1 /* Memory-access and commands for remote VxWorks processes, for GDB.
2 Copyright (C) 1990-95, 1997-98, 1999, 2001 Free Software Foundation, Inc.
3 Contributed by Wind River Systems and Cygnus Support.
5 This file is part of GDB.
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place - Suite 330,
20 Boston, MA 02111-1307, USA. */
29 #include "complaints.h"
31 #include "bfd.h" /* Required by objfiles.h. */
34 #include "gdb-stabs.h"
36 #include "gdb_string.h"
40 #include <sys/types.h>
41 #include <sys/socket.h>
42 #define malloc bogon_malloc /* Sun claims "char *malloc()" not void * */
43 #define free bogon_free /* Sun claims "int free()" not void */
44 #define realloc bogon_realloc /* Sun claims "char *realloc()", not void * */
49 #include <sys/time.h> /* UTek's <rpc/rpc.h> doesn't #incl this */
51 #include "vx-share/ptrace.h"
52 #include "vx-share/xdr_ptrace.h"
53 #include "vx-share/xdr_ld.h"
54 #include "vx-share/xdr_rdb.h"
55 #include "vx-share/dbgRpcLib.h"
59 /* Maximum number of bytes to transfer in a single
60 PTRACE_{READ,WRITE}DATA request. */
61 #define VX_MEMXFER_MAX 4096
63 extern void vx_read_register ();
64 extern void vx_write_register ();
65 extern void symbol_file_command ();
66 extern int stop_soon_quietly
; /* for wait_for_inferior */
68 static int net_step ();
69 static int net_ptrace_clnt_call (); /* Forward decl */
70 static enum clnt_stat
net_clnt_call (); /* Forward decl */
72 /* Target ops structure for accessing memory and such over the net */
74 static struct target_ops vx_ops
;
76 /* Target ops structure for accessing VxWorks child processes over the net */
78 static struct target_ops vx_run_ops
;
80 /* Saved name of target host and called function for "info files".
84 static char *vx_running
; /* Called function */
86 /* Nonzero means target that is being debugged remotely has a floating
91 /* Default error message when the network is forking up. */
93 static const char rpcerr
[] = "network target debugging: rpc error";
95 CLIENT
*pClient
; /* client used in net debugging */
96 static int ptraceSock
= RPC_ANYSOCK
;
98 enum clnt_stat
net_clnt_call ();
99 static void parse_args ();
101 static struct timeval rpcTimeout
=
104 static char *skip_white_space ();
105 static char *find_white_space ();
107 /* Tell the VxWorks target system to download a file.
108 The load addresses of the text, data, and bss segments are
109 stored in *pTextAddr, *pDataAddr, and *pBssAddr (respectively).
110 Returns 0 for success, -1 for failure. */
113 net_load (char *filename
, CORE_ADDR
*pTextAddr
, CORE_ADDR
*pDataAddr
,
116 enum clnt_stat status
;
117 struct ldfile ldstruct
;
118 struct timeval load_timeout
;
120 memset ((char *) &ldstruct
, '\0', sizeof (ldstruct
));
122 /* We invoke clnt_call () here directly, instead of through
123 net_clnt_call (), because we need to set a large timeout value.
124 The load on the target side can take quite a while, easily
125 more than 10 seconds. The user can kill this call by typing
126 CTRL-C if there really is a problem with the load.
128 Do not change the tv_sec value without checking -- select() imposes
129 a limit of 10**8 on it for no good reason that I can see... */
131 load_timeout
.tv_sec
= 99999999; /* A large number, effectively inf. */
132 load_timeout
.tv_usec
= 0;
134 status
= clnt_call (pClient
, VX_LOAD
, xdr_wrapstring
, &filename
, xdr_ldfile
,
135 &ldstruct
, load_timeout
);
137 if (status
== RPC_SUCCESS
)
139 if (*ldstruct
.name
== 0) /* load failed on VxWorks side */
141 *pTextAddr
= ldstruct
.txt_addr
;
142 *pDataAddr
= ldstruct
.data_addr
;
143 *pBssAddr
= ldstruct
.bss_addr
;
150 /* returns 0 if successful, errno if RPC failed or VxWorks complains. */
153 net_break (int addr
, u_long procnum
)
155 enum clnt_stat status
;
157 Rptrace ptrace_in
; /* XXX This is stupid. It doesn't need to be a ptrace
158 structure. How about something smaller? */
160 memset ((char *) &ptrace_in
, '\0', sizeof (ptrace_in
));
163 ptrace_in
.addr
= addr
;
164 ptrace_in
.pid
= inferior_pid
;
166 status
= net_clnt_call (procnum
, xdr_rptrace
, &ptrace_in
, xdr_int
,
169 if (status
!= RPC_SUCCESS
)
172 if (break_status
== -1)
174 return break_status
; /* probably (FIXME) zero */
177 /* returns 0 if successful, errno otherwise */
180 vx_insert_breakpoint (int addr
)
182 return net_break (addr
, VX_BREAK_ADD
);
185 /* returns 0 if successful, errno otherwise */
188 vx_remove_breakpoint (int addr
)
190 return net_break (addr
, VX_BREAK_DELETE
);
193 /* Start an inferior process and sets inferior_pid to its pid.
194 EXEC_FILE is the file to run.
195 ALLARGS is a string containing the arguments to the program.
196 ENV is the environment vector to pass.
197 Returns process id. Errors reported with error().
198 On VxWorks, we ignore exec_file. */
201 vx_create_inferior (char *exec_file
, char *args
, char **env
)
203 enum clnt_stat status
;
205 TASK_START taskStart
;
207 memset ((char *) &passArgs
, '\0', sizeof (passArgs
));
208 memset ((char *) &taskStart
, '\0', sizeof (taskStart
));
210 /* parse arguments, put them in passArgs */
212 parse_args (args
, &passArgs
);
214 if (passArgs
.arg_array_len
== 0)
215 error ("You must specify a function name to run, and arguments if any");
217 status
= net_clnt_call (PROCESS_START
, xdr_arg_array
, &passArgs
,
218 xdr_TASK_START
, &taskStart
);
220 if ((status
!= RPC_SUCCESS
) || (taskStart
.status
== -1))
221 error ("Can't create process on remote target machine");
223 /* Save the name of the running function */
224 vx_running
= savestring (passArgs
.arg_array_val
[0],
225 strlen (passArgs
.arg_array_val
[0]));
227 push_target (&vx_run_ops
);
228 inferior_pid
= taskStart
.pid
;
230 /* We will get a trace trap after one instruction.
231 Insert breakpoints and continue. */
233 init_wait_for_inferior ();
235 /* Set up the "saved terminal modes" of the inferior
236 based on what modes we are starting it with. */
237 target_terminal_init ();
239 /* Install inferior's terminal modes. */
240 target_terminal_inferior ();
242 stop_soon_quietly
= 1;
243 wait_for_inferior (); /* Get the task spawn event */
244 stop_soon_quietly
= 0;
246 /* insert_step_breakpoint (); FIXME, do we need this? */
247 proceed (-1, TARGET_SIGNAL_DEFAULT
, 0);
250 /* Fill ARGSTRUCT in argc/argv form with the arguments from the
251 argument string ARGSTRING. */
254 parse_args (register char *arg_string
, arg_array
*arg_struct
)
256 register int arg_count
= 0; /* number of arguments */
257 register int arg_index
= 0;
260 memset ((char *) arg_struct
, '\0', sizeof (arg_array
));
262 /* first count how many arguments there are */
267 if (*(p0
= skip_white_space (p0
)) == '\0')
269 p0
= find_white_space (p0
);
273 arg_struct
->arg_array_len
= arg_count
;
274 arg_struct
->arg_array_val
= (char **) xmalloc ((arg_count
+ 1)
277 /* now copy argument strings into arg_struct. */
279 while (*(arg_string
= skip_white_space (arg_string
)))
281 p0
= find_white_space (arg_string
);
282 arg_struct
->arg_array_val
[arg_index
++] = savestring (arg_string
,
287 arg_struct
->arg_array_val
[arg_count
] = NULL
;
290 /* Advance a string pointer across whitespace and return a pointer
291 to the first non-white character. */
294 skip_white_space (register char *p
)
296 while (*p
== ' ' || *p
== '\t')
301 /* Search for the first unquoted whitespace character in a string.
302 Returns a pointer to the character, or to the null terminator
303 if no whitespace is found. */
306 find_white_space (register char *p
)
310 while ((c
= *p
) != ' ' && c
!= '\t' && c
)
312 if (c
== '\'' || c
== '"')
314 while (*++p
!= c
&& *p
)
327 /* Poll the VxWorks target system for an event related
328 to the debugged task.
329 Returns -1 if remote wait failed, task status otherwise. */
332 net_wait (RDB_EVENT
*pEvent
)
335 enum clnt_stat status
;
337 memset ((char *) pEvent
, '\0', sizeof (RDB_EVENT
));
340 status
= net_clnt_call (PROCESS_WAIT
, xdr_int
, &pid
, xdr_RDB_EVENT
,
343 /* return (status == RPC_SUCCESS)? pEvent->status: -1; */
344 if (status
== RPC_SUCCESS
)
345 return ((pEvent
->status
) ? 1 : 0);
346 else if (status
== RPC_TIMEDOUT
)
352 /* Suspend the remote task.
353 Returns -1 if suspend fails on target system, 0 otherwise. */
360 enum clnt_stat status
;
364 /* don't let rdbTask suspend itself by passing a pid of 0 */
366 if ((pid
= inferior_pid
) == 0)
369 status
= net_clnt_call (VX_TASK_SUSPEND
, xdr_int
, &pid
, xdr_int
,
372 return (status
== RPC_SUCCESS
) ? quit_status
: -1;
375 /* Read a register or registers from the remote system. */
378 net_read_registers (char *reg_buf
, int len
, u_long procnum
)
382 Ptrace_return ptrace_out
;
386 memset ((char *) &ptrace_in
, '\0', sizeof (ptrace_in
));
387 memset ((char *) &ptrace_out
, '\0', sizeof (ptrace_out
));
389 /* Initialize RPC input argument structure. */
391 ptrace_in
.pid
= inferior_pid
;
392 ptrace_in
.info
.ttype
= NOINFO
;
394 /* Initialize RPC return value structure. */
396 out_data
.bytes
= reg_buf
;
398 ptrace_out
.info
.more_data
= (caddr_t
) & out_data
;
400 /* Call RPC; take an error exit if appropriate. */
402 status
= net_ptrace_clnt_call (procnum
, &ptrace_in
, &ptrace_out
);
405 if (ptrace_out
.status
== -1)
407 errno
= ptrace_out
.errno_num
;
408 sprintf (message
, "reading %s registers", (procnum
== PTRACE_GETREGS
)
411 perror_with_name (message
);
415 /* Write register values to a VxWorks target. REG_BUF points to a buffer
416 containing the raw register values, LEN is the length of REG_BUF in
417 bytes, and PROCNUM is the RPC procedure number (PTRACE_SETREGS or
418 PTRACE_SETFPREGS). An error exit is taken if the RPC call fails or
419 if an error status is returned by the remote debug server. This is
420 a utility routine used by vx_write_register (). */
423 net_write_registers (char *reg_buf
, int len
, u_long procnum
)
427 Ptrace_return ptrace_out
;
431 memset ((char *) &ptrace_in
, '\0', sizeof (ptrace_in
));
432 memset ((char *) &ptrace_out
, '\0', sizeof (ptrace_out
));
434 /* Initialize RPC input argument structure. */
436 in_data
.bytes
= reg_buf
;
439 ptrace_in
.pid
= inferior_pid
;
440 ptrace_in
.info
.ttype
= DATA
;
441 ptrace_in
.info
.more_data
= (caddr_t
) & in_data
;
443 /* Call RPC; take an error exit if appropriate. */
445 status
= net_ptrace_clnt_call (procnum
, &ptrace_in
, &ptrace_out
);
448 if (ptrace_out
.status
== -1)
450 errno
= ptrace_out
.errno_num
;
451 sprintf (message
, "writing %s registers", (procnum
== PTRACE_SETREGS
)
454 perror_with_name (message
);
458 /* Prepare to store registers. Since we will store all of them,
459 read out their current values now. */
462 vx_prepare_to_store (void)
464 /* Fetch all registers, if any of them are not yet fetched. */
465 read_register_bytes (0, NULL
, REGISTER_BYTES
);
468 /* Copy LEN bytes to or from remote inferior's memory starting at MEMADDR
469 to debugger memory starting at MYADDR. WRITE is true if writing to the
470 inferior. TARGET is unused.
471 Result is the number of bytes written or read (zero if error). The
472 protocol allows us to return a negative count, indicating that we can't
473 handle the current address but can handle one N bytes further, but
474 vxworks doesn't give us that information. */
477 vx_xfer_memory (CORE_ADDR memaddr
, char *myaddr
, int len
, int write
,
478 struct mem_attrib
*attrib ATTRIBUTE_UNUSED
,
479 struct target_ops
*target ATTRIBUTE_UNUSED
)
483 Ptrace_return ptrace_out
;
485 enum ptracereq request
;
488 memset ((char *) &ptrace_in
, '\0', sizeof (ptrace_in
));
489 memset ((char *) &ptrace_out
, '\0', sizeof (ptrace_out
));
491 ptrace_in
.pid
= inferior_pid
; /* XXX pid unnecessary for READDATA */
492 ptrace_in
.addr
= (int) memaddr
; /* Where from */
493 ptrace_in
.data
= len
; /* How many bytes */
497 ptrace_in
.info
.ttype
= DATA
;
498 ptrace_in
.info
.more_data
= (caddr_t
) & data
;
500 data
.bytes
= (caddr_t
) myaddr
; /* Where from */
501 data
.len
= len
; /* How many bytes (again, for XDR) */
502 request
= PTRACE_WRITEDATA
;
506 ptrace_out
.info
.more_data
= (caddr_t
) & data
;
507 request
= PTRACE_READDATA
;
509 /* Loop until the entire request has been satisfied, transferring
510 at most VX_MEMXFER_MAX bytes per iteration. Break from the loop
511 if an error status is returned by the remote debug server. */
516 while (nleft
> 0 && status
== 0)
518 nxfer
= min (nleft
, VX_MEMXFER_MAX
);
520 ptrace_in
.addr
= (int) memaddr
;
521 ptrace_in
.data
= nxfer
;
522 data
.bytes
= (caddr_t
) myaddr
;
525 /* Request a block from the remote debug server; if RPC fails,
526 report an error and return to debugger command level. */
528 if (net_ptrace_clnt_call (request
, &ptrace_in
, &ptrace_out
))
531 status
= ptrace_out
.status
;
540 /* A target-side error has ocurred. Set errno to the error
541 code chosen by the target so that a later perror () will
542 say something meaningful. */
544 errno
= ptrace_out
.errno_num
;
548 /* Return the number of bytes transferred. */
550 return (len
- nleft
);
556 printf_unfiltered ("\tAttached to host `%s'", vx_host
);
557 printf_unfiltered (", which has %sfloating point", target_has_fp
? "" : "no ");
558 printf_unfiltered (".\n");
562 vx_run_files_info (void)
564 printf_unfiltered ("\tRunning %s VxWorks process %s",
565 vx_running
? "child" : "attached",
566 local_hex_string (inferior_pid
));
568 printf_unfiltered (", function `%s'", vx_running
);
569 printf_unfiltered (".\n");
573 vx_resume (int pid
, int step
, enum target_signal siggnal
)
577 Ptrace_return ptrace_out
;
583 if (siggnal
!= 0 && siggnal
!= stop_signal
)
584 error ("Cannot send signals to VxWorks processes");
586 /* Set CONT_ADDR to the address at which we are continuing,
587 or to 1 if we are continuing from where the program stopped.
588 This conforms to traditional ptrace () usage, but at the same
589 time has special meaning for the VxWorks remote debug server.
590 If the address is not 1, the server knows that the target
591 program is jumping to a new address, which requires special
592 handling if there is a breakpoint at the new address. */
594 cont_addr
= read_register (PC_REGNUM
);
595 if (cont_addr
== stop_pc
)
598 memset ((char *) &ptrace_in
, '\0', sizeof (ptrace_in
));
599 memset ((char *) &ptrace_out
, '\0', sizeof (ptrace_out
));
602 ptrace_in
.addr
= cont_addr
; /* Target side insists on this, or it panics. */
605 status
= net_step ();
607 status
= net_ptrace_clnt_call (PTRACE_CONT
, &ptrace_in
, &ptrace_out
);
611 if (ptrace_out
.status
== -1)
613 errno
= ptrace_out
.errno_num
;
614 perror_with_name ("Resuming remote process");
619 vx_mourn_inferior (void)
621 pop_target (); /* Pop back to no-child state */
622 generic_mourn_inferior ();
626 static void vx_add_symbols (char *, int, CORE_ADDR
, CORE_ADDR
, CORE_ADDR
);
628 struct find_sect_args
630 CORE_ADDR text_start
;
631 CORE_ADDR data_start
;
635 static void find_sect (bfd
*, asection
*, void *);
638 find_sect (bfd
*abfd
, asection
*sect
, PTR obj
)
640 struct find_sect_args
*args
= (struct find_sect_args
*) obj
;
642 if (bfd_get_section_flags (abfd
, sect
) & (SEC_CODE
& SEC_READONLY
))
643 args
->text_start
= bfd_get_section_vma (abfd
, sect
);
644 else if (bfd_get_section_flags (abfd
, sect
) & SEC_ALLOC
)
646 if (bfd_get_section_flags (abfd
, sect
) & SEC_LOAD
)
648 /* Exclude .ctor and .dtor sections which have SEC_CODE set but not
650 if (bfd_get_section_flags (abfd
, sect
) & SEC_DATA
)
651 args
->data_start
= bfd_get_section_vma (abfd
, sect
);
654 args
->bss_start
= bfd_get_section_vma (abfd
, sect
);
659 vx_add_symbols (char *name
, int from_tty
, CORE_ADDR text_addr
,
660 CORE_ADDR data_addr
, CORE_ADDR bss_addr
)
662 struct section_offsets
*offs
;
663 struct objfile
*objfile
;
664 struct find_sect_args ss
;
666 /* It might be nice to suppress the breakpoint_re_set which happens here
667 because we are going to do one again after the objfile_relocate. */
668 objfile
= symbol_file_add (name
, from_tty
, NULL
, 0, 0);
670 /* This is a (slightly cheesy) way of superceding the old symbols. A less
671 cheesy way would be to find the objfile with the same name and
673 objfile_to_front (objfile
);
675 offs
= (struct section_offsets
*) alloca (SIZEOF_SECTION_OFFSETS
);
676 memcpy (offs
, objfile
->section_offsets
, SIZEOF_SECTION_OFFSETS
);
681 bfd_map_over_sections (objfile
->obfd
, find_sect
, &ss
);
683 /* Both COFF and b.out frontends use these SECT_OFF_* values. */
684 offs
->offsets
[SECT_OFF_TEXT (objfile
)] = text_addr
- ss
.text_start
;
685 offs
->offsets
[SECT_OFF_DATA (objfile
)] = data_addr
- ss
.data_start
;
686 offs
->offsets
[SECT_OFF_BSS (objfile
)] = bss_addr
- ss
.bss_start
;
687 objfile_relocate (objfile
, offs
);
690 /* This function allows the addition of incrementally linked object files. */
693 vx_load_command (char *arg_string
, int from_tty
)
700 error ("The load command takes a file name");
702 arg_string
= tilde_expand (arg_string
);
703 make_cleanup (xfree
, arg_string
);
707 /* Refuse to load the module if a debugged task is running. Doing so
708 can have a number of unpleasant consequences to the running task. */
710 if (inferior_pid
!= 0 && target_has_execution
)
712 if (query ("You may not load a module while the target task is running.\n\
713 Kill the target task? "))
716 error ("Load canceled.");
721 if (net_load (arg_string
, &text_addr
, &data_addr
, &bss_addr
) == -1)
722 error ("Load failed on target machine");
725 vx_add_symbols (arg_string
, from_tty
, text_addr
, data_addr
, bss_addr
);
727 /* Getting new symbols may change our opinion about what is
729 reinit_frame_cache ();
732 /* Single step the target program at the source or machine level.
733 Takes an error exit if rpc fails.
734 Returns -1 if remote single-step operation fails, else 0. */
739 enum clnt_stat status
;
741 SOURCE_STEP source_step
;
743 source_step
.taskId
= inferior_pid
;
747 source_step
.startAddr
= step_range_start
;
748 source_step
.endAddr
= step_range_end
;
752 source_step
.startAddr
= 0;
753 source_step
.endAddr
= 0;
756 status
= net_clnt_call (VX_SOURCE_STEP
, xdr_SOURCE_STEP
, &source_step
,
757 xdr_int
, &step_status
);
759 if (status
== RPC_SUCCESS
)
765 /* Emulate ptrace using RPC calls to the VxWorks target system.
766 Returns nonzero (-1) if RPC status to VxWorks is bad, 0 otherwise. */
769 net_ptrace_clnt_call (enum ptracereq request
, Rptrace
*pPtraceIn
,
770 Ptrace_return
*pPtraceOut
)
772 enum clnt_stat status
;
774 status
= net_clnt_call (request
, xdr_rptrace
, pPtraceIn
, xdr_ptrace_return
,
777 if (status
!= RPC_SUCCESS
)
783 /* Query the target for the name of the file from which VxWorks was
784 booted. pBootFile is the address of a pointer to the buffer to
785 receive the file name; if the pointer pointed to by pBootFile is
786 NULL, memory for the buffer will be allocated by XDR.
787 Returns -1 if rpc failed, 0 otherwise. */
790 net_get_boot_file (char **pBootFile
)
792 enum clnt_stat status
;
794 status
= net_clnt_call (VX_BOOT_FILE_INQ
, xdr_void
, (char *) 0,
795 xdr_wrapstring
, pBootFile
);
796 return (status
== RPC_SUCCESS
) ? 0 : -1;
799 /* Fetch a list of loaded object modules from the VxWorks target
800 and store in PLOADTABLE.
801 Returns -1 if rpc failed, 0 otherwise
802 There's no way to check if the returned loadTable is correct.
803 VxWorks doesn't check it. */
806 net_get_symbols (ldtabl
*pLoadTable
)
808 enum clnt_stat status
;
810 memset ((char *) pLoadTable
, '\0', sizeof (struct ldtabl
));
812 status
= net_clnt_call (VX_STATE_INQ
, xdr_void
, 0, xdr_ldtabl
, pLoadTable
);
813 return (status
== RPC_SUCCESS
) ? 0 : -1;
816 /* Look up a symbol in the VxWorks target's symbol table.
817 Returns status of symbol read on target side (0=success, -1=fail)
818 Returns -1 and complain()s if rpc fails. */
820 struct complaint cant_contact_target
=
821 {"Lost contact with VxWorks target", 0, 0};
824 vx_lookup_symbol (char *name
, /* symbol name */
827 enum clnt_stat status
;
828 SYMBOL_ADDR symbolAddr
;
831 memset ((char *) &symbolAddr
, '\0', sizeof (symbolAddr
));
833 status
= net_clnt_call (VX_SYMBOL_INQ
, xdr_wrapstring
, &name
,
834 xdr_SYMBOL_ADDR
, &symbolAddr
);
835 if (status
!= RPC_SUCCESS
)
837 complain (&cant_contact_target
);
841 *pAddr
= symbolAddr
.addr
;
842 return symbolAddr
.status
;
845 /* Check to see if the VxWorks target has a floating point coprocessor.
846 Returns 1 if target has floating point processor, 0 otherwise.
847 Calls error() if rpc fails. */
850 net_check_for_fp (void)
852 enum clnt_stat status
;
853 bool_t fp
= 0; /* true if fp processor is present on target board */
855 status
= net_clnt_call (VX_FP_INQUIRE
, xdr_void
, 0, xdr_bool
, &fp
);
856 if (status
!= RPC_SUCCESS
)
862 /* Establish an RPC connection with the VxWorks target system.
863 Calls error () if unable to establish connection. */
866 net_connect (char *host
)
868 struct sockaddr_in destAddr
;
869 struct hostent
*destHost
;
872 /* Get the internet address for the given host. Allow a numeric
873 IP address or a hostname. */
875 addr
= inet_addr (host
);
878 destHost
= (struct hostent
*) gethostbyname (host
);
879 if (destHost
== NULL
)
880 /* FIXME: Probably should include hostname here in quotes.
881 For example if the user types "target vxworks vx960 " it should
882 say "Invalid host `vx960 '." not just "Invalid hostname". */
883 error ("Invalid hostname. Couldn't find remote host address.");
884 addr
= *(unsigned long *) destHost
->h_addr
;
887 memset (&destAddr
, '\0', sizeof (destAddr
));
889 destAddr
.sin_addr
.s_addr
= addr
;
890 destAddr
.sin_family
= AF_INET
;
891 destAddr
.sin_port
= 0; /* set to actual port that remote
892 ptrace is listening on. */
894 /* Create a tcp client transport on which to issue
895 calls to the remote ptrace server. */
897 ptraceSock
= RPC_ANYSOCK
;
898 pClient
= clnttcp_create (&destAddr
, RDBPROG
, RDBVERS
, &ptraceSock
, 0, 0);
899 /* FIXME, here is where we deal with different version numbers of the
904 clnt_pcreateerror ("\tnet_connect");
905 error ("Couldn't connect to remote target.");
909 /* Sleep for the specified number of milliseconds
910 * (assumed to be less than 1000).
911 * If select () is interrupted, returns immediately;
912 * takes an error exit if select () fails for some other reason.
918 struct timeval select_timeout
;
921 select_timeout
.tv_sec
= 0;
922 select_timeout
.tv_usec
= ms
* 1000;
924 status
= select (0, (fd_set
*) 0, (fd_set
*) 0, (fd_set
*) 0,
927 if (status
< 0 && errno
!= EINTR
)
928 perror_with_name ("select");
932 vx_wait (int pid_to_wait_for
, struct target_waitstatus
*status
)
940 /* If CTRL-C is hit during this loop,
941 suspend the inferior process. */
946 quit_failed
= (net_quit () == -1);
950 /* If a net_quit () or net_wait () call has failed,
951 allow the user to break the connection with the target.
952 We can't simply error () out of this loop, since the
953 data structures representing the state of the inferior
954 are in an inconsistent state. */
956 if (quit_failed
|| net_wait (&rdbEvent
) == -1)
959 if (query ("Can't %s. Disconnect from target system? ",
960 (quit_failed
) ? "suspend remote task"
961 : "get status of remote task"))
963 target_mourn_inferior ();
964 error ("Use the \"target\" command to reconnect.");
968 terminal_inferior ();
973 pid
= rdbEvent
.taskId
;
976 sleep_ms (200); /* FIXME Don't kill the network too badly */
978 else if (pid
!= inferior_pid
)
979 internal_error (__FILE__
, __LINE__
,
980 "Bad pid for debugged task: %s\n",
981 local_hex_string ((unsigned long) pid
));
985 /* The mostly likely kind. */
986 status
->kind
= TARGET_WAITKIND_STOPPED
;
988 switch (rdbEvent
.eventType
)
991 status
->kind
= TARGET_WAITKIND_EXITED
;
992 /* FIXME is it possible to distinguish between a
993 normal vs abnormal exit in VxWorks? */
994 status
->value
.integer
= 0;
998 /* Task was just started. */
999 status
->value
.sig
= TARGET_SIGNAL_TRAP
;
1003 status
->value
.sig
= TARGET_SIGNAL_TRAP
;
1004 /* XXX was it stopped by a signal? act accordingly */
1007 case EVENT_BREAK
: /* Breakpoint was hit. */
1008 status
->value
.sig
= TARGET_SIGNAL_TRAP
;
1011 case EVENT_SUSPEND
: /* Task was suspended, probably by ^C. */
1012 status
->value
.sig
= TARGET_SIGNAL_INT
;
1015 case EVENT_BUS_ERR
: /* Task made evil nasty reference. */
1016 status
->value
.sig
= TARGET_SIGNAL_BUS
;
1019 case EVENT_ZERO_DIV
: /* Division by zero */
1020 status
->value
.sig
= TARGET_SIGNAL_FPE
;
1025 status
->value
.sig
= i960_fault_to_signal (rdbEvent
.sigType
);
1027 /* Back in the old days, before enum target_signal, this code used
1028 to add NSIG to the signal number and claim that PRINT_RANDOM_SIGNAL
1029 would take care of it. But PRINT_RANDOM_SIGNAL has never been
1030 defined except on the i960, so I don't really know what we are
1031 supposed to do on other architectures. */
1032 status
->value
.sig
= TARGET_SIGNAL_UNKNOWN
;
1040 symbol_stub (char *arg
)
1042 symbol_file_add_main (arg
, 0);
1047 add_symbol_stub (char *arg
)
1049 struct ldfile
*pLoadFile
= (struct ldfile
*) arg
;
1051 printf_unfiltered ("\t%s: ", pLoadFile
->name
);
1052 vx_add_symbols (pLoadFile
->name
, 0, pLoadFile
->txt_addr
,
1053 pLoadFile
->data_addr
, pLoadFile
->bss_addr
);
1054 printf_unfiltered ("ok\n");
1057 /* Target command for VxWorks target systems.
1059 Used in vxgdb. Takes the name of a remote target machine
1060 running vxWorks and connects to it to initialize remote network
1064 vx_open (char *args
, int from_tty
)
1066 extern int close ();
1068 extern char *source_path
;
1069 struct ldtabl loadTable
;
1070 struct ldfile
*pLoadFile
;
1072 extern CLIENT
*pClient
;
1073 int symbols_added
= 0;
1076 error_no_arg ("target machine name");
1078 target_preopen (from_tty
);
1080 unpush_target (&vx_ops
);
1081 printf_unfiltered ("Attaching remote machine across net...\n");
1082 gdb_flush (gdb_stdout
);
1084 /* Allow the user to kill the connect attempt by typing ^C.
1085 Wait until the call to target_has_fp () completes before
1086 disallowing an immediate quit, since even if net_connect ()
1087 is successful, the remote debug server might be hung. */
1092 target_has_fp
= net_check_for_fp ();
1093 printf_filtered ("Connected to %s.\n", args
);
1097 push_target (&vx_ops
);
1099 /* Save a copy of the target host's name. */
1100 vx_host
= savestring (args
, strlen (args
));
1102 /* Find out the name of the file from which the target was booted
1103 and load its symbol table. */
1105 printf_filtered ("Looking in Unix path for all loaded modules:\n");
1107 if (!net_get_boot_file (&bootFile
))
1111 printf_filtered ("\t%s: ", bootFile
);
1112 /* This assumes that the kernel is never relocated. Hope that is an
1113 accurate assumption. */
1117 "Error while reading symbols from boot file:\n",
1119 puts_filtered ("ok\n");
1122 printf_unfiltered ("VxWorks kernel symbols not loaded.\n");
1125 error ("Can't retrieve boot file name from target machine.");
1127 clnt_freeres (pClient
, xdr_wrapstring
, &bootFile
);
1129 if (net_get_symbols (&loadTable
) != 0)
1130 error ("Can't read loaded modules from target machine");
1133 while (++i
< loadTable
.tbl_size
)
1135 QUIT
; /* FIXME, avoids clnt_freeres below: mem leak */
1136 pLoadFile
= &loadTable
.tbl_ent
[i
];
1140 struct cleanup
*old_chain
;
1141 char *fullname
= NULL
;
1143 desc
= openp (source_path
, 0, pLoadFile
->name
, O_RDONLY
, 0, &fullname
);
1145 perror_with_name (pLoadFile
->name
);
1146 old_chain
= make_cleanup (close
, desc
);
1147 add_file_at_addr (fullname
, desc
, pLoadFile
->txt_addr
, pLoadFile
->data_addr
,
1148 pLoadFile
->bss_addr
);
1149 do_cleanups (old_chain
);
1152 /* FIXME: Is there something better to search than the PATH? (probably
1153 not the source path, since source might be in different directories
1156 if (catch_errors (add_symbol_stub
, (char *) pLoadFile
, (char *) 0,
1161 printf_filtered ("Done.\n");
1163 clnt_freeres (pClient
, xdr_ldtabl
, &loadTable
);
1165 /* Getting new symbols may change our opinion about what is
1168 reinit_frame_cache ();
1171 /* Takes a task started up outside of gdb and ``attaches'' to it.
1172 This stops it cold in its tracks and allows us to start tracing it. */
1175 vx_attach (char *args
, int from_tty
)
1180 Ptrace_return ptrace_out
;
1184 error_no_arg ("process-id to attach");
1186 pid
= strtoul (args
, &cptr
, 0);
1187 if ((cptr
== args
) || (*cptr
!= '\0'))
1188 error ("Invalid process-id -- give a single number in decimal or 0xhex");
1191 printf_unfiltered ("Attaching pid %s.\n",
1192 local_hex_string ((unsigned long) pid
));
1194 memset ((char *) &ptrace_in
, '\0', sizeof (ptrace_in
));
1195 memset ((char *) &ptrace_out
, '\0', sizeof (ptrace_out
));
1196 ptrace_in
.pid
= pid
;
1198 status
= net_ptrace_clnt_call (PTRACE_ATTACH
, &ptrace_in
, &ptrace_out
);
1201 if (ptrace_out
.status
== -1)
1203 errno
= ptrace_out
.errno_num
;
1204 perror_with_name ("Attaching remote process");
1210 push_target (&vx_run_ops
);
1217 /* detach_command --
1218 takes a program previously attached to and detaches it.
1219 The program resumes execution and will no longer stop
1220 on signals, etc. We better not have left any breakpoints
1221 in the program or it'll die when it hits one. For this
1222 to work, it may be necessary for the process to have been
1223 previously attached. It *might* work if the program was
1224 started via the normal ptrace (PTRACE_TRACEME). */
1227 vx_detach (char *args
, int from_tty
)
1230 Ptrace_return ptrace_out
;
1235 error ("Argument given to VxWorks \"detach\".");
1238 printf_unfiltered ("Detaching pid %s.\n",
1239 local_hex_string ((unsigned long) inferior_pid
));
1241 if (args
) /* FIXME, should be possible to leave suspended */
1242 signal
= atoi (args
);
1244 memset ((char *) &ptrace_in
, '\0', sizeof (ptrace_in
));
1245 memset ((char *) &ptrace_out
, '\0', sizeof (ptrace_out
));
1246 ptrace_in
.pid
= inferior_pid
;
1248 status
= net_ptrace_clnt_call (PTRACE_DETACH
, &ptrace_in
, &ptrace_out
);
1251 if (ptrace_out
.status
== -1)
1253 errno
= ptrace_out
.errno_num
;
1254 perror_with_name ("Detaching VxWorks process");
1258 pop_target (); /* go back to non-executing VxWorks connection */
1261 /* vx_kill -- takes a running task and wipes it out. */
1267 Ptrace_return ptrace_out
;
1270 printf_unfiltered ("Killing pid %s.\n", local_hex_string ((unsigned long) inferior_pid
));
1272 memset ((char *) &ptrace_in
, '\0', sizeof (ptrace_in
));
1273 memset ((char *) &ptrace_out
, '\0', sizeof (ptrace_out
));
1274 ptrace_in
.pid
= inferior_pid
;
1276 status
= net_ptrace_clnt_call (PTRACE_KILL
, &ptrace_in
, &ptrace_out
);
1279 else if (ptrace_out
.status
== -1)
1281 errno
= ptrace_out
.errno_num
;
1282 perror_with_name ("Killing VxWorks process");
1285 /* If it gives good status, the process is *gone*, no events remain.
1286 If the kill failed, assume the process is gone anyhow. */
1288 pop_target (); /* go back to non-executing VxWorks connection */
1291 /* Clean up from the VxWorks process target as it goes away. */
1294 vx_proc_close (int quitting
)
1296 inferior_pid
= 0; /* No longer have a process. */
1302 /* Make an RPC call to the VxWorks target.
1303 Returns RPC status. */
1305 static enum clnt_stat
1306 net_clnt_call (enum ptracereq procNum
, xdrproc_t inProc
, char *in
,
1307 xdrproc_t outProc
, char *out
)
1309 enum clnt_stat status
;
1311 status
= clnt_call (pClient
, procNum
, inProc
, in
, outProc
, out
, rpcTimeout
);
1313 if (status
!= RPC_SUCCESS
)
1314 clnt_perrno (status
);
1319 /* Clean up before losing control. */
1322 vx_close (int quitting
)
1325 clnt_destroy (pClient
); /* The net connection */
1329 xfree (vx_host
); /* The hostname */
1333 /* A vxprocess target should be started via "run" not "target". */
1336 vx_proc_open (char *name
, int from_tty
)
1338 error ("Use the \"run\" command to start a VxWorks process.");
1344 vx_ops
.to_shortname
= "vxworks";
1345 vx_ops
.to_longname
= "VxWorks target memory via RPC over TCP/IP";
1346 vx_ops
.to_doc
= "Use VxWorks target memory. \n\
1347 Specify the name of the machine to connect to.";
1348 vx_ops
.to_open
= vx_open
;
1349 vx_ops
.to_close
= vx_close
;
1350 vx_ops
.to_attach
= vx_attach
;
1351 vx_ops
.to_xfer_memory
= vx_xfer_memory
;
1352 vx_ops
.to_files_info
= vx_files_info
;
1353 vx_ops
.to_load
= vx_load_command
;
1354 vx_ops
.to_lookup_symbol
= vx_lookup_symbol
;
1355 vx_ops
.to_create_inferior
= vx_create_inferior
;
1356 vx_ops
.to_stratum
= core_stratum
;
1357 vx_ops
.to_has_all_memory
= 1;
1358 vx_ops
.to_has_memory
= 1;
1359 vx_ops
.to_magic
= OPS_MAGIC
; /* Always the last thing */
1363 init_vx_run_ops (void)
1365 vx_run_ops
.to_shortname
= "vxprocess";
1366 vx_run_ops
.to_longname
= "VxWorks process";
1367 vx_run_ops
.to_doc
= "VxWorks process; started by the \"run\" command.";
1368 vx_run_ops
.to_open
= vx_proc_open
;
1369 vx_run_ops
.to_close
= vx_proc_close
;
1370 vx_run_ops
.to_detach
= vx_detach
;
1371 vx_run_ops
.to_resume
= vx_resume
;
1372 vx_run_ops
.to_wait
= vx_wait
;
1373 vx_run_ops
.to_fetch_registers
= vx_read_register
;
1374 vx_run_ops
.to_store_registers
= vx_write_register
;
1375 vx_run_ops
.to_prepare_to_store
= vx_prepare_to_store
;
1376 vx_run_ops
.to_xfer_memory
= vx_xfer_memory
;
1377 vx_run_ops
.to_files_info
= vx_run_files_info
;
1378 vx_run_ops
.to_insert_breakpoint
= vx_insert_breakpoint
;
1379 vx_run_ops
.to_remove_breakpoint
= vx_remove_breakpoint
;
1380 vx_run_ops
.to_kill
= vx_kill
;
1381 vx_run_ops
.to_load
= vx_load_command
;
1382 vx_run_ops
.to_lookup_symbol
= vx_lookup_symbol
;
1383 vx_run_ops
.to_mourn_inferior
= vx_mourn_inferior
;
1384 vx_run_ops
.to_stratum
= process_stratum
;
1385 vx_run_ops
.to_has_memory
= 1;
1386 vx_run_ops
.to_has_stack
= 1;
1387 vx_run_ops
.to_has_registers
= 1;
1388 vx_run_ops
.to_has_execution
= 1;
1389 vx_run_ops
.to_magic
= OPS_MAGIC
;
1393 _initialize_vx (void)
1396 add_target (&vx_ops
);
1398 add_target (&vx_run_ops
);
1401 (add_set_cmd ("vxworks-timeout", class_support
, var_uinteger
,
1402 (char *) &rpcTimeout
.tv_sec
,
1403 "Set seconds to wait for rpc calls to return.\n\
1404 Set the number of seconds to wait for rpc calls to return.", &setlist
),