gdb/testsuite: Bump up `match_max'
[deliverable/binutils-gdb.git] / gdb / nto-procfs.c
CommitLineData
61bb466e 1/* Machine independent support for QNX Neutrino /proc (process file system)
0df8b418 2 for GDB. Written by Colin Burgess at QNX Software Systems Limited.
61bb466e 3
ecd75fc8 4 Copyright (C) 2003-2014 Free Software Foundation, Inc.
61bb466e
KW
5
6 Contributed by QNX Software Systems Ltd.
7
8 This file is part of GDB.
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
a9762ec7 12 the Free Software Foundation; either version 3 of the License, or
61bb466e
KW
13 (at your option) any later version.
14
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
a9762ec7 21 along with this program. If not, see <http://www.gnu.org/licenses/>. */
61bb466e
KW
22
23#include "defs.h"
24
25#include <fcntl.h>
26#include <spawn.h>
27#include <sys/debug.h>
28#include <sys/procfs.h>
29#include <sys/neutrino.h>
30#include <sys/syspage.h>
2978b111 31#include <dirent.h>
61bb466e
KW
32#include <sys/netmgr.h>
33
60250e8b 34#include "exceptions.h"
0e9f083f 35#include <string.h>
61bb466e
KW
36#include "gdbcore.h"
37#include "inferior.h"
38#include "target.h"
39#include "objfiles.h"
40#include "gdbthread.h"
41#include "nto-tdep.h"
42#include "command.h"
43#include "regcache.h"
5ea03926 44#include "solib.h"
ee8e9165 45#include "inf-child.h"
61bb466e
KW
46
47#define NULL_PID 0
48#define _DEBUG_FLAG_TRACE (_DEBUG_FLAG_TRACE_EXEC|_DEBUG_FLAG_TRACE_RD|\
49 _DEBUG_FLAG_TRACE_WR|_DEBUG_FLAG_TRACE_MODIFY)
50
61bb466e
KW
51int ctl_fd;
52
53static void (*ofunc) ();
54
55static procfs_run run;
56
61bb466e
KW
57static ptid_t do_attach (ptid_t ptid);
58
5461485a
TT
59static int procfs_can_use_hw_breakpoint (struct target_ops *self,
60 int, int, int);
61bb466e 61
7bb99c53
TT
62static int procfs_insert_hw_watchpoint (struct target_ops *self,
63 CORE_ADDR addr, int len, int type,
a8f42b45 64 struct expression *cond);
61bb466e 65
11b5219a
TT
66static int procfs_remove_hw_watchpoint (struct target_ops *self,
67 CORE_ADDR addr, int len, int type,
a8f42b45 68 struct expression *cond);
61bb466e 69
6a109b6b 70static int procfs_stopped_by_watchpoint (struct target_ops *ops);
61bb466e 71
6a3cb8e8 72/* These two globals are only ever set in procfs_open_1, but are
61bb466e
KW
73 referenced elsewhere. 'nto_procfs_node' is a flag used to say
74 whether we are local, or we should get the current node descriptor
75 for the remote QNX node. */
76static char nto_procfs_path[PATH_MAX] = { "/proc" };
77static unsigned nto_procfs_node = ND_LOCAL_NODE;
78
79/* Return the current QNX Node, or error out. This is a simple
80 wrapper for the netmgr_strtond() function. The reason this
81 is required is because QNX node descriptors are transient so
82 we have to re-acquire them every time. */
83static unsigned
d737fd7f 84nto_node (void)
61bb466e
KW
85{
86 unsigned node;
87
d737fd7f 88 if (ND_NODE_CMP (nto_procfs_node, ND_LOCAL_NODE) == 0)
61bb466e
KW
89 return ND_LOCAL_NODE;
90
d737fd7f 91 node = netmgr_strtond (nto_procfs_path, 0);
61bb466e 92 if (node == -1)
8a3fe4f8 93 error (_("Lost the QNX node. Debug session probably over."));
61bb466e
KW
94
95 return (node);
96}
97
d737fd7f
KW
98static enum gdb_osabi
99procfs_is_nto_target (bfd *abfd)
100{
101 return GDB_OSABI_QNXNTO;
102}
103
6a3cb8e8
PA
104/* This is called when we call 'target native' or 'target procfs
105 <arg>' from the (gdb) prompt. For QNX6 (nto), the only valid arg
106 will be a QNX node string, eg: "/net/some_node". If arg is not a
107 valid QNX node, we will default to local. */
61bb466e 108static void
6a3cb8e8 109procfs_open_1 (struct target_ops *ops, char *arg, int from_tty)
61bb466e
KW
110{
111 char *nodestr;
112 char *endstr;
113 char buffer[50];
114 int fd, total_size;
115 procfs_sysinfo *sysinfo;
9fe4a216 116 struct cleanup *cleanups;
61bb466e 117
6a3cb8e8
PA
118 /* Offer to kill previous inferiors before opening this target. */
119 target_preopen (from_tty);
120
d737fd7f
KW
121 nto_is_nto_target = procfs_is_nto_target;
122
61bb466e
KW
123 /* Set the default node used for spawning to this one,
124 and only override it if there is a valid arg. */
125
126 nto_procfs_node = ND_LOCAL_NODE;
127 nodestr = arg ? xstrdup (arg) : arg;
128
129 init_thread_list ();
130
131 if (nodestr)
132 {
133 nto_procfs_node = netmgr_strtond (nodestr, &endstr);
134 if (nto_procfs_node == -1)
135 {
136 if (errno == ENOTSUP)
137 printf_filtered ("QNX Net Manager not found.\n");
138 printf_filtered ("Invalid QNX node %s: error %d (%s).\n", nodestr,
dc5dd1eb 139 errno, safe_strerror (errno));
61bb466e
KW
140 xfree (nodestr);
141 nodestr = NULL;
142 nto_procfs_node = ND_LOCAL_NODE;
143 }
144 else if (*endstr)
145 {
146 if (*(endstr - 1) == '/')
147 *(endstr - 1) = 0;
148 else
149 *endstr = 0;
150 }
151 }
d737fd7f
KW
152 snprintf (nto_procfs_path, PATH_MAX - 1, "%s%s", nodestr ? nodestr : "",
153 "/proc");
61bb466e
KW
154 if (nodestr)
155 xfree (nodestr);
156
157 fd = open (nto_procfs_path, O_RDONLY);
158 if (fd == -1)
159 {
160 printf_filtered ("Error opening %s : %d (%s)\n", nto_procfs_path, errno,
dc5dd1eb 161 safe_strerror (errno));
8a3fe4f8 162 error (_("Invalid procfs arg"));
61bb466e 163 }
9fe4a216 164 cleanups = make_cleanup_close (fd);
61bb466e
KW
165
166 sysinfo = (void *) buffer;
167 if (devctl (fd, DCMD_PROC_SYSINFO, sysinfo, sizeof buffer, 0) != EOK)
168 {
169 printf_filtered ("Error getting size: %d (%s)\n", errno,
dc5dd1eb 170 safe_strerror (errno));
8a3fe4f8 171 error (_("Devctl failed."));
61bb466e
KW
172 }
173 else
174 {
175 total_size = sysinfo->total_size;
176 sysinfo = alloca (total_size);
177 if (!sysinfo)
178 {
179 printf_filtered ("Memory error: %d (%s)\n", errno,
dc5dd1eb 180 safe_strerror (errno));
8a3fe4f8 181 error (_("alloca failed."));
61bb466e
KW
182 }
183 else
184 {
185 if (devctl (fd, DCMD_PROC_SYSINFO, sysinfo, total_size, 0) != EOK)
186 {
187 printf_filtered ("Error getting sysinfo: %d (%s)\n", errno,
dc5dd1eb 188 safe_strerror (errno));
8a3fe4f8 189 error (_("Devctl failed."));
61bb466e
KW
190 }
191 else
192 {
193 if (sysinfo->type !=
1143fffb 194 nto_map_arch_to_cputype (gdbarch_bfd_arch_info
f5656ead 195 (target_gdbarch ())->arch_name))
9fe4a216 196 error (_("Invalid target CPU."));
61bb466e
KW
197 }
198 }
199 }
9fe4a216 200 do_cleanups (cleanups);
6a3cb8e8
PA
201
202 inf_child_open_target (ops, arg, from_tty);
61bb466e
KW
203 printf_filtered ("Debugging using %s\n", nto_procfs_path);
204}
205
206static void
207procfs_set_thread (ptid_t ptid)
208{
209 pid_t tid;
210
211 tid = ptid_get_tid (ptid);
212 devctl (ctl_fd, DCMD_PROC_CURTHREAD, &tid, sizeof (tid), 0);
213}
214
215/* Return nonzero if the thread TH is still alive. */
216static int
28439f5e 217procfs_thread_alive (struct target_ops *ops, ptid_t ptid)
61bb466e
KW
218{
219 pid_t tid;
745a434e
AR
220 pid_t pid;
221 procfs_status status;
222 int err;
61bb466e
KW
223
224 tid = ptid_get_tid (ptid);
745a434e
AR
225 pid = ptid_get_pid (ptid);
226
227 if (kill (pid, 0) == -1)
228 return 0;
229
230 status.tid = tid;
231 if ((err = devctl (ctl_fd, DCMD_PROC_TIDSTATUS,
232 &status, sizeof (status), 0)) != EOK)
233 return 0;
234
235 /* Thread is alive or dead but not yet joined,
236 or dead and there is an alive (or dead unjoined) thread with
237 higher tid.
238
239 If the tid is not the same as requested, requested tid is dead. */
240 return (status.tid == tid) && (status.state != STATE_DEAD);
241}
242
243static void
244update_thread_private_data_name (struct thread_info *new_thread,
245 const char *newname)
246{
247 int newnamelen;
248 struct private_thread_info *pti;
249
250 gdb_assert (newname != NULL);
251 gdb_assert (new_thread != NULL);
252 newnamelen = strlen (newname);
253 if (!new_thread->private)
254 {
255 new_thread->private = xmalloc (offsetof (struct private_thread_info,
256 name)
257 + newnamelen + 1);
258 memcpy (new_thread->private->name, newname, newnamelen + 1);
259 }
260 else if (strcmp (newname, new_thread->private->name) != 0)
261 {
262 /* Reallocate if neccessary. */
263 int oldnamelen = strlen (new_thread->private->name);
264
265 if (oldnamelen < newnamelen)
266 new_thread->private = xrealloc (new_thread->private,
267 offsetof (struct private_thread_info,
268 name)
269 + newnamelen + 1);
270 memcpy (new_thread->private->name, newname, newnamelen + 1);
271 }
272}
273
274static void
275update_thread_private_data (struct thread_info *new_thread,
276 pthread_t tid, int state, int flags)
277{
278 struct private_thread_info *pti;
279 procfs_info pidinfo;
280 struct _thread_name *tn;
281 procfs_threadctl tctl;
282
283#if _NTO_VERSION > 630
284 gdb_assert (new_thread != NULL);
285
286 if (devctl (ctl_fd, DCMD_PROC_INFO, &pidinfo,
287 sizeof(pidinfo), 0) != EOK)
288 return;
289
290 memset (&tctl, 0, sizeof (tctl));
291 tctl.cmd = _NTO_TCTL_NAME;
292 tn = (struct _thread_name *) (&tctl.data);
293
294 /* Fetch name for the given thread. */
295 tctl.tid = tid;
296 tn->name_buf_len = sizeof (tctl.data) - sizeof (*tn);
297 tn->new_name_len = -1; /* Getting, not setting. */
298 if (devctl (ctl_fd, DCMD_PROC_THREADCTL, &tctl, sizeof (tctl), NULL) != EOK)
299 tn->name_buf[0] = '\0';
300
301 tn->name_buf[_NTO_THREAD_NAME_MAX] = '\0';
302
303 update_thread_private_data_name (new_thread, tn->name_buf);
304
305 pti = (struct private_thread_info *) new_thread->private;
306 pti->tid = tid;
307 pti->state = state;
308 pti->flags = flags;
309#endif /* _NTO_VERSION */
61bb466e
KW
310}
311
94c74239 312static void
28439f5e 313procfs_find_new_threads (struct target_ops *ops)
61bb466e
KW
314{
315 procfs_status status;
316 pid_t pid;
317 ptid_t ptid;
745a434e
AR
318 pthread_t tid;
319 struct thread_info *new_thread;
61bb466e
KW
320
321 if (ctl_fd == -1)
322 return;
323
324 pid = ptid_get_pid (inferior_ptid);
325
745a434e
AR
326 status.tid = 1;
327
328 for (tid = 1;; ++tid)
61bb466e 329 {
745a434e
AR
330 if (status.tid == tid
331 && (devctl (ctl_fd, DCMD_PROC_TIDSTATUS, &status, sizeof (status), 0)
332 != EOK))
61bb466e 333 break;
745a434e
AR
334 if (status.tid != tid)
335 /* The reason why this would not be equal is that devctl might have
336 returned different tid, meaning the requested tid no longer exists
337 (e.g. thread exited). */
338 continue;
339 ptid = ptid_build (pid, 0, tid);
340 new_thread = find_thread_ptid (ptid);
341 if (!new_thread)
342 new_thread = add_thread (ptid);
343 update_thread_private_data (new_thread, tid, status.state, 0);
344 status.tid++;
61bb466e
KW
345 }
346 return;
347}
348
9fe4a216
TT
349static void
350do_closedir_cleanup (void *dir)
351{
352 closedir (dir);
353}
354
61bb466e
KW
355void
356procfs_pidlist (char *args, int from_tty)
357{
358 DIR *dp = NULL;
359 struct dirent *dirp = NULL;
61bb466e
KW
360 char buf[512];
361 procfs_info *pidinfo = NULL;
362 procfs_debuginfo *info = NULL;
363 procfs_status *status = NULL;
364 pid_t num_threads = 0;
365 pid_t pid;
366 char name[512];
9fe4a216 367 struct cleanup *cleanups;
61bb466e
KW
368
369 dp = opendir (nto_procfs_path);
370 if (dp == NULL)
371 {
dc5dd1eb 372 fprintf_unfiltered (gdb_stderr, "failed to opendir \"%s\" - %d (%s)",
d737fd7f 373 nto_procfs_path, errno, safe_strerror (errno));
61bb466e
KW
374 return;
375 }
376
9fe4a216
TT
377 cleanups = make_cleanup (do_closedir_cleanup, dp);
378
61bb466e
KW
379 /* Start scan at first pid. */
380 rewinddir (dp);
381
382 do
383 {
9fe4a216
TT
384 int fd;
385 struct cleanup *inner_cleanup;
386
61bb466e
KW
387 /* Get the right pid and procfs path for the pid. */
388 do
389 {
390 dirp = readdir (dp);
391 if (dirp == NULL)
392 {
9fe4a216 393 do_cleanups (cleanups);
61bb466e
KW
394 return;
395 }
dc5dd1eb 396 snprintf (buf, 511, "%s/%s/as", nto_procfs_path, dirp->d_name);
61bb466e
KW
397 pid = atoi (dirp->d_name);
398 }
399 while (pid == 0);
400
0df8b418 401 /* Open the procfs path. */
61bb466e
KW
402 fd = open (buf, O_RDONLY);
403 if (fd == -1)
404 {
dc5dd1eb 405 fprintf_unfiltered (gdb_stderr, "failed to open %s - %d (%s)\n",
d737fd7f 406 buf, errno, safe_strerror (errno));
9fe4a216 407 do_cleanups (cleanups);
61bb466e
KW
408 return;
409 }
9fe4a216 410 inner_cleanup = make_cleanup_close (fd);
61bb466e
KW
411
412 pidinfo = (procfs_info *) buf;
413 if (devctl (fd, DCMD_PROC_INFO, pidinfo, sizeof (buf), 0) != EOK)
414 {
dc5dd1eb 415 fprintf_unfiltered (gdb_stderr,
d737fd7f
KW
416 "devctl DCMD_PROC_INFO failed - %d (%s)\n",
417 errno, safe_strerror (errno));
61bb466e
KW
418 break;
419 }
420 num_threads = pidinfo->num_threads;
421
422 info = (procfs_debuginfo *) buf;
423 if (devctl (fd, DCMD_PROC_MAPDEBUG_BASE, info, sizeof (buf), 0) != EOK)
424 strcpy (name, "unavailable");
425 else
426 strcpy (name, info->path);
427
428 /* Collect state info on all the threads. */
429 status = (procfs_status *) buf;
430 for (status->tid = 1; status->tid <= num_threads; status->tid++)
431 {
432 if (devctl (fd, DCMD_PROC_TIDSTATUS, status, sizeof (buf), 0) != EOK
433 && status->tid != 0)
434 break;
435 if (status->tid != 0)
436 printf_filtered ("%s - %d/%d\n", name, pid, status->tid);
437 }
9fe4a216
TT
438
439 do_cleanups (inner_cleanup);
61bb466e
KW
440 }
441 while (dirp != NULL);
442
9fe4a216 443 do_cleanups (cleanups);
61bb466e
KW
444 return;
445}
446
447void
448procfs_meminfo (char *args, int from_tty)
449{
450 procfs_mapinfo *mapinfos = NULL;
451 static int num_mapinfos = 0;
452 procfs_mapinfo *mapinfo_p, *mapinfo_p2;
453 int flags = ~0, err, num, i, j;
454
455 struct
456 {
457 procfs_debuginfo info;
458 char buff[_POSIX_PATH_MAX];
459 } map;
460
461 struct info
462 {
463 unsigned addr;
464 unsigned size;
465 unsigned flags;
466 unsigned debug_vaddr;
467 unsigned long long offset;
468 };
469
470 struct printinfo
471 {
472 unsigned long long ino;
473 unsigned dev;
474 struct info text;
475 struct info data;
476 char name[256];
477 } printme;
478
479 /* Get the number of map entrys. */
480 err = devctl (ctl_fd, DCMD_PROC_MAPINFO, NULL, 0, &num);
481 if (err != EOK)
482 {
d737fd7f
KW
483 printf ("failed devctl num mapinfos - %d (%s)\n", err,
484 safe_strerror (err));
61bb466e
KW
485 return;
486 }
487
488 mapinfos = xmalloc (num * sizeof (procfs_mapinfo));
489
490 num_mapinfos = num;
491 mapinfo_p = mapinfos;
492
493 /* Fill the map entrys. */
494 err = devctl (ctl_fd, DCMD_PROC_MAPINFO, mapinfo_p, num
495 * sizeof (procfs_mapinfo), &num);
496 if (err != EOK)
497 {
5483d879 498 printf ("failed devctl mapinfos - %d (%s)\n", err, safe_strerror (err));
61bb466e
KW
499 xfree (mapinfos);
500 return;
501 }
502
503 num = min (num, num_mapinfos);
504
505 /* Run through the list of mapinfos, and store the data and text info
506 so we can print it at the bottom of the loop. */
507 for (mapinfo_p = mapinfos, i = 0; i < num; i++, mapinfo_p++)
508 {
509 if (!(mapinfo_p->flags & flags))
510 mapinfo_p->ino = 0;
511
512 if (mapinfo_p->ino == 0) /* Already visited. */
513 continue;
514
515 map.info.vaddr = mapinfo_p->vaddr;
516
517 err = devctl (ctl_fd, DCMD_PROC_MAPDEBUG, &map, sizeof (map), 0);
518 if (err != EOK)
519 continue;
520
521 memset (&printme, 0, sizeof printme);
522 printme.dev = mapinfo_p->dev;
523 printme.ino = mapinfo_p->ino;
524 printme.text.addr = mapinfo_p->vaddr;
525 printme.text.size = mapinfo_p->size;
526 printme.text.flags = mapinfo_p->flags;
527 printme.text.offset = mapinfo_p->offset;
528 printme.text.debug_vaddr = map.info.vaddr;
529 strcpy (printme.name, map.info.path);
530
531 /* Check for matching data. */
532 for (mapinfo_p2 = mapinfos, j = 0; j < num; j++, mapinfo_p2++)
533 {
534 if (mapinfo_p2->vaddr != mapinfo_p->vaddr
535 && mapinfo_p2->ino == mapinfo_p->ino
536 && mapinfo_p2->dev == mapinfo_p->dev)
537 {
538 map.info.vaddr = mapinfo_p2->vaddr;
539 err =
540 devctl (ctl_fd, DCMD_PROC_MAPDEBUG, &map, sizeof (map), 0);
541 if (err != EOK)
542 continue;
543
544 if (strcmp (map.info.path, printme.name))
545 continue;
546
547 /* Lower debug_vaddr is always text, if nessessary, swap. */
548 if ((int) map.info.vaddr < (int) printme.text.debug_vaddr)
549 {
550 memcpy (&(printme.data), &(printme.text),
551 sizeof (printme.data));
552 printme.text.addr = mapinfo_p2->vaddr;
553 printme.text.size = mapinfo_p2->size;
554 printme.text.flags = mapinfo_p2->flags;
555 printme.text.offset = mapinfo_p2->offset;
556 printme.text.debug_vaddr = map.info.vaddr;
557 }
558 else
559 {
560 printme.data.addr = mapinfo_p2->vaddr;
561 printme.data.size = mapinfo_p2->size;
562 printme.data.flags = mapinfo_p2->flags;
563 printme.data.offset = mapinfo_p2->offset;
564 printme.data.debug_vaddr = map.info.vaddr;
565 }
566 mapinfo_p2->ino = 0;
567 }
568 }
569 mapinfo_p->ino = 0;
570
571 printf_filtered ("%s\n", printme.name);
572 printf_filtered ("\ttext=%08x bytes @ 0x%08x\n", printme.text.size,
573 printme.text.addr);
574 printf_filtered ("\t\tflags=%08x\n", printme.text.flags);
575 printf_filtered ("\t\tdebug=%08x\n", printme.text.debug_vaddr);
2244ba2e 576 printf_filtered ("\t\toffset=%s\n", phex (printme.text.offset, 8));
61bb466e
KW
577 if (printme.data.size)
578 {
579 printf_filtered ("\tdata=%08x bytes @ 0x%08x\n", printme.data.size,
580 printme.data.addr);
581 printf_filtered ("\t\tflags=%08x\n", printme.data.flags);
582 printf_filtered ("\t\tdebug=%08x\n", printme.data.debug_vaddr);
2244ba2e 583 printf_filtered ("\t\toffset=%s\n", phex (printme.data.offset, 8));
61bb466e
KW
584 }
585 printf_filtered ("\tdev=0x%x\n", printme.dev);
586 printf_filtered ("\tino=0x%x\n", (unsigned int) printme.ino);
587 }
588 xfree (mapinfos);
589 return;
590}
591
592/* Print status information about what we're accessing. */
593static void
594procfs_files_info (struct target_ops *ignore)
595{
181e7f93
PA
596 struct inferior *inf = current_inferior ();
597
61bb466e 598 printf_unfiltered ("\tUsing the running image of %s %s via %s.\n",
3fdfcbf1 599 inf->attach_flag ? "attached" : "child",
61bb466e
KW
600 target_pid_to_str (inferior_ptid), nto_procfs_path);
601}
602
61bb466e
KW
603/* Attach to process PID, then initialize for debugging it. */
604static void
136d6dae 605procfs_attach (struct target_ops *ops, char *args, int from_tty)
61bb466e
KW
606{
607 char *exec_file;
608 int pid;
181e7f93 609 struct inferior *inf;
61bb466e 610
74164c56 611 pid = parse_pid_to_attach (args);
61bb466e
KW
612
613 if (pid == getpid ())
8a3fe4f8 614 error (_("Attaching GDB to itself is not a good idea..."));
61bb466e
KW
615
616 if (from_tty)
617 {
618 exec_file = (char *) get_exec_file (0);
619
620 if (exec_file)
621 printf_unfiltered ("Attaching to program `%s', %s\n", exec_file,
622 target_pid_to_str (pid_to_ptid (pid)));
623 else
624 printf_unfiltered ("Attaching to %s\n",
625 target_pid_to_str (pid_to_ptid (pid)));
626
627 gdb_flush (gdb_stdout);
628 }
629 inferior_ptid = do_attach (pid_to_ptid (pid));
6c95b8df
PA
630 inf = current_inferior ();
631 inferior_appeared (inf, pid);
181e7f93 632 inf->attach_flag = 1;
7f9f62ba 633
6a3cb8e8
PA
634 if (!target_is_pushed (ops))
635 push_target (ops);
7f9f62ba 636
28439f5e 637 procfs_find_new_threads (ops);
61bb466e
KW
638}
639
640static void
f045800c 641procfs_post_attach (struct target_ops *self, pid_t pid)
61bb466e 642{
61bb466e 643 if (exec_bfd)
268a4a75 644 solib_create_inferior_hook (0);
61bb466e
KW
645}
646
647static ptid_t
648do_attach (ptid_t ptid)
649{
650 procfs_status status;
651 struct sigevent event;
dc5dd1eb 652 char path[PATH_MAX];
61bb466e 653
dfd4cc63
LM
654 snprintf (path, PATH_MAX - 1, "%s/%d/as", nto_procfs_path,
655 ptid_get_pid (ptid));
61bb466e
KW
656 ctl_fd = open (path, O_RDWR);
657 if (ctl_fd == -1)
8a3fe4f8 658 error (_("Couldn't open proc file %s, error %d (%s)"), path, errno,
dc5dd1eb 659 safe_strerror (errno));
61bb466e 660 if (devctl (ctl_fd, DCMD_PROC_STOP, &status, sizeof (status), 0) != EOK)
8a3fe4f8 661 error (_("Couldn't stop process"));
61bb466e
KW
662
663 /* Define a sigevent for process stopped notification. */
664 event.sigev_notify = SIGEV_SIGNAL_THREAD;
665 event.sigev_signo = SIGUSR1;
666 event.sigev_code = 0;
667 event.sigev_value.sival_ptr = NULL;
668 event.sigev_priority = -1;
669 devctl (ctl_fd, DCMD_PROC_EVENT, &event, sizeof (event), 0);
670
671 if (devctl (ctl_fd, DCMD_PROC_STATUS, &status, sizeof (status), 0) == EOK
672 && status.flags & _DEBUG_FLAG_STOPPED)
dfd4cc63 673 SignalKill (nto_node (), ptid_get_pid (ptid), 0, SIGCONT, 0, 0);
61bb466e 674 nto_init_solib_absolute_prefix ();
dfd4cc63 675 return ptid_build (ptid_get_pid (ptid), 0, status.tid);
61bb466e
KW
676}
677
678/* Ask the user what to do when an interrupt is received. */
679static void
dc5dd1eb 680interrupt_query (void)
61bb466e
KW
681{
682 target_terminal_ours ();
683
9e2f0ad4
HZ
684 if (query (_("Interrupted while waiting for the program.\n\
685Give up (and stop debugging it)? ")))
61bb466e
KW
686 {
687 target_mourn_inferior ();
039e3c22 688 quit ();
61bb466e
KW
689 }
690
691 target_terminal_inferior ();
692}
693
694/* The user typed ^C twice. */
695static void
696nto_interrupt_twice (int signo)
697{
698 signal (signo, ofunc);
699 interrupt_query ();
700 signal (signo, nto_interrupt_twice);
701}
702
703static void
704nto_interrupt (int signo)
705{
706 /* If this doesn't work, try more severe steps. */
707 signal (signo, nto_interrupt_twice);
708
f9c72d52 709 target_stop (inferior_ptid);
61bb466e
KW
710}
711
712static ptid_t
117de6a9 713procfs_wait (struct target_ops *ops,
47608cb1 714 ptid_t ptid, struct target_waitstatus *ourstatus, int options)
61bb466e
KW
715{
716 sigset_t set;
717 siginfo_t info;
718 procfs_status status;
719 static int exit_signo = 0; /* To track signals that cause termination. */
720
721 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
722
723 if (ptid_equal (inferior_ptid, null_ptid))
724 {
725 ourstatus->kind = TARGET_WAITKIND_STOPPED;
a493e3e2 726 ourstatus->value.sig = GDB_SIGNAL_0;
61bb466e
KW
727 exit_signo = 0;
728 return null_ptid;
729 }
730
731 sigemptyset (&set);
732 sigaddset (&set, SIGUSR1);
733
734 devctl (ctl_fd, DCMD_PROC_STATUS, &status, sizeof (status), 0);
735 while (!(status.flags & _DEBUG_FLAG_ISTOP))
736 {
737 ofunc = (void (*)()) signal (SIGINT, nto_interrupt);
738 sigwaitinfo (&set, &info);
739 signal (SIGINT, ofunc);
740 devctl (ctl_fd, DCMD_PROC_STATUS, &status, sizeof (status), 0);
741 }
742
743 if (status.flags & _DEBUG_FLAG_SSTEP)
744 {
745 ourstatus->kind = TARGET_WAITKIND_STOPPED;
a493e3e2 746 ourstatus->value.sig = GDB_SIGNAL_TRAP;
61bb466e
KW
747 }
748 /* Was it a breakpoint? */
749 else if (status.flags & _DEBUG_FLAG_TRACE)
750 {
751 ourstatus->kind = TARGET_WAITKIND_STOPPED;
a493e3e2 752 ourstatus->value.sig = GDB_SIGNAL_TRAP;
61bb466e
KW
753 }
754 else if (status.flags & _DEBUG_FLAG_ISTOP)
755 {
756 switch (status.why)
757 {
758 case _DEBUG_WHY_SIGNALLED:
759 ourstatus->kind = TARGET_WAITKIND_STOPPED;
760 ourstatus->value.sig =
2ea28649 761 gdb_signal_from_host (status.info.si_signo);
61bb466e
KW
762 exit_signo = 0;
763 break;
764 case _DEBUG_WHY_FAULTED:
765 ourstatus->kind = TARGET_WAITKIND_STOPPED;
766 if (status.info.si_signo == SIGTRAP)
767 {
768 ourstatus->value.sig = 0;
769 exit_signo = 0;
770 }
771 else
772 {
773 ourstatus->value.sig =
2ea28649 774 gdb_signal_from_host (status.info.si_signo);
61bb466e
KW
775 exit_signo = ourstatus->value.sig;
776 }
777 break;
778
779 case _DEBUG_WHY_TERMINATED:
780 {
781 int waitval = 0;
782
dfd4cc63 783 waitpid (ptid_get_pid (inferior_ptid), &waitval, WNOHANG);
61bb466e
KW
784 if (exit_signo)
785 {
786 /* Abnormal death. */
787 ourstatus->kind = TARGET_WAITKIND_SIGNALLED;
788 ourstatus->value.sig = exit_signo;
789 }
790 else
791 {
792 /* Normal death. */
793 ourstatus->kind = TARGET_WAITKIND_EXITED;
794 ourstatus->value.integer = WEXITSTATUS (waitval);
795 }
796 exit_signo = 0;
797 break;
798 }
799
800 case _DEBUG_WHY_REQUESTED:
801 /* We are assuming a requested stop is due to a SIGINT. */
802 ourstatus->kind = TARGET_WAITKIND_STOPPED;
a493e3e2 803 ourstatus->value.sig = GDB_SIGNAL_INT;
61bb466e
KW
804 exit_signo = 0;
805 break;
806 }
807 }
808
a6a7f2a5 809 return ptid_build (status.pid, 0, status.tid);
61bb466e
KW
810}
811
812/* Read the current values of the inferior's registers, both the
813 general register set and floating point registers (if supported)
814 and update gdb's idea of their current values. */
815static void
28439f5e
PA
816procfs_fetch_registers (struct target_ops *ops,
817 struct regcache *regcache, int regno)
61bb466e
KW
818{
819 union
820 {
821 procfs_greg greg;
822 procfs_fpreg fpreg;
823 procfs_altreg altreg;
824 }
825 reg;
826 int regsize;
827
828 procfs_set_thread (inferior_ptid);
829 if (devctl (ctl_fd, DCMD_PROC_GETGREG, &reg, sizeof (reg), &regsize) == EOK)
56be3814 830 nto_supply_gregset (regcache, (char *) &reg.greg);
61bb466e
KW
831 if (devctl (ctl_fd, DCMD_PROC_GETFPREG, &reg, sizeof (reg), &regsize)
832 == EOK)
56be3814 833 nto_supply_fpregset (regcache, (char *) &reg.fpreg);
61bb466e
KW
834 if (devctl (ctl_fd, DCMD_PROC_GETALTREG, &reg, sizeof (reg), &regsize)
835 == EOK)
56be3814 836 nto_supply_altregset (regcache, (char *) &reg.altreg);
61bb466e
KW
837}
838
9d46c4e5
PA
839/* Helper for procfs_xfer_partial that handles memory transfers.
840 Arguments are like target_xfer_partial. */
61bb466e 841
9d46c4e5
PA
842static enum target_xfer_status
843procfs_xfer_memory (gdb_byte *readbuf, const gdb_byte *writebuf,
844 ULONGEST memaddr, ULONGEST len, ULONGEST *xfered_len)
61bb466e 845{
9d46c4e5
PA
846 int nbytes;
847
848 if (lseek (ctl_fd, (off_t) memaddr, SEEK_SET) != (off_t) memaddr)
849 return TARGET_XFER_E_IO;
850
851 if (writebuf != NULL)
852 nbytes = write (ctl_fd, writebuf, len);
853 else
854 nbytes = read (ctl_fd, readbuf, len);
855 if (nbytes <= 0)
856 return TARGET_XFER_E_IO;
857 *xfered_len = nbytes;
858 return TARGET_XFER_OK;
859}
860
861/* Target to_xfer_partial implementation. */
61bb466e 862
9d46c4e5
PA
863static enum target_xfer_status
864procfs_xfer_partial (struct target_ops *ops, enum target_object object,
865 const char *annex, gdb_byte *readbuf,
866 const gdb_byte *writebuf, ULONGEST offset, ULONGEST len,
867 ULONGEST *xfered_len)
868{
869 switch (object)
61bb466e 870 {
9d46c4e5
PA
871 case TARGET_OBJECT_MEMORY:
872 return procfs_xfer_memory (readbuf, writebuf, offset, len, xfered_len);
873 default:
874 return ops->beneath->to_xfer_partial (ops->beneath, object, annex,
875 readbuf, writebuf, offset, len);
61bb466e 876 }
61bb466e
KW
877}
878
879/* Take a program previously attached to and detaches it.
880 The program resumes execution and will no longer stop
881 on signals, etc. We'd better not have left any breakpoints
882 in the program or it'll die when it hits one. */
883static void
52554a0e 884procfs_detach (struct target_ops *ops, const char *args, int from_tty)
61bb466e
KW
885{
886 int siggnal = 0;
7f9f62ba 887 int pid;
61bb466e
KW
888
889 if (from_tty)
890 {
891 char *exec_file = get_exec_file (0);
892 if (exec_file == 0)
893 exec_file = "";
894 printf_unfiltered ("Detaching from program: %s %s\n",
895 exec_file, target_pid_to_str (inferior_ptid));
896 gdb_flush (gdb_stdout);
897 }
898 if (args)
899 siggnal = atoi (args);
900
901 if (siggnal)
dfd4cc63 902 SignalKill (nto_node (), ptid_get_pid (inferior_ptid), 0, siggnal, 0, 0);
61bb466e
KW
903
904 close (ctl_fd);
905 ctl_fd = -1;
7f9f62ba
PA
906
907 pid = ptid_get_pid (inferior_ptid);
61bb466e 908 inferior_ptid = null_ptid;
7f9f62ba
PA
909 detach_inferior (pid);
910 init_thread_list ();
6a3cb8e8 911 inf_child_maybe_unpush_target (ops);
61bb466e
KW
912}
913
914static int
915procfs_breakpoint (CORE_ADDR addr, int type, int size)
916{
917 procfs_break brk;
918
919 brk.type = type;
920 brk.addr = addr;
921 brk.size = size;
922 errno = devctl (ctl_fd, DCMD_PROC_BREAK, &brk, sizeof (brk), 0);
923 if (errno != EOK)
924 return 1;
925 return 0;
926}
927
928static int
3db08215 929procfs_insert_breakpoint (struct target_ops *ops, struct gdbarch *gdbarch,
a6d9a66e 930 struct bp_target_info *bp_tgt)
61bb466e 931{
8181d85f 932 return procfs_breakpoint (bp_tgt->placed_address, _DEBUG_BREAK_EXEC, 0);
61bb466e
KW
933}
934
935static int
3db08215 936procfs_remove_breakpoint (struct target_ops *ops, struct gdbarch *gdbarch,
a6d9a66e 937 struct bp_target_info *bp_tgt)
61bb466e 938{
8181d85f 939 return procfs_breakpoint (bp_tgt->placed_address, _DEBUG_BREAK_EXEC, -1);
61bb466e
KW
940}
941
942static int
23a26771 943procfs_insert_hw_breakpoint (struct target_ops *self, struct gdbarch *gdbarch,
a6d9a66e 944 struct bp_target_info *bp_tgt)
61bb466e 945{
8181d85f
DJ
946 return procfs_breakpoint (bp_tgt->placed_address,
947 _DEBUG_BREAK_EXEC | _DEBUG_BREAK_HW, 0);
61bb466e
KW
948}
949
950static int
8476dc92
TT
951procfs_remove_hw_breakpoint (struct target_ops *self,
952 struct gdbarch *gdbarch,
a6d9a66e 953 struct bp_target_info *bp_tgt)
61bb466e 954{
8181d85f
DJ
955 return procfs_breakpoint (bp_tgt->placed_address,
956 _DEBUG_BREAK_EXEC | _DEBUG_BREAK_HW, -1);
61bb466e
KW
957}
958
959static void
28439f5e 960procfs_resume (struct target_ops *ops,
2ea28649 961 ptid_t ptid, int step, enum gdb_signal signo)
61bb466e
KW
962{
963 int signal_to_pass;
964 procfs_status status;
14ef7606 965 sigset_t *run_fault = (sigset_t *) (void *) &run.fault;
61bb466e
KW
966
967 if (ptid_equal (inferior_ptid, null_ptid))
968 return;
969
970 procfs_set_thread (ptid_equal (ptid, minus_one_ptid) ? inferior_ptid :
971 ptid);
972
973 run.flags = _DEBUG_RUN_FAULT | _DEBUG_RUN_TRACE;
974 if (step)
975 run.flags |= _DEBUG_RUN_STEP;
976
14ef7606
AR
977 sigemptyset (run_fault);
978 sigaddset (run_fault, FLTBPT);
979 sigaddset (run_fault, FLTTRACE);
980 sigaddset (run_fault, FLTILL);
981 sigaddset (run_fault, FLTPRIV);
982 sigaddset (run_fault, FLTBOUNDS);
983 sigaddset (run_fault, FLTIOVF);
984 sigaddset (run_fault, FLTIZDIV);
985 sigaddset (run_fault, FLTFPE);
61bb466e 986 /* Peter V will be changing this at some point. */
14ef7606 987 sigaddset (run_fault, FLTPAGE);
61bb466e
KW
988
989 run.flags |= _DEBUG_RUN_ARM;
990
2ea28649 991 signal_to_pass = gdb_signal_to_host (signo);
61bb466e
KW
992
993 if (signal_to_pass)
994 {
995 devctl (ctl_fd, DCMD_PROC_STATUS, &status, sizeof (status), 0);
2ea28649 996 signal_to_pass = gdb_signal_to_host (signo);
61bb466e
KW
997 if (status.why & (_DEBUG_WHY_SIGNALLED | _DEBUG_WHY_FAULTED))
998 {
999 if (signal_to_pass != status.info.si_signo)
1000 {
dfd4cc63 1001 SignalKill (nto_node (), ptid_get_pid (inferior_ptid), 0,
d737fd7f 1002 signal_to_pass, 0, 0);
61bb466e
KW
1003 run.flags |= _DEBUG_RUN_CLRFLT | _DEBUG_RUN_CLRSIG;
1004 }
0df8b418 1005 else /* Let it kill the program without telling us. */
61bb466e
KW
1006 sigdelset (&run.trace, signal_to_pass);
1007 }
1008 }
1009 else
1010 run.flags |= _DEBUG_RUN_CLRSIG | _DEBUG_RUN_CLRFLT;
1011
1012 errno = devctl (ctl_fd, DCMD_PROC_RUN, &run, sizeof (run), 0);
1013 if (errno != EOK)
1014 {
9b20d036 1015 perror (_("run error!\n"));
61bb466e
KW
1016 return;
1017 }
1018}
1019
1020static void
136d6dae 1021procfs_mourn_inferior (struct target_ops *ops)
61bb466e
KW
1022{
1023 if (!ptid_equal (inferior_ptid, null_ptid))
1024 {
dfd4cc63 1025 SignalKill (nto_node (), ptid_get_pid (inferior_ptid), 0, SIGKILL, 0, 0);
61bb466e
KW
1026 close (ctl_fd);
1027 }
1028 inferior_ptid = null_ptid;
1029 init_thread_list ();
61bb466e 1030 generic_mourn_inferior ();
6a3cb8e8 1031 inf_child_maybe_unpush_target (ops);
61bb466e
KW
1032}
1033
1034/* This function breaks up an argument string into an argument
1035 vector suitable for passing to execvp().
1036 E.g., on "run a b c d" this routine would get as input
1037 the string "a b c d", and as output it would fill in argv with
1038 the four arguments "a", "b", "c", "d". The only additional
1039 functionality is simple quoting. The gdb command:
1040 run a "b c d" f
1041 will fill in argv with the three args "a", "b c d", "e". */
1042static void
1043breakup_args (char *scratch, char **argv)
1044{
1045 char *pp, *cp = scratch;
1046 char quoting = 0;
1047
1048 for (;;)
1049 {
1050 /* Scan past leading separators. */
1051 quoting = 0;
1052 while (*cp == ' ' || *cp == '\t' || *cp == '\n')
1053 cp++;
1054
1055 /* Break if at end of string. */
1056 if (*cp == '\0')
1057 break;
1058
1059 /* Take an arg. */
1060 if (*cp == '"')
1061 {
1062 cp++;
1063 quoting = strchr (cp, '"') ? 1 : 0;
1064 }
1065
1066 *argv++ = cp;
1067
1068 /* Scan for next arg separator. */
1069 pp = cp;
1070 if (quoting)
1071 cp = strchr (pp, '"');
1072 if ((cp == NULL) || (!quoting))
1073 cp = strchr (pp, ' ');
1074 if (cp == NULL)
1075 cp = strchr (pp, '\t');
1076 if (cp == NULL)
1077 cp = strchr (pp, '\n');
1078
1079 /* No separators => end of string => break. */
1080 if (cp == NULL)
1081 {
1082 pp = cp;
1083 break;
1084 }
1085
1086 /* Replace the separator with a terminator. */
1087 *cp++ = '\0';
1088 }
1089
1090 /* Execv requires a null-terminated arg vector. */
1091 *argv = NULL;
1092}
1093
1094static void
136d6dae
VP
1095procfs_create_inferior (struct target_ops *ops, char *exec_file,
1096 char *allargs, char **env, int from_tty)
61bb466e
KW
1097{
1098 struct inheritance inherit;
1099 pid_t pid;
1100 int flags, errn;
1101 char **argv, *args;
3cb3b8df 1102 const char *in = "", *out = "", *err = "";
61bb466e
KW
1103 int fd, fds[3];
1104 sigset_t set;
3cb3b8df 1105 const char *inferior_io_terminal = get_inferior_io_terminal ();
3fdfcbf1 1106 struct inferior *inf;
61bb466e
KW
1107
1108 argv = xmalloc (((strlen (allargs) + 1) / (unsigned) 2 + 2) *
1109 sizeof (*argv));
1110 argv[0] = get_exec_file (1);
1111 if (!argv[0])
1112 {
1113 if (exec_file)
1114 argv[0] = exec_file;
1115 else
1116 return;
1117 }
1118
1119 args = xstrdup (allargs);
1120 breakup_args (args, exec_file ? &argv[1] : &argv[0]);
1121
1122 argv = nto_parse_redirection (argv, &in, &out, &err);
1123
1124 fds[0] = STDIN_FILENO;
1125 fds[1] = STDOUT_FILENO;
1126 fds[2] = STDERR_FILENO;
1127
1128 /* If the user specified I/O via gdb's --tty= arg, use it, but only
1129 if the i/o is not also being specified via redirection. */
1130 if (inferior_io_terminal)
1131 {
1132 if (!in[0])
1133 in = inferior_io_terminal;
1134 if (!out[0])
1135 out = inferior_io_terminal;
1136 if (!err[0])
1137 err = inferior_io_terminal;
1138 }
1139
1140 if (in[0])
1141 {
1142 fd = open (in, O_RDONLY);
1143 if (fd == -1)
1144 perror (in);
1145 else
1146 fds[0] = fd;
1147 }
1148 if (out[0])
1149 {
1150 fd = open (out, O_WRONLY);
1151 if (fd == -1)
1152 perror (out);
1153 else
1154 fds[1] = fd;
1155 }
1156 if (err[0])
1157 {
1158 fd = open (err, O_WRONLY);
1159 if (fd == -1)
1160 perror (err);
1161 else
1162 fds[2] = fd;
1163 }
1164
1165 /* Clear any pending SIGUSR1's but keep the behavior the same. */
1166 signal (SIGUSR1, signal (SIGUSR1, SIG_IGN));
1167
1168 sigemptyset (&set);
1169 sigaddset (&set, SIGUSR1);
1170 sigprocmask (SIG_UNBLOCK, &set, NULL);
1171
1172 memset (&inherit, 0, sizeof (inherit));
1173
1174 if (ND_NODE_CMP (nto_procfs_node, ND_LOCAL_NODE) != 0)
1175 {
d737fd7f 1176 inherit.nd = nto_node ();
61bb466e
KW
1177 inherit.flags |= SPAWN_SETND;
1178 inherit.flags &= ~SPAWN_EXEC;
1179 }
1180 inherit.flags |= SPAWN_SETGROUP | SPAWN_HOLD;
1181 inherit.pgroup = SPAWN_NEWPGROUP;
1182 pid = spawnp (argv[0], 3, fds, &inherit, argv,
1183 ND_NODE_CMP (nto_procfs_node, ND_LOCAL_NODE) == 0 ? env : 0);
1184 xfree (args);
1185
1186 sigprocmask (SIG_BLOCK, &set, NULL);
1187
1188 if (pid == -1)
8a3fe4f8 1189 error (_("Error spawning %s: %d (%s)"), argv[0], errno,
d737fd7f 1190 safe_strerror (errno));
61bb466e
KW
1191
1192 if (fds[0] != STDIN_FILENO)
1193 close (fds[0]);
1194 if (fds[1] != STDOUT_FILENO)
1195 close (fds[1]);
1196 if (fds[2] != STDERR_FILENO)
1197 close (fds[2]);
1198
1199 inferior_ptid = do_attach (pid_to_ptid (pid));
28439f5e 1200 procfs_find_new_threads (ops);
61bb466e 1201
6c95b8df
PA
1202 inf = current_inferior ();
1203 inferior_appeared (inf, pid);
3fdfcbf1 1204 inf->attach_flag = 0;
7f9f62ba 1205
61bb466e
KW
1206 flags = _DEBUG_FLAG_KLC; /* Kill-on-Last-Close flag. */
1207 errn = devctl (ctl_fd, DCMD_PROC_SET_FLAG, &flags, sizeof (flags), 0);
1208 if (errn != EOK)
1209 {
1210 /* FIXME: expected warning? */
1211 /* warning( "Failed to set Kill-on-Last-Close flag: errno = %d(%s)\n",
1212 errn, strerror(errn) ); */
1213 }
6a3cb8e8
PA
1214 if (!target_is_pushed (ops))
1215 push_target (ops);
61bb466e
KW
1216 target_terminal_init ();
1217
61bb466e
KW
1218 if (exec_bfd != NULL
1219 || (symfile_objfile != NULL && symfile_objfile->obfd != NULL))
268a4a75 1220 solib_create_inferior_hook (0);
61bb466e
KW
1221}
1222
1223static void
1eab8a48 1224procfs_stop (struct target_ops *self, ptid_t ptid)
61bb466e
KW
1225{
1226 devctl (ctl_fd, DCMD_PROC_STOP, NULL, 0, 0);
1227}
1228
1229static void
7d85a9c0 1230procfs_kill_inferior (struct target_ops *ops)
61bb466e
KW
1231{
1232 target_mourn_inferior ();
1233}
1234
61bb466e
KW
1235/* Fill buf with regset and return devctl cmd to do the setting. Return
1236 -1 if we fail to get the regset. Store size of regset in regsize. */
1237static int
1238get_regset (int regset, char *buf, int bufsize, int *regsize)
1239{
1240 int dev_get, dev_set;
1241 switch (regset)
1242 {
1243 case NTO_REG_GENERAL:
1244 dev_get = DCMD_PROC_GETGREG;
1245 dev_set = DCMD_PROC_SETGREG;
1246 break;
1247
1248 case NTO_REG_FLOAT:
1249 dev_get = DCMD_PROC_GETFPREG;
1250 dev_set = DCMD_PROC_SETFPREG;
1251 break;
1252
1253 case NTO_REG_ALT:
1254 dev_get = DCMD_PROC_GETALTREG;
1255 dev_set = DCMD_PROC_SETALTREG;
1256 break;
1257
1258 case NTO_REG_SYSTEM:
1259 default:
1260 return -1;
1261 }
97c44116 1262 if (devctl (ctl_fd, dev_get, buf, bufsize, regsize) != EOK)
61bb466e
KW
1263 return -1;
1264
1265 return dev_set;
1266}
1267
1268void
28439f5e
PA
1269procfs_store_registers (struct target_ops *ops,
1270 struct regcache *regcache, int regno)
61bb466e
KW
1271{
1272 union
1273 {
1274 procfs_greg greg;
1275 procfs_fpreg fpreg;
1276 procfs_altreg altreg;
1277 }
1278 reg;
1279 unsigned off;
1280 int len, regset, regsize, dev_set, err;
1281 char *data;
1282
1283 if (ptid_equal (inferior_ptid, null_ptid))
1284 return;
1285 procfs_set_thread (inferior_ptid);
1286
1287 if (regno == -1)
1288 {
1289 for (regset = NTO_REG_GENERAL; regset < NTO_REG_END; regset++)
1290 {
1291 dev_set = get_regset (regset, (char *) &reg,
1292 sizeof (reg), &regsize);
1293 if (dev_set == -1)
1294 continue;
1295
56be3814 1296 if (nto_regset_fill (regcache, regset, (char *) &reg) == -1)
61bb466e
KW
1297 continue;
1298
1299 err = devctl (ctl_fd, dev_set, &reg, regsize, 0);
1300 if (err != EOK)
1301 fprintf_unfiltered (gdb_stderr,
1302 "Warning unable to write regset %d: %s\n",
dc5dd1eb 1303 regno, safe_strerror (err));
61bb466e
KW
1304 }
1305 }
1306 else
1307 {
1308 regset = nto_regset_id (regno);
1309 if (regset == -1)
1310 return;
1311
1312 dev_set = get_regset (regset, (char *) &reg, sizeof (reg), &regsize);
1313 if (dev_set == -1)
1314 return;
1315
60441ab9
UW
1316 len = nto_register_area (get_regcache_arch (regcache),
1317 regno, regset, &off);
61bb466e
KW
1318
1319 if (len < 1)
1320 return;
1321
56be3814 1322 regcache_raw_collect (regcache, regno, (char *) &reg + off);
61bb466e
KW
1323
1324 err = devctl (ctl_fd, dev_set, &reg, regsize, 0);
1325 if (err != EOK)
1326 fprintf_unfiltered (gdb_stderr,
1327 "Warning unable to write regset %d: %s\n", regno,
dc5dd1eb 1328 safe_strerror (err));
61bb466e
KW
1329 }
1330}
1331
2455069d
UW
1332/* Set list of signals to be handled in the target. */
1333
61bb466e 1334static void
94bedb42
TT
1335procfs_pass_signals (struct target_ops *self,
1336 int numsigs, unsigned char *pass_signals)
61bb466e
KW
1337{
1338 int signo;
1339
2455069d
UW
1340 sigfillset (&run.trace);
1341
61bb466e
KW
1342 for (signo = 1; signo < NSIG; signo++)
1343 {
2ea28649 1344 int target_signo = gdb_signal_from_host (signo);
2455069d
UW
1345 if (target_signo < numsigs && pass_signals[target_signo])
1346 sigdelset (&run.trace, signo);
61bb466e
KW
1347 }
1348}
1349
61bb466e
KW
1350static struct tidinfo *
1351procfs_thread_info (pid_t pid, short tid)
1352{
1353/* NYI */
1354 return NULL;
1355}
1356
94c74239 1357static char *
117de6a9 1358procfs_pid_to_str (struct target_ops *ops, ptid_t ptid)
61bb466e
KW
1359{
1360 static char buf[1024];
1361 int pid, tid, n;
1362 struct tidinfo *tip;
1363
1364 pid = ptid_get_pid (ptid);
1365 tid = ptid_get_tid (ptid);
1366
dc5dd1eb 1367 n = snprintf (buf, 1023, "process %d", pid);
61bb466e
KW
1368
1369#if 0 /* NYI */
1370 tip = procfs_thread_info (pid, tid);
1371 if (tip != NULL)
dc5dd1eb 1372 snprintf (&buf[n], 1023, " (state = 0x%02x)", tip->state);
61bb466e
KW
1373#endif
1374
1375 return buf;
1376}
1377
132f8e03
PA
1378/* to_can_run implementation for "target procfs". Note this really
1379 means "can this target be the default run target", which there can
1380 be only one, and we make it be "target native" like other ports.
1381 "target procfs <node>" wouldn't make sense as default run target, as
1382 it needs <node>. */
ee8e9165 1383
132f8e03
PA
1384static int
1385procfs_can_run (struct target_ops *self)
1386{
1387 return 0;
1388}
1389
1390/* "target procfs". */
1391static struct target_ops nto_procfs_ops;
1392
6a3cb8e8
PA
1393/* "target native". */
1394static struct target_ops *nto_native_ops;
1395
1396/* to_open implementation for "target procfs". */
1397
1398static void
1399procfs_open (char *arg, int from_tty)
1400{
1401 procfs_open_1 (&nto_procfs_ops, arg, from_tty);
1402}
1403
1404/* to_open implementation for "target native". */
1405
1406static void
1407procfs_native_open (char *arg, int from_tty)
1408{
1409 procfs_open_1 (nto_native_ops, arg, from_tty);
1410}
1411
132f8e03
PA
1412/* Create the "native" and "procfs" targets. */
1413
1414static void
1415init_procfs_targets (void)
61bb466e 1416{
ee8e9165
PA
1417 struct target_ops *t = inf_child_target ();
1418
132f8e03
PA
1419 /* Leave to_shortname as "native". */
1420 t->to_longname = "QNX Neutrino local process";
1421 t->to_doc = "QNX Neutrino local process (started by the \"run\" command).";
6a3cb8e8 1422 t->to_open = procfs_native_open;
ee8e9165
PA
1423 t->to_attach = procfs_attach;
1424 t->to_post_attach = procfs_post_attach;
1425 t->to_detach = procfs_detach;
1426 t->to_resume = procfs_resume;
1427 t->to_wait = procfs_wait;
1428 t->to_fetch_registers = procfs_fetch_registers;
1429 t->to_store_registers = procfs_store_registers;
1430 t->to_xfer_partial = procfs_xfer_partial;
1431 t->to_files_info = procfs_files_info;
1432 t->to_insert_breakpoint = procfs_insert_breakpoint;
1433 t->to_remove_breakpoint = procfs_remove_breakpoint;
1434 t->to_can_use_hw_breakpoint = procfs_can_use_hw_breakpoint;
1435 t->to_insert_hw_breakpoint = procfs_insert_hw_breakpoint;
1436 t->to_remove_hw_breakpoint = procfs_remove_hw_breakpoint;
1437 t->to_insert_watchpoint = procfs_insert_hw_watchpoint;
1438 t->to_remove_watchpoint = procfs_remove_hw_watchpoint;
1439 t->to_stopped_by_watchpoint = procfs_stopped_by_watchpoint;
1440 t->to_kill = procfs_kill_inferior;
1441 t->to_create_inferior = procfs_create_inferior;
1442 t->to_mourn_inferior = procfs_mourn_inferior;
1443 t->to_pass_signals = procfs_pass_signals;
1444 t->to_thread_alive = procfs_thread_alive;
1445 t->to_find_new_threads = procfs_find_new_threads;
1446 t->to_pid_to_str = procfs_pid_to_str;
1447 t->to_stop = procfs_stop;
1448 t->to_have_continuable_watchpoint = 1;
1449 t->to_extra_thread_info = nto_extra_thread_info;
1450
6a3cb8e8
PA
1451 nto_native_ops = t;
1452
132f8e03
PA
1453 /* Register "target native". This is the default run target. */
1454 add_target (t);
1455
1456 /* Register "target procfs <node>". */
1457 nto_procfs_ops = *t;
1458 nto_procfs_ops.to_shortname = "procfs";
1459 nto_procfs_ops.to_can_run = procfs_can_run;
1460 t->to_longname = "QNX Neutrino local or remote process";
1461 t->to_doc = "QNX Neutrino process. target procfs <node>";
6a3cb8e8
PA
1462 t->to_open = procfs_open;
1463
132f8e03 1464 add_target (&nto_procfs_ops);
61bb466e
KW
1465}
1466
1467#define OSTYPE_NTO 1
1468
1469void
dc5dd1eb 1470_initialize_procfs (void)
61bb466e
KW
1471{
1472 sigset_t set;
1473
132f8e03 1474 init_procfs_targets ();
61bb466e
KW
1475
1476 /* We use SIGUSR1 to gain control after we block waiting for a process.
1477 We use sigwaitevent to wait. */
1478 sigemptyset (&set);
1479 sigaddset (&set, SIGUSR1);
1480 sigprocmask (SIG_BLOCK, &set, NULL);
1481
2455069d
UW
1482 /* Initially, make sure all signals are reported. */
1483 sigfillset (&run.trace);
61bb466e
KW
1484
1485 /* Stuff some information. */
1486 nto_cpuinfo_flags = SYSPAGE_ENTRY (cpuinfo)->flags;
1487 nto_cpuinfo_valid = 1;
1488
1bedd215
AC
1489 add_info ("pidlist", procfs_pidlist, _("pidlist"));
1490 add_info ("meminfo", procfs_meminfo, _("memory information"));
d737fd7f
KW
1491
1492 nto_is_nto_target = procfs_is_nto_target;
61bb466e
KW
1493}
1494
1495
1496static int
1497procfs_hw_watchpoint (int addr, int len, int type)
1498{
1499 procfs_break brk;
1500
1501 switch (type)
1502 {
1503 case 1: /* Read. */
1504 brk.type = _DEBUG_BREAK_RD;
1505 break;
1506 case 2: /* Read/Write. */
1507 brk.type = _DEBUG_BREAK_RW;
1508 break;
1509 default: /* Modify. */
1510/* FIXME: brk.type = _DEBUG_BREAK_RWM gives EINVAL for some reason. */
1511 brk.type = _DEBUG_BREAK_RW;
1512 }
1513 brk.type |= _DEBUG_BREAK_HW; /* Always ask for HW. */
1514 brk.addr = addr;
1515 brk.size = len;
1516
1517 errno = devctl (ctl_fd, DCMD_PROC_BREAK, &brk, sizeof (brk), 0);
1518 if (errno != EOK)
1519 {
9b20d036 1520 perror (_("Failed to set hardware watchpoint"));
61bb466e
KW
1521 return -1;
1522 }
1523 return 0;
1524}
1525
1526static int
5461485a
TT
1527procfs_can_use_hw_breakpoint (struct target_ops *self,
1528 int type, int cnt, int othertype)
61bb466e
KW
1529{
1530 return 1;
1531}
1532
1533static int
11b5219a
TT
1534procfs_remove_hw_watchpoint (struct target_ops *self,
1535 CORE_ADDR addr, int len, int type,
0cf6dd15 1536 struct expression *cond)
61bb466e
KW
1537{
1538 return procfs_hw_watchpoint (addr, -1, type);
1539}
1540
1541static int
7bb99c53
TT
1542procfs_insert_hw_watchpoint (struct target_ops *self,
1543 CORE_ADDR addr, int len, int type,
0cf6dd15 1544 struct expression *cond)
61bb466e
KW
1545{
1546 return procfs_hw_watchpoint (addr, len, type);
1547}
1548
1549static int
6a109b6b 1550procfs_stopped_by_watchpoint (struct target_ops *ops)
61bb466e
KW
1551{
1552 return 0;
1553}
This page took 1.138483 seconds and 4 git commands to generate.