*** empty log message ***
[deliverable/binutils-gdb.git] / gdb / nto-procfs.c
CommitLineData
61bb466e
KW
1/* Machine independent support for QNX Neutrino /proc (process file system)
2 for GDB. Written by Colin Burgess at QNX Software Systems Limited.
3
0fb0cc75 4 Copyright (C) 2003, 2006, 2007, 2008, 2009 Free Software Foundation, Inc.
61bb466e
KW
5
6 Contributed by QNX Software Systems Ltd.
7
8 This file is part of GDB.
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
a9762ec7 12 the Free Software Foundation; either version 3 of the License, or
61bb466e
KW
13 (at your option) any later version.
14
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
a9762ec7 21 along with this program. If not, see <http://www.gnu.org/licenses/>. */
61bb466e
KW
22
23#include "defs.h"
24
25#include <fcntl.h>
26#include <spawn.h>
27#include <sys/debug.h>
28#include <sys/procfs.h>
29#include <sys/neutrino.h>
30#include <sys/syspage.h>
5483d879 31#include "gdb_dirent.h"
61bb466e
KW
32#include <sys/netmgr.h>
33
60250e8b 34#include "exceptions.h"
61bb466e
KW
35#include "gdb_string.h"
36#include "gdbcore.h"
37#include "inferior.h"
38#include "target.h"
39#include "objfiles.h"
40#include "gdbthread.h"
41#include "nto-tdep.h"
42#include "command.h"
43#include "regcache.h"
5ea03926 44#include "solib.h"
61bb466e
KW
45
46#define NULL_PID 0
47#define _DEBUG_FLAG_TRACE (_DEBUG_FLAG_TRACE_EXEC|_DEBUG_FLAG_TRACE_RD|\
48 _DEBUG_FLAG_TRACE_WR|_DEBUG_FLAG_TRACE_MODIFY)
49
50static struct target_ops procfs_ops;
51
52int ctl_fd;
53
54static void (*ofunc) ();
55
56static procfs_run run;
57
58static void procfs_open (char *, int);
59
60static int procfs_can_run (void);
61
14ef7606 62static int procfs_xfer_memory (CORE_ADDR, gdb_byte *, int, int,
61bb466e
KW
63 struct mem_attrib *attrib,
64 struct target_ops *);
65
61bb466e
KW
66static void notice_signals (void);
67
68static void init_procfs_ops (void);
69
70static ptid_t do_attach (ptid_t ptid);
71
72static int procfs_can_use_hw_breakpoint (int, int, int);
73
61bb466e
KW
74static int procfs_insert_hw_watchpoint (CORE_ADDR addr, int len, int type);
75
76static int procfs_remove_hw_watchpoint (CORE_ADDR addr, int len, int type);
77
78static int procfs_stopped_by_watchpoint (void);
79
80/* These two globals are only ever set in procfs_open(), but are
81 referenced elsewhere. 'nto_procfs_node' is a flag used to say
82 whether we are local, or we should get the current node descriptor
83 for the remote QNX node. */
84static char nto_procfs_path[PATH_MAX] = { "/proc" };
85static unsigned nto_procfs_node = ND_LOCAL_NODE;
86
87/* Return the current QNX Node, or error out. This is a simple
88 wrapper for the netmgr_strtond() function. The reason this
89 is required is because QNX node descriptors are transient so
90 we have to re-acquire them every time. */
91static unsigned
d737fd7f 92nto_node (void)
61bb466e
KW
93{
94 unsigned node;
95
d737fd7f 96 if (ND_NODE_CMP (nto_procfs_node, ND_LOCAL_NODE) == 0)
61bb466e
KW
97 return ND_LOCAL_NODE;
98
d737fd7f 99 node = netmgr_strtond (nto_procfs_path, 0);
61bb466e 100 if (node == -1)
8a3fe4f8 101 error (_("Lost the QNX node. Debug session probably over."));
61bb466e
KW
102
103 return (node);
104}
105
d737fd7f
KW
106static enum gdb_osabi
107procfs_is_nto_target (bfd *abfd)
108{
109 return GDB_OSABI_QNXNTO;
110}
111
61bb466e
KW
112/* This is called when we call 'target procfs <arg>' from the (gdb) prompt.
113 For QNX6 (nto), the only valid arg will be a QNX node string,
114 eg: "/net/some_node". If arg is not a valid QNX node, we will
115 default to local. */
116static void
117procfs_open (char *arg, int from_tty)
118{
119 char *nodestr;
120 char *endstr;
121 char buffer[50];
122 int fd, total_size;
123 procfs_sysinfo *sysinfo;
9fe4a216 124 struct cleanup *cleanups;
61bb466e 125
d737fd7f
KW
126 nto_is_nto_target = procfs_is_nto_target;
127
61bb466e
KW
128 /* Set the default node used for spawning to this one,
129 and only override it if there is a valid arg. */
130
131 nto_procfs_node = ND_LOCAL_NODE;
132 nodestr = arg ? xstrdup (arg) : arg;
133
134 init_thread_list ();
135
136 if (nodestr)
137 {
138 nto_procfs_node = netmgr_strtond (nodestr, &endstr);
139 if (nto_procfs_node == -1)
140 {
141 if (errno == ENOTSUP)
142 printf_filtered ("QNX Net Manager not found.\n");
143 printf_filtered ("Invalid QNX node %s: error %d (%s).\n", nodestr,
dc5dd1eb 144 errno, safe_strerror (errno));
61bb466e
KW
145 xfree (nodestr);
146 nodestr = NULL;
147 nto_procfs_node = ND_LOCAL_NODE;
148 }
149 else if (*endstr)
150 {
151 if (*(endstr - 1) == '/')
152 *(endstr - 1) = 0;
153 else
154 *endstr = 0;
155 }
156 }
d737fd7f
KW
157 snprintf (nto_procfs_path, PATH_MAX - 1, "%s%s", nodestr ? nodestr : "",
158 "/proc");
61bb466e
KW
159 if (nodestr)
160 xfree (nodestr);
161
162 fd = open (nto_procfs_path, O_RDONLY);
163 if (fd == -1)
164 {
165 printf_filtered ("Error opening %s : %d (%s)\n", nto_procfs_path, errno,
dc5dd1eb 166 safe_strerror (errno));
8a3fe4f8 167 error (_("Invalid procfs arg"));
61bb466e 168 }
9fe4a216 169 cleanups = make_cleanup_close (fd);
61bb466e
KW
170
171 sysinfo = (void *) buffer;
172 if (devctl (fd, DCMD_PROC_SYSINFO, sysinfo, sizeof buffer, 0) != EOK)
173 {
174 printf_filtered ("Error getting size: %d (%s)\n", errno,
dc5dd1eb 175 safe_strerror (errno));
8a3fe4f8 176 error (_("Devctl failed."));
61bb466e
KW
177 }
178 else
179 {
180 total_size = sysinfo->total_size;
181 sysinfo = alloca (total_size);
182 if (!sysinfo)
183 {
184 printf_filtered ("Memory error: %d (%s)\n", errno,
dc5dd1eb 185 safe_strerror (errno));
8a3fe4f8 186 error (_("alloca failed."));
61bb466e
KW
187 }
188 else
189 {
190 if (devctl (fd, DCMD_PROC_SYSINFO, sysinfo, total_size, 0) != EOK)
191 {
192 printf_filtered ("Error getting sysinfo: %d (%s)\n", errno,
dc5dd1eb 193 safe_strerror (errno));
8a3fe4f8 194 error (_("Devctl failed."));
61bb466e
KW
195 }
196 else
197 {
198 if (sysinfo->type !=
1143fffb 199 nto_map_arch_to_cputype (gdbarch_bfd_arch_info
a97b0ac8 200 (target_gdbarch)->arch_name))
9fe4a216 201 error (_("Invalid target CPU."));
61bb466e
KW
202 }
203 }
204 }
9fe4a216 205 do_cleanups (cleanups);
61bb466e
KW
206 printf_filtered ("Debugging using %s\n", nto_procfs_path);
207}
208
209static void
210procfs_set_thread (ptid_t ptid)
211{
212 pid_t tid;
213
214 tid = ptid_get_tid (ptid);
215 devctl (ctl_fd, DCMD_PROC_CURTHREAD, &tid, sizeof (tid), 0);
216}
217
218/* Return nonzero if the thread TH is still alive. */
219static int
28439f5e 220procfs_thread_alive (struct target_ops *ops, ptid_t ptid)
61bb466e
KW
221{
222 pid_t tid;
745a434e
AR
223 pid_t pid;
224 procfs_status status;
225 int err;
61bb466e
KW
226
227 tid = ptid_get_tid (ptid);
745a434e
AR
228 pid = ptid_get_pid (ptid);
229
230 if (kill (pid, 0) == -1)
231 return 0;
232
233 status.tid = tid;
234 if ((err = devctl (ctl_fd, DCMD_PROC_TIDSTATUS,
235 &status, sizeof (status), 0)) != EOK)
236 return 0;
237
238 /* Thread is alive or dead but not yet joined,
239 or dead and there is an alive (or dead unjoined) thread with
240 higher tid.
241
242 If the tid is not the same as requested, requested tid is dead. */
243 return (status.tid == tid) && (status.state != STATE_DEAD);
244}
245
246static void
247update_thread_private_data_name (struct thread_info *new_thread,
248 const char *newname)
249{
250 int newnamelen;
251 struct private_thread_info *pti;
252
253 gdb_assert (newname != NULL);
254 gdb_assert (new_thread != NULL);
255 newnamelen = strlen (newname);
256 if (!new_thread->private)
257 {
258 new_thread->private = xmalloc (offsetof (struct private_thread_info,
259 name)
260 + newnamelen + 1);
261 memcpy (new_thread->private->name, newname, newnamelen + 1);
262 }
263 else if (strcmp (newname, new_thread->private->name) != 0)
264 {
265 /* Reallocate if neccessary. */
266 int oldnamelen = strlen (new_thread->private->name);
267
268 if (oldnamelen < newnamelen)
269 new_thread->private = xrealloc (new_thread->private,
270 offsetof (struct private_thread_info,
271 name)
272 + newnamelen + 1);
273 memcpy (new_thread->private->name, newname, newnamelen + 1);
274 }
275}
276
277static void
278update_thread_private_data (struct thread_info *new_thread,
279 pthread_t tid, int state, int flags)
280{
281 struct private_thread_info *pti;
282 procfs_info pidinfo;
283 struct _thread_name *tn;
284 procfs_threadctl tctl;
285
286#if _NTO_VERSION > 630
287 gdb_assert (new_thread != NULL);
288
289 if (devctl (ctl_fd, DCMD_PROC_INFO, &pidinfo,
290 sizeof(pidinfo), 0) != EOK)
291 return;
292
293 memset (&tctl, 0, sizeof (tctl));
294 tctl.cmd = _NTO_TCTL_NAME;
295 tn = (struct _thread_name *) (&tctl.data);
296
297 /* Fetch name for the given thread. */
298 tctl.tid = tid;
299 tn->name_buf_len = sizeof (tctl.data) - sizeof (*tn);
300 tn->new_name_len = -1; /* Getting, not setting. */
301 if (devctl (ctl_fd, DCMD_PROC_THREADCTL, &tctl, sizeof (tctl), NULL) != EOK)
302 tn->name_buf[0] = '\0';
303
304 tn->name_buf[_NTO_THREAD_NAME_MAX] = '\0';
305
306 update_thread_private_data_name (new_thread, tn->name_buf);
307
308 pti = (struct private_thread_info *) new_thread->private;
309 pti->tid = tid;
310 pti->state = state;
311 pti->flags = flags;
312#endif /* _NTO_VERSION */
61bb466e
KW
313}
314
315void
28439f5e 316procfs_find_new_threads (struct target_ops *ops)
61bb466e
KW
317{
318 procfs_status status;
319 pid_t pid;
320 ptid_t ptid;
745a434e
AR
321 pthread_t tid;
322 struct thread_info *new_thread;
61bb466e
KW
323
324 if (ctl_fd == -1)
325 return;
326
327 pid = ptid_get_pid (inferior_ptid);
328
745a434e
AR
329 status.tid = 1;
330
331 for (tid = 1;; ++tid)
61bb466e 332 {
745a434e
AR
333 if (status.tid == tid
334 && (devctl (ctl_fd, DCMD_PROC_TIDSTATUS, &status, sizeof (status), 0)
335 != EOK))
61bb466e 336 break;
745a434e
AR
337 if (status.tid != tid)
338 /* The reason why this would not be equal is that devctl might have
339 returned different tid, meaning the requested tid no longer exists
340 (e.g. thread exited). */
341 continue;
342 ptid = ptid_build (pid, 0, tid);
343 new_thread = find_thread_ptid (ptid);
344 if (!new_thread)
345 new_thread = add_thread (ptid);
346 update_thread_private_data (new_thread, tid, status.state, 0);
347 status.tid++;
61bb466e
KW
348 }
349 return;
350}
351
9fe4a216
TT
352static void
353do_closedir_cleanup (void *dir)
354{
355 closedir (dir);
356}
357
61bb466e
KW
358void
359procfs_pidlist (char *args, int from_tty)
360{
361 DIR *dp = NULL;
362 struct dirent *dirp = NULL;
61bb466e
KW
363 char buf[512];
364 procfs_info *pidinfo = NULL;
365 procfs_debuginfo *info = NULL;
366 procfs_status *status = NULL;
367 pid_t num_threads = 0;
368 pid_t pid;
369 char name[512];
9fe4a216 370 struct cleanup *cleanups;
61bb466e
KW
371
372 dp = opendir (nto_procfs_path);
373 if (dp == NULL)
374 {
dc5dd1eb 375 fprintf_unfiltered (gdb_stderr, "failed to opendir \"%s\" - %d (%s)",
d737fd7f 376 nto_procfs_path, errno, safe_strerror (errno));
61bb466e
KW
377 return;
378 }
379
9fe4a216
TT
380 cleanups = make_cleanup (do_closedir_cleanup, dp);
381
61bb466e
KW
382 /* Start scan at first pid. */
383 rewinddir (dp);
384
385 do
386 {
9fe4a216
TT
387 int fd;
388 struct cleanup *inner_cleanup;
389
61bb466e
KW
390 /* Get the right pid and procfs path for the pid. */
391 do
392 {
393 dirp = readdir (dp);
394 if (dirp == NULL)
395 {
9fe4a216 396 do_cleanups (cleanups);
61bb466e
KW
397 return;
398 }
dc5dd1eb 399 snprintf (buf, 511, "%s/%s/as", nto_procfs_path, dirp->d_name);
61bb466e
KW
400 pid = atoi (dirp->d_name);
401 }
402 while (pid == 0);
403
404 /* Open the procfs path. */
405 fd = open (buf, O_RDONLY);
406 if (fd == -1)
407 {
dc5dd1eb 408 fprintf_unfiltered (gdb_stderr, "failed to open %s - %d (%s)\n",
d737fd7f 409 buf, errno, safe_strerror (errno));
9fe4a216 410 do_cleanups (cleanups);
61bb466e
KW
411 return;
412 }
9fe4a216 413 inner_cleanup = make_cleanup_close (fd);
61bb466e
KW
414
415 pidinfo = (procfs_info *) buf;
416 if (devctl (fd, DCMD_PROC_INFO, pidinfo, sizeof (buf), 0) != EOK)
417 {
dc5dd1eb 418 fprintf_unfiltered (gdb_stderr,
d737fd7f
KW
419 "devctl DCMD_PROC_INFO failed - %d (%s)\n",
420 errno, safe_strerror (errno));
61bb466e
KW
421 break;
422 }
423 num_threads = pidinfo->num_threads;
424
425 info = (procfs_debuginfo *) buf;
426 if (devctl (fd, DCMD_PROC_MAPDEBUG_BASE, info, sizeof (buf), 0) != EOK)
427 strcpy (name, "unavailable");
428 else
429 strcpy (name, info->path);
430
431 /* Collect state info on all the threads. */
432 status = (procfs_status *) buf;
433 for (status->tid = 1; status->tid <= num_threads; status->tid++)
434 {
435 if (devctl (fd, DCMD_PROC_TIDSTATUS, status, sizeof (buf), 0) != EOK
436 && status->tid != 0)
437 break;
438 if (status->tid != 0)
439 printf_filtered ("%s - %d/%d\n", name, pid, status->tid);
440 }
9fe4a216
TT
441
442 do_cleanups (inner_cleanup);
61bb466e
KW
443 }
444 while (dirp != NULL);
445
9fe4a216 446 do_cleanups (cleanups);
61bb466e
KW
447 return;
448}
449
450void
451procfs_meminfo (char *args, int from_tty)
452{
453 procfs_mapinfo *mapinfos = NULL;
454 static int num_mapinfos = 0;
455 procfs_mapinfo *mapinfo_p, *mapinfo_p2;
456 int flags = ~0, err, num, i, j;
457
458 struct
459 {
460 procfs_debuginfo info;
461 char buff[_POSIX_PATH_MAX];
462 } map;
463
464 struct info
465 {
466 unsigned addr;
467 unsigned size;
468 unsigned flags;
469 unsigned debug_vaddr;
470 unsigned long long offset;
471 };
472
473 struct printinfo
474 {
475 unsigned long long ino;
476 unsigned dev;
477 struct info text;
478 struct info data;
479 char name[256];
480 } printme;
481
482 /* Get the number of map entrys. */
483 err = devctl (ctl_fd, DCMD_PROC_MAPINFO, NULL, 0, &num);
484 if (err != EOK)
485 {
d737fd7f
KW
486 printf ("failed devctl num mapinfos - %d (%s)\n", err,
487 safe_strerror (err));
61bb466e
KW
488 return;
489 }
490
491 mapinfos = xmalloc (num * sizeof (procfs_mapinfo));
492
493 num_mapinfos = num;
494 mapinfo_p = mapinfos;
495
496 /* Fill the map entrys. */
497 err = devctl (ctl_fd, DCMD_PROC_MAPINFO, mapinfo_p, num
498 * sizeof (procfs_mapinfo), &num);
499 if (err != EOK)
500 {
5483d879 501 printf ("failed devctl mapinfos - %d (%s)\n", err, safe_strerror (err));
61bb466e
KW
502 xfree (mapinfos);
503 return;
504 }
505
506 num = min (num, num_mapinfos);
507
508 /* Run through the list of mapinfos, and store the data and text info
509 so we can print it at the bottom of the loop. */
510 for (mapinfo_p = mapinfos, i = 0; i < num; i++, mapinfo_p++)
511 {
512 if (!(mapinfo_p->flags & flags))
513 mapinfo_p->ino = 0;
514
515 if (mapinfo_p->ino == 0) /* Already visited. */
516 continue;
517
518 map.info.vaddr = mapinfo_p->vaddr;
519
520 err = devctl (ctl_fd, DCMD_PROC_MAPDEBUG, &map, sizeof (map), 0);
521 if (err != EOK)
522 continue;
523
524 memset (&printme, 0, sizeof printme);
525 printme.dev = mapinfo_p->dev;
526 printme.ino = mapinfo_p->ino;
527 printme.text.addr = mapinfo_p->vaddr;
528 printme.text.size = mapinfo_p->size;
529 printme.text.flags = mapinfo_p->flags;
530 printme.text.offset = mapinfo_p->offset;
531 printme.text.debug_vaddr = map.info.vaddr;
532 strcpy (printme.name, map.info.path);
533
534 /* Check for matching data. */
535 for (mapinfo_p2 = mapinfos, j = 0; j < num; j++, mapinfo_p2++)
536 {
537 if (mapinfo_p2->vaddr != mapinfo_p->vaddr
538 && mapinfo_p2->ino == mapinfo_p->ino
539 && mapinfo_p2->dev == mapinfo_p->dev)
540 {
541 map.info.vaddr = mapinfo_p2->vaddr;
542 err =
543 devctl (ctl_fd, DCMD_PROC_MAPDEBUG, &map, sizeof (map), 0);
544 if (err != EOK)
545 continue;
546
547 if (strcmp (map.info.path, printme.name))
548 continue;
549
550 /* Lower debug_vaddr is always text, if nessessary, swap. */
551 if ((int) map.info.vaddr < (int) printme.text.debug_vaddr)
552 {
553 memcpy (&(printme.data), &(printme.text),
554 sizeof (printme.data));
555 printme.text.addr = mapinfo_p2->vaddr;
556 printme.text.size = mapinfo_p2->size;
557 printme.text.flags = mapinfo_p2->flags;
558 printme.text.offset = mapinfo_p2->offset;
559 printme.text.debug_vaddr = map.info.vaddr;
560 }
561 else
562 {
563 printme.data.addr = mapinfo_p2->vaddr;
564 printme.data.size = mapinfo_p2->size;
565 printme.data.flags = mapinfo_p2->flags;
566 printme.data.offset = mapinfo_p2->offset;
567 printme.data.debug_vaddr = map.info.vaddr;
568 }
569 mapinfo_p2->ino = 0;
570 }
571 }
572 mapinfo_p->ino = 0;
573
574 printf_filtered ("%s\n", printme.name);
575 printf_filtered ("\ttext=%08x bytes @ 0x%08x\n", printme.text.size,
576 printme.text.addr);
577 printf_filtered ("\t\tflags=%08x\n", printme.text.flags);
578 printf_filtered ("\t\tdebug=%08x\n", printme.text.debug_vaddr);
579 printf_filtered ("\t\toffset=%016llx\n", printme.text.offset);
580 if (printme.data.size)
581 {
582 printf_filtered ("\tdata=%08x bytes @ 0x%08x\n", printme.data.size,
583 printme.data.addr);
584 printf_filtered ("\t\tflags=%08x\n", printme.data.flags);
585 printf_filtered ("\t\tdebug=%08x\n", printme.data.debug_vaddr);
586 printf_filtered ("\t\toffset=%016llx\n", printme.data.offset);
587 }
588 printf_filtered ("\tdev=0x%x\n", printme.dev);
589 printf_filtered ("\tino=0x%x\n", (unsigned int) printme.ino);
590 }
591 xfree (mapinfos);
592 return;
593}
594
595/* Print status information about what we're accessing. */
596static void
597procfs_files_info (struct target_ops *ignore)
598{
181e7f93
PA
599 struct inferior *inf = current_inferior ();
600
61bb466e 601 printf_unfiltered ("\tUsing the running image of %s %s via %s.\n",
3fdfcbf1 602 inf->attach_flag ? "attached" : "child",
61bb466e
KW
603 target_pid_to_str (inferior_ptid), nto_procfs_path);
604}
605
606/* Mark our target-struct as eligible for stray "run" and "attach" commands. */
607static int
5483d879 608procfs_can_run (void)
61bb466e
KW
609{
610 return 1;
611}
612
613/* Attach to process PID, then initialize for debugging it. */
614static void
136d6dae 615procfs_attach (struct target_ops *ops, char *args, int from_tty)
61bb466e
KW
616{
617 char *exec_file;
618 int pid;
181e7f93 619 struct inferior *inf;
61bb466e
KW
620
621 if (!args)
e2e0b3e5 622 error_no_arg (_("process-id to attach"));
61bb466e
KW
623
624 pid = atoi (args);
625
626 if (pid == getpid ())
8a3fe4f8 627 error (_("Attaching GDB to itself is not a good idea..."));
61bb466e
KW
628
629 if (from_tty)
630 {
631 exec_file = (char *) get_exec_file (0);
632
633 if (exec_file)
634 printf_unfiltered ("Attaching to program `%s', %s\n", exec_file,
635 target_pid_to_str (pid_to_ptid (pid)));
636 else
637 printf_unfiltered ("Attaching to %s\n",
638 target_pid_to_str (pid_to_ptid (pid)));
639
640 gdb_flush (gdb_stdout);
641 }
642 inferior_ptid = do_attach (pid_to_ptid (pid));
181e7f93
PA
643 inf = add_inferior (pid);
644 inf->attach_flag = 1;
7f9f62ba 645
28439f5e 646 push_target (ops);
7f9f62ba 647
28439f5e 648 procfs_find_new_threads (ops);
61bb466e
KW
649}
650
651static void
652procfs_post_attach (pid_t pid)
653{
61bb466e 654 if (exec_bfd)
42e9a5a0 655 solib_create_inferior_hook ();
61bb466e
KW
656}
657
658static ptid_t
659do_attach (ptid_t ptid)
660{
661 procfs_status status;
662 struct sigevent event;
dc5dd1eb 663 char path[PATH_MAX];
61bb466e 664
dc5dd1eb 665 snprintf (path, PATH_MAX - 1, "%s/%d/as", nto_procfs_path, PIDGET (ptid));
61bb466e
KW
666 ctl_fd = open (path, O_RDWR);
667 if (ctl_fd == -1)
8a3fe4f8 668 error (_("Couldn't open proc file %s, error %d (%s)"), path, errno,
dc5dd1eb 669 safe_strerror (errno));
61bb466e 670 if (devctl (ctl_fd, DCMD_PROC_STOP, &status, sizeof (status), 0) != EOK)
8a3fe4f8 671 error (_("Couldn't stop process"));
61bb466e
KW
672
673 /* Define a sigevent for process stopped notification. */
674 event.sigev_notify = SIGEV_SIGNAL_THREAD;
675 event.sigev_signo = SIGUSR1;
676 event.sigev_code = 0;
677 event.sigev_value.sival_ptr = NULL;
678 event.sigev_priority = -1;
679 devctl (ctl_fd, DCMD_PROC_EVENT, &event, sizeof (event), 0);
680
681 if (devctl (ctl_fd, DCMD_PROC_STATUS, &status, sizeof (status), 0) == EOK
682 && status.flags & _DEBUG_FLAG_STOPPED)
d737fd7f 683 SignalKill (nto_node (), PIDGET (ptid), 0, SIGCONT, 0, 0);
61bb466e 684 nto_init_solib_absolute_prefix ();
103fd00d 685 return ptid_build (PIDGET (ptid), 0, status.tid);
61bb466e
KW
686}
687
688/* Ask the user what to do when an interrupt is received. */
689static void
dc5dd1eb 690interrupt_query (void)
61bb466e
KW
691{
692 target_terminal_ours ();
693
9e2f0ad4
HZ
694 if (query (_("Interrupted while waiting for the program.\n\
695Give up (and stop debugging it)? ")))
61bb466e
KW
696 {
697 target_mourn_inferior ();
315a522e 698 deprecated_throw_reason (RETURN_QUIT);
61bb466e
KW
699 }
700
701 target_terminal_inferior ();
702}
703
704/* The user typed ^C twice. */
705static void
706nto_interrupt_twice (int signo)
707{
708 signal (signo, ofunc);
709 interrupt_query ();
710 signal (signo, nto_interrupt_twice);
711}
712
713static void
714nto_interrupt (int signo)
715{
716 /* If this doesn't work, try more severe steps. */
717 signal (signo, nto_interrupt_twice);
718
f9c72d52 719 target_stop (inferior_ptid);
61bb466e
KW
720}
721
722static ptid_t
117de6a9 723procfs_wait (struct target_ops *ops,
47608cb1 724 ptid_t ptid, struct target_waitstatus *ourstatus, int options)
61bb466e
KW
725{
726 sigset_t set;
727 siginfo_t info;
728 procfs_status status;
729 static int exit_signo = 0; /* To track signals that cause termination. */
730
731 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
732
733 if (ptid_equal (inferior_ptid, null_ptid))
734 {
735 ourstatus->kind = TARGET_WAITKIND_STOPPED;
736 ourstatus->value.sig = TARGET_SIGNAL_0;
737 exit_signo = 0;
738 return null_ptid;
739 }
740
741 sigemptyset (&set);
742 sigaddset (&set, SIGUSR1);
743
744 devctl (ctl_fd, DCMD_PROC_STATUS, &status, sizeof (status), 0);
745 while (!(status.flags & _DEBUG_FLAG_ISTOP))
746 {
747 ofunc = (void (*)()) signal (SIGINT, nto_interrupt);
748 sigwaitinfo (&set, &info);
749 signal (SIGINT, ofunc);
750 devctl (ctl_fd, DCMD_PROC_STATUS, &status, sizeof (status), 0);
751 }
752
753 if (status.flags & _DEBUG_FLAG_SSTEP)
754 {
755 ourstatus->kind = TARGET_WAITKIND_STOPPED;
756 ourstatus->value.sig = TARGET_SIGNAL_TRAP;
757 }
758 /* Was it a breakpoint? */
759 else if (status.flags & _DEBUG_FLAG_TRACE)
760 {
761 ourstatus->kind = TARGET_WAITKIND_STOPPED;
762 ourstatus->value.sig = TARGET_SIGNAL_TRAP;
763 }
764 else if (status.flags & _DEBUG_FLAG_ISTOP)
765 {
766 switch (status.why)
767 {
768 case _DEBUG_WHY_SIGNALLED:
769 ourstatus->kind = TARGET_WAITKIND_STOPPED;
770 ourstatus->value.sig =
771 target_signal_from_host (status.info.si_signo);
772 exit_signo = 0;
773 break;
774 case _DEBUG_WHY_FAULTED:
775 ourstatus->kind = TARGET_WAITKIND_STOPPED;
776 if (status.info.si_signo == SIGTRAP)
777 {
778 ourstatus->value.sig = 0;
779 exit_signo = 0;
780 }
781 else
782 {
783 ourstatus->value.sig =
784 target_signal_from_host (status.info.si_signo);
785 exit_signo = ourstatus->value.sig;
786 }
787 break;
788
789 case _DEBUG_WHY_TERMINATED:
790 {
791 int waitval = 0;
792
793 waitpid (PIDGET (inferior_ptid), &waitval, WNOHANG);
794 if (exit_signo)
795 {
796 /* Abnormal death. */
797 ourstatus->kind = TARGET_WAITKIND_SIGNALLED;
798 ourstatus->value.sig = exit_signo;
799 }
800 else
801 {
802 /* Normal death. */
803 ourstatus->kind = TARGET_WAITKIND_EXITED;
804 ourstatus->value.integer = WEXITSTATUS (waitval);
805 }
806 exit_signo = 0;
807 break;
808 }
809
810 case _DEBUG_WHY_REQUESTED:
811 /* We are assuming a requested stop is due to a SIGINT. */
812 ourstatus->kind = TARGET_WAITKIND_STOPPED;
813 ourstatus->value.sig = TARGET_SIGNAL_INT;
814 exit_signo = 0;
815 break;
816 }
817 }
818
a6a7f2a5 819 return ptid_build (status.pid, 0, status.tid);
61bb466e
KW
820}
821
822/* Read the current values of the inferior's registers, both the
823 general register set and floating point registers (if supported)
824 and update gdb's idea of their current values. */
825static void
28439f5e
PA
826procfs_fetch_registers (struct target_ops *ops,
827 struct regcache *regcache, int regno)
61bb466e
KW
828{
829 union
830 {
831 procfs_greg greg;
832 procfs_fpreg fpreg;
833 procfs_altreg altreg;
834 }
835 reg;
836 int regsize;
837
838 procfs_set_thread (inferior_ptid);
839 if (devctl (ctl_fd, DCMD_PROC_GETGREG, &reg, sizeof (reg), &regsize) == EOK)
56be3814 840 nto_supply_gregset (regcache, (char *) &reg.greg);
61bb466e
KW
841 if (devctl (ctl_fd, DCMD_PROC_GETFPREG, &reg, sizeof (reg), &regsize)
842 == EOK)
56be3814 843 nto_supply_fpregset (regcache, (char *) &reg.fpreg);
61bb466e
KW
844 if (devctl (ctl_fd, DCMD_PROC_GETALTREG, &reg, sizeof (reg), &regsize)
845 == EOK)
56be3814 846 nto_supply_altregset (regcache, (char *) &reg.altreg);
61bb466e
KW
847}
848
849/* Copy LEN bytes to/from inferior's memory starting at MEMADDR
850 from/to debugger memory starting at MYADDR. Copy from inferior
851 if DOWRITE is zero or to inferior if DOWRITE is nonzero.
852
853 Returns the length copied, which is either the LEN argument or
854 zero. This xfer function does not do partial moves, since procfs_ops
855 doesn't allow memory operations to cross below us in the target stack
856 anyway. */
857static int
14ef7606 858procfs_xfer_memory (CORE_ADDR memaddr, gdb_byte *myaddr, int len, int dowrite,
61bb466e
KW
859 struct mem_attrib *attrib, struct target_ops *target)
860{
861 int nbytes = 0;
862
863 if (lseek (ctl_fd, (off_t) memaddr, SEEK_SET) == (off_t) memaddr)
864 {
865 if (dowrite)
866 nbytes = write (ctl_fd, myaddr, len);
867 else
868 nbytes = read (ctl_fd, myaddr, len);
869 if (nbytes < 0)
870 nbytes = 0;
871 }
872 return (nbytes);
873}
874
875/* Take a program previously attached to and detaches it.
876 The program resumes execution and will no longer stop
877 on signals, etc. We'd better not have left any breakpoints
878 in the program or it'll die when it hits one. */
879static void
136d6dae 880procfs_detach (struct target_ops *ops, char *args, int from_tty)
61bb466e
KW
881{
882 int siggnal = 0;
7f9f62ba 883 int pid;
61bb466e
KW
884
885 if (from_tty)
886 {
887 char *exec_file = get_exec_file (0);
888 if (exec_file == 0)
889 exec_file = "";
890 printf_unfiltered ("Detaching from program: %s %s\n",
891 exec_file, target_pid_to_str (inferior_ptid));
892 gdb_flush (gdb_stdout);
893 }
894 if (args)
895 siggnal = atoi (args);
896
897 if (siggnal)
d737fd7f 898 SignalKill (nto_node (), PIDGET (inferior_ptid), 0, siggnal, 0, 0);
61bb466e
KW
899
900 close (ctl_fd);
901 ctl_fd = -1;
7f9f62ba
PA
902
903 pid = ptid_get_pid (inferior_ptid);
61bb466e 904 inferior_ptid = null_ptid;
7f9f62ba
PA
905 detach_inferior (pid);
906 init_thread_list ();
61bb466e
KW
907 unpush_target (&procfs_ops); /* Pop out of handling an inferior. */
908}
909
910static int
911procfs_breakpoint (CORE_ADDR addr, int type, int size)
912{
913 procfs_break brk;
914
915 brk.type = type;
916 brk.addr = addr;
917 brk.size = size;
918 errno = devctl (ctl_fd, DCMD_PROC_BREAK, &brk, sizeof (brk), 0);
919 if (errno != EOK)
920 return 1;
921 return 0;
922}
923
924static int
a6d9a66e
UW
925procfs_insert_breakpoint (struct gdbarch *gdbarch,
926 struct bp_target_info *bp_tgt)
61bb466e 927{
8181d85f 928 return procfs_breakpoint (bp_tgt->placed_address, _DEBUG_BREAK_EXEC, 0);
61bb466e
KW
929}
930
931static int
a6d9a66e
UW
932procfs_remove_breakpoint (struct gdbarch *gdbarch,
933 struct bp_target_info *bp_tgt)
61bb466e 934{
8181d85f 935 return procfs_breakpoint (bp_tgt->placed_address, _DEBUG_BREAK_EXEC, -1);
61bb466e
KW
936}
937
938static int
a6d9a66e
UW
939procfs_insert_hw_breakpoint (struct gdbarch *gdbarch,
940 struct bp_target_info *bp_tgt)
61bb466e 941{
8181d85f
DJ
942 return procfs_breakpoint (bp_tgt->placed_address,
943 _DEBUG_BREAK_EXEC | _DEBUG_BREAK_HW, 0);
61bb466e
KW
944}
945
946static int
a6d9a66e
UW
947procfs_remove_hw_breakpoint (struct gdbarch *gdbarch,
948 struct bp_target_info *bp_tgt)
61bb466e 949{
8181d85f
DJ
950 return procfs_breakpoint (bp_tgt->placed_address,
951 _DEBUG_BREAK_EXEC | _DEBUG_BREAK_HW, -1);
61bb466e
KW
952}
953
954static void
28439f5e
PA
955procfs_resume (struct target_ops *ops,
956 ptid_t ptid, int step, enum target_signal signo)
61bb466e
KW
957{
958 int signal_to_pass;
959 procfs_status status;
14ef7606 960 sigset_t *run_fault = (sigset_t *) (void *) &run.fault;
61bb466e
KW
961
962 if (ptid_equal (inferior_ptid, null_ptid))
963 return;
964
965 procfs_set_thread (ptid_equal (ptid, minus_one_ptid) ? inferior_ptid :
966 ptid);
967
968 run.flags = _DEBUG_RUN_FAULT | _DEBUG_RUN_TRACE;
969 if (step)
970 run.flags |= _DEBUG_RUN_STEP;
971
14ef7606
AR
972 sigemptyset (run_fault);
973 sigaddset (run_fault, FLTBPT);
974 sigaddset (run_fault, FLTTRACE);
975 sigaddset (run_fault, FLTILL);
976 sigaddset (run_fault, FLTPRIV);
977 sigaddset (run_fault, FLTBOUNDS);
978 sigaddset (run_fault, FLTIOVF);
979 sigaddset (run_fault, FLTIZDIV);
980 sigaddset (run_fault, FLTFPE);
61bb466e 981 /* Peter V will be changing this at some point. */
14ef7606 982 sigaddset (run_fault, FLTPAGE);
61bb466e
KW
983
984 run.flags |= _DEBUG_RUN_ARM;
985
986 sigemptyset (&run.trace);
987 notice_signals ();
988 signal_to_pass = target_signal_to_host (signo);
989
990 if (signal_to_pass)
991 {
992 devctl (ctl_fd, DCMD_PROC_STATUS, &status, sizeof (status), 0);
993 signal_to_pass = target_signal_to_host (signo);
994 if (status.why & (_DEBUG_WHY_SIGNALLED | _DEBUG_WHY_FAULTED))
995 {
996 if (signal_to_pass != status.info.si_signo)
997 {
d737fd7f
KW
998 SignalKill (nto_node (), PIDGET (inferior_ptid), 0,
999 signal_to_pass, 0, 0);
61bb466e
KW
1000 run.flags |= _DEBUG_RUN_CLRFLT | _DEBUG_RUN_CLRSIG;
1001 }
1002 else /* Let it kill the program without telling us. */
1003 sigdelset (&run.trace, signal_to_pass);
1004 }
1005 }
1006 else
1007 run.flags |= _DEBUG_RUN_CLRSIG | _DEBUG_RUN_CLRFLT;
1008
1009 errno = devctl (ctl_fd, DCMD_PROC_RUN, &run, sizeof (run), 0);
1010 if (errno != EOK)
1011 {
1012 perror ("run error!\n");
1013 return;
1014 }
1015}
1016
1017static void
136d6dae 1018procfs_mourn_inferior (struct target_ops *ops)
61bb466e
KW
1019{
1020 if (!ptid_equal (inferior_ptid, null_ptid))
1021 {
d737fd7f 1022 SignalKill (nto_node (), PIDGET (inferior_ptid), 0, SIGKILL, 0, 0);
61bb466e
KW
1023 close (ctl_fd);
1024 }
1025 inferior_ptid = null_ptid;
1026 init_thread_list ();
1027 unpush_target (&procfs_ops);
1028 generic_mourn_inferior ();
61bb466e
KW
1029}
1030
1031/* This function breaks up an argument string into an argument
1032 vector suitable for passing to execvp().
1033 E.g., on "run a b c d" this routine would get as input
1034 the string "a b c d", and as output it would fill in argv with
1035 the four arguments "a", "b", "c", "d". The only additional
1036 functionality is simple quoting. The gdb command:
1037 run a "b c d" f
1038 will fill in argv with the three args "a", "b c d", "e". */
1039static void
1040breakup_args (char *scratch, char **argv)
1041{
1042 char *pp, *cp = scratch;
1043 char quoting = 0;
1044
1045 for (;;)
1046 {
1047 /* Scan past leading separators. */
1048 quoting = 0;
1049 while (*cp == ' ' || *cp == '\t' || *cp == '\n')
1050 cp++;
1051
1052 /* Break if at end of string. */
1053 if (*cp == '\0')
1054 break;
1055
1056 /* Take an arg. */
1057 if (*cp == '"')
1058 {
1059 cp++;
1060 quoting = strchr (cp, '"') ? 1 : 0;
1061 }
1062
1063 *argv++ = cp;
1064
1065 /* Scan for next arg separator. */
1066 pp = cp;
1067 if (quoting)
1068 cp = strchr (pp, '"');
1069 if ((cp == NULL) || (!quoting))
1070 cp = strchr (pp, ' ');
1071 if (cp == NULL)
1072 cp = strchr (pp, '\t');
1073 if (cp == NULL)
1074 cp = strchr (pp, '\n');
1075
1076 /* No separators => end of string => break. */
1077 if (cp == NULL)
1078 {
1079 pp = cp;
1080 break;
1081 }
1082
1083 /* Replace the separator with a terminator. */
1084 *cp++ = '\0';
1085 }
1086
1087 /* Execv requires a null-terminated arg vector. */
1088 *argv = NULL;
1089}
1090
1091static void
136d6dae
VP
1092procfs_create_inferior (struct target_ops *ops, char *exec_file,
1093 char *allargs, char **env, int from_tty)
61bb466e
KW
1094{
1095 struct inheritance inherit;
1096 pid_t pid;
1097 int flags, errn;
1098 char **argv, *args;
3cb3b8df 1099 const char *in = "", *out = "", *err = "";
61bb466e
KW
1100 int fd, fds[3];
1101 sigset_t set;
3cb3b8df 1102 const char *inferior_io_terminal = get_inferior_io_terminal ();
3fdfcbf1 1103 struct inferior *inf;
61bb466e
KW
1104
1105 argv = xmalloc (((strlen (allargs) + 1) / (unsigned) 2 + 2) *
1106 sizeof (*argv));
1107 argv[0] = get_exec_file (1);
1108 if (!argv[0])
1109 {
1110 if (exec_file)
1111 argv[0] = exec_file;
1112 else
1113 return;
1114 }
1115
1116 args = xstrdup (allargs);
1117 breakup_args (args, exec_file ? &argv[1] : &argv[0]);
1118
1119 argv = nto_parse_redirection (argv, &in, &out, &err);
1120
1121 fds[0] = STDIN_FILENO;
1122 fds[1] = STDOUT_FILENO;
1123 fds[2] = STDERR_FILENO;
1124
1125 /* If the user specified I/O via gdb's --tty= arg, use it, but only
1126 if the i/o is not also being specified via redirection. */
1127 if (inferior_io_terminal)
1128 {
1129 if (!in[0])
1130 in = inferior_io_terminal;
1131 if (!out[0])
1132 out = inferior_io_terminal;
1133 if (!err[0])
1134 err = inferior_io_terminal;
1135 }
1136
1137 if (in[0])
1138 {
1139 fd = open (in, O_RDONLY);
1140 if (fd == -1)
1141 perror (in);
1142 else
1143 fds[0] = fd;
1144 }
1145 if (out[0])
1146 {
1147 fd = open (out, O_WRONLY);
1148 if (fd == -1)
1149 perror (out);
1150 else
1151 fds[1] = fd;
1152 }
1153 if (err[0])
1154 {
1155 fd = open (err, O_WRONLY);
1156 if (fd == -1)
1157 perror (err);
1158 else
1159 fds[2] = fd;
1160 }
1161
1162 /* Clear any pending SIGUSR1's but keep the behavior the same. */
1163 signal (SIGUSR1, signal (SIGUSR1, SIG_IGN));
1164
1165 sigemptyset (&set);
1166 sigaddset (&set, SIGUSR1);
1167 sigprocmask (SIG_UNBLOCK, &set, NULL);
1168
1169 memset (&inherit, 0, sizeof (inherit));
1170
1171 if (ND_NODE_CMP (nto_procfs_node, ND_LOCAL_NODE) != 0)
1172 {
d737fd7f 1173 inherit.nd = nto_node ();
61bb466e
KW
1174 inherit.flags |= SPAWN_SETND;
1175 inherit.flags &= ~SPAWN_EXEC;
1176 }
1177 inherit.flags |= SPAWN_SETGROUP | SPAWN_HOLD;
1178 inherit.pgroup = SPAWN_NEWPGROUP;
1179 pid = spawnp (argv[0], 3, fds, &inherit, argv,
1180 ND_NODE_CMP (nto_procfs_node, ND_LOCAL_NODE) == 0 ? env : 0);
1181 xfree (args);
1182
1183 sigprocmask (SIG_BLOCK, &set, NULL);
1184
1185 if (pid == -1)
8a3fe4f8 1186 error (_("Error spawning %s: %d (%s)"), argv[0], errno,
d737fd7f 1187 safe_strerror (errno));
61bb466e
KW
1188
1189 if (fds[0] != STDIN_FILENO)
1190 close (fds[0]);
1191 if (fds[1] != STDOUT_FILENO)
1192 close (fds[1]);
1193 if (fds[2] != STDERR_FILENO)
1194 close (fds[2]);
1195
1196 inferior_ptid = do_attach (pid_to_ptid (pid));
28439f5e 1197 procfs_find_new_threads (ops);
61bb466e 1198
3fdfcbf1
AR
1199 inf = add_inferior (pid);
1200 inf->attach_flag = 0;
7f9f62ba 1201
61bb466e
KW
1202 flags = _DEBUG_FLAG_KLC; /* Kill-on-Last-Close flag. */
1203 errn = devctl (ctl_fd, DCMD_PROC_SET_FLAG, &flags, sizeof (flags), 0);
1204 if (errn != EOK)
1205 {
1206 /* FIXME: expected warning? */
1207 /* warning( "Failed to set Kill-on-Last-Close flag: errno = %d(%s)\n",
1208 errn, strerror(errn) ); */
1209 }
28439f5e 1210 push_target (ops);
61bb466e
KW
1211 target_terminal_init ();
1212
61bb466e
KW
1213 if (exec_bfd != NULL
1214 || (symfile_objfile != NULL && symfile_objfile->obfd != NULL))
42e9a5a0 1215 solib_create_inferior_hook ();
61bb466e
KW
1216}
1217
1218static void
f9c72d52 1219procfs_stop (ptid_t ptid)
61bb466e
KW
1220{
1221 devctl (ctl_fd, DCMD_PROC_STOP, NULL, 0, 0);
1222}
1223
1224static void
7d85a9c0 1225procfs_kill_inferior (struct target_ops *ops)
61bb466e
KW
1226{
1227 target_mourn_inferior ();
1228}
1229
1230/* Store register REGNO, or all registers if REGNO == -1, from the contents
1231 of REGISTERS. */
1232static void
316f2060 1233procfs_prepare_to_store (struct regcache *regcache)
61bb466e
KW
1234{
1235}
1236
1237/* Fill buf with regset and return devctl cmd to do the setting. Return
1238 -1 if we fail to get the regset. Store size of regset in regsize. */
1239static int
1240get_regset (int regset, char *buf, int bufsize, int *regsize)
1241{
1242 int dev_get, dev_set;
1243 switch (regset)
1244 {
1245 case NTO_REG_GENERAL:
1246 dev_get = DCMD_PROC_GETGREG;
1247 dev_set = DCMD_PROC_SETGREG;
1248 break;
1249
1250 case NTO_REG_FLOAT:
1251 dev_get = DCMD_PROC_GETFPREG;
1252 dev_set = DCMD_PROC_SETFPREG;
1253 break;
1254
1255 case NTO_REG_ALT:
1256 dev_get = DCMD_PROC_GETALTREG;
1257 dev_set = DCMD_PROC_SETALTREG;
1258 break;
1259
1260 case NTO_REG_SYSTEM:
1261 default:
1262 return -1;
1263 }
97c44116 1264 if (devctl (ctl_fd, dev_get, buf, bufsize, regsize) != EOK)
61bb466e
KW
1265 return -1;
1266
1267 return dev_set;
1268}
1269
1270void
28439f5e
PA
1271procfs_store_registers (struct target_ops *ops,
1272 struct regcache *regcache, int regno)
61bb466e
KW
1273{
1274 union
1275 {
1276 procfs_greg greg;
1277 procfs_fpreg fpreg;
1278 procfs_altreg altreg;
1279 }
1280 reg;
1281 unsigned off;
1282 int len, regset, regsize, dev_set, err;
1283 char *data;
1284
1285 if (ptid_equal (inferior_ptid, null_ptid))
1286 return;
1287 procfs_set_thread (inferior_ptid);
1288
1289 if (regno == -1)
1290 {
1291 for (regset = NTO_REG_GENERAL; regset < NTO_REG_END; regset++)
1292 {
1293 dev_set = get_regset (regset, (char *) &reg,
1294 sizeof (reg), &regsize);
1295 if (dev_set == -1)
1296 continue;
1297
56be3814 1298 if (nto_regset_fill (regcache, regset, (char *) &reg) == -1)
61bb466e
KW
1299 continue;
1300
1301 err = devctl (ctl_fd, dev_set, &reg, regsize, 0);
1302 if (err != EOK)
1303 fprintf_unfiltered (gdb_stderr,
1304 "Warning unable to write regset %d: %s\n",
dc5dd1eb 1305 regno, safe_strerror (err));
61bb466e
KW
1306 }
1307 }
1308 else
1309 {
1310 regset = nto_regset_id (regno);
1311 if (regset == -1)
1312 return;
1313
1314 dev_set = get_regset (regset, (char *) &reg, sizeof (reg), &regsize);
1315 if (dev_set == -1)
1316 return;
1317
60441ab9
UW
1318 len = nto_register_area (get_regcache_arch (regcache),
1319 regno, regset, &off);
61bb466e
KW
1320
1321 if (len < 1)
1322 return;
1323
56be3814 1324 regcache_raw_collect (regcache, regno, (char *) &reg + off);
61bb466e
KW
1325
1326 err = devctl (ctl_fd, dev_set, &reg, regsize, 0);
1327 if (err != EOK)
1328 fprintf_unfiltered (gdb_stderr,
1329 "Warning unable to write regset %d: %s\n", regno,
dc5dd1eb 1330 safe_strerror (err));
61bb466e
KW
1331 }
1332}
1333
1334static void
1335notice_signals (void)
1336{
1337 int signo;
1338
1339 for (signo = 1; signo < NSIG; signo++)
1340 {
1341 if (signal_stop_state (target_signal_from_host (signo)) == 0
1342 && signal_print_state (target_signal_from_host (signo)) == 0
1343 && signal_pass_state (target_signal_from_host (signo)) == 1)
1344 sigdelset (&run.trace, signo);
1345 else
1346 sigaddset (&run.trace, signo);
1347 }
1348}
1349
1350/* When the user changes the state of gdb's signal handling via the
1351 "handle" command, this function gets called to see if any change
1352 in the /proc interface is required. It is also called internally
1353 by other /proc interface functions to initialize the state of
1354 the traced signal set. */
1355static void
1356procfs_notice_signals (ptid_t ptid)
1357{
1358 sigemptyset (&run.trace);
1359 notice_signals ();
1360}
1361
1362static struct tidinfo *
1363procfs_thread_info (pid_t pid, short tid)
1364{
1365/* NYI */
1366 return NULL;
1367}
1368
1369char *
117de6a9 1370procfs_pid_to_str (struct target_ops *ops, ptid_t ptid)
61bb466e
KW
1371{
1372 static char buf[1024];
1373 int pid, tid, n;
1374 struct tidinfo *tip;
1375
1376 pid = ptid_get_pid (ptid);
1377 tid = ptid_get_tid (ptid);
1378
dc5dd1eb 1379 n = snprintf (buf, 1023, "process %d", pid);
61bb466e
KW
1380
1381#if 0 /* NYI */
1382 tip = procfs_thread_info (pid, tid);
1383 if (tip != NULL)
dc5dd1eb 1384 snprintf (&buf[n], 1023, " (state = 0x%02x)", tip->state);
61bb466e
KW
1385#endif
1386
1387 return buf;
1388}
1389
1390static void
dc5dd1eb 1391init_procfs_ops (void)
61bb466e
KW
1392{
1393 procfs_ops.to_shortname = "procfs";
1394 procfs_ops.to_longname = "QNX Neutrino procfs child process";
1395 procfs_ops.to_doc =
1396 "QNX Neutrino procfs child process (started by the \"run\" command).\n\
1397 target procfs <node>";
1398 procfs_ops.to_open = procfs_open;
1399 procfs_ops.to_attach = procfs_attach;
1400 procfs_ops.to_post_attach = procfs_post_attach;
1401 procfs_ops.to_detach = procfs_detach;
1402 procfs_ops.to_resume = procfs_resume;
1403 procfs_ops.to_wait = procfs_wait;
1404 procfs_ops.to_fetch_registers = procfs_fetch_registers;
1405 procfs_ops.to_store_registers = procfs_store_registers;
1406 procfs_ops.to_prepare_to_store = procfs_prepare_to_store;
c8e73a31 1407 procfs_ops.deprecated_xfer_memory = procfs_xfer_memory;
61bb466e
KW
1408 procfs_ops.to_files_info = procfs_files_info;
1409 procfs_ops.to_insert_breakpoint = procfs_insert_breakpoint;
1410 procfs_ops.to_remove_breakpoint = procfs_remove_breakpoint;
1411 procfs_ops.to_can_use_hw_breakpoint = procfs_can_use_hw_breakpoint;
1412 procfs_ops.to_insert_hw_breakpoint = procfs_insert_hw_breakpoint;
1413 procfs_ops.to_remove_hw_breakpoint = procfs_remove_breakpoint;
1414 procfs_ops.to_insert_watchpoint = procfs_insert_hw_watchpoint;
1415 procfs_ops.to_remove_watchpoint = procfs_remove_hw_watchpoint;
1416 procfs_ops.to_stopped_by_watchpoint = procfs_stopped_by_watchpoint;
1417 procfs_ops.to_terminal_init = terminal_init_inferior;
1418 procfs_ops.to_terminal_inferior = terminal_inferior;
1419 procfs_ops.to_terminal_ours_for_output = terminal_ours_for_output;
1420 procfs_ops.to_terminal_ours = terminal_ours;
1421 procfs_ops.to_terminal_info = child_terminal_info;
1422 procfs_ops.to_kill = procfs_kill_inferior;
1423 procfs_ops.to_create_inferior = procfs_create_inferior;
1424 procfs_ops.to_mourn_inferior = procfs_mourn_inferior;
1425 procfs_ops.to_can_run = procfs_can_run;
1426 procfs_ops.to_notice_signals = procfs_notice_signals;
1427 procfs_ops.to_thread_alive = procfs_thread_alive;
1428 procfs_ops.to_find_new_threads = procfs_find_new_threads;
1429 procfs_ops.to_pid_to_str = procfs_pid_to_str;
1430 procfs_ops.to_stop = procfs_stop;
1431 procfs_ops.to_stratum = process_stratum;
c35b1492
PA
1432 procfs_ops.to_has_all_memory = default_child_has_all_memory;
1433 procfs_ops.to_has_memory = default_child_has_memory;
1434 procfs_ops.to_has_stack = default_child_has_stack;
1435 procfs_ops.to_has_registers = default_child_has_registers;
1436 procfs_ops.to_has_execution = default_child_has_execution;
61bb466e
KW
1437 procfs_ops.to_magic = OPS_MAGIC;
1438 procfs_ops.to_have_continuable_watchpoint = 1;
745a434e 1439 procfs_ops.to_extra_thread_info = nto_extra_thread_info;
61bb466e
KW
1440}
1441
1442#define OSTYPE_NTO 1
1443
1444void
dc5dd1eb 1445_initialize_procfs (void)
61bb466e
KW
1446{
1447 sigset_t set;
1448
1449 init_procfs_ops ();
1450 add_target (&procfs_ops);
1451
1452 /* We use SIGUSR1 to gain control after we block waiting for a process.
1453 We use sigwaitevent to wait. */
1454 sigemptyset (&set);
1455 sigaddset (&set, SIGUSR1);
1456 sigprocmask (SIG_BLOCK, &set, NULL);
1457
1458 /* Set up trace and fault sets, as gdb expects them. */
1459 sigemptyset (&run.trace);
61bb466e
KW
1460
1461 /* Stuff some information. */
1462 nto_cpuinfo_flags = SYSPAGE_ENTRY (cpuinfo)->flags;
1463 nto_cpuinfo_valid = 1;
1464
1bedd215
AC
1465 add_info ("pidlist", procfs_pidlist, _("pidlist"));
1466 add_info ("meminfo", procfs_meminfo, _("memory information"));
d737fd7f
KW
1467
1468 nto_is_nto_target = procfs_is_nto_target;
61bb466e
KW
1469}
1470
1471
1472static int
1473procfs_hw_watchpoint (int addr, int len, int type)
1474{
1475 procfs_break brk;
1476
1477 switch (type)
1478 {
1479 case 1: /* Read. */
1480 brk.type = _DEBUG_BREAK_RD;
1481 break;
1482 case 2: /* Read/Write. */
1483 brk.type = _DEBUG_BREAK_RW;
1484 break;
1485 default: /* Modify. */
1486/* FIXME: brk.type = _DEBUG_BREAK_RWM gives EINVAL for some reason. */
1487 brk.type = _DEBUG_BREAK_RW;
1488 }
1489 brk.type |= _DEBUG_BREAK_HW; /* Always ask for HW. */
1490 brk.addr = addr;
1491 brk.size = len;
1492
1493 errno = devctl (ctl_fd, DCMD_PROC_BREAK, &brk, sizeof (brk), 0);
1494 if (errno != EOK)
1495 {
1496 perror ("Failed to set hardware watchpoint");
1497 return -1;
1498 }
1499 return 0;
1500}
1501
1502static int
1503procfs_can_use_hw_breakpoint (int type, int cnt, int othertype)
1504{
1505 return 1;
1506}
1507
1508static int
1509procfs_remove_hw_watchpoint (CORE_ADDR addr, int len, int type)
1510{
1511 return procfs_hw_watchpoint (addr, -1, type);
1512}
1513
1514static int
1515procfs_insert_hw_watchpoint (CORE_ADDR addr, int len, int type)
1516{
1517 return procfs_hw_watchpoint (addr, len, type);
1518}
1519
1520static int
1521procfs_stopped_by_watchpoint (void)
1522{
1523 return 0;
1524}
This page took 0.598878 seconds and 4 git commands to generate.