]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/procfs.c
Fix Solaris regression (PR tdep/30252)
[thirdparty/binutils-gdb.git] / gdb / procfs.c
CommitLineData
44122162 1/* Machine independent support for Solaris /proc (process file system) for GDB.
2555fe1a 2
213516ef 3 Copyright (C) 1999-2023 Free Software Foundation, Inc.
2555fe1a 4
c3f6f71d
JM
5 Written by Michael Snyder at Cygnus Solutions.
6 Based on work by Fred Fish, Stu Grossman, Geoff Noer, and others.
c906108c 7
a9762ec7
JB
8 This file is part of GDB.
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
14
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
21 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c 22
c3f6f71d
JM
23#include "defs.h"
24#include "inferior.h"
45741a9c 25#include "infrun.h"
c3f6f71d
JM
26#include "target.h"
27#include "gdbcore.h"
65554fef 28#include "elf-bfd.h" /* for elfcore_write_* */
c3f6f71d 29#include "gdbcmd.h"
0fda6bd2 30#include "gdbthread.h"
7f7fe91e 31#include "regcache.h"
28439f5e 32#include "inf-child.h"
4fa7574e 33#include "nat/fork-inferior.h"
0d12e84c 34#include "gdbarch.h"
c906108c 35
c3f6f71d
JM
36#include <sys/procfs.h>
37#include <sys/fault.h>
38#include <sys/syscall.h>
268a13a5 39#include "gdbsupport/gdb_wait.h"
0fda6bd2
JM
40#include <signal.h>
41#include <ctype.h>
92107356 42#include "gdb_bfd.h"
4e73f23d 43#include "auxv.h"
d1a7880c 44#include "procfs.h"
76727919 45#include "observable.h"
268a13a5
TT
46#include "gdbsupport/scoped_fd.h"
47#include "gdbsupport/pathstuff.h"
5530c021 48#include "gdbsupport/buildargv.h"
0fda6bd2 49
77382aee
PA
50/* This module provides the interface between GDB and the
51 /proc file system, which is used on many versions of Unix
52 as a means for debuggers to control other processes.
53
77382aee
PA
54 /proc works by imitating a file system: you open a simulated file
55 that represents the process you wish to interact with, and perform
56 operations on that "file" in order to examine or change the state
57 of the other process.
58
59 The most important thing to know about /proc and this module is
60 that there are two very different interfaces to /proc:
61
62 One that uses the ioctl system call, and another that uses read
63 and write system calls.
64
44122162
RO
65 This module supports only the Solaris version of the read/write
66 interface. */
77382aee 67
c906108c 68#include <sys/types.h>
2978b111 69#include <dirent.h> /* opendir/readdir, for listing the LWP's */
c906108c 70
c3f6f71d
JM
71#include <fcntl.h> /* for O_RDONLY */
72#include <unistd.h> /* for "X_OK" */
53ce3c39 73#include <sys/stat.h> /* for struct stat */
c906108c 74
103b3ef5
MS
75/* Note: procfs-utils.h must be included after the above system header
76 files, because it redefines various system calls using macros.
77 This may be incompatible with the prototype declarations. */
78
103b3ef5
MS
79#include "proc-utils.h"
80
77382aee 81/* Prototypes for supply_gregset etc. */
c60c0f5f
MS
82#include "gregset.h"
83
c3f6f71d 84/* =================== TARGET_OPS "MODULE" =================== */
c906108c 85
77382aee 86/* This module defines the GDB target vector and its methods. */
c906108c 87
f6ac5f3d 88
e96027e0
PA
89static enum target_xfer_status procfs_xfer_memory (gdb_byte *,
90 const gdb_byte *,
91 ULONGEST, ULONGEST,
92 ULONGEST *);
a14ed312 93
f6ac5f3d
PA
94class procfs_target final : public inf_child_target
95{
96public:
97 void create_inferior (const char *, const std::string &,
98 char **, int) override;
99
100 void kill () override;
101
102 void mourn_inferior () override;
103
104 void attach (const char *, int) override;
105 void detach (inferior *inf, int) override;
106
107 void resume (ptid_t, int, enum gdb_signal) override;
b60cea74 108 ptid_t wait (ptid_t, struct target_waitstatus *, target_wait_flags) override;
f6ac5f3d
PA
109
110 void fetch_registers (struct regcache *, int) override;
111 void store_registers (struct regcache *, int) override;
112
113 enum target_xfer_status xfer_partial (enum target_object object,
114 const char *annex,
115 gdb_byte *readbuf,
116 const gdb_byte *writebuf,
117 ULONGEST offset, ULONGEST len,
118 ULONGEST *xfered_len) override;
119
adc6a863 120 void pass_signals (gdb::array_view<const unsigned char>) override;
a14ed312 121
f6ac5f3d 122 void files_info () override;
c3f6f71d 123
f6ac5f3d 124 void update_thread_list () override;
be4d1333 125
57810aa7 126 bool thread_alive (ptid_t ptid) override;
be4d1333 127
a068643d 128 std::string pid_to_str (ptid_t) override;
1e03ad20 129
0e90c441 130 const char *pid_to_exec_file (int pid) override;
4206c05e 131
f6ac5f3d
PA
132 thread_control_capabilities get_thread_control_capabilities () override
133 { return tc_schedlock; }
145b16a9 134
f6ac5f3d
PA
135 /* find_memory_regions support method for gcore */
136 int find_memory_regions (find_memory_region_ftype func, void *data)
137 override;
b5c8fcb1 138
24f5300a 139 gdb::unique_xmalloc_ptr<char> make_corefile_notes (bfd *, int *) override;
b5c8fcb1 140
f6ac5f3d
PA
141 bool info_proc (const char *, enum info_proc_what) override;
142
c475f569 143#if PR_MODEL_NATIVE == PR_MODEL_LP64
f4ad82b3
RO
144 int auxv_parse (const gdb_byte **readptr,
145 const gdb_byte *endptr, CORE_ADDR *typep, CORE_ADDR *valp)
f6ac5f3d
PA
146 override;
147#endif
148
57810aa7 149 bool stopped_by_watchpoint () override;
f6ac5f3d
PA
150
151 int insert_watchpoint (CORE_ADDR, int, enum target_hw_bp_type,
152 struct expression *) override;
153
154 int remove_watchpoint (CORE_ADDR, int, enum target_hw_bp_type,
155 struct expression *) override;
156
157 int region_ok_for_hw_watchpoint (CORE_ADDR, int) override;
158
159 int can_use_hw_breakpoint (enum bptype, int, int) override;
57810aa7 160 bool stopped_data_address (CORE_ADDR *) override;
5b6d1e4f
PA
161
162 void procfs_init_inferior (int pid);
f6ac5f3d 163};
b5c8fcb1 164
f6ac5f3d 165static procfs_target the_procfs_target;
b5c8fcb1 166
c475f569 167#if PR_MODEL_NATIVE == PR_MODEL_LP64
77382aee
PA
168/* When GDB is built as 64-bit application on Solaris, the auxv data
169 is presented in 64-bit format. We need to provide a custom parser
170 to handle that. */
f6ac5f3d 171int
f4ad82b3
RO
172procfs_target::auxv_parse (const gdb_byte **readptr,
173 const gdb_byte *endptr, CORE_ADDR *typep,
174 CORE_ADDR *valp)
c47ffbe3 175{
f5656ead 176 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
f4ad82b3 177 const gdb_byte *ptr = *readptr;
c47ffbe3
VP
178
179 if (endptr == ptr)
180 return 0;
77382aee 181
c47ffbe3
VP
182 if (endptr - ptr < 8 * 2)
183 return -1;
184
e17a4113 185 *typep = extract_unsigned_integer (ptr, 4, byte_order);
c47ffbe3
VP
186 ptr += 8;
187 /* The size of data is always 64-bit. If the application is 32-bit,
188 it will be zero extended, as expected. */
e17a4113 189 *valp = extract_unsigned_integer (ptr, 8, byte_order);
c47ffbe3
VP
190 ptr += 8;
191
192 *readptr = ptr;
193 return 1;
194}
195#endif
196
c3f6f71d
JM
197/* =================== END, TARGET_OPS "MODULE" =================== */
198
c3f6f71d
JM
199/* =================== STRUCT PROCINFO "MODULE" =================== */
200
201 /* FIXME: this comment will soon be out of date W.R.T. threads. */
202
203/* The procinfo struct is a wrapper to hold all the state information
204 concerning a /proc process. There should be exactly one procinfo
205 for each process, and since GDB currently can debug only one
206 process at a time, that means there should be only one procinfo.
207 All of the LWP's of a process can be accessed indirectly thru the
208 single process procinfo.
209
210 However, against the day when GDB may debug more than one process,
211 this data structure is kept in a list (which for now will hold no
212 more than one member), and many functions will have a pointer to a
213 procinfo as an argument.
214
215 There will be a separate procinfo structure for use by the (not yet
216 implemented) "info proc" command, so that we can print useful
217 information about any random process without interfering with the
0df8b418 218 inferior's procinfo information. */
c3f6f71d 219
c3f6f71d 220/* format strings for /proc paths */
44122162
RO
221#define CTL_PROC_NAME_FMT "/proc/%d/ctl"
222#define AS_PROC_NAME_FMT "/proc/%d/as"
223#define MAP_PROC_NAME_FMT "/proc/%d/map"
224#define STATUS_PROC_NAME_FMT "/proc/%d/status"
13db92d3 225#define MAX_PROC_NAME_SIZE sizeof("/proc/999999/lwp/0123456789/lwpstatus")
c906108c 226
c3f6f71d
JM
227typedef struct procinfo {
228 struct procinfo *next;
229 int pid; /* Process ID */
230 int tid; /* Thread/LWP id */
c906108c 231
c3f6f71d
JM
232 /* process state */
233 int was_stopped;
234 int ignore_next_sigstop;
c906108c 235
c3f6f71d 236 int ctl_fd; /* File descriptor for /proc control file */
c3f6f71d
JM
237 int status_fd; /* File descriptor for /proc status file */
238 int as_fd; /* File descriptor for /proc as file */
c906108c 239
c3f6f71d 240 char pathname[MAX_PROC_NAME_SIZE]; /* Pathname to /proc entry */
c906108c 241
c3f6f71d 242 fltset_t saved_fltset; /* Saved traced hardware fault set */
44122162
RO
243 sigset_t saved_sigset; /* Saved traced signal set */
244 sigset_t saved_sighold; /* Saved held signal set */
37de36c6
KB
245 sysset_t *saved_exitset; /* Saved traced system call exit set */
246 sysset_t *saved_entryset; /* Saved traced system call entry set */
c906108c 247
44122162 248 pstatus_t prstatus; /* Current process status info */
19958708 249
c3f6f71d 250 struct procinfo *thread_list;
c906108c 251
c3f6f71d
JM
252 int status_valid : 1;
253 int gregs_valid : 1;
254 int fpregs_valid : 1;
255 int threads_valid: 1;
256} procinfo;
c906108c 257
c3f6f71d 258static char errmsg[128]; /* shared error msg buffer */
c906108c 259
c3f6f71d 260/* Function prototypes for procinfo module: */
c906108c 261
a14ed312
KB
262static procinfo *find_procinfo_or_die (int pid, int tid);
263static procinfo *find_procinfo (int pid, int tid);
264static procinfo *create_procinfo (int pid, int tid);
44122162 265static void destroy_procinfo (procinfo *p);
44122162
RO
266static void dead_procinfo (procinfo *p, const char *msg, int killp);
267static int open_procinfo_files (procinfo *p, int which);
268static void close_procinfo_files (procinfo *p);
c906108c 269
e9ef4f39 270static int iterate_over_mappings
b8edc417
JK
271 (procinfo *pi, find_memory_region_ftype child_func, void *data,
272 int (*func) (struct prmap *map, find_memory_region_ftype child_func,
77382aee 273 void *data));
e9ef4f39 274
c3f6f71d 275/* The head of the procinfo list: */
44122162 276static procinfo *procinfo_list;
c906108c 277
77382aee
PA
278/* Search the procinfo list. Return a pointer to procinfo, or NULL if
279 not found. */
c906108c 280
19958708 281static procinfo *
fba45db2 282find_procinfo (int pid, int tid)
c5aa993b 283{
c3f6f71d 284 procinfo *pi;
c906108c 285
c3f6f71d
JM
286 for (pi = procinfo_list; pi; pi = pi->next)
287 if (pi->pid == pid)
288 break;
c906108c 289
c3f6f71d
JM
290 if (pi)
291 if (tid)
292 {
293 /* Don't check threads_valid. If we're updating the
294 thread_list, we want to find whatever threads are already
295 here. This means that in general it is the caller's
296 responsibility to check threads_valid and update before
297 calling find_procinfo, if the caller wants to find a new
77382aee 298 thread. */
c3f6f71d
JM
299
300 for (pi = pi->thread_list; pi; pi = pi->next)
301 if (pi->tid == tid)
302 break;
303 }
c906108c 304
c3f6f71d
JM
305 return pi;
306}
c906108c 307
77382aee 308/* Calls find_procinfo, but errors on failure. */
c906108c 309
c3f6f71d 310static procinfo *
fba45db2 311find_procinfo_or_die (int pid, int tid)
c3f6f71d
JM
312{
313 procinfo *pi = find_procinfo (pid, tid);
c906108c 314
c3f6f71d 315 if (pi == NULL)
0fda6bd2
JM
316 {
317 if (tid)
3e43a32a
MS
318 error (_("procfs: couldn't find pid %d "
319 "(kernel thread %d) in procinfo list."),
0fda6bd2
JM
320 pid, tid);
321 else
8a3fe4f8 322 error (_("procfs: couldn't find pid %d in procinfo list."), pid);
0fda6bd2 323 }
c3f6f71d
JM
324 return pi;
325}
c906108c 326
77382aee
PA
327/* Wrapper for `open'. The appropriate open call is attempted; if
328 unsuccessful, it will be retried as many times as needed for the
329 EAGAIN and EINTR conditions.
19958708 330
77382aee
PA
331 For other conditions, retry the open a limited number of times. In
332 addition, a short sleep is imposed prior to retrying the open. The
333 reason for this sleep is to give the kernel a chance to catch up
334 and create the file in question in the event that GDB "wins" the
335 race to open a file before the kernel has created it. */
19958708 336
4d1bcd09
KB
337static int
338open_with_retry (const char *pathname, int flags)
339{
340 int retries_remaining, status;
341
342 retries_remaining = 2;
343
344 while (1)
345 {
346 status = open (pathname, flags);
347
348 if (status >= 0 || retries_remaining == 0)
349 break;
350 else if (errno != EINTR && errno != EAGAIN)
351 {
352 retries_remaining--;
353 sleep (1);
354 }
355 }
356
357 return status;
358}
359
44122162
RO
360/* Open the file descriptor for the process or LWP. We only open the
361 control file descriptor; the others are opened lazily as needed.
77382aee 362 Returns the file descriptor, or zero for failure. */
c906108c 363
c3f6f71d 364enum { FD_CTL, FD_STATUS, FD_AS };
c906108c 365
c3f6f71d 366static int
fba45db2 367open_procinfo_files (procinfo *pi, int which)
c3f6f71d
JM
368{
369 char tmp[MAX_PROC_NAME_SIZE];
370 int fd;
371
77382aee
PA
372 /* This function is getting ALMOST long enough to break up into
373 several. Here is some rationale:
374
77382aee 375 There are several file descriptors that may need to be open
196535a6 376 for any given process or LWP. The ones we're interested in are:
77382aee
PA
377 - control (ctl) write-only change the state
378 - status (status) read-only query the state
379 - address space (as) read/write access memory
380 - map (map) read-only virtual addr map
196535a6
RO
381 Most of these are opened lazily as they are needed.
382 The pathnames for the 'files' for an LWP look slightly
383 different from those of a first-class process:
77382aee
PA
384 Pathnames for a process (<proc-id>):
385 /proc/<proc-id>/ctl
386 /proc/<proc-id>/status
387 /proc/<proc-id>/as
388 /proc/<proc-id>/map
389 Pathnames for an LWP (lwp-id):
390 /proc/<proc-id>/lwp/<lwp-id>/lwpctl
391 /proc/<proc-id>/lwp/<lwp-id>/lwpstatus
196535a6
RO
392 An LWP has no map or address space file descriptor, since
393 the memory map and address space are shared by all LWPs. */
44122162 394
77382aee
PA
395 /* In this case, there are several different file descriptors that
396 we might be asked to open. The control file descriptor will be
397 opened early, but the others will be opened lazily as they are
398 needed. */
c3f6f71d
JM
399
400 strcpy (tmp, pi->pathname);
0df8b418 401 switch (which) { /* Which file descriptor to open? */
c3f6f71d
JM
402 case FD_CTL:
403 if (pi->tid)
404 strcat (tmp, "/lwpctl");
405 else
406 strcat (tmp, "/ctl");
4d1bcd09 407 fd = open_with_retry (tmp, O_WRONLY);
e28cade7 408 if (fd < 0)
c3f6f71d
JM
409 return 0; /* fail */
410 pi->ctl_fd = fd;
411 break;
412 case FD_AS:
413 if (pi->tid)
0df8b418 414 return 0; /* There is no 'as' file descriptor for an lwp. */
c3f6f71d 415 strcat (tmp, "/as");
4d1bcd09 416 fd = open_with_retry (tmp, O_RDWR);
e28cade7 417 if (fd < 0)
c3f6f71d
JM
418 return 0; /* fail */
419 pi->as_fd = fd;
420 break;
421 case FD_STATUS:
422 if (pi->tid)
423 strcat (tmp, "/lwpstatus");
424 else
425 strcat (tmp, "/status");
4d1bcd09 426 fd = open_with_retry (tmp, O_RDONLY);
e28cade7 427 if (fd < 0)
c3f6f71d
JM
428 return 0; /* fail */
429 pi->status_fd = fd;
430 break;
431 default:
432 return 0; /* unknown file descriptor */
433 }
c906108c 434
c3f6f71d
JM
435 return 1; /* success */
436}
c906108c 437
77382aee
PA
438/* Allocate a data structure and link it into the procinfo list.
439 First tries to find a pre-existing one (FIXME: why?). Returns the
440 pointer to new procinfo struct. */
c906108c 441
c3f6f71d 442static procinfo *
fba45db2 443create_procinfo (int pid, int tid)
c3f6f71d 444{
0b62613e 445 procinfo *pi, *parent = NULL;
c906108c 446
c475f569
RO
447 pi = find_procinfo (pid, tid);
448 if (pi != NULL)
0df8b418 449 return pi; /* Already exists, nothing to do. */
c906108c 450
0df8b418 451 /* Find parent before doing malloc, to save having to cleanup. */
c3f6f71d
JM
452 if (tid != 0)
453 parent = find_procinfo_or_die (pid, 0); /* FIXME: should I
454 create it if it
0df8b418 455 doesn't exist yet? */
c906108c 456
8d749320 457 pi = XNEW (procinfo);
c3f6f71d
JM
458 memset (pi, 0, sizeof (procinfo));
459 pi->pid = pid;
460 pi->tid = tid;
c906108c 461
c475f569
RO
462 pi->saved_entryset = XNEW (sysset_t);
463 pi->saved_exitset = XNEW (sysset_t);
1d5e0602 464
c3f6f71d
JM
465 /* Chain into list. */
466 if (tid == 0)
467 {
196535a6 468 xsnprintf (pi->pathname, sizeof (pi->pathname), "/proc/%d", pid);
c3f6f71d
JM
469 pi->next = procinfo_list;
470 procinfo_list = pi;
471 }
472 else
473 {
c475f569
RO
474 xsnprintf (pi->pathname, sizeof (pi->pathname), "/proc/%d/lwp/%d",
475 pid, tid);
c3f6f71d
JM
476 pi->next = parent->thread_list;
477 parent->thread_list = pi;
478 }
479 return pi;
480}
c906108c 481
77382aee 482/* Close all file descriptors associated with the procinfo. */
c906108c 483
c3f6f71d 484static void
fba45db2 485close_procinfo_files (procinfo *pi)
c3f6f71d
JM
486{
487 if (pi->ctl_fd > 0)
488 close (pi->ctl_fd);
c3f6f71d
JM
489 if (pi->as_fd > 0)
490 close (pi->as_fd);
491 if (pi->status_fd > 0)
492 close (pi->status_fd);
c3f6f71d
JM
493 pi->ctl_fd = pi->as_fd = pi->status_fd = 0;
494}
c906108c 495
77382aee 496/* Destructor function. Close, unlink and deallocate the object. */
c906108c 497
c3f6f71d 498static void
fba45db2 499destroy_one_procinfo (procinfo **list, procinfo *pi)
c3f6f71d
JM
500{
501 procinfo *ptr;
502
77382aee 503 /* Step one: unlink the procinfo from its list. */
c3f6f71d
JM
504 if (pi == *list)
505 *list = pi->next;
19958708 506 else
c3f6f71d
JM
507 for (ptr = *list; ptr; ptr = ptr->next)
508 if (ptr->next == pi)
509 {
510 ptr->next = pi->next;
511 break;
512 }
7a292a7a 513
77382aee 514 /* Step two: close any open file descriptors. */
c3f6f71d 515 close_procinfo_files (pi);
7a292a7a 516
77382aee 517 /* Step three: free the memory. */
1d5e0602
KB
518 xfree (pi->saved_entryset);
519 xfree (pi->saved_exitset);
b8c9b27d 520 xfree (pi);
c3f6f71d 521}
c906108c 522
c3f6f71d 523static void
fba45db2 524destroy_procinfo (procinfo *pi)
c3f6f71d
JM
525{
526 procinfo *tmp;
c906108c 527
0df8b418 528 if (pi->tid != 0) /* Destroy a thread procinfo. */
c3f6f71d 529 {
0df8b418 530 tmp = find_procinfo (pi->pid, 0); /* Find the parent process. */
c3f6f71d
JM
531 destroy_one_procinfo (&tmp->thread_list, pi);
532 }
0df8b418 533 else /* Destroy a process procinfo and all its threads. */
c3f6f71d
JM
534 {
535 /* First destroy the children, if any; */
536 while (pi->thread_list != NULL)
537 destroy_one_procinfo (&pi->thread_list, pi->thread_list);
538 /* Then destroy the parent. Genocide!!! */
539 destroy_one_procinfo (&procinfo_list, pi);
540 }
541}
c906108c 542
5b4cbbe3
TT
543/* A deleter that calls destroy_procinfo. */
544struct procinfo_deleter
004527cb 545{
5b4cbbe3
TT
546 void operator() (procinfo *pi) const
547 {
548 destroy_procinfo (pi);
549 }
550};
551
552typedef std::unique_ptr<procinfo, procinfo_deleter> procinfo_up;
004527cb 553
c3f6f71d 554enum { NOKILL, KILL };
c906108c 555
77382aee
PA
556/* To be called on a non_recoverable error for a procinfo. Prints
557 error messages, optionally sends a SIGKILL to the process, then
558 destroys the data structure. */
c906108c 559
c3f6f71d 560static void
995816ba 561dead_procinfo (procinfo *pi, const char *msg, int kill_p)
c3f6f71d 562{
f4ad82b3 563 print_sys_errmsg (pi->pathname, errno);
c3f6f71d
JM
564 if (kill_p == KILL)
565 kill (pi->pid, SIGKILL);
c906108c 566
c3f6f71d 567 destroy_procinfo (pi);
0b62613e 568 error ("%s", msg);
c3f6f71d 569}
c906108c 570
c3f6f71d 571/* =================== END, STRUCT PROCINFO "MODULE" =================== */
c906108c 572
196535a6 573/* =================== /proc "MODULE" =================== */
c906108c 574
77382aee
PA
575/* This "module" is the interface layer between the /proc system API
576 and the gdb target vector functions. This layer consists of access
577 functions that encapsulate each of the basic operations that we
578 need to use from the /proc API.
579
580 The main motivation for this layer is to hide the fact that there
196535a6 581 were two very different implementations of the /proc API. */
c906108c 582
44122162
RO
583static long proc_flags (procinfo *pi);
584static int proc_why (procinfo *pi);
585static int proc_what (procinfo *pi);
586static int proc_set_current_signal (procinfo *pi, int signo);
587static int proc_get_current_thread (procinfo *pi);
d3581e61 588static int proc_iterate_over_threads
44122162 589 (procinfo *pi,
d3581e61
JB
590 int (*func) (procinfo *, procinfo *, void *),
591 void *ptr);
b2ad7bb9
PA
592static void proc_resume (procinfo *pi, ptid_t scope_ptid,
593 int step, enum gdb_signal signo);
d3581e61
JB
594
595static void
995816ba 596proc_warn (procinfo *pi, const char *func, int line)
c3f6f71d 597{
c475f569
RO
598 xsnprintf (errmsg, sizeof (errmsg), "procfs: %s line %d, %s",
599 func, line, pi->pathname);
c3f6f71d
JM
600 print_sys_errmsg (errmsg, errno);
601}
c906108c 602
d3581e61 603static void
995816ba 604proc_error (procinfo *pi, const char *func, int line)
c3f6f71d 605{
c475f569
RO
606 xsnprintf (errmsg, sizeof (errmsg), "procfs: %s line %d, %s",
607 func, line, pi->pathname);
c3f6f71d
JM
608 perror_with_name (errmsg);
609}
c906108c 610
77382aee
PA
611/* Updates the status struct in the procinfo. There is a 'valid'
612 flag, to let other functions know when this function needs to be
613 called (so the status is only read when it is needed). The status
614 file descriptor is also only opened when it is needed. Returns
615 non-zero for success, zero for failure. */
c906108c 616
d3581e61 617static int
fba45db2 618proc_get_status (procinfo *pi)
c3f6f71d 619{
0df8b418 620 /* Status file descriptor is opened "lazily". */
c475f569 621 if (pi->status_fd == 0 && open_procinfo_files (pi, FD_STATUS) == 0)
c3f6f71d
JM
622 {
623 pi->status_valid = 0;
624 return 0;
625 }
c906108c 626
c3f6f71d
JM
627 if (lseek (pi->status_fd, 0, SEEK_SET) < 0)
628 pi->status_valid = 0; /* fail */
629 else
630 {
19958708 631 /* Sigh... I have to read a different data structure,
0df8b418 632 depending on whether this is a main process or an LWP. */
c3f6f71d 633 if (pi->tid)
19958708
RM
634 pi->status_valid = (read (pi->status_fd,
635 (char *) &pi->prstatus.pr_lwp,
c3f6f71d
JM
636 sizeof (lwpstatus_t))
637 == sizeof (lwpstatus_t));
638 else
639 {
19958708 640 pi->status_valid = (read (pi->status_fd,
c3f6f71d 641 (char *) &pi->prstatus,
44122162
RO
642 sizeof (pstatus_t))
643 == sizeof (pstatus_t));
c3f6f71d
JM
644 }
645 }
c906108c 646
c3f6f71d
JM
647 if (pi->status_valid)
648 {
19958708 649 PROC_PRETTYFPRINT_STATUS (proc_flags (pi),
c3f6f71d 650 proc_why (pi),
19958708 651 proc_what (pi),
c3f6f71d
JM
652 proc_get_current_thread (pi));
653 }
c906108c 654
77382aee 655 /* The status struct includes general regs, so mark them valid too. */
c3f6f71d 656 pi->gregs_valid = pi->status_valid;
77382aee
PA
657 /* In the read/write multiple-fd model, the status struct includes
658 the fp regs too, so mark them valid too. */
c3f6f71d 659 pi->fpregs_valid = pi->status_valid;
77382aee 660 return pi->status_valid; /* True if success, false if failure. */
c3f6f71d 661}
c906108c 662
77382aee 663/* Returns the process flags (pr_flags field). */
c3f6f71d 664
d3581e61 665static long
fba45db2 666proc_flags (procinfo *pi)
c3f6f71d
JM
667{
668 if (!pi->status_valid)
669 if (!proc_get_status (pi))
0df8b418 670 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 671
c3f6f71d 672 return pi->prstatus.pr_lwp.pr_flags;
c3f6f71d 673}
c906108c 674
77382aee 675/* Returns the pr_why field (why the process stopped). */
c906108c 676
d3581e61 677static int
fba45db2 678proc_why (procinfo *pi)
c3f6f71d
JM
679{
680 if (!pi->status_valid)
681 if (!proc_get_status (pi))
0df8b418 682 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 683
c3f6f71d 684 return pi->prstatus.pr_lwp.pr_why;
c3f6f71d 685}
c906108c 686
77382aee 687/* Returns the pr_what field (details of why the process stopped). */
c906108c 688
d3581e61 689static int
fba45db2 690proc_what (procinfo *pi)
c3f6f71d
JM
691{
692 if (!pi->status_valid)
693 if (!proc_get_status (pi))
0df8b418 694 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 695
c3f6f71d 696 return pi->prstatus.pr_lwp.pr_what;
c3f6f71d 697}
c906108c 698
77382aee
PA
699/* This function is only called when PI is stopped by a watchpoint.
700 Assuming the OS supports it, write to *ADDR the data address which
701 triggered it and return 1. Return 0 if it is not possible to know
702 the address. */
bf701c2c
PM
703
704static int
705proc_watchpoint_address (procinfo *pi, CORE_ADDR *addr)
706{
707 if (!pi->status_valid)
708 if (!proc_get_status (pi))
709 return 0;
710
f5656ead
TT
711 *addr = (CORE_ADDR) gdbarch_pointer_to_address (target_gdbarch (),
712 builtin_type (target_gdbarch ())->builtin_data_ptr,
bf701c2c 713 (gdb_byte *) &pi->prstatus.pr_lwp.pr_info.si_addr);
bf701c2c
PM
714 return 1;
715}
716
77382aee
PA
717/* Returns the pr_nsysarg field (number of args to the current
718 syscall). */
c3f6f71d 719
d3581e61 720static int
fba45db2 721proc_nsysarg (procinfo *pi)
c3f6f71d
JM
722{
723 if (!pi->status_valid)
724 if (!proc_get_status (pi))
725 return 0;
19958708 726
c3f6f71d 727 return pi->prstatus.pr_lwp.pr_nsysarg;
c3f6f71d 728}
c906108c 729
77382aee
PA
730/* Returns the pr_sysarg field (pointer to the arguments of current
731 syscall). */
c906108c 732
d3581e61 733static long *
fba45db2 734proc_sysargs (procinfo *pi)
c3f6f71d
JM
735{
736 if (!pi->status_valid)
737 if (!proc_get_status (pi))
738 return NULL;
19958708 739
c3f6f71d 740 return (long *) &pi->prstatus.pr_lwp.pr_sysarg;
c3f6f71d 741}
77382aee 742
44122162 743/* Set or reset any of the following process flags:
77382aee
PA
744 PR_FORK -- forked child will inherit trace flags
745 PR_RLC -- traced process runs when last /proc file closed.
746 PR_KLC -- traced process is killed when last /proc file closed.
747 PR_ASYNC -- LWP's get to run/stop independently.
748
44122162 749 This function is done using read/write [PCSET/PCRESET/PCUNSET].
77382aee
PA
750
751 Arguments:
752 pi -- the procinfo
753 flag -- one of PR_FORK, PR_RLC, or PR_ASYNC
754 mode -- 1 for set, 0 for reset.
755
756 Returns non-zero for success, zero for failure. */
c906108c 757
c3f6f71d 758enum { FLAG_RESET, FLAG_SET };
c906108c 759
c3f6f71d 760static int
fba45db2 761proc_modify_flag (procinfo *pi, long flag, long mode)
c3f6f71d
JM
762{
763 long win = 0; /* default to fail */
764
77382aee
PA
765 /* These operations affect the process as a whole, and applying them
766 to an individual LWP has the same meaning as applying them to the
767 main process. Therefore, if we're ever called with a pointer to
768 an LWP's procinfo, let's substitute the process's procinfo and
769 avoid opening the LWP's file descriptor unnecessarily. */
c3f6f71d
JM
770
771 if (pi->pid != 0)
772 pi = find_procinfo_or_die (pi->pid, 0);
773
44122162 774 procfs_ctl_t arg[2];
c5aa993b 775
44122162
RO
776 if (mode == FLAG_SET) /* Set the flag (RLC, FORK, or ASYNC). */
777 arg[0] = PCSET;
0df8b418 778 else /* Reset the flag. */
44122162
RO
779 arg[0] = PCUNSET;
780
781 arg[1] = flag;
782 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 783
77382aee
PA
784 /* The above operation renders the procinfo's cached pstatus
785 obsolete. */
c3f6f71d 786 pi->status_valid = 0;
c906108c 787
c3f6f71d 788 if (!win)
8a3fe4f8 789 warning (_("procfs: modify_flag failed to turn %s %s"),
c3f6f71d
JM
790 flag == PR_FORK ? "PR_FORK" :
791 flag == PR_RLC ? "PR_RLC" :
c3f6f71d 792 flag == PR_ASYNC ? "PR_ASYNC" :
0d06e24b 793 flag == PR_KLC ? "PR_KLC" :
c3f6f71d
JM
794 "<unknown flag>",
795 mode == FLAG_RESET ? "off" : "on");
c906108c 796
c3f6f71d
JM
797 return win;
798}
c906108c 799
77382aee
PA
800/* Set the run_on_last_close flag. Process with all threads will
801 become runnable when debugger closes all /proc fds. Returns
802 non-zero for success, zero for failure. */
c906108c 803
d3581e61 804static int
fba45db2 805proc_set_run_on_last_close (procinfo *pi)
c906108c 806{
c3f6f71d
JM
807 return proc_modify_flag (pi, PR_RLC, FLAG_SET);
808}
c906108c 809
77382aee
PA
810/* Reset the run_on_last_close flag. The process will NOT become
811 runnable when debugger closes its file handles. Returns non-zero
812 for success, zero for failure. */
c906108c 813
d3581e61 814static int
fba45db2 815proc_unset_run_on_last_close (procinfo *pi)
c3f6f71d
JM
816{
817 return proc_modify_flag (pi, PR_RLC, FLAG_RESET);
c906108c
SS
818}
819
77382aee 820/* Reset inherit_on_fork flag. If the process forks a child while we
85102364 821 are registered for events in the parent, then we will NOT receive
77382aee
PA
822 events from the child. Returns non-zero for success, zero for
823 failure. */
c906108c 824
d3581e61 825static int
fba45db2 826proc_unset_inherit_on_fork (procinfo *pi)
c3f6f71d
JM
827{
828 return proc_modify_flag (pi, PR_FORK, FLAG_RESET);
829}
c906108c 830
77382aee
PA
831/* Set PR_ASYNC flag. If one LWP stops because of a debug event
832 (signal etc.), the remaining LWPs will continue to run. Returns
833 non-zero for success, zero for failure. */
c906108c 834
d3581e61 835static int
fba45db2 836proc_set_async (procinfo *pi)
c3f6f71d
JM
837{
838 return proc_modify_flag (pi, PR_ASYNC, FLAG_SET);
839}
c906108c 840
77382aee
PA
841/* Reset PR_ASYNC flag. If one LWP stops because of a debug event
842 (signal etc.), then all other LWPs will stop as well. Returns
843 non-zero for success, zero for failure. */
c906108c 844
d3581e61 845static int
fba45db2 846proc_unset_async (procinfo *pi)
c3f6f71d
JM
847{
848 return proc_modify_flag (pi, PR_ASYNC, FLAG_RESET);
849}
c906108c 850
77382aee
PA
851/* Request the process/LWP to stop. Does not wait. Returns non-zero
852 for success, zero for failure. */
c906108c 853
d3581e61 854static int
fba45db2 855proc_stop_process (procinfo *pi)
c3f6f71d
JM
856{
857 int win;
c906108c 858
77382aee
PA
859 /* We might conceivably apply this operation to an LWP, and the
860 LWP's ctl file descriptor might not be open. */
c906108c 861
c475f569 862 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c3f6f71d
JM
863 return 0;
864 else
865 {
37de36c6 866 procfs_ctl_t cmd = PCSTOP;
f4a14ae6 867
c3f6f71d 868 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d 869 }
c906108c 870
c3f6f71d
JM
871 return win;
872}
c5aa993b 873
77382aee
PA
874/* Wait for the process or LWP to stop (block until it does). Returns
875 non-zero for success, zero for failure. */
c906108c 876
d3581e61 877static int
fba45db2 878proc_wait_for_stop (procinfo *pi)
c906108c 879{
c3f6f71d
JM
880 int win;
881
77382aee
PA
882 /* We should never have to apply this operation to any procinfo
883 except the one for the main process. If that ever changes for
884 any reason, then take out the following clause and replace it
885 with one that makes sure the ctl_fd is open. */
19958708 886
c3f6f71d
JM
887 if (pi->tid != 0)
888 pi = find_procinfo_or_die (pi->pid, 0);
889
44122162 890 procfs_ctl_t cmd = PCWSTOP;
f4a14ae6 891
92137da0
RO
892 set_sigint_trap ();
893
44122162 894 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
92137da0
RO
895
896 clear_sigint_trap ();
897
44122162
RO
898 /* We been runnin' and we stopped -- need to update status. */
899 pi->status_valid = 0;
c906108c 900
c3f6f71d 901 return win;
c906108c
SS
902}
903
77382aee
PA
904/* Make the process or LWP runnable.
905
906 Options (not all are implemented):
907 - single-step
908 - clear current fault
909 - clear current signal
910 - abort the current system call
911 - stop as soon as finished with system call
77382aee
PA
912
913 Always clears the current fault. PI is the process or LWP to
914 operate on. If STEP is true, set the process or LWP to trap after
915 one instruction. If SIGNO is zero, clear the current signal if
916 any; if non-zero, set the current signal to this one. Returns
917 non-zero for success, zero for failure. */
c3f6f71d 918
d3581e61 919static int
fba45db2 920proc_run_process (procinfo *pi, int step, int signo)
c3f6f71d
JM
921{
922 int win;
923 int runflags;
924
77382aee
PA
925 /* We will probably have to apply this operation to individual
926 threads, so make sure the control file descriptor is open. */
19958708 927
c475f569
RO
928 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
929 return 0;
c906108c 930
0df8b418 931 runflags = PRCFAULT; /* Always clear current fault. */
c3f6f71d
JM
932 if (step)
933 runflags |= PRSTEP;
934 if (signo == 0)
935 runflags |= PRCSIG;
0df8b418 936 else if (signo != -1) /* -1 means do nothing W.R.T. signals. */
c3f6f71d 937 proc_set_current_signal (pi, signo);
c5aa993b 938
44122162 939 procfs_ctl_t cmd[2];
c906108c 940
44122162
RO
941 cmd[0] = PCRUN;
942 cmd[1] = runflags;
943 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c906108c 944
c3f6f71d
JM
945 return win;
946}
c906108c 947
77382aee
PA
948/* Register to trace signals in the process or LWP. Returns non-zero
949 for success, zero for failure. */
c906108c 950
d3581e61 951static int
44122162 952proc_set_traced_signals (procinfo *pi, sigset_t *sigset)
c906108c 953{
c3f6f71d
JM
954 int win;
955
77382aee
PA
956 /* We should never have to apply this operation to any procinfo
957 except the one for the main process. If that ever changes for
958 any reason, then take out the following clause and replace it
959 with one that makes sure the ctl_fd is open. */
19958708 960
c3f6f71d
JM
961 if (pi->tid != 0)
962 pi = find_procinfo_or_die (pi->pid, 0);
963
44122162
RO
964 struct {
965 procfs_ctl_t cmd;
966 /* Use char array to avoid alignment issues. */
967 char sigset[sizeof (sigset_t)];
968 } arg;
c906108c 969
44122162
RO
970 arg.cmd = PCSTRACE;
971 memcpy (&arg.sigset, sigset, sizeof (sigset_t));
972
973 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 974
0df8b418 975 /* The above operation renders the procinfo's cached pstatus obsolete. */
c3f6f71d 976 pi->status_valid = 0;
c906108c 977
c3f6f71d 978 if (!win)
8a3fe4f8 979 warning (_("procfs: set_traced_signals failed"));
c3f6f71d 980 return win;
c906108c
SS
981}
982
77382aee
PA
983/* Register to trace hardware faults in the process or LWP. Returns
984 non-zero for success, zero for failure. */
c906108c 985
d3581e61 986static int
fba45db2 987proc_set_traced_faults (procinfo *pi, fltset_t *fltset)
c3f6f71d
JM
988{
989 int win;
990
77382aee
PA
991 /* We should never have to apply this operation to any procinfo
992 except the one for the main process. If that ever changes for
993 any reason, then take out the following clause and replace it
994 with one that makes sure the ctl_fd is open. */
19958708 995
c3f6f71d
JM
996 if (pi->tid != 0)
997 pi = find_procinfo_or_die (pi->pid, 0);
998
44122162
RO
999 struct {
1000 procfs_ctl_t cmd;
1001 /* Use char array to avoid alignment issues. */
1002 char fltset[sizeof (fltset_t)];
1003 } arg;
1004
1005 arg.cmd = PCSFAULT;
1006 memcpy (&arg.fltset, fltset, sizeof (fltset_t));
c906108c 1007
44122162 1008 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1009
0df8b418 1010 /* The above operation renders the procinfo's cached pstatus obsolete. */
c3f6f71d 1011 pi->status_valid = 0;
c906108c 1012
c3f6f71d
JM
1013 return win;
1014}
c5aa993b 1015
77382aee
PA
1016/* Register to trace entry to system calls in the process or LWP.
1017 Returns non-zero for success, zero for failure. */
c906108c 1018
d3581e61 1019static int
fba45db2 1020proc_set_traced_sysentry (procinfo *pi, sysset_t *sysset)
c906108c 1021{
c3f6f71d
JM
1022 int win;
1023
77382aee
PA
1024 /* We should never have to apply this operation to any procinfo
1025 except the one for the main process. If that ever changes for
1026 any reason, then take out the following clause and replace it
1027 with one that makes sure the ctl_fd is open. */
19958708 1028
c3f6f71d
JM
1029 if (pi->tid != 0)
1030 pi = find_procinfo_or_die (pi->pid, 0);
1031
c475f569 1032 struct {
44122162
RO
1033 procfs_ctl_t cmd;
1034 /* Use char array to avoid alignment issues. */
1035 char sysset[sizeof (sysset_t)];
c475f569 1036 } arg;
c3f6f71d 1037
c475f569
RO
1038 arg.cmd = PCSENTRY;
1039 memcpy (&arg.sysset, sysset, sizeof (sysset_t));
44122162 1040
c475f569 1041 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
37de36c6 1042
77382aee
PA
1043 /* The above operation renders the procinfo's cached pstatus
1044 obsolete. */
c3f6f71d 1045 pi->status_valid = 0;
19958708 1046
c3f6f71d 1047 return win;
c906108c
SS
1048}
1049
77382aee
PA
1050/* Register to trace exit from system calls in the process or LWP.
1051 Returns non-zero for success, zero for failure. */
c906108c 1052
d3581e61 1053static int
fba45db2 1054proc_set_traced_sysexit (procinfo *pi, sysset_t *sysset)
c3f6f71d
JM
1055{
1056 int win;
1057
77382aee
PA
1058 /* We should never have to apply this operation to any procinfo
1059 except the one for the main process. If that ever changes for
1060 any reason, then take out the following clause and replace it
1061 with one that makes sure the ctl_fd is open. */
19958708 1062
c3f6f71d
JM
1063 if (pi->tid != 0)
1064 pi = find_procinfo_or_die (pi->pid, 0);
1065
44122162
RO
1066 struct gdb_proc_ctl_pcsexit {
1067 procfs_ctl_t cmd;
1068 /* Use char array to avoid alignment issues. */
1069 char sysset[sizeof (sysset_t)];
c475f569 1070 } arg;
c906108c 1071
c475f569
RO
1072 arg.cmd = PCSEXIT;
1073 memcpy (&arg.sysset, sysset, sizeof (sysset_t));
c906108c 1074
c475f569 1075 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
37de36c6 1076
77382aee
PA
1077 /* The above operation renders the procinfo's cached pstatus
1078 obsolete. */
c3f6f71d 1079 pi->status_valid = 0;
c906108c 1080
c3f6f71d
JM
1081 return win;
1082}
c906108c 1083
77382aee
PA
1084/* Specify the set of blocked / held signals in the process or LWP.
1085 Returns non-zero for success, zero for failure. */
c906108c 1086
d3581e61 1087static int
44122162 1088proc_set_held_signals (procinfo *pi, sigset_t *sighold)
c906108c 1089{
c3f6f71d
JM
1090 int win;
1091
77382aee
PA
1092 /* We should never have to apply this operation to any procinfo
1093 except the one for the main process. If that ever changes for
1094 any reason, then take out the following clause and replace it
1095 with one that makes sure the ctl_fd is open. */
19958708 1096
c3f6f71d
JM
1097 if (pi->tid != 0)
1098 pi = find_procinfo_or_die (pi->pid, 0);
1099
44122162
RO
1100 struct {
1101 procfs_ctl_t cmd;
1102 /* Use char array to avoid alignment issues. */
1103 char hold[sizeof (sigset_t)];
1104 } arg;
1105
1106 arg.cmd = PCSHOLD;
1107 memcpy (&arg.hold, sighold, sizeof (sigset_t));
1108 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
1109
77382aee
PA
1110 /* The above operation renders the procinfo's cached pstatus
1111 obsolete. */
c3f6f71d
JM
1112 pi->status_valid = 0;
1113
1114 return win;
c906108c
SS
1115}
1116
77382aee
PA
1117/* Returns the set of signals that are held / blocked. Will also copy
1118 the sigset if SAVE is non-zero. */
c906108c 1119
44122162
RO
1120static sigset_t *
1121proc_get_held_signals (procinfo *pi, sigset_t *save)
c906108c 1122{
44122162 1123 sigset_t *ret = NULL;
c3f6f71d 1124
77382aee
PA
1125 /* We should never have to apply this operation to any procinfo
1126 except the one for the main process. If that ever changes for
1127 any reason, then take out the following clause and replace it
1128 with one that makes sure the ctl_fd is open. */
19958708 1129
c3f6f71d
JM
1130 if (pi->tid != 0)
1131 pi = find_procinfo_or_die (pi->pid, 0);
1132
c3f6f71d
JM
1133 if (!pi->status_valid)
1134 if (!proc_get_status (pi))
1135 return NULL;
1136
c3f6f71d 1137 ret = &pi->prstatus.pr_lwp.pr_lwphold;
c3f6f71d 1138 if (save && ret)
44122162 1139 memcpy (save, ret, sizeof (sigset_t));
c3f6f71d
JM
1140
1141 return ret;
c906108c
SS
1142}
1143
77382aee
PA
1144/* Returns the set of signals that are traced / debugged. Will also
1145 copy the sigset if SAVE is non-zero. */
c3f6f71d 1146
44122162
RO
1147static sigset_t *
1148proc_get_traced_signals (procinfo *pi, sigset_t *save)
c906108c 1149{
44122162 1150 sigset_t *ret = NULL;
c3f6f71d 1151
77382aee
PA
1152 /* We should never have to apply this operation to any procinfo
1153 except the one for the main process. If that ever changes for
1154 any reason, then take out the following clause and replace it
1155 with one that makes sure the ctl_fd is open. */
19958708 1156
c3f6f71d
JM
1157 if (pi->tid != 0)
1158 pi = find_procinfo_or_die (pi->pid, 0);
1159
c3f6f71d
JM
1160 if (!pi->status_valid)
1161 if (!proc_get_status (pi))
1162 return NULL;
1163
1164 ret = &pi->prstatus.pr_sigtrace;
c3f6f71d 1165 if (save && ret)
44122162 1166 memcpy (save, ret, sizeof (sigset_t));
c906108c 1167
c3f6f71d
JM
1168 return ret;
1169}
c906108c 1170
77382aee
PA
1171/* Returns the set of hardware faults that are traced /debugged. Will
1172 also copy the faultset if SAVE is non-zero. */
c3f6f71d 1173
d3581e61 1174static fltset_t *
fba45db2 1175proc_get_traced_faults (procinfo *pi, fltset_t *save)
c3f6f71d
JM
1176{
1177 fltset_t *ret = NULL;
1178
77382aee
PA
1179 /* We should never have to apply this operation to any procinfo
1180 except the one for the main process. If that ever changes for
1181 any reason, then take out the following clause and replace it
1182 with one that makes sure the ctl_fd is open. */
19958708 1183
c3f6f71d
JM
1184 if (pi->tid != 0)
1185 pi = find_procinfo_or_die (pi->pid, 0);
1186
c3f6f71d
JM
1187 if (!pi->status_valid)
1188 if (!proc_get_status (pi))
1189 return NULL;
1190
1191 ret = &pi->prstatus.pr_flttrace;
c3f6f71d
JM
1192 if (save && ret)
1193 memcpy (save, ret, sizeof (fltset_t));
c906108c 1194
c3f6f71d
JM
1195 return ret;
1196}
c906108c 1197
77382aee
PA
1198/* Returns the set of syscalls that are traced /debugged on entry.
1199 Will also copy the syscall set if SAVE is non-zero. */
c906108c 1200
d3581e61 1201static sysset_t *
fba45db2 1202proc_get_traced_sysentry (procinfo *pi, sysset_t *save)
c3f6f71d
JM
1203{
1204 sysset_t *ret = NULL;
1205
77382aee
PA
1206 /* We should never have to apply this operation to any procinfo
1207 except the one for the main process. If that ever changes for
1208 any reason, then take out the following clause and replace it
1209 with one that makes sure the ctl_fd is open. */
19958708 1210
c3f6f71d
JM
1211 if (pi->tid != 0)
1212 pi = find_procinfo_or_die (pi->pid, 0);
1213
c3f6f71d
JM
1214 if (!pi->status_valid)
1215 if (!proc_get_status (pi))
1216 return NULL;
1217
1218 ret = &pi->prstatus.pr_sysentry;
c3f6f71d 1219 if (save && ret)
44122162 1220 memcpy (save, ret, sizeof (sysset_t));
c906108c 1221
c3f6f71d
JM
1222 return ret;
1223}
c5aa993b 1224
77382aee
PA
1225/* Returns the set of syscalls that are traced /debugged on exit.
1226 Will also copy the syscall set if SAVE is non-zero. */
c906108c 1227
d3581e61 1228static sysset_t *
fba45db2 1229proc_get_traced_sysexit (procinfo *pi, sysset_t *save)
c906108c 1230{
44122162 1231 sysset_t *ret = NULL;
c3f6f71d 1232
77382aee
PA
1233 /* We should never have to apply this operation to any procinfo
1234 except the one for the main process. If that ever changes for
1235 any reason, then take out the following clause and replace it
1236 with one that makes sure the ctl_fd is open. */
19958708 1237
c3f6f71d
JM
1238 if (pi->tid != 0)
1239 pi = find_procinfo_or_die (pi->pid, 0);
1240
c3f6f71d
JM
1241 if (!pi->status_valid)
1242 if (!proc_get_status (pi))
1243 return NULL;
1244
1245 ret = &pi->prstatus.pr_sysexit;
c3f6f71d 1246 if (save && ret)
44122162 1247 memcpy (save, ret, sizeof (sysset_t));
c3f6f71d
JM
1248
1249 return ret;
1250}
c906108c 1251
77382aee
PA
1252/* The current fault (if any) is cleared; the associated signal will
1253 not be sent to the process or LWP when it resumes. Returns
1254 non-zero for success, zero for failure. */
c906108c 1255
d3581e61 1256static int
fba45db2 1257proc_clear_current_fault (procinfo *pi)
c3f6f71d
JM
1258{
1259 int win;
1260
77382aee
PA
1261 /* We should never have to apply this operation to any procinfo
1262 except the one for the main process. If that ever changes for
1263 any reason, then take out the following clause and replace it
1264 with one that makes sure the ctl_fd is open. */
19958708 1265
c3f6f71d
JM
1266 if (pi->tid != 0)
1267 pi = find_procinfo_or_die (pi->pid, 0);
1268
44122162 1269 procfs_ctl_t cmd = PCCFAULT;
f4a14ae6 1270
44122162 1271 win = (write (pi->ctl_fd, (void *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d
JM
1272
1273 return win;
c906108c
SS
1274}
1275
77382aee
PA
1276/* Set the "current signal" that will be delivered next to the
1277 process. NOTE: semantics are different from those of KILL. This
1278 signal will be delivered to the process or LWP immediately when it
1279 is resumed (even if the signal is held/blocked); it will NOT
1280 immediately cause another event of interest, and will NOT first
1281 trap back to the debugger. Returns non-zero for success, zero for
1282 failure. */
c3f6f71d 1283
d3581e61 1284static int
fba45db2 1285proc_set_current_signal (procinfo *pi, int signo)
c3f6f71d
JM
1286{
1287 int win;
1288 struct {
37de36c6 1289 procfs_ctl_t cmd;
c3f6f71d 1290 /* Use char array to avoid alignment issues. */
44122162 1291 char sinfo[sizeof (siginfo_t)];
c3f6f71d 1292 } arg;
44122162 1293 siginfo_t mysinfo;
5b6d1e4f 1294 process_stratum_target *wait_target;
c162e8c9
JM
1295 ptid_t wait_ptid;
1296 struct target_waitstatus wait_status;
c3f6f71d 1297
77382aee
PA
1298 /* We should never have to apply this operation to any procinfo
1299 except the one for the main process. If that ever changes for
1300 any reason, then take out the following clause and replace it
1301 with one that makes sure the ctl_fd is open. */
19958708 1302
c3f6f71d
JM
1303 if (pi->tid != 0)
1304 pi = find_procinfo_or_die (pi->pid, 0);
1305
c3f6f71d 1306 /* The pointer is just a type alias. */
5b6d1e4f
PA
1307 get_last_target_status (&wait_target, &wait_ptid, &wait_status);
1308 if (wait_target == &the_procfs_target
1309 && wait_ptid == inferior_ptid
183be222
SM
1310 && wait_status.kind () == TARGET_WAITKIND_STOPPED
1311 && wait_status.sig () == gdb_signal_from_host (signo)
c162e8c9 1312 && proc_get_status (pi)
c162e8c9 1313 && pi->prstatus.pr_lwp.pr_info.si_signo == signo
c162e8c9
JM
1314 )
1315 /* Use the siginfo associated with the signal being
1316 redelivered. */
44122162 1317 memcpy (arg.sinfo, &pi->prstatus.pr_lwp.pr_info, sizeof (siginfo_t));
c162e8c9
JM
1318 else
1319 {
73930d4d
KH
1320 mysinfo.si_signo = signo;
1321 mysinfo.si_code = 0;
1322 mysinfo.si_pid = getpid (); /* ?why? */
1323 mysinfo.si_uid = getuid (); /* ?why? */
44122162 1324 memcpy (arg.sinfo, &mysinfo, sizeof (siginfo_t));
c162e8c9 1325 }
c3f6f71d 1326
c3f6f71d
JM
1327 arg.cmd = PCSSIG;
1328 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1329
c3f6f71d
JM
1330 return win;
1331}
c906108c 1332
77382aee
PA
1333/* The current signal (if any) is cleared, and is not sent to the
1334 process or LWP when it resumes. Returns non-zero for success, zero
1335 for failure. */
c906108c 1336
d3581e61 1337static int
fba45db2 1338proc_clear_current_signal (procinfo *pi)
c3f6f71d
JM
1339{
1340 int win;
1341
77382aee
PA
1342 /* We should never have to apply this operation to any procinfo
1343 except the one for the main process. If that ever changes for
1344 any reason, then take out the following clause and replace it
1345 with one that makes sure the ctl_fd is open. */
19958708 1346
c3f6f71d
JM
1347 if (pi->tid != 0)
1348 pi = find_procinfo_or_die (pi->pid, 0);
1349
44122162
RO
1350 struct {
1351 procfs_ctl_t cmd;
1352 /* Use char array to avoid alignment issues. */
1353 char sinfo[sizeof (siginfo_t)];
1354 } arg;
1355 siginfo_t mysinfo;
1356
1357 arg.cmd = PCSSIG;
1358 /* The pointer is just a type alias. */
1359 mysinfo.si_signo = 0;
1360 mysinfo.si_code = 0;
1361 mysinfo.si_errno = 0;
1362 mysinfo.si_pid = getpid (); /* ?why? */
1363 mysinfo.si_uid = getuid (); /* ?why? */
1364 memcpy (arg.sinfo, &mysinfo, sizeof (siginfo_t));
1365
1366 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1367
c3f6f71d
JM
1368 return win;
1369}
c906108c 1370
772cf8be
MK
1371/* Return the general-purpose registers for the process or LWP
1372 corresponding to PI. Upon failure, return NULL. */
c906108c 1373
d3581e61 1374static gdb_gregset_t *
fba45db2 1375proc_get_gregs (procinfo *pi)
c3f6f71d
JM
1376{
1377 if (!pi->status_valid || !pi->gregs_valid)
1378 if (!proc_get_status (pi))
1379 return NULL;
1380
c3f6f71d 1381 return &pi->prstatus.pr_lwp.pr_reg;
c3f6f71d 1382}
c5aa993b 1383
772cf8be
MK
1384/* Return the general-purpose registers for the process or LWP
1385 corresponding to PI. Upon failure, return NULL. */
c906108c 1386
d3581e61 1387static gdb_fpregset_t *
fba45db2 1388proc_get_fpregs (procinfo *pi)
c906108c 1389{
c3f6f71d
JM
1390 if (!pi->status_valid || !pi->fpregs_valid)
1391 if (!proc_get_status (pi))
1392 return NULL;
1393
c3f6f71d 1394 return &pi->prstatus.pr_lwp.pr_fpreg;
c906108c
SS
1395}
1396
772cf8be
MK
1397/* Write the general-purpose registers back to the process or LWP
1398 corresponding to PI. Return non-zero for success, zero for
1399 failure. */
c3f6f71d 1400
d3581e61 1401static int
fba45db2 1402proc_set_gregs (procinfo *pi)
c906108c 1403{
c3f6f71d
JM
1404 gdb_gregset_t *gregs;
1405 int win;
c5aa993b 1406
772cf8be
MK
1407 gregs = proc_get_gregs (pi);
1408 if (gregs == NULL)
1409 return 0; /* proc_get_regs has already warned. */
c3f6f71d 1410
772cf8be 1411 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c475f569 1412 return 0;
c3f6f71d 1413 else
c906108c 1414 {
c3f6f71d 1415 struct {
37de36c6 1416 procfs_ctl_t cmd;
c3f6f71d
JM
1417 /* Use char array to avoid alignment issues. */
1418 char gregs[sizeof (gdb_gregset_t)];
1419 } arg;
1420
772cf8be 1421 arg.cmd = PCSREG;
c3f6f71d
JM
1422 memcpy (&arg.gregs, gregs, sizeof (arg.gregs));
1423 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1424 }
c3f6f71d 1425
772cf8be 1426 /* Policy: writing the registers invalidates our cache. */
c3f6f71d
JM
1427 pi->gregs_valid = 0;
1428 return win;
c906108c
SS
1429}
1430
772cf8be
MK
1431/* Write the floating-pointer registers back to the process or LWP
1432 corresponding to PI. Return non-zero for success, zero for
1433 failure. */
c3f6f71d 1434
d3581e61 1435static int
fba45db2 1436proc_set_fpregs (procinfo *pi)
c906108c 1437{
c3f6f71d
JM
1438 gdb_fpregset_t *fpregs;
1439 int win;
1440
772cf8be
MK
1441 fpregs = proc_get_fpregs (pi);
1442 if (fpregs == NULL)
1443 return 0; /* proc_get_fpregs has already warned. */
c5aa993b 1444
772cf8be 1445 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c475f569 1446 return 0;
c3f6f71d 1447 else
c906108c 1448 {
c3f6f71d 1449 struct {
37de36c6 1450 procfs_ctl_t cmd;
c3f6f71d
JM
1451 /* Use char array to avoid alignment issues. */
1452 char fpregs[sizeof (gdb_fpregset_t)];
1453 } arg;
1454
772cf8be 1455 arg.cmd = PCSFPREG;
c3f6f71d
JM
1456 memcpy (&arg.fpregs, fpregs, sizeof (arg.fpregs));
1457 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1458 }
c3f6f71d 1459
772cf8be 1460 /* Policy: writing the registers invalidates our cache. */
c3f6f71d
JM
1461 pi->fpregs_valid = 0;
1462 return win;
c906108c
SS
1463}
1464
77382aee
PA
1465/* Send a signal to the proc or lwp with the semantics of "kill()".
1466 Returns non-zero for success, zero for failure. */
c906108c 1467
d3581e61 1468static int
fba45db2 1469proc_kill (procinfo *pi, int signo)
c3f6f71d
JM
1470{
1471 int win;
c906108c 1472
77382aee
PA
1473 /* We might conceivably apply this operation to an LWP, and the
1474 LWP's ctl file descriptor might not be open. */
c906108c 1475
c475f569
RO
1476 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
1477 return 0;
c3f6f71d
JM
1478 else
1479 {
37de36c6 1480 procfs_ctl_t cmd[2];
c906108c 1481
c3f6f71d
JM
1482 cmd[0] = PCKILL;
1483 cmd[1] = signo;
1484 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d 1485 }
c906108c 1486
c3f6f71d
JM
1487 return win;
1488}
c906108c 1489
77382aee
PA
1490/* Find the pid of the process that started this one. Returns the
1491 parent process pid, or zero. */
c906108c 1492
d3581e61 1493static int
fba45db2 1494proc_parent_pid (procinfo *pi)
c906108c 1495{
77382aee
PA
1496 /* We should never have to apply this operation to any procinfo
1497 except the one for the main process. If that ever changes for
1498 any reason, then take out the following clause and replace it
1499 with one that makes sure the ctl_fd is open. */
19958708 1500
c3f6f71d
JM
1501 if (pi->tid != 0)
1502 pi = find_procinfo_or_die (pi->pid, 0);
1503
1504 if (!pi->status_valid)
1505 if (!proc_get_status (pi))
1506 return 0;
c5aa993b 1507
c3f6f71d
JM
1508 return pi->prstatus.pr_ppid;
1509}
1510
9a043c1d
AC
1511/* Convert a target address (a.k.a. CORE_ADDR) into a host address
1512 (a.k.a void pointer)! */
1513
1514static void *
1515procfs_address_to_host_pointer (CORE_ADDR addr)
1516{
f5656ead 1517 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
9a043c1d
AC
1518 void *ptr;
1519
df86565b 1520 gdb_assert (sizeof (ptr) == ptr_type->length ());
f5656ead 1521 gdbarch_address_to_pointer (target_gdbarch (), ptr_type,
0b62613e 1522 (gdb_byte *) &ptr, addr);
9a043c1d
AC
1523 return ptr;
1524}
1525
a0911fd0 1526static int
fba45db2 1527proc_set_watchpoint (procinfo *pi, CORE_ADDR addr, int len, int wflags)
c3f6f71d 1528{
c3f6f71d 1529 struct {
37de36c6 1530 procfs_ctl_t cmd;
c3f6f71d
JM
1531 char watch[sizeof (prwatch_t)];
1532 } arg;
73930d4d 1533 prwatch_t pwatch;
c3f6f71d 1534
9a043c1d
AC
1535 /* NOTE: cagney/2003-02-01: Even more horrible hack. Need to
1536 convert a target address into something that can be stored in a
1537 native data structure. */
73930d4d 1538 pwatch.pr_vaddr = (uintptr_t) procfs_address_to_host_pointer (addr);
73930d4d
KH
1539 pwatch.pr_size = len;
1540 pwatch.pr_wflags = wflags;
c3f6f71d 1541 arg.cmd = PCWATCH;
73930d4d 1542 memcpy (arg.watch, &pwatch, sizeof (prwatch_t));
c3f6f71d 1543 return (write (pi->ctl_fd, &arg, sizeof (arg)) == sizeof (arg));
c906108c
SS
1544}
1545
c3f6f71d 1546/* =============== END, non-thread part of /proc "MODULE" =============== */
c906108c 1547
c3f6f71d 1548/* =================== Thread "MODULE" =================== */
c906108c 1549
44122162 1550/* Returns the number of threads for the process. */
c906108c 1551
d3581e61 1552static int
fba45db2 1553proc_get_nthreads (procinfo *pi)
c906108c 1554{
c3f6f71d
JM
1555 if (!pi->status_valid)
1556 if (!proc_get_status (pi))
1557 return 0;
c5aa993b 1558
44122162
RO
1559 /* Only works for the process procinfo, because the LWP procinfos do not
1560 get prstatus filled in. */
0df8b418 1561 if (pi->tid != 0) /* Find the parent process procinfo. */
c3f6f71d 1562 pi = find_procinfo_or_die (pi->pid, 0);
c3f6f71d 1563 return pi->prstatus.pr_nlwp;
c906108c
SS
1564}
1565
196535a6 1566/* Return the ID of the thread that had an event of interest.
77382aee
PA
1567 (ie. the one that hit a breakpoint or other traced event). All
1568 other things being equal, this should be the ID of a thread that is
1569 currently executing. */
c3f6f71d 1570
d3581e61 1571static int
fba45db2 1572proc_get_current_thread (procinfo *pi)
c3f6f71d 1573{
77382aee
PA
1574 /* Note: this should be applied to the root procinfo for the
1575 process, not to the procinfo for an LWP. If applied to the
1576 procinfo for an LWP, it will simply return that LWP's ID. In
1577 that case, find the parent process procinfo. */
19958708 1578
c3f6f71d
JM
1579 if (pi->tid != 0)
1580 pi = find_procinfo_or_die (pi->pid, 0);
1581
1582 if (!pi->status_valid)
1583 if (!proc_get_status (pi))
1584 return 0;
1585
c3f6f71d 1586 return pi->prstatus.pr_lwp.pr_lwpid;
c3f6f71d
JM
1587}
1588
77382aee 1589/* Discover the IDs of all the threads within the process, and create
196535a6 1590 a procinfo for each of them (chained to the parent). Returns
77382aee 1591 non-zero for success, zero for failure. */
c906108c 1592
a0911fd0 1593static int
fba45db2 1594proc_delete_dead_threads (procinfo *parent, procinfo *thread, void *ignore)
c3f6f71d
JM
1595{
1596 if (thread && parent) /* sanity */
c906108c 1597 {
c3f6f71d
JM
1598 thread->status_valid = 0;
1599 if (!proc_get_status (thread))
1600 destroy_one_procinfo (&parent->thread_list, thread);
1601 }
1602 return 0; /* keep iterating */
1603}
c5aa993b 1604
d3581e61 1605static int
fba45db2 1606proc_update_threads (procinfo *pi)
c3f6f71d
JM
1607{
1608 char pathname[MAX_PROC_NAME_SIZE + 16];
1609 struct dirent *direntry;
c3f6f71d 1610 procinfo *thread;
f0b3976b 1611 gdb_dir_up dirp;
c3f6f71d
JM
1612 int lwpid;
1613
77382aee
PA
1614 /* We should never have to apply this operation to any procinfo
1615 except the one for the main process. If that ever changes for
1616 any reason, then take out the following clause and replace it
1617 with one that makes sure the ctl_fd is open. */
19958708 1618
c3f6f71d
JM
1619 if (pi->tid != 0)
1620 pi = find_procinfo_or_die (pi->pid, 0);
1621
1622 proc_iterate_over_threads (pi, proc_delete_dead_threads, NULL);
1623
05b4bd79
PA
1624 /* Note: this brute-force method was originally devised for Unixware
1625 (support removed since), and will also work on Solaris 2.6 and
1626 2.7. The original comment mentioned the existence of a much
1627 simpler and more elegant way to do this on Solaris, but didn't
1628 point out what that was. */
c3f6f71d
JM
1629
1630 strcpy (pathname, pi->pathname);
1631 strcat (pathname, "/lwp");
f0b3976b
TT
1632 dirp.reset (opendir (pathname));
1633 if (dirp == NULL)
c3f6f71d
JM
1634 proc_error (pi, "update_threads, opendir", __LINE__);
1635
f0b3976b 1636 while ((direntry = readdir (dirp.get ())) != NULL)
c3f6f71d
JM
1637 if (direntry->d_name[0] != '.') /* skip '.' and '..' */
1638 {
1639 lwpid = atoi (&direntry->d_name[0]);
c475f569
RO
1640 thread = create_procinfo (pi->pid, lwpid);
1641 if (thread == NULL)
c3f6f71d
JM
1642 proc_error (pi, "update_threads, create_procinfo", __LINE__);
1643 }
1644 pi->threads_valid = 1;
c3f6f71d
JM
1645 return 1;
1646}
c906108c 1647
77382aee
PA
1648/* Given a pointer to a function, call that function once for each lwp
1649 in the procinfo list, until the function returns non-zero, in which
1650 event return the value returned by the function.
1651
1652 Note: this function does NOT call update_threads. If you want to
1653 discover new threads first, you must call that function explicitly.
1654 This function just makes a quick pass over the currently-known
1655 procinfos.
1656
1657 PI is the parent process procinfo. FUNC is the per-thread
1658 function. PTR is an opaque parameter for function. Returns the
1659 first non-zero return value from the callee, or zero. */
c3f6f71d 1660
d3581e61 1661static int
d0849a9a
KB
1662proc_iterate_over_threads (procinfo *pi,
1663 int (*func) (procinfo *, procinfo *, void *),
1664 void *ptr)
c906108c 1665{
c3f6f71d
JM
1666 procinfo *thread, *next;
1667 int retval = 0;
c906108c 1668
77382aee
PA
1669 /* We should never have to apply this operation to any procinfo
1670 except the one for the main process. If that ever changes for
1671 any reason, then take out the following clause and replace it
1672 with one that makes sure the ctl_fd is open. */
19958708 1673
c3f6f71d
JM
1674 if (pi->tid != 0)
1675 pi = find_procinfo_or_die (pi->pid, 0);
1676
1677 for (thread = pi->thread_list; thread != NULL; thread = next)
c906108c 1678 {
0df8b418 1679 next = thread->next; /* In case thread is destroyed. */
c475f569
RO
1680 retval = (*func) (pi, thread, ptr);
1681 if (retval != 0)
c3f6f71d 1682 break;
c906108c 1683 }
c3f6f71d
JM
1684
1685 return retval;
c906108c
SS
1686}
1687
c3f6f71d
JM
1688/* =================== END, Thread "MODULE" =================== */
1689
1690/* =================== END, /proc "MODULE" =================== */
1691
1692/* =================== GDB "MODULE" =================== */
1693
77382aee
PA
1694/* Here are all of the gdb target vector functions and their
1695 friends. */
c3f6f71d 1696
7fb43e53 1697static void do_attach (ptid_t ptid);
6bd6f3b6 1698static void do_detach ();
9185ddce 1699static void proc_trace_syscalls_1 (procinfo *pi, int syscallnum,
77382aee 1700 int entry_or_exit, int mode, int from_tty);
9185ddce 1701
77382aee
PA
1702/* Sets up the inferior to be debugged. Registers to trace signals,
1703 hardware faults, and syscalls. Note: does not set RLC flag: caller
1704 may want to customize that. Returns zero for success (note!
1705 unlike most functions in this module); on failure, returns the LINE
1706 NUMBER where it failed! */
c3f6f71d
JM
1707
1708static int
fba45db2 1709procfs_debug_inferior (procinfo *pi)
c906108c 1710{
c3f6f71d 1711 fltset_t traced_faults;
44122162 1712 sigset_t traced_signals;
37de36c6
KB
1713 sysset_t *traced_syscall_entries;
1714 sysset_t *traced_syscall_exits;
1715 int status;
c906108c 1716
0df8b418
MS
1717 /* Register to trace hardware faults in the child. */
1718 prfillset (&traced_faults); /* trace all faults... */
44122162 1719 prdelset (&traced_faults, FLTPAGE); /* except page fault. */
c3f6f71d
JM
1720 if (!proc_set_traced_faults (pi, &traced_faults))
1721 return __LINE__;
c906108c 1722
2455069d
UW
1723 /* Initially, register to trace all signals in the child. */
1724 prfillset (&traced_signals);
1725 if (!proc_set_traced_signals (pi, &traced_signals))
c3f6f71d
JM
1726 return __LINE__;
1727
37de36c6 1728
c3f6f71d 1729 /* Register to trace the 'exit' system call (on entry). */
c475f569 1730 traced_syscall_entries = XNEW (sysset_t);
44122162
RO
1731 premptyset (traced_syscall_entries);
1732 praddset (traced_syscall_entries, SYS_exit);
1733 praddset (traced_syscall_entries, SYS_lwp_exit);
c906108c 1734
37de36c6
KB
1735 status = proc_set_traced_sysentry (pi, traced_syscall_entries);
1736 xfree (traced_syscall_entries);
1737 if (!status)
c3f6f71d
JM
1738 return __LINE__;
1739
44122162 1740 /* Method for tracing exec syscalls. */
c475f569 1741 traced_syscall_exits = XNEW (sysset_t);
44122162 1742 premptyset (traced_syscall_exits);
44122162
RO
1743 praddset (traced_syscall_exits, SYS_execve);
1744 praddset (traced_syscall_exits, SYS_lwp_create);
1745 praddset (traced_syscall_exits, SYS_lwp_exit);
c906108c 1746
37de36c6
KB
1747 status = proc_set_traced_sysexit (pi, traced_syscall_exits);
1748 xfree (traced_syscall_exits);
1749 if (!status)
c3f6f71d
JM
1750 return __LINE__;
1751
c3f6f71d 1752 return 0;
c906108c
SS
1753}
1754
f6ac5f3d
PA
1755void
1756procfs_target::attach (const char *args, int from_tty)
c906108c 1757{
c3f6f71d
JM
1758 int pid;
1759
74164c56 1760 pid = parse_pid_to_attach (args);
c3f6f71d 1761
c3f6f71d 1762 if (pid == getpid ())
8a3fe4f8 1763 error (_("Attaching GDB to itself is not a good idea..."));
c906108c 1764
de146e19 1765 /* Push the target if needed, ensure it gets un-pushed it if attach fails. */
25b48839 1766 inferior *inf = current_inferior ();
de146e19 1767 target_unpush_up unpusher;
c8fbd44a 1768 if (!inf->target_is_pushed (this))
de146e19 1769 {
25b48839 1770 inf->push_target (this);
de146e19
SM
1771 unpusher.reset (this);
1772 }
1773
bc521517 1774 target_announce_attach (from_tty, pid);
de146e19 1775
7fb43e53 1776 do_attach (ptid_t (pid));
de146e19
SM
1777
1778 /* Everything went fine, keep the target pushed. */
1779 unpusher.release ();
c3f6f71d
JM
1780}
1781
f6ac5f3d
PA
1782void
1783procfs_target::detach (inferior *inf, int from_tty)
c3f6f71d 1784{
41e321a8 1785 target_announce_detach (from_tty);
19958708 1786
6bd6f3b6 1787 do_detach ();
cc377e6b 1788
7fb43e53 1789 switch_to_no_thread ();
b7a08269 1790 detach_inferior (inf);
f6ac5f3d 1791 maybe_unpush_target ();
c906108c
SS
1792}
1793
7fb43e53 1794static void
39f77062 1795do_attach (ptid_t ptid)
c906108c 1796{
c3f6f71d 1797 procinfo *pi;
181e7f93 1798 struct inferior *inf;
c3f6f71d 1799 int fail;
2689673f 1800 int lwpid;
c3f6f71d 1801
c475f569
RO
1802 pi = create_procinfo (ptid.pid (), 0);
1803 if (pi == NULL)
8a3fe4f8 1804 perror (_("procfs: out of memory in 'attach'"));
c3f6f71d
JM
1805
1806 if (!open_procinfo_files (pi, FD_CTL))
1807 {
6cb06a8c 1808 gdb_printf (gdb_stderr, "procfs:%d -- ", __LINE__);
c475f569
RO
1809 xsnprintf (errmsg, sizeof (errmsg),
1810 "do_attach: couldn't open /proc file for process %d",
1811 ptid.pid ());
c3f6f71d
JM
1812 dead_procinfo (pi, errmsg, NOKILL);
1813 }
c906108c 1814
c3f6f71d
JM
1815 /* Stop the process (if it isn't already stopped). */
1816 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
c906108c 1817 {
c3f6f71d
JM
1818 pi->was_stopped = 1;
1819 proc_prettyprint_why (proc_why (pi), proc_what (pi), 1);
c906108c
SS
1820 }
1821 else
1822 {
c3f6f71d
JM
1823 pi->was_stopped = 0;
1824 /* Set the process to run again when we close it. */
1825 if (!proc_set_run_on_last_close (pi))
1826 dead_procinfo (pi, "do_attach: couldn't set RLC.", NOKILL);
1827
0df8b418 1828 /* Now stop the process. */
c3f6f71d
JM
1829 if (!proc_stop_process (pi))
1830 dead_procinfo (pi, "do_attach: couldn't stop the process.", NOKILL);
1831 pi->ignore_next_sigstop = 1;
c906108c 1832 }
c3f6f71d
JM
1833 /* Save some of the /proc state to be restored if we detach. */
1834 if (!proc_get_traced_faults (pi, &pi->saved_fltset))
1835 dead_procinfo (pi, "do_attach: couldn't save traced faults.", NOKILL);
1836 if (!proc_get_traced_signals (pi, &pi->saved_sigset))
1837 dead_procinfo (pi, "do_attach: couldn't save traced signals.", NOKILL);
37de36c6 1838 if (!proc_get_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d
JM
1839 dead_procinfo (pi, "do_attach: couldn't save traced syscall entries.",
1840 NOKILL);
37de36c6 1841 if (!proc_get_traced_sysexit (pi, pi->saved_exitset))
19958708 1842 dead_procinfo (pi, "do_attach: couldn't save traced syscall exits.",
c3f6f71d
JM
1843 NOKILL);
1844 if (!proc_get_held_signals (pi, &pi->saved_sighold))
1845 dead_procinfo (pi, "do_attach: couldn't save held signals.", NOKILL);
1846
c475f569
RO
1847 fail = procfs_debug_inferior (pi);
1848 if (fail != 0)
c3f6f71d
JM
1849 dead_procinfo (pi, "do_attach: failed in procfs_debug_inferior", NOKILL);
1850
6c95b8df
PA
1851 inf = current_inferior ();
1852 inferior_appeared (inf, pi->pid);
c3f6f71d 1853 /* Let GDB know that the inferior was attached. */
30220b46 1854 inf->attach_flag = true;
2689673f
PA
1855
1856 /* Create a procinfo for the current lwp. */
1857 lwpid = proc_get_current_thread (pi);
1858 create_procinfo (pi->pid, lwpid);
1859
1860 /* Add it to gdb's thread list. */
fd79271b 1861 ptid = ptid_t (pi->pid, lwpid, 0);
7fb43e53
PA
1862 thread_info *thr = add_thread (&the_procfs_target, ptid);
1863 switch_to_thread (thr);
c906108c
SS
1864}
1865
1866static void
6bd6f3b6 1867do_detach ()
c906108c 1868{
c3f6f71d 1869 procinfo *pi;
c906108c 1870
0df8b418 1871 /* Find procinfo for the main process. */
e99b03dc 1872 pi = find_procinfo_or_die (inferior_ptid.pid (),
dfd4cc63 1873 0); /* FIXME: threads */
c5aa993b 1874
c3f6f71d
JM
1875 if (!proc_set_traced_signals (pi, &pi->saved_sigset))
1876 proc_warn (pi, "do_detach, set_traced_signal", __LINE__);
c906108c 1877
c3f6f71d
JM
1878 if (!proc_set_traced_faults (pi, &pi->saved_fltset))
1879 proc_warn (pi, "do_detach, set_traced_faults", __LINE__);
1880
37de36c6 1881 if (!proc_set_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d
JM
1882 proc_warn (pi, "do_detach, set_traced_sysentry", __LINE__);
1883
37de36c6 1884 if (!proc_set_traced_sysexit (pi, pi->saved_exitset))
c3f6f71d
JM
1885 proc_warn (pi, "do_detach, set_traced_sysexit", __LINE__);
1886
1887 if (!proc_set_held_signals (pi, &pi->saved_sighold))
1888 proc_warn (pi, "do_detach, set_held_signals", __LINE__);
1889
6bd6f3b6
SM
1890 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
1891 if (!(pi->was_stopped)
1892 || query (_("Was stopped when attached, make it runnable again? ")))
c3f6f71d
JM
1893 {
1894 /* Clear any pending signal. */
1895 if (!proc_clear_current_fault (pi))
1896 proc_warn (pi, "do_detach, clear_current_fault", __LINE__);
1897
6bd6f3b6 1898 if (!proc_clear_current_signal (pi))
1a303dec
MS
1899 proc_warn (pi, "do_detach, clear_current_signal", __LINE__);
1900
c3f6f71d
JM
1901 if (!proc_set_run_on_last_close (pi))
1902 proc_warn (pi, "do_detach, set_rlc", __LINE__);
1903 }
1904
c3f6f71d 1905 destroy_procinfo (pi);
c906108c
SS
1906}
1907
772cf8be
MK
1908/* Fetch register REGNUM from the inferior. If REGNUM is -1, do this
1909 for all registers.
1910
772cf8be
MK
1911 NOTE: Since the /proc interface cannot give us individual
1912 registers, we pay no attention to REGNUM, and just fetch them all.
1913 This results in the possibility that we will do unnecessarily many
1914 fetches, since we may be called repeatedly for individual
1915 registers. So we cache the results, and mark the cache invalid
1916 when the process is resumed. */
c3f6f71d 1917
f6ac5f3d
PA
1918void
1919procfs_target::fetch_registers (struct regcache *regcache, int regnum)
c906108c 1920{
772cf8be
MK
1921 gdb_gregset_t *gregs;
1922 procinfo *pi;
222312d3 1923 ptid_t ptid = regcache->ptid ();
e99b03dc 1924 int pid = ptid.pid ();
e38504b3 1925 int tid = ptid.lwp ();
ac7936df 1926 struct gdbarch *gdbarch = regcache->arch ();
c3f6f71d 1927
2689673f 1928 pi = find_procinfo_or_die (pid, tid);
c3f6f71d
JM
1929
1930 if (pi == NULL)
8a3fe4f8 1931 error (_("procfs: fetch_registers failed to find procinfo for %s"),
a068643d 1932 target_pid_to_str (ptid).c_str ());
c3f6f71d 1933
772cf8be
MK
1934 gregs = proc_get_gregs (pi);
1935 if (gregs == NULL)
c3f6f71d
JM
1936 proc_error (pi, "fetch_registers, get_gregs", __LINE__);
1937
56be3814 1938 supply_gregset (regcache, (const gdb_gregset_t *) gregs);
c3f6f71d 1939
40a6adc1 1940 if (gdbarch_fp0_regnum (gdbarch) >= 0) /* Do we have an FPU? */
60054393 1941 {
772cf8be
MK
1942 gdb_fpregset_t *fpregs;
1943
40a6adc1
MD
1944 if ((regnum >= 0 && regnum < gdbarch_fp0_regnum (gdbarch))
1945 || regnum == gdbarch_pc_regnum (gdbarch)
1946 || regnum == gdbarch_sp_regnum (gdbarch))
772cf8be 1947 return; /* Not a floating point register. */
c5aa993b 1948
772cf8be
MK
1949 fpregs = proc_get_fpregs (pi);
1950 if (fpregs == NULL)
60054393 1951 proc_error (pi, "fetch_registers, get_fpregs", __LINE__);
c906108c 1952
56be3814 1953 supply_fpregset (regcache, (const gdb_fpregset_t *) fpregs);
60054393 1954 }
c906108c
SS
1955}
1956
772cf8be
MK
1957/* Store register REGNUM back into the inferior. If REGNUM is -1, do
1958 this for all registers.
1959
1960 NOTE: Since the /proc interface will not read individual registers,
1961 we will cache these requests until the process is resumed, and only
1962 then write them back to the inferior process.
77382aee 1963
772cf8be
MK
1964 FIXME: is that a really bad idea? Have to think about cases where
1965 writing one register might affect the value of others, etc. */
c906108c 1966
f6ac5f3d
PA
1967void
1968procfs_target::store_registers (struct regcache *regcache, int regnum)
c3f6f71d 1969{
772cf8be
MK
1970 gdb_gregset_t *gregs;
1971 procinfo *pi;
222312d3 1972 ptid_t ptid = regcache->ptid ();
e99b03dc 1973 int pid = ptid.pid ();
e38504b3 1974 int tid = ptid.lwp ();
ac7936df 1975 struct gdbarch *gdbarch = regcache->arch ();
c3f6f71d 1976
2689673f 1977 pi = find_procinfo_or_die (pid, tid);
c3f6f71d
JM
1978
1979 if (pi == NULL)
8a3fe4f8 1980 error (_("procfs: store_registers: failed to find procinfo for %s"),
a068643d 1981 target_pid_to_str (ptid).c_str ());
c906108c 1982
772cf8be
MK
1983 gregs = proc_get_gregs (pi);
1984 if (gregs == NULL)
c3f6f71d 1985 proc_error (pi, "store_registers, get_gregs", __LINE__);
c906108c 1986
56be3814 1987 fill_gregset (regcache, gregs, regnum);
c3f6f71d
JM
1988 if (!proc_set_gregs (pi))
1989 proc_error (pi, "store_registers, set_gregs", __LINE__);
c906108c 1990
40a6adc1 1991 if (gdbarch_fp0_regnum (gdbarch) >= 0) /* Do we have an FPU? */
60054393 1992 {
772cf8be
MK
1993 gdb_fpregset_t *fpregs;
1994
40a6adc1
MD
1995 if ((regnum >= 0 && regnum < gdbarch_fp0_regnum (gdbarch))
1996 || regnum == gdbarch_pc_regnum (gdbarch)
1997 || regnum == gdbarch_sp_regnum (gdbarch))
772cf8be 1998 return; /* Not a floating point register. */
60054393 1999
772cf8be
MK
2000 fpregs = proc_get_fpregs (pi);
2001 if (fpregs == NULL)
60054393
MS
2002 proc_error (pi, "store_registers, get_fpregs", __LINE__);
2003
56be3814 2004 fill_fpregset (regcache, fpregs, regnum);
60054393
MS
2005 if (!proc_set_fpregs (pi))
2006 proc_error (pi, "store_registers, set_fpregs", __LINE__);
2007 }
c3f6f71d 2008}
c906108c 2009
77382aee
PA
2010/* Retrieve the next stop event from the child process. If child has
2011 not stopped yet, wait for it to stop. Translate /proc eventcodes
2012 (or possibly wait eventcodes) into gdb internal event codes.
2013 Returns the id of process (and possibly thread) that incurred the
2014 event. Event codes are returned through a pointer parameter. */
c906108c 2015
f6ac5f3d
PA
2016ptid_t
2017procfs_target::wait (ptid_t ptid, struct target_waitstatus *status,
b60cea74 2018 target_wait_flags options)
c906108c 2019{
0df8b418 2020 /* First cut: loosely based on original version 2.1. */
c3f6f71d 2021 procinfo *pi;
39f77062
KB
2022 int wstat;
2023 int temp_tid;
2024 ptid_t retval, temp_ptid;
c3f6f71d
JM
2025 int why, what, flags;
2026 int retry = 0;
c906108c 2027
c3f6f71d 2028wait_again:
c906108c 2029
c3f6f71d
JM
2030 retry++;
2031 wstat = 0;
f2907e49 2032 retval = ptid_t (-1);
c906108c 2033
0df8b418 2034 /* Find procinfo for main process. */
f8098322
PA
2035
2036 /* procfs_target currently only supports one inferior. */
2037 inferior *inf = current_inferior ();
2038
2039 pi = find_procinfo_or_die (inf->pid, 0);
c3f6f71d 2040 if (pi)
c906108c 2041 {
0df8b418 2042 /* We must assume that the status is stale now... */
c3f6f71d
JM
2043 pi->status_valid = 0;
2044 pi->gregs_valid = 0;
2045 pi->fpregs_valid = 0;
2046
0df8b418 2047#if 0 /* just try this out... */
c3f6f71d
JM
2048 flags = proc_flags (pi);
2049 why = proc_why (pi);
2050 if ((flags & PR_STOPPED) && (why == PR_REQUESTED))
0df8b418 2051 pi->status_valid = 0; /* re-read again, IMMEDIATELY... */
c3f6f71d
JM
2052#endif
2053 /* If child is not stopped, wait for it to stop. */
c475f569
RO
2054 if (!(proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
2055 && !proc_wait_for_stop (pi))
c906108c 2056 {
0df8b418 2057 /* wait_for_stop failed: has the child terminated? */
c3f6f71d 2058 if (errno == ENOENT)
c906108c 2059 {
39f77062
KB
2060 int wait_retval;
2061
0df8b418 2062 /* /proc file not found; presumably child has terminated. */
f6ac5f3d 2063 wait_retval = ::wait (&wstat); /* "wait" for the child's exit. */
c3f6f71d 2064
dfd4cc63 2065 /* Wrong child? */
f8098322 2066 if (wait_retval != inf->pid)
3e43a32a
MS
2067 error (_("procfs: couldn't stop "
2068 "process %d: wait returned %d."),
f8098322 2069 inf->pid, wait_retval);
c3f6f71d 2070 /* FIXME: might I not just use waitpid?
0df8b418 2071 Or try find_procinfo to see if I know about this child? */
f2907e49 2072 retval = ptid_t (wait_retval);
c906108c 2073 }
d1566ff5
FN
2074 else if (errno == EINTR)
2075 goto wait_again;
c3f6f71d 2076 else
c906108c 2077 {
0df8b418 2078 /* Unknown error from wait_for_stop. */
c3f6f71d 2079 proc_error (pi, "target_wait (wait_for_stop)", __LINE__);
c906108c 2080 }
c3f6f71d
JM
2081 }
2082 else
2083 {
2084 /* This long block is reached if either:
2085 a) the child was already stopped, or
2086 b) we successfully waited for the child with wait_for_stop.
2087 This block will analyze the /proc status, and translate it
2088 into a waitstatus for GDB.
2089
2090 If we actually had to call wait because the /proc file
19958708 2091 is gone (child terminated), then we skip this block,
c3f6f71d
JM
2092 because we already have a waitstatus. */
2093
2094 flags = proc_flags (pi);
2095 why = proc_why (pi);
2096 what = proc_what (pi);
2097
c3f6f71d 2098 if (flags & (PR_STOPPED | PR_ISTOP))
c906108c 2099 {
c3f6f71d
JM
2100 /* If it's running async (for single_thread control),
2101 set it back to normal again. */
2102 if (flags & PR_ASYNC)
2103 if (!proc_unset_async (pi))
2104 proc_error (pi, "target_wait, unset_async", __LINE__);
c3f6f71d
JM
2105
2106 if (info_verbose)
2107 proc_prettyprint_why (why, what, 1);
2108
2109 /* The 'pid' we will return to GDB is composed of
2110 the process ID plus the lwp ID. */
fd79271b 2111 retval = ptid_t (pi->pid, proc_get_current_thread (pi), 0);
c3f6f71d
JM
2112
2113 switch (why) {
2114 case PR_SIGNALLED:
2115 wstat = (what << 8) | 0177;
2116 break;
2117 case PR_SYSENTRY:
196535a6 2118 if (what == SYS_lwp_exit)
c3f6f71d 2119 {
17faa917 2120 if (print_thread_events)
6cb06a8c
TT
2121 gdb_printf (_("[%s exited]\n"),
2122 target_pid_to_str (retval).c_str ());
9213a6d7 2123 delete_thread (this->find_thread (retval));
b2ad7bb9 2124 proc_resume (pi, ptid, 0, GDB_SIGNAL_0);
f8098322 2125 goto wait_again;
37de36c6 2126 }
196535a6 2127 else if (what == SYS_exit)
37de36c6 2128 {
0df8b418 2129 /* Handle SYS_exit call only. */
37de36c6 2130 /* Stopped at entry to SYS_exit.
19958708 2131 Make it runnable, resume it, then use
37de36c6 2132 the wait system call to get its exit code.
19958708 2133 Proc_run_process always clears the current
37de36c6
KB
2134 fault and signal.
2135 Then return its exit status. */
2136 pi->status_valid = 0;
2137 wstat = 0;
19958708 2138 /* FIXME: what we should do is return
37de36c6
KB
2139 TARGET_WAITKIND_SPURIOUS. */
2140 if (!proc_run_process (pi, 0, 0))
2141 proc_error (pi, "target_wait, run_process", __LINE__);
181e7f93 2142
181e7f93 2143 if (inf->attach_flag)
c3f6f71d 2144 {
19958708 2145 /* Don't call wait: simulate waiting for exit,
37de36c6
KB
2146 return a "success" exit code. Bogus: what if
2147 it returns something else? */
2148 wstat = 0;
f8098322 2149 retval = ptid_t (inf->pid); /* ? ? ? */
37de36c6
KB
2150 }
2151 else
2152 {
f6ac5f3d 2153 int temp = ::wait (&wstat);
37de36c6
KB
2154
2155 /* FIXME: shouldn't I make sure I get the right
2156 event from the right process? If (for
2157 instance) I have killed an earlier inferior
2158 process but failed to clean up after it
2159 somehow, I could get its termination event
2160 here. */
2161
0df8b418
MS
2162 /* If wait returns -1, that's what we return
2163 to GDB. */
37de36c6 2164 if (temp < 0)
f2907e49 2165 retval = ptid_t (temp);
c3f6f71d 2166 }
c3f6f71d 2167 }
37de36c6
KB
2168 else
2169 {
6cb06a8c 2170 gdb_printf (_("procfs: trapped on entry to "));
37de36c6 2171 proc_prettyprint_syscall (proc_what (pi), 0);
6cb06a8c 2172 gdb_printf ("\n");
44122162
RO
2173
2174 long i, nsysargs, *sysargs;
2175
c475f569
RO
2176 nsysargs = proc_nsysarg (pi);
2177 sysargs = proc_sysargs (pi);
2178
2179 if (nsysargs > 0 && sysargs != NULL)
44122162 2180 {
6cb06a8c
TT
2181 gdb_printf (_("%ld syscall arguments:\n"),
2182 nsysargs);
44122162 2183 for (i = 0; i < nsysargs; i++)
6cb06a8c
TT
2184 gdb_printf ("#%ld: 0x%08lx\n",
2185 i, sysargs[i]);
44122162
RO
2186 }
2187
b2ad7bb9 2188 proc_resume (pi, ptid, 0, GDB_SIGNAL_0);
f8098322 2189 goto wait_again;
37de36c6
KB
2190 }
2191 break;
2192 case PR_SYSEXIT:
196535a6 2193 if (what == SYS_execve)
c3f6f71d 2194 {
37de36c6
KB
2195 /* Hopefully this is our own "fork-child" execing
2196 the real child. Hoax this event into a trap, and
2197 GDB will see the child about to execute its start
0df8b418 2198 address. */
37de36c6
KB
2199 wstat = (SIGTRAP << 8) | 0177;
2200 }
196535a6 2201 else if (what == SYS_lwp_create)
37de36c6 2202 {
77382aee
PA
2203 /* This syscall is somewhat like fork/exec. We
2204 will get the event twice: once for the parent
2205 LWP, and once for the child. We should already
2206 know about the parent LWP, but the child will
2207 be new to us. So, whenever we get this event,
2208 if it represents a new thread, simply add the
2209 thread to the list. */
c3f6f71d 2210
37de36c6 2211 /* If not in procinfo list, add it. */
39f77062
KB
2212 temp_tid = proc_get_current_thread (pi);
2213 if (!find_procinfo (pi->pid, temp_tid))
2214 create_procinfo (pi->pid, temp_tid);
37de36c6 2215
fd79271b 2216 temp_ptid = ptid_t (pi->pid, temp_tid, 0);
37de36c6 2217 /* If not in GDB's thread list, add it. */
5b6d1e4f
PA
2218 if (!in_thread_list (this, temp_ptid))
2219 add_thread (this, temp_ptid);
93815fbf 2220
b2ad7bb9 2221 proc_resume (pi, ptid, 0, GDB_SIGNAL_0);
f8098322 2222 goto wait_again;
37de36c6 2223 }
196535a6 2224 else if (what == SYS_lwp_exit)
37de36c6 2225 {
17faa917 2226 if (print_thread_events)
6cb06a8c
TT
2227 gdb_printf (_("[%s exited]\n"),
2228 target_pid_to_str (retval).c_str ());
9213a6d7 2229 delete_thread (this->find_thread (retval));
183be222 2230 status->set_spurious ();
37de36c6 2231 return retval;
c3f6f71d 2232 }
37de36c6
KB
2233 else
2234 {
6cb06a8c 2235 gdb_printf (_("procfs: trapped on exit from "));
37de36c6 2236 proc_prettyprint_syscall (proc_what (pi), 0);
6cb06a8c 2237 gdb_printf ("\n");
44122162
RO
2238
2239 long i, nsysargs, *sysargs;
2240
c475f569
RO
2241 nsysargs = proc_nsysarg (pi);
2242 sysargs = proc_sysargs (pi);
2243
2244 if (nsysargs > 0 && sysargs != NULL)
44122162 2245 {
6cb06a8c
TT
2246 gdb_printf (_("%ld syscall arguments:\n"),
2247 nsysargs);
44122162 2248 for (i = 0; i < nsysargs; i++)
6cb06a8c
TT
2249 gdb_printf ("#%ld: 0x%08lx\n",
2250 i, sysargs[i]);
44122162
RO
2251 }
2252
b2ad7bb9 2253 proc_resume (pi, ptid, 0, GDB_SIGNAL_0);
f8098322 2254 goto wait_again;
37de36c6 2255 }
c3f6f71d
JM
2256 break;
2257 case PR_REQUESTED:
2258#if 0 /* FIXME */
2259 wstat = (SIGSTOP << 8) | 0177;
2260 break;
2261#else
2262 if (retry < 5)
2263 {
6cb06a8c 2264 gdb_printf (_("Retry #%d:\n"), retry);
c3f6f71d
JM
2265 pi->status_valid = 0;
2266 goto wait_again;
2267 }
2268 else
2269 {
2270 /* If not in procinfo list, add it. */
39f77062
KB
2271 temp_tid = proc_get_current_thread (pi);
2272 if (!find_procinfo (pi->pid, temp_tid))
2273 create_procinfo (pi->pid, temp_tid);
c3f6f71d
JM
2274
2275 /* If not in GDB's thread list, add it. */
fd79271b 2276 temp_ptid = ptid_t (pi->pid, temp_tid, 0);
5b6d1e4f
PA
2277 if (!in_thread_list (this, temp_ptid))
2278 add_thread (this, temp_ptid);
c3f6f71d 2279
183be222 2280 status->set_stopped (GDB_SIGNAL_0);
c3f6f71d
JM
2281 return retval;
2282 }
2283#endif
2284 case PR_JOBCONTROL:
2285 wstat = (what << 8) | 0177;
2286 break;
2287 case PR_FAULTED:
7a289707
RO
2288 {
2289 int signo = pi->prstatus.pr_lwp.pr_info.si_signo;
2290 if (signo != 0)
2291 wstat = (signo << 8) | 0177;
c3f6f71d 2292 }
7a289707 2293 break;
c3f6f71d 2294 default: /* switch (why) unmatched */
6cb06a8c
TT
2295 gdb_printf ("procfs:%d -- ", __LINE__);
2296 gdb_printf (_("child stopped for unknown reason:\n"));
c3f6f71d 2297 proc_prettyprint_why (why, what, 1);
8a3fe4f8 2298 error (_("... giving up..."));
c3f6f71d
JM
2299 break;
2300 }
77382aee
PA
2301 /* Got this far without error: If retval isn't in the
2302 threads database, add it. */
c475f569 2303 if (retval.pid () > 0
5b6d1e4f 2304 && !in_thread_list (this, retval))
c906108c 2305 {
77382aee
PA
2306 /* We have a new thread. We need to add it both to
2307 GDB's list and to our own. If we don't create a
2308 procinfo, resume may be unhappy later. */
5b6d1e4f 2309 add_thread (this, retval);
e99b03dc 2310 if (find_procinfo (retval.pid (),
e38504b3 2311 retval.lwp ()) == NULL)
e99b03dc 2312 create_procinfo (retval.pid (),
e38504b3 2313 retval.lwp ());
c906108c 2314 }
c906108c 2315 }
0df8b418 2316 else /* Flags do not indicate STOPPED. */
c906108c 2317 {
0df8b418 2318 /* surely this can't happen... */
6cb06a8c
TT
2319 gdb_printf ("procfs:%d -- process not stopped.\n",
2320 __LINE__);
c3f6f71d 2321 proc_prettyprint_flags (flags, 1);
8a3fe4f8 2322 error (_("procfs: ...giving up..."));
c906108c 2323 }
c906108c 2324 }
c906108c 2325
c3f6f71d 2326 if (status)
7509b829 2327 *status = host_status_to_waitstatus (wstat);
c906108c
SS
2328 }
2329
c3f6f71d
JM
2330 return retval;
2331}
c906108c 2332
4e73f23d
RM
2333/* Perform a partial transfer to/from the specified object. For
2334 memory transfers, fall back to the old memory xfer functions. */
2335
f6ac5f3d
PA
2336enum target_xfer_status
2337procfs_target::xfer_partial (enum target_object object,
2338 const char *annex, gdb_byte *readbuf,
2339 const gdb_byte *writebuf, ULONGEST offset,
2340 ULONGEST len, ULONGEST *xfered_len)
4e73f23d
RM
2341{
2342 switch (object)
2343 {
2344 case TARGET_OBJECT_MEMORY:
e96027e0 2345 return procfs_xfer_memory (readbuf, writebuf, offset, len, xfered_len);
4e73f23d 2346
4e73f23d 2347 case TARGET_OBJECT_AUXV:
f6ac5f3d 2348 return memory_xfer_auxv (this, object, annex, readbuf, writebuf,
9b409511 2349 offset, len, xfered_len);
4e73f23d
RM
2350
2351 default:
4360561f
TT
2352 return this->beneath ()->xfer_partial (object, annex,
2353 readbuf, writebuf, offset, len,
2354 xfered_len);
4e73f23d
RM
2355 }
2356}
2357
e96027e0
PA
2358/* Helper for procfs_xfer_partial that handles memory transfers.
2359 Arguments are like target_xfer_partial. */
4e73f23d 2360
e96027e0
PA
2361static enum target_xfer_status
2362procfs_xfer_memory (gdb_byte *readbuf, const gdb_byte *writebuf,
2363 ULONGEST memaddr, ULONGEST len, ULONGEST *xfered_len)
c3f6f71d
JM
2364{
2365 procinfo *pi;
e96027e0 2366 int nbytes;
c906108c 2367
0df8b418 2368 /* Find procinfo for main process. */
e99b03dc 2369 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c475f569 2370 if (pi->as_fd == 0 && open_procinfo_files (pi, FD_AS) == 0)
c906108c 2371 {
c3f6f71d 2372 proc_warn (pi, "xfer_memory, open_proc_files", __LINE__);
e96027e0 2373 return TARGET_XFER_E_IO;
c906108c 2374 }
c906108c 2375
e96027e0
PA
2376 if (lseek (pi->as_fd, (off_t) memaddr, SEEK_SET) != (off_t) memaddr)
2377 return TARGET_XFER_E_IO;
2378
2379 if (writebuf != NULL)
c906108c 2380 {
e96027e0
PA
2381 PROCFS_NOTE ("write memory:\n");
2382 nbytes = write (pi->as_fd, writebuf, len);
2383 }
2384 else
2385 {
2386 PROCFS_NOTE ("read memory:\n");
2387 nbytes = read (pi->as_fd, readbuf, len);
c906108c 2388 }
e96027e0
PA
2389 if (nbytes <= 0)
2390 return TARGET_XFER_E_IO;
2391 *xfered_len = nbytes;
2392 return TARGET_XFER_OK;
c906108c
SS
2393}
2394
77382aee
PA
2395/* Called by target_resume before making child runnable. Mark cached
2396 registers and status's invalid. If there are "dirty" caches that
2397 need to be written back to the child process, do that.
c906108c 2398
77382aee
PA
2399 File descriptors are also cached. As they are a limited resource,
2400 we cannot hold onto them indefinitely. However, as they are
2401 expensive to open, we don't want to throw them away
85102364 2402 indiscriminately either. As a compromise, we will keep the file
77382aee
PA
2403 descriptors for the parent process, but discard any file
2404 descriptors we may have accumulated for the threads.
2405
2406 As this function is called by iterate_over_threads, it always
2407 returns zero (so that iterate_over_threads will keep
2408 iterating). */
c3f6f71d
JM
2409
2410static int
fba45db2 2411invalidate_cache (procinfo *parent, procinfo *pi, void *ptr)
c906108c 2412{
77382aee
PA
2413 /* About to run the child; invalidate caches and do any other
2414 cleanup. */
c906108c 2415
c3f6f71d 2416 if (parent != NULL)
c906108c 2417 {
c3f6f71d 2418 /* The presence of a parent indicates that this is an LWP.
19958708 2419 Close any file descriptors that it might have open.
c3f6f71d
JM
2420 We don't do this to the master (parent) procinfo. */
2421
2422 close_procinfo_files (pi);
c906108c 2423 }
c3f6f71d
JM
2424 pi->gregs_valid = 0;
2425 pi->fpregs_valid = 0;
c3f6f71d
JM
2426 pi->status_valid = 0;
2427 pi->threads_valid = 0;
c906108c 2428
c3f6f71d 2429 return 0;
c906108c
SS
2430}
2431
b2ad7bb9 2432/* Make child process PI runnable.
77382aee
PA
2433
2434 If STEP is true, then arrange for the child to stop again after
b2ad7bb9
PA
2435 executing a single instruction. SCOPE_PTID, STEP and SIGNO are
2436 like in the target_resume interface. */
c906108c 2437
b2ad7bb9
PA
2438static void
2439proc_resume (procinfo *pi, ptid_t scope_ptid, int step, enum gdb_signal signo)
c906108c 2440{
b2ad7bb9 2441 procinfo *thread;
c3f6f71d
JM
2442 int native_signo;
2443
196535a6
RO
2444 /* FIXME: Check/reword. */
2445
2446 /* prrun.prflags |= PRCFAULT; clear current fault.
2447 PRCFAULT may be replaced by a PCCFAULT call (proc_clear_current_fault)
c3f6f71d 2448 This basically leaves PRSTEP and PRCSIG.
196535a6 2449 PRCSIG is like PCSSIG (proc_clear_current_signal).
c3f6f71d 2450 So basically PR_STEP is the sole argument that must be passed
196535a6 2451 to proc_run_process. */
c3f6f71d 2452
c3f6f71d 2453 errno = 0;
c906108c 2454
c3f6f71d 2455 /* Convert signal to host numbering. */
c475f569 2456 if (signo == 0 || (signo == GDB_SIGNAL_STOP && pi->ignore_next_sigstop))
c3f6f71d
JM
2457 native_signo = 0;
2458 else
2ea28649 2459 native_signo = gdb_signal_to_host (signo);
c906108c 2460
c3f6f71d 2461 pi->ignore_next_sigstop = 0;
c906108c 2462
77382aee
PA
2463 /* Running the process voids all cached registers and status. */
2464 /* Void the threads' caches first. */
19958708 2465 proc_iterate_over_threads (pi, invalidate_cache, NULL);
c3f6f71d
JM
2466 /* Void the process procinfo's caches. */
2467 invalidate_cache (NULL, pi, NULL);
c906108c 2468
b2ad7bb9 2469 if (scope_ptid.pid () != -1)
c906108c 2470 {
77382aee
PA
2471 /* Resume a specific thread, presumably suppressing the
2472 others. */
b2ad7bb9 2473 thread = find_procinfo (scope_ptid.pid (), scope_ptid.lwp ());
7de45904 2474 if (thread != NULL)
c906108c 2475 {
c3f6f71d
JM
2476 if (thread->tid != 0)
2477 {
77382aee
PA
2478 /* We're to resume a specific thread, and not the
2479 others. Set the child process's PR_ASYNC flag. */
c3f6f71d
JM
2480 if (!proc_set_async (pi))
2481 proc_error (pi, "target_resume, set_async", __LINE__);
0df8b418
MS
2482 pi = thread; /* Substitute the thread's procinfo
2483 for run. */
c3f6f71d 2484 }
c906108c
SS
2485 }
2486 }
c906108c 2487
c3f6f71d 2488 if (!proc_run_process (pi, step, native_signo))
c906108c 2489 {
c3f6f71d 2490 if (errno == EBUSY)
77382aee
PA
2491 warning (_("resume: target already running. "
2492 "Pretend to resume, and hope for the best!"));
c3f6f71d
JM
2493 else
2494 proc_error (pi, "target_resume", __LINE__);
c906108c 2495 }
c3f6f71d 2496}
c906108c 2497
b2ad7bb9
PA
2498/* Implementation of target_ops::resume. */
2499
2500void
2501procfs_target::resume (ptid_t scope_ptid, int step, enum gdb_signal signo)
2502{
2503 /* Find procinfo for main process. */
2504 procinfo *pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
2505
2506 proc_resume (pi, scope_ptid, step, signo);
2507}
2508
77382aee 2509/* Set up to trace signals in the child process. */
c906108c 2510
f6ac5f3d 2511void
adc6a863 2512procfs_target::pass_signals (gdb::array_view<const unsigned char> pass_signals)
c3f6f71d 2513{
44122162 2514 sigset_t signals;
e99b03dc 2515 procinfo *pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
2455069d 2516 int signo;
c906108c 2517
2455069d
UW
2518 prfillset (&signals);
2519
2520 for (signo = 0; signo < NSIG; signo++)
2521 {
2ea28649 2522 int target_signo = gdb_signal_from_host (signo);
adc6a863 2523 if (target_signo < pass_signals.size () && pass_signals[target_signo])
44122162 2524 prdelset (&signals, signo);
2455069d
UW
2525 }
2526
2527 if (!proc_set_traced_signals (pi, &signals))
2528 proc_error (pi, "pass_signals", __LINE__);
c3f6f71d 2529}
c906108c 2530
77382aee 2531/* Print status information about the child process. */
c906108c 2532
f6ac5f3d
PA
2533void
2534procfs_target::files_info ()
c3f6f71d 2535{
181e7f93 2536 struct inferior *inf = current_inferior ();
f4a14ae6 2537
6cb06a8c
TT
2538 gdb_printf (_("\tUsing the running image of %s %s via /proc.\n"),
2539 inf->attach_flag? "attached": "child",
fb6d30e0 2540 target_pid_to_str (ptid_t (inf->pid)).c_str ());
c3f6f71d 2541}
c906108c 2542
77382aee
PA
2543/* Make it die. Wait for it to die. Clean up after it. Note: this
2544 should only be applied to the real process, not to an LWP, because
2545 of the check for parent-process. If we need this to work for an
2546 LWP, it needs some more logic. */
c906108c 2547
c3f6f71d 2548static void
fba45db2 2549unconditionally_kill_inferior (procinfo *pi)
c3f6f71d
JM
2550{
2551 int parent_pid;
c906108c 2552
c3f6f71d 2553 parent_pid = proc_parent_pid (pi);
c3f6f71d 2554 if (!proc_kill (pi, SIGKILL))
103b3ef5 2555 proc_error (pi, "unconditionally_kill, proc_kill", __LINE__);
c3f6f71d 2556 destroy_procinfo (pi);
c906108c 2557
c3f6f71d
JM
2558 /* If pi is GDB's child, wait for it to die. */
2559 if (parent_pid == getpid ())
19958708 2560 /* FIXME: should we use waitpid to make sure we get the right event?
c3f6f71d
JM
2561 Should we check the returned event? */
2562 {
0d06e24b 2563#if 0
c3f6f71d 2564 int status, ret;
c906108c 2565
c3f6f71d
JM
2566 ret = waitpid (pi->pid, &status, 0);
2567#else
2568 wait (NULL);
2569#endif
2570 }
2571}
c906108c 2572
77382aee
PA
2573/* We're done debugging it, and we want it to go away. Then we want
2574 GDB to forget all about it. */
c906108c 2575
f6ac5f3d
PA
2576void
2577procfs_target::kill ()
c906108c 2578{
d7e15655 2579 if (inferior_ptid != null_ptid) /* ? */
c3f6f71d 2580 {
0df8b418 2581 /* Find procinfo for main process. */
e99b03dc 2582 procinfo *pi = find_procinfo (inferior_ptid.pid (), 0);
c906108c 2583
c3f6f71d
JM
2584 if (pi)
2585 unconditionally_kill_inferior (pi);
bc1e6c81 2586 target_mourn_inferior (inferior_ptid);
c906108c 2587 }
c3f6f71d
JM
2588}
2589
77382aee 2590/* Forget we ever debugged this thing! */
c906108c 2591
f6ac5f3d
PA
2592void
2593procfs_target::mourn_inferior ()
c3f6f71d
JM
2594{
2595 procinfo *pi;
c906108c 2596
d7e15655 2597 if (inferior_ptid != null_ptid)
c3f6f71d 2598 {
0df8b418 2599 /* Find procinfo for main process. */
e99b03dc 2600 pi = find_procinfo (inferior_ptid.pid (), 0);
c3f6f71d
JM
2601 if (pi)
2602 destroy_procinfo (pi);
c906108c 2603 }
6a3cb8e8
PA
2604
2605 generic_mourn_inferior ();
8181d85f 2606
f6ac5f3d 2607 maybe_unpush_target ();
c3f6f71d 2608}
c906108c 2609
77382aee
PA
2610/* When GDB forks to create a runnable inferior process, this function
2611 is called on the parent side of the fork. It's job is to do
2612 whatever is necessary to make the child ready to be debugged, and
2613 then wait for the child to synchronize. */
c906108c 2614
5b6d1e4f
PA
2615void
2616procfs_target::procfs_init_inferior (int pid)
c3f6f71d
JM
2617{
2618 procinfo *pi;
c3f6f71d 2619 int fail;
2689673f 2620 int lwpid;
c906108c 2621
c475f569
RO
2622 pi = create_procinfo (pid, 0);
2623 if (pi == NULL)
9b20d036 2624 perror (_("procfs: out of memory in 'init_inferior'"));
c3f6f71d
JM
2625
2626 if (!open_procinfo_files (pi, FD_CTL))
2627 proc_error (pi, "init_inferior, open_proc_files", __LINE__);
2628
2629 /*
2630 xmalloc // done
2631 open_procinfo_files // done
2632 link list // done
2633 prfillset (trace)
2634 procfs_notice_signals
2635 prfillset (fault)
2636 prdelset (FLTPAGE)
c3f6f71d
JM
2637 */
2638
77382aee 2639 /* If not stopped yet, wait for it to stop. */
c475f569 2640 if (!(proc_flags (pi) & PR_STOPPED) && !(proc_wait_for_stop (pi)))
c3f6f71d
JM
2641 dead_procinfo (pi, "init_inferior: wait_for_stop failed", KILL);
2642
2643 /* Save some of the /proc state to be restored if we detach. */
2644 /* FIXME: Why? In case another debugger was debugging it?
0df8b418 2645 We're it's parent, for Ghu's sake! */
c3f6f71d
JM
2646 if (!proc_get_traced_signals (pi, &pi->saved_sigset))
2647 proc_error (pi, "init_inferior, get_traced_signals", __LINE__);
2648 if (!proc_get_held_signals (pi, &pi->saved_sighold))
2649 proc_error (pi, "init_inferior, get_held_signals", __LINE__);
2650 if (!proc_get_traced_faults (pi, &pi->saved_fltset))
2651 proc_error (pi, "init_inferior, get_traced_faults", __LINE__);
37de36c6 2652 if (!proc_get_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d 2653 proc_error (pi, "init_inferior, get_traced_sysentry", __LINE__);
37de36c6 2654 if (!proc_get_traced_sysexit (pi, pi->saved_exitset))
c3f6f71d
JM
2655 proc_error (pi, "init_inferior, get_traced_sysexit", __LINE__);
2656
c475f569
RO
2657 fail = procfs_debug_inferior (pi);
2658 if (fail != 0)
c3f6f71d
JM
2659 proc_error (pi, "init_inferior (procfs_debug_inferior)", fail);
2660
0d06e24b
JM
2661 /* FIXME: logically, we should really be turning OFF run-on-last-close,
2662 and possibly even turning ON kill-on-last-close at this point. But
2663 I can't make that change without careful testing which I don't have
2664 time to do right now... */
c3f6f71d
JM
2665 /* Turn on run-on-last-close flag so that the child
2666 will die if GDB goes away for some reason. */
2667 if (!proc_set_run_on_last_close (pi))
2668 proc_error (pi, "init_inferior, set_RLC", __LINE__);
2669
2689673f
PA
2670 /* We now have have access to the lwpid of the main thread/lwp. */
2671 lwpid = proc_get_current_thread (pi);
2672
2673 /* Create a procinfo for the main lwp. */
2674 create_procinfo (pid, lwpid);
2675
2676 /* We already have a main thread registered in the thread table at
2677 this point, but it didn't have any lwp info yet. Notify the core
2678 about it. This changes inferior_ptid as well. */
5b6d1e4f 2679 thread_change_ptid (this, ptid_t (pid), ptid_t (pid, lwpid, 0));
c906108c 2680
2090129c 2681 gdb_startup_inferior (pid, START_INFERIOR_TRAPS_EXPECTED);
c3f6f71d 2682}
c906108c 2683
77382aee
PA
2684/* When GDB forks to create a new process, this function is called on
2685 the child side of the fork before GDB exec's the user program. Its
2686 job is to make the child minimally debuggable, so that the parent
2687 GDB process can connect to the child and take over. This function
2688 should do only the minimum to make that possible, and to
2689 synchronize with the parent process. The parent process should
2690 take care of the details. */
c3f6f71d
JM
2691
2692static void
fba45db2 2693procfs_set_exec_trap (void)
c3f6f71d
JM
2694{
2695 /* This routine called on the child side (inferior side)
2696 after GDB forks the inferior. It must use only local variables,
2697 because it may be sharing data space with its parent. */
c906108c 2698
c3f6f71d 2699 procinfo *pi;
37de36c6 2700 sysset_t *exitset;
c906108c 2701
c475f569
RO
2702 pi = create_procinfo (getpid (), 0);
2703 if (pi == NULL)
deb70aa0 2704 perror_with_name (_("procfs: create_procinfo failed in child"));
c906108c 2705
c3f6f71d
JM
2706 if (open_procinfo_files (pi, FD_CTL) == 0)
2707 {
2708 proc_warn (pi, "set_exec_trap, open_proc_files", __LINE__);
2709 gdb_flush (gdb_stderr);
77382aee
PA
2710 /* No need to call "dead_procinfo", because we're going to
2711 exit. */
c3f6f71d
JM
2712 _exit (127);
2713 }
c906108c 2714
c475f569 2715 exitset = XNEW (sysset_t);
44122162 2716 premptyset (exitset);
44122162 2717 praddset (exitset, SYS_execve);
37de36c6
KB
2718
2719 if (!proc_set_traced_sysexit (pi, exitset))
c906108c 2720 {
c3f6f71d
JM
2721 proc_warn (pi, "set_exec_trap, set_traced_sysexit", __LINE__);
2722 gdb_flush (gdb_stderr);
2723 _exit (127);
c906108c 2724 }
c3f6f71d 2725
0df8b418 2726 /* FIXME: should this be done in the parent instead? */
c3f6f71d
JM
2727 /* Turn off inherit on fork flag so that all grand-children
2728 of gdb start with tracing flags cleared. */
2729 if (!proc_unset_inherit_on_fork (pi))
2730 proc_warn (pi, "set_exec_trap, unset_inherit", __LINE__);
2731
2732 /* Turn off run on last close flag, so that the child process
2733 cannot run away just because we close our handle on it.
2734 We want it to wait for the parent to attach. */
2735 if (!proc_unset_run_on_last_close (pi))
2736 proc_warn (pi, "set_exec_trap, unset_RLC", __LINE__);
2737
19958708 2738 /* FIXME: No need to destroy the procinfo --
0df8b418 2739 we have our own address space, and we're about to do an exec! */
c3f6f71d 2740 /*destroy_procinfo (pi);*/
c906108c 2741}
c906108c 2742
c6d36836
RO
2743/* Dummy function to be sure fork_inferior uses fork(2) and not vfork(2).
2744 This avoids a possible deadlock gdb and its vfork'ed child. */
2745static void
2746procfs_pre_trace (void)
2747{
2748}
2749
77382aee
PA
2750/* This function is called BEFORE gdb forks the inferior process. Its
2751 only real responsibility is to set things up for the fork, and tell
2752 GDB which two functions to call after the fork (one for the parent,
2753 and one for the child).
2754
2755 This function does a complicated search for a unix shell program,
2756 which it then uses to parse arguments and environment variables to
2757 be sent to the child. I wonder whether this code could not be
2758 abstracted out and shared with other unix targets such as
2759 inf-ptrace? */
c906108c 2760
f6ac5f3d
PA
2761void
2762procfs_target::create_inferior (const char *exec_file,
2763 const std::string &allargs,
2764 char **env, int from_tty)
c906108c 2765{
974e6844 2766 const char *shell_file = get_shell ();
c906108c 2767 char *tryname;
28439f5e
PA
2768 int pid;
2769
974e6844 2770 if (strchr (shell_file, '/') == NULL)
c906108c
SS
2771 {
2772
2773 /* We will be looking down the PATH to find shell_file. If we
c3f6f71d
JM
2774 just do this the normal way (via execlp, which operates by
2775 attempting an exec for each element of the PATH until it
2776 finds one which succeeds), then there will be an exec for
2777 each failed attempt, each of which will cause a PR_SYSEXIT
2778 stop, and we won't know how to distinguish the PR_SYSEXIT's
2779 for these failed execs with the ones for successful execs
2780 (whether the exec has succeeded is stored at that time in the
2781 carry bit or some such architecture-specific and
2782 non-ABI-specified place).
2783
2784 So I can't think of anything better than to search the PATH
2785 now. This has several disadvantages: (1) There is a race
2786 condition; if we find a file now and it is deleted before we
2787 exec it, we lose, even if the deletion leaves a valid file
2788 further down in the PATH, (2) there is no way to know exactly
2789 what an executable (in the sense of "capable of being
2790 exec'd") file is. Using access() loses because it may lose
2791 if the caller is the superuser; failing to use it loses if
2792 there are ACLs or some such. */
c906108c 2793
995816ba
PA
2794 const char *p;
2795 const char *p1;
c906108c 2796 /* FIXME-maybe: might want "set path" command so user can change what
c3f6f71d 2797 path is used from within GDB. */
995816ba 2798 const char *path = getenv ("PATH");
c906108c
SS
2799 int len;
2800 struct stat statbuf;
2801
2802 if (path == NULL)
2803 path = "/bin:/usr/bin";
2804
b196bc4c 2805 tryname = (char *) alloca (strlen (path) + strlen (shell_file) + 2);
c3f6f71d 2806 for (p = path; p != NULL; p = p1 ? p1 + 1: NULL)
c906108c
SS
2807 {
2808 p1 = strchr (p, ':');
2809 if (p1 != NULL)
2810 len = p1 - p;
2811 else
2812 len = strlen (p);
f4ad82b3 2813 memcpy (tryname, p, len);
c906108c
SS
2814 tryname[len] = '\0';
2815 strcat (tryname, "/");
2816 strcat (tryname, shell_file);
2817 if (access (tryname, X_OK) < 0)
2818 continue;
2819 if (stat (tryname, &statbuf) < 0)
2820 continue;
2821 if (!S_ISREG (statbuf.st_mode))
2822 /* We certainly need to reject directories. I'm not quite
2823 as sure about FIFOs, sockets, etc., but I kind of doubt
2824 that people want to exec() these things. */
2825 continue;
2826 break;
2827 }
2828 if (p == NULL)
2829 /* Not found. This must be an error rather than merely passing
2830 the file to execlp(), because execlp() would try all the
2831 exec()s, causing GDB to get confused. */
8a3fe4f8 2832 error (_("procfs:%d -- Can't find shell %s in PATH"),
c3f6f71d 2833 __LINE__, shell_file);
c906108c
SS
2834
2835 shell_file = tryname;
2836 }
2837
25b48839 2838 inferior *inf = current_inferior ();
c8fbd44a 2839 if (!inf->target_is_pushed (this))
25b48839 2840 inf->push_target (this);
cf6f3e86 2841
28439f5e 2842 pid = fork_inferior (exec_file, allargs, env, procfs_set_exec_trap,
c6d36836 2843 NULL, procfs_pre_trace, shell_file, NULL);
28439f5e 2844
2090129c
SDJ
2845 /* We have something that executes now. We'll be running through
2846 the shell at this point (if startup-with-shell is true), but the
2847 pid shouldn't change. */
7fb43e53
PA
2848 thread_info *thr = add_thread_silent (this, ptid_t (pid));
2849 switch_to_thread (thr);
2090129c 2850
5b6d1e4f 2851 procfs_init_inferior (pid);
27087a3d
JB
2852}
2853
e8032dde 2854/* Callback for update_thread_list. Calls "add_thread". */
c906108c 2855
c3f6f71d 2856static int
fba45db2 2857procfs_notice_thread (procinfo *pi, procinfo *thread, void *ptr)
c906108c 2858{
fd79271b 2859 ptid_t gdb_threadid = ptid_t (pi->pid, thread->tid, 0);
c906108c 2860
9213a6d7 2861 thread_info *thr = the_procfs_target.find_thread (gdb_threadid);
24bce9bb 2862 if (thr == NULL || thr->state == THREAD_EXITED)
5b6d1e4f 2863 add_thread (&the_procfs_target, gdb_threadid);
c906108c 2864
c3f6f71d
JM
2865 return 0;
2866}
2867
77382aee
PA
2868/* Query all the threads that the target knows about, and give them
2869 back to GDB to add to its list. */
c3f6f71d 2870
f6ac5f3d
PA
2871void
2872procfs_target::update_thread_list ()
c3f6f71d
JM
2873{
2874 procinfo *pi;
2875
e8032dde
PA
2876 prune_threads ();
2877
0df8b418 2878 /* Find procinfo for main process. */
e99b03dc 2879 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c3f6f71d
JM
2880 proc_update_threads (pi);
2881 proc_iterate_over_threads (pi, procfs_notice_thread, NULL);
c906108c
SS
2882}
2883
77382aee
PA
2884/* Return true if the thread is still 'alive'. This guy doesn't
2885 really seem to be doing his job. Got to investigate how to tell
2886 when a thread is really gone. */
c906108c 2887
57810aa7 2888bool
f6ac5f3d 2889procfs_target::thread_alive (ptid_t ptid)
c906108c 2890{
c3f6f71d
JM
2891 int proc, thread;
2892 procinfo *pi;
c906108c 2893
e99b03dc 2894 proc = ptid.pid ();
e38504b3 2895 thread = ptid.lwp ();
0df8b418 2896 /* If I don't know it, it ain't alive! */
c475f569
RO
2897 pi = find_procinfo (proc, thread);
2898 if (pi == NULL)
57810aa7 2899 return false;
c3f6f71d
JM
2900
2901 /* If I can't get its status, it ain't alive!
2902 What's more, I need to forget about it! */
2903 if (!proc_get_status (pi))
2904 {
2905 destroy_procinfo (pi);
57810aa7 2906 return false;
c3f6f71d 2907 }
77382aee
PA
2908 /* I couldn't have got its status if it weren't alive, so it's
2909 alive. */
57810aa7 2910 return true;
c906108c 2911}
c3f6f71d 2912
a068643d 2913/* Convert PTID to a string. */
c3f6f71d 2914
a068643d 2915std::string
f6ac5f3d 2916procfs_target::pid_to_str (ptid_t ptid)
c3f6f71d 2917{
e38504b3 2918 if (ptid.lwp () == 0)
a068643d 2919 return string_printf ("process %d", ptid.pid ());
c3f6f71d 2920 else
a068643d 2921 return string_printf ("LWP %ld", ptid.lwp ());
c3f6f71d
JM
2922}
2923
4206c05e
RO
2924/* Accepts an integer PID; Returns a string representing a file that
2925 can be opened to get the symbols for the child process. */
2926
0e90c441 2927const char *
4206c05e
RO
2928procfs_target::pid_to_exec_file (int pid)
2929{
2930 static char buf[PATH_MAX];
2931 char name[PATH_MAX];
2932
2933 /* Solaris 11 introduced /proc/<proc-id>/execname. */
c475f569 2934 xsnprintf (name, sizeof (name), "/proc/%d/execname", pid);
4206c05e
RO
2935 scoped_fd fd (gdb_open_cloexec (name, O_RDONLY, 0));
2936 if (fd.get () < 0 || read (fd.get (), buf, PATH_MAX - 1) < 0)
2937 {
2938 /* If that fails, fall back to /proc/<proc-id>/path/a.out introduced in
2939 Solaris 10. */
2940 ssize_t len;
2941
c475f569 2942 xsnprintf (name, sizeof (name), "/proc/%d/path/a.out", pid);
4206c05e
RO
2943 len = readlink (name, buf, PATH_MAX - 1);
2944 if (len <= 0)
2945 strcpy (buf, name);
2946 else
2947 buf[len] = '\0';
2948 }
2949
2950 return buf;
2951}
2952
77382aee 2953/* Insert a watchpoint. */
c3f6f71d 2954
a0911fd0 2955static int
39f77062 2956procfs_set_watchpoint (ptid_t ptid, CORE_ADDR addr, int len, int rwflag,
77382aee 2957 int after)
c906108c 2958{
c3f6f71d 2959 int pflags = 0;
19958708 2960 procinfo *pi;
c3f6f71d 2961
e99b03dc
TT
2962 pi = find_procinfo_or_die (ptid.pid () == -1 ?
2963 inferior_ptid.pid () : ptid.pid (),
dfd4cc63 2964 0);
c3f6f71d 2965
0df8b418
MS
2966 /* Translate from GDB's flags to /proc's. */
2967 if (len > 0) /* len == 0 means delete watchpoint. */
c906108c 2968 {
0df8b418 2969 switch (rwflag) { /* FIXME: need an enum! */
c3f6f71d 2970 case hw_write: /* default watchpoint (write) */
196535a6 2971 pflags = WA_WRITE;
c3f6f71d
JM
2972 break;
2973 case hw_read: /* read watchpoint */
196535a6 2974 pflags = WA_READ;
c3f6f71d
JM
2975 break;
2976 case hw_access: /* access watchpoint */
196535a6 2977 pflags = WA_READ | WA_WRITE;
c3f6f71d
JM
2978 break;
2979 case hw_execute: /* execution HW breakpoint */
196535a6 2980 pflags = WA_EXEC;
c3f6f71d 2981 break;
0df8b418 2982 default: /* Something weird. Return error. */
c906108c 2983 return -1;
c3f6f71d 2984 }
0df8b418 2985 if (after) /* Stop after r/w access is completed. */
196535a6 2986 pflags |= WA_TRAPAFTER;
c3f6f71d
JM
2987 }
2988
2989 if (!proc_set_watchpoint (pi, addr, len, pflags))
2990 {
0df8b418 2991 if (errno == E2BIG) /* Typical error for no resources. */
c3f6f71d
JM
2992 return -1; /* fail */
2993 /* GDB may try to remove the same watchpoint twice.
2994 If a remove request returns no match, don't error. */
c906108c 2995 if (errno == ESRCH && len == 0)
c3f6f71d
JM
2996 return 0; /* ignore */
2997 proc_error (pi, "set_watchpoint", __LINE__);
c906108c
SS
2998 }
2999 return 0;
3000}
3001
1e03ad20
KB
3002/* Return non-zero if we can set a hardware watchpoint of type TYPE. TYPE
3003 is one of bp_hardware_watchpoint, bp_read_watchpoint, bp_write_watchpoint,
3004 or bp_hardware_watchpoint. CNT is the number of watchpoints used so
196535a6 3005 far. */
1e03ad20 3006
f6ac5f3d
PA
3007int
3008procfs_target::can_use_hw_breakpoint (enum bptype type, int cnt, int othertype)
1e03ad20 3009{
1e03ad20
KB
3010 /* Due to the way that proc_set_watchpoint() is implemented, host
3011 and target pointers must be of the same size. If they are not,
3012 we can't use hardware watchpoints. This limitation is due to the
9a043c1d
AC
3013 fact that proc_set_watchpoint() calls
3014 procfs_address_to_host_pointer(); a close inspection of
3015 procfs_address_to_host_pointer will reveal that an internal error
3016 will be generated when the host and target pointer sizes are
3017 different. */
f5656ead 3018 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
f4a14ae6 3019
df86565b 3020 if (sizeof (void *) != ptr_type->length ())
1e03ad20
KB
3021 return 0;
3022
3023 /* Other tests here??? */
3024
3025 return 1;
1e03ad20
KB
3026}
3027
77382aee
PA
3028/* Returns non-zero if process is stopped on a hardware watchpoint
3029 fault, else returns zero. */
c3f6f71d 3030
57810aa7 3031bool
f6ac5f3d 3032procfs_target::stopped_by_watchpoint ()
c906108c 3033{
c3f6f71d 3034 procinfo *pi;
c906108c 3035
e99b03dc 3036 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
aaeb7efa 3037
c3f6f71d 3038 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
c475f569
RO
3039 if (proc_why (pi) == PR_FAULTED)
3040 if (proc_what (pi) == FLTWATCH)
3041 return true;
57810aa7 3042 return false;
c906108c 3043}
c906108c 3044
77382aee
PA
3045/* Returns 1 if the OS knows the position of the triggered watchpoint,
3046 and sets *ADDR to that address. Returns 0 if OS cannot report that
3047 address. This function is only called if
3048 procfs_stopped_by_watchpoint returned 1, thus no further checks are
3049 done. The function also assumes that ADDR is not NULL. */
bf701c2c 3050
57810aa7 3051bool
f6ac5f3d 3052procfs_target::stopped_data_address (CORE_ADDR *addr)
bf701c2c
PM
3053{
3054 procinfo *pi;
3055
e99b03dc 3056 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
bf701c2c
PM
3057 return proc_watchpoint_address (pi, addr);
3058}
3059
f6ac5f3d
PA
3060int
3061procfs_target::insert_watchpoint (CORE_ADDR addr, int len,
3062 enum target_hw_bp_type type,
3063 struct expression *cond)
25513619 3064{
9aed480c 3065 if (!target_have_steppable_watchpoint ()
f5656ead 3066 && !gdbarch_have_nonsteppable_watchpoint (target_gdbarch ()))
c475f569
RO
3067 /* When a hardware watchpoint fires off the PC will be left at
3068 the instruction following the one which caused the
3069 watchpoint. It will *NOT* be necessary for GDB to step over
3070 the watchpoint. */
3071 return procfs_set_watchpoint (inferior_ptid, addr, len, type, 1);
25513619 3072 else
c475f569
RO
3073 /* When a hardware watchpoint fires off the PC will be left at
3074 the instruction which caused the watchpoint. It will be
3075 necessary for GDB to step over the watchpoint. */
3076 return procfs_set_watchpoint (inferior_ptid, addr, len, type, 0);
25513619
PA
3077}
3078
f6ac5f3d
PA
3079int
3080procfs_target::remove_watchpoint (CORE_ADDR addr, int len,
3081 enum target_hw_bp_type type,
3082 struct expression *cond)
25513619
PA
3083{
3084 return procfs_set_watchpoint (inferior_ptid, addr, 0, 0, 0);
3085}
3086
f6ac5f3d
PA
3087int
3088procfs_target::region_ok_for_hw_watchpoint (CORE_ADDR addr, int len)
25513619
PA
3089{
3090 /* The man page for proc(4) on Solaris 2.6 and up says that the
3091 system can support "thousands" of hardware watchpoints, but gives
3092 no method for finding out how many; It doesn't say anything about
3093 the allowed size for the watched area either. So we just tell
3094 GDB 'yes'. */
3095 return 1;
3096}
3097
77382aee
PA
3098/* Memory Mappings Functions: */
3099
3100/* Call a callback function once for each mapping, passing it the
3101 mapping, an optional secondary callback function, and some optional
3102 opaque data. Quit and return the first non-zero value returned
3103 from the callback.
3104
3105 PI is the procinfo struct for the process to be mapped. FUNC is
3106 the callback function to be called by this iterator. DATA is the
3107 optional opaque data to be passed to the callback function.
3108 CHILD_FUNC is the optional secondary function pointer to be passed
3109 to the child function. Returns the first non-zero return value
3110 from the callback function, or zero. */
831e682e
MS
3111
3112static int
b8edc417 3113iterate_over_mappings (procinfo *pi, find_memory_region_ftype child_func,
e9ef4f39 3114 void *data,
19958708 3115 int (*func) (struct prmap *map,
b8edc417 3116 find_memory_region_ftype child_func,
831e682e
MS
3117 void *data))
3118{
3119 char pathname[MAX_PROC_NAME_SIZE];
3120 struct prmap *prmaps;
3121 struct prmap *prmap;
3122 int funcstat;
831e682e 3123 int nmap;
831e682e 3124 struct stat sbuf;
831e682e 3125
19958708 3126 /* Get the number of mappings, allocate space,
831e682e 3127 and read the mappings into prmaps. */
0df8b418 3128 /* Open map fd. */
c475f569 3129 xsnprintf (pathname, sizeof (pathname), "/proc/%d/map", pi->pid);
831e682e 3130
5dc1a704
TT
3131 scoped_fd map_fd (open (pathname, O_RDONLY));
3132 if (map_fd.get () < 0)
3133 proc_error (pi, "iterate_over_mappings (open)", __LINE__);
831e682e 3134
19958708 3135 /* Use stat to determine the file size, and compute
831e682e 3136 the number of prmap_t objects it contains. */
5dc1a704 3137 if (fstat (map_fd.get (), &sbuf) != 0)
831e682e
MS
3138 proc_error (pi, "iterate_over_mappings (fstat)", __LINE__);
3139
3140 nmap = sbuf.st_size / sizeof (prmap_t);
3141 prmaps = (struct prmap *) alloca ((nmap + 1) * sizeof (*prmaps));
5dc1a704 3142 if (read (map_fd.get (), (char *) prmaps, nmap * sizeof (*prmaps))
831e682e
MS
3143 != (nmap * sizeof (*prmaps)))
3144 proc_error (pi, "iterate_over_mappings (read)", __LINE__);
831e682e
MS
3145
3146 for (prmap = prmaps; nmap > 0; prmap++, nmap--)
c475f569
RO
3147 {
3148 funcstat = (*func) (prmap, child_func, data);
3149 if (funcstat != 0)
3150 return funcstat;
3151 }
831e682e
MS
3152
3153 return 0;
3154}
3155
77382aee 3156/* Implements the to_find_memory_regions method. Calls an external
b8edc417 3157 function for each memory region.
77382aee 3158 Returns the integer value returned by the callback. */
be4d1333
MS
3159
3160static int
19958708 3161find_memory_regions_callback (struct prmap *map,
b8edc417 3162 find_memory_region_ftype func, void *data)
be4d1333 3163{
bf75638e 3164 return (*func) ((CORE_ADDR) map->pr_vaddr,
19958708 3165 map->pr_size,
be4d1333
MS
3166 (map->pr_mflags & MA_READ) != 0,
3167 (map->pr_mflags & MA_WRITE) != 0,
19958708 3168 (map->pr_mflags & MA_EXEC) != 0,
4f69f4c2 3169 1, /* MODIFIED is unknown, pass it as true. */
f4ad82b3 3170 false,
be4d1333
MS
3171 data);
3172}
3173
77382aee
PA
3174/* External interface. Calls a callback function once for each
3175 mapped memory region in the child process, passing as arguments:
3176
3177 CORE_ADDR virtual_address,
3178 unsigned long size,
3179 int read, TRUE if region is readable by the child
3180 int write, TRUE if region is writable by the child
3181 int execute TRUE if region is executable by the child.
3182
3183 Stops iterating and returns the first non-zero value returned by
3184 the callback. */
be4d1333 3185
f6ac5f3d
PA
3186int
3187procfs_target::find_memory_regions (find_memory_region_ftype func, void *data)
be4d1333 3188{
e99b03dc 3189 procinfo *pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
be4d1333 3190
19958708 3191 return iterate_over_mappings (pi, func, data,
be4d1333
MS
3192 find_memory_regions_callback);
3193}
3194
77382aee 3195/* Returns an ascii representation of a memory mapping's flags. */
c3f6f71d 3196
388faa48 3197static char *
5ae5f592 3198mappingflags (long flags)
388faa48
MS
3199{
3200 static char asciiflags[8];
3201
3202 strcpy (asciiflags, "-------");
388faa48
MS
3203 if (flags & MA_STACK)
3204 asciiflags[1] = 's';
3205 if (flags & MA_BREAK)
3206 asciiflags[2] = 'b';
3207 if (flags & MA_SHARED)
3208 asciiflags[3] = 's';
3209 if (flags & MA_READ)
3210 asciiflags[4] = 'r';
3211 if (flags & MA_WRITE)
3212 asciiflags[5] = 'w';
3213 if (flags & MA_EXEC)
3214 asciiflags[6] = 'x';
3215 return (asciiflags);
3216}
3217
77382aee
PA
3218/* Callback function, does the actual work for 'info proc
3219 mappings'. */
831e682e 3220
831e682e 3221static int
b8edc417 3222info_mappings_callback (struct prmap *map, find_memory_region_ftype ignore,
e9ef4f39 3223 void *unused)
831e682e 3224{
0b62613e 3225 unsigned int pr_off;
831e682e 3226
0b62613e 3227 pr_off = (unsigned int) map->pr_offset;
0b62613e 3228
f5656ead 3229 if (gdbarch_addr_bit (target_gdbarch ()) == 32)
6cb06a8c
TT
3230 gdb_printf ("\t%#10lx %#10lx %#10lx %#10x %7s\n",
3231 (unsigned long) map->pr_vaddr,
3232 (unsigned long) map->pr_vaddr + map->pr_size - 1,
3233 (unsigned long) map->pr_size,
3234 pr_off,
3235 mappingflags (map->pr_mflags));
0b62613e 3236 else
6cb06a8c
TT
3237 gdb_printf (" %#18lx %#18lx %#10lx %#10x %7s\n",
3238 (unsigned long) map->pr_vaddr,
3239 (unsigned long) map->pr_vaddr + map->pr_size - 1,
3240 (unsigned long) map->pr_size,
3241 pr_off,
3242 mappingflags (map->pr_mflags));
831e682e
MS
3243
3244 return 0;
3245}
3246
77382aee 3247/* Implement the "info proc mappings" subcommand. */
388faa48
MS
3248
3249static void
3250info_proc_mappings (procinfo *pi, int summary)
3251{
388faa48 3252 if (summary)
0df8b418 3253 return; /* No output for summary mode. */
388faa48 3254
6cb06a8c 3255 gdb_printf (_("Mapped address spaces:\n\n"));
f5656ead 3256 if (gdbarch_ptr_bit (target_gdbarch ()) == 32)
6cb06a8c
TT
3257 gdb_printf ("\t%10s %10s %10s %10s %7s\n",
3258 "Start Addr",
3259 " End Addr",
3260 " Size",
3261 " Offset",
3262 "Flags");
0b62613e 3263 else
6cb06a8c
TT
3264 gdb_printf (" %18s %18s %10s %10s %7s\n",
3265 "Start Addr",
3266 " End Addr",
3267 " Size",
3268 " Offset",
3269 "Flags");
388faa48 3270
831e682e 3271 iterate_over_mappings (pi, NULL, NULL, info_mappings_callback);
6cb06a8c 3272 gdb_printf ("\n");
388faa48
MS
3273}
3274
77382aee 3275/* Implement the "info proc" command. */
c3f6f71d 3276
f6ac5f3d
PA
3277bool
3278procfs_target::info_proc (const char *args, enum info_proc_what what)
c906108c 3279{
388faa48
MS
3280 procinfo *process = NULL;
3281 procinfo *thread = NULL;
388faa48
MS
3282 char *tmp = NULL;
3283 int pid = 0;
3284 int tid = 0;
3285 int mappings = 0;
c906108c 3286
145b16a9
UW
3287 switch (what)
3288 {
3289 case IP_MINIMAL:
3290 break;
3291
3292 case IP_MAPPINGS:
3293 case IP_ALL:
3294 mappings = 1;
3295 break;
3296
3297 default:
3298 error (_("Not supported on this target."));
3299 }
3300
773a1edc 3301 gdb_argv built_argv (args);
4fa7574e 3302 for (char *arg : built_argv)
c3f6f71d 3303 {
773a1edc 3304 if (isdigit (arg[0]))
c3f6f71d 3305 {
773a1edc 3306 pid = strtoul (arg, &tmp, 10);
c3f6f71d
JM
3307 if (*tmp == '/')
3308 tid = strtoul (++tmp, NULL, 10);
3309 }
773a1edc 3310 else if (arg[0] == '/')
c3f6f71d 3311 {
773a1edc 3312 tid = strtoul (arg + 1, NULL, 10);
c3f6f71d 3313 }
c3f6f71d 3314 }
5b4cbbe3
TT
3315
3316 procinfo_up temporary_procinfo;
c3f6f71d 3317 if (pid == 0)
e99b03dc 3318 pid = inferior_ptid.pid ();
c3f6f71d 3319 if (pid == 0)
8a3fe4f8 3320 error (_("No current process: you must name one."));
c3f6f71d 3321 else
c906108c 3322 {
c3f6f71d 3323 /* Have pid, will travel.
0df8b418 3324 First see if it's a process we're already debugging. */
c3f6f71d
JM
3325 process = find_procinfo (pid, 0);
3326 if (process == NULL)
3327 {
19958708 3328 /* No. So open a procinfo for it, but
c3f6f71d
JM
3329 remember to close it again when finished. */
3330 process = create_procinfo (pid, 0);
5b4cbbe3 3331 temporary_procinfo.reset (process);
c3f6f71d
JM
3332 if (!open_procinfo_files (process, FD_CTL))
3333 proc_error (process, "info proc, open_procinfo_files", __LINE__);
3334 }
c906108c 3335 }
c3f6f71d
JM
3336 if (tid != 0)
3337 thread = create_procinfo (pid, tid);
3338
3339 if (process)
3340 {
6cb06a8c 3341 gdb_printf (_("process %d flags:\n"), process->pid);
c3f6f71d
JM
3342 proc_prettyprint_flags (proc_flags (process), 1);
3343 if (proc_flags (process) & (PR_STOPPED | PR_ISTOP))
3344 proc_prettyprint_why (proc_why (process), proc_what (process), 1);
3345 if (proc_get_nthreads (process) > 1)
6cb06a8c
TT
3346 gdb_printf ("Process has %d threads.\n",
3347 proc_get_nthreads (process));
c3f6f71d
JM
3348 }
3349 if (thread)
3350 {
6cb06a8c 3351 gdb_printf (_("thread %d flags:\n"), thread->tid);
c3f6f71d
JM
3352 proc_prettyprint_flags (proc_flags (thread), 1);
3353 if (proc_flags (thread) & (PR_STOPPED | PR_ISTOP))
3354 proc_prettyprint_why (proc_why (thread), proc_what (thread), 1);
3355 }
3356
388faa48 3357 if (mappings)
c475f569 3358 info_proc_mappings (process, 0);
388faa48 3359
f6ac5f3d 3360 return true;
c906108c
SS
3361}
3362
9185ddce
JB
3363/* Modify the status of the system call identified by SYSCALLNUM in
3364 the set of syscalls that are currently traced/debugged.
3365
3366 If ENTRY_OR_EXIT is set to PR_SYSENTRY, then the entry syscalls set
0df8b418 3367 will be updated. Otherwise, the exit syscalls set will be updated.
9185ddce 3368
0df8b418 3369 If MODE is FLAG_SET, then traces will be enabled. Otherwise, they
9185ddce
JB
3370 will be disabled. */
3371
3372static void
3373proc_trace_syscalls_1 (procinfo *pi, int syscallnum, int entry_or_exit,
77382aee 3374 int mode, int from_tty)
9185ddce
JB
3375{
3376 sysset_t *sysset;
77382aee 3377
9185ddce
JB
3378 if (entry_or_exit == PR_SYSENTRY)
3379 sysset = proc_get_traced_sysentry (pi, NULL);
3380 else
3381 sysset = proc_get_traced_sysexit (pi, NULL);
3382
3383 if (sysset == NULL)
3384 proc_error (pi, "proc-trace, get_traced_sysset", __LINE__);
3385
3386 if (mode == FLAG_SET)
44122162 3387 praddset (sysset, syscallnum);
9185ddce 3388 else
44122162 3389 prdelset (sysset, syscallnum);
9185ddce
JB
3390
3391 if (entry_or_exit == PR_SYSENTRY)
3392 {
3393 if (!proc_set_traced_sysentry (pi, sysset))
77382aee 3394 proc_error (pi, "proc-trace, set_traced_sysentry", __LINE__);
9185ddce
JB
3395 }
3396 else
3397 {
3398 if (!proc_set_traced_sysexit (pi, sysset))
77382aee 3399 proc_error (pi, "proc-trace, set_traced_sysexit", __LINE__);
9185ddce
JB
3400 }
3401}
3402
c3f6f71d 3403static void
0b39b52e 3404proc_trace_syscalls (const char *args, int from_tty, int entry_or_exit, int mode)
c906108c 3405{
c3f6f71d 3406 procinfo *pi;
c906108c 3407
e99b03dc 3408 if (inferior_ptid.pid () <= 0)
8a3fe4f8 3409 error (_("you must be debugging a process to use this command."));
c906108c 3410
c3f6f71d 3411 if (args == NULL || args[0] == 0)
e2e0b3e5 3412 error_no_arg (_("system call to trace"));
c3f6f71d 3413
e99b03dc 3414 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c3f6f71d
JM
3415 if (isdigit (args[0]))
3416 {
9185ddce 3417 const int syscallnum = atoi (args);
c906108c 3418
9185ddce 3419 proc_trace_syscalls_1 (pi, syscallnum, entry_or_exit, mode, from_tty);
c3f6f71d
JM
3420 }
3421}
3422
19958708 3423static void
0b39b52e 3424proc_trace_sysentry_cmd (const char *args, int from_tty)
c906108c 3425{
c3f6f71d
JM
3426 proc_trace_syscalls (args, from_tty, PR_SYSENTRY, FLAG_SET);
3427}
c906108c 3428
19958708 3429static void
0b39b52e 3430proc_trace_sysexit_cmd (const char *args, int from_tty)
c3f6f71d
JM
3431{
3432 proc_trace_syscalls (args, from_tty, PR_SYSEXIT, FLAG_SET);
c906108c 3433}
c906108c 3434
19958708 3435static void
0b39b52e 3436proc_untrace_sysentry_cmd (const char *args, int from_tty)
c3f6f71d
JM
3437{
3438 proc_trace_syscalls (args, from_tty, PR_SYSENTRY, FLAG_RESET);
3439}
3440
19958708 3441static void
0b39b52e 3442proc_untrace_sysexit_cmd (const char *args, int from_tty)
c906108c 3443{
c3f6f71d
JM
3444 proc_trace_syscalls (args, from_tty, PR_SYSEXIT, FLAG_RESET);
3445}
c906108c 3446
6c265988 3447void _initialize_procfs ();
c906108c 3448void
6c265988 3449_initialize_procfs ()
c906108c 3450{
19958708 3451 add_com ("proc-trace-entry", no_class, proc_trace_sysentry_cmd,
1bedd215 3452 _("Give a trace of entries into the syscall."));
19958708 3453 add_com ("proc-trace-exit", no_class, proc_trace_sysexit_cmd,
1bedd215 3454 _("Give a trace of exits from the syscall."));
19958708 3455 add_com ("proc-untrace-entry", no_class, proc_untrace_sysentry_cmd,
1bedd215 3456 _("Cancel a trace of entries into the syscall."));
19958708 3457 add_com ("proc-untrace-exit", no_class, proc_untrace_sysexit_cmd,
1bedd215 3458 _("Cancel a trace of exits from the syscall."));
c1955e17 3459
62c808ae 3460 add_inf_child_target (&the_procfs_target);
c3f6f71d
JM
3461}
3462
3463/* =================== END, GDB "MODULE" =================== */
3464
3465
3466
77382aee
PA
3467/* miscellaneous stubs: */
3468
3469/* The following satisfy a few random symbols mostly created by the
3470 solaris threads implementation, which I will chase down later. */
c3f6f71d 3471
77382aee
PA
3472/* Return a pid for which we guarantee we will be able to find a
3473 'live' procinfo. */
c3f6f71d 3474
39f77062 3475ptid_t
fba45db2 3476procfs_first_available (void)
c3f6f71d 3477{
f2907e49 3478 return ptid_t (procinfo_list ? procinfo_list->pid : -1);
c3f6f71d 3479}
be4d1333
MS
3480
3481/* =================== GCORE .NOTE "MODULE" =================== */
3482
24f5300a 3483static void
19958708 3484procfs_do_thread_registers (bfd *obfd, ptid_t ptid,
24f5300a
SM
3485 gdb::unique_xmalloc_ptr<char> &note_data,
3486 int *note_size, enum gdb_signal stop_signal)
be4d1333 3487{
5b6d1e4f 3488 struct regcache *regcache = get_thread_regcache (&the_procfs_target, ptid);
be4d1333
MS
3489 gdb_gregset_t gregs;
3490 gdb_fpregset_t fpregs;
3491 unsigned long merged_pid;
3492
e38504b3 3493 merged_pid = ptid.lwp () << 16 | ptid.pid ();
be4d1333 3494
75125405
DJ
3495 /* This part is the old method for fetching registers.
3496 It should be replaced by the newer one using regsets
3497 once it is implemented in this platform:
29082443 3498 gdbarch_iterate_over_regset_sections(). */
75125405 3499
75125405
DJ
3500 target_fetch_registers (regcache, -1);
3501
594f7785 3502 fill_gregset (regcache, &gregs, -1);
24f5300a
SM
3503 note_data.reset (elfcore_write_lwpstatus (obfd,
3504 note_data.release (),
3505 note_size,
3506 merged_pid,
3507 stop_signal,
3508 &gregs));
594f7785 3509 fill_fpregset (regcache, &fpregs, -1);
24f5300a
SM
3510 note_data.reset (elfcore_write_prfpreg (obfd,
3511 note_data.release (),
3512 note_size,
3513 &fpregs,
3514 sizeof (fpregs)));
be4d1333
MS
3515}
3516
24f5300a
SM
3517struct procfs_corefile_thread_data
3518{
3519 procfs_corefile_thread_data (bfd *obfd,
3520 gdb::unique_xmalloc_ptr<char> &note_data,
3521 int *note_size, gdb_signal stop_signal)
3522 : obfd (obfd), note_data (note_data), note_size (note_size),
3523 stop_signal (stop_signal)
3524 {}
3525
be4d1333 3526 bfd *obfd;
24f5300a 3527 gdb::unique_xmalloc_ptr<char> &note_data;
be4d1333 3528 int *note_size;
2ea28649 3529 enum gdb_signal stop_signal;
be4d1333
MS
3530};
3531
3532static int
65554fef 3533procfs_corefile_thread_callback (procinfo *pi, procinfo *thread, void *data)
be4d1333 3534{
b196bc4c
RO
3535 struct procfs_corefile_thread_data *args
3536 = (struct procfs_corefile_thread_data *) data;
be4d1333 3537
2689673f 3538 if (pi != NULL)
be4d1333 3539 {
fd79271b 3540 ptid_t ptid = ptid_t (pi->pid, thread->tid, 0);
f4a14ae6 3541
24f5300a
SM
3542 procfs_do_thread_registers (args->obfd, ptid,
3543 args->note_data,
3544 args->note_size,
3545 args->stop_signal);
be4d1333
MS
3546 }
3547 return 0;
3548}
3549
a223f1e7
JB
3550static int
3551find_signalled_thread (struct thread_info *info, void *data)
3552{
e22be212 3553 if (info->stop_signal () != GDB_SIGNAL_0
e99b03dc 3554 && info->ptid.pid () == inferior_ptid.pid ())
a223f1e7
JB
3555 return 1;
3556
3557 return 0;
3558}
3559
2ea28649 3560static enum gdb_signal
a223f1e7
JB
3561find_stop_signal (void)
3562{
3563 struct thread_info *info =
3564 iterate_over_threads (find_signalled_thread, NULL);
3565
3566 if (info)
e22be212 3567 return info->stop_signal ();
a223f1e7 3568 else
a493e3e2 3569 return GDB_SIGNAL_0;
a223f1e7
JB
3570}
3571
24f5300a 3572gdb::unique_xmalloc_ptr<char>
f6ac5f3d 3573procfs_target::make_corefile_notes (bfd *obfd, int *note_size)
be4d1333 3574{
be4d1333 3575 gdb_gregset_t gregs;
be4d1333
MS
3576 char fname[16] = {'\0'};
3577 char psargs[80] = {'\0'};
e99b03dc 3578 procinfo *pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
24f5300a 3579 gdb::unique_xmalloc_ptr<char> note_data;
2ea28649 3580 enum gdb_signal stop_signal;
be4d1333
MS
3581
3582 if (get_exec_file (0))
3583 {
9f37bbcc 3584 strncpy (fname, lbasename (get_exec_file (0)), sizeof (fname));
4e2af517
JM
3585 fname[sizeof (fname) - 1] = 0;
3586 strncpy (psargs, get_exec_file (0), sizeof (psargs));
3587 psargs[sizeof (psargs) - 1] = 0;
6dbdc4a3 3588
fd2dec2a
SM
3589 const std::string &inf_args = current_inferior ()->args ();
3590 if (!inf_args.empty () &&
3591 inf_args.length () < ((int) sizeof (psargs) - (int) strlen (psargs)))
be4d1333 3592 {
19958708 3593 strncat (psargs, " ",
be4d1333 3594 sizeof (psargs) - strlen (psargs));
fd2dec2a 3595 strncat (psargs, inf_args.c_str (),
be4d1333
MS
3596 sizeof (psargs) - strlen (psargs));
3597 }
3598 }
3599
24f5300a
SM
3600 note_data.reset (elfcore_write_prpsinfo (obfd,
3601 note_data.release (),
3602 note_size,
3603 fname,
3604 psargs));
be4d1333 3605
651c8d2d
PA
3606 stop_signal = find_stop_signal ();
3607
3e3420f6 3608 fill_gregset (get_current_regcache (), &gregs, -1);
24f5300a
SM
3609 note_data.reset (elfcore_write_pstatus (obfd, note_data.release (), note_size,
3610 inferior_ptid.pid (),
3611 stop_signal, &gregs));
3612
3613 procfs_corefile_thread_data thread_args (obfd, note_data, note_size,
3614 stop_signal);
3e43a32a
MS
3615 proc_iterate_over_threads (pi, procfs_corefile_thread_callback,
3616 &thread_args);
be4d1333 3617
62c808ae 3618 gdb::optional<gdb::byte_vector> auxv =
328d42d8
SM
3619 target_read_alloc (current_inferior ()->top_target (),
3620 TARGET_OBJECT_AUXV, NULL);
62c808ae 3621 if (auxv && !auxv->empty ())
24f5300a
SM
3622 note_data.reset (elfcore_write_note (obfd, note_data.release (), note_size,
3623 "CORE", NT_AUXV, auxv->data (),
3624 auxv->size ()));
4e73f23d 3625
be4d1333
MS
3626 return note_data;
3627}
be4d1333 3628/* =================== END GCORE .NOTE "MODULE" =================== */