* gencode.c (build_instruction) [MUL]: Cast operands to word64, to
[deliverable/binutils-gdb.git] / gdb / remote-vx.c
CommitLineData
dd3b648e 1/* Memory-access and commands for remote VxWorks processes, for GDB.
e17960fb 2 Copyright 1990, 1991, 1992 Free Software Foundation, Inc.
dd3b648e
RP
3 Contributed by Wind River Systems and Cygnus Support.
4
5This file is part of GDB.
6
99a7de40 7This program is free software; you can redistribute it and/or modify
dd3b648e 8it under the terms of the GNU General Public License as published by
99a7de40
JG
9the Free Software Foundation; either version 2 of the License, or
10(at your option) any later version.
dd3b648e 11
99a7de40 12This program is distributed in the hope that it will be useful,
dd3b648e
RP
13but WITHOUT ANY WARRANTY; without even the implied warranty of
14MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15GNU General Public License for more details.
16
17You should have received a copy of the GNU General Public License
99a7de40 18along with this program; if not, write to the Free Software
6c9638b4 19Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
dd3b648e
RP
20
21#include "defs.h"
dd3b648e
RP
22#include "frame.h"
23#include "inferior.h"
24#include "wait.h"
25#include "target.h"
26#include "gdbcore.h"
27#include "command.h"
28#include "symtab.h"
5998e362 29#include "complaints.h"
56894788 30#include "gdbcmd.h"
e7b5942b
JK
31#include "bfd.h" /* Required by objfiles.h. */
32#include "symfile.h" /* Required by objfiles.h. */
33#include "objfiles.h"
34#include "gdb-stabs.h"
dd3b648e 35
2b576293 36#include "gdb_string.h"
dd3b648e
RP
37#include <errno.h>
38#include <signal.h>
39#include <fcntl.h>
40#include <sys/types.h>
dd3b648e 41#include <sys/socket.h>
0d6d92c7 42#define malloc bogon_malloc /* Sun claims "char *malloc()" not void * */
dd3b648e 43#define free bogon_free /* Sun claims "int free()" not void */
b67903ac 44#define realloc bogon_realloc /* Sun claims "char *realloc()", not void * */
dd3b648e 45#include <rpc/rpc.h>
0d6d92c7 46#undef malloc
dd3b648e 47#undef free
b67903ac 48#undef realloc
dd3b648e
RP
49#include <sys/time.h> /* UTek's <rpc/rpc.h> doesn't #incl this */
50#include <netdb.h>
aa942355
SG
51#include "vx-share/ptrace.h"
52#include "vx-share/xdr_ptrace.h"
53#include "vx-share/xdr_ld.h"
54#include "vx-share/xdr_rdb.h"
55#include "vx-share/dbgRpcLib.h"
dd3b648e 56
dd3b648e 57#include <symtab.h>
1ab3bf1b 58
161520dc
KH
59/* Maximum number of bytes to transfer in a single
60 PTRACE_{READ,WRITE}DATA request. */
61#define VX_MEMXFER_MAX 4096
62
63extern void vx_read_register ();
64extern void vx_write_register ();
dd3b648e 65extern void symbol_file_command ();
dd3b648e
RP
66extern int stop_soon_quietly; /* for wait_for_inferior */
67
161520dc 68static int net_step ();
dd3b648e
RP
69static int net_ptrace_clnt_call (); /* Forward decl */
70static enum clnt_stat net_clnt_call (); /* Forward decl */
71extern struct target_ops vx_ops, vx_run_ops; /* Forward declaration */
72
73/* Saved name of target host and called function for "info files".
74 Both malloc'd. */
75
76static char *vx_host;
77static char *vx_running; /* Called function */
78
79/* Nonzero means target that is being debugged remotely has a floating
80 point processor. */
81
161520dc 82int target_has_fp;
dd3b648e
RP
83
84/* Default error message when the network is forking up. */
85
86static const char rpcerr[] = "network target debugging: rpc error";
87
88CLIENT *pClient; /* client used in net debugging */
89static int ptraceSock = RPC_ANYSOCK;
90
91enum clnt_stat net_clnt_call();
92static void parse_args ();
93
94static struct timeval rpcTimeout = { 10, 0 };
95
96static char *skip_white_space ();
97static char *find_white_space ();
98
99/* Tell the VxWorks target system to download a file.
100 The load addresses of the text, data, and bss segments are
afc5505f 101 stored in *pTextAddr, *pDataAddr, and *pBssAddr (respectively).
dd3b648e
RP
102 Returns 0 for success, -1 for failure. */
103
104static int
105net_load (filename, pTextAddr, pDataAddr, pBssAddr)
e7b5942b
JK
106 char *filename;
107 CORE_ADDR *pTextAddr;
108 CORE_ADDR *pDataAddr;
109 CORE_ADDR *pBssAddr;
110{
111 enum clnt_stat status;
112 struct ldfile ldstruct;
113 struct timeval load_timeout;
dd3b648e 114
e7b5942b 115 memset ((char *) &ldstruct, '\0', sizeof (ldstruct));
afc5505f 116
e7b5942b
JK
117 /* We invoke clnt_call () here directly, instead of through
118 net_clnt_call (), because we need to set a large timeout value.
119 The load on the target side can take quite a while, easily
120 more than 10 seconds. The user can kill this call by typing
121 CTRL-C if there really is a problem with the load.
dd3b648e 122
e7b5942b
JK
123 Do not change the tv_sec value without checking -- select() imposes
124 a limit of 10**8 on it for no good reason that I can see... */
125
126 load_timeout.tv_sec = 99999999; /* A large number, effectively inf. */
127 load_timeout.tv_usec = 0;
dd3b648e 128
e7b5942b
JK
129 status = clnt_call (pClient, VX_LOAD, xdr_wrapstring, &filename, xdr_ldfile,
130 &ldstruct, load_timeout);
131
132 if (status == RPC_SUCCESS)
133 {
134 if (*ldstruct.name == 0) /* load failed on VxWorks side */
135 return -1;
136 *pTextAddr = ldstruct.txt_addr;
137 *pDataAddr = ldstruct.data_addr;
138 *pBssAddr = ldstruct.bss_addr;
139 return 0;
dd3b648e 140 }
e7b5942b
JK
141 else
142 return -1;
143}
144
dd3b648e
RP
145/* returns 0 if successful, errno if RPC failed or VxWorks complains. */
146
147static int
148net_break (addr, procnum)
e7b5942b
JK
149 int addr;
150 u_long procnum;
151{
152 enum clnt_stat status;
153 int break_status;
154 Rptrace ptrace_in; /* XXX This is stupid. It doesn't need to be a ptrace
155 structure. How about something smaller? */
156
157 memset ((char *) &ptrace_in, '\0', sizeof (ptrace_in));
158 break_status = 0;
dd3b648e 159
e7b5942b
JK
160 ptrace_in.addr = addr;
161 ptrace_in.pid = inferior_pid;
dd3b648e 162
e7b5942b
JK
163 status = net_clnt_call (procnum, xdr_rptrace, &ptrace_in, xdr_int,
164 &break_status);
dd3b648e 165
e7b5942b
JK
166 if (status != RPC_SUCCESS)
167 return errno;
dd3b648e 168
e7b5942b
JK
169 if (break_status == -1)
170 return ENOMEM;
171 return break_status; /* probably (FIXME) zero */
172}
dd3b648e 173
dd3b648e
RP
174/* returns 0 if successful, errno otherwise */
175
8616205a 176static int
dd3b648e 177vx_insert_breakpoint (addr)
e7b5942b
JK
178 int addr;
179{
180 return net_break (addr, VX_BREAK_ADD);
181}
dd3b648e
RP
182
183/* returns 0 if successful, errno otherwise */
184
8616205a 185static int
dd3b648e 186vx_remove_breakpoint (addr)
e7b5942b
JK
187 int addr;
188{
189 return net_break (addr, VX_BREAK_DELETE);
190}
dd3b648e 191
dd3b648e
RP
192/* Start an inferior process and sets inferior_pid to its pid.
193 EXEC_FILE is the file to run.
194 ALLARGS is a string containing the arguments to the program.
195 ENV is the environment vector to pass.
196 Returns process id. Errors reported with error().
197 On VxWorks, we ignore exec_file. */
198
8616205a 199static void
dd3b648e
RP
200vx_create_inferior (exec_file, args, env)
201 char *exec_file;
202 char *args;
203 char **env;
204{
205 enum clnt_stat status;
206 arg_array passArgs;
207 TASK_START taskStart;
208
4ed97c9a
RP
209 memset ((char *) &passArgs, '\0', sizeof (passArgs));
210 memset ((char *) &taskStart, '\0', sizeof (taskStart));
dd3b648e
RP
211
212 /* parse arguments, put them in passArgs */
213
214 parse_args (args, &passArgs);
215
216 if (passArgs.arg_array_len == 0)
217 error ("You must specify a function name to run, and arguments if any");
218
219 status = net_clnt_call (PROCESS_START, xdr_arg_array, &passArgs,
220 xdr_TASK_START, &taskStart);
221
222 if ((status != RPC_SUCCESS) || (taskStart.status == -1))
223 error ("Can't create process on remote target machine");
224
225 /* Save the name of the running function */
226 vx_running = savestring (passArgs.arg_array_val[0],
227 strlen (passArgs.arg_array_val[0]));
228
dd3b648e
RP
229 push_target (&vx_run_ops);
230 inferior_pid = taskStart.pid;
231
dd3b648e
RP
232 /* We will get a trace trap after one instruction.
233 Insert breakpoints and continue. */
234
235 init_wait_for_inferior ();
236
237 /* Set up the "saved terminal modes" of the inferior
238 based on what modes we are starting it with. */
239 target_terminal_init ();
240
241 /* Install inferior's terminal modes. */
242 target_terminal_inferior ();
243
dd3b648e
RP
244 stop_soon_quietly = 1;
245 wait_for_inferior (); /* Get the task spawn event */
246 stop_soon_quietly = 0;
247
248 /* insert_step_breakpoint (); FIXME, do we need this? */
45dc9be3 249 proceed (-1, TARGET_SIGNAL_DEFAULT, 0);
dd3b648e
RP
250}
251
252/* Fill ARGSTRUCT in argc/argv form with the arguments from the
253 argument string ARGSTRING. */
254
255static void
256parse_args (arg_string, arg_struct)
257 register char *arg_string;
258 arg_array *arg_struct;
259{
260 register int arg_count = 0; /* number of arguments */
261 register int arg_index = 0;
262 register char *p0;
263
4ed97c9a 264 memset ((char *) arg_struct, '\0', sizeof (arg_array));
dd3b648e
RP
265
266 /* first count how many arguments there are */
267
268 p0 = arg_string;
269 while (*p0 != '\0')
270 {
271 if (*(p0 = skip_white_space (p0)) == '\0')
272 break;
273 p0 = find_white_space (p0);
274 arg_count++;
275 }
276
277 arg_struct->arg_array_len = arg_count;
278 arg_struct->arg_array_val = (char **) xmalloc ((arg_count + 1)
279 * sizeof (char *));
280
281 /* now copy argument strings into arg_struct. */
282
283 while (*(arg_string = skip_white_space (arg_string)))
284 {
285 p0 = find_white_space (arg_string);
286 arg_struct->arg_array_val[arg_index++] = savestring (arg_string,
287 p0 - arg_string);
288 arg_string = p0;
289 }
290
291 arg_struct->arg_array_val[arg_count] = NULL;
292}
293
294/* Advance a string pointer across whitespace and return a pointer
295 to the first non-white character. */
296
297static char *
298skip_white_space (p)
299 register char *p;
300{
301 while (*p == ' ' || *p == '\t')
302 p++;
303 return p;
304}
305
306/* Search for the first unquoted whitespace character in a string.
307 Returns a pointer to the character, or to the null terminator
308 if no whitespace is found. */
309
310static char *
311find_white_space (p)
312 register char *p;
313{
314 register int c;
315
316 while ((c = *p) != ' ' && c != '\t' && c)
317 {
318 if (c == '\'' || c == '"')
319 {
320 while (*++p != c && *p)
321 {
322 if (*p == '\\')
323 p++;
324 }
325 if (!*p)
326 break;
327 }
328 p++;
329 }
330 return p;
331}
332
333/* Poll the VxWorks target system for an event related
334 to the debugged task.
335 Returns -1 if remote wait failed, task status otherwise. */
336
8616205a 337static int
dd3b648e
RP
338net_wait (pEvent)
339 RDB_EVENT *pEvent;
340{
341 int pid;
342 enum clnt_stat status;
343
4ed97c9a 344 memset ((char *) pEvent, '\0', sizeof (RDB_EVENT));
dd3b648e
RP
345
346 pid = inferior_pid;
e7b5942b
JK
347 status = net_clnt_call (PROCESS_WAIT, xdr_int, &pid, xdr_RDB_EVENT,
348 pEvent);
dd3b648e 349
161520dc
KH
350 /* return (status == RPC_SUCCESS)? pEvent->status: -1; */
351 if (status == RPC_SUCCESS)
352 return ((pEvent->status) ? 1 : 0);
353 else if (status == RPC_TIMEDOUT)
354 return (1);
355 else
356 return (-1);
dd3b648e
RP
357}
358
359/* Suspend the remote task.
360 Returns -1 if suspend fails on target system, 0 otherwise. */
361
8616205a 362static int
dd3b648e
RP
363net_quit ()
364{
e7b5942b
JK
365 int pid;
366 int quit_status;
367 enum clnt_stat status;
dd3b648e 368
e7b5942b 369 quit_status = 0;
dd3b648e 370
e7b5942b 371 /* don't let rdbTask suspend itself by passing a pid of 0 */
dd3b648e 372
e7b5942b
JK
373 if ((pid = inferior_pid) == 0)
374 return -1;
dd3b648e 375
e7b5942b
JK
376 status = net_clnt_call (VX_TASK_SUSPEND, xdr_int, &pid, xdr_int,
377 &quit_status);
dd3b648e 378
e7b5942b 379 return (status == RPC_SUCCESS)? quit_status: -1;
dd3b648e
RP
380}
381
382/* Read a register or registers from the remote system. */
383
161520dc
KH
384void
385net_read_registers (reg_buf, len, procnum)
386 char *reg_buf;
387 int len;
388 u_long procnum;
dd3b648e
RP
389{
390 int status;
391 Rptrace ptrace_in;
392 Ptrace_return ptrace_out;
8616205a 393 C_bytes out_data;
161520dc 394 char message[100];
dd3b648e 395
bf644f8f
JK
396 memset ((char *) &ptrace_in, '\0', sizeof (ptrace_in));
397 memset ((char *) &ptrace_out, '\0', sizeof (ptrace_out));
dd3b648e 398
161520dc
KH
399 /* Initialize RPC input argument structure. */
400
dd3b648e 401 ptrace_in.pid = inferior_pid;
161520dc
KH
402 ptrace_in.info.ttype = NOINFO;
403
404 /* Initialize RPC return value structure. */
405
406 out_data.bytes = reg_buf;
407 out_data.len = len;
8616205a 408 ptrace_out.info.more_data = (caddr_t) &out_data;
161520dc
KH
409
410 /* Call RPC; take an error exit if appropriate. */
411
412 status = net_ptrace_clnt_call (procnum, &ptrace_in, &ptrace_out);
dd3b648e
RP
413 if (status)
414 error (rpcerr);
415 if (ptrace_out.status == -1)
416 {
bf644f8f 417 errno = ptrace_out.errno;
161520dc
KH
418 sprintf (message, "reading %s registers", (procnum == PTRACE_GETREGS)
419 ? "general-purpose"
420 : "floating-point");
421 perror_with_name (message);
bf644f8f 422 }
dd3b648e
RP
423}
424
161520dc
KH
425/* Write register values to a VxWorks target. REG_BUF points to a buffer
426 containing the raw register values, LEN is the length of REG_BUF in
427 bytes, and PROCNUM is the RPC procedure number (PTRACE_SETREGS or
428 PTRACE_SETFPREGS). An error exit is taken if the RPC call fails or
429 if an error status is returned by the remote debug server. This is
430 a utility routine used by vx_write_register (). */
dd3b648e 431
161520dc
KH
432void
433net_write_registers (reg_buf, len, procnum)
434 char *reg_buf;
435 int len;
436 u_long procnum;
dd3b648e 437{
dd3b648e
RP
438 int status;
439 Rptrace ptrace_in;
440 Ptrace_return ptrace_out;
161520dc
KH
441 C_bytes in_data;
442 char message[100];
83d9bb14 443
bf644f8f
JK
444 memset ((char *) &ptrace_in, '\0', sizeof (ptrace_in));
445 memset ((char *) &ptrace_out, '\0', sizeof (ptrace_out));
dd3b648e 446
161520dc
KH
447 /* Initialize RPC input argument structure. */
448
449 in_data.bytes = reg_buf;
450 in_data.len = len;
451
8616205a 452 ptrace_in.pid = inferior_pid;
161520dc 453 ptrace_in.info.ttype = DATA;
8616205a
SG
454 ptrace_in.info.more_data = (caddr_t) &in_data;
455
161520dc 456 /* Call RPC; take an error exit if appropriate. */
dd3b648e 457
161520dc 458 status = net_ptrace_clnt_call (procnum, &ptrace_in, &ptrace_out);
dd3b648e 459 if (status)
e7b5942b 460 error (rpcerr);
dd3b648e
RP
461 if (ptrace_out.status == -1)
462 {
bf644f8f 463 errno = ptrace_out.errno;
161520dc
KH
464 sprintf (message, "writing %s registers", (procnum == PTRACE_SETREGS)
465 ? "general-purpose"
466 : "floating-point");
467 perror_with_name (message);
dd3b648e 468 }
161520dc 469}
dd3b648e 470
161520dc
KH
471/* Prepare to store registers. Since we will store all of them,
472 read out their current values now. */
bf644f8f 473
161520dc
KH
474static void
475vx_prepare_to_store ()
476{
477 /* Fetch all registers, if any of them are not yet fetched. */
478 read_register_bytes (0, NULL, REGISTER_BYTES);
dd3b648e
RP
479}
480
481/* Copy LEN bytes to or from remote inferior's memory starting at MEMADDR
482 to debugger memory starting at MYADDR. WRITE is true if writing to the
483 inferior.
484 Result is the number of bytes written or read (zero if error). The
485 protocol allows us to return a negative count, indicating that we can't
486 handle the current address but can handle one N bytes further, but
487 vxworks doesn't give us that information. */
488
8616205a 489static int
8f1f2a72 490vx_xfer_memory (memaddr, myaddr, len, write, target)
dd3b648e
RP
491 CORE_ADDR memaddr;
492 char *myaddr;
493 int len;
8f1f2a72
JG
494 int write;
495 struct target_ops *target; /* ignored */
dd3b648e
RP
496{
497 int status;
498 Rptrace ptrace_in;
499 Ptrace_return ptrace_out;
500 C_bytes data;
161520dc
KH
501 enum ptracereq request;
502 int nleft, nxfer;
dd3b648e 503
4ed97c9a
RP
504 memset ((char *) &ptrace_in, '\0', sizeof (ptrace_in));
505 memset ((char *) &ptrace_out, '\0', sizeof (ptrace_out));
dd3b648e
RP
506
507 ptrace_in.pid = inferior_pid; /* XXX pid unnecessary for READDATA */
508 ptrace_in.addr = (int) memaddr; /* Where from */
509 ptrace_in.data = len; /* How many bytes */
510
511 if (write)
512 {
513 ptrace_in.info.ttype = DATA;
514 ptrace_in.info.more_data = (caddr_t) &data;
515
516 data.bytes = (caddr_t) myaddr; /* Where from */
517 data.len = len; /* How many bytes (again, for XDR) */
161520dc 518 request = PTRACE_WRITEDATA;
dd3b648e
RP
519 }
520 else
521 {
522 ptrace_out.info.more_data = (caddr_t) &data;
161520dc 523 request = PTRACE_READDATA;
bf644f8f 524 }
161520dc
KH
525 /* Loop until the entire request has been satisfied, transferring
526 at most VX_MEMXFER_MAX bytes per iteration. Break from the loop
527 if an error status is returned by the remote debug server. */
83d9bb14 528
161520dc
KH
529 nleft = len;
530 status = 0;
531
532 while (nleft > 0 && status == 0)
dd3b648e 533 {
161520dc
KH
534 nxfer = min (nleft, VX_MEMXFER_MAX);
535
536 ptrace_in.addr = (int) memaddr;
537 ptrace_in.data = nxfer;
538 data.bytes = (caddr_t) myaddr;
539 data.len = nxfer;
540
541 /* Request a block from the remote debug server; if RPC fails,
542 report an error and return to debugger command level. */
543
544 if (net_ptrace_clnt_call (request, &ptrace_in, &ptrace_out))
545 error (rpcerr);
546
547 status = ptrace_out.status;
548 if (status == 0)
549 {
550 memaddr += nxfer;
551 myaddr += nxfer;
552 nleft -= nxfer;
553 }
554 else
555 {
556 /* A target-side error has ocurred. Set errno to the error
557 code chosen by the target so that a later perror () will
558 say something meaningful. */
559
560 errno = ptrace_out.errno;
561 }
dd3b648e 562 }
161520dc
KH
563
564 /* Return the number of bytes transferred. */
565
566 return (len - nleft);
dd3b648e
RP
567}
568
8616205a 569static void
dd3b648e
RP
570vx_files_info ()
571{
199b2450
TL
572 printf_unfiltered ("\tAttached to host `%s'", vx_host);
573 printf_unfiltered (", which has %sfloating point", target_has_fp? "": "no ");
574 printf_unfiltered (".\n");
dd3b648e
RP
575}
576
8616205a 577static void
dd3b648e
RP
578vx_run_files_info ()
579{
199b2450 580 printf_unfiltered ("\tRunning %s VxWorks process %s",
833e0d94
JK
581 vx_running ? "child" : "attached",
582 local_hex_string (inferior_pid));
dd3b648e 583 if (vx_running)
199b2450
TL
584 printf_unfiltered (", function `%s'", vx_running);
585 printf_unfiltered(".\n");
dd3b648e
RP
586}
587
8616205a 588static void
25286543
SG
589vx_resume (pid, step, siggnal)
590 int pid;
dd3b648e 591 int step;
67ac9759 592 enum target_signal siggnal;
dd3b648e
RP
593{
594 int status;
595 Rptrace ptrace_in;
596 Ptrace_return ptrace_out;
161520dc 597 CORE_ADDR cont_addr;
dd3b648e 598
de43d7d0
SG
599 if (pid == -1)
600 pid = inferior_pid;
601
dd3b648e
RP
602 if (siggnal != 0 && siggnal != stop_signal)
603 error ("Cannot send signals to VxWorks processes");
604
161520dc
KH
605 /* Set CONT_ADDR to the address at which we are continuing,
606 or to 1 if we are continuing from where the program stopped.
607 This conforms to traditional ptrace () usage, but at the same
608 time has special meaning for the VxWorks remote debug server.
609 If the address is not 1, the server knows that the target
610 program is jumping to a new address, which requires special
611 handling if there is a breakpoint at the new address. */
612
613 cont_addr = read_register (PC_REGNUM);
614 if (cont_addr == stop_pc)
615 cont_addr = 1;
616
4ed97c9a
RP
617 memset ((char *) &ptrace_in, '\0', sizeof (ptrace_in));
618 memset ((char *) &ptrace_out, '\0', sizeof (ptrace_out));
dd3b648e 619
25286543 620 ptrace_in.pid = pid;
161520dc
KH
621 ptrace_in.addr = cont_addr; /* Target side insists on this, or it panics. */
622
623 if (step)
624 status = net_step();
625 else
626 status = net_ptrace_clnt_call (PTRACE_CONT, &ptrace_in, &ptrace_out);
dd3b648e 627
dd3b648e 628 if (status)
e7b5942b 629 error (rpcerr);
dd3b648e
RP
630 if (ptrace_out.status == -1)
631 {
632 errno = ptrace_out.errno;
633 perror_with_name ("Resuming remote process");
634 }
635}
636
8616205a 637static void
dd3b648e
RP
638vx_mourn_inferior ()
639{
640 pop_target (); /* Pop back to no-child state */
641 generic_mourn_inferior ();
642}
643
644\f
e7b5942b
JK
645static void vx_add_symbols PARAMS ((char *, int, CORE_ADDR, CORE_ADDR,
646 CORE_ADDR));
647
648struct find_sect_args {
649 CORE_ADDR text_start;
650 CORE_ADDR data_start;
651 CORE_ADDR bss_start;
652};
653
654static void find_sect PARAMS ((bfd *, asection *, void *));
655
656static void
657find_sect (abfd, sect, obj)
658 bfd *abfd;
659 asection *sect;
660 PTR obj;
661{
662 struct find_sect_args *args = (struct find_sect_args *)obj;
663
664 if (bfd_get_section_flags (abfd, sect) & (SEC_CODE & SEC_READONLY))
665 args->text_start = bfd_get_section_vma (abfd, sect);
666 else if (bfd_get_section_flags (abfd, sect) & SEC_ALLOC)
667 {
668 if (bfd_get_section_flags (abfd, sect) & SEC_LOAD)
669 {
670 /* Exclude .ctor and .dtor sections which have SEC_CODE set but not
671 SEC_DATA. */
672 if (bfd_get_section_flags (abfd, sect) & SEC_DATA)
673 args->data_start = bfd_get_section_vma (abfd, sect);
674 }
675 else
676 args->bss_start = bfd_get_section_vma (abfd, sect);
677 }
678}
679
680static void
681vx_add_symbols (name, from_tty, text_addr, data_addr, bss_addr)
682 char *name;
683 int from_tty;
684 CORE_ADDR text_addr;
685 CORE_ADDR data_addr;
686 CORE_ADDR bss_addr;
687{
688 struct section_offsets *offs;
689 struct objfile *objfile;
690 struct find_sect_args ss;
691
3a470454
JK
692 /* It might be nice to suppress the breakpoint_re_set which happens here
693 because we are going to do one again after the objfile_relocate. */
e7b5942b 694 objfile = symbol_file_add (name, from_tty, 0, 0, 0, 0);
3a470454
JK
695
696 /* This is a (slightly cheesy) way of superceding the old symbols. A less
697 cheesy way would be to find the objfile with the same name and
698 free_objfile it. */
699 objfile_to_front (objfile);
700
e7b5942b
JK
701 offs = (struct section_offsets *)
702 alloca (sizeof (struct section_offsets)
703 + objfile->num_sections * sizeof (offs->offsets));
704 memcpy (offs, objfile->section_offsets,
705 sizeof (struct section_offsets)
706 + objfile->num_sections * sizeof (offs->offsets));
707
708 ss.text_start = 0;
709 ss.data_start = 0;
710 ss.bss_start = 0;
711 bfd_map_over_sections (objfile->obfd, find_sect, &ss);
712
713 /* Both COFF and b.out frontends use these SECT_OFF_* values. */
714 ANOFFSET (offs, SECT_OFF_TEXT) = text_addr - ss.text_start;
715 ANOFFSET (offs, SECT_OFF_DATA) = data_addr - ss.data_start;
716 ANOFFSET (offs, SECT_OFF_BSS) = bss_addr - ss.bss_start;
717 objfile_relocate (objfile, offs);
3a470454
JK
718
719 /* Need to do this *after* things are relocated. */
720 breakpoint_re_set ();
e7b5942b
JK
721}
722
dd3b648e
RP
723/* This function allows the addition of incrementally linked object files. */
724
8616205a 725static void
dd3b648e 726vx_load_command (arg_string, from_tty)
e7b5942b 727 char *arg_string;
dd3b648e
RP
728 int from_tty;
729{
730 CORE_ADDR text_addr;
731 CORE_ADDR data_addr;
732 CORE_ADDR bss_addr;
e7b5942b 733
dd3b648e
RP
734 if (arg_string == 0)
735 error ("The load command takes a file name");
736
737 arg_string = tilde_expand (arg_string);
738 make_cleanup (free, arg_string);
739
740 dont_repeat ();
741
161520dc
KH
742 /* Refuse to load the module if a debugged task is running. Doing so
743 can have a number of unpleasant consequences to the running task. */
744
745 if (inferior_pid != 0 && target_has_execution)
746 {
747 if (query ("You may not load a module while the target task is running.\n\
748Kill the target task? "))
749 target_kill ();
750 else
751 error ("Load cancelled.");
752 }
753
dd3b648e
RP
754 QUIT;
755 immediate_quit++;
756 if (net_load (arg_string, &text_addr, &data_addr, &bss_addr) == -1)
757 error ("Load failed on target machine");
758 immediate_quit--;
759
e7b5942b 760 vx_add_symbols (arg_string, from_tty, text_addr, data_addr, bss_addr);
46d185d3
PS
761
762 /* Getting new symbols may change our opinion about what is
763 frameless. */
764 reinit_frame_cache ();
dd3b648e
RP
765}
766
dd3b648e
RP
767/* Single step the target program at the source or machine level.
768 Takes an error exit if rpc fails.
769 Returns -1 if remote single-step operation fails, else 0. */
770
771static int
772net_step ()
773{
774 enum clnt_stat status;
775 int step_status;
776 SOURCE_STEP source_step;
777
778 source_step.taskId = inferior_pid;
779
780 if (step_range_end)
781 {
782 source_step.startAddr = step_range_start;
783 source_step.endAddr = step_range_end;
784 }
785 else
786 {
787 source_step.startAddr = 0;
788 source_step.endAddr = 0;
789 }
790
791 status = net_clnt_call (VX_SOURCE_STEP, xdr_SOURCE_STEP, &source_step,
792 xdr_int, &step_status);
793
794 if (status == RPC_SUCCESS)
795 return step_status;
796 else
797 error (rpcerr);
798}
dd3b648e
RP
799
800/* Emulate ptrace using RPC calls to the VxWorks target system.
801 Returns nonzero (-1) if RPC status to VxWorks is bad, 0 otherwise. */
802
803static int
804net_ptrace_clnt_call (request, pPtraceIn, pPtraceOut)
805 enum ptracereq request;
806 Rptrace *pPtraceIn;
807 Ptrace_return *pPtraceOut;
808{
809 enum clnt_stat status;
810
811 status = net_clnt_call (request, xdr_rptrace, pPtraceIn, xdr_ptrace_return,
812 pPtraceOut);
813
814 if (status != RPC_SUCCESS)
815 return -1;
816
817 return 0;
818}
819
820/* Query the target for the name of the file from which VxWorks was
821 booted. pBootFile is the address of a pointer to the buffer to
822 receive the file name; if the pointer pointed to by pBootFile is
823 NULL, memory for the buffer will be allocated by XDR.
824 Returns -1 if rpc failed, 0 otherwise. */
825
8616205a 826static int
dd3b648e
RP
827net_get_boot_file (pBootFile)
828 char **pBootFile;
829{
830 enum clnt_stat status;
831
832 status = net_clnt_call (VX_BOOT_FILE_INQ, xdr_void, (char *) 0,
833 xdr_wrapstring, pBootFile);
834 return (status == RPC_SUCCESS) ? 0 : -1;
835}
836
837/* Fetch a list of loaded object modules from the VxWorks target.
838 Returns -1 if rpc failed, 0 otherwise
839 There's no way to check if the returned loadTable is correct.
840 VxWorks doesn't check it. */
841
8616205a 842static int
dd3b648e
RP
843net_get_symbols (pLoadTable)
844 ldtabl *pLoadTable; /* return pointer to ldtabl here */
845{
846 enum clnt_stat status;
847
4ed97c9a 848 memset ((char *) pLoadTable, '\0', sizeof (struct ldtabl));
dd3b648e
RP
849
850 status = net_clnt_call (VX_STATE_INQ, xdr_void, 0, xdr_ldtabl, pLoadTable);
851 return (status == RPC_SUCCESS) ? 0 : -1;
852}
853
854/* Look up a symbol in the VxWorks target's symbol table.
855 Returns status of symbol read on target side (0=success, -1=fail)
856 Returns -1 and complain()s if rpc fails. */
857
858struct complaint cant_contact_target =
859 {"Lost contact with VxWorks target", 0, 0};
860
8616205a 861static int
dd3b648e
RP
862vx_lookup_symbol (name, pAddr)
863 char *name; /* symbol name */
864 CORE_ADDR *pAddr;
865{
866 enum clnt_stat status;
867 SYMBOL_ADDR symbolAddr;
868
869 *pAddr = 0;
4ed97c9a 870 memset ((char *) &symbolAddr, '\0', sizeof (symbolAddr));
dd3b648e
RP
871
872 status = net_clnt_call (VX_SYMBOL_INQ, xdr_wrapstring, &name,
873 xdr_SYMBOL_ADDR, &symbolAddr);
e7b5942b
JK
874 if (status != RPC_SUCCESS)
875 {
51b80b00 876 complain (&cant_contact_target);
dd3b648e 877 return -1;
e7b5942b 878 }
dd3b648e
RP
879
880 *pAddr = symbolAddr.addr;
881 return symbolAddr.status;
882}
883
884/* Check to see if the VxWorks target has a floating point coprocessor.
885 Returns 1 if target has floating point processor, 0 otherwise.
886 Calls error() if rpc fails. */
887
8616205a 888static int
dd3b648e
RP
889net_check_for_fp ()
890{
891 enum clnt_stat status;
892 bool_t fp = 0; /* true if fp processor is present on target board */
893
894 status = net_clnt_call (VX_FP_INQUIRE, xdr_void, 0, xdr_bool, &fp);
895 if (status != RPC_SUCCESS)
e7b5942b 896 error (rpcerr);
dd3b648e
RP
897
898 return (int) fp;
899}
900
901/* Establish an RPC connection with the VxWorks target system.
902 Calls error () if unable to establish connection. */
903
8616205a 904static void
dd3b648e
RP
905net_connect (host)
906 char *host;
907{
908 struct sockaddr_in destAddr;
909 struct hostent *destHost;
ebe8362f 910 unsigned long addr;
e7b5942b 911
ebe8362f
JK
912 /* Get the internet address for the given host. Allow a numeric
913 IP address or a hostname. */
dd3b648e 914
ebe8362f
JK
915 addr = inet_addr (host);
916 if (addr == -1)
917 {
918 destHost = (struct hostent *) gethostbyname (host);
919 if (destHost == NULL)
e7b5942b
JK
920 /* FIXME: Probably should include hostname here in quotes.
921 For example if the user types "target vxworks vx960 " it should
922 say "Invalid host `vx960 '." not just "Invalid hostname". */
ebe8362f
JK
923 error ("Invalid hostname. Couldn't find remote host address.");
924 addr = * (unsigned long *) destHost->h_addr;
925 }
dd3b648e 926
4ed97c9a 927 memset (&destAddr, '\0', sizeof (destAddr));
dd3b648e 928
ebe8362f 929 destAddr.sin_addr.s_addr = addr;
dd3b648e
RP
930 destAddr.sin_family = AF_INET;
931 destAddr.sin_port = 0; /* set to actual port that remote
932 ptrace is listening on. */
933
934 /* Create a tcp client transport on which to issue
935 calls to the remote ptrace server. */
936
937 ptraceSock = RPC_ANYSOCK;
938 pClient = clnttcp_create (&destAddr, RDBPROG, RDBVERS, &ptraceSock, 0, 0);
e7b5942b
JK
939 /* FIXME, here is where we deal with different version numbers of the
940 proto */
941
dd3b648e
RP
942 if (pClient == NULL)
943 {
944 clnt_pcreateerror ("\tnet_connect");
945 error ("Couldn't connect to remote target.");
946 }
947}
948\f
949/* Sleep for the specified number of milliseconds
950 * (assumed to be less than 1000).
951 * If select () is interrupted, returns immediately;
952 * takes an error exit if select () fails for some other reason.
953 */
954
955static void
956sleep_ms (ms)
957 long ms;
958{
959 struct timeval select_timeout;
960 int status;
961
962 select_timeout.tv_sec = 0;
963 select_timeout.tv_usec = ms * 1000;
964
e7b5942b
JK
965 status = select (0, (fd_set *) 0, (fd_set *) 0, (fd_set *) 0,
966 &select_timeout);
dd3b648e
RP
967
968 if (status < 0 && errno != EINTR)
969 perror_with_name ("select");
970}
971
dd3b648e 972static int
c3cabecb
JK
973vx_wait (pid_to_wait_for, status)
974 int pid_to_wait_for;
67ac9759 975 struct target_waitstatus *status;
dd3b648e
RP
976{
977 register int pid;
dd3b648e
RP
978 RDB_EVENT rdbEvent;
979 int quit_failed;
980
981 do
982 {
983 /* If CTRL-C is hit during this loop,
984 suspend the inferior process. */
985
986 quit_failed = 0;
987 if (quit_flag)
988 {
989 quit_failed = (net_quit () == -1);
990 quit_flag = 0;
991 }
992
993 /* If a net_quit () or net_wait () call has failed,
994 allow the user to break the connection with the target.
995 We can't simply error () out of this loop, since the
996 data structures representing the state of the inferior
997 are in an inconsistent state. */
998
999 if (quit_failed || net_wait (&rdbEvent) == -1)
1000 {
1001 terminal_ours ();
1002 if (query ("Can't %s. Disconnect from target system? ",
1003 (quit_failed) ? "suspend remote task"
1004 : "get status of remote task"))
1005 {
1006 target_mourn_inferior();
1007 error ("Use the \"target\" command to reconnect.");
1008 }
1009 else
1010 {
1011 terminal_inferior ();
1012 continue;
1013 }
1014 }
1015
1016 pid = rdbEvent.taskId;
1017 if (pid == 0)
1018 {
1019 sleep_ms (200); /* FIXME Don't kill the network too badly */
1020 }
1021 else if (pid != inferior_pid)
5573d7d4
JK
1022 fatal ("Bad pid for debugged task: %s\n",
1023 local_hex_string((unsigned long) pid));
dd3b648e
RP
1024 } while (pid == 0);
1025
67ac9759
JK
1026 /* The mostly likely kind. */
1027 status->kind = TARGET_WAITKIND_STOPPED;
1028
dd3b648e
RP
1029 switch (rdbEvent.eventType)
1030 {
1031 case EVENT_EXIT:
67ac9759 1032 status->kind = TARGET_WAITKIND_EXITED;
dd3b648e 1033 /* FIXME is it possible to distinguish between a
67ac9759
JK
1034 normal vs abnormal exit in VxWorks? */
1035 status->value.integer = 0;
dd3b648e
RP
1036 break;
1037
67ac9759
JK
1038 case EVENT_START:
1039 /* Task was just started. */
1040 status->value.sig = TARGET_SIGNAL_TRAP;
dd3b648e
RP
1041 break;
1042
1043 case EVENT_STOP:
67ac9759 1044 status->value.sig = TARGET_SIGNAL_TRAP;
dd3b648e
RP
1045 /* XXX was it stopped by a signal? act accordingly */
1046 break;
1047
1048 case EVENT_BREAK: /* Breakpoint was hit. */
67ac9759 1049 status->value.sig = TARGET_SIGNAL_TRAP;
dd3b648e
RP
1050 break;
1051
1052 case EVENT_SUSPEND: /* Task was suspended, probably by ^C. */
67ac9759 1053 status->value.sig = TARGET_SIGNAL_INT;
dd3b648e
RP
1054 break;
1055
1056 case EVENT_BUS_ERR: /* Task made evil nasty reference. */
67ac9759 1057 status->value.sig = TARGET_SIGNAL_BUS;
dd3b648e
RP
1058 break;
1059
1060 case EVENT_ZERO_DIV: /* Division by zero */
67ac9759 1061 status->value.sig = TARGET_SIGNAL_FPE;
021959e2 1062 break;
dd3b648e
RP
1063
1064 case EVENT_SIGNAL:
d0acb092 1065#ifdef I80960
67ac9759 1066 status->value.sig = i960_fault_to_signal (rdbEvent.sigType);
d0acb092
JK
1067#else
1068 /* Back in the old days, before enum target_signal, this code used
1069 to add NSIG to the signal number and claim that PRINT_RANDOM_SIGNAL
1070 would take care of it. But PRINT_RANDOM_SIGNAL has never been
1071 defined except on the i960, so I don't really know what we are
1072 supposed to do on other architectures. */
1073 status->value.sig = TARGET_SIGNAL_UNKNOWN;
1074#endif
dd3b648e
RP
1075 break;
1076 } /* switch */
dd3b648e
RP
1077 return pid;
1078}
1079\f
1080static int
1081symbol_stub (arg)
bdbd5f50 1082 char *arg;
dd3b648e 1083{
bdbd5f50 1084 symbol_file_command (arg, 0);
dd3b648e
RP
1085 return 1;
1086}
1087
1088static int
1089add_symbol_stub (arg)
bdbd5f50 1090 char *arg;
dd3b648e
RP
1091{
1092 struct ldfile *pLoadFile = (struct ldfile *)arg;
1093
199b2450 1094 printf_unfiltered("\t%s: ", pLoadFile->name);
e7b5942b
JK
1095 vx_add_symbols (pLoadFile->name, 0, pLoadFile->txt_addr,
1096 pLoadFile->data_addr, pLoadFile->bss_addr);
199b2450 1097 printf_unfiltered ("ok\n");
dd3b648e
RP
1098 return 1;
1099}
1100/* Target command for VxWorks target systems.
1101
1102 Used in vxgdb. Takes the name of a remote target machine
1103 running vxWorks and connects to it to initialize remote network
1104 debugging. */
1105
1106static void
1107vx_open (args, from_tty)
1108 char *args;
1109 int from_tty;
1110{
1111 extern int close ();
1112 char *bootFile;
1113 extern char *source_path;
1114 struct ldtabl loadTable;
1115 struct ldfile *pLoadFile;
1116 int i;
1117 extern CLIENT *pClient;
46d185d3 1118 int symbols_added = 0;
dd3b648e
RP
1119
1120 if (!args)
1121 error_no_arg ("target machine name");
1122
70dcc196
JK
1123 target_preopen (from_tty);
1124
dd3b648e 1125 unpush_target (&vx_ops);
199b2450
TL
1126 printf_unfiltered ("Attaching remote machine across net...\n");
1127 gdb_flush (gdb_stdout);
dd3b648e
RP
1128
1129 /* Allow the user to kill the connect attempt by typing ^C.
1130 Wait until the call to target_has_fp () completes before
1131 disallowing an immediate quit, since even if net_connect ()
1132 is successful, the remote debug server might be hung. */
1133
1134 immediate_quit++;
1135
1136 net_connect (args);
1137 target_has_fp = net_check_for_fp ();
1138 printf_filtered ("Connected to %s.\n", args);
1139
1140 immediate_quit--;
1141
1142 push_target (&vx_ops);
1143
1144 /* Save a copy of the target host's name. */
1145 vx_host = savestring (args, strlen (args));
1146
1147 /* Find out the name of the file from which the target was booted
1148 and load its symbol table. */
1149
1150 printf_filtered ("Looking in Unix path for all loaded modules:\n");
1151 bootFile = NULL;
1152 if (!net_get_boot_file (&bootFile))
1153 {
e7b5942b
JK
1154 if (*bootFile)
1155 {
1156 printf_filtered ("\t%s: ", bootFile);
1157 /* This assumes that the kernel is never relocated. Hope that is an
1158 accurate assumption. */
1159 if (catch_errors
1160 (symbol_stub,
1161 bootFile,
1162 "Error while reading symbols from boot file:\n",
1163 RETURN_MASK_ALL))
1164 puts_filtered ("ok\n");
1165 }
1166 else if (from_tty)
199b2450 1167 printf_unfiltered ("VxWorks kernel symbols not loaded.\n");
dd3b648e
RP
1168 }
1169 else
1170 error ("Can't retrieve boot file name from target machine.");
1171
1172 clnt_freeres (pClient, xdr_wrapstring, &bootFile);
1173
1174 if (net_get_symbols (&loadTable) != 0)
1175 error ("Can't read loaded modules from target machine");
1176
1177 i = 0-1;
1178 while (++i < loadTable.tbl_size)
1179 {
1180 QUIT; /* FIXME, avoids clnt_freeres below: mem leak */
1181 pLoadFile = &loadTable.tbl_ent [i];
1182#ifdef WRS_ORIG
1183 {
1184 register int desc;
1185 struct cleanup *old_chain;
1186 char *fullname = NULL;
1187
1188 desc = openp (source_path, 0, pLoadFile->name, O_RDONLY, 0, &fullname);
1189 if (desc < 0)
1190 perror_with_name (pLoadFile->name);
1191 old_chain = make_cleanup (close, desc);
1192 add_file_at_addr (fullname, desc, pLoadFile->txt_addr, pLoadFile->data_addr,
1193 pLoadFile->bss_addr);
1194 do_cleanups (old_chain);
1195 }
1196#else
e7b5942b
JK
1197 /* FIXME: Is there something better to search than the PATH? (probably
1198 not the source path, since source might be in different directories
1199 than objects. */
1200
46d185d3
PS
1201 if (catch_errors (add_symbol_stub, (char *)pLoadFile, (char *)0,
1202 RETURN_MASK_ALL))
1203 symbols_added = 1;
dd3b648e
RP
1204#endif
1205 }
1206 printf_filtered ("Done.\n");
1207
1208 clnt_freeres (pClient, xdr_ldtabl, &loadTable);
46d185d3
PS
1209
1210 /* Getting new symbols may change our opinion about what is
1211 frameless. */
1212 if (symbols_added)
1213 reinit_frame_cache ();
dd3b648e
RP
1214}
1215\f
836e343b 1216/* Takes a task started up outside of gdb and ``attaches'' to it.
dd3b648e
RP
1217 This stops it cold in its tracks and allows us to start tracing it. */
1218
1219static void
1220vx_attach (args, from_tty)
1221 char *args;
1222 int from_tty;
1223{
3d19ff2b 1224 unsigned long pid;
dd3b648e
RP
1225 char *cptr = 0;
1226 Rptrace ptrace_in;
1227 Ptrace_return ptrace_out;
1228 int status;
1229
dd3b648e
RP
1230 if (!args)
1231 error_no_arg ("process-id to attach");
1232
3d19ff2b 1233 pid = strtoul (args, &cptr, 0);
dd3b648e
RP
1234 if ((cptr == args) || (*cptr != '\0'))
1235 error ("Invalid process-id -- give a single number in decimal or 0xhex");
1236
1237 if (from_tty)
3d19ff2b
SS
1238 printf_unfiltered ("Attaching pid %s.\n",
1239 local_hex_string((unsigned long) pid));
dd3b648e 1240
4ed97c9a
RP
1241 memset ((char *)&ptrace_in, '\0', sizeof (ptrace_in));
1242 memset ((char *)&ptrace_out, '\0', sizeof (ptrace_out));
dd3b648e
RP
1243 ptrace_in.pid = pid;
1244
1245 status = net_ptrace_clnt_call (PTRACE_ATTACH, &ptrace_in, &ptrace_out);
1246 if (status == -1)
1247 error (rpcerr);
1248 if (ptrace_out.status == -1)
1249 {
1250 errno = ptrace_out.errno;
1251 perror_with_name ("Attaching remote process");
1252 }
1253
1254 /* It worked... */
1255 push_target (&vx_run_ops);
3d19ff2b
SS
1256 /* The unsigned long pid will get turned into a signed int here,
1257 but it doesn't seem to matter. inferior_pid must be signed
1258 in order for other parts of GDB to work correctly. */
dd3b648e
RP
1259 inferior_pid = pid;
1260 vx_running = 0;
161520dc
KH
1261#if defined (START_INFERIOR_HOOK)
1262 START_INFERIOR_HOOK ();
1263#endif
1264
1265 mark_breakpoints_out ();
1266
1267 /* Set up the "saved terminal modes" of the inferior
1268 based on what modes we are starting it with. */
1269
1270 target_terminal_init ();
1271
1272 /* Install inferior's terminal modes. */
1273
1274 target_terminal_inferior ();
1275
1276 /* We will get a task spawn event immediately. */
1277
1278 init_wait_for_inferior ();
1279 clear_proceed_status ();
1280 stop_soon_quietly = 1;
1281 wait_for_inferior ();
1282 stop_soon_quietly = 0;
1283 normal_stop ();
dd3b648e
RP
1284}
1285
1286
1287/* detach_command --
1288 takes a program previously attached to and detaches it.
1289 The program resumes execution and will no longer stop
1290 on signals, etc. We better not have left any breakpoints
1291 in the program or it'll die when it hits one. For this
1292 to work, it may be necessary for the process to have been
1293 previously attached. It *might* work if the program was
1294 started via the normal ptrace (PTRACE_TRACEME). */
1295
1296static void
1297vx_detach (args, from_tty)
1298 char *args;
1299 int from_tty;
1300{
1301 Rptrace ptrace_in;
1302 Ptrace_return ptrace_out;
1303 int signal = 0;
1304 int status;
1305
1306 if (args)
1307 error ("Argument given to VxWorks \"detach\".");
1308
1309 if (from_tty)
199b2450 1310 printf_unfiltered ("Detaching pid %s.\n",
5573d7d4 1311 local_hex_string((unsigned long) inferior_pid));
dd3b648e
RP
1312
1313 if (args) /* FIXME, should be possible to leave suspended */
1314 signal = atoi (args);
1315
4ed97c9a
RP
1316 memset ((char *)&ptrace_in, '\0', sizeof (ptrace_in));
1317 memset ((char *)&ptrace_out, '\0', sizeof (ptrace_out));
dd3b648e
RP
1318 ptrace_in.pid = inferior_pid;
1319
1320 status = net_ptrace_clnt_call (PTRACE_DETACH, &ptrace_in, &ptrace_out);
1321 if (status == -1)
1322 error (rpcerr);
1323 if (ptrace_out.status == -1)
1324 {
1325 errno = ptrace_out.errno;
1326 perror_with_name ("Detaching VxWorks process");
1327 }
1328
1329 inferior_pid = 0;
1330 pop_target (); /* go back to non-executing VxWorks connection */
1331}
1332
1333/* vx_kill -- takes a running task and wipes it out. */
1334
1335static void
afc5505f 1336vx_kill ()
dd3b648e
RP
1337{
1338 Rptrace ptrace_in;
1339 Ptrace_return ptrace_out;
1340 int status;
1341
199b2450 1342 printf_unfiltered ("Killing pid %s.\n", local_hex_string((unsigned long) inferior_pid));
dd3b648e 1343
4ed97c9a
RP
1344 memset ((char *)&ptrace_in, '\0', sizeof (ptrace_in));
1345 memset ((char *)&ptrace_out, '\0', sizeof (ptrace_out));
dd3b648e
RP
1346 ptrace_in.pid = inferior_pid;
1347
1348 status = net_ptrace_clnt_call (PTRACE_KILL, &ptrace_in, &ptrace_out);
1349 if (status == -1)
195b44d9
ILT
1350 warning (rpcerr);
1351 else if (ptrace_out.status == -1)
dd3b648e
RP
1352 {
1353 errno = ptrace_out.errno;
1354 perror_with_name ("Killing VxWorks process");
1355 }
1356
195b44d9
ILT
1357 /* If it gives good status, the process is *gone*, no events remain.
1358 If the kill failed, assume the process is gone anyhow. */
dd3b648e
RP
1359 inferior_pid = 0;
1360 pop_target (); /* go back to non-executing VxWorks connection */
1361}
1362
1363/* Clean up from the VxWorks process target as it goes away. */
1364
8616205a 1365static void
dd3b648e
RP
1366vx_proc_close (quitting)
1367 int quitting;
1368{
1369 inferior_pid = 0; /* No longer have a process. */
1370 if (vx_running)
1371 free (vx_running);
1372 vx_running = 0;
1373}
1374\f
dd3b648e
RP
1375/* Make an RPC call to the VxWorks target.
1376 Returns RPC status. */
1377
1378static enum clnt_stat
1379net_clnt_call (procNum, inProc, in, outProc, out)
1380 enum ptracereq procNum;
1381 xdrproc_t inProc;
1382 char *in;
1383 xdrproc_t outProc;
1384 char *out;
1385{
1386 enum clnt_stat status;
1387
1388 status = clnt_call (pClient, procNum, inProc, in, outProc, out, rpcTimeout);
1389
1390 if (status != RPC_SUCCESS)
1391 clnt_perrno (status);
1392
1393 return status;
1394}
1395
1396/* Clean up before losing control. */
1397
8616205a 1398static void
dd3b648e
RP
1399vx_close (quitting)
1400 int quitting;
1401{
1402 if (pClient)
1403 clnt_destroy (pClient); /* The net connection */
1404 pClient = 0;
1405
1406 if (vx_host)
1407 free (vx_host); /* The hostname */
1408 vx_host = 0;
1409}
1410
70dcc196
JK
1411/* A vxprocess target should be started via "run" not "target". */
1412/*ARGSUSED*/
1413static void
1414vx_proc_open (name, from_tty)
1415 char *name;
1416 int from_tty;
1417{
1418 error ("Use the \"run\" command to start a VxWorks process.");
1419}
dd3b648e
RP
1420
1421/* Target ops structure for accessing memory and such over the net */
1422
1423struct target_ops vx_ops = {
e7b5942b
JK
1424 "vxworks", "VxWorks target memory via RPC over TCP/IP",
1425 "Use VxWorks target memory. \n\
70dcc196 1426Specify the name of the machine to connect to.",
e7b5942b
JK
1427 vx_open, vx_close, vx_attach, 0, /* vx_detach, */
1428 0, 0, /* resume, wait */
1429 0, 0, /* read_reg, write_reg */
1430 0, /* prep_to_store, */
1431 vx_xfer_memory, vx_files_info,
1432 0, 0, /* insert_breakpoint, remove_breakpoint */
1433 0, 0, 0, 0, 0, /* terminal stuff */
1434 0, /* vx_kill, */
1435 vx_load_command,
1436 vx_lookup_symbol,
1437 vx_create_inferior, 0, /* mourn_inferior */
1438 0, /* can_run */
1439 0, /* notice_signals */
5d672f28 1440 0, /* thread_alive */
6c27841f 1441 0, /* to_stop */
e7b5942b
JK
1442 core_stratum, 0, /* next */
1443 1, 1, 0, 0, 0, /* all mem, mem, stack, regs, exec */
1444 0, 0, /* Section pointers */
1445 OPS_MAGIC, /* Always the last thing */
dd3b648e
RP
1446};
1447
1448/* Target ops structure for accessing VxWorks child processes over the net */
1449
1450struct target_ops vx_run_ops = {
e7b5942b
JK
1451 "vxprocess", "VxWorks process",
1452 "VxWorks process, started by the \"run\" command.",
1453 vx_proc_open, vx_proc_close, 0, vx_detach, /* vx_attach */
1454 vx_resume, vx_wait,
1455 vx_read_register, vx_write_register,
1456 vx_prepare_to_store,
1457 vx_xfer_memory, vx_run_files_info,
1458 vx_insert_breakpoint, vx_remove_breakpoint,
1459 0, 0, 0, 0, 0, /* terminal stuff */
1460 vx_kill,
1461 vx_load_command,
1462 vx_lookup_symbol,
1463 0, vx_mourn_inferior,
1464 0, /* can_run */
1465 0, /* notice_signals */
5d672f28 1466 0, /* thread_alive */
6c27841f 1467 0, /* to_stop */
e7b5942b
JK
1468 process_stratum, 0, /* next */
1469 0, /* all_mem--off to avoid spurious msg in "i files" */
1470 1, 1, 1, 1, /* mem, stack, regs, exec */
1471 0, 0, /* Section pointers */
1472 OPS_MAGIC, /* Always the last thing */
dd3b648e
RP
1473};
1474/* ==> Remember when reading at end of file, there are two "ops" structs here. */
1475\f
1476void
1477_initialize_vx ()
1478{
e7b5942b 1479 add_show_from_set
1c5d6049 1480 (add_set_cmd ("vxworks-timeout", class_support, var_uinteger,
56894788
RP
1481 (char *) &rpcTimeout.tv_sec,
1482 "Set seconds to wait for rpc calls to return.\n\
1483Set the number of seconds to wait for rpc calls to return.", &setlist),
1484 &showlist);
1485
e7b5942b 1486 add_target (&vx_ops);
dd3b648e
RP
1487 add_target (&vx_run_ops);
1488}
This page took 0.418658 seconds and 4 git commands to generate.