]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/procfs.c
Remove explanatory comments from includes
[thirdparty/binutils-gdb.git] / gdb / procfs.c
CommitLineData
44122162 1/* Machine independent support for Solaris /proc (process file system) for GDB.
2555fe1a 2
213516ef 3 Copyright (C) 1999-2023 Free Software Foundation, Inc.
2555fe1a 4
c3f6f71d
JM
5 Written by Michael Snyder at Cygnus Solutions.
6 Based on work by Fred Fish, Stu Grossman, Geoff Noer, and others.
c906108c 7
a9762ec7
JB
8 This file is part of GDB.
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
14
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
21 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c 22
c3f6f71d
JM
23#include "defs.h"
24#include "inferior.h"
45741a9c 25#include "infrun.h"
c3f6f71d
JM
26#include "target.h"
27#include "gdbcore.h"
ef0f16cc 28#include "elf-bfd.h"
c3f6f71d 29#include "gdbcmd.h"
0fda6bd2 30#include "gdbthread.h"
7f7fe91e 31#include "regcache.h"
28439f5e 32#include "inf-child.h"
4fa7574e 33#include "nat/fork-inferior.h"
0d12e84c 34#include "gdbarch.h"
c906108c 35
c3f6f71d
JM
36#include <sys/procfs.h>
37#include <sys/fault.h>
38#include <sys/syscall.h>
268a13a5 39#include "gdbsupport/gdb_wait.h"
0fda6bd2
JM
40#include <signal.h>
41#include <ctype.h>
92107356 42#include "gdb_bfd.h"
4e73f23d 43#include "auxv.h"
d1a7880c 44#include "procfs.h"
76727919 45#include "observable.h"
268a13a5
TT
46#include "gdbsupport/scoped_fd.h"
47#include "gdbsupport/pathstuff.h"
5530c021 48#include "gdbsupport/buildargv.h"
0fda6bd2 49
77382aee
PA
50/* This module provides the interface between GDB and the
51 /proc file system, which is used on many versions of Unix
52 as a means for debuggers to control other processes.
53
77382aee
PA
54 /proc works by imitating a file system: you open a simulated file
55 that represents the process you wish to interact with, and perform
56 operations on that "file" in order to examine or change the state
57 of the other process.
58
59 The most important thing to know about /proc and this module is
60 that there are two very different interfaces to /proc:
61
62 One that uses the ioctl system call, and another that uses read
63 and write system calls.
64
44122162
RO
65 This module supports only the Solaris version of the read/write
66 interface. */
77382aee 67
c906108c 68#include <sys/types.h>
ef0f16cc 69#include <dirent.h>
c906108c 70
ef0f16cc
TT
71#include <fcntl.h>
72#include <unistd.h>
73#include <sys/stat.h>
c906108c 74
103b3ef5
MS
75/* Note: procfs-utils.h must be included after the above system header
76 files, because it redefines various system calls using macros.
77 This may be incompatible with the prototype declarations. */
78
103b3ef5
MS
79#include "proc-utils.h"
80
77382aee 81/* Prototypes for supply_gregset etc. */
c60c0f5f
MS
82#include "gregset.h"
83
c3f6f71d 84/* =================== TARGET_OPS "MODULE" =================== */
c906108c 85
77382aee 86/* This module defines the GDB target vector and its methods. */
c906108c 87
f6ac5f3d 88
e96027e0
PA
89static enum target_xfer_status procfs_xfer_memory (gdb_byte *,
90 const gdb_byte *,
91 ULONGEST, ULONGEST,
92 ULONGEST *);
a14ed312 93
f6ac5f3d
PA
94class procfs_target final : public inf_child_target
95{
96public:
97 void create_inferior (const char *, const std::string &,
98 char **, int) override;
99
100 void kill () override;
101
102 void mourn_inferior () override;
103
104 void attach (const char *, int) override;
105 void detach (inferior *inf, int) override;
106
107 void resume (ptid_t, int, enum gdb_signal) override;
b60cea74 108 ptid_t wait (ptid_t, struct target_waitstatus *, target_wait_flags) override;
f6ac5f3d
PA
109
110 void fetch_registers (struct regcache *, int) override;
111 void store_registers (struct regcache *, int) override;
112
113 enum target_xfer_status xfer_partial (enum target_object object,
114 const char *annex,
115 gdb_byte *readbuf,
116 const gdb_byte *writebuf,
117 ULONGEST offset, ULONGEST len,
118 ULONGEST *xfered_len) override;
119
adc6a863 120 void pass_signals (gdb::array_view<const unsigned char>) override;
a14ed312 121
f6ac5f3d 122 void files_info () override;
c3f6f71d 123
f6ac5f3d 124 void update_thread_list () override;
be4d1333 125
57810aa7 126 bool thread_alive (ptid_t ptid) override;
be4d1333 127
a068643d 128 std::string pid_to_str (ptid_t) override;
1e03ad20 129
0e90c441 130 const char *pid_to_exec_file (int pid) override;
4206c05e 131
f6ac5f3d
PA
132 thread_control_capabilities get_thread_control_capabilities () override
133 { return tc_schedlock; }
145b16a9 134
f6ac5f3d
PA
135 /* find_memory_regions support method for gcore */
136 int find_memory_regions (find_memory_region_ftype func, void *data)
137 override;
b5c8fcb1 138
24f5300a 139 gdb::unique_xmalloc_ptr<char> make_corefile_notes (bfd *, int *) override;
b5c8fcb1 140
f6ac5f3d
PA
141 bool info_proc (const char *, enum info_proc_what) override;
142
c475f569 143#if PR_MODEL_NATIVE == PR_MODEL_LP64
f4ad82b3
RO
144 int auxv_parse (const gdb_byte **readptr,
145 const gdb_byte *endptr, CORE_ADDR *typep, CORE_ADDR *valp)
f6ac5f3d
PA
146 override;
147#endif
148
57810aa7 149 bool stopped_by_watchpoint () override;
f6ac5f3d
PA
150
151 int insert_watchpoint (CORE_ADDR, int, enum target_hw_bp_type,
152 struct expression *) override;
153
154 int remove_watchpoint (CORE_ADDR, int, enum target_hw_bp_type,
155 struct expression *) override;
156
157 int region_ok_for_hw_watchpoint (CORE_ADDR, int) override;
158
159 int can_use_hw_breakpoint (enum bptype, int, int) override;
57810aa7 160 bool stopped_data_address (CORE_ADDR *) override;
5b6d1e4f
PA
161
162 void procfs_init_inferior (int pid);
f6ac5f3d 163};
b5c8fcb1 164
f6ac5f3d 165static procfs_target the_procfs_target;
b5c8fcb1 166
c475f569 167#if PR_MODEL_NATIVE == PR_MODEL_LP64
77382aee
PA
168/* When GDB is built as 64-bit application on Solaris, the auxv data
169 is presented in 64-bit format. We need to provide a custom parser
170 to handle that. */
f6ac5f3d 171int
f4ad82b3
RO
172procfs_target::auxv_parse (const gdb_byte **readptr,
173 const gdb_byte *endptr, CORE_ADDR *typep,
174 CORE_ADDR *valp)
c47ffbe3 175{
f5656ead 176 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
f4ad82b3 177 const gdb_byte *ptr = *readptr;
c47ffbe3
VP
178
179 if (endptr == ptr)
180 return 0;
77382aee 181
c47ffbe3
VP
182 if (endptr - ptr < 8 * 2)
183 return -1;
184
e17a4113 185 *typep = extract_unsigned_integer (ptr, 4, byte_order);
c47ffbe3
VP
186 ptr += 8;
187 /* The size of data is always 64-bit. If the application is 32-bit,
188 it will be zero extended, as expected. */
e17a4113 189 *valp = extract_unsigned_integer (ptr, 8, byte_order);
c47ffbe3
VP
190 ptr += 8;
191
192 *readptr = ptr;
193 return 1;
194}
195#endif
196
c3f6f71d
JM
197/* =================== END, TARGET_OPS "MODULE" =================== */
198
c3f6f71d
JM
199/* =================== STRUCT PROCINFO "MODULE" =================== */
200
201 /* FIXME: this comment will soon be out of date W.R.T. threads. */
202
203/* The procinfo struct is a wrapper to hold all the state information
204 concerning a /proc process. There should be exactly one procinfo
205 for each process, and since GDB currently can debug only one
206 process at a time, that means there should be only one procinfo.
207 All of the LWP's of a process can be accessed indirectly thru the
208 single process procinfo.
209
210 However, against the day when GDB may debug more than one process,
211 this data structure is kept in a list (which for now will hold no
212 more than one member), and many functions will have a pointer to a
213 procinfo as an argument.
214
215 There will be a separate procinfo structure for use by the (not yet
216 implemented) "info proc" command, so that we can print useful
217 information about any random process without interfering with the
0df8b418 218 inferior's procinfo information. */
c3f6f71d 219
c3f6f71d 220/* format strings for /proc paths */
44122162
RO
221#define CTL_PROC_NAME_FMT "/proc/%d/ctl"
222#define AS_PROC_NAME_FMT "/proc/%d/as"
223#define MAP_PROC_NAME_FMT "/proc/%d/map"
224#define STATUS_PROC_NAME_FMT "/proc/%d/status"
13db92d3 225#define MAX_PROC_NAME_SIZE sizeof("/proc/999999/lwp/0123456789/lwpstatus")
c906108c 226
c3f6f71d
JM
227typedef struct procinfo {
228 struct procinfo *next;
229 int pid; /* Process ID */
230 int tid; /* Thread/LWP id */
c906108c 231
c3f6f71d
JM
232 /* process state */
233 int was_stopped;
234 int ignore_next_sigstop;
c906108c 235
c3f6f71d 236 int ctl_fd; /* File descriptor for /proc control file */
c3f6f71d
JM
237 int status_fd; /* File descriptor for /proc status file */
238 int as_fd; /* File descriptor for /proc as file */
c906108c 239
c3f6f71d 240 char pathname[MAX_PROC_NAME_SIZE]; /* Pathname to /proc entry */
c906108c 241
c3f6f71d 242 fltset_t saved_fltset; /* Saved traced hardware fault set */
44122162
RO
243 sigset_t saved_sigset; /* Saved traced signal set */
244 sigset_t saved_sighold; /* Saved held signal set */
37de36c6
KB
245 sysset_t *saved_exitset; /* Saved traced system call exit set */
246 sysset_t *saved_entryset; /* Saved traced system call entry set */
c906108c 247
44122162 248 pstatus_t prstatus; /* Current process status info */
19958708 249
c3f6f71d 250 struct procinfo *thread_list;
c906108c 251
c3f6f71d
JM
252 int status_valid : 1;
253 int gregs_valid : 1;
254 int fpregs_valid : 1;
255 int threads_valid: 1;
256} procinfo;
c906108c 257
c3f6f71d 258static char errmsg[128]; /* shared error msg buffer */
c906108c 259
c3f6f71d 260/* Function prototypes for procinfo module: */
c906108c 261
a14ed312
KB
262static procinfo *find_procinfo_or_die (int pid, int tid);
263static procinfo *find_procinfo (int pid, int tid);
264static procinfo *create_procinfo (int pid, int tid);
44122162 265static void destroy_procinfo (procinfo *p);
44122162
RO
266static void dead_procinfo (procinfo *p, const char *msg, int killp);
267static int open_procinfo_files (procinfo *p, int which);
268static void close_procinfo_files (procinfo *p);
c906108c 269
e9ef4f39 270static int iterate_over_mappings
b8edc417
JK
271 (procinfo *pi, find_memory_region_ftype child_func, void *data,
272 int (*func) (struct prmap *map, find_memory_region_ftype child_func,
77382aee 273 void *data));
e9ef4f39 274
c3f6f71d 275/* The head of the procinfo list: */
44122162 276static procinfo *procinfo_list;
c906108c 277
77382aee
PA
278/* Search the procinfo list. Return a pointer to procinfo, or NULL if
279 not found. */
c906108c 280
19958708 281static procinfo *
fba45db2 282find_procinfo (int pid, int tid)
c5aa993b 283{
c3f6f71d 284 procinfo *pi;
c906108c 285
c3f6f71d
JM
286 for (pi = procinfo_list; pi; pi = pi->next)
287 if (pi->pid == pid)
288 break;
c906108c 289
c3f6f71d
JM
290 if (pi)
291 if (tid)
292 {
293 /* Don't check threads_valid. If we're updating the
294 thread_list, we want to find whatever threads are already
295 here. This means that in general it is the caller's
296 responsibility to check threads_valid and update before
297 calling find_procinfo, if the caller wants to find a new
77382aee 298 thread. */
c3f6f71d
JM
299
300 for (pi = pi->thread_list; pi; pi = pi->next)
301 if (pi->tid == tid)
302 break;
303 }
c906108c 304
c3f6f71d
JM
305 return pi;
306}
c906108c 307
77382aee 308/* Calls find_procinfo, but errors on failure. */
c906108c 309
c3f6f71d 310static procinfo *
fba45db2 311find_procinfo_or_die (int pid, int tid)
c3f6f71d
JM
312{
313 procinfo *pi = find_procinfo (pid, tid);
c906108c 314
c3f6f71d 315 if (pi == NULL)
0fda6bd2
JM
316 {
317 if (tid)
3e43a32a
MS
318 error (_("procfs: couldn't find pid %d "
319 "(kernel thread %d) in procinfo list."),
0fda6bd2
JM
320 pid, tid);
321 else
8a3fe4f8 322 error (_("procfs: couldn't find pid %d in procinfo list."), pid);
0fda6bd2 323 }
c3f6f71d
JM
324 return pi;
325}
c906108c 326
77382aee
PA
327/* Wrapper for `open'. The appropriate open call is attempted; if
328 unsuccessful, it will be retried as many times as needed for the
329 EAGAIN and EINTR conditions.
19958708 330
77382aee
PA
331 For other conditions, retry the open a limited number of times. In
332 addition, a short sleep is imposed prior to retrying the open. The
333 reason for this sleep is to give the kernel a chance to catch up
334 and create the file in question in the event that GDB "wins" the
335 race to open a file before the kernel has created it. */
19958708 336
4d1bcd09
KB
337static int
338open_with_retry (const char *pathname, int flags)
339{
340 int retries_remaining, status;
341
342 retries_remaining = 2;
343
344 while (1)
345 {
346 status = open (pathname, flags);
347
348 if (status >= 0 || retries_remaining == 0)
349 break;
350 else if (errno != EINTR && errno != EAGAIN)
351 {
352 retries_remaining--;
353 sleep (1);
354 }
355 }
356
357 return status;
358}
359
44122162
RO
360/* Open the file descriptor for the process or LWP. We only open the
361 control file descriptor; the others are opened lazily as needed.
77382aee 362 Returns the file descriptor, or zero for failure. */
c906108c 363
c3f6f71d 364enum { FD_CTL, FD_STATUS, FD_AS };
c906108c 365
c3f6f71d 366static int
fba45db2 367open_procinfo_files (procinfo *pi, int which)
c3f6f71d
JM
368{
369 char tmp[MAX_PROC_NAME_SIZE];
370 int fd;
371
77382aee
PA
372 /* This function is getting ALMOST long enough to break up into
373 several. Here is some rationale:
374
77382aee 375 There are several file descriptors that may need to be open
196535a6 376 for any given process or LWP. The ones we're interested in are:
77382aee
PA
377 - control (ctl) write-only change the state
378 - status (status) read-only query the state
379 - address space (as) read/write access memory
380 - map (map) read-only virtual addr map
196535a6
RO
381 Most of these are opened lazily as they are needed.
382 The pathnames for the 'files' for an LWP look slightly
383 different from those of a first-class process:
77382aee
PA
384 Pathnames for a process (<proc-id>):
385 /proc/<proc-id>/ctl
386 /proc/<proc-id>/status
387 /proc/<proc-id>/as
388 /proc/<proc-id>/map
389 Pathnames for an LWP (lwp-id):
390 /proc/<proc-id>/lwp/<lwp-id>/lwpctl
391 /proc/<proc-id>/lwp/<lwp-id>/lwpstatus
196535a6
RO
392 An LWP has no map or address space file descriptor, since
393 the memory map and address space are shared by all LWPs. */
44122162 394
77382aee
PA
395 /* In this case, there are several different file descriptors that
396 we might be asked to open. The control file descriptor will be
397 opened early, but the others will be opened lazily as they are
398 needed. */
c3f6f71d
JM
399
400 strcpy (tmp, pi->pathname);
0df8b418 401 switch (which) { /* Which file descriptor to open? */
c3f6f71d
JM
402 case FD_CTL:
403 if (pi->tid)
404 strcat (tmp, "/lwpctl");
405 else
406 strcat (tmp, "/ctl");
4d1bcd09 407 fd = open_with_retry (tmp, O_WRONLY);
e28cade7 408 if (fd < 0)
c3f6f71d
JM
409 return 0; /* fail */
410 pi->ctl_fd = fd;
411 break;
412 case FD_AS:
413 if (pi->tid)
0df8b418 414 return 0; /* There is no 'as' file descriptor for an lwp. */
c3f6f71d 415 strcat (tmp, "/as");
4d1bcd09 416 fd = open_with_retry (tmp, O_RDWR);
e28cade7 417 if (fd < 0)
c3f6f71d
JM
418 return 0; /* fail */
419 pi->as_fd = fd;
420 break;
421 case FD_STATUS:
422 if (pi->tid)
423 strcat (tmp, "/lwpstatus");
424 else
425 strcat (tmp, "/status");
4d1bcd09 426 fd = open_with_retry (tmp, O_RDONLY);
e28cade7 427 if (fd < 0)
c3f6f71d
JM
428 return 0; /* fail */
429 pi->status_fd = fd;
430 break;
431 default:
432 return 0; /* unknown file descriptor */
433 }
c906108c 434
c3f6f71d
JM
435 return 1; /* success */
436}
c906108c 437
77382aee
PA
438/* Allocate a data structure and link it into the procinfo list.
439 First tries to find a pre-existing one (FIXME: why?). Returns the
440 pointer to new procinfo struct. */
c906108c 441
c3f6f71d 442static procinfo *
fba45db2 443create_procinfo (int pid, int tid)
c3f6f71d 444{
0b62613e 445 procinfo *pi, *parent = NULL;
c906108c 446
c475f569
RO
447 pi = find_procinfo (pid, tid);
448 if (pi != NULL)
0df8b418 449 return pi; /* Already exists, nothing to do. */
c906108c 450
0df8b418 451 /* Find parent before doing malloc, to save having to cleanup. */
c3f6f71d
JM
452 if (tid != 0)
453 parent = find_procinfo_or_die (pid, 0); /* FIXME: should I
454 create it if it
0df8b418 455 doesn't exist yet? */
c906108c 456
8d749320 457 pi = XNEW (procinfo);
c3f6f71d
JM
458 memset (pi, 0, sizeof (procinfo));
459 pi->pid = pid;
460 pi->tid = tid;
c906108c 461
c475f569
RO
462 pi->saved_entryset = XNEW (sysset_t);
463 pi->saved_exitset = XNEW (sysset_t);
1d5e0602 464
c3f6f71d
JM
465 /* Chain into list. */
466 if (tid == 0)
467 {
196535a6 468 xsnprintf (pi->pathname, sizeof (pi->pathname), "/proc/%d", pid);
c3f6f71d
JM
469 pi->next = procinfo_list;
470 procinfo_list = pi;
471 }
472 else
473 {
c475f569
RO
474 xsnprintf (pi->pathname, sizeof (pi->pathname), "/proc/%d/lwp/%d",
475 pid, tid);
c3f6f71d
JM
476 pi->next = parent->thread_list;
477 parent->thread_list = pi;
478 }
479 return pi;
480}
c906108c 481
77382aee 482/* Close all file descriptors associated with the procinfo. */
c906108c 483
c3f6f71d 484static void
fba45db2 485close_procinfo_files (procinfo *pi)
c3f6f71d
JM
486{
487 if (pi->ctl_fd > 0)
488 close (pi->ctl_fd);
c3f6f71d
JM
489 if (pi->as_fd > 0)
490 close (pi->as_fd);
491 if (pi->status_fd > 0)
492 close (pi->status_fd);
c3f6f71d
JM
493 pi->ctl_fd = pi->as_fd = pi->status_fd = 0;
494}
c906108c 495
77382aee 496/* Destructor function. Close, unlink and deallocate the object. */
c906108c 497
c3f6f71d 498static void
fba45db2 499destroy_one_procinfo (procinfo **list, procinfo *pi)
c3f6f71d
JM
500{
501 procinfo *ptr;
502
77382aee 503 /* Step one: unlink the procinfo from its list. */
c3f6f71d
JM
504 if (pi == *list)
505 *list = pi->next;
19958708 506 else
c3f6f71d
JM
507 for (ptr = *list; ptr; ptr = ptr->next)
508 if (ptr->next == pi)
509 {
510 ptr->next = pi->next;
511 break;
512 }
7a292a7a 513
77382aee 514 /* Step two: close any open file descriptors. */
c3f6f71d 515 close_procinfo_files (pi);
7a292a7a 516
77382aee 517 /* Step three: free the memory. */
1d5e0602
KB
518 xfree (pi->saved_entryset);
519 xfree (pi->saved_exitset);
b8c9b27d 520 xfree (pi);
c3f6f71d 521}
c906108c 522
c3f6f71d 523static void
fba45db2 524destroy_procinfo (procinfo *pi)
c3f6f71d
JM
525{
526 procinfo *tmp;
c906108c 527
0df8b418 528 if (pi->tid != 0) /* Destroy a thread procinfo. */
c3f6f71d 529 {
0df8b418 530 tmp = find_procinfo (pi->pid, 0); /* Find the parent process. */
c3f6f71d
JM
531 destroy_one_procinfo (&tmp->thread_list, pi);
532 }
0df8b418 533 else /* Destroy a process procinfo and all its threads. */
c3f6f71d
JM
534 {
535 /* First destroy the children, if any; */
536 while (pi->thread_list != NULL)
537 destroy_one_procinfo (&pi->thread_list, pi->thread_list);
538 /* Then destroy the parent. Genocide!!! */
539 destroy_one_procinfo (&procinfo_list, pi);
540 }
541}
c906108c 542
5b4cbbe3
TT
543/* A deleter that calls destroy_procinfo. */
544struct procinfo_deleter
004527cb 545{
5b4cbbe3
TT
546 void operator() (procinfo *pi) const
547 {
548 destroy_procinfo (pi);
549 }
550};
551
552typedef std::unique_ptr<procinfo, procinfo_deleter> procinfo_up;
004527cb 553
c3f6f71d 554enum { NOKILL, KILL };
c906108c 555
77382aee
PA
556/* To be called on a non_recoverable error for a procinfo. Prints
557 error messages, optionally sends a SIGKILL to the process, then
558 destroys the data structure. */
c906108c 559
c3f6f71d 560static void
995816ba 561dead_procinfo (procinfo *pi, const char *msg, int kill_p)
c3f6f71d 562{
f4ad82b3 563 print_sys_errmsg (pi->pathname, errno);
c3f6f71d
JM
564 if (kill_p == KILL)
565 kill (pi->pid, SIGKILL);
c906108c 566
c3f6f71d 567 destroy_procinfo (pi);
0b62613e 568 error ("%s", msg);
c3f6f71d 569}
c906108c 570
c3f6f71d 571/* =================== END, STRUCT PROCINFO "MODULE" =================== */
c906108c 572
196535a6 573/* =================== /proc "MODULE" =================== */
c906108c 574
77382aee
PA
575/* This "module" is the interface layer between the /proc system API
576 and the gdb target vector functions. This layer consists of access
577 functions that encapsulate each of the basic operations that we
578 need to use from the /proc API.
579
580 The main motivation for this layer is to hide the fact that there
196535a6 581 were two very different implementations of the /proc API. */
c906108c 582
44122162
RO
583static long proc_flags (procinfo *pi);
584static int proc_why (procinfo *pi);
585static int proc_what (procinfo *pi);
586static int proc_set_current_signal (procinfo *pi, int signo);
587static int proc_get_current_thread (procinfo *pi);
d3581e61 588static int proc_iterate_over_threads
44122162 589 (procinfo *pi,
d3581e61
JB
590 int (*func) (procinfo *, procinfo *, void *),
591 void *ptr);
b2ad7bb9
PA
592static void proc_resume (procinfo *pi, ptid_t scope_ptid,
593 int step, enum gdb_signal signo);
d3581e61
JB
594
595static void
995816ba 596proc_warn (procinfo *pi, const char *func, int line)
c3f6f71d 597{
c475f569
RO
598 xsnprintf (errmsg, sizeof (errmsg), "procfs: %s line %d, %s",
599 func, line, pi->pathname);
c3f6f71d
JM
600 print_sys_errmsg (errmsg, errno);
601}
c906108c 602
d3581e61 603static void
995816ba 604proc_error (procinfo *pi, const char *func, int line)
c3f6f71d 605{
c475f569
RO
606 xsnprintf (errmsg, sizeof (errmsg), "procfs: %s line %d, %s",
607 func, line, pi->pathname);
c3f6f71d
JM
608 perror_with_name (errmsg);
609}
c906108c 610
77382aee
PA
611/* Updates the status struct in the procinfo. There is a 'valid'
612 flag, to let other functions know when this function needs to be
613 called (so the status is only read when it is needed). The status
614 file descriptor is also only opened when it is needed. Returns
615 non-zero for success, zero for failure. */
c906108c 616
d3581e61 617static int
fba45db2 618proc_get_status (procinfo *pi)
c3f6f71d 619{
0df8b418 620 /* Status file descriptor is opened "lazily". */
c475f569 621 if (pi->status_fd == 0 && open_procinfo_files (pi, FD_STATUS) == 0)
c3f6f71d
JM
622 {
623 pi->status_valid = 0;
624 return 0;
625 }
c906108c 626
c3f6f71d
JM
627 if (lseek (pi->status_fd, 0, SEEK_SET) < 0)
628 pi->status_valid = 0; /* fail */
629 else
630 {
19958708 631 /* Sigh... I have to read a different data structure,
0df8b418 632 depending on whether this is a main process or an LWP. */
c3f6f71d 633 if (pi->tid)
19958708
RM
634 pi->status_valid = (read (pi->status_fd,
635 (char *) &pi->prstatus.pr_lwp,
c3f6f71d
JM
636 sizeof (lwpstatus_t))
637 == sizeof (lwpstatus_t));
638 else
639 {
19958708 640 pi->status_valid = (read (pi->status_fd,
c3f6f71d 641 (char *) &pi->prstatus,
44122162
RO
642 sizeof (pstatus_t))
643 == sizeof (pstatus_t));
c3f6f71d
JM
644 }
645 }
c906108c 646
c3f6f71d
JM
647 if (pi->status_valid)
648 {
19958708 649 PROC_PRETTYFPRINT_STATUS (proc_flags (pi),
c3f6f71d 650 proc_why (pi),
19958708 651 proc_what (pi),
c3f6f71d
JM
652 proc_get_current_thread (pi));
653 }
c906108c 654
77382aee 655 /* The status struct includes general regs, so mark them valid too. */
c3f6f71d 656 pi->gregs_valid = pi->status_valid;
77382aee
PA
657 /* In the read/write multiple-fd model, the status struct includes
658 the fp regs too, so mark them valid too. */
c3f6f71d 659 pi->fpregs_valid = pi->status_valid;
77382aee 660 return pi->status_valid; /* True if success, false if failure. */
c3f6f71d 661}
c906108c 662
77382aee 663/* Returns the process flags (pr_flags field). */
c3f6f71d 664
d3581e61 665static long
fba45db2 666proc_flags (procinfo *pi)
c3f6f71d
JM
667{
668 if (!pi->status_valid)
669 if (!proc_get_status (pi))
0df8b418 670 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 671
c3f6f71d 672 return pi->prstatus.pr_lwp.pr_flags;
c3f6f71d 673}
c906108c 674
77382aee 675/* Returns the pr_why field (why the process stopped). */
c906108c 676
d3581e61 677static int
fba45db2 678proc_why (procinfo *pi)
c3f6f71d
JM
679{
680 if (!pi->status_valid)
681 if (!proc_get_status (pi))
0df8b418 682 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 683
c3f6f71d 684 return pi->prstatus.pr_lwp.pr_why;
c3f6f71d 685}
c906108c 686
77382aee 687/* Returns the pr_what field (details of why the process stopped). */
c906108c 688
d3581e61 689static int
fba45db2 690proc_what (procinfo *pi)
c3f6f71d
JM
691{
692 if (!pi->status_valid)
693 if (!proc_get_status (pi))
0df8b418 694 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 695
c3f6f71d 696 return pi->prstatus.pr_lwp.pr_what;
c3f6f71d 697}
c906108c 698
77382aee
PA
699/* This function is only called when PI is stopped by a watchpoint.
700 Assuming the OS supports it, write to *ADDR the data address which
701 triggered it and return 1. Return 0 if it is not possible to know
702 the address. */
bf701c2c
PM
703
704static int
705proc_watchpoint_address (procinfo *pi, CORE_ADDR *addr)
706{
707 if (!pi->status_valid)
708 if (!proc_get_status (pi))
709 return 0;
710
f5656ead
TT
711 *addr = (CORE_ADDR) gdbarch_pointer_to_address (target_gdbarch (),
712 builtin_type (target_gdbarch ())->builtin_data_ptr,
bf701c2c 713 (gdb_byte *) &pi->prstatus.pr_lwp.pr_info.si_addr);
bf701c2c
PM
714 return 1;
715}
716
77382aee
PA
717/* Returns the pr_nsysarg field (number of args to the current
718 syscall). */
c3f6f71d 719
d3581e61 720static int
fba45db2 721proc_nsysarg (procinfo *pi)
c3f6f71d
JM
722{
723 if (!pi->status_valid)
724 if (!proc_get_status (pi))
725 return 0;
19958708 726
c3f6f71d 727 return pi->prstatus.pr_lwp.pr_nsysarg;
c3f6f71d 728}
c906108c 729
77382aee
PA
730/* Returns the pr_sysarg field (pointer to the arguments of current
731 syscall). */
c906108c 732
d3581e61 733static long *
fba45db2 734proc_sysargs (procinfo *pi)
c3f6f71d
JM
735{
736 if (!pi->status_valid)
737 if (!proc_get_status (pi))
738 return NULL;
19958708 739
c3f6f71d 740 return (long *) &pi->prstatus.pr_lwp.pr_sysarg;
c3f6f71d 741}
77382aee 742
44122162 743/* Set or reset any of the following process flags:
77382aee
PA
744 PR_FORK -- forked child will inherit trace flags
745 PR_RLC -- traced process runs when last /proc file closed.
746 PR_KLC -- traced process is killed when last /proc file closed.
747 PR_ASYNC -- LWP's get to run/stop independently.
748
44122162 749 This function is done using read/write [PCSET/PCRESET/PCUNSET].
77382aee
PA
750
751 Arguments:
752 pi -- the procinfo
753 flag -- one of PR_FORK, PR_RLC, or PR_ASYNC
754 mode -- 1 for set, 0 for reset.
755
756 Returns non-zero for success, zero for failure. */
c906108c 757
c3f6f71d 758enum { FLAG_RESET, FLAG_SET };
c906108c 759
c3f6f71d 760static int
fba45db2 761proc_modify_flag (procinfo *pi, long flag, long mode)
c3f6f71d
JM
762{
763 long win = 0; /* default to fail */
764
77382aee
PA
765 /* These operations affect the process as a whole, and applying them
766 to an individual LWP has the same meaning as applying them to the
767 main process. Therefore, if we're ever called with a pointer to
768 an LWP's procinfo, let's substitute the process's procinfo and
769 avoid opening the LWP's file descriptor unnecessarily. */
c3f6f71d
JM
770
771 if (pi->pid != 0)
772 pi = find_procinfo_or_die (pi->pid, 0);
773
44122162 774 procfs_ctl_t arg[2];
c5aa993b 775
44122162
RO
776 if (mode == FLAG_SET) /* Set the flag (RLC, FORK, or ASYNC). */
777 arg[0] = PCSET;
0df8b418 778 else /* Reset the flag. */
44122162
RO
779 arg[0] = PCUNSET;
780
781 arg[1] = flag;
782 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 783
77382aee
PA
784 /* The above operation renders the procinfo's cached pstatus
785 obsolete. */
c3f6f71d 786 pi->status_valid = 0;
c906108c 787
c3f6f71d 788 if (!win)
8a3fe4f8 789 warning (_("procfs: modify_flag failed to turn %s %s"),
c3f6f71d
JM
790 flag == PR_FORK ? "PR_FORK" :
791 flag == PR_RLC ? "PR_RLC" :
c3f6f71d 792 flag == PR_ASYNC ? "PR_ASYNC" :
0d06e24b 793 flag == PR_KLC ? "PR_KLC" :
c3f6f71d
JM
794 "<unknown flag>",
795 mode == FLAG_RESET ? "off" : "on");
c906108c 796
c3f6f71d
JM
797 return win;
798}
c906108c 799
77382aee
PA
800/* Set the run_on_last_close flag. Process with all threads will
801 become runnable when debugger closes all /proc fds. Returns
802 non-zero for success, zero for failure. */
c906108c 803
d3581e61 804static int
fba45db2 805proc_set_run_on_last_close (procinfo *pi)
c906108c 806{
c3f6f71d
JM
807 return proc_modify_flag (pi, PR_RLC, FLAG_SET);
808}
c906108c 809
77382aee
PA
810/* Reset the run_on_last_close flag. The process will NOT become
811 runnable when debugger closes its file handles. Returns non-zero
812 for success, zero for failure. */
c906108c 813
d3581e61 814static int
fba45db2 815proc_unset_run_on_last_close (procinfo *pi)
c3f6f71d
JM
816{
817 return proc_modify_flag (pi, PR_RLC, FLAG_RESET);
c906108c
SS
818}
819
77382aee 820/* Reset inherit_on_fork flag. If the process forks a child while we
85102364 821 are registered for events in the parent, then we will NOT receive
77382aee
PA
822 events from the child. Returns non-zero for success, zero for
823 failure. */
c906108c 824
d3581e61 825static int
fba45db2 826proc_unset_inherit_on_fork (procinfo *pi)
c3f6f71d
JM
827{
828 return proc_modify_flag (pi, PR_FORK, FLAG_RESET);
829}
c906108c 830
77382aee
PA
831/* Set PR_ASYNC flag. If one LWP stops because of a debug event
832 (signal etc.), the remaining LWPs will continue to run. Returns
833 non-zero for success, zero for failure. */
c906108c 834
d3581e61 835static int
fba45db2 836proc_set_async (procinfo *pi)
c3f6f71d
JM
837{
838 return proc_modify_flag (pi, PR_ASYNC, FLAG_SET);
839}
c906108c 840
77382aee
PA
841/* Reset PR_ASYNC flag. If one LWP stops because of a debug event
842 (signal etc.), then all other LWPs will stop as well. Returns
843 non-zero for success, zero for failure. */
c906108c 844
d3581e61 845static int
fba45db2 846proc_unset_async (procinfo *pi)
c3f6f71d
JM
847{
848 return proc_modify_flag (pi, PR_ASYNC, FLAG_RESET);
849}
c906108c 850
77382aee
PA
851/* Request the process/LWP to stop. Does not wait. Returns non-zero
852 for success, zero for failure. */
c906108c 853
d3581e61 854static int
fba45db2 855proc_stop_process (procinfo *pi)
c3f6f71d
JM
856{
857 int win;
c906108c 858
77382aee
PA
859 /* We might conceivably apply this operation to an LWP, and the
860 LWP's ctl file descriptor might not be open. */
c906108c 861
c475f569 862 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c3f6f71d
JM
863 return 0;
864 else
865 {
37de36c6 866 procfs_ctl_t cmd = PCSTOP;
f4a14ae6 867
c3f6f71d 868 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d 869 }
c906108c 870
c3f6f71d
JM
871 return win;
872}
c5aa993b 873
77382aee
PA
874/* Wait for the process or LWP to stop (block until it does). Returns
875 non-zero for success, zero for failure. */
c906108c 876
d3581e61 877static int
fba45db2 878proc_wait_for_stop (procinfo *pi)
c906108c 879{
c3f6f71d
JM
880 int win;
881
77382aee
PA
882 /* We should never have to apply this operation to any procinfo
883 except the one for the main process. If that ever changes for
884 any reason, then take out the following clause and replace it
885 with one that makes sure the ctl_fd is open. */
19958708 886
c3f6f71d
JM
887 if (pi->tid != 0)
888 pi = find_procinfo_or_die (pi->pid, 0);
889
44122162 890 procfs_ctl_t cmd = PCWSTOP;
f4a14ae6 891
92137da0
RO
892 set_sigint_trap ();
893
44122162 894 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
92137da0
RO
895
896 clear_sigint_trap ();
897
44122162
RO
898 /* We been runnin' and we stopped -- need to update status. */
899 pi->status_valid = 0;
c906108c 900
c3f6f71d 901 return win;
c906108c
SS
902}
903
77382aee
PA
904/* Make the process or LWP runnable.
905
906 Options (not all are implemented):
907 - single-step
908 - clear current fault
909 - clear current signal
910 - abort the current system call
911 - stop as soon as finished with system call
77382aee
PA
912
913 Always clears the current fault. PI is the process or LWP to
914 operate on. If STEP is true, set the process or LWP to trap after
915 one instruction. If SIGNO is zero, clear the current signal if
916 any; if non-zero, set the current signal to this one. Returns
917 non-zero for success, zero for failure. */
c3f6f71d 918
d3581e61 919static int
fba45db2 920proc_run_process (procinfo *pi, int step, int signo)
c3f6f71d
JM
921{
922 int win;
923 int runflags;
924
77382aee
PA
925 /* We will probably have to apply this operation to individual
926 threads, so make sure the control file descriptor is open. */
19958708 927
c475f569
RO
928 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
929 return 0;
c906108c 930
0df8b418 931 runflags = PRCFAULT; /* Always clear current fault. */
c3f6f71d
JM
932 if (step)
933 runflags |= PRSTEP;
934 if (signo == 0)
935 runflags |= PRCSIG;
0df8b418 936 else if (signo != -1) /* -1 means do nothing W.R.T. signals. */
c3f6f71d 937 proc_set_current_signal (pi, signo);
c5aa993b 938
44122162 939 procfs_ctl_t cmd[2];
c906108c 940
44122162
RO
941 cmd[0] = PCRUN;
942 cmd[1] = runflags;
943 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c906108c 944
c3f6f71d
JM
945 return win;
946}
c906108c 947
77382aee
PA
948/* Register to trace signals in the process or LWP. Returns non-zero
949 for success, zero for failure. */
c906108c 950
d3581e61 951static int
44122162 952proc_set_traced_signals (procinfo *pi, sigset_t *sigset)
c906108c 953{
c3f6f71d
JM
954 int win;
955
77382aee
PA
956 /* We should never have to apply this operation to any procinfo
957 except the one for the main process. If that ever changes for
958 any reason, then take out the following clause and replace it
959 with one that makes sure the ctl_fd is open. */
19958708 960
c3f6f71d
JM
961 if (pi->tid != 0)
962 pi = find_procinfo_or_die (pi->pid, 0);
963
44122162
RO
964 struct {
965 procfs_ctl_t cmd;
966 /* Use char array to avoid alignment issues. */
967 char sigset[sizeof (sigset_t)];
968 } arg;
c906108c 969
44122162
RO
970 arg.cmd = PCSTRACE;
971 memcpy (&arg.sigset, sigset, sizeof (sigset_t));
972
973 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 974
0df8b418 975 /* The above operation renders the procinfo's cached pstatus obsolete. */
c3f6f71d 976 pi->status_valid = 0;
c906108c 977
c3f6f71d 978 if (!win)
8a3fe4f8 979 warning (_("procfs: set_traced_signals failed"));
c3f6f71d 980 return win;
c906108c
SS
981}
982
77382aee
PA
983/* Register to trace hardware faults in the process or LWP. Returns
984 non-zero for success, zero for failure. */
c906108c 985
d3581e61 986static int
fba45db2 987proc_set_traced_faults (procinfo *pi, fltset_t *fltset)
c3f6f71d
JM
988{
989 int win;
990
77382aee
PA
991 /* We should never have to apply this operation to any procinfo
992 except the one for the main process. If that ever changes for
993 any reason, then take out the following clause and replace it
994 with one that makes sure the ctl_fd is open. */
19958708 995
c3f6f71d
JM
996 if (pi->tid != 0)
997 pi = find_procinfo_or_die (pi->pid, 0);
998
44122162
RO
999 struct {
1000 procfs_ctl_t cmd;
1001 /* Use char array to avoid alignment issues. */
1002 char fltset[sizeof (fltset_t)];
1003 } arg;
1004
1005 arg.cmd = PCSFAULT;
1006 memcpy (&arg.fltset, fltset, sizeof (fltset_t));
c906108c 1007
44122162 1008 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1009
0df8b418 1010 /* The above operation renders the procinfo's cached pstatus obsolete. */
c3f6f71d 1011 pi->status_valid = 0;
c906108c 1012
c3f6f71d
JM
1013 return win;
1014}
c5aa993b 1015
77382aee
PA
1016/* Register to trace entry to system calls in the process or LWP.
1017 Returns non-zero for success, zero for failure. */
c906108c 1018
d3581e61 1019static int
fba45db2 1020proc_set_traced_sysentry (procinfo *pi, sysset_t *sysset)
c906108c 1021{
c3f6f71d
JM
1022 int win;
1023
77382aee
PA
1024 /* We should never have to apply this operation to any procinfo
1025 except the one for the main process. If that ever changes for
1026 any reason, then take out the following clause and replace it
1027 with one that makes sure the ctl_fd is open. */
19958708 1028
c3f6f71d
JM
1029 if (pi->tid != 0)
1030 pi = find_procinfo_or_die (pi->pid, 0);
1031
c475f569 1032 struct {
44122162
RO
1033 procfs_ctl_t cmd;
1034 /* Use char array to avoid alignment issues. */
1035 char sysset[sizeof (sysset_t)];
c475f569 1036 } arg;
c3f6f71d 1037
c475f569
RO
1038 arg.cmd = PCSENTRY;
1039 memcpy (&arg.sysset, sysset, sizeof (sysset_t));
44122162 1040
c475f569 1041 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
37de36c6 1042
77382aee
PA
1043 /* The above operation renders the procinfo's cached pstatus
1044 obsolete. */
c3f6f71d 1045 pi->status_valid = 0;
19958708 1046
c3f6f71d 1047 return win;
c906108c
SS
1048}
1049
77382aee
PA
1050/* Register to trace exit from system calls in the process or LWP.
1051 Returns non-zero for success, zero for failure. */
c906108c 1052
d3581e61 1053static int
fba45db2 1054proc_set_traced_sysexit (procinfo *pi, sysset_t *sysset)
c3f6f71d
JM
1055{
1056 int win;
1057
77382aee
PA
1058 /* We should never have to apply this operation to any procinfo
1059 except the one for the main process. If that ever changes for
1060 any reason, then take out the following clause and replace it
1061 with one that makes sure the ctl_fd is open. */
19958708 1062
c3f6f71d
JM
1063 if (pi->tid != 0)
1064 pi = find_procinfo_or_die (pi->pid, 0);
1065
44122162
RO
1066 struct gdb_proc_ctl_pcsexit {
1067 procfs_ctl_t cmd;
1068 /* Use char array to avoid alignment issues. */
1069 char sysset[sizeof (sysset_t)];
c475f569 1070 } arg;
c906108c 1071
c475f569
RO
1072 arg.cmd = PCSEXIT;
1073 memcpy (&arg.sysset, sysset, sizeof (sysset_t));
c906108c 1074
c475f569 1075 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
37de36c6 1076
77382aee
PA
1077 /* The above operation renders the procinfo's cached pstatus
1078 obsolete. */
c3f6f71d 1079 pi->status_valid = 0;
c906108c 1080
c3f6f71d
JM
1081 return win;
1082}
c906108c 1083
77382aee
PA
1084/* Specify the set of blocked / held signals in the process or LWP.
1085 Returns non-zero for success, zero for failure. */
c906108c 1086
d3581e61 1087static int
44122162 1088proc_set_held_signals (procinfo *pi, sigset_t *sighold)
c906108c 1089{
c3f6f71d
JM
1090 int win;
1091
77382aee
PA
1092 /* We should never have to apply this operation to any procinfo
1093 except the one for the main process. If that ever changes for
1094 any reason, then take out the following clause and replace it
1095 with one that makes sure the ctl_fd is open. */
19958708 1096
c3f6f71d
JM
1097 if (pi->tid != 0)
1098 pi = find_procinfo_or_die (pi->pid, 0);
1099
44122162
RO
1100 struct {
1101 procfs_ctl_t cmd;
1102 /* Use char array to avoid alignment issues. */
1103 char hold[sizeof (sigset_t)];
1104 } arg;
1105
1106 arg.cmd = PCSHOLD;
1107 memcpy (&arg.hold, sighold, sizeof (sigset_t));
1108 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
1109
77382aee
PA
1110 /* The above operation renders the procinfo's cached pstatus
1111 obsolete. */
c3f6f71d
JM
1112 pi->status_valid = 0;
1113
1114 return win;
c906108c
SS
1115}
1116
77382aee
PA
1117/* Returns the set of signals that are held / blocked. Will also copy
1118 the sigset if SAVE is non-zero. */
c906108c 1119
44122162
RO
1120static sigset_t *
1121proc_get_held_signals (procinfo *pi, sigset_t *save)
c906108c 1122{
44122162 1123 sigset_t *ret = NULL;
c3f6f71d 1124
77382aee
PA
1125 /* We should never have to apply this operation to any procinfo
1126 except the one for the main process. If that ever changes for
1127 any reason, then take out the following clause and replace it
1128 with one that makes sure the ctl_fd is open. */
19958708 1129
c3f6f71d
JM
1130 if (pi->tid != 0)
1131 pi = find_procinfo_or_die (pi->pid, 0);
1132
c3f6f71d
JM
1133 if (!pi->status_valid)
1134 if (!proc_get_status (pi))
1135 return NULL;
1136
c3f6f71d 1137 ret = &pi->prstatus.pr_lwp.pr_lwphold;
c3f6f71d 1138 if (save && ret)
44122162 1139 memcpy (save, ret, sizeof (sigset_t));
c3f6f71d
JM
1140
1141 return ret;
c906108c
SS
1142}
1143
77382aee
PA
1144/* Returns the set of signals that are traced / debugged. Will also
1145 copy the sigset if SAVE is non-zero. */
c3f6f71d 1146
44122162
RO
1147static sigset_t *
1148proc_get_traced_signals (procinfo *pi, sigset_t *save)
c906108c 1149{
44122162 1150 sigset_t *ret = NULL;
c3f6f71d 1151
77382aee
PA
1152 /* We should never have to apply this operation to any procinfo
1153 except the one for the main process. If that ever changes for
1154 any reason, then take out the following clause and replace it
1155 with one that makes sure the ctl_fd is open. */
19958708 1156
c3f6f71d
JM
1157 if (pi->tid != 0)
1158 pi = find_procinfo_or_die (pi->pid, 0);
1159
c3f6f71d
JM
1160 if (!pi->status_valid)
1161 if (!proc_get_status (pi))
1162 return NULL;
1163
1164 ret = &pi->prstatus.pr_sigtrace;
c3f6f71d 1165 if (save && ret)
44122162 1166 memcpy (save, ret, sizeof (sigset_t));
c906108c 1167
c3f6f71d
JM
1168 return ret;
1169}
c906108c 1170
77382aee
PA
1171/* Returns the set of hardware faults that are traced /debugged. Will
1172 also copy the faultset if SAVE is non-zero. */
c3f6f71d 1173
d3581e61 1174static fltset_t *
fba45db2 1175proc_get_traced_faults (procinfo *pi, fltset_t *save)
c3f6f71d
JM
1176{
1177 fltset_t *ret = NULL;
1178
77382aee
PA
1179 /* We should never have to apply this operation to any procinfo
1180 except the one for the main process. If that ever changes for
1181 any reason, then take out the following clause and replace it
1182 with one that makes sure the ctl_fd is open. */
19958708 1183
c3f6f71d
JM
1184 if (pi->tid != 0)
1185 pi = find_procinfo_or_die (pi->pid, 0);
1186
c3f6f71d
JM
1187 if (!pi->status_valid)
1188 if (!proc_get_status (pi))
1189 return NULL;
1190
1191 ret = &pi->prstatus.pr_flttrace;
c3f6f71d
JM
1192 if (save && ret)
1193 memcpy (save, ret, sizeof (fltset_t));
c906108c 1194
c3f6f71d
JM
1195 return ret;
1196}
c906108c 1197
77382aee
PA
1198/* Returns the set of syscalls that are traced /debugged on entry.
1199 Will also copy the syscall set if SAVE is non-zero. */
c906108c 1200
d3581e61 1201static sysset_t *
fba45db2 1202proc_get_traced_sysentry (procinfo *pi, sysset_t *save)
c3f6f71d
JM
1203{
1204 sysset_t *ret = NULL;
1205
77382aee
PA
1206 /* We should never have to apply this operation to any procinfo
1207 except the one for the main process. If that ever changes for
1208 any reason, then take out the following clause and replace it
1209 with one that makes sure the ctl_fd is open. */
19958708 1210
c3f6f71d
JM
1211 if (pi->tid != 0)
1212 pi = find_procinfo_or_die (pi->pid, 0);
1213
c3f6f71d
JM
1214 if (!pi->status_valid)
1215 if (!proc_get_status (pi))
1216 return NULL;
1217
1218 ret = &pi->prstatus.pr_sysentry;
c3f6f71d 1219 if (save && ret)
44122162 1220 memcpy (save, ret, sizeof (sysset_t));
c906108c 1221
c3f6f71d
JM
1222 return ret;
1223}
c5aa993b 1224
77382aee
PA
1225/* Returns the set of syscalls that are traced /debugged on exit.
1226 Will also copy the syscall set if SAVE is non-zero. */
c906108c 1227
d3581e61 1228static sysset_t *
fba45db2 1229proc_get_traced_sysexit (procinfo *pi, sysset_t *save)
c906108c 1230{
44122162 1231 sysset_t *ret = NULL;
c3f6f71d 1232
77382aee
PA
1233 /* We should never have to apply this operation to any procinfo
1234 except the one for the main process. If that ever changes for
1235 any reason, then take out the following clause and replace it
1236 with one that makes sure the ctl_fd is open. */
19958708 1237
c3f6f71d
JM
1238 if (pi->tid != 0)
1239 pi = find_procinfo_or_die (pi->pid, 0);
1240
c3f6f71d
JM
1241 if (!pi->status_valid)
1242 if (!proc_get_status (pi))
1243 return NULL;
1244
1245 ret = &pi->prstatus.pr_sysexit;
c3f6f71d 1246 if (save && ret)
44122162 1247 memcpy (save, ret, sizeof (sysset_t));
c3f6f71d
JM
1248
1249 return ret;
1250}
c906108c 1251
77382aee
PA
1252/* The current fault (if any) is cleared; the associated signal will
1253 not be sent to the process or LWP when it resumes. Returns
1254 non-zero for success, zero for failure. */
c906108c 1255
d3581e61 1256static int
fba45db2 1257proc_clear_current_fault (procinfo *pi)
c3f6f71d
JM
1258{
1259 int win;
1260
77382aee
PA
1261 /* We should never have to apply this operation to any procinfo
1262 except the one for the main process. If that ever changes for
1263 any reason, then take out the following clause and replace it
1264 with one that makes sure the ctl_fd is open. */
19958708 1265
c3f6f71d
JM
1266 if (pi->tid != 0)
1267 pi = find_procinfo_or_die (pi->pid, 0);
1268
44122162 1269 procfs_ctl_t cmd = PCCFAULT;
f4a14ae6 1270
44122162 1271 win = (write (pi->ctl_fd, (void *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d
JM
1272
1273 return win;
c906108c
SS
1274}
1275
77382aee
PA
1276/* Set the "current signal" that will be delivered next to the
1277 process. NOTE: semantics are different from those of KILL. This
1278 signal will be delivered to the process or LWP immediately when it
1279 is resumed (even if the signal is held/blocked); it will NOT
1280 immediately cause another event of interest, and will NOT first
1281 trap back to the debugger. Returns non-zero for success, zero for
1282 failure. */
c3f6f71d 1283
d3581e61 1284static int
fba45db2 1285proc_set_current_signal (procinfo *pi, int signo)
c3f6f71d
JM
1286{
1287 int win;
1288 struct {
37de36c6 1289 procfs_ctl_t cmd;
c3f6f71d 1290 /* Use char array to avoid alignment issues. */
44122162 1291 char sinfo[sizeof (siginfo_t)];
c3f6f71d 1292 } arg;
44122162 1293 siginfo_t mysinfo;
5b6d1e4f 1294 process_stratum_target *wait_target;
c162e8c9
JM
1295 ptid_t wait_ptid;
1296 struct target_waitstatus wait_status;
c3f6f71d 1297
77382aee
PA
1298 /* We should never have to apply this operation to any procinfo
1299 except the one for the main process. If that ever changes for
1300 any reason, then take out the following clause and replace it
1301 with one that makes sure the ctl_fd is open. */
19958708 1302
c3f6f71d
JM
1303 if (pi->tid != 0)
1304 pi = find_procinfo_or_die (pi->pid, 0);
1305
c3f6f71d 1306 /* The pointer is just a type alias. */
5b6d1e4f
PA
1307 get_last_target_status (&wait_target, &wait_ptid, &wait_status);
1308 if (wait_target == &the_procfs_target
1309 && wait_ptid == inferior_ptid
183be222
SM
1310 && wait_status.kind () == TARGET_WAITKIND_STOPPED
1311 && wait_status.sig () == gdb_signal_from_host (signo)
c162e8c9 1312 && proc_get_status (pi)
c162e8c9 1313 && pi->prstatus.pr_lwp.pr_info.si_signo == signo
c162e8c9
JM
1314 )
1315 /* Use the siginfo associated with the signal being
1316 redelivered. */
44122162 1317 memcpy (arg.sinfo, &pi->prstatus.pr_lwp.pr_info, sizeof (siginfo_t));
c162e8c9
JM
1318 else
1319 {
73930d4d
KH
1320 mysinfo.si_signo = signo;
1321 mysinfo.si_code = 0;
1322 mysinfo.si_pid = getpid (); /* ?why? */
1323 mysinfo.si_uid = getuid (); /* ?why? */
44122162 1324 memcpy (arg.sinfo, &mysinfo, sizeof (siginfo_t));
c162e8c9 1325 }
c3f6f71d 1326
c3f6f71d
JM
1327 arg.cmd = PCSSIG;
1328 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1329
c3f6f71d
JM
1330 return win;
1331}
c906108c 1332
77382aee
PA
1333/* The current signal (if any) is cleared, and is not sent to the
1334 process or LWP when it resumes. Returns non-zero for success, zero
1335 for failure. */
c906108c 1336
d3581e61 1337static int
fba45db2 1338proc_clear_current_signal (procinfo *pi)
c3f6f71d
JM
1339{
1340 int win;
1341
77382aee
PA
1342 /* We should never have to apply this operation to any procinfo
1343 except the one for the main process. If that ever changes for
1344 any reason, then take out the following clause and replace it
1345 with one that makes sure the ctl_fd is open. */
19958708 1346
c3f6f71d
JM
1347 if (pi->tid != 0)
1348 pi = find_procinfo_or_die (pi->pid, 0);
1349
44122162
RO
1350 struct {
1351 procfs_ctl_t cmd;
1352 /* Use char array to avoid alignment issues. */
1353 char sinfo[sizeof (siginfo_t)];
1354 } arg;
1355 siginfo_t mysinfo;
1356
1357 arg.cmd = PCSSIG;
1358 /* The pointer is just a type alias. */
1359 mysinfo.si_signo = 0;
1360 mysinfo.si_code = 0;
1361 mysinfo.si_errno = 0;
1362 mysinfo.si_pid = getpid (); /* ?why? */
1363 mysinfo.si_uid = getuid (); /* ?why? */
1364 memcpy (arg.sinfo, &mysinfo, sizeof (siginfo_t));
1365
1366 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1367
c3f6f71d
JM
1368 return win;
1369}
c906108c 1370
772cf8be
MK
1371/* Return the general-purpose registers for the process or LWP
1372 corresponding to PI. Upon failure, return NULL. */
c906108c 1373
d3581e61 1374static gdb_gregset_t *
fba45db2 1375proc_get_gregs (procinfo *pi)
c3f6f71d
JM
1376{
1377 if (!pi->status_valid || !pi->gregs_valid)
1378 if (!proc_get_status (pi))
1379 return NULL;
1380
c3f6f71d 1381 return &pi->prstatus.pr_lwp.pr_reg;
c3f6f71d 1382}
c5aa993b 1383
772cf8be
MK
1384/* Return the general-purpose registers for the process or LWP
1385 corresponding to PI. Upon failure, return NULL. */
c906108c 1386
d3581e61 1387static gdb_fpregset_t *
fba45db2 1388proc_get_fpregs (procinfo *pi)
c906108c 1389{
c3f6f71d
JM
1390 if (!pi->status_valid || !pi->fpregs_valid)
1391 if (!proc_get_status (pi))
1392 return NULL;
1393
c3f6f71d 1394 return &pi->prstatus.pr_lwp.pr_fpreg;
c906108c
SS
1395}
1396
772cf8be
MK
1397/* Write the general-purpose registers back to the process or LWP
1398 corresponding to PI. Return non-zero for success, zero for
1399 failure. */
c3f6f71d 1400
d3581e61 1401static int
fba45db2 1402proc_set_gregs (procinfo *pi)
c906108c 1403{
c3f6f71d
JM
1404 gdb_gregset_t *gregs;
1405 int win;
c5aa993b 1406
772cf8be
MK
1407 gregs = proc_get_gregs (pi);
1408 if (gregs == NULL)
1409 return 0; /* proc_get_regs has already warned. */
c3f6f71d 1410
772cf8be 1411 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c475f569 1412 return 0;
c3f6f71d 1413 else
c906108c 1414 {
c3f6f71d 1415 struct {
37de36c6 1416 procfs_ctl_t cmd;
c3f6f71d
JM
1417 /* Use char array to avoid alignment issues. */
1418 char gregs[sizeof (gdb_gregset_t)];
1419 } arg;
1420
772cf8be 1421 arg.cmd = PCSREG;
c3f6f71d
JM
1422 memcpy (&arg.gregs, gregs, sizeof (arg.gregs));
1423 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1424 }
c3f6f71d 1425
772cf8be 1426 /* Policy: writing the registers invalidates our cache. */
c3f6f71d
JM
1427 pi->gregs_valid = 0;
1428 return win;
c906108c
SS
1429}
1430
772cf8be
MK
1431/* Write the floating-pointer registers back to the process or LWP
1432 corresponding to PI. Return non-zero for success, zero for
1433 failure. */
c3f6f71d 1434
d3581e61 1435static int
fba45db2 1436proc_set_fpregs (procinfo *pi)
c906108c 1437{
c3f6f71d
JM
1438 gdb_fpregset_t *fpregs;
1439 int win;
1440
772cf8be
MK
1441 fpregs = proc_get_fpregs (pi);
1442 if (fpregs == NULL)
1443 return 0; /* proc_get_fpregs has already warned. */
c5aa993b 1444
772cf8be 1445 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c475f569 1446 return 0;
c3f6f71d 1447 else
c906108c 1448 {
c3f6f71d 1449 struct {
37de36c6 1450 procfs_ctl_t cmd;
c3f6f71d
JM
1451 /* Use char array to avoid alignment issues. */
1452 char fpregs[sizeof (gdb_fpregset_t)];
1453 } arg;
1454
772cf8be 1455 arg.cmd = PCSFPREG;
c3f6f71d
JM
1456 memcpy (&arg.fpregs, fpregs, sizeof (arg.fpregs));
1457 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1458 }
c3f6f71d 1459
772cf8be 1460 /* Policy: writing the registers invalidates our cache. */
c3f6f71d
JM
1461 pi->fpregs_valid = 0;
1462 return win;
c906108c
SS
1463}
1464
77382aee
PA
1465/* Send a signal to the proc or lwp with the semantics of "kill()".
1466 Returns non-zero for success, zero for failure. */
c906108c 1467
d3581e61 1468static int
fba45db2 1469proc_kill (procinfo *pi, int signo)
c3f6f71d
JM
1470{
1471 int win;
c906108c 1472
77382aee
PA
1473 /* We might conceivably apply this operation to an LWP, and the
1474 LWP's ctl file descriptor might not be open. */
c906108c 1475
c475f569
RO
1476 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
1477 return 0;
c3f6f71d
JM
1478 else
1479 {
37de36c6 1480 procfs_ctl_t cmd[2];
c906108c 1481
c3f6f71d
JM
1482 cmd[0] = PCKILL;
1483 cmd[1] = signo;
1484 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d 1485 }
c906108c 1486
c3f6f71d
JM
1487 return win;
1488}
c906108c 1489
77382aee
PA
1490/* Find the pid of the process that started this one. Returns the
1491 parent process pid, or zero. */
c906108c 1492
d3581e61 1493static int
fba45db2 1494proc_parent_pid (procinfo *pi)
c906108c 1495{
77382aee
PA
1496 /* We should never have to apply this operation to any procinfo
1497 except the one for the main process. If that ever changes for
1498 any reason, then take out the following clause and replace it
1499 with one that makes sure the ctl_fd is open. */
19958708 1500
c3f6f71d
JM
1501 if (pi->tid != 0)
1502 pi = find_procinfo_or_die (pi->pid, 0);
1503
1504 if (!pi->status_valid)
1505 if (!proc_get_status (pi))
1506 return 0;
c5aa993b 1507
c3f6f71d
JM
1508 return pi->prstatus.pr_ppid;
1509}
1510
9a043c1d
AC
1511/* Convert a target address (a.k.a. CORE_ADDR) into a host address
1512 (a.k.a void pointer)! */
1513
1514static void *
1515procfs_address_to_host_pointer (CORE_ADDR addr)
1516{
f5656ead 1517 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
9a043c1d
AC
1518 void *ptr;
1519
df86565b 1520 gdb_assert (sizeof (ptr) == ptr_type->length ());
f5656ead 1521 gdbarch_address_to_pointer (target_gdbarch (), ptr_type,
0b62613e 1522 (gdb_byte *) &ptr, addr);
9a043c1d
AC
1523 return ptr;
1524}
1525
a0911fd0 1526static int
fba45db2 1527proc_set_watchpoint (procinfo *pi, CORE_ADDR addr, int len, int wflags)
c3f6f71d 1528{
c3f6f71d 1529 struct {
37de36c6 1530 procfs_ctl_t cmd;
c3f6f71d
JM
1531 char watch[sizeof (prwatch_t)];
1532 } arg;
73930d4d 1533 prwatch_t pwatch;
c3f6f71d 1534
9a043c1d
AC
1535 /* NOTE: cagney/2003-02-01: Even more horrible hack. Need to
1536 convert a target address into something that can be stored in a
1537 native data structure. */
73930d4d 1538 pwatch.pr_vaddr = (uintptr_t) procfs_address_to_host_pointer (addr);
73930d4d
KH
1539 pwatch.pr_size = len;
1540 pwatch.pr_wflags = wflags;
c3f6f71d 1541 arg.cmd = PCWATCH;
73930d4d 1542 memcpy (arg.watch, &pwatch, sizeof (prwatch_t));
c3f6f71d 1543 return (write (pi->ctl_fd, &arg, sizeof (arg)) == sizeof (arg));
c906108c
SS
1544}
1545
c3f6f71d 1546/* =============== END, non-thread part of /proc "MODULE" =============== */
c906108c 1547
c3f6f71d 1548/* =================== Thread "MODULE" =================== */
c906108c 1549
44122162 1550/* Returns the number of threads for the process. */
c906108c 1551
d3581e61 1552static int
fba45db2 1553proc_get_nthreads (procinfo *pi)
c906108c 1554{
c3f6f71d
JM
1555 if (!pi->status_valid)
1556 if (!proc_get_status (pi))
1557 return 0;
c5aa993b 1558
44122162
RO
1559 /* Only works for the process procinfo, because the LWP procinfos do not
1560 get prstatus filled in. */
0df8b418 1561 if (pi->tid != 0) /* Find the parent process procinfo. */
c3f6f71d 1562 pi = find_procinfo_or_die (pi->pid, 0);
c3f6f71d 1563 return pi->prstatus.pr_nlwp;
c906108c
SS
1564}
1565
196535a6 1566/* Return the ID of the thread that had an event of interest.
77382aee
PA
1567 (ie. the one that hit a breakpoint or other traced event). All
1568 other things being equal, this should be the ID of a thread that is
1569 currently executing. */
c3f6f71d 1570
d3581e61 1571static int
fba45db2 1572proc_get_current_thread (procinfo *pi)
c3f6f71d 1573{
77382aee
PA
1574 /* Note: this should be applied to the root procinfo for the
1575 process, not to the procinfo for an LWP. If applied to the
1576 procinfo for an LWP, it will simply return that LWP's ID. In
1577 that case, find the parent process procinfo. */
19958708 1578
c3f6f71d
JM
1579 if (pi->tid != 0)
1580 pi = find_procinfo_or_die (pi->pid, 0);
1581
1582 if (!pi->status_valid)
1583 if (!proc_get_status (pi))
1584 return 0;
1585
c3f6f71d 1586 return pi->prstatus.pr_lwp.pr_lwpid;
c3f6f71d
JM
1587}
1588
77382aee 1589/* Discover the IDs of all the threads within the process, and create
196535a6 1590 a procinfo for each of them (chained to the parent). Returns
77382aee 1591 non-zero for success, zero for failure. */
c906108c 1592
a0911fd0 1593static int
fba45db2 1594proc_delete_dead_threads (procinfo *parent, procinfo *thread, void *ignore)
c3f6f71d
JM
1595{
1596 if (thread && parent) /* sanity */
c906108c 1597 {
c3f6f71d
JM
1598 thread->status_valid = 0;
1599 if (!proc_get_status (thread))
1600 destroy_one_procinfo (&parent->thread_list, thread);
1601 }
1602 return 0; /* keep iterating */
1603}
c5aa993b 1604
d3581e61 1605static int
fba45db2 1606proc_update_threads (procinfo *pi)
c3f6f71d
JM
1607{
1608 char pathname[MAX_PROC_NAME_SIZE + 16];
1609 struct dirent *direntry;
c3f6f71d 1610 procinfo *thread;
f0b3976b 1611 gdb_dir_up dirp;
c3f6f71d
JM
1612 int lwpid;
1613
77382aee
PA
1614 /* We should never have to apply this operation to any procinfo
1615 except the one for the main process. If that ever changes for
1616 any reason, then take out the following clause and replace it
1617 with one that makes sure the ctl_fd is open. */
19958708 1618
c3f6f71d
JM
1619 if (pi->tid != 0)
1620 pi = find_procinfo_or_die (pi->pid, 0);
1621
1622 proc_iterate_over_threads (pi, proc_delete_dead_threads, NULL);
1623
05b4bd79
PA
1624 /* Note: this brute-force method was originally devised for Unixware
1625 (support removed since), and will also work on Solaris 2.6 and
1626 2.7. The original comment mentioned the existence of a much
1627 simpler and more elegant way to do this on Solaris, but didn't
1628 point out what that was. */
c3f6f71d
JM
1629
1630 strcpy (pathname, pi->pathname);
1631 strcat (pathname, "/lwp");
f0b3976b
TT
1632 dirp.reset (opendir (pathname));
1633 if (dirp == NULL)
c3f6f71d
JM
1634 proc_error (pi, "update_threads, opendir", __LINE__);
1635
f0b3976b 1636 while ((direntry = readdir (dirp.get ())) != NULL)
c3f6f71d
JM
1637 if (direntry->d_name[0] != '.') /* skip '.' and '..' */
1638 {
1639 lwpid = atoi (&direntry->d_name[0]);
c475f569
RO
1640 thread = create_procinfo (pi->pid, lwpid);
1641 if (thread == NULL)
c3f6f71d
JM
1642 proc_error (pi, "update_threads, create_procinfo", __LINE__);
1643 }
1644 pi->threads_valid = 1;
c3f6f71d
JM
1645 return 1;
1646}
c906108c 1647
77382aee
PA
1648/* Given a pointer to a function, call that function once for each lwp
1649 in the procinfo list, until the function returns non-zero, in which
1650 event return the value returned by the function.
1651
1652 Note: this function does NOT call update_threads. If you want to
1653 discover new threads first, you must call that function explicitly.
1654 This function just makes a quick pass over the currently-known
1655 procinfos.
1656
1657 PI is the parent process procinfo. FUNC is the per-thread
1658 function. PTR is an opaque parameter for function. Returns the
1659 first non-zero return value from the callee, or zero. */
c3f6f71d 1660
d3581e61 1661static int
d0849a9a
KB
1662proc_iterate_over_threads (procinfo *pi,
1663 int (*func) (procinfo *, procinfo *, void *),
1664 void *ptr)
c906108c 1665{
c3f6f71d
JM
1666 procinfo *thread, *next;
1667 int retval = 0;
c906108c 1668
77382aee
PA
1669 /* We should never have to apply this operation to any procinfo
1670 except the one for the main process. If that ever changes for
1671 any reason, then take out the following clause and replace it
1672 with one that makes sure the ctl_fd is open. */
19958708 1673
c3f6f71d
JM
1674 if (pi->tid != 0)
1675 pi = find_procinfo_or_die (pi->pid, 0);
1676
1677 for (thread = pi->thread_list; thread != NULL; thread = next)
c906108c 1678 {
0df8b418 1679 next = thread->next; /* In case thread is destroyed. */
c475f569
RO
1680 retval = (*func) (pi, thread, ptr);
1681 if (retval != 0)
c3f6f71d 1682 break;
c906108c 1683 }
c3f6f71d
JM
1684
1685 return retval;
c906108c
SS
1686}
1687
c3f6f71d
JM
1688/* =================== END, Thread "MODULE" =================== */
1689
1690/* =================== END, /proc "MODULE" =================== */
1691
1692/* =================== GDB "MODULE" =================== */
1693
77382aee
PA
1694/* Here are all of the gdb target vector functions and their
1695 friends. */
c3f6f71d 1696
7fb43e53 1697static void do_attach (ptid_t ptid);
6bd6f3b6 1698static void do_detach ();
9185ddce 1699static void proc_trace_syscalls_1 (procinfo *pi, int syscallnum,
77382aee 1700 int entry_or_exit, int mode, int from_tty);
9185ddce 1701
77382aee
PA
1702/* Sets up the inferior to be debugged. Registers to trace signals,
1703 hardware faults, and syscalls. Note: does not set RLC flag: caller
1704 may want to customize that. Returns zero for success (note!
1705 unlike most functions in this module); on failure, returns the LINE
1706 NUMBER where it failed! */
c3f6f71d
JM
1707
1708static int
fba45db2 1709procfs_debug_inferior (procinfo *pi)
c906108c 1710{
c3f6f71d 1711 fltset_t traced_faults;
44122162 1712 sigset_t traced_signals;
37de36c6
KB
1713 sysset_t *traced_syscall_entries;
1714 sysset_t *traced_syscall_exits;
1715 int status;
c906108c 1716
0df8b418
MS
1717 /* Register to trace hardware faults in the child. */
1718 prfillset (&traced_faults); /* trace all faults... */
44122162 1719 prdelset (&traced_faults, FLTPAGE); /* except page fault. */
c3f6f71d
JM
1720 if (!proc_set_traced_faults (pi, &traced_faults))
1721 return __LINE__;
c906108c 1722
2455069d
UW
1723 /* Initially, register to trace all signals in the child. */
1724 prfillset (&traced_signals);
1725 if (!proc_set_traced_signals (pi, &traced_signals))
c3f6f71d
JM
1726 return __LINE__;
1727
37de36c6 1728
c3f6f71d 1729 /* Register to trace the 'exit' system call (on entry). */
c475f569 1730 traced_syscall_entries = XNEW (sysset_t);
44122162
RO
1731 premptyset (traced_syscall_entries);
1732 praddset (traced_syscall_entries, SYS_exit);
1733 praddset (traced_syscall_entries, SYS_lwp_exit);
c906108c 1734
37de36c6
KB
1735 status = proc_set_traced_sysentry (pi, traced_syscall_entries);
1736 xfree (traced_syscall_entries);
1737 if (!status)
c3f6f71d
JM
1738 return __LINE__;
1739
44122162 1740 /* Method for tracing exec syscalls. */
c475f569 1741 traced_syscall_exits = XNEW (sysset_t);
44122162 1742 premptyset (traced_syscall_exits);
44122162
RO
1743 praddset (traced_syscall_exits, SYS_execve);
1744 praddset (traced_syscall_exits, SYS_lwp_create);
1745 praddset (traced_syscall_exits, SYS_lwp_exit);
c906108c 1746
37de36c6
KB
1747 status = proc_set_traced_sysexit (pi, traced_syscall_exits);
1748 xfree (traced_syscall_exits);
1749 if (!status)
c3f6f71d
JM
1750 return __LINE__;
1751
c3f6f71d 1752 return 0;
c906108c
SS
1753}
1754
f6ac5f3d
PA
1755void
1756procfs_target::attach (const char *args, int from_tty)
c906108c 1757{
c3f6f71d
JM
1758 int pid;
1759
74164c56 1760 pid = parse_pid_to_attach (args);
c3f6f71d 1761
c3f6f71d 1762 if (pid == getpid ())
8a3fe4f8 1763 error (_("Attaching GDB to itself is not a good idea..."));
c906108c 1764
de146e19 1765 /* Push the target if needed, ensure it gets un-pushed it if attach fails. */
25b48839 1766 inferior *inf = current_inferior ();
de146e19 1767 target_unpush_up unpusher;
c8fbd44a 1768 if (!inf->target_is_pushed (this))
de146e19 1769 {
25b48839 1770 inf->push_target (this);
de146e19
SM
1771 unpusher.reset (this);
1772 }
1773
bc521517 1774 target_announce_attach (from_tty, pid);
de146e19 1775
7fb43e53 1776 do_attach (ptid_t (pid));
de146e19
SM
1777
1778 /* Everything went fine, keep the target pushed. */
1779 unpusher.release ();
c3f6f71d
JM
1780}
1781
f6ac5f3d
PA
1782void
1783procfs_target::detach (inferior *inf, int from_tty)
c3f6f71d 1784{
41e321a8 1785 target_announce_detach (from_tty);
19958708 1786
6bd6f3b6 1787 do_detach ();
cc377e6b 1788
7fb43e53 1789 switch_to_no_thread ();
b7a08269 1790 detach_inferior (inf);
f6ac5f3d 1791 maybe_unpush_target ();
c906108c
SS
1792}
1793
7fb43e53 1794static void
39f77062 1795do_attach (ptid_t ptid)
c906108c 1796{
c3f6f71d 1797 procinfo *pi;
181e7f93 1798 struct inferior *inf;
c3f6f71d 1799 int fail;
2689673f 1800 int lwpid;
c3f6f71d 1801
c475f569
RO
1802 pi = create_procinfo (ptid.pid (), 0);
1803 if (pi == NULL)
8a3fe4f8 1804 perror (_("procfs: out of memory in 'attach'"));
c3f6f71d
JM
1805
1806 if (!open_procinfo_files (pi, FD_CTL))
1807 {
6cb06a8c 1808 gdb_printf (gdb_stderr, "procfs:%d -- ", __LINE__);
c475f569
RO
1809 xsnprintf (errmsg, sizeof (errmsg),
1810 "do_attach: couldn't open /proc file for process %d",
1811 ptid.pid ());
c3f6f71d
JM
1812 dead_procinfo (pi, errmsg, NOKILL);
1813 }
c906108c 1814
c3f6f71d
JM
1815 /* Stop the process (if it isn't already stopped). */
1816 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
c906108c 1817 {
c3f6f71d
JM
1818 pi->was_stopped = 1;
1819 proc_prettyprint_why (proc_why (pi), proc_what (pi), 1);
c906108c
SS
1820 }
1821 else
1822 {
c3f6f71d
JM
1823 pi->was_stopped = 0;
1824 /* Set the process to run again when we close it. */
1825 if (!proc_set_run_on_last_close (pi))
1826 dead_procinfo (pi, "do_attach: couldn't set RLC.", NOKILL);
1827
0df8b418 1828 /* Now stop the process. */
c3f6f71d
JM
1829 if (!proc_stop_process (pi))
1830 dead_procinfo (pi, "do_attach: couldn't stop the process.", NOKILL);
1831 pi->ignore_next_sigstop = 1;
c906108c 1832 }
c3f6f71d
JM
1833 /* Save some of the /proc state to be restored if we detach. */
1834 if (!proc_get_traced_faults (pi, &pi->saved_fltset))
1835 dead_procinfo (pi, "do_attach: couldn't save traced faults.", NOKILL);
1836 if (!proc_get_traced_signals (pi, &pi->saved_sigset))
1837 dead_procinfo (pi, "do_attach: couldn't save traced signals.", NOKILL);
37de36c6 1838 if (!proc_get_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d
JM
1839 dead_procinfo (pi, "do_attach: couldn't save traced syscall entries.",
1840 NOKILL);
37de36c6 1841 if (!proc_get_traced_sysexit (pi, pi->saved_exitset))
19958708 1842 dead_procinfo (pi, "do_attach: couldn't save traced syscall exits.",
c3f6f71d
JM
1843 NOKILL);
1844 if (!proc_get_held_signals (pi, &pi->saved_sighold))
1845 dead_procinfo (pi, "do_attach: couldn't save held signals.", NOKILL);
1846
c475f569
RO
1847 fail = procfs_debug_inferior (pi);
1848 if (fail != 0)
c3f6f71d
JM
1849 dead_procinfo (pi, "do_attach: failed in procfs_debug_inferior", NOKILL);
1850
6c95b8df
PA
1851 inf = current_inferior ();
1852 inferior_appeared (inf, pi->pid);
c3f6f71d 1853 /* Let GDB know that the inferior was attached. */
30220b46 1854 inf->attach_flag = true;
2689673f
PA
1855
1856 /* Create a procinfo for the current lwp. */
1857 lwpid = proc_get_current_thread (pi);
1858 create_procinfo (pi->pid, lwpid);
1859
1860 /* Add it to gdb's thread list. */
fd79271b 1861 ptid = ptid_t (pi->pid, lwpid, 0);
7fb43e53
PA
1862 thread_info *thr = add_thread (&the_procfs_target, ptid);
1863 switch_to_thread (thr);
c906108c
SS
1864}
1865
1866static void
6bd6f3b6 1867do_detach ()
c906108c 1868{
c3f6f71d 1869 procinfo *pi;
c906108c 1870
0df8b418 1871 /* Find procinfo for the main process. */
e99b03dc 1872 pi = find_procinfo_or_die (inferior_ptid.pid (),
dfd4cc63 1873 0); /* FIXME: threads */
c5aa993b 1874
c3f6f71d
JM
1875 if (!proc_set_traced_signals (pi, &pi->saved_sigset))
1876 proc_warn (pi, "do_detach, set_traced_signal", __LINE__);
c906108c 1877
c3f6f71d
JM
1878 if (!proc_set_traced_faults (pi, &pi->saved_fltset))
1879 proc_warn (pi, "do_detach, set_traced_faults", __LINE__);
1880
37de36c6 1881 if (!proc_set_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d
JM
1882 proc_warn (pi, "do_detach, set_traced_sysentry", __LINE__);
1883
37de36c6 1884 if (!proc_set_traced_sysexit (pi, pi->saved_exitset))
c3f6f71d
JM
1885 proc_warn (pi, "do_detach, set_traced_sysexit", __LINE__);
1886
1887 if (!proc_set_held_signals (pi, &pi->saved_sighold))
1888 proc_warn (pi, "do_detach, set_held_signals", __LINE__);
1889
6bd6f3b6
SM
1890 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
1891 if (!(pi->was_stopped)
1892 || query (_("Was stopped when attached, make it runnable again? ")))
c3f6f71d
JM
1893 {
1894 /* Clear any pending signal. */
1895 if (!proc_clear_current_fault (pi))
1896 proc_warn (pi, "do_detach, clear_current_fault", __LINE__);
1897
6bd6f3b6 1898 if (!proc_clear_current_signal (pi))
1a303dec
MS
1899 proc_warn (pi, "do_detach, clear_current_signal", __LINE__);
1900
c3f6f71d
JM
1901 if (!proc_set_run_on_last_close (pi))
1902 proc_warn (pi, "do_detach, set_rlc", __LINE__);
1903 }
1904
c3f6f71d 1905 destroy_procinfo (pi);
c906108c
SS
1906}
1907
772cf8be
MK
1908/* Fetch register REGNUM from the inferior. If REGNUM is -1, do this
1909 for all registers.
1910
772cf8be
MK
1911 NOTE: Since the /proc interface cannot give us individual
1912 registers, we pay no attention to REGNUM, and just fetch them all.
1913 This results in the possibility that we will do unnecessarily many
1914 fetches, since we may be called repeatedly for individual
1915 registers. So we cache the results, and mark the cache invalid
1916 when the process is resumed. */
c3f6f71d 1917
f6ac5f3d
PA
1918void
1919procfs_target::fetch_registers (struct regcache *regcache, int regnum)
c906108c 1920{
772cf8be
MK
1921 gdb_gregset_t *gregs;
1922 procinfo *pi;
222312d3 1923 ptid_t ptid = regcache->ptid ();
e99b03dc 1924 int pid = ptid.pid ();
e38504b3 1925 int tid = ptid.lwp ();
ac7936df 1926 struct gdbarch *gdbarch = regcache->arch ();
c3f6f71d 1927
2689673f 1928 pi = find_procinfo_or_die (pid, tid);
c3f6f71d
JM
1929
1930 if (pi == NULL)
8a3fe4f8 1931 error (_("procfs: fetch_registers failed to find procinfo for %s"),
a068643d 1932 target_pid_to_str (ptid).c_str ());
c3f6f71d 1933
772cf8be
MK
1934 gregs = proc_get_gregs (pi);
1935 if (gregs == NULL)
c3f6f71d
JM
1936 proc_error (pi, "fetch_registers, get_gregs", __LINE__);
1937
56be3814 1938 supply_gregset (regcache, (const gdb_gregset_t *) gregs);
c3f6f71d 1939
40a6adc1 1940 if (gdbarch_fp0_regnum (gdbarch) >= 0) /* Do we have an FPU? */
60054393 1941 {
772cf8be
MK
1942 gdb_fpregset_t *fpregs;
1943
40a6adc1
MD
1944 if ((regnum >= 0 && regnum < gdbarch_fp0_regnum (gdbarch))
1945 || regnum == gdbarch_pc_regnum (gdbarch)
1946 || regnum == gdbarch_sp_regnum (gdbarch))
772cf8be 1947 return; /* Not a floating point register. */
c5aa993b 1948
772cf8be
MK
1949 fpregs = proc_get_fpregs (pi);
1950 if (fpregs == NULL)
60054393 1951 proc_error (pi, "fetch_registers, get_fpregs", __LINE__);
c906108c 1952
56be3814 1953 supply_fpregset (regcache, (const gdb_fpregset_t *) fpregs);
60054393 1954 }
c906108c
SS
1955}
1956
772cf8be
MK
1957/* Store register REGNUM back into the inferior. If REGNUM is -1, do
1958 this for all registers.
1959
1960 NOTE: Since the /proc interface will not read individual registers,
1961 we will cache these requests until the process is resumed, and only
1962 then write them back to the inferior process.
77382aee 1963
772cf8be
MK
1964 FIXME: is that a really bad idea? Have to think about cases where
1965 writing one register might affect the value of others, etc. */
c906108c 1966
f6ac5f3d
PA
1967void
1968procfs_target::store_registers (struct regcache *regcache, int regnum)
c3f6f71d 1969{
772cf8be
MK
1970 gdb_gregset_t *gregs;
1971 procinfo *pi;
222312d3 1972 ptid_t ptid = regcache->ptid ();
e99b03dc 1973 int pid = ptid.pid ();
e38504b3 1974 int tid = ptid.lwp ();
ac7936df 1975 struct gdbarch *gdbarch = regcache->arch ();
c3f6f71d 1976
2689673f 1977 pi = find_procinfo_or_die (pid, tid);
c3f6f71d
JM
1978
1979 if (pi == NULL)
8a3fe4f8 1980 error (_("procfs: store_registers: failed to find procinfo for %s"),
a068643d 1981 target_pid_to_str (ptid).c_str ());
c906108c 1982
772cf8be
MK
1983 gregs = proc_get_gregs (pi);
1984 if (gregs == NULL)
c3f6f71d 1985 proc_error (pi, "store_registers, get_gregs", __LINE__);
c906108c 1986
56be3814 1987 fill_gregset (regcache, gregs, regnum);
c3f6f71d
JM
1988 if (!proc_set_gregs (pi))
1989 proc_error (pi, "store_registers, set_gregs", __LINE__);
c906108c 1990
40a6adc1 1991 if (gdbarch_fp0_regnum (gdbarch) >= 0) /* Do we have an FPU? */
60054393 1992 {
772cf8be
MK
1993 gdb_fpregset_t *fpregs;
1994
40a6adc1
MD
1995 if ((regnum >= 0 && regnum < gdbarch_fp0_regnum (gdbarch))
1996 || regnum == gdbarch_pc_regnum (gdbarch)
1997 || regnum == gdbarch_sp_regnum (gdbarch))
772cf8be 1998 return; /* Not a floating point register. */
60054393 1999
772cf8be
MK
2000 fpregs = proc_get_fpregs (pi);
2001 if (fpregs == NULL)
60054393
MS
2002 proc_error (pi, "store_registers, get_fpregs", __LINE__);
2003
56be3814 2004 fill_fpregset (regcache, fpregs, regnum);
60054393
MS
2005 if (!proc_set_fpregs (pi))
2006 proc_error (pi, "store_registers, set_fpregs", __LINE__);
2007 }
c3f6f71d 2008}
c906108c 2009
77382aee
PA
2010/* Retrieve the next stop event from the child process. If child has
2011 not stopped yet, wait for it to stop. Translate /proc eventcodes
2012 (or possibly wait eventcodes) into gdb internal event codes.
2013 Returns the id of process (and possibly thread) that incurred the
2014 event. Event codes are returned through a pointer parameter. */
c906108c 2015
f6ac5f3d
PA
2016ptid_t
2017procfs_target::wait (ptid_t ptid, struct target_waitstatus *status,
b60cea74 2018 target_wait_flags options)
c906108c 2019{
0df8b418 2020 /* First cut: loosely based on original version 2.1. */
c3f6f71d 2021 procinfo *pi;
39f77062
KB
2022 int wstat;
2023 int temp_tid;
2024 ptid_t retval, temp_ptid;
c3f6f71d
JM
2025 int why, what, flags;
2026 int retry = 0;
c906108c 2027
c3f6f71d 2028wait_again:
c906108c 2029
c3f6f71d
JM
2030 retry++;
2031 wstat = 0;
f2907e49 2032 retval = ptid_t (-1);
c906108c 2033
0df8b418 2034 /* Find procinfo for main process. */
f8098322
PA
2035
2036 /* procfs_target currently only supports one inferior. */
2037 inferior *inf = current_inferior ();
2038
2039 pi = find_procinfo_or_die (inf->pid, 0);
c3f6f71d 2040 if (pi)
c906108c 2041 {
0df8b418 2042 /* We must assume that the status is stale now... */
c3f6f71d
JM
2043 pi->status_valid = 0;
2044 pi->gregs_valid = 0;
2045 pi->fpregs_valid = 0;
2046
0df8b418 2047#if 0 /* just try this out... */
c3f6f71d
JM
2048 flags = proc_flags (pi);
2049 why = proc_why (pi);
2050 if ((flags & PR_STOPPED) && (why == PR_REQUESTED))
0df8b418 2051 pi->status_valid = 0; /* re-read again, IMMEDIATELY... */
c3f6f71d
JM
2052#endif
2053 /* If child is not stopped, wait for it to stop. */
c475f569
RO
2054 if (!(proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
2055 && !proc_wait_for_stop (pi))
c906108c 2056 {
0df8b418 2057 /* wait_for_stop failed: has the child terminated? */
c3f6f71d 2058 if (errno == ENOENT)
c906108c 2059 {
39f77062
KB
2060 int wait_retval;
2061
0df8b418 2062 /* /proc file not found; presumably child has terminated. */
f6ac5f3d 2063 wait_retval = ::wait (&wstat); /* "wait" for the child's exit. */
c3f6f71d 2064
dfd4cc63 2065 /* Wrong child? */
f8098322 2066 if (wait_retval != inf->pid)
3e43a32a
MS
2067 error (_("procfs: couldn't stop "
2068 "process %d: wait returned %d."),
f8098322 2069 inf->pid, wait_retval);
c3f6f71d 2070 /* FIXME: might I not just use waitpid?
0df8b418 2071 Or try find_procinfo to see if I know about this child? */
f2907e49 2072 retval = ptid_t (wait_retval);
c906108c 2073 }
d1566ff5
FN
2074 else if (errno == EINTR)
2075 goto wait_again;
c3f6f71d 2076 else
c906108c 2077 {
0df8b418 2078 /* Unknown error from wait_for_stop. */
c3f6f71d 2079 proc_error (pi, "target_wait (wait_for_stop)", __LINE__);
c906108c 2080 }
c3f6f71d
JM
2081 }
2082 else
2083 {
2084 /* This long block is reached if either:
2085 a) the child was already stopped, or
2086 b) we successfully waited for the child with wait_for_stop.
2087 This block will analyze the /proc status, and translate it
2088 into a waitstatus for GDB.
2089
2090 If we actually had to call wait because the /proc file
19958708 2091 is gone (child terminated), then we skip this block,
c3f6f71d
JM
2092 because we already have a waitstatus. */
2093
2094 flags = proc_flags (pi);
2095 why = proc_why (pi);
2096 what = proc_what (pi);
2097
c3f6f71d 2098 if (flags & (PR_STOPPED | PR_ISTOP))
c906108c 2099 {
c3f6f71d
JM
2100 /* If it's running async (for single_thread control),
2101 set it back to normal again. */
2102 if (flags & PR_ASYNC)
2103 if (!proc_unset_async (pi))
2104 proc_error (pi, "target_wait, unset_async", __LINE__);
c3f6f71d
JM
2105
2106 if (info_verbose)
2107 proc_prettyprint_why (why, what, 1);
2108
2109 /* The 'pid' we will return to GDB is composed of
2110 the process ID plus the lwp ID. */
fd79271b 2111 retval = ptid_t (pi->pid, proc_get_current_thread (pi), 0);
c3f6f71d
JM
2112
2113 switch (why) {
2114 case PR_SIGNALLED:
2115 wstat = (what << 8) | 0177;
2116 break;
2117 case PR_SYSENTRY:
196535a6 2118 if (what == SYS_lwp_exit)
c3f6f71d 2119 {
9213a6d7 2120 delete_thread (this->find_thread (retval));
b2ad7bb9 2121 proc_resume (pi, ptid, 0, GDB_SIGNAL_0);
f8098322 2122 goto wait_again;
37de36c6 2123 }
196535a6 2124 else if (what == SYS_exit)
37de36c6 2125 {
0df8b418 2126 /* Handle SYS_exit call only. */
37de36c6 2127 /* Stopped at entry to SYS_exit.
19958708 2128 Make it runnable, resume it, then use
37de36c6 2129 the wait system call to get its exit code.
19958708 2130 Proc_run_process always clears the current
37de36c6
KB
2131 fault and signal.
2132 Then return its exit status. */
2133 pi->status_valid = 0;
2134 wstat = 0;
19958708 2135 /* FIXME: what we should do is return
37de36c6
KB
2136 TARGET_WAITKIND_SPURIOUS. */
2137 if (!proc_run_process (pi, 0, 0))
2138 proc_error (pi, "target_wait, run_process", __LINE__);
181e7f93 2139
181e7f93 2140 if (inf->attach_flag)
c3f6f71d 2141 {
19958708 2142 /* Don't call wait: simulate waiting for exit,
37de36c6
KB
2143 return a "success" exit code. Bogus: what if
2144 it returns something else? */
2145 wstat = 0;
f8098322 2146 retval = ptid_t (inf->pid); /* ? ? ? */
37de36c6
KB
2147 }
2148 else
2149 {
f6ac5f3d 2150 int temp = ::wait (&wstat);
37de36c6
KB
2151
2152 /* FIXME: shouldn't I make sure I get the right
2153 event from the right process? If (for
2154 instance) I have killed an earlier inferior
2155 process but failed to clean up after it
2156 somehow, I could get its termination event
2157 here. */
2158
0df8b418
MS
2159 /* If wait returns -1, that's what we return
2160 to GDB. */
37de36c6 2161 if (temp < 0)
f2907e49 2162 retval = ptid_t (temp);
c3f6f71d 2163 }
c3f6f71d 2164 }
37de36c6
KB
2165 else
2166 {
6cb06a8c 2167 gdb_printf (_("procfs: trapped on entry to "));
37de36c6 2168 proc_prettyprint_syscall (proc_what (pi), 0);
6cb06a8c 2169 gdb_printf ("\n");
44122162
RO
2170
2171 long i, nsysargs, *sysargs;
2172
c475f569
RO
2173 nsysargs = proc_nsysarg (pi);
2174 sysargs = proc_sysargs (pi);
2175
2176 if (nsysargs > 0 && sysargs != NULL)
44122162 2177 {
6cb06a8c
TT
2178 gdb_printf (_("%ld syscall arguments:\n"),
2179 nsysargs);
44122162 2180 for (i = 0; i < nsysargs; i++)
6cb06a8c
TT
2181 gdb_printf ("#%ld: 0x%08lx\n",
2182 i, sysargs[i]);
44122162
RO
2183 }
2184
b2ad7bb9 2185 proc_resume (pi, ptid, 0, GDB_SIGNAL_0);
f8098322 2186 goto wait_again;
37de36c6
KB
2187 }
2188 break;
2189 case PR_SYSEXIT:
196535a6 2190 if (what == SYS_execve)
c3f6f71d 2191 {
37de36c6
KB
2192 /* Hopefully this is our own "fork-child" execing
2193 the real child. Hoax this event into a trap, and
2194 GDB will see the child about to execute its start
0df8b418 2195 address. */
37de36c6
KB
2196 wstat = (SIGTRAP << 8) | 0177;
2197 }
196535a6 2198 else if (what == SYS_lwp_create)
37de36c6 2199 {
77382aee
PA
2200 /* This syscall is somewhat like fork/exec. We
2201 will get the event twice: once for the parent
2202 LWP, and once for the child. We should already
2203 know about the parent LWP, but the child will
2204 be new to us. So, whenever we get this event,
2205 if it represents a new thread, simply add the
2206 thread to the list. */
c3f6f71d 2207
37de36c6 2208 /* If not in procinfo list, add it. */
39f77062
KB
2209 temp_tid = proc_get_current_thread (pi);
2210 if (!find_procinfo (pi->pid, temp_tid))
2211 create_procinfo (pi->pid, temp_tid);
37de36c6 2212
fd79271b 2213 temp_ptid = ptid_t (pi->pid, temp_tid, 0);
37de36c6 2214 /* If not in GDB's thread list, add it. */
5b6d1e4f
PA
2215 if (!in_thread_list (this, temp_ptid))
2216 add_thread (this, temp_ptid);
93815fbf 2217
b2ad7bb9 2218 proc_resume (pi, ptid, 0, GDB_SIGNAL_0);
f8098322 2219 goto wait_again;
37de36c6 2220 }
196535a6 2221 else if (what == SYS_lwp_exit)
37de36c6 2222 {
9213a6d7 2223 delete_thread (this->find_thread (retval));
183be222 2224 status->set_spurious ();
37de36c6 2225 return retval;
c3f6f71d 2226 }
37de36c6
KB
2227 else
2228 {
6cb06a8c 2229 gdb_printf (_("procfs: trapped on exit from "));
37de36c6 2230 proc_prettyprint_syscall (proc_what (pi), 0);
6cb06a8c 2231 gdb_printf ("\n");
44122162
RO
2232
2233 long i, nsysargs, *sysargs;
2234
c475f569
RO
2235 nsysargs = proc_nsysarg (pi);
2236 sysargs = proc_sysargs (pi);
2237
2238 if (nsysargs > 0 && sysargs != NULL)
44122162 2239 {
6cb06a8c
TT
2240 gdb_printf (_("%ld syscall arguments:\n"),
2241 nsysargs);
44122162 2242 for (i = 0; i < nsysargs; i++)
6cb06a8c
TT
2243 gdb_printf ("#%ld: 0x%08lx\n",
2244 i, sysargs[i]);
44122162
RO
2245 }
2246
b2ad7bb9 2247 proc_resume (pi, ptid, 0, GDB_SIGNAL_0);
f8098322 2248 goto wait_again;
37de36c6 2249 }
c3f6f71d
JM
2250 break;
2251 case PR_REQUESTED:
2252#if 0 /* FIXME */
2253 wstat = (SIGSTOP << 8) | 0177;
2254 break;
2255#else
2256 if (retry < 5)
2257 {
6cb06a8c 2258 gdb_printf (_("Retry #%d:\n"), retry);
c3f6f71d
JM
2259 pi->status_valid = 0;
2260 goto wait_again;
2261 }
2262 else
2263 {
2264 /* If not in procinfo list, add it. */
39f77062
KB
2265 temp_tid = proc_get_current_thread (pi);
2266 if (!find_procinfo (pi->pid, temp_tid))
2267 create_procinfo (pi->pid, temp_tid);
c3f6f71d
JM
2268
2269 /* If not in GDB's thread list, add it. */
fd79271b 2270 temp_ptid = ptid_t (pi->pid, temp_tid, 0);
5b6d1e4f
PA
2271 if (!in_thread_list (this, temp_ptid))
2272 add_thread (this, temp_ptid);
c3f6f71d 2273
183be222 2274 status->set_stopped (GDB_SIGNAL_0);
c3f6f71d
JM
2275 return retval;
2276 }
2277#endif
2278 case PR_JOBCONTROL:
2279 wstat = (what << 8) | 0177;
2280 break;
2281 case PR_FAULTED:
7a289707
RO
2282 {
2283 int signo = pi->prstatus.pr_lwp.pr_info.si_signo;
2284 if (signo != 0)
2285 wstat = (signo << 8) | 0177;
c3f6f71d 2286 }
7a289707 2287 break;
c3f6f71d 2288 default: /* switch (why) unmatched */
6cb06a8c
TT
2289 gdb_printf ("procfs:%d -- ", __LINE__);
2290 gdb_printf (_("child stopped for unknown reason:\n"));
c3f6f71d 2291 proc_prettyprint_why (why, what, 1);
8a3fe4f8 2292 error (_("... giving up..."));
c3f6f71d
JM
2293 break;
2294 }
77382aee
PA
2295 /* Got this far without error: If retval isn't in the
2296 threads database, add it. */
c475f569 2297 if (retval.pid () > 0
5b6d1e4f 2298 && !in_thread_list (this, retval))
c906108c 2299 {
77382aee
PA
2300 /* We have a new thread. We need to add it both to
2301 GDB's list and to our own. If we don't create a
2302 procinfo, resume may be unhappy later. */
5b6d1e4f 2303 add_thread (this, retval);
e99b03dc 2304 if (find_procinfo (retval.pid (),
e38504b3 2305 retval.lwp ()) == NULL)
e99b03dc 2306 create_procinfo (retval.pid (),
e38504b3 2307 retval.lwp ());
c906108c 2308 }
c906108c 2309 }
0df8b418 2310 else /* Flags do not indicate STOPPED. */
c906108c 2311 {
0df8b418 2312 /* surely this can't happen... */
6cb06a8c
TT
2313 gdb_printf ("procfs:%d -- process not stopped.\n",
2314 __LINE__);
c3f6f71d 2315 proc_prettyprint_flags (flags, 1);
8a3fe4f8 2316 error (_("procfs: ...giving up..."));
c906108c 2317 }
c906108c 2318 }
c906108c 2319
c3f6f71d 2320 if (status)
7509b829 2321 *status = host_status_to_waitstatus (wstat);
c906108c
SS
2322 }
2323
c3f6f71d
JM
2324 return retval;
2325}
c906108c 2326
4e73f23d
RM
2327/* Perform a partial transfer to/from the specified object. For
2328 memory transfers, fall back to the old memory xfer functions. */
2329
f6ac5f3d
PA
2330enum target_xfer_status
2331procfs_target::xfer_partial (enum target_object object,
2332 const char *annex, gdb_byte *readbuf,
2333 const gdb_byte *writebuf, ULONGEST offset,
2334 ULONGEST len, ULONGEST *xfered_len)
4e73f23d
RM
2335{
2336 switch (object)
2337 {
2338 case TARGET_OBJECT_MEMORY:
e96027e0 2339 return procfs_xfer_memory (readbuf, writebuf, offset, len, xfered_len);
4e73f23d 2340
4e73f23d 2341 case TARGET_OBJECT_AUXV:
f6ac5f3d 2342 return memory_xfer_auxv (this, object, annex, readbuf, writebuf,
9b409511 2343 offset, len, xfered_len);
4e73f23d
RM
2344
2345 default:
4360561f
TT
2346 return this->beneath ()->xfer_partial (object, annex,
2347 readbuf, writebuf, offset, len,
2348 xfered_len);
4e73f23d
RM
2349 }
2350}
2351
e96027e0
PA
2352/* Helper for procfs_xfer_partial that handles memory transfers.
2353 Arguments are like target_xfer_partial. */
4e73f23d 2354
e96027e0
PA
2355static enum target_xfer_status
2356procfs_xfer_memory (gdb_byte *readbuf, const gdb_byte *writebuf,
2357 ULONGEST memaddr, ULONGEST len, ULONGEST *xfered_len)
c3f6f71d
JM
2358{
2359 procinfo *pi;
e96027e0 2360 int nbytes;
c906108c 2361
0df8b418 2362 /* Find procinfo for main process. */
e99b03dc 2363 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c475f569 2364 if (pi->as_fd == 0 && open_procinfo_files (pi, FD_AS) == 0)
c906108c 2365 {
c3f6f71d 2366 proc_warn (pi, "xfer_memory, open_proc_files", __LINE__);
e96027e0 2367 return TARGET_XFER_E_IO;
c906108c 2368 }
c906108c 2369
e96027e0
PA
2370 if (lseek (pi->as_fd, (off_t) memaddr, SEEK_SET) != (off_t) memaddr)
2371 return TARGET_XFER_E_IO;
2372
2373 if (writebuf != NULL)
c906108c 2374 {
e96027e0
PA
2375 PROCFS_NOTE ("write memory:\n");
2376 nbytes = write (pi->as_fd, writebuf, len);
2377 }
2378 else
2379 {
2380 PROCFS_NOTE ("read memory:\n");
2381 nbytes = read (pi->as_fd, readbuf, len);
c906108c 2382 }
e96027e0
PA
2383 if (nbytes <= 0)
2384 return TARGET_XFER_E_IO;
2385 *xfered_len = nbytes;
2386 return TARGET_XFER_OK;
c906108c
SS
2387}
2388
77382aee
PA
2389/* Called by target_resume before making child runnable. Mark cached
2390 registers and status's invalid. If there are "dirty" caches that
2391 need to be written back to the child process, do that.
c906108c 2392
77382aee
PA
2393 File descriptors are also cached. As they are a limited resource,
2394 we cannot hold onto them indefinitely. However, as they are
2395 expensive to open, we don't want to throw them away
85102364 2396 indiscriminately either. As a compromise, we will keep the file
77382aee
PA
2397 descriptors for the parent process, but discard any file
2398 descriptors we may have accumulated for the threads.
2399
2400 As this function is called by iterate_over_threads, it always
2401 returns zero (so that iterate_over_threads will keep
2402 iterating). */
c3f6f71d
JM
2403
2404static int
fba45db2 2405invalidate_cache (procinfo *parent, procinfo *pi, void *ptr)
c906108c 2406{
77382aee
PA
2407 /* About to run the child; invalidate caches and do any other
2408 cleanup. */
c906108c 2409
c3f6f71d 2410 if (parent != NULL)
c906108c 2411 {
c3f6f71d 2412 /* The presence of a parent indicates that this is an LWP.
19958708 2413 Close any file descriptors that it might have open.
c3f6f71d
JM
2414 We don't do this to the master (parent) procinfo. */
2415
2416 close_procinfo_files (pi);
c906108c 2417 }
c3f6f71d
JM
2418 pi->gregs_valid = 0;
2419 pi->fpregs_valid = 0;
c3f6f71d
JM
2420 pi->status_valid = 0;
2421 pi->threads_valid = 0;
c906108c 2422
c3f6f71d 2423 return 0;
c906108c
SS
2424}
2425
b2ad7bb9 2426/* Make child process PI runnable.
77382aee
PA
2427
2428 If STEP is true, then arrange for the child to stop again after
b2ad7bb9
PA
2429 executing a single instruction. SCOPE_PTID, STEP and SIGNO are
2430 like in the target_resume interface. */
c906108c 2431
b2ad7bb9
PA
2432static void
2433proc_resume (procinfo *pi, ptid_t scope_ptid, int step, enum gdb_signal signo)
c906108c 2434{
b2ad7bb9 2435 procinfo *thread;
c3f6f71d
JM
2436 int native_signo;
2437
196535a6
RO
2438 /* FIXME: Check/reword. */
2439
2440 /* prrun.prflags |= PRCFAULT; clear current fault.
2441 PRCFAULT may be replaced by a PCCFAULT call (proc_clear_current_fault)
c3f6f71d 2442 This basically leaves PRSTEP and PRCSIG.
196535a6 2443 PRCSIG is like PCSSIG (proc_clear_current_signal).
c3f6f71d 2444 So basically PR_STEP is the sole argument that must be passed
196535a6 2445 to proc_run_process. */
c3f6f71d 2446
c3f6f71d 2447 errno = 0;
c906108c 2448
c3f6f71d 2449 /* Convert signal to host numbering. */
c475f569 2450 if (signo == 0 || (signo == GDB_SIGNAL_STOP && pi->ignore_next_sigstop))
c3f6f71d
JM
2451 native_signo = 0;
2452 else
2ea28649 2453 native_signo = gdb_signal_to_host (signo);
c906108c 2454
c3f6f71d 2455 pi->ignore_next_sigstop = 0;
c906108c 2456
77382aee
PA
2457 /* Running the process voids all cached registers and status. */
2458 /* Void the threads' caches first. */
19958708 2459 proc_iterate_over_threads (pi, invalidate_cache, NULL);
c3f6f71d
JM
2460 /* Void the process procinfo's caches. */
2461 invalidate_cache (NULL, pi, NULL);
c906108c 2462
b2ad7bb9 2463 if (scope_ptid.pid () != -1)
c906108c 2464 {
77382aee
PA
2465 /* Resume a specific thread, presumably suppressing the
2466 others. */
b2ad7bb9 2467 thread = find_procinfo (scope_ptid.pid (), scope_ptid.lwp ());
7de45904 2468 if (thread != NULL)
c906108c 2469 {
c3f6f71d
JM
2470 if (thread->tid != 0)
2471 {
77382aee
PA
2472 /* We're to resume a specific thread, and not the
2473 others. Set the child process's PR_ASYNC flag. */
c3f6f71d
JM
2474 if (!proc_set_async (pi))
2475 proc_error (pi, "target_resume, set_async", __LINE__);
0df8b418
MS
2476 pi = thread; /* Substitute the thread's procinfo
2477 for run. */
c3f6f71d 2478 }
c906108c
SS
2479 }
2480 }
c906108c 2481
c3f6f71d 2482 if (!proc_run_process (pi, step, native_signo))
c906108c 2483 {
c3f6f71d 2484 if (errno == EBUSY)
77382aee
PA
2485 warning (_("resume: target already running. "
2486 "Pretend to resume, and hope for the best!"));
c3f6f71d
JM
2487 else
2488 proc_error (pi, "target_resume", __LINE__);
c906108c 2489 }
c3f6f71d 2490}
c906108c 2491
b2ad7bb9
PA
2492/* Implementation of target_ops::resume. */
2493
2494void
2495procfs_target::resume (ptid_t scope_ptid, int step, enum gdb_signal signo)
2496{
2497 /* Find procinfo for main process. */
2498 procinfo *pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
2499
2500 proc_resume (pi, scope_ptid, step, signo);
2501}
2502
77382aee 2503/* Set up to trace signals in the child process. */
c906108c 2504
f6ac5f3d 2505void
adc6a863 2506procfs_target::pass_signals (gdb::array_view<const unsigned char> pass_signals)
c3f6f71d 2507{
44122162 2508 sigset_t signals;
e99b03dc 2509 procinfo *pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
2455069d 2510 int signo;
c906108c 2511
2455069d
UW
2512 prfillset (&signals);
2513
2514 for (signo = 0; signo < NSIG; signo++)
2515 {
2ea28649 2516 int target_signo = gdb_signal_from_host (signo);
adc6a863 2517 if (target_signo < pass_signals.size () && pass_signals[target_signo])
44122162 2518 prdelset (&signals, signo);
2455069d
UW
2519 }
2520
2521 if (!proc_set_traced_signals (pi, &signals))
2522 proc_error (pi, "pass_signals", __LINE__);
c3f6f71d 2523}
c906108c 2524
77382aee 2525/* Print status information about the child process. */
c906108c 2526
f6ac5f3d
PA
2527void
2528procfs_target::files_info ()
c3f6f71d 2529{
181e7f93 2530 struct inferior *inf = current_inferior ();
f4a14ae6 2531
6cb06a8c
TT
2532 gdb_printf (_("\tUsing the running image of %s %s via /proc.\n"),
2533 inf->attach_flag? "attached": "child",
fb6d30e0 2534 target_pid_to_str (ptid_t (inf->pid)).c_str ());
c3f6f71d 2535}
c906108c 2536
77382aee
PA
2537/* Make it die. Wait for it to die. Clean up after it. Note: this
2538 should only be applied to the real process, not to an LWP, because
2539 of the check for parent-process. If we need this to work for an
2540 LWP, it needs some more logic. */
c906108c 2541
c3f6f71d 2542static void
fba45db2 2543unconditionally_kill_inferior (procinfo *pi)
c3f6f71d
JM
2544{
2545 int parent_pid;
c906108c 2546
c3f6f71d 2547 parent_pid = proc_parent_pid (pi);
c3f6f71d 2548 if (!proc_kill (pi, SIGKILL))
103b3ef5 2549 proc_error (pi, "unconditionally_kill, proc_kill", __LINE__);
c3f6f71d 2550 destroy_procinfo (pi);
c906108c 2551
c3f6f71d
JM
2552 /* If pi is GDB's child, wait for it to die. */
2553 if (parent_pid == getpid ())
19958708 2554 /* FIXME: should we use waitpid to make sure we get the right event?
c3f6f71d
JM
2555 Should we check the returned event? */
2556 {
0d06e24b 2557#if 0
c3f6f71d 2558 int status, ret;
c906108c 2559
c3f6f71d
JM
2560 ret = waitpid (pi->pid, &status, 0);
2561#else
2562 wait (NULL);
2563#endif
2564 }
2565}
c906108c 2566
77382aee
PA
2567/* We're done debugging it, and we want it to go away. Then we want
2568 GDB to forget all about it. */
c906108c 2569
f6ac5f3d
PA
2570void
2571procfs_target::kill ()
c906108c 2572{
d7e15655 2573 if (inferior_ptid != null_ptid) /* ? */
c3f6f71d 2574 {
0df8b418 2575 /* Find procinfo for main process. */
e99b03dc 2576 procinfo *pi = find_procinfo (inferior_ptid.pid (), 0);
c906108c 2577
c3f6f71d
JM
2578 if (pi)
2579 unconditionally_kill_inferior (pi);
bc1e6c81 2580 target_mourn_inferior (inferior_ptid);
c906108c 2581 }
c3f6f71d
JM
2582}
2583
77382aee 2584/* Forget we ever debugged this thing! */
c906108c 2585
f6ac5f3d
PA
2586void
2587procfs_target::mourn_inferior ()
c3f6f71d
JM
2588{
2589 procinfo *pi;
c906108c 2590
d7e15655 2591 if (inferior_ptid != null_ptid)
c3f6f71d 2592 {
0df8b418 2593 /* Find procinfo for main process. */
e99b03dc 2594 pi = find_procinfo (inferior_ptid.pid (), 0);
c3f6f71d
JM
2595 if (pi)
2596 destroy_procinfo (pi);
c906108c 2597 }
6a3cb8e8
PA
2598
2599 generic_mourn_inferior ();
8181d85f 2600
f6ac5f3d 2601 maybe_unpush_target ();
c3f6f71d 2602}
c906108c 2603
77382aee
PA
2604/* When GDB forks to create a runnable inferior process, this function
2605 is called on the parent side of the fork. It's job is to do
2606 whatever is necessary to make the child ready to be debugged, and
2607 then wait for the child to synchronize. */
c906108c 2608
5b6d1e4f
PA
2609void
2610procfs_target::procfs_init_inferior (int pid)
c3f6f71d
JM
2611{
2612 procinfo *pi;
c3f6f71d 2613 int fail;
2689673f 2614 int lwpid;
c906108c 2615
c475f569
RO
2616 pi = create_procinfo (pid, 0);
2617 if (pi == NULL)
9b20d036 2618 perror (_("procfs: out of memory in 'init_inferior'"));
c3f6f71d
JM
2619
2620 if (!open_procinfo_files (pi, FD_CTL))
2621 proc_error (pi, "init_inferior, open_proc_files", __LINE__);
2622
2623 /*
2624 xmalloc // done
2625 open_procinfo_files // done
2626 link list // done
2627 prfillset (trace)
2628 procfs_notice_signals
2629 prfillset (fault)
2630 prdelset (FLTPAGE)
c3f6f71d
JM
2631 */
2632
77382aee 2633 /* If not stopped yet, wait for it to stop. */
c475f569 2634 if (!(proc_flags (pi) & PR_STOPPED) && !(proc_wait_for_stop (pi)))
c3f6f71d
JM
2635 dead_procinfo (pi, "init_inferior: wait_for_stop failed", KILL);
2636
2637 /* Save some of the /proc state to be restored if we detach. */
2638 /* FIXME: Why? In case another debugger was debugging it?
0df8b418 2639 We're it's parent, for Ghu's sake! */
c3f6f71d
JM
2640 if (!proc_get_traced_signals (pi, &pi->saved_sigset))
2641 proc_error (pi, "init_inferior, get_traced_signals", __LINE__);
2642 if (!proc_get_held_signals (pi, &pi->saved_sighold))
2643 proc_error (pi, "init_inferior, get_held_signals", __LINE__);
2644 if (!proc_get_traced_faults (pi, &pi->saved_fltset))
2645 proc_error (pi, "init_inferior, get_traced_faults", __LINE__);
37de36c6 2646 if (!proc_get_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d 2647 proc_error (pi, "init_inferior, get_traced_sysentry", __LINE__);
37de36c6 2648 if (!proc_get_traced_sysexit (pi, pi->saved_exitset))
c3f6f71d
JM
2649 proc_error (pi, "init_inferior, get_traced_sysexit", __LINE__);
2650
c475f569
RO
2651 fail = procfs_debug_inferior (pi);
2652 if (fail != 0)
c3f6f71d
JM
2653 proc_error (pi, "init_inferior (procfs_debug_inferior)", fail);
2654
0d06e24b
JM
2655 /* FIXME: logically, we should really be turning OFF run-on-last-close,
2656 and possibly even turning ON kill-on-last-close at this point. But
2657 I can't make that change without careful testing which I don't have
2658 time to do right now... */
c3f6f71d
JM
2659 /* Turn on run-on-last-close flag so that the child
2660 will die if GDB goes away for some reason. */
2661 if (!proc_set_run_on_last_close (pi))
2662 proc_error (pi, "init_inferior, set_RLC", __LINE__);
2663
2689673f
PA
2664 /* We now have have access to the lwpid of the main thread/lwp. */
2665 lwpid = proc_get_current_thread (pi);
2666
2667 /* Create a procinfo for the main lwp. */
2668 create_procinfo (pid, lwpid);
2669
2670 /* We already have a main thread registered in the thread table at
2671 this point, but it didn't have any lwp info yet. Notify the core
2672 about it. This changes inferior_ptid as well. */
5b6d1e4f 2673 thread_change_ptid (this, ptid_t (pid), ptid_t (pid, lwpid, 0));
c906108c 2674
2090129c 2675 gdb_startup_inferior (pid, START_INFERIOR_TRAPS_EXPECTED);
c3f6f71d 2676}
c906108c 2677
77382aee
PA
2678/* When GDB forks to create a new process, this function is called on
2679 the child side of the fork before GDB exec's the user program. Its
2680 job is to make the child minimally debuggable, so that the parent
2681 GDB process can connect to the child and take over. This function
2682 should do only the minimum to make that possible, and to
2683 synchronize with the parent process. The parent process should
2684 take care of the details. */
c3f6f71d
JM
2685
2686static void
fba45db2 2687procfs_set_exec_trap (void)
c3f6f71d
JM
2688{
2689 /* This routine called on the child side (inferior side)
2690 after GDB forks the inferior. It must use only local variables,
2691 because it may be sharing data space with its parent. */
c906108c 2692
c3f6f71d 2693 procinfo *pi;
37de36c6 2694 sysset_t *exitset;
c906108c 2695
c475f569
RO
2696 pi = create_procinfo (getpid (), 0);
2697 if (pi == NULL)
deb70aa0 2698 perror_with_name (_("procfs: create_procinfo failed in child"));
c906108c 2699
c3f6f71d
JM
2700 if (open_procinfo_files (pi, FD_CTL) == 0)
2701 {
2702 proc_warn (pi, "set_exec_trap, open_proc_files", __LINE__);
2703 gdb_flush (gdb_stderr);
77382aee
PA
2704 /* No need to call "dead_procinfo", because we're going to
2705 exit. */
c3f6f71d
JM
2706 _exit (127);
2707 }
c906108c 2708
c475f569 2709 exitset = XNEW (sysset_t);
44122162 2710 premptyset (exitset);
44122162 2711 praddset (exitset, SYS_execve);
37de36c6
KB
2712
2713 if (!proc_set_traced_sysexit (pi, exitset))
c906108c 2714 {
c3f6f71d
JM
2715 proc_warn (pi, "set_exec_trap, set_traced_sysexit", __LINE__);
2716 gdb_flush (gdb_stderr);
2717 _exit (127);
c906108c 2718 }
c3f6f71d 2719
0df8b418 2720 /* FIXME: should this be done in the parent instead? */
c3f6f71d
JM
2721 /* Turn off inherit on fork flag so that all grand-children
2722 of gdb start with tracing flags cleared. */
2723 if (!proc_unset_inherit_on_fork (pi))
2724 proc_warn (pi, "set_exec_trap, unset_inherit", __LINE__);
2725
2726 /* Turn off run on last close flag, so that the child process
2727 cannot run away just because we close our handle on it.
2728 We want it to wait for the parent to attach. */
2729 if (!proc_unset_run_on_last_close (pi))
2730 proc_warn (pi, "set_exec_trap, unset_RLC", __LINE__);
2731
19958708 2732 /* FIXME: No need to destroy the procinfo --
0df8b418 2733 we have our own address space, and we're about to do an exec! */
c3f6f71d 2734 /*destroy_procinfo (pi);*/
c906108c 2735}
c906108c 2736
c6d36836
RO
2737/* Dummy function to be sure fork_inferior uses fork(2) and not vfork(2).
2738 This avoids a possible deadlock gdb and its vfork'ed child. */
2739static void
2740procfs_pre_trace (void)
2741{
2742}
2743
77382aee
PA
2744/* This function is called BEFORE gdb forks the inferior process. Its
2745 only real responsibility is to set things up for the fork, and tell
2746 GDB which two functions to call after the fork (one for the parent,
2747 and one for the child).
2748
2749 This function does a complicated search for a unix shell program,
2750 which it then uses to parse arguments and environment variables to
2751 be sent to the child. I wonder whether this code could not be
2752 abstracted out and shared with other unix targets such as
2753 inf-ptrace? */
c906108c 2754
f6ac5f3d
PA
2755void
2756procfs_target::create_inferior (const char *exec_file,
2757 const std::string &allargs,
2758 char **env, int from_tty)
c906108c 2759{
974e6844 2760 const char *shell_file = get_shell ();
c906108c 2761 char *tryname;
28439f5e
PA
2762 int pid;
2763
974e6844 2764 if (strchr (shell_file, '/') == NULL)
c906108c
SS
2765 {
2766
2767 /* We will be looking down the PATH to find shell_file. If we
c3f6f71d
JM
2768 just do this the normal way (via execlp, which operates by
2769 attempting an exec for each element of the PATH until it
2770 finds one which succeeds), then there will be an exec for
2771 each failed attempt, each of which will cause a PR_SYSEXIT
2772 stop, and we won't know how to distinguish the PR_SYSEXIT's
2773 for these failed execs with the ones for successful execs
2774 (whether the exec has succeeded is stored at that time in the
2775 carry bit or some such architecture-specific and
2776 non-ABI-specified place).
2777
2778 So I can't think of anything better than to search the PATH
2779 now. This has several disadvantages: (1) There is a race
2780 condition; if we find a file now and it is deleted before we
2781 exec it, we lose, even if the deletion leaves a valid file
2782 further down in the PATH, (2) there is no way to know exactly
2783 what an executable (in the sense of "capable of being
2784 exec'd") file is. Using access() loses because it may lose
2785 if the caller is the superuser; failing to use it loses if
2786 there are ACLs or some such. */
c906108c 2787
995816ba
PA
2788 const char *p;
2789 const char *p1;
c906108c 2790 /* FIXME-maybe: might want "set path" command so user can change what
c3f6f71d 2791 path is used from within GDB. */
995816ba 2792 const char *path = getenv ("PATH");
c906108c
SS
2793 int len;
2794 struct stat statbuf;
2795
2796 if (path == NULL)
2797 path = "/bin:/usr/bin";
2798
b196bc4c 2799 tryname = (char *) alloca (strlen (path) + strlen (shell_file) + 2);
c3f6f71d 2800 for (p = path; p != NULL; p = p1 ? p1 + 1: NULL)
c906108c
SS
2801 {
2802 p1 = strchr (p, ':');
2803 if (p1 != NULL)
2804 len = p1 - p;
2805 else
2806 len = strlen (p);
f4ad82b3 2807 memcpy (tryname, p, len);
c906108c
SS
2808 tryname[len] = '\0';
2809 strcat (tryname, "/");
2810 strcat (tryname, shell_file);
2811 if (access (tryname, X_OK) < 0)
2812 continue;
2813 if (stat (tryname, &statbuf) < 0)
2814 continue;
2815 if (!S_ISREG (statbuf.st_mode))
2816 /* We certainly need to reject directories. I'm not quite
2817 as sure about FIFOs, sockets, etc., but I kind of doubt
2818 that people want to exec() these things. */
2819 continue;
2820 break;
2821 }
2822 if (p == NULL)
2823 /* Not found. This must be an error rather than merely passing
2824 the file to execlp(), because execlp() would try all the
2825 exec()s, causing GDB to get confused. */
8a3fe4f8 2826 error (_("procfs:%d -- Can't find shell %s in PATH"),
c3f6f71d 2827 __LINE__, shell_file);
c906108c
SS
2828
2829 shell_file = tryname;
2830 }
2831
25b48839 2832 inferior *inf = current_inferior ();
c8fbd44a 2833 if (!inf->target_is_pushed (this))
25b48839 2834 inf->push_target (this);
cf6f3e86 2835
28439f5e 2836 pid = fork_inferior (exec_file, allargs, env, procfs_set_exec_trap,
c6d36836 2837 NULL, procfs_pre_trace, shell_file, NULL);
28439f5e 2838
2090129c
SDJ
2839 /* We have something that executes now. We'll be running through
2840 the shell at this point (if startup-with-shell is true), but the
2841 pid shouldn't change. */
7fb43e53
PA
2842 thread_info *thr = add_thread_silent (this, ptid_t (pid));
2843 switch_to_thread (thr);
2090129c 2844
5b6d1e4f 2845 procfs_init_inferior (pid);
27087a3d
JB
2846}
2847
e8032dde 2848/* Callback for update_thread_list. Calls "add_thread". */
c906108c 2849
c3f6f71d 2850static int
fba45db2 2851procfs_notice_thread (procinfo *pi, procinfo *thread, void *ptr)
c906108c 2852{
fd79271b 2853 ptid_t gdb_threadid = ptid_t (pi->pid, thread->tid, 0);
c906108c 2854
9213a6d7 2855 thread_info *thr = the_procfs_target.find_thread (gdb_threadid);
24bce9bb 2856 if (thr == NULL || thr->state == THREAD_EXITED)
5b6d1e4f 2857 add_thread (&the_procfs_target, gdb_threadid);
c906108c 2858
c3f6f71d
JM
2859 return 0;
2860}
2861
77382aee
PA
2862/* Query all the threads that the target knows about, and give them
2863 back to GDB to add to its list. */
c3f6f71d 2864
f6ac5f3d
PA
2865void
2866procfs_target::update_thread_list ()
c3f6f71d
JM
2867{
2868 procinfo *pi;
2869
e8032dde
PA
2870 prune_threads ();
2871
0df8b418 2872 /* Find procinfo for main process. */
e99b03dc 2873 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c3f6f71d
JM
2874 proc_update_threads (pi);
2875 proc_iterate_over_threads (pi, procfs_notice_thread, NULL);
c906108c
SS
2876}
2877
77382aee
PA
2878/* Return true if the thread is still 'alive'. This guy doesn't
2879 really seem to be doing his job. Got to investigate how to tell
2880 when a thread is really gone. */
c906108c 2881
57810aa7 2882bool
f6ac5f3d 2883procfs_target::thread_alive (ptid_t ptid)
c906108c 2884{
c3f6f71d
JM
2885 int proc, thread;
2886 procinfo *pi;
c906108c 2887
e99b03dc 2888 proc = ptid.pid ();
e38504b3 2889 thread = ptid.lwp ();
0df8b418 2890 /* If I don't know it, it ain't alive! */
c475f569
RO
2891 pi = find_procinfo (proc, thread);
2892 if (pi == NULL)
57810aa7 2893 return false;
c3f6f71d
JM
2894
2895 /* If I can't get its status, it ain't alive!
2896 What's more, I need to forget about it! */
2897 if (!proc_get_status (pi))
2898 {
2899 destroy_procinfo (pi);
57810aa7 2900 return false;
c3f6f71d 2901 }
77382aee
PA
2902 /* I couldn't have got its status if it weren't alive, so it's
2903 alive. */
57810aa7 2904 return true;
c906108c 2905}
c3f6f71d 2906
a068643d 2907/* Convert PTID to a string. */
c3f6f71d 2908
a068643d 2909std::string
f6ac5f3d 2910procfs_target::pid_to_str (ptid_t ptid)
c3f6f71d 2911{
e38504b3 2912 if (ptid.lwp () == 0)
a068643d 2913 return string_printf ("process %d", ptid.pid ());
c3f6f71d 2914 else
a068643d 2915 return string_printf ("LWP %ld", ptid.lwp ());
c3f6f71d
JM
2916}
2917
4206c05e
RO
2918/* Accepts an integer PID; Returns a string representing a file that
2919 can be opened to get the symbols for the child process. */
2920
0e90c441 2921const char *
4206c05e
RO
2922procfs_target::pid_to_exec_file (int pid)
2923{
2924 static char buf[PATH_MAX];
2925 char name[PATH_MAX];
2926
2927 /* Solaris 11 introduced /proc/<proc-id>/execname. */
c475f569 2928 xsnprintf (name, sizeof (name), "/proc/%d/execname", pid);
4206c05e
RO
2929 scoped_fd fd (gdb_open_cloexec (name, O_RDONLY, 0));
2930 if (fd.get () < 0 || read (fd.get (), buf, PATH_MAX - 1) < 0)
2931 {
2932 /* If that fails, fall back to /proc/<proc-id>/path/a.out introduced in
2933 Solaris 10. */
2934 ssize_t len;
2935
c475f569 2936 xsnprintf (name, sizeof (name), "/proc/%d/path/a.out", pid);
4206c05e
RO
2937 len = readlink (name, buf, PATH_MAX - 1);
2938 if (len <= 0)
2939 strcpy (buf, name);
2940 else
2941 buf[len] = '\0';
2942 }
2943
2944 return buf;
2945}
2946
77382aee 2947/* Insert a watchpoint. */
c3f6f71d 2948
a0911fd0 2949static int
39f77062 2950procfs_set_watchpoint (ptid_t ptid, CORE_ADDR addr, int len, int rwflag,
77382aee 2951 int after)
c906108c 2952{
c3f6f71d 2953 int pflags = 0;
19958708 2954 procinfo *pi;
c3f6f71d 2955
e99b03dc
TT
2956 pi = find_procinfo_or_die (ptid.pid () == -1 ?
2957 inferior_ptid.pid () : ptid.pid (),
dfd4cc63 2958 0);
c3f6f71d 2959
0df8b418
MS
2960 /* Translate from GDB's flags to /proc's. */
2961 if (len > 0) /* len == 0 means delete watchpoint. */
c906108c 2962 {
0df8b418 2963 switch (rwflag) { /* FIXME: need an enum! */
c3f6f71d 2964 case hw_write: /* default watchpoint (write) */
196535a6 2965 pflags = WA_WRITE;
c3f6f71d
JM
2966 break;
2967 case hw_read: /* read watchpoint */
196535a6 2968 pflags = WA_READ;
c3f6f71d
JM
2969 break;
2970 case hw_access: /* access watchpoint */
196535a6 2971 pflags = WA_READ | WA_WRITE;
c3f6f71d
JM
2972 break;
2973 case hw_execute: /* execution HW breakpoint */
196535a6 2974 pflags = WA_EXEC;
c3f6f71d 2975 break;
0df8b418 2976 default: /* Something weird. Return error. */
c906108c 2977 return -1;
c3f6f71d 2978 }
0df8b418 2979 if (after) /* Stop after r/w access is completed. */
196535a6 2980 pflags |= WA_TRAPAFTER;
c3f6f71d
JM
2981 }
2982
2983 if (!proc_set_watchpoint (pi, addr, len, pflags))
2984 {
0df8b418 2985 if (errno == E2BIG) /* Typical error for no resources. */
c3f6f71d
JM
2986 return -1; /* fail */
2987 /* GDB may try to remove the same watchpoint twice.
2988 If a remove request returns no match, don't error. */
c906108c 2989 if (errno == ESRCH && len == 0)
c3f6f71d
JM
2990 return 0; /* ignore */
2991 proc_error (pi, "set_watchpoint", __LINE__);
c906108c
SS
2992 }
2993 return 0;
2994}
2995
1e03ad20
KB
2996/* Return non-zero if we can set a hardware watchpoint of type TYPE. TYPE
2997 is one of bp_hardware_watchpoint, bp_read_watchpoint, bp_write_watchpoint,
2998 or bp_hardware_watchpoint. CNT is the number of watchpoints used so
196535a6 2999 far. */
1e03ad20 3000
f6ac5f3d
PA
3001int
3002procfs_target::can_use_hw_breakpoint (enum bptype type, int cnt, int othertype)
1e03ad20 3003{
1e03ad20
KB
3004 /* Due to the way that proc_set_watchpoint() is implemented, host
3005 and target pointers must be of the same size. If they are not,
3006 we can't use hardware watchpoints. This limitation is due to the
9a043c1d
AC
3007 fact that proc_set_watchpoint() calls
3008 procfs_address_to_host_pointer(); a close inspection of
3009 procfs_address_to_host_pointer will reveal that an internal error
3010 will be generated when the host and target pointer sizes are
3011 different. */
f5656ead 3012 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
f4a14ae6 3013
df86565b 3014 if (sizeof (void *) != ptr_type->length ())
1e03ad20
KB
3015 return 0;
3016
3017 /* Other tests here??? */
3018
3019 return 1;
1e03ad20
KB
3020}
3021
77382aee
PA
3022/* Returns non-zero if process is stopped on a hardware watchpoint
3023 fault, else returns zero. */
c3f6f71d 3024
57810aa7 3025bool
f6ac5f3d 3026procfs_target::stopped_by_watchpoint ()
c906108c 3027{
c3f6f71d 3028 procinfo *pi;
c906108c 3029
e99b03dc 3030 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
aaeb7efa 3031
c3f6f71d 3032 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
c475f569
RO
3033 if (proc_why (pi) == PR_FAULTED)
3034 if (proc_what (pi) == FLTWATCH)
3035 return true;
57810aa7 3036 return false;
c906108c 3037}
c906108c 3038
77382aee
PA
3039/* Returns 1 if the OS knows the position of the triggered watchpoint,
3040 and sets *ADDR to that address. Returns 0 if OS cannot report that
3041 address. This function is only called if
3042 procfs_stopped_by_watchpoint returned 1, thus no further checks are
3043 done. The function also assumes that ADDR is not NULL. */
bf701c2c 3044
57810aa7 3045bool
f6ac5f3d 3046procfs_target::stopped_data_address (CORE_ADDR *addr)
bf701c2c
PM
3047{
3048 procinfo *pi;
3049
e99b03dc 3050 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
bf701c2c
PM
3051 return proc_watchpoint_address (pi, addr);
3052}
3053
f6ac5f3d
PA
3054int
3055procfs_target::insert_watchpoint (CORE_ADDR addr, int len,
3056 enum target_hw_bp_type type,
3057 struct expression *cond)
25513619 3058{
9aed480c 3059 if (!target_have_steppable_watchpoint ()
f5656ead 3060 && !gdbarch_have_nonsteppable_watchpoint (target_gdbarch ()))
c475f569
RO
3061 /* When a hardware watchpoint fires off the PC will be left at
3062 the instruction following the one which caused the
3063 watchpoint. It will *NOT* be necessary for GDB to step over
3064 the watchpoint. */
3065 return procfs_set_watchpoint (inferior_ptid, addr, len, type, 1);
25513619 3066 else
c475f569
RO
3067 /* When a hardware watchpoint fires off the PC will be left at
3068 the instruction which caused the watchpoint. It will be
3069 necessary for GDB to step over the watchpoint. */
3070 return procfs_set_watchpoint (inferior_ptid, addr, len, type, 0);
25513619
PA
3071}
3072
f6ac5f3d
PA
3073int
3074procfs_target::remove_watchpoint (CORE_ADDR addr, int len,
3075 enum target_hw_bp_type type,
3076 struct expression *cond)
25513619
PA
3077{
3078 return procfs_set_watchpoint (inferior_ptid, addr, 0, 0, 0);
3079}
3080
f6ac5f3d
PA
3081int
3082procfs_target::region_ok_for_hw_watchpoint (CORE_ADDR addr, int len)
25513619
PA
3083{
3084 /* The man page for proc(4) on Solaris 2.6 and up says that the
3085 system can support "thousands" of hardware watchpoints, but gives
3086 no method for finding out how many; It doesn't say anything about
3087 the allowed size for the watched area either. So we just tell
3088 GDB 'yes'. */
3089 return 1;
3090}
3091
77382aee
PA
3092/* Memory Mappings Functions: */
3093
3094/* Call a callback function once for each mapping, passing it the
3095 mapping, an optional secondary callback function, and some optional
3096 opaque data. Quit and return the first non-zero value returned
3097 from the callback.
3098
3099 PI is the procinfo struct for the process to be mapped. FUNC is
3100 the callback function to be called by this iterator. DATA is the
3101 optional opaque data to be passed to the callback function.
3102 CHILD_FUNC is the optional secondary function pointer to be passed
3103 to the child function. Returns the first non-zero return value
3104 from the callback function, or zero. */
831e682e
MS
3105
3106static int
b8edc417 3107iterate_over_mappings (procinfo *pi, find_memory_region_ftype child_func,
e9ef4f39 3108 void *data,
19958708 3109 int (*func) (struct prmap *map,
b8edc417 3110 find_memory_region_ftype child_func,
831e682e
MS
3111 void *data))
3112{
3113 char pathname[MAX_PROC_NAME_SIZE];
3114 struct prmap *prmaps;
3115 struct prmap *prmap;
3116 int funcstat;
831e682e 3117 int nmap;
831e682e 3118 struct stat sbuf;
831e682e 3119
19958708 3120 /* Get the number of mappings, allocate space,
831e682e 3121 and read the mappings into prmaps. */
0df8b418 3122 /* Open map fd. */
c475f569 3123 xsnprintf (pathname, sizeof (pathname), "/proc/%d/map", pi->pid);
831e682e 3124
5dc1a704
TT
3125 scoped_fd map_fd (open (pathname, O_RDONLY));
3126 if (map_fd.get () < 0)
3127 proc_error (pi, "iterate_over_mappings (open)", __LINE__);
831e682e 3128
19958708 3129 /* Use stat to determine the file size, and compute
831e682e 3130 the number of prmap_t objects it contains. */
5dc1a704 3131 if (fstat (map_fd.get (), &sbuf) != 0)
831e682e
MS
3132 proc_error (pi, "iterate_over_mappings (fstat)", __LINE__);
3133
3134 nmap = sbuf.st_size / sizeof (prmap_t);
3135 prmaps = (struct prmap *) alloca ((nmap + 1) * sizeof (*prmaps));
5dc1a704 3136 if (read (map_fd.get (), (char *) prmaps, nmap * sizeof (*prmaps))
831e682e
MS
3137 != (nmap * sizeof (*prmaps)))
3138 proc_error (pi, "iterate_over_mappings (read)", __LINE__);
831e682e
MS
3139
3140 for (prmap = prmaps; nmap > 0; prmap++, nmap--)
c475f569
RO
3141 {
3142 funcstat = (*func) (prmap, child_func, data);
3143 if (funcstat != 0)
3144 return funcstat;
3145 }
831e682e
MS
3146
3147 return 0;
3148}
3149
77382aee 3150/* Implements the to_find_memory_regions method. Calls an external
b8edc417 3151 function for each memory region.
77382aee 3152 Returns the integer value returned by the callback. */
be4d1333
MS
3153
3154static int
19958708 3155find_memory_regions_callback (struct prmap *map,
b8edc417 3156 find_memory_region_ftype func, void *data)
be4d1333 3157{
bf75638e 3158 return (*func) ((CORE_ADDR) map->pr_vaddr,
19958708 3159 map->pr_size,
be4d1333
MS
3160 (map->pr_mflags & MA_READ) != 0,
3161 (map->pr_mflags & MA_WRITE) != 0,
19958708 3162 (map->pr_mflags & MA_EXEC) != 0,
4f69f4c2 3163 1, /* MODIFIED is unknown, pass it as true. */
f4ad82b3 3164 false,
be4d1333
MS
3165 data);
3166}
3167
77382aee
PA
3168/* External interface. Calls a callback function once for each
3169 mapped memory region in the child process, passing as arguments:
3170
3171 CORE_ADDR virtual_address,
3172 unsigned long size,
3173 int read, TRUE if region is readable by the child
3174 int write, TRUE if region is writable by the child
3175 int execute TRUE if region is executable by the child.
3176
3177 Stops iterating and returns the first non-zero value returned by
3178 the callback. */
be4d1333 3179
f6ac5f3d
PA
3180int
3181procfs_target::find_memory_regions (find_memory_region_ftype func, void *data)
be4d1333 3182{
e99b03dc 3183 procinfo *pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
be4d1333 3184
19958708 3185 return iterate_over_mappings (pi, func, data,
be4d1333
MS
3186 find_memory_regions_callback);
3187}
3188
77382aee 3189/* Returns an ascii representation of a memory mapping's flags. */
c3f6f71d 3190
388faa48 3191static char *
5ae5f592 3192mappingflags (long flags)
388faa48
MS
3193{
3194 static char asciiflags[8];
3195
3196 strcpy (asciiflags, "-------");
388faa48
MS
3197 if (flags & MA_STACK)
3198 asciiflags[1] = 's';
3199 if (flags & MA_BREAK)
3200 asciiflags[2] = 'b';
3201 if (flags & MA_SHARED)
3202 asciiflags[3] = 's';
3203 if (flags & MA_READ)
3204 asciiflags[4] = 'r';
3205 if (flags & MA_WRITE)
3206 asciiflags[5] = 'w';
3207 if (flags & MA_EXEC)
3208 asciiflags[6] = 'x';
3209 return (asciiflags);
3210}
3211
77382aee
PA
3212/* Callback function, does the actual work for 'info proc
3213 mappings'. */
831e682e 3214
831e682e 3215static int
b8edc417 3216info_mappings_callback (struct prmap *map, find_memory_region_ftype ignore,
e9ef4f39 3217 void *unused)
831e682e 3218{
0b62613e 3219 unsigned int pr_off;
831e682e 3220
0b62613e 3221 pr_off = (unsigned int) map->pr_offset;
0b62613e 3222
f5656ead 3223 if (gdbarch_addr_bit (target_gdbarch ()) == 32)
6cb06a8c
TT
3224 gdb_printf ("\t%#10lx %#10lx %#10lx %#10x %7s\n",
3225 (unsigned long) map->pr_vaddr,
3226 (unsigned long) map->pr_vaddr + map->pr_size - 1,
3227 (unsigned long) map->pr_size,
3228 pr_off,
3229 mappingflags (map->pr_mflags));
0b62613e 3230 else
6cb06a8c
TT
3231 gdb_printf (" %#18lx %#18lx %#10lx %#10x %7s\n",
3232 (unsigned long) map->pr_vaddr,
3233 (unsigned long) map->pr_vaddr + map->pr_size - 1,
3234 (unsigned long) map->pr_size,
3235 pr_off,
3236 mappingflags (map->pr_mflags));
831e682e
MS
3237
3238 return 0;
3239}
3240
77382aee 3241/* Implement the "info proc mappings" subcommand. */
388faa48
MS
3242
3243static void
3244info_proc_mappings (procinfo *pi, int summary)
3245{
388faa48 3246 if (summary)
0df8b418 3247 return; /* No output for summary mode. */
388faa48 3248
6cb06a8c 3249 gdb_printf (_("Mapped address spaces:\n\n"));
f5656ead 3250 if (gdbarch_ptr_bit (target_gdbarch ()) == 32)
6cb06a8c
TT
3251 gdb_printf ("\t%10s %10s %10s %10s %7s\n",
3252 "Start Addr",
3253 " End Addr",
3254 " Size",
3255 " Offset",
3256 "Flags");
0b62613e 3257 else
6cb06a8c
TT
3258 gdb_printf (" %18s %18s %10s %10s %7s\n",
3259 "Start Addr",
3260 " End Addr",
3261 " Size",
3262 " Offset",
3263 "Flags");
388faa48 3264
831e682e 3265 iterate_over_mappings (pi, NULL, NULL, info_mappings_callback);
6cb06a8c 3266 gdb_printf ("\n");
388faa48
MS
3267}
3268
77382aee 3269/* Implement the "info proc" command. */
c3f6f71d 3270
f6ac5f3d
PA
3271bool
3272procfs_target::info_proc (const char *args, enum info_proc_what what)
c906108c 3273{
388faa48
MS
3274 procinfo *process = NULL;
3275 procinfo *thread = NULL;
388faa48
MS
3276 char *tmp = NULL;
3277 int pid = 0;
3278 int tid = 0;
3279 int mappings = 0;
c906108c 3280
145b16a9
UW
3281 switch (what)
3282 {
3283 case IP_MINIMAL:
3284 break;
3285
3286 case IP_MAPPINGS:
3287 case IP_ALL:
3288 mappings = 1;
3289 break;
3290
3291 default:
3292 error (_("Not supported on this target."));
3293 }
3294
773a1edc 3295 gdb_argv built_argv (args);
4fa7574e 3296 for (char *arg : built_argv)
c3f6f71d 3297 {
773a1edc 3298 if (isdigit (arg[0]))
c3f6f71d 3299 {
773a1edc 3300 pid = strtoul (arg, &tmp, 10);
c3f6f71d
JM
3301 if (*tmp == '/')
3302 tid = strtoul (++tmp, NULL, 10);
3303 }
773a1edc 3304 else if (arg[0] == '/')
c3f6f71d 3305 {
773a1edc 3306 tid = strtoul (arg + 1, NULL, 10);
c3f6f71d 3307 }
c3f6f71d 3308 }
5b4cbbe3
TT
3309
3310 procinfo_up temporary_procinfo;
c3f6f71d 3311 if (pid == 0)
e99b03dc 3312 pid = inferior_ptid.pid ();
c3f6f71d 3313 if (pid == 0)
8a3fe4f8 3314 error (_("No current process: you must name one."));
c3f6f71d 3315 else
c906108c 3316 {
c3f6f71d 3317 /* Have pid, will travel.
0df8b418 3318 First see if it's a process we're already debugging. */
c3f6f71d
JM
3319 process = find_procinfo (pid, 0);
3320 if (process == NULL)
3321 {
19958708 3322 /* No. So open a procinfo for it, but
c3f6f71d
JM
3323 remember to close it again when finished. */
3324 process = create_procinfo (pid, 0);
5b4cbbe3 3325 temporary_procinfo.reset (process);
c3f6f71d
JM
3326 if (!open_procinfo_files (process, FD_CTL))
3327 proc_error (process, "info proc, open_procinfo_files", __LINE__);
3328 }
c906108c 3329 }
c3f6f71d
JM
3330 if (tid != 0)
3331 thread = create_procinfo (pid, tid);
3332
3333 if (process)
3334 {
6cb06a8c 3335 gdb_printf (_("process %d flags:\n"), process->pid);
c3f6f71d
JM
3336 proc_prettyprint_flags (proc_flags (process), 1);
3337 if (proc_flags (process) & (PR_STOPPED | PR_ISTOP))
3338 proc_prettyprint_why (proc_why (process), proc_what (process), 1);
3339 if (proc_get_nthreads (process) > 1)
6cb06a8c
TT
3340 gdb_printf ("Process has %d threads.\n",
3341 proc_get_nthreads (process));
c3f6f71d
JM
3342 }
3343 if (thread)
3344 {
6cb06a8c 3345 gdb_printf (_("thread %d flags:\n"), thread->tid);
c3f6f71d
JM
3346 proc_prettyprint_flags (proc_flags (thread), 1);
3347 if (proc_flags (thread) & (PR_STOPPED | PR_ISTOP))
3348 proc_prettyprint_why (proc_why (thread), proc_what (thread), 1);
3349 }
3350
388faa48 3351 if (mappings)
c475f569 3352 info_proc_mappings (process, 0);
388faa48 3353
f6ac5f3d 3354 return true;
c906108c
SS
3355}
3356
9185ddce
JB
3357/* Modify the status of the system call identified by SYSCALLNUM in
3358 the set of syscalls that are currently traced/debugged.
3359
3360 If ENTRY_OR_EXIT is set to PR_SYSENTRY, then the entry syscalls set
0df8b418 3361 will be updated. Otherwise, the exit syscalls set will be updated.
9185ddce 3362
0df8b418 3363 If MODE is FLAG_SET, then traces will be enabled. Otherwise, they
9185ddce
JB
3364 will be disabled. */
3365
3366static void
3367proc_trace_syscalls_1 (procinfo *pi, int syscallnum, int entry_or_exit,
77382aee 3368 int mode, int from_tty)
9185ddce
JB
3369{
3370 sysset_t *sysset;
77382aee 3371
9185ddce
JB
3372 if (entry_or_exit == PR_SYSENTRY)
3373 sysset = proc_get_traced_sysentry (pi, NULL);
3374 else
3375 sysset = proc_get_traced_sysexit (pi, NULL);
3376
3377 if (sysset == NULL)
3378 proc_error (pi, "proc-trace, get_traced_sysset", __LINE__);
3379
3380 if (mode == FLAG_SET)
44122162 3381 praddset (sysset, syscallnum);
9185ddce 3382 else
44122162 3383 prdelset (sysset, syscallnum);
9185ddce
JB
3384
3385 if (entry_or_exit == PR_SYSENTRY)
3386 {
3387 if (!proc_set_traced_sysentry (pi, sysset))
77382aee 3388 proc_error (pi, "proc-trace, set_traced_sysentry", __LINE__);
9185ddce
JB
3389 }
3390 else
3391 {
3392 if (!proc_set_traced_sysexit (pi, sysset))
77382aee 3393 proc_error (pi, "proc-trace, set_traced_sysexit", __LINE__);
9185ddce
JB
3394 }
3395}
3396
c3f6f71d 3397static void
0b39b52e 3398proc_trace_syscalls (const char *args, int from_tty, int entry_or_exit, int mode)
c906108c 3399{
c3f6f71d 3400 procinfo *pi;
c906108c 3401
e99b03dc 3402 if (inferior_ptid.pid () <= 0)
8a3fe4f8 3403 error (_("you must be debugging a process to use this command."));
c906108c 3404
c3f6f71d 3405 if (args == NULL || args[0] == 0)
e2e0b3e5 3406 error_no_arg (_("system call to trace"));
c3f6f71d 3407
e99b03dc 3408 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c3f6f71d
JM
3409 if (isdigit (args[0]))
3410 {
9185ddce 3411 const int syscallnum = atoi (args);
c906108c 3412
9185ddce 3413 proc_trace_syscalls_1 (pi, syscallnum, entry_or_exit, mode, from_tty);
c3f6f71d
JM
3414 }
3415}
3416
19958708 3417static void
0b39b52e 3418proc_trace_sysentry_cmd (const char *args, int from_tty)
c906108c 3419{
c3f6f71d
JM
3420 proc_trace_syscalls (args, from_tty, PR_SYSENTRY, FLAG_SET);
3421}
c906108c 3422
19958708 3423static void
0b39b52e 3424proc_trace_sysexit_cmd (const char *args, int from_tty)
c3f6f71d
JM
3425{
3426 proc_trace_syscalls (args, from_tty, PR_SYSEXIT, FLAG_SET);
c906108c 3427}
c906108c 3428
19958708 3429static void
0b39b52e 3430proc_untrace_sysentry_cmd (const char *args, int from_tty)
c3f6f71d
JM
3431{
3432 proc_trace_syscalls (args, from_tty, PR_SYSENTRY, FLAG_RESET);
3433}
3434
19958708 3435static void
0b39b52e 3436proc_untrace_sysexit_cmd (const char *args, int from_tty)
c906108c 3437{
c3f6f71d
JM
3438 proc_trace_syscalls (args, from_tty, PR_SYSEXIT, FLAG_RESET);
3439}
c906108c 3440
6c265988 3441void _initialize_procfs ();
c906108c 3442void
6c265988 3443_initialize_procfs ()
c906108c 3444{
19958708 3445 add_com ("proc-trace-entry", no_class, proc_trace_sysentry_cmd,
1bedd215 3446 _("Give a trace of entries into the syscall."));
19958708 3447 add_com ("proc-trace-exit", no_class, proc_trace_sysexit_cmd,
1bedd215 3448 _("Give a trace of exits from the syscall."));
19958708 3449 add_com ("proc-untrace-entry", no_class, proc_untrace_sysentry_cmd,
1bedd215 3450 _("Cancel a trace of entries into the syscall."));
19958708 3451 add_com ("proc-untrace-exit", no_class, proc_untrace_sysexit_cmd,
1bedd215 3452 _("Cancel a trace of exits from the syscall."));
c1955e17 3453
62c808ae 3454 add_inf_child_target (&the_procfs_target);
c3f6f71d
JM
3455}
3456
3457/* =================== END, GDB "MODULE" =================== */
3458
3459
3460
77382aee
PA
3461/* miscellaneous stubs: */
3462
3463/* The following satisfy a few random symbols mostly created by the
3464 solaris threads implementation, which I will chase down later. */
c3f6f71d 3465
77382aee
PA
3466/* Return a pid for which we guarantee we will be able to find a
3467 'live' procinfo. */
c3f6f71d 3468
39f77062 3469ptid_t
fba45db2 3470procfs_first_available (void)
c3f6f71d 3471{
f2907e49 3472 return ptid_t (procinfo_list ? procinfo_list->pid : -1);
c3f6f71d 3473}
be4d1333
MS
3474
3475/* =================== GCORE .NOTE "MODULE" =================== */
3476
24f5300a 3477static void
19958708 3478procfs_do_thread_registers (bfd *obfd, ptid_t ptid,
24f5300a
SM
3479 gdb::unique_xmalloc_ptr<char> &note_data,
3480 int *note_size, enum gdb_signal stop_signal)
be4d1333 3481{
5b6d1e4f 3482 struct regcache *regcache = get_thread_regcache (&the_procfs_target, ptid);
be4d1333
MS
3483 gdb_gregset_t gregs;
3484 gdb_fpregset_t fpregs;
3485 unsigned long merged_pid;
3486
e38504b3 3487 merged_pid = ptid.lwp () << 16 | ptid.pid ();
be4d1333 3488
75125405
DJ
3489 /* This part is the old method for fetching registers.
3490 It should be replaced by the newer one using regsets
3491 once it is implemented in this platform:
29082443 3492 gdbarch_iterate_over_regset_sections(). */
75125405 3493
75125405
DJ
3494 target_fetch_registers (regcache, -1);
3495
594f7785 3496 fill_gregset (regcache, &gregs, -1);
24f5300a
SM
3497 note_data.reset (elfcore_write_lwpstatus (obfd,
3498 note_data.release (),
3499 note_size,
3500 merged_pid,
3501 stop_signal,
3502 &gregs));
594f7785 3503 fill_fpregset (regcache, &fpregs, -1);
24f5300a
SM
3504 note_data.reset (elfcore_write_prfpreg (obfd,
3505 note_data.release (),
3506 note_size,
3507 &fpregs,
3508 sizeof (fpregs)));
be4d1333
MS
3509}
3510
24f5300a
SM
3511struct procfs_corefile_thread_data
3512{
3513 procfs_corefile_thread_data (bfd *obfd,
3514 gdb::unique_xmalloc_ptr<char> &note_data,
3515 int *note_size, gdb_signal stop_signal)
3516 : obfd (obfd), note_data (note_data), note_size (note_size),
3517 stop_signal (stop_signal)
3518 {}
3519
be4d1333 3520 bfd *obfd;
24f5300a 3521 gdb::unique_xmalloc_ptr<char> &note_data;
be4d1333 3522 int *note_size;
2ea28649 3523 enum gdb_signal stop_signal;
be4d1333
MS
3524};
3525
3526static int
65554fef 3527procfs_corefile_thread_callback (procinfo *pi, procinfo *thread, void *data)
be4d1333 3528{
b196bc4c
RO
3529 struct procfs_corefile_thread_data *args
3530 = (struct procfs_corefile_thread_data *) data;
be4d1333 3531
2689673f 3532 if (pi != NULL)
be4d1333 3533 {
fd79271b 3534 ptid_t ptid = ptid_t (pi->pid, thread->tid, 0);
f4a14ae6 3535
24f5300a
SM
3536 procfs_do_thread_registers (args->obfd, ptid,
3537 args->note_data,
3538 args->note_size,
3539 args->stop_signal);
be4d1333
MS
3540 }
3541 return 0;
3542}
3543
a223f1e7
JB
3544static int
3545find_signalled_thread (struct thread_info *info, void *data)
3546{
e22be212 3547 if (info->stop_signal () != GDB_SIGNAL_0
e99b03dc 3548 && info->ptid.pid () == inferior_ptid.pid ())
a223f1e7
JB
3549 return 1;
3550
3551 return 0;
3552}
3553
2ea28649 3554static enum gdb_signal
a223f1e7
JB
3555find_stop_signal (void)
3556{
3557 struct thread_info *info =
3558 iterate_over_threads (find_signalled_thread, NULL);
3559
3560 if (info)
e22be212 3561 return info->stop_signal ();
a223f1e7 3562 else
a493e3e2 3563 return GDB_SIGNAL_0;
a223f1e7
JB
3564}
3565
24f5300a 3566gdb::unique_xmalloc_ptr<char>
f6ac5f3d 3567procfs_target::make_corefile_notes (bfd *obfd, int *note_size)
be4d1333 3568{
be4d1333 3569 gdb_gregset_t gregs;
be4d1333
MS
3570 char fname[16] = {'\0'};
3571 char psargs[80] = {'\0'};
e99b03dc 3572 procinfo *pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
24f5300a 3573 gdb::unique_xmalloc_ptr<char> note_data;
2ea28649 3574 enum gdb_signal stop_signal;
be4d1333
MS
3575
3576 if (get_exec_file (0))
3577 {
9f37bbcc 3578 strncpy (fname, lbasename (get_exec_file (0)), sizeof (fname));
4e2af517
JM
3579 fname[sizeof (fname) - 1] = 0;
3580 strncpy (psargs, get_exec_file (0), sizeof (psargs));
3581 psargs[sizeof (psargs) - 1] = 0;
6dbdc4a3 3582
fd2dec2a
SM
3583 const std::string &inf_args = current_inferior ()->args ();
3584 if (!inf_args.empty () &&
3585 inf_args.length () < ((int) sizeof (psargs) - (int) strlen (psargs)))
be4d1333 3586 {
19958708 3587 strncat (psargs, " ",
be4d1333 3588 sizeof (psargs) - strlen (psargs));
fd2dec2a 3589 strncat (psargs, inf_args.c_str (),
be4d1333
MS
3590 sizeof (psargs) - strlen (psargs));
3591 }
3592 }
3593
24f5300a
SM
3594 note_data.reset (elfcore_write_prpsinfo (obfd,
3595 note_data.release (),
3596 note_size,
3597 fname,
3598 psargs));
be4d1333 3599
651c8d2d
PA
3600 stop_signal = find_stop_signal ();
3601
3e3420f6 3602 fill_gregset (get_current_regcache (), &gregs, -1);
24f5300a
SM
3603 note_data.reset (elfcore_write_pstatus (obfd, note_data.release (), note_size,
3604 inferior_ptid.pid (),
3605 stop_signal, &gregs));
3606
3607 procfs_corefile_thread_data thread_args (obfd, note_data, note_size,
3608 stop_signal);
3e43a32a
MS
3609 proc_iterate_over_threads (pi, procfs_corefile_thread_callback,
3610 &thread_args);
be4d1333 3611
62c808ae 3612 gdb::optional<gdb::byte_vector> auxv =
328d42d8
SM
3613 target_read_alloc (current_inferior ()->top_target (),
3614 TARGET_OBJECT_AUXV, NULL);
62c808ae 3615 if (auxv && !auxv->empty ())
24f5300a
SM
3616 note_data.reset (elfcore_write_note (obfd, note_data.release (), note_size,
3617 "CORE", NT_AUXV, auxv->data (),
3618 auxv->size ()));
4e73f23d 3619
be4d1333
MS
3620 return note_data;
3621}
be4d1333 3622/* =================== END GCORE .NOTE "MODULE" =================== */