Use is_xcoff_format in gas testsuite
[deliverable/binutils-gdb.git] / gdb / nto-procfs.c
CommitLineData
61bb466e 1/* Machine independent support for QNX Neutrino /proc (process file system)
0df8b418 2 for GDB. Written by Colin Burgess at QNX Software Systems Limited.
61bb466e 3
b811d2c2 4 Copyright (C) 2003-2020 Free Software Foundation, Inc.
61bb466e
KW
5
6 Contributed by QNX Software Systems Ltd.
7
8 This file is part of GDB.
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
a9762ec7 12 the Free Software Foundation; either version 3 of the License, or
61bb466e
KW
13 (at your option) any later version.
14
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
a9762ec7 21 along with this program. If not, see <http://www.gnu.org/licenses/>. */
61bb466e
KW
22
23#include "defs.h"
24
25#include <fcntl.h>
26#include <spawn.h>
27#include <sys/debug.h>
28#include <sys/procfs.h>
29#include <sys/neutrino.h>
30#include <sys/syspage.h>
2978b111 31#include <dirent.h>
61bb466e 32#include <sys/netmgr.h>
8a6c0ccd
AR
33#include <sys/auxv.h>
34
61bb466e
KW
35#include "gdbcore.h"
36#include "inferior.h"
37#include "target.h"
38#include "objfiles.h"
39#include "gdbthread.h"
40#include "nto-tdep.h"
41#include "command.h"
42#include "regcache.h"
5ea03926 43#include "solib.h"
ee8e9165 44#include "inf-child.h"
268a13a5
TT
45#include "gdbsupport/filestuff.h"
46#include "gdbsupport/scoped_fd.h"
61bb466e
KW
47
48#define NULL_PID 0
49#define _DEBUG_FLAG_TRACE (_DEBUG_FLAG_TRACE_EXEC|_DEBUG_FLAG_TRACE_RD|\
50 _DEBUG_FLAG_TRACE_WR|_DEBUG_FLAG_TRACE_MODIFY)
51
61bb466e
KW
52int ctl_fd;
53
a40805d4 54static sighandler_t ofunc;
61bb466e
KW
55
56static procfs_run run;
57
f6ac5f3d
PA
58/* Create the "native" and "procfs" targets. */
59
60struct nto_procfs_target : public inf_child_target
61{
62 void open (const char *arg, int from_tty) override;
63
64 void attach (const char *, int) override = 0;
65
66 void post_attach (int);
67
68 void detach (inferior *, int) override;
69
70 void resume (ptid_t, int, enum gdb_signal) override;
71
72 ptid_t wait (ptid_t, struct target_waitstatus *, int) override;
73
74 void fetch_registers (struct regcache *, int) override;
75 void store_registers (struct regcache *, int) override;
76
77 enum target_xfer_status xfer_partial (enum target_object object,
78 const char *annex,
79 gdb_byte *readbuf,
80 const gdb_byte *writebuf,
81 ULONGEST offset, ULONGEST len,
82 ULONGEST *xfered_len) override;
83
84 void files_info () override;
85
86 int insert_breakpoint (struct gdbarch *, struct bp_target_info *) override;
87
88 int remove_breakpoint (struct gdbarch *, struct bp_target_info *,
89 enum remove_bp_reason) override;
90
91 int can_use_hw_breakpoint (enum bptype, int, int) override;
92
93 int insert_hw_breakpoint (struct gdbarch *, struct bp_target_info *) override;
94
95 int remove_hw_breakpoint (struct gdbarch *, struct bp_target_info *) override;
96
97 int insert_watchpoint (CORE_ADDR, int, enum target_hw_bp_type,
98 struct expression *) override;
99
100 int remove_watchpoint (CORE_ADDR, int, enum target_hw_bp_type,
101 struct expression *) override;
102
57810aa7 103 bool stopped_by_watchpoint () override;
f6ac5f3d
PA
104
105 void kill () override;
106
107 void create_inferior (const char *, const std::string &,
108 char **, int) override;
109
110 void mourn_inferior () override;
61bb466e 111
adc6a863 112 void pass_signals (gdb::array_view<const unsigned char>) override;
61bb466e 113
57810aa7 114 bool thread_alive (ptid_t ptid) override;
61bb466e 115
f6ac5f3d 116 void update_thread_list () override;
61bb466e 117
a068643d 118 std::string pid_to_str (ptid_t) override;
f6ac5f3d
PA
119
120 void interrupt () override;
121
f6ac5f3d
PA
122 const char *extra_thread_info (struct thread_info *) override;
123
124 char *pid_to_exec_file (int pid) override;
125};
126
127/* For "target native". */
f6ac5f3d 128
d9f719f1
PA
129static const target_info nto_native_target_info = {
130 "native",
131 N_("QNX Neutrino local process"),
132 N_("QNX Neutrino local process (started by the \"run\" command).")
133};
f6ac5f3d 134
d9f719f1
PA
135class nto_procfs_target_native final : public nto_procfs_target
136{
137 const target_info &info () const override
138 { return nto_native_target_info; }
f6ac5f3d
PA
139};
140
141/* For "target procfs <node>". */
f6ac5f3d 142
d9f719f1
PA
143static const target_info nto_procfs_target_info = {
144 "procfs",
145 N_("QNX Neutrino local or remote process"),
65e65158 146 N_("QNX Neutrino process. target procfs NODE")
d9f719f1 147};
f6ac5f3d 148
d9f719f1
PA
149struct nto_procfs_target_procfs final : public nto_procfs_target
150{
151 const target_info &info () const override
152 { return nto_procfs_target_info; }
f6ac5f3d
PA
153};
154
155static ptid_t do_attach (ptid_t ptid);
61bb466e 156
6a3cb8e8 157/* These two globals are only ever set in procfs_open_1, but are
61bb466e
KW
158 referenced elsewhere. 'nto_procfs_node' is a flag used to say
159 whether we are local, or we should get the current node descriptor
160 for the remote QNX node. */
609c3040 161static char *nodestr;
61bb466e
KW
162static unsigned nto_procfs_node = ND_LOCAL_NODE;
163
164/* Return the current QNX Node, or error out. This is a simple
165 wrapper for the netmgr_strtond() function. The reason this
166 is required is because QNX node descriptors are transient so
167 we have to re-acquire them every time. */
168static unsigned
d737fd7f 169nto_node (void)
61bb466e
KW
170{
171 unsigned node;
172
609c3040
AR
173 if (ND_NODE_CMP (nto_procfs_node, ND_LOCAL_NODE) == 0
174 || nodestr == NULL)
61bb466e
KW
175 return ND_LOCAL_NODE;
176
609c3040 177 node = netmgr_strtond (nodestr, 0);
61bb466e 178 if (node == -1)
8a3fe4f8 179 error (_("Lost the QNX node. Debug session probably over."));
61bb466e
KW
180
181 return (node);
182}
183
d737fd7f
KW
184static enum gdb_osabi
185procfs_is_nto_target (bfd *abfd)
186{
187 return GDB_OSABI_QNXNTO;
188}
189
6a3cb8e8
PA
190/* This is called when we call 'target native' or 'target procfs
191 <arg>' from the (gdb) prompt. For QNX6 (nto), the only valid arg
192 will be a QNX node string, eg: "/net/some_node". If arg is not a
193 valid QNX node, we will default to local. */
f6ac5f3d
PA
194void
195nto_procfs_target::open (const char *arg, int from_tty)
61bb466e 196{
61bb466e
KW
197 char *endstr;
198 char buffer[50];
5dc1a704 199 int total_size;
61bb466e 200 procfs_sysinfo *sysinfo;
609c3040 201 char nto_procfs_path[PATH_MAX];
61bb466e 202
6a3cb8e8
PA
203 /* Offer to kill previous inferiors before opening this target. */
204 target_preopen (from_tty);
205
d737fd7f
KW
206 nto_is_nto_target = procfs_is_nto_target;
207
61bb466e
KW
208 /* Set the default node used for spawning to this one,
209 and only override it if there is a valid arg. */
210
609c3040
AR
211 xfree (nodestr);
212 nodestr = NULL;
213
61bb466e 214 nto_procfs_node = ND_LOCAL_NODE;
609c3040 215 nodestr = (arg != NULL) ? xstrdup (arg) : NULL;
61bb466e 216
61bb466e
KW
217 if (nodestr)
218 {
219 nto_procfs_node = netmgr_strtond (nodestr, &endstr);
220 if (nto_procfs_node == -1)
221 {
222 if (errno == ENOTSUP)
223 printf_filtered ("QNX Net Manager not found.\n");
224 printf_filtered ("Invalid QNX node %s: error %d (%s).\n", nodestr,
dc5dd1eb 225 errno, safe_strerror (errno));
61bb466e
KW
226 xfree (nodestr);
227 nodestr = NULL;
228 nto_procfs_node = ND_LOCAL_NODE;
229 }
230 else if (*endstr)
231 {
232 if (*(endstr - 1) == '/')
233 *(endstr - 1) = 0;
234 else
235 *endstr = 0;
236 }
237 }
609c3040
AR
238 snprintf (nto_procfs_path, PATH_MAX - 1, "%s%s",
239 (nodestr != NULL) ? nodestr : "", "/proc");
61bb466e 240
5dc1a704
TT
241 scoped_fd fd (open (nto_procfs_path, O_RDONLY));
242 if (fd.get () == -1)
61bb466e
KW
243 {
244 printf_filtered ("Error opening %s : %d (%s)\n", nto_procfs_path, errno,
dc5dd1eb 245 safe_strerror (errno));
8a3fe4f8 246 error (_("Invalid procfs arg"));
61bb466e
KW
247 }
248
249 sysinfo = (void *) buffer;
5dc1a704 250 if (devctl (fd.get (), DCMD_PROC_SYSINFO, sysinfo, sizeof buffer, 0) != EOK)
61bb466e
KW
251 {
252 printf_filtered ("Error getting size: %d (%s)\n", errno,
dc5dd1eb 253 safe_strerror (errno));
8a3fe4f8 254 error (_("Devctl failed."));
61bb466e
KW
255 }
256 else
257 {
258 total_size = sysinfo->total_size;
259 sysinfo = alloca (total_size);
609c3040 260 if (sysinfo == NULL)
61bb466e
KW
261 {
262 printf_filtered ("Memory error: %d (%s)\n", errno,
dc5dd1eb 263 safe_strerror (errno));
8a3fe4f8 264 error (_("alloca failed."));
61bb466e
KW
265 }
266 else
267 {
5dc1a704
TT
268 if (devctl (fd.get (), DCMD_PROC_SYSINFO, sysinfo, total_size, 0)
269 != EOK)
61bb466e
KW
270 {
271 printf_filtered ("Error getting sysinfo: %d (%s)\n", errno,
dc5dd1eb 272 safe_strerror (errno));
8a3fe4f8 273 error (_("Devctl failed."));
61bb466e
KW
274 }
275 else
276 {
277 if (sysinfo->type !=
1143fffb 278 nto_map_arch_to_cputype (gdbarch_bfd_arch_info
f5656ead 279 (target_gdbarch ())->arch_name))
9fe4a216 280 error (_("Invalid target CPU."));
61bb466e
KW
281 }
282 }
283 }
6a3cb8e8 284
f6ac5f3d 285 inf_child_target::open (arg, from_tty);
61bb466e
KW
286 printf_filtered ("Debugging using %s\n", nto_procfs_path);
287}
288
289static void
290procfs_set_thread (ptid_t ptid)
291{
292 pid_t tid;
293
cc6bcb54 294 tid = ptid.tid ();
61bb466e
KW
295 devctl (ctl_fd, DCMD_PROC_CURTHREAD, &tid, sizeof (tid), 0);
296}
297
57810aa7
PA
298/* Return true if the thread TH is still alive. */
299
300bool
f6ac5f3d 301nto_procfs_target::thread_alive (ptid_t ptid)
61bb466e
KW
302{
303 pid_t tid;
745a434e
AR
304 pid_t pid;
305 procfs_status status;
306 int err;
61bb466e 307
cc6bcb54 308 tid = ptid.tid ();
e99b03dc 309 pid = ptid.pid ();
745a434e
AR
310
311 if (kill (pid, 0) == -1)
57810aa7 312 return false;
745a434e
AR
313
314 status.tid = tid;
315 if ((err = devctl (ctl_fd, DCMD_PROC_TIDSTATUS,
316 &status, sizeof (status), 0)) != EOK)
57810aa7 317 return false;
745a434e
AR
318
319 /* Thread is alive or dead but not yet joined,
320 or dead and there is an alive (or dead unjoined) thread with
321 higher tid.
322
323 If the tid is not the same as requested, requested tid is dead. */
324 return (status.tid == tid) && (status.state != STATE_DEAD);
325}
326
327static void
328update_thread_private_data_name (struct thread_info *new_thread,
329 const char *newname)
330{
7aabaf9d 331 nto_thread_info *pti = get_nto_thread_info (new_thread);
745a434e
AR
332
333 gdb_assert (newname != NULL);
334 gdb_assert (new_thread != NULL);
7aabaf9d
SM
335
336 if (pti)
745a434e 337 {
7aabaf9d
SM
338 pti = new nto_thread_info;
339 new_thread->priv.reset (pti);
745a434e 340 }
7aabaf9d
SM
341
342 pti->name = newname;
745a434e
AR
343}
344
345static void
346update_thread_private_data (struct thread_info *new_thread,
347 pthread_t tid, int state, int flags)
348{
745a434e
AR
349 procfs_info pidinfo;
350 struct _thread_name *tn;
351 procfs_threadctl tctl;
352
353#if _NTO_VERSION > 630
354 gdb_assert (new_thread != NULL);
355
356 if (devctl (ctl_fd, DCMD_PROC_INFO, &pidinfo,
357 sizeof(pidinfo), 0) != EOK)
358 return;
359
360 memset (&tctl, 0, sizeof (tctl));
361 tctl.cmd = _NTO_TCTL_NAME;
362 tn = (struct _thread_name *) (&tctl.data);
363
364 /* Fetch name for the given thread. */
365 tctl.tid = tid;
366 tn->name_buf_len = sizeof (tctl.data) - sizeof (*tn);
367 tn->new_name_len = -1; /* Getting, not setting. */
368 if (devctl (ctl_fd, DCMD_PROC_THREADCTL, &tctl, sizeof (tctl), NULL) != EOK)
369 tn->name_buf[0] = '\0';
370
371 tn->name_buf[_NTO_THREAD_NAME_MAX] = '\0';
372
373 update_thread_private_data_name (new_thread, tn->name_buf);
374
7aabaf9d 375 nto_thread_info *pti = get_nto_thread_info (new_thread);
745a434e
AR
376 pti->tid = tid;
377 pti->state = state;
378 pti->flags = flags;
379#endif /* _NTO_VERSION */
61bb466e
KW
380}
381
f6ac5f3d
PA
382void
383nto_procfs_target::update_thread_list ()
61bb466e
KW
384{
385 procfs_status status;
386 pid_t pid;
387 ptid_t ptid;
745a434e
AR
388 pthread_t tid;
389 struct thread_info *new_thread;
61bb466e
KW
390
391 if (ctl_fd == -1)
392 return;
393
e8032dde
PA
394 prune_threads ();
395
ebe84f23 396 pid = current_inferior ()->pid;
61bb466e 397
745a434e
AR
398 status.tid = 1;
399
400 for (tid = 1;; ++tid)
61bb466e 401 {
745a434e
AR
402 if (status.tid == tid
403 && (devctl (ctl_fd, DCMD_PROC_TIDSTATUS, &status, sizeof (status), 0)
404 != EOK))
61bb466e 405 break;
745a434e
AR
406 if (status.tid != tid)
407 /* The reason why this would not be equal is that devctl might have
408 returned different tid, meaning the requested tid no longer exists
409 (e.g. thread exited). */
410 continue;
fd79271b 411 ptid = ptid_t (pid, 0, tid);
5b6d1e4f 412 new_thread = find_thread_ptid (this, ptid);
745a434e
AR
413 if (!new_thread)
414 new_thread = add_thread (ptid);
415 update_thread_private_data (new_thread, tid, status.state, 0);
416 status.tid++;
61bb466e
KW
417 }
418 return;
419}
420
774ee6d2 421static void
1d12d88f 422procfs_pidlist (const char *args, int from_tty)
61bb466e 423{
61bb466e 424 struct dirent *dirp = NULL;
609c3040 425 char buf[PATH_MAX];
61bb466e
KW
426 procfs_info *pidinfo = NULL;
427 procfs_debuginfo *info = NULL;
428 procfs_status *status = NULL;
429 pid_t num_threads = 0;
430 pid_t pid;
431 char name[512];
609c3040 432 char procfs_dir[PATH_MAX];
61bb466e 433
609c3040
AR
434 snprintf (procfs_dir, sizeof (procfs_dir), "%s%s",
435 (nodestr != NULL) ? nodestr : "", "/proc");
436
f0b3976b 437 gdb_dir_up dp (opendir (procfs_dir));
61bb466e
KW
438 if (dp == NULL)
439 {
dc5dd1eb 440 fprintf_unfiltered (gdb_stderr, "failed to opendir \"%s\" - %d (%s)",
609c3040 441 procfs_dir, errno, safe_strerror (errno));
61bb466e
KW
442 return;
443 }
444
445 /* Start scan at first pid. */
f0b3976b 446 rewinddir (dp.get ());
61bb466e
KW
447
448 do
449 {
450 /* Get the right pid and procfs path for the pid. */
451 do
452 {
f0b3976b 453 dirp = readdir (dp.get ());
61bb466e 454 if (dirp == NULL)
f0b3976b 455 return;
609c3040
AR
456 snprintf (buf, sizeof (buf), "%s%s/%s/as",
457 (nodestr != NULL) ? nodestr : "",
458 "/proc", dirp->d_name);
61bb466e
KW
459 pid = atoi (dirp->d_name);
460 }
461 while (pid == 0);
462
0df8b418 463 /* Open the procfs path. */
5dc1a704
TT
464 scoped_fd fd (open (buf, O_RDONLY));
465 if (fd.get () == -1)
61bb466e 466 {
dc5dd1eb 467 fprintf_unfiltered (gdb_stderr, "failed to open %s - %d (%s)\n",
d737fd7f 468 buf, errno, safe_strerror (errno));
609c3040 469 continue;
61bb466e
KW
470 }
471
472 pidinfo = (procfs_info *) buf;
5dc1a704 473 if (devctl (fd.get (), DCMD_PROC_INFO, pidinfo, sizeof (buf), 0) != EOK)
61bb466e 474 {
dc5dd1eb 475 fprintf_unfiltered (gdb_stderr,
d737fd7f
KW
476 "devctl DCMD_PROC_INFO failed - %d (%s)\n",
477 errno, safe_strerror (errno));
61bb466e
KW
478 break;
479 }
480 num_threads = pidinfo->num_threads;
481
482 info = (procfs_debuginfo *) buf;
5dc1a704
TT
483 if (devctl (fd.get (), DCMD_PROC_MAPDEBUG_BASE, info, sizeof (buf), 0)
484 != EOK)
61bb466e
KW
485 strcpy (name, "unavailable");
486 else
487 strcpy (name, info->path);
488
489 /* Collect state info on all the threads. */
490 status = (procfs_status *) buf;
491 for (status->tid = 1; status->tid <= num_threads; status->tid++)
492 {
609c3040 493 const int err
5dc1a704 494 = devctl (fd.get (), DCMD_PROC_TIDSTATUS, status, sizeof (buf), 0);
609c3040
AR
495 printf_filtered ("%s - %d", name, pid);
496 if (err == EOK && status->tid != 0)
497 printf_filtered ("/%d\n", status->tid);
498 else
499 {
500 printf_filtered ("\n");
501 break;
502 }
61bb466e 503 }
61bb466e
KW
504 }
505 while (dirp != NULL);
61bb466e
KW
506}
507
774ee6d2 508static void
1d12d88f 509procfs_meminfo (const char *args, int from_tty)
61bb466e
KW
510{
511 procfs_mapinfo *mapinfos = NULL;
512 static int num_mapinfos = 0;
513 procfs_mapinfo *mapinfo_p, *mapinfo_p2;
514 int flags = ~0, err, num, i, j;
515
516 struct
517 {
518 procfs_debuginfo info;
519 char buff[_POSIX_PATH_MAX];
520 } map;
521
522 struct info
523 {
524 unsigned addr;
525 unsigned size;
526 unsigned flags;
527 unsigned debug_vaddr;
528 unsigned long long offset;
529 };
530
531 struct printinfo
532 {
533 unsigned long long ino;
534 unsigned dev;
535 struct info text;
536 struct info data;
537 char name[256];
538 } printme;
539
540 /* Get the number of map entrys. */
541 err = devctl (ctl_fd, DCMD_PROC_MAPINFO, NULL, 0, &num);
542 if (err != EOK)
543 {
d737fd7f
KW
544 printf ("failed devctl num mapinfos - %d (%s)\n", err,
545 safe_strerror (err));
61bb466e
KW
546 return;
547 }
548
774ee6d2 549 mapinfos = XNEWVEC (procfs_mapinfo, num);
61bb466e
KW
550
551 num_mapinfos = num;
552 mapinfo_p = mapinfos;
553
554 /* Fill the map entrys. */
555 err = devctl (ctl_fd, DCMD_PROC_MAPINFO, mapinfo_p, num
556 * sizeof (procfs_mapinfo), &num);
557 if (err != EOK)
558 {
5483d879 559 printf ("failed devctl mapinfos - %d (%s)\n", err, safe_strerror (err));
61bb466e
KW
560 xfree (mapinfos);
561 return;
562 }
563
325fac50 564 num = std::min (num, num_mapinfos);
61bb466e
KW
565
566 /* Run through the list of mapinfos, and store the data and text info
567 so we can print it at the bottom of the loop. */
568 for (mapinfo_p = mapinfos, i = 0; i < num; i++, mapinfo_p++)
569 {
570 if (!(mapinfo_p->flags & flags))
571 mapinfo_p->ino = 0;
572
573 if (mapinfo_p->ino == 0) /* Already visited. */
574 continue;
575
576 map.info.vaddr = mapinfo_p->vaddr;
577
578 err = devctl (ctl_fd, DCMD_PROC_MAPDEBUG, &map, sizeof (map), 0);
579 if (err != EOK)
580 continue;
581
582 memset (&printme, 0, sizeof printme);
583 printme.dev = mapinfo_p->dev;
584 printme.ino = mapinfo_p->ino;
585 printme.text.addr = mapinfo_p->vaddr;
586 printme.text.size = mapinfo_p->size;
587 printme.text.flags = mapinfo_p->flags;
588 printme.text.offset = mapinfo_p->offset;
589 printme.text.debug_vaddr = map.info.vaddr;
590 strcpy (printme.name, map.info.path);
591
592 /* Check for matching data. */
593 for (mapinfo_p2 = mapinfos, j = 0; j < num; j++, mapinfo_p2++)
594 {
595 if (mapinfo_p2->vaddr != mapinfo_p->vaddr
596 && mapinfo_p2->ino == mapinfo_p->ino
597 && mapinfo_p2->dev == mapinfo_p->dev)
598 {
599 map.info.vaddr = mapinfo_p2->vaddr;
600 err =
601 devctl (ctl_fd, DCMD_PROC_MAPDEBUG, &map, sizeof (map), 0);
602 if (err != EOK)
603 continue;
604
605 if (strcmp (map.info.path, printme.name))
606 continue;
607
405feb71 608 /* Lower debug_vaddr is always text, if necessary, swap. */
61bb466e
KW
609 if ((int) map.info.vaddr < (int) printme.text.debug_vaddr)
610 {
611 memcpy (&(printme.data), &(printme.text),
612 sizeof (printme.data));
613 printme.text.addr = mapinfo_p2->vaddr;
614 printme.text.size = mapinfo_p2->size;
615 printme.text.flags = mapinfo_p2->flags;
616 printme.text.offset = mapinfo_p2->offset;
617 printme.text.debug_vaddr = map.info.vaddr;
618 }
619 else
620 {
621 printme.data.addr = mapinfo_p2->vaddr;
622 printme.data.size = mapinfo_p2->size;
623 printme.data.flags = mapinfo_p2->flags;
624 printme.data.offset = mapinfo_p2->offset;
625 printme.data.debug_vaddr = map.info.vaddr;
626 }
627 mapinfo_p2->ino = 0;
628 }
629 }
630 mapinfo_p->ino = 0;
631
632 printf_filtered ("%s\n", printme.name);
633 printf_filtered ("\ttext=%08x bytes @ 0x%08x\n", printme.text.size,
634 printme.text.addr);
635 printf_filtered ("\t\tflags=%08x\n", printme.text.flags);
636 printf_filtered ("\t\tdebug=%08x\n", printme.text.debug_vaddr);
2244ba2e 637 printf_filtered ("\t\toffset=%s\n", phex (printme.text.offset, 8));
61bb466e
KW
638 if (printme.data.size)
639 {
640 printf_filtered ("\tdata=%08x bytes @ 0x%08x\n", printme.data.size,
641 printme.data.addr);
642 printf_filtered ("\t\tflags=%08x\n", printme.data.flags);
643 printf_filtered ("\t\tdebug=%08x\n", printme.data.debug_vaddr);
2244ba2e 644 printf_filtered ("\t\toffset=%s\n", phex (printme.data.offset, 8));
61bb466e
KW
645 }
646 printf_filtered ("\tdev=0x%x\n", printme.dev);
647 printf_filtered ("\tino=0x%x\n", (unsigned int) printme.ino);
648 }
649 xfree (mapinfos);
650 return;
651}
652
653/* Print status information about what we're accessing. */
f6ac5f3d
PA
654void
655nto_procfs_target::files_info ()
61bb466e 656{
181e7f93
PA
657 struct inferior *inf = current_inferior ();
658
61bb466e 659 printf_unfiltered ("\tUsing the running image of %s %s via %s.\n",
3fdfcbf1 660 inf->attach_flag ? "attached" : "child",
a068643d 661 target_pid_to_str (inferior_ptid).c_str (),
609c3040 662 (nodestr != NULL) ? nodestr : "local node");
61bb466e
KW
663}
664
e5343fde
AR
665/* Target to_pid_to_exec_file implementation. */
666
f6ac5f3d
PA
667char *
668nto_procfs_target::pid_to_exec_file (const int pid)
e5343fde
AR
669{
670 int proc_fd;
671 static char proc_path[PATH_MAX];
672 ssize_t rd;
673
674 /* Read exe file name. */
675 snprintf (proc_path, sizeof (proc_path), "%s/proc/%d/exefile",
676 (nodestr != NULL) ? nodestr : "", pid);
677 proc_fd = open (proc_path, O_RDONLY);
678 if (proc_fd == -1)
679 return NULL;
680
681 rd = read (proc_fd, proc_path, sizeof (proc_path) - 1);
682 close (proc_fd);
683 if (rd <= 0)
684 {
685 proc_path[0] = '\0';
686 return NULL;
687 }
688 proc_path[rd] = '\0';
689 return proc_path;
690}
691
61bb466e 692/* Attach to process PID, then initialize for debugging it. */
f6ac5f3d
PA
693void
694nto_procfs_target::attach (const char *args, int from_tty)
61bb466e 695{
61bb466e 696 int pid;
181e7f93 697 struct inferior *inf;
61bb466e 698
74164c56 699 pid = parse_pid_to_attach (args);
61bb466e
KW
700
701 if (pid == getpid ())
8a3fe4f8 702 error (_("Attaching GDB to itself is not a good idea..."));
61bb466e
KW
703
704 if (from_tty)
705 {
d9fa87f4 706 const char *exec_file = get_exec_file (0);
61bb466e
KW
707
708 if (exec_file)
709 printf_unfiltered ("Attaching to program `%s', %s\n", exec_file,
a068643d 710 target_pid_to_str (ptid_t (pid)).c_str ());
61bb466e
KW
711 else
712 printf_unfiltered ("Attaching to %s\n",
a068643d 713 target_pid_to_str (ptid_t (pid)).c_str ());
61bb466e 714 }
ebe84f23 715 ptid_t ptid = do_attach (ptid_t (pid));
6c95b8df
PA
716 inf = current_inferior ();
717 inferior_appeared (inf, pid);
181e7f93 718 inf->attach_flag = 1;
7f9f62ba 719
6a3cb8e8
PA
720 if (!target_is_pushed (ops))
721 push_target (ops);
7f9f62ba 722
ebe84f23
PA
723 update_thread_list ();
724
725 switch_to_thread (find_thread_ptid (this, ptid));
61bb466e
KW
726}
727
f6ac5f3d
PA
728void
729nto_procfs_target::post_attach (pid_t pid)
61bb466e 730{
61bb466e 731 if (exec_bfd)
268a4a75 732 solib_create_inferior_hook (0);
61bb466e
KW
733}
734
735static ptid_t
736do_attach (ptid_t ptid)
737{
738 procfs_status status;
739 struct sigevent event;
dc5dd1eb 740 char path[PATH_MAX];
61bb466e 741
609c3040 742 snprintf (path, PATH_MAX - 1, "%s%s/%d/as",
e99b03dc 743 (nodestr != NULL) ? nodestr : "", "/proc", ptid.pid ());
61bb466e
KW
744 ctl_fd = open (path, O_RDWR);
745 if (ctl_fd == -1)
8a3fe4f8 746 error (_("Couldn't open proc file %s, error %d (%s)"), path, errno,
dc5dd1eb 747 safe_strerror (errno));
61bb466e 748 if (devctl (ctl_fd, DCMD_PROC_STOP, &status, sizeof (status), 0) != EOK)
8a3fe4f8 749 error (_("Couldn't stop process"));
61bb466e
KW
750
751 /* Define a sigevent for process stopped notification. */
752 event.sigev_notify = SIGEV_SIGNAL_THREAD;
753 event.sigev_signo = SIGUSR1;
754 event.sigev_code = 0;
755 event.sigev_value.sival_ptr = NULL;
756 event.sigev_priority = -1;
757 devctl (ctl_fd, DCMD_PROC_EVENT, &event, sizeof (event), 0);
758
759 if (devctl (ctl_fd, DCMD_PROC_STATUS, &status, sizeof (status), 0) == EOK
760 && status.flags & _DEBUG_FLAG_STOPPED)
e99b03dc 761 SignalKill (nto_node (), ptid.pid (), 0, SIGCONT, 0, 0);
61bb466e 762 nto_init_solib_absolute_prefix ();
e99b03dc 763 return ptid_t (ptid.pid (), 0, status.tid);
61bb466e
KW
764}
765
766/* Ask the user what to do when an interrupt is received. */
767static void
dc5dd1eb 768interrupt_query (void)
61bb466e 769{
9e2f0ad4
HZ
770 if (query (_("Interrupted while waiting for the program.\n\
771Give up (and stop debugging it)? ")))
61bb466e 772 {
bc1e6c81 773 target_mourn_inferior (inferior_ptid);
039e3c22 774 quit ();
61bb466e 775 }
61bb466e
KW
776}
777
778/* The user typed ^C twice. */
779static void
bfedc46a 780nto_handle_sigint_twice (int signo)
61bb466e
KW
781{
782 signal (signo, ofunc);
783 interrupt_query ();
bfedc46a 784 signal (signo, nto_handle_sigint_twice);
61bb466e
KW
785}
786
787static void
bfedc46a 788nto_handle_sigint (int signo)
61bb466e
KW
789{
790 /* If this doesn't work, try more severe steps. */
bfedc46a 791 signal (signo, nto_handle_sigint_twice);
61bb466e 792
e671cd59 793 target_interrupt ();
61bb466e
KW
794}
795
f6ac5f3d
PA
796sptid_t
797nto_procfs_target::wait (ptid_t ptid, struct target_waitstatus *ourstatus,
798 int options)
61bb466e
KW
799{
800 sigset_t set;
801 siginfo_t info;
802 procfs_status status;
803 static int exit_signo = 0; /* To track signals that cause termination. */
804
805 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
806
d7e15655 807 if (inferior_ptid == null_ptid)
61bb466e
KW
808 {
809 ourstatus->kind = TARGET_WAITKIND_STOPPED;
a493e3e2 810 ourstatus->value.sig = GDB_SIGNAL_0;
61bb466e
KW
811 exit_signo = 0;
812 return null_ptid;
813 }
814
815 sigemptyset (&set);
816 sigaddset (&set, SIGUSR1);
817
818 devctl (ctl_fd, DCMD_PROC_STATUS, &status, sizeof (status), 0);
819 while (!(status.flags & _DEBUG_FLAG_ISTOP))
820 {
a40805d4 821 ofunc = signal (SIGINT, nto_handle_sigint);
61bb466e
KW
822 sigwaitinfo (&set, &info);
823 signal (SIGINT, ofunc);
824 devctl (ctl_fd, DCMD_PROC_STATUS, &status, sizeof (status), 0);
825 }
826
a9889169
AR
827 nto_inferior_data (NULL)->stopped_flags = status.flags;
828 nto_inferior_data (NULL)->stopped_pc = status.ip;
829
61bb466e
KW
830 if (status.flags & _DEBUG_FLAG_SSTEP)
831 {
832 ourstatus->kind = TARGET_WAITKIND_STOPPED;
a493e3e2 833 ourstatus->value.sig = GDB_SIGNAL_TRAP;
61bb466e
KW
834 }
835 /* Was it a breakpoint? */
836 else if (status.flags & _DEBUG_FLAG_TRACE)
837 {
838 ourstatus->kind = TARGET_WAITKIND_STOPPED;
a493e3e2 839 ourstatus->value.sig = GDB_SIGNAL_TRAP;
61bb466e
KW
840 }
841 else if (status.flags & _DEBUG_FLAG_ISTOP)
842 {
843 switch (status.why)
844 {
845 case _DEBUG_WHY_SIGNALLED:
846 ourstatus->kind = TARGET_WAITKIND_STOPPED;
847 ourstatus->value.sig =
2ea28649 848 gdb_signal_from_host (status.info.si_signo);
61bb466e
KW
849 exit_signo = 0;
850 break;
851 case _DEBUG_WHY_FAULTED:
852 ourstatus->kind = TARGET_WAITKIND_STOPPED;
853 if (status.info.si_signo == SIGTRAP)
854 {
855 ourstatus->value.sig = 0;
856 exit_signo = 0;
857 }
858 else
859 {
860 ourstatus->value.sig =
2ea28649 861 gdb_signal_from_host (status.info.si_signo);
61bb466e
KW
862 exit_signo = ourstatus->value.sig;
863 }
864 break;
865
866 case _DEBUG_WHY_TERMINATED:
867 {
868 int waitval = 0;
869
e99b03dc 870 waitpid (inferior_ptid.pid (), &waitval, WNOHANG);
61bb466e
KW
871 if (exit_signo)
872 {
873 /* Abnormal death. */
874 ourstatus->kind = TARGET_WAITKIND_SIGNALLED;
875 ourstatus->value.sig = exit_signo;
876 }
877 else
878 {
879 /* Normal death. */
880 ourstatus->kind = TARGET_WAITKIND_EXITED;
881 ourstatus->value.integer = WEXITSTATUS (waitval);
882 }
883 exit_signo = 0;
884 break;
885 }
886
887 case _DEBUG_WHY_REQUESTED:
888 /* We are assuming a requested stop is due to a SIGINT. */
889 ourstatus->kind = TARGET_WAITKIND_STOPPED;
a493e3e2 890 ourstatus->value.sig = GDB_SIGNAL_INT;
61bb466e
KW
891 exit_signo = 0;
892 break;
893 }
894 }
895
fd79271b 896 return ptid_t (status.pid, 0, status.tid);
61bb466e
KW
897}
898
899/* Read the current values of the inferior's registers, both the
900 general register set and floating point registers (if supported)
901 and update gdb's idea of their current values. */
f6ac5f3d
PA
902void
903nto_procfs_target::fetch_registers (struct regcache *regcache, int regno)
61bb466e
KW
904{
905 union
906 {
907 procfs_greg greg;
908 procfs_fpreg fpreg;
909 procfs_altreg altreg;
910 }
911 reg;
912 int regsize;
913
222312d3 914 procfs_set_thread (regcache->ptid ());
61bb466e 915 if (devctl (ctl_fd, DCMD_PROC_GETGREG, &reg, sizeof (reg), &regsize) == EOK)
56be3814 916 nto_supply_gregset (regcache, (char *) &reg.greg);
61bb466e
KW
917 if (devctl (ctl_fd, DCMD_PROC_GETFPREG, &reg, sizeof (reg), &regsize)
918 == EOK)
56be3814 919 nto_supply_fpregset (regcache, (char *) &reg.fpreg);
61bb466e
KW
920 if (devctl (ctl_fd, DCMD_PROC_GETALTREG, &reg, sizeof (reg), &regsize)
921 == EOK)
56be3814 922 nto_supply_altregset (regcache, (char *) &reg.altreg);
61bb466e
KW
923}
924
9d46c4e5
PA
925/* Helper for procfs_xfer_partial that handles memory transfers.
926 Arguments are like target_xfer_partial. */
61bb466e 927
9d46c4e5
PA
928static enum target_xfer_status
929procfs_xfer_memory (gdb_byte *readbuf, const gdb_byte *writebuf,
930 ULONGEST memaddr, ULONGEST len, ULONGEST *xfered_len)
61bb466e 931{
9d46c4e5
PA
932 int nbytes;
933
934 if (lseek (ctl_fd, (off_t) memaddr, SEEK_SET) != (off_t) memaddr)
935 return TARGET_XFER_E_IO;
936
937 if (writebuf != NULL)
938 nbytes = write (ctl_fd, writebuf, len);
939 else
940 nbytes = read (ctl_fd, readbuf, len);
941 if (nbytes <= 0)
942 return TARGET_XFER_E_IO;
943 *xfered_len = nbytes;
944 return TARGET_XFER_OK;
945}
946
947/* Target to_xfer_partial implementation. */
61bb466e 948
f6ac5f3d
PA
949enum target_xfer_status
950nto_procfs_target::xfer_partial (enum target_object object,
951 const char *annex, gdb_byte *readbuf,
952 const gdb_byte *writebuf, ULONGEST offset,
953 ULONGEST len, ULONGEST *xfered_len)
9d46c4e5
PA
954{
955 switch (object)
61bb466e 956 {
9d46c4e5
PA
957 case TARGET_OBJECT_MEMORY:
958 return procfs_xfer_memory (readbuf, writebuf, offset, len, xfered_len);
8a6c0ccd
AR
959 case TARGET_OBJECT_AUXV:
960 if (readbuf != NULL)
961 {
962 int err;
963 CORE_ADDR initial_stack;
964 debug_process_t procinfo;
965 /* For 32-bit architecture, size of auxv_t is 8 bytes. */
966 const unsigned int sizeof_auxv_t = sizeof (auxv_t);
967 const unsigned int sizeof_tempbuf = 20 * sizeof_auxv_t;
968 int tempread;
969 gdb_byte *const tempbuf = alloca (sizeof_tempbuf);
970
971 if (tempbuf == NULL)
972 return TARGET_XFER_E_IO;
973
974 err = devctl (ctl_fd, DCMD_PROC_INFO, &procinfo,
975 sizeof procinfo, 0);
976 if (err != EOK)
977 return TARGET_XFER_E_IO;
978
979 initial_stack = procinfo.initial_stack;
980
981 /* procfs is always 'self-hosted', no byte-order manipulation. */
982 tempread = nto_read_auxv_from_initial_stack (initial_stack, tempbuf,
983 sizeof_tempbuf,
984 sizeof (auxv_t));
325fac50 985 tempread = std::min (tempread, len) - offset;
8a6c0ccd
AR
986 memcpy (readbuf, tempbuf + offset, tempread);
987 *xfered_len = tempread;
988 return tempread ? TARGET_XFER_OK : TARGET_XFER_EOF;
989 }
990 /* Fallthru */
9d46c4e5 991 default:
4360561f
TT
992 return this->beneath ()->xfer_partial (object, annex,
993 readbuf, writebuf, offset, len,
994 xfered_len);
61bb466e 995 }
61bb466e
KW
996}
997
998/* Take a program previously attached to and detaches it.
999 The program resumes execution and will no longer stop
1000 on signals, etc. We'd better not have left any breakpoints
1001 in the program or it'll die when it hits one. */
f6ac5f3d
PA
1002void
1003nto_procfs_target::detach (inferior *inf, int from_tty)
61bb466e 1004{
0f48b757
PA
1005 target_announce_detach ();
1006
61bb466e 1007 if (siggnal)
ebe84f23 1008 SignalKill (nto_node (), inf->pid, 0, 0, 0, 0);
61bb466e
KW
1009
1010 close (ctl_fd);
1011 ctl_fd = -1;
7f9f62ba 1012
ebe84f23
PA
1013 switch_to_no_thread ();
1014 detach_inferior (inf->pid);
7f9f62ba 1015 init_thread_list ();
6a3cb8e8 1016 inf_child_maybe_unpush_target (ops);
61bb466e
KW
1017}
1018
1019static int
1020procfs_breakpoint (CORE_ADDR addr, int type, int size)
1021{
1022 procfs_break brk;
1023
1024 brk.type = type;
1025 brk.addr = addr;
1026 brk.size = size;
1027 errno = devctl (ctl_fd, DCMD_PROC_BREAK, &brk, sizeof (brk), 0);
1028 if (errno != EOK)
1029 return 1;
1030 return 0;
1031}
1032
f6ac5f3d
PA
1033int
1034nto_procfs_target::insert_breakpoint (struct gdbarch *gdbarch,
1035 struct bp_target_info *bp_tgt)
61bb466e 1036{
0d5ed153 1037 bp_tgt->placed_address = bp_tgt->reqstd_address;
8181d85f 1038 return procfs_breakpoint (bp_tgt->placed_address, _DEBUG_BREAK_EXEC, 0);
61bb466e
KW
1039}
1040
f6ac5f3d
PA
1041int
1042nto_procfs_target::remove_breakpoint (struct gdbarch *gdbarch,
1043 struct bp_target_info *bp_tgt,
1044 enum remove_bp_reason reason)
61bb466e 1045{
8181d85f 1046 return procfs_breakpoint (bp_tgt->placed_address, _DEBUG_BREAK_EXEC, -1);
61bb466e
KW
1047}
1048
f6ac5f3d
PA
1049int
1050nto_procfs_target::insert_hw_breakpoint (struct gdbarch *gdbarch,
1051 struct bp_target_info *bp_tgt)
61bb466e 1052{
0d5ed153 1053 bp_tgt->placed_address = bp_tgt->reqstd_address;
8181d85f
DJ
1054 return procfs_breakpoint (bp_tgt->placed_address,
1055 _DEBUG_BREAK_EXEC | _DEBUG_BREAK_HW, 0);
61bb466e
KW
1056}
1057
f6ac5f3d
PA
1058int
1059nto_procfs_target::remove_hw_breakpoint (struct gdbarch *gdbarch,
1060 struct bp_target_info *bp_tgt)
61bb466e 1061{
8181d85f
DJ
1062 return procfs_breakpoint (bp_tgt->placed_address,
1063 _DEBUG_BREAK_EXEC | _DEBUG_BREAK_HW, -1);
61bb466e
KW
1064}
1065
f6ac5f3d
PA
1066void
1067nto_procfs_target::resume (ptid_t ptid, int step, enum gdb_signal signo)
61bb466e
KW
1068{
1069 int signal_to_pass;
1070 procfs_status status;
14ef7606 1071 sigset_t *run_fault = (sigset_t *) (void *) &run.fault;
61bb466e 1072
d7e15655 1073 if (inferior_ptid == null_ptid)
61bb466e
KW
1074 return;
1075
d7e15655 1076 procfs_set_thread (ptid == minus_one_ptid ? inferior_ptid :
61bb466e
KW
1077 ptid);
1078
1079 run.flags = _DEBUG_RUN_FAULT | _DEBUG_RUN_TRACE;
1080 if (step)
1081 run.flags |= _DEBUG_RUN_STEP;
1082
14ef7606
AR
1083 sigemptyset (run_fault);
1084 sigaddset (run_fault, FLTBPT);
1085 sigaddset (run_fault, FLTTRACE);
1086 sigaddset (run_fault, FLTILL);
1087 sigaddset (run_fault, FLTPRIV);
1088 sigaddset (run_fault, FLTBOUNDS);
1089 sigaddset (run_fault, FLTIOVF);
1090 sigaddset (run_fault, FLTIZDIV);
1091 sigaddset (run_fault, FLTFPE);
61bb466e 1092 /* Peter V will be changing this at some point. */
14ef7606 1093 sigaddset (run_fault, FLTPAGE);
61bb466e
KW
1094
1095 run.flags |= _DEBUG_RUN_ARM;
1096
2ea28649 1097 signal_to_pass = gdb_signal_to_host (signo);
61bb466e
KW
1098
1099 if (signal_to_pass)
1100 {
1101 devctl (ctl_fd, DCMD_PROC_STATUS, &status, sizeof (status), 0);
2ea28649 1102 signal_to_pass = gdb_signal_to_host (signo);
61bb466e
KW
1103 if (status.why & (_DEBUG_WHY_SIGNALLED | _DEBUG_WHY_FAULTED))
1104 {
1105 if (signal_to_pass != status.info.si_signo)
1106 {
e99b03dc 1107 SignalKill (nto_node (), inferior_ptid.pid (), 0,
d737fd7f 1108 signal_to_pass, 0, 0);
61bb466e
KW
1109 run.flags |= _DEBUG_RUN_CLRFLT | _DEBUG_RUN_CLRSIG;
1110 }
0df8b418 1111 else /* Let it kill the program without telling us. */
61bb466e
KW
1112 sigdelset (&run.trace, signal_to_pass);
1113 }
1114 }
1115 else
1116 run.flags |= _DEBUG_RUN_CLRSIG | _DEBUG_RUN_CLRFLT;
1117
1118 errno = devctl (ctl_fd, DCMD_PROC_RUN, &run, sizeof (run), 0);
1119 if (errno != EOK)
1120 {
9b20d036 1121 perror (_("run error!\n"));
61bb466e
KW
1122 return;
1123 }
1124}
1125
f6ac5f3d
PA
1126void
1127nto_procfs_target::mourn_inferior ()
61bb466e 1128{
d7e15655 1129 if (inferior_ptid != null_ptid)
61bb466e 1130 {
e99b03dc 1131 SignalKill (nto_node (), inferior_ptid.pid (), 0, SIGKILL, 0, 0);
61bb466e
KW
1132 close (ctl_fd);
1133 }
ebe84f23 1134 switch_to_no_thread ();
61bb466e 1135 init_thread_list ();
c1ee2fb3 1136 inf_child_mourn_inferior (ops);
61bb466e
KW
1137}
1138
1139/* This function breaks up an argument string into an argument
1140 vector suitable for passing to execvp().
1141 E.g., on "run a b c d" this routine would get as input
1142 the string "a b c d", and as output it would fill in argv with
1143 the four arguments "a", "b", "c", "d". The only additional
1144 functionality is simple quoting. The gdb command:
1145 run a "b c d" f
1146 will fill in argv with the three args "a", "b c d", "e". */
1147static void
1148breakup_args (char *scratch, char **argv)
1149{
1150 char *pp, *cp = scratch;
1151 char quoting = 0;
1152
1153 for (;;)
1154 {
1155 /* Scan past leading separators. */
1156 quoting = 0;
1157 while (*cp == ' ' || *cp == '\t' || *cp == '\n')
1158 cp++;
1159
1160 /* Break if at end of string. */
1161 if (*cp == '\0')
1162 break;
1163
1164 /* Take an arg. */
1165 if (*cp == '"')
1166 {
1167 cp++;
1168 quoting = strchr (cp, '"') ? 1 : 0;
1169 }
1170
1171 *argv++ = cp;
1172
1173 /* Scan for next arg separator. */
1174 pp = cp;
1175 if (quoting)
1176 cp = strchr (pp, '"');
1177 if ((cp == NULL) || (!quoting))
1178 cp = strchr (pp, ' ');
1179 if (cp == NULL)
1180 cp = strchr (pp, '\t');
1181 if (cp == NULL)
1182 cp = strchr (pp, '\n');
1183
1184 /* No separators => end of string => break. */
1185 if (cp == NULL)
1186 {
1187 pp = cp;
1188 break;
1189 }
1190
1191 /* Replace the separator with a terminator. */
1192 *cp++ = '\0';
1193 }
1194
1195 /* Execv requires a null-terminated arg vector. */
1196 *argv = NULL;
1197}
1198
f6ac5f3d
PA
1199void
1200nto_procfs_target::create_inferior (const char *exec_file,
1201 const std::string &allargs,
1202 char **env, int from_tty)
61bb466e
KW
1203{
1204 struct inheritance inherit;
1205 pid_t pid;
1206 int flags, errn;
1207 char **argv, *args;
3cb3b8df 1208 const char *in = "", *out = "", *err = "";
61bb466e
KW
1209 int fd, fds[3];
1210 sigset_t set;
3fdfcbf1 1211 struct inferior *inf;
61bb466e 1212
7c5ded6a 1213 argv = xmalloc ((allargs.size () / (unsigned) 2 + 2) *
61bb466e 1214 sizeof (*argv));
d9fa87f4 1215 argv[0] = const_cast<char *> (get_exec_file (1));
61bb466e
KW
1216 if (!argv[0])
1217 {
1218 if (exec_file)
1219 argv[0] = exec_file;
1220 else
1221 return;
1222 }
1223
7c5ded6a 1224 args = xstrdup (allargs.c_str ());
609c3040 1225 breakup_args (args, (exec_file != NULL) ? &argv[1] : &argv[0]);
61bb466e
KW
1226
1227 argv = nto_parse_redirection (argv, &in, &out, &err);
1228
1229 fds[0] = STDIN_FILENO;
1230 fds[1] = STDOUT_FILENO;
1231 fds[2] = STDERR_FILENO;
1232
1233 /* If the user specified I/O via gdb's --tty= arg, use it, but only
1234 if the i/o is not also being specified via redirection. */
05779d57
PA
1235 const char *inferior_tty = current_inferior ()->tty ();
1236 if (inferior_tty != nullptr)
61bb466e
KW
1237 {
1238 if (!in[0])
05779d57 1239 in = inferior_tty;
61bb466e 1240 if (!out[0])
05779d57 1241 out = inferior_tty;
61bb466e 1242 if (!err[0])
05779d57 1243 err = inferior_tty;
61bb466e
KW
1244 }
1245
1246 if (in[0])
1247 {
1248 fd = open (in, O_RDONLY);
1249 if (fd == -1)
1250 perror (in);
1251 else
1252 fds[0] = fd;
1253 }
1254 if (out[0])
1255 {
1256 fd = open (out, O_WRONLY);
1257 if (fd == -1)
1258 perror (out);
1259 else
1260 fds[1] = fd;
1261 }
1262 if (err[0])
1263 {
1264 fd = open (err, O_WRONLY);
1265 if (fd == -1)
1266 perror (err);
1267 else
1268 fds[2] = fd;
1269 }
1270
1271 /* Clear any pending SIGUSR1's but keep the behavior the same. */
1272 signal (SIGUSR1, signal (SIGUSR1, SIG_IGN));
1273
1274 sigemptyset (&set);
1275 sigaddset (&set, SIGUSR1);
1276 sigprocmask (SIG_UNBLOCK, &set, NULL);
1277
1278 memset (&inherit, 0, sizeof (inherit));
1279
1280 if (ND_NODE_CMP (nto_procfs_node, ND_LOCAL_NODE) != 0)
1281 {
d737fd7f 1282 inherit.nd = nto_node ();
61bb466e
KW
1283 inherit.flags |= SPAWN_SETND;
1284 inherit.flags &= ~SPAWN_EXEC;
1285 }
1286 inherit.flags |= SPAWN_SETGROUP | SPAWN_HOLD;
1287 inherit.pgroup = SPAWN_NEWPGROUP;
1288 pid = spawnp (argv[0], 3, fds, &inherit, argv,
1289 ND_NODE_CMP (nto_procfs_node, ND_LOCAL_NODE) == 0 ? env : 0);
1290 xfree (args);
1291
1292 sigprocmask (SIG_BLOCK, &set, NULL);
1293
1294 if (pid == -1)
8a3fe4f8 1295 error (_("Error spawning %s: %d (%s)"), argv[0], errno,
d737fd7f 1296 safe_strerror (errno));
61bb466e
KW
1297
1298 if (fds[0] != STDIN_FILENO)
1299 close (fds[0]);
1300 if (fds[1] != STDOUT_FILENO)
1301 close (fds[1]);
1302 if (fds[2] != STDERR_FILENO)
1303 close (fds[2]);
1304
ebe84f23
PA
1305 ptid_t ptid = do_attach (ptid_t (pid));
1306 update_thread_list ();
1307 switch_to_thread (find_thread_ptid (this, ptid));
61bb466e 1308
6c95b8df
PA
1309 inf = current_inferior ();
1310 inferior_appeared (inf, pid);
3fdfcbf1 1311 inf->attach_flag = 0;
7f9f62ba 1312
61bb466e
KW
1313 flags = _DEBUG_FLAG_KLC; /* Kill-on-Last-Close flag. */
1314 errn = devctl (ctl_fd, DCMD_PROC_SET_FLAG, &flags, sizeof (flags), 0);
1315 if (errn != EOK)
1316 {
1317 /* FIXME: expected warning? */
1318 /* warning( "Failed to set Kill-on-Last-Close flag: errno = %d(%s)\n",
6d91ce9a 1319 errn, safe_strerror(errn) ); */
61bb466e 1320 }
6a3cb8e8
PA
1321 if (!target_is_pushed (ops))
1322 push_target (ops);
223ffa71 1323 target_terminal::init ();
61bb466e 1324
61bb466e
KW
1325 if (exec_bfd != NULL
1326 || (symfile_objfile != NULL && symfile_objfile->obfd != NULL))
268a4a75 1327 solib_create_inferior_hook (0);
61bb466e
KW
1328}
1329
f6ac5f3d
PA
1330void
1331nto_procfs_target::interrupt ()
61bb466e
KW
1332{
1333 devctl (ctl_fd, DCMD_PROC_STOP, NULL, 0, 0);
1334}
1335
f6ac5f3d
PA
1336void
1337nto_procfs_target::kill ()
61bb466e 1338{
bc1e6c81 1339 target_mourn_inferior (inferior_ptid);
61bb466e
KW
1340}
1341
61bb466e
KW
1342/* Fill buf with regset and return devctl cmd to do the setting. Return
1343 -1 if we fail to get the regset. Store size of regset in regsize. */
1344static int
1345get_regset (int regset, char *buf, int bufsize, int *regsize)
1346{
1347 int dev_get, dev_set;
1348 switch (regset)
1349 {
1350 case NTO_REG_GENERAL:
1351 dev_get = DCMD_PROC_GETGREG;
1352 dev_set = DCMD_PROC_SETGREG;
1353 break;
1354
1355 case NTO_REG_FLOAT:
1356 dev_get = DCMD_PROC_GETFPREG;
1357 dev_set = DCMD_PROC_SETFPREG;
1358 break;
1359
1360 case NTO_REG_ALT:
1361 dev_get = DCMD_PROC_GETALTREG;
1362 dev_set = DCMD_PROC_SETALTREG;
1363 break;
1364
1365 case NTO_REG_SYSTEM:
1366 default:
1367 return -1;
1368 }
97c44116 1369 if (devctl (ctl_fd, dev_get, buf, bufsize, regsize) != EOK)
61bb466e
KW
1370 return -1;
1371
1372 return dev_set;
1373}
1374
f6ac5f3d
PA
1375void
1376nto_procfs_target::store_registers (struct regcache *regcache, int regno)
61bb466e
KW
1377{
1378 union
1379 {
1380 procfs_greg greg;
1381 procfs_fpreg fpreg;
1382 procfs_altreg altreg;
1383 }
1384 reg;
1385 unsigned off;
1386 int len, regset, regsize, dev_set, err;
1387 char *data;
222312d3 1388 ptid_t ptid = regcache->ptid ();
61bb466e 1389
d7e15655 1390 if (ptid == null_ptid)
61bb466e 1391 return;
bcc0c096 1392 procfs_set_thread (ptid);
61bb466e
KW
1393
1394 if (regno == -1)
1395 {
1396 for (regset = NTO_REG_GENERAL; regset < NTO_REG_END; regset++)
1397 {
1398 dev_set = get_regset (regset, (char *) &reg,
1399 sizeof (reg), &regsize);
1400 if (dev_set == -1)
1401 continue;
1402
56be3814 1403 if (nto_regset_fill (regcache, regset, (char *) &reg) == -1)
61bb466e
KW
1404 continue;
1405
1406 err = devctl (ctl_fd, dev_set, &reg, regsize, 0);
1407 if (err != EOK)
1408 fprintf_unfiltered (gdb_stderr,
1409 "Warning unable to write regset %d: %s\n",
dc5dd1eb 1410 regno, safe_strerror (err));
61bb466e
KW
1411 }
1412 }
1413 else
1414 {
1415 regset = nto_regset_id (regno);
1416 if (regset == -1)
1417 return;
1418
1419 dev_set = get_regset (regset, (char *) &reg, sizeof (reg), &regsize);
1420 if (dev_set == -1)
1421 return;
1422
ac7936df 1423 len = nto_register_area (regcache->arch (),
60441ab9 1424 regno, regset, &off);
61bb466e
KW
1425
1426 if (len < 1)
1427 return;
1428
34a79281 1429 regcache->raw_collect (regno, (char *) &reg + off);
61bb466e
KW
1430
1431 err = devctl (ctl_fd, dev_set, &reg, regsize, 0);
1432 if (err != EOK)
1433 fprintf_unfiltered (gdb_stderr,
1434 "Warning unable to write regset %d: %s\n", regno,
dc5dd1eb 1435 safe_strerror (err));
61bb466e
KW
1436 }
1437}
1438
2455069d
UW
1439/* Set list of signals to be handled in the target. */
1440
f6ac5f3d 1441void
adc6a863
PA
1442nto_procfs_target::pass_signals
1443 (gdb::array_view<const unsigned char> pass_signals)
61bb466e
KW
1444{
1445 int signo;
1446
2455069d
UW
1447 sigfillset (&run.trace);
1448
61bb466e
KW
1449 for (signo = 1; signo < NSIG; signo++)
1450 {
2ea28649 1451 int target_signo = gdb_signal_from_host (signo);
adc6a863 1452 if (target_signo < pass_signals.size () && pass_signals[target_signo])
2455069d 1453 sigdelset (&run.trace, signo);
61bb466e
KW
1454 }
1455}
1456
a068643d 1457std::string
f6ac5f3d 1458nto_procfs_target::pid_to_str (ptid_t ptid)
61bb466e 1459{
a068643d 1460 int pid, tid;
61bb466e
KW
1461 struct tidinfo *tip;
1462
e99b03dc 1463 pid = ptid.pid ();
cc6bcb54 1464 tid = ptid.tid ();
61bb466e 1465
61bb466e
KW
1466#if 0 /* NYI */
1467 tip = procfs_thread_info (pid, tid);
1468 if (tip != NULL)
dc5dd1eb 1469 snprintf (&buf[n], 1023, " (state = 0x%02x)", tip->state);
61bb466e
KW
1470#endif
1471
a068643d 1472 return string_printf ("process %d", pid);
61bb466e
KW
1473}
1474
132f8e03
PA
1475/* to_can_run implementation for "target procfs". Note this really
1476 means "can this target be the default run target", which there can
1477 be only one, and we make it be "target native" like other ports.
1478 "target procfs <node>" wouldn't make sense as default run target, as
1479 it needs <node>. */
ee8e9165 1480
f6ac5f3d
PA
1481int
1482nto_procfs_target::can_run ()
132f8e03
PA
1483{
1484 return 0;
1485}
1486
1487/* "target procfs". */
f6ac5f3d 1488static nto_procfs_target_procfs nto_procfs_ops;
132f8e03 1489
6a3cb8e8 1490/* "target native". */
f6ac5f3d 1491static nto_procfs_target_native nto_native_ops;
6a3cb8e8 1492
132f8e03
PA
1493/* Create the "native" and "procfs" targets. */
1494
1495static void
1496init_procfs_targets (void)
61bb466e 1497{
132f8e03 1498 /* Register "target native". This is the default run target. */
d9f719f1
PA
1499 add_target (nto_native_target_info, inf_child_open_target);
1500 set_native_target (&nto_native_ops);
132f8e03
PA
1501
1502 /* Register "target procfs <node>". */
d9f719f1 1503 add_target (nto_procfs_target_info, inf_child_open_target);
61bb466e
KW
1504}
1505
1506#define OSTYPE_NTO 1
1507
6c265988 1508void _initialize_procfs ();
61bb466e 1509void
6c265988 1510_initialize_procfs ()
61bb466e
KW
1511{
1512 sigset_t set;
1513
132f8e03 1514 init_procfs_targets ();
61bb466e
KW
1515
1516 /* We use SIGUSR1 to gain control after we block waiting for a process.
1517 We use sigwaitevent to wait. */
1518 sigemptyset (&set);
1519 sigaddset (&set, SIGUSR1);
1520 sigprocmask (SIG_BLOCK, &set, NULL);
1521
2455069d
UW
1522 /* Initially, make sure all signals are reported. */
1523 sigfillset (&run.trace);
61bb466e
KW
1524
1525 /* Stuff some information. */
1526 nto_cpuinfo_flags = SYSPAGE_ENTRY (cpuinfo)->flags;
1527 nto_cpuinfo_valid = 1;
1528
1bedd215
AC
1529 add_info ("pidlist", procfs_pidlist, _("pidlist"));
1530 add_info ("meminfo", procfs_meminfo, _("memory information"));
d737fd7f
KW
1531
1532 nto_is_nto_target = procfs_is_nto_target;
61bb466e
KW
1533}
1534
1535
1536static int
f486487f 1537procfs_hw_watchpoint (int addr, int len, enum target_hw_bp_type type)
61bb466e
KW
1538{
1539 procfs_break brk;
1540
1541 switch (type)
1542 {
f486487f 1543 case hw_read:
61bb466e
KW
1544 brk.type = _DEBUG_BREAK_RD;
1545 break;
f486487f 1546 case hw_access:
61bb466e
KW
1547 brk.type = _DEBUG_BREAK_RW;
1548 break;
1549 default: /* Modify. */
1550/* FIXME: brk.type = _DEBUG_BREAK_RWM gives EINVAL for some reason. */
1551 brk.type = _DEBUG_BREAK_RW;
1552 }
1553 brk.type |= _DEBUG_BREAK_HW; /* Always ask for HW. */
1554 brk.addr = addr;
1555 brk.size = len;
1556
1557 errno = devctl (ctl_fd, DCMD_PROC_BREAK, &brk, sizeof (brk), 0);
1558 if (errno != EOK)
1559 {
9b20d036 1560 perror (_("Failed to set hardware watchpoint"));
61bb466e
KW
1561 return -1;
1562 }
1563 return 0;
1564}
1565
57810aa7 1566bool
f6ac5f3d
PA
1567nto_procfs_target::can_use_hw_breakpoint (enum bptype type,
1568 int cnt, int othertype)
61bb466e
KW
1569{
1570 return 1;
1571}
1572
f6ac5f3d
PA
1573int
1574nto_procfs_target::remove_hw_watchpoint (CORE_ADDR addr, int len,
1575 enum target_hw_bp_type type,
1576 struct expression *cond)
61bb466e
KW
1577{
1578 return procfs_hw_watchpoint (addr, -1, type);
1579}
1580
f6ac5f3d
PA
1581int
1582nto_procfs_target::insert_hw_watchpoint (CORE_ADDR addr, int len,
1583 enum target_hw_bp_type type,
1584 struct expression *cond)
61bb466e
KW
1585{
1586 return procfs_hw_watchpoint (addr, len, type);
1587}
1588
57810aa7 1589bool
f6ac5f3d 1590nto_procfs_target::stopped_by_watchpoint ()
61bb466e 1591{
a9889169
AR
1592 /* NOTE: nto_stopped_by_watchpoint will be called ONLY while we are
1593 stopped due to a SIGTRAP. This assumes gdb works in 'all-stop' mode;
1594 future gdb versions will likely run in 'non-stop' mode in which case
1595 we will have to store/examine statuses per thread in question.
1596 Until then, this will work fine. */
1597
1598 struct inferior *inf = current_inferior ();
1599 struct nto_inferior_data *inf_data;
1600
1601 gdb_assert (inf != NULL);
1602
1603 inf_data = nto_inferior_data (inf);
1604
1605 return inf_data->stopped_flags
1606 & (_DEBUG_FLAG_TRACE_RD
1607 | _DEBUG_FLAG_TRACE_WR
1608 | _DEBUG_FLAG_TRACE_MODIFY);
61bb466e 1609}
This page took 1.743268 seconds and 4 git commands to generate.