]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/procfs.c
Automatic date update in version.in
[thirdparty/binutils-gdb.git] / gdb / procfs.c
CommitLineData
44122162 1/* Machine independent support for Solaris /proc (process file system) for GDB.
2555fe1a 2
4a94e368 3 Copyright (C) 1999-2022 Free Software Foundation, Inc.
2555fe1a 4
c3f6f71d
JM
5 Written by Michael Snyder at Cygnus Solutions.
6 Based on work by Fred Fish, Stu Grossman, Geoff Noer, and others.
c906108c 7
a9762ec7
JB
8 This file is part of GDB.
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
14
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
21 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c 22
c3f6f71d
JM
23#include "defs.h"
24#include "inferior.h"
45741a9c 25#include "infrun.h"
c3f6f71d
JM
26#include "target.h"
27#include "gdbcore.h"
65554fef 28#include "elf-bfd.h" /* for elfcore_write_* */
c3f6f71d 29#include "gdbcmd.h"
0fda6bd2 30#include "gdbthread.h"
7f7fe91e 31#include "regcache.h"
28439f5e 32#include "inf-child.h"
4fa7574e 33#include "nat/fork-inferior.h"
0d12e84c 34#include "gdbarch.h"
c906108c 35
c3f6f71d
JM
36#include <sys/procfs.h>
37#include <sys/fault.h>
38#include <sys/syscall.h>
268a13a5 39#include "gdbsupport/gdb_wait.h"
0fda6bd2
JM
40#include <signal.h>
41#include <ctype.h>
92107356 42#include "gdb_bfd.h"
4e73f23d 43#include "auxv.h"
d1a7880c 44#include "procfs.h"
76727919 45#include "observable.h"
268a13a5
TT
46#include "gdbsupport/scoped_fd.h"
47#include "gdbsupport/pathstuff.h"
0fda6bd2 48
77382aee
PA
49/* This module provides the interface between GDB and the
50 /proc file system, which is used on many versions of Unix
51 as a means for debuggers to control other processes.
52
77382aee
PA
53 /proc works by imitating a file system: you open a simulated file
54 that represents the process you wish to interact with, and perform
55 operations on that "file" in order to examine or change the state
56 of the other process.
57
58 The most important thing to know about /proc and this module is
59 that there are two very different interfaces to /proc:
60
61 One that uses the ioctl system call, and another that uses read
62 and write system calls.
63
44122162
RO
64 This module supports only the Solaris version of the read/write
65 interface. */
77382aee 66
c906108c 67#include <sys/types.h>
2978b111 68#include <dirent.h> /* opendir/readdir, for listing the LWP's */
c906108c 69
c3f6f71d
JM
70#include <fcntl.h> /* for O_RDONLY */
71#include <unistd.h> /* for "X_OK" */
53ce3c39 72#include <sys/stat.h> /* for struct stat */
c906108c 73
103b3ef5
MS
74/* Note: procfs-utils.h must be included after the above system header
75 files, because it redefines various system calls using macros.
76 This may be incompatible with the prototype declarations. */
77
103b3ef5
MS
78#include "proc-utils.h"
79
77382aee 80/* Prototypes for supply_gregset etc. */
c60c0f5f
MS
81#include "gregset.h"
82
c3f6f71d 83/* =================== TARGET_OPS "MODULE" =================== */
c906108c 84
77382aee 85/* This module defines the GDB target vector and its methods. */
c906108c 86
f6ac5f3d 87
e96027e0
PA
88static enum target_xfer_status procfs_xfer_memory (gdb_byte *,
89 const gdb_byte *,
90 ULONGEST, ULONGEST,
91 ULONGEST *);
a14ed312 92
f6ac5f3d
PA
93class procfs_target final : public inf_child_target
94{
95public:
96 void create_inferior (const char *, const std::string &,
97 char **, int) override;
98
99 void kill () override;
100
101 void mourn_inferior () override;
102
103 void attach (const char *, int) override;
104 void detach (inferior *inf, int) override;
105
106 void resume (ptid_t, int, enum gdb_signal) override;
b60cea74 107 ptid_t wait (ptid_t, struct target_waitstatus *, target_wait_flags) override;
f6ac5f3d
PA
108
109 void fetch_registers (struct regcache *, int) override;
110 void store_registers (struct regcache *, int) override;
111
112 enum target_xfer_status xfer_partial (enum target_object object,
113 const char *annex,
114 gdb_byte *readbuf,
115 const gdb_byte *writebuf,
116 ULONGEST offset, ULONGEST len,
117 ULONGEST *xfered_len) override;
118
adc6a863 119 void pass_signals (gdb::array_view<const unsigned char>) override;
a14ed312 120
f6ac5f3d 121 void files_info () override;
c3f6f71d 122
f6ac5f3d 123 void update_thread_list () override;
be4d1333 124
57810aa7 125 bool thread_alive (ptid_t ptid) override;
be4d1333 126
a068643d 127 std::string pid_to_str (ptid_t) override;
1e03ad20 128
4206c05e
RO
129 char *pid_to_exec_file (int pid) override;
130
f6ac5f3d
PA
131 thread_control_capabilities get_thread_control_capabilities () override
132 { return tc_schedlock; }
145b16a9 133
f6ac5f3d
PA
134 /* find_memory_regions support method for gcore */
135 int find_memory_regions (find_memory_region_ftype func, void *data)
136 override;
b5c8fcb1 137
24f5300a 138 gdb::unique_xmalloc_ptr<char> make_corefile_notes (bfd *, int *) override;
b5c8fcb1 139
f6ac5f3d
PA
140 bool info_proc (const char *, enum info_proc_what) override;
141
c475f569 142#if PR_MODEL_NATIVE == PR_MODEL_LP64
f6ac5f3d
PA
143 int auxv_parse (gdb_byte **readptr,
144 gdb_byte *endptr, CORE_ADDR *typep, CORE_ADDR *valp)
145 override;
146#endif
147
57810aa7 148 bool stopped_by_watchpoint () override;
f6ac5f3d
PA
149
150 int insert_watchpoint (CORE_ADDR, int, enum target_hw_bp_type,
151 struct expression *) override;
152
153 int remove_watchpoint (CORE_ADDR, int, enum target_hw_bp_type,
154 struct expression *) override;
155
156 int region_ok_for_hw_watchpoint (CORE_ADDR, int) override;
157
158 int can_use_hw_breakpoint (enum bptype, int, int) override;
57810aa7 159 bool stopped_data_address (CORE_ADDR *) override;
5b6d1e4f
PA
160
161 void procfs_init_inferior (int pid);
f6ac5f3d 162};
b5c8fcb1 163
f6ac5f3d 164static procfs_target the_procfs_target;
b5c8fcb1 165
c475f569 166#if PR_MODEL_NATIVE == PR_MODEL_LP64
77382aee
PA
167/* When GDB is built as 64-bit application on Solaris, the auxv data
168 is presented in 64-bit format. We need to provide a custom parser
169 to handle that. */
f6ac5f3d
PA
170int
171procfs_target::auxv_parse (gdb_byte **readptr,
172 gdb_byte *endptr, CORE_ADDR *typep, CORE_ADDR *valp)
c47ffbe3 173{
f5656ead 174 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
c47ffbe3
VP
175 gdb_byte *ptr = *readptr;
176
177 if (endptr == ptr)
178 return 0;
77382aee 179
c47ffbe3
VP
180 if (endptr - ptr < 8 * 2)
181 return -1;
182
e17a4113 183 *typep = extract_unsigned_integer (ptr, 4, byte_order);
c47ffbe3
VP
184 ptr += 8;
185 /* The size of data is always 64-bit. If the application is 32-bit,
186 it will be zero extended, as expected. */
e17a4113 187 *valp = extract_unsigned_integer (ptr, 8, byte_order);
c47ffbe3
VP
188 ptr += 8;
189
190 *readptr = ptr;
191 return 1;
192}
193#endif
194
c3f6f71d
JM
195/* =================== END, TARGET_OPS "MODULE" =================== */
196
c3f6f71d
JM
197/* =================== STRUCT PROCINFO "MODULE" =================== */
198
199 /* FIXME: this comment will soon be out of date W.R.T. threads. */
200
201/* The procinfo struct is a wrapper to hold all the state information
202 concerning a /proc process. There should be exactly one procinfo
203 for each process, and since GDB currently can debug only one
204 process at a time, that means there should be only one procinfo.
205 All of the LWP's of a process can be accessed indirectly thru the
206 single process procinfo.
207
208 However, against the day when GDB may debug more than one process,
209 this data structure is kept in a list (which for now will hold no
210 more than one member), and many functions will have a pointer to a
211 procinfo as an argument.
212
213 There will be a separate procinfo structure for use by the (not yet
214 implemented) "info proc" command, so that we can print useful
215 information about any random process without interfering with the
0df8b418 216 inferior's procinfo information. */
c3f6f71d 217
c3f6f71d 218/* format strings for /proc paths */
44122162
RO
219#define CTL_PROC_NAME_FMT "/proc/%d/ctl"
220#define AS_PROC_NAME_FMT "/proc/%d/as"
221#define MAP_PROC_NAME_FMT "/proc/%d/map"
222#define STATUS_PROC_NAME_FMT "/proc/%d/status"
13db92d3 223#define MAX_PROC_NAME_SIZE sizeof("/proc/999999/lwp/0123456789/lwpstatus")
c906108c 224
c3f6f71d
JM
225typedef struct procinfo {
226 struct procinfo *next;
227 int pid; /* Process ID */
228 int tid; /* Thread/LWP id */
c906108c 229
c3f6f71d
JM
230 /* process state */
231 int was_stopped;
232 int ignore_next_sigstop;
c906108c 233
c3f6f71d 234 int ctl_fd; /* File descriptor for /proc control file */
c3f6f71d
JM
235 int status_fd; /* File descriptor for /proc status file */
236 int as_fd; /* File descriptor for /proc as file */
c906108c 237
c3f6f71d 238 char pathname[MAX_PROC_NAME_SIZE]; /* Pathname to /proc entry */
c906108c 239
c3f6f71d 240 fltset_t saved_fltset; /* Saved traced hardware fault set */
44122162
RO
241 sigset_t saved_sigset; /* Saved traced signal set */
242 sigset_t saved_sighold; /* Saved held signal set */
37de36c6
KB
243 sysset_t *saved_exitset; /* Saved traced system call exit set */
244 sysset_t *saved_entryset; /* Saved traced system call entry set */
c906108c 245
44122162 246 pstatus_t prstatus; /* Current process status info */
19958708 247
c3f6f71d 248 struct procinfo *thread_list;
c906108c 249
c3f6f71d
JM
250 int status_valid : 1;
251 int gregs_valid : 1;
252 int fpregs_valid : 1;
253 int threads_valid: 1;
254} procinfo;
c906108c 255
c3f6f71d 256static char errmsg[128]; /* shared error msg buffer */
c906108c 257
c3f6f71d 258/* Function prototypes for procinfo module: */
c906108c 259
a14ed312
KB
260static procinfo *find_procinfo_or_die (int pid, int tid);
261static procinfo *find_procinfo (int pid, int tid);
262static procinfo *create_procinfo (int pid, int tid);
44122162 263static void destroy_procinfo (procinfo *p);
44122162
RO
264static void dead_procinfo (procinfo *p, const char *msg, int killp);
265static int open_procinfo_files (procinfo *p, int which);
266static void close_procinfo_files (procinfo *p);
c906108c 267
e9ef4f39 268static int iterate_over_mappings
b8edc417
JK
269 (procinfo *pi, find_memory_region_ftype child_func, void *data,
270 int (*func) (struct prmap *map, find_memory_region_ftype child_func,
77382aee 271 void *data));
e9ef4f39 272
c3f6f71d 273/* The head of the procinfo list: */
44122162 274static procinfo *procinfo_list;
c906108c 275
77382aee
PA
276/* Search the procinfo list. Return a pointer to procinfo, or NULL if
277 not found. */
c906108c 278
19958708 279static procinfo *
fba45db2 280find_procinfo (int pid, int tid)
c5aa993b 281{
c3f6f71d 282 procinfo *pi;
c906108c 283
c3f6f71d
JM
284 for (pi = procinfo_list; pi; pi = pi->next)
285 if (pi->pid == pid)
286 break;
c906108c 287
c3f6f71d
JM
288 if (pi)
289 if (tid)
290 {
291 /* Don't check threads_valid. If we're updating the
292 thread_list, we want to find whatever threads are already
293 here. This means that in general it is the caller's
294 responsibility to check threads_valid and update before
295 calling find_procinfo, if the caller wants to find a new
77382aee 296 thread. */
c3f6f71d
JM
297
298 for (pi = pi->thread_list; pi; pi = pi->next)
299 if (pi->tid == tid)
300 break;
301 }
c906108c 302
c3f6f71d
JM
303 return pi;
304}
c906108c 305
77382aee 306/* Calls find_procinfo, but errors on failure. */
c906108c 307
c3f6f71d 308static procinfo *
fba45db2 309find_procinfo_or_die (int pid, int tid)
c3f6f71d
JM
310{
311 procinfo *pi = find_procinfo (pid, tid);
c906108c 312
c3f6f71d 313 if (pi == NULL)
0fda6bd2
JM
314 {
315 if (tid)
3e43a32a
MS
316 error (_("procfs: couldn't find pid %d "
317 "(kernel thread %d) in procinfo list."),
0fda6bd2
JM
318 pid, tid);
319 else
8a3fe4f8 320 error (_("procfs: couldn't find pid %d in procinfo list."), pid);
0fda6bd2 321 }
c3f6f71d
JM
322 return pi;
323}
c906108c 324
77382aee
PA
325/* Wrapper for `open'. The appropriate open call is attempted; if
326 unsuccessful, it will be retried as many times as needed for the
327 EAGAIN and EINTR conditions.
19958708 328
77382aee
PA
329 For other conditions, retry the open a limited number of times. In
330 addition, a short sleep is imposed prior to retrying the open. The
331 reason for this sleep is to give the kernel a chance to catch up
332 and create the file in question in the event that GDB "wins" the
333 race to open a file before the kernel has created it. */
19958708 334
4d1bcd09
KB
335static int
336open_with_retry (const char *pathname, int flags)
337{
338 int retries_remaining, status;
339
340 retries_remaining = 2;
341
342 while (1)
343 {
344 status = open (pathname, flags);
345
346 if (status >= 0 || retries_remaining == 0)
347 break;
348 else if (errno != EINTR && errno != EAGAIN)
349 {
350 retries_remaining--;
351 sleep (1);
352 }
353 }
354
355 return status;
356}
357
44122162
RO
358/* Open the file descriptor for the process or LWP. We only open the
359 control file descriptor; the others are opened lazily as needed.
77382aee 360 Returns the file descriptor, or zero for failure. */
c906108c 361
c3f6f71d 362enum { FD_CTL, FD_STATUS, FD_AS };
c906108c 363
c3f6f71d 364static int
fba45db2 365open_procinfo_files (procinfo *pi, int which)
c3f6f71d
JM
366{
367 char tmp[MAX_PROC_NAME_SIZE];
368 int fd;
369
77382aee
PA
370 /* This function is getting ALMOST long enough to break up into
371 several. Here is some rationale:
372
77382aee 373 There are several file descriptors that may need to be open
196535a6 374 for any given process or LWP. The ones we're interested in are:
77382aee
PA
375 - control (ctl) write-only change the state
376 - status (status) read-only query the state
377 - address space (as) read/write access memory
378 - map (map) read-only virtual addr map
196535a6
RO
379 Most of these are opened lazily as they are needed.
380 The pathnames for the 'files' for an LWP look slightly
381 different from those of a first-class process:
77382aee
PA
382 Pathnames for a process (<proc-id>):
383 /proc/<proc-id>/ctl
384 /proc/<proc-id>/status
385 /proc/<proc-id>/as
386 /proc/<proc-id>/map
387 Pathnames for an LWP (lwp-id):
388 /proc/<proc-id>/lwp/<lwp-id>/lwpctl
389 /proc/<proc-id>/lwp/<lwp-id>/lwpstatus
196535a6
RO
390 An LWP has no map or address space file descriptor, since
391 the memory map and address space are shared by all LWPs. */
44122162 392
77382aee
PA
393 /* In this case, there are several different file descriptors that
394 we might be asked to open. The control file descriptor will be
395 opened early, but the others will be opened lazily as they are
396 needed. */
c3f6f71d
JM
397
398 strcpy (tmp, pi->pathname);
0df8b418 399 switch (which) { /* Which file descriptor to open? */
c3f6f71d
JM
400 case FD_CTL:
401 if (pi->tid)
402 strcat (tmp, "/lwpctl");
403 else
404 strcat (tmp, "/ctl");
4d1bcd09 405 fd = open_with_retry (tmp, O_WRONLY);
e28cade7 406 if (fd < 0)
c3f6f71d
JM
407 return 0; /* fail */
408 pi->ctl_fd = fd;
409 break;
410 case FD_AS:
411 if (pi->tid)
0df8b418 412 return 0; /* There is no 'as' file descriptor for an lwp. */
c3f6f71d 413 strcat (tmp, "/as");
4d1bcd09 414 fd = open_with_retry (tmp, O_RDWR);
e28cade7 415 if (fd < 0)
c3f6f71d
JM
416 return 0; /* fail */
417 pi->as_fd = fd;
418 break;
419 case FD_STATUS:
420 if (pi->tid)
421 strcat (tmp, "/lwpstatus");
422 else
423 strcat (tmp, "/status");
4d1bcd09 424 fd = open_with_retry (tmp, O_RDONLY);
e28cade7 425 if (fd < 0)
c3f6f71d
JM
426 return 0; /* fail */
427 pi->status_fd = fd;
428 break;
429 default:
430 return 0; /* unknown file descriptor */
431 }
c906108c 432
c3f6f71d
JM
433 return 1; /* success */
434}
c906108c 435
77382aee
PA
436/* Allocate a data structure and link it into the procinfo list.
437 First tries to find a pre-existing one (FIXME: why?). Returns the
438 pointer to new procinfo struct. */
c906108c 439
c3f6f71d 440static procinfo *
fba45db2 441create_procinfo (int pid, int tid)
c3f6f71d 442{
0b62613e 443 procinfo *pi, *parent = NULL;
c906108c 444
c475f569
RO
445 pi = find_procinfo (pid, tid);
446 if (pi != NULL)
0df8b418 447 return pi; /* Already exists, nothing to do. */
c906108c 448
0df8b418 449 /* Find parent before doing malloc, to save having to cleanup. */
c3f6f71d
JM
450 if (tid != 0)
451 parent = find_procinfo_or_die (pid, 0); /* FIXME: should I
452 create it if it
0df8b418 453 doesn't exist yet? */
c906108c 454
8d749320 455 pi = XNEW (procinfo);
c3f6f71d
JM
456 memset (pi, 0, sizeof (procinfo));
457 pi->pid = pid;
458 pi->tid = tid;
c906108c 459
c475f569
RO
460 pi->saved_entryset = XNEW (sysset_t);
461 pi->saved_exitset = XNEW (sysset_t);
1d5e0602 462
c3f6f71d
JM
463 /* Chain into list. */
464 if (tid == 0)
465 {
196535a6 466 xsnprintf (pi->pathname, sizeof (pi->pathname), "/proc/%d", pid);
c3f6f71d
JM
467 pi->next = procinfo_list;
468 procinfo_list = pi;
469 }
470 else
471 {
c475f569
RO
472 xsnprintf (pi->pathname, sizeof (pi->pathname), "/proc/%d/lwp/%d",
473 pid, tid);
c3f6f71d
JM
474 pi->next = parent->thread_list;
475 parent->thread_list = pi;
476 }
477 return pi;
478}
c906108c 479
77382aee 480/* Close all file descriptors associated with the procinfo. */
c906108c 481
c3f6f71d 482static void
fba45db2 483close_procinfo_files (procinfo *pi)
c3f6f71d
JM
484{
485 if (pi->ctl_fd > 0)
486 close (pi->ctl_fd);
c3f6f71d
JM
487 if (pi->as_fd > 0)
488 close (pi->as_fd);
489 if (pi->status_fd > 0)
490 close (pi->status_fd);
c3f6f71d
JM
491 pi->ctl_fd = pi->as_fd = pi->status_fd = 0;
492}
c906108c 493
77382aee 494/* Destructor function. Close, unlink and deallocate the object. */
c906108c 495
c3f6f71d 496static void
fba45db2 497destroy_one_procinfo (procinfo **list, procinfo *pi)
c3f6f71d
JM
498{
499 procinfo *ptr;
500
77382aee 501 /* Step one: unlink the procinfo from its list. */
c3f6f71d
JM
502 if (pi == *list)
503 *list = pi->next;
19958708 504 else
c3f6f71d
JM
505 for (ptr = *list; ptr; ptr = ptr->next)
506 if (ptr->next == pi)
507 {
508 ptr->next = pi->next;
509 break;
510 }
7a292a7a 511
77382aee 512 /* Step two: close any open file descriptors. */
c3f6f71d 513 close_procinfo_files (pi);
7a292a7a 514
77382aee 515 /* Step three: free the memory. */
1d5e0602
KB
516 xfree (pi->saved_entryset);
517 xfree (pi->saved_exitset);
b8c9b27d 518 xfree (pi);
c3f6f71d 519}
c906108c 520
c3f6f71d 521static void
fba45db2 522destroy_procinfo (procinfo *pi)
c3f6f71d
JM
523{
524 procinfo *tmp;
c906108c 525
0df8b418 526 if (pi->tid != 0) /* Destroy a thread procinfo. */
c3f6f71d 527 {
0df8b418 528 tmp = find_procinfo (pi->pid, 0); /* Find the parent process. */
c3f6f71d
JM
529 destroy_one_procinfo (&tmp->thread_list, pi);
530 }
0df8b418 531 else /* Destroy a process procinfo and all its threads. */
c3f6f71d
JM
532 {
533 /* First destroy the children, if any; */
534 while (pi->thread_list != NULL)
535 destroy_one_procinfo (&pi->thread_list, pi->thread_list);
536 /* Then destroy the parent. Genocide!!! */
537 destroy_one_procinfo (&procinfo_list, pi);
538 }
539}
c906108c 540
5b4cbbe3
TT
541/* A deleter that calls destroy_procinfo. */
542struct procinfo_deleter
004527cb 543{
5b4cbbe3
TT
544 void operator() (procinfo *pi) const
545 {
546 destroy_procinfo (pi);
547 }
548};
549
550typedef std::unique_ptr<procinfo, procinfo_deleter> procinfo_up;
004527cb 551
c3f6f71d 552enum { NOKILL, KILL };
c906108c 553
77382aee
PA
554/* To be called on a non_recoverable error for a procinfo. Prints
555 error messages, optionally sends a SIGKILL to the process, then
556 destroys the data structure. */
c906108c 557
c3f6f71d 558static void
995816ba 559dead_procinfo (procinfo *pi, const char *msg, int kill_p)
c3f6f71d
JM
560{
561 char procfile[80];
c906108c 562
c3f6f71d 563 if (pi->pathname)
c475f569 564 print_sys_errmsg (pi->pathname, errno);
c3f6f71d
JM
565 else
566 {
c475f569 567 xsnprintf (procfile, sizeof (procfile), "process %d", pi->pid);
c3f6f71d
JM
568 print_sys_errmsg (procfile, errno);
569 }
570 if (kill_p == KILL)
571 kill (pi->pid, SIGKILL);
c906108c 572
c3f6f71d 573 destroy_procinfo (pi);
0b62613e 574 error ("%s", msg);
c3f6f71d 575}
c906108c 576
c3f6f71d 577/* =================== END, STRUCT PROCINFO "MODULE" =================== */
c906108c 578
196535a6 579/* =================== /proc "MODULE" =================== */
c906108c 580
77382aee
PA
581/* This "module" is the interface layer between the /proc system API
582 and the gdb target vector functions. This layer consists of access
583 functions that encapsulate each of the basic operations that we
584 need to use from the /proc API.
585
586 The main motivation for this layer is to hide the fact that there
196535a6 587 were two very different implementations of the /proc API. */
c906108c 588
44122162
RO
589static long proc_flags (procinfo *pi);
590static int proc_why (procinfo *pi);
591static int proc_what (procinfo *pi);
592static int proc_set_current_signal (procinfo *pi, int signo);
593static int proc_get_current_thread (procinfo *pi);
d3581e61 594static int proc_iterate_over_threads
44122162 595 (procinfo *pi,
d3581e61
JB
596 int (*func) (procinfo *, procinfo *, void *),
597 void *ptr);
598
599static void
995816ba 600proc_warn (procinfo *pi, const char *func, int line)
c3f6f71d 601{
c475f569
RO
602 xsnprintf (errmsg, sizeof (errmsg), "procfs: %s line %d, %s",
603 func, line, pi->pathname);
c3f6f71d
JM
604 print_sys_errmsg (errmsg, errno);
605}
c906108c 606
d3581e61 607static void
995816ba 608proc_error (procinfo *pi, const char *func, int line)
c3f6f71d 609{
c475f569
RO
610 xsnprintf (errmsg, sizeof (errmsg), "procfs: %s line %d, %s",
611 func, line, pi->pathname);
c3f6f71d
JM
612 perror_with_name (errmsg);
613}
c906108c 614
77382aee
PA
615/* Updates the status struct in the procinfo. There is a 'valid'
616 flag, to let other functions know when this function needs to be
617 called (so the status is only read when it is needed). The status
618 file descriptor is also only opened when it is needed. Returns
619 non-zero for success, zero for failure. */
c906108c 620
d3581e61 621static int
fba45db2 622proc_get_status (procinfo *pi)
c3f6f71d 623{
0df8b418 624 /* Status file descriptor is opened "lazily". */
c475f569 625 if (pi->status_fd == 0 && open_procinfo_files (pi, FD_STATUS) == 0)
c3f6f71d
JM
626 {
627 pi->status_valid = 0;
628 return 0;
629 }
c906108c 630
c3f6f71d
JM
631 if (lseek (pi->status_fd, 0, SEEK_SET) < 0)
632 pi->status_valid = 0; /* fail */
633 else
634 {
19958708 635 /* Sigh... I have to read a different data structure,
0df8b418 636 depending on whether this is a main process or an LWP. */
c3f6f71d 637 if (pi->tid)
19958708
RM
638 pi->status_valid = (read (pi->status_fd,
639 (char *) &pi->prstatus.pr_lwp,
c3f6f71d
JM
640 sizeof (lwpstatus_t))
641 == sizeof (lwpstatus_t));
642 else
643 {
19958708 644 pi->status_valid = (read (pi->status_fd,
c3f6f71d 645 (char *) &pi->prstatus,
44122162
RO
646 sizeof (pstatus_t))
647 == sizeof (pstatus_t));
c3f6f71d
JM
648 }
649 }
c906108c 650
c3f6f71d
JM
651 if (pi->status_valid)
652 {
19958708 653 PROC_PRETTYFPRINT_STATUS (proc_flags (pi),
c3f6f71d 654 proc_why (pi),
19958708 655 proc_what (pi),
c3f6f71d
JM
656 proc_get_current_thread (pi));
657 }
c906108c 658
77382aee 659 /* The status struct includes general regs, so mark them valid too. */
c3f6f71d 660 pi->gregs_valid = pi->status_valid;
77382aee
PA
661 /* In the read/write multiple-fd model, the status struct includes
662 the fp regs too, so mark them valid too. */
c3f6f71d 663 pi->fpregs_valid = pi->status_valid;
77382aee 664 return pi->status_valid; /* True if success, false if failure. */
c3f6f71d 665}
c906108c 666
77382aee 667/* Returns the process flags (pr_flags field). */
c3f6f71d 668
d3581e61 669static long
fba45db2 670proc_flags (procinfo *pi)
c3f6f71d
JM
671{
672 if (!pi->status_valid)
673 if (!proc_get_status (pi))
0df8b418 674 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 675
c3f6f71d 676 return pi->prstatus.pr_lwp.pr_flags;
c3f6f71d 677}
c906108c 678
77382aee 679/* Returns the pr_why field (why the process stopped). */
c906108c 680
d3581e61 681static int
fba45db2 682proc_why (procinfo *pi)
c3f6f71d
JM
683{
684 if (!pi->status_valid)
685 if (!proc_get_status (pi))
0df8b418 686 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 687
c3f6f71d 688 return pi->prstatus.pr_lwp.pr_why;
c3f6f71d 689}
c906108c 690
77382aee 691/* Returns the pr_what field (details of why the process stopped). */
c906108c 692
d3581e61 693static int
fba45db2 694proc_what (procinfo *pi)
c3f6f71d
JM
695{
696 if (!pi->status_valid)
697 if (!proc_get_status (pi))
0df8b418 698 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 699
c3f6f71d 700 return pi->prstatus.pr_lwp.pr_what;
c3f6f71d 701}
c906108c 702
77382aee
PA
703/* This function is only called when PI is stopped by a watchpoint.
704 Assuming the OS supports it, write to *ADDR the data address which
705 triggered it and return 1. Return 0 if it is not possible to know
706 the address. */
bf701c2c
PM
707
708static int
709proc_watchpoint_address (procinfo *pi, CORE_ADDR *addr)
710{
711 if (!pi->status_valid)
712 if (!proc_get_status (pi))
713 return 0;
714
f5656ead
TT
715 *addr = (CORE_ADDR) gdbarch_pointer_to_address (target_gdbarch (),
716 builtin_type (target_gdbarch ())->builtin_data_ptr,
bf701c2c 717 (gdb_byte *) &pi->prstatus.pr_lwp.pr_info.si_addr);
bf701c2c
PM
718 return 1;
719}
720
77382aee
PA
721/* Returns the pr_nsysarg field (number of args to the current
722 syscall). */
c3f6f71d 723
d3581e61 724static int
fba45db2 725proc_nsysarg (procinfo *pi)
c3f6f71d
JM
726{
727 if (!pi->status_valid)
728 if (!proc_get_status (pi))
729 return 0;
19958708 730
c3f6f71d 731 return pi->prstatus.pr_lwp.pr_nsysarg;
c3f6f71d 732}
c906108c 733
77382aee
PA
734/* Returns the pr_sysarg field (pointer to the arguments of current
735 syscall). */
c906108c 736
d3581e61 737static long *
fba45db2 738proc_sysargs (procinfo *pi)
c3f6f71d
JM
739{
740 if (!pi->status_valid)
741 if (!proc_get_status (pi))
742 return NULL;
19958708 743
c3f6f71d 744 return (long *) &pi->prstatus.pr_lwp.pr_sysarg;
c3f6f71d 745}
77382aee 746
44122162 747/* Set or reset any of the following process flags:
77382aee
PA
748 PR_FORK -- forked child will inherit trace flags
749 PR_RLC -- traced process runs when last /proc file closed.
750 PR_KLC -- traced process is killed when last /proc file closed.
751 PR_ASYNC -- LWP's get to run/stop independently.
752
44122162 753 This function is done using read/write [PCSET/PCRESET/PCUNSET].
77382aee
PA
754
755 Arguments:
756 pi -- the procinfo
757 flag -- one of PR_FORK, PR_RLC, or PR_ASYNC
758 mode -- 1 for set, 0 for reset.
759
760 Returns non-zero for success, zero for failure. */
c906108c 761
c3f6f71d 762enum { FLAG_RESET, FLAG_SET };
c906108c 763
c3f6f71d 764static int
fba45db2 765proc_modify_flag (procinfo *pi, long flag, long mode)
c3f6f71d
JM
766{
767 long win = 0; /* default to fail */
768
77382aee
PA
769 /* These operations affect the process as a whole, and applying them
770 to an individual LWP has the same meaning as applying them to the
771 main process. Therefore, if we're ever called with a pointer to
772 an LWP's procinfo, let's substitute the process's procinfo and
773 avoid opening the LWP's file descriptor unnecessarily. */
c3f6f71d
JM
774
775 if (pi->pid != 0)
776 pi = find_procinfo_or_die (pi->pid, 0);
777
44122162 778 procfs_ctl_t arg[2];
c5aa993b 779
44122162
RO
780 if (mode == FLAG_SET) /* Set the flag (RLC, FORK, or ASYNC). */
781 arg[0] = PCSET;
0df8b418 782 else /* Reset the flag. */
44122162
RO
783 arg[0] = PCUNSET;
784
785 arg[1] = flag;
786 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 787
77382aee
PA
788 /* The above operation renders the procinfo's cached pstatus
789 obsolete. */
c3f6f71d 790 pi->status_valid = 0;
c906108c 791
c3f6f71d 792 if (!win)
8a3fe4f8 793 warning (_("procfs: modify_flag failed to turn %s %s"),
c3f6f71d
JM
794 flag == PR_FORK ? "PR_FORK" :
795 flag == PR_RLC ? "PR_RLC" :
c3f6f71d 796 flag == PR_ASYNC ? "PR_ASYNC" :
0d06e24b 797 flag == PR_KLC ? "PR_KLC" :
c3f6f71d
JM
798 "<unknown flag>",
799 mode == FLAG_RESET ? "off" : "on");
c906108c 800
c3f6f71d
JM
801 return win;
802}
c906108c 803
77382aee
PA
804/* Set the run_on_last_close flag. Process with all threads will
805 become runnable when debugger closes all /proc fds. Returns
806 non-zero for success, zero for failure. */
c906108c 807
d3581e61 808static int
fba45db2 809proc_set_run_on_last_close (procinfo *pi)
c906108c 810{
c3f6f71d
JM
811 return proc_modify_flag (pi, PR_RLC, FLAG_SET);
812}
c906108c 813
77382aee
PA
814/* Reset the run_on_last_close flag. The process will NOT become
815 runnable when debugger closes its file handles. Returns non-zero
816 for success, zero for failure. */
c906108c 817
d3581e61 818static int
fba45db2 819proc_unset_run_on_last_close (procinfo *pi)
c3f6f71d
JM
820{
821 return proc_modify_flag (pi, PR_RLC, FLAG_RESET);
c906108c
SS
822}
823
77382aee 824/* Reset inherit_on_fork flag. If the process forks a child while we
85102364 825 are registered for events in the parent, then we will NOT receive
77382aee
PA
826 events from the child. Returns non-zero for success, zero for
827 failure. */
c906108c 828
d3581e61 829static int
fba45db2 830proc_unset_inherit_on_fork (procinfo *pi)
c3f6f71d
JM
831{
832 return proc_modify_flag (pi, PR_FORK, FLAG_RESET);
833}
c906108c 834
77382aee
PA
835/* Set PR_ASYNC flag. If one LWP stops because of a debug event
836 (signal etc.), the remaining LWPs will continue to run. Returns
837 non-zero for success, zero for failure. */
c906108c 838
d3581e61 839static int
fba45db2 840proc_set_async (procinfo *pi)
c3f6f71d
JM
841{
842 return proc_modify_flag (pi, PR_ASYNC, FLAG_SET);
843}
c906108c 844
77382aee
PA
845/* Reset PR_ASYNC flag. If one LWP stops because of a debug event
846 (signal etc.), then all other LWPs will stop as well. Returns
847 non-zero for success, zero for failure. */
c906108c 848
d3581e61 849static int
fba45db2 850proc_unset_async (procinfo *pi)
c3f6f71d
JM
851{
852 return proc_modify_flag (pi, PR_ASYNC, FLAG_RESET);
853}
c906108c 854
77382aee
PA
855/* Request the process/LWP to stop. Does not wait. Returns non-zero
856 for success, zero for failure. */
c906108c 857
d3581e61 858static int
fba45db2 859proc_stop_process (procinfo *pi)
c3f6f71d
JM
860{
861 int win;
c906108c 862
77382aee
PA
863 /* We might conceivably apply this operation to an LWP, and the
864 LWP's ctl file descriptor might not be open. */
c906108c 865
c475f569 866 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c3f6f71d
JM
867 return 0;
868 else
869 {
37de36c6 870 procfs_ctl_t cmd = PCSTOP;
f4a14ae6 871
c3f6f71d 872 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d 873 }
c906108c 874
c3f6f71d
JM
875 return win;
876}
c5aa993b 877
77382aee
PA
878/* Wait for the process or LWP to stop (block until it does). Returns
879 non-zero for success, zero for failure. */
c906108c 880
d3581e61 881static int
fba45db2 882proc_wait_for_stop (procinfo *pi)
c906108c 883{
c3f6f71d
JM
884 int win;
885
77382aee
PA
886 /* We should never have to apply this operation to any procinfo
887 except the one for the main process. If that ever changes for
888 any reason, then take out the following clause and replace it
889 with one that makes sure the ctl_fd is open. */
19958708 890
c3f6f71d
JM
891 if (pi->tid != 0)
892 pi = find_procinfo_or_die (pi->pid, 0);
893
44122162 894 procfs_ctl_t cmd = PCWSTOP;
f4a14ae6 895
92137da0
RO
896 set_sigint_trap ();
897
44122162 898 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
92137da0
RO
899
900 clear_sigint_trap ();
901
44122162
RO
902 /* We been runnin' and we stopped -- need to update status. */
903 pi->status_valid = 0;
c906108c 904
c3f6f71d 905 return win;
c906108c
SS
906}
907
77382aee
PA
908/* Make the process or LWP runnable.
909
910 Options (not all are implemented):
911 - single-step
912 - clear current fault
913 - clear current signal
914 - abort the current system call
915 - stop as soon as finished with system call
77382aee
PA
916
917 Always clears the current fault. PI is the process or LWP to
918 operate on. If STEP is true, set the process or LWP to trap after
919 one instruction. If SIGNO is zero, clear the current signal if
920 any; if non-zero, set the current signal to this one. Returns
921 non-zero for success, zero for failure. */
c3f6f71d 922
d3581e61 923static int
fba45db2 924proc_run_process (procinfo *pi, int step, int signo)
c3f6f71d
JM
925{
926 int win;
927 int runflags;
928
77382aee
PA
929 /* We will probably have to apply this operation to individual
930 threads, so make sure the control file descriptor is open. */
19958708 931
c475f569
RO
932 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
933 return 0;
c906108c 934
0df8b418 935 runflags = PRCFAULT; /* Always clear current fault. */
c3f6f71d
JM
936 if (step)
937 runflags |= PRSTEP;
938 if (signo == 0)
939 runflags |= PRCSIG;
0df8b418 940 else if (signo != -1) /* -1 means do nothing W.R.T. signals. */
c3f6f71d 941 proc_set_current_signal (pi, signo);
c5aa993b 942
44122162 943 procfs_ctl_t cmd[2];
c906108c 944
44122162
RO
945 cmd[0] = PCRUN;
946 cmd[1] = runflags;
947 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c906108c 948
c3f6f71d
JM
949 return win;
950}
c906108c 951
77382aee
PA
952/* Register to trace signals in the process or LWP. Returns non-zero
953 for success, zero for failure. */
c906108c 954
d3581e61 955static int
44122162 956proc_set_traced_signals (procinfo *pi, sigset_t *sigset)
c906108c 957{
c3f6f71d
JM
958 int win;
959
77382aee
PA
960 /* We should never have to apply this operation to any procinfo
961 except the one for the main process. If that ever changes for
962 any reason, then take out the following clause and replace it
963 with one that makes sure the ctl_fd is open. */
19958708 964
c3f6f71d
JM
965 if (pi->tid != 0)
966 pi = find_procinfo_or_die (pi->pid, 0);
967
44122162
RO
968 struct {
969 procfs_ctl_t cmd;
970 /* Use char array to avoid alignment issues. */
971 char sigset[sizeof (sigset_t)];
972 } arg;
c906108c 973
44122162
RO
974 arg.cmd = PCSTRACE;
975 memcpy (&arg.sigset, sigset, sizeof (sigset_t));
976
977 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 978
0df8b418 979 /* The above operation renders the procinfo's cached pstatus obsolete. */
c3f6f71d 980 pi->status_valid = 0;
c906108c 981
c3f6f71d 982 if (!win)
8a3fe4f8 983 warning (_("procfs: set_traced_signals failed"));
c3f6f71d 984 return win;
c906108c
SS
985}
986
77382aee
PA
987/* Register to trace hardware faults in the process or LWP. Returns
988 non-zero for success, zero for failure. */
c906108c 989
d3581e61 990static int
fba45db2 991proc_set_traced_faults (procinfo *pi, fltset_t *fltset)
c3f6f71d
JM
992{
993 int win;
994
77382aee
PA
995 /* We should never have to apply this operation to any procinfo
996 except the one for the main process. If that ever changes for
997 any reason, then take out the following clause and replace it
998 with one that makes sure the ctl_fd is open. */
19958708 999
c3f6f71d
JM
1000 if (pi->tid != 0)
1001 pi = find_procinfo_or_die (pi->pid, 0);
1002
44122162
RO
1003 struct {
1004 procfs_ctl_t cmd;
1005 /* Use char array to avoid alignment issues. */
1006 char fltset[sizeof (fltset_t)];
1007 } arg;
1008
1009 arg.cmd = PCSFAULT;
1010 memcpy (&arg.fltset, fltset, sizeof (fltset_t));
c906108c 1011
44122162 1012 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1013
0df8b418 1014 /* The above operation renders the procinfo's cached pstatus obsolete. */
c3f6f71d 1015 pi->status_valid = 0;
c906108c 1016
c3f6f71d
JM
1017 return win;
1018}
c5aa993b 1019
77382aee
PA
1020/* Register to trace entry to system calls in the process or LWP.
1021 Returns non-zero for success, zero for failure. */
c906108c 1022
d3581e61 1023static int
fba45db2 1024proc_set_traced_sysentry (procinfo *pi, sysset_t *sysset)
c906108c 1025{
c3f6f71d
JM
1026 int win;
1027
77382aee
PA
1028 /* We should never have to apply this operation to any procinfo
1029 except the one for the main process. If that ever changes for
1030 any reason, then take out the following clause and replace it
1031 with one that makes sure the ctl_fd is open. */
19958708 1032
c3f6f71d
JM
1033 if (pi->tid != 0)
1034 pi = find_procinfo_or_die (pi->pid, 0);
1035
c475f569 1036 struct {
44122162
RO
1037 procfs_ctl_t cmd;
1038 /* Use char array to avoid alignment issues. */
1039 char sysset[sizeof (sysset_t)];
c475f569 1040 } arg;
c3f6f71d 1041
c475f569
RO
1042 arg.cmd = PCSENTRY;
1043 memcpy (&arg.sysset, sysset, sizeof (sysset_t));
44122162 1044
c475f569 1045 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
37de36c6 1046
77382aee
PA
1047 /* The above operation renders the procinfo's cached pstatus
1048 obsolete. */
c3f6f71d 1049 pi->status_valid = 0;
19958708 1050
c3f6f71d 1051 return win;
c906108c
SS
1052}
1053
77382aee
PA
1054/* Register to trace exit from system calls in the process or LWP.
1055 Returns non-zero for success, zero for failure. */
c906108c 1056
d3581e61 1057static int
fba45db2 1058proc_set_traced_sysexit (procinfo *pi, sysset_t *sysset)
c3f6f71d
JM
1059{
1060 int win;
1061
77382aee
PA
1062 /* We should never have to apply this operation to any procinfo
1063 except the one for the main process. If that ever changes for
1064 any reason, then take out the following clause and replace it
1065 with one that makes sure the ctl_fd is open. */
19958708 1066
c3f6f71d
JM
1067 if (pi->tid != 0)
1068 pi = find_procinfo_or_die (pi->pid, 0);
1069
44122162
RO
1070 struct gdb_proc_ctl_pcsexit {
1071 procfs_ctl_t cmd;
1072 /* Use char array to avoid alignment issues. */
1073 char sysset[sizeof (sysset_t)];
c475f569 1074 } arg;
c906108c 1075
c475f569
RO
1076 arg.cmd = PCSEXIT;
1077 memcpy (&arg.sysset, sysset, sizeof (sysset_t));
c906108c 1078
c475f569 1079 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
37de36c6 1080
77382aee
PA
1081 /* The above operation renders the procinfo's cached pstatus
1082 obsolete. */
c3f6f71d 1083 pi->status_valid = 0;
c906108c 1084
c3f6f71d
JM
1085 return win;
1086}
c906108c 1087
77382aee
PA
1088/* Specify the set of blocked / held signals in the process or LWP.
1089 Returns non-zero for success, zero for failure. */
c906108c 1090
d3581e61 1091static int
44122162 1092proc_set_held_signals (procinfo *pi, sigset_t *sighold)
c906108c 1093{
c3f6f71d
JM
1094 int win;
1095
77382aee
PA
1096 /* We should never have to apply this operation to any procinfo
1097 except the one for the main process. If that ever changes for
1098 any reason, then take out the following clause and replace it
1099 with one that makes sure the ctl_fd is open. */
19958708 1100
c3f6f71d
JM
1101 if (pi->tid != 0)
1102 pi = find_procinfo_or_die (pi->pid, 0);
1103
44122162
RO
1104 struct {
1105 procfs_ctl_t cmd;
1106 /* Use char array to avoid alignment issues. */
1107 char hold[sizeof (sigset_t)];
1108 } arg;
1109
1110 arg.cmd = PCSHOLD;
1111 memcpy (&arg.hold, sighold, sizeof (sigset_t));
1112 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
1113
77382aee
PA
1114 /* The above operation renders the procinfo's cached pstatus
1115 obsolete. */
c3f6f71d
JM
1116 pi->status_valid = 0;
1117
1118 return win;
c906108c
SS
1119}
1120
77382aee
PA
1121/* Returns the set of signals that are held / blocked. Will also copy
1122 the sigset if SAVE is non-zero. */
c906108c 1123
44122162
RO
1124static sigset_t *
1125proc_get_held_signals (procinfo *pi, sigset_t *save)
c906108c 1126{
44122162 1127 sigset_t *ret = NULL;
c3f6f71d 1128
77382aee
PA
1129 /* We should never have to apply this operation to any procinfo
1130 except the one for the main process. If that ever changes for
1131 any reason, then take out the following clause and replace it
1132 with one that makes sure the ctl_fd is open. */
19958708 1133
c3f6f71d
JM
1134 if (pi->tid != 0)
1135 pi = find_procinfo_or_die (pi->pid, 0);
1136
c3f6f71d
JM
1137 if (!pi->status_valid)
1138 if (!proc_get_status (pi))
1139 return NULL;
1140
c3f6f71d 1141 ret = &pi->prstatus.pr_lwp.pr_lwphold;
c3f6f71d 1142 if (save && ret)
44122162 1143 memcpy (save, ret, sizeof (sigset_t));
c3f6f71d
JM
1144
1145 return ret;
c906108c
SS
1146}
1147
77382aee
PA
1148/* Returns the set of signals that are traced / debugged. Will also
1149 copy the sigset if SAVE is non-zero. */
c3f6f71d 1150
44122162
RO
1151static sigset_t *
1152proc_get_traced_signals (procinfo *pi, sigset_t *save)
c906108c 1153{
44122162 1154 sigset_t *ret = NULL;
c3f6f71d 1155
77382aee
PA
1156 /* We should never have to apply this operation to any procinfo
1157 except the one for the main process. If that ever changes for
1158 any reason, then take out the following clause and replace it
1159 with one that makes sure the ctl_fd is open. */
19958708 1160
c3f6f71d
JM
1161 if (pi->tid != 0)
1162 pi = find_procinfo_or_die (pi->pid, 0);
1163
c3f6f71d
JM
1164 if (!pi->status_valid)
1165 if (!proc_get_status (pi))
1166 return NULL;
1167
1168 ret = &pi->prstatus.pr_sigtrace;
c3f6f71d 1169 if (save && ret)
44122162 1170 memcpy (save, ret, sizeof (sigset_t));
c906108c 1171
c3f6f71d
JM
1172 return ret;
1173}
c906108c 1174
77382aee
PA
1175/* Returns the set of hardware faults that are traced /debugged. Will
1176 also copy the faultset if SAVE is non-zero. */
c3f6f71d 1177
d3581e61 1178static fltset_t *
fba45db2 1179proc_get_traced_faults (procinfo *pi, fltset_t *save)
c3f6f71d
JM
1180{
1181 fltset_t *ret = NULL;
1182
77382aee
PA
1183 /* We should never have to apply this operation to any procinfo
1184 except the one for the main process. If that ever changes for
1185 any reason, then take out the following clause and replace it
1186 with one that makes sure the ctl_fd is open. */
19958708 1187
c3f6f71d
JM
1188 if (pi->tid != 0)
1189 pi = find_procinfo_or_die (pi->pid, 0);
1190
c3f6f71d
JM
1191 if (!pi->status_valid)
1192 if (!proc_get_status (pi))
1193 return NULL;
1194
1195 ret = &pi->prstatus.pr_flttrace;
c3f6f71d
JM
1196 if (save && ret)
1197 memcpy (save, ret, sizeof (fltset_t));
c906108c 1198
c3f6f71d
JM
1199 return ret;
1200}
c906108c 1201
77382aee
PA
1202/* Returns the set of syscalls that are traced /debugged on entry.
1203 Will also copy the syscall set if SAVE is non-zero. */
c906108c 1204
d3581e61 1205static sysset_t *
fba45db2 1206proc_get_traced_sysentry (procinfo *pi, sysset_t *save)
c3f6f71d
JM
1207{
1208 sysset_t *ret = NULL;
1209
77382aee
PA
1210 /* We should never have to apply this operation to any procinfo
1211 except the one for the main process. If that ever changes for
1212 any reason, then take out the following clause and replace it
1213 with one that makes sure the ctl_fd is open. */
19958708 1214
c3f6f71d
JM
1215 if (pi->tid != 0)
1216 pi = find_procinfo_or_die (pi->pid, 0);
1217
c3f6f71d
JM
1218 if (!pi->status_valid)
1219 if (!proc_get_status (pi))
1220 return NULL;
1221
1222 ret = &pi->prstatus.pr_sysentry;
c3f6f71d 1223 if (save && ret)
44122162 1224 memcpy (save, ret, sizeof (sysset_t));
c906108c 1225
c3f6f71d
JM
1226 return ret;
1227}
c5aa993b 1228
77382aee
PA
1229/* Returns the set of syscalls that are traced /debugged on exit.
1230 Will also copy the syscall set if SAVE is non-zero. */
c906108c 1231
d3581e61 1232static sysset_t *
fba45db2 1233proc_get_traced_sysexit (procinfo *pi, sysset_t *save)
c906108c 1234{
44122162 1235 sysset_t *ret = NULL;
c3f6f71d 1236
77382aee
PA
1237 /* We should never have to apply this operation to any procinfo
1238 except the one for the main process. If that ever changes for
1239 any reason, then take out the following clause and replace it
1240 with one that makes sure the ctl_fd is open. */
19958708 1241
c3f6f71d
JM
1242 if (pi->tid != 0)
1243 pi = find_procinfo_or_die (pi->pid, 0);
1244
c3f6f71d
JM
1245 if (!pi->status_valid)
1246 if (!proc_get_status (pi))
1247 return NULL;
1248
1249 ret = &pi->prstatus.pr_sysexit;
c3f6f71d 1250 if (save && ret)
44122162 1251 memcpy (save, ret, sizeof (sysset_t));
c3f6f71d
JM
1252
1253 return ret;
1254}
c906108c 1255
77382aee
PA
1256/* The current fault (if any) is cleared; the associated signal will
1257 not be sent to the process or LWP when it resumes. Returns
1258 non-zero for success, zero for failure. */
c906108c 1259
d3581e61 1260static int
fba45db2 1261proc_clear_current_fault (procinfo *pi)
c3f6f71d
JM
1262{
1263 int win;
1264
77382aee
PA
1265 /* We should never have to apply this operation to any procinfo
1266 except the one for the main process. If that ever changes for
1267 any reason, then take out the following clause and replace it
1268 with one that makes sure the ctl_fd is open. */
19958708 1269
c3f6f71d
JM
1270 if (pi->tid != 0)
1271 pi = find_procinfo_or_die (pi->pid, 0);
1272
44122162 1273 procfs_ctl_t cmd = PCCFAULT;
f4a14ae6 1274
44122162 1275 win = (write (pi->ctl_fd, (void *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d
JM
1276
1277 return win;
c906108c
SS
1278}
1279
77382aee
PA
1280/* Set the "current signal" that will be delivered next to the
1281 process. NOTE: semantics are different from those of KILL. This
1282 signal will be delivered to the process or LWP immediately when it
1283 is resumed (even if the signal is held/blocked); it will NOT
1284 immediately cause another event of interest, and will NOT first
1285 trap back to the debugger. Returns non-zero for success, zero for
1286 failure. */
c3f6f71d 1287
d3581e61 1288static int
fba45db2 1289proc_set_current_signal (procinfo *pi, int signo)
c3f6f71d
JM
1290{
1291 int win;
1292 struct {
37de36c6 1293 procfs_ctl_t cmd;
c3f6f71d 1294 /* Use char array to avoid alignment issues. */
44122162 1295 char sinfo[sizeof (siginfo_t)];
c3f6f71d 1296 } arg;
44122162 1297 siginfo_t mysinfo;
5b6d1e4f 1298 process_stratum_target *wait_target;
c162e8c9
JM
1299 ptid_t wait_ptid;
1300 struct target_waitstatus wait_status;
c3f6f71d 1301
77382aee
PA
1302 /* We should never have to apply this operation to any procinfo
1303 except the one for the main process. If that ever changes for
1304 any reason, then take out the following clause and replace it
1305 with one that makes sure the ctl_fd is open. */
19958708 1306
c3f6f71d
JM
1307 if (pi->tid != 0)
1308 pi = find_procinfo_or_die (pi->pid, 0);
1309
c3f6f71d 1310 /* The pointer is just a type alias. */
5b6d1e4f
PA
1311 get_last_target_status (&wait_target, &wait_ptid, &wait_status);
1312 if (wait_target == &the_procfs_target
1313 && wait_ptid == inferior_ptid
183be222
SM
1314 && wait_status.kind () == TARGET_WAITKIND_STOPPED
1315 && wait_status.sig () == gdb_signal_from_host (signo)
c162e8c9 1316 && proc_get_status (pi)
c162e8c9 1317 && pi->prstatus.pr_lwp.pr_info.si_signo == signo
c162e8c9
JM
1318 )
1319 /* Use the siginfo associated with the signal being
1320 redelivered. */
44122162 1321 memcpy (arg.sinfo, &pi->prstatus.pr_lwp.pr_info, sizeof (siginfo_t));
c162e8c9
JM
1322 else
1323 {
73930d4d
KH
1324 mysinfo.si_signo = signo;
1325 mysinfo.si_code = 0;
1326 mysinfo.si_pid = getpid (); /* ?why? */
1327 mysinfo.si_uid = getuid (); /* ?why? */
44122162 1328 memcpy (arg.sinfo, &mysinfo, sizeof (siginfo_t));
c162e8c9 1329 }
c3f6f71d 1330
c3f6f71d
JM
1331 arg.cmd = PCSSIG;
1332 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1333
c3f6f71d
JM
1334 return win;
1335}
c906108c 1336
77382aee
PA
1337/* The current signal (if any) is cleared, and is not sent to the
1338 process or LWP when it resumes. Returns non-zero for success, zero
1339 for failure. */
c906108c 1340
d3581e61 1341static int
fba45db2 1342proc_clear_current_signal (procinfo *pi)
c3f6f71d
JM
1343{
1344 int win;
1345
77382aee
PA
1346 /* We should never have to apply this operation to any procinfo
1347 except the one for the main process. If that ever changes for
1348 any reason, then take out the following clause and replace it
1349 with one that makes sure the ctl_fd is open. */
19958708 1350
c3f6f71d
JM
1351 if (pi->tid != 0)
1352 pi = find_procinfo_or_die (pi->pid, 0);
1353
44122162
RO
1354 struct {
1355 procfs_ctl_t cmd;
1356 /* Use char array to avoid alignment issues. */
1357 char sinfo[sizeof (siginfo_t)];
1358 } arg;
1359 siginfo_t mysinfo;
1360
1361 arg.cmd = PCSSIG;
1362 /* The pointer is just a type alias. */
1363 mysinfo.si_signo = 0;
1364 mysinfo.si_code = 0;
1365 mysinfo.si_errno = 0;
1366 mysinfo.si_pid = getpid (); /* ?why? */
1367 mysinfo.si_uid = getuid (); /* ?why? */
1368 memcpy (arg.sinfo, &mysinfo, sizeof (siginfo_t));
1369
1370 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1371
c3f6f71d
JM
1372 return win;
1373}
c906108c 1374
772cf8be
MK
1375/* Return the general-purpose registers for the process or LWP
1376 corresponding to PI. Upon failure, return NULL. */
c906108c 1377
d3581e61 1378static gdb_gregset_t *
fba45db2 1379proc_get_gregs (procinfo *pi)
c3f6f71d
JM
1380{
1381 if (!pi->status_valid || !pi->gregs_valid)
1382 if (!proc_get_status (pi))
1383 return NULL;
1384
c3f6f71d 1385 return &pi->prstatus.pr_lwp.pr_reg;
c3f6f71d 1386}
c5aa993b 1387
772cf8be
MK
1388/* Return the general-purpose registers for the process or LWP
1389 corresponding to PI. Upon failure, return NULL. */
c906108c 1390
d3581e61 1391static gdb_fpregset_t *
fba45db2 1392proc_get_fpregs (procinfo *pi)
c906108c 1393{
c3f6f71d
JM
1394 if (!pi->status_valid || !pi->fpregs_valid)
1395 if (!proc_get_status (pi))
1396 return NULL;
1397
c3f6f71d 1398 return &pi->prstatus.pr_lwp.pr_fpreg;
c906108c
SS
1399}
1400
772cf8be
MK
1401/* Write the general-purpose registers back to the process or LWP
1402 corresponding to PI. Return non-zero for success, zero for
1403 failure. */
c3f6f71d 1404
d3581e61 1405static int
fba45db2 1406proc_set_gregs (procinfo *pi)
c906108c 1407{
c3f6f71d
JM
1408 gdb_gregset_t *gregs;
1409 int win;
c5aa993b 1410
772cf8be
MK
1411 gregs = proc_get_gregs (pi);
1412 if (gregs == NULL)
1413 return 0; /* proc_get_regs has already warned. */
c3f6f71d 1414
772cf8be 1415 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c475f569 1416 return 0;
c3f6f71d 1417 else
c906108c 1418 {
c3f6f71d 1419 struct {
37de36c6 1420 procfs_ctl_t cmd;
c3f6f71d
JM
1421 /* Use char array to avoid alignment issues. */
1422 char gregs[sizeof (gdb_gregset_t)];
1423 } arg;
1424
772cf8be 1425 arg.cmd = PCSREG;
c3f6f71d
JM
1426 memcpy (&arg.gregs, gregs, sizeof (arg.gregs));
1427 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1428 }
c3f6f71d 1429
772cf8be 1430 /* Policy: writing the registers invalidates our cache. */
c3f6f71d
JM
1431 pi->gregs_valid = 0;
1432 return win;
c906108c
SS
1433}
1434
772cf8be
MK
1435/* Write the floating-pointer registers back to the process or LWP
1436 corresponding to PI. Return non-zero for success, zero for
1437 failure. */
c3f6f71d 1438
d3581e61 1439static int
fba45db2 1440proc_set_fpregs (procinfo *pi)
c906108c 1441{
c3f6f71d
JM
1442 gdb_fpregset_t *fpregs;
1443 int win;
1444
772cf8be
MK
1445 fpregs = proc_get_fpregs (pi);
1446 if (fpregs == NULL)
1447 return 0; /* proc_get_fpregs has already warned. */
c5aa993b 1448
772cf8be 1449 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c475f569 1450 return 0;
c3f6f71d 1451 else
c906108c 1452 {
c3f6f71d 1453 struct {
37de36c6 1454 procfs_ctl_t cmd;
c3f6f71d
JM
1455 /* Use char array to avoid alignment issues. */
1456 char fpregs[sizeof (gdb_fpregset_t)];
1457 } arg;
1458
772cf8be 1459 arg.cmd = PCSFPREG;
c3f6f71d
JM
1460 memcpy (&arg.fpregs, fpregs, sizeof (arg.fpregs));
1461 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1462 }
c3f6f71d 1463
772cf8be 1464 /* Policy: writing the registers invalidates our cache. */
c3f6f71d
JM
1465 pi->fpregs_valid = 0;
1466 return win;
c906108c
SS
1467}
1468
77382aee
PA
1469/* Send a signal to the proc or lwp with the semantics of "kill()".
1470 Returns non-zero for success, zero for failure. */
c906108c 1471
d3581e61 1472static int
fba45db2 1473proc_kill (procinfo *pi, int signo)
c3f6f71d
JM
1474{
1475 int win;
c906108c 1476
77382aee
PA
1477 /* We might conceivably apply this operation to an LWP, and the
1478 LWP's ctl file descriptor might not be open. */
c906108c 1479
c475f569
RO
1480 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
1481 return 0;
c3f6f71d
JM
1482 else
1483 {
37de36c6 1484 procfs_ctl_t cmd[2];
c906108c 1485
c3f6f71d
JM
1486 cmd[0] = PCKILL;
1487 cmd[1] = signo;
1488 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d 1489 }
c906108c 1490
c3f6f71d
JM
1491 return win;
1492}
c906108c 1493
77382aee
PA
1494/* Find the pid of the process that started this one. Returns the
1495 parent process pid, or zero. */
c906108c 1496
d3581e61 1497static int
fba45db2 1498proc_parent_pid (procinfo *pi)
c906108c 1499{
77382aee
PA
1500 /* We should never have to apply this operation to any procinfo
1501 except the one for the main process. If that ever changes for
1502 any reason, then take out the following clause and replace it
1503 with one that makes sure the ctl_fd is open. */
19958708 1504
c3f6f71d
JM
1505 if (pi->tid != 0)
1506 pi = find_procinfo_or_die (pi->pid, 0);
1507
1508 if (!pi->status_valid)
1509 if (!proc_get_status (pi))
1510 return 0;
c5aa993b 1511
c3f6f71d
JM
1512 return pi->prstatus.pr_ppid;
1513}
1514
9a043c1d
AC
1515/* Convert a target address (a.k.a. CORE_ADDR) into a host address
1516 (a.k.a void pointer)! */
1517
1518static void *
1519procfs_address_to_host_pointer (CORE_ADDR addr)
1520{
f5656ead 1521 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
9a043c1d
AC
1522 void *ptr;
1523
4e906f53 1524 gdb_assert (sizeof (ptr) == TYPE_LENGTH (ptr_type));
f5656ead 1525 gdbarch_address_to_pointer (target_gdbarch (), ptr_type,
0b62613e 1526 (gdb_byte *) &ptr, addr);
9a043c1d
AC
1527 return ptr;
1528}
1529
a0911fd0 1530static int
fba45db2 1531proc_set_watchpoint (procinfo *pi, CORE_ADDR addr, int len, int wflags)
c3f6f71d 1532{
c3f6f71d 1533 struct {
37de36c6 1534 procfs_ctl_t cmd;
c3f6f71d
JM
1535 char watch[sizeof (prwatch_t)];
1536 } arg;
73930d4d 1537 prwatch_t pwatch;
c3f6f71d 1538
9a043c1d
AC
1539 /* NOTE: cagney/2003-02-01: Even more horrible hack. Need to
1540 convert a target address into something that can be stored in a
1541 native data structure. */
73930d4d 1542 pwatch.pr_vaddr = (uintptr_t) procfs_address_to_host_pointer (addr);
73930d4d
KH
1543 pwatch.pr_size = len;
1544 pwatch.pr_wflags = wflags;
c3f6f71d 1545 arg.cmd = PCWATCH;
73930d4d 1546 memcpy (arg.watch, &pwatch, sizeof (prwatch_t));
c3f6f71d 1547 return (write (pi->ctl_fd, &arg, sizeof (arg)) == sizeof (arg));
c906108c
SS
1548}
1549
c3f6f71d 1550/* =============== END, non-thread part of /proc "MODULE" =============== */
c906108c 1551
c3f6f71d 1552/* =================== Thread "MODULE" =================== */
c906108c 1553
44122162 1554/* Returns the number of threads for the process. */
c906108c 1555
d3581e61 1556static int
fba45db2 1557proc_get_nthreads (procinfo *pi)
c906108c 1558{
c3f6f71d
JM
1559 if (!pi->status_valid)
1560 if (!proc_get_status (pi))
1561 return 0;
c5aa993b 1562
44122162
RO
1563 /* Only works for the process procinfo, because the LWP procinfos do not
1564 get prstatus filled in. */
0df8b418 1565 if (pi->tid != 0) /* Find the parent process procinfo. */
c3f6f71d 1566 pi = find_procinfo_or_die (pi->pid, 0);
c3f6f71d 1567 return pi->prstatus.pr_nlwp;
c906108c
SS
1568}
1569
196535a6 1570/* Return the ID of the thread that had an event of interest.
77382aee
PA
1571 (ie. the one that hit a breakpoint or other traced event). All
1572 other things being equal, this should be the ID of a thread that is
1573 currently executing. */
c3f6f71d 1574
d3581e61 1575static int
fba45db2 1576proc_get_current_thread (procinfo *pi)
c3f6f71d 1577{
77382aee
PA
1578 /* Note: this should be applied to the root procinfo for the
1579 process, not to the procinfo for an LWP. If applied to the
1580 procinfo for an LWP, it will simply return that LWP's ID. In
1581 that case, find the parent process procinfo. */
19958708 1582
c3f6f71d
JM
1583 if (pi->tid != 0)
1584 pi = find_procinfo_or_die (pi->pid, 0);
1585
1586 if (!pi->status_valid)
1587 if (!proc_get_status (pi))
1588 return 0;
1589
c3f6f71d 1590 return pi->prstatus.pr_lwp.pr_lwpid;
c3f6f71d
JM
1591}
1592
77382aee 1593/* Discover the IDs of all the threads within the process, and create
196535a6 1594 a procinfo for each of them (chained to the parent). Returns
77382aee 1595 non-zero for success, zero for failure. */
c906108c 1596
a0911fd0 1597static int
fba45db2 1598proc_delete_dead_threads (procinfo *parent, procinfo *thread, void *ignore)
c3f6f71d
JM
1599{
1600 if (thread && parent) /* sanity */
c906108c 1601 {
c3f6f71d
JM
1602 thread->status_valid = 0;
1603 if (!proc_get_status (thread))
1604 destroy_one_procinfo (&parent->thread_list, thread);
1605 }
1606 return 0; /* keep iterating */
1607}
c5aa993b 1608
d3581e61 1609static int
fba45db2 1610proc_update_threads (procinfo *pi)
c3f6f71d
JM
1611{
1612 char pathname[MAX_PROC_NAME_SIZE + 16];
1613 struct dirent *direntry;
c3f6f71d 1614 procinfo *thread;
f0b3976b 1615 gdb_dir_up dirp;
c3f6f71d
JM
1616 int lwpid;
1617
77382aee
PA
1618 /* We should never have to apply this operation to any procinfo
1619 except the one for the main process. If that ever changes for
1620 any reason, then take out the following clause and replace it
1621 with one that makes sure the ctl_fd is open. */
19958708 1622
c3f6f71d
JM
1623 if (pi->tid != 0)
1624 pi = find_procinfo_or_die (pi->pid, 0);
1625
1626 proc_iterate_over_threads (pi, proc_delete_dead_threads, NULL);
1627
05b4bd79
PA
1628 /* Note: this brute-force method was originally devised for Unixware
1629 (support removed since), and will also work on Solaris 2.6 and
1630 2.7. The original comment mentioned the existence of a much
1631 simpler and more elegant way to do this on Solaris, but didn't
1632 point out what that was. */
c3f6f71d
JM
1633
1634 strcpy (pathname, pi->pathname);
1635 strcat (pathname, "/lwp");
f0b3976b
TT
1636 dirp.reset (opendir (pathname));
1637 if (dirp == NULL)
c3f6f71d
JM
1638 proc_error (pi, "update_threads, opendir", __LINE__);
1639
f0b3976b 1640 while ((direntry = readdir (dirp.get ())) != NULL)
c3f6f71d
JM
1641 if (direntry->d_name[0] != '.') /* skip '.' and '..' */
1642 {
1643 lwpid = atoi (&direntry->d_name[0]);
c475f569
RO
1644 thread = create_procinfo (pi->pid, lwpid);
1645 if (thread == NULL)
c3f6f71d
JM
1646 proc_error (pi, "update_threads, create_procinfo", __LINE__);
1647 }
1648 pi->threads_valid = 1;
c3f6f71d
JM
1649 return 1;
1650}
c906108c 1651
77382aee
PA
1652/* Given a pointer to a function, call that function once for each lwp
1653 in the procinfo list, until the function returns non-zero, in which
1654 event return the value returned by the function.
1655
1656 Note: this function does NOT call update_threads. If you want to
1657 discover new threads first, you must call that function explicitly.
1658 This function just makes a quick pass over the currently-known
1659 procinfos.
1660
1661 PI is the parent process procinfo. FUNC is the per-thread
1662 function. PTR is an opaque parameter for function. Returns the
1663 first non-zero return value from the callee, or zero. */
c3f6f71d 1664
d3581e61 1665static int
d0849a9a
KB
1666proc_iterate_over_threads (procinfo *pi,
1667 int (*func) (procinfo *, procinfo *, void *),
1668 void *ptr)
c906108c 1669{
c3f6f71d
JM
1670 procinfo *thread, *next;
1671 int retval = 0;
c906108c 1672
77382aee
PA
1673 /* We should never have to apply this operation to any procinfo
1674 except the one for the main process. If that ever changes for
1675 any reason, then take out the following clause and replace it
1676 with one that makes sure the ctl_fd is open. */
19958708 1677
c3f6f71d
JM
1678 if (pi->tid != 0)
1679 pi = find_procinfo_or_die (pi->pid, 0);
1680
1681 for (thread = pi->thread_list; thread != NULL; thread = next)
c906108c 1682 {
0df8b418 1683 next = thread->next; /* In case thread is destroyed. */
c475f569
RO
1684 retval = (*func) (pi, thread, ptr);
1685 if (retval != 0)
c3f6f71d 1686 break;
c906108c 1687 }
c3f6f71d
JM
1688
1689 return retval;
c906108c
SS
1690}
1691
c3f6f71d
JM
1692/* =================== END, Thread "MODULE" =================== */
1693
1694/* =================== END, /proc "MODULE" =================== */
1695
1696/* =================== GDB "MODULE" =================== */
1697
77382aee
PA
1698/* Here are all of the gdb target vector functions and their
1699 friends. */
c3f6f71d 1700
7fb43e53 1701static void do_attach (ptid_t ptid);
6bd6f3b6 1702static void do_detach ();
9185ddce 1703static void proc_trace_syscalls_1 (procinfo *pi, int syscallnum,
77382aee 1704 int entry_or_exit, int mode, int from_tty);
9185ddce 1705
77382aee
PA
1706/* Sets up the inferior to be debugged. Registers to trace signals,
1707 hardware faults, and syscalls. Note: does not set RLC flag: caller
1708 may want to customize that. Returns zero for success (note!
1709 unlike most functions in this module); on failure, returns the LINE
1710 NUMBER where it failed! */
c3f6f71d
JM
1711
1712static int
fba45db2 1713procfs_debug_inferior (procinfo *pi)
c906108c 1714{
c3f6f71d 1715 fltset_t traced_faults;
44122162 1716 sigset_t traced_signals;
37de36c6
KB
1717 sysset_t *traced_syscall_entries;
1718 sysset_t *traced_syscall_exits;
1719 int status;
c906108c 1720
0df8b418
MS
1721 /* Register to trace hardware faults in the child. */
1722 prfillset (&traced_faults); /* trace all faults... */
44122162 1723 prdelset (&traced_faults, FLTPAGE); /* except page fault. */
c3f6f71d
JM
1724 if (!proc_set_traced_faults (pi, &traced_faults))
1725 return __LINE__;
c906108c 1726
2455069d
UW
1727 /* Initially, register to trace all signals in the child. */
1728 prfillset (&traced_signals);
1729 if (!proc_set_traced_signals (pi, &traced_signals))
c3f6f71d
JM
1730 return __LINE__;
1731
37de36c6 1732
c3f6f71d 1733 /* Register to trace the 'exit' system call (on entry). */
c475f569 1734 traced_syscall_entries = XNEW (sysset_t);
44122162
RO
1735 premptyset (traced_syscall_entries);
1736 praddset (traced_syscall_entries, SYS_exit);
1737 praddset (traced_syscall_entries, SYS_lwp_exit);
c906108c 1738
37de36c6
KB
1739 status = proc_set_traced_sysentry (pi, traced_syscall_entries);
1740 xfree (traced_syscall_entries);
1741 if (!status)
c3f6f71d
JM
1742 return __LINE__;
1743
44122162 1744 /* Method for tracing exec syscalls. */
c475f569 1745 traced_syscall_exits = XNEW (sysset_t);
44122162 1746 premptyset (traced_syscall_exits);
44122162
RO
1747 praddset (traced_syscall_exits, SYS_execve);
1748 praddset (traced_syscall_exits, SYS_lwp_create);
1749 praddset (traced_syscall_exits, SYS_lwp_exit);
c906108c 1750
37de36c6
KB
1751 status = proc_set_traced_sysexit (pi, traced_syscall_exits);
1752 xfree (traced_syscall_exits);
1753 if (!status)
c3f6f71d
JM
1754 return __LINE__;
1755
c3f6f71d 1756 return 0;
c906108c
SS
1757}
1758
f6ac5f3d
PA
1759void
1760procfs_target::attach (const char *args, int from_tty)
c906108c 1761{
c3f6f71d
JM
1762 int pid;
1763
74164c56 1764 pid = parse_pid_to_attach (args);
c3f6f71d 1765
c3f6f71d 1766 if (pid == getpid ())
8a3fe4f8 1767 error (_("Attaching GDB to itself is not a good idea..."));
c906108c 1768
de146e19 1769 /* Push the target if needed, ensure it gets un-pushed it if attach fails. */
25b48839 1770 inferior *inf = current_inferior ();
de146e19 1771 target_unpush_up unpusher;
c8fbd44a 1772 if (!inf->target_is_pushed (this))
de146e19 1773 {
25b48839 1774 inf->push_target (this);
de146e19
SM
1775 unpusher.reset (this);
1776 }
1777
bc521517 1778 target_announce_attach (from_tty, pid);
de146e19 1779
7fb43e53 1780 do_attach (ptid_t (pid));
de146e19
SM
1781
1782 /* Everything went fine, keep the target pushed. */
1783 unpusher.release ();
c3f6f71d
JM
1784}
1785
f6ac5f3d
PA
1786void
1787procfs_target::detach (inferior *inf, int from_tty)
c3f6f71d 1788{
41e321a8 1789 target_announce_detach (from_tty);
19958708 1790
6bd6f3b6 1791 do_detach ();
cc377e6b 1792
7fb43e53 1793 switch_to_no_thread ();
b7a08269 1794 detach_inferior (inf);
f6ac5f3d 1795 maybe_unpush_target ();
c906108c
SS
1796}
1797
7fb43e53 1798static void
39f77062 1799do_attach (ptid_t ptid)
c906108c 1800{
c3f6f71d 1801 procinfo *pi;
181e7f93 1802 struct inferior *inf;
c3f6f71d 1803 int fail;
2689673f 1804 int lwpid;
c3f6f71d 1805
c475f569
RO
1806 pi = create_procinfo (ptid.pid (), 0);
1807 if (pi == NULL)
8a3fe4f8 1808 perror (_("procfs: out of memory in 'attach'"));
c3f6f71d
JM
1809
1810 if (!open_procinfo_files (pi, FD_CTL))
1811 {
6cb06a8c 1812 gdb_printf (gdb_stderr, "procfs:%d -- ", __LINE__);
c475f569
RO
1813 xsnprintf (errmsg, sizeof (errmsg),
1814 "do_attach: couldn't open /proc file for process %d",
1815 ptid.pid ());
c3f6f71d
JM
1816 dead_procinfo (pi, errmsg, NOKILL);
1817 }
c906108c 1818
c3f6f71d
JM
1819 /* Stop the process (if it isn't already stopped). */
1820 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
c906108c 1821 {
c3f6f71d
JM
1822 pi->was_stopped = 1;
1823 proc_prettyprint_why (proc_why (pi), proc_what (pi), 1);
c906108c
SS
1824 }
1825 else
1826 {
c3f6f71d
JM
1827 pi->was_stopped = 0;
1828 /* Set the process to run again when we close it. */
1829 if (!proc_set_run_on_last_close (pi))
1830 dead_procinfo (pi, "do_attach: couldn't set RLC.", NOKILL);
1831
0df8b418 1832 /* Now stop the process. */
c3f6f71d
JM
1833 if (!proc_stop_process (pi))
1834 dead_procinfo (pi, "do_attach: couldn't stop the process.", NOKILL);
1835 pi->ignore_next_sigstop = 1;
c906108c 1836 }
c3f6f71d
JM
1837 /* Save some of the /proc state to be restored if we detach. */
1838 if (!proc_get_traced_faults (pi, &pi->saved_fltset))
1839 dead_procinfo (pi, "do_attach: couldn't save traced faults.", NOKILL);
1840 if (!proc_get_traced_signals (pi, &pi->saved_sigset))
1841 dead_procinfo (pi, "do_attach: couldn't save traced signals.", NOKILL);
37de36c6 1842 if (!proc_get_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d
JM
1843 dead_procinfo (pi, "do_attach: couldn't save traced syscall entries.",
1844 NOKILL);
37de36c6 1845 if (!proc_get_traced_sysexit (pi, pi->saved_exitset))
19958708 1846 dead_procinfo (pi, "do_attach: couldn't save traced syscall exits.",
c3f6f71d
JM
1847 NOKILL);
1848 if (!proc_get_held_signals (pi, &pi->saved_sighold))
1849 dead_procinfo (pi, "do_attach: couldn't save held signals.", NOKILL);
1850
c475f569
RO
1851 fail = procfs_debug_inferior (pi);
1852 if (fail != 0)
c3f6f71d
JM
1853 dead_procinfo (pi, "do_attach: failed in procfs_debug_inferior", NOKILL);
1854
6c95b8df
PA
1855 inf = current_inferior ();
1856 inferior_appeared (inf, pi->pid);
c3f6f71d 1857 /* Let GDB know that the inferior was attached. */
181e7f93 1858 inf->attach_flag = 1;
2689673f
PA
1859
1860 /* Create a procinfo for the current lwp. */
1861 lwpid = proc_get_current_thread (pi);
1862 create_procinfo (pi->pid, lwpid);
1863
1864 /* Add it to gdb's thread list. */
fd79271b 1865 ptid = ptid_t (pi->pid, lwpid, 0);
7fb43e53
PA
1866 thread_info *thr = add_thread (&the_procfs_target, ptid);
1867 switch_to_thread (thr);
c906108c
SS
1868}
1869
1870static void
6bd6f3b6 1871do_detach ()
c906108c 1872{
c3f6f71d 1873 procinfo *pi;
c906108c 1874
0df8b418 1875 /* Find procinfo for the main process. */
e99b03dc 1876 pi = find_procinfo_or_die (inferior_ptid.pid (),
dfd4cc63 1877 0); /* FIXME: threads */
c5aa993b 1878
c3f6f71d
JM
1879 if (!proc_set_traced_signals (pi, &pi->saved_sigset))
1880 proc_warn (pi, "do_detach, set_traced_signal", __LINE__);
c906108c 1881
c3f6f71d
JM
1882 if (!proc_set_traced_faults (pi, &pi->saved_fltset))
1883 proc_warn (pi, "do_detach, set_traced_faults", __LINE__);
1884
37de36c6 1885 if (!proc_set_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d
JM
1886 proc_warn (pi, "do_detach, set_traced_sysentry", __LINE__);
1887
37de36c6 1888 if (!proc_set_traced_sysexit (pi, pi->saved_exitset))
c3f6f71d
JM
1889 proc_warn (pi, "do_detach, set_traced_sysexit", __LINE__);
1890
1891 if (!proc_set_held_signals (pi, &pi->saved_sighold))
1892 proc_warn (pi, "do_detach, set_held_signals", __LINE__);
1893
6bd6f3b6
SM
1894 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
1895 if (!(pi->was_stopped)
1896 || query (_("Was stopped when attached, make it runnable again? ")))
c3f6f71d
JM
1897 {
1898 /* Clear any pending signal. */
1899 if (!proc_clear_current_fault (pi))
1900 proc_warn (pi, "do_detach, clear_current_fault", __LINE__);
1901
6bd6f3b6 1902 if (!proc_clear_current_signal (pi))
1a303dec
MS
1903 proc_warn (pi, "do_detach, clear_current_signal", __LINE__);
1904
c3f6f71d
JM
1905 if (!proc_set_run_on_last_close (pi))
1906 proc_warn (pi, "do_detach, set_rlc", __LINE__);
1907 }
1908
c3f6f71d 1909 destroy_procinfo (pi);
c906108c
SS
1910}
1911
772cf8be
MK
1912/* Fetch register REGNUM from the inferior. If REGNUM is -1, do this
1913 for all registers.
1914
772cf8be
MK
1915 NOTE: Since the /proc interface cannot give us individual
1916 registers, we pay no attention to REGNUM, and just fetch them all.
1917 This results in the possibility that we will do unnecessarily many
1918 fetches, since we may be called repeatedly for individual
1919 registers. So we cache the results, and mark the cache invalid
1920 when the process is resumed. */
c3f6f71d 1921
f6ac5f3d
PA
1922void
1923procfs_target::fetch_registers (struct regcache *regcache, int regnum)
c906108c 1924{
772cf8be
MK
1925 gdb_gregset_t *gregs;
1926 procinfo *pi;
222312d3 1927 ptid_t ptid = regcache->ptid ();
e99b03dc 1928 int pid = ptid.pid ();
e38504b3 1929 int tid = ptid.lwp ();
ac7936df 1930 struct gdbarch *gdbarch = regcache->arch ();
c3f6f71d 1931
2689673f 1932 pi = find_procinfo_or_die (pid, tid);
c3f6f71d
JM
1933
1934 if (pi == NULL)
8a3fe4f8 1935 error (_("procfs: fetch_registers failed to find procinfo for %s"),
a068643d 1936 target_pid_to_str (ptid).c_str ());
c3f6f71d 1937
772cf8be
MK
1938 gregs = proc_get_gregs (pi);
1939 if (gregs == NULL)
c3f6f71d
JM
1940 proc_error (pi, "fetch_registers, get_gregs", __LINE__);
1941
56be3814 1942 supply_gregset (regcache, (const gdb_gregset_t *) gregs);
c3f6f71d 1943
40a6adc1 1944 if (gdbarch_fp0_regnum (gdbarch) >= 0) /* Do we have an FPU? */
60054393 1945 {
772cf8be
MK
1946 gdb_fpregset_t *fpregs;
1947
40a6adc1
MD
1948 if ((regnum >= 0 && regnum < gdbarch_fp0_regnum (gdbarch))
1949 || regnum == gdbarch_pc_regnum (gdbarch)
1950 || regnum == gdbarch_sp_regnum (gdbarch))
772cf8be 1951 return; /* Not a floating point register. */
c5aa993b 1952
772cf8be
MK
1953 fpregs = proc_get_fpregs (pi);
1954 if (fpregs == NULL)
60054393 1955 proc_error (pi, "fetch_registers, get_fpregs", __LINE__);
c906108c 1956
56be3814 1957 supply_fpregset (regcache, (const gdb_fpregset_t *) fpregs);
60054393 1958 }
c906108c
SS
1959}
1960
772cf8be
MK
1961/* Store register REGNUM back into the inferior. If REGNUM is -1, do
1962 this for all registers.
1963
1964 NOTE: Since the /proc interface will not read individual registers,
1965 we will cache these requests until the process is resumed, and only
1966 then write them back to the inferior process.
77382aee 1967
772cf8be
MK
1968 FIXME: is that a really bad idea? Have to think about cases where
1969 writing one register might affect the value of others, etc. */
c906108c 1970
f6ac5f3d
PA
1971void
1972procfs_target::store_registers (struct regcache *regcache, int regnum)
c3f6f71d 1973{
772cf8be
MK
1974 gdb_gregset_t *gregs;
1975 procinfo *pi;
222312d3 1976 ptid_t ptid = regcache->ptid ();
e99b03dc 1977 int pid = ptid.pid ();
e38504b3 1978 int tid = ptid.lwp ();
ac7936df 1979 struct gdbarch *gdbarch = regcache->arch ();
c3f6f71d 1980
2689673f 1981 pi = find_procinfo_or_die (pid, tid);
c3f6f71d
JM
1982
1983 if (pi == NULL)
8a3fe4f8 1984 error (_("procfs: store_registers: failed to find procinfo for %s"),
a068643d 1985 target_pid_to_str (ptid).c_str ());
c906108c 1986
772cf8be
MK
1987 gregs = proc_get_gregs (pi);
1988 if (gregs == NULL)
c3f6f71d 1989 proc_error (pi, "store_registers, get_gregs", __LINE__);
c906108c 1990
56be3814 1991 fill_gregset (regcache, gregs, regnum);
c3f6f71d
JM
1992 if (!proc_set_gregs (pi))
1993 proc_error (pi, "store_registers, set_gregs", __LINE__);
c906108c 1994
40a6adc1 1995 if (gdbarch_fp0_regnum (gdbarch) >= 0) /* Do we have an FPU? */
60054393 1996 {
772cf8be
MK
1997 gdb_fpregset_t *fpregs;
1998
40a6adc1
MD
1999 if ((regnum >= 0 && regnum < gdbarch_fp0_regnum (gdbarch))
2000 || regnum == gdbarch_pc_regnum (gdbarch)
2001 || regnum == gdbarch_sp_regnum (gdbarch))
772cf8be 2002 return; /* Not a floating point register. */
60054393 2003
772cf8be
MK
2004 fpregs = proc_get_fpregs (pi);
2005 if (fpregs == NULL)
60054393
MS
2006 proc_error (pi, "store_registers, get_fpregs", __LINE__);
2007
56be3814 2008 fill_fpregset (regcache, fpregs, regnum);
60054393
MS
2009 if (!proc_set_fpregs (pi))
2010 proc_error (pi, "store_registers, set_fpregs", __LINE__);
2011 }
c3f6f71d 2012}
c906108c 2013
77382aee
PA
2014/* Retrieve the next stop event from the child process. If child has
2015 not stopped yet, wait for it to stop. Translate /proc eventcodes
2016 (or possibly wait eventcodes) into gdb internal event codes.
2017 Returns the id of process (and possibly thread) that incurred the
2018 event. Event codes are returned through a pointer parameter. */
c906108c 2019
f6ac5f3d
PA
2020ptid_t
2021procfs_target::wait (ptid_t ptid, struct target_waitstatus *status,
b60cea74 2022 target_wait_flags options)
c906108c 2023{
0df8b418 2024 /* First cut: loosely based on original version 2.1. */
c3f6f71d 2025 procinfo *pi;
39f77062
KB
2026 int wstat;
2027 int temp_tid;
2028 ptid_t retval, temp_ptid;
c3f6f71d
JM
2029 int why, what, flags;
2030 int retry = 0;
c906108c 2031
c3f6f71d 2032wait_again:
c906108c 2033
c3f6f71d
JM
2034 retry++;
2035 wstat = 0;
f2907e49 2036 retval = ptid_t (-1);
c906108c 2037
0df8b418 2038 /* Find procinfo for main process. */
f8098322
PA
2039
2040 /* procfs_target currently only supports one inferior. */
2041 inferior *inf = current_inferior ();
2042
2043 pi = find_procinfo_or_die (inf->pid, 0);
c3f6f71d 2044 if (pi)
c906108c 2045 {
0df8b418 2046 /* We must assume that the status is stale now... */
c3f6f71d
JM
2047 pi->status_valid = 0;
2048 pi->gregs_valid = 0;
2049 pi->fpregs_valid = 0;
2050
0df8b418 2051#if 0 /* just try this out... */
c3f6f71d
JM
2052 flags = proc_flags (pi);
2053 why = proc_why (pi);
2054 if ((flags & PR_STOPPED) && (why == PR_REQUESTED))
0df8b418 2055 pi->status_valid = 0; /* re-read again, IMMEDIATELY... */
c3f6f71d
JM
2056#endif
2057 /* If child is not stopped, wait for it to stop. */
c475f569
RO
2058 if (!(proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
2059 && !proc_wait_for_stop (pi))
c906108c 2060 {
0df8b418 2061 /* wait_for_stop failed: has the child terminated? */
c3f6f71d 2062 if (errno == ENOENT)
c906108c 2063 {
39f77062
KB
2064 int wait_retval;
2065
0df8b418 2066 /* /proc file not found; presumably child has terminated. */
f6ac5f3d 2067 wait_retval = ::wait (&wstat); /* "wait" for the child's exit. */
c3f6f71d 2068
dfd4cc63 2069 /* Wrong child? */
f8098322 2070 if (wait_retval != inf->pid)
3e43a32a
MS
2071 error (_("procfs: couldn't stop "
2072 "process %d: wait returned %d."),
f8098322 2073 inf->pid, wait_retval);
c3f6f71d 2074 /* FIXME: might I not just use waitpid?
0df8b418 2075 Or try find_procinfo to see if I know about this child? */
f2907e49 2076 retval = ptid_t (wait_retval);
c906108c 2077 }
d1566ff5
FN
2078 else if (errno == EINTR)
2079 goto wait_again;
c3f6f71d 2080 else
c906108c 2081 {
0df8b418 2082 /* Unknown error from wait_for_stop. */
c3f6f71d 2083 proc_error (pi, "target_wait (wait_for_stop)", __LINE__);
c906108c 2084 }
c3f6f71d
JM
2085 }
2086 else
2087 {
2088 /* This long block is reached if either:
2089 a) the child was already stopped, or
2090 b) we successfully waited for the child with wait_for_stop.
2091 This block will analyze the /proc status, and translate it
2092 into a waitstatus for GDB.
2093
2094 If we actually had to call wait because the /proc file
19958708 2095 is gone (child terminated), then we skip this block,
c3f6f71d
JM
2096 because we already have a waitstatus. */
2097
2098 flags = proc_flags (pi);
2099 why = proc_why (pi);
2100 what = proc_what (pi);
2101
c3f6f71d 2102 if (flags & (PR_STOPPED | PR_ISTOP))
c906108c 2103 {
c3f6f71d
JM
2104 /* If it's running async (for single_thread control),
2105 set it back to normal again. */
2106 if (flags & PR_ASYNC)
2107 if (!proc_unset_async (pi))
2108 proc_error (pi, "target_wait, unset_async", __LINE__);
c3f6f71d
JM
2109
2110 if (info_verbose)
2111 proc_prettyprint_why (why, what, 1);
2112
2113 /* The 'pid' we will return to GDB is composed of
2114 the process ID plus the lwp ID. */
fd79271b 2115 retval = ptid_t (pi->pid, proc_get_current_thread (pi), 0);
c3f6f71d
JM
2116
2117 switch (why) {
2118 case PR_SIGNALLED:
2119 wstat = (what << 8) | 0177;
2120 break;
2121 case PR_SYSENTRY:
196535a6 2122 if (what == SYS_lwp_exit)
c3f6f71d 2123 {
17faa917 2124 if (print_thread_events)
6cb06a8c
TT
2125 gdb_printf (_("[%s exited]\n"),
2126 target_pid_to_str (retval).c_str ());
5b6d1e4f 2127 delete_thread (find_thread_ptid (this, retval));
f8098322
PA
2128 target_continue_no_signal (ptid);
2129 goto wait_again;
37de36c6 2130 }
196535a6 2131 else if (what == SYS_exit)
37de36c6 2132 {
0df8b418 2133 /* Handle SYS_exit call only. */
37de36c6 2134 /* Stopped at entry to SYS_exit.
19958708 2135 Make it runnable, resume it, then use
37de36c6 2136 the wait system call to get its exit code.
19958708 2137 Proc_run_process always clears the current
37de36c6
KB
2138 fault and signal.
2139 Then return its exit status. */
2140 pi->status_valid = 0;
2141 wstat = 0;
19958708 2142 /* FIXME: what we should do is return
37de36c6
KB
2143 TARGET_WAITKIND_SPURIOUS. */
2144 if (!proc_run_process (pi, 0, 0))
2145 proc_error (pi, "target_wait, run_process", __LINE__);
181e7f93 2146
181e7f93 2147 if (inf->attach_flag)
c3f6f71d 2148 {
19958708 2149 /* Don't call wait: simulate waiting for exit,
37de36c6
KB
2150 return a "success" exit code. Bogus: what if
2151 it returns something else? */
2152 wstat = 0;
f8098322 2153 retval = ptid_t (inf->pid); /* ? ? ? */
37de36c6
KB
2154 }
2155 else
2156 {
f6ac5f3d 2157 int temp = ::wait (&wstat);
37de36c6
KB
2158
2159 /* FIXME: shouldn't I make sure I get the right
2160 event from the right process? If (for
2161 instance) I have killed an earlier inferior
2162 process but failed to clean up after it
2163 somehow, I could get its termination event
2164 here. */
2165
0df8b418
MS
2166 /* If wait returns -1, that's what we return
2167 to GDB. */
37de36c6 2168 if (temp < 0)
f2907e49 2169 retval = ptid_t (temp);
c3f6f71d 2170 }
c3f6f71d 2171 }
37de36c6
KB
2172 else
2173 {
6cb06a8c 2174 gdb_printf (_("procfs: trapped on entry to "));
37de36c6 2175 proc_prettyprint_syscall (proc_what (pi), 0);
6cb06a8c 2176 gdb_printf ("\n");
44122162
RO
2177
2178 long i, nsysargs, *sysargs;
2179
c475f569
RO
2180 nsysargs = proc_nsysarg (pi);
2181 sysargs = proc_sysargs (pi);
2182
2183 if (nsysargs > 0 && sysargs != NULL)
44122162 2184 {
6cb06a8c
TT
2185 gdb_printf (_("%ld syscall arguments:\n"),
2186 nsysargs);
44122162 2187 for (i = 0; i < nsysargs; i++)
6cb06a8c
TT
2188 gdb_printf ("#%ld: 0x%08lx\n",
2189 i, sysargs[i]);
44122162
RO
2190 }
2191
f8098322
PA
2192 /* How to keep going without returning to wfi: */
2193 target_continue_no_signal (ptid);
2194 goto wait_again;
37de36c6
KB
2195 }
2196 break;
2197 case PR_SYSEXIT:
196535a6 2198 if (what == SYS_execve)
c3f6f71d 2199 {
37de36c6
KB
2200 /* Hopefully this is our own "fork-child" execing
2201 the real child. Hoax this event into a trap, and
2202 GDB will see the child about to execute its start
0df8b418 2203 address. */
37de36c6
KB
2204 wstat = (SIGTRAP << 8) | 0177;
2205 }
196535a6 2206 else if (what == SYS_lwp_create)
37de36c6 2207 {
77382aee
PA
2208 /* This syscall is somewhat like fork/exec. We
2209 will get the event twice: once for the parent
2210 LWP, and once for the child. We should already
2211 know about the parent LWP, but the child will
2212 be new to us. So, whenever we get this event,
2213 if it represents a new thread, simply add the
2214 thread to the list. */
c3f6f71d 2215
37de36c6 2216 /* If not in procinfo list, add it. */
39f77062
KB
2217 temp_tid = proc_get_current_thread (pi);
2218 if (!find_procinfo (pi->pid, temp_tid))
2219 create_procinfo (pi->pid, temp_tid);
37de36c6 2220
fd79271b 2221 temp_ptid = ptid_t (pi->pid, temp_tid, 0);
37de36c6 2222 /* If not in GDB's thread list, add it. */
5b6d1e4f
PA
2223 if (!in_thread_list (this, temp_ptid))
2224 add_thread (this, temp_ptid);
93815fbf 2225
f8098322
PA
2226 target_continue_no_signal (ptid);
2227 goto wait_again;
37de36c6 2228 }
196535a6 2229 else if (what == SYS_lwp_exit)
37de36c6 2230 {
17faa917 2231 if (print_thread_events)
6cb06a8c
TT
2232 gdb_printf (_("[%s exited]\n"),
2233 target_pid_to_str (retval).c_str ());
5b6d1e4f 2234 delete_thread (find_thread_ptid (this, retval));
183be222 2235 status->set_spurious ();
37de36c6 2236 return retval;
c3f6f71d 2237 }
37de36c6
KB
2238 else
2239 {
6cb06a8c 2240 gdb_printf (_("procfs: trapped on exit from "));
37de36c6 2241 proc_prettyprint_syscall (proc_what (pi), 0);
6cb06a8c 2242 gdb_printf ("\n");
44122162
RO
2243
2244 long i, nsysargs, *sysargs;
2245
c475f569
RO
2246 nsysargs = proc_nsysarg (pi);
2247 sysargs = proc_sysargs (pi);
2248
2249 if (nsysargs > 0 && sysargs != NULL)
44122162 2250 {
6cb06a8c
TT
2251 gdb_printf (_("%ld syscall arguments:\n"),
2252 nsysargs);
44122162 2253 for (i = 0; i < nsysargs; i++)
6cb06a8c
TT
2254 gdb_printf ("#%ld: 0x%08lx\n",
2255 i, sysargs[i]);
44122162
RO
2256 }
2257
f8098322
PA
2258 target_continue_no_signal (ptid);
2259 goto wait_again;
37de36c6 2260 }
c3f6f71d
JM
2261 break;
2262 case PR_REQUESTED:
2263#if 0 /* FIXME */
2264 wstat = (SIGSTOP << 8) | 0177;
2265 break;
2266#else
2267 if (retry < 5)
2268 {
6cb06a8c 2269 gdb_printf (_("Retry #%d:\n"), retry);
c3f6f71d
JM
2270 pi->status_valid = 0;
2271 goto wait_again;
2272 }
2273 else
2274 {
2275 /* If not in procinfo list, add it. */
39f77062
KB
2276 temp_tid = proc_get_current_thread (pi);
2277 if (!find_procinfo (pi->pid, temp_tid))
2278 create_procinfo (pi->pid, temp_tid);
c3f6f71d
JM
2279
2280 /* If not in GDB's thread list, add it. */
fd79271b 2281 temp_ptid = ptid_t (pi->pid, temp_tid, 0);
5b6d1e4f
PA
2282 if (!in_thread_list (this, temp_ptid))
2283 add_thread (this, temp_ptid);
c3f6f71d 2284
183be222 2285 status->set_stopped (GDB_SIGNAL_0);
c3f6f71d
JM
2286 return retval;
2287 }
2288#endif
2289 case PR_JOBCONTROL:
2290 wstat = (what << 8) | 0177;
2291 break;
2292 case PR_FAULTED:
7a289707
RO
2293 {
2294 int signo = pi->prstatus.pr_lwp.pr_info.si_signo;
2295 if (signo != 0)
2296 wstat = (signo << 8) | 0177;
c3f6f71d 2297 }
7a289707 2298 break;
c3f6f71d 2299 default: /* switch (why) unmatched */
6cb06a8c
TT
2300 gdb_printf ("procfs:%d -- ", __LINE__);
2301 gdb_printf (_("child stopped for unknown reason:\n"));
c3f6f71d 2302 proc_prettyprint_why (why, what, 1);
8a3fe4f8 2303 error (_("... giving up..."));
c3f6f71d
JM
2304 break;
2305 }
77382aee
PA
2306 /* Got this far without error: If retval isn't in the
2307 threads database, add it. */
c475f569 2308 if (retval.pid () > 0
5b6d1e4f 2309 && !in_thread_list (this, retval))
c906108c 2310 {
77382aee
PA
2311 /* We have a new thread. We need to add it both to
2312 GDB's list and to our own. If we don't create a
2313 procinfo, resume may be unhappy later. */
5b6d1e4f 2314 add_thread (this, retval);
e99b03dc 2315 if (find_procinfo (retval.pid (),
e38504b3 2316 retval.lwp ()) == NULL)
e99b03dc 2317 create_procinfo (retval.pid (),
e38504b3 2318 retval.lwp ());
c906108c 2319 }
c906108c 2320 }
0df8b418 2321 else /* Flags do not indicate STOPPED. */
c906108c 2322 {
0df8b418 2323 /* surely this can't happen... */
6cb06a8c
TT
2324 gdb_printf ("procfs:%d -- process not stopped.\n",
2325 __LINE__);
c3f6f71d 2326 proc_prettyprint_flags (flags, 1);
8a3fe4f8 2327 error (_("procfs: ...giving up..."));
c906108c 2328 }
c906108c 2329 }
c906108c 2330
c3f6f71d 2331 if (status)
7509b829 2332 *status = host_status_to_waitstatus (wstat);
c906108c
SS
2333 }
2334
c3f6f71d
JM
2335 return retval;
2336}
c906108c 2337
4e73f23d
RM
2338/* Perform a partial transfer to/from the specified object. For
2339 memory transfers, fall back to the old memory xfer functions. */
2340
f6ac5f3d
PA
2341enum target_xfer_status
2342procfs_target::xfer_partial (enum target_object object,
2343 const char *annex, gdb_byte *readbuf,
2344 const gdb_byte *writebuf, ULONGEST offset,
2345 ULONGEST len, ULONGEST *xfered_len)
4e73f23d
RM
2346{
2347 switch (object)
2348 {
2349 case TARGET_OBJECT_MEMORY:
e96027e0 2350 return procfs_xfer_memory (readbuf, writebuf, offset, len, xfered_len);
4e73f23d 2351
4e73f23d 2352 case TARGET_OBJECT_AUXV:
f6ac5f3d 2353 return memory_xfer_auxv (this, object, annex, readbuf, writebuf,
9b409511 2354 offset, len, xfered_len);
4e73f23d
RM
2355
2356 default:
4360561f
TT
2357 return this->beneath ()->xfer_partial (object, annex,
2358 readbuf, writebuf, offset, len,
2359 xfered_len);
4e73f23d
RM
2360 }
2361}
2362
e96027e0
PA
2363/* Helper for procfs_xfer_partial that handles memory transfers.
2364 Arguments are like target_xfer_partial. */
4e73f23d 2365
e96027e0
PA
2366static enum target_xfer_status
2367procfs_xfer_memory (gdb_byte *readbuf, const gdb_byte *writebuf,
2368 ULONGEST memaddr, ULONGEST len, ULONGEST *xfered_len)
c3f6f71d
JM
2369{
2370 procinfo *pi;
e96027e0 2371 int nbytes;
c906108c 2372
0df8b418 2373 /* Find procinfo for main process. */
e99b03dc 2374 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c475f569 2375 if (pi->as_fd == 0 && open_procinfo_files (pi, FD_AS) == 0)
c906108c 2376 {
c3f6f71d 2377 proc_warn (pi, "xfer_memory, open_proc_files", __LINE__);
e96027e0 2378 return TARGET_XFER_E_IO;
c906108c 2379 }
c906108c 2380
e96027e0
PA
2381 if (lseek (pi->as_fd, (off_t) memaddr, SEEK_SET) != (off_t) memaddr)
2382 return TARGET_XFER_E_IO;
2383
2384 if (writebuf != NULL)
c906108c 2385 {
e96027e0
PA
2386 PROCFS_NOTE ("write memory:\n");
2387 nbytes = write (pi->as_fd, writebuf, len);
2388 }
2389 else
2390 {
2391 PROCFS_NOTE ("read memory:\n");
2392 nbytes = read (pi->as_fd, readbuf, len);
c906108c 2393 }
e96027e0
PA
2394 if (nbytes <= 0)
2395 return TARGET_XFER_E_IO;
2396 *xfered_len = nbytes;
2397 return TARGET_XFER_OK;
c906108c
SS
2398}
2399
77382aee
PA
2400/* Called by target_resume before making child runnable. Mark cached
2401 registers and status's invalid. If there are "dirty" caches that
2402 need to be written back to the child process, do that.
c906108c 2403
77382aee
PA
2404 File descriptors are also cached. As they are a limited resource,
2405 we cannot hold onto them indefinitely. However, as they are
2406 expensive to open, we don't want to throw them away
85102364 2407 indiscriminately either. As a compromise, we will keep the file
77382aee
PA
2408 descriptors for the parent process, but discard any file
2409 descriptors we may have accumulated for the threads.
2410
2411 As this function is called by iterate_over_threads, it always
2412 returns zero (so that iterate_over_threads will keep
2413 iterating). */
c3f6f71d
JM
2414
2415static int
fba45db2 2416invalidate_cache (procinfo *parent, procinfo *pi, void *ptr)
c906108c 2417{
77382aee
PA
2418 /* About to run the child; invalidate caches and do any other
2419 cleanup. */
c906108c 2420
c3f6f71d 2421 if (parent != NULL)
c906108c 2422 {
c3f6f71d 2423 /* The presence of a parent indicates that this is an LWP.
19958708 2424 Close any file descriptors that it might have open.
c3f6f71d
JM
2425 We don't do this to the master (parent) procinfo. */
2426
2427 close_procinfo_files (pi);
c906108c 2428 }
c3f6f71d
JM
2429 pi->gregs_valid = 0;
2430 pi->fpregs_valid = 0;
c3f6f71d
JM
2431 pi->status_valid = 0;
2432 pi->threads_valid = 0;
c906108c 2433
c3f6f71d 2434 return 0;
c906108c
SS
2435}
2436
77382aee
PA
2437/* Make the child process runnable. Normally we will then call
2438 procfs_wait and wait for it to stop again (unless gdb is async).
2439
2440 If STEP is true, then arrange for the child to stop again after
2441 executing a single instruction. If SIGNO is zero, then cancel any
2442 pending signal; if non-zero, then arrange for the indicated signal
2443 to be delivered to the child when it runs. If PID is -1, then
2444 allow any child thread to run; if non-zero, then allow only the
2445 indicated thread to run. (not implemented yet). */
c906108c 2446
f6ac5f3d
PA
2447void
2448procfs_target::resume (ptid_t ptid, int step, enum gdb_signal signo)
c906108c 2449{
c3f6f71d
JM
2450 procinfo *pi, *thread;
2451 int native_signo;
2452
196535a6
RO
2453 /* FIXME: Check/reword. */
2454
2455 /* prrun.prflags |= PRCFAULT; clear current fault.
2456 PRCFAULT may be replaced by a PCCFAULT call (proc_clear_current_fault)
c3f6f71d 2457 This basically leaves PRSTEP and PRCSIG.
196535a6 2458 PRCSIG is like PCSSIG (proc_clear_current_signal).
c3f6f71d 2459 So basically PR_STEP is the sole argument that must be passed
196535a6 2460 to proc_run_process. */
c3f6f71d 2461
0df8b418 2462 /* Find procinfo for main process. */
e99b03dc 2463 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c3f6f71d 2464
77382aee 2465 /* First cut: ignore pid argument. */
c3f6f71d 2466 errno = 0;
c906108c 2467
c3f6f71d 2468 /* Convert signal to host numbering. */
c475f569 2469 if (signo == 0 || (signo == GDB_SIGNAL_STOP && pi->ignore_next_sigstop))
c3f6f71d
JM
2470 native_signo = 0;
2471 else
2ea28649 2472 native_signo = gdb_signal_to_host (signo);
c906108c 2473
c3f6f71d 2474 pi->ignore_next_sigstop = 0;
c906108c 2475
77382aee
PA
2476 /* Running the process voids all cached registers and status. */
2477 /* Void the threads' caches first. */
19958708 2478 proc_iterate_over_threads (pi, invalidate_cache, NULL);
c3f6f71d
JM
2479 /* Void the process procinfo's caches. */
2480 invalidate_cache (NULL, pi, NULL);
c906108c 2481
e99b03dc 2482 if (ptid.pid () != -1)
c906108c 2483 {
77382aee
PA
2484 /* Resume a specific thread, presumably suppressing the
2485 others. */
e38504b3 2486 thread = find_procinfo (ptid.pid (), ptid.lwp ());
7de45904 2487 if (thread != NULL)
c906108c 2488 {
c3f6f71d
JM
2489 if (thread->tid != 0)
2490 {
77382aee
PA
2491 /* We're to resume a specific thread, and not the
2492 others. Set the child process's PR_ASYNC flag. */
c3f6f71d
JM
2493 if (!proc_set_async (pi))
2494 proc_error (pi, "target_resume, set_async", __LINE__);
0df8b418
MS
2495 pi = thread; /* Substitute the thread's procinfo
2496 for run. */
c3f6f71d 2497 }
c906108c
SS
2498 }
2499 }
c906108c 2500
c3f6f71d 2501 if (!proc_run_process (pi, step, native_signo))
c906108c 2502 {
c3f6f71d 2503 if (errno == EBUSY)
77382aee
PA
2504 warning (_("resume: target already running. "
2505 "Pretend to resume, and hope for the best!"));
c3f6f71d
JM
2506 else
2507 proc_error (pi, "target_resume", __LINE__);
c906108c 2508 }
c3f6f71d 2509}
c906108c 2510
77382aee 2511/* Set up to trace signals in the child process. */
c906108c 2512
f6ac5f3d 2513void
adc6a863 2514procfs_target::pass_signals (gdb::array_view<const unsigned char> pass_signals)
c3f6f71d 2515{
44122162 2516 sigset_t signals;
e99b03dc 2517 procinfo *pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
2455069d 2518 int signo;
c906108c 2519
2455069d
UW
2520 prfillset (&signals);
2521
2522 for (signo = 0; signo < NSIG; signo++)
2523 {
2ea28649 2524 int target_signo = gdb_signal_from_host (signo);
adc6a863 2525 if (target_signo < pass_signals.size () && pass_signals[target_signo])
44122162 2526 prdelset (&signals, signo);
2455069d
UW
2527 }
2528
2529 if (!proc_set_traced_signals (pi, &signals))
2530 proc_error (pi, "pass_signals", __LINE__);
c3f6f71d 2531}
c906108c 2532
77382aee 2533/* Print status information about the child process. */
c906108c 2534
f6ac5f3d
PA
2535void
2536procfs_target::files_info ()
c3f6f71d 2537{
181e7f93 2538 struct inferior *inf = current_inferior ();
f4a14ae6 2539
6cb06a8c
TT
2540 gdb_printf (_("\tUsing the running image of %s %s via /proc.\n"),
2541 inf->attach_flag? "attached": "child",
2542 target_pid_to_str (inferior_ptid).c_str ());
c3f6f71d 2543}
c906108c 2544
77382aee
PA
2545/* Make it die. Wait for it to die. Clean up after it. Note: this
2546 should only be applied to the real process, not to an LWP, because
2547 of the check for parent-process. If we need this to work for an
2548 LWP, it needs some more logic. */
c906108c 2549
c3f6f71d 2550static void
fba45db2 2551unconditionally_kill_inferior (procinfo *pi)
c3f6f71d
JM
2552{
2553 int parent_pid;
c906108c 2554
c3f6f71d 2555 parent_pid = proc_parent_pid (pi);
c3f6f71d 2556 if (!proc_kill (pi, SIGKILL))
103b3ef5 2557 proc_error (pi, "unconditionally_kill, proc_kill", __LINE__);
c3f6f71d 2558 destroy_procinfo (pi);
c906108c 2559
c3f6f71d
JM
2560 /* If pi is GDB's child, wait for it to die. */
2561 if (parent_pid == getpid ())
19958708 2562 /* FIXME: should we use waitpid to make sure we get the right event?
c3f6f71d
JM
2563 Should we check the returned event? */
2564 {
0d06e24b 2565#if 0
c3f6f71d 2566 int status, ret;
c906108c 2567
c3f6f71d
JM
2568 ret = waitpid (pi->pid, &status, 0);
2569#else
2570 wait (NULL);
2571#endif
2572 }
2573}
c906108c 2574
77382aee
PA
2575/* We're done debugging it, and we want it to go away. Then we want
2576 GDB to forget all about it. */
c906108c 2577
f6ac5f3d
PA
2578void
2579procfs_target::kill ()
c906108c 2580{
d7e15655 2581 if (inferior_ptid != null_ptid) /* ? */
c3f6f71d 2582 {
0df8b418 2583 /* Find procinfo for main process. */
e99b03dc 2584 procinfo *pi = find_procinfo (inferior_ptid.pid (), 0);
c906108c 2585
c3f6f71d
JM
2586 if (pi)
2587 unconditionally_kill_inferior (pi);
bc1e6c81 2588 target_mourn_inferior (inferior_ptid);
c906108c 2589 }
c3f6f71d
JM
2590}
2591
77382aee 2592/* Forget we ever debugged this thing! */
c906108c 2593
f6ac5f3d
PA
2594void
2595procfs_target::mourn_inferior ()
c3f6f71d
JM
2596{
2597 procinfo *pi;
c906108c 2598
d7e15655 2599 if (inferior_ptid != null_ptid)
c3f6f71d 2600 {
0df8b418 2601 /* Find procinfo for main process. */
e99b03dc 2602 pi = find_procinfo (inferior_ptid.pid (), 0);
c3f6f71d
JM
2603 if (pi)
2604 destroy_procinfo (pi);
c906108c 2605 }
6a3cb8e8
PA
2606
2607 generic_mourn_inferior ();
8181d85f 2608
f6ac5f3d 2609 maybe_unpush_target ();
c3f6f71d 2610}
c906108c 2611
77382aee
PA
2612/* When GDB forks to create a runnable inferior process, this function
2613 is called on the parent side of the fork. It's job is to do
2614 whatever is necessary to make the child ready to be debugged, and
2615 then wait for the child to synchronize. */
c906108c 2616
5b6d1e4f
PA
2617void
2618procfs_target::procfs_init_inferior (int pid)
c3f6f71d
JM
2619{
2620 procinfo *pi;
c3f6f71d 2621 int fail;
2689673f 2622 int lwpid;
c906108c 2623
c475f569
RO
2624 pi = create_procinfo (pid, 0);
2625 if (pi == NULL)
9b20d036 2626 perror (_("procfs: out of memory in 'init_inferior'"));
c3f6f71d
JM
2627
2628 if (!open_procinfo_files (pi, FD_CTL))
2629 proc_error (pi, "init_inferior, open_proc_files", __LINE__);
2630
2631 /*
2632 xmalloc // done
2633 open_procinfo_files // done
2634 link list // done
2635 prfillset (trace)
2636 procfs_notice_signals
2637 prfillset (fault)
2638 prdelset (FLTPAGE)
c3f6f71d
JM
2639 */
2640
77382aee 2641 /* If not stopped yet, wait for it to stop. */
c475f569 2642 if (!(proc_flags (pi) & PR_STOPPED) && !(proc_wait_for_stop (pi)))
c3f6f71d
JM
2643 dead_procinfo (pi, "init_inferior: wait_for_stop failed", KILL);
2644
2645 /* Save some of the /proc state to be restored if we detach. */
2646 /* FIXME: Why? In case another debugger was debugging it?
0df8b418 2647 We're it's parent, for Ghu's sake! */
c3f6f71d
JM
2648 if (!proc_get_traced_signals (pi, &pi->saved_sigset))
2649 proc_error (pi, "init_inferior, get_traced_signals", __LINE__);
2650 if (!proc_get_held_signals (pi, &pi->saved_sighold))
2651 proc_error (pi, "init_inferior, get_held_signals", __LINE__);
2652 if (!proc_get_traced_faults (pi, &pi->saved_fltset))
2653 proc_error (pi, "init_inferior, get_traced_faults", __LINE__);
37de36c6 2654 if (!proc_get_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d 2655 proc_error (pi, "init_inferior, get_traced_sysentry", __LINE__);
37de36c6 2656 if (!proc_get_traced_sysexit (pi, pi->saved_exitset))
c3f6f71d
JM
2657 proc_error (pi, "init_inferior, get_traced_sysexit", __LINE__);
2658
c475f569
RO
2659 fail = procfs_debug_inferior (pi);
2660 if (fail != 0)
c3f6f71d
JM
2661 proc_error (pi, "init_inferior (procfs_debug_inferior)", fail);
2662
0d06e24b
JM
2663 /* FIXME: logically, we should really be turning OFF run-on-last-close,
2664 and possibly even turning ON kill-on-last-close at this point. But
2665 I can't make that change without careful testing which I don't have
2666 time to do right now... */
c3f6f71d
JM
2667 /* Turn on run-on-last-close flag so that the child
2668 will die if GDB goes away for some reason. */
2669 if (!proc_set_run_on_last_close (pi))
2670 proc_error (pi, "init_inferior, set_RLC", __LINE__);
2671
2689673f
PA
2672 /* We now have have access to the lwpid of the main thread/lwp. */
2673 lwpid = proc_get_current_thread (pi);
2674
2675 /* Create a procinfo for the main lwp. */
2676 create_procinfo (pid, lwpid);
2677
2678 /* We already have a main thread registered in the thread table at
2679 this point, but it didn't have any lwp info yet. Notify the core
2680 about it. This changes inferior_ptid as well. */
5b6d1e4f 2681 thread_change_ptid (this, ptid_t (pid), ptid_t (pid, lwpid, 0));
c906108c 2682
2090129c 2683 gdb_startup_inferior (pid, START_INFERIOR_TRAPS_EXPECTED);
c3f6f71d 2684}
c906108c 2685
77382aee
PA
2686/* When GDB forks to create a new process, this function is called on
2687 the child side of the fork before GDB exec's the user program. Its
2688 job is to make the child minimally debuggable, so that the parent
2689 GDB process can connect to the child and take over. This function
2690 should do only the minimum to make that possible, and to
2691 synchronize with the parent process. The parent process should
2692 take care of the details. */
c3f6f71d
JM
2693
2694static void
fba45db2 2695procfs_set_exec_trap (void)
c3f6f71d
JM
2696{
2697 /* This routine called on the child side (inferior side)
2698 after GDB forks the inferior. It must use only local variables,
2699 because it may be sharing data space with its parent. */
c906108c 2700
c3f6f71d 2701 procinfo *pi;
37de36c6 2702 sysset_t *exitset;
c906108c 2703
c475f569
RO
2704 pi = create_procinfo (getpid (), 0);
2705 if (pi == NULL)
e2e0b3e5 2706 perror_with_name (_("procfs: create_procinfo failed in child."));
c906108c 2707
c3f6f71d
JM
2708 if (open_procinfo_files (pi, FD_CTL) == 0)
2709 {
2710 proc_warn (pi, "set_exec_trap, open_proc_files", __LINE__);
2711 gdb_flush (gdb_stderr);
77382aee
PA
2712 /* No need to call "dead_procinfo", because we're going to
2713 exit. */
c3f6f71d
JM
2714 _exit (127);
2715 }
c906108c 2716
c475f569 2717 exitset = XNEW (sysset_t);
44122162 2718 premptyset (exitset);
44122162 2719 praddset (exitset, SYS_execve);
37de36c6
KB
2720
2721 if (!proc_set_traced_sysexit (pi, exitset))
c906108c 2722 {
c3f6f71d
JM
2723 proc_warn (pi, "set_exec_trap, set_traced_sysexit", __LINE__);
2724 gdb_flush (gdb_stderr);
2725 _exit (127);
c906108c 2726 }
c3f6f71d 2727
0df8b418 2728 /* FIXME: should this be done in the parent instead? */
c3f6f71d
JM
2729 /* Turn off inherit on fork flag so that all grand-children
2730 of gdb start with tracing flags cleared. */
2731 if (!proc_unset_inherit_on_fork (pi))
2732 proc_warn (pi, "set_exec_trap, unset_inherit", __LINE__);
2733
2734 /* Turn off run on last close flag, so that the child process
2735 cannot run away just because we close our handle on it.
2736 We want it to wait for the parent to attach. */
2737 if (!proc_unset_run_on_last_close (pi))
2738 proc_warn (pi, "set_exec_trap, unset_RLC", __LINE__);
2739
19958708 2740 /* FIXME: No need to destroy the procinfo --
0df8b418 2741 we have our own address space, and we're about to do an exec! */
c3f6f71d 2742 /*destroy_procinfo (pi);*/
c906108c 2743}
c906108c 2744
c6d36836
RO
2745/* Dummy function to be sure fork_inferior uses fork(2) and not vfork(2).
2746 This avoids a possible deadlock gdb and its vfork'ed child. */
2747static void
2748procfs_pre_trace (void)
2749{
2750}
2751
77382aee
PA
2752/* This function is called BEFORE gdb forks the inferior process. Its
2753 only real responsibility is to set things up for the fork, and tell
2754 GDB which two functions to call after the fork (one for the parent,
2755 and one for the child).
2756
2757 This function does a complicated search for a unix shell program,
2758 which it then uses to parse arguments and environment variables to
2759 be sent to the child. I wonder whether this code could not be
2760 abstracted out and shared with other unix targets such as
2761 inf-ptrace? */
c906108c 2762
f6ac5f3d
PA
2763void
2764procfs_target::create_inferior (const char *exec_file,
2765 const std::string &allargs,
2766 char **env, int from_tty)
c906108c 2767{
974e6844 2768 const char *shell_file = get_shell ();
c906108c 2769 char *tryname;
28439f5e
PA
2770 int pid;
2771
974e6844 2772 if (strchr (shell_file, '/') == NULL)
c906108c
SS
2773 {
2774
2775 /* We will be looking down the PATH to find shell_file. If we
c3f6f71d
JM
2776 just do this the normal way (via execlp, which operates by
2777 attempting an exec for each element of the PATH until it
2778 finds one which succeeds), then there will be an exec for
2779 each failed attempt, each of which will cause a PR_SYSEXIT
2780 stop, and we won't know how to distinguish the PR_SYSEXIT's
2781 for these failed execs with the ones for successful execs
2782 (whether the exec has succeeded is stored at that time in the
2783 carry bit or some such architecture-specific and
2784 non-ABI-specified place).
2785
2786 So I can't think of anything better than to search the PATH
2787 now. This has several disadvantages: (1) There is a race
2788 condition; if we find a file now and it is deleted before we
2789 exec it, we lose, even if the deletion leaves a valid file
2790 further down in the PATH, (2) there is no way to know exactly
2791 what an executable (in the sense of "capable of being
2792 exec'd") file is. Using access() loses because it may lose
2793 if the caller is the superuser; failing to use it loses if
2794 there are ACLs or some such. */
c906108c 2795
995816ba
PA
2796 const char *p;
2797 const char *p1;
c906108c 2798 /* FIXME-maybe: might want "set path" command so user can change what
c3f6f71d 2799 path is used from within GDB. */
995816ba 2800 const char *path = getenv ("PATH");
c906108c
SS
2801 int len;
2802 struct stat statbuf;
2803
2804 if (path == NULL)
2805 path = "/bin:/usr/bin";
2806
b196bc4c 2807 tryname = (char *) alloca (strlen (path) + strlen (shell_file) + 2);
c3f6f71d 2808 for (p = path; p != NULL; p = p1 ? p1 + 1: NULL)
c906108c
SS
2809 {
2810 p1 = strchr (p, ':');
2811 if (p1 != NULL)
2812 len = p1 - p;
2813 else
2814 len = strlen (p);
2815 strncpy (tryname, p, len);
2816 tryname[len] = '\0';
2817 strcat (tryname, "/");
2818 strcat (tryname, shell_file);
2819 if (access (tryname, X_OK) < 0)
2820 continue;
2821 if (stat (tryname, &statbuf) < 0)
2822 continue;
2823 if (!S_ISREG (statbuf.st_mode))
2824 /* We certainly need to reject directories. I'm not quite
2825 as sure about FIFOs, sockets, etc., but I kind of doubt
2826 that people want to exec() these things. */
2827 continue;
2828 break;
2829 }
2830 if (p == NULL)
2831 /* Not found. This must be an error rather than merely passing
2832 the file to execlp(), because execlp() would try all the
2833 exec()s, causing GDB to get confused. */
8a3fe4f8 2834 error (_("procfs:%d -- Can't find shell %s in PATH"),
c3f6f71d 2835 __LINE__, shell_file);
c906108c
SS
2836
2837 shell_file = tryname;
2838 }
2839
25b48839 2840 inferior *inf = current_inferior ();
c8fbd44a 2841 if (!inf->target_is_pushed (this))
25b48839 2842 inf->push_target (this);
cf6f3e86 2843
28439f5e 2844 pid = fork_inferior (exec_file, allargs, env, procfs_set_exec_trap,
c6d36836 2845 NULL, procfs_pre_trace, shell_file, NULL);
28439f5e 2846
2090129c
SDJ
2847 /* We have something that executes now. We'll be running through
2848 the shell at this point (if startup-with-shell is true), but the
2849 pid shouldn't change. */
7fb43e53
PA
2850 thread_info *thr = add_thread_silent (this, ptid_t (pid));
2851 switch_to_thread (thr);
2090129c 2852
5b6d1e4f 2853 procfs_init_inferior (pid);
27087a3d
JB
2854}
2855
e8032dde 2856/* Callback for update_thread_list. Calls "add_thread". */
c906108c 2857
c3f6f71d 2858static int
fba45db2 2859procfs_notice_thread (procinfo *pi, procinfo *thread, void *ptr)
c906108c 2860{
fd79271b 2861 ptid_t gdb_threadid = ptid_t (pi->pid, thread->tid, 0);
c906108c 2862
5b6d1e4f 2863 thread_info *thr = find_thread_ptid (&the_procfs_target, gdb_threadid);
24bce9bb 2864 if (thr == NULL || thr->state == THREAD_EXITED)
5b6d1e4f 2865 add_thread (&the_procfs_target, gdb_threadid);
c906108c 2866
c3f6f71d
JM
2867 return 0;
2868}
2869
77382aee
PA
2870/* Query all the threads that the target knows about, and give them
2871 back to GDB to add to its list. */
c3f6f71d 2872
f6ac5f3d
PA
2873void
2874procfs_target::update_thread_list ()
c3f6f71d
JM
2875{
2876 procinfo *pi;
2877
e8032dde
PA
2878 prune_threads ();
2879
0df8b418 2880 /* Find procinfo for main process. */
e99b03dc 2881 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c3f6f71d
JM
2882 proc_update_threads (pi);
2883 proc_iterate_over_threads (pi, procfs_notice_thread, NULL);
c906108c
SS
2884}
2885
77382aee
PA
2886/* Return true if the thread is still 'alive'. This guy doesn't
2887 really seem to be doing his job. Got to investigate how to tell
2888 when a thread is really gone. */
c906108c 2889
57810aa7 2890bool
f6ac5f3d 2891procfs_target::thread_alive (ptid_t ptid)
c906108c 2892{
c3f6f71d
JM
2893 int proc, thread;
2894 procinfo *pi;
c906108c 2895
e99b03dc 2896 proc = ptid.pid ();
e38504b3 2897 thread = ptid.lwp ();
0df8b418 2898 /* If I don't know it, it ain't alive! */
c475f569
RO
2899 pi = find_procinfo (proc, thread);
2900 if (pi == NULL)
57810aa7 2901 return false;
c3f6f71d
JM
2902
2903 /* If I can't get its status, it ain't alive!
2904 What's more, I need to forget about it! */
2905 if (!proc_get_status (pi))
2906 {
2907 destroy_procinfo (pi);
57810aa7 2908 return false;
c3f6f71d 2909 }
77382aee
PA
2910 /* I couldn't have got its status if it weren't alive, so it's
2911 alive. */
57810aa7 2912 return true;
c906108c 2913}
c3f6f71d 2914
a068643d 2915/* Convert PTID to a string. */
c3f6f71d 2916
a068643d 2917std::string
f6ac5f3d 2918procfs_target::pid_to_str (ptid_t ptid)
c3f6f71d 2919{
e38504b3 2920 if (ptid.lwp () == 0)
a068643d 2921 return string_printf ("process %d", ptid.pid ());
c3f6f71d 2922 else
a068643d 2923 return string_printf ("LWP %ld", ptid.lwp ());
c3f6f71d
JM
2924}
2925
4206c05e
RO
2926/* Accepts an integer PID; Returns a string representing a file that
2927 can be opened to get the symbols for the child process. */
2928
2929char *
2930procfs_target::pid_to_exec_file (int pid)
2931{
2932 static char buf[PATH_MAX];
2933 char name[PATH_MAX];
2934
2935 /* Solaris 11 introduced /proc/<proc-id>/execname. */
c475f569 2936 xsnprintf (name, sizeof (name), "/proc/%d/execname", pid);
4206c05e
RO
2937 scoped_fd fd (gdb_open_cloexec (name, O_RDONLY, 0));
2938 if (fd.get () < 0 || read (fd.get (), buf, PATH_MAX - 1) < 0)
2939 {
2940 /* If that fails, fall back to /proc/<proc-id>/path/a.out introduced in
2941 Solaris 10. */
2942 ssize_t len;
2943
c475f569 2944 xsnprintf (name, sizeof (name), "/proc/%d/path/a.out", pid);
4206c05e
RO
2945 len = readlink (name, buf, PATH_MAX - 1);
2946 if (len <= 0)
2947 strcpy (buf, name);
2948 else
2949 buf[len] = '\0';
2950 }
2951
2952 return buf;
2953}
2954
77382aee 2955/* Insert a watchpoint. */
c3f6f71d 2956
a0911fd0 2957static int
39f77062 2958procfs_set_watchpoint (ptid_t ptid, CORE_ADDR addr, int len, int rwflag,
77382aee 2959 int after)
c906108c 2960{
c3f6f71d 2961 int pflags = 0;
19958708 2962 procinfo *pi;
c3f6f71d 2963
e99b03dc
TT
2964 pi = find_procinfo_or_die (ptid.pid () == -1 ?
2965 inferior_ptid.pid () : ptid.pid (),
dfd4cc63 2966 0);
c3f6f71d 2967
0df8b418
MS
2968 /* Translate from GDB's flags to /proc's. */
2969 if (len > 0) /* len == 0 means delete watchpoint. */
c906108c 2970 {
0df8b418 2971 switch (rwflag) { /* FIXME: need an enum! */
c3f6f71d 2972 case hw_write: /* default watchpoint (write) */
196535a6 2973 pflags = WA_WRITE;
c3f6f71d
JM
2974 break;
2975 case hw_read: /* read watchpoint */
196535a6 2976 pflags = WA_READ;
c3f6f71d
JM
2977 break;
2978 case hw_access: /* access watchpoint */
196535a6 2979 pflags = WA_READ | WA_WRITE;
c3f6f71d
JM
2980 break;
2981 case hw_execute: /* execution HW breakpoint */
196535a6 2982 pflags = WA_EXEC;
c3f6f71d 2983 break;
0df8b418 2984 default: /* Something weird. Return error. */
c906108c 2985 return -1;
c3f6f71d 2986 }
0df8b418 2987 if (after) /* Stop after r/w access is completed. */
196535a6 2988 pflags |= WA_TRAPAFTER;
c3f6f71d
JM
2989 }
2990
2991 if (!proc_set_watchpoint (pi, addr, len, pflags))
2992 {
0df8b418 2993 if (errno == E2BIG) /* Typical error for no resources. */
c3f6f71d
JM
2994 return -1; /* fail */
2995 /* GDB may try to remove the same watchpoint twice.
2996 If a remove request returns no match, don't error. */
c906108c 2997 if (errno == ESRCH && len == 0)
c3f6f71d
JM
2998 return 0; /* ignore */
2999 proc_error (pi, "set_watchpoint", __LINE__);
c906108c
SS
3000 }
3001 return 0;
3002}
3003
1e03ad20
KB
3004/* Return non-zero if we can set a hardware watchpoint of type TYPE. TYPE
3005 is one of bp_hardware_watchpoint, bp_read_watchpoint, bp_write_watchpoint,
3006 or bp_hardware_watchpoint. CNT is the number of watchpoints used so
196535a6 3007 far. */
1e03ad20 3008
f6ac5f3d
PA
3009int
3010procfs_target::can_use_hw_breakpoint (enum bptype type, int cnt, int othertype)
1e03ad20 3011{
1e03ad20
KB
3012 /* Due to the way that proc_set_watchpoint() is implemented, host
3013 and target pointers must be of the same size. If they are not,
3014 we can't use hardware watchpoints. This limitation is due to the
9a043c1d
AC
3015 fact that proc_set_watchpoint() calls
3016 procfs_address_to_host_pointer(); a close inspection of
3017 procfs_address_to_host_pointer will reveal that an internal error
3018 will be generated when the host and target pointer sizes are
3019 different. */
f5656ead 3020 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
f4a14ae6 3021
4e906f53 3022 if (sizeof (void *) != TYPE_LENGTH (ptr_type))
1e03ad20
KB
3023 return 0;
3024
3025 /* Other tests here??? */
3026
3027 return 1;
1e03ad20
KB
3028}
3029
77382aee
PA
3030/* Returns non-zero if process is stopped on a hardware watchpoint
3031 fault, else returns zero. */
c3f6f71d 3032
57810aa7 3033bool
f6ac5f3d 3034procfs_target::stopped_by_watchpoint ()
c906108c 3035{
c3f6f71d 3036 procinfo *pi;
c906108c 3037
e99b03dc 3038 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
aaeb7efa 3039
c3f6f71d 3040 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
c475f569
RO
3041 if (proc_why (pi) == PR_FAULTED)
3042 if (proc_what (pi) == FLTWATCH)
3043 return true;
57810aa7 3044 return false;
c906108c 3045}
c906108c 3046
77382aee
PA
3047/* Returns 1 if the OS knows the position of the triggered watchpoint,
3048 and sets *ADDR to that address. Returns 0 if OS cannot report that
3049 address. This function is only called if
3050 procfs_stopped_by_watchpoint returned 1, thus no further checks are
3051 done. The function also assumes that ADDR is not NULL. */
bf701c2c 3052
57810aa7 3053bool
f6ac5f3d 3054procfs_target::stopped_data_address (CORE_ADDR *addr)
bf701c2c
PM
3055{
3056 procinfo *pi;
3057
e99b03dc 3058 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
bf701c2c
PM
3059 return proc_watchpoint_address (pi, addr);
3060}
3061
f6ac5f3d
PA
3062int
3063procfs_target::insert_watchpoint (CORE_ADDR addr, int len,
3064 enum target_hw_bp_type type,
3065 struct expression *cond)
25513619 3066{
9aed480c 3067 if (!target_have_steppable_watchpoint ()
f5656ead 3068 && !gdbarch_have_nonsteppable_watchpoint (target_gdbarch ()))
c475f569
RO
3069 /* When a hardware watchpoint fires off the PC will be left at
3070 the instruction following the one which caused the
3071 watchpoint. It will *NOT* be necessary for GDB to step over
3072 the watchpoint. */
3073 return procfs_set_watchpoint (inferior_ptid, addr, len, type, 1);
25513619 3074 else
c475f569
RO
3075 /* When a hardware watchpoint fires off the PC will be left at
3076 the instruction which caused the watchpoint. It will be
3077 necessary for GDB to step over the watchpoint. */
3078 return procfs_set_watchpoint (inferior_ptid, addr, len, type, 0);
25513619
PA
3079}
3080
f6ac5f3d
PA
3081int
3082procfs_target::remove_watchpoint (CORE_ADDR addr, int len,
3083 enum target_hw_bp_type type,
3084 struct expression *cond)
25513619
PA
3085{
3086 return procfs_set_watchpoint (inferior_ptid, addr, 0, 0, 0);
3087}
3088
f6ac5f3d
PA
3089int
3090procfs_target::region_ok_for_hw_watchpoint (CORE_ADDR addr, int len)
25513619
PA
3091{
3092 /* The man page for proc(4) on Solaris 2.6 and up says that the
3093 system can support "thousands" of hardware watchpoints, but gives
3094 no method for finding out how many; It doesn't say anything about
3095 the allowed size for the watched area either. So we just tell
3096 GDB 'yes'. */
3097 return 1;
3098}
3099
77382aee
PA
3100/* Memory Mappings Functions: */
3101
3102/* Call a callback function once for each mapping, passing it the
3103 mapping, an optional secondary callback function, and some optional
3104 opaque data. Quit and return the first non-zero value returned
3105 from the callback.
3106
3107 PI is the procinfo struct for the process to be mapped. FUNC is
3108 the callback function to be called by this iterator. DATA is the
3109 optional opaque data to be passed to the callback function.
3110 CHILD_FUNC is the optional secondary function pointer to be passed
3111 to the child function. Returns the first non-zero return value
3112 from the callback function, or zero. */
831e682e
MS
3113
3114static int
b8edc417 3115iterate_over_mappings (procinfo *pi, find_memory_region_ftype child_func,
e9ef4f39 3116 void *data,
19958708 3117 int (*func) (struct prmap *map,
b8edc417 3118 find_memory_region_ftype child_func,
831e682e
MS
3119 void *data))
3120{
3121 char pathname[MAX_PROC_NAME_SIZE];
3122 struct prmap *prmaps;
3123 struct prmap *prmap;
3124 int funcstat;
831e682e 3125 int nmap;
831e682e 3126 struct stat sbuf;
831e682e 3127
19958708 3128 /* Get the number of mappings, allocate space,
831e682e 3129 and read the mappings into prmaps. */
0df8b418 3130 /* Open map fd. */
c475f569 3131 xsnprintf (pathname, sizeof (pathname), "/proc/%d/map", pi->pid);
831e682e 3132
5dc1a704
TT
3133 scoped_fd map_fd (open (pathname, O_RDONLY));
3134 if (map_fd.get () < 0)
3135 proc_error (pi, "iterate_over_mappings (open)", __LINE__);
831e682e 3136
19958708 3137 /* Use stat to determine the file size, and compute
831e682e 3138 the number of prmap_t objects it contains. */
5dc1a704 3139 if (fstat (map_fd.get (), &sbuf) != 0)
831e682e
MS
3140 proc_error (pi, "iterate_over_mappings (fstat)", __LINE__);
3141
3142 nmap = sbuf.st_size / sizeof (prmap_t);
3143 prmaps = (struct prmap *) alloca ((nmap + 1) * sizeof (*prmaps));
5dc1a704 3144 if (read (map_fd.get (), (char *) prmaps, nmap * sizeof (*prmaps))
831e682e
MS
3145 != (nmap * sizeof (*prmaps)))
3146 proc_error (pi, "iterate_over_mappings (read)", __LINE__);
831e682e
MS
3147
3148 for (prmap = prmaps; nmap > 0; prmap++, nmap--)
c475f569
RO
3149 {
3150 funcstat = (*func) (prmap, child_func, data);
3151 if (funcstat != 0)
3152 return funcstat;
3153 }
831e682e
MS
3154
3155 return 0;
3156}
3157
77382aee 3158/* Implements the to_find_memory_regions method. Calls an external
b8edc417 3159 function for each memory region.
77382aee 3160 Returns the integer value returned by the callback. */
be4d1333
MS
3161
3162static int
19958708 3163find_memory_regions_callback (struct prmap *map,
b8edc417 3164 find_memory_region_ftype func, void *data)
be4d1333 3165{
bf75638e 3166 return (*func) ((CORE_ADDR) map->pr_vaddr,
19958708 3167 map->pr_size,
be4d1333
MS
3168 (map->pr_mflags & MA_READ) != 0,
3169 (map->pr_mflags & MA_WRITE) != 0,
19958708 3170 (map->pr_mflags & MA_EXEC) != 0,
4f69f4c2 3171 1, /* MODIFIED is unknown, pass it as true. */
be4d1333
MS
3172 data);
3173}
3174
77382aee
PA
3175/* External interface. Calls a callback function once for each
3176 mapped memory region in the child process, passing as arguments:
3177
3178 CORE_ADDR virtual_address,
3179 unsigned long size,
3180 int read, TRUE if region is readable by the child
3181 int write, TRUE if region is writable by the child
3182 int execute TRUE if region is executable by the child.
3183
3184 Stops iterating and returns the first non-zero value returned by
3185 the callback. */
be4d1333 3186
f6ac5f3d
PA
3187int
3188procfs_target::find_memory_regions (find_memory_region_ftype func, void *data)
be4d1333 3189{
e99b03dc 3190 procinfo *pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
be4d1333 3191
19958708 3192 return iterate_over_mappings (pi, func, data,
be4d1333
MS
3193 find_memory_regions_callback);
3194}
3195
77382aee 3196/* Returns an ascii representation of a memory mapping's flags. */
c3f6f71d 3197
388faa48 3198static char *
5ae5f592 3199mappingflags (long flags)
388faa48
MS
3200{
3201 static char asciiflags[8];
3202
3203 strcpy (asciiflags, "-------");
388faa48
MS
3204 if (flags & MA_STACK)
3205 asciiflags[1] = 's';
3206 if (flags & MA_BREAK)
3207 asciiflags[2] = 'b';
3208 if (flags & MA_SHARED)
3209 asciiflags[3] = 's';
3210 if (flags & MA_READ)
3211 asciiflags[4] = 'r';
3212 if (flags & MA_WRITE)
3213 asciiflags[5] = 'w';
3214 if (flags & MA_EXEC)
3215 asciiflags[6] = 'x';
3216 return (asciiflags);
3217}
3218
77382aee
PA
3219/* Callback function, does the actual work for 'info proc
3220 mappings'. */
831e682e 3221
831e682e 3222static int
b8edc417 3223info_mappings_callback (struct prmap *map, find_memory_region_ftype ignore,
e9ef4f39 3224 void *unused)
831e682e 3225{
0b62613e 3226 unsigned int pr_off;
831e682e 3227
0b62613e 3228 pr_off = (unsigned int) map->pr_offset;
0b62613e 3229
f5656ead 3230 if (gdbarch_addr_bit (target_gdbarch ()) == 32)
6cb06a8c
TT
3231 gdb_printf ("\t%#10lx %#10lx %#10lx %#10x %7s\n",
3232 (unsigned long) map->pr_vaddr,
3233 (unsigned long) map->pr_vaddr + map->pr_size - 1,
3234 (unsigned long) map->pr_size,
3235 pr_off,
3236 mappingflags (map->pr_mflags));
0b62613e 3237 else
6cb06a8c
TT
3238 gdb_printf (" %#18lx %#18lx %#10lx %#10x %7s\n",
3239 (unsigned long) map->pr_vaddr,
3240 (unsigned long) map->pr_vaddr + map->pr_size - 1,
3241 (unsigned long) map->pr_size,
3242 pr_off,
3243 mappingflags (map->pr_mflags));
831e682e
MS
3244
3245 return 0;
3246}
3247
77382aee 3248/* Implement the "info proc mappings" subcommand. */
388faa48
MS
3249
3250static void
3251info_proc_mappings (procinfo *pi, int summary)
3252{
388faa48 3253 if (summary)
0df8b418 3254 return; /* No output for summary mode. */
388faa48 3255
6cb06a8c 3256 gdb_printf (_("Mapped address spaces:\n\n"));
f5656ead 3257 if (gdbarch_ptr_bit (target_gdbarch ()) == 32)
6cb06a8c
TT
3258 gdb_printf ("\t%10s %10s %10s %10s %7s\n",
3259 "Start Addr",
3260 " End Addr",
3261 " Size",
3262 " Offset",
3263 "Flags");
0b62613e 3264 else
6cb06a8c
TT
3265 gdb_printf (" %18s %18s %10s %10s %7s\n",
3266 "Start Addr",
3267 " End Addr",
3268 " Size",
3269 " Offset",
3270 "Flags");
388faa48 3271
831e682e 3272 iterate_over_mappings (pi, NULL, NULL, info_mappings_callback);
6cb06a8c 3273 gdb_printf ("\n");
388faa48
MS
3274}
3275
77382aee 3276/* Implement the "info proc" command. */
c3f6f71d 3277
f6ac5f3d
PA
3278bool
3279procfs_target::info_proc (const char *args, enum info_proc_what what)
c906108c 3280{
388faa48
MS
3281 procinfo *process = NULL;
3282 procinfo *thread = NULL;
388faa48
MS
3283 char *tmp = NULL;
3284 int pid = 0;
3285 int tid = 0;
3286 int mappings = 0;
c906108c 3287
145b16a9
UW
3288 switch (what)
3289 {
3290 case IP_MINIMAL:
3291 break;
3292
3293 case IP_MAPPINGS:
3294 case IP_ALL:
3295 mappings = 1;
3296 break;
3297
3298 default:
3299 error (_("Not supported on this target."));
3300 }
3301
773a1edc 3302 gdb_argv built_argv (args);
4fa7574e 3303 for (char *arg : built_argv)
c3f6f71d 3304 {
773a1edc 3305 if (isdigit (arg[0]))
c3f6f71d 3306 {
773a1edc 3307 pid = strtoul (arg, &tmp, 10);
c3f6f71d
JM
3308 if (*tmp == '/')
3309 tid = strtoul (++tmp, NULL, 10);
3310 }
773a1edc 3311 else if (arg[0] == '/')
c3f6f71d 3312 {
773a1edc 3313 tid = strtoul (arg + 1, NULL, 10);
c3f6f71d 3314 }
c3f6f71d 3315 }
5b4cbbe3
TT
3316
3317 procinfo_up temporary_procinfo;
c3f6f71d 3318 if (pid == 0)
e99b03dc 3319 pid = inferior_ptid.pid ();
c3f6f71d 3320 if (pid == 0)
8a3fe4f8 3321 error (_("No current process: you must name one."));
c3f6f71d 3322 else
c906108c 3323 {
c3f6f71d 3324 /* Have pid, will travel.
0df8b418 3325 First see if it's a process we're already debugging. */
c3f6f71d
JM
3326 process = find_procinfo (pid, 0);
3327 if (process == NULL)
3328 {
19958708 3329 /* No. So open a procinfo for it, but
c3f6f71d
JM
3330 remember to close it again when finished. */
3331 process = create_procinfo (pid, 0);
5b4cbbe3 3332 temporary_procinfo.reset (process);
c3f6f71d
JM
3333 if (!open_procinfo_files (process, FD_CTL))
3334 proc_error (process, "info proc, open_procinfo_files", __LINE__);
3335 }
c906108c 3336 }
c3f6f71d
JM
3337 if (tid != 0)
3338 thread = create_procinfo (pid, tid);
3339
3340 if (process)
3341 {
6cb06a8c 3342 gdb_printf (_("process %d flags:\n"), process->pid);
c3f6f71d
JM
3343 proc_prettyprint_flags (proc_flags (process), 1);
3344 if (proc_flags (process) & (PR_STOPPED | PR_ISTOP))
3345 proc_prettyprint_why (proc_why (process), proc_what (process), 1);
3346 if (proc_get_nthreads (process) > 1)
6cb06a8c
TT
3347 gdb_printf ("Process has %d threads.\n",
3348 proc_get_nthreads (process));
c3f6f71d
JM
3349 }
3350 if (thread)
3351 {
6cb06a8c 3352 gdb_printf (_("thread %d flags:\n"), thread->tid);
c3f6f71d
JM
3353 proc_prettyprint_flags (proc_flags (thread), 1);
3354 if (proc_flags (thread) & (PR_STOPPED | PR_ISTOP))
3355 proc_prettyprint_why (proc_why (thread), proc_what (thread), 1);
3356 }
3357
388faa48 3358 if (mappings)
c475f569 3359 info_proc_mappings (process, 0);
388faa48 3360
f6ac5f3d 3361 return true;
c906108c
SS
3362}
3363
9185ddce
JB
3364/* Modify the status of the system call identified by SYSCALLNUM in
3365 the set of syscalls that are currently traced/debugged.
3366
3367 If ENTRY_OR_EXIT is set to PR_SYSENTRY, then the entry syscalls set
0df8b418 3368 will be updated. Otherwise, the exit syscalls set will be updated.
9185ddce 3369
0df8b418 3370 If MODE is FLAG_SET, then traces will be enabled. Otherwise, they
9185ddce
JB
3371 will be disabled. */
3372
3373static void
3374proc_trace_syscalls_1 (procinfo *pi, int syscallnum, int entry_or_exit,
77382aee 3375 int mode, int from_tty)
9185ddce
JB
3376{
3377 sysset_t *sysset;
77382aee 3378
9185ddce
JB
3379 if (entry_or_exit == PR_SYSENTRY)
3380 sysset = proc_get_traced_sysentry (pi, NULL);
3381 else
3382 sysset = proc_get_traced_sysexit (pi, NULL);
3383
3384 if (sysset == NULL)
3385 proc_error (pi, "proc-trace, get_traced_sysset", __LINE__);
3386
3387 if (mode == FLAG_SET)
44122162 3388 praddset (sysset, syscallnum);
9185ddce 3389 else
44122162 3390 prdelset (sysset, syscallnum);
9185ddce
JB
3391
3392 if (entry_or_exit == PR_SYSENTRY)
3393 {
3394 if (!proc_set_traced_sysentry (pi, sysset))
77382aee 3395 proc_error (pi, "proc-trace, set_traced_sysentry", __LINE__);
9185ddce
JB
3396 }
3397 else
3398 {
3399 if (!proc_set_traced_sysexit (pi, sysset))
77382aee 3400 proc_error (pi, "proc-trace, set_traced_sysexit", __LINE__);
9185ddce
JB
3401 }
3402}
3403
c3f6f71d 3404static void
0b39b52e 3405proc_trace_syscalls (const char *args, int from_tty, int entry_or_exit, int mode)
c906108c 3406{
c3f6f71d 3407 procinfo *pi;
c906108c 3408
e99b03dc 3409 if (inferior_ptid.pid () <= 0)
8a3fe4f8 3410 error (_("you must be debugging a process to use this command."));
c906108c 3411
c3f6f71d 3412 if (args == NULL || args[0] == 0)
e2e0b3e5 3413 error_no_arg (_("system call to trace"));
c3f6f71d 3414
e99b03dc 3415 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c3f6f71d
JM
3416 if (isdigit (args[0]))
3417 {
9185ddce 3418 const int syscallnum = atoi (args);
c906108c 3419
9185ddce 3420 proc_trace_syscalls_1 (pi, syscallnum, entry_or_exit, mode, from_tty);
c3f6f71d
JM
3421 }
3422}
3423
19958708 3424static void
0b39b52e 3425proc_trace_sysentry_cmd (const char *args, int from_tty)
c906108c 3426{
c3f6f71d
JM
3427 proc_trace_syscalls (args, from_tty, PR_SYSENTRY, FLAG_SET);
3428}
c906108c 3429
19958708 3430static void
0b39b52e 3431proc_trace_sysexit_cmd (const char *args, int from_tty)
c3f6f71d
JM
3432{
3433 proc_trace_syscalls (args, from_tty, PR_SYSEXIT, FLAG_SET);
c906108c 3434}
c906108c 3435
19958708 3436static void
0b39b52e 3437proc_untrace_sysentry_cmd (const char *args, int from_tty)
c3f6f71d
JM
3438{
3439 proc_trace_syscalls (args, from_tty, PR_SYSENTRY, FLAG_RESET);
3440}
3441
19958708 3442static void
0b39b52e 3443proc_untrace_sysexit_cmd (const char *args, int from_tty)
c906108c 3444{
c3f6f71d
JM
3445 proc_trace_syscalls (args, from_tty, PR_SYSEXIT, FLAG_RESET);
3446}
c906108c 3447
6c265988 3448void _initialize_procfs ();
c906108c 3449void
6c265988 3450_initialize_procfs ()
c906108c 3451{
19958708 3452 add_com ("proc-trace-entry", no_class, proc_trace_sysentry_cmd,
1bedd215 3453 _("Give a trace of entries into the syscall."));
19958708 3454 add_com ("proc-trace-exit", no_class, proc_trace_sysexit_cmd,
1bedd215 3455 _("Give a trace of exits from the syscall."));
19958708 3456 add_com ("proc-untrace-entry", no_class, proc_untrace_sysentry_cmd,
1bedd215 3457 _("Cancel a trace of entries into the syscall."));
19958708 3458 add_com ("proc-untrace-exit", no_class, proc_untrace_sysexit_cmd,
1bedd215 3459 _("Cancel a trace of exits from the syscall."));
c1955e17 3460
62c808ae 3461 add_inf_child_target (&the_procfs_target);
c3f6f71d
JM
3462}
3463
3464/* =================== END, GDB "MODULE" =================== */
3465
3466
3467
77382aee
PA
3468/* miscellaneous stubs: */
3469
3470/* The following satisfy a few random symbols mostly created by the
3471 solaris threads implementation, which I will chase down later. */
c3f6f71d 3472
77382aee
PA
3473/* Return a pid for which we guarantee we will be able to find a
3474 'live' procinfo. */
c3f6f71d 3475
39f77062 3476ptid_t
fba45db2 3477procfs_first_available (void)
c3f6f71d 3478{
f2907e49 3479 return ptid_t (procinfo_list ? procinfo_list->pid : -1);
c3f6f71d 3480}
be4d1333
MS
3481
3482/* =================== GCORE .NOTE "MODULE" =================== */
3483
24f5300a 3484static void
19958708 3485procfs_do_thread_registers (bfd *obfd, ptid_t ptid,
24f5300a
SM
3486 gdb::unique_xmalloc_ptr<char> &note_data,
3487 int *note_size, enum gdb_signal stop_signal)
be4d1333 3488{
5b6d1e4f 3489 struct regcache *regcache = get_thread_regcache (&the_procfs_target, ptid);
be4d1333
MS
3490 gdb_gregset_t gregs;
3491 gdb_fpregset_t fpregs;
3492 unsigned long merged_pid;
3493
e38504b3 3494 merged_pid = ptid.lwp () << 16 | ptid.pid ();
be4d1333 3495
75125405
DJ
3496 /* This part is the old method for fetching registers.
3497 It should be replaced by the newer one using regsets
3498 once it is implemented in this platform:
29082443 3499 gdbarch_iterate_over_regset_sections(). */
75125405 3500
75125405
DJ
3501 target_fetch_registers (regcache, -1);
3502
594f7785 3503 fill_gregset (regcache, &gregs, -1);
24f5300a
SM
3504 note_data.reset (elfcore_write_lwpstatus (obfd,
3505 note_data.release (),
3506 note_size,
3507 merged_pid,
3508 stop_signal,
3509 &gregs));
594f7785 3510 fill_fpregset (regcache, &fpregs, -1);
24f5300a
SM
3511 note_data.reset (elfcore_write_prfpreg (obfd,
3512 note_data.release (),
3513 note_size,
3514 &fpregs,
3515 sizeof (fpregs)));
be4d1333
MS
3516}
3517
24f5300a
SM
3518struct procfs_corefile_thread_data
3519{
3520 procfs_corefile_thread_data (bfd *obfd,
3521 gdb::unique_xmalloc_ptr<char> &note_data,
3522 int *note_size, gdb_signal stop_signal)
3523 : obfd (obfd), note_data (note_data), note_size (note_size),
3524 stop_signal (stop_signal)
3525 {}
3526
be4d1333 3527 bfd *obfd;
24f5300a 3528 gdb::unique_xmalloc_ptr<char> &note_data;
be4d1333 3529 int *note_size;
2ea28649 3530 enum gdb_signal stop_signal;
be4d1333
MS
3531};
3532
3533static int
65554fef 3534procfs_corefile_thread_callback (procinfo *pi, procinfo *thread, void *data)
be4d1333 3535{
b196bc4c
RO
3536 struct procfs_corefile_thread_data *args
3537 = (struct procfs_corefile_thread_data *) data;
be4d1333 3538
2689673f 3539 if (pi != NULL)
be4d1333 3540 {
fd79271b 3541 ptid_t ptid = ptid_t (pi->pid, thread->tid, 0);
f4a14ae6 3542
24f5300a
SM
3543 procfs_do_thread_registers (args->obfd, ptid,
3544 args->note_data,
3545 args->note_size,
3546 args->stop_signal);
be4d1333
MS
3547 }
3548 return 0;
3549}
3550
a223f1e7
JB
3551static int
3552find_signalled_thread (struct thread_info *info, void *data)
3553{
e22be212 3554 if (info->stop_signal () != GDB_SIGNAL_0
e99b03dc 3555 && info->ptid.pid () == inferior_ptid.pid ())
a223f1e7
JB
3556 return 1;
3557
3558 return 0;
3559}
3560
2ea28649 3561static enum gdb_signal
a223f1e7
JB
3562find_stop_signal (void)
3563{
3564 struct thread_info *info =
3565 iterate_over_threads (find_signalled_thread, NULL);
3566
3567 if (info)
e22be212 3568 return info->stop_signal ();
a223f1e7 3569 else
a493e3e2 3570 return GDB_SIGNAL_0;
a223f1e7
JB
3571}
3572
24f5300a 3573gdb::unique_xmalloc_ptr<char>
f6ac5f3d 3574procfs_target::make_corefile_notes (bfd *obfd, int *note_size)
be4d1333 3575{
be4d1333 3576 gdb_gregset_t gregs;
be4d1333
MS
3577 char fname[16] = {'\0'};
3578 char psargs[80] = {'\0'};
e99b03dc 3579 procinfo *pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
24f5300a 3580 gdb::unique_xmalloc_ptr<char> note_data;
2ea28649 3581 enum gdb_signal stop_signal;
be4d1333
MS
3582
3583 if (get_exec_file (0))
3584 {
9f37bbcc 3585 strncpy (fname, lbasename (get_exec_file (0)), sizeof (fname));
4e2af517
JM
3586 fname[sizeof (fname) - 1] = 0;
3587 strncpy (psargs, get_exec_file (0), sizeof (psargs));
3588 psargs[sizeof (psargs) - 1] = 0;
6dbdc4a3 3589
fd2dec2a
SM
3590 const std::string &inf_args = current_inferior ()->args ();
3591 if (!inf_args.empty () &&
3592 inf_args.length () < ((int) sizeof (psargs) - (int) strlen (psargs)))
be4d1333 3593 {
19958708 3594 strncat (psargs, " ",
be4d1333 3595 sizeof (psargs) - strlen (psargs));
fd2dec2a 3596 strncat (psargs, inf_args.c_str (),
be4d1333
MS
3597 sizeof (psargs) - strlen (psargs));
3598 }
3599 }
3600
24f5300a
SM
3601 note_data.reset (elfcore_write_prpsinfo (obfd,
3602 note_data.release (),
3603 note_size,
3604 fname,
3605 psargs));
be4d1333 3606
651c8d2d
PA
3607 stop_signal = find_stop_signal ();
3608
3e3420f6 3609 fill_gregset (get_current_regcache (), &gregs, -1);
24f5300a
SM
3610 note_data.reset (elfcore_write_pstatus (obfd, note_data.release (), note_size,
3611 inferior_ptid.pid (),
3612 stop_signal, &gregs));
3613
3614 procfs_corefile_thread_data thread_args (obfd, note_data, note_size,
3615 stop_signal);
3e43a32a
MS
3616 proc_iterate_over_threads (pi, procfs_corefile_thread_callback,
3617 &thread_args);
be4d1333 3618
62c808ae 3619 gdb::optional<gdb::byte_vector> auxv =
328d42d8
SM
3620 target_read_alloc (current_inferior ()->top_target (),
3621 TARGET_OBJECT_AUXV, NULL);
62c808ae 3622 if (auxv && !auxv->empty ())
24f5300a
SM
3623 note_data.reset (elfcore_write_note (obfd, note_data.release (), note_size,
3624 "CORE", NT_AUXV, auxv->data (),
3625 auxv->size ()));
4e73f23d 3626
be4d1333
MS
3627 return note_data;
3628}
be4d1333 3629/* =================== END GCORE .NOTE "MODULE" =================== */