         StringExtractorGDBRemote packet_response(x);
408         m_max_packet_size =
409             packet_response.GetHexMaxU64(/*little_endian=*/false, UINT64_MAX);
410         if (m_max_packet_size == 0) {
411           m_max_packet_size = UINT64_MAX; // Must have been a garbled response
412           Log *log(GetLog(GDBRLog::Process));
413           LLDB_LOGF(log, "Garbled PacketSize spec in qSupported response");
414         }
415       }
416     }
417   }
418 }
419 
420 bool GDBRemoteCommunicationClient::GetThreadSuffixSupported() {
421   if (m_supports_thread_suffix == eLazyBoolCalculate) {
422     StringExtractorGDBRemote response;
423     m_supports_thread_suffix = eLazyBoolNo;
424     if (SendPacketAndWaitForResponse("QThreadSuffixSupported", response) ==
425         PacketResult::Success) {
426       if (response.IsOKResponse())
427         m_supports_thread_suffix = eLazyBoolYes;
428     }
429   }
430   return m_supports_thread_suffix;
431 }
432 bool GDBRemoteCommunicationClient::GetVContSupported(char flavor) {
433   if (m_supports_vCont_c == eLazyBoolCalculate) {
434     StringExtractorGDBRemote response;
435     m_supports_vCont_any = eLazyBoolNo;
436     m_supports_vCont_all = eLazyBoolNo;
437     m_supports_vCont_c = eLazyBoolNo;
438     m_supports_vCont_C = eLazyBoolNo;
439     m_supports_vCont_s = eLazyBoolNo;
440     m_supports_vCont_S = eLazyBoolNo;
441     if (SendPacketAndWaitForResponse("vCont?", response) ==
442         PacketResult::Success) {
443       const char *response_cstr = response.GetStringRef().data();
444       if (::strstr(response_cstr, ";c"))
445         m_supports_vCont_c = eLazyBoolYes;
446 
447       if (::strstr(response_cstr, ";C"))
448         m_supports_vCont_C = eLazyBoolYes;
449 
450       if (::strstr(response_cstr, ";s"))
451         m_supports_vCont_s = eLazyBoolYes;
452 
453       if (::strstr(response_cstr, ";S"))
454         m_supports_vCont_S = eLazyBoolYes;
455 
456       if (m_supports_vCont_c == eLazyBoolYes &&
457           m_supports_vCont_C == eLazyBoolYes &&
458           m_supports_vCont_s == eLazyBoolYes &&
459           m_supports_vCont_S == eLazyBoolYes) {
460         m_supports_vCont_all = eLazyBoolYes;
461       }
462 
463       if (m_supports_vCont_c == eLazyBoolYes ||
464           m_supports_vCont_C == eLazyBoolYes ||
465           m_supports_vCont_s == eLazyBoolYes ||
466           m_supports_vCont_S == eLazyBoolYes) {
467         m_supports_vCont_any = eLazyBoolYes;
468       }
469     }
470   }
471 
472   switch (flavor) {
473   case 'a':
474     return m_supports_vCont_any;
475   case 'A':
476     return m_supports_vCont_all;
477   case 'c':
478     return m_supports_vCont_c;
479   case 'C':
480     return m_supports_vCont_C;
481   case 's':
482     return m_supports_vCont_s;
483   case 'S':
484     return m_supports_vCont_S;
485   default:
486     break;
487   }
488   return false;
489 }
490 
491 GDBRemoteCommunication::PacketResult
492 GDBRemoteCommunicationClient::SendThreadSpecificPacketAndWaitForResponse(
493     lldb::tid_t tid, StreamString &&payload,
494     StringExtractorGDBRemote &response) {
495   Lock lock(*this);
496   if (!lock) {
497     if (Log *log = GetLog(GDBRLog::Process | GDBRLog::Packets))
498       LLDB_LOGF(log,
499                 "GDBRemoteCommunicationClient::%s: Didn't get sequence mutex "
500                 "for %s packet.",
501                 __FUNCTION__, payload.GetData());
502     return PacketResult::ErrorNoSequenceLock;
503   }
504 
505   if (GetThreadSuffixSupported())
506     payload.Printf(";thread:%4.4" PRIx64 ";", tid);
507   else {
508     if (!SetCurrentThread(tid))
509       return PacketResult::ErrorSendFailed;
510   }
511 
512   return SendPacketAndWaitForResponseNoLock(payload.GetString(), response);
513 }
514 
515 // Check if the target supports 'p' packet. It sends out a 'p' packet and
516 // checks the response. A normal packet will tell us that support is available.
517 //
518 // Takes a valid thread ID because p needs to apply to a thread.
519 bool GDBRemoteCommunicationClient::GetpPacketSupported(lldb::tid_t tid) {
520   if (m_supports_p == eLazyBoolCalculate)
521     m_supports_p = GetThreadPacketSupported(tid, "p0");
522   return m_supports_p;
523 }
524 
525 LazyBool GDBRemoteCommunicationClient::GetThreadPacketSupported(
526     lldb::tid_t tid, llvm::StringRef packetStr) {
527   StreamString payload;
528   payload.PutCString(packetStr);
529   StringExtractorGDBRemote response;
530   if (SendThreadSpecificPacketAndWaitForResponse(
531           tid, std::move(payload), response) == PacketResult::Success &&
532       response.IsNormalResponse()) {
533     return eLazyBoolYes;
534   }
535   return eLazyBoolNo;
536 }
537 
538 bool GDBRemoteCommunicationClient::GetSaveCoreSupported() const {
539   return m_supports_qSaveCore == eLazyBoolYes;
540 }
541 
542 StructuredData::ObjectSP GDBRemoteCommunicationClient::GetThreadsInfo() {
543   // Get information on all threads at one using the "jThreadsInfo" packet
544   StructuredData::ObjectSP object_sp;
545 
546   if (m_supports_jThreadsInfo) {
547     StringExtractorGDBRemote response;
548     response.SetResponseValidatorToJSON();
549     if (SendPacketAndWaitForResponse("jThreadsInfo", response) ==
550         PacketResult::Success) {
551       if (response.IsUnsupportedResponse()) {
552         m_supports_jThreadsInfo = false;
553       } else if (!response.Empty()) {
554         object_sp = StructuredData::ParseJSON(response.GetStringRef());
555       }
556     }
557   }
558   return object_sp;
559 }
560 
561 bool GDBRemoteCommunicationClient::GetThreadExtendedInfoSupported() {
562   if (m_supports_jThreadExtendedInfo == eLazyBoolCalculate) {
563     StringExtractorGDBRemote response;
564     m_supports_jThreadExtendedInfo = eLazyBoolNo;
565     if (SendPacketAndWaitForResponse("jThreadExtendedInfo:", response) ==
566         PacketResult::Success) {
567       if (response.IsOKResponse()) {
568         m_supports_jThreadExtendedInfo = eLazyBoolYes;
569       }
570     }
571   }
572   return m_supports_jThreadExtendedInfo;
573 }
574 
575 void GDBRemoteCommunicationClient::EnableErrorStringInPacket() {
576   if (m_supports_error_string_reply == eLazyBoolCalculate) {
577     StringExtractorGDBRemote response;
578     // We try to enable error strings in remote packets but if we fail, we just
579     // work in the older way.
580     m_supports_error_string_reply = eLazyBoolNo;
581     if (SendPacketAndWaitForResponse("QEnableErrorStrings", response) ==
582         PacketResult::Success) {
583       if (response.IsOKResponse()) {
584         m_supports_error_string_reply = eLazyBoolYes;
585       }
586     }
587   }
588 }
589 
590 bool GDBRemoteCommunicationClient::GetLoadedDynamicLibrariesInfosSupported() {
591   if (m_supports_jLoadedDynamicLibrariesInfos == eLazyBoolCalculate) {
592     StringExtractorGDBRemote response;
593     m_supports_jLoadedDynamicLibrariesInfos = eLazyBoolNo;
594     if (SendPacketAndWaitForResponse("jGetLoadedDynamicLibrariesInfos:",
595                                      response) == PacketResult::Success) {
596       if (response.IsOKResponse()) {
597         m_supports_jLoadedDynamicLibrariesInfos = eLazyBoolYes;
598       }
599     }
600   }
601   return m_supports_jLoadedDynamicLibrariesInfos;
602 }
603 
604 bool GDBRemoteCommunicationClient::GetSharedCacheInfoSupported() {
605   if (m_supports_jGetSharedCacheInfo == eLazyBoolCalculate) {
606     StringExtractorGDBRemote response;
607     m_supports_jGetSharedCacheInfo = eLazyBoolNo;
608     if (SendPacketAndWaitForResponse("jGetSharedCacheInfo:", response) ==
609         PacketResult::Success) {
610       if (response.IsOKResponse()) {
611         m_supports_jGetSharedCacheInfo = eLazyBoolYes;
612       }
613     }
614   }
615   return m_supports_jGetSharedCacheInfo;
616 }
617 
618 bool GDBRemoteCommunicationClient::GetDynamicLoaderProcessStateSupported() {
619   if (m_supports_jGetDyldProcessState == eLazyBoolCalculate) {
620     StringExtractorGDBRemote response;
621     m_supports_jGetDyldProcessState = eLazyBoolNo;
622     if (SendPacketAndWaitForResponse("jGetDyldProcessState", response) ==
623         PacketResult::Success) {
624       if (!response.IsUnsupportedResponse())
625         m_supports_jGetDyldProcessState = eLazyBoolYes;
626     }
627   }
628   return m_supports_jGetDyldProcessState;
629 }
630 
631 bool GDBRemoteCommunicationClient::GetMemoryTaggingSupported() {
632   if (m_supports_memory_tagging == eLazyBoolCalculate) {
633     GetRemoteQSupported();
634   }
635   return m_supports_memory_tagging == eLazyBoolYes;
636 }
637 
638 DataBufferSP GDBRemoteCommunicationClient::ReadMemoryTags(lldb::addr_t addr,
639                                                           size_t len,
640                                                           int32_t type) {
641   StreamString packet;
642   packet.Printf("qMemTags:%" PRIx64 ",%zx:%" PRIx32, addr, len, type);
643   StringExtractorGDBRemote response;
644 
645   Log *log = GetLog(GDBRLog::Memory);
646 
647   if (SendPacketAndWaitForResponse(packet.GetString(), response) !=
648           PacketResult::Success ||
649       !response.IsNormalResponse()) {
650     LLDB_LOGF(log, "GDBRemoteCommunicationClient::%s: qMemTags packet failed",
651               __FUNCTION__);
652     return nullptr;
653   }
654 
655   // We are expecting
656   // m<hex encoded bytes>
657 
658   if (response.GetChar() != 'm') {
659     LLDB_LOGF(log,
660               "GDBRemoteCommunicationClient::%s: qMemTags response did not "
661               "begin with \"m\"",
662               __FUNCTION__);
663     return nullptr;
664   }
665 
666   size_t expected_bytes = response.GetBytesLeft() / 2;
667   WritableDataBufferSP buffer_sp(new DataBufferHeap(expected_bytes, 0));
668   size_t got_bytes = response.GetHexBytesAvail(buffer_sp->GetData());
669   // Check both because in some situations chars are consumed even
670   // if the decoding fails.
671   if (response.GetBytesLeft() || (expected_bytes != got_bytes)) {
672     LLDB_LOGF(
673         log,
674         "GDBRemoteCommunicationClient::%s: Invalid data in qMemTags response",
675         __FUNCTION__);
676     return nullptr;
677   }
678 
679   return buffer_sp;
680 }
681 
682 Status GDBRemoteCommunicationClient::WriteMemoryTags(
683     lldb::addr_t addr, size_t len, int32_t type,
684     const std::vector<uint8_t> &tags) {
685   // Format QMemTags:address,length:type:tags
686   StreamString packet;
687   packet.Printf("QMemTags:%" PRIx64 ",%zx:%" PRIx32 ":", addr, len, type);
688   packet.PutBytesAsRawHex8(tags.data(), tags.size());
689 
690   Status status;
691   StringExtractorGDBRemote response;
692   if (SendPacketAndWaitForResponse(packet.GetString(), response) !=
693           PacketResult::Success ||
694       !response.IsOKResponse()) {
695     status.SetErrorString("QMemTags packet failed");
696   }
697   return status;
698 }
699 
700 bool GDBRemoteCommunicationClient::GetxPacketSupported() {
701   if (m_supports_x == eLazyBoolCalculate) {
702     StringExtractorGDBRemote response;
703     m_supports_x = eLazyBoolNo;
704     char packet[256];
705     snprintf(packet, sizeof(packet), "x0,0");
706     if (SendPacketAndWaitForResponse(packet, response) ==
707         PacketResult::Success) {
708       if (response.IsOKResponse())
709         m_supports_x = eLazyBoolYes;
710     }
711   }
712   return m_supports_x;
713 }
714 
715 lldb::pid_t GDBRemoteCommunicationClient::GetCurrentProcessID(bool allow_lazy) {
716   if (allow_lazy && m_curr_pid_is_valid == eLazyBoolYes)
717     return m_curr_pid;
718 
719   // First try to retrieve the pid via the qProcessInfo request.
720   GetCurrentProcessInfo(allow_lazy);
721   if (m_curr_pid_is_valid == eLazyBoolYes) {
722     // We really got it.
723     return m_curr_pid;
724   } else {
725     // If we don't get a response for qProcessInfo, check if $qC gives us a
726     // result. $qC only returns a real process id on older debugserver and
727     // lldb-platform stubs. The gdb remote protocol documents $qC as returning
728     // the thread id, which newer debugserver and lldb-gdbserver stubs return
729     // correctly.
730     StringExtractorGDBRemote response;
731     if (SendPacketAndWaitForResponse("qC", response) == PacketResult::Success) {
732       if (response.GetChar() == 'Q') {
733         if (response.GetChar() == 'C') {
734           m_curr_pid_run = m_curr_pid =
735               response.GetHexMaxU64(false, LLDB_INVALID_PROCESS_ID);
736           if (m_curr_pid != LLDB_INVALID_PROCESS_ID) {
737             m_curr_pid_is_valid = eLazyBoolYes;
738             return m_curr_pid;
739           }
740         }
741       }
742     }
743 
744     // If we don't get a response for $qC, check if $qfThreadID gives us a
745     // result.
746     if (m_curr_pid == LLDB_INVALID_PROCESS_ID) {
747       bool sequence_mutex_unavailable;
748       auto ids = GetCurrentProcessAndThreadIDs(sequence_mutex_unavailable);
749       if (!ids.empty() && !sequence_mutex_unavailable) {
750         // If server returned an explicit PID, use that.
751         m_curr_pid_run = m_curr_pid = ids.front().first;
752         // Otherwise, use the TID of the first thread (Linux hack).
753         if (m_curr_pid == LLDB_INVALID_PROCESS_ID)
754           m_curr_pid_run = m_curr_pid = ids.front().second;
755         m_curr_pid_is_valid = eLazyBoolYes;
756         return m_curr_pid;
757       }
758     }
759   }
760 
761   return LLDB_INVALID_PROCESS_ID;
762 }
763 
764 llvm::Error GDBRemoteCommunicationClient::LaunchProcess(const Args &args) {
765   if (!args.GetArgumentAtIndex(0))
766     return llvm::createStringError(llvm::inconvertibleErrorCode(),
767                                    "Nothing to launch");
768   // try vRun first
769   if (m_supports_vRun) {
770     StreamString packet;
771     packet.PutCString("vRun");
772     for (const Args::ArgEntry &arg : args) {
773       packet.PutChar(';');
774       packet.PutStringAsRawHex8(arg.ref());
775     }
776 
777     StringExtractorGDBRemote response;
778     if (SendPacketAndWaitForResponse(packet.GetString(), response) !=
779         PacketResult::Success)
780       return llvm::createStringError(llvm::inconvertibleErrorCode(),
781                                      "Sending vRun packet failed");
782 
783     if (response.IsErrorResponse())
784       return response.GetStatus().ToError();
785 
786     // vRun replies with a stop reason packet
787     // FIXME: right now we just discard the packet and LLDB queries
788     // for stop reason again
789     if (!response.IsUnsupportedResponse())
790       return llvm::Error::success();
791 
792     m_supports_vRun = false;
793   }
794 
795   // fallback to A
796   StreamString packet;
797   packet.PutChar('A');
798   llvm::ListSeparator LS(",");
799   for (const auto &arg : llvm::enumerate(args)) {
800     packet << LS;
801     packet.Format("{0},{1},", arg.value().ref().size() * 2, arg.index());
802     packet.PutStringAsRawHex8(arg.value().ref());
803   }
804 
805   StringExtractorGDBRemote response;
806   if (SendPacketAndWaitForResponse(packet.GetString(), response) !=
807       PacketResult::Success) {
808     return llvm::createStringError(llvm::inconvertibleErrorCode(),
809                                    "Sending A packet failed");
810   }
811   if (!response.IsOKResponse())
812     return response.GetStatus().ToError();
813 
814   if (SendPacketAndWaitForResponse("qLaunchSuccess", response) !=
815       PacketResult::Success) {
816     return llvm::createStringError(llvm::inconvertibleErrorCode(),
817                                    "Sending qLaunchSuccess packet failed");
818   }
819   if (response.IsOKResponse())
820     return llvm::Error::success();
821   if (response.GetChar() == 'E') {
822     return llvm::createStringError(llvm::inconvertibleErrorCode(),
823                                    response.GetStringRef().substr(1));
824   }
825   return llvm::createStringError(llvm::inconvertibleErrorCode(),
826                                  "unknown error occurred launching process");
827 }
828 
829 int GDBRemoteCommunicationClient::SendEnvironment(const Environment &env) {
830   llvm::SmallVector<std::pair<llvm::StringRef, llvm::StringRef>, 0> vec;
831   for (const auto &kv : env)
832     vec.emplace_back(kv.first(), kv.second);
833   llvm::sort(vec, llvm::less_first());
834   for (const auto &[k, v] : vec) {
835     int r = SendEnvironmentPacket((k + "=" + v).str().c_str());
836     if (r != 0)
837       return r;
838   }
839   return 0;
840 }
841 
842 int GDBRemoteCommunicationClient::SendEnvironmentPacket(
843     char const *name_equal_value) {
844   if (name_equal_value && name_equal_value[0]) {
845     bool send_hex_encoding = false;
846     for (const char *p = name_equal_value; *p != '\0' && !send_hex_encoding;
847          ++p) {
848       if (llvm::isPrint(*p)) {
849         switch (*p) {
850         case '$':
851         case '#':
852         case '*':
853         case '}':
854           send_hex_encoding = true;
855           break;
856         default:
857           break;
858         }
859       } else {
860         // We have non printable characters, lets hex encode this...
861         send_hex_encoding = true;
862       }
863     }
864 
865     StringExtractorGDBRemote response;
866     // Prefer sending unencoded, if possible and the server supports it.
867     if (!send_hex_encoding && m_supports_QEnvironment) {
868       StreamString packet;
869       packet.Printf("QEnvironment:%s", name_equal_value);
870       if (SendPacketAndWaitForResponse(packet.GetString(), response) !=
871           PacketResult::Success)
872         return -1;
873 
874       if (response.IsOKResponse())
875         return 0;
876       if (response.IsUnsupportedResponse())
877         m_supports_QEnvironment = false;
878       else {
879         uint8_t error = response.GetError();
880         if (error)
881           return error;
882         return -1;
883       }
884     }
885 
886     if (m_supports_QEnvironmentHexEncoded) {
887       StreamString packet;
888       packet.PutCString("QEnvironmentHexEncoded:");
889       packet.PutBytesAsRawHex8(name_equal_value, strlen(name_equal_value));
890       if (SendPacketAndWaitForResponse(packet.GetString(), response) !=
891           PacketResult::Success)
892         return -1;
893 
894       if (response.IsOKResponse())
895         return 0;
896       if (response.IsUnsupportedResponse())
897         m_supports_QEnvironmentHexEncoded = false;
898       else {
899         uint8_t error = response.GetError();
900         if (error)
901           return error;
902         return -1;
903       }
904     }
905   }
906   return -1;
907 }
908 
909 int GDBRemoteCommunicationClient::SendLaunchArchPacket(char const *arch) {
910   if (arch && arch[0]) {
911     StreamString packet;
912     packet.Printf("QLaunchArch:%s", arch);
913     StringExtractorGDBRemote response;
914     if (SendPacketAndWaitForResponse(packet.GetString(), response) ==
915         PacketResult::Success) {
916       if (response.IsOKResponse())
917         return 0;
918       uint8_t error = response.GetError();
919       if (error)
920         return error;
921     }
922   }
923   return -1;
924 }
925 
926 int GDBRemoteCommunicationClient::SendLaunchEventDataPacket(
927     char const *data, bool *was_supported) {
928   if (data && *data != '\0') {
929     StreamString packet;
930     packet.Printf("QSetProcessEvent:%s", data);
931     StringExtractorGDBRemote response;
932     if (SendPacketAndWaitForResponse(packet.GetString(), response) ==
933         PacketResult::Success) {
934       if (response.IsOKResponse()) {
935         if (was_supported)
936           *was_supported = true;
937         return 0;
938       } else if (response.IsUnsupportedResponse()) {
939         if (was_supported)
940           *was_supported = false;
941         return -1;
942       } else {
943         uint8_t error = response.GetError();
944         if (was_supported)
945           *was_supported = true;
946         if (error)
947           return error;
948       }
949     }
950   }
951   return -1;
952 }
953 
954 llvm::VersionTuple GDBRemoteCommunicationClient::GetOSVersion() {
955   GetHostInfo();
956   return m_os_version;
957 }
958 
959 llvm::VersionTuple GDBRemoteCommunicationClient::GetMacCatalystVersion() {
960   GetHostInfo();
961   return m_maccatalyst_version;
962 }
963 
964 std::optional<std::string> GDBRemoteCommunicationClient::GetOSBuildString() {
965   if (GetHostInfo()) {
966     if (!m_os_build.empty())
967       return m_os_build;
968   }
969   return std::nullopt;
970 }
971 
972 std::optional<std::string>
973 GDBRemoteCommunicationClient::GetOSKernelDescription() {
974   if (GetHostInfo()) {
975     if (!m_os_kernel.empty())
976       return m_os_kernel;
977   }
978   return std::nullopt;
979 }
980 
981 bool GDBRemoteCommunicationClient::GetHostname(std::string &s) {
982   if (GetHostInfo()) {
983     if (!m_hostname.empty()) {
984       s = m_hostname;
985       return true;
986     }
987   }
988   s.clear();
989   return false;
990 }
991 
992 ArchSpec GDBRemoteCommunicationClient::GetSystemArchitecture() {
993   if (GetHostInfo())
994     return m_host_arch;
995   return ArchSpec();
996 }
997 
998 const lldb_private::ArchSpec &
999 GDBRemoteCommunicationClient::GetProcessArchitecture() {
1000   if (m_qProcessInfo_is_valid == eLazyBoolCalculate)
1001     GetCurrentProcessInfo();
1002   return m_process_arch;
1003 }
1004 
1005 bool GDBRemoteCommunicationClient::GetProcessStandaloneBinary(
1006     UUID &uuid, addr_t &value, bool &value_is_offset) {
1007   if (m_qProcessInfo_is_valid == eLazyBoolCalculate)
1008     GetCurrentProcessInfo();
1009 
1010   // Return true if we have a UUID or an address/offset of the
1011   // main standalone / firmware binary being used.
1012   if (!m_process_standalone_uuid.IsValid() &&
1013       m_process_standalone_value == LLDB_INVALID_ADDRESS)
1014     return false;
1015 
1016   uuid = m_process_standalone_uuid;
1017   value = m_process_standalone_value;
1018   value_is_offset = m_process_standalone_value_is_offset;
1019   return true;
1020 }
1021 
1022 std::vector<addr_t>
1023 GDBRemoteCommunicationClient::GetProcessStandaloneBinaries() {
1024   if (m_qProcessInfo_is_valid == eLazyBoolCalculate)
1025     GetCurrentProcessInfo();
1026   return m_binary_addresses;
1027 }
1028 
1029 bool GDBRemoteCommunicationClient::GetGDBServerVersion() {
1030   if (m_qGDBServerVersion_is_valid == eLazyBoolCalculate) {
1031     m_gdb_server_name.clear();
1032     m_gdb_server_version = 0;
1033     m_qGDBServerVersion_is_valid = eLazyBoolNo;
1034 
1035     StringExtractorGDBRemote response;
1036     if (SendPacketAndWaitForResponse("qGDBServerVersion", response) ==
1037         PacketResult::Success) {
1038       if (response.IsNormalResponse()) {
1039         llvm::StringRef name, value;
1040         bool success = false;
1041         while (response.GetNameColonValue(name, value)) {
1042           if (name.equals("name")) {
1043             success = true;
1044             m_gdb_server_name = std::string(value);
1045           } else if (name.equals("version")) {
1046             llvm::StringRef major, minor;
1047             std::tie(major, minor) = value.split('.');
1048             if (!major.getAsInteger(0, m_gdb_server_version))
1049               success = true;
1050           }
1051         }
1052         if (success)
1053           m_qGDBServerVersion_is_valid = eLazyBoolYes;
1054       }
1055     }
1056   }
1057   return m_qGDBServerVersion_is_valid == eLazyBoolYes;
1058 }
1059 
1060 void GDBRemoteCommunicationClient::MaybeEnableCompression(
1061     llvm::ArrayRef<llvm::StringRef> supported_compressions) {
1062   CompressionType avail_type = CompressionType::None;
1063   llvm::StringRef avail_name;
1064 
1065 #if defined(HAVE_LIBCOMPRESSION)
1066   if (avail_type == CompressionType::None) {
1067     for (auto compression : supported_compressions) {
1068       if (compression == "lzfse") {
1069         avail_type = CompressionType::LZFSE;
1070         avail_name = compression;
1071         break;
1072       }
1073     }
1074   }
1075 #endif
1076 
1077 #if defined(HAVE_LIBCOMPRESSION)
1078   if (avail_type == CompressionType::None) {
1079     for (auto compression : supported_compressions) {
1080       if (compression == "zlib-deflate") {
1081         avail_type = CompressionType::ZlibDeflate;
1082         avail_name = compression;
1083         break;
1084       }
1085     }
1086   }
1087 #endif
1088 
1089 #if LLVM_ENABLE_ZLIB
1090   if (avail_type == CompressionType::None) {
1091     for (auto compression : supported_compressions) {
1092       if (compression == "zlib-deflate") {
1093         avail_type = CompressionType::ZlibDeflate;
1094         avail_name = compression;
1095         break;
1096       }
1097     }
1098   }
1099 #endif
1100 
1101 #if defined(HAVE_LIBCOMPRESSION)
1102   if (avail_type == CompressionType::None) {
1103     for (auto compression : supported_compressions) {
1104       if (compression == "lz4") {
1105         avail_type = CompressionType::LZ4;
1106         avail_name = compression;
1107         break;
1108       }
1109     }
1110   }
1111 #endif
1112 
1113 #if defined(HAVE_LIBCOMPRESSION)
1114   if (avail_type == CompressionType::None) {
1115     for (auto compression : supported_compressions) {
1116       if (compression == "lzma") {
1117         avail_type = CompressionType::LZMA;
1118         avail_name = compression;
1119         break;
1120       }
1121     }
1122   }
1123 #endif
1124 
1125   if (avail_type != CompressionType::None) {
1126     StringExtractorGDBRemote response;
1127     std::string packet = "QEnableCompression:type:" + avail_name.str() + ";";
1128     if (SendPacketAndWaitForResponse(packet, response) != PacketResult::Success)
1129       return;
1130 
1131     if (response.IsOKResponse()) {
1132       m_compression_type = avail_type;
1133     }
1134   }
1135 }
1136 
1137 const char *GDBRemoteCommunicationClient::GetGDBServerProgramName() {
1138   if (GetGDBServerVersion()) {
1139     if (!m_gdb_server_name.empty())
1140       return m_gdb_server_name.c_str();
1141   }
1142   return nullptr;
1143 }
1144 
1145 uint32_t GDBRemoteCommunicationClient::GetGDBServerProgramVersion() {
1146   if (GetGDBServerVersion())
1147     return m_gdb_server_version;
1148   return 0;
1149 }
1150 
1151 bool GDBRemoteCommunicationClient::GetDefaultThreadId(lldb::tid_t &tid) {
1152   StringExtractorGDBRemote response;
1153   if (SendPacketAndWaitForResponse("qC", response) != PacketResult::Success)
1154     return false;
1155 
1156   if (!response.IsNormalResponse())
1157     return false;
1158 
1159   if (response.GetChar() == 'Q' && response.GetChar() == 'C') {
1160     auto pid_tid = response.GetPidTid(0);
1161     if (!pid_tid)
1162       return false;
1163 
1164     lldb::pid_t pid = pid_tid->first;
1165     // invalid
1166     if (pid == StringExtractorGDBRemote::AllProcesses)
1167       return false;
1168 
1169     // if we get pid as well, update m_curr_pid
1170     if (pid != 0) {
1171       m_curr_pid_run = m_curr_pid = pid;
1172       m_curr_pid_is_valid = eLazyBoolYes;
1173     }
1174     tid = pid_tid->second;
1175   }
1176 
1177   return true;
1178 }
1179 
1180 static void ParseOSType(llvm::StringRef value, std::string &os_name,
1181                         std::string &environment) {
1182   if (value.equals("iossimulator") || value.equals("tvossimulator") ||
1183       value.equals("watchossimulator")) {
1184     environment = "simulator";
1185     os_name = value.drop_back(environment.size()).str();
1186   } else if (value.equals("maccatalyst")) {
1187     os_name = "ios";
1188     environment = "macabi";
1189   } else {
1190     os_name = value.str();
1191   }
1192 }
1193 
1194 bool GDBRemoteCommunicationClient::GetHostInfo(bool force) {
1195   Log *log = GetLog(GDBRLog::Process);
1196 
1197   if (force || m_qHostInfo_is_valid == eLazyBoolCalculate) {
1198     // host info computation can require DNS traffic and shelling out to external processes.
1199     // Increase the timeout to account for that.
1200     ScopedTimeout timeout(*this, seconds(10));
1201     m_qHostInfo_is_valid = eLazyBoolNo;
1202     StringExtractorGDBRemote response;
1203     if (SendPacketAndWaitForResponse("qHostInfo", response) ==
1204         PacketResult::Success) {
1205       if (response.IsNormalResponse()) {
1206         llvm::StringRef name;
1207         llvm::StringRef value;
1208         uint32_t cpu = LLDB_INVALID_CPUTYPE;
1209         uint32_t sub = 0;
1210         std::string arch_name;
1211         std::string os_name;
1212         std::string environment;
1213         std::string vendor_name;
1214         std::string triple;
1215         uint32_t pointer_byte_size = 0;
1216         ByteOrder byte_order = eByteOrderInvalid;
1217         uint32_t num_keys_decoded = 0;
1218         while (response.GetNameColonValue(name, value)) {
1219           if (name.equals("cputype")) {
1220             // exception type in big endian hex
1221             if (!value.getAsInteger(0, cpu))
1222               ++num_keys_decoded;
1223           } else if (name.equals("cpusubtype")) {
1224             // exception count in big endian hex
1225             if (!value.getAsInteger(0, sub))
1226               ++num_keys_decoded;
1227           } else if (name.equals("arch")) {
1228             arch_name = std::string(value);
1229             ++num_keys_decoded;
1230           } else if (name.equals("triple")) {
1231             StringExtractor extractor(value);
1232             extractor.GetHexByteString(triple);
1233             ++num_keys_decoded;
1234           } else if (name.equals("distribution_id")) {
1235             StringExtractor extractor(value);
1236             extractor.GetHexByteString(m_host_distribution_id);
1237             ++num_keys_decoded;
1238           } else if (name.equals("os_build")) {
1239             StringExtractor extractor(value);
1240             extractor.GetHexByteString(m_os_build);
1241             ++num_keys_decoded;
1242           } else if (name.equals("hostname")) {
1243             StringExtractor extractor(value);
1244             extractor.GetHexByteString(m_hostname);
1245             ++num_keys_decoded;
1246           } else if (name.equals("os_kernel")) {
1247             StringExtractor extractor(value);
1248             extractor.GetHexByteString(m_os_kernel);
1249             ++num_keys_decoded;
1250           } else if (name.equals("ostype")) {
1251             ParseOSType(value, os_name, environment);
1252             ++num_keys_decoded;
1253           } else if (name.equals("vendor")) {
1254             vendor_name = std::string(value);
1255             ++num_keys_decoded;
1256           } else if (name.equals("endian")) {
1257             byte_order = llvm::StringSwitch<lldb::ByteOrder>(value)
1258                              .Case("little", eByteOrderLittle)
1259                              .Case("big", eByteOrderBig)
1260                              .Case("pdp", eByteOrderPDP)
1261                              .Default(eByteOrderInvalid);
1262             if (byte_order != eByteOrderInvalid)
1263               ++num_keys_decoded;
1264           } else if (name.equals("ptrsize")) {
1265             if (!value.getAsInteger(0, pointer_byte_size))
1266               ++num_keys_decoded;
1267           } else if (name.equals("addressing_bits")) {
1268             if (!value.getAsInteger(0, m_low_mem_addressing_bits)) {
1269               ++num_keys_decoded;
1270             }
1271           } else if (name.equals("high_mem_addressing_bits")) {
1272             if (!value.getAsInteger(0, m_high_mem_addressing_bits))
1273               ++num_keys_decoded;
1274           } else if (name.equals("low_mem_addressing_bits")) {
1275             if (!value.getAsInteger(0, m_low_mem_addressing_bits))
1276               ++num_keys_decoded;
1277           } else if (name.equals("os_version") ||
1278                      name.equals("version")) // Older debugserver binaries used
1279                                              // the "version" key instead of
1280                                              // "os_version"...
1281           {
1282             if (!m_os_version.tryParse(value))
1283               ++num_keys_decoded;
1284           } else if (name.equals("maccatalyst_version")) {
1285             if (!m_maccatalyst_version.tryParse(value))
1286               ++num_keys_decoded;
1287           } else if (name.equals("watchpoint_exceptions_received")) {
1288             m_watchpoints_trigger_after_instruction =
1289                 llvm::StringSwitch<LazyBool>(value)
1290                     .Case("before", eLazyBoolNo)
1291                     .Case("after", eLazyBoolYes)
1292                     .Default(eLazyBoolCalculate);
1293             if (m_watchpoints_trigger_after_instruction != eLazyBoolCalculate)
1294               ++num_keys_decoded;
1295           } else if (name.equals("default_packet_timeout")) {
1296             uint32_t timeout_seconds;
1297             if (!value.getAsInteger(0, timeout_seconds)) {
1298               m_default_packet_timeout = seconds(timeout_seconds);
1299               SetPacketTimeout(m_default_packet_timeout);
1300               ++num_keys_decoded;
1301             }
1302           } else if (name.equals("vm-page-size")) {
1303             int page_size;
1304             if (!value.getAsInteger(0, page_size)) {
1305               m_target_vm_page_size = page_size;
1306               ++num_keys_decoded;
1307             }
1308           }
1309         }
1310 
1311         if (num_keys_decoded > 0)
1312           m_qHostInfo_is_valid = eLazyBoolYes;
1313 
1314         if (triple.empty()) {
1315           if (arch_name.empty()) {
1316             if (cpu != LLDB_INVALID_CPUTYPE) {
1317               m_host_arch.SetArchitecture(eArchTypeMachO, cpu, sub);
1318               if (pointer_byte_size) {
1319                 assert(pointer_byte_size == m_host_arch.GetAddressByteSize());
1320               }
1321               if (byte_order != eByteOrderInvalid) {
1322                 assert(byte_order == m_host_arch.GetByteOrder());
1323               }
1324 
1325               if (!vendor_name.empty())
1326                 m_host_arch.GetTriple().setVendorName(
1327                     llvm::StringRef(vendor_name));
1328               if (!os_name.empty())
1329                 m_host_arch.GetTriple().setOSName(llvm::StringRef(os_name));
1330               if (!environment.empty())
1331                 m_host_arch.GetTriple().setEnvironmentName(environment);
1332             }
1333           } else {
1334             std::string triple;
1335             triple += arch_name;
1336             if (!vendor_name.empty() || !os_name.empty()) {
1337               triple += '-';
1338               if (vendor_name.empty())
1339                 triple += "unknown";
1340               else
1341                 triple += vendor_name;
1342               triple += '-';
1343               if (os_name.empty())
1344                 triple += "unknown";
1345               else
1346                 triple += os_name;
1347             }
1348             m_host_arch.SetTriple(triple.c_str());
1349 
1350             llvm::Triple &host_triple = m_host_arch.GetTriple();
1351             if (host_triple.getVendor() == llvm::Triple::Apple &&
1352                 host_triple.getOS() == llvm::Triple::Darwin) {
1353               switch (m_host_arch.GetMachine()) {
1354               case llvm::Triple::aarch64:
1355               case llvm::Triple::aarch64_32:
1356               case llvm::Triple::arm:
1357               case llvm::Triple::thumb:
1358                 host_triple.setOS(llvm::Triple::IOS);
1359                 break;
1360               default:
1361                 host_triple.setOS(llvm::Triple::MacOSX);
1362                 break;
1363               }
1364             }
1365             if (pointer_byte_size) {
1366               assert(pointer_byte_size == m_host_arch.GetAddressByteSize());
1367             }
1368             if (byte_order != eByteOrderInvalid) {
1369               assert(byte_order == m_host_arch.GetByteOrder());
1370             }
1371           }
1372         } else {
1373           m_host_arch.SetTriple(triple.c_str());
1374           if (pointer_byte_size) {
1375             assert(pointer_byte_size == m_host_arch.GetAddressByteSize());
1376           }
1377           if (byte_order != eByteOrderInvalid) {
1378             assert(byte_order == m_host_arch.GetByteOrder());
1379           }
1380 
1381           LLDB_LOGF(log,
1382                     "GDBRemoteCommunicationClient::%s parsed host "
1383                     "architecture as %s, triple as %s from triple text %s",
1384                     __FUNCTION__,
1385                     m_host_arch.GetArchitectureName()
1386                         ? m_host_arch.GetArchitectureName()
1387                         : "<null-arch-name>",
1388                     m_host_arch.GetTriple().getTriple().c_str(),
1389                     triple.c_str());
1390         }
1391       }
1392     }
1393   }
1394   return m_qHostInfo_is_valid == eLazyBoolYes;
1395 }
1396 
1397 int GDBRemoteCommunicationClient::SendStdinNotification(const char *data,
1398                                                         size_t data_len) {
1399   StreamString packet;
1400   packet.PutCString("I");
1401   packet.PutBytesAsRawHex8(data, data_len);
1402   StringExtractorGDBRemote response;
1403   if (SendPacketAndWaitForResponse(packet.GetString(), response) ==
1404       PacketResult::Success) {
1405     return 0;
1406   }
1407   return response.GetError();
1408 }
1409 
1410 const lldb_private::ArchSpec &
1411 GDBRemoteCommunicationClient::GetHostArchitecture() {
1412   if (m_qHostInfo_is_valid == eLazyBoolCalculate)
1413     GetHostInfo();
1414   return m_host_arch;
1415 }
1416 
1417 AddressableBits GDBRemoteCommunicationClient::GetAddressableBits() {
1418   AddressableBits addressable_bits;
1419   if (m_qHostInfo_is_valid == eLazyBoolCalculate)
1420     GetHostInfo();
1421 
1422   if (m_low_mem_addressing_bits == m_high_mem_addressing_bits)
1423     addressable_bits.SetAddressableBits(m_low_mem_addressing_bits);
1424   else
1425     addressable_bits.SetAddressableBits(m_low_mem_addressing_bits,
1426                                         m_high_mem_addressing_bits);
1427   return addressable_bits;
1428 }
1429 
1430 seconds GDBRemoteCommunicationClient::GetHostDefaultPacketTimeout() {
1431   if (m_qHostInfo_is_valid == eLazyBoolCalculate)
1432     GetHostInfo();
1433   return m_default_packet_timeout;
1434 }
1435 
1436 addr_t GDBRemoteCommunicationClient::AllocateMemory(size_t size,
1437                                                     uint32_t permissions) {
1438   if (m_supports_alloc_dealloc_memory != eLazyBoolNo) {
1439     m_supports_alloc_dealloc_memory = eLazyBoolYes;
1440     char packet[64];
1441     const int packet_len = ::snprintf(
1442         packet, sizeof(packet), "_M%" PRIx64 ",%s%s%s", (uint64_t)size,
1443         permissions & lldb::ePermissionsReadable ? "r" : "",
1444         permissions & lldb::ePermissionsWritable ? "w" : "",
1445         permissions & lldb::ePermissionsExecutable ? "x" : "");
1446     assert(packet_len < (int)sizeof(packet));
1447     UNUSED_IF_ASSERT_DISABLED(packet_len);
1448     StringExtractorGDBRemote response;
1449     if (SendPacketAndWaitForResponse(packet, response) ==
1450         PacketResult::Success) {
1451       if (response.IsUnsupportedResponse())
1452         m_supports_alloc_dealloc_memory = eLazyBoolNo;
1453       else if (!response.IsErrorResponse())
1454         return response.GetHexMaxU64(false, LLDB_INVALID_ADDRESS);
1455     } else {
1456       m_supports_alloc_dealloc_memory = eLazyBoolNo;
1457     }
1458   }
1459   return LLDB_INVALID_ADDRESS;
1460 }
1461 
1462 bool GDBRemoteCommunicationClient::DeallocateMemory(addr_t addr) {
1463   if (m_supports_alloc_dealloc_memory != eLazyBoolNo) {
1464     m_supports_alloc_dealloc_memory = eLazyBoolYes;
1465     char packet[64];
1466     const int packet_len =
1467         ::snprintf(packet, sizeof(packet), "_m%" PRIx64, (uint64_t)addr);
1468     assert(packet_len < (int)sizeof(packet));
1469     UNUSED_IF_ASSERT_DISABLED(packet_len);
1470     StringExtractorGDBRemote response;
1471     if (SendPacketAndWaitForResponse(packet, response) ==
1472         PacketResult::Success) {
1473       if (response.IsUnsupportedResponse())
1474         m_supports_alloc_dealloc_memory = eLazyBoolNo;
1475       else if (response.IsOKResponse())
1476         return true;
1477     } else {
1478       m_supports_alloc_dealloc_memory = eLazyBoolNo;
1479     }
1480   }
1481   return false;
1482 }
1483 
1484 Status GDBRemoteCommunicationClient::Detach(bool keep_stopped,
1485                                             lldb::pid_t pid) {
1486   Status error;
1487   lldb_private::StreamString packet;
1488 
1489   packet.PutChar('D');
1490   if (keep_stopped) {
1491     if (m_supports_detach_stay_stopped == eLazyBoolCalculate) {
1492       char packet[64];
1493       const int packet_len =
1494           ::snprintf(packet, sizeof(packet), "qSupportsDetachAndStayStopped:");
1495       assert(packet_len < (int)sizeof(packet));
1496       UNUSED_IF_ASSERT_DISABLED(packet_len);
1497       StringExtractorGDBRemote response;
1498       if (SendPacketAndWaitForResponse(packet, response) ==
1499               PacketResult::Success &&
1500           response.IsOKResponse()) {
1501         m_supports_detach_stay_stopped = eLazyBoolYes;
1502       } else {
1503         m_supports_detach_stay_stopped = eLazyBoolNo;
1504       }
1505     }
1506 
1507     if (m_supports_detach_stay_stopped == eLazyBoolNo) {
1508       error.SetErrorString("Stays stopped not supported by this target.");
1509       return error;
1510     } else {
1511       packet.PutChar('1');
1512     }
1513   }
1514 
1515   if (GetMultiprocessSupported()) {
1516     // Some servers (e.g. qemu) require specifying the PID even if only a single
1517     // process is running.
1518     if (pid == LLDB_INVALID_PROCESS_ID)
1519       pid = GetCurrentProcessID();
1520     packet.PutChar(';');
1521     packet.PutHex64(pid);
1522   } else if (pid != LLDB_INVALID_PROCESS_ID) {
1523     error.SetErrorString("Multiprocess extension not supported by the server.");
1524     return error;
1525   }
1526 
1527   StringExtractorGDBRemote response;
1528   PacketResult packet_result =
1529       SendPacketAndWaitForResponse(packet.GetString(), response);
1530   if (packet_result != PacketResult::Success)
1531     error.SetErrorString("Sending isconnect packet failed.");
1532   return error;
1533 }
1534 
1535 Status GDBRemoteCommunicationClient::GetMemoryRegionInfo(
1536     lldb::addr_t addr, lldb_private::MemoryRegionInfo &region_info) {
1537   Status error;
1538   region_info.Clear();
1539 
1540   if (m_supports_memory_region_info != eLazyBoolNo) {
1541     m_supports_memory_region_info = eLazyBoolYes;
1542     char packet[64];
1543     const int packet_len = ::snprintf(
1544         packet, sizeof(packet), "qMemoryRegionInfo:%" PRIx64, (uint64_t)addr);
1545     assert(packet_len < (int)sizeof(packet));
1546     UNUSED_IF_ASSERT_DISABLED(packet_len);
1547     StringExtractorGDBRemote response;
1548     if (SendPacketAndWaitForResponse(packet, response) ==
1549             PacketResult::Success &&
1550         response.GetResponseType() == StringExtractorGDBRemote::eResponse) {
1551       llvm::StringRef name;
1552       llvm::StringRef value;
1553       addr_t addr_value = LLDB_INVALID_ADDRESS;
1554       bool success = true;
1555       bool saw_permissions = false;
1556       while (success && response.GetNameColonValue(name, value)) {
1557         if (name.equals("start")) {
1558           if (!value.getAsInteger(16, addr_value))
1559             region_info.GetRange().SetRangeBase(addr_value);
1560         } else if (name.equals("size")) {
1561           if (!value.getAsInteger(16, addr_value)) {
1562             region_info.GetRange().SetByteSize(addr_value);
1563             if (region_info.GetRange().GetRangeEnd() <
1564                 region_info.GetRange().GetRangeBase()) {
1565               // Range size overflowed, truncate it.
1566               region_info.GetRange().SetRangeEnd(LLDB_INVALID_ADDRESS);
1567             }
1568           }
1569         } else if (name.equals("permissions") &&
1570                    region_info.GetRange().IsValid()) {
1571           saw_permissions = true;
1572           if (region_info.GetRange().Contains(addr)) {
1573             if (value.contains('r'))
1574               region_info.SetReadable(MemoryRegionInfo::eYes);
1575             else
1576               region_info.SetReadable(MemoryRegionInfo::eNo);
1577 
1578             if (value.contains('w'))
1579               region_info.SetWritable(MemoryRegionInfo::eYes);
1580             else
1581               region_info.SetWritable(MemoryRegionInfo::eNo);
1582 
1583             if (value.contains('x'))
1584               region_info.SetExecutable(MemoryRegionInfo::eYes);
1585             else
1586               region_info.SetExecutable(MemoryRegionInfo::eNo);
1587 
1588             region_info.SetMapped(MemoryRegionInfo::eYes);
1589           } else {
1590             // The reported region does not contain this address -- we're
1591             // looking at an unmapped page
1592             region_info.SetReadable(MemoryRegionInfo::eNo);
1593             region_info.SetWritable(MemoryRegionInfo::eNo);
1594             region_info.SetExecutable(MemoryRegionInfo::eNo);
1595             region_info.SetMapped(MemoryRegionInfo::eNo);
1596           }
1597         } else if (name.equals("name")) {
1598           StringExtractorGDBRemote name_extractor(value);
1599           std::string name;
1600           name_extractor.GetHexByteString(name);
1601           region_info.SetName(name.c_str());
1602         } else if (name.equals("flags")) {
1603           region_info.SetMemoryTagged(MemoryRegionInfo::eNo);
1604 
1605           llvm::StringRef flags = value;
1606           llvm::StringRef flag;
1607           while (flags.size()) {
1608             flags = flags.ltrim();
1609             std::tie(flag, flags) = flags.split(' ');
1610             // To account for trailing whitespace
1611             if (flag.size()) {
1612               if (flag == "mt") {
1613                 region_info.SetMemoryTagged(MemoryRegionInfo::eYes);
1614                 break;
1615               }
1616             }
1617           }
1618         } else if (name.equals("type")) {
1619           std::string comma_sep_str = value.str();
1620           size_t comma_pos;
1621           while ((comma_pos = comma_sep_str.find(',')) != std::string::npos) {
1622             comma_sep_str[comma_pos] = '\0';
1623             if (comma_sep_str == "stack") {
1624               region_info.SetIsStackMemory(MemoryRegionInfo::eYes);
1625             }
1626           }
1627           // handle final (or only) type of "stack"
1628           if (comma_sep_str == "stack") {
1629             region_info.SetIsStackMemory(MemoryRegionInfo::eYes);
1630           }
1631         } else if (name.equals("error")) {
1632           StringExtractorGDBRemote error_extractor(value);
1633           std::string error_string;
1634           // Now convert the HEX bytes into a string value
1635           error_extractor.GetHexByteString(error_string);
1636           error.SetErrorString(error_string.c_str());
1637         } else if (name.equals("dirty-pages")) {
1638           std::vector<addr_t> dirty_page_list;
1639           for (llvm::StringRef x : llvm::split(value, ',')) {
1640             addr_t page;
1641             x.consume_front("0x");
1642             if (llvm::to_integer(x, page, 16))
1643               dirty_page_list.push_back(page);
1644           }
1645           region_info.SetDirtyPageList(dirty_page_list);
1646         }
1647       }
1648 
1649       if (m_target_vm_page_size != 0)
1650         region_info.SetPageSize(m_target_vm_page_size);
1651 
1652       if (region_info.GetRange().IsValid()) {
1653         // We got a valid address range back but no permissions -- which means
1654         // this is an unmapped page
1655         if (!saw_permissions) {
1656           region_info.SetReadable(MemoryRegionInfo::eNo);
1657           region_info.SetWritable(MemoryRegionInfo::eNo);
1658           region_info.SetExecutable(MemoryRegionInfo::eNo);
1659           region_info.SetMapped(MemoryRegionInfo::eNo);
1660         }
1661       } else {
1662         // We got an invalid address range back
1663         error.SetErrorString("Server returned invalid range");
1664       }
1665     } else {
1666       m_supports_memory_region_info = eLazyBoolNo;
1667     }
1668   }
1669 
1670   if (m_supports_memory_region_info == eLazyBoolNo) {
1671     error.SetErrorString("qMemoryRegionInfo is not supported");
1672   }
1673 
1674   // Try qXfer:memory-map:read to get region information not included in
1675   // qMemoryRegionInfo
1676   MemoryRegionInfo qXfer_region_info;
1677   Status qXfer_error = GetQXferMemoryMapRegionInfo(addr, qXfer_region_info);
1678 
1679   if (error.Fail()) {
1680     // If qMemoryRegionInfo failed, but qXfer:memory-map:read succeeded, use
1681     // the qXfer result as a fallback
1682     if (qXfer_error.Success()) {
1683       region_info = qXfer_region_info;
1684       error.Clear();
1685     } else {
1686       region_info.Clear();
1687     }
1688   } else if (qXfer_error.Success()) {
1689     // If both qMemoryRegionInfo and qXfer:memory-map:read succeeded, and if
1690     // both regions are the same range, update the result to include the flash-
1691     // memory information that is specific to the qXfer result.
1692     if (region_info.GetRange() == qXfer_region_info.GetRange()) {
1693       region_info.SetFlash(qXfer_region_info.GetFlash());
1694       region_info.SetBlocksize(qXfer_region_info.GetBlocksize());
1695     }
1696   }
1697   return error;
1698 }
1699 
1700 Status GDBRemoteCommunicationClient::GetQXferMemoryMapRegionInfo(
1701     lldb::addr_t addr, MemoryRegionInfo &region) {
1702   Status error = LoadQXferMemoryMap();
1703   if (!error.Success())
1704     return error;
1705   for (const auto &map_region : m_qXfer_memory_map) {
1706     if (map_region.GetRange().Contains(addr)) {
1707       region = map_region;
1708       return error;
1709     }
1710   }
1711   error.SetErrorString("Region not found");
1712   return error;
1713 }
1714 
1715 Status GDBRemoteCommunicationClient::LoadQXferMemoryMap() {
1716 
1717   Status error;
1718 
1719   if (m_qXfer_memory_map_loaded)
1720     // Already loaded, return success
1721     return error;
1722 
1723   if (!XMLDocument::XMLEnabled()) {
1724     error.SetErrorString("XML is not supported");
1725     return error;
1726   }
1727 
1728   if (!GetQXferMemoryMapReadSupported()) {
1729     error.SetErrorString("Memory map is not supported");
1730     return error;
1731   }
1732 
1733   llvm::Expected<std::string> xml = ReadExtFeature("memory-map", "");
1734   if (!xml)
1735     return Status(xml.takeError());
1736 
1737   XMLDocument xml_document;
1738 
1739   if (!xml_document.ParseMemory(xml->c_str(), xml->size())) {
1740     error.SetErrorString("Failed to parse memory map xml");
1741     return error;
1742   }
1743 
1744   XMLNode map_node = xml_document.GetRootElement("memory-map");
1745   if (!map_node) {
1746     error.SetErrorString("Invalid root node in memory map xml");
1747     return error;
1748   }
1749 
1750   m_qXfer_memory_map.clear();
1751 
1752   map_node.ForEachChildElement([this](const XMLNode &memory_node) -> bool {
1753     if (!memory_node.IsElement())
1754       return true;
1755     if (memory_node.GetName() != "memory")
1756       return true;
1757     auto type = memory_node.GetAttributeValue("type", "");
1758     uint64_t start;
1759     uint64_t length;
1760     if (!memory_node.GetAttributeValueAsUnsigned("start", start))
1761       return true;
1762     if (!memory_node.GetAttributeValueAsUnsigned("length", length))
1763       return true;
1764     MemoryRegionInfo region;
1765     region.GetRange().SetRangeBase(start);
1766     region.GetRange().SetByteSize(length);
1767     if (type == "rom") {
1768       region.SetReadable(MemoryRegionInfo::eYes);
1769       this->m_qXfer_memory_map.push_back(region);
1770     } else if (type == "ram") {
1771       region.SetReadable(MemoryRegionInfo::eYes);
1772       region.SetWritable(MemoryRegionInfo::eYes);
1773       this->m_qXfer_memory_map.push_back(region);
1774     } else if (type == "flash") {
1775       region.SetFlash(MemoryRegionInfo::eYes);
1776       memory_node.ForEachChildElement(
1777           [&region](const XMLNode &prop_node) -> bool {
1778             if (!prop_node.IsElement())
1779               return true;
1780             if (prop_node.GetName() != "property")
1781               return true;
1782             auto propname = prop_node.GetAttributeValue("name", "");
1783             if (propname == "blocksize") {
1784               uint64_t blocksize;
1785               if (prop_node.GetElementTextAsUnsigned(blocksize))
1786                 region.SetBlocksize(blocksize);
1787             }
1788             return true;
1789           });
1790       this->m_qXfer_memory_map.push_back(region);
1791     }
1792     return true;
1793   });
1794 
1795   m_qXfer_memory_map_loaded = true;
1796 
1797   return error;
1798 }
1799 
1800 std::optional<uint32_t> GDBRemoteCommunicationClient::GetWatchpointSlotCount() {
1801   if (m_supports_watchpoint_support_info == eLazyBoolYes) {
1802     return m_num_supported_hardware_watchpoints;
1803   }
1804 
1805   std::optional<uint32_t> num;
1806   if (m_supports_watchpoint_support_info != eLazyBoolNo) {
1807     StringExtractorGDBRemote response;
1808     if (SendPacketAndWaitForResponse("qWatchpointSupportInfo:", response) ==
1809         PacketResult::Success) {
1810       m_supports_watchpoint_support_info = eLazyBoolYes;
1811       llvm::StringRef name;
1812       llvm::StringRef value;
1813       while (response.GetNameColonValue(name, value)) {
1814         if (name.equals("num")) {
1815           value.getAsInteger(0, m_num_supported_hardware_watchpoints);
1816           num = m_num_supported_hardware_watchpoints;
1817         }
1818       }
1819       if (!num) {
1820         m_supports_watchpoint_support_info = eLazyBoolNo;
1821       }
1822     } else {
1823       m_supports_watchpoint_support_info = eLazyBoolNo;
1824     }
1825   }
1826 
1827   return num;
1828 }
1829 
1830 std::optional<bool> GDBRemoteCommunicationClient::GetWatchpointReportedAfter() {
1831   if (m_qHostInfo_is_valid == eLazyBoolCalculate)
1832     GetHostInfo();
1833 
1834   // Process determines this by target CPU, but allow for the
1835   // remote stub to override it via the qHostInfo
1836   // watchpoint_exceptions_received key, if it is present.
1837   if (m_qHostInfo_is_valid == eLazyBoolYes) {
1838     if (m_watchpoints_trigger_after_instruction == eLazyBoolNo)
1839       return false;
1840     if (m_watchpoints_trigger_after_instruction == eLazyBoolYes)
1841       return true;
1842   }
1843 
1844   return std::nullopt;
1845 }
1846 
1847 int GDBRemoteCommunicationClient::SetSTDIN(const FileSpec &file_spec) {
1848   if (file_spec) {
1849     std::string path{file_spec.GetPath(false)};
1850     StreamString packet;
1851     packet.PutCString("QSetSTDIN:");
1852     packet.PutStringAsRawHex8(path);
1853 
1854     StringExtractorGDBRemote response;
1855     if (SendPacketAndWaitForResponse(packet.GetString(), response) ==
1856         PacketResult::Success) {
1857       if (response.IsOKResponse())
1858         return 0;
1859       uint8_t error = response.GetError();
1860       if (error)
1861         return error;
1862     }
1863   }
1864   return -1;
1865 }
1866 
1867 int GDBRemoteCommunicationClient::SetSTDOUT(const FileSpec &file_spec) {
1868   if (file_spec) {
1869     std::string path{file_spec.GetPath(false)};
1870     StreamString packet;
1871     packet.PutCString("QSetSTDOUT:");
1872     packet.PutStringAsRawHex8(path);
1873 
1874     StringExtractorGDBRemote response;
1875     if (SendPacketAndWaitForResponse(packet.GetString(), response) ==
1876         PacketResult::Success) {
1877       if (response.IsOKResponse())
1878         return 0;
1879       uint8_t error = response.GetError();
1880       if (error)
1881         return error;
1882     }
1883   }
1884   return -1;
1885 }
1886 
1887 int GDBRemoteCommunicationClient::SetSTDERR(const FileSpec &file_spec) {
1888   if (file_spec) {
1889     std::string path{file_spec.GetPath(false)};
1890     StreamString packet;
1891     packet.PutCString("QSetSTDERR:");
1892     packet.PutStringAsRawHex8(path);
1893 
1894     StringExtractorGDBRemote response;
1895     if (SendPacketAndWaitForResponse(packet.GetString(), response) ==
1896         PacketResult::Success) {
1897       if (response.IsOKResponse())
1898         return 0;
1899       uint8_t error = response.GetError();
1900       if (error)
1901         return error;
1902     }
1903   }
1904   return -1;
1905 }
1906 
1907 bool GDBRemoteCommunicationClient::GetWorkingDir(FileSpec &working_dir) {
1908   StringExtractorGDBRemote response;
1909   if (SendPacketAndWaitForResponse("qGetWorkingDir", response) ==
1910       PacketResult::Success) {
1911     if (response.IsUnsupportedResponse())
1912       return false;
1913     if (response.IsErrorResponse())
1914       return false;
1915     std::string cwd;
1916     response.GetHexByteString(cwd);
1917     working_dir.SetFile(cwd, GetHostArchitecture().GetTriple());
1918     return !cwd.empty();
1919   }
1920   return false;
1921 }
1922 
1923 int GDBRemoteCommunicationClient::SetWorkingDir(const FileSpec &working_dir) {
1924   if (working_dir) {
1925     std::string path{working_dir.GetPath(false)};
1926     StreamString packet;
1927     packet.PutCString("QSetWorkingDir:");
1928     packet.PutStringAsRawHex8(path);
1929 
1930     StringExtractorGDBRemote response;
1931     if (SendPacketAndWaitForResponse(packet.GetString(), response) ==
1932         PacketResult::Success) {
1933       if (response.IsOKResponse())
1934         return 0;
1935       uint8_t error = response.GetError();
1936       if (error)
1937         return error;
1938     }
1939   }
1940   return -1;
1941 }
1942 
1943 int GDBRemoteCommunicationClient::SetDisableASLR(bool enable) {
1944   char packet[32];
1945   const int packet_len =
1946       ::snprintf(packet, sizeof(packet), "QSetDisableASLR:%i", enable ? 1 : 0);
1947   assert(packet_len < (int)sizeof(packet));
1948   UNUSED_IF_ASSERT_DISABLED(packet_len);
1949   StringExtractorGDBRemote response;
1950   if (SendPacketAndWaitForResponse(packet, response) == PacketResult::Success) {
1951     if (response.IsOKResponse())
1952       return 0;
1953     uint8_t error = response.GetError();
1954     if (error)
1955       return error;
1956   }
1957   return -1;
1958 }
1959 
1960 int GDBRemoteCommunicationClient::SetDetachOnError(bool enable) {
1961   char packet[32];
1962   const int packet_len = ::snprintf(packet, sizeof(packet),
1963                                     "QSetDetachOnError:%i", enable ? 1 : 0);
1964   assert(packet_len < (int)sizeof(packet));
1965   UNUSED_IF_ASSERT_DISABLED(packet_len);
1966   StringExtractorGDBRemote response;
1967   if (SendPacketAndWaitForResponse(packet, response) == PacketResult::Success) {
1968     if (response.IsOKResponse())
1969       return 0;
1970     uint8_t error = response.GetError();
1971     if (error)
1972       return error;
1973   }
1974   return -1;
1975 }
1976 
1977 bool GDBRemoteCommunicationClient::DecodeProcessInfoResponse(
1978     StringExtractorGDBRemote &response, ProcessInstanceInfo &process_info) {
1979   if (response.IsNormalResponse()) {
1980     llvm::StringRef name;
1981     llvm::StringRef value;
1982     StringExtractor extractor;
1983 
1984     uint32_t cpu = LLDB_INVALID_CPUTYPE;
1985     uint32_t sub = 0;
1986     std::string vendor;
1987     std::string os_type;
1988 
1989     while (response.GetNameColonValue(name, value)) {
1990       if (name.equals("pid")) {
1991         lldb::pid_t pid = LLDB_INVALID_PROCESS_ID;
1992         value.getAsInteger(0, pid);
1993         process_info.SetProcessID(pid);
1994       } else if (name.equals("ppid")) {
1995         lldb::pid_t pid = LLDB_INVALID_PROCESS_ID;
1996         value.getAsInteger(0, pid);
1997         process_info.SetParentProcessID(pid);
1998       } else if (name.equals("uid")) {
1999         uint32_t uid = UINT32_MAX;
2000         value.getAsInteger(0, uid);
2001         process_info.SetUserID(uid);
2002       } else if (name.equals("euid")) {
2003         uint32_t uid = UINT32_MAX;
2004         value.getAsInteger(0, uid);
2005         process_info.SetEffectiveUserID(uid);
2006       } else if (name.equals("gid")) {
2007         uint32_t gid = UINT32_MAX;
2008         value.getAsInteger(0, gid);
2009         process_info.SetGroupID(gid);
2010       } else if (name.equals("egid")) {
2011         uint32_t gid = UINT32_MAX;
2012         value.getAsInteger(0, gid);
2013         process_info.SetEffectiveGroupID(gid);
2014       } else if (name.equals("triple")) {
2015         StringExtractor extractor(value);
2016         std::string triple;
2017         extractor.GetHexByteString(triple);
2018         process_info.GetArchitecture().SetTriple(triple.c_str());
2019       } else if (name.equals("name")) {
2020         StringExtractor extractor(value);
2021         // The process name from ASCII hex bytes since we can't control the
2022         // characters in a process name
2023         std::string name;
2024         extractor.GetHexByteString(name);
2025         process_info.GetExecutableFile().SetFile(name, FileSpec::Style::native);
2026       } else if (name.equals("args")) {
2027         llvm::StringRef encoded_args(value), hex_arg;
2028 
2029         bool is_arg0 = true;
2030         while (!encoded_args.empty()) {
2031           std::tie(hex_arg, encoded_args) = encoded_args.split('-');
2032           std::string arg;
2033           StringExtractor extractor(hex_arg);
2034           if (extractor.GetHexByteString(arg) * 2 != hex_arg.size()) {
2035             // In case of wrong encoding, we discard all the arguments
2036             process_info.GetArguments().Clear();
2037             process_info.SetArg0("");
2038             break;
2039           }
2040           if (is_arg0)
2041             process_info.SetArg0(arg);
2042           else
2043             process_info.GetArguments().AppendArgument(arg);
2044           is_arg0 = false;
2045         }
2046       } else if (name.equals("cputype")) {
2047         value.getAsInteger(0, cpu);
2048       } else if (name.equals("cpusubtype")) {
2049         value.getAsInteger(0, sub);
2050       } else if (name.equals("vendor")) {
2051         vendor = std::string(value);
2052       } else if (name.equals("ostype")) {
2053         os_type = std::string(value);
2054       }
2055     }
2056 
2057     if (cpu != LLDB_INVALID_CPUTYPE && !vendor.empty() && !os_type.empty()) {
2058       if (vendor == "apple") {
2059         process_info.GetArchitecture().SetArchitecture(eArchTypeMachO, cpu,
2060                                                        sub);
2061         process_info.GetArchitecture().GetTriple().setVendorName(
2062             llvm::StringRef(vendor));
2063         process_info.GetArchitecture().GetTriple().setOSName(
2064             llvm::StringRef(os_type));
2065       }
2066     }
2067 
2068     if (process_info.GetProcessID() != LLDB_INVALID_PROCESS_ID)
2069       return true;
2070   }
2071   return false;
2072 }
2073 
2074 bool GDBRemoteCommunicationClient::GetProcessInfo(
2075     lldb::pid_t pid, ProcessInstanceInfo &process_info) {
2076   process_info.Clear();
2077 
2078   if (m_supports_qProcessInfoPID) {
2079     char packet[32];
2080     const int packet_len =
2081         ::snprintf(packet, sizeof(packet), "qProcessInfoPID:%" PRIu64, pid);
2082     assert(packet_len < (int)sizeof(packet));
2083     UNUSED_IF_ASSERT_DISABLED(packet_len);
2084     StringExtractorGDBRemote response;
2085     if (SendPacketAndWaitForResponse(packet, response) ==
2086         PacketResult::Success) {
2087       return DecodeProcessInfoResponse(response, process_info);
2088     } else {
2089       m_supports_qProcessInfoPID = false;
2090       return false;
2091     }
2092   }
2093   return false;
2094 }
2095 
2096 bool GDBRemoteCommunicationClient::GetCurrentProcessInfo(bool allow_lazy) {
2097   Log *log(GetLog(GDBRLog::Process | GDBRLog::Packets));
2098 
2099   if (allow_lazy) {
2100     if (m_qProcessInfo_is_valid == eLazyBoolYes)
2101       return true;
2102     if (m_qProcessInfo_is_valid == eLazyBoolNo)
2103       return false;
2104   }
2105 
2106   GetHostInfo();
2107 
2108   StringExtractorGDBRemote response;
2109   if (SendPacketAndWaitForResponse("qProcessInfo", response) ==
2110       PacketResult::Success) {
2111     if (response.IsNormalResponse()) {
2112       llvm::StringRef name;
2113       llvm::StringRef value;
2114       uint32_t cpu = LLDB_INVALID_CPUTYPE;
2115       uint32_t sub = 0;
2116       std::string arch_name;
2117       std::string os_name;
2118       std::string environment;
2119       std::string vendor_name;
2120       std::string triple;
2121       std::string elf_abi;
2122       uint32_t pointer_byte_size = 0;
2123       StringExtractor extractor;
2124       ByteOrder byte_order = eByteOrderInvalid;
2125       uint32_t num_keys_decoded = 0;
2126       lldb::pid_t pid = LLDB_INVALID_PROCESS_ID;
2127       while (response.GetNameColonValue(name, value)) {
2128         if (name.equals("cputype")) {
2129           if (!value.getAsInteger(16, cpu))
2130             ++num_keys_decoded;
2131         } else if (name.equals("cpusubtype")) {
2132           if (!value.getAsInteger(16, sub))
2133             ++num_keys_decoded;
2134         } else if (name.equals("triple")) {
2135           StringExtractor extractor(value);
2136           extractor.GetHexByteString(triple);
2137           ++num_keys_decoded;
2138         } else if (name.equals("ostype")) {
2139           ParseOSType(value, os_name, environment);
2140           ++num_keys_decoded;
2141         } else if (name.equals("vendor")) {
2142           vendor_name = std::string(value);
2143           ++num_keys_decoded;
2144         } else if (name.equals("endian")) {
2145           byte_order = llvm::StringSwitch<lldb::ByteOrder>(value)
2146                            .Case("little", eByteOrderLittle)
2147                            .Case("big", eByteOrderBig)
2148                            .Case("pdp", eByteOrderPDP)
2149                            .Default(eByteOrderInvalid);
2150           if (byte_order != eByteOrderInvalid)
2151             ++num_keys_decoded;
2152         } else if (name.equals("ptrsize")) {
2153           if (!value.getAsInteger(16, pointer_byte_size))
2154             ++num_keys_decoded;
2155         } else if (name.equals("pid")) {
2156           if (!value.getAsInteger(16, pid))
2157             ++num_keys_decoded;
2158         } else if (name.equals("elf_abi")) {
2159           elf_abi = std::string(value);
2160           ++num_keys_decoded;
2161         } else if (name.equals("main-binary-uuid")) {
2162           m_process_standalone_uuid.SetFromStringRef(value);
2163           ++num_keys_decoded;
2164         } else if (name.equals("main-binary-slide")) {
2165           StringExtractor extractor(value);
2166           m_process_standalone_value =
2167               extractor.GetU64(LLDB_INVALID_ADDRESS, 16);
2168           if (m_process_standalone_value != LLDB_INVALID_ADDRESS) {
2169             m_process_standalone_value_is_offset = true;
2170             ++num_keys_decoded;
2171           }
2172         } else if (name.equals("main-binary-address")) {
2173           StringExtractor extractor(value);
2174           m_process_standalone_value =
2175               extractor.GetU64(LLDB_INVALID_ADDRESS, 16);
2176           if (m_process_standalone_value != LLDB_INVALID_ADDRESS) {
2177             m_process_standalone_value_is_offset = false;
2178             ++num_keys_decoded;
2179           }
2180         } else if (name.equals("binary-addresses")) {
2181           m_binary_addresses.clear();
2182           ++num_keys_decoded;
2183           for (llvm::StringRef x : llvm::split(value, ',')) {
2184             addr_t vmaddr;
2185             x.consume_front("0x");
2186             if (llvm::to_integer(x, vmaddr, 16))
2187               m_binary_addresses.push_back(vmaddr);
2188           }
2189         }
2190       }
2191       if (num_keys_decoded > 0)
2192         m_qProcessInfo_is_valid = eLazyBoolYes;
2193       if (pid != LLDB_INVALID_PROCESS_ID) {
2194         m_curr_pid_is_valid = eLazyBoolYes;
2195         m_curr_pid_run = m_curr_pid = pid;
2196       }
2197 
2198       // Set the ArchSpec from the triple if we have it.
2199       if (!triple.empty()) {
2200         m_process_arch.SetTriple(triple.c_str());
2201         m_process_arch.SetFlags(elf_abi);
2202         if (pointer_byte_size) {
2203           assert(pointer_byte_size == m_process_arch.GetAddressByteSize());
2204         }
2205       } else if (cpu != LLDB_INVALID_CPUTYPE && !os_name.empty() &&
2206                  !vendor_name.empty()) {
2207         llvm::Triple triple(llvm::Twine("-") + vendor_name + "-" + os_name);
2208         if (!environment.empty())
2209             triple.setEnvironmentName(environment);
2210 
2211         assert(triple.getObjectFormat() != llvm::Triple::UnknownObjectFormat);
2212         assert(triple.getObjectFormat() != llvm::Triple::Wasm);
2213         assert(triple.getObjectFormat() != llvm::Triple::XCOFF);
2214         switch (triple.getObjectFormat()) {
2215         case llvm::Triple::MachO:
2216           m_process_arch.SetArchitecture(eArchTypeMachO, cpu, sub);
2217           break;
2218         case llvm::Triple::ELF:
2219           m_process_arch.SetArchitecture(eArchTypeELF, cpu, sub);
2220           break;
2221         case llvm::Triple::COFF:
2222           m_process_arch.SetArchitecture(eArchTypeCOFF, cpu, sub);
2223           break;
2224         case llvm::Triple::GOFF:
2225         case llvm::Triple::SPIRV:
2226         case llvm::Triple::Wasm:
2227         case llvm::Triple::XCOFF:
2228         case llvm::Triple::DXContainer:
2229           LLDB_LOGF(log, "error: not supported target architecture");
2230           return false;
2231         case llvm::Triple::UnknownObjectFormat:
2232           LLDB_LOGF(log, "error: failed to determine target architecture");
2233           return false;
2234         }
2235 
2236         if (pointer_byte_size) {
2237           assert(pointer_byte_size == m_process_arch.GetAddressByteSize());
2238         }
2239         if (byte_order != eByteOrderInvalid) {
2240           assert(byte_order == m_process_arch.GetByteOrder());
2241         }
2242         m_process_arch.GetTriple().setVendorName(llvm::StringRef(vendor_name));
2243         m_process_arch.GetTriple().setOSName(llvm::StringRef(os_name));
2244         m_process_arch.GetTriple().setEnvironmentName(llvm::StringRef(environment));
2245       }
2246       return true;
2247     }
2248   } else {
2249     m_qProcessInfo_is_valid = eLazyBoolNo;
2250   }
2251 
2252   return false;
2253 }
2254 
2255 uint32_t GDBRemoteCommunicationClient::FindProcesses(
2256     const ProcessInstanceInfoMatch &match_info,
2257     ProcessInstanceInfoList &process_infos) {
2258   process_infos.clear();
2259 
2260   if (m_supports_qfProcessInfo) {
2261     StreamString packet;
2262     packet.PutCString("qfProcessInfo");
2263     if (!match_info.MatchAllProcesses()) {
2264       packet.PutChar(':');
2265       const char *name = match_info.GetProcessInfo().GetName();
2266       bool has_name_match = false;
2267       if (name && name[0]) {
2268         has_name_match = true;
2269         NameMatch name_match_type = match_info.GetNameMatchType();
2270         switch (name_match_type) {
2271         case NameMatch::Ignore:
2272           has_name_match = false;
2273           break;
2274 
2275         case NameMatch::Equals:
2276           packet.PutCString("name_match:equals;");
2277           break;
2278 
2279         case NameMatch::Contains:
2280           packet.PutCString("name_match:contains;");
2281           break;
2282 
2283         case NameMatch::StartsWith:
2284           packet.PutCString("name_match:starts_with;");
2285           break;
2286 
2287         case NameMatch::EndsWith:
2288           packet.PutCString("name_match:ends_with;");
2289           break;
2290 
2291         case NameMatch::RegularExpression:
2292           packet.PutCString("name_match:regex;");
2293           break;
2294         }
2295         if (has_name_match) {
2296           packet.PutCString("name:");
2297           packet.PutBytesAsRawHex8(name, ::strlen(name));
2298           packet.PutChar(';');
2299         }
2300       }
2301 
2302       if (match_info.GetProcessInfo().ProcessIDIsValid())
2303         packet.Printf("pid:%" PRIu64 ";",
2304                       match_info.GetProcessInfo().GetProcessID());
2305       if (match_info.GetProcessInfo().ParentProcessIDIsValid())
2306         packet.Printf("parent_pid:%" PRIu64 ";",
2307                       match_info.GetProcessInfo().GetParentProcessID());
2308       if (match_info.GetProcessInfo().UserIDIsValid())
2309         packet.Printf("uid:%u;", match_info.GetProcessInfo().GetUserID());
2310       if (match_info.GetProcessInfo().GroupIDIsValid())
2311         packet.Printf("gid:%u;", match_info.GetProcessInfo().GetGroupID());
2312       if (match_info.GetProcessInfo().EffectiveUserIDIsValid())
2313         packet.Printf("euid:%u;",
2314                       match_info.GetProcessInfo().GetEffectiveUserID());
2315       if (match_info.GetProcessInfo().EffectiveGroupIDIsValid())
2316         packet.Printf("egid:%u;",
2317                       match_info.GetProcessInfo().GetEffectiveGroupID());
2318       packet.Printf("all_users:%u;", match_info.GetMatchAllUsers() ? 1 : 0);
2319       if (match_info.GetProcessInfo().GetArchitecture().IsValid()) {
2320         const ArchSpec &match_arch =
2321             match_info.GetProcessInfo().GetArchitecture();
2322         const llvm::Triple &triple = match_arch.GetTriple();
2323         packet.PutCString("triple:");
2324         packet.PutCString(triple.getTriple());
2325         packet.PutChar(';');
2326       }
2327     }
2328     StringExtractorGDBRemote response;
2329     // Increase timeout as the first qfProcessInfo packet takes a long time on
2330     // Android. The value of 1min was arrived at empirically.
2331     ScopedTimeout timeout(*this, minutes(1));
2332     if (SendPacketAndWaitForResponse(packet.GetString(), response) ==
2333         PacketResult::Success) {
2334       do {
2335         ProcessInstanceInfo process_info;
2336         if (!DecodeProcessInfoResponse(response, process_info))
2337           break;
2338         process_infos.push_back(process_info);
2339         response = StringExtractorGDBRemote();
2340       } while (SendPacketAndWaitForResponse("qsProcessInfo", response) ==
2341                PacketResult::Success);
2342     } else {
2343       m_supports_qfProcessInfo = false;
2344       return 0;
2345     }
2346   }
2347   return process_infos.size();
2348 }
2349 
2350 bool GDBRemoteCommunicationClient::GetUserName(uint32_t uid,
2351                                                std::string &name) {
2352   if (m_supports_qUserName) {
2353     char packet[32];
2354     const int packet_len =
2355         ::snprintf(packet, sizeof(packet), "qUserName:%i", uid);
2356     assert(packet_len < (int)sizeof(packet));
2357     UNUSED_IF_ASSERT_DISABLED(packet_len);
2358     StringExtractorGDBRemote response;
2359     if (SendPacketAndWaitForResponse(packet, response) ==
2360         PacketResult::Success) {
2361       if (response.IsNormalResponse()) {
2362         // Make sure we parsed the right number of characters. The response is
2363         // the hex encoded user name and should make up the entire packet. If
2364         // there are any non-hex ASCII bytes, the length won't match below..
2365         if (response.GetHexByteString(name) * 2 ==
2366             response.GetStringRef().size())
2367           return true;
2368       }
2369     } else {
2370       m_supports_qUserName = false;
2371       return false;
2372     }
2373   }
2374   return false;
2375 }
2376 
2377 bool GDBRemoteCommunicationClient::GetGroupName(uint32_t gid,
2378                                                 std::string &name) {
2379   if (m_supports_qGroupName) {
2380     char packet[32];
2381     const int packet_len =
2382         ::snprintf(packet, sizeof(packet), "qGroupName:%i", gid);
2383     assert(packet_len < (int)sizeof(packet));
2384     UNUSED_IF_ASSERT_DISABLED(packet_len);
2385     StringExtractorGDBRemote response;
2386     if (SendPacketAndWaitForResponse(packet, response) ==
2387         PacketResult::Success) {
2388       if (response.IsNormalResponse()) {
2389         // Make sure we parsed the right number of characters. The response is
2390         // the hex encoded group name and should make up the entire packet. If
2391         // there are any non-hex ASCII bytes, the length won't match below..
2392         if (response.GetHexByteString(name) * 2 ==
2393             response.GetStringRef().size())
2394           return true;
2395       }
2396     } else {
2397       m_supports_qGroupName = false;
2398       return false;
2399     }
2400   }
2401   return false;
2402 }
2403 
2404 static void MakeSpeedTestPacket(StreamString &packet, uint32_t send_size,
2405                                 uint32_t recv_size) {
2406   packet.Clear();
2407   packet.Printf("qSpeedTest:response_size:%i;data:", recv_size);
2408   uint32_t bytes_left = send_size;
2409   while (bytes_left > 0) {
2410     if (bytes_left >= 26) {
2411       packet.PutCString("abcdefghijklmnopqrstuvwxyz");
2412       bytes_left -= 26;
2413     } else {
2414       packet.Printf("%*.*s;", bytes_left, bytes_left,
2415                     "abcdefghijklmnopqrstuvwxyz");
2416       bytes_left = 0;
2417     }
2418   }
2419 }
2420 
2421 duration<float>
2422 calculate_standard_deviation(const std::vector<duration<float>> &v) {
2423   if (v.size() == 0)
2424     return duration<float>::zero();
2425   using Dur = duration<float>;
2426   Dur sum = std::accumulate(std::begin(v), std::end(v), Dur());
2427   Dur mean = sum / v.size();
2428   float accum = 0;
2429   for (auto d : v) {
2430     float delta = (d - mean).count();
2431     accum += delta * delta;
2432   };
2433 
2434   return Dur(sqrtf(accum / (v.size() - 1)));
2435 }
2436 
2437 void GDBRemoteCommunicationClient::TestPacketSpeed(const uint32_t num_packets,
2438                                                    uint32_t max_send,
2439                                                    uint32_t max_recv,
2440                                                    uint64_t recv_amount,
2441                                                    bool json, Stream &strm) {
2442 
2443   if (SendSpeedTestPacket(0, 0)) {
2444     StreamString packet;
2445     if (json)
2446       strm.Printf("{ \"packet_speeds\" : {\n    \"num_packets\" : %u,\n    "
2447                   "\"results\" : [",
2448                   num_packets);
2449     else
2450       strm.Printf("Testing sending %u packets of various sizes:\n",
2451                   num_packets);
2452     strm.Flush();
2453 
2454     uint32_t result_idx = 0;
2455     uint32_t send_size;
2456     std::vector<duration<float>> packet_times;
2457 
2458     for (send_size = 0; send_size <= max_send;
2459          send_size ? send_size *= 2 : send_size = 4) {
2460       for (uint32_t recv_size = 0; recv_size <= max_recv;
2461            recv_size ? recv_size *= 2 : recv_size = 4) {
2462         MakeSpeedTestPacket(packet, send_size, recv_size);
2463 
2464         packet_times.clear();
2465         // Test how long it takes to send 'num_packets' packets
2466         const auto start_time = steady_clock::now();
2467         for (uint32_t i = 0; i < num_packets; ++i) {
2468           const auto packet_start_time = steady_clock::now();
2469           StringExtractorGDBRemote response;
2470           SendPacketAndWaitForResponse(packet.GetString(), response);
2471           const auto packet_end_time = steady_clock::now();
2472           packet_times.push_back(packet_end_time - packet_start_time);
2473         }
2474         const auto end_time = steady_clock::now();
2475         const auto total_time = end_time - start_time;
2476 
2477         float packets_per_second =
2478             ((float)num_packets) / duration<float>(total_time).count();
2479         auto average_per_packet = num_packets > 0 ? total_time / num_packets
2480                                                   : duration<float>::zero();
2481         const duration<float> standard_deviation =
2482             calculate_standard_deviation(packet_times);
2483         if (json) {
2484           strm.Format("{0}\n     {{\"send_size\" : {1,6}, \"recv_size\" : "
2485                       "{2,6}, \"total_time_nsec\" : {3,12:ns-}, "
2486                       "\"standard_deviation_nsec\" : {4,9:ns-f0}}",
2487                       result_idx > 0 ? "," : "", send_size, recv_size,
2488                       total_time, standard_deviation);
2489           ++result_idx;
2490         } else {
2491           strm.Format("qSpeedTest(send={0,7}, recv={1,7}) in {2:s+f9} for "
2492                       "{3,9:f2} packets/s ({4,10:ms+f6} per packet) with "
2493                       "standard deviation of {5,10:ms+f6}\n",
2494                       send_size, recv_size, duration<float>(total_time),
2495                       packets_per_second, duration<float>(average_per_packet),
2496                       standard_deviation);
2497         }
2498         strm.Flush();
2499       }
2500     }
2501 
2502     const float k_recv_amount_mb = (float)recv_amount / (1024.0f * 1024.0f);
2503     if (json)
2504       strm.Printf("\n    ]\n  },\n  \"download_speed\" : {\n    \"byte_size\" "
2505                   ": %" PRIu64 ",\n    \"results\" : [",
2506                   recv_amount);
2507     else
2508       strm.Printf("Testing receiving %2.1fMB of data using varying receive "
2509                   "packet sizes:\n",
2510                   k_recv_amount_mb);
2511     strm.Flush();
2512     send_size = 0;
2513     result_idx = 0;
2514     for (uint32_t recv_size = 32; recv_size <= max_recv; recv_size *= 2) {
2515       MakeSpeedTestPacket(packet, send_size, recv_size);
2516 
2517       // If we have a receive size, test how long it takes to receive 4MB of
2518       // data
2519       if (recv_size > 0) {
2520         const auto start_time = steady_clock::now();
2521         uint32_t bytes_read = 0;
2522         uint32_t packet_count = 0;
2523         while (bytes_read < recv_amount) {
2524           StringExtractorGDBRemote response;
2525           SendPacketAndWaitForResponse(packet.GetString(), response);
2526           bytes_read += recv_size;
2527           ++packet_count;
2528         }
2529         const auto end_time = steady_clock::now();
2530         const auto total_time = end_time - start_time;
2531         float mb_second = ((float)recv_amount) /
2532                           duration<float>(total_time).count() /
2533                           (1024.0 * 1024.0);
2534         float packets_per_second =
2535             ((float)packet_count) / duration<float>(total_time).count();
2536         const auto average_per_packet = packet_count > 0
2537                                             ? total_time / packet_count
2538                                             : duration<float>::zero();
2539 
2540         if (json) {
2541           strm.Format("{0}\n     {{\"send_size\" : {1,6}, \"recv_size\" : "
2542                       "{2,6}, \"total_time_nsec\" : {3,12:ns-}}",
2543                       result_idx > 0 ? "," : "", send_size, recv_size,
2544                       total_time);
2545           ++result_idx;
2546         } else {
2547           strm.Format("qSpeedTest(send={0,7}, recv={1,7}) {2,6} packets needed "
2548                       "to receive {3:f1}MB in {4:s+f9} for {5} MB/sec for "
2549                       "{6,9:f2} packets/sec ({7,10:ms+f6} per packet)\n",
2550                       send_size, recv_size, packet_count, k_recv_amount_mb,
2551                       duration<float>(total_time), mb_second,
2552                       packets_per_second, duration<float>(average_per_packet));
2553         }
2554         strm.Flush();
2555       }
2556     }
2557     if (json)
2558       strm.Printf("\n    ]\n  }\n}\n");
2559     else
2560       strm.EOL();
2561   }
2562 }
2563 
2564 bool GDBRemoteCommunicationClient::SendSpeedTestPacket(uint32_t send_size,
2565                                                        uint32_t recv_size) {
2566   StreamString packet;
2567   packet.Printf("qSpeedTest:response_size:%i;data:", recv_size);
2568   uint32_t bytes_left = send_size;
2569   while (bytes_left > 0) {
2570     if (bytes_left >= 26) {
2571       packet.PutCString("abcdefghijklmnopqrstuvwxyz");
2572       bytes_left -= 26;
2573     } else {
2574       packet.Printf("%*.*s;", bytes_left, bytes_left,
2575                     "abcdefghijklmnopqrstuvwxyz");
2576       bytes_left = 0;
2577     }
2578   }
2579 
2580   StringExtractorGDBRemote response;
2581   return SendPacketAndWaitForResponse(packet.GetString(), response) ==
2582          PacketResult::Success;
2583 }
2584 
2585 bool GDBRemoteCommunicationClient::LaunchGDBServer(
2586     const char *remote_accept_hostname, lldb::pid_t &pid, uint16_t &port,
2587     std::string &socket_name) {
2588   pid = LLDB_INVALID_PROCESS_ID;
2589   port = 0;
2590   socket_name.clear();
2591 
2592   StringExtractorGDBRemote response;
2593   StreamString stream;
2594   stream.PutCString("qLaunchGDBServer;");
2595   std::string hostname;
2596   if (remote_accept_hostname && remote_accept_hostname[0])
2597     hostname = remote_accept_hostname;
2598   else {
2599     if (HostInfo::GetHostname(hostname)) {
2600       // Make the GDB server we launch only accept connections from this host
2601       stream.Printf("host:%s;", hostname.c_str());
2602     } else {
2603       // Make the GDB server we launch accept connections from any host since
2604       // we can't figure out the hostname
2605       stream.Printf("host:*;");
2606     }
2607   }
2608   // give the process a few seconds to startup
2609   ScopedTimeout timeout(*this, seconds(10));
2610 
2611   if (SendPacketAndWaitForResponse(stream.GetString(), response) ==
2612       PacketResult::Success) {
2613     if (response.IsErrorResponse())
2614       return false;
2615 
2616     llvm::StringRef name;
2617     llvm::StringRef value;
2618     while (response.GetNameColonValue(name, value)) {
2619       if (name.equals("port"))
2620         value.getAsInteger(0, port);
2621       else if (name.equals("pid"))
2622         value.getAsInteger(0, pid);
2623       else if (name.compare("socket_name") == 0) {
2624         StringExtractor extractor(value);
2625         extractor.GetHexByteString(socket_name);
2626       }
2627     }
2628     return true;
2629   }
2630   return false;
2631 }
2632 
2633 size_t GDBRemoteCommunicationClient::QueryGDBServer(
2634     std::vector<std::pair<uint16_t, std::string>> &connection_urls) {
2635   connection_urls.clear();
2636 
2637   StringExtractorGDBRemote response;
2638   if (SendPacketAndWaitForResponse("qQueryGDBServer", response) !=
2639       PacketResult::Success)
2640     return 0;
2641 
2642   StructuredData::ObjectSP data =
2643       StructuredData::ParseJSON(response.GetStringRef());
2644   if (!data)
2645     return 0;
2646 
2647   StructuredData::Array *array = data->GetAsArray();
2648   if (!array)
2649     return 0;
2650 
2651   for (size_t i = 0, count = array->GetSize(); i < count; ++i) {
2652     StructuredData::Dictionary *element = nullptr;
2653     if (!array->GetItemAtIndexAsDictionary(i, element))
2654       continue;
2655 
2656     uint16_t port = 0;
2657     if (StructuredData::ObjectSP port_osp =
2658             element->GetValueForKey(llvm::StringRef("port")))
2659       port = port_osp->GetUnsignedIntegerValue(0);
2660 
2661     std::string socket_name;
2662     if (StructuredData::ObjectSP socket_name_osp =
2663             element->GetValueForKey(llvm::StringRef("socket_name")))
2664       socket_name = std::string(socket_name_osp->GetStringValue());
2665 
2666     if (port != 0 || !socket_name.empty())
2667       connection_urls.emplace_back(port, socket_name);
2668   }
2669   return connection_urls.size();
2670 }
2671 
2672 bool GDBRemoteCommunicationClient::KillSpawnedProcess(lldb::pid_t pid) {
2673   StreamString stream;
2674   stream.Printf("qKillSpawnedProcess:%" PRId64, pid);
2675 
2676   StringExtractorGDBRemote response;
2677   if (SendPacketAndWaitForResponse(stream.GetString(), response) ==
2678       PacketResult::Success) {
2679     if (response.IsOKResponse())
2680       return true;
2681   }
2682   return false;
2683 }
2684 
2685 std::optional<PidTid> GDBRemoteCommunicationClient::SendSetCurrentThreadPacket(
2686     uint64_t tid, uint64_t pid, char op) {
2687   lldb_private::StreamString packet;
2688   packet.PutChar('H');
2689   packet.PutChar(op);
2690 
2691   if (pid != LLDB_INVALID_PROCESS_ID)
2692     packet.Printf("p%" PRIx64 ".", pid);
2693 
2694   if (tid == UINT64_MAX)
2695     packet.PutCString("-1");
2696   else
2697     packet.Printf("%" PRIx64, tid);
2698 
2699   StringExtractorGDBRemote response;
2700   if (SendPacketAndWaitForResponse(packet.GetString(), response) ==
2701       PacketResult::Success) {
2702     if (response.IsOKResponse())
2703       return {{pid, tid}};
2704 
2705     /*
2706      * Connected bare-iron target (like YAMON gdb-stub) may not have support for
2707      * Hg packet.
2708      * The reply from '?' packet could be as simple as 'S05'. There is no packet
2709      * which can
2710      * give us pid and/or tid. Assume pid=tid=1 in such cases.
2711      */
2712     if (response.IsUnsupportedResponse() && IsConnected())
2713       return {{1, 1}};
2714   }
2715   return std::nullopt;
2716 }
2717 
2718 bool GDBRemoteCommunicationClient::SetCurrentThread(uint64_t tid,
2719                                                     uint64_t pid) {
2720   if (m_curr_tid == tid &&
2721       (m_curr_pid == pid || LLDB_INVALID_PROCESS_ID == pid))
2722     return true;
2723 
2724   std::optional<PidTid> ret = SendSetCurrentThreadPacket(tid, pid, 'g');
2725   if (ret) {
2726     if (ret->pid != LLDB_INVALID_PROCESS_ID)
2727       m_curr_pid = ret->pid;
2728     m_curr_tid = ret->tid;
2729   }
2730   return ret.has_value();
2731 }
2732 
2733 bool GDBRemoteCommunicationClient::SetCurrentThreadForRun(uint64_t tid,
2734                                                           uint64_t pid) {
2735   if (m_curr_tid_run == tid &&
2736       (m_curr_pid_run == pid || LLDB_INVALID_PROCESS_ID == pid))
2737     return true;
2738 
2739   std::optional<PidTid> ret = SendSetCurrentThreadPacket(tid, pid, 'c');
2740   if (ret) {
2741     if (ret->pid != LLDB_INVALID_PROCESS_ID)
2742       m_curr_pid_run = ret->pid;
2743     m_curr_tid_run = ret->tid;
2744   }
2745   return ret.has_value();
2746 }
2747 
2748 bool GDBRemoteCommunicationClient::GetStopReply(
2749     StringExtractorGDBRemote &response) {
2750   if (SendPacketAndWaitForResponse("?", response) == PacketResult::Success)
2751     return response.IsNormalResponse();
2752   return false;
2753 }
2754 
2755 bool GDBRemoteCommunicationClient::GetThreadStopInfo(
2756     lldb::tid_t tid, StringExtractorGDBRemote &response) {
2757   if (m_supports_qThreadStopInfo) {
2758     char packet[256];
2759     int packet_len =
2760         ::snprintf(packet, sizeof(packet), "qThreadStopInfo%" PRIx64, tid);
2761     assert(packet_len < (int)sizeof(packet));
2762     UNUSED_IF_ASSERT_DISABLED(packet_len);
2763     if (SendPacketAndWaitForResponse(packet, response) ==
2764         PacketResult::Success) {
2765       if (response.IsUnsupportedResponse())
2766         m_supports_qThreadStopInfo = false;
2767       else if (response.IsNormalResponse())
2768         return true;
2769       else
2770         return false;
2771     } else {
2772       m_supports_qThreadStopInfo = false;
2773     }
2774   }
2775   return false;
2776 }
2777 
2778 uint8_t GDBRemoteCommunicationClient::SendGDBStoppointTypePacket(
2779     GDBStoppointType type, bool insert, addr_t addr, uint32_t length,
2780     std::chrono::seconds timeout) {
2781   Log *log = GetLog(LLDBLog::Breakpoints);
2782   LLDB_LOGF(log, "GDBRemoteCommunicationClient::%s() %s at addr = 0x%" PRIx64,
2783             __FUNCTION__, insert ? "add" : "remove", addr);
2784 
2785   // Check if the stub is known not to support this breakpoint type
2786   if (!SupportsGDBStoppointPacket(type))
2787     return UINT8_MAX;
2788   // Construct the breakpoint packet
2789   char packet[64];
2790   const int packet_len =
2791       ::snprintf(packet, sizeof(packet), "%c%i,%" PRIx64 ",%x",
2792                  insert ? 'Z' : 'z', type, addr, length);
2793   // Check we haven't overwritten the end of the packet buffer
2794   assert(packet_len + 1 < (int)sizeof(packet));
2795   UNUSED_IF_ASSERT_DISABLED(packet_len);
2796   StringExtractorGDBRemote response;
2797   // Make sure the response is either "OK", "EXX" where XX are two hex digits,
2798   // or "" (unsupported)
2799   response.SetResponseValidatorToOKErrorNotSupported();
2800   // Try to send the breakpoint packet, and check that it was correctly sent
2801   if (SendPacketAndWaitForResponse(packet, response, timeout) ==
2802       PacketResult::Success) {
2803     // Receive and OK packet when the breakpoint successfully placed
2804     if (response.IsOKResponse())
2805       return 0;
2806 
2807     // Status while setting breakpoint, send back specific error
2808     if (response.IsErrorResponse())
2809       return response.GetError();
2810 
2811     // Empty packet informs us that breakpoint is not supported
2812     if (response.IsUnsupportedResponse()) {
2813       // Disable this breakpoint type since it is unsupported
2814       switch (type) {
2815       case eBreakpointSoftware:
2816         m_supports_z0 = false;
2817         break;
2818       case eBreakpointHardware:
2819         m_supports_z1 = false;
2820         break;
2821       case eWatchpointWrite:
2822         m_supports_z2 = false;
2823         break;
2824       case eWatchpointRead:
2825         m_supports_z3 = false;
2826         break;
2827       case eWatchpointReadWrite:
2828         m_supports_z4 = false;
2829         break;
2830       case eStoppointInvalid:
2831         return UINT8_MAX;
2832       }
2833     }
2834   }
2835   // Signal generic failure
2836   return UINT8_MAX;
2837 }
2838 
2839 std::vector<std::pair<lldb::pid_t, lldb::tid_t>>
2840 GDBRemoteCommunicationClient::GetCurrentProcessAndThreadIDs(
2841     bool &sequence_mutex_unavailable) {
2842   std::vector<std::pair<lldb::pid_t, lldb::tid_t>> ids;
2843 
2844   Lock lock(*this);
2845   if (lock) {
2846     sequence_mutex_unavailable = false;
2847     StringExtractorGDBRemote response;
2848 
2849     PacketResult packet_result;
2850     for (packet_result =
2851              SendPacketAndWaitForResponseNoLock("qfThreadInfo", response);
2852          packet_result == PacketResult::Success && response.IsNormalResponse();
2853          packet_result =
2854              SendPacketAndWaitForResponseNoLock("qsThreadInfo", response)) {
2855       char ch = response.GetChar();
2856       if (ch == 'l')
2857         break;
2858       if (ch == 'm') {
2859         do {
2860           auto pid_tid = response.GetPidTid(LLDB_INVALID_PROCESS_ID);
2861           // If we get an invalid response, break out of the loop.
2862           // If there are valid tids, they have been added to ids.
2863           // If there are no valid tids, we'll fall through to the
2864           // bare-iron target handling below.
2865           if (!pid_tid)
2866             break;
2867 
2868           ids.push_back(*pid_tid);
2869           ch = response.GetChar(); // Skip the command separator
2870         } while (ch == ',');       // Make sure we got a comma separator
2871       }
2872     }
2873 
2874     /*
2875      * Connected bare-iron target (like YAMON gdb-stub) may not have support for
2876      * qProcessInfo, qC and qfThreadInfo packets. The reply from '?' packet
2877      * could
2878      * be as simple as 'S05'. There is no packet which can give us pid and/or
2879      * tid.
2880      * Assume pid=tid=1 in such cases.
2881      */
2882     if ((response.IsUnsupportedResponse() || response.IsNormalResponse()) &&
2883         ids.size() == 0 && IsConnected()) {
2884       ids.emplace_back(1, 1);
2885     }
2886   } else {
2887     Log *log(GetLog(GDBRLog::Process | GDBRLog::Packets));
2888     LLDB_LOG(log, "error: failed to get packet sequence mutex, not sending "
2889                   "packet 'qfThreadInfo'");
2890     sequence_mutex_unavailable = true;
2891   }
2892 
2893   return ids;
2894 }
2895 
2896 size_t GDBRemoteCommunicationClient::GetCurrentThreadIDs(
2897     std::vector<lldb::tid_t> &thread_ids, bool &sequence_mutex_unavailable) {
2898   lldb::pid_t pid = GetCurrentProcessID();
2899   thread_ids.clear();
2900 
2901   auto ids = GetCurrentProcessAndThreadIDs(sequence_mutex_unavailable);
2902   if (ids.empty() || sequence_mutex_unavailable)
2903     return 0;
2904 
2905   for (auto id : ids) {
2906     // skip threads that do not belong to the current process
2907     if (id.first != LLDB_INVALID_PROCESS_ID && id.first != pid)
2908       continue;
2909     if (id.second != LLDB_INVALID_THREAD_ID &&
2910         id.second != StringExtractorGDBRemote::AllThreads)
2911       thread_ids.push_back(id.second);
2912   }
2913 
2914   return thread_ids.size();
2915 }
2916 
2917 lldb::addr_t GDBRemoteCommunicationClient::GetShlibInfoAddr() {
2918   StringExtractorGDBRemote response;
2919   if (SendPacketAndWaitForResponse("qShlibInfoAddr", response) !=
2920           PacketResult::Success ||
2921       !response.IsNormalResponse())
2922     return LLDB_INVALID_ADDRESS;
2923   return response.GetHexMaxU64(false, LLDB_INVALID_ADDRESS);
2924 }
2925 
2926 lldb_private::Status GDBRemoteCommunicationClient::RunShellCommand(
2927     llvm::StringRef command,
2928     const FileSpec &
2929         working_dir, // Pass empty FileSpec to use the current working directory
2930     int *status_ptr, // Pass NULL if you don't want the process exit status
2931     int *signo_ptr,  // Pass NULL if you don't want the signal that caused the
2932                      // process to exit
2933     std::string
2934         *command_output, // Pass NULL if you don't want the command output
2935     const Timeout<std::micro> &timeout) {
2936   lldb_private::StreamString stream;
2937   stream.PutCString("qPlatform_shell:");
2938   stream.PutBytesAsRawHex8(command.data(), command.size());
2939   stream.PutChar(',');
2940   uint32_t timeout_sec = UINT32_MAX;
2941   if (timeout) {
2942     // TODO: Use chrono version of std::ceil once c++17 is available.
2943     timeout_sec = std::ceil(std::chrono::duration<double>(*timeout).count());
2944   }
2945   stream.PutHex32(timeout_sec);
2946   if (working_dir) {
2947     std::string path{working_dir.GetPath(false)};
2948     stream.PutChar(',');
2949     stream.PutStringAsRawHex8(path);
2950   }
2951   StringExtractorGDBRemote response;
2952   if (SendPacketAndWaitForResponse(stream.GetString(), response) ==
2953       PacketResult::Success) {
2954     if (response.GetChar() != 'F')
2955       return Status("malformed reply");
2956     if (response.GetChar() != ',')
2957       return Status("malformed reply");
2958     uint32_t exitcode = response.GetHexMaxU32(false, UINT32_MAX);
2959     if (exitcode == UINT32_MAX)
2960       return Status("unable to run remote process");
2961     else if (status_ptr)
2962       *status_ptr = exitcode;
2963     if (response.GetChar() != ',')
2964       return Status("malformed reply");
2965     uint32_t signo = response.GetHexMaxU32(false, UINT32_MAX);
2966     if (signo_ptr)
2967       *signo_ptr = signo;
2968     if (response.GetChar() != ',')
2969       return Status("malformed reply");
2970     std::string output;
2971     response.GetEscapedBinaryData(output);
2972     if (command_output)
2973       command_output->assign(output);
2974     return Status();
2975   }
2976   return Status("unable to send packet");
2977 }
2978 
2979 Status GDBRemoteCommunicationClient::MakeDirectory(const FileSpec &file_spec,
2980                                                    uint32_t file_permissions) {
2981   std::string path{file_spec.GetPath(false)};
2982   lldb_private::StreamString stream;
2983   stream.PutCString("qPlatform_mkdir:");
2984   stream.PutHex32(file_permissions);
2985   stream.PutChar(',');
2986   stream.PutStringAsRawHex8(path);
2987   llvm::StringRef packet = stream.GetString();
2988   StringExtractorGDBRemote response;
2989 
2990   if (SendPacketAndWaitForResponse(packet, response) != PacketResult::Success)
2991     return Status("failed to send '%s' packet", packet.str().c_str());
2992 
2993   if (response.GetChar() != 'F')
2994     return Status("invalid response to '%s' packet", packet.str().c_str());
2995 
2996   return Status(response.GetHexMaxU32(false, UINT32_MAX), eErrorTypePOSIX);
2997 }
2998 
2999 Status
3000 GDBRemoteCommunicationClient::SetFilePermissions(const FileSpec &file_spec,
3001                                                  uint32_t file_permissions) {
3002   std::string path{file_spec.GetPath(false)};
3003   lldb_private::StreamString stream;
3004   stream.PutCString("qPlatform_chmod:");
3005   stream.PutHex32(file_permissions);
3006   stream.PutChar(',');
3007   stream.PutStringAsRawHex8(path);
3008   llvm::StringRef packet = stream.GetString();
3009   StringExtractorGDBRemote response;
3010 
3011   if (SendPacketAndWaitForResponse(packet, response) != PacketResult::Success)
3012     return Status("failed to send '%s' packet", stream.GetData());
3013 
3014   if (response.GetChar() != 'F')
3015     return Status("invalid response to '%s' packet", stream.GetData());
3016 
3017   return Status(response.GetHexMaxU32(false, UINT32_MAX), eErrorTypePOSIX);
3018 }
3019 
3020 static int gdb_errno_to_system(int err) {
3021   switch (err) {
3022 #define HANDLE_ERRNO(name, value)                                              \
3023   case GDB_##name:                                                             \
3024     return name;
3025 #include "Plugins/Process/gdb-remote/GDBRemoteErrno.def"
3026   default:
3027     return -1;
3028   }
3029 }
3030 
3031 static uint64_t ParseHostIOPacketResponse(StringExtractorGDBRemote &response,
3032                                           uint64_t fail_result, Status &error) {
3033   response.SetFilePos(0);
3034   if (response.GetChar() != 'F')
3035     return fail_result;
3036   int32_t result = response.GetS32(-2, 16);
3037   if (result == -2)
3038     return fail_result;
3039   if (response.GetChar() == ',') {
3040     int result_errno = gdb_errno_to_system(response.GetS32(-1, 16));
3041     if (result_errno != -1)
3042       error.SetError(result_errno, eErrorTypePOSIX);
3043     else
3044       error.SetError(-1, eErrorTypeGeneric);
3045   } else
3046     error.Clear();
3047   return result;
3048 }
3049 lldb::user_id_t
3050 GDBRemoteCommunicationClient::OpenFile(const lldb_private::FileSpec &file_spec,
3051                                        File::OpenOptions flags, mode_t mode,
3052                                        Status &error) {
3053   std::string path(file_spec.GetPath(false));
3054   lldb_private::StreamString stream;
3055   stream.PutCString("vFile:open:");
3056   if (path.empty())
3057     return UINT64_MAX;
3058   stream.PutStringAsRawHex8(path);
3059   stream.PutChar(',');
3060   stream.PutHex32(flags);
3061   stream.PutChar(',');
3062   stream.PutHex32(mode);
3063   StringExtractorGDBRemote response;
3064   if (SendPacketAndWaitForResponse(stream.GetString(), response) ==
3065       PacketResult::Success) {
3066     return ParseHostIOPacketResponse(response, UINT64_MAX, error);
3067   }
3068   return UINT64_MAX;
3069 }
3070 
3071 bool GDBRemoteCommunicationClient::CloseFile(lldb::user_id_t fd,
3072                                              Status &error) {
3073   lldb_private::StreamString stream;
3074   stream.Printf("vFile:close:%x", (int)fd);
3075   StringExtractorGDBRemote response;
3076   if (SendPacketAndWaitForResponse(stream.GetString(), response) ==
3077       PacketResult::Success) {
3078     return ParseHostIOPacketResponse(response, -1, error) == 0;
3079   }
3080   return false;
3081 }
3082 
3083 std::optional<GDBRemoteFStatData>
3084 GDBRemoteCommunicationClient::FStat(lldb::user_id_t fd) {
3085   lldb_private::StreamString stream;
3086   stream.Printf("vFile:fstat:%" PRIx64, fd);
3087   StringExtractorGDBRemote response;
3088   if (SendPacketAndWaitForResponse(stream.GetString(), response) ==
3089       PacketResult::Success) {
3090     if (response.GetChar() != 'F')
3091       return std::nullopt;
3092     int64_t size = response.GetS64(-1, 16);
3093     if (size > 0 && response.GetChar() == ';') {
3094       std::string buffer;
3095       if (response.GetEscapedBinaryData(buffer)) {
3096         GDBRemoteFStatData out;
3097         if (buffer.size() != sizeof(out))
3098           return std::nullopt;
3099         memcpy(&out, buffer.data(), sizeof(out));
3100         return out;
3101       }
3102     }
3103   }
3104   return std::nullopt;
3105 }
3106 
3107 std::optional<GDBRemoteFStatData>
3108 GDBRemoteCommunicationClient::Stat(const lldb_private::FileSpec &file_spec) {
3109   Status error;
3110   lldb::user_id_t fd = OpenFile(file_spec, File::eOpenOptionReadOnly, 0, error);
3111   if (fd == UINT64_MAX)
3112     return std::nullopt;
3113   std::optional<GDBRemoteFStatData> st = FStat(fd);
3114   CloseFile(fd, error);
3115   return st;
3116 }
3117 
3118 // Extension of host I/O packets to get the file size.
3119 lldb::user_id_t GDBRemoteCommunicationClient::GetFileSize(
3120     const lldb_private::FileSpec &file_spec) {
3121   if (m_supports_vFileSize) {
3122     std::string path(file_spec.GetPath(false));
3123     lldb_private::StreamString stream;
3124     stream.PutCString("vFile:size:");
3125     stream.PutStringAsRawHex8(path);
3126     StringExtractorGDBRemote response;
3127     if (SendPacketAndWaitForResponse(stream.GetString(), response) !=
3128         PacketResult::Success)
3129       return UINT64_MAX;
3130 
3131     if (!response.IsUnsupportedResponse()) {
3132       if (response.GetChar() != 'F')
3133         return UINT64_MAX;
3134       uint32_t retcode = response.GetHexMaxU64(false, UINT64_MAX);
3135       return retcode;
3136     }
3137     m_supports_vFileSize = false;
3138   }
3139 
3140   // Fallback to fstat.
3141   std::optional<GDBRemoteFStatData> st = Stat(file_spec);
3142   return st ? st->gdb_st_size : UINT64_MAX;
3143 }
3144 
3145 void GDBRemoteCommunicationClient::AutoCompleteDiskFileOrDirectory(
3146     CompletionRequest &request, bool only_dir) {
3147   lldb_private::StreamString stream;
3148   stream.PutCString("qPathComplete:");
3149   stream.PutHex32(only_dir ? 1 : 0);
3150   stream.PutChar(',');
3151   stream.PutStringAsRawHex8(request.GetCursorArgumentPrefix());
3152   StringExtractorGDBRemote response;
3153   if (SendPacketAndWaitForResponse(stream.GetString(), response) ==
3154       PacketResult::Success) {
3155     StreamString strm;
3156     char ch = response.GetChar();
3157     if (ch != 'M')
3158       return;
3159     while (response.Peek()) {
3160       strm.Clear();
3161       while ((ch = response.GetHexU8(0, false)) != '\0')
3162         strm.PutChar(ch);
3163       request.AddCompletion(strm.GetString());
3164       if (response.GetChar() != ',')
3165         break;
3166     }
3167   }
3168 }
3169 
3170 Status
3171 GDBRemoteCommunicationClient::GetFilePermissions(const FileSpec &file_spec,
3172                                                  uint32_t &file_permissions) {
3173   if (m_supports_vFileMode) {
3174     std::string path{file_spec.GetPath(false)};
3175     Status error;
3176     lldb_private::StreamString stream;
3177     stream.PutCString("vFile:mode:");
3178     stream.PutStringAsRawHex8(path);
3179     StringExtractorGDBRemote response;
3180     if (SendPacketAndWaitForResponse(stream.GetString(), response) !=
3181         PacketResult::Success) {
3182       error.SetErrorStringWithFormat("failed to send '%s' packet",
3183                                      stream.GetData());
3184       return error;
3185     }
3186     if (!response.IsUnsupportedResponse()) {
3187       if (response.GetChar() != 'F') {
3188         error.SetErrorStringWithFormat("invalid response to '%s' packet",
3189                                        stream.GetData());
3190       } else {
3191         const uint32_t mode = response.GetS32(-1, 16);
3192         if (static_cast<int32_t>(mode) == -1) {
3193           if (response.GetChar() == ',') {
3194             int response_errno = gdb_errno_to_system(response.GetS32(-1, 16));
3195             if (response_errno > 0)
3196               error.SetError(response_errno, lldb::eErrorTypePOSIX);
3197             else
3198               error.SetErrorToGenericError();
3199           } else
3200             error.SetErrorToGenericError();
3201         } else {
3202           file_permissions = mode & (S_IRWXU | S_IRWXG | S_IRWXO);
3203         }
3204       }
3205       return error;
3206     } else { // response.IsUnsupportedResponse()
3207       m_supports_vFileMode = false;
3208     }
3209   }
3210 
3211   // Fallback to fstat.
3212   if (std::optional<GDBRemoteFStatData> st = Stat(file_spec)) {
3213     file_permissions = st->gdb_st_mode & (S_IRWXU | S_IRWXG | S_IRWXO);
3214     return Status();
3215   }
3216   return Status("fstat failed");
3217 }
3218 
3219 uint64_t GDBRemoteCommunicationClient::ReadFile(lldb::user_id_t fd,
3220                                                 uint64_t offset, void *dst,
3221                                                 uint64_t dst_len,
3222                                                 Status &error) {
3223   lldb_private::StreamString stream;
3224   stream.Printf("vFile:pread:%x,%" PRIx64 ",%" PRIx64, (int)fd, dst_len,
3225                 offset);
3226   StringExtractorGDBRemote response;
3227   if (SendPacketAndWaitForResponse(stream.GetString(), response) ==
3228       PacketResult::Success) {
3229     if (response.GetChar() != 'F')
3230       return 0;
3231     int64_t retcode = response.GetS64(-1, 16);
3232     if (retcode == -1) {
3233       error.SetErrorToGenericError();
3234       if (response.GetChar() == ',') {
3235         int response_errno = gdb_errno_to_system(response.GetS32(-1, 16));
3236         if (response_errno > 0)
3237           error.SetError(response_errno, lldb::eErrorTypePOSIX);
3238       }
3239       return -1;
3240     }
3241     const char next = (response.Peek() ? *response.Peek() : 0);
3242     if (next == ',')
3243       return 0;
3244     if (next == ';') {
3245       response.GetChar(); // skip the semicolon
3246       std::string buffer;
3247       if (response.GetEscapedBinaryData(buffer)) {
3248         const uint64_t data_to_write =
3249             std::min<uint64_t>(dst_len, buffer.size());
3250         if (data_to_write > 0)
3251           memcpy(dst, &buffer[0], data_to_write);
3252         return data_to_write;
3253       }
3254     }
3255   }
3256   return 0;
3257 }
3258 
3259 uint64_t GDBRemoteCommunicationClient::WriteFile(lldb::user_id_t fd,
3260                                                  uint64_t offset,
3261                                                  const void *src,
3262                                                  uint64_t src_len,
3263                                                  Status &error) {
3264   lldb_private::StreamGDBRemote stream;
3265   stream.Printf("vFile:pwrite:%x,%" PRIx64 ",", (int)fd, offset);
3266   stream.PutEscapedBytes(src, src_len);
3267   StringExtractorGDBRemote response;
3268   if (SendPacketAndWaitForResponse(stream.GetString(), response) ==
3269       PacketResult::Success) {
3270     if (response.GetChar() != 'F') {
3271       error.SetErrorStringWithFormat("write file failed");
3272       return 0;
3273     }
3274     int64_t bytes_written = response.GetS64(-1, 16);
3275     if (bytes_written == -1) {
3276       error.SetErrorToGenericError();
3277       if (response.GetChar() == ',') {
3278         int response_errno = gdb_errno_to_system(response.GetS32(-1, 16));
3279         if (response_errno > 0)
3280           error.SetError(response_errno, lldb::eErrorTypePOSIX);
3281       }
3282       return -1;
3283     }
3284     return bytes_written;
3285   } else {
3286     error.SetErrorString("failed to send vFile:pwrite packet");
3287   }
3288   return 0;
3289 }
3290 
3291 Status GDBRemoteCommunicationClient::CreateSymlink(const FileSpec &src,
3292                                                    const FileSpec &dst) {
3293   std::string src_path{src.GetPath(false)}, dst_path{dst.GetPath(false)};
3294   Status error;
3295   lldb_private::StreamGDBRemote stream;
3296   stream.PutCString("vFile:symlink:");
3297   // the unix symlink() command reverses its parameters where the dst if first,
3298   // so we follow suit here
3299   stream.PutStringAsRawHex8(dst_path);
3300   stream.PutChar(',');
3301   stream.PutStringAsRawHex8(src_path);
3302   StringExtractorGDBRemote response;
3303   if (SendPacketAndWaitForResponse(stream.GetString(), response) ==
3304       PacketResult::Success) {
3305     if (response.GetChar() == 'F') {
3306       uint32_t result = response.GetHexMaxU32(false, UINT32_MAX);
3307       if (result != 0) {
3308         error.SetErrorToGenericError();
3309         if (response.GetChar() == ',') {
3310           int response_errno = gdb_errno_to_system(response.GetS32(-1, 16));
3311           if (response_errno > 0)
3312             error.SetError(response_errno, lldb::eErrorTypePOSIX);
3313         }
3314       }
3315     } else {
3316       // Should have returned with 'F<result>[,<errno>]'
3317       error.SetErrorStringWithFormat("symlink failed");
3318     }
3319   } else {
3320     error.SetErrorString("failed to send vFile:symlink packet");
3321   }
3322   return error;
3323 }
3324 
3325 Status GDBRemoteCommunicationClient::Unlink(const FileSpec &file_spec) {
3326   std::string path{file_spec.GetPath(false)};
3327   Status error;
3328   lldb_private::StreamGDBRemote stream;
3329   stream.PutCString("vFile:unlink:");
3330   // the unix symlink() command reverses its parameters where the dst if first,
3331   // so we follow suit here
3332   stream.PutStringAsRawHex8(path);
3333   StringExtractorGDBRemote response;
3334   if (SendPacketAndWaitForResponse(stream.GetString(), response) ==
3335       PacketResult::Success) {
3336     if (response.GetChar() == 'F') {
3337       uint32_t result = response.GetHexMaxU32(false, UINT32_MAX);
3338       if (result != 0) {
3339         error.SetErrorToGenericError();
3340         if (response.GetChar() == ',') {
3341           int response_errno = gdb_errno_to_system(response.GetS32(-1, 16));
3342           if (response_errno > 0)
3343             error.SetError(response_errno, lldb::eErrorTypePOSIX);
3344         }
3345       }
3346     } else {
3347       // Should have returned with 'F<result>[,<errno>]'
3348       error.SetErrorStringWithFormat("unlink failed");
3349     }
3350   } else {
3351     error.SetErrorString("failed to send vFile:unlink packet");
3352   }
3353   return error;
3354 }
3355 
3356 // Extension of host I/O packets to get whether a file exists.
3357 bool GDBRemoteCommunicationClient::GetFileExists(
3358     const lldb_private::FileSpec &file_spec) {
3359   if (m_supports_vFileExists) {
3360     std::string path(file_spec.GetPath(false));
3361     lldb_private::StreamString stream;
3362     stream.PutCString("vFile:exists:");
3363     stream.PutStringAsRawHex8(path);
3364     StringExtractorGDBRemote response;
3365     if (SendPacketAndWaitForResponse(stream.GetString(), response) !=
3366         PacketResult::Success)
3367       return false;
3368     if (!response.IsUnsupportedResponse()) {
3369       if (response.GetChar() != 'F')
3370         return false;
3371       if (response.GetChar() != ',')
3372         return false;
3373       bool retcode = (response.GetChar() != '0');
3374       return retcode;
3375     } else
3376       m_supports_vFileExists = false;
3377   }
3378 
3379   // Fallback to open.
3380   Status error;
3381   lldb::user_id_t fd = OpenFile(file_spec, File::eOpenOptionReadOnly, 0, error);
3382   if (fd == UINT64_MAX)
3383     return false;
3384   CloseFile(fd, error);
3385   return true;
3386 }
3387 
3388 bool GDBRemoteCommunicationClient::CalculateMD5(
3389     const lldb_private::FileSpec &file_spec, uint64_t &high, uint64_t &low) {
3390   std::string path(file_spec.GetPath(false));
3391   lldb_private::StreamString stream;
3392   stream.PutCString("vFile:MD5:");
3393   stream.PutStringAsRawHex8(path);
3394   StringExtractorGDBRemote response;
3395   if (SendPacketAndWaitForResponse(stream.GetString(), response) ==
3396       PacketResult::Success) {
3397     if (response.GetChar() != 'F')
3398       return false;
3399     if (response.GetChar() != ',')
3400       return false;
3401     if (response.Peek() && *response.Peek() == 'x')
3402       return false;
3403     low = response.GetHexMaxU64(false, UINT64_MAX);
3404     high = response.GetHexMaxU64(false, UINT64_MAX);
3405     return true;
3406   }
3407   return false;
3408 }
3409 
3410 bool GDBRemoteCommunicationClient::AvoidGPackets(ProcessGDBRemote *process) {
3411   // Some targets have issues with g/G packets and we need to avoid using them
3412   if (m_avoid_g_packets == eLazyBoolCalculate) {
3413     if (process) {
3414       m_avoid_g_packets = eLazyBoolNo;
3415       const ArchSpec &arch = process->GetTarget().GetArchitecture();
3416       if (arch.IsValid() &&
3417           arch.GetTriple().getVendor() == llvm::Triple::Apple &&
3418           arch.GetTriple().getOS() == llvm::Triple::IOS &&
3419           (arch.GetTriple().getArch() == llvm::Triple::aarch64 ||
3420            arch.GetTriple().getArch() == llvm::Triple::aarch64_32)) {
3421         m_avoid_g_packets = eLazyBoolYes;
3422         uint32_t gdb_server_version = GetGDBServerProgramVersion();
3423         if (gdb_server_version != 0) {
3424           const char *gdb_server_name = GetGDBServerProgramName();
3425           if (gdb_server_name && strcmp(gdb_server_name, "debugserver") == 0) {
3426             if (gdb_server_version >= 310)
3427               m_avoid_g_packets = eLazyBoolNo;
3428           }
3429         }
3430       }
3431     }
3432   }
3433   return m_avoid_g_packets == eLazyBoolYes;
3434 }
3435 
3436 DataBufferSP GDBRemoteCommunicationClient::ReadRegister(lldb::tid_t tid,
3437                                                         uint32_t reg) {
3438   StreamString payload;
3439   payload.Printf("p%x", reg);
3440   StringExtractorGDBRemote response;
3441   if (SendThreadSpecificPacketAndWaitForResponse(
3442           tid, std::move(payload), response) != PacketResult::Success ||
3443       !response.IsNormalResponse())
3444     return nullptr;
3445 
3446   WritableDataBufferSP buffer_sp(
3447       new DataBufferHeap(response.GetStringRef().size() / 2, 0));
3448   response.GetHexBytes(buffer_sp->GetData(), '\xcc');
3449   return buffer_sp;
3450 }
3451 
3452 DataBufferSP GDBRemoteCommunicationClient::ReadAllRegisters(lldb::tid_t tid) {
3453   StreamString payload;
3454   payload.PutChar('g');
3455   StringExtractorGDBRemote response;
3456   if (SendThreadSpecificPacketAndWaitForResponse(
3457           tid, std::move(payload), response) != PacketResult::Success ||
3458       !response.IsNormalResponse())
3459     return nullptr;
3460 
3461   WritableDataBufferSP buffer_sp(
3462       new DataBufferHeap(response.GetStringRef().size() / 2, 0));
3463   response.GetHexBytes(buffer_sp->GetData(), '\xcc');
3464   return buffer_sp;
3465 }
3466 
3467 bool GDBRemoteCommunicationClient::WriteRegister(lldb::tid_t tid,
3468                                                  uint32_t reg_num,
3469                                                  llvm::ArrayRef<uint8_t> data) {
3470   StreamString payload;
3471   payload.Printf("P%x=", reg_num);
3472   payload.PutBytesAsRawHex8(data.data(), data.size(),
3473                             endian::InlHostByteOrder(),
3474                             endian::InlHostByteOrder());
3475   StringExtractorGDBRemote response;
3476   return SendThreadSpecificPacketAndWaitForResponse(
3477              tid, std::move(payload), response) == PacketResult::Success &&
3478          response.IsOKResponse();
3479 }
3480 
3481 bool GDBRemoteCommunicationClient::WriteAllRegisters(
3482     lldb::tid_t tid, llvm::ArrayRef<uint8_t> data) {
3483   StreamString payload;
3484   payload.PutChar('G');
3485   payload.PutBytesAsRawHex8(data.data(), data.size(),
3486                             endian::InlHostByteOrder(),
3487                             endian::InlHostByteOrder());
3488   StringExtractorGDBRemote response;
3489   return SendThreadSpecificPacketAndWaitForResponse(
3490              tid, std::move(payload), response) == PacketResult::Success &&
3491          response.IsOKResponse();
3492 }
3493 
3494 bool GDBRemoteCommunicationClient::SaveRegisterState(lldb::tid_t tid,
3495                                                      uint32_t &save_id) {
3496   save_id = 0; // Set to invalid save ID
3497   if (m_supports_QSaveRegisterState == eLazyBoolNo)
3498     return false;
3499 
3500   m_supports_QSaveRegisterState = eLazyBoolYes;
3501   StreamString payload;
3502   payload.PutCString("QSaveRegisterState");
3503   StringExtractorGDBRemote response;
3504   if (SendThreadSpecificPacketAndWaitForResponse(
3505           tid, std::move(payload), response) != PacketResult::Success)
3506     return false;
3507 
3508   if (response.IsUnsupportedResponse())
3509     m_supports_QSaveRegisterState = eLazyBoolNo;
3510 
3511   const uint32_t response_save_id = response.GetU32(0);
3512   if (response_save_id == 0)
3513     return false;
3514 
3515   save_id = response_save_id;
3516   return true;
3517 }
3518 
3519 bool GDBRemoteCommunicationClient::RestoreRegisterState(lldb::tid_t tid,
3520                                                         uint32_t save_id) {
3521   // We use the "m_supports_QSaveRegisterState" variable here because the
3522   // QSaveRegisterState and QRestoreRegisterState packets must both be
3523   // supported in order to be useful
3524   if (m_supports_QSaveRegisterState == eLazyBoolNo)
3525     return false;
3526 
3527   StreamString payload;
3528   payload.Printf("QRestoreRegisterState:%u", save_id);
3529   StringExtractorGDBRemote response;
3530   if (SendThreadSpecificPacketAndWaitForResponse(
3531           tid, std::move(payload), response) != PacketResult::Success)
3532     return false;
3533 
3534   if (response.IsOKResponse())
3535     return true;
3536 
3537   if (response.IsUnsupportedResponse())
3538     m_supports_QSaveRegisterState = eLazyBoolNo;
3539   return false;
3540 }
3541 
3542 bool GDBRemoteCommunicationClient::SyncThreadState(lldb::tid_t tid) {
3543   if (!GetSyncThreadStateSupported())
3544     return false;
3545 
3546   StreamString packet;
3547   StringExtractorGDBRemote response;
3548   packet.Printf("QSyncThreadState:%4.4" PRIx64 ";", tid);
3549   return SendPacketAndWaitForResponse(packet.GetString(), response) ==
3550              GDBRemoteCommunication::PacketResult::Success &&
3551          response.IsOKResponse();
3552 }
3553 
3554 llvm::Expected<TraceSupportedResponse>
3555 GDBRemoteCommunicationClient::SendTraceSupported(std::chrono::seconds timeout) {
3556   Log *log = GetLog(GDBRLog::Process);
3557 
3558   StreamGDBRemote escaped_packet;
3559   escaped_packet.PutCString("jLLDBTraceSupported");
3560 
3561   StringExtractorGDBRemote response;
3562   if (SendPacketAndWaitForResponse(escaped_packet.GetString(), response,
3563                                    timeout) ==
3564       GDBRemoteCommunication::PacketResult::Success) {
3565     if (response.IsErrorResponse())
3566       return response.GetStatus().ToError();
3567     if (response.IsUnsupportedResponse())
3568       return llvm::createStringError(llvm::inconvertibleErrorCode(),
3569                                      "jLLDBTraceSupported is unsupported");
3570 
3571     return llvm::json::parse<TraceSupportedResponse>(response.Peek(),
3572                                                      "TraceSupportedResponse");
3573   }
3574   LLDB_LOG(log, "failed to send packet: jLLDBTraceSupported");
3575   return llvm::createStringError(llvm::inconvertibleErrorCode(),
3576                                  "failed to send packet: jLLDBTraceSupported");
3577 }
3578 
3579 llvm::Error
3580 GDBRemoteCommunicationClient::SendTraceStop(const TraceStopRequest &request,
3581                                             std::chrono::seconds timeout) {
3582   Log *log = GetLog(GDBRLog::Process);
3583 
3584   StreamGDBRemote escaped_packet;
3585   escaped_packet.PutCString("jLLDBTraceStop:");
3586 
3587   std::string json_string;
3588   llvm::raw_string_ostream os(json_string);
3589   os << toJSON(request);
3590   os.flush();
3591 
3592   escaped_packet.PutEscapedBytes(json_string.c_str(), json_string.size());
3593 
3594   StringExtractorGDBRemote response;
3595   if (SendPacketAndWaitForResponse(escaped_packet.GetString(), response,
3596                                    timeout) ==
3597       GDBRemoteCommunication::PacketResult::Success) {
3598     if (response.IsErrorResponse())
3599       return response.GetStatus().ToError();
3600     if (response.IsUnsupportedResponse())
3601       return llvm::createStringError(llvm::inconvertibleErrorCode(),
3602                                      "jLLDBTraceStop is unsupported");
3603     if (response.IsOKResponse())
3604       return llvm::Error::success();
3605     return llvm::createStringError(llvm::inconvertibleErrorCode(),
3606                                    "Invalid jLLDBTraceStart response");
3607   }
3608   LLDB_LOG(log, "failed to send packet: jLLDBTraceStop");
3609   return llvm::createStringError(llvm::inconvertibleErrorCode(),
3610                                  "failed to send packet: jLLDBTraceStop '%s'",
3611                                  escaped_packet.GetData());
3612 }
3613 
3614 llvm::Error
3615 GDBRemoteCommunicationClient::SendTraceStart(const llvm::json::Value &params,
3616                                              std::chrono::seconds timeout) {
3617   Log *log = GetLog(GDBRLog::Process);
3618 
3619   StreamGDBRemote escaped_packet;
3620   escaped_packet.PutCString("jLLDBTraceStart:");
3621 
3622   std::string json_string;
3623   llvm::raw_string_ostream os(json_string);
3624   os << params;
3625   os.flush();
3626 
3627   escaped_packet.PutEscapedBytes(json_string.c_str(), json_string.size());
3628 
3629   StringExtractorGDBRemote response;
3630   if (SendPacketAndWaitForResponse(escaped_packet.GetString(), response,
3631                                    timeout) ==
3632       GDBRemoteCommunication::PacketResult::Success) {
3633     if (response.IsErrorResponse())
3634       return response.GetStatus().ToError();
3635     if (response.IsUnsupportedResponse())
3636       return llvm::createStringError(llvm::inconvertibleErrorCode(),
3637                                      "jLLDBTraceStart is unsupported");
3638     if (response.IsOKResponse())
3639       return llvm::Error::success();
3640     return llvm::createStringError(llvm::inconvertibleErrorCode(),
3641                                    "Invalid jLLDBTraceStart response");
3642   }
3643   LLDB_LOG(log, "failed to send packet: jLLDBTraceStart");
3644   return llvm::createStringError(llvm::inconvertibleErrorCode(),
3645                                  "failed to send packet: jLLDBTraceStart '%s'",
3646                                  escaped_packet.GetData());
3647 }
3648 
3649 llvm::Expected<std::string>
3650 GDBRemoteCommunicationClient::SendTraceGetState(llvm::StringRef type,
3651                                                 std::chrono::seconds timeout) {
3652   Log *log = GetLog(GDBRLog::Process);
3653 
3654   StreamGDBRemote escaped_packet;
3655   escaped_packet.PutCString("jLLDBTraceGetState:");
3656 
3657   std::string json_string;
3658   llvm::raw_string_ostream os(json_string);
3659   os << toJSON(TraceGetStateRequest{type.str()});
3660   os.flush();
3661 
3662   escaped_packet.PutEscapedBytes(json_string.c_str(), json_string.size());
3663 
3664   StringExtractorGDBRemote response;
3665   if (SendPacketAndWaitForResponse(escaped_packet.GetString(), response,
3666                                    timeout) ==
3667       GDBRemoteCommunication::PacketResult::Success) {
3668     if (response.IsErrorResponse())
3669       return response.GetStatus().ToError();
3670     if (response.IsUnsupportedResponse())
3671       return llvm::createStringError(llvm::inconvertibleErrorCode(),
3672                                      "jLLDBTraceGetState is unsupported");
3673     return std::string(response.Peek());
3674   }
3675 
3676   LLDB_LOG(log, "failed to send packet: jLLDBTraceGetState");
3677   return llvm::createStringError(
3678       llvm::inconvertibleErrorCode(),
3679       "failed to send packet: jLLDBTraceGetState '%s'",
3680       escaped_packet.GetData());
3681 }
3682 
3683 llvm::Expected<std::vector<uint8_t>>
3684 GDBRemoteCommunicationClient::SendTraceGetBinaryData(
3685     const TraceGetBinaryDataRequest &request, std::chrono::seconds timeout) {
3686   Log *log = GetLog(GDBRLog::Process);
3687 
3688   StreamGDBRemote escaped_packet;
3689   escaped_packet.PutCString("jLLDBTraceGetBinaryData:");
3690 
3691   std::string json_string;
3692   llvm::raw_string_ostream os(json_string);
3693   os << toJSON(request);
3694   os.flush();
3695 
3696   escaped_packet.PutEscapedBytes(json_string.c_str(), json_string.size());
3697 
3698   StringExtractorGDBRemote response;
3699   if (SendPacketAndWaitForResponse(escaped_packet.GetString(), response,
3700                                    timeout) ==
3701       GDBRemoteCommunication::PacketResult::Success) {
3702     if (response.IsErrorResponse())
3703       return response.GetStatus().ToError();
3704     std::string data;
3705     response.GetEscapedBinaryData(data);
3706     return std::vector<uint8_t>(data.begin(), data.end());
3707   }
3708   LLDB_LOG(log, "failed to send packet: jLLDBTraceGetBinaryData");
3709   return llvm::createStringError(
3710       llvm::inconvertibleErrorCode(),
3711       "failed to send packet: jLLDBTraceGetBinaryData '%s'",
3712       escaped_packet.GetData());
3713 }
3714 
3715 std::optional<QOffsets> GDBRemoteCommunicationClient::GetQOffsets() {
3716   StringExtractorGDBRemote response;
3717   if (SendPacketAndWaitForResponse("qOffsets", response) !=
3718       PacketResult::Success)
3719     return std::nullopt;
3720   if (!response.IsNormalResponse())
3721     return std::nullopt;
3722 
3723   QOffsets result;
3724   llvm::StringRef ref = response.GetStringRef();
3725   const auto &GetOffset = [&] {
3726     addr_t offset;
3727     if (ref.consumeInteger(16, offset))
3728       return false;
3729     result.offsets.push_back(offset);
3730     return true;
3731   };
3732 
3733   if (ref.consume_front("Text=")) {
3734     result.segments = false;
3735     if (!GetOffset())
3736       return std::nullopt;
3737     if (!ref.consume_front(";Data=") || !GetOffset())
3738       return std::nullopt;
3739     if (ref.empty())
3740       return result;
3741     if (ref.consume_front(";Bss=") && GetOffset() && ref.empty())
3742       return result;
3743   } else if (ref.consume_front("TextSeg=")) {
3744     result.segments = true;
3745     if (!GetOffset())
3746       return std::nullopt;
3747     if (ref.empty())
3748       return result;
3749     if (ref.consume_front(";DataSeg=") && GetOffset() && ref.empty())
3750       return result;
3751   }
3752   return std::nullopt;
3753 }
3754 
3755 bool GDBRemoteCommunicationClient::GetModuleInfo(
3756     const FileSpec &module_file_spec, const lldb_private::ArchSpec &arch_spec,
3757     ModuleSpec &module_spec) {
3758   if (!m_supports_qModuleInfo)
3759     return false;
3760 
3761   std::string module_path = module_file_spec.GetPath(false);
3762   if (module_path.empty())
3763     return false;
3764 
3765   StreamString packet;
3766   packet.PutCString("qModuleInfo:");
3767   packet.PutStringAsRawHex8(module_path);
3768   packet.PutCString(";");
3769   const auto &triple = arch_spec.GetTriple().getTriple();
3770   packet.PutStringAsRawHex8(triple);
3771 
3772   StringExtractorGDBRemote response;
3773   if (SendPacketAndWaitForResponse(packet.GetString(), response) !=
3774       PacketResult::Success)
3775     return false;
3776 
3777   if (response.IsErrorResponse())
3778     return false;
3779 
3780   if (response.IsUnsupportedResponse()) {
3781     m_supports_qModuleInfo = false;
3782     return false;
3783   }
3784 
3785   llvm::StringRef name;
3786   llvm::StringRef value;
3787 
3788   module_spec.Clear();
3789   module_spec.GetFileSpec() = module_file_spec;
3790 
3791   while (response.GetNameColonValue(name, value)) {
3792     if (name == "uuid" || name == "md5") {
3793       StringExtractor extractor(value);
3794       std::string uuid;
3795       extractor.GetHexByteString(uuid);
3796       module_spec.GetUUID().SetFromStringRef(uuid);
3797     } else if (name == "triple") {
3798       StringExtractor extractor(value);
3799       std::string triple;
3800       extractor.GetHexByteString(triple);
3801       module_spec.GetArchitecture().SetTriple(triple.c_str());
3802     } else if (name == "file_offset") {
3803       uint64_t ival = 0;
3804       if (!value.getAsInteger(16, ival))
3805         module_spec.SetObjectOffset(ival);
3806     } else if (name == "file_size") {
3807       uint64_t ival = 0;
3808       if (!value.getAsInteger(16, ival))
3809         module_spec.SetObjectSize(ival);
3810     } else if (name == "file_path") {
3811       StringExtractor extractor(value);
3812       std::string path;
3813       extractor.GetHexByteString(path);
3814       module_spec.GetFileSpec() = FileSpec(path, arch_spec.GetTriple());
3815     }
3816   }
3817 
3818   return true;
3819 }
3820 
3821 static std::optional<ModuleSpec>
3822 ParseModuleSpec(StructuredData::Dictionary *dict) {
3823   ModuleSpec result;
3824   if (!dict)
3825     return std::nullopt;
3826 
3827   llvm::StringRef string;
3828   uint64_t integer;
3829 
3830   if (!dict->GetValueForKeyAsString("uuid", string))
3831     return std::nullopt;
3832   if (!result.GetUUID().SetFromStringRef(string))
3833     return std::nullopt;
3834 
3835   if (!dict->GetValueForKeyAsInteger("file_offset", integer))
3836     return std::nullopt;
3837   result.SetObjectOffset(integer);
3838 
3839   if (!dict->GetValueForKeyAsInteger("file_size", integer))
3840     return std::nullopt;
3841   result.SetObjectSize(integer);
3842 
3843   if (!dict->GetValueForKeyAsString("triple", string))
3844     return std::nullopt;
3845   result.GetArchitecture().SetTriple(string);
3846 
3847   if (!dict->GetValueForKeyAsString("file_path", string))
3848     return std::nullopt;
3849   result.GetFileSpec() = FileSpec(string, result.GetArchitecture().GetTriple());
3850 
3851   return result;
3852 }
3853 
3854 std::optional<std::vector<ModuleSpec>>
3855 GDBRemoteCommunicationClient::GetModulesInfo(
3856     llvm::ArrayRef<FileSpec> module_file_specs, const llvm::Triple &triple) {
3857   namespace json = llvm::json;
3858 
3859   if (!m_supports_jModulesInfo)
3860     return std::nullopt;
3861 
3862   json::Array module_array;
3863   for (const FileSpec &module_file_spec : module_file_specs) {
3864     module_array.push_back(
3865         json::Object{{"file", module_file_spec.GetPath(false)},
3866                      {"triple", triple.getTriple()}});
3867   }
3868   StreamString unescaped_payload;
3869   unescaped_payload.PutCString("jModulesInfo:");
3870   unescaped_payload.AsRawOstream() << std::move(module_array);
3871 
3872   StreamGDBRemote payload;
3873   payload.PutEscapedBytes(unescaped_payload.GetString().data(),
3874                           unescaped_payload.GetSize());
3875 
3876   // Increase the timeout for jModulesInfo since this packet can take longer.
3877   ScopedTimeout timeout(*this, std::chrono::seconds(10));
3878 
3879   StringExtractorGDBRemote response;
3880   if (SendPacketAndWaitForResponse(payload.GetString(), response) !=
3881           PacketResult::Success ||
3882       response.IsErrorResponse())
3883     return std::nullopt;
3884 
3885   if (response.IsUnsupportedResponse()) {
3886     m_supports_jModulesInfo = false;
3887     return std::nullopt;
3888   }
3889 
3890   StructuredData::ObjectSP response_object_sp =
3891       StructuredData::ParseJSON(response.GetStringRef());
3892   if (!response_object_sp)
3893     return std::nullopt;
3894 
3895   StructuredData::Array *response_array = response_object_sp->GetAsArray();
3896   if (!response_array)
3897     return std::nullopt;
3898 
3899   std::vector<ModuleSpec> result;
3900   for (size_t i = 0; i < response_array->GetSize(); ++i) {
3901     if (std::optional<ModuleSpec> module_spec = ParseModuleSpec(
3902             response_array->GetItemAtIndex(i)->GetAsDictionary()))
3903       result.push_back(*module_spec);
3904   }
3905 
3906   return result;
3907 }
3908 
3909 // query the target remote for extended information using the qXfer packet
3910 //
3911 // example: object='features', annex='target.xml'
3912 // return: <xml output> or error
3913 llvm::Expected<std::string>
3914 GDBRemoteCommunicationClient::ReadExtFeature(llvm::StringRef object,
3915                                              llvm::StringRef annex) {
3916 
3917   std::string output;
3918   llvm::raw_string_ostream output_stream(output);
3919   StringExtractorGDBRemote chunk;
3920 
3921   uint64_t size = GetRemoteMaxPacketSize();
3922   if (size == 0)
3923     size = 0x1000;
3924   size = size - 1; // Leave space for the 'm' or 'l' character in the response
3925   int offset = 0;
3926   bool active = true;
3927 
3928   // loop until all data has been read
3929   while (active) {
3930 
3931     // send query extended feature packet
3932     std::string packet =
3933         ("qXfer:" + object + ":read:" + annex + ":" +
3934          llvm::Twine::utohexstr(offset) + "," + llvm::Twine::utohexstr(size))
3935             .str();
3936 
3937     GDBRemoteCommunication::PacketResult res =
3938         SendPacketAndWaitForResponse(packet, chunk);
3939 
3940     if (res != GDBRemoteCommunication::PacketResult::Success ||
3941         chunk.GetStringRef().empty()) {
3942       return llvm::createStringError(llvm::inconvertibleErrorCode(),
3943                                      "Error sending $qXfer packet");
3944     }
3945 
3946     // check packet code
3947     switch (chunk.GetStringRef()[0]) {
3948     // last chunk
3949     case ('l'):
3950       active = false;
3951       [[fallthrough]];
3952 
3953     // more chunks
3954     case ('m'):
3955       output_stream << chunk.GetStringRef().drop_front();
3956       offset += chunk.GetStringRef().size() - 1;
3957       break;
3958 
3959     // unknown chunk
3960     default:
3961       return llvm::createStringError(
3962           llvm::inconvertibleErrorCode(),
3963           "Invalid continuation code from $qXfer packet");
3964     }
3965   }
3966 
3967   return output_stream.str();
3968 }
3969 
3970 // Notify the target that gdb is prepared to serve symbol lookup requests.
3971 //  packet: "qSymbol::"
3972 //  reply:
3973 //  OK                  The target does not need to look up any (more) symbols.
3974 //  qSymbol:<sym_name>  The target requests the value of symbol sym_name (hex
3975 //  encoded).
3976 //                      LLDB may provide the value by sending another qSymbol
3977 //                      packet
3978 //                      in the form of"qSymbol:<sym_value>:<sym_name>".
3979 //
3980 //  Three examples:
3981 //
3982 //  lldb sends:    qSymbol::
3983 //  lldb receives: OK
3984 //     Remote gdb stub does not need to know the addresses of any symbols, lldb
3985 //     does not
3986 //     need to ask again in this session.
3987 //
3988 //  lldb sends:    qSymbol::
3989 //  lldb receives: qSymbol:64697370617463685f71756575655f6f666673657473
3990 //  lldb sends:    qSymbol::64697370617463685f71756575655f6f666673657473
3991 //  lldb receives: OK
3992 //     Remote gdb stub asks for address of 'dispatch_queue_offsets'.  lldb does
3993 //     not know
3994 //     the address at this time.  lldb needs to send qSymbol:: again when it has
3995 //     more
3996 //     solibs loaded.
3997 //
3998 //  lldb sends:    qSymbol::
3999 //  lldb receives: qSymbol:64697370617463685f71756575655f6f666673657473
4000 //  lldb sends:    qSymbol:2bc97554:64697370617463685f71756575655f6f666673657473
4001 //  lldb receives: OK
4002 //     Remote gdb stub asks for address of 'dispatch_queue_offsets'.  lldb says
4003 //     that it
4004 //     is at address 0x2bc97554.  Remote gdb stub sends 'OK' indicating that it
4005 //     does not
4006 //     need any more symbols.  lldb does not need to ask again in this session.
4007 
4008 void GDBRemoteCommunicationClient::ServeSymbolLookups(
4009     lldb_private::Process *process) {
4010   // Set to true once we've resolved a symbol to an address for the remote
4011   // stub. If we get an 'OK' response after this, the remote stub doesn't need
4012   // any more symbols and we can stop asking.
4013   bool symbol_response_provided = false;
4014 
4015   // Is this the initial qSymbol:: packet?
4016   bool first_qsymbol_query = true;
4017 
4018   if (m_supports_qSymbol && !m_qSymbol_requests_done) {
4019     Lock lock(*this);
4020     if (lock) {
4021       StreamString packet;
4022       packet.PutCString("qSymbol::");
4023       StringExtractorGDBRemote response;
4024       while (SendPacketAndWaitForResponseNoLock(packet.GetString(), response) ==
4025              PacketResult::Success) {
4026         if (response.IsOKResponse()) {
4027           if (symbol_response_provided || first_qsymbol_query) {
4028             m_qSymbol_requests_done = true;
4029           }
4030 
4031           // We are done serving symbols requests
4032           return;
4033         }
4034         first_qsymbol_query = false;
4035 
4036         if (response.IsUnsupportedResponse()) {
4037           // qSymbol is not supported by the current GDB server we are
4038           // connected to
4039           m_supports_qSymbol = false;
4040           return;
4041         } else {
4042           llvm::StringRef response_str(response.GetStringRef());
4043           if (response_str.startswith("qSymbol:")) {
4044             response.SetFilePos(strlen("qSymbol:"));
4045             std::string symbol_name;
4046             if (response.GetHexByteString(symbol_name)) {
4047               if (symbol_name.empty())
4048                 return;
4049 
4050               addr_t symbol_load_addr = LLDB_INVALID_ADDRESS;
4051               lldb_private::SymbolContextList sc_list;
4052               process->GetTarget().GetImages().FindSymbolsWithNameAndType(
4053                   ConstString(symbol_name), eSymbolTypeAny, sc_list);
4054               for (const SymbolContext &sc : sc_list) {
4055                 if (symbol_load_addr != LLDB_INVALID_ADDRESS)
4056                   break;
4057                 if (sc.symbol) {
4058                   switch (sc.symbol->GetType()) {
4059                   case eSymbolTypeInvalid:
4060                   case eSymbolTypeAbsolute:
4061                   case eSymbolTypeUndefined:
4062                   case eSymbolTypeSourceFile:
4063                   case eSymbolTypeHeaderFile:
4064                   case eSymbolTypeObjectFile:
4065                   case eSymbolTypeCommonBlock:
4066                   case eSymbolTypeBlock:
4067                   case eSymbolTypeLocal:
4068                   case eSymbolTypeParam:
4069                   case eSymbolTypeVariable:
4070                   case eSymbolTypeVariableType:
4071                   case eSymbolTypeLineEntry:
4072                   case eSymbolTypeLineHeader:
4073                   case eSymbolTypeScopeBegin:
4074                   case eSymbolTypeScopeEnd:
4075                   case eSymbolTypeAdditional:
4076                   case eSymbolTypeCompiler:
4077                   case eSymbolTypeInstrumentation:
4078                   case eSymbolTypeTrampoline:
4079                     break;
4080 
4081                   case eSymbolTypeCode:
4082                   case eSymbolTypeResolver:
4083                   case eSymbolTypeData:
4084                   case eSymbolTypeRuntime:
4085                   case eSymbolTypeException:
4086                   case eSymbolTypeObjCClass:
4087                   case eSymbolTypeObjCMetaClass:
4088                   case eSymbolTypeObjCIVar:
4089                   case eSymbolTypeReExported:
4090                     symbol_load_addr =
4091                         sc.symbol->GetLoadAddress(&process->GetTarget());
4092                     break;
4093                   }
4094                 }
4095               }
4096               // This is the normal path where our symbol lookup was successful
4097               // and we want to send a packet with the new symbol value and see
4098               // if another lookup needs to be done.
4099 
4100               // Change "packet" to contain the requested symbol value and name
4101               packet.Clear();
4102               packet.PutCString("qSymbol:");
4103               if (symbol_load_addr != LLDB_INVALID_ADDRESS) {
4104                 packet.Printf("%" PRIx64, symbol_load_addr);
4105                 symbol_response_provided = true;
4106               } else {
4107                 symbol_response_provided = false;
4108               }
4109               packet.PutCString(":");
4110               packet.PutBytesAsRawHex8(symbol_name.data(), symbol_name.size());
4111               continue; // go back to the while loop and send "packet" and wait
4112                         // for another response
4113             }
4114           }
4115         }
4116       }
4117       // If we make it here, the symbol request packet response wasn't valid or
4118       // our symbol lookup failed so we must abort
4119       return;
4120 
4121     } else if (Log *log = GetLog(GDBRLog::Process | GDBRLog::Packets)) {
4122       LLDB_LOGF(log,
4123                 "GDBRemoteCommunicationClient::%s: Didn't get sequence mutex.",
4124                 __FUNCTION__);
4125     }
4126   }
4127 }
4128 
4129 StructuredData::Array *
4130 GDBRemoteCommunicationClient::GetSupportedStructuredDataPlugins() {
4131   if (!m_supported_async_json_packets_is_valid) {
4132     // Query the server for the array of supported asynchronous JSON packets.
4133     m_supported_async_json_packets_is_valid = true;
4134 
4135     Log *log = GetLog(GDBRLog::Process);
4136 
4137     // Poll it now.
4138     StringExtractorGDBRemote response;
4139     if (SendPacketAndWaitForResponse("qStructuredDataPlugins", response) ==
4140         PacketResult::Success) {
4141       m_supported_async_json_packets_sp =
4142           StructuredData::ParseJSON(response.GetStringRef());
4143       if (m_supported_async_json_packets_sp &&
4144           !m_supported_async_json_packets_sp->GetAsArray()) {
4145         // We were returned something other than a JSON array.  This is
4146         // invalid.  Clear it out.
4147         LLDB_LOGF(log,
4148                   "GDBRemoteCommunicationClient::%s(): "
4149                   "QSupportedAsyncJSONPackets returned invalid "
4150                   "result: %s",
4151                   __FUNCTION__, response.GetStringRef().data());
4152         m_supported_async_json_packets_sp.reset();
4153       }
4154     } else {
4155       LLDB_LOGF(log,
4156                 "GDBRemoteCommunicationClient::%s(): "
4157                 "QSupportedAsyncJSONPackets unsupported",
4158                 __FUNCTION__);
4159     }
4160 
4161     if (log && m_supported_async_json_packets_sp) {
4162       StreamString stream;
4163       m_supported_async_json_packets_sp->Dump(stream);
4164       LLDB_LOGF(log,
4165                 "GDBRemoteCommunicationClient::%s(): supported async "
4166                 "JSON packets: %s",
4167                 __FUNCTION__, stream.GetData());
4168     }
4169   }
4170 
4171   return m_supported_async_json_packets_sp
4172              ? m_supported_async_json_packets_sp->GetAsArray()
4173              : nullptr;
4174 }
4175 
4176 Status GDBRemoteCommunicationClient::SendSignalsToIgnore(
4177     llvm::ArrayRef<int32_t> signals) {
4178   // Format packet:
4179   // QPassSignals:<hex_sig1>;<hex_sig2>...;<hex_sigN>
4180   auto range = llvm::make_range(signals.begin(), signals.end());
4181   std::string packet = formatv("QPassSignals:{0:$[;]@(x-2)}", range).str();
4182 
4183   StringExtractorGDBRemote response;
4184   auto send_status = SendPacketAndWaitForResponse(packet, response);
4185 
4186   if (send_status != GDBRemoteCommunication::PacketResult::Success)
4187     return Status("Sending QPassSignals packet failed");
4188 
4189   if (response.IsOKResponse()) {
4190     return Status();
4191   } else {
4192     return Status("Unknown error happened during sending QPassSignals packet.");
4193   }
4194 }
4195 
4196 Status GDBRemoteCommunicationClient::ConfigureRemoteStructuredData(
4197     llvm::StringRef type_name, const StructuredData::ObjectSP &config_sp) {
4198   Status error;
4199 
4200   if (type_name.empty()) {
4201     error.SetErrorString("invalid type_name argument");
4202     return error;
4203   }
4204 
4205   // Build command: Configure{type_name}: serialized config data.
4206   StreamGDBRemote stream;
4207   stream.PutCString("QConfigure");
4208   stream.PutCString(type_name);
4209   stream.PutChar(':');
4210   if (config_sp) {
4211     // Gather the plain-text version of the configuration data.
4212     StreamString unescaped_stream;
4213     config_sp->Dump(unescaped_stream);
4214     unescaped_stream.Flush();
4215 
4216     // Add it to the stream in escaped fashion.
4217     stream.PutEscapedBytes(unescaped_stream.GetString().data(),
4218                            unescaped_stream.GetSize());
4219   }
4220   stream.Flush();
4221 
4222   // Send the packet.
4223   StringExtractorGDBRemote response;
4224   auto result = SendPacketAndWaitForResponse(stream.GetString(), response);
4225   if (result == PacketResult::Success) {
4226     // We failed if the config result comes back other than OK.
4227     if (response.GetStringRef() == "OK") {
4228       // Okay!
4229       error.Clear();
4230     } else {
4231       error.SetErrorStringWithFormatv(
4232           "configuring StructuredData feature {0} failed with error {1}",
4233           type_name, response.GetStringRef());
4234     }
4235   } else {
4236     // Can we get more data here on the failure?
4237     error.SetErrorStringWithFormatv(
4238         "configuring StructuredData feature {0} failed when sending packet: "
4239         "PacketResult={1}",
4240         type_name, (int)result);
4241   }
4242   return error;
4243 }
4244 
4245 void GDBRemoteCommunicationClient::OnRunPacketSent(bool first) {
4246   GDBRemoteClientBase::OnRunPacketSent(first);
4247   m_curr_tid = LLDB_INVALID_THREAD_ID;
4248 }
4249 
4250 bool GDBRemoteCommunicationClient::UsesNativeSignals() {
4251   if (m_uses_native_signals == eLazyBoolCalculate)
4252     GetRemoteQSupported();
4253   if (m_uses_native_signals == eLazyBoolYes)
4254     return true;
4255 
4256   // If the remote didn't indicate native-signal support explicitly,
4257   // check whether it is an old version of lldb-server.
4258   return GetThreadSuffixSupported();
4259 }
4260 
4261 llvm::Expected<int> GDBRemoteCommunicationClient::KillProcess(lldb::pid_t pid) {
4262   StringExtractorGDBRemote response;
4263   GDBRemoteCommunication::ScopedTimeout(*this, seconds(3));
4264 
4265   if (SendPacketAndWaitForResponse("k", response, GetPacketTimeout()) !=
4266       PacketResult::Success)
4267     return llvm::createStringError(llvm::inconvertibleErrorCode(),
4268                                    "failed to send k packet");
4269 
4270   char packet_cmd = response.GetChar(0);
4271   if (packet_cmd == 'W' || packet_cmd == 'X')
4272     return response.GetHexU8();
4273 
4274   return llvm::createStringError(llvm::inconvertibleErrorCode(),
4275                                  "unexpected response to k packet: %s",
4276                                  response.GetStringRef().str().c_str());
4277 }
4278