]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/procfs.c
x86: move some opcode table entries
[thirdparty/binutils-gdb.git] / gdb / procfs.c
CommitLineData
44122162 1/* Machine independent support for Solaris /proc (process file system) for GDB.
2555fe1a 2
3666a048 3 Copyright (C) 1999-2021 Free Software Foundation, Inc.
2555fe1a 4
c3f6f71d
JM
5 Written by Michael Snyder at Cygnus Solutions.
6 Based on work by Fred Fish, Stu Grossman, Geoff Noer, and others.
c906108c 7
a9762ec7
JB
8 This file is part of GDB.
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
14
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
21 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c 22
c3f6f71d
JM
23#include "defs.h"
24#include "inferior.h"
45741a9c 25#include "infrun.h"
c3f6f71d
JM
26#include "target.h"
27#include "gdbcore.h"
65554fef 28#include "elf-bfd.h" /* for elfcore_write_* */
c3f6f71d 29#include "gdbcmd.h"
0fda6bd2 30#include "gdbthread.h"
7f7fe91e 31#include "regcache.h"
28439f5e 32#include "inf-child.h"
4fa7574e 33#include "nat/fork-inferior.h"
0d12e84c 34#include "gdbarch.h"
c906108c 35
c3f6f71d
JM
36#include <sys/procfs.h>
37#include <sys/fault.h>
38#include <sys/syscall.h>
268a13a5 39#include "gdbsupport/gdb_wait.h"
0fda6bd2
JM
40#include <signal.h>
41#include <ctype.h>
92107356 42#include "gdb_bfd.h"
44270758 43#include "inflow.h"
4e73f23d 44#include "auxv.h"
d1a7880c 45#include "procfs.h"
76727919 46#include "observable.h"
268a13a5
TT
47#include "gdbsupport/scoped_fd.h"
48#include "gdbsupport/pathstuff.h"
0fda6bd2 49
77382aee
PA
50/* This module provides the interface between GDB and the
51 /proc file system, which is used on many versions of Unix
52 as a means for debuggers to control other processes.
53
77382aee
PA
54 /proc works by imitating a file system: you open a simulated file
55 that represents the process you wish to interact with, and perform
56 operations on that "file" in order to examine or change the state
57 of the other process.
58
59 The most important thing to know about /proc and this module is
60 that there are two very different interfaces to /proc:
61
62 One that uses the ioctl system call, and another that uses read
63 and write system calls.
64
44122162
RO
65 This module supports only the Solaris version of the read/write
66 interface. */
77382aee 67
c906108c 68#include <sys/types.h>
2978b111 69#include <dirent.h> /* opendir/readdir, for listing the LWP's */
c906108c 70
c3f6f71d
JM
71#include <fcntl.h> /* for O_RDONLY */
72#include <unistd.h> /* for "X_OK" */
53ce3c39 73#include <sys/stat.h> /* for struct stat */
c906108c 74
103b3ef5
MS
75/* Note: procfs-utils.h must be included after the above system header
76 files, because it redefines various system calls using macros.
77 This may be incompatible with the prototype declarations. */
78
103b3ef5
MS
79#include "proc-utils.h"
80
77382aee 81/* Prototypes for supply_gregset etc. */
c60c0f5f
MS
82#include "gregset.h"
83
c3f6f71d 84/* =================== TARGET_OPS "MODULE" =================== */
c906108c 85
77382aee 86/* This module defines the GDB target vector and its methods. */
c906108c 87
f6ac5f3d 88
e96027e0
PA
89static enum target_xfer_status procfs_xfer_memory (gdb_byte *,
90 const gdb_byte *,
91 ULONGEST, ULONGEST,
92 ULONGEST *);
a14ed312 93
f6ac5f3d
PA
94class procfs_target final : public inf_child_target
95{
96public:
97 void create_inferior (const char *, const std::string &,
98 char **, int) override;
99
100 void kill () override;
101
102 void mourn_inferior () override;
103
104 void attach (const char *, int) override;
105 void detach (inferior *inf, int) override;
106
107 void resume (ptid_t, int, enum gdb_signal) override;
b60cea74 108 ptid_t wait (ptid_t, struct target_waitstatus *, target_wait_flags) override;
f6ac5f3d
PA
109
110 void fetch_registers (struct regcache *, int) override;
111 void store_registers (struct regcache *, int) override;
112
113 enum target_xfer_status xfer_partial (enum target_object object,
114 const char *annex,
115 gdb_byte *readbuf,
116 const gdb_byte *writebuf,
117 ULONGEST offset, ULONGEST len,
118 ULONGEST *xfered_len) override;
119
adc6a863 120 void pass_signals (gdb::array_view<const unsigned char>) override;
a14ed312 121
f6ac5f3d 122 void files_info () override;
c3f6f71d 123
f6ac5f3d 124 void update_thread_list () override;
be4d1333 125
57810aa7 126 bool thread_alive (ptid_t ptid) override;
be4d1333 127
a068643d 128 std::string pid_to_str (ptid_t) override;
1e03ad20 129
4206c05e
RO
130 char *pid_to_exec_file (int pid) override;
131
f6ac5f3d
PA
132 thread_control_capabilities get_thread_control_capabilities () override
133 { return tc_schedlock; }
145b16a9 134
f6ac5f3d
PA
135 /* find_memory_regions support method for gcore */
136 int find_memory_regions (find_memory_region_ftype func, void *data)
137 override;
b5c8fcb1 138
24f5300a 139 gdb::unique_xmalloc_ptr<char> make_corefile_notes (bfd *, int *) override;
b5c8fcb1 140
f6ac5f3d
PA
141 bool info_proc (const char *, enum info_proc_what) override;
142
c475f569 143#if PR_MODEL_NATIVE == PR_MODEL_LP64
f6ac5f3d
PA
144 int auxv_parse (gdb_byte **readptr,
145 gdb_byte *endptr, CORE_ADDR *typep, CORE_ADDR *valp)
146 override;
147#endif
148
57810aa7 149 bool stopped_by_watchpoint () override;
f6ac5f3d
PA
150
151 int insert_watchpoint (CORE_ADDR, int, enum target_hw_bp_type,
152 struct expression *) override;
153
154 int remove_watchpoint (CORE_ADDR, int, enum target_hw_bp_type,
155 struct expression *) override;
156
157 int region_ok_for_hw_watchpoint (CORE_ADDR, int) override;
158
159 int can_use_hw_breakpoint (enum bptype, int, int) override;
57810aa7 160 bool stopped_data_address (CORE_ADDR *) override;
5b6d1e4f
PA
161
162 void procfs_init_inferior (int pid);
f6ac5f3d 163};
b5c8fcb1 164
f6ac5f3d 165static procfs_target the_procfs_target;
b5c8fcb1 166
c475f569 167#if PR_MODEL_NATIVE == PR_MODEL_LP64
77382aee
PA
168/* When GDB is built as 64-bit application on Solaris, the auxv data
169 is presented in 64-bit format. We need to provide a custom parser
170 to handle that. */
f6ac5f3d
PA
171int
172procfs_target::auxv_parse (gdb_byte **readptr,
173 gdb_byte *endptr, CORE_ADDR *typep, CORE_ADDR *valp)
c47ffbe3 174{
f5656ead 175 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
c47ffbe3
VP
176 gdb_byte *ptr = *readptr;
177
178 if (endptr == ptr)
179 return 0;
77382aee 180
c47ffbe3
VP
181 if (endptr - ptr < 8 * 2)
182 return -1;
183
e17a4113 184 *typep = extract_unsigned_integer (ptr, 4, byte_order);
c47ffbe3
VP
185 ptr += 8;
186 /* The size of data is always 64-bit. If the application is 32-bit,
187 it will be zero extended, as expected. */
e17a4113 188 *valp = extract_unsigned_integer (ptr, 8, byte_order);
c47ffbe3
VP
189 ptr += 8;
190
191 *readptr = ptr;
192 return 1;
193}
194#endif
195
c3f6f71d
JM
196/* =================== END, TARGET_OPS "MODULE" =================== */
197
c3f6f71d
JM
198/* =================== STRUCT PROCINFO "MODULE" =================== */
199
200 /* FIXME: this comment will soon be out of date W.R.T. threads. */
201
202/* The procinfo struct is a wrapper to hold all the state information
203 concerning a /proc process. There should be exactly one procinfo
204 for each process, and since GDB currently can debug only one
205 process at a time, that means there should be only one procinfo.
206 All of the LWP's of a process can be accessed indirectly thru the
207 single process procinfo.
208
209 However, against the day when GDB may debug more than one process,
210 this data structure is kept in a list (which for now will hold no
211 more than one member), and many functions will have a pointer to a
212 procinfo as an argument.
213
214 There will be a separate procinfo structure for use by the (not yet
215 implemented) "info proc" command, so that we can print useful
216 information about any random process without interfering with the
0df8b418 217 inferior's procinfo information. */
c3f6f71d 218
c3f6f71d 219/* format strings for /proc paths */
44122162
RO
220#define CTL_PROC_NAME_FMT "/proc/%d/ctl"
221#define AS_PROC_NAME_FMT "/proc/%d/as"
222#define MAP_PROC_NAME_FMT "/proc/%d/map"
223#define STATUS_PROC_NAME_FMT "/proc/%d/status"
13db92d3 224#define MAX_PROC_NAME_SIZE sizeof("/proc/999999/lwp/0123456789/lwpstatus")
c906108c 225
c3f6f71d
JM
226typedef struct procinfo {
227 struct procinfo *next;
228 int pid; /* Process ID */
229 int tid; /* Thread/LWP id */
c906108c 230
c3f6f71d
JM
231 /* process state */
232 int was_stopped;
233 int ignore_next_sigstop;
c906108c 234
c3f6f71d 235 int ctl_fd; /* File descriptor for /proc control file */
c3f6f71d
JM
236 int status_fd; /* File descriptor for /proc status file */
237 int as_fd; /* File descriptor for /proc as file */
c906108c 238
c3f6f71d 239 char pathname[MAX_PROC_NAME_SIZE]; /* Pathname to /proc entry */
c906108c 240
c3f6f71d 241 fltset_t saved_fltset; /* Saved traced hardware fault set */
44122162
RO
242 sigset_t saved_sigset; /* Saved traced signal set */
243 sigset_t saved_sighold; /* Saved held signal set */
37de36c6
KB
244 sysset_t *saved_exitset; /* Saved traced system call exit set */
245 sysset_t *saved_entryset; /* Saved traced system call entry set */
c906108c 246
44122162 247 pstatus_t prstatus; /* Current process status info */
19958708 248
c3f6f71d 249 struct procinfo *thread_list;
c906108c 250
c3f6f71d
JM
251 int status_valid : 1;
252 int gregs_valid : 1;
253 int fpregs_valid : 1;
254 int threads_valid: 1;
255} procinfo;
c906108c 256
c3f6f71d 257static char errmsg[128]; /* shared error msg buffer */
c906108c 258
c3f6f71d 259/* Function prototypes for procinfo module: */
c906108c 260
a14ed312
KB
261static procinfo *find_procinfo_or_die (int pid, int tid);
262static procinfo *find_procinfo (int pid, int tid);
263static procinfo *create_procinfo (int pid, int tid);
44122162 264static void destroy_procinfo (procinfo *p);
44122162
RO
265static void dead_procinfo (procinfo *p, const char *msg, int killp);
266static int open_procinfo_files (procinfo *p, int which);
267static void close_procinfo_files (procinfo *p);
c906108c 268
e9ef4f39 269static int iterate_over_mappings
b8edc417
JK
270 (procinfo *pi, find_memory_region_ftype child_func, void *data,
271 int (*func) (struct prmap *map, find_memory_region_ftype child_func,
77382aee 272 void *data));
e9ef4f39 273
c3f6f71d 274/* The head of the procinfo list: */
44122162 275static procinfo *procinfo_list;
c906108c 276
77382aee
PA
277/* Search the procinfo list. Return a pointer to procinfo, or NULL if
278 not found. */
c906108c 279
19958708 280static procinfo *
fba45db2 281find_procinfo (int pid, int tid)
c5aa993b 282{
c3f6f71d 283 procinfo *pi;
c906108c 284
c3f6f71d
JM
285 for (pi = procinfo_list; pi; pi = pi->next)
286 if (pi->pid == pid)
287 break;
c906108c 288
c3f6f71d
JM
289 if (pi)
290 if (tid)
291 {
292 /* Don't check threads_valid. If we're updating the
293 thread_list, we want to find whatever threads are already
294 here. This means that in general it is the caller's
295 responsibility to check threads_valid and update before
296 calling find_procinfo, if the caller wants to find a new
77382aee 297 thread. */
c3f6f71d
JM
298
299 for (pi = pi->thread_list; pi; pi = pi->next)
300 if (pi->tid == tid)
301 break;
302 }
c906108c 303
c3f6f71d
JM
304 return pi;
305}
c906108c 306
77382aee 307/* Calls find_procinfo, but errors on failure. */
c906108c 308
c3f6f71d 309static procinfo *
fba45db2 310find_procinfo_or_die (int pid, int tid)
c3f6f71d
JM
311{
312 procinfo *pi = find_procinfo (pid, tid);
c906108c 313
c3f6f71d 314 if (pi == NULL)
0fda6bd2
JM
315 {
316 if (tid)
3e43a32a
MS
317 error (_("procfs: couldn't find pid %d "
318 "(kernel thread %d) in procinfo list."),
0fda6bd2
JM
319 pid, tid);
320 else
8a3fe4f8 321 error (_("procfs: couldn't find pid %d in procinfo list."), pid);
0fda6bd2 322 }
c3f6f71d
JM
323 return pi;
324}
c906108c 325
77382aee
PA
326/* Wrapper for `open'. The appropriate open call is attempted; if
327 unsuccessful, it will be retried as many times as needed for the
328 EAGAIN and EINTR conditions.
19958708 329
77382aee
PA
330 For other conditions, retry the open a limited number of times. In
331 addition, a short sleep is imposed prior to retrying the open. The
332 reason for this sleep is to give the kernel a chance to catch up
333 and create the file in question in the event that GDB "wins" the
334 race to open a file before the kernel has created it. */
19958708 335
4d1bcd09
KB
336static int
337open_with_retry (const char *pathname, int flags)
338{
339 int retries_remaining, status;
340
341 retries_remaining = 2;
342
343 while (1)
344 {
345 status = open (pathname, flags);
346
347 if (status >= 0 || retries_remaining == 0)
348 break;
349 else if (errno != EINTR && errno != EAGAIN)
350 {
351 retries_remaining--;
352 sleep (1);
353 }
354 }
355
356 return status;
357}
358
44122162
RO
359/* Open the file descriptor for the process or LWP. We only open the
360 control file descriptor; the others are opened lazily as needed.
77382aee 361 Returns the file descriptor, or zero for failure. */
c906108c 362
c3f6f71d 363enum { FD_CTL, FD_STATUS, FD_AS };
c906108c 364
c3f6f71d 365static int
fba45db2 366open_procinfo_files (procinfo *pi, int which)
c3f6f71d
JM
367{
368 char tmp[MAX_PROC_NAME_SIZE];
369 int fd;
370
77382aee
PA
371 /* This function is getting ALMOST long enough to break up into
372 several. Here is some rationale:
373
77382aee 374 There are several file descriptors that may need to be open
196535a6 375 for any given process or LWP. The ones we're interested in are:
77382aee
PA
376 - control (ctl) write-only change the state
377 - status (status) read-only query the state
378 - address space (as) read/write access memory
379 - map (map) read-only virtual addr map
196535a6
RO
380 Most of these are opened lazily as they are needed.
381 The pathnames for the 'files' for an LWP look slightly
382 different from those of a first-class process:
77382aee
PA
383 Pathnames for a process (<proc-id>):
384 /proc/<proc-id>/ctl
385 /proc/<proc-id>/status
386 /proc/<proc-id>/as
387 /proc/<proc-id>/map
388 Pathnames for an LWP (lwp-id):
389 /proc/<proc-id>/lwp/<lwp-id>/lwpctl
390 /proc/<proc-id>/lwp/<lwp-id>/lwpstatus
196535a6
RO
391 An LWP has no map or address space file descriptor, since
392 the memory map and address space are shared by all LWPs. */
44122162 393
77382aee
PA
394 /* In this case, there are several different file descriptors that
395 we might be asked to open. The control file descriptor will be
396 opened early, but the others will be opened lazily as they are
397 needed. */
c3f6f71d
JM
398
399 strcpy (tmp, pi->pathname);
0df8b418 400 switch (which) { /* Which file descriptor to open? */
c3f6f71d
JM
401 case FD_CTL:
402 if (pi->tid)
403 strcat (tmp, "/lwpctl");
404 else
405 strcat (tmp, "/ctl");
4d1bcd09 406 fd = open_with_retry (tmp, O_WRONLY);
e28cade7 407 if (fd < 0)
c3f6f71d
JM
408 return 0; /* fail */
409 pi->ctl_fd = fd;
410 break;
411 case FD_AS:
412 if (pi->tid)
0df8b418 413 return 0; /* There is no 'as' file descriptor for an lwp. */
c3f6f71d 414 strcat (tmp, "/as");
4d1bcd09 415 fd = open_with_retry (tmp, O_RDWR);
e28cade7 416 if (fd < 0)
c3f6f71d
JM
417 return 0; /* fail */
418 pi->as_fd = fd;
419 break;
420 case FD_STATUS:
421 if (pi->tid)
422 strcat (tmp, "/lwpstatus");
423 else
424 strcat (tmp, "/status");
4d1bcd09 425 fd = open_with_retry (tmp, O_RDONLY);
e28cade7 426 if (fd < 0)
c3f6f71d
JM
427 return 0; /* fail */
428 pi->status_fd = fd;
429 break;
430 default:
431 return 0; /* unknown file descriptor */
432 }
c906108c 433
c3f6f71d
JM
434 return 1; /* success */
435}
c906108c 436
77382aee
PA
437/* Allocate a data structure and link it into the procinfo list.
438 First tries to find a pre-existing one (FIXME: why?). Returns the
439 pointer to new procinfo struct. */
c906108c 440
c3f6f71d 441static procinfo *
fba45db2 442create_procinfo (int pid, int tid)
c3f6f71d 443{
0b62613e 444 procinfo *pi, *parent = NULL;
c906108c 445
c475f569
RO
446 pi = find_procinfo (pid, tid);
447 if (pi != NULL)
0df8b418 448 return pi; /* Already exists, nothing to do. */
c906108c 449
0df8b418 450 /* Find parent before doing malloc, to save having to cleanup. */
c3f6f71d
JM
451 if (tid != 0)
452 parent = find_procinfo_or_die (pid, 0); /* FIXME: should I
453 create it if it
0df8b418 454 doesn't exist yet? */
c906108c 455
8d749320 456 pi = XNEW (procinfo);
c3f6f71d
JM
457 memset (pi, 0, sizeof (procinfo));
458 pi->pid = pid;
459 pi->tid = tid;
c906108c 460
c475f569
RO
461 pi->saved_entryset = XNEW (sysset_t);
462 pi->saved_exitset = XNEW (sysset_t);
1d5e0602 463
c3f6f71d
JM
464 /* Chain into list. */
465 if (tid == 0)
466 {
196535a6 467 xsnprintf (pi->pathname, sizeof (pi->pathname), "/proc/%d", pid);
c3f6f71d
JM
468 pi->next = procinfo_list;
469 procinfo_list = pi;
470 }
471 else
472 {
c475f569
RO
473 xsnprintf (pi->pathname, sizeof (pi->pathname), "/proc/%d/lwp/%d",
474 pid, tid);
c3f6f71d
JM
475 pi->next = parent->thread_list;
476 parent->thread_list = pi;
477 }
478 return pi;
479}
c906108c 480
77382aee 481/* Close all file descriptors associated with the procinfo. */
c906108c 482
c3f6f71d 483static void
fba45db2 484close_procinfo_files (procinfo *pi)
c3f6f71d
JM
485{
486 if (pi->ctl_fd > 0)
487 close (pi->ctl_fd);
c3f6f71d
JM
488 if (pi->as_fd > 0)
489 close (pi->as_fd);
490 if (pi->status_fd > 0)
491 close (pi->status_fd);
c3f6f71d
JM
492 pi->ctl_fd = pi->as_fd = pi->status_fd = 0;
493}
c906108c 494
77382aee 495/* Destructor function. Close, unlink and deallocate the object. */
c906108c 496
c3f6f71d 497static void
fba45db2 498destroy_one_procinfo (procinfo **list, procinfo *pi)
c3f6f71d
JM
499{
500 procinfo *ptr;
501
77382aee 502 /* Step one: unlink the procinfo from its list. */
c3f6f71d
JM
503 if (pi == *list)
504 *list = pi->next;
19958708 505 else
c3f6f71d
JM
506 for (ptr = *list; ptr; ptr = ptr->next)
507 if (ptr->next == pi)
508 {
509 ptr->next = pi->next;
510 break;
511 }
7a292a7a 512
77382aee 513 /* Step two: close any open file descriptors. */
c3f6f71d 514 close_procinfo_files (pi);
7a292a7a 515
77382aee 516 /* Step three: free the memory. */
1d5e0602
KB
517 xfree (pi->saved_entryset);
518 xfree (pi->saved_exitset);
b8c9b27d 519 xfree (pi);
c3f6f71d 520}
c906108c 521
c3f6f71d 522static void
fba45db2 523destroy_procinfo (procinfo *pi)
c3f6f71d
JM
524{
525 procinfo *tmp;
c906108c 526
0df8b418 527 if (pi->tid != 0) /* Destroy a thread procinfo. */
c3f6f71d 528 {
0df8b418 529 tmp = find_procinfo (pi->pid, 0); /* Find the parent process. */
c3f6f71d
JM
530 destroy_one_procinfo (&tmp->thread_list, pi);
531 }
0df8b418 532 else /* Destroy a process procinfo and all its threads. */
c3f6f71d
JM
533 {
534 /* First destroy the children, if any; */
535 while (pi->thread_list != NULL)
536 destroy_one_procinfo (&pi->thread_list, pi->thread_list);
537 /* Then destroy the parent. Genocide!!! */
538 destroy_one_procinfo (&procinfo_list, pi);
539 }
540}
c906108c 541
5b4cbbe3
TT
542/* A deleter that calls destroy_procinfo. */
543struct procinfo_deleter
004527cb 544{
5b4cbbe3
TT
545 void operator() (procinfo *pi) const
546 {
547 destroy_procinfo (pi);
548 }
549};
550
551typedef std::unique_ptr<procinfo, procinfo_deleter> procinfo_up;
004527cb 552
c3f6f71d 553enum { NOKILL, KILL };
c906108c 554
77382aee
PA
555/* To be called on a non_recoverable error for a procinfo. Prints
556 error messages, optionally sends a SIGKILL to the process, then
557 destroys the data structure. */
c906108c 558
c3f6f71d 559static void
995816ba 560dead_procinfo (procinfo *pi, const char *msg, int kill_p)
c3f6f71d
JM
561{
562 char procfile[80];
c906108c 563
c3f6f71d 564 if (pi->pathname)
c475f569 565 print_sys_errmsg (pi->pathname, errno);
c3f6f71d
JM
566 else
567 {
c475f569 568 xsnprintf (procfile, sizeof (procfile), "process %d", pi->pid);
c3f6f71d
JM
569 print_sys_errmsg (procfile, errno);
570 }
571 if (kill_p == KILL)
572 kill (pi->pid, SIGKILL);
c906108c 573
c3f6f71d 574 destroy_procinfo (pi);
0b62613e 575 error ("%s", msg);
c3f6f71d 576}
c906108c 577
c3f6f71d 578/* =================== END, STRUCT PROCINFO "MODULE" =================== */
c906108c 579
196535a6 580/* =================== /proc "MODULE" =================== */
c906108c 581
77382aee
PA
582/* This "module" is the interface layer between the /proc system API
583 and the gdb target vector functions. This layer consists of access
584 functions that encapsulate each of the basic operations that we
585 need to use from the /proc API.
586
587 The main motivation for this layer is to hide the fact that there
196535a6 588 were two very different implementations of the /proc API. */
c906108c 589
44122162
RO
590static long proc_flags (procinfo *pi);
591static int proc_why (procinfo *pi);
592static int proc_what (procinfo *pi);
593static int proc_set_current_signal (procinfo *pi, int signo);
594static int proc_get_current_thread (procinfo *pi);
d3581e61 595static int proc_iterate_over_threads
44122162 596 (procinfo *pi,
d3581e61
JB
597 int (*func) (procinfo *, procinfo *, void *),
598 void *ptr);
599
600static void
995816ba 601proc_warn (procinfo *pi, const char *func, int line)
c3f6f71d 602{
c475f569
RO
603 xsnprintf (errmsg, sizeof (errmsg), "procfs: %s line %d, %s",
604 func, line, pi->pathname);
c3f6f71d
JM
605 print_sys_errmsg (errmsg, errno);
606}
c906108c 607
d3581e61 608static void
995816ba 609proc_error (procinfo *pi, const char *func, int line)
c3f6f71d 610{
c475f569
RO
611 xsnprintf (errmsg, sizeof (errmsg), "procfs: %s line %d, %s",
612 func, line, pi->pathname);
c3f6f71d
JM
613 perror_with_name (errmsg);
614}
c906108c 615
77382aee
PA
616/* Updates the status struct in the procinfo. There is a 'valid'
617 flag, to let other functions know when this function needs to be
618 called (so the status is only read when it is needed). The status
619 file descriptor is also only opened when it is needed. Returns
620 non-zero for success, zero for failure. */
c906108c 621
d3581e61 622static int
fba45db2 623proc_get_status (procinfo *pi)
c3f6f71d 624{
0df8b418 625 /* Status file descriptor is opened "lazily". */
c475f569 626 if (pi->status_fd == 0 && open_procinfo_files (pi, FD_STATUS) == 0)
c3f6f71d
JM
627 {
628 pi->status_valid = 0;
629 return 0;
630 }
c906108c 631
c3f6f71d
JM
632 if (lseek (pi->status_fd, 0, SEEK_SET) < 0)
633 pi->status_valid = 0; /* fail */
634 else
635 {
19958708 636 /* Sigh... I have to read a different data structure,
0df8b418 637 depending on whether this is a main process or an LWP. */
c3f6f71d 638 if (pi->tid)
19958708
RM
639 pi->status_valid = (read (pi->status_fd,
640 (char *) &pi->prstatus.pr_lwp,
c3f6f71d
JM
641 sizeof (lwpstatus_t))
642 == sizeof (lwpstatus_t));
643 else
644 {
19958708 645 pi->status_valid = (read (pi->status_fd,
c3f6f71d 646 (char *) &pi->prstatus,
44122162
RO
647 sizeof (pstatus_t))
648 == sizeof (pstatus_t));
c3f6f71d
JM
649 }
650 }
c906108c 651
c3f6f71d
JM
652 if (pi->status_valid)
653 {
19958708 654 PROC_PRETTYFPRINT_STATUS (proc_flags (pi),
c3f6f71d 655 proc_why (pi),
19958708 656 proc_what (pi),
c3f6f71d
JM
657 proc_get_current_thread (pi));
658 }
c906108c 659
77382aee 660 /* The status struct includes general regs, so mark them valid too. */
c3f6f71d 661 pi->gregs_valid = pi->status_valid;
77382aee
PA
662 /* In the read/write multiple-fd model, the status struct includes
663 the fp regs too, so mark them valid too. */
c3f6f71d 664 pi->fpregs_valid = pi->status_valid;
77382aee 665 return pi->status_valid; /* True if success, false if failure. */
c3f6f71d 666}
c906108c 667
77382aee 668/* Returns the process flags (pr_flags field). */
c3f6f71d 669
d3581e61 670static long
fba45db2 671proc_flags (procinfo *pi)
c3f6f71d
JM
672{
673 if (!pi->status_valid)
674 if (!proc_get_status (pi))
0df8b418 675 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 676
c3f6f71d 677 return pi->prstatus.pr_lwp.pr_flags;
c3f6f71d 678}
c906108c 679
77382aee 680/* Returns the pr_why field (why the process stopped). */
c906108c 681
d3581e61 682static int
fba45db2 683proc_why (procinfo *pi)
c3f6f71d
JM
684{
685 if (!pi->status_valid)
686 if (!proc_get_status (pi))
0df8b418 687 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 688
c3f6f71d 689 return pi->prstatus.pr_lwp.pr_why;
c3f6f71d 690}
c906108c 691
77382aee 692/* Returns the pr_what field (details of why the process stopped). */
c906108c 693
d3581e61 694static int
fba45db2 695proc_what (procinfo *pi)
c3f6f71d
JM
696{
697 if (!pi->status_valid)
698 if (!proc_get_status (pi))
0df8b418 699 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 700
c3f6f71d 701 return pi->prstatus.pr_lwp.pr_what;
c3f6f71d 702}
c906108c 703
77382aee
PA
704/* This function is only called when PI is stopped by a watchpoint.
705 Assuming the OS supports it, write to *ADDR the data address which
706 triggered it and return 1. Return 0 if it is not possible to know
707 the address. */
bf701c2c
PM
708
709static int
710proc_watchpoint_address (procinfo *pi, CORE_ADDR *addr)
711{
712 if (!pi->status_valid)
713 if (!proc_get_status (pi))
714 return 0;
715
f5656ead
TT
716 *addr = (CORE_ADDR) gdbarch_pointer_to_address (target_gdbarch (),
717 builtin_type (target_gdbarch ())->builtin_data_ptr,
bf701c2c 718 (gdb_byte *) &pi->prstatus.pr_lwp.pr_info.si_addr);
bf701c2c
PM
719 return 1;
720}
721
77382aee
PA
722/* Returns the pr_nsysarg field (number of args to the current
723 syscall). */
c3f6f71d 724
d3581e61 725static int
fba45db2 726proc_nsysarg (procinfo *pi)
c3f6f71d
JM
727{
728 if (!pi->status_valid)
729 if (!proc_get_status (pi))
730 return 0;
19958708 731
c3f6f71d 732 return pi->prstatus.pr_lwp.pr_nsysarg;
c3f6f71d 733}
c906108c 734
77382aee
PA
735/* Returns the pr_sysarg field (pointer to the arguments of current
736 syscall). */
c906108c 737
d3581e61 738static long *
fba45db2 739proc_sysargs (procinfo *pi)
c3f6f71d
JM
740{
741 if (!pi->status_valid)
742 if (!proc_get_status (pi))
743 return NULL;
19958708 744
c3f6f71d 745 return (long *) &pi->prstatus.pr_lwp.pr_sysarg;
c3f6f71d 746}
77382aee 747
44122162 748/* Set or reset any of the following process flags:
77382aee
PA
749 PR_FORK -- forked child will inherit trace flags
750 PR_RLC -- traced process runs when last /proc file closed.
751 PR_KLC -- traced process is killed when last /proc file closed.
752 PR_ASYNC -- LWP's get to run/stop independently.
753
44122162 754 This function is done using read/write [PCSET/PCRESET/PCUNSET].
77382aee
PA
755
756 Arguments:
757 pi -- the procinfo
758 flag -- one of PR_FORK, PR_RLC, or PR_ASYNC
759 mode -- 1 for set, 0 for reset.
760
761 Returns non-zero for success, zero for failure. */
c906108c 762
c3f6f71d 763enum { FLAG_RESET, FLAG_SET };
c906108c 764
c3f6f71d 765static int
fba45db2 766proc_modify_flag (procinfo *pi, long flag, long mode)
c3f6f71d
JM
767{
768 long win = 0; /* default to fail */
769
77382aee
PA
770 /* These operations affect the process as a whole, and applying them
771 to an individual LWP has the same meaning as applying them to the
772 main process. Therefore, if we're ever called with a pointer to
773 an LWP's procinfo, let's substitute the process's procinfo and
774 avoid opening the LWP's file descriptor unnecessarily. */
c3f6f71d
JM
775
776 if (pi->pid != 0)
777 pi = find_procinfo_or_die (pi->pid, 0);
778
44122162 779 procfs_ctl_t arg[2];
c5aa993b 780
44122162
RO
781 if (mode == FLAG_SET) /* Set the flag (RLC, FORK, or ASYNC). */
782 arg[0] = PCSET;
0df8b418 783 else /* Reset the flag. */
44122162
RO
784 arg[0] = PCUNSET;
785
786 arg[1] = flag;
787 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 788
77382aee
PA
789 /* The above operation renders the procinfo's cached pstatus
790 obsolete. */
c3f6f71d 791 pi->status_valid = 0;
c906108c 792
c3f6f71d 793 if (!win)
8a3fe4f8 794 warning (_("procfs: modify_flag failed to turn %s %s"),
c3f6f71d
JM
795 flag == PR_FORK ? "PR_FORK" :
796 flag == PR_RLC ? "PR_RLC" :
c3f6f71d 797 flag == PR_ASYNC ? "PR_ASYNC" :
0d06e24b 798 flag == PR_KLC ? "PR_KLC" :
c3f6f71d
JM
799 "<unknown flag>",
800 mode == FLAG_RESET ? "off" : "on");
c906108c 801
c3f6f71d
JM
802 return win;
803}
c906108c 804
77382aee
PA
805/* Set the run_on_last_close flag. Process with all threads will
806 become runnable when debugger closes all /proc fds. Returns
807 non-zero for success, zero for failure. */
c906108c 808
d3581e61 809static int
fba45db2 810proc_set_run_on_last_close (procinfo *pi)
c906108c 811{
c3f6f71d
JM
812 return proc_modify_flag (pi, PR_RLC, FLAG_SET);
813}
c906108c 814
77382aee
PA
815/* Reset the run_on_last_close flag. The process will NOT become
816 runnable when debugger closes its file handles. Returns non-zero
817 for success, zero for failure. */
c906108c 818
d3581e61 819static int
fba45db2 820proc_unset_run_on_last_close (procinfo *pi)
c3f6f71d
JM
821{
822 return proc_modify_flag (pi, PR_RLC, FLAG_RESET);
c906108c
SS
823}
824
77382aee 825/* Reset inherit_on_fork flag. If the process forks a child while we
85102364 826 are registered for events in the parent, then we will NOT receive
77382aee
PA
827 events from the child. Returns non-zero for success, zero for
828 failure. */
c906108c 829
d3581e61 830static int
fba45db2 831proc_unset_inherit_on_fork (procinfo *pi)
c3f6f71d
JM
832{
833 return proc_modify_flag (pi, PR_FORK, FLAG_RESET);
834}
c906108c 835
77382aee
PA
836/* Set PR_ASYNC flag. If one LWP stops because of a debug event
837 (signal etc.), the remaining LWPs will continue to run. Returns
838 non-zero for success, zero for failure. */
c906108c 839
d3581e61 840static int
fba45db2 841proc_set_async (procinfo *pi)
c3f6f71d
JM
842{
843 return proc_modify_flag (pi, PR_ASYNC, FLAG_SET);
844}
c906108c 845
77382aee
PA
846/* Reset PR_ASYNC flag. If one LWP stops because of a debug event
847 (signal etc.), then all other LWPs will stop as well. Returns
848 non-zero for success, zero for failure. */
c906108c 849
d3581e61 850static int
fba45db2 851proc_unset_async (procinfo *pi)
c3f6f71d
JM
852{
853 return proc_modify_flag (pi, PR_ASYNC, FLAG_RESET);
854}
c906108c 855
77382aee
PA
856/* Request the process/LWP to stop. Does not wait. Returns non-zero
857 for success, zero for failure. */
c906108c 858
d3581e61 859static int
fba45db2 860proc_stop_process (procinfo *pi)
c3f6f71d
JM
861{
862 int win;
c906108c 863
77382aee
PA
864 /* We might conceivably apply this operation to an LWP, and the
865 LWP's ctl file descriptor might not be open. */
c906108c 866
c475f569 867 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c3f6f71d
JM
868 return 0;
869 else
870 {
37de36c6 871 procfs_ctl_t cmd = PCSTOP;
f4a14ae6 872
c3f6f71d 873 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d 874 }
c906108c 875
c3f6f71d
JM
876 return win;
877}
c5aa993b 878
77382aee
PA
879/* Wait for the process or LWP to stop (block until it does). Returns
880 non-zero for success, zero for failure. */
c906108c 881
d3581e61 882static int
fba45db2 883proc_wait_for_stop (procinfo *pi)
c906108c 884{
c3f6f71d
JM
885 int win;
886
77382aee
PA
887 /* We should never have to apply this operation to any procinfo
888 except the one for the main process. If that ever changes for
889 any reason, then take out the following clause and replace it
890 with one that makes sure the ctl_fd is open. */
19958708 891
c3f6f71d
JM
892 if (pi->tid != 0)
893 pi = find_procinfo_or_die (pi->pid, 0);
894
44122162 895 procfs_ctl_t cmd = PCWSTOP;
f4a14ae6 896
92137da0
RO
897 set_sigint_trap ();
898
44122162 899 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
92137da0
RO
900
901 clear_sigint_trap ();
902
44122162
RO
903 /* We been runnin' and we stopped -- need to update status. */
904 pi->status_valid = 0;
c906108c 905
c3f6f71d 906 return win;
c906108c
SS
907}
908
77382aee
PA
909/* Make the process or LWP runnable.
910
911 Options (not all are implemented):
912 - single-step
913 - clear current fault
914 - clear current signal
915 - abort the current system call
916 - stop as soon as finished with system call
77382aee
PA
917
918 Always clears the current fault. PI is the process or LWP to
919 operate on. If STEP is true, set the process or LWP to trap after
920 one instruction. If SIGNO is zero, clear the current signal if
921 any; if non-zero, set the current signal to this one. Returns
922 non-zero for success, zero for failure. */
c3f6f71d 923
d3581e61 924static int
fba45db2 925proc_run_process (procinfo *pi, int step, int signo)
c3f6f71d
JM
926{
927 int win;
928 int runflags;
929
77382aee
PA
930 /* We will probably have to apply this operation to individual
931 threads, so make sure the control file descriptor is open. */
19958708 932
c475f569
RO
933 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
934 return 0;
c906108c 935
0df8b418 936 runflags = PRCFAULT; /* Always clear current fault. */
c3f6f71d
JM
937 if (step)
938 runflags |= PRSTEP;
939 if (signo == 0)
940 runflags |= PRCSIG;
0df8b418 941 else if (signo != -1) /* -1 means do nothing W.R.T. signals. */
c3f6f71d 942 proc_set_current_signal (pi, signo);
c5aa993b 943
44122162 944 procfs_ctl_t cmd[2];
c906108c 945
44122162
RO
946 cmd[0] = PCRUN;
947 cmd[1] = runflags;
948 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c906108c 949
c3f6f71d
JM
950 return win;
951}
c906108c 952
77382aee
PA
953/* Register to trace signals in the process or LWP. Returns non-zero
954 for success, zero for failure. */
c906108c 955
d3581e61 956static int
44122162 957proc_set_traced_signals (procinfo *pi, sigset_t *sigset)
c906108c 958{
c3f6f71d
JM
959 int win;
960
77382aee
PA
961 /* We should never have to apply this operation to any procinfo
962 except the one for the main process. If that ever changes for
963 any reason, then take out the following clause and replace it
964 with one that makes sure the ctl_fd is open. */
19958708 965
c3f6f71d
JM
966 if (pi->tid != 0)
967 pi = find_procinfo_or_die (pi->pid, 0);
968
44122162
RO
969 struct {
970 procfs_ctl_t cmd;
971 /* Use char array to avoid alignment issues. */
972 char sigset[sizeof (sigset_t)];
973 } arg;
c906108c 974
44122162
RO
975 arg.cmd = PCSTRACE;
976 memcpy (&arg.sigset, sigset, sizeof (sigset_t));
977
978 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 979
0df8b418 980 /* The above operation renders the procinfo's cached pstatus obsolete. */
c3f6f71d 981 pi->status_valid = 0;
c906108c 982
c3f6f71d 983 if (!win)
8a3fe4f8 984 warning (_("procfs: set_traced_signals failed"));
c3f6f71d 985 return win;
c906108c
SS
986}
987
77382aee
PA
988/* Register to trace hardware faults in the process or LWP. Returns
989 non-zero for success, zero for failure. */
c906108c 990
d3581e61 991static int
fba45db2 992proc_set_traced_faults (procinfo *pi, fltset_t *fltset)
c3f6f71d
JM
993{
994 int win;
995
77382aee
PA
996 /* We should never have to apply this operation to any procinfo
997 except the one for the main process. If that ever changes for
998 any reason, then take out the following clause and replace it
999 with one that makes sure the ctl_fd is open. */
19958708 1000
c3f6f71d
JM
1001 if (pi->tid != 0)
1002 pi = find_procinfo_or_die (pi->pid, 0);
1003
44122162
RO
1004 struct {
1005 procfs_ctl_t cmd;
1006 /* Use char array to avoid alignment issues. */
1007 char fltset[sizeof (fltset_t)];
1008 } arg;
1009
1010 arg.cmd = PCSFAULT;
1011 memcpy (&arg.fltset, fltset, sizeof (fltset_t));
c906108c 1012
44122162 1013 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1014
0df8b418 1015 /* The above operation renders the procinfo's cached pstatus obsolete. */
c3f6f71d 1016 pi->status_valid = 0;
c906108c 1017
c3f6f71d
JM
1018 return win;
1019}
c5aa993b 1020
77382aee
PA
1021/* Register to trace entry to system calls in the process or LWP.
1022 Returns non-zero for success, zero for failure. */
c906108c 1023
d3581e61 1024static int
fba45db2 1025proc_set_traced_sysentry (procinfo *pi, sysset_t *sysset)
c906108c 1026{
c3f6f71d
JM
1027 int win;
1028
77382aee
PA
1029 /* We should never have to apply this operation to any procinfo
1030 except the one for the main process. If that ever changes for
1031 any reason, then take out the following clause and replace it
1032 with one that makes sure the ctl_fd is open. */
19958708 1033
c3f6f71d
JM
1034 if (pi->tid != 0)
1035 pi = find_procinfo_or_die (pi->pid, 0);
1036
c475f569 1037 struct {
44122162
RO
1038 procfs_ctl_t cmd;
1039 /* Use char array to avoid alignment issues. */
1040 char sysset[sizeof (sysset_t)];
c475f569 1041 } arg;
c3f6f71d 1042
c475f569
RO
1043 arg.cmd = PCSENTRY;
1044 memcpy (&arg.sysset, sysset, sizeof (sysset_t));
44122162 1045
c475f569 1046 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
37de36c6 1047
77382aee
PA
1048 /* The above operation renders the procinfo's cached pstatus
1049 obsolete. */
c3f6f71d 1050 pi->status_valid = 0;
19958708 1051
c3f6f71d 1052 return win;
c906108c
SS
1053}
1054
77382aee
PA
1055/* Register to trace exit from system calls in the process or LWP.
1056 Returns non-zero for success, zero for failure. */
c906108c 1057
d3581e61 1058static int
fba45db2 1059proc_set_traced_sysexit (procinfo *pi, sysset_t *sysset)
c3f6f71d
JM
1060{
1061 int win;
1062
77382aee
PA
1063 /* We should never have to apply this operation to any procinfo
1064 except the one for the main process. If that ever changes for
1065 any reason, then take out the following clause and replace it
1066 with one that makes sure the ctl_fd is open. */
19958708 1067
c3f6f71d
JM
1068 if (pi->tid != 0)
1069 pi = find_procinfo_or_die (pi->pid, 0);
1070
44122162
RO
1071 struct gdb_proc_ctl_pcsexit {
1072 procfs_ctl_t cmd;
1073 /* Use char array to avoid alignment issues. */
1074 char sysset[sizeof (sysset_t)];
c475f569 1075 } arg;
c906108c 1076
c475f569
RO
1077 arg.cmd = PCSEXIT;
1078 memcpy (&arg.sysset, sysset, sizeof (sysset_t));
c906108c 1079
c475f569 1080 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
37de36c6 1081
77382aee
PA
1082 /* The above operation renders the procinfo's cached pstatus
1083 obsolete. */
c3f6f71d 1084 pi->status_valid = 0;
c906108c 1085
c3f6f71d
JM
1086 return win;
1087}
c906108c 1088
77382aee
PA
1089/* Specify the set of blocked / held signals in the process or LWP.
1090 Returns non-zero for success, zero for failure. */
c906108c 1091
d3581e61 1092static int
44122162 1093proc_set_held_signals (procinfo *pi, sigset_t *sighold)
c906108c 1094{
c3f6f71d
JM
1095 int win;
1096
77382aee
PA
1097 /* We should never have to apply this operation to any procinfo
1098 except the one for the main process. If that ever changes for
1099 any reason, then take out the following clause and replace it
1100 with one that makes sure the ctl_fd is open. */
19958708 1101
c3f6f71d
JM
1102 if (pi->tid != 0)
1103 pi = find_procinfo_or_die (pi->pid, 0);
1104
44122162
RO
1105 struct {
1106 procfs_ctl_t cmd;
1107 /* Use char array to avoid alignment issues. */
1108 char hold[sizeof (sigset_t)];
1109 } arg;
1110
1111 arg.cmd = PCSHOLD;
1112 memcpy (&arg.hold, sighold, sizeof (sigset_t));
1113 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
1114
77382aee
PA
1115 /* The above operation renders the procinfo's cached pstatus
1116 obsolete. */
c3f6f71d
JM
1117 pi->status_valid = 0;
1118
1119 return win;
c906108c
SS
1120}
1121
77382aee
PA
1122/* Returns the set of signals that are held / blocked. Will also copy
1123 the sigset if SAVE is non-zero. */
c906108c 1124
44122162
RO
1125static sigset_t *
1126proc_get_held_signals (procinfo *pi, sigset_t *save)
c906108c 1127{
44122162 1128 sigset_t *ret = NULL;
c3f6f71d 1129
77382aee
PA
1130 /* We should never have to apply this operation to any procinfo
1131 except the one for the main process. If that ever changes for
1132 any reason, then take out the following clause and replace it
1133 with one that makes sure the ctl_fd is open. */
19958708 1134
c3f6f71d
JM
1135 if (pi->tid != 0)
1136 pi = find_procinfo_or_die (pi->pid, 0);
1137
c3f6f71d
JM
1138 if (!pi->status_valid)
1139 if (!proc_get_status (pi))
1140 return NULL;
1141
c3f6f71d 1142 ret = &pi->prstatus.pr_lwp.pr_lwphold;
c3f6f71d 1143 if (save && ret)
44122162 1144 memcpy (save, ret, sizeof (sigset_t));
c3f6f71d
JM
1145
1146 return ret;
c906108c
SS
1147}
1148
77382aee
PA
1149/* Returns the set of signals that are traced / debugged. Will also
1150 copy the sigset if SAVE is non-zero. */
c3f6f71d 1151
44122162
RO
1152static sigset_t *
1153proc_get_traced_signals (procinfo *pi, sigset_t *save)
c906108c 1154{
44122162 1155 sigset_t *ret = NULL;
c3f6f71d 1156
77382aee
PA
1157 /* We should never have to apply this operation to any procinfo
1158 except the one for the main process. If that ever changes for
1159 any reason, then take out the following clause and replace it
1160 with one that makes sure the ctl_fd is open. */
19958708 1161
c3f6f71d
JM
1162 if (pi->tid != 0)
1163 pi = find_procinfo_or_die (pi->pid, 0);
1164
c3f6f71d
JM
1165 if (!pi->status_valid)
1166 if (!proc_get_status (pi))
1167 return NULL;
1168
1169 ret = &pi->prstatus.pr_sigtrace;
c3f6f71d 1170 if (save && ret)
44122162 1171 memcpy (save, ret, sizeof (sigset_t));
c906108c 1172
c3f6f71d
JM
1173 return ret;
1174}
c906108c 1175
77382aee
PA
1176/* Returns the set of hardware faults that are traced /debugged. Will
1177 also copy the faultset if SAVE is non-zero. */
c3f6f71d 1178
d3581e61 1179static fltset_t *
fba45db2 1180proc_get_traced_faults (procinfo *pi, fltset_t *save)
c3f6f71d
JM
1181{
1182 fltset_t *ret = NULL;
1183
77382aee
PA
1184 /* We should never have to apply this operation to any procinfo
1185 except the one for the main process. If that ever changes for
1186 any reason, then take out the following clause and replace it
1187 with one that makes sure the ctl_fd is open. */
19958708 1188
c3f6f71d
JM
1189 if (pi->tid != 0)
1190 pi = find_procinfo_or_die (pi->pid, 0);
1191
c3f6f71d
JM
1192 if (!pi->status_valid)
1193 if (!proc_get_status (pi))
1194 return NULL;
1195
1196 ret = &pi->prstatus.pr_flttrace;
c3f6f71d
JM
1197 if (save && ret)
1198 memcpy (save, ret, sizeof (fltset_t));
c906108c 1199
c3f6f71d
JM
1200 return ret;
1201}
c906108c 1202
77382aee
PA
1203/* Returns the set of syscalls that are traced /debugged on entry.
1204 Will also copy the syscall set if SAVE is non-zero. */
c906108c 1205
d3581e61 1206static sysset_t *
fba45db2 1207proc_get_traced_sysentry (procinfo *pi, sysset_t *save)
c3f6f71d
JM
1208{
1209 sysset_t *ret = NULL;
1210
77382aee
PA
1211 /* We should never have to apply this operation to any procinfo
1212 except the one for the main process. If that ever changes for
1213 any reason, then take out the following clause and replace it
1214 with one that makes sure the ctl_fd is open. */
19958708 1215
c3f6f71d
JM
1216 if (pi->tid != 0)
1217 pi = find_procinfo_or_die (pi->pid, 0);
1218
c3f6f71d
JM
1219 if (!pi->status_valid)
1220 if (!proc_get_status (pi))
1221 return NULL;
1222
1223 ret = &pi->prstatus.pr_sysentry;
c3f6f71d 1224 if (save && ret)
44122162 1225 memcpy (save, ret, sizeof (sysset_t));
c906108c 1226
c3f6f71d
JM
1227 return ret;
1228}
c5aa993b 1229
77382aee
PA
1230/* Returns the set of syscalls that are traced /debugged on exit.
1231 Will also copy the syscall set if SAVE is non-zero. */
c906108c 1232
d3581e61 1233static sysset_t *
fba45db2 1234proc_get_traced_sysexit (procinfo *pi, sysset_t *save)
c906108c 1235{
44122162 1236 sysset_t *ret = NULL;
c3f6f71d 1237
77382aee
PA
1238 /* We should never have to apply this operation to any procinfo
1239 except the one for the main process. If that ever changes for
1240 any reason, then take out the following clause and replace it
1241 with one that makes sure the ctl_fd is open. */
19958708 1242
c3f6f71d
JM
1243 if (pi->tid != 0)
1244 pi = find_procinfo_or_die (pi->pid, 0);
1245
c3f6f71d
JM
1246 if (!pi->status_valid)
1247 if (!proc_get_status (pi))
1248 return NULL;
1249
1250 ret = &pi->prstatus.pr_sysexit;
c3f6f71d 1251 if (save && ret)
44122162 1252 memcpy (save, ret, sizeof (sysset_t));
c3f6f71d
JM
1253
1254 return ret;
1255}
c906108c 1256
77382aee
PA
1257/* The current fault (if any) is cleared; the associated signal will
1258 not be sent to the process or LWP when it resumes. Returns
1259 non-zero for success, zero for failure. */
c906108c 1260
d3581e61 1261static int
fba45db2 1262proc_clear_current_fault (procinfo *pi)
c3f6f71d
JM
1263{
1264 int win;
1265
77382aee
PA
1266 /* We should never have to apply this operation to any procinfo
1267 except the one for the main process. If that ever changes for
1268 any reason, then take out the following clause and replace it
1269 with one that makes sure the ctl_fd is open. */
19958708 1270
c3f6f71d
JM
1271 if (pi->tid != 0)
1272 pi = find_procinfo_or_die (pi->pid, 0);
1273
44122162 1274 procfs_ctl_t cmd = PCCFAULT;
f4a14ae6 1275
44122162 1276 win = (write (pi->ctl_fd, (void *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d
JM
1277
1278 return win;
c906108c
SS
1279}
1280
77382aee
PA
1281/* Set the "current signal" that will be delivered next to the
1282 process. NOTE: semantics are different from those of KILL. This
1283 signal will be delivered to the process or LWP immediately when it
1284 is resumed (even if the signal is held/blocked); it will NOT
1285 immediately cause another event of interest, and will NOT first
1286 trap back to the debugger. Returns non-zero for success, zero for
1287 failure. */
c3f6f71d 1288
d3581e61 1289static int
fba45db2 1290proc_set_current_signal (procinfo *pi, int signo)
c3f6f71d
JM
1291{
1292 int win;
1293 struct {
37de36c6 1294 procfs_ctl_t cmd;
c3f6f71d 1295 /* Use char array to avoid alignment issues. */
44122162 1296 char sinfo[sizeof (siginfo_t)];
c3f6f71d 1297 } arg;
44122162 1298 siginfo_t mysinfo;
5b6d1e4f 1299 process_stratum_target *wait_target;
c162e8c9
JM
1300 ptid_t wait_ptid;
1301 struct target_waitstatus wait_status;
c3f6f71d 1302
77382aee
PA
1303 /* We should never have to apply this operation to any procinfo
1304 except the one for the main process. If that ever changes for
1305 any reason, then take out the following clause and replace it
1306 with one that makes sure the ctl_fd is open. */
19958708 1307
c3f6f71d
JM
1308 if (pi->tid != 0)
1309 pi = find_procinfo_or_die (pi->pid, 0);
1310
c3f6f71d 1311 /* The pointer is just a type alias. */
5b6d1e4f
PA
1312 get_last_target_status (&wait_target, &wait_ptid, &wait_status);
1313 if (wait_target == &the_procfs_target
1314 && wait_ptid == inferior_ptid
c162e8c9 1315 && wait_status.kind == TARGET_WAITKIND_STOPPED
2ea28649 1316 && wait_status.value.sig == gdb_signal_from_host (signo)
c162e8c9 1317 && proc_get_status (pi)
c162e8c9 1318 && pi->prstatus.pr_lwp.pr_info.si_signo == signo
c162e8c9
JM
1319 )
1320 /* Use the siginfo associated with the signal being
1321 redelivered. */
44122162 1322 memcpy (arg.sinfo, &pi->prstatus.pr_lwp.pr_info, sizeof (siginfo_t));
c162e8c9
JM
1323 else
1324 {
73930d4d
KH
1325 mysinfo.si_signo = signo;
1326 mysinfo.si_code = 0;
1327 mysinfo.si_pid = getpid (); /* ?why? */
1328 mysinfo.si_uid = getuid (); /* ?why? */
44122162 1329 memcpy (arg.sinfo, &mysinfo, sizeof (siginfo_t));
c162e8c9 1330 }
c3f6f71d 1331
c3f6f71d
JM
1332 arg.cmd = PCSSIG;
1333 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1334
c3f6f71d
JM
1335 return win;
1336}
c906108c 1337
77382aee
PA
1338/* The current signal (if any) is cleared, and is not sent to the
1339 process or LWP when it resumes. Returns non-zero for success, zero
1340 for failure. */
c906108c 1341
d3581e61 1342static int
fba45db2 1343proc_clear_current_signal (procinfo *pi)
c3f6f71d
JM
1344{
1345 int win;
1346
77382aee
PA
1347 /* We should never have to apply this operation to any procinfo
1348 except the one for the main process. If that ever changes for
1349 any reason, then take out the following clause and replace it
1350 with one that makes sure the ctl_fd is open. */
19958708 1351
c3f6f71d
JM
1352 if (pi->tid != 0)
1353 pi = find_procinfo_or_die (pi->pid, 0);
1354
44122162
RO
1355 struct {
1356 procfs_ctl_t cmd;
1357 /* Use char array to avoid alignment issues. */
1358 char sinfo[sizeof (siginfo_t)];
1359 } arg;
1360 siginfo_t mysinfo;
1361
1362 arg.cmd = PCSSIG;
1363 /* The pointer is just a type alias. */
1364 mysinfo.si_signo = 0;
1365 mysinfo.si_code = 0;
1366 mysinfo.si_errno = 0;
1367 mysinfo.si_pid = getpid (); /* ?why? */
1368 mysinfo.si_uid = getuid (); /* ?why? */
1369 memcpy (arg.sinfo, &mysinfo, sizeof (siginfo_t));
1370
1371 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1372
c3f6f71d
JM
1373 return win;
1374}
c906108c 1375
772cf8be
MK
1376/* Return the general-purpose registers for the process or LWP
1377 corresponding to PI. Upon failure, return NULL. */
c906108c 1378
d3581e61 1379static gdb_gregset_t *
fba45db2 1380proc_get_gregs (procinfo *pi)
c3f6f71d
JM
1381{
1382 if (!pi->status_valid || !pi->gregs_valid)
1383 if (!proc_get_status (pi))
1384 return NULL;
1385
c3f6f71d 1386 return &pi->prstatus.pr_lwp.pr_reg;
c3f6f71d 1387}
c5aa993b 1388
772cf8be
MK
1389/* Return the general-purpose registers for the process or LWP
1390 corresponding to PI. Upon failure, return NULL. */
c906108c 1391
d3581e61 1392static gdb_fpregset_t *
fba45db2 1393proc_get_fpregs (procinfo *pi)
c906108c 1394{
c3f6f71d
JM
1395 if (!pi->status_valid || !pi->fpregs_valid)
1396 if (!proc_get_status (pi))
1397 return NULL;
1398
c3f6f71d 1399 return &pi->prstatus.pr_lwp.pr_fpreg;
c906108c
SS
1400}
1401
772cf8be
MK
1402/* Write the general-purpose registers back to the process or LWP
1403 corresponding to PI. Return non-zero for success, zero for
1404 failure. */
c3f6f71d 1405
d3581e61 1406static int
fba45db2 1407proc_set_gregs (procinfo *pi)
c906108c 1408{
c3f6f71d
JM
1409 gdb_gregset_t *gregs;
1410 int win;
c5aa993b 1411
772cf8be
MK
1412 gregs = proc_get_gregs (pi);
1413 if (gregs == NULL)
1414 return 0; /* proc_get_regs has already warned. */
c3f6f71d 1415
772cf8be 1416 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c475f569 1417 return 0;
c3f6f71d 1418 else
c906108c 1419 {
c3f6f71d 1420 struct {
37de36c6 1421 procfs_ctl_t cmd;
c3f6f71d
JM
1422 /* Use char array to avoid alignment issues. */
1423 char gregs[sizeof (gdb_gregset_t)];
1424 } arg;
1425
772cf8be 1426 arg.cmd = PCSREG;
c3f6f71d
JM
1427 memcpy (&arg.gregs, gregs, sizeof (arg.gregs));
1428 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1429 }
c3f6f71d 1430
772cf8be 1431 /* Policy: writing the registers invalidates our cache. */
c3f6f71d
JM
1432 pi->gregs_valid = 0;
1433 return win;
c906108c
SS
1434}
1435
772cf8be
MK
1436/* Write the floating-pointer registers back to the process or LWP
1437 corresponding to PI. Return non-zero for success, zero for
1438 failure. */
c3f6f71d 1439
d3581e61 1440static int
fba45db2 1441proc_set_fpregs (procinfo *pi)
c906108c 1442{
c3f6f71d
JM
1443 gdb_fpregset_t *fpregs;
1444 int win;
1445
772cf8be
MK
1446 fpregs = proc_get_fpregs (pi);
1447 if (fpregs == NULL)
1448 return 0; /* proc_get_fpregs has already warned. */
c5aa993b 1449
772cf8be 1450 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c475f569 1451 return 0;
c3f6f71d 1452 else
c906108c 1453 {
c3f6f71d 1454 struct {
37de36c6 1455 procfs_ctl_t cmd;
c3f6f71d
JM
1456 /* Use char array to avoid alignment issues. */
1457 char fpregs[sizeof (gdb_fpregset_t)];
1458 } arg;
1459
772cf8be 1460 arg.cmd = PCSFPREG;
c3f6f71d
JM
1461 memcpy (&arg.fpregs, fpregs, sizeof (arg.fpregs));
1462 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1463 }
c3f6f71d 1464
772cf8be 1465 /* Policy: writing the registers invalidates our cache. */
c3f6f71d
JM
1466 pi->fpregs_valid = 0;
1467 return win;
c906108c
SS
1468}
1469
77382aee
PA
1470/* Send a signal to the proc or lwp with the semantics of "kill()".
1471 Returns non-zero for success, zero for failure. */
c906108c 1472
d3581e61 1473static int
fba45db2 1474proc_kill (procinfo *pi, int signo)
c3f6f71d
JM
1475{
1476 int win;
c906108c 1477
77382aee
PA
1478 /* We might conceivably apply this operation to an LWP, and the
1479 LWP's ctl file descriptor might not be open. */
c906108c 1480
c475f569
RO
1481 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
1482 return 0;
c3f6f71d
JM
1483 else
1484 {
37de36c6 1485 procfs_ctl_t cmd[2];
c906108c 1486
c3f6f71d
JM
1487 cmd[0] = PCKILL;
1488 cmd[1] = signo;
1489 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d 1490 }
c906108c 1491
c3f6f71d
JM
1492 return win;
1493}
c906108c 1494
77382aee
PA
1495/* Find the pid of the process that started this one. Returns the
1496 parent process pid, or zero. */
c906108c 1497
d3581e61 1498static int
fba45db2 1499proc_parent_pid (procinfo *pi)
c906108c 1500{
77382aee
PA
1501 /* We should never have to apply this operation to any procinfo
1502 except the one for the main process. If that ever changes for
1503 any reason, then take out the following clause and replace it
1504 with one that makes sure the ctl_fd is open. */
19958708 1505
c3f6f71d
JM
1506 if (pi->tid != 0)
1507 pi = find_procinfo_or_die (pi->pid, 0);
1508
1509 if (!pi->status_valid)
1510 if (!proc_get_status (pi))
1511 return 0;
c5aa993b 1512
c3f6f71d
JM
1513 return pi->prstatus.pr_ppid;
1514}
1515
9a043c1d
AC
1516/* Convert a target address (a.k.a. CORE_ADDR) into a host address
1517 (a.k.a void pointer)! */
1518
1519static void *
1520procfs_address_to_host_pointer (CORE_ADDR addr)
1521{
f5656ead 1522 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
9a043c1d
AC
1523 void *ptr;
1524
4e906f53 1525 gdb_assert (sizeof (ptr) == TYPE_LENGTH (ptr_type));
f5656ead 1526 gdbarch_address_to_pointer (target_gdbarch (), ptr_type,
0b62613e 1527 (gdb_byte *) &ptr, addr);
9a043c1d
AC
1528 return ptr;
1529}
1530
a0911fd0 1531static int
fba45db2 1532proc_set_watchpoint (procinfo *pi, CORE_ADDR addr, int len, int wflags)
c3f6f71d 1533{
c3f6f71d 1534 struct {
37de36c6 1535 procfs_ctl_t cmd;
c3f6f71d
JM
1536 char watch[sizeof (prwatch_t)];
1537 } arg;
73930d4d 1538 prwatch_t pwatch;
c3f6f71d 1539
9a043c1d
AC
1540 /* NOTE: cagney/2003-02-01: Even more horrible hack. Need to
1541 convert a target address into something that can be stored in a
1542 native data structure. */
73930d4d 1543 pwatch.pr_vaddr = (uintptr_t) procfs_address_to_host_pointer (addr);
73930d4d
KH
1544 pwatch.pr_size = len;
1545 pwatch.pr_wflags = wflags;
c3f6f71d 1546 arg.cmd = PCWATCH;
73930d4d 1547 memcpy (arg.watch, &pwatch, sizeof (prwatch_t));
c3f6f71d 1548 return (write (pi->ctl_fd, &arg, sizeof (arg)) == sizeof (arg));
c906108c
SS
1549}
1550
c3f6f71d 1551/* =============== END, non-thread part of /proc "MODULE" =============== */
c906108c 1552
c3f6f71d 1553/* =================== Thread "MODULE" =================== */
c906108c 1554
44122162 1555/* Returns the number of threads for the process. */
c906108c 1556
d3581e61 1557static int
fba45db2 1558proc_get_nthreads (procinfo *pi)
c906108c 1559{
c3f6f71d
JM
1560 if (!pi->status_valid)
1561 if (!proc_get_status (pi))
1562 return 0;
c5aa993b 1563
44122162
RO
1564 /* Only works for the process procinfo, because the LWP procinfos do not
1565 get prstatus filled in. */
0df8b418 1566 if (pi->tid != 0) /* Find the parent process procinfo. */
c3f6f71d 1567 pi = find_procinfo_or_die (pi->pid, 0);
c3f6f71d 1568 return pi->prstatus.pr_nlwp;
c906108c
SS
1569}
1570
196535a6 1571/* Return the ID of the thread that had an event of interest.
77382aee
PA
1572 (ie. the one that hit a breakpoint or other traced event). All
1573 other things being equal, this should be the ID of a thread that is
1574 currently executing. */
c3f6f71d 1575
d3581e61 1576static int
fba45db2 1577proc_get_current_thread (procinfo *pi)
c3f6f71d 1578{
77382aee
PA
1579 /* Note: this should be applied to the root procinfo for the
1580 process, not to the procinfo for an LWP. If applied to the
1581 procinfo for an LWP, it will simply return that LWP's ID. In
1582 that case, find the parent process procinfo. */
19958708 1583
c3f6f71d
JM
1584 if (pi->tid != 0)
1585 pi = find_procinfo_or_die (pi->pid, 0);
1586
1587 if (!pi->status_valid)
1588 if (!proc_get_status (pi))
1589 return 0;
1590
c3f6f71d 1591 return pi->prstatus.pr_lwp.pr_lwpid;
c3f6f71d
JM
1592}
1593
77382aee 1594/* Discover the IDs of all the threads within the process, and create
196535a6 1595 a procinfo for each of them (chained to the parent). Returns
77382aee 1596 non-zero for success, zero for failure. */
c906108c 1597
a0911fd0 1598static int
fba45db2 1599proc_delete_dead_threads (procinfo *parent, procinfo *thread, void *ignore)
c3f6f71d
JM
1600{
1601 if (thread && parent) /* sanity */
c906108c 1602 {
c3f6f71d
JM
1603 thread->status_valid = 0;
1604 if (!proc_get_status (thread))
1605 destroy_one_procinfo (&parent->thread_list, thread);
1606 }
1607 return 0; /* keep iterating */
1608}
c5aa993b 1609
d3581e61 1610static int
fba45db2 1611proc_update_threads (procinfo *pi)
c3f6f71d
JM
1612{
1613 char pathname[MAX_PROC_NAME_SIZE + 16];
1614 struct dirent *direntry;
c3f6f71d 1615 procinfo *thread;
f0b3976b 1616 gdb_dir_up dirp;
c3f6f71d
JM
1617 int lwpid;
1618
77382aee
PA
1619 /* We should never have to apply this operation to any procinfo
1620 except the one for the main process. If that ever changes for
1621 any reason, then take out the following clause and replace it
1622 with one that makes sure the ctl_fd is open. */
19958708 1623
c3f6f71d
JM
1624 if (pi->tid != 0)
1625 pi = find_procinfo_or_die (pi->pid, 0);
1626
1627 proc_iterate_over_threads (pi, proc_delete_dead_threads, NULL);
1628
05b4bd79
PA
1629 /* Note: this brute-force method was originally devised for Unixware
1630 (support removed since), and will also work on Solaris 2.6 and
1631 2.7. The original comment mentioned the existence of a much
1632 simpler and more elegant way to do this on Solaris, but didn't
1633 point out what that was. */
c3f6f71d
JM
1634
1635 strcpy (pathname, pi->pathname);
1636 strcat (pathname, "/lwp");
f0b3976b
TT
1637 dirp.reset (opendir (pathname));
1638 if (dirp == NULL)
c3f6f71d
JM
1639 proc_error (pi, "update_threads, opendir", __LINE__);
1640
f0b3976b 1641 while ((direntry = readdir (dirp.get ())) != NULL)
c3f6f71d
JM
1642 if (direntry->d_name[0] != '.') /* skip '.' and '..' */
1643 {
1644 lwpid = atoi (&direntry->d_name[0]);
c475f569
RO
1645 thread = create_procinfo (pi->pid, lwpid);
1646 if (thread == NULL)
c3f6f71d
JM
1647 proc_error (pi, "update_threads, create_procinfo", __LINE__);
1648 }
1649 pi->threads_valid = 1;
c3f6f71d
JM
1650 return 1;
1651}
c906108c 1652
77382aee
PA
1653/* Given a pointer to a function, call that function once for each lwp
1654 in the procinfo list, until the function returns non-zero, in which
1655 event return the value returned by the function.
1656
1657 Note: this function does NOT call update_threads. If you want to
1658 discover new threads first, you must call that function explicitly.
1659 This function just makes a quick pass over the currently-known
1660 procinfos.
1661
1662 PI is the parent process procinfo. FUNC is the per-thread
1663 function. PTR is an opaque parameter for function. Returns the
1664 first non-zero return value from the callee, or zero. */
c3f6f71d 1665
d3581e61 1666static int
d0849a9a
KB
1667proc_iterate_over_threads (procinfo *pi,
1668 int (*func) (procinfo *, procinfo *, void *),
1669 void *ptr)
c906108c 1670{
c3f6f71d
JM
1671 procinfo *thread, *next;
1672 int retval = 0;
c906108c 1673
77382aee
PA
1674 /* We should never have to apply this operation to any procinfo
1675 except the one for the main process. If that ever changes for
1676 any reason, then take out the following clause and replace it
1677 with one that makes sure the ctl_fd is open. */
19958708 1678
c3f6f71d
JM
1679 if (pi->tid != 0)
1680 pi = find_procinfo_or_die (pi->pid, 0);
1681
1682 for (thread = pi->thread_list; thread != NULL; thread = next)
c906108c 1683 {
0df8b418 1684 next = thread->next; /* In case thread is destroyed. */
c475f569
RO
1685 retval = (*func) (pi, thread, ptr);
1686 if (retval != 0)
c3f6f71d 1687 break;
c906108c 1688 }
c3f6f71d
JM
1689
1690 return retval;
c906108c
SS
1691}
1692
c3f6f71d
JM
1693/* =================== END, Thread "MODULE" =================== */
1694
1695/* =================== END, /proc "MODULE" =================== */
1696
1697/* =================== GDB "MODULE" =================== */
1698
77382aee
PA
1699/* Here are all of the gdb target vector functions and their
1700 friends. */
c3f6f71d 1701
7fb43e53 1702static void do_attach (ptid_t ptid);
6bd6f3b6 1703static void do_detach ();
9185ddce 1704static void proc_trace_syscalls_1 (procinfo *pi, int syscallnum,
77382aee 1705 int entry_or_exit, int mode, int from_tty);
9185ddce 1706
77382aee
PA
1707/* Sets up the inferior to be debugged. Registers to trace signals,
1708 hardware faults, and syscalls. Note: does not set RLC flag: caller
1709 may want to customize that. Returns zero for success (note!
1710 unlike most functions in this module); on failure, returns the LINE
1711 NUMBER where it failed! */
c3f6f71d
JM
1712
1713static int
fba45db2 1714procfs_debug_inferior (procinfo *pi)
c906108c 1715{
c3f6f71d 1716 fltset_t traced_faults;
44122162 1717 sigset_t traced_signals;
37de36c6
KB
1718 sysset_t *traced_syscall_entries;
1719 sysset_t *traced_syscall_exits;
1720 int status;
c906108c 1721
0df8b418
MS
1722 /* Register to trace hardware faults in the child. */
1723 prfillset (&traced_faults); /* trace all faults... */
44122162 1724 prdelset (&traced_faults, FLTPAGE); /* except page fault. */
c3f6f71d
JM
1725 if (!proc_set_traced_faults (pi, &traced_faults))
1726 return __LINE__;
c906108c 1727
2455069d
UW
1728 /* Initially, register to trace all signals in the child. */
1729 prfillset (&traced_signals);
1730 if (!proc_set_traced_signals (pi, &traced_signals))
c3f6f71d
JM
1731 return __LINE__;
1732
37de36c6 1733
c3f6f71d 1734 /* Register to trace the 'exit' system call (on entry). */
c475f569 1735 traced_syscall_entries = XNEW (sysset_t);
44122162
RO
1736 premptyset (traced_syscall_entries);
1737 praddset (traced_syscall_entries, SYS_exit);
1738 praddset (traced_syscall_entries, SYS_lwp_exit);
c906108c 1739
37de36c6
KB
1740 status = proc_set_traced_sysentry (pi, traced_syscall_entries);
1741 xfree (traced_syscall_entries);
1742 if (!status)
c3f6f71d
JM
1743 return __LINE__;
1744
44122162 1745 /* Method for tracing exec syscalls. */
c475f569 1746 traced_syscall_exits = XNEW (sysset_t);
44122162 1747 premptyset (traced_syscall_exits);
44122162
RO
1748 praddset (traced_syscall_exits, SYS_execve);
1749 praddset (traced_syscall_exits, SYS_lwp_create);
1750 praddset (traced_syscall_exits, SYS_lwp_exit);
c906108c 1751
37de36c6
KB
1752 status = proc_set_traced_sysexit (pi, traced_syscall_exits);
1753 xfree (traced_syscall_exits);
1754 if (!status)
c3f6f71d
JM
1755 return __LINE__;
1756
c3f6f71d 1757 return 0;
c906108c
SS
1758}
1759
f6ac5f3d
PA
1760void
1761procfs_target::attach (const char *args, int from_tty)
c906108c 1762{
c3f6f71d
JM
1763 int pid;
1764
74164c56 1765 pid = parse_pid_to_attach (args);
c3f6f71d 1766
c3f6f71d 1767 if (pid == getpid ())
8a3fe4f8 1768 error (_("Attaching GDB to itself is not a good idea..."));
c906108c 1769
de146e19
SM
1770 /* Push the target if needed, ensure it gets un-pushed it if attach fails. */
1771 target_unpush_up unpusher;
c8fbd44a 1772 if (!inf->target_is_pushed (this))
de146e19 1773 {
02980c56 1774 current_inferior ()->push_target (this);
de146e19
SM
1775 unpusher.reset (this);
1776 }
1777
c3f6f71d 1778 if (from_tty)
c906108c 1779 {
d9fa87f4 1780 const char *exec_file = get_exec_file (0);
c3f6f71d
JM
1781
1782 if (exec_file)
a3f17187 1783 printf_filtered (_("Attaching to program `%s', %s\n"),
a068643d 1784 exec_file, target_pid_to_str (ptid_t (pid)).c_str ());
c3f6f71d 1785 else
a3f17187 1786 printf_filtered (_("Attaching to %s\n"),
a068643d 1787 target_pid_to_str (ptid_t (pid)).c_str ());
c3f6f71d
JM
1788
1789 fflush (stdout);
c906108c 1790 }
de146e19 1791
7fb43e53 1792 do_attach (ptid_t (pid));
de146e19
SM
1793
1794 /* Everything went fine, keep the target pushed. */
1795 unpusher.release ();
c3f6f71d
JM
1796}
1797
f6ac5f3d
PA
1798void
1799procfs_target::detach (inferior *inf, int from_tty)
c3f6f71d 1800{
e99b03dc 1801 int pid = inferior_ptid.pid ();
cc377e6b 1802
c3f6f71d 1803 if (from_tty)
c906108c 1804 {
995816ba 1805 const char *exec_file;
cc377e6b 1806
c3f6f71d 1807 exec_file = get_exec_file (0);
cc377e6b 1808 if (exec_file == NULL)
c3f6f71d 1809 exec_file = "";
cc377e6b 1810
a3f17187 1811 printf_filtered (_("Detaching from program: %s, %s\n"), exec_file,
a068643d 1812 target_pid_to_str (ptid_t (pid)).c_str ());
c906108c 1813 }
19958708 1814
6bd6f3b6 1815 do_detach ();
cc377e6b 1816
7fb43e53 1817 switch_to_no_thread ();
b7a08269 1818 detach_inferior (inf);
f6ac5f3d 1819 maybe_unpush_target ();
c906108c
SS
1820}
1821
7fb43e53 1822static void
39f77062 1823do_attach (ptid_t ptid)
c906108c 1824{
c3f6f71d 1825 procinfo *pi;
181e7f93 1826 struct inferior *inf;
c3f6f71d 1827 int fail;
2689673f 1828 int lwpid;
c3f6f71d 1829
c475f569
RO
1830 pi = create_procinfo (ptid.pid (), 0);
1831 if (pi == NULL)
8a3fe4f8 1832 perror (_("procfs: out of memory in 'attach'"));
c3f6f71d
JM
1833
1834 if (!open_procinfo_files (pi, FD_CTL))
1835 {
1836 fprintf_filtered (gdb_stderr, "procfs:%d -- ", __LINE__);
c475f569
RO
1837 xsnprintf (errmsg, sizeof (errmsg),
1838 "do_attach: couldn't open /proc file for process %d",
1839 ptid.pid ());
c3f6f71d
JM
1840 dead_procinfo (pi, errmsg, NOKILL);
1841 }
c906108c 1842
c3f6f71d
JM
1843 /* Stop the process (if it isn't already stopped). */
1844 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
c906108c 1845 {
c3f6f71d
JM
1846 pi->was_stopped = 1;
1847 proc_prettyprint_why (proc_why (pi), proc_what (pi), 1);
c906108c
SS
1848 }
1849 else
1850 {
c3f6f71d
JM
1851 pi->was_stopped = 0;
1852 /* Set the process to run again when we close it. */
1853 if (!proc_set_run_on_last_close (pi))
1854 dead_procinfo (pi, "do_attach: couldn't set RLC.", NOKILL);
1855
0df8b418 1856 /* Now stop the process. */
c3f6f71d
JM
1857 if (!proc_stop_process (pi))
1858 dead_procinfo (pi, "do_attach: couldn't stop the process.", NOKILL);
1859 pi->ignore_next_sigstop = 1;
c906108c 1860 }
c3f6f71d
JM
1861 /* Save some of the /proc state to be restored if we detach. */
1862 if (!proc_get_traced_faults (pi, &pi->saved_fltset))
1863 dead_procinfo (pi, "do_attach: couldn't save traced faults.", NOKILL);
1864 if (!proc_get_traced_signals (pi, &pi->saved_sigset))
1865 dead_procinfo (pi, "do_attach: couldn't save traced signals.", NOKILL);
37de36c6 1866 if (!proc_get_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d
JM
1867 dead_procinfo (pi, "do_attach: couldn't save traced syscall entries.",
1868 NOKILL);
37de36c6 1869 if (!proc_get_traced_sysexit (pi, pi->saved_exitset))
19958708 1870 dead_procinfo (pi, "do_attach: couldn't save traced syscall exits.",
c3f6f71d
JM
1871 NOKILL);
1872 if (!proc_get_held_signals (pi, &pi->saved_sighold))
1873 dead_procinfo (pi, "do_attach: couldn't save held signals.", NOKILL);
1874
c475f569
RO
1875 fail = procfs_debug_inferior (pi);
1876 if (fail != 0)
c3f6f71d
JM
1877 dead_procinfo (pi, "do_attach: failed in procfs_debug_inferior", NOKILL);
1878
6c95b8df
PA
1879 inf = current_inferior ();
1880 inferior_appeared (inf, pi->pid);
c3f6f71d 1881 /* Let GDB know that the inferior was attached. */
181e7f93 1882 inf->attach_flag = 1;
2689673f
PA
1883
1884 /* Create a procinfo for the current lwp. */
1885 lwpid = proc_get_current_thread (pi);
1886 create_procinfo (pi->pid, lwpid);
1887
1888 /* Add it to gdb's thread list. */
fd79271b 1889 ptid = ptid_t (pi->pid, lwpid, 0);
7fb43e53
PA
1890 thread_info *thr = add_thread (&the_procfs_target, ptid);
1891 switch_to_thread (thr);
c906108c
SS
1892}
1893
1894static void
6bd6f3b6 1895do_detach ()
c906108c 1896{
c3f6f71d 1897 procinfo *pi;
c906108c 1898
0df8b418 1899 /* Find procinfo for the main process. */
e99b03dc 1900 pi = find_procinfo_or_die (inferior_ptid.pid (),
dfd4cc63 1901 0); /* FIXME: threads */
c5aa993b 1902
c3f6f71d
JM
1903 if (!proc_set_traced_signals (pi, &pi->saved_sigset))
1904 proc_warn (pi, "do_detach, set_traced_signal", __LINE__);
c906108c 1905
c3f6f71d
JM
1906 if (!proc_set_traced_faults (pi, &pi->saved_fltset))
1907 proc_warn (pi, "do_detach, set_traced_faults", __LINE__);
1908
37de36c6 1909 if (!proc_set_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d
JM
1910 proc_warn (pi, "do_detach, set_traced_sysentry", __LINE__);
1911
37de36c6 1912 if (!proc_set_traced_sysexit (pi, pi->saved_exitset))
c3f6f71d
JM
1913 proc_warn (pi, "do_detach, set_traced_sysexit", __LINE__);
1914
1915 if (!proc_set_held_signals (pi, &pi->saved_sighold))
1916 proc_warn (pi, "do_detach, set_held_signals", __LINE__);
1917
6bd6f3b6
SM
1918 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
1919 if (!(pi->was_stopped)
1920 || query (_("Was stopped when attached, make it runnable again? ")))
c3f6f71d
JM
1921 {
1922 /* Clear any pending signal. */
1923 if (!proc_clear_current_fault (pi))
1924 proc_warn (pi, "do_detach, clear_current_fault", __LINE__);
1925
6bd6f3b6 1926 if (!proc_clear_current_signal (pi))
1a303dec
MS
1927 proc_warn (pi, "do_detach, clear_current_signal", __LINE__);
1928
c3f6f71d
JM
1929 if (!proc_set_run_on_last_close (pi))
1930 proc_warn (pi, "do_detach, set_rlc", __LINE__);
1931 }
1932
c3f6f71d 1933 destroy_procinfo (pi);
c906108c
SS
1934}
1935
772cf8be
MK
1936/* Fetch register REGNUM from the inferior. If REGNUM is -1, do this
1937 for all registers.
1938
772cf8be
MK
1939 NOTE: Since the /proc interface cannot give us individual
1940 registers, we pay no attention to REGNUM, and just fetch them all.
1941 This results in the possibility that we will do unnecessarily many
1942 fetches, since we may be called repeatedly for individual
1943 registers. So we cache the results, and mark the cache invalid
1944 when the process is resumed. */
c3f6f71d 1945
f6ac5f3d
PA
1946void
1947procfs_target::fetch_registers (struct regcache *regcache, int regnum)
c906108c 1948{
772cf8be
MK
1949 gdb_gregset_t *gregs;
1950 procinfo *pi;
222312d3 1951 ptid_t ptid = regcache->ptid ();
e99b03dc 1952 int pid = ptid.pid ();
e38504b3 1953 int tid = ptid.lwp ();
ac7936df 1954 struct gdbarch *gdbarch = regcache->arch ();
c3f6f71d 1955
2689673f 1956 pi = find_procinfo_or_die (pid, tid);
c3f6f71d
JM
1957
1958 if (pi == NULL)
8a3fe4f8 1959 error (_("procfs: fetch_registers failed to find procinfo for %s"),
a068643d 1960 target_pid_to_str (ptid).c_str ());
c3f6f71d 1961
772cf8be
MK
1962 gregs = proc_get_gregs (pi);
1963 if (gregs == NULL)
c3f6f71d
JM
1964 proc_error (pi, "fetch_registers, get_gregs", __LINE__);
1965
56be3814 1966 supply_gregset (regcache, (const gdb_gregset_t *) gregs);
c3f6f71d 1967
40a6adc1 1968 if (gdbarch_fp0_regnum (gdbarch) >= 0) /* Do we have an FPU? */
60054393 1969 {
772cf8be
MK
1970 gdb_fpregset_t *fpregs;
1971
40a6adc1
MD
1972 if ((regnum >= 0 && regnum < gdbarch_fp0_regnum (gdbarch))
1973 || regnum == gdbarch_pc_regnum (gdbarch)
1974 || regnum == gdbarch_sp_regnum (gdbarch))
772cf8be 1975 return; /* Not a floating point register. */
c5aa993b 1976
772cf8be
MK
1977 fpregs = proc_get_fpregs (pi);
1978 if (fpregs == NULL)
60054393 1979 proc_error (pi, "fetch_registers, get_fpregs", __LINE__);
c906108c 1980
56be3814 1981 supply_fpregset (regcache, (const gdb_fpregset_t *) fpregs);
60054393 1982 }
c906108c
SS
1983}
1984
772cf8be
MK
1985/* Store register REGNUM back into the inferior. If REGNUM is -1, do
1986 this for all registers.
1987
1988 NOTE: Since the /proc interface will not read individual registers,
1989 we will cache these requests until the process is resumed, and only
1990 then write them back to the inferior process.
77382aee 1991
772cf8be
MK
1992 FIXME: is that a really bad idea? Have to think about cases where
1993 writing one register might affect the value of others, etc. */
c906108c 1994
f6ac5f3d
PA
1995void
1996procfs_target::store_registers (struct regcache *regcache, int regnum)
c3f6f71d 1997{
772cf8be
MK
1998 gdb_gregset_t *gregs;
1999 procinfo *pi;
222312d3 2000 ptid_t ptid = regcache->ptid ();
e99b03dc 2001 int pid = ptid.pid ();
e38504b3 2002 int tid = ptid.lwp ();
ac7936df 2003 struct gdbarch *gdbarch = regcache->arch ();
c3f6f71d 2004
2689673f 2005 pi = find_procinfo_or_die (pid, tid);
c3f6f71d
JM
2006
2007 if (pi == NULL)
8a3fe4f8 2008 error (_("procfs: store_registers: failed to find procinfo for %s"),
a068643d 2009 target_pid_to_str (ptid).c_str ());
c906108c 2010
772cf8be
MK
2011 gregs = proc_get_gregs (pi);
2012 if (gregs == NULL)
c3f6f71d 2013 proc_error (pi, "store_registers, get_gregs", __LINE__);
c906108c 2014
56be3814 2015 fill_gregset (regcache, gregs, regnum);
c3f6f71d
JM
2016 if (!proc_set_gregs (pi))
2017 proc_error (pi, "store_registers, set_gregs", __LINE__);
c906108c 2018
40a6adc1 2019 if (gdbarch_fp0_regnum (gdbarch) >= 0) /* Do we have an FPU? */
60054393 2020 {
772cf8be
MK
2021 gdb_fpregset_t *fpregs;
2022
40a6adc1
MD
2023 if ((regnum >= 0 && regnum < gdbarch_fp0_regnum (gdbarch))
2024 || regnum == gdbarch_pc_regnum (gdbarch)
2025 || regnum == gdbarch_sp_regnum (gdbarch))
772cf8be 2026 return; /* Not a floating point register. */
60054393 2027
772cf8be
MK
2028 fpregs = proc_get_fpregs (pi);
2029 if (fpregs == NULL)
60054393
MS
2030 proc_error (pi, "store_registers, get_fpregs", __LINE__);
2031
56be3814 2032 fill_fpregset (regcache, fpregs, regnum);
60054393
MS
2033 if (!proc_set_fpregs (pi))
2034 proc_error (pi, "store_registers, set_fpregs", __LINE__);
2035 }
c3f6f71d 2036}
c906108c 2037
77382aee
PA
2038/* Retrieve the next stop event from the child process. If child has
2039 not stopped yet, wait for it to stop. Translate /proc eventcodes
2040 (or possibly wait eventcodes) into gdb internal event codes.
2041 Returns the id of process (and possibly thread) that incurred the
2042 event. Event codes are returned through a pointer parameter. */
c906108c 2043
f6ac5f3d
PA
2044ptid_t
2045procfs_target::wait (ptid_t ptid, struct target_waitstatus *status,
b60cea74 2046 target_wait_flags options)
c906108c 2047{
0df8b418 2048 /* First cut: loosely based on original version 2.1. */
c3f6f71d 2049 procinfo *pi;
39f77062
KB
2050 int wstat;
2051 int temp_tid;
2052 ptid_t retval, temp_ptid;
c3f6f71d
JM
2053 int why, what, flags;
2054 int retry = 0;
c906108c 2055
c3f6f71d 2056wait_again:
c906108c 2057
c3f6f71d
JM
2058 retry++;
2059 wstat = 0;
f2907e49 2060 retval = ptid_t (-1);
c906108c 2061
0df8b418 2062 /* Find procinfo for main process. */
f8098322
PA
2063
2064 /* procfs_target currently only supports one inferior. */
2065 inferior *inf = current_inferior ();
2066
2067 pi = find_procinfo_or_die (inf->pid, 0);
c3f6f71d 2068 if (pi)
c906108c 2069 {
0df8b418 2070 /* We must assume that the status is stale now... */
c3f6f71d
JM
2071 pi->status_valid = 0;
2072 pi->gregs_valid = 0;
2073 pi->fpregs_valid = 0;
2074
0df8b418 2075#if 0 /* just try this out... */
c3f6f71d
JM
2076 flags = proc_flags (pi);
2077 why = proc_why (pi);
2078 if ((flags & PR_STOPPED) && (why == PR_REQUESTED))
0df8b418 2079 pi->status_valid = 0; /* re-read again, IMMEDIATELY... */
c3f6f71d
JM
2080#endif
2081 /* If child is not stopped, wait for it to stop. */
c475f569
RO
2082 if (!(proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
2083 && !proc_wait_for_stop (pi))
c906108c 2084 {
0df8b418 2085 /* wait_for_stop failed: has the child terminated? */
c3f6f71d 2086 if (errno == ENOENT)
c906108c 2087 {
39f77062
KB
2088 int wait_retval;
2089
0df8b418 2090 /* /proc file not found; presumably child has terminated. */
f6ac5f3d 2091 wait_retval = ::wait (&wstat); /* "wait" for the child's exit. */
c3f6f71d 2092
dfd4cc63 2093 /* Wrong child? */
f8098322 2094 if (wait_retval != inf->pid)
3e43a32a
MS
2095 error (_("procfs: couldn't stop "
2096 "process %d: wait returned %d."),
f8098322 2097 inf->pid, wait_retval);
c3f6f71d 2098 /* FIXME: might I not just use waitpid?
0df8b418 2099 Or try find_procinfo to see if I know about this child? */
f2907e49 2100 retval = ptid_t (wait_retval);
c906108c 2101 }
d1566ff5
FN
2102 else if (errno == EINTR)
2103 goto wait_again;
c3f6f71d 2104 else
c906108c 2105 {
0df8b418 2106 /* Unknown error from wait_for_stop. */
c3f6f71d 2107 proc_error (pi, "target_wait (wait_for_stop)", __LINE__);
c906108c 2108 }
c3f6f71d
JM
2109 }
2110 else
2111 {
2112 /* This long block is reached if either:
2113 a) the child was already stopped, or
2114 b) we successfully waited for the child with wait_for_stop.
2115 This block will analyze the /proc status, and translate it
2116 into a waitstatus for GDB.
2117
2118 If we actually had to call wait because the /proc file
19958708 2119 is gone (child terminated), then we skip this block,
c3f6f71d
JM
2120 because we already have a waitstatus. */
2121
2122 flags = proc_flags (pi);
2123 why = proc_why (pi);
2124 what = proc_what (pi);
2125
c3f6f71d 2126 if (flags & (PR_STOPPED | PR_ISTOP))
c906108c 2127 {
c3f6f71d
JM
2128 /* If it's running async (for single_thread control),
2129 set it back to normal again. */
2130 if (flags & PR_ASYNC)
2131 if (!proc_unset_async (pi))
2132 proc_error (pi, "target_wait, unset_async", __LINE__);
c3f6f71d
JM
2133
2134 if (info_verbose)
2135 proc_prettyprint_why (why, what, 1);
2136
2137 /* The 'pid' we will return to GDB is composed of
2138 the process ID plus the lwp ID. */
fd79271b 2139 retval = ptid_t (pi->pid, proc_get_current_thread (pi), 0);
c3f6f71d
JM
2140
2141 switch (why) {
2142 case PR_SIGNALLED:
2143 wstat = (what << 8) | 0177;
2144 break;
2145 case PR_SYSENTRY:
196535a6 2146 if (what == SYS_lwp_exit)
c3f6f71d 2147 {
17faa917
DJ
2148 if (print_thread_events)
2149 printf_unfiltered (_("[%s exited]\n"),
a068643d 2150 target_pid_to_str (retval).c_str ());
5b6d1e4f 2151 delete_thread (find_thread_ptid (this, retval));
f8098322
PA
2152 target_continue_no_signal (ptid);
2153 goto wait_again;
37de36c6 2154 }
196535a6 2155 else if (what == SYS_exit)
37de36c6 2156 {
0df8b418 2157 /* Handle SYS_exit call only. */
37de36c6 2158 /* Stopped at entry to SYS_exit.
19958708 2159 Make it runnable, resume it, then use
37de36c6 2160 the wait system call to get its exit code.
19958708 2161 Proc_run_process always clears the current
37de36c6
KB
2162 fault and signal.
2163 Then return its exit status. */
2164 pi->status_valid = 0;
2165 wstat = 0;
19958708 2166 /* FIXME: what we should do is return
37de36c6
KB
2167 TARGET_WAITKIND_SPURIOUS. */
2168 if (!proc_run_process (pi, 0, 0))
2169 proc_error (pi, "target_wait, run_process", __LINE__);
181e7f93 2170
181e7f93 2171 if (inf->attach_flag)
c3f6f71d 2172 {
19958708 2173 /* Don't call wait: simulate waiting for exit,
37de36c6
KB
2174 return a "success" exit code. Bogus: what if
2175 it returns something else? */
2176 wstat = 0;
f8098322 2177 retval = ptid_t (inf->pid); /* ? ? ? */
37de36c6
KB
2178 }
2179 else
2180 {
f6ac5f3d 2181 int temp = ::wait (&wstat);
37de36c6
KB
2182
2183 /* FIXME: shouldn't I make sure I get the right
2184 event from the right process? If (for
2185 instance) I have killed an earlier inferior
2186 process but failed to clean up after it
2187 somehow, I could get its termination event
2188 here. */
2189
0df8b418
MS
2190 /* If wait returns -1, that's what we return
2191 to GDB. */
37de36c6 2192 if (temp < 0)
f2907e49 2193 retval = ptid_t (temp);
c3f6f71d 2194 }
c3f6f71d 2195 }
37de36c6
KB
2196 else
2197 {
a3f17187 2198 printf_filtered (_("procfs: trapped on entry to "));
37de36c6
KB
2199 proc_prettyprint_syscall (proc_what (pi), 0);
2200 printf_filtered ("\n");
44122162
RO
2201
2202 long i, nsysargs, *sysargs;
2203
c475f569
RO
2204 nsysargs = proc_nsysarg (pi);
2205 sysargs = proc_sysargs (pi);
2206
2207 if (nsysargs > 0 && sysargs != NULL)
44122162
RO
2208 {
2209 printf_filtered (_("%ld syscall arguments:\n"),
2210 nsysargs);
2211 for (i = 0; i < nsysargs; i++)
2212 printf_filtered ("#%ld: 0x%08lx\n",
2213 i, sysargs[i]);
2214 }
2215
f8098322
PA
2216 /* How to keep going without returning to wfi: */
2217 target_continue_no_signal (ptid);
2218 goto wait_again;
37de36c6
KB
2219 }
2220 break;
2221 case PR_SYSEXIT:
196535a6 2222 if (what == SYS_execve)
c3f6f71d 2223 {
37de36c6
KB
2224 /* Hopefully this is our own "fork-child" execing
2225 the real child. Hoax this event into a trap, and
2226 GDB will see the child about to execute its start
0df8b418 2227 address. */
37de36c6
KB
2228 wstat = (SIGTRAP << 8) | 0177;
2229 }
196535a6 2230 else if (what == SYS_lwp_create)
37de36c6 2231 {
77382aee
PA
2232 /* This syscall is somewhat like fork/exec. We
2233 will get the event twice: once for the parent
2234 LWP, and once for the child. We should already
2235 know about the parent LWP, but the child will
2236 be new to us. So, whenever we get this event,
2237 if it represents a new thread, simply add the
2238 thread to the list. */
c3f6f71d 2239
37de36c6 2240 /* If not in procinfo list, add it. */
39f77062
KB
2241 temp_tid = proc_get_current_thread (pi);
2242 if (!find_procinfo (pi->pid, temp_tid))
2243 create_procinfo (pi->pid, temp_tid);
37de36c6 2244
fd79271b 2245 temp_ptid = ptid_t (pi->pid, temp_tid, 0);
37de36c6 2246 /* If not in GDB's thread list, add it. */
5b6d1e4f
PA
2247 if (!in_thread_list (this, temp_ptid))
2248 add_thread (this, temp_ptid);
93815fbf 2249
f8098322
PA
2250 target_continue_no_signal (ptid);
2251 goto wait_again;
37de36c6 2252 }
196535a6 2253 else if (what == SYS_lwp_exit)
37de36c6 2254 {
17faa917
DJ
2255 if (print_thread_events)
2256 printf_unfiltered (_("[%s exited]\n"),
a068643d 2257 target_pid_to_str (retval).c_str ());
5b6d1e4f 2258 delete_thread (find_thread_ptid (this, retval));
37de36c6
KB
2259 status->kind = TARGET_WAITKIND_SPURIOUS;
2260 return retval;
c3f6f71d 2261 }
37de36c6
KB
2262 else
2263 {
a3f17187 2264 printf_filtered (_("procfs: trapped on exit from "));
37de36c6
KB
2265 proc_prettyprint_syscall (proc_what (pi), 0);
2266 printf_filtered ("\n");
44122162
RO
2267
2268 long i, nsysargs, *sysargs;
2269
c475f569
RO
2270 nsysargs = proc_nsysarg (pi);
2271 sysargs = proc_sysargs (pi);
2272
2273 if (nsysargs > 0 && sysargs != NULL)
44122162
RO
2274 {
2275 printf_filtered (_("%ld syscall arguments:\n"),
2276 nsysargs);
2277 for (i = 0; i < nsysargs; i++)
2278 printf_filtered ("#%ld: 0x%08lx\n",
2279 i, sysargs[i]);
2280 }
2281
f8098322
PA
2282 target_continue_no_signal (ptid);
2283 goto wait_again;
37de36c6 2284 }
c3f6f71d
JM
2285 break;
2286 case PR_REQUESTED:
2287#if 0 /* FIXME */
2288 wstat = (SIGSTOP << 8) | 0177;
2289 break;
2290#else
2291 if (retry < 5)
2292 {
a3f17187 2293 printf_filtered (_("Retry #%d:\n"), retry);
c3f6f71d
JM
2294 pi->status_valid = 0;
2295 goto wait_again;
2296 }
2297 else
2298 {
2299 /* If not in procinfo list, add it. */
39f77062
KB
2300 temp_tid = proc_get_current_thread (pi);
2301 if (!find_procinfo (pi->pid, temp_tid))
2302 create_procinfo (pi->pid, temp_tid);
c3f6f71d
JM
2303
2304 /* If not in GDB's thread list, add it. */
fd79271b 2305 temp_ptid = ptid_t (pi->pid, temp_tid, 0);
5b6d1e4f
PA
2306 if (!in_thread_list (this, temp_ptid))
2307 add_thread (this, temp_ptid);
c3f6f71d
JM
2308
2309 status->kind = TARGET_WAITKIND_STOPPED;
b196bc4c 2310 status->value.sig = GDB_SIGNAL_0;
c3f6f71d
JM
2311 return retval;
2312 }
2313#endif
2314 case PR_JOBCONTROL:
2315 wstat = (what << 8) | 0177;
2316 break;
2317 case PR_FAULTED:
7a289707
RO
2318 {
2319 int signo = pi->prstatus.pr_lwp.pr_info.si_signo;
2320 if (signo != 0)
2321 wstat = (signo << 8) | 0177;
c3f6f71d 2322 }
7a289707 2323 break;
c3f6f71d
JM
2324 default: /* switch (why) unmatched */
2325 printf_filtered ("procfs:%d -- ", __LINE__);
a3f17187 2326 printf_filtered (_("child stopped for unknown reason:\n"));
c3f6f71d 2327 proc_prettyprint_why (why, what, 1);
8a3fe4f8 2328 error (_("... giving up..."));
c3f6f71d
JM
2329 break;
2330 }
77382aee
PA
2331 /* Got this far without error: If retval isn't in the
2332 threads database, add it. */
c475f569 2333 if (retval.pid () > 0
5b6d1e4f 2334 && !in_thread_list (this, retval))
c906108c 2335 {
77382aee
PA
2336 /* We have a new thread. We need to add it both to
2337 GDB's list and to our own. If we don't create a
2338 procinfo, resume may be unhappy later. */
5b6d1e4f 2339 add_thread (this, retval);
e99b03dc 2340 if (find_procinfo (retval.pid (),
e38504b3 2341 retval.lwp ()) == NULL)
e99b03dc 2342 create_procinfo (retval.pid (),
e38504b3 2343 retval.lwp ());
c906108c 2344 }
c906108c 2345 }
0df8b418 2346 else /* Flags do not indicate STOPPED. */
c906108c 2347 {
0df8b418 2348 /* surely this can't happen... */
c3f6f71d
JM
2349 printf_filtered ("procfs:%d -- process not stopped.\n",
2350 __LINE__);
2351 proc_prettyprint_flags (flags, 1);
8a3fe4f8 2352 error (_("procfs: ...giving up..."));
c906108c 2353 }
c906108c 2354 }
c906108c 2355
c3f6f71d
JM
2356 if (status)
2357 store_waitstatus (status, wstat);
c906108c
SS
2358 }
2359
c3f6f71d
JM
2360 return retval;
2361}
c906108c 2362
4e73f23d
RM
2363/* Perform a partial transfer to/from the specified object. For
2364 memory transfers, fall back to the old memory xfer functions. */
2365
f6ac5f3d
PA
2366enum target_xfer_status
2367procfs_target::xfer_partial (enum target_object object,
2368 const char *annex, gdb_byte *readbuf,
2369 const gdb_byte *writebuf, ULONGEST offset,
2370 ULONGEST len, ULONGEST *xfered_len)
4e73f23d
RM
2371{
2372 switch (object)
2373 {
2374 case TARGET_OBJECT_MEMORY:
e96027e0 2375 return procfs_xfer_memory (readbuf, writebuf, offset, len, xfered_len);
4e73f23d 2376
4e73f23d 2377 case TARGET_OBJECT_AUXV:
f6ac5f3d 2378 return memory_xfer_auxv (this, object, annex, readbuf, writebuf,
9b409511 2379 offset, len, xfered_len);
4e73f23d
RM
2380
2381 default:
4360561f
TT
2382 return this->beneath ()->xfer_partial (object, annex,
2383 readbuf, writebuf, offset, len,
2384 xfered_len);
4e73f23d
RM
2385 }
2386}
2387
e96027e0
PA
2388/* Helper for procfs_xfer_partial that handles memory transfers.
2389 Arguments are like target_xfer_partial. */
4e73f23d 2390
e96027e0
PA
2391static enum target_xfer_status
2392procfs_xfer_memory (gdb_byte *readbuf, const gdb_byte *writebuf,
2393 ULONGEST memaddr, ULONGEST len, ULONGEST *xfered_len)
c3f6f71d
JM
2394{
2395 procinfo *pi;
e96027e0 2396 int nbytes;
c906108c 2397
0df8b418 2398 /* Find procinfo for main process. */
e99b03dc 2399 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c475f569 2400 if (pi->as_fd == 0 && open_procinfo_files (pi, FD_AS) == 0)
c906108c 2401 {
c3f6f71d 2402 proc_warn (pi, "xfer_memory, open_proc_files", __LINE__);
e96027e0 2403 return TARGET_XFER_E_IO;
c906108c 2404 }
c906108c 2405
e96027e0
PA
2406 if (lseek (pi->as_fd, (off_t) memaddr, SEEK_SET) != (off_t) memaddr)
2407 return TARGET_XFER_E_IO;
2408
2409 if (writebuf != NULL)
c906108c 2410 {
e96027e0
PA
2411 PROCFS_NOTE ("write memory:\n");
2412 nbytes = write (pi->as_fd, writebuf, len);
2413 }
2414 else
2415 {
2416 PROCFS_NOTE ("read memory:\n");
2417 nbytes = read (pi->as_fd, readbuf, len);
c906108c 2418 }
e96027e0
PA
2419 if (nbytes <= 0)
2420 return TARGET_XFER_E_IO;
2421 *xfered_len = nbytes;
2422 return TARGET_XFER_OK;
c906108c
SS
2423}
2424
77382aee
PA
2425/* Called by target_resume before making child runnable. Mark cached
2426 registers and status's invalid. If there are "dirty" caches that
2427 need to be written back to the child process, do that.
c906108c 2428
77382aee
PA
2429 File descriptors are also cached. As they are a limited resource,
2430 we cannot hold onto them indefinitely. However, as they are
2431 expensive to open, we don't want to throw them away
85102364 2432 indiscriminately either. As a compromise, we will keep the file
77382aee
PA
2433 descriptors for the parent process, but discard any file
2434 descriptors we may have accumulated for the threads.
2435
2436 As this function is called by iterate_over_threads, it always
2437 returns zero (so that iterate_over_threads will keep
2438 iterating). */
c3f6f71d
JM
2439
2440static int
fba45db2 2441invalidate_cache (procinfo *parent, procinfo *pi, void *ptr)
c906108c 2442{
77382aee
PA
2443 /* About to run the child; invalidate caches and do any other
2444 cleanup. */
c906108c 2445
c3f6f71d 2446 if (parent != NULL)
c906108c 2447 {
c3f6f71d 2448 /* The presence of a parent indicates that this is an LWP.
19958708 2449 Close any file descriptors that it might have open.
c3f6f71d
JM
2450 We don't do this to the master (parent) procinfo. */
2451
2452 close_procinfo_files (pi);
c906108c 2453 }
c3f6f71d
JM
2454 pi->gregs_valid = 0;
2455 pi->fpregs_valid = 0;
c3f6f71d
JM
2456 pi->status_valid = 0;
2457 pi->threads_valid = 0;
c906108c 2458
c3f6f71d 2459 return 0;
c906108c
SS
2460}
2461
77382aee
PA
2462/* Make the child process runnable. Normally we will then call
2463 procfs_wait and wait for it to stop again (unless gdb is async).
2464
2465 If STEP is true, then arrange for the child to stop again after
2466 executing a single instruction. If SIGNO is zero, then cancel any
2467 pending signal; if non-zero, then arrange for the indicated signal
2468 to be delivered to the child when it runs. If PID is -1, then
2469 allow any child thread to run; if non-zero, then allow only the
2470 indicated thread to run. (not implemented yet). */
c906108c 2471
f6ac5f3d
PA
2472void
2473procfs_target::resume (ptid_t ptid, int step, enum gdb_signal signo)
c906108c 2474{
c3f6f71d
JM
2475 procinfo *pi, *thread;
2476 int native_signo;
2477
196535a6
RO
2478 /* FIXME: Check/reword. */
2479
2480 /* prrun.prflags |= PRCFAULT; clear current fault.
2481 PRCFAULT may be replaced by a PCCFAULT call (proc_clear_current_fault)
c3f6f71d 2482 This basically leaves PRSTEP and PRCSIG.
196535a6 2483 PRCSIG is like PCSSIG (proc_clear_current_signal).
c3f6f71d 2484 So basically PR_STEP is the sole argument that must be passed
196535a6 2485 to proc_run_process. */
c3f6f71d 2486
0df8b418 2487 /* Find procinfo for main process. */
e99b03dc 2488 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c3f6f71d 2489
77382aee 2490 /* First cut: ignore pid argument. */
c3f6f71d 2491 errno = 0;
c906108c 2492
c3f6f71d 2493 /* Convert signal to host numbering. */
c475f569 2494 if (signo == 0 || (signo == GDB_SIGNAL_STOP && pi->ignore_next_sigstop))
c3f6f71d
JM
2495 native_signo = 0;
2496 else
2ea28649 2497 native_signo = gdb_signal_to_host (signo);
c906108c 2498
c3f6f71d 2499 pi->ignore_next_sigstop = 0;
c906108c 2500
77382aee
PA
2501 /* Running the process voids all cached registers and status. */
2502 /* Void the threads' caches first. */
19958708 2503 proc_iterate_over_threads (pi, invalidate_cache, NULL);
c3f6f71d
JM
2504 /* Void the process procinfo's caches. */
2505 invalidate_cache (NULL, pi, NULL);
c906108c 2506
e99b03dc 2507 if (ptid.pid () != -1)
c906108c 2508 {
77382aee
PA
2509 /* Resume a specific thread, presumably suppressing the
2510 others. */
e38504b3 2511 thread = find_procinfo (ptid.pid (), ptid.lwp ());
7de45904 2512 if (thread != NULL)
c906108c 2513 {
c3f6f71d
JM
2514 if (thread->tid != 0)
2515 {
77382aee
PA
2516 /* We're to resume a specific thread, and not the
2517 others. Set the child process's PR_ASYNC flag. */
c3f6f71d
JM
2518 if (!proc_set_async (pi))
2519 proc_error (pi, "target_resume, set_async", __LINE__);
0df8b418
MS
2520 pi = thread; /* Substitute the thread's procinfo
2521 for run. */
c3f6f71d 2522 }
c906108c
SS
2523 }
2524 }
c906108c 2525
c3f6f71d 2526 if (!proc_run_process (pi, step, native_signo))
c906108c 2527 {
c3f6f71d 2528 if (errno == EBUSY)
77382aee
PA
2529 warning (_("resume: target already running. "
2530 "Pretend to resume, and hope for the best!"));
c3f6f71d
JM
2531 else
2532 proc_error (pi, "target_resume", __LINE__);
c906108c 2533 }
c3f6f71d 2534}
c906108c 2535
77382aee 2536/* Set up to trace signals in the child process. */
c906108c 2537
f6ac5f3d 2538void
adc6a863 2539procfs_target::pass_signals (gdb::array_view<const unsigned char> pass_signals)
c3f6f71d 2540{
44122162 2541 sigset_t signals;
e99b03dc 2542 procinfo *pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
2455069d 2543 int signo;
c906108c 2544
2455069d
UW
2545 prfillset (&signals);
2546
2547 for (signo = 0; signo < NSIG; signo++)
2548 {
2ea28649 2549 int target_signo = gdb_signal_from_host (signo);
adc6a863 2550 if (target_signo < pass_signals.size () && pass_signals[target_signo])
44122162 2551 prdelset (&signals, signo);
2455069d
UW
2552 }
2553
2554 if (!proc_set_traced_signals (pi, &signals))
2555 proc_error (pi, "pass_signals", __LINE__);
c3f6f71d 2556}
c906108c 2557
77382aee 2558/* Print status information about the child process. */
c906108c 2559
f6ac5f3d
PA
2560void
2561procfs_target::files_info ()
c3f6f71d 2562{
181e7f93 2563 struct inferior *inf = current_inferior ();
f4a14ae6 2564
a3f17187 2565 printf_filtered (_("\tUsing the running image of %s %s via /proc.\n"),
181e7f93 2566 inf->attach_flag? "attached": "child",
a068643d 2567 target_pid_to_str (inferior_ptid).c_str ());
c3f6f71d 2568}
c906108c 2569
77382aee
PA
2570/* Make it die. Wait for it to die. Clean up after it. Note: this
2571 should only be applied to the real process, not to an LWP, because
2572 of the check for parent-process. If we need this to work for an
2573 LWP, it needs some more logic. */
c906108c 2574
c3f6f71d 2575static void
fba45db2 2576unconditionally_kill_inferior (procinfo *pi)
c3f6f71d
JM
2577{
2578 int parent_pid;
c906108c 2579
c3f6f71d 2580 parent_pid = proc_parent_pid (pi);
c3f6f71d 2581 if (!proc_kill (pi, SIGKILL))
103b3ef5 2582 proc_error (pi, "unconditionally_kill, proc_kill", __LINE__);
c3f6f71d 2583 destroy_procinfo (pi);
c906108c 2584
c3f6f71d
JM
2585 /* If pi is GDB's child, wait for it to die. */
2586 if (parent_pid == getpid ())
19958708 2587 /* FIXME: should we use waitpid to make sure we get the right event?
c3f6f71d
JM
2588 Should we check the returned event? */
2589 {
0d06e24b 2590#if 0
c3f6f71d 2591 int status, ret;
c906108c 2592
c3f6f71d
JM
2593 ret = waitpid (pi->pid, &status, 0);
2594#else
2595 wait (NULL);
2596#endif
2597 }
2598}
c906108c 2599
77382aee
PA
2600/* We're done debugging it, and we want it to go away. Then we want
2601 GDB to forget all about it. */
c906108c 2602
f6ac5f3d
PA
2603void
2604procfs_target::kill ()
c906108c 2605{
d7e15655 2606 if (inferior_ptid != null_ptid) /* ? */
c3f6f71d 2607 {
0df8b418 2608 /* Find procinfo for main process. */
e99b03dc 2609 procinfo *pi = find_procinfo (inferior_ptid.pid (), 0);
c906108c 2610
c3f6f71d
JM
2611 if (pi)
2612 unconditionally_kill_inferior (pi);
bc1e6c81 2613 target_mourn_inferior (inferior_ptid);
c906108c 2614 }
c3f6f71d
JM
2615}
2616
77382aee 2617/* Forget we ever debugged this thing! */
c906108c 2618
f6ac5f3d
PA
2619void
2620procfs_target::mourn_inferior ()
c3f6f71d
JM
2621{
2622 procinfo *pi;
c906108c 2623
d7e15655 2624 if (inferior_ptid != null_ptid)
c3f6f71d 2625 {
0df8b418 2626 /* Find procinfo for main process. */
e99b03dc 2627 pi = find_procinfo (inferior_ptid.pid (), 0);
c3f6f71d
JM
2628 if (pi)
2629 destroy_procinfo (pi);
c906108c 2630 }
6a3cb8e8
PA
2631
2632 generic_mourn_inferior ();
8181d85f 2633
f6ac5f3d 2634 maybe_unpush_target ();
c3f6f71d 2635}
c906108c 2636
77382aee
PA
2637/* When GDB forks to create a runnable inferior process, this function
2638 is called on the parent side of the fork. It's job is to do
2639 whatever is necessary to make the child ready to be debugged, and
2640 then wait for the child to synchronize. */
c906108c 2641
5b6d1e4f
PA
2642void
2643procfs_target::procfs_init_inferior (int pid)
c3f6f71d
JM
2644{
2645 procinfo *pi;
c3f6f71d 2646 int fail;
2689673f 2647 int lwpid;
c906108c 2648
c475f569
RO
2649 pi = create_procinfo (pid, 0);
2650 if (pi == NULL)
9b20d036 2651 perror (_("procfs: out of memory in 'init_inferior'"));
c3f6f71d
JM
2652
2653 if (!open_procinfo_files (pi, FD_CTL))
2654 proc_error (pi, "init_inferior, open_proc_files", __LINE__);
2655
2656 /*
2657 xmalloc // done
2658 open_procinfo_files // done
2659 link list // done
2660 prfillset (trace)
2661 procfs_notice_signals
2662 prfillset (fault)
2663 prdelset (FLTPAGE)
c3f6f71d
JM
2664 */
2665
77382aee 2666 /* If not stopped yet, wait for it to stop. */
c475f569 2667 if (!(proc_flags (pi) & PR_STOPPED) && !(proc_wait_for_stop (pi)))
c3f6f71d
JM
2668 dead_procinfo (pi, "init_inferior: wait_for_stop failed", KILL);
2669
2670 /* Save some of the /proc state to be restored if we detach. */
2671 /* FIXME: Why? In case another debugger was debugging it?
0df8b418 2672 We're it's parent, for Ghu's sake! */
c3f6f71d
JM
2673 if (!proc_get_traced_signals (pi, &pi->saved_sigset))
2674 proc_error (pi, "init_inferior, get_traced_signals", __LINE__);
2675 if (!proc_get_held_signals (pi, &pi->saved_sighold))
2676 proc_error (pi, "init_inferior, get_held_signals", __LINE__);
2677 if (!proc_get_traced_faults (pi, &pi->saved_fltset))
2678 proc_error (pi, "init_inferior, get_traced_faults", __LINE__);
37de36c6 2679 if (!proc_get_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d 2680 proc_error (pi, "init_inferior, get_traced_sysentry", __LINE__);
37de36c6 2681 if (!proc_get_traced_sysexit (pi, pi->saved_exitset))
c3f6f71d
JM
2682 proc_error (pi, "init_inferior, get_traced_sysexit", __LINE__);
2683
c475f569
RO
2684 fail = procfs_debug_inferior (pi);
2685 if (fail != 0)
c3f6f71d
JM
2686 proc_error (pi, "init_inferior (procfs_debug_inferior)", fail);
2687
0d06e24b
JM
2688 /* FIXME: logically, we should really be turning OFF run-on-last-close,
2689 and possibly even turning ON kill-on-last-close at this point. But
2690 I can't make that change without careful testing which I don't have
2691 time to do right now... */
c3f6f71d
JM
2692 /* Turn on run-on-last-close flag so that the child
2693 will die if GDB goes away for some reason. */
2694 if (!proc_set_run_on_last_close (pi))
2695 proc_error (pi, "init_inferior, set_RLC", __LINE__);
2696
2689673f
PA
2697 /* We now have have access to the lwpid of the main thread/lwp. */
2698 lwpid = proc_get_current_thread (pi);
2699
2700 /* Create a procinfo for the main lwp. */
2701 create_procinfo (pid, lwpid);
2702
2703 /* We already have a main thread registered in the thread table at
2704 this point, but it didn't have any lwp info yet. Notify the core
2705 about it. This changes inferior_ptid as well. */
5b6d1e4f 2706 thread_change_ptid (this, ptid_t (pid), ptid_t (pid, lwpid, 0));
c906108c 2707
2090129c 2708 gdb_startup_inferior (pid, START_INFERIOR_TRAPS_EXPECTED);
c3f6f71d 2709}
c906108c 2710
77382aee
PA
2711/* When GDB forks to create a new process, this function is called on
2712 the child side of the fork before GDB exec's the user program. Its
2713 job is to make the child minimally debuggable, so that the parent
2714 GDB process can connect to the child and take over. This function
2715 should do only the minimum to make that possible, and to
2716 synchronize with the parent process. The parent process should
2717 take care of the details. */
c3f6f71d
JM
2718
2719static void
fba45db2 2720procfs_set_exec_trap (void)
c3f6f71d
JM
2721{
2722 /* This routine called on the child side (inferior side)
2723 after GDB forks the inferior. It must use only local variables,
2724 because it may be sharing data space with its parent. */
c906108c 2725
c3f6f71d 2726 procinfo *pi;
37de36c6 2727 sysset_t *exitset;
c906108c 2728
c475f569
RO
2729 pi = create_procinfo (getpid (), 0);
2730 if (pi == NULL)
e2e0b3e5 2731 perror_with_name (_("procfs: create_procinfo failed in child."));
c906108c 2732
c3f6f71d
JM
2733 if (open_procinfo_files (pi, FD_CTL) == 0)
2734 {
2735 proc_warn (pi, "set_exec_trap, open_proc_files", __LINE__);
2736 gdb_flush (gdb_stderr);
77382aee
PA
2737 /* No need to call "dead_procinfo", because we're going to
2738 exit. */
c3f6f71d
JM
2739 _exit (127);
2740 }
c906108c 2741
c475f569 2742 exitset = XNEW (sysset_t);
44122162 2743 premptyset (exitset);
44122162 2744 praddset (exitset, SYS_execve);
37de36c6
KB
2745
2746 if (!proc_set_traced_sysexit (pi, exitset))
c906108c 2747 {
c3f6f71d
JM
2748 proc_warn (pi, "set_exec_trap, set_traced_sysexit", __LINE__);
2749 gdb_flush (gdb_stderr);
2750 _exit (127);
c906108c 2751 }
c3f6f71d 2752
0df8b418 2753 /* FIXME: should this be done in the parent instead? */
c3f6f71d
JM
2754 /* Turn off inherit on fork flag so that all grand-children
2755 of gdb start with tracing flags cleared. */
2756 if (!proc_unset_inherit_on_fork (pi))
2757 proc_warn (pi, "set_exec_trap, unset_inherit", __LINE__);
2758
2759 /* Turn off run on last close flag, so that the child process
2760 cannot run away just because we close our handle on it.
2761 We want it to wait for the parent to attach. */
2762 if (!proc_unset_run_on_last_close (pi))
2763 proc_warn (pi, "set_exec_trap, unset_RLC", __LINE__);
2764
19958708 2765 /* FIXME: No need to destroy the procinfo --
0df8b418 2766 we have our own address space, and we're about to do an exec! */
c3f6f71d 2767 /*destroy_procinfo (pi);*/
c906108c 2768}
c906108c 2769
c6d36836
RO
2770/* Dummy function to be sure fork_inferior uses fork(2) and not vfork(2).
2771 This avoids a possible deadlock gdb and its vfork'ed child. */
2772static void
2773procfs_pre_trace (void)
2774{
2775}
2776
77382aee
PA
2777/* This function is called BEFORE gdb forks the inferior process. Its
2778 only real responsibility is to set things up for the fork, and tell
2779 GDB which two functions to call after the fork (one for the parent,
2780 and one for the child).
2781
2782 This function does a complicated search for a unix shell program,
2783 which it then uses to parse arguments and environment variables to
2784 be sent to the child. I wonder whether this code could not be
2785 abstracted out and shared with other unix targets such as
2786 inf-ptrace? */
c906108c 2787
f6ac5f3d
PA
2788void
2789procfs_target::create_inferior (const char *exec_file,
2790 const std::string &allargs,
2791 char **env, int from_tty)
c906108c 2792{
974e6844 2793 const char *shell_file = get_shell ();
c906108c 2794 char *tryname;
28439f5e
PA
2795 int pid;
2796
974e6844 2797 if (strchr (shell_file, '/') == NULL)
c906108c
SS
2798 {
2799
2800 /* We will be looking down the PATH to find shell_file. If we
c3f6f71d
JM
2801 just do this the normal way (via execlp, which operates by
2802 attempting an exec for each element of the PATH until it
2803 finds one which succeeds), then there will be an exec for
2804 each failed attempt, each of which will cause a PR_SYSEXIT
2805 stop, and we won't know how to distinguish the PR_SYSEXIT's
2806 for these failed execs with the ones for successful execs
2807 (whether the exec has succeeded is stored at that time in the
2808 carry bit or some such architecture-specific and
2809 non-ABI-specified place).
2810
2811 So I can't think of anything better than to search the PATH
2812 now. This has several disadvantages: (1) There is a race
2813 condition; if we find a file now and it is deleted before we
2814 exec it, we lose, even if the deletion leaves a valid file
2815 further down in the PATH, (2) there is no way to know exactly
2816 what an executable (in the sense of "capable of being
2817 exec'd") file is. Using access() loses because it may lose
2818 if the caller is the superuser; failing to use it loses if
2819 there are ACLs or some such. */
c906108c 2820
995816ba
PA
2821 const char *p;
2822 const char *p1;
c906108c 2823 /* FIXME-maybe: might want "set path" command so user can change what
c3f6f71d 2824 path is used from within GDB. */
995816ba 2825 const char *path = getenv ("PATH");
c906108c
SS
2826 int len;
2827 struct stat statbuf;
2828
2829 if (path == NULL)
2830 path = "/bin:/usr/bin";
2831
b196bc4c 2832 tryname = (char *) alloca (strlen (path) + strlen (shell_file) + 2);
c3f6f71d 2833 for (p = path; p != NULL; p = p1 ? p1 + 1: NULL)
c906108c
SS
2834 {
2835 p1 = strchr (p, ':');
2836 if (p1 != NULL)
2837 len = p1 - p;
2838 else
2839 len = strlen (p);
2840 strncpy (tryname, p, len);
2841 tryname[len] = '\0';
2842 strcat (tryname, "/");
2843 strcat (tryname, shell_file);
2844 if (access (tryname, X_OK) < 0)
2845 continue;
2846 if (stat (tryname, &statbuf) < 0)
2847 continue;
2848 if (!S_ISREG (statbuf.st_mode))
2849 /* We certainly need to reject directories. I'm not quite
2850 as sure about FIFOs, sockets, etc., but I kind of doubt
2851 that people want to exec() these things. */
2852 continue;
2853 break;
2854 }
2855 if (p == NULL)
2856 /* Not found. This must be an error rather than merely passing
2857 the file to execlp(), because execlp() would try all the
2858 exec()s, causing GDB to get confused. */
8a3fe4f8 2859 error (_("procfs:%d -- Can't find shell %s in PATH"),
c3f6f71d 2860 __LINE__, shell_file);
c906108c
SS
2861
2862 shell_file = tryname;
2863 }
2864
c8fbd44a 2865 if (!inf->target_is_pushed (this))
02980c56 2866 current_inferior ()->push_target (this);
cf6f3e86 2867
28439f5e 2868 pid = fork_inferior (exec_file, allargs, env, procfs_set_exec_trap,
c6d36836 2869 NULL, procfs_pre_trace, shell_file, NULL);
28439f5e 2870
2090129c
SDJ
2871 /* We have something that executes now. We'll be running through
2872 the shell at this point (if startup-with-shell is true), but the
2873 pid shouldn't change. */
7fb43e53
PA
2874 thread_info *thr = add_thread_silent (this, ptid_t (pid));
2875 switch_to_thread (thr);
2090129c 2876
5b6d1e4f 2877 procfs_init_inferior (pid);
27087a3d
JB
2878}
2879
e8032dde 2880/* Callback for update_thread_list. Calls "add_thread". */
c906108c 2881
c3f6f71d 2882static int
fba45db2 2883procfs_notice_thread (procinfo *pi, procinfo *thread, void *ptr)
c906108c 2884{
fd79271b 2885 ptid_t gdb_threadid = ptid_t (pi->pid, thread->tid, 0);
c906108c 2886
5b6d1e4f 2887 thread_info *thr = find_thread_ptid (&the_procfs_target, gdb_threadid);
24bce9bb 2888 if (thr == NULL || thr->state == THREAD_EXITED)
5b6d1e4f 2889 add_thread (&the_procfs_target, gdb_threadid);
c906108c 2890
c3f6f71d
JM
2891 return 0;
2892}
2893
77382aee
PA
2894/* Query all the threads that the target knows about, and give them
2895 back to GDB to add to its list. */
c3f6f71d 2896
f6ac5f3d
PA
2897void
2898procfs_target::update_thread_list ()
c3f6f71d
JM
2899{
2900 procinfo *pi;
2901
e8032dde
PA
2902 prune_threads ();
2903
0df8b418 2904 /* Find procinfo for main process. */
e99b03dc 2905 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c3f6f71d
JM
2906 proc_update_threads (pi);
2907 proc_iterate_over_threads (pi, procfs_notice_thread, NULL);
c906108c
SS
2908}
2909
77382aee
PA
2910/* Return true if the thread is still 'alive'. This guy doesn't
2911 really seem to be doing his job. Got to investigate how to tell
2912 when a thread is really gone. */
c906108c 2913
57810aa7 2914bool
f6ac5f3d 2915procfs_target::thread_alive (ptid_t ptid)
c906108c 2916{
c3f6f71d
JM
2917 int proc, thread;
2918 procinfo *pi;
c906108c 2919
e99b03dc 2920 proc = ptid.pid ();
e38504b3 2921 thread = ptid.lwp ();
0df8b418 2922 /* If I don't know it, it ain't alive! */
c475f569
RO
2923 pi = find_procinfo (proc, thread);
2924 if (pi == NULL)
57810aa7 2925 return false;
c3f6f71d
JM
2926
2927 /* If I can't get its status, it ain't alive!
2928 What's more, I need to forget about it! */
2929 if (!proc_get_status (pi))
2930 {
2931 destroy_procinfo (pi);
57810aa7 2932 return false;
c3f6f71d 2933 }
77382aee
PA
2934 /* I couldn't have got its status if it weren't alive, so it's
2935 alive. */
57810aa7 2936 return true;
c906108c 2937}
c3f6f71d 2938
a068643d 2939/* Convert PTID to a string. */
c3f6f71d 2940
a068643d 2941std::string
f6ac5f3d 2942procfs_target::pid_to_str (ptid_t ptid)
c3f6f71d 2943{
e38504b3 2944 if (ptid.lwp () == 0)
a068643d 2945 return string_printf ("process %d", ptid.pid ());
c3f6f71d 2946 else
a068643d 2947 return string_printf ("LWP %ld", ptid.lwp ());
c3f6f71d
JM
2948}
2949
4206c05e
RO
2950/* Accepts an integer PID; Returns a string representing a file that
2951 can be opened to get the symbols for the child process. */
2952
2953char *
2954procfs_target::pid_to_exec_file (int pid)
2955{
2956 static char buf[PATH_MAX];
2957 char name[PATH_MAX];
2958
2959 /* Solaris 11 introduced /proc/<proc-id>/execname. */
c475f569 2960 xsnprintf (name, sizeof (name), "/proc/%d/execname", pid);
4206c05e
RO
2961 scoped_fd fd (gdb_open_cloexec (name, O_RDONLY, 0));
2962 if (fd.get () < 0 || read (fd.get (), buf, PATH_MAX - 1) < 0)
2963 {
2964 /* If that fails, fall back to /proc/<proc-id>/path/a.out introduced in
2965 Solaris 10. */
2966 ssize_t len;
2967
c475f569 2968 xsnprintf (name, sizeof (name), "/proc/%d/path/a.out", pid);
4206c05e
RO
2969 len = readlink (name, buf, PATH_MAX - 1);
2970 if (len <= 0)
2971 strcpy (buf, name);
2972 else
2973 buf[len] = '\0';
2974 }
2975
2976 return buf;
2977}
2978
77382aee 2979/* Insert a watchpoint. */
c3f6f71d 2980
a0911fd0 2981static int
39f77062 2982procfs_set_watchpoint (ptid_t ptid, CORE_ADDR addr, int len, int rwflag,
77382aee 2983 int after)
c906108c 2984{
c3f6f71d 2985 int pflags = 0;
19958708 2986 procinfo *pi;
c3f6f71d 2987
e99b03dc
TT
2988 pi = find_procinfo_or_die (ptid.pid () == -1 ?
2989 inferior_ptid.pid () : ptid.pid (),
dfd4cc63 2990 0);
c3f6f71d 2991
0df8b418
MS
2992 /* Translate from GDB's flags to /proc's. */
2993 if (len > 0) /* len == 0 means delete watchpoint. */
c906108c 2994 {
0df8b418 2995 switch (rwflag) { /* FIXME: need an enum! */
c3f6f71d 2996 case hw_write: /* default watchpoint (write) */
196535a6 2997 pflags = WA_WRITE;
c3f6f71d
JM
2998 break;
2999 case hw_read: /* read watchpoint */
196535a6 3000 pflags = WA_READ;
c3f6f71d
JM
3001 break;
3002 case hw_access: /* access watchpoint */
196535a6 3003 pflags = WA_READ | WA_WRITE;
c3f6f71d
JM
3004 break;
3005 case hw_execute: /* execution HW breakpoint */
196535a6 3006 pflags = WA_EXEC;
c3f6f71d 3007 break;
0df8b418 3008 default: /* Something weird. Return error. */
c906108c 3009 return -1;
c3f6f71d 3010 }
0df8b418 3011 if (after) /* Stop after r/w access is completed. */
196535a6 3012 pflags |= WA_TRAPAFTER;
c3f6f71d
JM
3013 }
3014
3015 if (!proc_set_watchpoint (pi, addr, len, pflags))
3016 {
0df8b418 3017 if (errno == E2BIG) /* Typical error for no resources. */
c3f6f71d
JM
3018 return -1; /* fail */
3019 /* GDB may try to remove the same watchpoint twice.
3020 If a remove request returns no match, don't error. */
c906108c 3021 if (errno == ESRCH && len == 0)
c3f6f71d
JM
3022 return 0; /* ignore */
3023 proc_error (pi, "set_watchpoint", __LINE__);
c906108c
SS
3024 }
3025 return 0;
3026}
3027
1e03ad20
KB
3028/* Return non-zero if we can set a hardware watchpoint of type TYPE. TYPE
3029 is one of bp_hardware_watchpoint, bp_read_watchpoint, bp_write_watchpoint,
3030 or bp_hardware_watchpoint. CNT is the number of watchpoints used so
196535a6 3031 far. */
1e03ad20 3032
f6ac5f3d
PA
3033int
3034procfs_target::can_use_hw_breakpoint (enum bptype type, int cnt, int othertype)
1e03ad20 3035{
1e03ad20
KB
3036 /* Due to the way that proc_set_watchpoint() is implemented, host
3037 and target pointers must be of the same size. If they are not,
3038 we can't use hardware watchpoints. This limitation is due to the
9a043c1d
AC
3039 fact that proc_set_watchpoint() calls
3040 procfs_address_to_host_pointer(); a close inspection of
3041 procfs_address_to_host_pointer will reveal that an internal error
3042 will be generated when the host and target pointer sizes are
3043 different. */
f5656ead 3044 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
f4a14ae6 3045
4e906f53 3046 if (sizeof (void *) != TYPE_LENGTH (ptr_type))
1e03ad20
KB
3047 return 0;
3048
3049 /* Other tests here??? */
3050
3051 return 1;
1e03ad20
KB
3052}
3053
77382aee
PA
3054/* Returns non-zero if process is stopped on a hardware watchpoint
3055 fault, else returns zero. */
c3f6f71d 3056
57810aa7 3057bool
f6ac5f3d 3058procfs_target::stopped_by_watchpoint ()
c906108c 3059{
c3f6f71d 3060 procinfo *pi;
c906108c 3061
e99b03dc 3062 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
aaeb7efa 3063
c3f6f71d 3064 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
c475f569
RO
3065 if (proc_why (pi) == PR_FAULTED)
3066 if (proc_what (pi) == FLTWATCH)
3067 return true;
57810aa7 3068 return false;
c906108c 3069}
c906108c 3070
77382aee
PA
3071/* Returns 1 if the OS knows the position of the triggered watchpoint,
3072 and sets *ADDR to that address. Returns 0 if OS cannot report that
3073 address. This function is only called if
3074 procfs_stopped_by_watchpoint returned 1, thus no further checks are
3075 done. The function also assumes that ADDR is not NULL. */
bf701c2c 3076
57810aa7 3077bool
f6ac5f3d 3078procfs_target::stopped_data_address (CORE_ADDR *addr)
bf701c2c
PM
3079{
3080 procinfo *pi;
3081
e99b03dc 3082 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
bf701c2c
PM
3083 return proc_watchpoint_address (pi, addr);
3084}
3085
f6ac5f3d
PA
3086int
3087procfs_target::insert_watchpoint (CORE_ADDR addr, int len,
3088 enum target_hw_bp_type type,
3089 struct expression *cond)
25513619 3090{
9aed480c 3091 if (!target_have_steppable_watchpoint ()
f5656ead 3092 && !gdbarch_have_nonsteppable_watchpoint (target_gdbarch ()))
c475f569
RO
3093 /* When a hardware watchpoint fires off the PC will be left at
3094 the instruction following the one which caused the
3095 watchpoint. It will *NOT* be necessary for GDB to step over
3096 the watchpoint. */
3097 return procfs_set_watchpoint (inferior_ptid, addr, len, type, 1);
25513619 3098 else
c475f569
RO
3099 /* When a hardware watchpoint fires off the PC will be left at
3100 the instruction which caused the watchpoint. It will be
3101 necessary for GDB to step over the watchpoint. */
3102 return procfs_set_watchpoint (inferior_ptid, addr, len, type, 0);
25513619
PA
3103}
3104
f6ac5f3d
PA
3105int
3106procfs_target::remove_watchpoint (CORE_ADDR addr, int len,
3107 enum target_hw_bp_type type,
3108 struct expression *cond)
25513619
PA
3109{
3110 return procfs_set_watchpoint (inferior_ptid, addr, 0, 0, 0);
3111}
3112
f6ac5f3d
PA
3113int
3114procfs_target::region_ok_for_hw_watchpoint (CORE_ADDR addr, int len)
25513619
PA
3115{
3116 /* The man page for proc(4) on Solaris 2.6 and up says that the
3117 system can support "thousands" of hardware watchpoints, but gives
3118 no method for finding out how many; It doesn't say anything about
3119 the allowed size for the watched area either. So we just tell
3120 GDB 'yes'. */
3121 return 1;
3122}
3123
77382aee
PA
3124/* Memory Mappings Functions: */
3125
3126/* Call a callback function once for each mapping, passing it the
3127 mapping, an optional secondary callback function, and some optional
3128 opaque data. Quit and return the first non-zero value returned
3129 from the callback.
3130
3131 PI is the procinfo struct for the process to be mapped. FUNC is
3132 the callback function to be called by this iterator. DATA is the
3133 optional opaque data to be passed to the callback function.
3134 CHILD_FUNC is the optional secondary function pointer to be passed
3135 to the child function. Returns the first non-zero return value
3136 from the callback function, or zero. */
831e682e
MS
3137
3138static int
b8edc417 3139iterate_over_mappings (procinfo *pi, find_memory_region_ftype child_func,
e9ef4f39 3140 void *data,
19958708 3141 int (*func) (struct prmap *map,
b8edc417 3142 find_memory_region_ftype child_func,
831e682e
MS
3143 void *data))
3144{
3145 char pathname[MAX_PROC_NAME_SIZE];
3146 struct prmap *prmaps;
3147 struct prmap *prmap;
3148 int funcstat;
831e682e 3149 int nmap;
831e682e 3150 struct stat sbuf;
831e682e 3151
19958708 3152 /* Get the number of mappings, allocate space,
831e682e 3153 and read the mappings into prmaps. */
0df8b418 3154 /* Open map fd. */
c475f569 3155 xsnprintf (pathname, sizeof (pathname), "/proc/%d/map", pi->pid);
831e682e 3156
5dc1a704
TT
3157 scoped_fd map_fd (open (pathname, O_RDONLY));
3158 if (map_fd.get () < 0)
3159 proc_error (pi, "iterate_over_mappings (open)", __LINE__);
831e682e 3160
19958708 3161 /* Use stat to determine the file size, and compute
831e682e 3162 the number of prmap_t objects it contains. */
5dc1a704 3163 if (fstat (map_fd.get (), &sbuf) != 0)
831e682e
MS
3164 proc_error (pi, "iterate_over_mappings (fstat)", __LINE__);
3165
3166 nmap = sbuf.st_size / sizeof (prmap_t);
3167 prmaps = (struct prmap *) alloca ((nmap + 1) * sizeof (*prmaps));
5dc1a704 3168 if (read (map_fd.get (), (char *) prmaps, nmap * sizeof (*prmaps))
831e682e
MS
3169 != (nmap * sizeof (*prmaps)))
3170 proc_error (pi, "iterate_over_mappings (read)", __LINE__);
831e682e
MS
3171
3172 for (prmap = prmaps; nmap > 0; prmap++, nmap--)
c475f569
RO
3173 {
3174 funcstat = (*func) (prmap, child_func, data);
3175 if (funcstat != 0)
3176 return funcstat;
3177 }
831e682e
MS
3178
3179 return 0;
3180}
3181
77382aee 3182/* Implements the to_find_memory_regions method. Calls an external
b8edc417 3183 function for each memory region.
77382aee 3184 Returns the integer value returned by the callback. */
be4d1333
MS
3185
3186static int
19958708 3187find_memory_regions_callback (struct prmap *map,
b8edc417 3188 find_memory_region_ftype func, void *data)
be4d1333 3189{
bf75638e 3190 return (*func) ((CORE_ADDR) map->pr_vaddr,
19958708 3191 map->pr_size,
be4d1333
MS
3192 (map->pr_mflags & MA_READ) != 0,
3193 (map->pr_mflags & MA_WRITE) != 0,
19958708 3194 (map->pr_mflags & MA_EXEC) != 0,
4f69f4c2 3195 1, /* MODIFIED is unknown, pass it as true. */
be4d1333
MS
3196 data);
3197}
3198
77382aee
PA
3199/* External interface. Calls a callback function once for each
3200 mapped memory region in the child process, passing as arguments:
3201
3202 CORE_ADDR virtual_address,
3203 unsigned long size,
3204 int read, TRUE if region is readable by the child
3205 int write, TRUE if region is writable by the child
3206 int execute TRUE if region is executable by the child.
3207
3208 Stops iterating and returns the first non-zero value returned by
3209 the callback. */
be4d1333 3210
f6ac5f3d
PA
3211int
3212procfs_target::find_memory_regions (find_memory_region_ftype func, void *data)
be4d1333 3213{
e99b03dc 3214 procinfo *pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
be4d1333 3215
19958708 3216 return iterate_over_mappings (pi, func, data,
be4d1333
MS
3217 find_memory_regions_callback);
3218}
3219
77382aee 3220/* Returns an ascii representation of a memory mapping's flags. */
c3f6f71d 3221
388faa48 3222static char *
5ae5f592 3223mappingflags (long flags)
388faa48
MS
3224{
3225 static char asciiflags[8];
3226
3227 strcpy (asciiflags, "-------");
388faa48
MS
3228 if (flags & MA_STACK)
3229 asciiflags[1] = 's';
3230 if (flags & MA_BREAK)
3231 asciiflags[2] = 'b';
3232 if (flags & MA_SHARED)
3233 asciiflags[3] = 's';
3234 if (flags & MA_READ)
3235 asciiflags[4] = 'r';
3236 if (flags & MA_WRITE)
3237 asciiflags[5] = 'w';
3238 if (flags & MA_EXEC)
3239 asciiflags[6] = 'x';
3240 return (asciiflags);
3241}
3242
77382aee
PA
3243/* Callback function, does the actual work for 'info proc
3244 mappings'. */
831e682e 3245
831e682e 3246static int
b8edc417 3247info_mappings_callback (struct prmap *map, find_memory_region_ftype ignore,
e9ef4f39 3248 void *unused)
831e682e 3249{
0b62613e 3250 unsigned int pr_off;
831e682e 3251
0b62613e 3252 pr_off = (unsigned int) map->pr_offset;
0b62613e 3253
f5656ead 3254 if (gdbarch_addr_bit (target_gdbarch ()) == 32)
f6a96b83 3255 printf_filtered ("\t%#10lx %#10lx %#10lx %#10x %7s\n",
0b62613e
PA
3256 (unsigned long) map->pr_vaddr,
3257 (unsigned long) map->pr_vaddr + map->pr_size - 1,
f6a96b83 3258 (unsigned long) map->pr_size,
0b62613e
PA
3259 pr_off,
3260 mappingflags (map->pr_mflags));
3261 else
f6a96b83 3262 printf_filtered (" %#18lx %#18lx %#10lx %#10x %7s\n",
0b62613e
PA
3263 (unsigned long) map->pr_vaddr,
3264 (unsigned long) map->pr_vaddr + map->pr_size - 1,
f6a96b83 3265 (unsigned long) map->pr_size,
0b62613e
PA
3266 pr_off,
3267 mappingflags (map->pr_mflags));
831e682e
MS
3268
3269 return 0;
3270}
3271
77382aee 3272/* Implement the "info proc mappings" subcommand. */
388faa48
MS
3273
3274static void
3275info_proc_mappings (procinfo *pi, int summary)
3276{
388faa48 3277 if (summary)
0df8b418 3278 return; /* No output for summary mode. */
388faa48 3279
a3f17187 3280 printf_filtered (_("Mapped address spaces:\n\n"));
f5656ead 3281 if (gdbarch_ptr_bit (target_gdbarch ()) == 32)
0b62613e
PA
3282 printf_filtered ("\t%10s %10s %10s %10s %7s\n",
3283 "Start Addr",
3284 " End Addr",
3285 " Size",
3286 " Offset",
3287 "Flags");
3288 else
3289 printf_filtered (" %18s %18s %10s %10s %7s\n",
3290 "Start Addr",
3291 " End Addr",
3292 " Size",
3293 " Offset",
3294 "Flags");
388faa48 3295
831e682e 3296 iterate_over_mappings (pi, NULL, NULL, info_mappings_callback);
388faa48
MS
3297 printf_filtered ("\n");
3298}
3299
77382aee 3300/* Implement the "info proc" command. */
c3f6f71d 3301
f6ac5f3d
PA
3302bool
3303procfs_target::info_proc (const char *args, enum info_proc_what what)
c906108c 3304{
388faa48
MS
3305 procinfo *process = NULL;
3306 procinfo *thread = NULL;
388faa48
MS
3307 char *tmp = NULL;
3308 int pid = 0;
3309 int tid = 0;
3310 int mappings = 0;
c906108c 3311
145b16a9
UW
3312 switch (what)
3313 {
3314 case IP_MINIMAL:
3315 break;
3316
3317 case IP_MAPPINGS:
3318 case IP_ALL:
3319 mappings = 1;
3320 break;
3321
3322 default:
3323 error (_("Not supported on this target."));
3324 }
3325
773a1edc 3326 gdb_argv built_argv (args);
4fa7574e 3327 for (char *arg : built_argv)
c3f6f71d 3328 {
773a1edc 3329 if (isdigit (arg[0]))
c3f6f71d 3330 {
773a1edc 3331 pid = strtoul (arg, &tmp, 10);
c3f6f71d
JM
3332 if (*tmp == '/')
3333 tid = strtoul (++tmp, NULL, 10);
3334 }
773a1edc 3335 else if (arg[0] == '/')
c3f6f71d 3336 {
773a1edc 3337 tid = strtoul (arg + 1, NULL, 10);
c3f6f71d 3338 }
c3f6f71d 3339 }
5b4cbbe3
TT
3340
3341 procinfo_up temporary_procinfo;
c3f6f71d 3342 if (pid == 0)
e99b03dc 3343 pid = inferior_ptid.pid ();
c3f6f71d 3344 if (pid == 0)
8a3fe4f8 3345 error (_("No current process: you must name one."));
c3f6f71d 3346 else
c906108c 3347 {
c3f6f71d 3348 /* Have pid, will travel.
0df8b418 3349 First see if it's a process we're already debugging. */
c3f6f71d
JM
3350 process = find_procinfo (pid, 0);
3351 if (process == NULL)
3352 {
19958708 3353 /* No. So open a procinfo for it, but
c3f6f71d
JM
3354 remember to close it again when finished. */
3355 process = create_procinfo (pid, 0);
5b4cbbe3 3356 temporary_procinfo.reset (process);
c3f6f71d
JM
3357 if (!open_procinfo_files (process, FD_CTL))
3358 proc_error (process, "info proc, open_procinfo_files", __LINE__);
3359 }
c906108c 3360 }
c3f6f71d
JM
3361 if (tid != 0)
3362 thread = create_procinfo (pid, tid);
3363
3364 if (process)
3365 {
a3f17187 3366 printf_filtered (_("process %d flags:\n"), process->pid);
c3f6f71d
JM
3367 proc_prettyprint_flags (proc_flags (process), 1);
3368 if (proc_flags (process) & (PR_STOPPED | PR_ISTOP))
3369 proc_prettyprint_why (proc_why (process), proc_what (process), 1);
3370 if (proc_get_nthreads (process) > 1)
19958708 3371 printf_filtered ("Process has %d threads.\n",
c3f6f71d
JM
3372 proc_get_nthreads (process));
3373 }
3374 if (thread)
3375 {
a3f17187 3376 printf_filtered (_("thread %d flags:\n"), thread->tid);
c3f6f71d
JM
3377 proc_prettyprint_flags (proc_flags (thread), 1);
3378 if (proc_flags (thread) & (PR_STOPPED | PR_ISTOP))
3379 proc_prettyprint_why (proc_why (thread), proc_what (thread), 1);
3380 }
3381
388faa48 3382 if (mappings)
c475f569 3383 info_proc_mappings (process, 0);
388faa48 3384
f6ac5f3d 3385 return true;
c906108c
SS
3386}
3387
9185ddce
JB
3388/* Modify the status of the system call identified by SYSCALLNUM in
3389 the set of syscalls that are currently traced/debugged.
3390
3391 If ENTRY_OR_EXIT is set to PR_SYSENTRY, then the entry syscalls set
0df8b418 3392 will be updated. Otherwise, the exit syscalls set will be updated.
9185ddce 3393
0df8b418 3394 If MODE is FLAG_SET, then traces will be enabled. Otherwise, they
9185ddce
JB
3395 will be disabled. */
3396
3397static void
3398proc_trace_syscalls_1 (procinfo *pi, int syscallnum, int entry_or_exit,
77382aee 3399 int mode, int from_tty)
9185ddce
JB
3400{
3401 sysset_t *sysset;
77382aee 3402
9185ddce
JB
3403 if (entry_or_exit == PR_SYSENTRY)
3404 sysset = proc_get_traced_sysentry (pi, NULL);
3405 else
3406 sysset = proc_get_traced_sysexit (pi, NULL);
3407
3408 if (sysset == NULL)
3409 proc_error (pi, "proc-trace, get_traced_sysset", __LINE__);
3410
3411 if (mode == FLAG_SET)
44122162 3412 praddset (sysset, syscallnum);
9185ddce 3413 else
44122162 3414 prdelset (sysset, syscallnum);
9185ddce
JB
3415
3416 if (entry_or_exit == PR_SYSENTRY)
3417 {
3418 if (!proc_set_traced_sysentry (pi, sysset))
77382aee 3419 proc_error (pi, "proc-trace, set_traced_sysentry", __LINE__);
9185ddce
JB
3420 }
3421 else
3422 {
3423 if (!proc_set_traced_sysexit (pi, sysset))
77382aee 3424 proc_error (pi, "proc-trace, set_traced_sysexit", __LINE__);
9185ddce
JB
3425 }
3426}
3427
c3f6f71d 3428static void
0b39b52e 3429proc_trace_syscalls (const char *args, int from_tty, int entry_or_exit, int mode)
c906108c 3430{
c3f6f71d 3431 procinfo *pi;
c906108c 3432
e99b03dc 3433 if (inferior_ptid.pid () <= 0)
8a3fe4f8 3434 error (_("you must be debugging a process to use this command."));
c906108c 3435
c3f6f71d 3436 if (args == NULL || args[0] == 0)
e2e0b3e5 3437 error_no_arg (_("system call to trace"));
c3f6f71d 3438
e99b03dc 3439 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c3f6f71d
JM
3440 if (isdigit (args[0]))
3441 {
9185ddce 3442 const int syscallnum = atoi (args);
c906108c 3443
9185ddce 3444 proc_trace_syscalls_1 (pi, syscallnum, entry_or_exit, mode, from_tty);
c3f6f71d
JM
3445 }
3446}
3447
19958708 3448static void
0b39b52e 3449proc_trace_sysentry_cmd (const char *args, int from_tty)
c906108c 3450{
c3f6f71d
JM
3451 proc_trace_syscalls (args, from_tty, PR_SYSENTRY, FLAG_SET);
3452}
c906108c 3453
19958708 3454static void
0b39b52e 3455proc_trace_sysexit_cmd (const char *args, int from_tty)
c3f6f71d
JM
3456{
3457 proc_trace_syscalls (args, from_tty, PR_SYSEXIT, FLAG_SET);
c906108c 3458}
c906108c 3459
19958708 3460static void
0b39b52e 3461proc_untrace_sysentry_cmd (const char *args, int from_tty)
c3f6f71d
JM
3462{
3463 proc_trace_syscalls (args, from_tty, PR_SYSENTRY, FLAG_RESET);
3464}
3465
19958708 3466static void
0b39b52e 3467proc_untrace_sysexit_cmd (const char *args, int from_tty)
c906108c 3468{
c3f6f71d
JM
3469 proc_trace_syscalls (args, from_tty, PR_SYSEXIT, FLAG_RESET);
3470}
c906108c 3471
6c265988 3472void _initialize_procfs ();
c906108c 3473void
6c265988 3474_initialize_procfs ()
c906108c 3475{
19958708 3476 add_com ("proc-trace-entry", no_class, proc_trace_sysentry_cmd,
1bedd215 3477 _("Give a trace of entries into the syscall."));
19958708 3478 add_com ("proc-trace-exit", no_class, proc_trace_sysexit_cmd,
1bedd215 3479 _("Give a trace of exits from the syscall."));
19958708 3480 add_com ("proc-untrace-entry", no_class, proc_untrace_sysentry_cmd,
1bedd215 3481 _("Cancel a trace of entries into the syscall."));
19958708 3482 add_com ("proc-untrace-exit", no_class, proc_untrace_sysexit_cmd,
1bedd215 3483 _("Cancel a trace of exits from the syscall."));
c1955e17 3484
62c808ae 3485 add_inf_child_target (&the_procfs_target);
c3f6f71d
JM
3486}
3487
3488/* =================== END, GDB "MODULE" =================== */
3489
3490
3491
77382aee
PA
3492/* miscellaneous stubs: */
3493
3494/* The following satisfy a few random symbols mostly created by the
3495 solaris threads implementation, which I will chase down later. */
c3f6f71d 3496
77382aee
PA
3497/* Return a pid for which we guarantee we will be able to find a
3498 'live' procinfo. */
c3f6f71d 3499
39f77062 3500ptid_t
fba45db2 3501procfs_first_available (void)
c3f6f71d 3502{
f2907e49 3503 return ptid_t (procinfo_list ? procinfo_list->pid : -1);
c3f6f71d 3504}
be4d1333
MS
3505
3506/* =================== GCORE .NOTE "MODULE" =================== */
3507
24f5300a 3508static void
19958708 3509procfs_do_thread_registers (bfd *obfd, ptid_t ptid,
24f5300a
SM
3510 gdb::unique_xmalloc_ptr<char> &note_data,
3511 int *note_size, enum gdb_signal stop_signal)
be4d1333 3512{
5b6d1e4f 3513 struct regcache *regcache = get_thread_regcache (&the_procfs_target, ptid);
be4d1333
MS
3514 gdb_gregset_t gregs;
3515 gdb_fpregset_t fpregs;
3516 unsigned long merged_pid;
3517
e38504b3 3518 merged_pid = ptid.lwp () << 16 | ptid.pid ();
be4d1333 3519
75125405
DJ
3520 /* This part is the old method for fetching registers.
3521 It should be replaced by the newer one using regsets
3522 once it is implemented in this platform:
29082443 3523 gdbarch_iterate_over_regset_sections(). */
75125405 3524
75125405
DJ
3525 target_fetch_registers (regcache, -1);
3526
594f7785 3527 fill_gregset (regcache, &gregs, -1);
24f5300a
SM
3528 note_data.reset (elfcore_write_lwpstatus (obfd,
3529 note_data.release (),
3530 note_size,
3531 merged_pid,
3532 stop_signal,
3533 &gregs));
594f7785 3534 fill_fpregset (regcache, &fpregs, -1);
24f5300a
SM
3535 note_data.reset (elfcore_write_prfpreg (obfd,
3536 note_data.release (),
3537 note_size,
3538 &fpregs,
3539 sizeof (fpregs)));
be4d1333
MS
3540}
3541
24f5300a
SM
3542struct procfs_corefile_thread_data
3543{
3544 procfs_corefile_thread_data (bfd *obfd,
3545 gdb::unique_xmalloc_ptr<char> &note_data,
3546 int *note_size, gdb_signal stop_signal)
3547 : obfd (obfd), note_data (note_data), note_size (note_size),
3548 stop_signal (stop_signal)
3549 {}
3550
be4d1333 3551 bfd *obfd;
24f5300a 3552 gdb::unique_xmalloc_ptr<char> &note_data;
be4d1333 3553 int *note_size;
2ea28649 3554 enum gdb_signal stop_signal;
be4d1333
MS
3555};
3556
3557static int
65554fef 3558procfs_corefile_thread_callback (procinfo *pi, procinfo *thread, void *data)
be4d1333 3559{
b196bc4c
RO
3560 struct procfs_corefile_thread_data *args
3561 = (struct procfs_corefile_thread_data *) data;
be4d1333 3562
2689673f 3563 if (pi != NULL)
be4d1333 3564 {
fd79271b 3565 ptid_t ptid = ptid_t (pi->pid, thread->tid, 0);
f4a14ae6 3566
24f5300a
SM
3567 procfs_do_thread_registers (args->obfd, ptid,
3568 args->note_data,
3569 args->note_size,
3570 args->stop_signal);
be4d1333
MS
3571 }
3572 return 0;
3573}
3574
a223f1e7
JB
3575static int
3576find_signalled_thread (struct thread_info *info, void *data)
3577{
a493e3e2 3578 if (info->suspend.stop_signal != GDB_SIGNAL_0
e99b03dc 3579 && info->ptid.pid () == inferior_ptid.pid ())
a223f1e7
JB
3580 return 1;
3581
3582 return 0;
3583}
3584
2ea28649 3585static enum gdb_signal
a223f1e7
JB
3586find_stop_signal (void)
3587{
3588 struct thread_info *info =
3589 iterate_over_threads (find_signalled_thread, NULL);
3590
3591 if (info)
16c381f0 3592 return info->suspend.stop_signal;
a223f1e7 3593 else
a493e3e2 3594 return GDB_SIGNAL_0;
a223f1e7
JB
3595}
3596
24f5300a 3597gdb::unique_xmalloc_ptr<char>
f6ac5f3d 3598procfs_target::make_corefile_notes (bfd *obfd, int *note_size)
be4d1333 3599{
be4d1333 3600 gdb_gregset_t gregs;
be4d1333
MS
3601 char fname[16] = {'\0'};
3602 char psargs[80] = {'\0'};
e99b03dc 3603 procinfo *pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
24f5300a 3604 gdb::unique_xmalloc_ptr<char> note_data;
cbaaa0ca 3605 const char *inf_args;
2ea28649 3606 enum gdb_signal stop_signal;
be4d1333
MS
3607
3608 if (get_exec_file (0))
3609 {
9f37bbcc 3610 strncpy (fname, lbasename (get_exec_file (0)), sizeof (fname));
4e2af517
JM
3611 fname[sizeof (fname) - 1] = 0;
3612 strncpy (psargs, get_exec_file (0), sizeof (psargs));
3613 psargs[sizeof (psargs) - 1] = 0;
6dbdc4a3
MS
3614
3615 inf_args = get_inferior_args ();
c475f569
RO
3616 if (inf_args && *inf_args
3617 && (strlen (inf_args)
3618 < ((int) sizeof (psargs) - (int) strlen (psargs))))
be4d1333 3619 {
19958708 3620 strncat (psargs, " ",
be4d1333 3621 sizeof (psargs) - strlen (psargs));
19958708 3622 strncat (psargs, inf_args,
be4d1333
MS
3623 sizeof (psargs) - strlen (psargs));
3624 }
3625 }
3626
24f5300a
SM
3627 note_data.reset (elfcore_write_prpsinfo (obfd,
3628 note_data.release (),
3629 note_size,
3630 fname,
3631 psargs));
be4d1333 3632
651c8d2d
PA
3633 stop_signal = find_stop_signal ();
3634
3e3420f6 3635 fill_gregset (get_current_regcache (), &gregs, -1);
24f5300a
SM
3636 note_data.reset (elfcore_write_pstatus (obfd, note_data.release (), note_size,
3637 inferior_ptid.pid (),
3638 stop_signal, &gregs));
3639
3640 procfs_corefile_thread_data thread_args (obfd, note_data, note_size,
3641 stop_signal);
3e43a32a
MS
3642 proc_iterate_over_threads (pi, procfs_corefile_thread_callback,
3643 &thread_args);
be4d1333 3644
62c808ae 3645 gdb::optional<gdb::byte_vector> auxv =
328d42d8
SM
3646 target_read_alloc (current_inferior ()->top_target (),
3647 TARGET_OBJECT_AUXV, NULL);
62c808ae 3648 if (auxv && !auxv->empty ())
24f5300a
SM
3649 note_data.reset (elfcore_write_note (obfd, note_data.release (), note_size,
3650 "CORE", NT_AUXV, auxv->data (),
3651 auxv->size ()));
4e73f23d 3652
be4d1333
MS
3653 return note_data;
3654}
be4d1333 3655/* =================== END GCORE .NOTE "MODULE" =================== */