]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/procfs.c
Fix reconnecting to a gdbserver already debugging multiple processes, II
[thirdparty/binutils-gdb.git] / gdb / procfs.c
CommitLineData
44122162 1/* Machine independent support for Solaris /proc (process file system) for GDB.
2555fe1a 2
b811d2c2 3 Copyright (C) 1999-2020 Free Software Foundation, Inc.
2555fe1a 4
c3f6f71d
JM
5 Written by Michael Snyder at Cygnus Solutions.
6 Based on work by Fred Fish, Stu Grossman, Geoff Noer, and others.
c906108c 7
a9762ec7
JB
8 This file is part of GDB.
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
14
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
21 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c 22
c3f6f71d
JM
23#include "defs.h"
24#include "inferior.h"
45741a9c 25#include "infrun.h"
c3f6f71d
JM
26#include "target.h"
27#include "gdbcore.h"
65554fef 28#include "elf-bfd.h" /* for elfcore_write_* */
c3f6f71d 29#include "gdbcmd.h"
0fda6bd2 30#include "gdbthread.h"
7f7fe91e 31#include "regcache.h"
28439f5e 32#include "inf-child.h"
4fa7574e 33#include "nat/fork-inferior.h"
0d12e84c 34#include "gdbarch.h"
c906108c 35
0df8b418 36#define _STRUCTURED_PROC 1 /* Should be done by configure script. */
c906108c 37
c3f6f71d
JM
38#include <sys/procfs.h>
39#include <sys/fault.h>
40#include <sys/syscall.h>
268a13a5 41#include "gdbsupport/gdb_wait.h"
0fda6bd2
JM
42#include <signal.h>
43#include <ctype.h>
92107356 44#include "gdb_bfd.h"
44270758 45#include "inflow.h"
4e73f23d 46#include "auxv.h"
d1a7880c 47#include "procfs.h"
76727919 48#include "observable.h"
268a13a5
TT
49#include "gdbsupport/scoped_fd.h"
50#include "gdbsupport/pathstuff.h"
0fda6bd2 51
77382aee
PA
52/* This module provides the interface between GDB and the
53 /proc file system, which is used on many versions of Unix
54 as a means for debuggers to control other processes.
55
77382aee
PA
56 /proc works by imitating a file system: you open a simulated file
57 that represents the process you wish to interact with, and perform
58 operations on that "file" in order to examine or change the state
59 of the other process.
60
61 The most important thing to know about /proc and this module is
62 that there are two very different interfaces to /proc:
63
64 One that uses the ioctl system call, and another that uses read
65 and write system calls.
66
44122162
RO
67 This module supports only the Solaris version of the read/write
68 interface. */
77382aee 69
c906108c 70#include <sys/types.h>
2978b111 71#include <dirent.h> /* opendir/readdir, for listing the LWP's */
c906108c 72
c3f6f71d
JM
73#include <fcntl.h> /* for O_RDONLY */
74#include <unistd.h> /* for "X_OK" */
53ce3c39 75#include <sys/stat.h> /* for struct stat */
c906108c 76
103b3ef5
MS
77/* Note: procfs-utils.h must be included after the above system header
78 files, because it redefines various system calls using macros.
79 This may be incompatible with the prototype declarations. */
80
103b3ef5
MS
81#include "proc-utils.h"
82
77382aee 83/* Prototypes for supply_gregset etc. */
c60c0f5f
MS
84#include "gregset.h"
85
c3f6f71d 86/* =================== TARGET_OPS "MODULE" =================== */
c906108c 87
77382aee 88/* This module defines the GDB target vector and its methods. */
c906108c 89
f6ac5f3d 90
e96027e0
PA
91static enum target_xfer_status procfs_xfer_memory (gdb_byte *,
92 const gdb_byte *,
93 ULONGEST, ULONGEST,
94 ULONGEST *);
a14ed312 95
f6ac5f3d
PA
96class procfs_target final : public inf_child_target
97{
98public:
99 void create_inferior (const char *, const std::string &,
100 char **, int) override;
101
102 void kill () override;
103
104 void mourn_inferior () override;
105
106 void attach (const char *, int) override;
107 void detach (inferior *inf, int) override;
108
109 void resume (ptid_t, int, enum gdb_signal) override;
110 ptid_t wait (ptid_t, struct target_waitstatus *, int) override;
111
112 void fetch_registers (struct regcache *, int) override;
113 void store_registers (struct regcache *, int) override;
114
115 enum target_xfer_status xfer_partial (enum target_object object,
116 const char *annex,
117 gdb_byte *readbuf,
118 const gdb_byte *writebuf,
119 ULONGEST offset, ULONGEST len,
120 ULONGEST *xfered_len) override;
121
adc6a863 122 void pass_signals (gdb::array_view<const unsigned char>) override;
a14ed312 123
f6ac5f3d 124 void files_info () override;
c3f6f71d 125
f6ac5f3d 126 void update_thread_list () override;
be4d1333 127
57810aa7 128 bool thread_alive (ptid_t ptid) override;
be4d1333 129
a068643d 130 std::string pid_to_str (ptid_t) override;
1e03ad20 131
4206c05e
RO
132 char *pid_to_exec_file (int pid) override;
133
f6ac5f3d
PA
134 thread_control_capabilities get_thread_control_capabilities () override
135 { return tc_schedlock; }
145b16a9 136
f6ac5f3d
PA
137 /* find_memory_regions support method for gcore */
138 int find_memory_regions (find_memory_region_ftype func, void *data)
139 override;
b5c8fcb1 140
f6ac5f3d 141 char *make_corefile_notes (bfd *, int *) override;
b5c8fcb1 142
f6ac5f3d
PA
143 bool info_proc (const char *, enum info_proc_what) override;
144
c475f569 145#if PR_MODEL_NATIVE == PR_MODEL_LP64
f6ac5f3d
PA
146 int auxv_parse (gdb_byte **readptr,
147 gdb_byte *endptr, CORE_ADDR *typep, CORE_ADDR *valp)
148 override;
149#endif
150
57810aa7 151 bool stopped_by_watchpoint () override;
f6ac5f3d
PA
152
153 int insert_watchpoint (CORE_ADDR, int, enum target_hw_bp_type,
154 struct expression *) override;
155
156 int remove_watchpoint (CORE_ADDR, int, enum target_hw_bp_type,
157 struct expression *) override;
158
159 int region_ok_for_hw_watchpoint (CORE_ADDR, int) override;
160
161 int can_use_hw_breakpoint (enum bptype, int, int) override;
57810aa7 162 bool stopped_data_address (CORE_ADDR *) override;
f6ac5f3d 163};
b5c8fcb1 164
f6ac5f3d 165static procfs_target the_procfs_target;
b5c8fcb1 166
c475f569 167#if PR_MODEL_NATIVE == PR_MODEL_LP64
77382aee
PA
168/* When GDB is built as 64-bit application on Solaris, the auxv data
169 is presented in 64-bit format. We need to provide a custom parser
170 to handle that. */
f6ac5f3d
PA
171int
172procfs_target::auxv_parse (gdb_byte **readptr,
173 gdb_byte *endptr, CORE_ADDR *typep, CORE_ADDR *valp)
c47ffbe3 174{
f5656ead 175 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
c47ffbe3
VP
176 gdb_byte *ptr = *readptr;
177
178 if (endptr == ptr)
179 return 0;
77382aee 180
c47ffbe3
VP
181 if (endptr - ptr < 8 * 2)
182 return -1;
183
e17a4113 184 *typep = extract_unsigned_integer (ptr, 4, byte_order);
c47ffbe3
VP
185 ptr += 8;
186 /* The size of data is always 64-bit. If the application is 32-bit,
187 it will be zero extended, as expected. */
e17a4113 188 *valp = extract_unsigned_integer (ptr, 8, byte_order);
c47ffbe3
VP
189 ptr += 8;
190
191 *readptr = ptr;
192 return 1;
193}
194#endif
195
c3f6f71d
JM
196/* =================== END, TARGET_OPS "MODULE" =================== */
197
77382aee
PA
198/* World Unification:
199
200 Put any typedefs, defines etc. here that are required for the
201 unification of code that handles different versions of /proc. */
c3f6f71d 202
44122162
RO
203enum { READ_WATCHFLAG = WA_READ,
204 WRITE_WATCHFLAG = WA_WRITE,
205 EXEC_WATCHFLAG = WA_EXEC,
206 AFTER_WATCHFLAG = WA_TRAPAFTER
207};
c3f6f71d
JM
208
209
210/* =================== STRUCT PROCINFO "MODULE" =================== */
211
212 /* FIXME: this comment will soon be out of date W.R.T. threads. */
213
214/* The procinfo struct is a wrapper to hold all the state information
215 concerning a /proc process. There should be exactly one procinfo
216 for each process, and since GDB currently can debug only one
217 process at a time, that means there should be only one procinfo.
218 All of the LWP's of a process can be accessed indirectly thru the
219 single process procinfo.
220
221 However, against the day when GDB may debug more than one process,
222 this data structure is kept in a list (which for now will hold no
223 more than one member), and many functions will have a pointer to a
224 procinfo as an argument.
225
226 There will be a separate procinfo structure for use by the (not yet
227 implemented) "info proc" command, so that we can print useful
228 information about any random process without interfering with the
0df8b418 229 inferior's procinfo information. */
c3f6f71d 230
c3f6f71d 231/* format strings for /proc paths */
44122162
RO
232#define MAIN_PROC_NAME_FMT "/proc/%d"
233#define CTL_PROC_NAME_FMT "/proc/%d/ctl"
234#define AS_PROC_NAME_FMT "/proc/%d/as"
235#define MAP_PROC_NAME_FMT "/proc/%d/map"
236#define STATUS_PROC_NAME_FMT "/proc/%d/status"
13db92d3 237#define MAX_PROC_NAME_SIZE sizeof("/proc/999999/lwp/0123456789/lwpstatus")
c906108c 238
c3f6f71d
JM
239typedef struct procinfo {
240 struct procinfo *next;
241 int pid; /* Process ID */
242 int tid; /* Thread/LWP id */
c906108c 243
c3f6f71d
JM
244 /* process state */
245 int was_stopped;
246 int ignore_next_sigstop;
c906108c 247
c3f6f71d 248 int ctl_fd; /* File descriptor for /proc control file */
c3f6f71d
JM
249 int status_fd; /* File descriptor for /proc status file */
250 int as_fd; /* File descriptor for /proc as file */
c906108c 251
c3f6f71d 252 char pathname[MAX_PROC_NAME_SIZE]; /* Pathname to /proc entry */
c906108c 253
c3f6f71d 254 fltset_t saved_fltset; /* Saved traced hardware fault set */
44122162
RO
255 sigset_t saved_sigset; /* Saved traced signal set */
256 sigset_t saved_sighold; /* Saved held signal set */
37de36c6
KB
257 sysset_t *saved_exitset; /* Saved traced system call exit set */
258 sysset_t *saved_entryset; /* Saved traced system call entry set */
c906108c 259
44122162 260 pstatus_t prstatus; /* Current process status info */
19958708 261
c3f6f71d 262 struct procinfo *thread_list;
c906108c 263
c3f6f71d
JM
264 int status_valid : 1;
265 int gregs_valid : 1;
266 int fpregs_valid : 1;
267 int threads_valid: 1;
268} procinfo;
c906108c 269
c3f6f71d 270static char errmsg[128]; /* shared error msg buffer */
c906108c 271
c3f6f71d 272/* Function prototypes for procinfo module: */
c906108c 273
a14ed312
KB
274static procinfo *find_procinfo_or_die (int pid, int tid);
275static procinfo *find_procinfo (int pid, int tid);
276static procinfo *create_procinfo (int pid, int tid);
44122162 277static void destroy_procinfo (procinfo *p);
44122162
RO
278static void dead_procinfo (procinfo *p, const char *msg, int killp);
279static int open_procinfo_files (procinfo *p, int which);
280static void close_procinfo_files (procinfo *p);
c906108c 281
e9ef4f39 282static int iterate_over_mappings
b8edc417
JK
283 (procinfo *pi, find_memory_region_ftype child_func, void *data,
284 int (*func) (struct prmap *map, find_memory_region_ftype child_func,
77382aee 285 void *data));
e9ef4f39 286
c3f6f71d 287/* The head of the procinfo list: */
44122162 288static procinfo *procinfo_list;
c906108c 289
77382aee
PA
290/* Search the procinfo list. Return a pointer to procinfo, or NULL if
291 not found. */
c906108c 292
19958708 293static procinfo *
fba45db2 294find_procinfo (int pid, int tid)
c5aa993b 295{
c3f6f71d 296 procinfo *pi;
c906108c 297
c3f6f71d
JM
298 for (pi = procinfo_list; pi; pi = pi->next)
299 if (pi->pid == pid)
300 break;
c906108c 301
c3f6f71d
JM
302 if (pi)
303 if (tid)
304 {
305 /* Don't check threads_valid. If we're updating the
306 thread_list, we want to find whatever threads are already
307 here. This means that in general it is the caller's
308 responsibility to check threads_valid and update before
309 calling find_procinfo, if the caller wants to find a new
77382aee 310 thread. */
c3f6f71d
JM
311
312 for (pi = pi->thread_list; pi; pi = pi->next)
313 if (pi->tid == tid)
314 break;
315 }
c906108c 316
c3f6f71d
JM
317 return pi;
318}
c906108c 319
77382aee 320/* Calls find_procinfo, but errors on failure. */
c906108c 321
c3f6f71d 322static procinfo *
fba45db2 323find_procinfo_or_die (int pid, int tid)
c3f6f71d
JM
324{
325 procinfo *pi = find_procinfo (pid, tid);
c906108c 326
c3f6f71d 327 if (pi == NULL)
0fda6bd2
JM
328 {
329 if (tid)
3e43a32a
MS
330 error (_("procfs: couldn't find pid %d "
331 "(kernel thread %d) in procinfo list."),
0fda6bd2
JM
332 pid, tid);
333 else
8a3fe4f8 334 error (_("procfs: couldn't find pid %d in procinfo list."), pid);
0fda6bd2 335 }
c3f6f71d
JM
336 return pi;
337}
c906108c 338
77382aee
PA
339/* Wrapper for `open'. The appropriate open call is attempted; if
340 unsuccessful, it will be retried as many times as needed for the
341 EAGAIN and EINTR conditions.
19958708 342
77382aee
PA
343 For other conditions, retry the open a limited number of times. In
344 addition, a short sleep is imposed prior to retrying the open. The
345 reason for this sleep is to give the kernel a chance to catch up
346 and create the file in question in the event that GDB "wins" the
347 race to open a file before the kernel has created it. */
19958708 348
4d1bcd09
KB
349static int
350open_with_retry (const char *pathname, int flags)
351{
352 int retries_remaining, status;
353
354 retries_remaining = 2;
355
356 while (1)
357 {
358 status = open (pathname, flags);
359
360 if (status >= 0 || retries_remaining == 0)
361 break;
362 else if (errno != EINTR && errno != EAGAIN)
363 {
364 retries_remaining--;
365 sleep (1);
366 }
367 }
368
369 return status;
370}
371
44122162
RO
372/* Open the file descriptor for the process or LWP. We only open the
373 control file descriptor; the others are opened lazily as needed.
77382aee 374 Returns the file descriptor, or zero for failure. */
c906108c 375
c3f6f71d 376enum { FD_CTL, FD_STATUS, FD_AS };
c906108c 377
c3f6f71d 378static int
fba45db2 379open_procinfo_files (procinfo *pi, int which)
c3f6f71d
JM
380{
381 char tmp[MAX_PROC_NAME_SIZE];
382 int fd;
383
77382aee
PA
384 /* This function is getting ALMOST long enough to break up into
385 several. Here is some rationale:
386
77382aee 387 There are several file descriptors that may need to be open
85102364 388 for any given process or LWP. The ones we're interested in are:
77382aee
PA
389 - control (ctl) write-only change the state
390 - status (status) read-only query the state
391 - address space (as) read/write access memory
392 - map (map) read-only virtual addr map
393 Most of these are opened lazily as they are needed.
394 The pathnames for the 'files' for an LWP look slightly
395 different from those of a first-class process:
396 Pathnames for a process (<proc-id>):
397 /proc/<proc-id>/ctl
398 /proc/<proc-id>/status
399 /proc/<proc-id>/as
400 /proc/<proc-id>/map
401 Pathnames for an LWP (lwp-id):
402 /proc/<proc-id>/lwp/<lwp-id>/lwpctl
403 /proc/<proc-id>/lwp/<lwp-id>/lwpstatus
404 An LWP has no map or address space file descriptor, since
44122162
RO
405 the memory map and address space are shared by all LWPs. */
406
77382aee
PA
407 /* In this case, there are several different file descriptors that
408 we might be asked to open. The control file descriptor will be
409 opened early, but the others will be opened lazily as they are
410 needed. */
c3f6f71d
JM
411
412 strcpy (tmp, pi->pathname);
0df8b418 413 switch (which) { /* Which file descriptor to open? */
c3f6f71d
JM
414 case FD_CTL:
415 if (pi->tid)
416 strcat (tmp, "/lwpctl");
417 else
418 strcat (tmp, "/ctl");
4d1bcd09 419 fd = open_with_retry (tmp, O_WRONLY);
e28cade7 420 if (fd < 0)
c3f6f71d
JM
421 return 0; /* fail */
422 pi->ctl_fd = fd;
423 break;
424 case FD_AS:
425 if (pi->tid)
0df8b418 426 return 0; /* There is no 'as' file descriptor for an lwp. */
c3f6f71d 427 strcat (tmp, "/as");
4d1bcd09 428 fd = open_with_retry (tmp, O_RDWR);
e28cade7 429 if (fd < 0)
c3f6f71d
JM
430 return 0; /* fail */
431 pi->as_fd = fd;
432 break;
433 case FD_STATUS:
434 if (pi->tid)
435 strcat (tmp, "/lwpstatus");
436 else
437 strcat (tmp, "/status");
4d1bcd09 438 fd = open_with_retry (tmp, O_RDONLY);
e28cade7 439 if (fd < 0)
c3f6f71d
JM
440 return 0; /* fail */
441 pi->status_fd = fd;
442 break;
443 default:
444 return 0; /* unknown file descriptor */
445 }
c906108c 446
c3f6f71d
JM
447 return 1; /* success */
448}
c906108c 449
77382aee
PA
450/* Allocate a data structure and link it into the procinfo list.
451 First tries to find a pre-existing one (FIXME: why?). Returns the
452 pointer to new procinfo struct. */
c906108c 453
c3f6f71d 454static procinfo *
fba45db2 455create_procinfo (int pid, int tid)
c3f6f71d 456{
0b62613e 457 procinfo *pi, *parent = NULL;
c906108c 458
c475f569
RO
459 pi = find_procinfo (pid, tid);
460 if (pi != NULL)
0df8b418 461 return pi; /* Already exists, nothing to do. */
c906108c 462
0df8b418 463 /* Find parent before doing malloc, to save having to cleanup. */
c3f6f71d
JM
464 if (tid != 0)
465 parent = find_procinfo_or_die (pid, 0); /* FIXME: should I
466 create it if it
0df8b418 467 doesn't exist yet? */
c906108c 468
8d749320 469 pi = XNEW (procinfo);
c3f6f71d
JM
470 memset (pi, 0, sizeof (procinfo));
471 pi->pid = pid;
472 pi->tid = tid;
c906108c 473
c475f569
RO
474 pi->saved_entryset = XNEW (sysset_t);
475 pi->saved_exitset = XNEW (sysset_t);
1d5e0602 476
c3f6f71d
JM
477 /* Chain into list. */
478 if (tid == 0)
479 {
c475f569 480 xsnprintf (pi->pathname, sizeof (pi->pathname), MAIN_PROC_NAME_FMT, pid);
c3f6f71d
JM
481 pi->next = procinfo_list;
482 procinfo_list = pi;
483 }
484 else
485 {
c475f569
RO
486 xsnprintf (pi->pathname, sizeof (pi->pathname), "/proc/%d/lwp/%d",
487 pid, tid);
c3f6f71d
JM
488 pi->next = parent->thread_list;
489 parent->thread_list = pi;
490 }
491 return pi;
492}
c906108c 493
77382aee 494/* Close all file descriptors associated with the procinfo. */
c906108c 495
c3f6f71d 496static void
fba45db2 497close_procinfo_files (procinfo *pi)
c3f6f71d
JM
498{
499 if (pi->ctl_fd > 0)
500 close (pi->ctl_fd);
c3f6f71d
JM
501 if (pi->as_fd > 0)
502 close (pi->as_fd);
503 if (pi->status_fd > 0)
504 close (pi->status_fd);
c3f6f71d
JM
505 pi->ctl_fd = pi->as_fd = pi->status_fd = 0;
506}
c906108c 507
77382aee 508/* Destructor function. Close, unlink and deallocate the object. */
c906108c 509
c3f6f71d 510static void
fba45db2 511destroy_one_procinfo (procinfo **list, procinfo *pi)
c3f6f71d
JM
512{
513 procinfo *ptr;
514
77382aee 515 /* Step one: unlink the procinfo from its list. */
c3f6f71d
JM
516 if (pi == *list)
517 *list = pi->next;
19958708 518 else
c3f6f71d
JM
519 for (ptr = *list; ptr; ptr = ptr->next)
520 if (ptr->next == pi)
521 {
522 ptr->next = pi->next;
523 break;
524 }
7a292a7a 525
77382aee 526 /* Step two: close any open file descriptors. */
c3f6f71d 527 close_procinfo_files (pi);
7a292a7a 528
77382aee 529 /* Step three: free the memory. */
1d5e0602
KB
530 xfree (pi->saved_entryset);
531 xfree (pi->saved_exitset);
b8c9b27d 532 xfree (pi);
c3f6f71d 533}
c906108c 534
c3f6f71d 535static void
fba45db2 536destroy_procinfo (procinfo *pi)
c3f6f71d
JM
537{
538 procinfo *tmp;
c906108c 539
0df8b418 540 if (pi->tid != 0) /* Destroy a thread procinfo. */
c3f6f71d 541 {
0df8b418 542 tmp = find_procinfo (pi->pid, 0); /* Find the parent process. */
c3f6f71d
JM
543 destroy_one_procinfo (&tmp->thread_list, pi);
544 }
0df8b418 545 else /* Destroy a process procinfo and all its threads. */
c3f6f71d
JM
546 {
547 /* First destroy the children, if any; */
548 while (pi->thread_list != NULL)
549 destroy_one_procinfo (&pi->thread_list, pi->thread_list);
550 /* Then destroy the parent. Genocide!!! */
551 destroy_one_procinfo (&procinfo_list, pi);
552 }
553}
c906108c 554
5b4cbbe3
TT
555/* A deleter that calls destroy_procinfo. */
556struct procinfo_deleter
004527cb 557{
5b4cbbe3
TT
558 void operator() (procinfo *pi) const
559 {
560 destroy_procinfo (pi);
561 }
562};
563
564typedef std::unique_ptr<procinfo, procinfo_deleter> procinfo_up;
004527cb 565
c3f6f71d 566enum { NOKILL, KILL };
c906108c 567
77382aee
PA
568/* To be called on a non_recoverable error for a procinfo. Prints
569 error messages, optionally sends a SIGKILL to the process, then
570 destroys the data structure. */
c906108c 571
c3f6f71d 572static void
995816ba 573dead_procinfo (procinfo *pi, const char *msg, int kill_p)
c3f6f71d
JM
574{
575 char procfile[80];
c906108c 576
c3f6f71d 577 if (pi->pathname)
c475f569 578 print_sys_errmsg (pi->pathname, errno);
c3f6f71d
JM
579 else
580 {
c475f569 581 xsnprintf (procfile, sizeof (procfile), "process %d", pi->pid);
c3f6f71d
JM
582 print_sys_errmsg (procfile, errno);
583 }
584 if (kill_p == KILL)
585 kill (pi->pid, SIGKILL);
c906108c 586
c3f6f71d 587 destroy_procinfo (pi);
0b62613e 588 error ("%s", msg);
c3f6f71d 589}
c906108c 590
c3f6f71d 591/* =================== END, STRUCT PROCINFO "MODULE" =================== */
c906108c 592
c3f6f71d 593/* =================== /proc "MODULE" =================== */
c906108c 594
77382aee
PA
595/* This "module" is the interface layer between the /proc system API
596 and the gdb target vector functions. This layer consists of access
597 functions that encapsulate each of the basic operations that we
598 need to use from the /proc API.
599
600 The main motivation for this layer is to hide the fact that there
601 are two very different implementations of the /proc API. Rather
602 than have a bunch of #ifdefs all thru the gdb target vector
603 functions, we do our best to hide them all in here. */
c906108c 604
44122162
RO
605static long proc_flags (procinfo *pi);
606static int proc_why (procinfo *pi);
607static int proc_what (procinfo *pi);
608static int proc_set_current_signal (procinfo *pi, int signo);
609static int proc_get_current_thread (procinfo *pi);
d3581e61 610static int proc_iterate_over_threads
44122162 611 (procinfo *pi,
d3581e61
JB
612 int (*func) (procinfo *, procinfo *, void *),
613 void *ptr);
614
615static void
995816ba 616proc_warn (procinfo *pi, const char *func, int line)
c3f6f71d 617{
c475f569
RO
618 xsnprintf (errmsg, sizeof (errmsg), "procfs: %s line %d, %s",
619 func, line, pi->pathname);
c3f6f71d
JM
620 print_sys_errmsg (errmsg, errno);
621}
c906108c 622
d3581e61 623static void
995816ba 624proc_error (procinfo *pi, const char *func, int line)
c3f6f71d 625{
c475f569
RO
626 xsnprintf (errmsg, sizeof (errmsg), "procfs: %s line %d, %s",
627 func, line, pi->pathname);
c3f6f71d
JM
628 perror_with_name (errmsg);
629}
c906108c 630
77382aee
PA
631/* Updates the status struct in the procinfo. There is a 'valid'
632 flag, to let other functions know when this function needs to be
633 called (so the status is only read when it is needed). The status
634 file descriptor is also only opened when it is needed. Returns
635 non-zero for success, zero for failure. */
c906108c 636
d3581e61 637static int
fba45db2 638proc_get_status (procinfo *pi)
c3f6f71d 639{
0df8b418 640 /* Status file descriptor is opened "lazily". */
c475f569 641 if (pi->status_fd == 0 && open_procinfo_files (pi, FD_STATUS) == 0)
c3f6f71d
JM
642 {
643 pi->status_valid = 0;
644 return 0;
645 }
c906108c 646
c3f6f71d
JM
647 if (lseek (pi->status_fd, 0, SEEK_SET) < 0)
648 pi->status_valid = 0; /* fail */
649 else
650 {
19958708 651 /* Sigh... I have to read a different data structure,
0df8b418 652 depending on whether this is a main process or an LWP. */
c3f6f71d 653 if (pi->tid)
19958708
RM
654 pi->status_valid = (read (pi->status_fd,
655 (char *) &pi->prstatus.pr_lwp,
c3f6f71d
JM
656 sizeof (lwpstatus_t))
657 == sizeof (lwpstatus_t));
658 else
659 {
19958708 660 pi->status_valid = (read (pi->status_fd,
c3f6f71d 661 (char *) &pi->prstatus,
44122162
RO
662 sizeof (pstatus_t))
663 == sizeof (pstatus_t));
c3f6f71d
JM
664 }
665 }
c906108c 666
c3f6f71d
JM
667 if (pi->status_valid)
668 {
19958708 669 PROC_PRETTYFPRINT_STATUS (proc_flags (pi),
c3f6f71d 670 proc_why (pi),
19958708 671 proc_what (pi),
c3f6f71d
JM
672 proc_get_current_thread (pi));
673 }
c906108c 674
77382aee 675 /* The status struct includes general regs, so mark them valid too. */
c3f6f71d 676 pi->gregs_valid = pi->status_valid;
77382aee
PA
677 /* In the read/write multiple-fd model, the status struct includes
678 the fp regs too, so mark them valid too. */
c3f6f71d 679 pi->fpregs_valid = pi->status_valid;
77382aee 680 return pi->status_valid; /* True if success, false if failure. */
c3f6f71d 681}
c906108c 682
77382aee 683/* Returns the process flags (pr_flags field). */
c3f6f71d 684
d3581e61 685static long
fba45db2 686proc_flags (procinfo *pi)
c3f6f71d
JM
687{
688 if (!pi->status_valid)
689 if (!proc_get_status (pi))
0df8b418 690 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 691
c3f6f71d 692 return pi->prstatus.pr_lwp.pr_flags;
c3f6f71d 693}
c906108c 694
77382aee 695/* Returns the pr_why field (why the process stopped). */
c906108c 696
d3581e61 697static int
fba45db2 698proc_why (procinfo *pi)
c3f6f71d
JM
699{
700 if (!pi->status_valid)
701 if (!proc_get_status (pi))
0df8b418 702 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 703
c3f6f71d 704 return pi->prstatus.pr_lwp.pr_why;
c3f6f71d 705}
c906108c 706
77382aee 707/* Returns the pr_what field (details of why the process stopped). */
c906108c 708
d3581e61 709static int
fba45db2 710proc_what (procinfo *pi)
c3f6f71d
JM
711{
712 if (!pi->status_valid)
713 if (!proc_get_status (pi))
0df8b418 714 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 715
c3f6f71d 716 return pi->prstatus.pr_lwp.pr_what;
c3f6f71d 717}
c906108c 718
77382aee
PA
719/* This function is only called when PI is stopped by a watchpoint.
720 Assuming the OS supports it, write to *ADDR the data address which
721 triggered it and return 1. Return 0 if it is not possible to know
722 the address. */
bf701c2c
PM
723
724static int
725proc_watchpoint_address (procinfo *pi, CORE_ADDR *addr)
726{
727 if (!pi->status_valid)
728 if (!proc_get_status (pi))
729 return 0;
730
f5656ead
TT
731 *addr = (CORE_ADDR) gdbarch_pointer_to_address (target_gdbarch (),
732 builtin_type (target_gdbarch ())->builtin_data_ptr,
bf701c2c 733 (gdb_byte *) &pi->prstatus.pr_lwp.pr_info.si_addr);
bf701c2c
PM
734 return 1;
735}
736
77382aee
PA
737/* Returns the pr_nsysarg field (number of args to the current
738 syscall). */
c3f6f71d 739
d3581e61 740static int
fba45db2 741proc_nsysarg (procinfo *pi)
c3f6f71d
JM
742{
743 if (!pi->status_valid)
744 if (!proc_get_status (pi))
745 return 0;
19958708 746
c3f6f71d 747 return pi->prstatus.pr_lwp.pr_nsysarg;
c3f6f71d 748}
c906108c 749
77382aee
PA
750/* Returns the pr_sysarg field (pointer to the arguments of current
751 syscall). */
c906108c 752
d3581e61 753static long *
fba45db2 754proc_sysargs (procinfo *pi)
c3f6f71d
JM
755{
756 if (!pi->status_valid)
757 if (!proc_get_status (pi))
758 return NULL;
19958708 759
c3f6f71d 760 return (long *) &pi->prstatus.pr_lwp.pr_sysarg;
c3f6f71d 761}
77382aee 762
44122162 763/* Set or reset any of the following process flags:
77382aee
PA
764 PR_FORK -- forked child will inherit trace flags
765 PR_RLC -- traced process runs when last /proc file closed.
766 PR_KLC -- traced process is killed when last /proc file closed.
767 PR_ASYNC -- LWP's get to run/stop independently.
768
44122162 769 This function is done using read/write [PCSET/PCRESET/PCUNSET].
77382aee
PA
770
771 Arguments:
772 pi -- the procinfo
773 flag -- one of PR_FORK, PR_RLC, or PR_ASYNC
774 mode -- 1 for set, 0 for reset.
775
776 Returns non-zero for success, zero for failure. */
c906108c 777
c3f6f71d 778enum { FLAG_RESET, FLAG_SET };
c906108c 779
c3f6f71d 780static int
fba45db2 781proc_modify_flag (procinfo *pi, long flag, long mode)
c3f6f71d
JM
782{
783 long win = 0; /* default to fail */
784
77382aee
PA
785 /* These operations affect the process as a whole, and applying them
786 to an individual LWP has the same meaning as applying them to the
787 main process. Therefore, if we're ever called with a pointer to
788 an LWP's procinfo, let's substitute the process's procinfo and
789 avoid opening the LWP's file descriptor unnecessarily. */
c3f6f71d
JM
790
791 if (pi->pid != 0)
792 pi = find_procinfo_or_die (pi->pid, 0);
793
44122162 794 procfs_ctl_t arg[2];
c5aa993b 795
44122162
RO
796 if (mode == FLAG_SET) /* Set the flag (RLC, FORK, or ASYNC). */
797 arg[0] = PCSET;
0df8b418 798 else /* Reset the flag. */
44122162
RO
799 arg[0] = PCUNSET;
800
801 arg[1] = flag;
802 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 803
77382aee
PA
804 /* The above operation renders the procinfo's cached pstatus
805 obsolete. */
c3f6f71d 806 pi->status_valid = 0;
c906108c 807
c3f6f71d 808 if (!win)
8a3fe4f8 809 warning (_("procfs: modify_flag failed to turn %s %s"),
c3f6f71d
JM
810 flag == PR_FORK ? "PR_FORK" :
811 flag == PR_RLC ? "PR_RLC" :
c3f6f71d 812 flag == PR_ASYNC ? "PR_ASYNC" :
0d06e24b 813 flag == PR_KLC ? "PR_KLC" :
c3f6f71d
JM
814 "<unknown flag>",
815 mode == FLAG_RESET ? "off" : "on");
c906108c 816
c3f6f71d
JM
817 return win;
818}
c906108c 819
77382aee
PA
820/* Set the run_on_last_close flag. Process with all threads will
821 become runnable when debugger closes all /proc fds. Returns
822 non-zero for success, zero for failure. */
c906108c 823
d3581e61 824static int
fba45db2 825proc_set_run_on_last_close (procinfo *pi)
c906108c 826{
c3f6f71d
JM
827 return proc_modify_flag (pi, PR_RLC, FLAG_SET);
828}
c906108c 829
77382aee
PA
830/* Reset the run_on_last_close flag. The process will NOT become
831 runnable when debugger closes its file handles. Returns non-zero
832 for success, zero for failure. */
c906108c 833
d3581e61 834static int
fba45db2 835proc_unset_run_on_last_close (procinfo *pi)
c3f6f71d
JM
836{
837 return proc_modify_flag (pi, PR_RLC, FLAG_RESET);
c906108c
SS
838}
839
77382aee 840/* Reset inherit_on_fork flag. If the process forks a child while we
85102364 841 are registered for events in the parent, then we will NOT receive
77382aee
PA
842 events from the child. Returns non-zero for success, zero for
843 failure. */
c906108c 844
d3581e61 845static int
fba45db2 846proc_unset_inherit_on_fork (procinfo *pi)
c3f6f71d
JM
847{
848 return proc_modify_flag (pi, PR_FORK, FLAG_RESET);
849}
c906108c 850
77382aee
PA
851/* Set PR_ASYNC flag. If one LWP stops because of a debug event
852 (signal etc.), the remaining LWPs will continue to run. Returns
853 non-zero for success, zero for failure. */
c906108c 854
d3581e61 855static int
fba45db2 856proc_set_async (procinfo *pi)
c3f6f71d
JM
857{
858 return proc_modify_flag (pi, PR_ASYNC, FLAG_SET);
859}
c906108c 860
77382aee
PA
861/* Reset PR_ASYNC flag. If one LWP stops because of a debug event
862 (signal etc.), then all other LWPs will stop as well. Returns
863 non-zero for success, zero for failure. */
c906108c 864
d3581e61 865static int
fba45db2 866proc_unset_async (procinfo *pi)
c3f6f71d
JM
867{
868 return proc_modify_flag (pi, PR_ASYNC, FLAG_RESET);
869}
c906108c 870
77382aee
PA
871/* Request the process/LWP to stop. Does not wait. Returns non-zero
872 for success, zero for failure. */
c906108c 873
d3581e61 874static int
fba45db2 875proc_stop_process (procinfo *pi)
c3f6f71d
JM
876{
877 int win;
c906108c 878
77382aee
PA
879 /* We might conceivably apply this operation to an LWP, and the
880 LWP's ctl file descriptor might not be open. */
c906108c 881
c475f569 882 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c3f6f71d
JM
883 return 0;
884 else
885 {
37de36c6 886 procfs_ctl_t cmd = PCSTOP;
f4a14ae6 887
c3f6f71d 888 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d 889 }
c906108c 890
c3f6f71d
JM
891 return win;
892}
c5aa993b 893
77382aee
PA
894/* Wait for the process or LWP to stop (block until it does). Returns
895 non-zero for success, zero for failure. */
c906108c 896
d3581e61 897static int
fba45db2 898proc_wait_for_stop (procinfo *pi)
c906108c 899{
c3f6f71d
JM
900 int win;
901
77382aee
PA
902 /* We should never have to apply this operation to any procinfo
903 except the one for the main process. If that ever changes for
904 any reason, then take out the following clause and replace it
905 with one that makes sure the ctl_fd is open. */
19958708 906
c3f6f71d
JM
907 if (pi->tid != 0)
908 pi = find_procinfo_or_die (pi->pid, 0);
909
44122162 910 procfs_ctl_t cmd = PCWSTOP;
f4a14ae6 911
92137da0
RO
912 set_sigint_trap ();
913
44122162 914 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
92137da0
RO
915
916 clear_sigint_trap ();
917
44122162
RO
918 /* We been runnin' and we stopped -- need to update status. */
919 pi->status_valid = 0;
c906108c 920
c3f6f71d 921 return win;
c906108c
SS
922}
923
77382aee
PA
924/* Make the process or LWP runnable.
925
926 Options (not all are implemented):
927 - single-step
928 - clear current fault
929 - clear current signal
930 - abort the current system call
931 - stop as soon as finished with system call
932 - (ioctl): set traced signal set
933 - (ioctl): set held signal set
934 - (ioctl): set traced fault set
935 - (ioctl): set start pc (vaddr)
936
937 Always clears the current fault. PI is the process or LWP to
938 operate on. If STEP is true, set the process or LWP to trap after
939 one instruction. If SIGNO is zero, clear the current signal if
940 any; if non-zero, set the current signal to this one. Returns
941 non-zero for success, zero for failure. */
c3f6f71d 942
d3581e61 943static int
fba45db2 944proc_run_process (procinfo *pi, int step, int signo)
c3f6f71d
JM
945{
946 int win;
947 int runflags;
948
77382aee
PA
949 /* We will probably have to apply this operation to individual
950 threads, so make sure the control file descriptor is open. */
19958708 951
c475f569
RO
952 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
953 return 0;
c906108c 954
0df8b418 955 runflags = PRCFAULT; /* Always clear current fault. */
c3f6f71d
JM
956 if (step)
957 runflags |= PRSTEP;
958 if (signo == 0)
959 runflags |= PRCSIG;
0df8b418 960 else if (signo != -1) /* -1 means do nothing W.R.T. signals. */
c3f6f71d 961 proc_set_current_signal (pi, signo);
c5aa993b 962
44122162 963 procfs_ctl_t cmd[2];
c906108c 964
44122162
RO
965 cmd[0] = PCRUN;
966 cmd[1] = runflags;
967 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c906108c 968
c3f6f71d
JM
969 return win;
970}
c906108c 971
77382aee
PA
972/* Register to trace signals in the process or LWP. Returns non-zero
973 for success, zero for failure. */
c906108c 974
d3581e61 975static int
44122162 976proc_set_traced_signals (procinfo *pi, sigset_t *sigset)
c906108c 977{
c3f6f71d
JM
978 int win;
979
77382aee
PA
980 /* We should never have to apply this operation to any procinfo
981 except the one for the main process. If that ever changes for
982 any reason, then take out the following clause and replace it
983 with one that makes sure the ctl_fd is open. */
19958708 984
c3f6f71d
JM
985 if (pi->tid != 0)
986 pi = find_procinfo_or_die (pi->pid, 0);
987
44122162
RO
988 struct {
989 procfs_ctl_t cmd;
990 /* Use char array to avoid alignment issues. */
991 char sigset[sizeof (sigset_t)];
992 } arg;
c906108c 993
44122162
RO
994 arg.cmd = PCSTRACE;
995 memcpy (&arg.sigset, sigset, sizeof (sigset_t));
996
997 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 998
0df8b418 999 /* The above operation renders the procinfo's cached pstatus obsolete. */
c3f6f71d 1000 pi->status_valid = 0;
c906108c 1001
c3f6f71d 1002 if (!win)
8a3fe4f8 1003 warning (_("procfs: set_traced_signals failed"));
c3f6f71d 1004 return win;
c906108c
SS
1005}
1006
77382aee
PA
1007/* Register to trace hardware faults in the process or LWP. Returns
1008 non-zero for success, zero for failure. */
c906108c 1009
d3581e61 1010static int
fba45db2 1011proc_set_traced_faults (procinfo *pi, fltset_t *fltset)
c3f6f71d
JM
1012{
1013 int win;
1014
77382aee
PA
1015 /* We should never have to apply this operation to any procinfo
1016 except the one for the main process. If that ever changes for
1017 any reason, then take out the following clause and replace it
1018 with one that makes sure the ctl_fd is open. */
19958708 1019
c3f6f71d
JM
1020 if (pi->tid != 0)
1021 pi = find_procinfo_or_die (pi->pid, 0);
1022
44122162
RO
1023 struct {
1024 procfs_ctl_t cmd;
1025 /* Use char array to avoid alignment issues. */
1026 char fltset[sizeof (fltset_t)];
1027 } arg;
1028
1029 arg.cmd = PCSFAULT;
1030 memcpy (&arg.fltset, fltset, sizeof (fltset_t));
c906108c 1031
44122162 1032 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1033
0df8b418 1034 /* The above operation renders the procinfo's cached pstatus obsolete. */
c3f6f71d 1035 pi->status_valid = 0;
c906108c 1036
c3f6f71d
JM
1037 return win;
1038}
c5aa993b 1039
77382aee
PA
1040/* Register to trace entry to system calls in the process or LWP.
1041 Returns non-zero for success, zero for failure. */
c906108c 1042
d3581e61 1043static int
fba45db2 1044proc_set_traced_sysentry (procinfo *pi, sysset_t *sysset)
c906108c 1045{
c3f6f71d
JM
1046 int win;
1047
77382aee
PA
1048 /* We should never have to apply this operation to any procinfo
1049 except the one for the main process. If that ever changes for
1050 any reason, then take out the following clause and replace it
1051 with one that makes sure the ctl_fd is open. */
19958708 1052
c3f6f71d
JM
1053 if (pi->tid != 0)
1054 pi = find_procinfo_or_die (pi->pid, 0);
1055
c475f569 1056 struct {
44122162
RO
1057 procfs_ctl_t cmd;
1058 /* Use char array to avoid alignment issues. */
1059 char sysset[sizeof (sysset_t)];
c475f569 1060 } arg;
c3f6f71d 1061
c475f569
RO
1062 arg.cmd = PCSENTRY;
1063 memcpy (&arg.sysset, sysset, sizeof (sysset_t));
44122162 1064
c475f569 1065 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
37de36c6 1066
77382aee
PA
1067 /* The above operation renders the procinfo's cached pstatus
1068 obsolete. */
c3f6f71d 1069 pi->status_valid = 0;
19958708 1070
c3f6f71d 1071 return win;
c906108c
SS
1072}
1073
77382aee
PA
1074/* Register to trace exit from system calls in the process or LWP.
1075 Returns non-zero for success, zero for failure. */
c906108c 1076
d3581e61 1077static int
fba45db2 1078proc_set_traced_sysexit (procinfo *pi, sysset_t *sysset)
c3f6f71d
JM
1079{
1080 int win;
1081
77382aee
PA
1082 /* We should never have to apply this operation to any procinfo
1083 except the one for the main process. If that ever changes for
1084 any reason, then take out the following clause and replace it
1085 with one that makes sure the ctl_fd is open. */
19958708 1086
c3f6f71d
JM
1087 if (pi->tid != 0)
1088 pi = find_procinfo_or_die (pi->pid, 0);
1089
44122162
RO
1090 struct gdb_proc_ctl_pcsexit {
1091 procfs_ctl_t cmd;
1092 /* Use char array to avoid alignment issues. */
1093 char sysset[sizeof (sysset_t)];
c475f569 1094 } arg;
c906108c 1095
c475f569
RO
1096 arg.cmd = PCSEXIT;
1097 memcpy (&arg.sysset, sysset, sizeof (sysset_t));
c906108c 1098
c475f569 1099 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
37de36c6 1100
77382aee
PA
1101 /* The above operation renders the procinfo's cached pstatus
1102 obsolete. */
c3f6f71d 1103 pi->status_valid = 0;
c906108c 1104
c3f6f71d
JM
1105 return win;
1106}
c906108c 1107
77382aee
PA
1108/* Specify the set of blocked / held signals in the process or LWP.
1109 Returns non-zero for success, zero for failure. */
c906108c 1110
d3581e61 1111static int
44122162 1112proc_set_held_signals (procinfo *pi, sigset_t *sighold)
c906108c 1113{
c3f6f71d
JM
1114 int win;
1115
77382aee
PA
1116 /* We should never have to apply this operation to any procinfo
1117 except the one for the main process. If that ever changes for
1118 any reason, then take out the following clause and replace it
1119 with one that makes sure the ctl_fd is open. */
19958708 1120
c3f6f71d
JM
1121 if (pi->tid != 0)
1122 pi = find_procinfo_or_die (pi->pid, 0);
1123
44122162
RO
1124 struct {
1125 procfs_ctl_t cmd;
1126 /* Use char array to avoid alignment issues. */
1127 char hold[sizeof (sigset_t)];
1128 } arg;
1129
1130 arg.cmd = PCSHOLD;
1131 memcpy (&arg.hold, sighold, sizeof (sigset_t));
1132 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
1133
77382aee
PA
1134 /* The above operation renders the procinfo's cached pstatus
1135 obsolete. */
c3f6f71d
JM
1136 pi->status_valid = 0;
1137
1138 return win;
c906108c
SS
1139}
1140
77382aee
PA
1141/* Returns the set of signals that are held / blocked. Will also copy
1142 the sigset if SAVE is non-zero. */
c906108c 1143
44122162
RO
1144static sigset_t *
1145proc_get_held_signals (procinfo *pi, sigset_t *save)
c906108c 1146{
44122162 1147 sigset_t *ret = NULL;
c3f6f71d 1148
77382aee
PA
1149 /* We should never have to apply this operation to any procinfo
1150 except the one for the main process. If that ever changes for
1151 any reason, then take out the following clause and replace it
1152 with one that makes sure the ctl_fd is open. */
19958708 1153
c3f6f71d
JM
1154 if (pi->tid != 0)
1155 pi = find_procinfo_or_die (pi->pid, 0);
1156
c3f6f71d
JM
1157 if (!pi->status_valid)
1158 if (!proc_get_status (pi))
1159 return NULL;
1160
c3f6f71d 1161 ret = &pi->prstatus.pr_lwp.pr_lwphold;
c3f6f71d 1162 if (save && ret)
44122162 1163 memcpy (save, ret, sizeof (sigset_t));
c3f6f71d
JM
1164
1165 return ret;
c906108c
SS
1166}
1167
77382aee
PA
1168/* Returns the set of signals that are traced / debugged. Will also
1169 copy the sigset if SAVE is non-zero. */
c3f6f71d 1170
44122162
RO
1171static sigset_t *
1172proc_get_traced_signals (procinfo *pi, sigset_t *save)
c906108c 1173{
44122162 1174 sigset_t *ret = NULL;
c3f6f71d 1175
77382aee
PA
1176 /* We should never have to apply this operation to any procinfo
1177 except the one for the main process. If that ever changes for
1178 any reason, then take out the following clause and replace it
1179 with one that makes sure the ctl_fd is open. */
19958708 1180
c3f6f71d
JM
1181 if (pi->tid != 0)
1182 pi = find_procinfo_or_die (pi->pid, 0);
1183
c3f6f71d
JM
1184 if (!pi->status_valid)
1185 if (!proc_get_status (pi))
1186 return NULL;
1187
1188 ret = &pi->prstatus.pr_sigtrace;
c3f6f71d 1189 if (save && ret)
44122162 1190 memcpy (save, ret, sizeof (sigset_t));
c906108c 1191
c3f6f71d
JM
1192 return ret;
1193}
c906108c 1194
77382aee
PA
1195/* Returns the set of hardware faults that are traced /debugged. Will
1196 also copy the faultset if SAVE is non-zero. */
c3f6f71d 1197
d3581e61 1198static fltset_t *
fba45db2 1199proc_get_traced_faults (procinfo *pi, fltset_t *save)
c3f6f71d
JM
1200{
1201 fltset_t *ret = NULL;
1202
77382aee
PA
1203 /* We should never have to apply this operation to any procinfo
1204 except the one for the main process. If that ever changes for
1205 any reason, then take out the following clause and replace it
1206 with one that makes sure the ctl_fd is open. */
19958708 1207
c3f6f71d
JM
1208 if (pi->tid != 0)
1209 pi = find_procinfo_or_die (pi->pid, 0);
1210
c3f6f71d
JM
1211 if (!pi->status_valid)
1212 if (!proc_get_status (pi))
1213 return NULL;
1214
1215 ret = &pi->prstatus.pr_flttrace;
c3f6f71d
JM
1216 if (save && ret)
1217 memcpy (save, ret, sizeof (fltset_t));
c906108c 1218
c3f6f71d
JM
1219 return ret;
1220}
c906108c 1221
77382aee
PA
1222/* Returns the set of syscalls that are traced /debugged on entry.
1223 Will also copy the syscall set if SAVE is non-zero. */
c906108c 1224
d3581e61 1225static sysset_t *
fba45db2 1226proc_get_traced_sysentry (procinfo *pi, sysset_t *save)
c3f6f71d
JM
1227{
1228 sysset_t *ret = NULL;
1229
77382aee
PA
1230 /* We should never have to apply this operation to any procinfo
1231 except the one for the main process. If that ever changes for
1232 any reason, then take out the following clause and replace it
1233 with one that makes sure the ctl_fd is open. */
19958708 1234
c3f6f71d
JM
1235 if (pi->tid != 0)
1236 pi = find_procinfo_or_die (pi->pid, 0);
1237
c3f6f71d
JM
1238 if (!pi->status_valid)
1239 if (!proc_get_status (pi))
1240 return NULL;
1241
1242 ret = &pi->prstatus.pr_sysentry;
c3f6f71d 1243 if (save && ret)
44122162 1244 memcpy (save, ret, sizeof (sysset_t));
c906108c 1245
c3f6f71d
JM
1246 return ret;
1247}
c5aa993b 1248
77382aee
PA
1249/* Returns the set of syscalls that are traced /debugged on exit.
1250 Will also copy the syscall set if SAVE is non-zero. */
c906108c 1251
d3581e61 1252static sysset_t *
fba45db2 1253proc_get_traced_sysexit (procinfo *pi, sysset_t *save)
c906108c 1254{
44122162 1255 sysset_t *ret = NULL;
c3f6f71d 1256
77382aee
PA
1257 /* We should never have to apply this operation to any procinfo
1258 except the one for the main process. If that ever changes for
1259 any reason, then take out the following clause and replace it
1260 with one that makes sure the ctl_fd is open. */
19958708 1261
c3f6f71d
JM
1262 if (pi->tid != 0)
1263 pi = find_procinfo_or_die (pi->pid, 0);
1264
c3f6f71d
JM
1265 if (!pi->status_valid)
1266 if (!proc_get_status (pi))
1267 return NULL;
1268
1269 ret = &pi->prstatus.pr_sysexit;
c3f6f71d 1270 if (save && ret)
44122162 1271 memcpy (save, ret, sizeof (sysset_t));
c3f6f71d
JM
1272
1273 return ret;
1274}
c906108c 1275
77382aee
PA
1276/* The current fault (if any) is cleared; the associated signal will
1277 not be sent to the process or LWP when it resumes. Returns
1278 non-zero for success, zero for failure. */
c906108c 1279
d3581e61 1280static int
fba45db2 1281proc_clear_current_fault (procinfo *pi)
c3f6f71d
JM
1282{
1283 int win;
1284
77382aee
PA
1285 /* We should never have to apply this operation to any procinfo
1286 except the one for the main process. If that ever changes for
1287 any reason, then take out the following clause and replace it
1288 with one that makes sure the ctl_fd is open. */
19958708 1289
c3f6f71d
JM
1290 if (pi->tid != 0)
1291 pi = find_procinfo_or_die (pi->pid, 0);
1292
44122162 1293 procfs_ctl_t cmd = PCCFAULT;
f4a14ae6 1294
44122162 1295 win = (write (pi->ctl_fd, (void *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d
JM
1296
1297 return win;
c906108c
SS
1298}
1299
77382aee
PA
1300/* Set the "current signal" that will be delivered next to the
1301 process. NOTE: semantics are different from those of KILL. This
1302 signal will be delivered to the process or LWP immediately when it
1303 is resumed (even if the signal is held/blocked); it will NOT
1304 immediately cause another event of interest, and will NOT first
1305 trap back to the debugger. Returns non-zero for success, zero for
1306 failure. */
c3f6f71d 1307
d3581e61 1308static int
fba45db2 1309proc_set_current_signal (procinfo *pi, int signo)
c3f6f71d
JM
1310{
1311 int win;
1312 struct {
37de36c6 1313 procfs_ctl_t cmd;
c3f6f71d 1314 /* Use char array to avoid alignment issues. */
44122162 1315 char sinfo[sizeof (siginfo_t)];
c3f6f71d 1316 } arg;
44122162 1317 siginfo_t mysinfo;
c162e8c9
JM
1318 ptid_t wait_ptid;
1319 struct target_waitstatus wait_status;
c3f6f71d 1320
77382aee
PA
1321 /* We should never have to apply this operation to any procinfo
1322 except the one for the main process. If that ever changes for
1323 any reason, then take out the following clause and replace it
1324 with one that makes sure the ctl_fd is open. */
19958708 1325
c3f6f71d
JM
1326 if (pi->tid != 0)
1327 pi = find_procinfo_or_die (pi->pid, 0);
1328
c3f6f71d 1329 /* The pointer is just a type alias. */
c162e8c9 1330 get_last_target_status (&wait_ptid, &wait_status);
d7e15655 1331 if (wait_ptid == inferior_ptid
c162e8c9 1332 && wait_status.kind == TARGET_WAITKIND_STOPPED
2ea28649 1333 && wait_status.value.sig == gdb_signal_from_host (signo)
c162e8c9 1334 && proc_get_status (pi)
c162e8c9 1335 && pi->prstatus.pr_lwp.pr_info.si_signo == signo
c162e8c9
JM
1336 )
1337 /* Use the siginfo associated with the signal being
1338 redelivered. */
44122162 1339 memcpy (arg.sinfo, &pi->prstatus.pr_lwp.pr_info, sizeof (siginfo_t));
c162e8c9
JM
1340 else
1341 {
73930d4d
KH
1342 mysinfo.si_signo = signo;
1343 mysinfo.si_code = 0;
1344 mysinfo.si_pid = getpid (); /* ?why? */
1345 mysinfo.si_uid = getuid (); /* ?why? */
44122162 1346 memcpy (arg.sinfo, &mysinfo, sizeof (siginfo_t));
c162e8c9 1347 }
c3f6f71d 1348
c3f6f71d
JM
1349 arg.cmd = PCSSIG;
1350 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1351
c3f6f71d
JM
1352 return win;
1353}
c906108c 1354
77382aee
PA
1355/* The current signal (if any) is cleared, and is not sent to the
1356 process or LWP when it resumes. Returns non-zero for success, zero
1357 for failure. */
c906108c 1358
d3581e61 1359static int
fba45db2 1360proc_clear_current_signal (procinfo *pi)
c3f6f71d
JM
1361{
1362 int win;
1363
77382aee
PA
1364 /* We should never have to apply this operation to any procinfo
1365 except the one for the main process. If that ever changes for
1366 any reason, then take out the following clause and replace it
1367 with one that makes sure the ctl_fd is open. */
19958708 1368
c3f6f71d
JM
1369 if (pi->tid != 0)
1370 pi = find_procinfo_or_die (pi->pid, 0);
1371
44122162
RO
1372 struct {
1373 procfs_ctl_t cmd;
1374 /* Use char array to avoid alignment issues. */
1375 char sinfo[sizeof (siginfo_t)];
1376 } arg;
1377 siginfo_t mysinfo;
1378
1379 arg.cmd = PCSSIG;
1380 /* The pointer is just a type alias. */
1381 mysinfo.si_signo = 0;
1382 mysinfo.si_code = 0;
1383 mysinfo.si_errno = 0;
1384 mysinfo.si_pid = getpid (); /* ?why? */
1385 mysinfo.si_uid = getuid (); /* ?why? */
1386 memcpy (arg.sinfo, &mysinfo, sizeof (siginfo_t));
1387
1388 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1389
c3f6f71d
JM
1390 return win;
1391}
c906108c 1392
772cf8be
MK
1393/* Return the general-purpose registers for the process or LWP
1394 corresponding to PI. Upon failure, return NULL. */
c906108c 1395
d3581e61 1396static gdb_gregset_t *
fba45db2 1397proc_get_gregs (procinfo *pi)
c3f6f71d
JM
1398{
1399 if (!pi->status_valid || !pi->gregs_valid)
1400 if (!proc_get_status (pi))
1401 return NULL;
1402
c3f6f71d 1403 return &pi->prstatus.pr_lwp.pr_reg;
c3f6f71d 1404}
c5aa993b 1405
772cf8be
MK
1406/* Return the general-purpose registers for the process or LWP
1407 corresponding to PI. Upon failure, return NULL. */
c906108c 1408
d3581e61 1409static gdb_fpregset_t *
fba45db2 1410proc_get_fpregs (procinfo *pi)
c906108c 1411{
c3f6f71d
JM
1412 if (!pi->status_valid || !pi->fpregs_valid)
1413 if (!proc_get_status (pi))
1414 return NULL;
1415
c3f6f71d 1416 return &pi->prstatus.pr_lwp.pr_fpreg;
c906108c
SS
1417}
1418
772cf8be
MK
1419/* Write the general-purpose registers back to the process or LWP
1420 corresponding to PI. Return non-zero for success, zero for
1421 failure. */
c3f6f71d 1422
d3581e61 1423static int
fba45db2 1424proc_set_gregs (procinfo *pi)
c906108c 1425{
c3f6f71d
JM
1426 gdb_gregset_t *gregs;
1427 int win;
c5aa993b 1428
772cf8be
MK
1429 gregs = proc_get_gregs (pi);
1430 if (gregs == NULL)
1431 return 0; /* proc_get_regs has already warned. */
c3f6f71d 1432
772cf8be 1433 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c475f569 1434 return 0;
c3f6f71d 1435 else
c906108c 1436 {
c3f6f71d 1437 struct {
37de36c6 1438 procfs_ctl_t cmd;
c3f6f71d
JM
1439 /* Use char array to avoid alignment issues. */
1440 char gregs[sizeof (gdb_gregset_t)];
1441 } arg;
1442
772cf8be 1443 arg.cmd = PCSREG;
c3f6f71d
JM
1444 memcpy (&arg.gregs, gregs, sizeof (arg.gregs));
1445 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1446 }
c3f6f71d 1447
772cf8be 1448 /* Policy: writing the registers invalidates our cache. */
c3f6f71d
JM
1449 pi->gregs_valid = 0;
1450 return win;
c906108c
SS
1451}
1452
772cf8be
MK
1453/* Write the floating-pointer registers back to the process or LWP
1454 corresponding to PI. Return non-zero for success, zero for
1455 failure. */
c3f6f71d 1456
d3581e61 1457static int
fba45db2 1458proc_set_fpregs (procinfo *pi)
c906108c 1459{
c3f6f71d
JM
1460 gdb_fpregset_t *fpregs;
1461 int win;
1462
772cf8be
MK
1463 fpregs = proc_get_fpregs (pi);
1464 if (fpregs == NULL)
1465 return 0; /* proc_get_fpregs has already warned. */
c5aa993b 1466
772cf8be 1467 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c475f569 1468 return 0;
c3f6f71d 1469 else
c906108c 1470 {
c3f6f71d 1471 struct {
37de36c6 1472 procfs_ctl_t cmd;
c3f6f71d
JM
1473 /* Use char array to avoid alignment issues. */
1474 char fpregs[sizeof (gdb_fpregset_t)];
1475 } arg;
1476
772cf8be 1477 arg.cmd = PCSFPREG;
c3f6f71d
JM
1478 memcpy (&arg.fpregs, fpregs, sizeof (arg.fpregs));
1479 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1480 }
c3f6f71d 1481
772cf8be 1482 /* Policy: writing the registers invalidates our cache. */
c3f6f71d
JM
1483 pi->fpregs_valid = 0;
1484 return win;
c906108c
SS
1485}
1486
77382aee
PA
1487/* Send a signal to the proc or lwp with the semantics of "kill()".
1488 Returns non-zero for success, zero for failure. */
c906108c 1489
d3581e61 1490static int
fba45db2 1491proc_kill (procinfo *pi, int signo)
c3f6f71d
JM
1492{
1493 int win;
c906108c 1494
77382aee
PA
1495 /* We might conceivably apply this operation to an LWP, and the
1496 LWP's ctl file descriptor might not be open. */
c906108c 1497
c475f569
RO
1498 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
1499 return 0;
c3f6f71d
JM
1500 else
1501 {
37de36c6 1502 procfs_ctl_t cmd[2];
c906108c 1503
c3f6f71d
JM
1504 cmd[0] = PCKILL;
1505 cmd[1] = signo;
1506 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d 1507 }
c906108c 1508
c3f6f71d
JM
1509 return win;
1510}
c906108c 1511
77382aee
PA
1512/* Find the pid of the process that started this one. Returns the
1513 parent process pid, or zero. */
c906108c 1514
d3581e61 1515static int
fba45db2 1516proc_parent_pid (procinfo *pi)
c906108c 1517{
77382aee
PA
1518 /* We should never have to apply this operation to any procinfo
1519 except the one for the main process. If that ever changes for
1520 any reason, then take out the following clause and replace it
1521 with one that makes sure the ctl_fd is open. */
19958708 1522
c3f6f71d
JM
1523 if (pi->tid != 0)
1524 pi = find_procinfo_or_die (pi->pid, 0);
1525
1526 if (!pi->status_valid)
1527 if (!proc_get_status (pi))
1528 return 0;
c5aa993b 1529
c3f6f71d
JM
1530 return pi->prstatus.pr_ppid;
1531}
1532
9a043c1d
AC
1533/* Convert a target address (a.k.a. CORE_ADDR) into a host address
1534 (a.k.a void pointer)! */
1535
1536static void *
1537procfs_address_to_host_pointer (CORE_ADDR addr)
1538{
f5656ead 1539 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
9a043c1d
AC
1540 void *ptr;
1541
4e906f53 1542 gdb_assert (sizeof (ptr) == TYPE_LENGTH (ptr_type));
f5656ead 1543 gdbarch_address_to_pointer (target_gdbarch (), ptr_type,
0b62613e 1544 (gdb_byte *) &ptr, addr);
9a043c1d
AC
1545 return ptr;
1546}
1547
a0911fd0 1548static int
fba45db2 1549proc_set_watchpoint (procinfo *pi, CORE_ADDR addr, int len, int wflags)
c3f6f71d 1550{
c3f6f71d 1551 struct {
37de36c6 1552 procfs_ctl_t cmd;
c3f6f71d
JM
1553 char watch[sizeof (prwatch_t)];
1554 } arg;
73930d4d 1555 prwatch_t pwatch;
c3f6f71d 1556
9a043c1d
AC
1557 /* NOTE: cagney/2003-02-01: Even more horrible hack. Need to
1558 convert a target address into something that can be stored in a
1559 native data structure. */
73930d4d 1560 pwatch.pr_vaddr = (uintptr_t) procfs_address_to_host_pointer (addr);
73930d4d
KH
1561 pwatch.pr_size = len;
1562 pwatch.pr_wflags = wflags;
c3f6f71d 1563 arg.cmd = PCWATCH;
73930d4d 1564 memcpy (arg.watch, &pwatch, sizeof (prwatch_t));
c3f6f71d 1565 return (write (pi->ctl_fd, &arg, sizeof (arg)) == sizeof (arg));
c906108c
SS
1566}
1567
965b60ee 1568#if (defined(__i386__) || defined(__x86_64__)) && defined (sun)
c906108c 1569
c3f6f71d 1570#include <sys/sysi86.h>
c906108c 1571
77382aee
PA
1572/* The KEY is actually the value of the lower 16 bits of the GS
1573 register for the LWP that we're interested in. Returns the
1574 matching ssh struct (LDT entry). */
c906108c 1575
337c776f 1576static struct ssd *
c475f569 1577proc_get_LDT_entry (procinfo *pi, int key) /* ARI: editCase function */
c906108c 1578{
c3f6f71d 1579 static struct ssd *ldt_entry = NULL;
c3f6f71d 1580 char pathname[MAX_PROC_NAME_SIZE];
c3f6f71d
JM
1581
1582 /* Allocate space for one LDT entry.
1583 This alloc must persist, because we return a pointer to it. */
1584 if (ldt_entry == NULL)
8d749320 1585 ldt_entry = XNEW (struct ssd);
c3f6f71d
JM
1586
1587 /* Open the file descriptor for the LDT table. */
c475f569 1588 xsnprintf (pathname, sizeof (pathname), "/proc/%d/ldt", pi->pid);
5dc1a704
TT
1589 scoped_fd fd (open_with_retry (pathname, O_RDONLY));
1590 if (fd.get () < 0)
c906108c 1591 {
c3f6f71d
JM
1592 proc_warn (pi, "proc_get_LDT_entry (open)", __LINE__);
1593 return NULL;
c906108c
SS
1594 }
1595
c3f6f71d 1596 /* Now 'read' thru the table, find a match and return it. */
5dc1a704
TT
1597 while (read (fd.get (), ldt_entry, sizeof (struct ssd))
1598 == sizeof (struct ssd))
c906108c 1599 {
c475f569
RO
1600 if (ldt_entry->sel == 0
1601 && ldt_entry->bo == 0
1602 && ldt_entry->acc1 == 0
1603 && ldt_entry->acc2 == 0)
c3f6f71d 1604 break; /* end of table */
0df8b418 1605 /* If key matches, return this entry. */
c3f6f71d 1606 if (ldt_entry->sel == key)
70b33f19 1607 return ldt_entry;
c906108c 1608 }
0df8b418 1609 /* Loop ended, match not found. */
c3f6f71d 1610 return NULL;
c3f6f71d 1611}
c906108c 1612
77382aee 1613/* Returns the pointer to the LDT entry of PTID. */
965b60ee
JB
1614
1615struct ssd *
c475f569 1616procfs_find_LDT_entry (ptid_t ptid) /* ARI: editCase function */
965b60ee
JB
1617{
1618 gdb_gregset_t *gregs;
1619 int key;
1620 procinfo *pi;
1621
0df8b418 1622 /* Find procinfo for the lwp. */
c475f569
RO
1623 pi = find_procinfo (ptid.pid (), ptid.lwp ());
1624 if (pi == NULL)
965b60ee 1625 {
0b62613e 1626 warning (_("procfs_find_LDT_entry: could not find procinfo for %d:%ld."),
e38504b3 1627 ptid.pid (), ptid.lwp ());
965b60ee
JB
1628 return NULL;
1629 }
0df8b418 1630 /* get its general registers. */
c475f569
RO
1631 gregs = proc_get_gregs (pi);
1632 if (gregs == NULL)
965b60ee 1633 {
0b62613e 1634 warning (_("procfs_find_LDT_entry: could not read gregs for %d:%ld."),
e38504b3 1635 ptid.pid (), ptid.lwp ());
965b60ee
JB
1636 return NULL;
1637 }
0df8b418 1638 /* Now extract the GS register's lower 16 bits. */
965b60ee
JB
1639 key = (*gregs)[GS] & 0xffff;
1640
0df8b418 1641 /* Find the matching entry and return it. */
965b60ee
JB
1642 return proc_get_LDT_entry (pi, key);
1643}
1644
1645#endif
c906108c 1646
c3f6f71d 1647/* =============== END, non-thread part of /proc "MODULE" =============== */
c906108c 1648
c3f6f71d 1649/* =================== Thread "MODULE" =================== */
c906108c 1650
44122162
RO
1651/* NOTE: you'll see more ifdefs and duplication of functions here,
1652 since there is a different way to do threads on every OS. */
c906108c 1653
44122162 1654/* Returns the number of threads for the process. */
c906108c 1655
d3581e61 1656static int
fba45db2 1657proc_get_nthreads (procinfo *pi)
c906108c 1658{
c3f6f71d
JM
1659 if (!pi->status_valid)
1660 if (!proc_get_status (pi))
1661 return 0;
c5aa993b 1662
44122162
RO
1663 /* Only works for the process procinfo, because the LWP procinfos do not
1664 get prstatus filled in. */
0df8b418 1665 if (pi->tid != 0) /* Find the parent process procinfo. */
c3f6f71d 1666 pi = find_procinfo_or_die (pi->pid, 0);
c3f6f71d 1667 return pi->prstatus.pr_nlwp;
c906108c
SS
1668}
1669
77382aee
PA
1670/* LWP version.
1671
1672 Return the ID of the thread that had an event of interest.
1673 (ie. the one that hit a breakpoint or other traced event). All
1674 other things being equal, this should be the ID of a thread that is
1675 currently executing. */
c3f6f71d 1676
d3581e61 1677static int
fba45db2 1678proc_get_current_thread (procinfo *pi)
c3f6f71d 1679{
77382aee
PA
1680 /* Note: this should be applied to the root procinfo for the
1681 process, not to the procinfo for an LWP. If applied to the
1682 procinfo for an LWP, it will simply return that LWP's ID. In
1683 that case, find the parent process procinfo. */
19958708 1684
c3f6f71d
JM
1685 if (pi->tid != 0)
1686 pi = find_procinfo_or_die (pi->pid, 0);
1687
1688 if (!pi->status_valid)
1689 if (!proc_get_status (pi))
1690 return 0;
1691
c3f6f71d 1692 return pi->prstatus.pr_lwp.pr_lwpid;
c3f6f71d
JM
1693}
1694
77382aee
PA
1695/* Discover the IDs of all the threads within the process, and create
1696 a procinfo for each of them (chained to the parent). This
1697 unfortunately requires a different method on every OS. Returns
1698 non-zero for success, zero for failure. */
c906108c 1699
a0911fd0 1700static int
fba45db2 1701proc_delete_dead_threads (procinfo *parent, procinfo *thread, void *ignore)
c3f6f71d
JM
1702{
1703 if (thread && parent) /* sanity */
c906108c 1704 {
c3f6f71d
JM
1705 thread->status_valid = 0;
1706 if (!proc_get_status (thread))
1707 destroy_one_procinfo (&parent->thread_list, thread);
1708 }
1709 return 0; /* keep iterating */
1710}
c5aa993b 1711
d3581e61 1712static int
fba45db2 1713proc_update_threads (procinfo *pi)
c3f6f71d
JM
1714{
1715 char pathname[MAX_PROC_NAME_SIZE + 16];
1716 struct dirent *direntry;
c3f6f71d 1717 procinfo *thread;
f0b3976b 1718 gdb_dir_up dirp;
c3f6f71d
JM
1719 int lwpid;
1720
77382aee
PA
1721 /* We should never have to apply this operation to any procinfo
1722 except the one for the main process. If that ever changes for
1723 any reason, then take out the following clause and replace it
1724 with one that makes sure the ctl_fd is open. */
19958708 1725
c3f6f71d
JM
1726 if (pi->tid != 0)
1727 pi = find_procinfo_or_die (pi->pid, 0);
1728
1729 proc_iterate_over_threads (pi, proc_delete_dead_threads, NULL);
1730
05b4bd79
PA
1731 /* Note: this brute-force method was originally devised for Unixware
1732 (support removed since), and will also work on Solaris 2.6 and
1733 2.7. The original comment mentioned the existence of a much
1734 simpler and more elegant way to do this on Solaris, but didn't
1735 point out what that was. */
c3f6f71d
JM
1736
1737 strcpy (pathname, pi->pathname);
1738 strcat (pathname, "/lwp");
f0b3976b
TT
1739 dirp.reset (opendir (pathname));
1740 if (dirp == NULL)
c3f6f71d
JM
1741 proc_error (pi, "update_threads, opendir", __LINE__);
1742
f0b3976b 1743 while ((direntry = readdir (dirp.get ())) != NULL)
c3f6f71d
JM
1744 if (direntry->d_name[0] != '.') /* skip '.' and '..' */
1745 {
1746 lwpid = atoi (&direntry->d_name[0]);
c475f569
RO
1747 thread = create_procinfo (pi->pid, lwpid);
1748 if (thread == NULL)
c3f6f71d
JM
1749 proc_error (pi, "update_threads, create_procinfo", __LINE__);
1750 }
1751 pi->threads_valid = 1;
c3f6f71d
JM
1752 return 1;
1753}
c906108c 1754
77382aee
PA
1755/* Given a pointer to a function, call that function once for each lwp
1756 in the procinfo list, until the function returns non-zero, in which
1757 event return the value returned by the function.
1758
1759 Note: this function does NOT call update_threads. If you want to
1760 discover new threads first, you must call that function explicitly.
1761 This function just makes a quick pass over the currently-known
1762 procinfos.
1763
1764 PI is the parent process procinfo. FUNC is the per-thread
1765 function. PTR is an opaque parameter for function. Returns the
1766 first non-zero return value from the callee, or zero. */
c3f6f71d 1767
d3581e61 1768static int
d0849a9a
KB
1769proc_iterate_over_threads (procinfo *pi,
1770 int (*func) (procinfo *, procinfo *, void *),
1771 void *ptr)
c906108c 1772{
c3f6f71d
JM
1773 procinfo *thread, *next;
1774 int retval = 0;
c906108c 1775
77382aee
PA
1776 /* We should never have to apply this operation to any procinfo
1777 except the one for the main process. If that ever changes for
1778 any reason, then take out the following clause and replace it
1779 with one that makes sure the ctl_fd is open. */
19958708 1780
c3f6f71d
JM
1781 if (pi->tid != 0)
1782 pi = find_procinfo_or_die (pi->pid, 0);
1783
1784 for (thread = pi->thread_list; thread != NULL; thread = next)
c906108c 1785 {
0df8b418 1786 next = thread->next; /* In case thread is destroyed. */
c475f569
RO
1787 retval = (*func) (pi, thread, ptr);
1788 if (retval != 0)
c3f6f71d 1789 break;
c906108c 1790 }
c3f6f71d
JM
1791
1792 return retval;
c906108c
SS
1793}
1794
c3f6f71d
JM
1795/* =================== END, Thread "MODULE" =================== */
1796
1797/* =================== END, /proc "MODULE" =================== */
1798
1799/* =================== GDB "MODULE" =================== */
1800
77382aee
PA
1801/* Here are all of the gdb target vector functions and their
1802 friends. */
c3f6f71d 1803
39f77062 1804static ptid_t do_attach (ptid_t ptid);
6bd6f3b6 1805static void do_detach ();
9185ddce 1806static void proc_trace_syscalls_1 (procinfo *pi, int syscallnum,
77382aee 1807 int entry_or_exit, int mode, int from_tty);
9185ddce 1808
77382aee
PA
1809/* Sets up the inferior to be debugged. Registers to trace signals,
1810 hardware faults, and syscalls. Note: does not set RLC flag: caller
1811 may want to customize that. Returns zero for success (note!
1812 unlike most functions in this module); on failure, returns the LINE
1813 NUMBER where it failed! */
c3f6f71d
JM
1814
1815static int
fba45db2 1816procfs_debug_inferior (procinfo *pi)
c906108c 1817{
c3f6f71d 1818 fltset_t traced_faults;
44122162 1819 sigset_t traced_signals;
37de36c6
KB
1820 sysset_t *traced_syscall_entries;
1821 sysset_t *traced_syscall_exits;
1822 int status;
c906108c 1823
0df8b418
MS
1824 /* Register to trace hardware faults in the child. */
1825 prfillset (&traced_faults); /* trace all faults... */
44122162 1826 prdelset (&traced_faults, FLTPAGE); /* except page fault. */
c3f6f71d
JM
1827 if (!proc_set_traced_faults (pi, &traced_faults))
1828 return __LINE__;
c906108c 1829
2455069d
UW
1830 /* Initially, register to trace all signals in the child. */
1831 prfillset (&traced_signals);
1832 if (!proc_set_traced_signals (pi, &traced_signals))
c3f6f71d
JM
1833 return __LINE__;
1834
37de36c6 1835
c3f6f71d 1836 /* Register to trace the 'exit' system call (on entry). */
c475f569 1837 traced_syscall_entries = XNEW (sysset_t);
44122162
RO
1838 premptyset (traced_syscall_entries);
1839 praddset (traced_syscall_entries, SYS_exit);
1840 praddset (traced_syscall_entries, SYS_lwp_exit);
c906108c 1841
37de36c6
KB
1842 status = proc_set_traced_sysentry (pi, traced_syscall_entries);
1843 xfree (traced_syscall_entries);
1844 if (!status)
c3f6f71d
JM
1845 return __LINE__;
1846
44122162 1847 /* Method for tracing exec syscalls. */
c3f6f71d
JM
1848 /* GW: Rationale...
1849 Not all systems with /proc have all the exec* syscalls with the same
1850 names. On the SGI, for example, there is no SYS_exec, but there
0df8b418 1851 *is* a SYS_execv. So, we try to account for that. */
c3f6f71d 1852
c475f569 1853 traced_syscall_exits = XNEW (sysset_t);
44122162 1854 premptyset (traced_syscall_exits);
c3f6f71d 1855#ifdef SYS_exec
44122162 1856 praddset (traced_syscall_exits, SYS_exec);
37de36c6 1857#endif
44122162
RO
1858 praddset (traced_syscall_exits, SYS_execve);
1859 praddset (traced_syscall_exits, SYS_lwp_create);
1860 praddset (traced_syscall_exits, SYS_lwp_exit);
c906108c 1861
37de36c6
KB
1862 status = proc_set_traced_sysexit (pi, traced_syscall_exits);
1863 xfree (traced_syscall_exits);
1864 if (!status)
c3f6f71d
JM
1865 return __LINE__;
1866
c3f6f71d 1867 return 0;
c906108c
SS
1868}
1869
f6ac5f3d
PA
1870void
1871procfs_target::attach (const char *args, int from_tty)
c906108c 1872{
c3f6f71d
JM
1873 int pid;
1874
74164c56 1875 pid = parse_pid_to_attach (args);
c3f6f71d 1876
c3f6f71d 1877 if (pid == getpid ())
8a3fe4f8 1878 error (_("Attaching GDB to itself is not a good idea..."));
c906108c 1879
c3f6f71d 1880 if (from_tty)
c906108c 1881 {
d9fa87f4 1882 const char *exec_file = get_exec_file (0);
c3f6f71d
JM
1883
1884 if (exec_file)
a3f17187 1885 printf_filtered (_("Attaching to program `%s', %s\n"),
a068643d 1886 exec_file, target_pid_to_str (ptid_t (pid)).c_str ());
c3f6f71d 1887 else
a3f17187 1888 printf_filtered (_("Attaching to %s\n"),
a068643d 1889 target_pid_to_str (ptid_t (pid)).c_str ());
c3f6f71d
JM
1890
1891 fflush (stdout);
c906108c 1892 }
f2907e49 1893 inferior_ptid = do_attach (ptid_t (pid));
f6ac5f3d
PA
1894 if (!target_is_pushed (this))
1895 push_target (this);
c3f6f71d
JM
1896}
1897
f6ac5f3d
PA
1898void
1899procfs_target::detach (inferior *inf, int from_tty)
c3f6f71d 1900{
e99b03dc 1901 int pid = inferior_ptid.pid ();
cc377e6b 1902
c3f6f71d 1903 if (from_tty)
c906108c 1904 {
995816ba 1905 const char *exec_file;
cc377e6b 1906
c3f6f71d 1907 exec_file = get_exec_file (0);
cc377e6b 1908 if (exec_file == NULL)
c3f6f71d 1909 exec_file = "";
cc377e6b 1910
a3f17187 1911 printf_filtered (_("Detaching from program: %s, %s\n"), exec_file,
a068643d 1912 target_pid_to_str (ptid_t (pid)).c_str ());
c906108c 1913 }
19958708 1914
6bd6f3b6 1915 do_detach ();
cc377e6b 1916
39f77062 1917 inferior_ptid = null_ptid;
b7a08269 1918 detach_inferior (inf);
f6ac5f3d 1919 maybe_unpush_target ();
c906108c
SS
1920}
1921
39f77062
KB
1922static ptid_t
1923do_attach (ptid_t ptid)
c906108c 1924{
c3f6f71d 1925 procinfo *pi;
181e7f93 1926 struct inferior *inf;
c3f6f71d 1927 int fail;
2689673f 1928 int lwpid;
c3f6f71d 1929
c475f569
RO
1930 pi = create_procinfo (ptid.pid (), 0);
1931 if (pi == NULL)
8a3fe4f8 1932 perror (_("procfs: out of memory in 'attach'"));
c3f6f71d
JM
1933
1934 if (!open_procinfo_files (pi, FD_CTL))
1935 {
1936 fprintf_filtered (gdb_stderr, "procfs:%d -- ", __LINE__);
c475f569
RO
1937 xsnprintf (errmsg, sizeof (errmsg),
1938 "do_attach: couldn't open /proc file for process %d",
1939 ptid.pid ());
c3f6f71d
JM
1940 dead_procinfo (pi, errmsg, NOKILL);
1941 }
c906108c 1942
c3f6f71d
JM
1943 /* Stop the process (if it isn't already stopped). */
1944 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
c906108c 1945 {
c3f6f71d
JM
1946 pi->was_stopped = 1;
1947 proc_prettyprint_why (proc_why (pi), proc_what (pi), 1);
c906108c
SS
1948 }
1949 else
1950 {
c3f6f71d
JM
1951 pi->was_stopped = 0;
1952 /* Set the process to run again when we close it. */
1953 if (!proc_set_run_on_last_close (pi))
1954 dead_procinfo (pi, "do_attach: couldn't set RLC.", NOKILL);
1955
0df8b418 1956 /* Now stop the process. */
c3f6f71d
JM
1957 if (!proc_stop_process (pi))
1958 dead_procinfo (pi, "do_attach: couldn't stop the process.", NOKILL);
1959 pi->ignore_next_sigstop = 1;
c906108c 1960 }
c3f6f71d
JM
1961 /* Save some of the /proc state to be restored if we detach. */
1962 if (!proc_get_traced_faults (pi, &pi->saved_fltset))
1963 dead_procinfo (pi, "do_attach: couldn't save traced faults.", NOKILL);
1964 if (!proc_get_traced_signals (pi, &pi->saved_sigset))
1965 dead_procinfo (pi, "do_attach: couldn't save traced signals.", NOKILL);
37de36c6 1966 if (!proc_get_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d
JM
1967 dead_procinfo (pi, "do_attach: couldn't save traced syscall entries.",
1968 NOKILL);
37de36c6 1969 if (!proc_get_traced_sysexit (pi, pi->saved_exitset))
19958708 1970 dead_procinfo (pi, "do_attach: couldn't save traced syscall exits.",
c3f6f71d
JM
1971 NOKILL);
1972 if (!proc_get_held_signals (pi, &pi->saved_sighold))
1973 dead_procinfo (pi, "do_attach: couldn't save held signals.", NOKILL);
1974
c475f569
RO
1975 fail = procfs_debug_inferior (pi);
1976 if (fail != 0)
c3f6f71d
JM
1977 dead_procinfo (pi, "do_attach: failed in procfs_debug_inferior", NOKILL);
1978
6c95b8df
PA
1979 inf = current_inferior ();
1980 inferior_appeared (inf, pi->pid);
c3f6f71d 1981 /* Let GDB know that the inferior was attached. */
181e7f93 1982 inf->attach_flag = 1;
2689673f
PA
1983
1984 /* Create a procinfo for the current lwp. */
1985 lwpid = proc_get_current_thread (pi);
1986 create_procinfo (pi->pid, lwpid);
1987
1988 /* Add it to gdb's thread list. */
fd79271b 1989 ptid = ptid_t (pi->pid, lwpid, 0);
2689673f
PA
1990 add_thread (ptid);
1991
1992 return ptid;
c906108c
SS
1993}
1994
1995static void
6bd6f3b6 1996do_detach ()
c906108c 1997{
c3f6f71d 1998 procinfo *pi;
c906108c 1999
0df8b418 2000 /* Find procinfo for the main process. */
e99b03dc 2001 pi = find_procinfo_or_die (inferior_ptid.pid (),
dfd4cc63 2002 0); /* FIXME: threads */
c5aa993b 2003
c3f6f71d
JM
2004 if (!proc_set_traced_signals (pi, &pi->saved_sigset))
2005 proc_warn (pi, "do_detach, set_traced_signal", __LINE__);
c906108c 2006
c3f6f71d
JM
2007 if (!proc_set_traced_faults (pi, &pi->saved_fltset))
2008 proc_warn (pi, "do_detach, set_traced_faults", __LINE__);
2009
37de36c6 2010 if (!proc_set_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d
JM
2011 proc_warn (pi, "do_detach, set_traced_sysentry", __LINE__);
2012
37de36c6 2013 if (!proc_set_traced_sysexit (pi, pi->saved_exitset))
c3f6f71d
JM
2014 proc_warn (pi, "do_detach, set_traced_sysexit", __LINE__);
2015
2016 if (!proc_set_held_signals (pi, &pi->saved_sighold))
2017 proc_warn (pi, "do_detach, set_held_signals", __LINE__);
2018
6bd6f3b6
SM
2019 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
2020 if (!(pi->was_stopped)
2021 || query (_("Was stopped when attached, make it runnable again? ")))
c3f6f71d
JM
2022 {
2023 /* Clear any pending signal. */
2024 if (!proc_clear_current_fault (pi))
2025 proc_warn (pi, "do_detach, clear_current_fault", __LINE__);
2026
6bd6f3b6 2027 if (!proc_clear_current_signal (pi))
1a303dec
MS
2028 proc_warn (pi, "do_detach, clear_current_signal", __LINE__);
2029
c3f6f71d
JM
2030 if (!proc_set_run_on_last_close (pi))
2031 proc_warn (pi, "do_detach, set_rlc", __LINE__);
2032 }
2033
c3f6f71d 2034 destroy_procinfo (pi);
c906108c
SS
2035}
2036
772cf8be
MK
2037/* Fetch register REGNUM from the inferior. If REGNUM is -1, do this
2038 for all registers.
2039
2040 ??? Is the following note still relevant? We can't get individual
2041 registers with the PT_GETREGS ptrace(2) request either, yet we
2042 don't bother with caching at all in that case.
2043
2044 NOTE: Since the /proc interface cannot give us individual
2045 registers, we pay no attention to REGNUM, and just fetch them all.
2046 This results in the possibility that we will do unnecessarily many
2047 fetches, since we may be called repeatedly for individual
2048 registers. So we cache the results, and mark the cache invalid
2049 when the process is resumed. */
c3f6f71d 2050
f6ac5f3d
PA
2051void
2052procfs_target::fetch_registers (struct regcache *regcache, int regnum)
c906108c 2053{
772cf8be
MK
2054 gdb_gregset_t *gregs;
2055 procinfo *pi;
222312d3 2056 ptid_t ptid = regcache->ptid ();
e99b03dc 2057 int pid = ptid.pid ();
e38504b3 2058 int tid = ptid.lwp ();
ac7936df 2059 struct gdbarch *gdbarch = regcache->arch ();
c3f6f71d 2060
2689673f 2061 pi = find_procinfo_or_die (pid, tid);
c3f6f71d
JM
2062
2063 if (pi == NULL)
8a3fe4f8 2064 error (_("procfs: fetch_registers failed to find procinfo for %s"),
a068643d 2065 target_pid_to_str (ptid).c_str ());
c3f6f71d 2066
772cf8be
MK
2067 gregs = proc_get_gregs (pi);
2068 if (gregs == NULL)
c3f6f71d
JM
2069 proc_error (pi, "fetch_registers, get_gregs", __LINE__);
2070
56be3814 2071 supply_gregset (regcache, (const gdb_gregset_t *) gregs);
c3f6f71d 2072
40a6adc1 2073 if (gdbarch_fp0_regnum (gdbarch) >= 0) /* Do we have an FPU? */
60054393 2074 {
772cf8be
MK
2075 gdb_fpregset_t *fpregs;
2076
40a6adc1
MD
2077 if ((regnum >= 0 && regnum < gdbarch_fp0_regnum (gdbarch))
2078 || regnum == gdbarch_pc_regnum (gdbarch)
2079 || regnum == gdbarch_sp_regnum (gdbarch))
772cf8be 2080 return; /* Not a floating point register. */
c5aa993b 2081
772cf8be
MK
2082 fpregs = proc_get_fpregs (pi);
2083 if (fpregs == NULL)
60054393 2084 proc_error (pi, "fetch_registers, get_fpregs", __LINE__);
c906108c 2085
56be3814 2086 supply_fpregset (regcache, (const gdb_fpregset_t *) fpregs);
60054393 2087 }
c906108c
SS
2088}
2089
772cf8be
MK
2090/* Store register REGNUM back into the inferior. If REGNUM is -1, do
2091 this for all registers.
2092
2093 NOTE: Since the /proc interface will not read individual registers,
2094 we will cache these requests until the process is resumed, and only
2095 then write them back to the inferior process.
77382aee 2096
772cf8be
MK
2097 FIXME: is that a really bad idea? Have to think about cases where
2098 writing one register might affect the value of others, etc. */
c906108c 2099
f6ac5f3d
PA
2100void
2101procfs_target::store_registers (struct regcache *regcache, int regnum)
c3f6f71d 2102{
772cf8be
MK
2103 gdb_gregset_t *gregs;
2104 procinfo *pi;
222312d3 2105 ptid_t ptid = regcache->ptid ();
e99b03dc 2106 int pid = ptid.pid ();
e38504b3 2107 int tid = ptid.lwp ();
ac7936df 2108 struct gdbarch *gdbarch = regcache->arch ();
c3f6f71d 2109
2689673f 2110 pi = find_procinfo_or_die (pid, tid);
c3f6f71d
JM
2111
2112 if (pi == NULL)
8a3fe4f8 2113 error (_("procfs: store_registers: failed to find procinfo for %s"),
a068643d 2114 target_pid_to_str (ptid).c_str ());
c906108c 2115
772cf8be
MK
2116 gregs = proc_get_gregs (pi);
2117 if (gregs == NULL)
c3f6f71d 2118 proc_error (pi, "store_registers, get_gregs", __LINE__);
c906108c 2119
56be3814 2120 fill_gregset (regcache, gregs, regnum);
c3f6f71d
JM
2121 if (!proc_set_gregs (pi))
2122 proc_error (pi, "store_registers, set_gregs", __LINE__);
c906108c 2123
40a6adc1 2124 if (gdbarch_fp0_regnum (gdbarch) >= 0) /* Do we have an FPU? */
60054393 2125 {
772cf8be
MK
2126 gdb_fpregset_t *fpregs;
2127
40a6adc1
MD
2128 if ((regnum >= 0 && regnum < gdbarch_fp0_regnum (gdbarch))
2129 || regnum == gdbarch_pc_regnum (gdbarch)
2130 || regnum == gdbarch_sp_regnum (gdbarch))
772cf8be 2131 return; /* Not a floating point register. */
60054393 2132
772cf8be
MK
2133 fpregs = proc_get_fpregs (pi);
2134 if (fpregs == NULL)
60054393
MS
2135 proc_error (pi, "store_registers, get_fpregs", __LINE__);
2136
56be3814 2137 fill_fpregset (regcache, fpregs, regnum);
60054393
MS
2138 if (!proc_set_fpregs (pi))
2139 proc_error (pi, "store_registers, set_fpregs", __LINE__);
2140 }
c3f6f71d 2141}
c906108c 2142
37de36c6
KB
2143static int
2144syscall_is_lwp_exit (procinfo *pi, int scall)
2145{
37de36c6
KB
2146 if (scall == SYS_lwp_exit)
2147 return 1;
37de36c6
KB
2148 return 0;
2149}
2150
2151static int
2152syscall_is_exit (procinfo *pi, int scall)
2153{
37de36c6
KB
2154 if (scall == SYS_exit)
2155 return 1;
37de36c6
KB
2156 return 0;
2157}
2158
2159static int
2160syscall_is_exec (procinfo *pi, int scall)
2161{
2162#ifdef SYS_exec
2163 if (scall == SYS_exec)
2164 return 1;
2165#endif
37de36c6
KB
2166 if (scall == SYS_execve)
2167 return 1;
37de36c6
KB
2168 return 0;
2169}
2170
2171static int
2172syscall_is_lwp_create (procinfo *pi, int scall)
2173{
37de36c6
KB
2174 if (scall == SYS_lwp_create)
2175 return 1;
37de36c6
KB
2176 return 0;
2177}
2178
77382aee
PA
2179/* Retrieve the next stop event from the child process. If child has
2180 not stopped yet, wait for it to stop. Translate /proc eventcodes
2181 (or possibly wait eventcodes) into gdb internal event codes.
2182 Returns the id of process (and possibly thread) that incurred the
2183 event. Event codes are returned through a pointer parameter. */
c906108c 2184
f6ac5f3d
PA
2185ptid_t
2186procfs_target::wait (ptid_t ptid, struct target_waitstatus *status,
2187 int options)
c906108c 2188{
0df8b418 2189 /* First cut: loosely based on original version 2.1. */
c3f6f71d 2190 procinfo *pi;
39f77062
KB
2191 int wstat;
2192 int temp_tid;
2193 ptid_t retval, temp_ptid;
c3f6f71d
JM
2194 int why, what, flags;
2195 int retry = 0;
c906108c 2196
c3f6f71d 2197wait_again:
c906108c 2198
c3f6f71d
JM
2199 retry++;
2200 wstat = 0;
f2907e49 2201 retval = ptid_t (-1);
c906108c 2202
0df8b418 2203 /* Find procinfo for main process. */
e99b03dc 2204 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c3f6f71d 2205 if (pi)
c906108c 2206 {
0df8b418 2207 /* We must assume that the status is stale now... */
c3f6f71d
JM
2208 pi->status_valid = 0;
2209 pi->gregs_valid = 0;
2210 pi->fpregs_valid = 0;
2211
0df8b418 2212#if 0 /* just try this out... */
c3f6f71d
JM
2213 flags = proc_flags (pi);
2214 why = proc_why (pi);
2215 if ((flags & PR_STOPPED) && (why == PR_REQUESTED))
0df8b418 2216 pi->status_valid = 0; /* re-read again, IMMEDIATELY... */
c3f6f71d
JM
2217#endif
2218 /* If child is not stopped, wait for it to stop. */
c475f569
RO
2219 if (!(proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
2220 && !proc_wait_for_stop (pi))
c906108c 2221 {
0df8b418 2222 /* wait_for_stop failed: has the child terminated? */
c3f6f71d 2223 if (errno == ENOENT)
c906108c 2224 {
39f77062
KB
2225 int wait_retval;
2226
0df8b418 2227 /* /proc file not found; presumably child has terminated. */
f6ac5f3d 2228 wait_retval = ::wait (&wstat); /* "wait" for the child's exit. */
c3f6f71d 2229
dfd4cc63 2230 /* Wrong child? */
e99b03dc 2231 if (wait_retval != inferior_ptid.pid ())
3e43a32a
MS
2232 error (_("procfs: couldn't stop "
2233 "process %d: wait returned %d."),
e99b03dc 2234 inferior_ptid.pid (), wait_retval);
c3f6f71d 2235 /* FIXME: might I not just use waitpid?
0df8b418 2236 Or try find_procinfo to see if I know about this child? */
f2907e49 2237 retval = ptid_t (wait_retval);
c906108c 2238 }
d1566ff5
FN
2239 else if (errno == EINTR)
2240 goto wait_again;
c3f6f71d 2241 else
c906108c 2242 {
0df8b418 2243 /* Unknown error from wait_for_stop. */
c3f6f71d 2244 proc_error (pi, "target_wait (wait_for_stop)", __LINE__);
c906108c 2245 }
c3f6f71d
JM
2246 }
2247 else
2248 {
2249 /* This long block is reached if either:
2250 a) the child was already stopped, or
2251 b) we successfully waited for the child with wait_for_stop.
2252 This block will analyze the /proc status, and translate it
2253 into a waitstatus for GDB.
2254
2255 If we actually had to call wait because the /proc file
19958708 2256 is gone (child terminated), then we skip this block,
c3f6f71d
JM
2257 because we already have a waitstatus. */
2258
2259 flags = proc_flags (pi);
2260 why = proc_why (pi);
2261 what = proc_what (pi);
2262
c3f6f71d 2263 if (flags & (PR_STOPPED | PR_ISTOP))
c906108c 2264 {
c3f6f71d
JM
2265 /* If it's running async (for single_thread control),
2266 set it back to normal again. */
2267 if (flags & PR_ASYNC)
2268 if (!proc_unset_async (pi))
2269 proc_error (pi, "target_wait, unset_async", __LINE__);
c3f6f71d
JM
2270
2271 if (info_verbose)
2272 proc_prettyprint_why (why, what, 1);
2273
2274 /* The 'pid' we will return to GDB is composed of
2275 the process ID plus the lwp ID. */
fd79271b 2276 retval = ptid_t (pi->pid, proc_get_current_thread (pi), 0);
c3f6f71d
JM
2277
2278 switch (why) {
2279 case PR_SIGNALLED:
2280 wstat = (what << 8) | 0177;
2281 break;
2282 case PR_SYSENTRY:
37de36c6 2283 if (syscall_is_lwp_exit (pi, what))
c3f6f71d 2284 {
17faa917
DJ
2285 if (print_thread_events)
2286 printf_unfiltered (_("[%s exited]\n"),
a068643d 2287 target_pid_to_str (retval).c_str ());
b7a08269 2288 delete_thread (find_thread_ptid (retval));
37de36c6
KB
2289 status->kind = TARGET_WAITKIND_SPURIOUS;
2290 return retval;
2291 }
2292 else if (syscall_is_exit (pi, what))
2293 {
181e7f93
PA
2294 struct inferior *inf;
2295
0df8b418 2296 /* Handle SYS_exit call only. */
37de36c6 2297 /* Stopped at entry to SYS_exit.
19958708 2298 Make it runnable, resume it, then use
37de36c6 2299 the wait system call to get its exit code.
19958708 2300 Proc_run_process always clears the current
37de36c6
KB
2301 fault and signal.
2302 Then return its exit status. */
2303 pi->status_valid = 0;
2304 wstat = 0;
19958708 2305 /* FIXME: what we should do is return
37de36c6
KB
2306 TARGET_WAITKIND_SPURIOUS. */
2307 if (!proc_run_process (pi, 0, 0))
2308 proc_error (pi, "target_wait, run_process", __LINE__);
181e7f93
PA
2309
2310 inf = find_inferior_pid (pi->pid);
2311 if (inf->attach_flag)
c3f6f71d 2312 {
19958708 2313 /* Don't call wait: simulate waiting for exit,
37de36c6
KB
2314 return a "success" exit code. Bogus: what if
2315 it returns something else? */
2316 wstat = 0;
39f77062 2317 retval = inferior_ptid; /* ? ? ? */
37de36c6
KB
2318 }
2319 else
2320 {
f6ac5f3d 2321 int temp = ::wait (&wstat);
37de36c6
KB
2322
2323 /* FIXME: shouldn't I make sure I get the right
2324 event from the right process? If (for
2325 instance) I have killed an earlier inferior
2326 process but failed to clean up after it
2327 somehow, I could get its termination event
2328 here. */
2329
0df8b418
MS
2330 /* If wait returns -1, that's what we return
2331 to GDB. */
37de36c6 2332 if (temp < 0)
f2907e49 2333 retval = ptid_t (temp);
c3f6f71d 2334 }
c3f6f71d 2335 }
37de36c6
KB
2336 else
2337 {
a3f17187 2338 printf_filtered (_("procfs: trapped on entry to "));
37de36c6
KB
2339 proc_prettyprint_syscall (proc_what (pi), 0);
2340 printf_filtered ("\n");
44122162
RO
2341
2342 long i, nsysargs, *sysargs;
2343
c475f569
RO
2344 nsysargs = proc_nsysarg (pi);
2345 sysargs = proc_sysargs (pi);
2346
2347 if (nsysargs > 0 && sysargs != NULL)
44122162
RO
2348 {
2349 printf_filtered (_("%ld syscall arguments:\n"),
2350 nsysargs);
2351 for (i = 0; i < nsysargs; i++)
2352 printf_filtered ("#%ld: 0x%08lx\n",
2353 i, sysargs[i]);
2354 }
2355
37de36c6
KB
2356 if (status)
2357 {
0df8b418
MS
2358 /* How to exit gracefully, returning "unknown
2359 event". */
37de36c6 2360 status->kind = TARGET_WAITKIND_SPURIOUS;
39f77062 2361 return inferior_ptid;
37de36c6
KB
2362 }
2363 else
2364 {
2365 /* How to keep going without returning to wfi: */
049a8570 2366 target_continue_no_signal (ptid);
37de36c6
KB
2367 goto wait_again;
2368 }
2369 }
2370 break;
2371 case PR_SYSEXIT:
2372 if (syscall_is_exec (pi, what))
c3f6f71d 2373 {
37de36c6
KB
2374 /* Hopefully this is our own "fork-child" execing
2375 the real child. Hoax this event into a trap, and
2376 GDB will see the child about to execute its start
0df8b418 2377 address. */
37de36c6
KB
2378 wstat = (SIGTRAP << 8) | 0177;
2379 }
2380 else if (syscall_is_lwp_create (pi, what))
2381 {
77382aee
PA
2382 /* This syscall is somewhat like fork/exec. We
2383 will get the event twice: once for the parent
2384 LWP, and once for the child. We should already
2385 know about the parent LWP, but the child will
2386 be new to us. So, whenever we get this event,
2387 if it represents a new thread, simply add the
2388 thread to the list. */
c3f6f71d 2389
37de36c6 2390 /* If not in procinfo list, add it. */
39f77062
KB
2391 temp_tid = proc_get_current_thread (pi);
2392 if (!find_procinfo (pi->pid, temp_tid))
2393 create_procinfo (pi->pid, temp_tid);
37de36c6 2394
fd79271b 2395 temp_ptid = ptid_t (pi->pid, temp_tid, 0);
37de36c6 2396 /* If not in GDB's thread list, add it. */
39f77062 2397 if (!in_thread_list (temp_ptid))
93815fbf
VP
2398 add_thread (temp_ptid);
2399
0df8b418 2400 /* Return to WFI, but tell it to immediately resume. */
37de36c6 2401 status->kind = TARGET_WAITKIND_SPURIOUS;
39f77062 2402 return inferior_ptid;
37de36c6
KB
2403 }
2404 else if (syscall_is_lwp_exit (pi, what))
2405 {
17faa917
DJ
2406 if (print_thread_events)
2407 printf_unfiltered (_("[%s exited]\n"),
a068643d 2408 target_pid_to_str (retval).c_str ());
b7a08269 2409 delete_thread (find_thread_ptid (retval));
37de36c6
KB
2410 status->kind = TARGET_WAITKIND_SPURIOUS;
2411 return retval;
c3f6f71d 2412 }
37de36c6
KB
2413 else if (0)
2414 {
2415 /* FIXME: Do we need to handle SYS_sproc,
2416 SYS_fork, or SYS_vfork here? The old procfs
2417 seemed to use this event to handle threads on
2418 older (non-LWP) systems, where I'm assuming
19958708 2419 that threads were actually separate processes.
37de36c6
KB
2420 Irix, maybe? Anyway, low priority for now. */
2421 }
2422 else
2423 {
a3f17187 2424 printf_filtered (_("procfs: trapped on exit from "));
37de36c6
KB
2425 proc_prettyprint_syscall (proc_what (pi), 0);
2426 printf_filtered ("\n");
44122162
RO
2427
2428 long i, nsysargs, *sysargs;
2429
c475f569
RO
2430 nsysargs = proc_nsysarg (pi);
2431 sysargs = proc_sysargs (pi);
2432
2433 if (nsysargs > 0 && sysargs != NULL)
44122162
RO
2434 {
2435 printf_filtered (_("%ld syscall arguments:\n"),
2436 nsysargs);
2437 for (i = 0; i < nsysargs; i++)
2438 printf_filtered ("#%ld: 0x%08lx\n",
2439 i, sysargs[i]);
2440 }
2441
37de36c6 2442 status->kind = TARGET_WAITKIND_SPURIOUS;
39f77062 2443 return inferior_ptid;
37de36c6 2444 }
c3f6f71d
JM
2445 break;
2446 case PR_REQUESTED:
2447#if 0 /* FIXME */
2448 wstat = (SIGSTOP << 8) | 0177;
2449 break;
2450#else
2451 if (retry < 5)
2452 {
a3f17187 2453 printf_filtered (_("Retry #%d:\n"), retry);
c3f6f71d
JM
2454 pi->status_valid = 0;
2455 goto wait_again;
2456 }
2457 else
2458 {
2459 /* If not in procinfo list, add it. */
39f77062
KB
2460 temp_tid = proc_get_current_thread (pi);
2461 if (!find_procinfo (pi->pid, temp_tid))
2462 create_procinfo (pi->pid, temp_tid);
c3f6f71d
JM
2463
2464 /* If not in GDB's thread list, add it. */
fd79271b 2465 temp_ptid = ptid_t (pi->pid, temp_tid, 0);
39f77062 2466 if (!in_thread_list (temp_ptid))
93815fbf 2467 add_thread (temp_ptid);
c3f6f71d
JM
2468
2469 status->kind = TARGET_WAITKIND_STOPPED;
b196bc4c 2470 status->value.sig = GDB_SIGNAL_0;
c3f6f71d
JM
2471 return retval;
2472 }
2473#endif
2474 case PR_JOBCONTROL:
2475 wstat = (what << 8) | 0177;
2476 break;
2477 case PR_FAULTED:
7a289707
RO
2478 {
2479 int signo = pi->prstatus.pr_lwp.pr_info.si_signo;
2480 if (signo != 0)
2481 wstat = (signo << 8) | 0177;
c3f6f71d 2482 }
7a289707 2483 break;
c3f6f71d
JM
2484 default: /* switch (why) unmatched */
2485 printf_filtered ("procfs:%d -- ", __LINE__);
a3f17187 2486 printf_filtered (_("child stopped for unknown reason:\n"));
c3f6f71d 2487 proc_prettyprint_why (why, what, 1);
8a3fe4f8 2488 error (_("... giving up..."));
c3f6f71d
JM
2489 break;
2490 }
77382aee
PA
2491 /* Got this far without error: If retval isn't in the
2492 threads database, add it. */
c475f569
RO
2493 if (retval.pid () > 0
2494 && retval != inferior_ptid
2495 && !in_thread_list (retval))
c906108c 2496 {
77382aee
PA
2497 /* We have a new thread. We need to add it both to
2498 GDB's list and to our own. If we don't create a
2499 procinfo, resume may be unhappy later. */
c3f6f71d 2500 add_thread (retval);
e99b03dc 2501 if (find_procinfo (retval.pid (),
e38504b3 2502 retval.lwp ()) == NULL)
e99b03dc 2503 create_procinfo (retval.pid (),
e38504b3 2504 retval.lwp ());
c906108c 2505 }
c906108c 2506 }
0df8b418 2507 else /* Flags do not indicate STOPPED. */
c906108c 2508 {
0df8b418 2509 /* surely this can't happen... */
c3f6f71d
JM
2510 printf_filtered ("procfs:%d -- process not stopped.\n",
2511 __LINE__);
2512 proc_prettyprint_flags (flags, 1);
8a3fe4f8 2513 error (_("procfs: ...giving up..."));
c906108c 2514 }
c906108c 2515 }
c906108c 2516
c3f6f71d
JM
2517 if (status)
2518 store_waitstatus (status, wstat);
c906108c
SS
2519 }
2520
c3f6f71d
JM
2521 return retval;
2522}
c906108c 2523
4e73f23d
RM
2524/* Perform a partial transfer to/from the specified object. For
2525 memory transfers, fall back to the old memory xfer functions. */
2526
f6ac5f3d
PA
2527enum target_xfer_status
2528procfs_target::xfer_partial (enum target_object object,
2529 const char *annex, gdb_byte *readbuf,
2530 const gdb_byte *writebuf, ULONGEST offset,
2531 ULONGEST len, ULONGEST *xfered_len)
4e73f23d
RM
2532{
2533 switch (object)
2534 {
2535 case TARGET_OBJECT_MEMORY:
e96027e0 2536 return procfs_xfer_memory (readbuf, writebuf, offset, len, xfered_len);
4e73f23d 2537
4e73f23d 2538 case TARGET_OBJECT_AUXV:
f6ac5f3d 2539 return memory_xfer_auxv (this, object, annex, readbuf, writebuf,
9b409511 2540 offset, len, xfered_len);
4e73f23d
RM
2541
2542 default:
4360561f
TT
2543 return this->beneath ()->xfer_partial (object, annex,
2544 readbuf, writebuf, offset, len,
2545 xfered_len);
4e73f23d
RM
2546 }
2547}
2548
e96027e0
PA
2549/* Helper for procfs_xfer_partial that handles memory transfers.
2550 Arguments are like target_xfer_partial. */
4e73f23d 2551
e96027e0
PA
2552static enum target_xfer_status
2553procfs_xfer_memory (gdb_byte *readbuf, const gdb_byte *writebuf,
2554 ULONGEST memaddr, ULONGEST len, ULONGEST *xfered_len)
c3f6f71d
JM
2555{
2556 procinfo *pi;
e96027e0 2557 int nbytes;
c906108c 2558
0df8b418 2559 /* Find procinfo for main process. */
e99b03dc 2560 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c475f569 2561 if (pi->as_fd == 0 && open_procinfo_files (pi, FD_AS) == 0)
c906108c 2562 {
c3f6f71d 2563 proc_warn (pi, "xfer_memory, open_proc_files", __LINE__);
e96027e0 2564 return TARGET_XFER_E_IO;
c906108c 2565 }
c906108c 2566
e96027e0
PA
2567 if (lseek (pi->as_fd, (off_t) memaddr, SEEK_SET) != (off_t) memaddr)
2568 return TARGET_XFER_E_IO;
2569
2570 if (writebuf != NULL)
c906108c 2571 {
e96027e0
PA
2572 PROCFS_NOTE ("write memory:\n");
2573 nbytes = write (pi->as_fd, writebuf, len);
2574 }
2575 else
2576 {
2577 PROCFS_NOTE ("read memory:\n");
2578 nbytes = read (pi->as_fd, readbuf, len);
c906108c 2579 }
e96027e0
PA
2580 if (nbytes <= 0)
2581 return TARGET_XFER_E_IO;
2582 *xfered_len = nbytes;
2583 return TARGET_XFER_OK;
c906108c
SS
2584}
2585
77382aee
PA
2586/* Called by target_resume before making child runnable. Mark cached
2587 registers and status's invalid. If there are "dirty" caches that
2588 need to be written back to the child process, do that.
c906108c 2589
77382aee
PA
2590 File descriptors are also cached. As they are a limited resource,
2591 we cannot hold onto them indefinitely. However, as they are
2592 expensive to open, we don't want to throw them away
85102364 2593 indiscriminately either. As a compromise, we will keep the file
77382aee
PA
2594 descriptors for the parent process, but discard any file
2595 descriptors we may have accumulated for the threads.
2596
2597 As this function is called by iterate_over_threads, it always
2598 returns zero (so that iterate_over_threads will keep
2599 iterating). */
c3f6f71d
JM
2600
2601static int
fba45db2 2602invalidate_cache (procinfo *parent, procinfo *pi, void *ptr)
c906108c 2603{
77382aee
PA
2604 /* About to run the child; invalidate caches and do any other
2605 cleanup. */
c906108c 2606
c3f6f71d
JM
2607#if 0
2608 if (pi->gregs_dirty)
c475f569 2609 if (parent == NULL || proc_get_current_thread (parent) != pi->tid)
c3f6f71d
JM
2610 if (!proc_set_gregs (pi)) /* flush gregs cache */
2611 proc_warn (pi, "target_resume, set_gregs",
2612 __LINE__);
f5656ead 2613 if (gdbarch_fp0_regnum (target_gdbarch ()) >= 0)
60054393 2614 if (pi->fpregs_dirty)
c475f569 2615 if (parent == NULL || proc_get_current_thread (parent) != pi->tid)
60054393 2616 if (!proc_set_fpregs (pi)) /* flush fpregs cache */
19958708 2617 proc_warn (pi, "target_resume, set_fpregs",
60054393 2618 __LINE__);
c906108c 2619#endif
c906108c 2620
c3f6f71d 2621 if (parent != NULL)
c906108c 2622 {
c3f6f71d 2623 /* The presence of a parent indicates that this is an LWP.
19958708 2624 Close any file descriptors that it might have open.
c3f6f71d
JM
2625 We don't do this to the master (parent) procinfo. */
2626
2627 close_procinfo_files (pi);
c906108c 2628 }
c3f6f71d
JM
2629 pi->gregs_valid = 0;
2630 pi->fpregs_valid = 0;
2631#if 0
2632 pi->gregs_dirty = 0;
2633 pi->fpregs_dirty = 0;
c906108c 2634#endif
c3f6f71d
JM
2635 pi->status_valid = 0;
2636 pi->threads_valid = 0;
c906108c 2637
c3f6f71d 2638 return 0;
c906108c
SS
2639}
2640
0fda6bd2 2641#if 0
77382aee
PA
2642/* A callback function for iterate_over_threads. Find the
2643 asynchronous signal thread, and make it runnable. See if that
2644 helps matters any. */
c906108c 2645
c3f6f71d 2646static int
fba45db2 2647make_signal_thread_runnable (procinfo *process, procinfo *pi, void *ptr)
c906108c 2648{
c3f6f71d
JM
2649#ifdef PR_ASLWP
2650 if (proc_flags (pi) & PR_ASLWP)
c906108c 2651 {
c3f6f71d
JM
2652 if (!proc_run_process (pi, 0, -1))
2653 proc_error (pi, "make_signal_thread_runnable", __LINE__);
2654 return 1;
c906108c 2655 }
c906108c 2656#endif
c3f6f71d 2657 return 0;
c906108c 2658}
0fda6bd2 2659#endif
c906108c 2660
77382aee
PA
2661/* Make the child process runnable. Normally we will then call
2662 procfs_wait and wait for it to stop again (unless gdb is async).
2663
2664 If STEP is true, then arrange for the child to stop again after
2665 executing a single instruction. If SIGNO is zero, then cancel any
2666 pending signal; if non-zero, then arrange for the indicated signal
2667 to be delivered to the child when it runs. If PID is -1, then
2668 allow any child thread to run; if non-zero, then allow only the
2669 indicated thread to run. (not implemented yet). */
c906108c 2670
f6ac5f3d
PA
2671void
2672procfs_target::resume (ptid_t ptid, int step, enum gdb_signal signo)
c906108c 2673{
c3f6f71d
JM
2674 procinfo *pi, *thread;
2675 int native_signo;
2676
19958708 2677 /* 2.1:
c3f6f71d 2678 prrun.prflags |= PRSVADDR;
19958708 2679 prrun.pr_vaddr = $PC; set resume address
c3f6f71d 2680 prrun.prflags |= PRSTRACE; trace signals in pr_trace (all)
19958708 2681 prrun.prflags |= PRSFAULT; trace faults in pr_fault (all but PAGE)
c3f6f71d
JM
2682 prrun.prflags |= PRCFAULT; clear current fault.
2683
2684 PRSTRACE and PRSFAULT can be done by other means
77382aee 2685 (proc_trace_signals, proc_trace_faults)
c3f6f71d
JM
2686 PRSVADDR is unnecessary.
2687 PRCFAULT may be replaced by a PIOCCFAULT call (proc_clear_current_fault)
2688 This basically leaves PRSTEP and PRCSIG.
2689 PRCSIG is like PIOCSSIG (proc_clear_current_signal).
2690 So basically PR_STEP is the sole argument that must be passed
77382aee 2691 to proc_run_process (for use in the prrun struct by ioctl). */
c3f6f71d 2692
0df8b418 2693 /* Find procinfo for main process. */
e99b03dc 2694 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c3f6f71d 2695
77382aee 2696 /* First cut: ignore pid argument. */
c3f6f71d 2697 errno = 0;
c906108c 2698
c3f6f71d 2699 /* Convert signal to host numbering. */
c475f569 2700 if (signo == 0 || (signo == GDB_SIGNAL_STOP && pi->ignore_next_sigstop))
c3f6f71d
JM
2701 native_signo = 0;
2702 else
2ea28649 2703 native_signo = gdb_signal_to_host (signo);
c906108c 2704
c3f6f71d 2705 pi->ignore_next_sigstop = 0;
c906108c 2706
77382aee
PA
2707 /* Running the process voids all cached registers and status. */
2708 /* Void the threads' caches first. */
19958708 2709 proc_iterate_over_threads (pi, invalidate_cache, NULL);
c3f6f71d
JM
2710 /* Void the process procinfo's caches. */
2711 invalidate_cache (NULL, pi, NULL);
c906108c 2712
e99b03dc 2713 if (ptid.pid () != -1)
c906108c 2714 {
77382aee
PA
2715 /* Resume a specific thread, presumably suppressing the
2716 others. */
e38504b3 2717 thread = find_procinfo (ptid.pid (), ptid.lwp ());
7de45904 2718 if (thread != NULL)
c906108c 2719 {
c3f6f71d
JM
2720 if (thread->tid != 0)
2721 {
77382aee
PA
2722 /* We're to resume a specific thread, and not the
2723 others. Set the child process's PR_ASYNC flag. */
c3f6f71d
JM
2724 if (!proc_set_async (pi))
2725 proc_error (pi, "target_resume, set_async", __LINE__);
c3f6f71d 2726#if 0
19958708 2727 proc_iterate_over_threads (pi,
c3f6f71d
JM
2728 make_signal_thread_runnable,
2729 NULL);
2730#endif
0df8b418
MS
2731 pi = thread; /* Substitute the thread's procinfo
2732 for run. */
c3f6f71d 2733 }
c906108c
SS
2734 }
2735 }
c906108c 2736
c3f6f71d 2737 if (!proc_run_process (pi, step, native_signo))
c906108c 2738 {
c3f6f71d 2739 if (errno == EBUSY)
77382aee
PA
2740 warning (_("resume: target already running. "
2741 "Pretend to resume, and hope for the best!"));
c3f6f71d
JM
2742 else
2743 proc_error (pi, "target_resume", __LINE__);
c906108c 2744 }
c3f6f71d 2745}
c906108c 2746
77382aee 2747/* Set up to trace signals in the child process. */
c906108c 2748
f6ac5f3d 2749void
adc6a863 2750procfs_target::pass_signals (gdb::array_view<const unsigned char> pass_signals)
c3f6f71d 2751{
44122162 2752 sigset_t signals;
e99b03dc 2753 procinfo *pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
2455069d 2754 int signo;
c906108c 2755
2455069d
UW
2756 prfillset (&signals);
2757
2758 for (signo = 0; signo < NSIG; signo++)
2759 {
2ea28649 2760 int target_signo = gdb_signal_from_host (signo);
adc6a863 2761 if (target_signo < pass_signals.size () && pass_signals[target_signo])
44122162 2762 prdelset (&signals, signo);
2455069d
UW
2763 }
2764
2765 if (!proc_set_traced_signals (pi, &signals))
2766 proc_error (pi, "pass_signals", __LINE__);
c3f6f71d 2767}
c906108c 2768
77382aee 2769/* Print status information about the child process. */
c906108c 2770
f6ac5f3d
PA
2771void
2772procfs_target::files_info ()
c3f6f71d 2773{
181e7f93 2774 struct inferior *inf = current_inferior ();
f4a14ae6 2775
a3f17187 2776 printf_filtered (_("\tUsing the running image of %s %s via /proc.\n"),
181e7f93 2777 inf->attach_flag? "attached": "child",
a068643d 2778 target_pid_to_str (inferior_ptid).c_str ());
c3f6f71d 2779}
c906108c 2780
77382aee
PA
2781/* Make it die. Wait for it to die. Clean up after it. Note: this
2782 should only be applied to the real process, not to an LWP, because
2783 of the check for parent-process. If we need this to work for an
2784 LWP, it needs some more logic. */
c906108c 2785
c3f6f71d 2786static void
fba45db2 2787unconditionally_kill_inferior (procinfo *pi)
c3f6f71d
JM
2788{
2789 int parent_pid;
c906108c 2790
c3f6f71d 2791 parent_pid = proc_parent_pid (pi);
c3f6f71d 2792 if (!proc_kill (pi, SIGKILL))
103b3ef5 2793 proc_error (pi, "unconditionally_kill, proc_kill", __LINE__);
c3f6f71d 2794 destroy_procinfo (pi);
c906108c 2795
c3f6f71d
JM
2796 /* If pi is GDB's child, wait for it to die. */
2797 if (parent_pid == getpid ())
19958708 2798 /* FIXME: should we use waitpid to make sure we get the right event?
c3f6f71d
JM
2799 Should we check the returned event? */
2800 {
0d06e24b 2801#if 0
c3f6f71d 2802 int status, ret;
c906108c 2803
c3f6f71d
JM
2804 ret = waitpid (pi->pid, &status, 0);
2805#else
2806 wait (NULL);
2807#endif
2808 }
2809}
c906108c 2810
77382aee
PA
2811/* We're done debugging it, and we want it to go away. Then we want
2812 GDB to forget all about it. */
c906108c 2813
f6ac5f3d
PA
2814void
2815procfs_target::kill ()
c906108c 2816{
d7e15655 2817 if (inferior_ptid != null_ptid) /* ? */
c3f6f71d 2818 {
0df8b418 2819 /* Find procinfo for main process. */
e99b03dc 2820 procinfo *pi = find_procinfo (inferior_ptid.pid (), 0);
c906108c 2821
c3f6f71d
JM
2822 if (pi)
2823 unconditionally_kill_inferior (pi);
bc1e6c81 2824 target_mourn_inferior (inferior_ptid);
c906108c 2825 }
c3f6f71d
JM
2826}
2827
77382aee 2828/* Forget we ever debugged this thing! */
c906108c 2829
f6ac5f3d
PA
2830void
2831procfs_target::mourn_inferior ()
c3f6f71d
JM
2832{
2833 procinfo *pi;
c906108c 2834
d7e15655 2835 if (inferior_ptid != null_ptid)
c3f6f71d 2836 {
0df8b418 2837 /* Find procinfo for main process. */
e99b03dc 2838 pi = find_procinfo (inferior_ptid.pid (), 0);
c3f6f71d
JM
2839 if (pi)
2840 destroy_procinfo (pi);
c906108c 2841 }
6a3cb8e8
PA
2842
2843 generic_mourn_inferior ();
8181d85f 2844
f6ac5f3d 2845 maybe_unpush_target ();
c3f6f71d 2846}
c906108c 2847
77382aee
PA
2848/* When GDB forks to create a runnable inferior process, this function
2849 is called on the parent side of the fork. It's job is to do
2850 whatever is necessary to make the child ready to be debugged, and
2851 then wait for the child to synchronize. */
c906108c 2852
19958708 2853static void
28439f5e 2854procfs_init_inferior (struct target_ops *ops, int pid)
c3f6f71d
JM
2855{
2856 procinfo *pi;
c3f6f71d 2857 int fail;
2689673f 2858 int lwpid;
c906108c 2859
c3f6f71d
JM
2860 /* This routine called on the parent side (GDB side)
2861 after GDB forks the inferior. */
6a3cb8e8
PA
2862 if (!target_is_pushed (ops))
2863 push_target (ops);
c906108c 2864
c475f569
RO
2865 pi = create_procinfo (pid, 0);
2866 if (pi == NULL)
9b20d036 2867 perror (_("procfs: out of memory in 'init_inferior'"));
c3f6f71d
JM
2868
2869 if (!open_procinfo_files (pi, FD_CTL))
2870 proc_error (pi, "init_inferior, open_proc_files", __LINE__);
2871
2872 /*
2873 xmalloc // done
2874 open_procinfo_files // done
2875 link list // done
2876 prfillset (trace)
2877 procfs_notice_signals
2878 prfillset (fault)
2879 prdelset (FLTPAGE)
2880 PIOCWSTOP
2881 PIOCSFAULT
2882 */
2883
77382aee 2884 /* If not stopped yet, wait for it to stop. */
c475f569 2885 if (!(proc_flags (pi) & PR_STOPPED) && !(proc_wait_for_stop (pi)))
c3f6f71d
JM
2886 dead_procinfo (pi, "init_inferior: wait_for_stop failed", KILL);
2887
2888 /* Save some of the /proc state to be restored if we detach. */
2889 /* FIXME: Why? In case another debugger was debugging it?
0df8b418 2890 We're it's parent, for Ghu's sake! */
c3f6f71d
JM
2891 if (!proc_get_traced_signals (pi, &pi->saved_sigset))
2892 proc_error (pi, "init_inferior, get_traced_signals", __LINE__);
2893 if (!proc_get_held_signals (pi, &pi->saved_sighold))
2894 proc_error (pi, "init_inferior, get_held_signals", __LINE__);
2895 if (!proc_get_traced_faults (pi, &pi->saved_fltset))
2896 proc_error (pi, "init_inferior, get_traced_faults", __LINE__);
37de36c6 2897 if (!proc_get_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d 2898 proc_error (pi, "init_inferior, get_traced_sysentry", __LINE__);
37de36c6 2899 if (!proc_get_traced_sysexit (pi, pi->saved_exitset))
c3f6f71d
JM
2900 proc_error (pi, "init_inferior, get_traced_sysexit", __LINE__);
2901
c475f569
RO
2902 fail = procfs_debug_inferior (pi);
2903 if (fail != 0)
c3f6f71d
JM
2904 proc_error (pi, "init_inferior (procfs_debug_inferior)", fail);
2905
0d06e24b
JM
2906 /* FIXME: logically, we should really be turning OFF run-on-last-close,
2907 and possibly even turning ON kill-on-last-close at this point. But
2908 I can't make that change without careful testing which I don't have
2909 time to do right now... */
c3f6f71d
JM
2910 /* Turn on run-on-last-close flag so that the child
2911 will die if GDB goes away for some reason. */
2912 if (!proc_set_run_on_last_close (pi))
2913 proc_error (pi, "init_inferior, set_RLC", __LINE__);
2914
2689673f
PA
2915 /* We now have have access to the lwpid of the main thread/lwp. */
2916 lwpid = proc_get_current_thread (pi);
2917
2918 /* Create a procinfo for the main lwp. */
2919 create_procinfo (pid, lwpid);
2920
2921 /* We already have a main thread registered in the thread table at
2922 this point, but it didn't have any lwp info yet. Notify the core
2923 about it. This changes inferior_ptid as well. */
f2907e49 2924 thread_change_ptid (ptid_t (pid),
fd79271b 2925 ptid_t (pid, lwpid, 0));
c906108c 2926
2090129c 2927 gdb_startup_inferior (pid, START_INFERIOR_TRAPS_EXPECTED);
c3f6f71d 2928}
c906108c 2929
77382aee
PA
2930/* When GDB forks to create a new process, this function is called on
2931 the child side of the fork before GDB exec's the user program. Its
2932 job is to make the child minimally debuggable, so that the parent
2933 GDB process can connect to the child and take over. This function
2934 should do only the minimum to make that possible, and to
2935 synchronize with the parent process. The parent process should
2936 take care of the details. */
c3f6f71d
JM
2937
2938static void
fba45db2 2939procfs_set_exec_trap (void)
c3f6f71d
JM
2940{
2941 /* This routine called on the child side (inferior side)
2942 after GDB forks the inferior. It must use only local variables,
2943 because it may be sharing data space with its parent. */
c906108c 2944
c3f6f71d 2945 procinfo *pi;
37de36c6 2946 sysset_t *exitset;
c906108c 2947
c475f569
RO
2948 pi = create_procinfo (getpid (), 0);
2949 if (pi == NULL)
e2e0b3e5 2950 perror_with_name (_("procfs: create_procinfo failed in child."));
c906108c 2951
c3f6f71d
JM
2952 if (open_procinfo_files (pi, FD_CTL) == 0)
2953 {
2954 proc_warn (pi, "set_exec_trap, open_proc_files", __LINE__);
2955 gdb_flush (gdb_stderr);
77382aee
PA
2956 /* No need to call "dead_procinfo", because we're going to
2957 exit. */
c3f6f71d
JM
2958 _exit (127);
2959 }
c906108c 2960
44122162 2961 /* Method for tracing exec syscalls. */
c3f6f71d
JM
2962 /* GW: Rationale...
2963 Not all systems with /proc have all the exec* syscalls with the same
2964 names. On the SGI, for example, there is no SYS_exec, but there
77382aee 2965 *is* a SYS_execv. So, we try to account for that. */
c906108c 2966
c475f569 2967 exitset = XNEW (sysset_t);
44122162 2968 premptyset (exitset);
c3f6f71d 2969#ifdef SYS_exec
44122162 2970 praddset (exitset, SYS_exec);
c906108c 2971#endif
44122162 2972 praddset (exitset, SYS_execve);
37de36c6
KB
2973
2974 if (!proc_set_traced_sysexit (pi, exitset))
c906108c 2975 {
c3f6f71d
JM
2976 proc_warn (pi, "set_exec_trap, set_traced_sysexit", __LINE__);
2977 gdb_flush (gdb_stderr);
2978 _exit (127);
c906108c 2979 }
c3f6f71d 2980
0df8b418 2981 /* FIXME: should this be done in the parent instead? */
c3f6f71d
JM
2982 /* Turn off inherit on fork flag so that all grand-children
2983 of gdb start with tracing flags cleared. */
2984 if (!proc_unset_inherit_on_fork (pi))
2985 proc_warn (pi, "set_exec_trap, unset_inherit", __LINE__);
2986
2987 /* Turn off run on last close flag, so that the child process
2988 cannot run away just because we close our handle on it.
2989 We want it to wait for the parent to attach. */
2990 if (!proc_unset_run_on_last_close (pi))
2991 proc_warn (pi, "set_exec_trap, unset_RLC", __LINE__);
2992
19958708 2993 /* FIXME: No need to destroy the procinfo --
0df8b418 2994 we have our own address space, and we're about to do an exec! */
c3f6f71d 2995 /*destroy_procinfo (pi);*/
c906108c 2996}
c906108c 2997
77382aee
PA
2998/* This function is called BEFORE gdb forks the inferior process. Its
2999 only real responsibility is to set things up for the fork, and tell
3000 GDB which two functions to call after the fork (one for the parent,
3001 and one for the child).
3002
3003 This function does a complicated search for a unix shell program,
3004 which it then uses to parse arguments and environment variables to
3005 be sent to the child. I wonder whether this code could not be
3006 abstracted out and shared with other unix targets such as
3007 inf-ptrace? */
c906108c 3008
f6ac5f3d
PA
3009void
3010procfs_target::create_inferior (const char *exec_file,
3011 const std::string &allargs,
3012 char **env, int from_tty)
c906108c 3013{
974e6844 3014 const char *shell_file = get_shell ();
c906108c 3015 char *tryname;
28439f5e
PA
3016 int pid;
3017
974e6844 3018 if (strchr (shell_file, '/') == NULL)
c906108c
SS
3019 {
3020
3021 /* We will be looking down the PATH to find shell_file. If we
c3f6f71d
JM
3022 just do this the normal way (via execlp, which operates by
3023 attempting an exec for each element of the PATH until it
3024 finds one which succeeds), then there will be an exec for
3025 each failed attempt, each of which will cause a PR_SYSEXIT
3026 stop, and we won't know how to distinguish the PR_SYSEXIT's
3027 for these failed execs with the ones for successful execs
3028 (whether the exec has succeeded is stored at that time in the
3029 carry bit or some such architecture-specific and
3030 non-ABI-specified place).
3031
3032 So I can't think of anything better than to search the PATH
3033 now. This has several disadvantages: (1) There is a race
3034 condition; if we find a file now and it is deleted before we
3035 exec it, we lose, even if the deletion leaves a valid file
3036 further down in the PATH, (2) there is no way to know exactly
3037 what an executable (in the sense of "capable of being
3038 exec'd") file is. Using access() loses because it may lose
3039 if the caller is the superuser; failing to use it loses if
3040 there are ACLs or some such. */
c906108c 3041
995816ba
PA
3042 const char *p;
3043 const char *p1;
c906108c 3044 /* FIXME-maybe: might want "set path" command so user can change what
c3f6f71d 3045 path is used from within GDB. */
995816ba 3046 const char *path = getenv ("PATH");
c906108c
SS
3047 int len;
3048 struct stat statbuf;
3049
3050 if (path == NULL)
3051 path = "/bin:/usr/bin";
3052
b196bc4c 3053 tryname = (char *) alloca (strlen (path) + strlen (shell_file) + 2);
c3f6f71d 3054 for (p = path; p != NULL; p = p1 ? p1 + 1: NULL)
c906108c
SS
3055 {
3056 p1 = strchr (p, ':');
3057 if (p1 != NULL)
3058 len = p1 - p;
3059 else
3060 len = strlen (p);
3061 strncpy (tryname, p, len);
3062 tryname[len] = '\0';
3063 strcat (tryname, "/");
3064 strcat (tryname, shell_file);
3065 if (access (tryname, X_OK) < 0)
3066 continue;
3067 if (stat (tryname, &statbuf) < 0)
3068 continue;
3069 if (!S_ISREG (statbuf.st_mode))
3070 /* We certainly need to reject directories. I'm not quite
3071 as sure about FIFOs, sockets, etc., but I kind of doubt
3072 that people want to exec() these things. */
3073 continue;
3074 break;
3075 }
3076 if (p == NULL)
3077 /* Not found. This must be an error rather than merely passing
3078 the file to execlp(), because execlp() would try all the
3079 exec()s, causing GDB to get confused. */
8a3fe4f8 3080 error (_("procfs:%d -- Can't find shell %s in PATH"),
c3f6f71d 3081 __LINE__, shell_file);
c906108c
SS
3082
3083 shell_file = tryname;
3084 }
3085
28439f5e 3086 pid = fork_inferior (exec_file, allargs, env, procfs_set_exec_trap,
e69860f1 3087 NULL, NULL, shell_file, NULL);
28439f5e 3088
2090129c
SDJ
3089 /* We have something that executes now. We'll be running through
3090 the shell at this point (if startup-with-shell is true), but the
3091 pid shouldn't change. */
f2907e49 3092 add_thread_silent (ptid_t (pid));
2090129c 3093
f6ac5f3d 3094 procfs_init_inferior (this, pid);
27087a3d
JB
3095}
3096
3097/* An observer for the "inferior_created" event. */
c906108c 3098
27087a3d
JB
3099static void
3100procfs_inferior_created (struct target_ops *ops, int from_tty)
3101{
c906108c
SS
3102}
3103
e8032dde 3104/* Callback for update_thread_list. Calls "add_thread". */
c906108c 3105
c3f6f71d 3106static int
fba45db2 3107procfs_notice_thread (procinfo *pi, procinfo *thread, void *ptr)
c906108c 3108{
fd79271b 3109 ptid_t gdb_threadid = ptid_t (pi->pid, thread->tid, 0);
c906108c 3110
24bce9bb
PA
3111 thread_info *thr = find_thread_ptid (gdb_threadid);
3112 if (thr == NULL || thr->state == THREAD_EXITED)
c3f6f71d 3113 add_thread (gdb_threadid);
c906108c 3114
c3f6f71d
JM
3115 return 0;
3116}
3117
77382aee
PA
3118/* Query all the threads that the target knows about, and give them
3119 back to GDB to add to its list. */
c3f6f71d 3120
f6ac5f3d
PA
3121void
3122procfs_target::update_thread_list ()
c3f6f71d
JM
3123{
3124 procinfo *pi;
3125
e8032dde
PA
3126 prune_threads ();
3127
0df8b418 3128 /* Find procinfo for main process. */
e99b03dc 3129 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c3f6f71d
JM
3130 proc_update_threads (pi);
3131 proc_iterate_over_threads (pi, procfs_notice_thread, NULL);
c906108c
SS
3132}
3133
77382aee
PA
3134/* Return true if the thread is still 'alive'. This guy doesn't
3135 really seem to be doing his job. Got to investigate how to tell
3136 when a thread is really gone. */
c906108c 3137
57810aa7 3138bool
f6ac5f3d 3139procfs_target::thread_alive (ptid_t ptid)
c906108c 3140{
c3f6f71d
JM
3141 int proc, thread;
3142 procinfo *pi;
c906108c 3143
e99b03dc 3144 proc = ptid.pid ();
e38504b3 3145 thread = ptid.lwp ();
0df8b418 3146 /* If I don't know it, it ain't alive! */
c475f569
RO
3147 pi = find_procinfo (proc, thread);
3148 if (pi == NULL)
57810aa7 3149 return false;
c3f6f71d
JM
3150
3151 /* If I can't get its status, it ain't alive!
3152 What's more, I need to forget about it! */
3153 if (!proc_get_status (pi))
3154 {
3155 destroy_procinfo (pi);
57810aa7 3156 return false;
c3f6f71d 3157 }
77382aee
PA
3158 /* I couldn't have got its status if it weren't alive, so it's
3159 alive. */
57810aa7 3160 return true;
c906108c 3161}
c3f6f71d 3162
a068643d 3163/* Convert PTID to a string. */
c3f6f71d 3164
a068643d 3165std::string
f6ac5f3d 3166procfs_target::pid_to_str (ptid_t ptid)
c3f6f71d 3167{
e38504b3 3168 if (ptid.lwp () == 0)
a068643d 3169 return string_printf ("process %d", ptid.pid ());
c3f6f71d 3170 else
a068643d 3171 return string_printf ("LWP %ld", ptid.lwp ());
c3f6f71d
JM
3172}
3173
4206c05e
RO
3174/* Accepts an integer PID; Returns a string representing a file that
3175 can be opened to get the symbols for the child process. */
3176
3177char *
3178procfs_target::pid_to_exec_file (int pid)
3179{
3180 static char buf[PATH_MAX];
3181 char name[PATH_MAX];
3182
3183 /* Solaris 11 introduced /proc/<proc-id>/execname. */
c475f569 3184 xsnprintf (name, sizeof (name), "/proc/%d/execname", pid);
4206c05e
RO
3185 scoped_fd fd (gdb_open_cloexec (name, O_RDONLY, 0));
3186 if (fd.get () < 0 || read (fd.get (), buf, PATH_MAX - 1) < 0)
3187 {
3188 /* If that fails, fall back to /proc/<proc-id>/path/a.out introduced in
3189 Solaris 10. */
3190 ssize_t len;
3191
c475f569 3192 xsnprintf (name, sizeof (name), "/proc/%d/path/a.out", pid);
4206c05e
RO
3193 len = readlink (name, buf, PATH_MAX - 1);
3194 if (len <= 0)
3195 strcpy (buf, name);
3196 else
3197 buf[len] = '\0';
3198 }
3199
3200 return buf;
3201}
3202
77382aee 3203/* Insert a watchpoint. */
c3f6f71d 3204
a0911fd0 3205static int
39f77062 3206procfs_set_watchpoint (ptid_t ptid, CORE_ADDR addr, int len, int rwflag,
77382aee 3207 int after)
c906108c 3208{
c3f6f71d 3209 int pflags = 0;
19958708 3210 procinfo *pi;
c3f6f71d 3211
e99b03dc
TT
3212 pi = find_procinfo_or_die (ptid.pid () == -1 ?
3213 inferior_ptid.pid () : ptid.pid (),
dfd4cc63 3214 0);
c3f6f71d 3215
0df8b418
MS
3216 /* Translate from GDB's flags to /proc's. */
3217 if (len > 0) /* len == 0 means delete watchpoint. */
c906108c 3218 {
0df8b418 3219 switch (rwflag) { /* FIXME: need an enum! */
c3f6f71d
JM
3220 case hw_write: /* default watchpoint (write) */
3221 pflags = WRITE_WATCHFLAG;
3222 break;
3223 case hw_read: /* read watchpoint */
3224 pflags = READ_WATCHFLAG;
3225 break;
3226 case hw_access: /* access watchpoint */
3227 pflags = READ_WATCHFLAG | WRITE_WATCHFLAG;
3228 break;
3229 case hw_execute: /* execution HW breakpoint */
3230 pflags = EXEC_WATCHFLAG;
3231 break;
0df8b418 3232 default: /* Something weird. Return error. */
c906108c 3233 return -1;
c3f6f71d 3234 }
0df8b418 3235 if (after) /* Stop after r/w access is completed. */
c3f6f71d
JM
3236 pflags |= AFTER_WATCHFLAG;
3237 }
3238
3239 if (!proc_set_watchpoint (pi, addr, len, pflags))
3240 {
0df8b418 3241 if (errno == E2BIG) /* Typical error for no resources. */
c3f6f71d
JM
3242 return -1; /* fail */
3243 /* GDB may try to remove the same watchpoint twice.
3244 If a remove request returns no match, don't error. */
c906108c 3245 if (errno == ESRCH && len == 0)
c3f6f71d
JM
3246 return 0; /* ignore */
3247 proc_error (pi, "set_watchpoint", __LINE__);
c906108c
SS
3248 }
3249 return 0;
3250}
3251
1e03ad20
KB
3252/* Return non-zero if we can set a hardware watchpoint of type TYPE. TYPE
3253 is one of bp_hardware_watchpoint, bp_read_watchpoint, bp_write_watchpoint,
3254 or bp_hardware_watchpoint. CNT is the number of watchpoints used so
3255 far.
19958708 3256
1e03ad20
KB
3257 Note: procfs_can_use_hw_breakpoint() is not yet used by all
3258 procfs.c targets due to the fact that some of them still define
d92524f1 3259 target_can_use_hardware_watchpoint. */
1e03ad20 3260
f6ac5f3d
PA
3261int
3262procfs_target::can_use_hw_breakpoint (enum bptype type, int cnt, int othertype)
1e03ad20 3263{
1e03ad20
KB
3264 /* Due to the way that proc_set_watchpoint() is implemented, host
3265 and target pointers must be of the same size. If they are not,
3266 we can't use hardware watchpoints. This limitation is due to the
9a043c1d
AC
3267 fact that proc_set_watchpoint() calls
3268 procfs_address_to_host_pointer(); a close inspection of
3269 procfs_address_to_host_pointer will reveal that an internal error
3270 will be generated when the host and target pointer sizes are
3271 different. */
f5656ead 3272 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
f4a14ae6 3273
4e906f53 3274 if (sizeof (void *) != TYPE_LENGTH (ptr_type))
1e03ad20
KB
3275 return 0;
3276
3277 /* Other tests here??? */
3278
3279 return 1;
1e03ad20
KB
3280}
3281
77382aee
PA
3282/* Returns non-zero if process is stopped on a hardware watchpoint
3283 fault, else returns zero. */
c3f6f71d 3284
57810aa7 3285bool
f6ac5f3d 3286procfs_target::stopped_by_watchpoint ()
c906108c 3287{
c3f6f71d 3288 procinfo *pi;
c906108c 3289
e99b03dc 3290 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
aaeb7efa 3291
c3f6f71d 3292 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
c475f569
RO
3293 if (proc_why (pi) == PR_FAULTED)
3294 if (proc_what (pi) == FLTWATCH)
3295 return true;
57810aa7 3296 return false;
c906108c 3297}
c906108c 3298
77382aee
PA
3299/* Returns 1 if the OS knows the position of the triggered watchpoint,
3300 and sets *ADDR to that address. Returns 0 if OS cannot report that
3301 address. This function is only called if
3302 procfs_stopped_by_watchpoint returned 1, thus no further checks are
3303 done. The function also assumes that ADDR is not NULL. */
bf701c2c 3304
57810aa7 3305bool
f6ac5f3d 3306procfs_target::stopped_data_address (CORE_ADDR *addr)
bf701c2c
PM
3307{
3308 procinfo *pi;
3309
e99b03dc 3310 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
bf701c2c
PM
3311 return proc_watchpoint_address (pi, addr);
3312}
3313
f6ac5f3d
PA
3314int
3315procfs_target::insert_watchpoint (CORE_ADDR addr, int len,
3316 enum target_hw_bp_type type,
3317 struct expression *cond)
25513619 3318{
d92524f1 3319 if (!target_have_steppable_watchpoint
f5656ead 3320 && !gdbarch_have_nonsteppable_watchpoint (target_gdbarch ()))
c475f569
RO
3321 /* When a hardware watchpoint fires off the PC will be left at
3322 the instruction following the one which caused the
3323 watchpoint. It will *NOT* be necessary for GDB to step over
3324 the watchpoint. */
3325 return procfs_set_watchpoint (inferior_ptid, addr, len, type, 1);
25513619 3326 else
c475f569
RO
3327 /* When a hardware watchpoint fires off the PC will be left at
3328 the instruction which caused the watchpoint. It will be
3329 necessary for GDB to step over the watchpoint. */
3330 return procfs_set_watchpoint (inferior_ptid, addr, len, type, 0);
25513619
PA
3331}
3332
f6ac5f3d
PA
3333int
3334procfs_target::remove_watchpoint (CORE_ADDR addr, int len,
3335 enum target_hw_bp_type type,
3336 struct expression *cond)
25513619
PA
3337{
3338 return procfs_set_watchpoint (inferior_ptid, addr, 0, 0, 0);
3339}
3340
f6ac5f3d
PA
3341int
3342procfs_target::region_ok_for_hw_watchpoint (CORE_ADDR addr, int len)
25513619
PA
3343{
3344 /* The man page for proc(4) on Solaris 2.6 and up says that the
3345 system can support "thousands" of hardware watchpoints, but gives
3346 no method for finding out how many; It doesn't say anything about
3347 the allowed size for the watched area either. So we just tell
3348 GDB 'yes'. */
3349 return 1;
3350}
3351
77382aee
PA
3352/* Memory Mappings Functions: */
3353
3354/* Call a callback function once for each mapping, passing it the
3355 mapping, an optional secondary callback function, and some optional
3356 opaque data. Quit and return the first non-zero value returned
3357 from the callback.
3358
3359 PI is the procinfo struct for the process to be mapped. FUNC is
3360 the callback function to be called by this iterator. DATA is the
3361 optional opaque data to be passed to the callback function.
3362 CHILD_FUNC is the optional secondary function pointer to be passed
3363 to the child function. Returns the first non-zero return value
3364 from the callback function, or zero. */
831e682e
MS
3365
3366static int
b8edc417 3367iterate_over_mappings (procinfo *pi, find_memory_region_ftype child_func,
e9ef4f39 3368 void *data,
19958708 3369 int (*func) (struct prmap *map,
b8edc417 3370 find_memory_region_ftype child_func,
831e682e
MS
3371 void *data))
3372{
3373 char pathname[MAX_PROC_NAME_SIZE];
3374 struct prmap *prmaps;
3375 struct prmap *prmap;
3376 int funcstat;
831e682e 3377 int nmap;
831e682e 3378 struct stat sbuf;
831e682e 3379
19958708 3380 /* Get the number of mappings, allocate space,
831e682e 3381 and read the mappings into prmaps. */
0df8b418 3382 /* Open map fd. */
c475f569 3383 xsnprintf (pathname, sizeof (pathname), "/proc/%d/map", pi->pid);
831e682e 3384
5dc1a704
TT
3385 scoped_fd map_fd (open (pathname, O_RDONLY));
3386 if (map_fd.get () < 0)
3387 proc_error (pi, "iterate_over_mappings (open)", __LINE__);
831e682e 3388
19958708 3389 /* Use stat to determine the file size, and compute
831e682e 3390 the number of prmap_t objects it contains. */
5dc1a704 3391 if (fstat (map_fd.get (), &sbuf) != 0)
831e682e
MS
3392 proc_error (pi, "iterate_over_mappings (fstat)", __LINE__);
3393
3394 nmap = sbuf.st_size / sizeof (prmap_t);
3395 prmaps = (struct prmap *) alloca ((nmap + 1) * sizeof (*prmaps));
5dc1a704 3396 if (read (map_fd.get (), (char *) prmaps, nmap * sizeof (*prmaps))
831e682e
MS
3397 != (nmap * sizeof (*prmaps)))
3398 proc_error (pi, "iterate_over_mappings (read)", __LINE__);
831e682e
MS
3399
3400 for (prmap = prmaps; nmap > 0; prmap++, nmap--)
c475f569
RO
3401 {
3402 funcstat = (*func) (prmap, child_func, data);
3403 if (funcstat != 0)
3404 return funcstat;
3405 }
831e682e
MS
3406
3407 return 0;
3408}
3409
77382aee 3410/* Implements the to_find_memory_regions method. Calls an external
b8edc417 3411 function for each memory region.
77382aee 3412 Returns the integer value returned by the callback. */
be4d1333
MS
3413
3414static int
19958708 3415find_memory_regions_callback (struct prmap *map,
b8edc417 3416 find_memory_region_ftype func, void *data)
be4d1333 3417{
bf75638e 3418 return (*func) ((CORE_ADDR) map->pr_vaddr,
19958708 3419 map->pr_size,
be4d1333
MS
3420 (map->pr_mflags & MA_READ) != 0,
3421 (map->pr_mflags & MA_WRITE) != 0,
19958708 3422 (map->pr_mflags & MA_EXEC) != 0,
4f69f4c2 3423 1, /* MODIFIED is unknown, pass it as true. */
be4d1333
MS
3424 data);
3425}
3426
77382aee
PA
3427/* External interface. Calls a callback function once for each
3428 mapped memory region in the child process, passing as arguments:
3429
3430 CORE_ADDR virtual_address,
3431 unsigned long size,
3432 int read, TRUE if region is readable by the child
3433 int write, TRUE if region is writable by the child
3434 int execute TRUE if region is executable by the child.
3435
3436 Stops iterating and returns the first non-zero value returned by
3437 the callback. */
be4d1333 3438
f6ac5f3d
PA
3439int
3440procfs_target::find_memory_regions (find_memory_region_ftype func, void *data)
be4d1333 3441{
e99b03dc 3442 procinfo *pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
be4d1333 3443
19958708 3444 return iterate_over_mappings (pi, func, data,
be4d1333
MS
3445 find_memory_regions_callback);
3446}
3447
77382aee 3448/* Returns an ascii representation of a memory mapping's flags. */
c3f6f71d 3449
388faa48 3450static char *
5ae5f592 3451mappingflags (long flags)
388faa48
MS
3452{
3453 static char asciiflags[8];
3454
3455 strcpy (asciiflags, "-------");
388faa48
MS
3456 if (flags & MA_STACK)
3457 asciiflags[1] = 's';
3458 if (flags & MA_BREAK)
3459 asciiflags[2] = 'b';
3460 if (flags & MA_SHARED)
3461 asciiflags[3] = 's';
3462 if (flags & MA_READ)
3463 asciiflags[4] = 'r';
3464 if (flags & MA_WRITE)
3465 asciiflags[5] = 'w';
3466 if (flags & MA_EXEC)
3467 asciiflags[6] = 'x';
3468 return (asciiflags);
3469}
3470
77382aee
PA
3471/* Callback function, does the actual work for 'info proc
3472 mappings'. */
831e682e 3473
831e682e 3474static int
b8edc417 3475info_mappings_callback (struct prmap *map, find_memory_region_ftype ignore,
e9ef4f39 3476 void *unused)
831e682e 3477{
0b62613e 3478 unsigned int pr_off;
831e682e 3479
0b62613e 3480 pr_off = (unsigned int) map->pr_offset;
0b62613e 3481
f5656ead 3482 if (gdbarch_addr_bit (target_gdbarch ()) == 32)
f6a96b83 3483 printf_filtered ("\t%#10lx %#10lx %#10lx %#10x %7s\n",
0b62613e
PA
3484 (unsigned long) map->pr_vaddr,
3485 (unsigned long) map->pr_vaddr + map->pr_size - 1,
f6a96b83 3486 (unsigned long) map->pr_size,
0b62613e
PA
3487 pr_off,
3488 mappingflags (map->pr_mflags));
3489 else
f6a96b83 3490 printf_filtered (" %#18lx %#18lx %#10lx %#10x %7s\n",
0b62613e
PA
3491 (unsigned long) map->pr_vaddr,
3492 (unsigned long) map->pr_vaddr + map->pr_size - 1,
f6a96b83 3493 (unsigned long) map->pr_size,
0b62613e
PA
3494 pr_off,
3495 mappingflags (map->pr_mflags));
831e682e
MS
3496
3497 return 0;
3498}
3499
77382aee 3500/* Implement the "info proc mappings" subcommand. */
388faa48
MS
3501
3502static void
3503info_proc_mappings (procinfo *pi, int summary)
3504{
388faa48 3505 if (summary)
0df8b418 3506 return; /* No output for summary mode. */
388faa48 3507
a3f17187 3508 printf_filtered (_("Mapped address spaces:\n\n"));
f5656ead 3509 if (gdbarch_ptr_bit (target_gdbarch ()) == 32)
0b62613e
PA
3510 printf_filtered ("\t%10s %10s %10s %10s %7s\n",
3511 "Start Addr",
3512 " End Addr",
3513 " Size",
3514 " Offset",
3515 "Flags");
3516 else
3517 printf_filtered (" %18s %18s %10s %10s %7s\n",
3518 "Start Addr",
3519 " End Addr",
3520 " Size",
3521 " Offset",
3522 "Flags");
388faa48 3523
831e682e 3524 iterate_over_mappings (pi, NULL, NULL, info_mappings_callback);
388faa48
MS
3525 printf_filtered ("\n");
3526}
3527
77382aee 3528/* Implement the "info proc" command. */
c3f6f71d 3529
f6ac5f3d
PA
3530bool
3531procfs_target::info_proc (const char *args, enum info_proc_what what)
c906108c 3532{
388faa48
MS
3533 procinfo *process = NULL;
3534 procinfo *thread = NULL;
388faa48
MS
3535 char *tmp = NULL;
3536 int pid = 0;
3537 int tid = 0;
3538 int mappings = 0;
c906108c 3539
145b16a9
UW
3540 switch (what)
3541 {
3542 case IP_MINIMAL:
3543 break;
3544
3545 case IP_MAPPINGS:
3546 case IP_ALL:
3547 mappings = 1;
3548 break;
3549
3550 default:
3551 error (_("Not supported on this target."));
3552 }
3553
773a1edc 3554 gdb_argv built_argv (args);
4fa7574e 3555 for (char *arg : built_argv)
c3f6f71d 3556 {
773a1edc 3557 if (isdigit (arg[0]))
c3f6f71d 3558 {
773a1edc 3559 pid = strtoul (arg, &tmp, 10);
c3f6f71d
JM
3560 if (*tmp == '/')
3561 tid = strtoul (++tmp, NULL, 10);
3562 }
773a1edc 3563 else if (arg[0] == '/')
c3f6f71d 3564 {
773a1edc 3565 tid = strtoul (arg + 1, NULL, 10);
c3f6f71d 3566 }
c3f6f71d 3567 }
5b4cbbe3
TT
3568
3569 procinfo_up temporary_procinfo;
c3f6f71d 3570 if (pid == 0)
e99b03dc 3571 pid = inferior_ptid.pid ();
c3f6f71d 3572 if (pid == 0)
8a3fe4f8 3573 error (_("No current process: you must name one."));
c3f6f71d 3574 else
c906108c 3575 {
c3f6f71d 3576 /* Have pid, will travel.
0df8b418 3577 First see if it's a process we're already debugging. */
c3f6f71d
JM
3578 process = find_procinfo (pid, 0);
3579 if (process == NULL)
3580 {
19958708 3581 /* No. So open a procinfo for it, but
c3f6f71d
JM
3582 remember to close it again when finished. */
3583 process = create_procinfo (pid, 0);
5b4cbbe3 3584 temporary_procinfo.reset (process);
c3f6f71d
JM
3585 if (!open_procinfo_files (process, FD_CTL))
3586 proc_error (process, "info proc, open_procinfo_files", __LINE__);
3587 }
c906108c 3588 }
c3f6f71d
JM
3589 if (tid != 0)
3590 thread = create_procinfo (pid, tid);
3591
3592 if (process)
3593 {
a3f17187 3594 printf_filtered (_("process %d flags:\n"), process->pid);
c3f6f71d
JM
3595 proc_prettyprint_flags (proc_flags (process), 1);
3596 if (proc_flags (process) & (PR_STOPPED | PR_ISTOP))
3597 proc_prettyprint_why (proc_why (process), proc_what (process), 1);
3598 if (proc_get_nthreads (process) > 1)
19958708 3599 printf_filtered ("Process has %d threads.\n",
c3f6f71d
JM
3600 proc_get_nthreads (process));
3601 }
3602 if (thread)
3603 {
a3f17187 3604 printf_filtered (_("thread %d flags:\n"), thread->tid);
c3f6f71d
JM
3605 proc_prettyprint_flags (proc_flags (thread), 1);
3606 if (proc_flags (thread) & (PR_STOPPED | PR_ISTOP))
3607 proc_prettyprint_why (proc_why (thread), proc_what (thread), 1);
3608 }
3609
388faa48 3610 if (mappings)
c475f569 3611 info_proc_mappings (process, 0);
388faa48 3612
f6ac5f3d 3613 return true;
c906108c
SS
3614}
3615
9185ddce
JB
3616/* Modify the status of the system call identified by SYSCALLNUM in
3617 the set of syscalls that are currently traced/debugged.
3618
3619 If ENTRY_OR_EXIT is set to PR_SYSENTRY, then the entry syscalls set
0df8b418 3620 will be updated. Otherwise, the exit syscalls set will be updated.
9185ddce 3621
0df8b418 3622 If MODE is FLAG_SET, then traces will be enabled. Otherwise, they
9185ddce
JB
3623 will be disabled. */
3624
3625static void
3626proc_trace_syscalls_1 (procinfo *pi, int syscallnum, int entry_or_exit,
77382aee 3627 int mode, int from_tty)
9185ddce
JB
3628{
3629 sysset_t *sysset;
77382aee 3630
9185ddce
JB
3631 if (entry_or_exit == PR_SYSENTRY)
3632 sysset = proc_get_traced_sysentry (pi, NULL);
3633 else
3634 sysset = proc_get_traced_sysexit (pi, NULL);
3635
3636 if (sysset == NULL)
3637 proc_error (pi, "proc-trace, get_traced_sysset", __LINE__);
3638
3639 if (mode == FLAG_SET)
44122162 3640 praddset (sysset, syscallnum);
9185ddce 3641 else
44122162 3642 prdelset (sysset, syscallnum);
9185ddce
JB
3643
3644 if (entry_or_exit == PR_SYSENTRY)
3645 {
3646 if (!proc_set_traced_sysentry (pi, sysset))
77382aee 3647 proc_error (pi, "proc-trace, set_traced_sysentry", __LINE__);
9185ddce
JB
3648 }
3649 else
3650 {
3651 if (!proc_set_traced_sysexit (pi, sysset))
77382aee 3652 proc_error (pi, "proc-trace, set_traced_sysexit", __LINE__);
9185ddce
JB
3653 }
3654}
3655
c3f6f71d 3656static void
0b39b52e 3657proc_trace_syscalls (const char *args, int from_tty, int entry_or_exit, int mode)
c906108c 3658{
c3f6f71d 3659 procinfo *pi;
c906108c 3660
e99b03dc 3661 if (inferior_ptid.pid () <= 0)
8a3fe4f8 3662 error (_("you must be debugging a process to use this command."));
c906108c 3663
c3f6f71d 3664 if (args == NULL || args[0] == 0)
e2e0b3e5 3665 error_no_arg (_("system call to trace"));
c3f6f71d 3666
e99b03dc 3667 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c3f6f71d
JM
3668 if (isdigit (args[0]))
3669 {
9185ddce 3670 const int syscallnum = atoi (args);
c906108c 3671
9185ddce 3672 proc_trace_syscalls_1 (pi, syscallnum, entry_or_exit, mode, from_tty);
c3f6f71d
JM
3673 }
3674}
3675
19958708 3676static void
0b39b52e 3677proc_trace_sysentry_cmd (const char *args, int from_tty)
c906108c 3678{
c3f6f71d
JM
3679 proc_trace_syscalls (args, from_tty, PR_SYSENTRY, FLAG_SET);
3680}
c906108c 3681
19958708 3682static void
0b39b52e 3683proc_trace_sysexit_cmd (const char *args, int from_tty)
c3f6f71d
JM
3684{
3685 proc_trace_syscalls (args, from_tty, PR_SYSEXIT, FLAG_SET);
c906108c 3686}
c906108c 3687
19958708 3688static void
0b39b52e 3689proc_untrace_sysentry_cmd (const char *args, int from_tty)
c3f6f71d
JM
3690{
3691 proc_trace_syscalls (args, from_tty, PR_SYSENTRY, FLAG_RESET);
3692}
3693
19958708 3694static void
0b39b52e 3695proc_untrace_sysexit_cmd (const char *args, int from_tty)
c906108c 3696{
c3f6f71d
JM
3697 proc_trace_syscalls (args, from_tty, PR_SYSEXIT, FLAG_RESET);
3698}
c906108c 3699
c906108c 3700void
fba45db2 3701_initialize_procfs (void)
c906108c 3702{
76727919 3703 gdb::observers::inferior_created.attach (procfs_inferior_created);
27087a3d 3704
19958708 3705 add_com ("proc-trace-entry", no_class, proc_trace_sysentry_cmd,
1bedd215 3706 _("Give a trace of entries into the syscall."));
19958708 3707 add_com ("proc-trace-exit", no_class, proc_trace_sysexit_cmd,
1bedd215 3708 _("Give a trace of exits from the syscall."));
19958708 3709 add_com ("proc-untrace-entry", no_class, proc_untrace_sysentry_cmd,
1bedd215 3710 _("Cancel a trace of entries into the syscall."));
19958708 3711 add_com ("proc-untrace-exit", no_class, proc_untrace_sysexit_cmd,
1bedd215 3712 _("Cancel a trace of exits from the syscall."));
c1955e17 3713
62c808ae 3714 add_inf_child_target (&the_procfs_target);
c3f6f71d
JM
3715}
3716
3717/* =================== END, GDB "MODULE" =================== */
3718
3719
3720
77382aee
PA
3721/* miscellaneous stubs: */
3722
3723/* The following satisfy a few random symbols mostly created by the
3724 solaris threads implementation, which I will chase down later. */
c3f6f71d 3725
77382aee
PA
3726/* Return a pid for which we guarantee we will be able to find a
3727 'live' procinfo. */
c3f6f71d 3728
39f77062 3729ptid_t
fba45db2 3730procfs_first_available (void)
c3f6f71d 3731{
f2907e49 3732 return ptid_t (procinfo_list ? procinfo_list->pid : -1);
c3f6f71d 3733}
be4d1333
MS
3734
3735/* =================== GCORE .NOTE "MODULE" =================== */
3736
3737static char *
19958708 3738procfs_do_thread_registers (bfd *obfd, ptid_t ptid,
2020b7ab 3739 char *note_data, int *note_size,
2ea28649 3740 enum gdb_signal stop_signal)
be4d1333 3741{
594f7785 3742 struct regcache *regcache = get_thread_regcache (ptid);
be4d1333
MS
3743 gdb_gregset_t gregs;
3744 gdb_fpregset_t fpregs;
3745 unsigned long merged_pid;
3746
e38504b3 3747 merged_pid = ptid.lwp () << 16 | ptid.pid ();
be4d1333 3748
75125405
DJ
3749 /* This part is the old method for fetching registers.
3750 It should be replaced by the newer one using regsets
3751 once it is implemented in this platform:
29082443 3752 gdbarch_iterate_over_regset_sections(). */
75125405 3753
2989a365 3754 scoped_restore save_inferior_ptid = make_scoped_restore (&inferior_ptid);
75125405
DJ
3755 inferior_ptid = ptid;
3756 target_fetch_registers (regcache, -1);
3757
594f7785 3758 fill_gregset (regcache, &gregs, -1);
65554fef
MS
3759 note_data = (char *) elfcore_write_lwpstatus (obfd,
3760 note_data,
3761 note_size,
19958708 3762 merged_pid,
65554fef
MS
3763 stop_signal,
3764 &gregs);
594f7785 3765 fill_fpregset (regcache, &fpregs, -1);
be4d1333
MS
3766 note_data = (char *) elfcore_write_prfpreg (obfd,
3767 note_data,
3768 note_size,
3769 &fpregs,
3770 sizeof (fpregs));
75125405 3771
be4d1333
MS
3772 return note_data;
3773}
3774
3775struct procfs_corefile_thread_data {
3776 bfd *obfd;
3777 char *note_data;
3778 int *note_size;
2ea28649 3779 enum gdb_signal stop_signal;
be4d1333
MS
3780};
3781
3782static int
65554fef 3783procfs_corefile_thread_callback (procinfo *pi, procinfo *thread, void *data)
be4d1333 3784{
b196bc4c
RO
3785 struct procfs_corefile_thread_data *args
3786 = (struct procfs_corefile_thread_data *) data;
be4d1333 3787
2689673f 3788 if (pi != NULL)
be4d1333 3789 {
fd79271b 3790 ptid_t ptid = ptid_t (pi->pid, thread->tid, 0);
f4a14ae6 3791
75125405 3792 args->note_data = procfs_do_thread_registers (args->obfd, ptid,
19958708 3793 args->note_data,
2020b7ab
PA
3794 args->note_size,
3795 args->stop_signal);
be4d1333
MS
3796 }
3797 return 0;
3798}
3799
a223f1e7
JB
3800static int
3801find_signalled_thread (struct thread_info *info, void *data)
3802{
a493e3e2 3803 if (info->suspend.stop_signal != GDB_SIGNAL_0
e99b03dc 3804 && info->ptid.pid () == inferior_ptid.pid ())
a223f1e7
JB
3805 return 1;
3806
3807 return 0;
3808}
3809
2ea28649 3810static enum gdb_signal
a223f1e7
JB
3811find_stop_signal (void)
3812{
3813 struct thread_info *info =
3814 iterate_over_threads (find_signalled_thread, NULL);
3815
3816 if (info)
16c381f0 3817 return info->suspend.stop_signal;
a223f1e7 3818 else
a493e3e2 3819 return GDB_SIGNAL_0;
a223f1e7
JB
3820}
3821
f6ac5f3d
PA
3822char *
3823procfs_target::make_corefile_notes (bfd *obfd, int *note_size)
be4d1333 3824{
be4d1333 3825 gdb_gregset_t gregs;
be4d1333
MS
3826 char fname[16] = {'\0'};
3827 char psargs[80] = {'\0'};
e99b03dc 3828 procinfo *pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
be4d1333 3829 char *note_data = NULL;
cbaaa0ca 3830 const char *inf_args;
be4d1333 3831 struct procfs_corefile_thread_data thread_args;
2ea28649 3832 enum gdb_signal stop_signal;
be4d1333
MS
3833
3834 if (get_exec_file (0))
3835 {
9f37bbcc 3836 strncpy (fname, lbasename (get_exec_file (0)), sizeof (fname));
4e2af517
JM
3837 fname[sizeof (fname) - 1] = 0;
3838 strncpy (psargs, get_exec_file (0), sizeof (psargs));
3839 psargs[sizeof (psargs) - 1] = 0;
6dbdc4a3
MS
3840
3841 inf_args = get_inferior_args ();
c475f569
RO
3842 if (inf_args && *inf_args
3843 && (strlen (inf_args)
3844 < ((int) sizeof (psargs) - (int) strlen (psargs))))
be4d1333 3845 {
19958708 3846 strncat (psargs, " ",
be4d1333 3847 sizeof (psargs) - strlen (psargs));
19958708 3848 strncat (psargs, inf_args,
be4d1333
MS
3849 sizeof (psargs) - strlen (psargs));
3850 }
3851 }
3852
19958708
RM
3853 note_data = (char *) elfcore_write_prpsinfo (obfd,
3854 note_data,
3855 note_size,
3856 fname,
be4d1333
MS
3857 psargs);
3858
651c8d2d
PA
3859 stop_signal = find_stop_signal ();
3860
3e3420f6
PA
3861 fill_gregset (get_current_regcache (), &gregs, -1);
3862 note_data = elfcore_write_pstatus (obfd, note_data, note_size,
e99b03dc 3863 inferior_ptid.pid (),
3e3420f6 3864 stop_signal, &gregs);
3e3420f6 3865
be4d1333
MS
3866 thread_args.obfd = obfd;
3867 thread_args.note_data = note_data;
3868 thread_args.note_size = note_size;
651c8d2d 3869 thread_args.stop_signal = stop_signal;
3e43a32a
MS
3870 proc_iterate_over_threads (pi, procfs_corefile_thread_callback,
3871 &thread_args);
2689673f 3872 note_data = thread_args.note_data;
be4d1333 3873
62c808ae
RO
3874 gdb::optional<gdb::byte_vector> auxv =
3875 target_read_alloc (current_top_target (), TARGET_OBJECT_AUXV, NULL);
3876 if (auxv && !auxv->empty ())
3877 note_data = elfcore_write_note (obfd, note_data, note_size,
3878 "CORE", NT_AUXV, auxv->data (),
3879 auxv->size ());
4e73f23d 3880
be4d1333
MS
3881 return note_data;
3882}
be4d1333 3883/* =================== END GCORE .NOTE "MODULE" =================== */