gdb/
[deliverable/binutils-gdb.git] / gdb / nto-procfs.c
CommitLineData
61bb466e
KW
1/* Machine independent support for QNX Neutrino /proc (process file system)
2 for GDB. Written by Colin Burgess at QNX Software Systems Limited.
3
4c38e0a4
JB
4 Copyright (C) 2003, 2006, 2007, 2008, 2009, 2010
5 Free Software Foundation, Inc.
61bb466e
KW
6
7 Contributed by QNX Software Systems Ltd.
8
9 This file is part of GDB.
10
11 This program is free software; you can redistribute it and/or modify
12 it under the terms of the GNU General Public License as published by
a9762ec7 13 the Free Software Foundation; either version 3 of the License, or
61bb466e
KW
14 (at your option) any later version.
15
16 This program is distributed in the hope that it will be useful,
17 but WITHOUT ANY WARRANTY; without even the implied warranty of
18 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 GNU General Public License for more details.
20
21 You should have received a copy of the GNU General Public License
a9762ec7 22 along with this program. If not, see <http://www.gnu.org/licenses/>. */
61bb466e
KW
23
24#include "defs.h"
25
26#include <fcntl.h>
27#include <spawn.h>
28#include <sys/debug.h>
29#include <sys/procfs.h>
30#include <sys/neutrino.h>
31#include <sys/syspage.h>
5483d879 32#include "gdb_dirent.h"
61bb466e
KW
33#include <sys/netmgr.h>
34
60250e8b 35#include "exceptions.h"
61bb466e
KW
36#include "gdb_string.h"
37#include "gdbcore.h"
38#include "inferior.h"
39#include "target.h"
40#include "objfiles.h"
41#include "gdbthread.h"
42#include "nto-tdep.h"
43#include "command.h"
44#include "regcache.h"
5ea03926 45#include "solib.h"
61bb466e
KW
46
47#define NULL_PID 0
48#define _DEBUG_FLAG_TRACE (_DEBUG_FLAG_TRACE_EXEC|_DEBUG_FLAG_TRACE_RD|\
49 _DEBUG_FLAG_TRACE_WR|_DEBUG_FLAG_TRACE_MODIFY)
50
51static struct target_ops procfs_ops;
52
53int ctl_fd;
54
55static void (*ofunc) ();
56
57static procfs_run run;
58
59static void procfs_open (char *, int);
60
61static int procfs_can_run (void);
62
14ef7606 63static int procfs_xfer_memory (CORE_ADDR, gdb_byte *, int, int,
61bb466e
KW
64 struct mem_attrib *attrib,
65 struct target_ops *);
66
61bb466e
KW
67static void notice_signals (void);
68
69static void init_procfs_ops (void);
70
71static ptid_t do_attach (ptid_t ptid);
72
73static int procfs_can_use_hw_breakpoint (int, int, int);
74
61bb466e
KW
75static int procfs_insert_hw_watchpoint (CORE_ADDR addr, int len, int type);
76
77static int procfs_remove_hw_watchpoint (CORE_ADDR addr, int len, int type);
78
79static int procfs_stopped_by_watchpoint (void);
80
81/* These two globals are only ever set in procfs_open(), but are
82 referenced elsewhere. 'nto_procfs_node' is a flag used to say
83 whether we are local, or we should get the current node descriptor
84 for the remote QNX node. */
85static char nto_procfs_path[PATH_MAX] = { "/proc" };
86static unsigned nto_procfs_node = ND_LOCAL_NODE;
87
88/* Return the current QNX Node, or error out. This is a simple
89 wrapper for the netmgr_strtond() function. The reason this
90 is required is because QNX node descriptors are transient so
91 we have to re-acquire them every time. */
92static unsigned
d737fd7f 93nto_node (void)
61bb466e
KW
94{
95 unsigned node;
96
d737fd7f 97 if (ND_NODE_CMP (nto_procfs_node, ND_LOCAL_NODE) == 0)
61bb466e
KW
98 return ND_LOCAL_NODE;
99
d737fd7f 100 node = netmgr_strtond (nto_procfs_path, 0);
61bb466e 101 if (node == -1)
8a3fe4f8 102 error (_("Lost the QNX node. Debug session probably over."));
61bb466e
KW
103
104 return (node);
105}
106
d737fd7f
KW
107static enum gdb_osabi
108procfs_is_nto_target (bfd *abfd)
109{
110 return GDB_OSABI_QNXNTO;
111}
112
61bb466e
KW
113/* This is called when we call 'target procfs <arg>' from the (gdb) prompt.
114 For QNX6 (nto), the only valid arg will be a QNX node string,
115 eg: "/net/some_node". If arg is not a valid QNX node, we will
116 default to local. */
117static void
118procfs_open (char *arg, int from_tty)
119{
120 char *nodestr;
121 char *endstr;
122 char buffer[50];
123 int fd, total_size;
124 procfs_sysinfo *sysinfo;
9fe4a216 125 struct cleanup *cleanups;
61bb466e 126
d737fd7f
KW
127 nto_is_nto_target = procfs_is_nto_target;
128
61bb466e
KW
129 /* Set the default node used for spawning to this one,
130 and only override it if there is a valid arg. */
131
132 nto_procfs_node = ND_LOCAL_NODE;
133 nodestr = arg ? xstrdup (arg) : arg;
134
135 init_thread_list ();
136
137 if (nodestr)
138 {
139 nto_procfs_node = netmgr_strtond (nodestr, &endstr);
140 if (nto_procfs_node == -1)
141 {
142 if (errno == ENOTSUP)
143 printf_filtered ("QNX Net Manager not found.\n");
144 printf_filtered ("Invalid QNX node %s: error %d (%s).\n", nodestr,
dc5dd1eb 145 errno, safe_strerror (errno));
61bb466e
KW
146 xfree (nodestr);
147 nodestr = NULL;
148 nto_procfs_node = ND_LOCAL_NODE;
149 }
150 else if (*endstr)
151 {
152 if (*(endstr - 1) == '/')
153 *(endstr - 1) = 0;
154 else
155 *endstr = 0;
156 }
157 }
d737fd7f
KW
158 snprintf (nto_procfs_path, PATH_MAX - 1, "%s%s", nodestr ? nodestr : "",
159 "/proc");
61bb466e
KW
160 if (nodestr)
161 xfree (nodestr);
162
163 fd = open (nto_procfs_path, O_RDONLY);
164 if (fd == -1)
165 {
166 printf_filtered ("Error opening %s : %d (%s)\n", nto_procfs_path, errno,
dc5dd1eb 167 safe_strerror (errno));
8a3fe4f8 168 error (_("Invalid procfs arg"));
61bb466e 169 }
9fe4a216 170 cleanups = make_cleanup_close (fd);
61bb466e
KW
171
172 sysinfo = (void *) buffer;
173 if (devctl (fd, DCMD_PROC_SYSINFO, sysinfo, sizeof buffer, 0) != EOK)
174 {
175 printf_filtered ("Error getting size: %d (%s)\n", errno,
dc5dd1eb 176 safe_strerror (errno));
8a3fe4f8 177 error (_("Devctl failed."));
61bb466e
KW
178 }
179 else
180 {
181 total_size = sysinfo->total_size;
182 sysinfo = alloca (total_size);
183 if (!sysinfo)
184 {
185 printf_filtered ("Memory error: %d (%s)\n", errno,
dc5dd1eb 186 safe_strerror (errno));
8a3fe4f8 187 error (_("alloca failed."));
61bb466e
KW
188 }
189 else
190 {
191 if (devctl (fd, DCMD_PROC_SYSINFO, sysinfo, total_size, 0) != EOK)
192 {
193 printf_filtered ("Error getting sysinfo: %d (%s)\n", errno,
dc5dd1eb 194 safe_strerror (errno));
8a3fe4f8 195 error (_("Devctl failed."));
61bb466e
KW
196 }
197 else
198 {
199 if (sysinfo->type !=
1143fffb 200 nto_map_arch_to_cputype (gdbarch_bfd_arch_info
a97b0ac8 201 (target_gdbarch)->arch_name))
9fe4a216 202 error (_("Invalid target CPU."));
61bb466e
KW
203 }
204 }
205 }
9fe4a216 206 do_cleanups (cleanups);
61bb466e
KW
207 printf_filtered ("Debugging using %s\n", nto_procfs_path);
208}
209
210static void
211procfs_set_thread (ptid_t ptid)
212{
213 pid_t tid;
214
215 tid = ptid_get_tid (ptid);
216 devctl (ctl_fd, DCMD_PROC_CURTHREAD, &tid, sizeof (tid), 0);
217}
218
219/* Return nonzero if the thread TH is still alive. */
220static int
28439f5e 221procfs_thread_alive (struct target_ops *ops, ptid_t ptid)
61bb466e
KW
222{
223 pid_t tid;
745a434e
AR
224 pid_t pid;
225 procfs_status status;
226 int err;
61bb466e
KW
227
228 tid = ptid_get_tid (ptid);
745a434e
AR
229 pid = ptid_get_pid (ptid);
230
231 if (kill (pid, 0) == -1)
232 return 0;
233
234 status.tid = tid;
235 if ((err = devctl (ctl_fd, DCMD_PROC_TIDSTATUS,
236 &status, sizeof (status), 0)) != EOK)
237 return 0;
238
239 /* Thread is alive or dead but not yet joined,
240 or dead and there is an alive (or dead unjoined) thread with
241 higher tid.
242
243 If the tid is not the same as requested, requested tid is dead. */
244 return (status.tid == tid) && (status.state != STATE_DEAD);
245}
246
247static void
248update_thread_private_data_name (struct thread_info *new_thread,
249 const char *newname)
250{
251 int newnamelen;
252 struct private_thread_info *pti;
253
254 gdb_assert (newname != NULL);
255 gdb_assert (new_thread != NULL);
256 newnamelen = strlen (newname);
257 if (!new_thread->private)
258 {
259 new_thread->private = xmalloc (offsetof (struct private_thread_info,
260 name)
261 + newnamelen + 1);
262 memcpy (new_thread->private->name, newname, newnamelen + 1);
263 }
264 else if (strcmp (newname, new_thread->private->name) != 0)
265 {
266 /* Reallocate if neccessary. */
267 int oldnamelen = strlen (new_thread->private->name);
268
269 if (oldnamelen < newnamelen)
270 new_thread->private = xrealloc (new_thread->private,
271 offsetof (struct private_thread_info,
272 name)
273 + newnamelen + 1);
274 memcpy (new_thread->private->name, newname, newnamelen + 1);
275 }
276}
277
278static void
279update_thread_private_data (struct thread_info *new_thread,
280 pthread_t tid, int state, int flags)
281{
282 struct private_thread_info *pti;
283 procfs_info pidinfo;
284 struct _thread_name *tn;
285 procfs_threadctl tctl;
286
287#if _NTO_VERSION > 630
288 gdb_assert (new_thread != NULL);
289
290 if (devctl (ctl_fd, DCMD_PROC_INFO, &pidinfo,
291 sizeof(pidinfo), 0) != EOK)
292 return;
293
294 memset (&tctl, 0, sizeof (tctl));
295 tctl.cmd = _NTO_TCTL_NAME;
296 tn = (struct _thread_name *) (&tctl.data);
297
298 /* Fetch name for the given thread. */
299 tctl.tid = tid;
300 tn->name_buf_len = sizeof (tctl.data) - sizeof (*tn);
301 tn->new_name_len = -1; /* Getting, not setting. */
302 if (devctl (ctl_fd, DCMD_PROC_THREADCTL, &tctl, sizeof (tctl), NULL) != EOK)
303 tn->name_buf[0] = '\0';
304
305 tn->name_buf[_NTO_THREAD_NAME_MAX] = '\0';
306
307 update_thread_private_data_name (new_thread, tn->name_buf);
308
309 pti = (struct private_thread_info *) new_thread->private;
310 pti->tid = tid;
311 pti->state = state;
312 pti->flags = flags;
313#endif /* _NTO_VERSION */
61bb466e
KW
314}
315
316void
28439f5e 317procfs_find_new_threads (struct target_ops *ops)
61bb466e
KW
318{
319 procfs_status status;
320 pid_t pid;
321 ptid_t ptid;
745a434e
AR
322 pthread_t tid;
323 struct thread_info *new_thread;
61bb466e
KW
324
325 if (ctl_fd == -1)
326 return;
327
328 pid = ptid_get_pid (inferior_ptid);
329
745a434e
AR
330 status.tid = 1;
331
332 for (tid = 1;; ++tid)
61bb466e 333 {
745a434e
AR
334 if (status.tid == tid
335 && (devctl (ctl_fd, DCMD_PROC_TIDSTATUS, &status, sizeof (status), 0)
336 != EOK))
61bb466e 337 break;
745a434e
AR
338 if (status.tid != tid)
339 /* The reason why this would not be equal is that devctl might have
340 returned different tid, meaning the requested tid no longer exists
341 (e.g. thread exited). */
342 continue;
343 ptid = ptid_build (pid, 0, tid);
344 new_thread = find_thread_ptid (ptid);
345 if (!new_thread)
346 new_thread = add_thread (ptid);
347 update_thread_private_data (new_thread, tid, status.state, 0);
348 status.tid++;
61bb466e
KW
349 }
350 return;
351}
352
9fe4a216
TT
353static void
354do_closedir_cleanup (void *dir)
355{
356 closedir (dir);
357}
358
61bb466e
KW
359void
360procfs_pidlist (char *args, int from_tty)
361{
362 DIR *dp = NULL;
363 struct dirent *dirp = NULL;
61bb466e
KW
364 char buf[512];
365 procfs_info *pidinfo = NULL;
366 procfs_debuginfo *info = NULL;
367 procfs_status *status = NULL;
368 pid_t num_threads = 0;
369 pid_t pid;
370 char name[512];
9fe4a216 371 struct cleanup *cleanups;
61bb466e
KW
372
373 dp = opendir (nto_procfs_path);
374 if (dp == NULL)
375 {
dc5dd1eb 376 fprintf_unfiltered (gdb_stderr, "failed to opendir \"%s\" - %d (%s)",
d737fd7f 377 nto_procfs_path, errno, safe_strerror (errno));
61bb466e
KW
378 return;
379 }
380
9fe4a216
TT
381 cleanups = make_cleanup (do_closedir_cleanup, dp);
382
61bb466e
KW
383 /* Start scan at first pid. */
384 rewinddir (dp);
385
386 do
387 {
9fe4a216
TT
388 int fd;
389 struct cleanup *inner_cleanup;
390
61bb466e
KW
391 /* Get the right pid and procfs path for the pid. */
392 do
393 {
394 dirp = readdir (dp);
395 if (dirp == NULL)
396 {
9fe4a216 397 do_cleanups (cleanups);
61bb466e
KW
398 return;
399 }
dc5dd1eb 400 snprintf (buf, 511, "%s/%s/as", nto_procfs_path, dirp->d_name);
61bb466e
KW
401 pid = atoi (dirp->d_name);
402 }
403 while (pid == 0);
404
405 /* Open the procfs path. */
406 fd = open (buf, O_RDONLY);
407 if (fd == -1)
408 {
dc5dd1eb 409 fprintf_unfiltered (gdb_stderr, "failed to open %s - %d (%s)\n",
d737fd7f 410 buf, errno, safe_strerror (errno));
9fe4a216 411 do_cleanups (cleanups);
61bb466e
KW
412 return;
413 }
9fe4a216 414 inner_cleanup = make_cleanup_close (fd);
61bb466e
KW
415
416 pidinfo = (procfs_info *) buf;
417 if (devctl (fd, DCMD_PROC_INFO, pidinfo, sizeof (buf), 0) != EOK)
418 {
dc5dd1eb 419 fprintf_unfiltered (gdb_stderr,
d737fd7f
KW
420 "devctl DCMD_PROC_INFO failed - %d (%s)\n",
421 errno, safe_strerror (errno));
61bb466e
KW
422 break;
423 }
424 num_threads = pidinfo->num_threads;
425
426 info = (procfs_debuginfo *) buf;
427 if (devctl (fd, DCMD_PROC_MAPDEBUG_BASE, info, sizeof (buf), 0) != EOK)
428 strcpy (name, "unavailable");
429 else
430 strcpy (name, info->path);
431
432 /* Collect state info on all the threads. */
433 status = (procfs_status *) buf;
434 for (status->tid = 1; status->tid <= num_threads; status->tid++)
435 {
436 if (devctl (fd, DCMD_PROC_TIDSTATUS, status, sizeof (buf), 0) != EOK
437 && status->tid != 0)
438 break;
439 if (status->tid != 0)
440 printf_filtered ("%s - %d/%d\n", name, pid, status->tid);
441 }
9fe4a216
TT
442
443 do_cleanups (inner_cleanup);
61bb466e
KW
444 }
445 while (dirp != NULL);
446
9fe4a216 447 do_cleanups (cleanups);
61bb466e
KW
448 return;
449}
450
451void
452procfs_meminfo (char *args, int from_tty)
453{
454 procfs_mapinfo *mapinfos = NULL;
455 static int num_mapinfos = 0;
456 procfs_mapinfo *mapinfo_p, *mapinfo_p2;
457 int flags = ~0, err, num, i, j;
458
459 struct
460 {
461 procfs_debuginfo info;
462 char buff[_POSIX_PATH_MAX];
463 } map;
464
465 struct info
466 {
467 unsigned addr;
468 unsigned size;
469 unsigned flags;
470 unsigned debug_vaddr;
471 unsigned long long offset;
472 };
473
474 struct printinfo
475 {
476 unsigned long long ino;
477 unsigned dev;
478 struct info text;
479 struct info data;
480 char name[256];
481 } printme;
482
483 /* Get the number of map entrys. */
484 err = devctl (ctl_fd, DCMD_PROC_MAPINFO, NULL, 0, &num);
485 if (err != EOK)
486 {
d737fd7f
KW
487 printf ("failed devctl num mapinfos - %d (%s)\n", err,
488 safe_strerror (err));
61bb466e
KW
489 return;
490 }
491
492 mapinfos = xmalloc (num * sizeof (procfs_mapinfo));
493
494 num_mapinfos = num;
495 mapinfo_p = mapinfos;
496
497 /* Fill the map entrys. */
498 err = devctl (ctl_fd, DCMD_PROC_MAPINFO, mapinfo_p, num
499 * sizeof (procfs_mapinfo), &num);
500 if (err != EOK)
501 {
5483d879 502 printf ("failed devctl mapinfos - %d (%s)\n", err, safe_strerror (err));
61bb466e
KW
503 xfree (mapinfos);
504 return;
505 }
506
507 num = min (num, num_mapinfos);
508
509 /* Run through the list of mapinfos, and store the data and text info
510 so we can print it at the bottom of the loop. */
511 for (mapinfo_p = mapinfos, i = 0; i < num; i++, mapinfo_p++)
512 {
513 if (!(mapinfo_p->flags & flags))
514 mapinfo_p->ino = 0;
515
516 if (mapinfo_p->ino == 0) /* Already visited. */
517 continue;
518
519 map.info.vaddr = mapinfo_p->vaddr;
520
521 err = devctl (ctl_fd, DCMD_PROC_MAPDEBUG, &map, sizeof (map), 0);
522 if (err != EOK)
523 continue;
524
525 memset (&printme, 0, sizeof printme);
526 printme.dev = mapinfo_p->dev;
527 printme.ino = mapinfo_p->ino;
528 printme.text.addr = mapinfo_p->vaddr;
529 printme.text.size = mapinfo_p->size;
530 printme.text.flags = mapinfo_p->flags;
531 printme.text.offset = mapinfo_p->offset;
532 printme.text.debug_vaddr = map.info.vaddr;
533 strcpy (printme.name, map.info.path);
534
535 /* Check for matching data. */
536 for (mapinfo_p2 = mapinfos, j = 0; j < num; j++, mapinfo_p2++)
537 {
538 if (mapinfo_p2->vaddr != mapinfo_p->vaddr
539 && mapinfo_p2->ino == mapinfo_p->ino
540 && mapinfo_p2->dev == mapinfo_p->dev)
541 {
542 map.info.vaddr = mapinfo_p2->vaddr;
543 err =
544 devctl (ctl_fd, DCMD_PROC_MAPDEBUG, &map, sizeof (map), 0);
545 if (err != EOK)
546 continue;
547
548 if (strcmp (map.info.path, printme.name))
549 continue;
550
551 /* Lower debug_vaddr is always text, if nessessary, swap. */
552 if ((int) map.info.vaddr < (int) printme.text.debug_vaddr)
553 {
554 memcpy (&(printme.data), &(printme.text),
555 sizeof (printme.data));
556 printme.text.addr = mapinfo_p2->vaddr;
557 printme.text.size = mapinfo_p2->size;
558 printme.text.flags = mapinfo_p2->flags;
559 printme.text.offset = mapinfo_p2->offset;
560 printme.text.debug_vaddr = map.info.vaddr;
561 }
562 else
563 {
564 printme.data.addr = mapinfo_p2->vaddr;
565 printme.data.size = mapinfo_p2->size;
566 printme.data.flags = mapinfo_p2->flags;
567 printme.data.offset = mapinfo_p2->offset;
568 printme.data.debug_vaddr = map.info.vaddr;
569 }
570 mapinfo_p2->ino = 0;
571 }
572 }
573 mapinfo_p->ino = 0;
574
575 printf_filtered ("%s\n", printme.name);
576 printf_filtered ("\ttext=%08x bytes @ 0x%08x\n", printme.text.size,
577 printme.text.addr);
578 printf_filtered ("\t\tflags=%08x\n", printme.text.flags);
579 printf_filtered ("\t\tdebug=%08x\n", printme.text.debug_vaddr);
580 printf_filtered ("\t\toffset=%016llx\n", printme.text.offset);
581 if (printme.data.size)
582 {
583 printf_filtered ("\tdata=%08x bytes @ 0x%08x\n", printme.data.size,
584 printme.data.addr);
585 printf_filtered ("\t\tflags=%08x\n", printme.data.flags);
586 printf_filtered ("\t\tdebug=%08x\n", printme.data.debug_vaddr);
587 printf_filtered ("\t\toffset=%016llx\n", printme.data.offset);
588 }
589 printf_filtered ("\tdev=0x%x\n", printme.dev);
590 printf_filtered ("\tino=0x%x\n", (unsigned int) printme.ino);
591 }
592 xfree (mapinfos);
593 return;
594}
595
596/* Print status information about what we're accessing. */
597static void
598procfs_files_info (struct target_ops *ignore)
599{
181e7f93
PA
600 struct inferior *inf = current_inferior ();
601
61bb466e 602 printf_unfiltered ("\tUsing the running image of %s %s via %s.\n",
3fdfcbf1 603 inf->attach_flag ? "attached" : "child",
61bb466e
KW
604 target_pid_to_str (inferior_ptid), nto_procfs_path);
605}
606
607/* Mark our target-struct as eligible for stray "run" and "attach" commands. */
608static int
5483d879 609procfs_can_run (void)
61bb466e
KW
610{
611 return 1;
612}
613
614/* Attach to process PID, then initialize for debugging it. */
615static void
136d6dae 616procfs_attach (struct target_ops *ops, char *args, int from_tty)
61bb466e
KW
617{
618 char *exec_file;
619 int pid;
181e7f93 620 struct inferior *inf;
61bb466e
KW
621
622 if (!args)
e2e0b3e5 623 error_no_arg (_("process-id to attach"));
61bb466e
KW
624
625 pid = atoi (args);
626
627 if (pid == getpid ())
8a3fe4f8 628 error (_("Attaching GDB to itself is not a good idea..."));
61bb466e
KW
629
630 if (from_tty)
631 {
632 exec_file = (char *) get_exec_file (0);
633
634 if (exec_file)
635 printf_unfiltered ("Attaching to program `%s', %s\n", exec_file,
636 target_pid_to_str (pid_to_ptid (pid)));
637 else
638 printf_unfiltered ("Attaching to %s\n",
639 target_pid_to_str (pid_to_ptid (pid)));
640
641 gdb_flush (gdb_stdout);
642 }
643 inferior_ptid = do_attach (pid_to_ptid (pid));
6c95b8df
PA
644 inf = current_inferior ();
645 inferior_appeared (inf, pid);
181e7f93 646 inf->attach_flag = 1;
7f9f62ba 647
28439f5e 648 push_target (ops);
7f9f62ba 649
28439f5e 650 procfs_find_new_threads (ops);
61bb466e
KW
651}
652
653static void
654procfs_post_attach (pid_t pid)
655{
61bb466e 656 if (exec_bfd)
268a4a75 657 solib_create_inferior_hook (0);
61bb466e
KW
658}
659
660static ptid_t
661do_attach (ptid_t ptid)
662{
663 procfs_status status;
664 struct sigevent event;
dc5dd1eb 665 char path[PATH_MAX];
61bb466e 666
dc5dd1eb 667 snprintf (path, PATH_MAX - 1, "%s/%d/as", nto_procfs_path, PIDGET (ptid));
61bb466e
KW
668 ctl_fd = open (path, O_RDWR);
669 if (ctl_fd == -1)
8a3fe4f8 670 error (_("Couldn't open proc file %s, error %d (%s)"), path, errno,
dc5dd1eb 671 safe_strerror (errno));
61bb466e 672 if (devctl (ctl_fd, DCMD_PROC_STOP, &status, sizeof (status), 0) != EOK)
8a3fe4f8 673 error (_("Couldn't stop process"));
61bb466e
KW
674
675 /* Define a sigevent for process stopped notification. */
676 event.sigev_notify = SIGEV_SIGNAL_THREAD;
677 event.sigev_signo = SIGUSR1;
678 event.sigev_code = 0;
679 event.sigev_value.sival_ptr = NULL;
680 event.sigev_priority = -1;
681 devctl (ctl_fd, DCMD_PROC_EVENT, &event, sizeof (event), 0);
682
683 if (devctl (ctl_fd, DCMD_PROC_STATUS, &status, sizeof (status), 0) == EOK
684 && status.flags & _DEBUG_FLAG_STOPPED)
d737fd7f 685 SignalKill (nto_node (), PIDGET (ptid), 0, SIGCONT, 0, 0);
61bb466e 686 nto_init_solib_absolute_prefix ();
103fd00d 687 return ptid_build (PIDGET (ptid), 0, status.tid);
61bb466e
KW
688}
689
690/* Ask the user what to do when an interrupt is received. */
691static void
dc5dd1eb 692interrupt_query (void)
61bb466e
KW
693{
694 target_terminal_ours ();
695
9e2f0ad4
HZ
696 if (query (_("Interrupted while waiting for the program.\n\
697Give up (and stop debugging it)? ")))
61bb466e
KW
698 {
699 target_mourn_inferior ();
315a522e 700 deprecated_throw_reason (RETURN_QUIT);
61bb466e
KW
701 }
702
703 target_terminal_inferior ();
704}
705
706/* The user typed ^C twice. */
707static void
708nto_interrupt_twice (int signo)
709{
710 signal (signo, ofunc);
711 interrupt_query ();
712 signal (signo, nto_interrupt_twice);
713}
714
715static void
716nto_interrupt (int signo)
717{
718 /* If this doesn't work, try more severe steps. */
719 signal (signo, nto_interrupt_twice);
720
f9c72d52 721 target_stop (inferior_ptid);
61bb466e
KW
722}
723
724static ptid_t
117de6a9 725procfs_wait (struct target_ops *ops,
47608cb1 726 ptid_t ptid, struct target_waitstatus *ourstatus, int options)
61bb466e
KW
727{
728 sigset_t set;
729 siginfo_t info;
730 procfs_status status;
731 static int exit_signo = 0; /* To track signals that cause termination. */
732
733 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
734
735 if (ptid_equal (inferior_ptid, null_ptid))
736 {
737 ourstatus->kind = TARGET_WAITKIND_STOPPED;
738 ourstatus->value.sig = TARGET_SIGNAL_0;
739 exit_signo = 0;
740 return null_ptid;
741 }
742
743 sigemptyset (&set);
744 sigaddset (&set, SIGUSR1);
745
746 devctl (ctl_fd, DCMD_PROC_STATUS, &status, sizeof (status), 0);
747 while (!(status.flags & _DEBUG_FLAG_ISTOP))
748 {
749 ofunc = (void (*)()) signal (SIGINT, nto_interrupt);
750 sigwaitinfo (&set, &info);
751 signal (SIGINT, ofunc);
752 devctl (ctl_fd, DCMD_PROC_STATUS, &status, sizeof (status), 0);
753 }
754
755 if (status.flags & _DEBUG_FLAG_SSTEP)
756 {
757 ourstatus->kind = TARGET_WAITKIND_STOPPED;
758 ourstatus->value.sig = TARGET_SIGNAL_TRAP;
759 }
760 /* Was it a breakpoint? */
761 else if (status.flags & _DEBUG_FLAG_TRACE)
762 {
763 ourstatus->kind = TARGET_WAITKIND_STOPPED;
764 ourstatus->value.sig = TARGET_SIGNAL_TRAP;
765 }
766 else if (status.flags & _DEBUG_FLAG_ISTOP)
767 {
768 switch (status.why)
769 {
770 case _DEBUG_WHY_SIGNALLED:
771 ourstatus->kind = TARGET_WAITKIND_STOPPED;
772 ourstatus->value.sig =
773 target_signal_from_host (status.info.si_signo);
774 exit_signo = 0;
775 break;
776 case _DEBUG_WHY_FAULTED:
777 ourstatus->kind = TARGET_WAITKIND_STOPPED;
778 if (status.info.si_signo == SIGTRAP)
779 {
780 ourstatus->value.sig = 0;
781 exit_signo = 0;
782 }
783 else
784 {
785 ourstatus->value.sig =
786 target_signal_from_host (status.info.si_signo);
787 exit_signo = ourstatus->value.sig;
788 }
789 break;
790
791 case _DEBUG_WHY_TERMINATED:
792 {
793 int waitval = 0;
794
795 waitpid (PIDGET (inferior_ptid), &waitval, WNOHANG);
796 if (exit_signo)
797 {
798 /* Abnormal death. */
799 ourstatus->kind = TARGET_WAITKIND_SIGNALLED;
800 ourstatus->value.sig = exit_signo;
801 }
802 else
803 {
804 /* Normal death. */
805 ourstatus->kind = TARGET_WAITKIND_EXITED;
806 ourstatus->value.integer = WEXITSTATUS (waitval);
807 }
808 exit_signo = 0;
809 break;
810 }
811
812 case _DEBUG_WHY_REQUESTED:
813 /* We are assuming a requested stop is due to a SIGINT. */
814 ourstatus->kind = TARGET_WAITKIND_STOPPED;
815 ourstatus->value.sig = TARGET_SIGNAL_INT;
816 exit_signo = 0;
817 break;
818 }
819 }
820
a6a7f2a5 821 return ptid_build (status.pid, 0, status.tid);
61bb466e
KW
822}
823
824/* Read the current values of the inferior's registers, both the
825 general register set and floating point registers (if supported)
826 and update gdb's idea of their current values. */
827static void
28439f5e
PA
828procfs_fetch_registers (struct target_ops *ops,
829 struct regcache *regcache, int regno)
61bb466e
KW
830{
831 union
832 {
833 procfs_greg greg;
834 procfs_fpreg fpreg;
835 procfs_altreg altreg;
836 }
837 reg;
838 int regsize;
839
840 procfs_set_thread (inferior_ptid);
841 if (devctl (ctl_fd, DCMD_PROC_GETGREG, &reg, sizeof (reg), &regsize) == EOK)
56be3814 842 nto_supply_gregset (regcache, (char *) &reg.greg);
61bb466e
KW
843 if (devctl (ctl_fd, DCMD_PROC_GETFPREG, &reg, sizeof (reg), &regsize)
844 == EOK)
56be3814 845 nto_supply_fpregset (regcache, (char *) &reg.fpreg);
61bb466e
KW
846 if (devctl (ctl_fd, DCMD_PROC_GETALTREG, &reg, sizeof (reg), &regsize)
847 == EOK)
56be3814 848 nto_supply_altregset (regcache, (char *) &reg.altreg);
61bb466e
KW
849}
850
851/* Copy LEN bytes to/from inferior's memory starting at MEMADDR
852 from/to debugger memory starting at MYADDR. Copy from inferior
853 if DOWRITE is zero or to inferior if DOWRITE is nonzero.
854
855 Returns the length copied, which is either the LEN argument or
856 zero. This xfer function does not do partial moves, since procfs_ops
857 doesn't allow memory operations to cross below us in the target stack
858 anyway. */
859static int
14ef7606 860procfs_xfer_memory (CORE_ADDR memaddr, gdb_byte *myaddr, int len, int dowrite,
61bb466e
KW
861 struct mem_attrib *attrib, struct target_ops *target)
862{
863 int nbytes = 0;
864
865 if (lseek (ctl_fd, (off_t) memaddr, SEEK_SET) == (off_t) memaddr)
866 {
867 if (dowrite)
868 nbytes = write (ctl_fd, myaddr, len);
869 else
870 nbytes = read (ctl_fd, myaddr, len);
871 if (nbytes < 0)
872 nbytes = 0;
873 }
874 return (nbytes);
875}
876
877/* Take a program previously attached to and detaches it.
878 The program resumes execution and will no longer stop
879 on signals, etc. We'd better not have left any breakpoints
880 in the program or it'll die when it hits one. */
881static void
136d6dae 882procfs_detach (struct target_ops *ops, char *args, int from_tty)
61bb466e
KW
883{
884 int siggnal = 0;
7f9f62ba 885 int pid;
61bb466e
KW
886
887 if (from_tty)
888 {
889 char *exec_file = get_exec_file (0);
890 if (exec_file == 0)
891 exec_file = "";
892 printf_unfiltered ("Detaching from program: %s %s\n",
893 exec_file, target_pid_to_str (inferior_ptid));
894 gdb_flush (gdb_stdout);
895 }
896 if (args)
897 siggnal = atoi (args);
898
899 if (siggnal)
d737fd7f 900 SignalKill (nto_node (), PIDGET (inferior_ptid), 0, siggnal, 0, 0);
61bb466e
KW
901
902 close (ctl_fd);
903 ctl_fd = -1;
7f9f62ba
PA
904
905 pid = ptid_get_pid (inferior_ptid);
61bb466e 906 inferior_ptid = null_ptid;
7f9f62ba
PA
907 detach_inferior (pid);
908 init_thread_list ();
61bb466e
KW
909 unpush_target (&procfs_ops); /* Pop out of handling an inferior. */
910}
911
912static int
913procfs_breakpoint (CORE_ADDR addr, int type, int size)
914{
915 procfs_break brk;
916
917 brk.type = type;
918 brk.addr = addr;
919 brk.size = size;
920 errno = devctl (ctl_fd, DCMD_PROC_BREAK, &brk, sizeof (brk), 0);
921 if (errno != EOK)
922 return 1;
923 return 0;
924}
925
926static int
a6d9a66e
UW
927procfs_insert_breakpoint (struct gdbarch *gdbarch,
928 struct bp_target_info *bp_tgt)
61bb466e 929{
8181d85f 930 return procfs_breakpoint (bp_tgt->placed_address, _DEBUG_BREAK_EXEC, 0);
61bb466e
KW
931}
932
933static int
a6d9a66e
UW
934procfs_remove_breakpoint (struct gdbarch *gdbarch,
935 struct bp_target_info *bp_tgt)
61bb466e 936{
8181d85f 937 return procfs_breakpoint (bp_tgt->placed_address, _DEBUG_BREAK_EXEC, -1);
61bb466e
KW
938}
939
940static int
a6d9a66e
UW
941procfs_insert_hw_breakpoint (struct gdbarch *gdbarch,
942 struct bp_target_info *bp_tgt)
61bb466e 943{
8181d85f
DJ
944 return procfs_breakpoint (bp_tgt->placed_address,
945 _DEBUG_BREAK_EXEC | _DEBUG_BREAK_HW, 0);
61bb466e
KW
946}
947
948static int
a6d9a66e
UW
949procfs_remove_hw_breakpoint (struct gdbarch *gdbarch,
950 struct bp_target_info *bp_tgt)
61bb466e 951{
8181d85f
DJ
952 return procfs_breakpoint (bp_tgt->placed_address,
953 _DEBUG_BREAK_EXEC | _DEBUG_BREAK_HW, -1);
61bb466e
KW
954}
955
956static void
28439f5e
PA
957procfs_resume (struct target_ops *ops,
958 ptid_t ptid, int step, enum target_signal signo)
61bb466e
KW
959{
960 int signal_to_pass;
961 procfs_status status;
14ef7606 962 sigset_t *run_fault = (sigset_t *) (void *) &run.fault;
61bb466e
KW
963
964 if (ptid_equal (inferior_ptid, null_ptid))
965 return;
966
967 procfs_set_thread (ptid_equal (ptid, minus_one_ptid) ? inferior_ptid :
968 ptid);
969
970 run.flags = _DEBUG_RUN_FAULT | _DEBUG_RUN_TRACE;
971 if (step)
972 run.flags |= _DEBUG_RUN_STEP;
973
14ef7606
AR
974 sigemptyset (run_fault);
975 sigaddset (run_fault, FLTBPT);
976 sigaddset (run_fault, FLTTRACE);
977 sigaddset (run_fault, FLTILL);
978 sigaddset (run_fault, FLTPRIV);
979 sigaddset (run_fault, FLTBOUNDS);
980 sigaddset (run_fault, FLTIOVF);
981 sigaddset (run_fault, FLTIZDIV);
982 sigaddset (run_fault, FLTFPE);
61bb466e 983 /* Peter V will be changing this at some point. */
14ef7606 984 sigaddset (run_fault, FLTPAGE);
61bb466e
KW
985
986 run.flags |= _DEBUG_RUN_ARM;
987
988 sigemptyset (&run.trace);
989 notice_signals ();
990 signal_to_pass = target_signal_to_host (signo);
991
992 if (signal_to_pass)
993 {
994 devctl (ctl_fd, DCMD_PROC_STATUS, &status, sizeof (status), 0);
995 signal_to_pass = target_signal_to_host (signo);
996 if (status.why & (_DEBUG_WHY_SIGNALLED | _DEBUG_WHY_FAULTED))
997 {
998 if (signal_to_pass != status.info.si_signo)
999 {
d737fd7f
KW
1000 SignalKill (nto_node (), PIDGET (inferior_ptid), 0,
1001 signal_to_pass, 0, 0);
61bb466e
KW
1002 run.flags |= _DEBUG_RUN_CLRFLT | _DEBUG_RUN_CLRSIG;
1003 }
1004 else /* Let it kill the program without telling us. */
1005 sigdelset (&run.trace, signal_to_pass);
1006 }
1007 }
1008 else
1009 run.flags |= _DEBUG_RUN_CLRSIG | _DEBUG_RUN_CLRFLT;
1010
1011 errno = devctl (ctl_fd, DCMD_PROC_RUN, &run, sizeof (run), 0);
1012 if (errno != EOK)
1013 {
1014 perror ("run error!\n");
1015 return;
1016 }
1017}
1018
1019static void
136d6dae 1020procfs_mourn_inferior (struct target_ops *ops)
61bb466e
KW
1021{
1022 if (!ptid_equal (inferior_ptid, null_ptid))
1023 {
d737fd7f 1024 SignalKill (nto_node (), PIDGET (inferior_ptid), 0, SIGKILL, 0, 0);
61bb466e
KW
1025 close (ctl_fd);
1026 }
1027 inferior_ptid = null_ptid;
1028 init_thread_list ();
1029 unpush_target (&procfs_ops);
1030 generic_mourn_inferior ();
61bb466e
KW
1031}
1032
1033/* This function breaks up an argument string into an argument
1034 vector suitable for passing to execvp().
1035 E.g., on "run a b c d" this routine would get as input
1036 the string "a b c d", and as output it would fill in argv with
1037 the four arguments "a", "b", "c", "d". The only additional
1038 functionality is simple quoting. The gdb command:
1039 run a "b c d" f
1040 will fill in argv with the three args "a", "b c d", "e". */
1041static void
1042breakup_args (char *scratch, char **argv)
1043{
1044 char *pp, *cp = scratch;
1045 char quoting = 0;
1046
1047 for (;;)
1048 {
1049 /* Scan past leading separators. */
1050 quoting = 0;
1051 while (*cp == ' ' || *cp == '\t' || *cp == '\n')
1052 cp++;
1053
1054 /* Break if at end of string. */
1055 if (*cp == '\0')
1056 break;
1057
1058 /* Take an arg. */
1059 if (*cp == '"')
1060 {
1061 cp++;
1062 quoting = strchr (cp, '"') ? 1 : 0;
1063 }
1064
1065 *argv++ = cp;
1066
1067 /* Scan for next arg separator. */
1068 pp = cp;
1069 if (quoting)
1070 cp = strchr (pp, '"');
1071 if ((cp == NULL) || (!quoting))
1072 cp = strchr (pp, ' ');
1073 if (cp == NULL)
1074 cp = strchr (pp, '\t');
1075 if (cp == NULL)
1076 cp = strchr (pp, '\n');
1077
1078 /* No separators => end of string => break. */
1079 if (cp == NULL)
1080 {
1081 pp = cp;
1082 break;
1083 }
1084
1085 /* Replace the separator with a terminator. */
1086 *cp++ = '\0';
1087 }
1088
1089 /* Execv requires a null-terminated arg vector. */
1090 *argv = NULL;
1091}
1092
1093static void
136d6dae
VP
1094procfs_create_inferior (struct target_ops *ops, char *exec_file,
1095 char *allargs, char **env, int from_tty)
61bb466e
KW
1096{
1097 struct inheritance inherit;
1098 pid_t pid;
1099 int flags, errn;
1100 char **argv, *args;
3cb3b8df 1101 const char *in = "", *out = "", *err = "";
61bb466e
KW
1102 int fd, fds[3];
1103 sigset_t set;
3cb3b8df 1104 const char *inferior_io_terminal = get_inferior_io_terminal ();
3fdfcbf1 1105 struct inferior *inf;
61bb466e
KW
1106
1107 argv = xmalloc (((strlen (allargs) + 1) / (unsigned) 2 + 2) *
1108 sizeof (*argv));
1109 argv[0] = get_exec_file (1);
1110 if (!argv[0])
1111 {
1112 if (exec_file)
1113 argv[0] = exec_file;
1114 else
1115 return;
1116 }
1117
1118 args = xstrdup (allargs);
1119 breakup_args (args, exec_file ? &argv[1] : &argv[0]);
1120
1121 argv = nto_parse_redirection (argv, &in, &out, &err);
1122
1123 fds[0] = STDIN_FILENO;
1124 fds[1] = STDOUT_FILENO;
1125 fds[2] = STDERR_FILENO;
1126
1127 /* If the user specified I/O via gdb's --tty= arg, use it, but only
1128 if the i/o is not also being specified via redirection. */
1129 if (inferior_io_terminal)
1130 {
1131 if (!in[0])
1132 in = inferior_io_terminal;
1133 if (!out[0])
1134 out = inferior_io_terminal;
1135 if (!err[0])
1136 err = inferior_io_terminal;
1137 }
1138
1139 if (in[0])
1140 {
1141 fd = open (in, O_RDONLY);
1142 if (fd == -1)
1143 perror (in);
1144 else
1145 fds[0] = fd;
1146 }
1147 if (out[0])
1148 {
1149 fd = open (out, O_WRONLY);
1150 if (fd == -1)
1151 perror (out);
1152 else
1153 fds[1] = fd;
1154 }
1155 if (err[0])
1156 {
1157 fd = open (err, O_WRONLY);
1158 if (fd == -1)
1159 perror (err);
1160 else
1161 fds[2] = fd;
1162 }
1163
1164 /* Clear any pending SIGUSR1's but keep the behavior the same. */
1165 signal (SIGUSR1, signal (SIGUSR1, SIG_IGN));
1166
1167 sigemptyset (&set);
1168 sigaddset (&set, SIGUSR1);
1169 sigprocmask (SIG_UNBLOCK, &set, NULL);
1170
1171 memset (&inherit, 0, sizeof (inherit));
1172
1173 if (ND_NODE_CMP (nto_procfs_node, ND_LOCAL_NODE) != 0)
1174 {
d737fd7f 1175 inherit.nd = nto_node ();
61bb466e
KW
1176 inherit.flags |= SPAWN_SETND;
1177 inherit.flags &= ~SPAWN_EXEC;
1178 }
1179 inherit.flags |= SPAWN_SETGROUP | SPAWN_HOLD;
1180 inherit.pgroup = SPAWN_NEWPGROUP;
1181 pid = spawnp (argv[0], 3, fds, &inherit, argv,
1182 ND_NODE_CMP (nto_procfs_node, ND_LOCAL_NODE) == 0 ? env : 0);
1183 xfree (args);
1184
1185 sigprocmask (SIG_BLOCK, &set, NULL);
1186
1187 if (pid == -1)
8a3fe4f8 1188 error (_("Error spawning %s: %d (%s)"), argv[0], errno,
d737fd7f 1189 safe_strerror (errno));
61bb466e
KW
1190
1191 if (fds[0] != STDIN_FILENO)
1192 close (fds[0]);
1193 if (fds[1] != STDOUT_FILENO)
1194 close (fds[1]);
1195 if (fds[2] != STDERR_FILENO)
1196 close (fds[2]);
1197
1198 inferior_ptid = do_attach (pid_to_ptid (pid));
28439f5e 1199 procfs_find_new_threads (ops);
61bb466e 1200
6c95b8df
PA
1201 inf = current_inferior ();
1202 inferior_appeared (inf, pid);
3fdfcbf1 1203 inf->attach_flag = 0;
7f9f62ba 1204
61bb466e
KW
1205 flags = _DEBUG_FLAG_KLC; /* Kill-on-Last-Close flag. */
1206 errn = devctl (ctl_fd, DCMD_PROC_SET_FLAG, &flags, sizeof (flags), 0);
1207 if (errn != EOK)
1208 {
1209 /* FIXME: expected warning? */
1210 /* warning( "Failed to set Kill-on-Last-Close flag: errno = %d(%s)\n",
1211 errn, strerror(errn) ); */
1212 }
28439f5e 1213 push_target (ops);
61bb466e
KW
1214 target_terminal_init ();
1215
61bb466e
KW
1216 if (exec_bfd != NULL
1217 || (symfile_objfile != NULL && symfile_objfile->obfd != NULL))
268a4a75 1218 solib_create_inferior_hook (0);
61bb466e
KW
1219}
1220
1221static void
f9c72d52 1222procfs_stop (ptid_t ptid)
61bb466e
KW
1223{
1224 devctl (ctl_fd, DCMD_PROC_STOP, NULL, 0, 0);
1225}
1226
1227static void
7d85a9c0 1228procfs_kill_inferior (struct target_ops *ops)
61bb466e
KW
1229{
1230 target_mourn_inferior ();
1231}
1232
1233/* Store register REGNO, or all registers if REGNO == -1, from the contents
1234 of REGISTERS. */
1235static void
316f2060 1236procfs_prepare_to_store (struct regcache *regcache)
61bb466e
KW
1237{
1238}
1239
1240/* Fill buf with regset and return devctl cmd to do the setting. Return
1241 -1 if we fail to get the regset. Store size of regset in regsize. */
1242static int
1243get_regset (int regset, char *buf, int bufsize, int *regsize)
1244{
1245 int dev_get, dev_set;
1246 switch (regset)
1247 {
1248 case NTO_REG_GENERAL:
1249 dev_get = DCMD_PROC_GETGREG;
1250 dev_set = DCMD_PROC_SETGREG;
1251 break;
1252
1253 case NTO_REG_FLOAT:
1254 dev_get = DCMD_PROC_GETFPREG;
1255 dev_set = DCMD_PROC_SETFPREG;
1256 break;
1257
1258 case NTO_REG_ALT:
1259 dev_get = DCMD_PROC_GETALTREG;
1260 dev_set = DCMD_PROC_SETALTREG;
1261 break;
1262
1263 case NTO_REG_SYSTEM:
1264 default:
1265 return -1;
1266 }
97c44116 1267 if (devctl (ctl_fd, dev_get, buf, bufsize, regsize) != EOK)
61bb466e
KW
1268 return -1;
1269
1270 return dev_set;
1271}
1272
1273void
28439f5e
PA
1274procfs_store_registers (struct target_ops *ops,
1275 struct regcache *regcache, int regno)
61bb466e
KW
1276{
1277 union
1278 {
1279 procfs_greg greg;
1280 procfs_fpreg fpreg;
1281 procfs_altreg altreg;
1282 }
1283 reg;
1284 unsigned off;
1285 int len, regset, regsize, dev_set, err;
1286 char *data;
1287
1288 if (ptid_equal (inferior_ptid, null_ptid))
1289 return;
1290 procfs_set_thread (inferior_ptid);
1291
1292 if (regno == -1)
1293 {
1294 for (regset = NTO_REG_GENERAL; regset < NTO_REG_END; regset++)
1295 {
1296 dev_set = get_regset (regset, (char *) &reg,
1297 sizeof (reg), &regsize);
1298 if (dev_set == -1)
1299 continue;
1300
56be3814 1301 if (nto_regset_fill (regcache, regset, (char *) &reg) == -1)
61bb466e
KW
1302 continue;
1303
1304 err = devctl (ctl_fd, dev_set, &reg, regsize, 0);
1305 if (err != EOK)
1306 fprintf_unfiltered (gdb_stderr,
1307 "Warning unable to write regset %d: %s\n",
dc5dd1eb 1308 regno, safe_strerror (err));
61bb466e
KW
1309 }
1310 }
1311 else
1312 {
1313 regset = nto_regset_id (regno);
1314 if (regset == -1)
1315 return;
1316
1317 dev_set = get_regset (regset, (char *) &reg, sizeof (reg), &regsize);
1318 if (dev_set == -1)
1319 return;
1320
60441ab9
UW
1321 len = nto_register_area (get_regcache_arch (regcache),
1322 regno, regset, &off);
61bb466e
KW
1323
1324 if (len < 1)
1325 return;
1326
56be3814 1327 regcache_raw_collect (regcache, regno, (char *) &reg + off);
61bb466e
KW
1328
1329 err = devctl (ctl_fd, dev_set, &reg, regsize, 0);
1330 if (err != EOK)
1331 fprintf_unfiltered (gdb_stderr,
1332 "Warning unable to write regset %d: %s\n", regno,
dc5dd1eb 1333 safe_strerror (err));
61bb466e
KW
1334 }
1335}
1336
1337static void
1338notice_signals (void)
1339{
1340 int signo;
1341
1342 for (signo = 1; signo < NSIG; signo++)
1343 {
1344 if (signal_stop_state (target_signal_from_host (signo)) == 0
1345 && signal_print_state (target_signal_from_host (signo)) == 0
1346 && signal_pass_state (target_signal_from_host (signo)) == 1)
1347 sigdelset (&run.trace, signo);
1348 else
1349 sigaddset (&run.trace, signo);
1350 }
1351}
1352
1353/* When the user changes the state of gdb's signal handling via the
1354 "handle" command, this function gets called to see if any change
1355 in the /proc interface is required. It is also called internally
1356 by other /proc interface functions to initialize the state of
1357 the traced signal set. */
1358static void
1359procfs_notice_signals (ptid_t ptid)
1360{
1361 sigemptyset (&run.trace);
1362 notice_signals ();
1363}
1364
1365static struct tidinfo *
1366procfs_thread_info (pid_t pid, short tid)
1367{
1368/* NYI */
1369 return NULL;
1370}
1371
1372char *
117de6a9 1373procfs_pid_to_str (struct target_ops *ops, ptid_t ptid)
61bb466e
KW
1374{
1375 static char buf[1024];
1376 int pid, tid, n;
1377 struct tidinfo *tip;
1378
1379 pid = ptid_get_pid (ptid);
1380 tid = ptid_get_tid (ptid);
1381
dc5dd1eb 1382 n = snprintf (buf, 1023, "process %d", pid);
61bb466e
KW
1383
1384#if 0 /* NYI */
1385 tip = procfs_thread_info (pid, tid);
1386 if (tip != NULL)
dc5dd1eb 1387 snprintf (&buf[n], 1023, " (state = 0x%02x)", tip->state);
61bb466e
KW
1388#endif
1389
1390 return buf;
1391}
1392
1393static void
dc5dd1eb 1394init_procfs_ops (void)
61bb466e
KW
1395{
1396 procfs_ops.to_shortname = "procfs";
1397 procfs_ops.to_longname = "QNX Neutrino procfs child process";
1398 procfs_ops.to_doc =
1399 "QNX Neutrino procfs child process (started by the \"run\" command).\n\
1400 target procfs <node>";
1401 procfs_ops.to_open = procfs_open;
1402 procfs_ops.to_attach = procfs_attach;
1403 procfs_ops.to_post_attach = procfs_post_attach;
1404 procfs_ops.to_detach = procfs_detach;
1405 procfs_ops.to_resume = procfs_resume;
1406 procfs_ops.to_wait = procfs_wait;
1407 procfs_ops.to_fetch_registers = procfs_fetch_registers;
1408 procfs_ops.to_store_registers = procfs_store_registers;
1409 procfs_ops.to_prepare_to_store = procfs_prepare_to_store;
c8e73a31 1410 procfs_ops.deprecated_xfer_memory = procfs_xfer_memory;
61bb466e
KW
1411 procfs_ops.to_files_info = procfs_files_info;
1412 procfs_ops.to_insert_breakpoint = procfs_insert_breakpoint;
1413 procfs_ops.to_remove_breakpoint = procfs_remove_breakpoint;
1414 procfs_ops.to_can_use_hw_breakpoint = procfs_can_use_hw_breakpoint;
1415 procfs_ops.to_insert_hw_breakpoint = procfs_insert_hw_breakpoint;
1416 procfs_ops.to_remove_hw_breakpoint = procfs_remove_breakpoint;
1417 procfs_ops.to_insert_watchpoint = procfs_insert_hw_watchpoint;
1418 procfs_ops.to_remove_watchpoint = procfs_remove_hw_watchpoint;
1419 procfs_ops.to_stopped_by_watchpoint = procfs_stopped_by_watchpoint;
1420 procfs_ops.to_terminal_init = terminal_init_inferior;
1421 procfs_ops.to_terminal_inferior = terminal_inferior;
1422 procfs_ops.to_terminal_ours_for_output = terminal_ours_for_output;
1423 procfs_ops.to_terminal_ours = terminal_ours;
1424 procfs_ops.to_terminal_info = child_terminal_info;
1425 procfs_ops.to_kill = procfs_kill_inferior;
1426 procfs_ops.to_create_inferior = procfs_create_inferior;
1427 procfs_ops.to_mourn_inferior = procfs_mourn_inferior;
1428 procfs_ops.to_can_run = procfs_can_run;
1429 procfs_ops.to_notice_signals = procfs_notice_signals;
1430 procfs_ops.to_thread_alive = procfs_thread_alive;
1431 procfs_ops.to_find_new_threads = procfs_find_new_threads;
1432 procfs_ops.to_pid_to_str = procfs_pid_to_str;
1433 procfs_ops.to_stop = procfs_stop;
1434 procfs_ops.to_stratum = process_stratum;
c35b1492
PA
1435 procfs_ops.to_has_all_memory = default_child_has_all_memory;
1436 procfs_ops.to_has_memory = default_child_has_memory;
1437 procfs_ops.to_has_stack = default_child_has_stack;
1438 procfs_ops.to_has_registers = default_child_has_registers;
1439 procfs_ops.to_has_execution = default_child_has_execution;
61bb466e
KW
1440 procfs_ops.to_magic = OPS_MAGIC;
1441 procfs_ops.to_have_continuable_watchpoint = 1;
745a434e 1442 procfs_ops.to_extra_thread_info = nto_extra_thread_info;
61bb466e
KW
1443}
1444
1445#define OSTYPE_NTO 1
1446
1447void
dc5dd1eb 1448_initialize_procfs (void)
61bb466e
KW
1449{
1450 sigset_t set;
1451
1452 init_procfs_ops ();
1453 add_target (&procfs_ops);
1454
1455 /* We use SIGUSR1 to gain control after we block waiting for a process.
1456 We use sigwaitevent to wait. */
1457 sigemptyset (&set);
1458 sigaddset (&set, SIGUSR1);
1459 sigprocmask (SIG_BLOCK, &set, NULL);
1460
1461 /* Set up trace and fault sets, as gdb expects them. */
1462 sigemptyset (&run.trace);
61bb466e
KW
1463
1464 /* Stuff some information. */
1465 nto_cpuinfo_flags = SYSPAGE_ENTRY (cpuinfo)->flags;
1466 nto_cpuinfo_valid = 1;
1467
1bedd215
AC
1468 add_info ("pidlist", procfs_pidlist, _("pidlist"));
1469 add_info ("meminfo", procfs_meminfo, _("memory information"));
d737fd7f
KW
1470
1471 nto_is_nto_target = procfs_is_nto_target;
61bb466e
KW
1472}
1473
1474
1475static int
1476procfs_hw_watchpoint (int addr, int len, int type)
1477{
1478 procfs_break brk;
1479
1480 switch (type)
1481 {
1482 case 1: /* Read. */
1483 brk.type = _DEBUG_BREAK_RD;
1484 break;
1485 case 2: /* Read/Write. */
1486 brk.type = _DEBUG_BREAK_RW;
1487 break;
1488 default: /* Modify. */
1489/* FIXME: brk.type = _DEBUG_BREAK_RWM gives EINVAL for some reason. */
1490 brk.type = _DEBUG_BREAK_RW;
1491 }
1492 brk.type |= _DEBUG_BREAK_HW; /* Always ask for HW. */
1493 brk.addr = addr;
1494 brk.size = len;
1495
1496 errno = devctl (ctl_fd, DCMD_PROC_BREAK, &brk, sizeof (brk), 0);
1497 if (errno != EOK)
1498 {
1499 perror ("Failed to set hardware watchpoint");
1500 return -1;
1501 }
1502 return 0;
1503}
1504
1505static int
1506procfs_can_use_hw_breakpoint (int type, int cnt, int othertype)
1507{
1508 return 1;
1509}
1510
1511static int
1512procfs_remove_hw_watchpoint (CORE_ADDR addr, int len, int type)
1513{
1514 return procfs_hw_watchpoint (addr, -1, type);
1515}
1516
1517static int
1518procfs_insert_hw_watchpoint (CORE_ADDR addr, int len, int type)
1519{
1520 return procfs_hw_watchpoint (addr, len, type);
1521}
1522
1523static int
1524procfs_stopped_by_watchpoint (void)
1525{
1526 return 0;
1527}
This page took 0.78286 seconds and 4 git commands to generate.