]>
Commit | Line | Data |
---|---|---|
ae7467b1 AB |
1 | /* |
2 | * gdbstub user-mode helper routines. | |
3 | * | |
4 | * We know for user-mode we are using TCG so we can call stuff directly. | |
5 | * | |
9455762f | 6 | * Copyright (c) 2003-2005 Fabrice Bellard |
ae7467b1 AB |
7 | * Copyright (c) 2022 Linaro Ltd |
8 | * | |
9455762f | 9 | * SPDX-License-Identifier: LGPL-2.0+ |
ae7467b1 AB |
10 | */ |
11 | ||
12 | #include "qemu/osdep.h" | |
d96bf49b AB |
13 | #include "qemu/cutils.h" |
14 | #include "qemu/sockets.h" | |
15 | #include "exec/hwaddr.h" | |
16 | #include "exec/tb-flush.h" | |
ae7467b1 | 17 | #include "exec/gdbstub.h" |
c566080c | 18 | #include "gdbstub/syscalls.h" |
d96bf49b | 19 | #include "gdbstub/user.h" |
ae7467b1 | 20 | #include "hw/core/cpu.h" |
d96bf49b | 21 | #include "trace.h" |
ae7467b1 AB |
22 | #include "internals.h" |
23 | ||
d96bf49b AB |
24 | /* User-mode specific state */ |
25 | typedef struct { | |
26 | int fd; | |
27 | char *socket_path; | |
28 | int running_state; | |
29 | } GDBUserState; | |
30 | ||
31 | static GDBUserState gdbserver_user_state; | |
32 | ||
33 | int gdb_get_char(void) | |
34 | { | |
35 | uint8_t ch; | |
36 | int ret; | |
37 | ||
38 | for (;;) { | |
39 | ret = recv(gdbserver_user_state.fd, &ch, 1, 0); | |
40 | if (ret < 0) { | |
41 | if (errno == ECONNRESET) { | |
42 | gdbserver_user_state.fd = -1; | |
43 | } | |
44 | if (errno != EINTR) { | |
45 | return -1; | |
46 | } | |
47 | } else if (ret == 0) { | |
48 | close(gdbserver_user_state.fd); | |
49 | gdbserver_user_state.fd = -1; | |
50 | return -1; | |
51 | } else { | |
52 | break; | |
53 | } | |
54 | } | |
55 | return ch; | |
56 | } | |
57 | ||
a7e0f9bd AB |
58 | bool gdb_got_immediate_ack(void) |
59 | { | |
60 | int i; | |
61 | ||
62 | i = gdb_get_char(); | |
63 | if (i < 0) { | |
64 | /* no response, continue anyway */ | |
65 | return true; | |
66 | } | |
67 | ||
68 | if (i == '+') { | |
69 | /* received correctly, continue */ | |
70 | return true; | |
71 | } | |
72 | ||
73 | /* anything else, including '-' then try again */ | |
74 | return false; | |
75 | } | |
76 | ||
d96bf49b AB |
77 | void gdb_put_buffer(const uint8_t *buf, int len) |
78 | { | |
79 | int ret; | |
80 | ||
81 | while (len > 0) { | |
82 | ret = send(gdbserver_user_state.fd, buf, len, 0); | |
83 | if (ret < 0) { | |
84 | if (errno != EINTR) { | |
85 | return; | |
86 | } | |
87 | } else { | |
88 | buf += ret; | |
89 | len -= ret; | |
90 | } | |
91 | } | |
92 | } | |
93 | ||
94 | /* Tell the remote gdb that the process has exited. */ | |
95 | void gdb_exit(int code) | |
96 | { | |
97 | char buf[4]; | |
98 | ||
99 | if (!gdbserver_state.init) { | |
100 | return; | |
101 | } | |
102 | if (gdbserver_user_state.socket_path) { | |
103 | unlink(gdbserver_user_state.socket_path); | |
104 | } | |
105 | if (gdbserver_user_state.fd < 0) { | |
106 | return; | |
107 | } | |
108 | ||
109 | trace_gdbstub_op_exiting((uint8_t)code); | |
110 | ||
75837005 MTB |
111 | if (gdbserver_state.allow_stop_reply) { |
112 | snprintf(buf, sizeof(buf), "W%02x", (uint8_t)code); | |
113 | gdb_put_packet(buf); | |
114 | gdbserver_state.allow_stop_reply = false; | |
115 | } | |
d96bf49b AB |
116 | } |
117 | ||
118 | int gdb_handlesig(CPUState *cpu, int sig) | |
119 | { | |
120 | char buf[256]; | |
121 | int n; | |
122 | ||
123 | if (!gdbserver_state.init || gdbserver_user_state.fd < 0) { | |
124 | return sig; | |
125 | } | |
126 | ||
127 | /* disable single step if it was enabled */ | |
128 | cpu_single_step(cpu, 0); | |
129 | tb_flush(cpu); | |
130 | ||
131 | if (sig != 0) { | |
132 | gdb_set_stop_cpu(cpu); | |
75837005 MTB |
133 | if (gdbserver_state.allow_stop_reply) { |
134 | g_string_printf(gdbserver_state.str_buf, | |
135 | "T%02xthread:", gdb_target_signal_to_gdb(sig)); | |
136 | gdb_append_thread_id(cpu, gdbserver_state.str_buf); | |
137 | g_string_append_c(gdbserver_state.str_buf, ';'); | |
138 | gdb_put_strbuf(); | |
139 | gdbserver_state.allow_stop_reply = false; | |
140 | } | |
d96bf49b AB |
141 | } |
142 | /* | |
143 | * gdb_put_packet() might have detected that the peer terminated the | |
144 | * connection. | |
145 | */ | |
146 | if (gdbserver_user_state.fd < 0) { | |
147 | return sig; | |
148 | } | |
149 | ||
150 | sig = 0; | |
151 | gdbserver_state.state = RS_IDLE; | |
152 | gdbserver_user_state.running_state = 0; | |
153 | while (gdbserver_user_state.running_state == 0) { | |
154 | n = read(gdbserver_user_state.fd, buf, 256); | |
155 | if (n > 0) { | |
156 | int i; | |
157 | ||
158 | for (i = 0; i < n; i++) { | |
159 | gdb_read_byte(buf[i]); | |
160 | } | |
161 | } else { | |
162 | /* | |
163 | * XXX: Connection closed. Should probably wait for another | |
164 | * connection before continuing. | |
165 | */ | |
166 | if (n == 0) { | |
167 | close(gdbserver_user_state.fd); | |
168 | } | |
169 | gdbserver_user_state.fd = -1; | |
170 | return sig; | |
171 | } | |
172 | } | |
173 | sig = gdbserver_state.signal; | |
174 | gdbserver_state.signal = 0; | |
175 | return sig; | |
176 | } | |
177 | ||
178 | /* Tell the remote gdb that the process has exited due to SIG. */ | |
179 | void gdb_signalled(CPUArchState *env, int sig) | |
180 | { | |
181 | char buf[4]; | |
182 | ||
75837005 MTB |
183 | if (!gdbserver_state.init || gdbserver_user_state.fd < 0 || |
184 | !gdbserver_state.allow_stop_reply) { | |
d96bf49b AB |
185 | return; |
186 | } | |
187 | ||
188 | snprintf(buf, sizeof(buf), "X%02x", gdb_target_signal_to_gdb(sig)); | |
189 | gdb_put_packet(buf); | |
75837005 | 190 | gdbserver_state.allow_stop_reply = false; |
d96bf49b AB |
191 | } |
192 | ||
193 | static void gdb_accept_init(int fd) | |
194 | { | |
195 | gdb_init_gdbserver_state(); | |
196 | gdb_create_default_process(&gdbserver_state); | |
197 | gdbserver_state.processes[0].attached = true; | |
198 | gdbserver_state.c_cpu = gdb_first_attached_cpu(); | |
199 | gdbserver_state.g_cpu = gdbserver_state.c_cpu; | |
200 | gdbserver_user_state.fd = fd; | |
201 | gdb_has_xml = false; | |
202 | } | |
203 | ||
204 | static bool gdb_accept_socket(int gdb_fd) | |
205 | { | |
206 | int fd; | |
207 | ||
208 | for (;;) { | |
209 | fd = accept(gdb_fd, NULL, NULL); | |
210 | if (fd < 0 && errno != EINTR) { | |
211 | perror("accept socket"); | |
212 | return false; | |
213 | } else if (fd >= 0) { | |
214 | qemu_set_cloexec(fd); | |
215 | break; | |
216 | } | |
217 | } | |
218 | ||
219 | gdb_accept_init(fd); | |
220 | return true; | |
221 | } | |
222 | ||
223 | static int gdbserver_open_socket(const char *path) | |
224 | { | |
225 | struct sockaddr_un sockaddr = {}; | |
226 | int fd, ret; | |
227 | ||
228 | fd = socket(AF_UNIX, SOCK_STREAM, 0); | |
229 | if (fd < 0) { | |
230 | perror("create socket"); | |
231 | return -1; | |
232 | } | |
233 | ||
234 | sockaddr.sun_family = AF_UNIX; | |
235 | pstrcpy(sockaddr.sun_path, sizeof(sockaddr.sun_path) - 1, path); | |
236 | ret = bind(fd, (struct sockaddr *)&sockaddr, sizeof(sockaddr)); | |
237 | if (ret < 0) { | |
238 | perror("bind socket"); | |
239 | close(fd); | |
240 | return -1; | |
241 | } | |
242 | ret = listen(fd, 1); | |
243 | if (ret < 0) { | |
244 | perror("listen socket"); | |
245 | close(fd); | |
246 | return -1; | |
247 | } | |
248 | ||
249 | return fd; | |
250 | } | |
251 | ||
252 | static bool gdb_accept_tcp(int gdb_fd) | |
253 | { | |
254 | struct sockaddr_in sockaddr = {}; | |
255 | socklen_t len; | |
256 | int fd; | |
257 | ||
258 | for (;;) { | |
259 | len = sizeof(sockaddr); | |
260 | fd = accept(gdb_fd, (struct sockaddr *)&sockaddr, &len); | |
261 | if (fd < 0 && errno != EINTR) { | |
262 | perror("accept"); | |
263 | return false; | |
264 | } else if (fd >= 0) { | |
265 | qemu_set_cloexec(fd); | |
266 | break; | |
267 | } | |
268 | } | |
269 | ||
270 | /* set short latency */ | |
271 | if (socket_set_nodelay(fd)) { | |
272 | perror("setsockopt"); | |
273 | close(fd); | |
274 | return false; | |
275 | } | |
276 | ||
277 | gdb_accept_init(fd); | |
278 | return true; | |
279 | } | |
280 | ||
281 | static int gdbserver_open_port(int port) | |
282 | { | |
283 | struct sockaddr_in sockaddr; | |
284 | int fd, ret; | |
285 | ||
286 | fd = socket(PF_INET, SOCK_STREAM, 0); | |
287 | if (fd < 0) { | |
288 | perror("socket"); | |
289 | return -1; | |
290 | } | |
291 | qemu_set_cloexec(fd); | |
292 | ||
293 | socket_set_fast_reuse(fd); | |
294 | ||
295 | sockaddr.sin_family = AF_INET; | |
296 | sockaddr.sin_port = htons(port); | |
297 | sockaddr.sin_addr.s_addr = 0; | |
298 | ret = bind(fd, (struct sockaddr *)&sockaddr, sizeof(sockaddr)); | |
299 | if (ret < 0) { | |
300 | perror("bind"); | |
301 | close(fd); | |
302 | return -1; | |
303 | } | |
304 | ret = listen(fd, 1); | |
305 | if (ret < 0) { | |
306 | perror("listen"); | |
307 | close(fd); | |
308 | return -1; | |
309 | } | |
310 | ||
311 | return fd; | |
312 | } | |
313 | ||
314 | int gdbserver_start(const char *port_or_path) | |
315 | { | |
316 | int port = g_ascii_strtoull(port_or_path, NULL, 10); | |
317 | int gdb_fd; | |
318 | ||
319 | if (port > 0) { | |
320 | gdb_fd = gdbserver_open_port(port); | |
321 | } else { | |
322 | gdb_fd = gdbserver_open_socket(port_or_path); | |
323 | } | |
324 | ||
325 | if (gdb_fd < 0) { | |
326 | return -1; | |
327 | } | |
328 | ||
329 | if (port > 0 && gdb_accept_tcp(gdb_fd)) { | |
330 | return 0; | |
331 | } else if (gdb_accept_socket(gdb_fd)) { | |
332 | gdbserver_user_state.socket_path = g_strdup(port_or_path); | |
333 | return 0; | |
334 | } | |
335 | ||
336 | /* gone wrong */ | |
337 | close(gdb_fd); | |
338 | return -1; | |
339 | } | |
340 | ||
341 | /* Disable gdb stub for child processes. */ | |
342 | void gdbserver_fork(CPUState *cpu) | |
343 | { | |
344 | if (!gdbserver_state.init || gdbserver_user_state.fd < 0) { | |
345 | return; | |
346 | } | |
347 | close(gdbserver_user_state.fd); | |
348 | gdbserver_user_state.fd = -1; | |
349 | cpu_breakpoint_remove_all(cpu, BP_GDB); | |
350 | /* no cpu_watchpoint_remove_all for user-mode */ | |
351 | } | |
352 | ||
353 | /* | |
354 | * Execution state helpers | |
355 | */ | |
356 | ||
8a2025b3 AB |
357 | void gdb_handle_query_attached(GArray *params, void *user_ctx) |
358 | { | |
359 | gdb_put_packet("0"); | |
360 | } | |
361 | ||
d96bf49b AB |
362 | void gdb_continue(void) |
363 | { | |
364 | gdbserver_user_state.running_state = 1; | |
365 | trace_gdbstub_op_continue(); | |
366 | } | |
367 | ||
368 | /* | |
369 | * Resume execution, for user-mode emulation it's equivalent to | |
370 | * gdb_continue. | |
371 | */ | |
372 | int gdb_continue_partial(char *newstates) | |
373 | { | |
374 | CPUState *cpu; | |
375 | int res = 0; | |
376 | /* | |
377 | * This is not exactly accurate, but it's an improvement compared to the | |
378 | * previous situation, where only one CPU would be single-stepped. | |
379 | */ | |
380 | CPU_FOREACH(cpu) { | |
381 | if (newstates[cpu->cpu_index] == 's') { | |
382 | trace_gdbstub_op_stepping(cpu->cpu_index); | |
383 | cpu_single_step(cpu, gdbserver_state.sstep_flags); | |
384 | } | |
385 | } | |
386 | gdbserver_user_state.running_state = 1; | |
387 | return res; | |
388 | } | |
389 | ||
589a5867 AB |
390 | /* |
391 | * Memory access helpers | |
392 | */ | |
393 | int gdb_target_memory_rw_debug(CPUState *cpu, hwaddr addr, | |
394 | uint8_t *buf, int len, bool is_write) | |
395 | { | |
396 | CPUClass *cc; | |
397 | ||
398 | cc = CPU_GET_CLASS(cpu); | |
399 | if (cc->memory_rw_debug) { | |
400 | return cc->memory_rw_debug(cpu, addr, buf, len, is_write); | |
401 | } | |
402 | return cpu_memory_rw_debug(cpu, addr, buf, len, is_write); | |
403 | } | |
404 | ||
7ea0c33d AB |
405 | /* |
406 | * cpu helpers | |
407 | */ | |
408 | ||
409 | unsigned int gdb_get_max_cpus(void) | |
410 | { | |
411 | CPUState *cpu; | |
412 | unsigned int max_cpus = 1; | |
413 | ||
414 | CPU_FOREACH(cpu) { | |
415 | max_cpus = max_cpus <= cpu->cpu_index ? cpu->cpu_index + 1 : max_cpus; | |
416 | } | |
417 | ||
418 | return max_cpus; | |
419 | } | |
420 | ||
505601d5 AB |
421 | /* replay not supported for user-mode */ |
422 | bool gdb_can_reverse(void) | |
423 | { | |
424 | return false; | |
425 | } | |
7ea0c33d | 426 | |
d96bf49b AB |
427 | /* |
428 | * Break/Watch point helpers | |
429 | */ | |
430 | ||
a48e7d9e AB |
431 | bool gdb_supports_guest_debug(void) |
432 | { | |
433 | /* user-mode == TCG == supported */ | |
434 | return true; | |
435 | } | |
436 | ||
55b5b8e9 | 437 | int gdb_breakpoint_insert(CPUState *cs, int type, vaddr addr, vaddr len) |
ae7467b1 AB |
438 | { |
439 | CPUState *cpu; | |
440 | int err = 0; | |
441 | ||
442 | switch (type) { | |
443 | case GDB_BREAKPOINT_SW: | |
444 | case GDB_BREAKPOINT_HW: | |
445 | CPU_FOREACH(cpu) { | |
446 | err = cpu_breakpoint_insert(cpu, addr, BP_GDB, NULL); | |
447 | if (err) { | |
448 | break; | |
449 | } | |
450 | } | |
451 | return err; | |
452 | default: | |
453 | /* user-mode doesn't support watchpoints */ | |
454 | return -ENOSYS; | |
455 | } | |
456 | } | |
457 | ||
55b5b8e9 | 458 | int gdb_breakpoint_remove(CPUState *cs, int type, vaddr addr, vaddr len) |
ae7467b1 AB |
459 | { |
460 | CPUState *cpu; | |
461 | int err = 0; | |
462 | ||
463 | switch (type) { | |
464 | case GDB_BREAKPOINT_SW: | |
465 | case GDB_BREAKPOINT_HW: | |
466 | CPU_FOREACH(cpu) { | |
467 | err = cpu_breakpoint_remove(cpu, addr, BP_GDB); | |
468 | if (err) { | |
469 | break; | |
470 | } | |
471 | } | |
472 | return err; | |
473 | default: | |
474 | /* user-mode doesn't support watchpoints */ | |
475 | return -ENOSYS; | |
476 | } | |
477 | } | |
478 | ||
479 | void gdb_breakpoint_remove_all(CPUState *cs) | |
480 | { | |
481 | cpu_breakpoint_remove_all(cs, BP_GDB); | |
482 | } | |
131f387d AB |
483 | |
484 | /* | |
485 | * For user-mode syscall support we send the system call immediately | |
486 | * and then return control to gdb for it to process the syscall request. | |
487 | * Since the protocol requires that gdb hands control back to us | |
488 | * using a "here are the results" F packet, we don't need to check | |
489 | * gdb_handlesig's return value (which is the signal to deliver if | |
490 | * execution was resumed via a continue packet). | |
491 | */ | |
492 | void gdb_syscall_handling(const char *syscall_packet) | |
493 | { | |
494 | gdb_put_packet(syscall_packet); | |
495 | gdb_handlesig(gdbserver_state.c_cpu, 0); | |
496 | } |