]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/procfs.c
Change enable_thread_stack_temporaries to an RAII class
[thirdparty/binutils-gdb.git] / gdb / procfs.c
CommitLineData
44122162 1/* Machine independent support for Solaris /proc (process file system) for GDB.
2555fe1a 2
e2882c85 3 Copyright (C) 1999-2018 Free Software Foundation, Inc.
2555fe1a 4
c3f6f71d
JM
5 Written by Michael Snyder at Cygnus Solutions.
6 Based on work by Fred Fish, Stu Grossman, Geoff Noer, and others.
c906108c 7
a9762ec7
JB
8 This file is part of GDB.
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
14
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
21 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c 22
c3f6f71d
JM
23#include "defs.h"
24#include "inferior.h"
45741a9c 25#include "infrun.h"
c3f6f71d
JM
26#include "target.h"
27#include "gdbcore.h"
65554fef 28#include "elf-bfd.h" /* for elfcore_write_* */
c3f6f71d 29#include "gdbcmd.h"
0fda6bd2 30#include "gdbthread.h"
7f7fe91e 31#include "regcache.h"
28439f5e 32#include "inf-child.h"
4fa7574e 33#include "nat/fork-inferior.h"
88fc5eb7 34#include "filestuff.h"
c906108c 35
0df8b418 36#define _STRUCTURED_PROC 1 /* Should be done by configure script. */
c906108c 37
c3f6f71d
JM
38#include <sys/procfs.h>
39#include <sys/fault.h>
40#include <sys/syscall.h>
2555fe1a 41#include "gdb_wait.h"
0fda6bd2
JM
42#include <signal.h>
43#include <ctype.h>
92107356 44#include "gdb_bfd.h"
44270758 45#include "inflow.h"
4e73f23d 46#include "auxv.h"
d1a7880c 47#include "procfs.h"
27087a3d 48#include "observer.h"
0fda6bd2 49
77382aee
PA
50/* This module provides the interface between GDB and the
51 /proc file system, which is used on many versions of Unix
52 as a means for debuggers to control other processes.
53
77382aee
PA
54 /proc works by imitating a file system: you open a simulated file
55 that represents the process you wish to interact with, and perform
56 operations on that "file" in order to examine or change the state
57 of the other process.
58
59 The most important thing to know about /proc and this module is
60 that there are two very different interfaces to /proc:
61
62 One that uses the ioctl system call, and another that uses read
63 and write system calls.
64
44122162
RO
65 This module supports only the Solaris version of the read/write
66 interface. */
77382aee 67
c906108c 68#include <sys/types.h>
2978b111 69#include <dirent.h> /* opendir/readdir, for listing the LWP's */
c906108c 70
c3f6f71d
JM
71#include <fcntl.h> /* for O_RDONLY */
72#include <unistd.h> /* for "X_OK" */
53ce3c39 73#include <sys/stat.h> /* for struct stat */
c906108c 74
103b3ef5
MS
75/* Note: procfs-utils.h must be included after the above system header
76 files, because it redefines various system calls using macros.
77 This may be incompatible with the prototype declarations. */
78
103b3ef5
MS
79#include "proc-utils.h"
80
77382aee 81/* Prototypes for supply_gregset etc. */
c60c0f5f
MS
82#include "gregset.h"
83
c3f6f71d 84/* =================== TARGET_OPS "MODULE" =================== */
c906108c 85
77382aee 86/* This module defines the GDB target vector and its methods. */
c906108c 87
c0939df1 88static void procfs_attach (struct target_ops *, const char *, int);
52554a0e 89static void procfs_detach (struct target_ops *, const char *, int);
28439f5e 90static void procfs_resume (struct target_ops *,
2ea28649 91 ptid_t, int, enum gdb_signal);
a14ed312 92static void procfs_files_info (struct target_ops *);
28439f5e
PA
93static void procfs_fetch_registers (struct target_ops *,
94 struct regcache *, int);
95static void procfs_store_registers (struct target_ops *,
96 struct regcache *, int);
94bedb42
TT
97static void procfs_pass_signals (struct target_ops *self,
98 int, unsigned char *);
7d85a9c0 99static void procfs_kill_inferior (struct target_ops *ops);
136d6dae 100static void procfs_mourn_inferior (struct target_ops *ops);
5f2ad7a3
RO
101static void procfs_create_inferior (struct target_ops *, const char *,
102 const std::string &, char **, int);
117de6a9 103static ptid_t procfs_wait (struct target_ops *,
4fcbb494 104 ptid_t, struct target_waitstatus *, int);
e96027e0
PA
105static enum target_xfer_status procfs_xfer_memory (gdb_byte *,
106 const gdb_byte *,
107 ULONGEST, ULONGEST,
108 ULONGEST *);
4ac248ca 109static target_xfer_partial_ftype procfs_xfer_partial;
a14ed312 110
28439f5e 111static int procfs_thread_alive (struct target_ops *ops, ptid_t);
a14ed312 112
e8032dde 113static void procfs_update_thread_list (struct target_ops *ops);
7a114964 114static const char *procfs_pid_to_str (struct target_ops *, ptid_t);
c3f6f71d 115
2e73927c
TT
116static int proc_find_memory_regions (struct target_ops *self,
117 find_memory_region_ftype, void *);
be4d1333 118
44122162
RO
119static char *procfs_make_note_section (struct target_ops *self,
120 bfd *, int *);
be4d1333 121
5461485a 122static int procfs_can_use_hw_breakpoint (struct target_ops *self,
f486487f 123 enum bptype, int, int);
1e03ad20 124
7bc112c1 125static void procfs_info_proc (struct target_ops *, const char *,
145b16a9
UW
126 enum info_proc_what);
127
c47ffbe3 128#if defined (PR_MODEL_NATIVE) && (PR_MODEL_NATIVE == PR_MODEL_LP64)
77382aee
PA
129/* When GDB is built as 64-bit application on Solaris, the auxv data
130 is presented in 64-bit format. We need to provide a custom parser
131 to handle that. */
c47ffbe3
VP
132static int
133procfs_auxv_parse (struct target_ops *ops, gdb_byte **readptr,
77382aee 134 gdb_byte *endptr, CORE_ADDR *typep, CORE_ADDR *valp)
c47ffbe3 135{
f5656ead 136 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
c47ffbe3
VP
137 gdb_byte *ptr = *readptr;
138
139 if (endptr == ptr)
140 return 0;
77382aee 141
c47ffbe3
VP
142 if (endptr - ptr < 8 * 2)
143 return -1;
144
e17a4113 145 *typep = extract_unsigned_integer (ptr, 4, byte_order);
c47ffbe3
VP
146 ptr += 8;
147 /* The size of data is always 64-bit. If the application is 32-bit,
148 it will be zero extended, as expected. */
e17a4113 149 *valp = extract_unsigned_integer (ptr, 8, byte_order);
c47ffbe3
VP
150 ptr += 8;
151
152 *readptr = ptr;
153 return 1;
154}
155#endif
156
d1a7880c 157struct target_ops *
28439f5e 158procfs_target (void)
c3f6f71d 159{
28439f5e
PA
160 struct target_ops *t = inf_child_target ();
161
77382aee
PA
162 t->to_create_inferior = procfs_create_inferior;
163 t->to_kill = procfs_kill_inferior;
164 t->to_mourn_inferior = procfs_mourn_inferior;
165 t->to_attach = procfs_attach;
166 t->to_detach = procfs_detach;
167 t->to_wait = procfs_wait;
168 t->to_resume = procfs_resume;
169 t->to_fetch_registers = procfs_fetch_registers;
170 t->to_store_registers = procfs_store_registers;
171 t->to_xfer_partial = procfs_xfer_partial;
2455069d 172 t->to_pass_signals = procfs_pass_signals;
77382aee 173 t->to_files_info = procfs_files_info;
28439f5e 174
e8032dde 175 t->to_update_thread_list = procfs_update_thread_list;
77382aee
PA
176 t->to_thread_alive = procfs_thread_alive;
177 t->to_pid_to_str = procfs_pid_to_str;
28439f5e 178
77382aee 179 t->to_has_thread_control = tc_schedlock;
28439f5e
PA
180 t->to_find_memory_regions = proc_find_memory_regions;
181 t->to_make_corefile_notes = procfs_make_note_section;
145b16a9 182 t->to_info_proc = procfs_info_proc;
c47ffbe3
VP
183
184#if defined(PR_MODEL_NATIVE) && (PR_MODEL_NATIVE == PR_MODEL_LP64)
28439f5e 185 t->to_auxv_parse = procfs_auxv_parse;
c47ffbe3
VP
186#endif
187
77382aee 188 t->to_magic = OPS_MAGIC;
28439f5e
PA
189
190 return t;
c3f6f71d 191}
c906108c 192
c3f6f71d
JM
193/* =================== END, TARGET_OPS "MODULE" =================== */
194
77382aee
PA
195/* World Unification:
196
197 Put any typedefs, defines etc. here that are required for the
198 unification of code that handles different versions of /proc. */
c3f6f71d 199
44122162
RO
200enum { READ_WATCHFLAG = WA_READ,
201 WRITE_WATCHFLAG = WA_WRITE,
202 EXEC_WATCHFLAG = WA_EXEC,
203 AFTER_WATCHFLAG = WA_TRAPAFTER
204};
c3f6f71d
JM
205
206
207/* =================== STRUCT PROCINFO "MODULE" =================== */
208
209 /* FIXME: this comment will soon be out of date W.R.T. threads. */
210
211/* The procinfo struct is a wrapper to hold all the state information
212 concerning a /proc process. There should be exactly one procinfo
213 for each process, and since GDB currently can debug only one
214 process at a time, that means there should be only one procinfo.
215 All of the LWP's of a process can be accessed indirectly thru the
216 single process procinfo.
217
218 However, against the day when GDB may debug more than one process,
219 this data structure is kept in a list (which for now will hold no
220 more than one member), and many functions will have a pointer to a
221 procinfo as an argument.
222
223 There will be a separate procinfo structure for use by the (not yet
224 implemented) "info proc" command, so that we can print useful
225 information about any random process without interfering with the
0df8b418 226 inferior's procinfo information. */
c3f6f71d 227
c3f6f71d 228/* format strings for /proc paths */
44122162
RO
229#define MAIN_PROC_NAME_FMT "/proc/%d"
230#define CTL_PROC_NAME_FMT "/proc/%d/ctl"
231#define AS_PROC_NAME_FMT "/proc/%d/as"
232#define MAP_PROC_NAME_FMT "/proc/%d/map"
233#define STATUS_PROC_NAME_FMT "/proc/%d/status"
234#define MAX_PROC_NAME_SIZE sizeof("/proc/99999/lwp/8096/lstatus")
c906108c 235
c3f6f71d
JM
236typedef struct procinfo {
237 struct procinfo *next;
238 int pid; /* Process ID */
239 int tid; /* Thread/LWP id */
c906108c 240
c3f6f71d
JM
241 /* process state */
242 int was_stopped;
243 int ignore_next_sigstop;
c906108c 244
c3f6f71d 245 int ctl_fd; /* File descriptor for /proc control file */
c3f6f71d
JM
246 int status_fd; /* File descriptor for /proc status file */
247 int as_fd; /* File descriptor for /proc as file */
c906108c 248
c3f6f71d 249 char pathname[MAX_PROC_NAME_SIZE]; /* Pathname to /proc entry */
c906108c 250
c3f6f71d 251 fltset_t saved_fltset; /* Saved traced hardware fault set */
44122162
RO
252 sigset_t saved_sigset; /* Saved traced signal set */
253 sigset_t saved_sighold; /* Saved held signal set */
37de36c6
KB
254 sysset_t *saved_exitset; /* Saved traced system call exit set */
255 sysset_t *saved_entryset; /* Saved traced system call entry set */
c906108c 256
44122162 257 pstatus_t prstatus; /* Current process status info */
19958708 258
c3f6f71d 259 struct procinfo *thread_list;
c906108c 260
c3f6f71d
JM
261 int status_valid : 1;
262 int gregs_valid : 1;
263 int fpregs_valid : 1;
264 int threads_valid: 1;
265} procinfo;
c906108c 266
c3f6f71d 267static char errmsg[128]; /* shared error msg buffer */
c906108c 268
c3f6f71d 269/* Function prototypes for procinfo module: */
c906108c 270
a14ed312
KB
271static procinfo *find_procinfo_or_die (int pid, int tid);
272static procinfo *find_procinfo (int pid, int tid);
273static procinfo *create_procinfo (int pid, int tid);
44122162 274static void destroy_procinfo (procinfo *p);
004527cb 275static void do_destroy_procinfo_cleanup (void *);
44122162
RO
276static void dead_procinfo (procinfo *p, const char *msg, int killp);
277static int open_procinfo_files (procinfo *p, int which);
278static void close_procinfo_files (procinfo *p);
279static sysset_t *sysset_t_alloc (procinfo *pi);
c906108c 280
e9ef4f39 281static int iterate_over_mappings
b8edc417
JK
282 (procinfo *pi, find_memory_region_ftype child_func, void *data,
283 int (*func) (struct prmap *map, find_memory_region_ftype child_func,
77382aee 284 void *data));
e9ef4f39 285
c3f6f71d 286/* The head of the procinfo list: */
44122162 287static procinfo *procinfo_list;
c906108c 288
77382aee
PA
289/* Search the procinfo list. Return a pointer to procinfo, or NULL if
290 not found. */
c906108c 291
19958708 292static procinfo *
fba45db2 293find_procinfo (int pid, int tid)
c5aa993b 294{
c3f6f71d 295 procinfo *pi;
c906108c 296
c3f6f71d
JM
297 for (pi = procinfo_list; pi; pi = pi->next)
298 if (pi->pid == pid)
299 break;
c906108c 300
c3f6f71d
JM
301 if (pi)
302 if (tid)
303 {
304 /* Don't check threads_valid. If we're updating the
305 thread_list, we want to find whatever threads are already
306 here. This means that in general it is the caller's
307 responsibility to check threads_valid and update before
308 calling find_procinfo, if the caller wants to find a new
77382aee 309 thread. */
c3f6f71d
JM
310
311 for (pi = pi->thread_list; pi; pi = pi->next)
312 if (pi->tid == tid)
313 break;
314 }
c906108c 315
c3f6f71d
JM
316 return pi;
317}
c906108c 318
77382aee 319/* Calls find_procinfo, but errors on failure. */
c906108c 320
c3f6f71d 321static procinfo *
fba45db2 322find_procinfo_or_die (int pid, int tid)
c3f6f71d
JM
323{
324 procinfo *pi = find_procinfo (pid, tid);
c906108c 325
c3f6f71d 326 if (pi == NULL)
0fda6bd2
JM
327 {
328 if (tid)
3e43a32a
MS
329 error (_("procfs: couldn't find pid %d "
330 "(kernel thread %d) in procinfo list."),
0fda6bd2
JM
331 pid, tid);
332 else
8a3fe4f8 333 error (_("procfs: couldn't find pid %d in procinfo list."), pid);
0fda6bd2 334 }
c3f6f71d
JM
335 return pi;
336}
c906108c 337
77382aee
PA
338/* Wrapper for `open'. The appropriate open call is attempted; if
339 unsuccessful, it will be retried as many times as needed for the
340 EAGAIN and EINTR conditions.
19958708 341
77382aee
PA
342 For other conditions, retry the open a limited number of times. In
343 addition, a short sleep is imposed prior to retrying the open. The
344 reason for this sleep is to give the kernel a chance to catch up
345 and create the file in question in the event that GDB "wins" the
346 race to open a file before the kernel has created it. */
19958708 347
4d1bcd09
KB
348static int
349open_with_retry (const char *pathname, int flags)
350{
351 int retries_remaining, status;
352
353 retries_remaining = 2;
354
355 while (1)
356 {
357 status = open (pathname, flags);
358
359 if (status >= 0 || retries_remaining == 0)
360 break;
361 else if (errno != EINTR && errno != EAGAIN)
362 {
363 retries_remaining--;
364 sleep (1);
365 }
366 }
367
368 return status;
369}
370
44122162
RO
371/* Open the file descriptor for the process or LWP. We only open the
372 control file descriptor; the others are opened lazily as needed.
77382aee 373 Returns the file descriptor, or zero for failure. */
c906108c 374
c3f6f71d 375enum { FD_CTL, FD_STATUS, FD_AS };
c906108c 376
c3f6f71d 377static int
fba45db2 378open_procinfo_files (procinfo *pi, int which)
c3f6f71d
JM
379{
380 char tmp[MAX_PROC_NAME_SIZE];
381 int fd;
382
77382aee
PA
383 /* This function is getting ALMOST long enough to break up into
384 several. Here is some rationale:
385
77382aee
PA
386 There are several file descriptors that may need to be open
387 for any given process or LWP. The ones we're intereted in are:
388 - control (ctl) write-only change the state
389 - status (status) read-only query the state
390 - address space (as) read/write access memory
391 - map (map) read-only virtual addr map
392 Most of these are opened lazily as they are needed.
393 The pathnames for the 'files' for an LWP look slightly
394 different from those of a first-class process:
395 Pathnames for a process (<proc-id>):
396 /proc/<proc-id>/ctl
397 /proc/<proc-id>/status
398 /proc/<proc-id>/as
399 /proc/<proc-id>/map
400 Pathnames for an LWP (lwp-id):
401 /proc/<proc-id>/lwp/<lwp-id>/lwpctl
402 /proc/<proc-id>/lwp/<lwp-id>/lwpstatus
403 An LWP has no map or address space file descriptor, since
44122162
RO
404 the memory map and address space are shared by all LWPs. */
405
77382aee
PA
406 /* In this case, there are several different file descriptors that
407 we might be asked to open. The control file descriptor will be
408 opened early, but the others will be opened lazily as they are
409 needed. */
c3f6f71d
JM
410
411 strcpy (tmp, pi->pathname);
0df8b418 412 switch (which) { /* Which file descriptor to open? */
c3f6f71d
JM
413 case FD_CTL:
414 if (pi->tid)
415 strcat (tmp, "/lwpctl");
416 else
417 strcat (tmp, "/ctl");
4d1bcd09 418 fd = open_with_retry (tmp, O_WRONLY);
e28cade7 419 if (fd < 0)
c3f6f71d
JM
420 return 0; /* fail */
421 pi->ctl_fd = fd;
422 break;
423 case FD_AS:
424 if (pi->tid)
0df8b418 425 return 0; /* There is no 'as' file descriptor for an lwp. */
c3f6f71d 426 strcat (tmp, "/as");
4d1bcd09 427 fd = open_with_retry (tmp, O_RDWR);
e28cade7 428 if (fd < 0)
c3f6f71d
JM
429 return 0; /* fail */
430 pi->as_fd = fd;
431 break;
432 case FD_STATUS:
433 if (pi->tid)
434 strcat (tmp, "/lwpstatus");
435 else
436 strcat (tmp, "/status");
4d1bcd09 437 fd = open_with_retry (tmp, O_RDONLY);
e28cade7 438 if (fd < 0)
c3f6f71d
JM
439 return 0; /* fail */
440 pi->status_fd = fd;
441 break;
442 default:
443 return 0; /* unknown file descriptor */
444 }
c906108c 445
c3f6f71d
JM
446 return 1; /* success */
447}
c906108c 448
77382aee
PA
449/* Allocate a data structure and link it into the procinfo list.
450 First tries to find a pre-existing one (FIXME: why?). Returns the
451 pointer to new procinfo struct. */
c906108c 452
c3f6f71d 453static procinfo *
fba45db2 454create_procinfo (int pid, int tid)
c3f6f71d 455{
0b62613e 456 procinfo *pi, *parent = NULL;
c906108c 457
0d06e24b 458 if ((pi = find_procinfo (pid, tid)))
0df8b418 459 return pi; /* Already exists, nothing to do. */
c906108c 460
0df8b418 461 /* Find parent before doing malloc, to save having to cleanup. */
c3f6f71d
JM
462 if (tid != 0)
463 parent = find_procinfo_or_die (pid, 0); /* FIXME: should I
464 create it if it
0df8b418 465 doesn't exist yet? */
c906108c 466
8d749320 467 pi = XNEW (procinfo);
c3f6f71d
JM
468 memset (pi, 0, sizeof (procinfo));
469 pi->pid = pid;
470 pi->tid = tid;
c906108c 471
1d5e0602
KB
472 pi->saved_entryset = sysset_t_alloc (pi);
473 pi->saved_exitset = sysset_t_alloc (pi);
474
c3f6f71d
JM
475 /* Chain into list. */
476 if (tid == 0)
477 {
478 sprintf (pi->pathname, MAIN_PROC_NAME_FMT, pid);
479 pi->next = procinfo_list;
480 procinfo_list = pi;
481 }
482 else
483 {
c3f6f71d 484 sprintf (pi->pathname, "/proc/%05d/lwp/%d", pid, tid);
c3f6f71d
JM
485 pi->next = parent->thread_list;
486 parent->thread_list = pi;
487 }
488 return pi;
489}
c906108c 490
77382aee 491/* Close all file descriptors associated with the procinfo. */
c906108c 492
c3f6f71d 493static void
fba45db2 494close_procinfo_files (procinfo *pi)
c3f6f71d
JM
495{
496 if (pi->ctl_fd > 0)
497 close (pi->ctl_fd);
c3f6f71d
JM
498 if (pi->as_fd > 0)
499 close (pi->as_fd);
500 if (pi->status_fd > 0)
501 close (pi->status_fd);
c3f6f71d
JM
502 pi->ctl_fd = pi->as_fd = pi->status_fd = 0;
503}
c906108c 504
77382aee 505/* Destructor function. Close, unlink and deallocate the object. */
c906108c 506
c3f6f71d 507static void
fba45db2 508destroy_one_procinfo (procinfo **list, procinfo *pi)
c3f6f71d
JM
509{
510 procinfo *ptr;
511
77382aee 512 /* Step one: unlink the procinfo from its list. */
c3f6f71d
JM
513 if (pi == *list)
514 *list = pi->next;
19958708 515 else
c3f6f71d
JM
516 for (ptr = *list; ptr; ptr = ptr->next)
517 if (ptr->next == pi)
518 {
519 ptr->next = pi->next;
520 break;
521 }
7a292a7a 522
77382aee 523 /* Step two: close any open file descriptors. */
c3f6f71d 524 close_procinfo_files (pi);
7a292a7a 525
77382aee 526 /* Step three: free the memory. */
1d5e0602
KB
527 xfree (pi->saved_entryset);
528 xfree (pi->saved_exitset);
b8c9b27d 529 xfree (pi);
c3f6f71d 530}
c906108c 531
c3f6f71d 532static void
fba45db2 533destroy_procinfo (procinfo *pi)
c3f6f71d
JM
534{
535 procinfo *tmp;
c906108c 536
0df8b418 537 if (pi->tid != 0) /* Destroy a thread procinfo. */
c3f6f71d 538 {
0df8b418 539 tmp = find_procinfo (pi->pid, 0); /* Find the parent process. */
c3f6f71d
JM
540 destroy_one_procinfo (&tmp->thread_list, pi);
541 }
0df8b418 542 else /* Destroy a process procinfo and all its threads. */
c3f6f71d
JM
543 {
544 /* First destroy the children, if any; */
545 while (pi->thread_list != NULL)
546 destroy_one_procinfo (&pi->thread_list, pi->thread_list);
547 /* Then destroy the parent. Genocide!!! */
548 destroy_one_procinfo (&procinfo_list, pi);
549 }
550}
c906108c 551
004527cb
AC
552static void
553do_destroy_procinfo_cleanup (void *pi)
554{
b196bc4c 555 destroy_procinfo ((procinfo *) pi);
004527cb
AC
556}
557
c3f6f71d 558enum { NOKILL, KILL };
c906108c 559
77382aee
PA
560/* To be called on a non_recoverable error for a procinfo. Prints
561 error messages, optionally sends a SIGKILL to the process, then
562 destroys the data structure. */
c906108c 563
c3f6f71d 564static void
995816ba 565dead_procinfo (procinfo *pi, const char *msg, int kill_p)
c3f6f71d
JM
566{
567 char procfile[80];
c906108c 568
c3f6f71d
JM
569 if (pi->pathname)
570 {
571 print_sys_errmsg (pi->pathname, errno);
572 }
573 else
574 {
575 sprintf (procfile, "process %d", pi->pid);
576 print_sys_errmsg (procfile, errno);
577 }
578 if (kill_p == KILL)
579 kill (pi->pid, SIGKILL);
c906108c 580
c3f6f71d 581 destroy_procinfo (pi);
0b62613e 582 error ("%s", msg);
c3f6f71d 583}
c906108c 584
77382aee 585/* Allocate and (partially) initialize a sysset_t struct. */
37de36c6
KB
586
587static sysset_t *
44122162 588sysset_t_alloc (procinfo *pi)
37de36c6 589{
44122162 590 return (sysset_t *) xmalloc (sizeof (sysset_t));
37de36c6
KB
591}
592
c3f6f71d 593/* =================== END, STRUCT PROCINFO "MODULE" =================== */
c906108c 594
c3f6f71d 595/* =================== /proc "MODULE" =================== */
c906108c 596
77382aee
PA
597/* This "module" is the interface layer between the /proc system API
598 and the gdb target vector functions. This layer consists of access
599 functions that encapsulate each of the basic operations that we
600 need to use from the /proc API.
601
602 The main motivation for this layer is to hide the fact that there
603 are two very different implementations of the /proc API. Rather
604 than have a bunch of #ifdefs all thru the gdb target vector
605 functions, we do our best to hide them all in here. */
c906108c 606
44122162
RO
607static long proc_flags (procinfo *pi);
608static int proc_why (procinfo *pi);
609static int proc_what (procinfo *pi);
610static int proc_set_current_signal (procinfo *pi, int signo);
611static int proc_get_current_thread (procinfo *pi);
d3581e61 612static int proc_iterate_over_threads
44122162 613 (procinfo *pi,
d3581e61
JB
614 int (*func) (procinfo *, procinfo *, void *),
615 void *ptr);
616
617static void
995816ba 618proc_warn (procinfo *pi, const char *func, int line)
c3f6f71d
JM
619{
620 sprintf (errmsg, "procfs: %s line %d, %s", func, line, pi->pathname);
621 print_sys_errmsg (errmsg, errno);
622}
c906108c 623
d3581e61 624static void
995816ba 625proc_error (procinfo *pi, const char *func, int line)
c3f6f71d
JM
626{
627 sprintf (errmsg, "procfs: %s line %d, %s", func, line, pi->pathname);
628 perror_with_name (errmsg);
629}
c906108c 630
77382aee
PA
631/* Updates the status struct in the procinfo. There is a 'valid'
632 flag, to let other functions know when this function needs to be
633 called (so the status is only read when it is needed). The status
634 file descriptor is also only opened when it is needed. Returns
635 non-zero for success, zero for failure. */
c906108c 636
d3581e61 637static int
fba45db2 638proc_get_status (procinfo *pi)
c3f6f71d 639{
0df8b418 640 /* Status file descriptor is opened "lazily". */
c3f6f71d
JM
641 if (pi->status_fd == 0 &&
642 open_procinfo_files (pi, FD_STATUS) == 0)
643 {
644 pi->status_valid = 0;
645 return 0;
646 }
c906108c 647
c3f6f71d
JM
648 if (lseek (pi->status_fd, 0, SEEK_SET) < 0)
649 pi->status_valid = 0; /* fail */
650 else
651 {
19958708 652 /* Sigh... I have to read a different data structure,
0df8b418 653 depending on whether this is a main process or an LWP. */
c3f6f71d 654 if (pi->tid)
19958708
RM
655 pi->status_valid = (read (pi->status_fd,
656 (char *) &pi->prstatus.pr_lwp,
c3f6f71d
JM
657 sizeof (lwpstatus_t))
658 == sizeof (lwpstatus_t));
659 else
660 {
19958708 661 pi->status_valid = (read (pi->status_fd,
c3f6f71d 662 (char *) &pi->prstatus,
44122162
RO
663 sizeof (pstatus_t))
664 == sizeof (pstatus_t));
c3f6f71d
JM
665 }
666 }
c906108c 667
c3f6f71d
JM
668 if (pi->status_valid)
669 {
19958708 670 PROC_PRETTYFPRINT_STATUS (proc_flags (pi),
c3f6f71d 671 proc_why (pi),
19958708 672 proc_what (pi),
c3f6f71d
JM
673 proc_get_current_thread (pi));
674 }
c906108c 675
77382aee 676 /* The status struct includes general regs, so mark them valid too. */
c3f6f71d 677 pi->gregs_valid = pi->status_valid;
77382aee
PA
678 /* In the read/write multiple-fd model, the status struct includes
679 the fp regs too, so mark them valid too. */
c3f6f71d 680 pi->fpregs_valid = pi->status_valid;
77382aee 681 return pi->status_valid; /* True if success, false if failure. */
c3f6f71d 682}
c906108c 683
77382aee 684/* Returns the process flags (pr_flags field). */
c3f6f71d 685
d3581e61 686static long
fba45db2 687proc_flags (procinfo *pi)
c3f6f71d
JM
688{
689 if (!pi->status_valid)
690 if (!proc_get_status (pi))
0df8b418 691 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 692
c3f6f71d 693 return pi->prstatus.pr_lwp.pr_flags;
c3f6f71d 694}
c906108c 695
77382aee 696/* Returns the pr_why field (why the process stopped). */
c906108c 697
d3581e61 698static int
fba45db2 699proc_why (procinfo *pi)
c3f6f71d
JM
700{
701 if (!pi->status_valid)
702 if (!proc_get_status (pi))
0df8b418 703 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 704
c3f6f71d 705 return pi->prstatus.pr_lwp.pr_why;
c3f6f71d 706}
c906108c 707
77382aee 708/* Returns the pr_what field (details of why the process stopped). */
c906108c 709
d3581e61 710static int
fba45db2 711proc_what (procinfo *pi)
c3f6f71d
JM
712{
713 if (!pi->status_valid)
714 if (!proc_get_status (pi))
0df8b418 715 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 716
c3f6f71d 717 return pi->prstatus.pr_lwp.pr_what;
c3f6f71d 718}
c906108c 719
77382aee
PA
720/* This function is only called when PI is stopped by a watchpoint.
721 Assuming the OS supports it, write to *ADDR the data address which
722 triggered it and return 1. Return 0 if it is not possible to know
723 the address. */
bf701c2c
PM
724
725static int
726proc_watchpoint_address (procinfo *pi, CORE_ADDR *addr)
727{
728 if (!pi->status_valid)
729 if (!proc_get_status (pi))
730 return 0;
731
f5656ead
TT
732 *addr = (CORE_ADDR) gdbarch_pointer_to_address (target_gdbarch (),
733 builtin_type (target_gdbarch ())->builtin_data_ptr,
bf701c2c 734 (gdb_byte *) &pi->prstatus.pr_lwp.pr_info.si_addr);
bf701c2c
PM
735 return 1;
736}
737
77382aee
PA
738/* Returns the pr_nsysarg field (number of args to the current
739 syscall). */
c3f6f71d 740
d3581e61 741static int
fba45db2 742proc_nsysarg (procinfo *pi)
c3f6f71d
JM
743{
744 if (!pi->status_valid)
745 if (!proc_get_status (pi))
746 return 0;
19958708 747
c3f6f71d 748 return pi->prstatus.pr_lwp.pr_nsysarg;
c3f6f71d 749}
c906108c 750
77382aee
PA
751/* Returns the pr_sysarg field (pointer to the arguments of current
752 syscall). */
c906108c 753
d3581e61 754static long *
fba45db2 755proc_sysargs (procinfo *pi)
c3f6f71d
JM
756{
757 if (!pi->status_valid)
758 if (!proc_get_status (pi))
759 return NULL;
19958708 760
c3f6f71d 761 return (long *) &pi->prstatus.pr_lwp.pr_sysarg;
c3f6f71d 762}
77382aee 763
44122162 764/* Set or reset any of the following process flags:
77382aee
PA
765 PR_FORK -- forked child will inherit trace flags
766 PR_RLC -- traced process runs when last /proc file closed.
767 PR_KLC -- traced process is killed when last /proc file closed.
768 PR_ASYNC -- LWP's get to run/stop independently.
769
44122162 770 This function is done using read/write [PCSET/PCRESET/PCUNSET].
77382aee
PA
771
772 Arguments:
773 pi -- the procinfo
774 flag -- one of PR_FORK, PR_RLC, or PR_ASYNC
775 mode -- 1 for set, 0 for reset.
776
777 Returns non-zero for success, zero for failure. */
c906108c 778
c3f6f71d 779enum { FLAG_RESET, FLAG_SET };
c906108c 780
c3f6f71d 781static int
fba45db2 782proc_modify_flag (procinfo *pi, long flag, long mode)
c3f6f71d
JM
783{
784 long win = 0; /* default to fail */
785
77382aee
PA
786 /* These operations affect the process as a whole, and applying them
787 to an individual LWP has the same meaning as applying them to the
788 main process. Therefore, if we're ever called with a pointer to
789 an LWP's procinfo, let's substitute the process's procinfo and
790 avoid opening the LWP's file descriptor unnecessarily. */
c3f6f71d
JM
791
792 if (pi->pid != 0)
793 pi = find_procinfo_or_die (pi->pid, 0);
794
44122162 795 procfs_ctl_t arg[2];
c5aa993b 796
44122162
RO
797 if (mode == FLAG_SET) /* Set the flag (RLC, FORK, or ASYNC). */
798 arg[0] = PCSET;
0df8b418 799 else /* Reset the flag. */
44122162
RO
800 arg[0] = PCUNSET;
801
802 arg[1] = flag;
803 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 804
77382aee
PA
805 /* The above operation renders the procinfo's cached pstatus
806 obsolete. */
c3f6f71d 807 pi->status_valid = 0;
c906108c 808
c3f6f71d 809 if (!win)
8a3fe4f8 810 warning (_("procfs: modify_flag failed to turn %s %s"),
c3f6f71d
JM
811 flag == PR_FORK ? "PR_FORK" :
812 flag == PR_RLC ? "PR_RLC" :
c3f6f71d 813 flag == PR_ASYNC ? "PR_ASYNC" :
0d06e24b 814 flag == PR_KLC ? "PR_KLC" :
c3f6f71d
JM
815 "<unknown flag>",
816 mode == FLAG_RESET ? "off" : "on");
c906108c 817
c3f6f71d
JM
818 return win;
819}
c906108c 820
77382aee
PA
821/* Set the run_on_last_close flag. Process with all threads will
822 become runnable when debugger closes all /proc fds. Returns
823 non-zero for success, zero for failure. */
c906108c 824
d3581e61 825static int
fba45db2 826proc_set_run_on_last_close (procinfo *pi)
c906108c 827{
c3f6f71d
JM
828 return proc_modify_flag (pi, PR_RLC, FLAG_SET);
829}
c906108c 830
77382aee
PA
831/* Reset the run_on_last_close flag. The process will NOT become
832 runnable when debugger closes its file handles. Returns non-zero
833 for success, zero for failure. */
c906108c 834
d3581e61 835static int
fba45db2 836proc_unset_run_on_last_close (procinfo *pi)
c3f6f71d
JM
837{
838 return proc_modify_flag (pi, PR_RLC, FLAG_RESET);
c906108c
SS
839}
840
77382aee
PA
841/* Reset inherit_on_fork flag. If the process forks a child while we
842 are registered for events in the parent, then we will NOT recieve
843 events from the child. Returns non-zero for success, zero for
844 failure. */
c906108c 845
d3581e61 846static int
fba45db2 847proc_unset_inherit_on_fork (procinfo *pi)
c3f6f71d
JM
848{
849 return proc_modify_flag (pi, PR_FORK, FLAG_RESET);
850}
c906108c 851
77382aee
PA
852/* Set PR_ASYNC flag. If one LWP stops because of a debug event
853 (signal etc.), the remaining LWPs will continue to run. Returns
854 non-zero for success, zero for failure. */
c906108c 855
d3581e61 856static int
fba45db2 857proc_set_async (procinfo *pi)
c3f6f71d
JM
858{
859 return proc_modify_flag (pi, PR_ASYNC, FLAG_SET);
860}
c906108c 861
77382aee
PA
862/* Reset PR_ASYNC flag. If one LWP stops because of a debug event
863 (signal etc.), then all other LWPs will stop as well. Returns
864 non-zero for success, zero for failure. */
c906108c 865
d3581e61 866static int
fba45db2 867proc_unset_async (procinfo *pi)
c3f6f71d
JM
868{
869 return proc_modify_flag (pi, PR_ASYNC, FLAG_RESET);
870}
c906108c 871
77382aee
PA
872/* Request the process/LWP to stop. Does not wait. Returns non-zero
873 for success, zero for failure. */
c906108c 874
d3581e61 875static int
fba45db2 876proc_stop_process (procinfo *pi)
c3f6f71d
JM
877{
878 int win;
c906108c 879
77382aee
PA
880 /* We might conceivably apply this operation to an LWP, and the
881 LWP's ctl file descriptor might not be open. */
c906108c 882
c3f6f71d
JM
883 if (pi->ctl_fd == 0 &&
884 open_procinfo_files (pi, FD_CTL) == 0)
885 return 0;
886 else
887 {
37de36c6 888 procfs_ctl_t cmd = PCSTOP;
f4a14ae6 889
c3f6f71d 890 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d 891 }
c906108c 892
c3f6f71d
JM
893 return win;
894}
c5aa993b 895
77382aee
PA
896/* Wait for the process or LWP to stop (block until it does). Returns
897 non-zero for success, zero for failure. */
c906108c 898
d3581e61 899static int
fba45db2 900proc_wait_for_stop (procinfo *pi)
c906108c 901{
c3f6f71d
JM
902 int win;
903
77382aee
PA
904 /* We should never have to apply this operation to any procinfo
905 except the one for the main process. If that ever changes for
906 any reason, then take out the following clause and replace it
907 with one that makes sure the ctl_fd is open. */
19958708 908
c3f6f71d
JM
909 if (pi->tid != 0)
910 pi = find_procinfo_or_die (pi->pid, 0);
911
44122162 912 procfs_ctl_t cmd = PCWSTOP;
f4a14ae6 913
44122162
RO
914 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
915 /* We been runnin' and we stopped -- need to update status. */
916 pi->status_valid = 0;
c906108c 917
c3f6f71d 918 return win;
c906108c
SS
919}
920
77382aee
PA
921/* Make the process or LWP runnable.
922
923 Options (not all are implemented):
924 - single-step
925 - clear current fault
926 - clear current signal
927 - abort the current system call
928 - stop as soon as finished with system call
929 - (ioctl): set traced signal set
930 - (ioctl): set held signal set
931 - (ioctl): set traced fault set
932 - (ioctl): set start pc (vaddr)
933
934 Always clears the current fault. PI is the process or LWP to
935 operate on. If STEP is true, set the process or LWP to trap after
936 one instruction. If SIGNO is zero, clear the current signal if
937 any; if non-zero, set the current signal to this one. Returns
938 non-zero for success, zero for failure. */
c3f6f71d 939
d3581e61 940static int
fba45db2 941proc_run_process (procinfo *pi, int step, int signo)
c3f6f71d
JM
942{
943 int win;
944 int runflags;
945
77382aee
PA
946 /* We will probably have to apply this operation to individual
947 threads, so make sure the control file descriptor is open. */
19958708 948
c3f6f71d
JM
949 if (pi->ctl_fd == 0 &&
950 open_procinfo_files (pi, FD_CTL) == 0)
951 {
952 return 0;
953 }
c906108c 954
0df8b418 955 runflags = PRCFAULT; /* Always clear current fault. */
c3f6f71d
JM
956 if (step)
957 runflags |= PRSTEP;
958 if (signo == 0)
959 runflags |= PRCSIG;
0df8b418 960 else if (signo != -1) /* -1 means do nothing W.R.T. signals. */
c3f6f71d 961 proc_set_current_signal (pi, signo);
c5aa993b 962
44122162 963 procfs_ctl_t cmd[2];
c906108c 964
44122162
RO
965 cmd[0] = PCRUN;
966 cmd[1] = runflags;
967 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c906108c 968
c3f6f71d
JM
969 return win;
970}
c906108c 971
77382aee
PA
972/* Register to trace signals in the process or LWP. Returns non-zero
973 for success, zero for failure. */
c906108c 974
d3581e61 975static int
44122162 976proc_set_traced_signals (procinfo *pi, sigset_t *sigset)
c906108c 977{
c3f6f71d
JM
978 int win;
979
77382aee
PA
980 /* We should never have to apply this operation to any procinfo
981 except the one for the main process. If that ever changes for
982 any reason, then take out the following clause and replace it
983 with one that makes sure the ctl_fd is open. */
19958708 984
c3f6f71d
JM
985 if (pi->tid != 0)
986 pi = find_procinfo_or_die (pi->pid, 0);
987
44122162
RO
988 struct {
989 procfs_ctl_t cmd;
990 /* Use char array to avoid alignment issues. */
991 char sigset[sizeof (sigset_t)];
992 } arg;
c906108c 993
44122162
RO
994 arg.cmd = PCSTRACE;
995 memcpy (&arg.sigset, sigset, sizeof (sigset_t));
996
997 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 998
0df8b418 999 /* The above operation renders the procinfo's cached pstatus obsolete. */
c3f6f71d 1000 pi->status_valid = 0;
c906108c 1001
c3f6f71d 1002 if (!win)
8a3fe4f8 1003 warning (_("procfs: set_traced_signals failed"));
c3f6f71d 1004 return win;
c906108c
SS
1005}
1006
77382aee
PA
1007/* Register to trace hardware faults in the process or LWP. Returns
1008 non-zero for success, zero for failure. */
c906108c 1009
d3581e61 1010static int
fba45db2 1011proc_set_traced_faults (procinfo *pi, fltset_t *fltset)
c3f6f71d
JM
1012{
1013 int win;
1014
77382aee
PA
1015 /* We should never have to apply this operation to any procinfo
1016 except the one for the main process. If that ever changes for
1017 any reason, then take out the following clause and replace it
1018 with one that makes sure the ctl_fd is open. */
19958708 1019
c3f6f71d
JM
1020 if (pi->tid != 0)
1021 pi = find_procinfo_or_die (pi->pid, 0);
1022
44122162
RO
1023 struct {
1024 procfs_ctl_t cmd;
1025 /* Use char array to avoid alignment issues. */
1026 char fltset[sizeof (fltset_t)];
1027 } arg;
1028
1029 arg.cmd = PCSFAULT;
1030 memcpy (&arg.fltset, fltset, sizeof (fltset_t));
c906108c 1031
44122162 1032 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1033
0df8b418 1034 /* The above operation renders the procinfo's cached pstatus obsolete. */
c3f6f71d 1035 pi->status_valid = 0;
c906108c 1036
c3f6f71d
JM
1037 return win;
1038}
c5aa993b 1039
77382aee
PA
1040/* Register to trace entry to system calls in the process or LWP.
1041 Returns non-zero for success, zero for failure. */
c906108c 1042
d3581e61 1043static int
fba45db2 1044proc_set_traced_sysentry (procinfo *pi, sysset_t *sysset)
c906108c 1045{
c3f6f71d
JM
1046 int win;
1047
77382aee
PA
1048 /* We should never have to apply this operation to any procinfo
1049 except the one for the main process. If that ever changes for
1050 any reason, then take out the following clause and replace it
1051 with one that makes sure the ctl_fd is open. */
19958708 1052
c3f6f71d
JM
1053 if (pi->tid != 0)
1054 pi = find_procinfo_or_die (pi->pid, 0);
1055
44122162
RO
1056 struct gdb_proc_ctl_pcsentry {
1057 procfs_ctl_t cmd;
1058 /* Use char array to avoid alignment issues. */
1059 char sysset[sizeof (sysset_t)];
1060 } *argp;
1061 int argp_size = sizeof (struct gdb_proc_ctl_pcsentry);
c3f6f71d 1062
44122162 1063 argp = (struct gdb_proc_ctl_pcsentry *) xmalloc (argp_size);
c3f6f71d 1064
44122162
RO
1065 argp->cmd = PCSENTRY;
1066 memcpy (&argp->sysset, sysset, sizeof (sysset_t));
1067
1068 win = (write (pi->ctl_fd, (char *) argp, argp_size) == argp_size);
1069 xfree (argp);
37de36c6 1070
77382aee
PA
1071 /* The above operation renders the procinfo's cached pstatus
1072 obsolete. */
c3f6f71d 1073 pi->status_valid = 0;
19958708 1074
c3f6f71d 1075 return win;
c906108c
SS
1076}
1077
77382aee
PA
1078/* Register to trace exit from system calls in the process or LWP.
1079 Returns non-zero for success, zero for failure. */
c906108c 1080
d3581e61 1081static int
fba45db2 1082proc_set_traced_sysexit (procinfo *pi, sysset_t *sysset)
c3f6f71d
JM
1083{
1084 int win;
1085
77382aee
PA
1086 /* We should never have to apply this operation to any procinfo
1087 except the one for the main process. If that ever changes for
1088 any reason, then take out the following clause and replace it
1089 with one that makes sure the ctl_fd is open. */
19958708 1090
c3f6f71d
JM
1091 if (pi->tid != 0)
1092 pi = find_procinfo_or_die (pi->pid, 0);
1093
44122162
RO
1094 struct gdb_proc_ctl_pcsexit {
1095 procfs_ctl_t cmd;
1096 /* Use char array to avoid alignment issues. */
1097 char sysset[sizeof (sysset_t)];
1098 } *argp;
1099 int argp_size = sizeof (struct gdb_proc_ctl_pcsexit);
1100
1101 argp = (struct gdb_proc_ctl_pcsexit *) xmalloc (argp_size);
c906108c 1102
44122162
RO
1103 argp->cmd = PCSEXIT;
1104 memcpy (&argp->sysset, sysset, sizeof (sysset_t));
c906108c 1105
44122162
RO
1106 win = (write (pi->ctl_fd, (char *) argp, argp_size) == argp_size);
1107 xfree (argp);
37de36c6 1108
77382aee
PA
1109 /* The above operation renders the procinfo's cached pstatus
1110 obsolete. */
c3f6f71d 1111 pi->status_valid = 0;
c906108c 1112
c3f6f71d
JM
1113 return win;
1114}
c906108c 1115
77382aee
PA
1116/* Specify the set of blocked / held signals in the process or LWP.
1117 Returns non-zero for success, zero for failure. */
c906108c 1118
d3581e61 1119static int
44122162 1120proc_set_held_signals (procinfo *pi, sigset_t *sighold)
c906108c 1121{
c3f6f71d
JM
1122 int win;
1123
77382aee
PA
1124 /* We should never have to apply this operation to any procinfo
1125 except the one for the main process. If that ever changes for
1126 any reason, then take out the following clause and replace it
1127 with one that makes sure the ctl_fd is open. */
19958708 1128
c3f6f71d
JM
1129 if (pi->tid != 0)
1130 pi = find_procinfo_or_die (pi->pid, 0);
1131
44122162
RO
1132 struct {
1133 procfs_ctl_t cmd;
1134 /* Use char array to avoid alignment issues. */
1135 char hold[sizeof (sigset_t)];
1136 } arg;
1137
1138 arg.cmd = PCSHOLD;
1139 memcpy (&arg.hold, sighold, sizeof (sigset_t));
1140 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
1141
77382aee
PA
1142 /* The above operation renders the procinfo's cached pstatus
1143 obsolete. */
c3f6f71d
JM
1144 pi->status_valid = 0;
1145
1146 return win;
c906108c
SS
1147}
1148
77382aee
PA
1149/* Returns the set of signals that are held / blocked. Will also copy
1150 the sigset if SAVE is non-zero. */
c906108c 1151
44122162
RO
1152static sigset_t *
1153proc_get_held_signals (procinfo *pi, sigset_t *save)
c906108c 1154{
44122162 1155 sigset_t *ret = NULL;
c3f6f71d 1156
77382aee
PA
1157 /* We should never have to apply this operation to any procinfo
1158 except the one for the main process. If that ever changes for
1159 any reason, then take out the following clause and replace it
1160 with one that makes sure the ctl_fd is open. */
19958708 1161
c3f6f71d
JM
1162 if (pi->tid != 0)
1163 pi = find_procinfo_or_die (pi->pid, 0);
1164
c3f6f71d
JM
1165 if (!pi->status_valid)
1166 if (!proc_get_status (pi))
1167 return NULL;
1168
c3f6f71d 1169 ret = &pi->prstatus.pr_lwp.pr_lwphold;
c3f6f71d 1170 if (save && ret)
44122162 1171 memcpy (save, ret, sizeof (sigset_t));
c3f6f71d
JM
1172
1173 return ret;
c906108c
SS
1174}
1175
77382aee
PA
1176/* Returns the set of signals that are traced / debugged. Will also
1177 copy the sigset if SAVE is non-zero. */
c3f6f71d 1178
44122162
RO
1179static sigset_t *
1180proc_get_traced_signals (procinfo *pi, sigset_t *save)
c906108c 1181{
44122162 1182 sigset_t *ret = NULL;
c3f6f71d 1183
77382aee
PA
1184 /* We should never have to apply this operation to any procinfo
1185 except the one for the main process. If that ever changes for
1186 any reason, then take out the following clause and replace it
1187 with one that makes sure the ctl_fd is open. */
19958708 1188
c3f6f71d
JM
1189 if (pi->tid != 0)
1190 pi = find_procinfo_or_die (pi->pid, 0);
1191
c3f6f71d
JM
1192 if (!pi->status_valid)
1193 if (!proc_get_status (pi))
1194 return NULL;
1195
1196 ret = &pi->prstatus.pr_sigtrace;
c3f6f71d 1197 if (save && ret)
44122162 1198 memcpy (save, ret, sizeof (sigset_t));
c906108c 1199
c3f6f71d
JM
1200 return ret;
1201}
c906108c 1202
77382aee
PA
1203/* Returns the set of hardware faults that are traced /debugged. Will
1204 also copy the faultset if SAVE is non-zero. */
c3f6f71d 1205
d3581e61 1206static fltset_t *
fba45db2 1207proc_get_traced_faults (procinfo *pi, fltset_t *save)
c3f6f71d
JM
1208{
1209 fltset_t *ret = NULL;
1210
77382aee
PA
1211 /* We should never have to apply this operation to any procinfo
1212 except the one for the main process. If that ever changes for
1213 any reason, then take out the following clause and replace it
1214 with one that makes sure the ctl_fd is open. */
19958708 1215
c3f6f71d
JM
1216 if (pi->tid != 0)
1217 pi = find_procinfo_or_die (pi->pid, 0);
1218
c3f6f71d
JM
1219 if (!pi->status_valid)
1220 if (!proc_get_status (pi))
1221 return NULL;
1222
1223 ret = &pi->prstatus.pr_flttrace;
c3f6f71d
JM
1224 if (save && ret)
1225 memcpy (save, ret, sizeof (fltset_t));
c906108c 1226
c3f6f71d
JM
1227 return ret;
1228}
c906108c 1229
77382aee
PA
1230/* Returns the set of syscalls that are traced /debugged on entry.
1231 Will also copy the syscall set if SAVE is non-zero. */
c906108c 1232
d3581e61 1233static sysset_t *
fba45db2 1234proc_get_traced_sysentry (procinfo *pi, sysset_t *save)
c3f6f71d
JM
1235{
1236 sysset_t *ret = NULL;
1237
77382aee
PA
1238 /* We should never have to apply this operation to any procinfo
1239 except the one for the main process. If that ever changes for
1240 any reason, then take out the following clause and replace it
1241 with one that makes sure the ctl_fd is open. */
19958708 1242
c3f6f71d
JM
1243 if (pi->tid != 0)
1244 pi = find_procinfo_or_die (pi->pid, 0);
1245
c3f6f71d
JM
1246 if (!pi->status_valid)
1247 if (!proc_get_status (pi))
1248 return NULL;
1249
1250 ret = &pi->prstatus.pr_sysentry;
c3f6f71d 1251 if (save && ret)
44122162 1252 memcpy (save, ret, sizeof (sysset_t));
c906108c 1253
c3f6f71d
JM
1254 return ret;
1255}
c5aa993b 1256
77382aee
PA
1257/* Returns the set of syscalls that are traced /debugged on exit.
1258 Will also copy the syscall set if SAVE is non-zero. */
c906108c 1259
d3581e61 1260static sysset_t *
fba45db2 1261proc_get_traced_sysexit (procinfo *pi, sysset_t *save)
c906108c 1262{
44122162 1263 sysset_t *ret = NULL;
c3f6f71d 1264
77382aee
PA
1265 /* We should never have to apply this operation to any procinfo
1266 except the one for the main process. If that ever changes for
1267 any reason, then take out the following clause and replace it
1268 with one that makes sure the ctl_fd is open. */
19958708 1269
c3f6f71d
JM
1270 if (pi->tid != 0)
1271 pi = find_procinfo_or_die (pi->pid, 0);
1272
c3f6f71d
JM
1273 if (!pi->status_valid)
1274 if (!proc_get_status (pi))
1275 return NULL;
1276
1277 ret = &pi->prstatus.pr_sysexit;
c3f6f71d 1278 if (save && ret)
44122162 1279 memcpy (save, ret, sizeof (sysset_t));
c3f6f71d
JM
1280
1281 return ret;
1282}
c906108c 1283
77382aee
PA
1284/* The current fault (if any) is cleared; the associated signal will
1285 not be sent to the process or LWP when it resumes. Returns
1286 non-zero for success, zero for failure. */
c906108c 1287
d3581e61 1288static int
fba45db2 1289proc_clear_current_fault (procinfo *pi)
c3f6f71d
JM
1290{
1291 int win;
1292
77382aee
PA
1293 /* We should never have to apply this operation to any procinfo
1294 except the one for the main process. If that ever changes for
1295 any reason, then take out the following clause and replace it
1296 with one that makes sure the ctl_fd is open. */
19958708 1297
c3f6f71d
JM
1298 if (pi->tid != 0)
1299 pi = find_procinfo_or_die (pi->pid, 0);
1300
44122162 1301 procfs_ctl_t cmd = PCCFAULT;
f4a14ae6 1302
44122162 1303 win = (write (pi->ctl_fd, (void *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d
JM
1304
1305 return win;
c906108c
SS
1306}
1307
77382aee
PA
1308/* Set the "current signal" that will be delivered next to the
1309 process. NOTE: semantics are different from those of KILL. This
1310 signal will be delivered to the process or LWP immediately when it
1311 is resumed (even if the signal is held/blocked); it will NOT
1312 immediately cause another event of interest, and will NOT first
1313 trap back to the debugger. Returns non-zero for success, zero for
1314 failure. */
c3f6f71d 1315
d3581e61 1316static int
fba45db2 1317proc_set_current_signal (procinfo *pi, int signo)
c3f6f71d
JM
1318{
1319 int win;
1320 struct {
37de36c6 1321 procfs_ctl_t cmd;
c3f6f71d 1322 /* Use char array to avoid alignment issues. */
44122162 1323 char sinfo[sizeof (siginfo_t)];
c3f6f71d 1324 } arg;
44122162 1325 siginfo_t mysinfo;
c162e8c9
JM
1326 ptid_t wait_ptid;
1327 struct target_waitstatus wait_status;
c3f6f71d 1328
77382aee
PA
1329 /* We should never have to apply this operation to any procinfo
1330 except the one for the main process. If that ever changes for
1331 any reason, then take out the following clause and replace it
1332 with one that makes sure the ctl_fd is open. */
19958708 1333
c3f6f71d
JM
1334 if (pi->tid != 0)
1335 pi = find_procinfo_or_die (pi->pid, 0);
1336
c3f6f71d 1337 /* The pointer is just a type alias. */
c162e8c9
JM
1338 get_last_target_status (&wait_ptid, &wait_status);
1339 if (ptid_equal (wait_ptid, inferior_ptid)
1340 && wait_status.kind == TARGET_WAITKIND_STOPPED
2ea28649 1341 && wait_status.value.sig == gdb_signal_from_host (signo)
c162e8c9 1342 && proc_get_status (pi)
c162e8c9 1343 && pi->prstatus.pr_lwp.pr_info.si_signo == signo
c162e8c9
JM
1344 )
1345 /* Use the siginfo associated with the signal being
1346 redelivered. */
44122162 1347 memcpy (arg.sinfo, &pi->prstatus.pr_lwp.pr_info, sizeof (siginfo_t));
c162e8c9
JM
1348 else
1349 {
73930d4d
KH
1350 mysinfo.si_signo = signo;
1351 mysinfo.si_code = 0;
1352 mysinfo.si_pid = getpid (); /* ?why? */
1353 mysinfo.si_uid = getuid (); /* ?why? */
44122162 1354 memcpy (arg.sinfo, &mysinfo, sizeof (siginfo_t));
c162e8c9 1355 }
c3f6f71d 1356
c3f6f71d
JM
1357 arg.cmd = PCSSIG;
1358 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1359
c3f6f71d
JM
1360 return win;
1361}
c906108c 1362
77382aee
PA
1363/* The current signal (if any) is cleared, and is not sent to the
1364 process or LWP when it resumes. Returns non-zero for success, zero
1365 for failure. */
c906108c 1366
d3581e61 1367static int
fba45db2 1368proc_clear_current_signal (procinfo *pi)
c3f6f71d
JM
1369{
1370 int win;
1371
77382aee
PA
1372 /* We should never have to apply this operation to any procinfo
1373 except the one for the main process. If that ever changes for
1374 any reason, then take out the following clause and replace it
1375 with one that makes sure the ctl_fd is open. */
19958708 1376
c3f6f71d
JM
1377 if (pi->tid != 0)
1378 pi = find_procinfo_or_die (pi->pid, 0);
1379
44122162
RO
1380 struct {
1381 procfs_ctl_t cmd;
1382 /* Use char array to avoid alignment issues. */
1383 char sinfo[sizeof (siginfo_t)];
1384 } arg;
1385 siginfo_t mysinfo;
1386
1387 arg.cmd = PCSSIG;
1388 /* The pointer is just a type alias. */
1389 mysinfo.si_signo = 0;
1390 mysinfo.si_code = 0;
1391 mysinfo.si_errno = 0;
1392 mysinfo.si_pid = getpid (); /* ?why? */
1393 mysinfo.si_uid = getuid (); /* ?why? */
1394 memcpy (arg.sinfo, &mysinfo, sizeof (siginfo_t));
1395
1396 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1397
c3f6f71d
JM
1398 return win;
1399}
c906108c 1400
772cf8be
MK
1401/* Return the general-purpose registers for the process or LWP
1402 corresponding to PI. Upon failure, return NULL. */
c906108c 1403
d3581e61 1404static gdb_gregset_t *
fba45db2 1405proc_get_gregs (procinfo *pi)
c3f6f71d
JM
1406{
1407 if (!pi->status_valid || !pi->gregs_valid)
1408 if (!proc_get_status (pi))
1409 return NULL;
1410
c3f6f71d 1411 return &pi->prstatus.pr_lwp.pr_reg;
c3f6f71d 1412}
c5aa993b 1413
772cf8be
MK
1414/* Return the general-purpose registers for the process or LWP
1415 corresponding to PI. Upon failure, return NULL. */
c906108c 1416
d3581e61 1417static gdb_fpregset_t *
fba45db2 1418proc_get_fpregs (procinfo *pi)
c906108c 1419{
c3f6f71d
JM
1420 if (!pi->status_valid || !pi->fpregs_valid)
1421 if (!proc_get_status (pi))
1422 return NULL;
1423
c3f6f71d 1424 return &pi->prstatus.pr_lwp.pr_fpreg;
c906108c
SS
1425}
1426
772cf8be
MK
1427/* Write the general-purpose registers back to the process or LWP
1428 corresponding to PI. Return non-zero for success, zero for
1429 failure. */
c3f6f71d 1430
d3581e61 1431static int
fba45db2 1432proc_set_gregs (procinfo *pi)
c906108c 1433{
c3f6f71d
JM
1434 gdb_gregset_t *gregs;
1435 int win;
c5aa993b 1436
772cf8be
MK
1437 gregs = proc_get_gregs (pi);
1438 if (gregs == NULL)
1439 return 0; /* proc_get_regs has already warned. */
c3f6f71d 1440
772cf8be 1441 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c906108c 1442 {
c3f6f71d 1443 return 0;
c906108c 1444 }
c3f6f71d 1445 else
c906108c 1446 {
c3f6f71d 1447 struct {
37de36c6 1448 procfs_ctl_t cmd;
c3f6f71d
JM
1449 /* Use char array to avoid alignment issues. */
1450 char gregs[sizeof (gdb_gregset_t)];
1451 } arg;
1452
772cf8be 1453 arg.cmd = PCSREG;
c3f6f71d
JM
1454 memcpy (&arg.gregs, gregs, sizeof (arg.gregs));
1455 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1456 }
c3f6f71d 1457
772cf8be 1458 /* Policy: writing the registers invalidates our cache. */
c3f6f71d
JM
1459 pi->gregs_valid = 0;
1460 return win;
c906108c
SS
1461}
1462
772cf8be
MK
1463/* Write the floating-pointer registers back to the process or LWP
1464 corresponding to PI. Return non-zero for success, zero for
1465 failure. */
c3f6f71d 1466
d3581e61 1467static int
fba45db2 1468proc_set_fpregs (procinfo *pi)
c906108c 1469{
c3f6f71d
JM
1470 gdb_fpregset_t *fpregs;
1471 int win;
1472
772cf8be
MK
1473 fpregs = proc_get_fpregs (pi);
1474 if (fpregs == NULL)
1475 return 0; /* proc_get_fpregs has already warned. */
c5aa993b 1476
772cf8be 1477 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c906108c 1478 {
c3f6f71d 1479 return 0;
c906108c 1480 }
c3f6f71d 1481 else
c906108c 1482 {
c3f6f71d 1483 struct {
37de36c6 1484 procfs_ctl_t cmd;
c3f6f71d
JM
1485 /* Use char array to avoid alignment issues. */
1486 char fpregs[sizeof (gdb_fpregset_t)];
1487 } arg;
1488
772cf8be 1489 arg.cmd = PCSFPREG;
c3f6f71d
JM
1490 memcpy (&arg.fpregs, fpregs, sizeof (arg.fpregs));
1491 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1492 }
c3f6f71d 1493
772cf8be 1494 /* Policy: writing the registers invalidates our cache. */
c3f6f71d
JM
1495 pi->fpregs_valid = 0;
1496 return win;
c906108c
SS
1497}
1498
77382aee
PA
1499/* Send a signal to the proc or lwp with the semantics of "kill()".
1500 Returns non-zero for success, zero for failure. */
c906108c 1501
d3581e61 1502static int
fba45db2 1503proc_kill (procinfo *pi, int signo)
c3f6f71d
JM
1504{
1505 int win;
c906108c 1506
77382aee
PA
1507 /* We might conceivably apply this operation to an LWP, and the
1508 LWP's ctl file descriptor might not be open. */
c906108c 1509
c3f6f71d
JM
1510 if (pi->ctl_fd == 0 &&
1511 open_procinfo_files (pi, FD_CTL) == 0)
1512 {
1513 return 0;
1514 }
1515 else
1516 {
37de36c6 1517 procfs_ctl_t cmd[2];
c906108c 1518
c3f6f71d
JM
1519 cmd[0] = PCKILL;
1520 cmd[1] = signo;
1521 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d 1522 }
c906108c 1523
c3f6f71d
JM
1524 return win;
1525}
c906108c 1526
77382aee
PA
1527/* Find the pid of the process that started this one. Returns the
1528 parent process pid, or zero. */
c906108c 1529
d3581e61 1530static int
fba45db2 1531proc_parent_pid (procinfo *pi)
c906108c 1532{
77382aee
PA
1533 /* We should never have to apply this operation to any procinfo
1534 except the one for the main process. If that ever changes for
1535 any reason, then take out the following clause and replace it
1536 with one that makes sure the ctl_fd is open. */
19958708 1537
c3f6f71d
JM
1538 if (pi->tid != 0)
1539 pi = find_procinfo_or_die (pi->pid, 0);
1540
1541 if (!pi->status_valid)
1542 if (!proc_get_status (pi))
1543 return 0;
c5aa993b 1544
c3f6f71d
JM
1545 return pi->prstatus.pr_ppid;
1546}
1547
9a043c1d
AC
1548/* Convert a target address (a.k.a. CORE_ADDR) into a host address
1549 (a.k.a void pointer)! */
1550
1551static void *
1552procfs_address_to_host_pointer (CORE_ADDR addr)
1553{
f5656ead 1554 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
9a043c1d
AC
1555 void *ptr;
1556
4e906f53 1557 gdb_assert (sizeof (ptr) == TYPE_LENGTH (ptr_type));
f5656ead 1558 gdbarch_address_to_pointer (target_gdbarch (), ptr_type,
0b62613e 1559 (gdb_byte *) &ptr, addr);
9a043c1d
AC
1560 return ptr;
1561}
1562
a0911fd0 1563static int
fba45db2 1564proc_set_watchpoint (procinfo *pi, CORE_ADDR addr, int len, int wflags)
c3f6f71d 1565{
c3f6f71d 1566 struct {
37de36c6 1567 procfs_ctl_t cmd;
c3f6f71d
JM
1568 char watch[sizeof (prwatch_t)];
1569 } arg;
73930d4d 1570 prwatch_t pwatch;
c3f6f71d 1571
9a043c1d
AC
1572 /* NOTE: cagney/2003-02-01: Even more horrible hack. Need to
1573 convert a target address into something that can be stored in a
1574 native data structure. */
73930d4d 1575 pwatch.pr_vaddr = (uintptr_t) procfs_address_to_host_pointer (addr);
73930d4d
KH
1576 pwatch.pr_size = len;
1577 pwatch.pr_wflags = wflags;
c3f6f71d 1578 arg.cmd = PCWATCH;
73930d4d 1579 memcpy (arg.watch, &pwatch, sizeof (prwatch_t));
c3f6f71d 1580 return (write (pi->ctl_fd, &arg, sizeof (arg)) == sizeof (arg));
c906108c
SS
1581}
1582
965b60ee 1583#if (defined(__i386__) || defined(__x86_64__)) && defined (sun)
c906108c 1584
c3f6f71d 1585#include <sys/sysi86.h>
c906108c 1586
77382aee
PA
1587/* The KEY is actually the value of the lower 16 bits of the GS
1588 register for the LWP that we're interested in. Returns the
1589 matching ssh struct (LDT entry). */
c906108c 1590
337c776f 1591static struct ssd *
fba45db2 1592proc_get_LDT_entry (procinfo *pi, int key)
c906108c 1593{
c3f6f71d 1594 static struct ssd *ldt_entry = NULL;
c3f6f71d
JM
1595 char pathname[MAX_PROC_NAME_SIZE];
1596 struct cleanup *old_chain = NULL;
1597 int fd;
1598
1599 /* Allocate space for one LDT entry.
1600 This alloc must persist, because we return a pointer to it. */
1601 if (ldt_entry == NULL)
8d749320 1602 ldt_entry = XNEW (struct ssd);
c3f6f71d
JM
1603
1604 /* Open the file descriptor for the LDT table. */
1605 sprintf (pathname, "/proc/%d/ldt", pi->pid);
4d1bcd09 1606 if ((fd = open_with_retry (pathname, O_RDONLY)) < 0)
c906108c 1607 {
c3f6f71d
JM
1608 proc_warn (pi, "proc_get_LDT_entry (open)", __LINE__);
1609 return NULL;
c906108c 1610 }
0df8b418 1611 /* Make sure it gets closed again! */
004527cb 1612 old_chain = make_cleanup_close (fd);
c906108c 1613
c3f6f71d
JM
1614 /* Now 'read' thru the table, find a match and return it. */
1615 while (read (fd, ldt_entry, sizeof (struct ssd)) == sizeof (struct ssd))
c906108c 1616 {
c3f6f71d
JM
1617 if (ldt_entry->sel == 0 &&
1618 ldt_entry->bo == 0 &&
1619 ldt_entry->acc1 == 0 &&
1620 ldt_entry->acc2 == 0)
1621 break; /* end of table */
0df8b418 1622 /* If key matches, return this entry. */
c3f6f71d 1623 if (ldt_entry->sel == key)
b196bc4c
RO
1624 {
1625 do_cleanups (old_chain);
1626 return ldt_entry;
1627 }
c906108c 1628 }
0df8b418 1629 /* Loop ended, match not found. */
b196bc4c 1630 do_cleanups (old_chain);
c3f6f71d 1631 return NULL;
c3f6f71d 1632}
c906108c 1633
77382aee 1634/* Returns the pointer to the LDT entry of PTID. */
965b60ee
JB
1635
1636struct ssd *
1637procfs_find_LDT_entry (ptid_t ptid)
1638{
1639 gdb_gregset_t *gregs;
1640 int key;
1641 procinfo *pi;
1642
0df8b418 1643 /* Find procinfo for the lwp. */
dfd4cc63 1644 if ((pi = find_procinfo (ptid_get_pid (ptid), ptid_get_lwp (ptid))) == NULL)
965b60ee 1645 {
0b62613e 1646 warning (_("procfs_find_LDT_entry: could not find procinfo for %d:%ld."),
dfd4cc63 1647 ptid_get_pid (ptid), ptid_get_lwp (ptid));
965b60ee
JB
1648 return NULL;
1649 }
0df8b418 1650 /* get its general registers. */
965b60ee
JB
1651 if ((gregs = proc_get_gregs (pi)) == NULL)
1652 {
0b62613e 1653 warning (_("procfs_find_LDT_entry: could not read gregs for %d:%ld."),
dfd4cc63 1654 ptid_get_pid (ptid), ptid_get_lwp (ptid));
965b60ee
JB
1655 return NULL;
1656 }
0df8b418 1657 /* Now extract the GS register's lower 16 bits. */
965b60ee
JB
1658 key = (*gregs)[GS] & 0xffff;
1659
0df8b418 1660 /* Find the matching entry and return it. */
965b60ee
JB
1661 return proc_get_LDT_entry (pi, key);
1662}
1663
1664#endif
c906108c 1665
c3f6f71d 1666/* =============== END, non-thread part of /proc "MODULE" =============== */
c906108c 1667
c3f6f71d 1668/* =================== Thread "MODULE" =================== */
c906108c 1669
44122162
RO
1670/* NOTE: you'll see more ifdefs and duplication of functions here,
1671 since there is a different way to do threads on every OS. */
c906108c 1672
44122162 1673/* Returns the number of threads for the process. */
c906108c 1674
d3581e61 1675static int
fba45db2 1676proc_get_nthreads (procinfo *pi)
c906108c 1677{
c3f6f71d
JM
1678 if (!pi->status_valid)
1679 if (!proc_get_status (pi))
1680 return 0;
c5aa993b 1681
44122162
RO
1682 /* Only works for the process procinfo, because the LWP procinfos do not
1683 get prstatus filled in. */
0df8b418 1684 if (pi->tid != 0) /* Find the parent process procinfo. */
c3f6f71d 1685 pi = find_procinfo_or_die (pi->pid, 0);
c3f6f71d 1686 return pi->prstatus.pr_nlwp;
c906108c
SS
1687}
1688
77382aee
PA
1689/* LWP version.
1690
1691 Return the ID of the thread that had an event of interest.
1692 (ie. the one that hit a breakpoint or other traced event). All
1693 other things being equal, this should be the ID of a thread that is
1694 currently executing. */
c3f6f71d 1695
d3581e61 1696static int
fba45db2 1697proc_get_current_thread (procinfo *pi)
c3f6f71d 1698{
77382aee
PA
1699 /* Note: this should be applied to the root procinfo for the
1700 process, not to the procinfo for an LWP. If applied to the
1701 procinfo for an LWP, it will simply return that LWP's ID. In
1702 that case, find the parent process procinfo. */
19958708 1703
c3f6f71d
JM
1704 if (pi->tid != 0)
1705 pi = find_procinfo_or_die (pi->pid, 0);
1706
1707 if (!pi->status_valid)
1708 if (!proc_get_status (pi))
1709 return 0;
1710
c3f6f71d 1711 return pi->prstatus.pr_lwp.pr_lwpid;
c3f6f71d
JM
1712}
1713
77382aee
PA
1714/* Discover the IDs of all the threads within the process, and create
1715 a procinfo for each of them (chained to the parent). This
1716 unfortunately requires a different method on every OS. Returns
1717 non-zero for success, zero for failure. */
c906108c 1718
a0911fd0 1719static int
fba45db2 1720proc_delete_dead_threads (procinfo *parent, procinfo *thread, void *ignore)
c3f6f71d
JM
1721{
1722 if (thread && parent) /* sanity */
c906108c 1723 {
c3f6f71d
JM
1724 thread->status_valid = 0;
1725 if (!proc_get_status (thread))
1726 destroy_one_procinfo (&parent->thread_list, thread);
1727 }
1728 return 0; /* keep iterating */
1729}
c5aa993b 1730
004527cb
AC
1731static void
1732do_closedir_cleanup (void *dir)
1733{
b196bc4c 1734 closedir ((DIR *) dir);
004527cb
AC
1735}
1736
d3581e61 1737static int
fba45db2 1738proc_update_threads (procinfo *pi)
c3f6f71d
JM
1739{
1740 char pathname[MAX_PROC_NAME_SIZE + 16];
1741 struct dirent *direntry;
1742 struct cleanup *old_chain = NULL;
1743 procinfo *thread;
1744 DIR *dirp;
1745 int lwpid;
1746
77382aee
PA
1747 /* We should never have to apply this operation to any procinfo
1748 except the one for the main process. If that ever changes for
1749 any reason, then take out the following clause and replace it
1750 with one that makes sure the ctl_fd is open. */
19958708 1751
c3f6f71d
JM
1752 if (pi->tid != 0)
1753 pi = find_procinfo_or_die (pi->pid, 0);
1754
1755 proc_iterate_over_threads (pi, proc_delete_dead_threads, NULL);
1756
05b4bd79
PA
1757 /* Note: this brute-force method was originally devised for Unixware
1758 (support removed since), and will also work on Solaris 2.6 and
1759 2.7. The original comment mentioned the existence of a much
1760 simpler and more elegant way to do this on Solaris, but didn't
1761 point out what that was. */
c3f6f71d
JM
1762
1763 strcpy (pathname, pi->pathname);
1764 strcat (pathname, "/lwp");
1765 if ((dirp = opendir (pathname)) == NULL)
1766 proc_error (pi, "update_threads, opendir", __LINE__);
1767
004527cb 1768 old_chain = make_cleanup (do_closedir_cleanup, dirp);
c3f6f71d
JM
1769 while ((direntry = readdir (dirp)) != NULL)
1770 if (direntry->d_name[0] != '.') /* skip '.' and '..' */
1771 {
1772 lwpid = atoi (&direntry->d_name[0]);
1773 if ((thread = create_procinfo (pi->pid, lwpid)) == NULL)
1774 proc_error (pi, "update_threads, create_procinfo", __LINE__);
1775 }
1776 pi->threads_valid = 1;
1777 do_cleanups (old_chain);
1778 return 1;
1779}
c906108c 1780
77382aee
PA
1781/* Given a pointer to a function, call that function once for each lwp
1782 in the procinfo list, until the function returns non-zero, in which
1783 event return the value returned by the function.
1784
1785 Note: this function does NOT call update_threads. If you want to
1786 discover new threads first, you must call that function explicitly.
1787 This function just makes a quick pass over the currently-known
1788 procinfos.
1789
1790 PI is the parent process procinfo. FUNC is the per-thread
1791 function. PTR is an opaque parameter for function. Returns the
1792 first non-zero return value from the callee, or zero. */
c3f6f71d 1793
d3581e61 1794static int
d0849a9a
KB
1795proc_iterate_over_threads (procinfo *pi,
1796 int (*func) (procinfo *, procinfo *, void *),
1797 void *ptr)
c906108c 1798{
c3f6f71d
JM
1799 procinfo *thread, *next;
1800 int retval = 0;
c906108c 1801
77382aee
PA
1802 /* We should never have to apply this operation to any procinfo
1803 except the one for the main process. If that ever changes for
1804 any reason, then take out the following clause and replace it
1805 with one that makes sure the ctl_fd is open. */
19958708 1806
c3f6f71d
JM
1807 if (pi->tid != 0)
1808 pi = find_procinfo_or_die (pi->pid, 0);
1809
1810 for (thread = pi->thread_list; thread != NULL; thread = next)
c906108c 1811 {
0df8b418 1812 next = thread->next; /* In case thread is destroyed. */
c3f6f71d
JM
1813 if ((retval = (*func) (pi, thread, ptr)) != 0)
1814 break;
c906108c 1815 }
c3f6f71d
JM
1816
1817 return retval;
c906108c
SS
1818}
1819
c3f6f71d
JM
1820/* =================== END, Thread "MODULE" =================== */
1821
1822/* =================== END, /proc "MODULE" =================== */
1823
1824/* =================== GDB "MODULE" =================== */
1825
77382aee
PA
1826/* Here are all of the gdb target vector functions and their
1827 friends. */
c3f6f71d 1828
39f77062 1829static ptid_t do_attach (ptid_t ptid);
6bd6f3b6 1830static void do_detach ();
9185ddce 1831static void proc_trace_syscalls_1 (procinfo *pi, int syscallnum,
77382aee 1832 int entry_or_exit, int mode, int from_tty);
9185ddce 1833
77382aee
PA
1834/* Sets up the inferior to be debugged. Registers to trace signals,
1835 hardware faults, and syscalls. Note: does not set RLC flag: caller
1836 may want to customize that. Returns zero for success (note!
1837 unlike most functions in this module); on failure, returns the LINE
1838 NUMBER where it failed! */
c3f6f71d
JM
1839
1840static int
fba45db2 1841procfs_debug_inferior (procinfo *pi)
c906108c 1842{
c3f6f71d 1843 fltset_t traced_faults;
44122162 1844 sigset_t traced_signals;
37de36c6
KB
1845 sysset_t *traced_syscall_entries;
1846 sysset_t *traced_syscall_exits;
1847 int status;
c906108c 1848
0df8b418
MS
1849 /* Register to trace hardware faults in the child. */
1850 prfillset (&traced_faults); /* trace all faults... */
44122162 1851 prdelset (&traced_faults, FLTPAGE); /* except page fault. */
c3f6f71d
JM
1852 if (!proc_set_traced_faults (pi, &traced_faults))
1853 return __LINE__;
c906108c 1854
2455069d
UW
1855 /* Initially, register to trace all signals in the child. */
1856 prfillset (&traced_signals);
1857 if (!proc_set_traced_signals (pi, &traced_signals))
c3f6f71d
JM
1858 return __LINE__;
1859
37de36c6 1860
c3f6f71d 1861 /* Register to trace the 'exit' system call (on entry). */
37de36c6 1862 traced_syscall_entries = sysset_t_alloc (pi);
44122162
RO
1863 premptyset (traced_syscall_entries);
1864 praddset (traced_syscall_entries, SYS_exit);
1865 praddset (traced_syscall_entries, SYS_lwp_exit);
c906108c 1866
37de36c6
KB
1867 status = proc_set_traced_sysentry (pi, traced_syscall_entries);
1868 xfree (traced_syscall_entries);
1869 if (!status)
c3f6f71d
JM
1870 return __LINE__;
1871
44122162 1872 /* Method for tracing exec syscalls. */
c3f6f71d
JM
1873 /* GW: Rationale...
1874 Not all systems with /proc have all the exec* syscalls with the same
1875 names. On the SGI, for example, there is no SYS_exec, but there
0df8b418 1876 *is* a SYS_execv. So, we try to account for that. */
c3f6f71d 1877
37de36c6 1878 traced_syscall_exits = sysset_t_alloc (pi);
44122162 1879 premptyset (traced_syscall_exits);
c3f6f71d 1880#ifdef SYS_exec
44122162 1881 praddset (traced_syscall_exits, SYS_exec);
37de36c6 1882#endif
44122162
RO
1883 praddset (traced_syscall_exits, SYS_execve);
1884 praddset (traced_syscall_exits, SYS_lwp_create);
1885 praddset (traced_syscall_exits, SYS_lwp_exit);
c906108c 1886
37de36c6
KB
1887 status = proc_set_traced_sysexit (pi, traced_syscall_exits);
1888 xfree (traced_syscall_exits);
1889 if (!status)
c3f6f71d
JM
1890 return __LINE__;
1891
c3f6f71d 1892 return 0;
c906108c
SS
1893}
1894
19958708 1895static void
c0939df1 1896procfs_attach (struct target_ops *ops, const char *args, int from_tty)
c906108c 1897{
c3f6f71d
JM
1898 char *exec_file;
1899 int pid;
1900
74164c56 1901 pid = parse_pid_to_attach (args);
c3f6f71d 1902
c3f6f71d 1903 if (pid == getpid ())
8a3fe4f8 1904 error (_("Attaching GDB to itself is not a good idea..."));
c906108c 1905
c3f6f71d 1906 if (from_tty)
c906108c 1907 {
c3f6f71d
JM
1908 exec_file = get_exec_file (0);
1909
1910 if (exec_file)
a3f17187 1911 printf_filtered (_("Attaching to program `%s', %s\n"),
39f77062 1912 exec_file, target_pid_to_str (pid_to_ptid (pid)));
c3f6f71d 1913 else
a3f17187 1914 printf_filtered (_("Attaching to %s\n"),
77382aee 1915 target_pid_to_str (pid_to_ptid (pid)));
c3f6f71d
JM
1916
1917 fflush (stdout);
c906108c 1918 }
39f77062 1919 inferior_ptid = do_attach (pid_to_ptid (pid));
6a3cb8e8
PA
1920 if (!target_is_pushed (ops))
1921 push_target (ops);
c3f6f71d
JM
1922}
1923
19958708 1924static void
6e1e1966 1925procfs_detach (struct target_ops *ops, inferior *inf, int from_tty)
c3f6f71d 1926{
dfd4cc63 1927 int pid = ptid_get_pid (inferior_ptid);
cc377e6b 1928
c3f6f71d 1929 if (from_tty)
c906108c 1930 {
995816ba 1931 const char *exec_file;
cc377e6b 1932
c3f6f71d 1933 exec_file = get_exec_file (0);
cc377e6b 1934 if (exec_file == NULL)
c3f6f71d 1935 exec_file = "";
cc377e6b 1936
a3f17187 1937 printf_filtered (_("Detaching from program: %s, %s\n"), exec_file,
cc377e6b
MK
1938 target_pid_to_str (pid_to_ptid (pid)));
1939 gdb_flush (gdb_stdout);
c906108c 1940 }
19958708 1941
6bd6f3b6 1942 do_detach ();
cc377e6b 1943
39f77062 1944 inferior_ptid = null_ptid;
7f9f62ba 1945 detach_inferior (pid);
6a3cb8e8 1946 inf_child_maybe_unpush_target (ops);
c906108c
SS
1947}
1948
39f77062
KB
1949static ptid_t
1950do_attach (ptid_t ptid)
c906108c 1951{
c3f6f71d 1952 procinfo *pi;
181e7f93 1953 struct inferior *inf;
c3f6f71d 1954 int fail;
2689673f 1955 int lwpid;
c3f6f71d 1956
dfd4cc63 1957 if ((pi = create_procinfo (ptid_get_pid (ptid), 0)) == NULL)
8a3fe4f8 1958 perror (_("procfs: out of memory in 'attach'"));
c3f6f71d
JM
1959
1960 if (!open_procinfo_files (pi, FD_CTL))
1961 {
1962 fprintf_filtered (gdb_stderr, "procfs:%d -- ", __LINE__);
19958708 1963 sprintf (errmsg, "do_attach: couldn't open /proc file for process %d",
dfd4cc63 1964 ptid_get_pid (ptid));
c3f6f71d
JM
1965 dead_procinfo (pi, errmsg, NOKILL);
1966 }
c906108c 1967
c3f6f71d
JM
1968 /* Stop the process (if it isn't already stopped). */
1969 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
c906108c 1970 {
c3f6f71d
JM
1971 pi->was_stopped = 1;
1972 proc_prettyprint_why (proc_why (pi), proc_what (pi), 1);
c906108c
SS
1973 }
1974 else
1975 {
c3f6f71d
JM
1976 pi->was_stopped = 0;
1977 /* Set the process to run again when we close it. */
1978 if (!proc_set_run_on_last_close (pi))
1979 dead_procinfo (pi, "do_attach: couldn't set RLC.", NOKILL);
1980
0df8b418 1981 /* Now stop the process. */
c3f6f71d
JM
1982 if (!proc_stop_process (pi))
1983 dead_procinfo (pi, "do_attach: couldn't stop the process.", NOKILL);
1984 pi->ignore_next_sigstop = 1;
c906108c 1985 }
c3f6f71d
JM
1986 /* Save some of the /proc state to be restored if we detach. */
1987 if (!proc_get_traced_faults (pi, &pi->saved_fltset))
1988 dead_procinfo (pi, "do_attach: couldn't save traced faults.", NOKILL);
1989 if (!proc_get_traced_signals (pi, &pi->saved_sigset))
1990 dead_procinfo (pi, "do_attach: couldn't save traced signals.", NOKILL);
37de36c6 1991 if (!proc_get_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d
JM
1992 dead_procinfo (pi, "do_attach: couldn't save traced syscall entries.",
1993 NOKILL);
37de36c6 1994 if (!proc_get_traced_sysexit (pi, pi->saved_exitset))
19958708 1995 dead_procinfo (pi, "do_attach: couldn't save traced syscall exits.",
c3f6f71d
JM
1996 NOKILL);
1997 if (!proc_get_held_signals (pi, &pi->saved_sighold))
1998 dead_procinfo (pi, "do_attach: couldn't save held signals.", NOKILL);
1999
2000 if ((fail = procfs_debug_inferior (pi)) != 0)
2001 dead_procinfo (pi, "do_attach: failed in procfs_debug_inferior", NOKILL);
2002
6c95b8df
PA
2003 inf = current_inferior ();
2004 inferior_appeared (inf, pi->pid);
c3f6f71d 2005 /* Let GDB know that the inferior was attached. */
181e7f93 2006 inf->attach_flag = 1;
2689673f
PA
2007
2008 /* Create a procinfo for the current lwp. */
2009 lwpid = proc_get_current_thread (pi);
2010 create_procinfo (pi->pid, lwpid);
2011
2012 /* Add it to gdb's thread list. */
dfd4cc63 2013 ptid = ptid_build (pi->pid, lwpid, 0);
2689673f
PA
2014 add_thread (ptid);
2015
2016 return ptid;
c906108c
SS
2017}
2018
2019static void
6bd6f3b6 2020do_detach ()
c906108c 2021{
c3f6f71d 2022 procinfo *pi;
c906108c 2023
0df8b418 2024 /* Find procinfo for the main process. */
dfd4cc63
LM
2025 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid),
2026 0); /* FIXME: threads */
c5aa993b 2027
c3f6f71d
JM
2028 if (!proc_set_traced_signals (pi, &pi->saved_sigset))
2029 proc_warn (pi, "do_detach, set_traced_signal", __LINE__);
c906108c 2030
c3f6f71d
JM
2031 if (!proc_set_traced_faults (pi, &pi->saved_fltset))
2032 proc_warn (pi, "do_detach, set_traced_faults", __LINE__);
2033
37de36c6 2034 if (!proc_set_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d
JM
2035 proc_warn (pi, "do_detach, set_traced_sysentry", __LINE__);
2036
37de36c6 2037 if (!proc_set_traced_sysexit (pi, pi->saved_exitset))
c3f6f71d
JM
2038 proc_warn (pi, "do_detach, set_traced_sysexit", __LINE__);
2039
2040 if (!proc_set_held_signals (pi, &pi->saved_sighold))
2041 proc_warn (pi, "do_detach, set_held_signals", __LINE__);
2042
6bd6f3b6
SM
2043 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
2044 if (!(pi->was_stopped)
2045 || query (_("Was stopped when attached, make it runnable again? ")))
c3f6f71d
JM
2046 {
2047 /* Clear any pending signal. */
2048 if (!proc_clear_current_fault (pi))
2049 proc_warn (pi, "do_detach, clear_current_fault", __LINE__);
2050
6bd6f3b6 2051 if (!proc_clear_current_signal (pi))
1a303dec
MS
2052 proc_warn (pi, "do_detach, clear_current_signal", __LINE__);
2053
c3f6f71d
JM
2054 if (!proc_set_run_on_last_close (pi))
2055 proc_warn (pi, "do_detach, set_rlc", __LINE__);
2056 }
2057
c3f6f71d 2058 destroy_procinfo (pi);
c906108c
SS
2059}
2060
772cf8be
MK
2061/* Fetch register REGNUM from the inferior. If REGNUM is -1, do this
2062 for all registers.
2063
2064 ??? Is the following note still relevant? We can't get individual
2065 registers with the PT_GETREGS ptrace(2) request either, yet we
2066 don't bother with caching at all in that case.
2067
2068 NOTE: Since the /proc interface cannot give us individual
2069 registers, we pay no attention to REGNUM, and just fetch them all.
2070 This results in the possibility that we will do unnecessarily many
2071 fetches, since we may be called repeatedly for individual
2072 registers. So we cache the results, and mark the cache invalid
2073 when the process is resumed. */
c3f6f71d 2074
c906108c 2075static void
28439f5e
PA
2076procfs_fetch_registers (struct target_ops *ops,
2077 struct regcache *regcache, int regnum)
c906108c 2078{
772cf8be
MK
2079 gdb_gregset_t *gregs;
2080 procinfo *pi;
bcc0c096
SM
2081 ptid_t ptid = regcache_get_ptid (regcache);
2082 int pid = ptid_get_pid (ptid);
2083 int tid = ptid_get_lwp (ptid);
ac7936df 2084 struct gdbarch *gdbarch = regcache->arch ();
c3f6f71d 2085
2689673f 2086 pi = find_procinfo_or_die (pid, tid);
c3f6f71d
JM
2087
2088 if (pi == NULL)
8a3fe4f8 2089 error (_("procfs: fetch_registers failed to find procinfo for %s"),
bcc0c096 2090 target_pid_to_str (ptid));
c3f6f71d 2091
772cf8be
MK
2092 gregs = proc_get_gregs (pi);
2093 if (gregs == NULL)
c3f6f71d
JM
2094 proc_error (pi, "fetch_registers, get_gregs", __LINE__);
2095
56be3814 2096 supply_gregset (regcache, (const gdb_gregset_t *) gregs);
c3f6f71d 2097
40a6adc1 2098 if (gdbarch_fp0_regnum (gdbarch) >= 0) /* Do we have an FPU? */
60054393 2099 {
772cf8be
MK
2100 gdb_fpregset_t *fpregs;
2101
40a6adc1
MD
2102 if ((regnum >= 0 && regnum < gdbarch_fp0_regnum (gdbarch))
2103 || regnum == gdbarch_pc_regnum (gdbarch)
2104 || regnum == gdbarch_sp_regnum (gdbarch))
772cf8be 2105 return; /* Not a floating point register. */
c5aa993b 2106
772cf8be
MK
2107 fpregs = proc_get_fpregs (pi);
2108 if (fpregs == NULL)
60054393 2109 proc_error (pi, "fetch_registers, get_fpregs", __LINE__);
c906108c 2110
56be3814 2111 supply_fpregset (regcache, (const gdb_fpregset_t *) fpregs);
60054393 2112 }
c906108c
SS
2113}
2114
772cf8be
MK
2115/* Store register REGNUM back into the inferior. If REGNUM is -1, do
2116 this for all registers.
2117
2118 NOTE: Since the /proc interface will not read individual registers,
2119 we will cache these requests until the process is resumed, and only
2120 then write them back to the inferior process.
77382aee 2121
772cf8be
MK
2122 FIXME: is that a really bad idea? Have to think about cases where
2123 writing one register might affect the value of others, etc. */
c906108c 2124
c3f6f71d 2125static void
28439f5e
PA
2126procfs_store_registers (struct target_ops *ops,
2127 struct regcache *regcache, int regnum)
c3f6f71d 2128{
772cf8be
MK
2129 gdb_gregset_t *gregs;
2130 procinfo *pi;
bcc0c096
SM
2131 ptid_t ptid = regcache_get_ptid (regcache);
2132 int pid = ptid_get_pid (ptid);
2133 int tid = ptid_get_lwp (ptid);
ac7936df 2134 struct gdbarch *gdbarch = regcache->arch ();
c3f6f71d 2135
2689673f 2136 pi = find_procinfo_or_die (pid, tid);
c3f6f71d
JM
2137
2138 if (pi == NULL)
8a3fe4f8 2139 error (_("procfs: store_registers: failed to find procinfo for %s"),
bcc0c096 2140 target_pid_to_str (ptid));
c906108c 2141
772cf8be
MK
2142 gregs = proc_get_gregs (pi);
2143 if (gregs == NULL)
c3f6f71d 2144 proc_error (pi, "store_registers, get_gregs", __LINE__);
c906108c 2145
56be3814 2146 fill_gregset (regcache, gregs, regnum);
c3f6f71d
JM
2147 if (!proc_set_gregs (pi))
2148 proc_error (pi, "store_registers, set_gregs", __LINE__);
c906108c 2149
40a6adc1 2150 if (gdbarch_fp0_regnum (gdbarch) >= 0) /* Do we have an FPU? */
60054393 2151 {
772cf8be
MK
2152 gdb_fpregset_t *fpregs;
2153
40a6adc1
MD
2154 if ((regnum >= 0 && regnum < gdbarch_fp0_regnum (gdbarch))
2155 || regnum == gdbarch_pc_regnum (gdbarch)
2156 || regnum == gdbarch_sp_regnum (gdbarch))
772cf8be 2157 return; /* Not a floating point register. */
60054393 2158
772cf8be
MK
2159 fpregs = proc_get_fpregs (pi);
2160 if (fpregs == NULL)
60054393
MS
2161 proc_error (pi, "store_registers, get_fpregs", __LINE__);
2162
56be3814 2163 fill_fpregset (regcache, fpregs, regnum);
60054393
MS
2164 if (!proc_set_fpregs (pi))
2165 proc_error (pi, "store_registers, set_fpregs", __LINE__);
2166 }
c3f6f71d 2167}
c906108c 2168
37de36c6
KB
2169static int
2170syscall_is_lwp_exit (procinfo *pi, int scall)
2171{
37de36c6
KB
2172 if (scall == SYS_lwp_exit)
2173 return 1;
37de36c6
KB
2174 return 0;
2175}
2176
2177static int
2178syscall_is_exit (procinfo *pi, int scall)
2179{
37de36c6
KB
2180 if (scall == SYS_exit)
2181 return 1;
37de36c6
KB
2182 return 0;
2183}
2184
2185static int
2186syscall_is_exec (procinfo *pi, int scall)
2187{
2188#ifdef SYS_exec
2189 if (scall == SYS_exec)
2190 return 1;
2191#endif
37de36c6
KB
2192 if (scall == SYS_execve)
2193 return 1;
37de36c6
KB
2194 return 0;
2195}
2196
2197static int
2198syscall_is_lwp_create (procinfo *pi, int scall)
2199{
37de36c6
KB
2200 if (scall == SYS_lwp_create)
2201 return 1;
37de36c6
KB
2202 return 0;
2203}
2204
77382aee
PA
2205/* Retrieve the next stop event from the child process. If child has
2206 not stopped yet, wait for it to stop. Translate /proc eventcodes
2207 (or possibly wait eventcodes) into gdb internal event codes.
2208 Returns the id of process (and possibly thread) that incurred the
2209 event. Event codes are returned through a pointer parameter. */
c906108c 2210
39f77062 2211static ptid_t
117de6a9 2212procfs_wait (struct target_ops *ops,
4fcbb494 2213 ptid_t ptid, struct target_waitstatus *status, int options)
c906108c 2214{
0df8b418 2215 /* First cut: loosely based on original version 2.1. */
c3f6f71d 2216 procinfo *pi;
39f77062
KB
2217 int wstat;
2218 int temp_tid;
2219 ptid_t retval, temp_ptid;
c3f6f71d
JM
2220 int why, what, flags;
2221 int retry = 0;
c906108c 2222
c3f6f71d 2223wait_again:
c906108c 2224
c3f6f71d
JM
2225 retry++;
2226 wstat = 0;
39f77062 2227 retval = pid_to_ptid (-1);
c906108c 2228
0df8b418 2229 /* Find procinfo for main process. */
dfd4cc63 2230 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
c3f6f71d 2231 if (pi)
c906108c 2232 {
0df8b418 2233 /* We must assume that the status is stale now... */
c3f6f71d
JM
2234 pi->status_valid = 0;
2235 pi->gregs_valid = 0;
2236 pi->fpregs_valid = 0;
2237
0df8b418 2238#if 0 /* just try this out... */
c3f6f71d
JM
2239 flags = proc_flags (pi);
2240 why = proc_why (pi);
2241 if ((flags & PR_STOPPED) && (why == PR_REQUESTED))
0df8b418 2242 pi->status_valid = 0; /* re-read again, IMMEDIATELY... */
c3f6f71d
JM
2243#endif
2244 /* If child is not stopped, wait for it to stop. */
2245 if (!(proc_flags (pi) & (PR_STOPPED | PR_ISTOP)) &&
2246 !proc_wait_for_stop (pi))
c906108c 2247 {
0df8b418 2248 /* wait_for_stop failed: has the child terminated? */
c3f6f71d 2249 if (errno == ENOENT)
c906108c 2250 {
39f77062
KB
2251 int wait_retval;
2252
0df8b418
MS
2253 /* /proc file not found; presumably child has terminated. */
2254 wait_retval = wait (&wstat); /* "wait" for the child's exit. */
c3f6f71d 2255
dfd4cc63
LM
2256 /* Wrong child? */
2257 if (wait_retval != ptid_get_pid (inferior_ptid))
3e43a32a
MS
2258 error (_("procfs: couldn't stop "
2259 "process %d: wait returned %d."),
dfd4cc63 2260 ptid_get_pid (inferior_ptid), wait_retval);
c3f6f71d 2261 /* FIXME: might I not just use waitpid?
0df8b418 2262 Or try find_procinfo to see if I know about this child? */
39f77062 2263 retval = pid_to_ptid (wait_retval);
c906108c 2264 }
d1566ff5
FN
2265 else if (errno == EINTR)
2266 goto wait_again;
c3f6f71d 2267 else
c906108c 2268 {
0df8b418 2269 /* Unknown error from wait_for_stop. */
c3f6f71d 2270 proc_error (pi, "target_wait (wait_for_stop)", __LINE__);
c906108c 2271 }
c3f6f71d
JM
2272 }
2273 else
2274 {
2275 /* This long block is reached if either:
2276 a) the child was already stopped, or
2277 b) we successfully waited for the child with wait_for_stop.
2278 This block will analyze the /proc status, and translate it
2279 into a waitstatus for GDB.
2280
2281 If we actually had to call wait because the /proc file
19958708 2282 is gone (child terminated), then we skip this block,
c3f6f71d
JM
2283 because we already have a waitstatus. */
2284
2285 flags = proc_flags (pi);
2286 why = proc_why (pi);
2287 what = proc_what (pi);
2288
c3f6f71d 2289 if (flags & (PR_STOPPED | PR_ISTOP))
c906108c 2290 {
c3f6f71d
JM
2291 /* If it's running async (for single_thread control),
2292 set it back to normal again. */
2293 if (flags & PR_ASYNC)
2294 if (!proc_unset_async (pi))
2295 proc_error (pi, "target_wait, unset_async", __LINE__);
c3f6f71d
JM
2296
2297 if (info_verbose)
2298 proc_prettyprint_why (why, what, 1);
2299
2300 /* The 'pid' we will return to GDB is composed of
2301 the process ID plus the lwp ID. */
dfd4cc63 2302 retval = ptid_build (pi->pid, proc_get_current_thread (pi), 0);
c3f6f71d
JM
2303
2304 switch (why) {
2305 case PR_SIGNALLED:
2306 wstat = (what << 8) | 0177;
2307 break;
2308 case PR_SYSENTRY:
37de36c6 2309 if (syscall_is_lwp_exit (pi, what))
c3f6f71d 2310 {
17faa917
DJ
2311 if (print_thread_events)
2312 printf_unfiltered (_("[%s exited]\n"),
2313 target_pid_to_str (retval));
37de36c6
KB
2314 delete_thread (retval);
2315 status->kind = TARGET_WAITKIND_SPURIOUS;
2316 return retval;
2317 }
2318 else if (syscall_is_exit (pi, what))
2319 {
181e7f93
PA
2320 struct inferior *inf;
2321
0df8b418 2322 /* Handle SYS_exit call only. */
37de36c6 2323 /* Stopped at entry to SYS_exit.
19958708 2324 Make it runnable, resume it, then use
37de36c6 2325 the wait system call to get its exit code.
19958708 2326 Proc_run_process always clears the current
37de36c6
KB
2327 fault and signal.
2328 Then return its exit status. */
2329 pi->status_valid = 0;
2330 wstat = 0;
19958708 2331 /* FIXME: what we should do is return
37de36c6
KB
2332 TARGET_WAITKIND_SPURIOUS. */
2333 if (!proc_run_process (pi, 0, 0))
2334 proc_error (pi, "target_wait, run_process", __LINE__);
181e7f93
PA
2335
2336 inf = find_inferior_pid (pi->pid);
2337 if (inf->attach_flag)
c3f6f71d 2338 {
19958708 2339 /* Don't call wait: simulate waiting for exit,
37de36c6
KB
2340 return a "success" exit code. Bogus: what if
2341 it returns something else? */
2342 wstat = 0;
39f77062 2343 retval = inferior_ptid; /* ? ? ? */
37de36c6
KB
2344 }
2345 else
2346 {
2347 int temp = wait (&wstat);
2348
2349 /* FIXME: shouldn't I make sure I get the right
2350 event from the right process? If (for
2351 instance) I have killed an earlier inferior
2352 process but failed to clean up after it
2353 somehow, I could get its termination event
2354 here. */
2355
0df8b418
MS
2356 /* If wait returns -1, that's what we return
2357 to GDB. */
37de36c6 2358 if (temp < 0)
39f77062 2359 retval = pid_to_ptid (temp);
c3f6f71d 2360 }
c3f6f71d 2361 }
37de36c6
KB
2362 else
2363 {
a3f17187 2364 printf_filtered (_("procfs: trapped on entry to "));
37de36c6
KB
2365 proc_prettyprint_syscall (proc_what (pi), 0);
2366 printf_filtered ("\n");
44122162
RO
2367
2368 long i, nsysargs, *sysargs;
2369
2370 if ((nsysargs = proc_nsysarg (pi)) > 0 &&
2371 (sysargs = proc_sysargs (pi)) != NULL)
2372 {
2373 printf_filtered (_("%ld syscall arguments:\n"),
2374 nsysargs);
2375 for (i = 0; i < nsysargs; i++)
2376 printf_filtered ("#%ld: 0x%08lx\n",
2377 i, sysargs[i]);
2378 }
2379
37de36c6
KB
2380 if (status)
2381 {
0df8b418
MS
2382 /* How to exit gracefully, returning "unknown
2383 event". */
37de36c6 2384 status->kind = TARGET_WAITKIND_SPURIOUS;
39f77062 2385 return inferior_ptid;
37de36c6
KB
2386 }
2387 else
2388 {
2389 /* How to keep going without returning to wfi: */
049a8570 2390 target_continue_no_signal (ptid);
37de36c6
KB
2391 goto wait_again;
2392 }
2393 }
2394 break;
2395 case PR_SYSEXIT:
2396 if (syscall_is_exec (pi, what))
c3f6f71d 2397 {
37de36c6
KB
2398 /* Hopefully this is our own "fork-child" execing
2399 the real child. Hoax this event into a trap, and
2400 GDB will see the child about to execute its start
0df8b418 2401 address. */
37de36c6
KB
2402 wstat = (SIGTRAP << 8) | 0177;
2403 }
2404 else if (syscall_is_lwp_create (pi, what))
2405 {
77382aee
PA
2406 /* This syscall is somewhat like fork/exec. We
2407 will get the event twice: once for the parent
2408 LWP, and once for the child. We should already
2409 know about the parent LWP, but the child will
2410 be new to us. So, whenever we get this event,
2411 if it represents a new thread, simply add the
2412 thread to the list. */
c3f6f71d 2413
37de36c6 2414 /* If not in procinfo list, add it. */
39f77062
KB
2415 temp_tid = proc_get_current_thread (pi);
2416 if (!find_procinfo (pi->pid, temp_tid))
2417 create_procinfo (pi->pid, temp_tid);
37de36c6 2418
dfd4cc63 2419 temp_ptid = ptid_build (pi->pid, temp_tid, 0);
37de36c6 2420 /* If not in GDB's thread list, add it. */
39f77062 2421 if (!in_thread_list (temp_ptid))
93815fbf
VP
2422 add_thread (temp_ptid);
2423
0df8b418 2424 /* Return to WFI, but tell it to immediately resume. */
37de36c6 2425 status->kind = TARGET_WAITKIND_SPURIOUS;
39f77062 2426 return inferior_ptid;
37de36c6
KB
2427 }
2428 else if (syscall_is_lwp_exit (pi, what))
2429 {
17faa917
DJ
2430 if (print_thread_events)
2431 printf_unfiltered (_("[%s exited]\n"),
2432 target_pid_to_str (retval));
37de36c6
KB
2433 delete_thread (retval);
2434 status->kind = TARGET_WAITKIND_SPURIOUS;
2435 return retval;
c3f6f71d 2436 }
37de36c6
KB
2437 else if (0)
2438 {
2439 /* FIXME: Do we need to handle SYS_sproc,
2440 SYS_fork, or SYS_vfork here? The old procfs
2441 seemed to use this event to handle threads on
2442 older (non-LWP) systems, where I'm assuming
19958708 2443 that threads were actually separate processes.
37de36c6
KB
2444 Irix, maybe? Anyway, low priority for now. */
2445 }
2446 else
2447 {
a3f17187 2448 printf_filtered (_("procfs: trapped on exit from "));
37de36c6
KB
2449 proc_prettyprint_syscall (proc_what (pi), 0);
2450 printf_filtered ("\n");
44122162
RO
2451
2452 long i, nsysargs, *sysargs;
2453
2454 if ((nsysargs = proc_nsysarg (pi)) > 0 &&
2455 (sysargs = proc_sysargs (pi)) != NULL)
2456 {
2457 printf_filtered (_("%ld syscall arguments:\n"),
2458 nsysargs);
2459 for (i = 0; i < nsysargs; i++)
2460 printf_filtered ("#%ld: 0x%08lx\n",
2461 i, sysargs[i]);
2462 }
2463
37de36c6 2464 status->kind = TARGET_WAITKIND_SPURIOUS;
39f77062 2465 return inferior_ptid;
37de36c6 2466 }
c3f6f71d
JM
2467 break;
2468 case PR_REQUESTED:
2469#if 0 /* FIXME */
2470 wstat = (SIGSTOP << 8) | 0177;
2471 break;
2472#else
2473 if (retry < 5)
2474 {
a3f17187 2475 printf_filtered (_("Retry #%d:\n"), retry);
c3f6f71d
JM
2476 pi->status_valid = 0;
2477 goto wait_again;
2478 }
2479 else
2480 {
2481 /* If not in procinfo list, add it. */
39f77062
KB
2482 temp_tid = proc_get_current_thread (pi);
2483 if (!find_procinfo (pi->pid, temp_tid))
2484 create_procinfo (pi->pid, temp_tid);
c3f6f71d
JM
2485
2486 /* If not in GDB's thread list, add it. */
dfd4cc63 2487 temp_ptid = ptid_build (pi->pid, temp_tid, 0);
39f77062 2488 if (!in_thread_list (temp_ptid))
93815fbf 2489 add_thread (temp_ptid);
c3f6f71d
JM
2490
2491 status->kind = TARGET_WAITKIND_STOPPED;
b196bc4c 2492 status->value.sig = GDB_SIGNAL_0;
c3f6f71d
JM
2493 return retval;
2494 }
2495#endif
2496 case PR_JOBCONTROL:
2497 wstat = (what << 8) | 0177;
2498 break;
2499 case PR_FAULTED:
7af6341f 2500 switch (what) {
c3f6f71d
JM
2501 case FLTWATCH:
2502 wstat = (SIGTRAP << 8) | 0177;
2503 break;
0df8b418 2504 /* FIXME: use si_signo where possible. */
c3f6f71d 2505 case FLTPRIV:
c3f6f71d 2506 case FLTILL:
c3f6f71d
JM
2507 wstat = (SIGILL << 8) | 0177;
2508 break;
2509 case FLTBPT:
c3f6f71d 2510 case FLTTRACE:
c3f6f71d
JM
2511 wstat = (SIGTRAP << 8) | 0177;
2512 break;
2513 case FLTSTACK:
2514 case FLTACCESS:
c3f6f71d 2515 case FLTBOUNDS:
c3f6f71d
JM
2516 wstat = (SIGSEGV << 8) | 0177;
2517 break;
2518 case FLTIOVF:
2519 case FLTIZDIV:
c3f6f71d 2520 case FLTFPE:
c3f6f71d
JM
2521 wstat = (SIGFPE << 8) | 0177;
2522 break;
3e43a32a 2523 case FLTPAGE: /* Recoverable page fault */
0df8b418
MS
2524 default: /* FIXME: use si_signo if possible for
2525 fault. */
39f77062 2526 retval = pid_to_ptid (-1);
c3f6f71d 2527 printf_filtered ("procfs:%d -- ", __LINE__);
a3f17187 2528 printf_filtered (_("child stopped for unknown reason:\n"));
c3f6f71d 2529 proc_prettyprint_why (why, what, 1);
8a3fe4f8 2530 error (_("... giving up..."));
c3f6f71d
JM
2531 break;
2532 }
2533 break; /* case PR_FAULTED: */
2534 default: /* switch (why) unmatched */
2535 printf_filtered ("procfs:%d -- ", __LINE__);
a3f17187 2536 printf_filtered (_("child stopped for unknown reason:\n"));
c3f6f71d 2537 proc_prettyprint_why (why, what, 1);
8a3fe4f8 2538 error (_("... giving up..."));
c3f6f71d
JM
2539 break;
2540 }
77382aee
PA
2541 /* Got this far without error: If retval isn't in the
2542 threads database, add it. */
dfd4cc63 2543 if (ptid_get_pid (retval) > 0 &&
39f77062 2544 !ptid_equal (retval, inferior_ptid) &&
c3f6f71d 2545 !in_thread_list (retval))
c906108c 2546 {
77382aee
PA
2547 /* We have a new thread. We need to add it both to
2548 GDB's list and to our own. If we don't create a
2549 procinfo, resume may be unhappy later. */
c3f6f71d 2550 add_thread (retval);
dfd4cc63
LM
2551 if (find_procinfo (ptid_get_pid (retval),
2552 ptid_get_lwp (retval)) == NULL)
2553 create_procinfo (ptid_get_pid (retval),
2554 ptid_get_lwp (retval));
c906108c 2555 }
c906108c 2556 }
0df8b418 2557 else /* Flags do not indicate STOPPED. */
c906108c 2558 {
0df8b418 2559 /* surely this can't happen... */
c3f6f71d
JM
2560 printf_filtered ("procfs:%d -- process not stopped.\n",
2561 __LINE__);
2562 proc_prettyprint_flags (flags, 1);
8a3fe4f8 2563 error (_("procfs: ...giving up..."));
c906108c 2564 }
c906108c 2565 }
c906108c 2566
c3f6f71d
JM
2567 if (status)
2568 store_waitstatus (status, wstat);
c906108c
SS
2569 }
2570
c3f6f71d
JM
2571 return retval;
2572}
c906108c 2573
4e73f23d
RM
2574/* Perform a partial transfer to/from the specified object. For
2575 memory transfers, fall back to the old memory xfer functions. */
2576
9b409511 2577static enum target_xfer_status
4e73f23d 2578procfs_xfer_partial (struct target_ops *ops, enum target_object object,
0b62613e 2579 const char *annex, gdb_byte *readbuf,
9b409511
YQ
2580 const gdb_byte *writebuf, ULONGEST offset, ULONGEST len,
2581 ULONGEST *xfered_len)
4e73f23d
RM
2582{
2583 switch (object)
2584 {
2585 case TARGET_OBJECT_MEMORY:
e96027e0 2586 return procfs_xfer_memory (readbuf, writebuf, offset, len, xfered_len);
4e73f23d 2587
4e73f23d 2588 case TARGET_OBJECT_AUXV:
9f2982ff 2589 return memory_xfer_auxv (ops, object, annex, readbuf, writebuf,
9b409511 2590 offset, len, xfered_len);
4e73f23d
RM
2591
2592 default:
e75fdfca
TT
2593 return ops->beneath->to_xfer_partial (ops->beneath, object, annex,
2594 readbuf, writebuf, offset, len,
2595 xfered_len);
4e73f23d
RM
2596 }
2597}
2598
e96027e0
PA
2599/* Helper for procfs_xfer_partial that handles memory transfers.
2600 Arguments are like target_xfer_partial. */
4e73f23d 2601
e96027e0
PA
2602static enum target_xfer_status
2603procfs_xfer_memory (gdb_byte *readbuf, const gdb_byte *writebuf,
2604 ULONGEST memaddr, ULONGEST len, ULONGEST *xfered_len)
c3f6f71d
JM
2605{
2606 procinfo *pi;
e96027e0 2607 int nbytes;
c906108c 2608
0df8b418 2609 /* Find procinfo for main process. */
dfd4cc63 2610 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
c3f6f71d
JM
2611 if (pi->as_fd == 0 &&
2612 open_procinfo_files (pi, FD_AS) == 0)
c906108c 2613 {
c3f6f71d 2614 proc_warn (pi, "xfer_memory, open_proc_files", __LINE__);
e96027e0 2615 return TARGET_XFER_E_IO;
c906108c 2616 }
c906108c 2617
e96027e0
PA
2618 if (lseek (pi->as_fd, (off_t) memaddr, SEEK_SET) != (off_t) memaddr)
2619 return TARGET_XFER_E_IO;
2620
2621 if (writebuf != NULL)
c906108c 2622 {
e96027e0
PA
2623 PROCFS_NOTE ("write memory:\n");
2624 nbytes = write (pi->as_fd, writebuf, len);
2625 }
2626 else
2627 {
2628 PROCFS_NOTE ("read memory:\n");
2629 nbytes = read (pi->as_fd, readbuf, len);
c906108c 2630 }
e96027e0
PA
2631 if (nbytes <= 0)
2632 return TARGET_XFER_E_IO;
2633 *xfered_len = nbytes;
2634 return TARGET_XFER_OK;
c906108c
SS
2635}
2636
77382aee
PA
2637/* Called by target_resume before making child runnable. Mark cached
2638 registers and status's invalid. If there are "dirty" caches that
2639 need to be written back to the child process, do that.
c906108c 2640
77382aee
PA
2641 File descriptors are also cached. As they are a limited resource,
2642 we cannot hold onto them indefinitely. However, as they are
2643 expensive to open, we don't want to throw them away
2644 indescriminately either. As a compromise, we will keep the file
2645 descriptors for the parent process, but discard any file
2646 descriptors we may have accumulated for the threads.
2647
2648 As this function is called by iterate_over_threads, it always
2649 returns zero (so that iterate_over_threads will keep
2650 iterating). */
c3f6f71d
JM
2651
2652static int
fba45db2 2653invalidate_cache (procinfo *parent, procinfo *pi, void *ptr)
c906108c 2654{
77382aee
PA
2655 /* About to run the child; invalidate caches and do any other
2656 cleanup. */
c906108c 2657
c3f6f71d
JM
2658#if 0
2659 if (pi->gregs_dirty)
2660 if (parent == NULL ||
2661 proc_get_current_thread (parent) != pi->tid)
2662 if (!proc_set_gregs (pi)) /* flush gregs cache */
2663 proc_warn (pi, "target_resume, set_gregs",
2664 __LINE__);
f5656ead 2665 if (gdbarch_fp0_regnum (target_gdbarch ()) >= 0)
60054393
MS
2666 if (pi->fpregs_dirty)
2667 if (parent == NULL ||
2668 proc_get_current_thread (parent) != pi->tid)
2669 if (!proc_set_fpregs (pi)) /* flush fpregs cache */
19958708 2670 proc_warn (pi, "target_resume, set_fpregs",
60054393 2671 __LINE__);
c906108c 2672#endif
c906108c 2673
c3f6f71d 2674 if (parent != NULL)
c906108c 2675 {
c3f6f71d 2676 /* The presence of a parent indicates that this is an LWP.
19958708 2677 Close any file descriptors that it might have open.
c3f6f71d
JM
2678 We don't do this to the master (parent) procinfo. */
2679
2680 close_procinfo_files (pi);
c906108c 2681 }
c3f6f71d
JM
2682 pi->gregs_valid = 0;
2683 pi->fpregs_valid = 0;
2684#if 0
2685 pi->gregs_dirty = 0;
2686 pi->fpregs_dirty = 0;
c906108c 2687#endif
c3f6f71d
JM
2688 pi->status_valid = 0;
2689 pi->threads_valid = 0;
c906108c 2690
c3f6f71d 2691 return 0;
c906108c
SS
2692}
2693
0fda6bd2 2694#if 0
77382aee
PA
2695/* A callback function for iterate_over_threads. Find the
2696 asynchronous signal thread, and make it runnable. See if that
2697 helps matters any. */
c906108c 2698
c3f6f71d 2699static int
fba45db2 2700make_signal_thread_runnable (procinfo *process, procinfo *pi, void *ptr)
c906108c 2701{
c3f6f71d
JM
2702#ifdef PR_ASLWP
2703 if (proc_flags (pi) & PR_ASLWP)
c906108c 2704 {
c3f6f71d
JM
2705 if (!proc_run_process (pi, 0, -1))
2706 proc_error (pi, "make_signal_thread_runnable", __LINE__);
2707 return 1;
c906108c 2708 }
c906108c 2709#endif
c3f6f71d 2710 return 0;
c906108c 2711}
0fda6bd2 2712#endif
c906108c 2713
77382aee
PA
2714/* Make the child process runnable. Normally we will then call
2715 procfs_wait and wait for it to stop again (unless gdb is async).
2716
2717 If STEP is true, then arrange for the child to stop again after
2718 executing a single instruction. If SIGNO is zero, then cancel any
2719 pending signal; if non-zero, then arrange for the indicated signal
2720 to be delivered to the child when it runs. If PID is -1, then
2721 allow any child thread to run; if non-zero, then allow only the
2722 indicated thread to run. (not implemented yet). */
c906108c
SS
2723
2724static void
28439f5e 2725procfs_resume (struct target_ops *ops,
2ea28649 2726 ptid_t ptid, int step, enum gdb_signal signo)
c906108c 2727{
c3f6f71d
JM
2728 procinfo *pi, *thread;
2729 int native_signo;
2730
19958708 2731 /* 2.1:
c3f6f71d 2732 prrun.prflags |= PRSVADDR;
19958708 2733 prrun.pr_vaddr = $PC; set resume address
c3f6f71d 2734 prrun.prflags |= PRSTRACE; trace signals in pr_trace (all)
19958708 2735 prrun.prflags |= PRSFAULT; trace faults in pr_fault (all but PAGE)
c3f6f71d
JM
2736 prrun.prflags |= PRCFAULT; clear current fault.
2737
2738 PRSTRACE and PRSFAULT can be done by other means
77382aee 2739 (proc_trace_signals, proc_trace_faults)
c3f6f71d
JM
2740 PRSVADDR is unnecessary.
2741 PRCFAULT may be replaced by a PIOCCFAULT call (proc_clear_current_fault)
2742 This basically leaves PRSTEP and PRCSIG.
2743 PRCSIG is like PIOCSSIG (proc_clear_current_signal).
2744 So basically PR_STEP is the sole argument that must be passed
77382aee 2745 to proc_run_process (for use in the prrun struct by ioctl). */
c3f6f71d 2746
0df8b418 2747 /* Find procinfo for main process. */
dfd4cc63 2748 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
c3f6f71d 2749
77382aee 2750 /* First cut: ignore pid argument. */
c3f6f71d 2751 errno = 0;
c906108c 2752
c3f6f71d
JM
2753 /* Convert signal to host numbering. */
2754 if (signo == 0 ||
a493e3e2 2755 (signo == GDB_SIGNAL_STOP && pi->ignore_next_sigstop))
c3f6f71d
JM
2756 native_signo = 0;
2757 else
2ea28649 2758 native_signo = gdb_signal_to_host (signo);
c906108c 2759
c3f6f71d 2760 pi->ignore_next_sigstop = 0;
c906108c 2761
77382aee
PA
2762 /* Running the process voids all cached registers and status. */
2763 /* Void the threads' caches first. */
19958708 2764 proc_iterate_over_threads (pi, invalidate_cache, NULL);
c3f6f71d
JM
2765 /* Void the process procinfo's caches. */
2766 invalidate_cache (NULL, pi, NULL);
c906108c 2767
dfd4cc63 2768 if (ptid_get_pid (ptid) != -1)
c906108c 2769 {
77382aee
PA
2770 /* Resume a specific thread, presumably suppressing the
2771 others. */
dfd4cc63 2772 thread = find_procinfo (ptid_get_pid (ptid), ptid_get_lwp (ptid));
7de45904 2773 if (thread != NULL)
c906108c 2774 {
c3f6f71d
JM
2775 if (thread->tid != 0)
2776 {
77382aee
PA
2777 /* We're to resume a specific thread, and not the
2778 others. Set the child process's PR_ASYNC flag. */
c3f6f71d
JM
2779 if (!proc_set_async (pi))
2780 proc_error (pi, "target_resume, set_async", __LINE__);
c3f6f71d 2781#if 0
19958708 2782 proc_iterate_over_threads (pi,
c3f6f71d
JM
2783 make_signal_thread_runnable,
2784 NULL);
2785#endif
0df8b418
MS
2786 pi = thread; /* Substitute the thread's procinfo
2787 for run. */
c3f6f71d 2788 }
c906108c
SS
2789 }
2790 }
c906108c 2791
c3f6f71d 2792 if (!proc_run_process (pi, step, native_signo))
c906108c 2793 {
c3f6f71d 2794 if (errno == EBUSY)
77382aee
PA
2795 warning (_("resume: target already running. "
2796 "Pretend to resume, and hope for the best!"));
c3f6f71d
JM
2797 else
2798 proc_error (pi, "target_resume", __LINE__);
c906108c 2799 }
c3f6f71d 2800}
c906108c 2801
77382aee 2802/* Set up to trace signals in the child process. */
c906108c 2803
c3f6f71d 2804static void
94bedb42
TT
2805procfs_pass_signals (struct target_ops *self,
2806 int numsigs, unsigned char *pass_signals)
c3f6f71d 2807{
44122162 2808 sigset_t signals;
dfd4cc63 2809 procinfo *pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
2455069d 2810 int signo;
c906108c 2811
2455069d
UW
2812 prfillset (&signals);
2813
2814 for (signo = 0; signo < NSIG; signo++)
2815 {
2ea28649 2816 int target_signo = gdb_signal_from_host (signo);
2455069d 2817 if (target_signo < numsigs && pass_signals[target_signo])
44122162 2818 prdelset (&signals, signo);
2455069d
UW
2819 }
2820
2821 if (!proc_set_traced_signals (pi, &signals))
2822 proc_error (pi, "pass_signals", __LINE__);
c3f6f71d 2823}
c906108c 2824
77382aee 2825/* Print status information about the child process. */
c906108c 2826
c3f6f71d 2827static void
fba45db2 2828procfs_files_info (struct target_ops *ignore)
c3f6f71d 2829{
181e7f93 2830 struct inferior *inf = current_inferior ();
f4a14ae6 2831
a3f17187 2832 printf_filtered (_("\tUsing the running image of %s %s via /proc.\n"),
181e7f93 2833 inf->attach_flag? "attached": "child",
39f77062 2834 target_pid_to_str (inferior_ptid));
c3f6f71d 2835}
c906108c 2836
77382aee
PA
2837/* Make it die. Wait for it to die. Clean up after it. Note: this
2838 should only be applied to the real process, not to an LWP, because
2839 of the check for parent-process. If we need this to work for an
2840 LWP, it needs some more logic. */
c906108c 2841
c3f6f71d 2842static void
fba45db2 2843unconditionally_kill_inferior (procinfo *pi)
c3f6f71d
JM
2844{
2845 int parent_pid;
c906108c 2846
c3f6f71d 2847 parent_pid = proc_parent_pid (pi);
c3f6f71d 2848 if (!proc_kill (pi, SIGKILL))
103b3ef5 2849 proc_error (pi, "unconditionally_kill, proc_kill", __LINE__);
c3f6f71d 2850 destroy_procinfo (pi);
c906108c 2851
c3f6f71d
JM
2852 /* If pi is GDB's child, wait for it to die. */
2853 if (parent_pid == getpid ())
19958708 2854 /* FIXME: should we use waitpid to make sure we get the right event?
c3f6f71d
JM
2855 Should we check the returned event? */
2856 {
0d06e24b 2857#if 0
c3f6f71d 2858 int status, ret;
c906108c 2859
c3f6f71d
JM
2860 ret = waitpid (pi->pid, &status, 0);
2861#else
2862 wait (NULL);
2863#endif
2864 }
2865}
c906108c 2866
77382aee
PA
2867/* We're done debugging it, and we want it to go away. Then we want
2868 GDB to forget all about it. */
c906108c 2869
19958708 2870static void
7d85a9c0 2871procfs_kill_inferior (struct target_ops *ops)
c906108c 2872{
39f77062 2873 if (!ptid_equal (inferior_ptid, null_ptid)) /* ? */
c3f6f71d 2874 {
0df8b418 2875 /* Find procinfo for main process. */
dfd4cc63 2876 procinfo *pi = find_procinfo (ptid_get_pid (inferior_ptid), 0);
c906108c 2877
c3f6f71d
JM
2878 if (pi)
2879 unconditionally_kill_inferior (pi);
bc1e6c81 2880 target_mourn_inferior (inferior_ptid);
c906108c 2881 }
c3f6f71d
JM
2882}
2883
77382aee 2884/* Forget we ever debugged this thing! */
c906108c 2885
19958708 2886static void
136d6dae 2887procfs_mourn_inferior (struct target_ops *ops)
c3f6f71d
JM
2888{
2889 procinfo *pi;
c906108c 2890
39f77062 2891 if (!ptid_equal (inferior_ptid, null_ptid))
c3f6f71d 2892 {
0df8b418 2893 /* Find procinfo for main process. */
dfd4cc63 2894 pi = find_procinfo (ptid_get_pid (inferior_ptid), 0);
c3f6f71d
JM
2895 if (pi)
2896 destroy_procinfo (pi);
c906108c 2897 }
6a3cb8e8
PA
2898
2899 generic_mourn_inferior ();
8181d85f 2900
6a3cb8e8 2901 inf_child_maybe_unpush_target (ops);
c3f6f71d 2902}
c906108c 2903
77382aee
PA
2904/* When GDB forks to create a runnable inferior process, this function
2905 is called on the parent side of the fork. It's job is to do
2906 whatever is necessary to make the child ready to be debugged, and
2907 then wait for the child to synchronize. */
c906108c 2908
19958708 2909static void
28439f5e 2910procfs_init_inferior (struct target_ops *ops, int pid)
c3f6f71d
JM
2911{
2912 procinfo *pi;
44122162 2913 sigset_t signals;
c3f6f71d 2914 int fail;
2689673f 2915 int lwpid;
c906108c 2916
c3f6f71d
JM
2917 /* This routine called on the parent side (GDB side)
2918 after GDB forks the inferior. */
6a3cb8e8
PA
2919 if (!target_is_pushed (ops))
2920 push_target (ops);
c906108c 2921
c3f6f71d 2922 if ((pi = create_procinfo (pid, 0)) == NULL)
9b20d036 2923 perror (_("procfs: out of memory in 'init_inferior'"));
c3f6f71d
JM
2924
2925 if (!open_procinfo_files (pi, FD_CTL))
2926 proc_error (pi, "init_inferior, open_proc_files", __LINE__);
2927
2928 /*
2929 xmalloc // done
2930 open_procinfo_files // done
2931 link list // done
2932 prfillset (trace)
2933 procfs_notice_signals
2934 prfillset (fault)
2935 prdelset (FLTPAGE)
2936 PIOCWSTOP
2937 PIOCSFAULT
2938 */
2939
77382aee 2940 /* If not stopped yet, wait for it to stop. */
c3f6f71d
JM
2941 if (!(proc_flags (pi) & PR_STOPPED) &&
2942 !(proc_wait_for_stop (pi)))
2943 dead_procinfo (pi, "init_inferior: wait_for_stop failed", KILL);
2944
2945 /* Save some of the /proc state to be restored if we detach. */
2946 /* FIXME: Why? In case another debugger was debugging it?
0df8b418 2947 We're it's parent, for Ghu's sake! */
c3f6f71d
JM
2948 if (!proc_get_traced_signals (pi, &pi->saved_sigset))
2949 proc_error (pi, "init_inferior, get_traced_signals", __LINE__);
2950 if (!proc_get_held_signals (pi, &pi->saved_sighold))
2951 proc_error (pi, "init_inferior, get_held_signals", __LINE__);
2952 if (!proc_get_traced_faults (pi, &pi->saved_fltset))
2953 proc_error (pi, "init_inferior, get_traced_faults", __LINE__);
37de36c6 2954 if (!proc_get_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d 2955 proc_error (pi, "init_inferior, get_traced_sysentry", __LINE__);
37de36c6 2956 if (!proc_get_traced_sysexit (pi, pi->saved_exitset))
c3f6f71d
JM
2957 proc_error (pi, "init_inferior, get_traced_sysexit", __LINE__);
2958
c3f6f71d
JM
2959 if ((fail = procfs_debug_inferior (pi)) != 0)
2960 proc_error (pi, "init_inferior (procfs_debug_inferior)", fail);
2961
0d06e24b
JM
2962 /* FIXME: logically, we should really be turning OFF run-on-last-close,
2963 and possibly even turning ON kill-on-last-close at this point. But
2964 I can't make that change without careful testing which I don't have
2965 time to do right now... */
c3f6f71d
JM
2966 /* Turn on run-on-last-close flag so that the child
2967 will die if GDB goes away for some reason. */
2968 if (!proc_set_run_on_last_close (pi))
2969 proc_error (pi, "init_inferior, set_RLC", __LINE__);
2970
2689673f
PA
2971 /* We now have have access to the lwpid of the main thread/lwp. */
2972 lwpid = proc_get_current_thread (pi);
2973
2974 /* Create a procinfo for the main lwp. */
2975 create_procinfo (pid, lwpid);
2976
2977 /* We already have a main thread registered in the thread table at
2978 this point, but it didn't have any lwp info yet. Notify the core
2979 about it. This changes inferior_ptid as well. */
2980 thread_change_ptid (pid_to_ptid (pid),
793e1c06 2981 ptid_build (pid, lwpid, 0));
c906108c 2982
2090129c 2983 gdb_startup_inferior (pid, START_INFERIOR_TRAPS_EXPECTED);
c3f6f71d 2984}
c906108c 2985
77382aee
PA
2986/* When GDB forks to create a new process, this function is called on
2987 the child side of the fork before GDB exec's the user program. Its
2988 job is to make the child minimally debuggable, so that the parent
2989 GDB process can connect to the child and take over. This function
2990 should do only the minimum to make that possible, and to
2991 synchronize with the parent process. The parent process should
2992 take care of the details. */
c3f6f71d
JM
2993
2994static void
fba45db2 2995procfs_set_exec_trap (void)
c3f6f71d
JM
2996{
2997 /* This routine called on the child side (inferior side)
2998 after GDB forks the inferior. It must use only local variables,
2999 because it may be sharing data space with its parent. */
c906108c 3000
c3f6f71d 3001 procinfo *pi;
37de36c6 3002 sysset_t *exitset;
c906108c 3003
c3f6f71d 3004 if ((pi = create_procinfo (getpid (), 0)) == NULL)
e2e0b3e5 3005 perror_with_name (_("procfs: create_procinfo failed in child."));
c906108c 3006
c3f6f71d
JM
3007 if (open_procinfo_files (pi, FD_CTL) == 0)
3008 {
3009 proc_warn (pi, "set_exec_trap, open_proc_files", __LINE__);
3010 gdb_flush (gdb_stderr);
77382aee
PA
3011 /* No need to call "dead_procinfo", because we're going to
3012 exit. */
c3f6f71d
JM
3013 _exit (127);
3014 }
c906108c 3015
44122162 3016 /* Method for tracing exec syscalls. */
c3f6f71d
JM
3017 /* GW: Rationale...
3018 Not all systems with /proc have all the exec* syscalls with the same
3019 names. On the SGI, for example, there is no SYS_exec, but there
77382aee 3020 *is* a SYS_execv. So, we try to account for that. */
c906108c 3021
37de36c6 3022 exitset = sysset_t_alloc (pi);
44122162 3023 premptyset (exitset);
c3f6f71d 3024#ifdef SYS_exec
44122162 3025 praddset (exitset, SYS_exec);
c906108c 3026#endif
44122162 3027 praddset (exitset, SYS_execve);
37de36c6
KB
3028
3029 if (!proc_set_traced_sysexit (pi, exitset))
c906108c 3030 {
c3f6f71d
JM
3031 proc_warn (pi, "set_exec_trap, set_traced_sysexit", __LINE__);
3032 gdb_flush (gdb_stderr);
3033 _exit (127);
c906108c 3034 }
c3f6f71d 3035
0df8b418 3036 /* FIXME: should this be done in the parent instead? */
c3f6f71d
JM
3037 /* Turn off inherit on fork flag so that all grand-children
3038 of gdb start with tracing flags cleared. */
3039 if (!proc_unset_inherit_on_fork (pi))
3040 proc_warn (pi, "set_exec_trap, unset_inherit", __LINE__);
3041
3042 /* Turn off run on last close flag, so that the child process
3043 cannot run away just because we close our handle on it.
3044 We want it to wait for the parent to attach. */
3045 if (!proc_unset_run_on_last_close (pi))
3046 proc_warn (pi, "set_exec_trap, unset_RLC", __LINE__);
3047
19958708 3048 /* FIXME: No need to destroy the procinfo --
0df8b418 3049 we have our own address space, and we're about to do an exec! */
c3f6f71d 3050 /*destroy_procinfo (pi);*/
c906108c 3051}
c906108c 3052
77382aee
PA
3053/* This function is called BEFORE gdb forks the inferior process. Its
3054 only real responsibility is to set things up for the fork, and tell
3055 GDB which two functions to call after the fork (one for the parent,
3056 and one for the child).
3057
3058 This function does a complicated search for a unix shell program,
3059 which it then uses to parse arguments and environment variables to
3060 be sent to the child. I wonder whether this code could not be
3061 abstracted out and shared with other unix targets such as
3062 inf-ptrace? */
c906108c
SS
3063
3064static void
7c5ded6a
SDJ
3065procfs_create_inferior (struct target_ops *ops, const char *exec_file,
3066 const std::string &allargs, char **env, int from_tty)
c906108c
SS
3067{
3068 char *shell_file = getenv ("SHELL");
3069 char *tryname;
28439f5e
PA
3070 int pid;
3071
c906108c
SS
3072 if (shell_file != NULL && strchr (shell_file, '/') == NULL)
3073 {
3074
3075 /* We will be looking down the PATH to find shell_file. If we
c3f6f71d
JM
3076 just do this the normal way (via execlp, which operates by
3077 attempting an exec for each element of the PATH until it
3078 finds one which succeeds), then there will be an exec for
3079 each failed attempt, each of which will cause a PR_SYSEXIT
3080 stop, and we won't know how to distinguish the PR_SYSEXIT's
3081 for these failed execs with the ones for successful execs
3082 (whether the exec has succeeded is stored at that time in the
3083 carry bit or some such architecture-specific and
3084 non-ABI-specified place).
3085
3086 So I can't think of anything better than to search the PATH
3087 now. This has several disadvantages: (1) There is a race
3088 condition; if we find a file now and it is deleted before we
3089 exec it, we lose, even if the deletion leaves a valid file
3090 further down in the PATH, (2) there is no way to know exactly
3091 what an executable (in the sense of "capable of being
3092 exec'd") file is. Using access() loses because it may lose
3093 if the caller is the superuser; failing to use it loses if
3094 there are ACLs or some such. */
c906108c 3095
995816ba
PA
3096 const char *p;
3097 const char *p1;
c906108c 3098 /* FIXME-maybe: might want "set path" command so user can change what
c3f6f71d 3099 path is used from within GDB. */
995816ba 3100 const char *path = getenv ("PATH");
c906108c
SS
3101 int len;
3102 struct stat statbuf;
3103
3104 if (path == NULL)
3105 path = "/bin:/usr/bin";
3106
b196bc4c 3107 tryname = (char *) alloca (strlen (path) + strlen (shell_file) + 2);
c3f6f71d 3108 for (p = path; p != NULL; p = p1 ? p1 + 1: NULL)
c906108c
SS
3109 {
3110 p1 = strchr (p, ':');
3111 if (p1 != NULL)
3112 len = p1 - p;
3113 else
3114 len = strlen (p);
3115 strncpy (tryname, p, len);
3116 tryname[len] = '\0';
3117 strcat (tryname, "/");
3118 strcat (tryname, shell_file);
3119 if (access (tryname, X_OK) < 0)
3120 continue;
3121 if (stat (tryname, &statbuf) < 0)
3122 continue;
3123 if (!S_ISREG (statbuf.st_mode))
3124 /* We certainly need to reject directories. I'm not quite
3125 as sure about FIFOs, sockets, etc., but I kind of doubt
3126 that people want to exec() these things. */
3127 continue;
3128 break;
3129 }
3130 if (p == NULL)
3131 /* Not found. This must be an error rather than merely passing
3132 the file to execlp(), because execlp() would try all the
3133 exec()s, causing GDB to get confused. */
8a3fe4f8 3134 error (_("procfs:%d -- Can't find shell %s in PATH"),
c3f6f71d 3135 __LINE__, shell_file);
c906108c
SS
3136
3137 shell_file = tryname;
3138 }
3139
28439f5e 3140 pid = fork_inferior (exec_file, allargs, env, procfs_set_exec_trap,
e69860f1 3141 NULL, NULL, shell_file, NULL);
28439f5e 3142
2090129c
SDJ
3143 /* We have something that executes now. We'll be running through
3144 the shell at this point (if startup-with-shell is true), but the
3145 pid shouldn't change. */
3146 add_thread_silent (pid_to_ptid (pid));
3147
28439f5e 3148 procfs_init_inferior (ops, pid);
27087a3d
JB
3149}
3150
3151/* An observer for the "inferior_created" event. */
c906108c 3152
27087a3d
JB
3153static void
3154procfs_inferior_created (struct target_ops *ops, int from_tty)
3155{
c906108c
SS
3156}
3157
e8032dde 3158/* Callback for update_thread_list. Calls "add_thread". */
c906108c 3159
c3f6f71d 3160static int
fba45db2 3161procfs_notice_thread (procinfo *pi, procinfo *thread, void *ptr)
c906108c 3162{
dfd4cc63 3163 ptid_t gdb_threadid = ptid_build (pi->pid, thread->tid, 0);
c906108c 3164
2689673f 3165 if (!in_thread_list (gdb_threadid) || is_exited (gdb_threadid))
c3f6f71d 3166 add_thread (gdb_threadid);
c906108c 3167
c3f6f71d
JM
3168 return 0;
3169}
3170
77382aee
PA
3171/* Query all the threads that the target knows about, and give them
3172 back to GDB to add to its list. */
c3f6f71d 3173
d3581e61 3174static void
e8032dde 3175procfs_update_thread_list (struct target_ops *ops)
c3f6f71d
JM
3176{
3177 procinfo *pi;
3178
e8032dde
PA
3179 prune_threads ();
3180
0df8b418 3181 /* Find procinfo for main process. */
dfd4cc63 3182 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
c3f6f71d
JM
3183 proc_update_threads (pi);
3184 proc_iterate_over_threads (pi, procfs_notice_thread, NULL);
c906108c
SS
3185}
3186
77382aee
PA
3187/* Return true if the thread is still 'alive'. This guy doesn't
3188 really seem to be doing his job. Got to investigate how to tell
3189 when a thread is really gone. */
c906108c 3190
c906108c 3191static int
28439f5e 3192procfs_thread_alive (struct target_ops *ops, ptid_t ptid)
c906108c 3193{
c3f6f71d
JM
3194 int proc, thread;
3195 procinfo *pi;
c906108c 3196
dfd4cc63
LM
3197 proc = ptid_get_pid (ptid);
3198 thread = ptid_get_lwp (ptid);
0df8b418 3199 /* If I don't know it, it ain't alive! */
c3f6f71d
JM
3200 if ((pi = find_procinfo (proc, thread)) == NULL)
3201 return 0;
3202
3203 /* If I can't get its status, it ain't alive!
3204 What's more, I need to forget about it! */
3205 if (!proc_get_status (pi))
3206 {
3207 destroy_procinfo (pi);
3208 return 0;
3209 }
77382aee
PA
3210 /* I couldn't have got its status if it weren't alive, so it's
3211 alive. */
c3f6f71d 3212 return 1;
c906108c 3213}
c3f6f71d 3214
77382aee
PA
3215/* Convert PTID to a string. Returns the string in a static
3216 buffer. */
c3f6f71d 3217
7a114964 3218static const char *
117de6a9 3219procfs_pid_to_str (struct target_ops *ops, ptid_t ptid)
c3f6f71d
JM
3220{
3221 static char buf[80];
c3f6f71d 3222
dfd4cc63
LM
3223 if (ptid_get_lwp (ptid) == 0)
3224 sprintf (buf, "process %d", ptid_get_pid (ptid));
c3f6f71d 3225 else
dfd4cc63 3226 sprintf (buf, "LWP %ld", ptid_get_lwp (ptid));
5240ceac
MK
3227
3228 return buf;
c3f6f71d
JM
3229}
3230
77382aee 3231/* Insert a watchpoint. */
c3f6f71d 3232
a0911fd0 3233static int
39f77062 3234procfs_set_watchpoint (ptid_t ptid, CORE_ADDR addr, int len, int rwflag,
77382aee 3235 int after)
c906108c 3236{
c3f6f71d 3237 int pflags = 0;
19958708 3238 procinfo *pi;
c3f6f71d 3239
dfd4cc63
LM
3240 pi = find_procinfo_or_die (ptid_get_pid (ptid) == -1 ?
3241 ptid_get_pid (inferior_ptid) : ptid_get_pid (ptid),
3242 0);
c3f6f71d 3243
0df8b418
MS
3244 /* Translate from GDB's flags to /proc's. */
3245 if (len > 0) /* len == 0 means delete watchpoint. */
c906108c 3246 {
0df8b418 3247 switch (rwflag) { /* FIXME: need an enum! */
c3f6f71d
JM
3248 case hw_write: /* default watchpoint (write) */
3249 pflags = WRITE_WATCHFLAG;
3250 break;
3251 case hw_read: /* read watchpoint */
3252 pflags = READ_WATCHFLAG;
3253 break;
3254 case hw_access: /* access watchpoint */
3255 pflags = READ_WATCHFLAG | WRITE_WATCHFLAG;
3256 break;
3257 case hw_execute: /* execution HW breakpoint */
3258 pflags = EXEC_WATCHFLAG;
3259 break;
0df8b418 3260 default: /* Something weird. Return error. */
c906108c 3261 return -1;
c3f6f71d 3262 }
0df8b418 3263 if (after) /* Stop after r/w access is completed. */
c3f6f71d
JM
3264 pflags |= AFTER_WATCHFLAG;
3265 }
3266
3267 if (!proc_set_watchpoint (pi, addr, len, pflags))
3268 {
0df8b418 3269 if (errno == E2BIG) /* Typical error for no resources. */
c3f6f71d
JM
3270 return -1; /* fail */
3271 /* GDB may try to remove the same watchpoint twice.
3272 If a remove request returns no match, don't error. */
c906108c 3273 if (errno == ESRCH && len == 0)
c3f6f71d
JM
3274 return 0; /* ignore */
3275 proc_error (pi, "set_watchpoint", __LINE__);
c906108c
SS
3276 }
3277 return 0;
3278}
3279
1e03ad20
KB
3280/* Return non-zero if we can set a hardware watchpoint of type TYPE. TYPE
3281 is one of bp_hardware_watchpoint, bp_read_watchpoint, bp_write_watchpoint,
3282 or bp_hardware_watchpoint. CNT is the number of watchpoints used so
3283 far.
19958708 3284
1e03ad20
KB
3285 Note: procfs_can_use_hw_breakpoint() is not yet used by all
3286 procfs.c targets due to the fact that some of them still define
d92524f1 3287 target_can_use_hardware_watchpoint. */
1e03ad20
KB
3288
3289static int
5461485a 3290procfs_can_use_hw_breakpoint (struct target_ops *self,
f486487f
SM
3291 enum bptype type,
3292 int cnt, int othertype)
1e03ad20 3293{
1e03ad20
KB
3294 /* Due to the way that proc_set_watchpoint() is implemented, host
3295 and target pointers must be of the same size. If they are not,
3296 we can't use hardware watchpoints. This limitation is due to the
9a043c1d
AC
3297 fact that proc_set_watchpoint() calls
3298 procfs_address_to_host_pointer(); a close inspection of
3299 procfs_address_to_host_pointer will reveal that an internal error
3300 will be generated when the host and target pointer sizes are
3301 different. */
f5656ead 3302 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
f4a14ae6 3303
4e906f53 3304 if (sizeof (void *) != TYPE_LENGTH (ptr_type))
1e03ad20
KB
3305 return 0;
3306
3307 /* Other tests here??? */
3308
3309 return 1;
1e03ad20
KB
3310}
3311
77382aee
PA
3312/* Returns non-zero if process is stopped on a hardware watchpoint
3313 fault, else returns zero. */
c3f6f71d 3314
25513619 3315static int
6a109b6b 3316procfs_stopped_by_watchpoint (struct target_ops *ops)
c906108c 3317{
c3f6f71d 3318 procinfo *pi;
c906108c 3319
dfd4cc63 3320 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
aaeb7efa 3321
c3f6f71d 3322 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
c906108c 3323 {
c3f6f71d 3324 if (proc_why (pi) == PR_FAULTED)
19958708 3325 {
c3f6f71d
JM
3326 if (proc_what (pi) == FLTWATCH)
3327 return 1;
c3f6f71d 3328 }
c906108c
SS
3329 }
3330 return 0;
3331}
c906108c 3332
77382aee
PA
3333/* Returns 1 if the OS knows the position of the triggered watchpoint,
3334 and sets *ADDR to that address. Returns 0 if OS cannot report that
3335 address. This function is only called if
3336 procfs_stopped_by_watchpoint returned 1, thus no further checks are
3337 done. The function also assumes that ADDR is not NULL. */
bf701c2c
PM
3338
3339static int
3340procfs_stopped_data_address (struct target_ops *targ, CORE_ADDR *addr)
3341{
3342 procinfo *pi;
3343
dfd4cc63 3344 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
bf701c2c
PM
3345 return proc_watchpoint_address (pi, addr);
3346}
3347
25513619 3348static int
7bb99c53 3349procfs_insert_watchpoint (struct target_ops *self,
f486487f
SM
3350 CORE_ADDR addr, int len,
3351 enum target_hw_bp_type type,
0cf6dd15 3352 struct expression *cond)
25513619 3353{
d92524f1 3354 if (!target_have_steppable_watchpoint
f5656ead 3355 && !gdbarch_have_nonsteppable_watchpoint (target_gdbarch ()))
25513619
PA
3356 {
3357 /* When a hardware watchpoint fires off the PC will be left at
3358 the instruction following the one which caused the
3359 watchpoint. It will *NOT* be necessary for GDB to step over
3360 the watchpoint. */
3361 return procfs_set_watchpoint (inferior_ptid, addr, len, type, 1);
3362 }
3363 else
3364 {
3365 /* When a hardware watchpoint fires off the PC will be left at
3366 the instruction which caused the watchpoint. It will be
3367 necessary for GDB to step over the watchpoint. */
3368 return procfs_set_watchpoint (inferior_ptid, addr, len, type, 0);
3369 }
3370}
3371
3372static int
11b5219a 3373procfs_remove_watchpoint (struct target_ops *self,
f486487f
SM
3374 CORE_ADDR addr, int len,
3375 enum target_hw_bp_type type,
0cf6dd15 3376 struct expression *cond)
25513619
PA
3377{
3378 return procfs_set_watchpoint (inferior_ptid, addr, 0, 0, 0);
3379}
3380
3381static int
31568a15
TT
3382procfs_region_ok_for_hw_watchpoint (struct target_ops *self,
3383 CORE_ADDR addr, int len)
25513619
PA
3384{
3385 /* The man page for proc(4) on Solaris 2.6 and up says that the
3386 system can support "thousands" of hardware watchpoints, but gives
3387 no method for finding out how many; It doesn't say anything about
3388 the allowed size for the watched area either. So we just tell
3389 GDB 'yes'. */
3390 return 1;
3391}
3392
3393void
3394procfs_use_watchpoints (struct target_ops *t)
3395{
3396 t->to_stopped_by_watchpoint = procfs_stopped_by_watchpoint;
3397 t->to_insert_watchpoint = procfs_insert_watchpoint;
3398 t->to_remove_watchpoint = procfs_remove_watchpoint;
3399 t->to_region_ok_for_hw_watchpoint = procfs_region_ok_for_hw_watchpoint;
d1a7880c 3400 t->to_can_use_hw_breakpoint = procfs_can_use_hw_breakpoint;
bf701c2c 3401 t->to_stopped_data_address = procfs_stopped_data_address;
25513619
PA
3402}
3403
77382aee
PA
3404/* Memory Mappings Functions: */
3405
3406/* Call a callback function once for each mapping, passing it the
3407 mapping, an optional secondary callback function, and some optional
3408 opaque data. Quit and return the first non-zero value returned
3409 from the callback.
3410
3411 PI is the procinfo struct for the process to be mapped. FUNC is
3412 the callback function to be called by this iterator. DATA is the
3413 optional opaque data to be passed to the callback function.
3414 CHILD_FUNC is the optional secondary function pointer to be passed
3415 to the child function. Returns the first non-zero return value
3416 from the callback function, or zero. */
831e682e
MS
3417
3418static int
b8edc417 3419iterate_over_mappings (procinfo *pi, find_memory_region_ftype child_func,
e9ef4f39 3420 void *data,
19958708 3421 int (*func) (struct prmap *map,
b8edc417 3422 find_memory_region_ftype child_func,
831e682e
MS
3423 void *data))
3424{
3425 char pathname[MAX_PROC_NAME_SIZE];
3426 struct prmap *prmaps;
3427 struct prmap *prmap;
3428 int funcstat;
3429 int map_fd;
3430 int nmap;
0a86f364 3431 struct cleanup *cleanups = make_cleanup (null_cleanup, NULL);
831e682e 3432 struct stat sbuf;
831e682e 3433
19958708 3434 /* Get the number of mappings, allocate space,
831e682e 3435 and read the mappings into prmaps. */
0df8b418 3436 /* Open map fd. */
831e682e
MS
3437 sprintf (pathname, "/proc/%d/map", pi->pid);
3438 if ((map_fd = open (pathname, O_RDONLY)) < 0)
3439 proc_error (pi, "iterate_over_mappings (open)", __LINE__);
3440
0df8b418 3441 /* Make sure it gets closed again. */
831e682e
MS
3442 make_cleanup_close (map_fd);
3443
19958708 3444 /* Use stat to determine the file size, and compute
831e682e
MS
3445 the number of prmap_t objects it contains. */
3446 if (fstat (map_fd, &sbuf) != 0)
3447 proc_error (pi, "iterate_over_mappings (fstat)", __LINE__);
3448
3449 nmap = sbuf.st_size / sizeof (prmap_t);
3450 prmaps = (struct prmap *) alloca ((nmap + 1) * sizeof (*prmaps));
3451 if (read (map_fd, (char *) prmaps, nmap * sizeof (*prmaps))
3452 != (nmap * sizeof (*prmaps)))
3453 proc_error (pi, "iterate_over_mappings (read)", __LINE__);
831e682e
MS
3454
3455 for (prmap = prmaps; nmap > 0; prmap++, nmap--)
3456 if ((funcstat = (*func) (prmap, child_func, data)) != 0)
0a86f364
JB
3457 {
3458 do_cleanups (cleanups);
3459 return funcstat;
3460 }
831e682e 3461
0a86f364 3462 do_cleanups (cleanups);
831e682e
MS
3463 return 0;
3464}
3465
77382aee 3466/* Implements the to_find_memory_regions method. Calls an external
b8edc417 3467 function for each memory region.
77382aee 3468 Returns the integer value returned by the callback. */
be4d1333
MS
3469
3470static int
19958708 3471find_memory_regions_callback (struct prmap *map,
b8edc417 3472 find_memory_region_ftype func, void *data)
be4d1333 3473{
bf75638e 3474 return (*func) ((CORE_ADDR) map->pr_vaddr,
19958708 3475 map->pr_size,
be4d1333
MS
3476 (map->pr_mflags & MA_READ) != 0,
3477 (map->pr_mflags & MA_WRITE) != 0,
19958708 3478 (map->pr_mflags & MA_EXEC) != 0,
4f69f4c2 3479 1, /* MODIFIED is unknown, pass it as true. */
be4d1333
MS
3480 data);
3481}
3482
77382aee
PA
3483/* External interface. Calls a callback function once for each
3484 mapped memory region in the child process, passing as arguments:
3485
3486 CORE_ADDR virtual_address,
3487 unsigned long size,
3488 int read, TRUE if region is readable by the child
3489 int write, TRUE if region is writable by the child
3490 int execute TRUE if region is executable by the child.
3491
3492 Stops iterating and returns the first non-zero value returned by
3493 the callback. */
be4d1333
MS
3494
3495static int
2e73927c
TT
3496proc_find_memory_regions (struct target_ops *self,
3497 find_memory_region_ftype func, void *data)
be4d1333 3498{
dfd4cc63 3499 procinfo *pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
be4d1333 3500
19958708 3501 return iterate_over_mappings (pi, func, data,
be4d1333
MS
3502 find_memory_regions_callback);
3503}
3504
77382aee 3505/* Returns an ascii representation of a memory mapping's flags. */
c3f6f71d 3506
388faa48 3507static char *
5ae5f592 3508mappingflags (long flags)
388faa48
MS
3509{
3510 static char asciiflags[8];
3511
3512 strcpy (asciiflags, "-------");
388faa48
MS
3513 if (flags & MA_STACK)
3514 asciiflags[1] = 's';
3515 if (flags & MA_BREAK)
3516 asciiflags[2] = 'b';
3517 if (flags & MA_SHARED)
3518 asciiflags[3] = 's';
3519 if (flags & MA_READ)
3520 asciiflags[4] = 'r';
3521 if (flags & MA_WRITE)
3522 asciiflags[5] = 'w';
3523 if (flags & MA_EXEC)
3524 asciiflags[6] = 'x';
3525 return (asciiflags);
3526}
3527
77382aee
PA
3528/* Callback function, does the actual work for 'info proc
3529 mappings'. */
831e682e 3530
831e682e 3531static int
b8edc417 3532info_mappings_callback (struct prmap *map, find_memory_region_ftype ignore,
e9ef4f39 3533 void *unused)
831e682e 3534{
0b62613e 3535 unsigned int pr_off;
831e682e 3536
0b62613e 3537 pr_off = (unsigned int) map->pr_offset;
0b62613e 3538
f5656ead 3539 if (gdbarch_addr_bit (target_gdbarch ()) == 32)
f6a96b83 3540 printf_filtered ("\t%#10lx %#10lx %#10lx %#10x %7s\n",
0b62613e
PA
3541 (unsigned long) map->pr_vaddr,
3542 (unsigned long) map->pr_vaddr + map->pr_size - 1,
f6a96b83 3543 (unsigned long) map->pr_size,
0b62613e
PA
3544 pr_off,
3545 mappingflags (map->pr_mflags));
3546 else
f6a96b83 3547 printf_filtered (" %#18lx %#18lx %#10lx %#10x %7s\n",
0b62613e
PA
3548 (unsigned long) map->pr_vaddr,
3549 (unsigned long) map->pr_vaddr + map->pr_size - 1,
f6a96b83 3550 (unsigned long) map->pr_size,
0b62613e
PA
3551 pr_off,
3552 mappingflags (map->pr_mflags));
831e682e
MS
3553
3554 return 0;
3555}
3556
77382aee 3557/* Implement the "info proc mappings" subcommand. */
388faa48
MS
3558
3559static void
3560info_proc_mappings (procinfo *pi, int summary)
3561{
388faa48 3562 if (summary)
0df8b418 3563 return; /* No output for summary mode. */
388faa48 3564
a3f17187 3565 printf_filtered (_("Mapped address spaces:\n\n"));
f5656ead 3566 if (gdbarch_ptr_bit (target_gdbarch ()) == 32)
0b62613e
PA
3567 printf_filtered ("\t%10s %10s %10s %10s %7s\n",
3568 "Start Addr",
3569 " End Addr",
3570 " Size",
3571 " Offset",
3572 "Flags");
3573 else
3574 printf_filtered (" %18s %18s %10s %10s %7s\n",
3575 "Start Addr",
3576 " End Addr",
3577 " Size",
3578 " Offset",
3579 "Flags");
388faa48 3580
831e682e 3581 iterate_over_mappings (pi, NULL, NULL, info_mappings_callback);
388faa48
MS
3582 printf_filtered ("\n");
3583}
3584
77382aee 3585/* Implement the "info proc" command. */
c3f6f71d
JM
3586
3587static void
7bc112c1 3588procfs_info_proc (struct target_ops *ops, const char *args,
145b16a9 3589 enum info_proc_what what)
c906108c 3590{
c3f6f71d 3591 struct cleanup *old_chain;
388faa48
MS
3592 procinfo *process = NULL;
3593 procinfo *thread = NULL;
388faa48
MS
3594 char *tmp = NULL;
3595 int pid = 0;
3596 int tid = 0;
3597 int mappings = 0;
c906108c 3598
145b16a9
UW
3599 switch (what)
3600 {
3601 case IP_MINIMAL:
3602 break;
3603
3604 case IP_MAPPINGS:
3605 case IP_ALL:
3606 mappings = 1;
3607 break;
3608
3609 default:
3610 error (_("Not supported on this target."));
3611 }
3612
c3f6f71d 3613 old_chain = make_cleanup (null_cleanup, 0);
773a1edc 3614 gdb_argv built_argv (args);
4fa7574e 3615 for (char *arg : built_argv)
c3f6f71d 3616 {
773a1edc 3617 if (isdigit (arg[0]))
c3f6f71d 3618 {
773a1edc 3619 pid = strtoul (arg, &tmp, 10);
c3f6f71d
JM
3620 if (*tmp == '/')
3621 tid = strtoul (++tmp, NULL, 10);
3622 }
773a1edc 3623 else if (arg[0] == '/')
c3f6f71d 3624 {
773a1edc 3625 tid = strtoul (arg + 1, NULL, 10);
c3f6f71d 3626 }
c3f6f71d
JM
3627 }
3628 if (pid == 0)
dfd4cc63 3629 pid = ptid_get_pid (inferior_ptid);
c3f6f71d 3630 if (pid == 0)
8a3fe4f8 3631 error (_("No current process: you must name one."));
c3f6f71d 3632 else
c906108c 3633 {
c3f6f71d 3634 /* Have pid, will travel.
0df8b418 3635 First see if it's a process we're already debugging. */
c3f6f71d
JM
3636 process = find_procinfo (pid, 0);
3637 if (process == NULL)
3638 {
19958708 3639 /* No. So open a procinfo for it, but
c3f6f71d
JM
3640 remember to close it again when finished. */
3641 process = create_procinfo (pid, 0);
004527cb 3642 make_cleanup (do_destroy_procinfo_cleanup, process);
c3f6f71d
JM
3643 if (!open_procinfo_files (process, FD_CTL))
3644 proc_error (process, "info proc, open_procinfo_files", __LINE__);
3645 }
c906108c 3646 }
c3f6f71d
JM
3647 if (tid != 0)
3648 thread = create_procinfo (pid, tid);
3649
3650 if (process)
3651 {
a3f17187 3652 printf_filtered (_("process %d flags:\n"), process->pid);
c3f6f71d
JM
3653 proc_prettyprint_flags (proc_flags (process), 1);
3654 if (proc_flags (process) & (PR_STOPPED | PR_ISTOP))
3655 proc_prettyprint_why (proc_why (process), proc_what (process), 1);
3656 if (proc_get_nthreads (process) > 1)
19958708 3657 printf_filtered ("Process has %d threads.\n",
c3f6f71d
JM
3658 proc_get_nthreads (process));
3659 }
3660 if (thread)
3661 {
a3f17187 3662 printf_filtered (_("thread %d flags:\n"), thread->tid);
c3f6f71d
JM
3663 proc_prettyprint_flags (proc_flags (thread), 1);
3664 if (proc_flags (thread) & (PR_STOPPED | PR_ISTOP))
3665 proc_prettyprint_why (proc_why (thread), proc_what (thread), 1);
3666 }
3667
388faa48
MS
3668 if (mappings)
3669 {
3670 info_proc_mappings (process, 0);
3671 }
3672
c3f6f71d 3673 do_cleanups (old_chain);
c906108c
SS
3674}
3675
9185ddce
JB
3676/* Modify the status of the system call identified by SYSCALLNUM in
3677 the set of syscalls that are currently traced/debugged.
3678
3679 If ENTRY_OR_EXIT is set to PR_SYSENTRY, then the entry syscalls set
0df8b418 3680 will be updated. Otherwise, the exit syscalls set will be updated.
9185ddce 3681
0df8b418 3682 If MODE is FLAG_SET, then traces will be enabled. Otherwise, they
9185ddce
JB
3683 will be disabled. */
3684
3685static void
3686proc_trace_syscalls_1 (procinfo *pi, int syscallnum, int entry_or_exit,
77382aee 3687 int mode, int from_tty)
9185ddce
JB
3688{
3689 sysset_t *sysset;
77382aee 3690
9185ddce
JB
3691 if (entry_or_exit == PR_SYSENTRY)
3692 sysset = proc_get_traced_sysentry (pi, NULL);
3693 else
3694 sysset = proc_get_traced_sysexit (pi, NULL);
3695
3696 if (sysset == NULL)
3697 proc_error (pi, "proc-trace, get_traced_sysset", __LINE__);
3698
3699 if (mode == FLAG_SET)
44122162 3700 praddset (sysset, syscallnum);
9185ddce 3701 else
44122162 3702 prdelset (sysset, syscallnum);
9185ddce
JB
3703
3704 if (entry_or_exit == PR_SYSENTRY)
3705 {
3706 if (!proc_set_traced_sysentry (pi, sysset))
77382aee 3707 proc_error (pi, "proc-trace, set_traced_sysentry", __LINE__);
9185ddce
JB
3708 }
3709 else
3710 {
3711 if (!proc_set_traced_sysexit (pi, sysset))
77382aee 3712 proc_error (pi, "proc-trace, set_traced_sysexit", __LINE__);
9185ddce
JB
3713 }
3714}
3715
c3f6f71d 3716static void
0b39b52e 3717proc_trace_syscalls (const char *args, int from_tty, int entry_or_exit, int mode)
c906108c 3718{
c3f6f71d 3719 procinfo *pi;
c906108c 3720
dfd4cc63 3721 if (ptid_get_pid (inferior_ptid) <= 0)
8a3fe4f8 3722 error (_("you must be debugging a process to use this command."));
c906108c 3723
c3f6f71d 3724 if (args == NULL || args[0] == 0)
e2e0b3e5 3725 error_no_arg (_("system call to trace"));
c3f6f71d 3726
dfd4cc63 3727 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
c3f6f71d
JM
3728 if (isdigit (args[0]))
3729 {
9185ddce 3730 const int syscallnum = atoi (args);
c906108c 3731
9185ddce 3732 proc_trace_syscalls_1 (pi, syscallnum, entry_or_exit, mode, from_tty);
c3f6f71d
JM
3733 }
3734}
3735
19958708 3736static void
0b39b52e 3737proc_trace_sysentry_cmd (const char *args, int from_tty)
c906108c 3738{
c3f6f71d
JM
3739 proc_trace_syscalls (args, from_tty, PR_SYSENTRY, FLAG_SET);
3740}
c906108c 3741
19958708 3742static void
0b39b52e 3743proc_trace_sysexit_cmd (const char *args, int from_tty)
c3f6f71d
JM
3744{
3745 proc_trace_syscalls (args, from_tty, PR_SYSEXIT, FLAG_SET);
c906108c 3746}
c906108c 3747
19958708 3748static void
0b39b52e 3749proc_untrace_sysentry_cmd (const char *args, int from_tty)
c3f6f71d
JM
3750{
3751 proc_trace_syscalls (args, from_tty, PR_SYSENTRY, FLAG_RESET);
3752}
3753
19958708 3754static void
0b39b52e 3755proc_untrace_sysexit_cmd (const char *args, int from_tty)
c906108c 3756{
c3f6f71d
JM
3757 proc_trace_syscalls (args, from_tty, PR_SYSEXIT, FLAG_RESET);
3758}
c906108c 3759
c906108c 3760void
fba45db2 3761_initialize_procfs (void)
c906108c 3762{
27087a3d
JB
3763 observer_attach_inferior_created (procfs_inferior_created);
3764
19958708 3765 add_com ("proc-trace-entry", no_class, proc_trace_sysentry_cmd,
1bedd215 3766 _("Give a trace of entries into the syscall."));
19958708 3767 add_com ("proc-trace-exit", no_class, proc_trace_sysexit_cmd,
1bedd215 3768 _("Give a trace of exits from the syscall."));
19958708 3769 add_com ("proc-untrace-entry", no_class, proc_untrace_sysentry_cmd,
1bedd215 3770 _("Cancel a trace of entries into the syscall."));
19958708 3771 add_com ("proc-untrace-exit", no_class, proc_untrace_sysexit_cmd,
1bedd215 3772 _("Cancel a trace of exits from the syscall."));
c3f6f71d
JM
3773}
3774
3775/* =================== END, GDB "MODULE" =================== */
3776
3777
3778
77382aee
PA
3779/* miscellaneous stubs: */
3780
3781/* The following satisfy a few random symbols mostly created by the
3782 solaris threads implementation, which I will chase down later. */
c3f6f71d 3783
77382aee
PA
3784/* Return a pid for which we guarantee we will be able to find a
3785 'live' procinfo. */
c3f6f71d 3786
39f77062 3787ptid_t
fba45db2 3788procfs_first_available (void)
c3f6f71d 3789{
39f77062 3790 return pid_to_ptid (procinfo_list ? procinfo_list->pid : -1);
c3f6f71d 3791}
be4d1333
MS
3792
3793/* =================== GCORE .NOTE "MODULE" =================== */
3794
3795static char *
19958708 3796procfs_do_thread_registers (bfd *obfd, ptid_t ptid,
2020b7ab 3797 char *note_data, int *note_size,
2ea28649 3798 enum gdb_signal stop_signal)
be4d1333 3799{
594f7785 3800 struct regcache *regcache = get_thread_regcache (ptid);
be4d1333
MS
3801 gdb_gregset_t gregs;
3802 gdb_fpregset_t fpregs;
3803 unsigned long merged_pid;
3804
dfd4cc63 3805 merged_pid = ptid_get_lwp (ptid) << 16 | ptid_get_pid (ptid);
be4d1333 3806
75125405
DJ
3807 /* This part is the old method for fetching registers.
3808 It should be replaced by the newer one using regsets
3809 once it is implemented in this platform:
29082443 3810 gdbarch_iterate_over_regset_sections(). */
75125405 3811
2989a365 3812 scoped_restore save_inferior_ptid = make_scoped_restore (&inferior_ptid);
75125405
DJ
3813 inferior_ptid = ptid;
3814 target_fetch_registers (regcache, -1);
3815
594f7785 3816 fill_gregset (regcache, &gregs, -1);
65554fef
MS
3817 note_data = (char *) elfcore_write_lwpstatus (obfd,
3818 note_data,
3819 note_size,
19958708 3820 merged_pid,
65554fef
MS
3821 stop_signal,
3822 &gregs);
594f7785 3823 fill_fpregset (regcache, &fpregs, -1);
be4d1333
MS
3824 note_data = (char *) elfcore_write_prfpreg (obfd,
3825 note_data,
3826 note_size,
3827 &fpregs,
3828 sizeof (fpregs));
75125405 3829
be4d1333
MS
3830 return note_data;
3831}
3832
3833struct procfs_corefile_thread_data {
3834 bfd *obfd;
3835 char *note_data;
3836 int *note_size;
2ea28649 3837 enum gdb_signal stop_signal;
be4d1333
MS
3838};
3839
3840static int
65554fef 3841procfs_corefile_thread_callback (procinfo *pi, procinfo *thread, void *data)
be4d1333 3842{
b196bc4c
RO
3843 struct procfs_corefile_thread_data *args
3844 = (struct procfs_corefile_thread_data *) data;
be4d1333 3845
2689673f 3846 if (pi != NULL)
be4d1333 3847 {
dfd4cc63 3848 ptid_t ptid = ptid_build (pi->pid, thread->tid, 0);
f4a14ae6 3849
75125405 3850 args->note_data = procfs_do_thread_registers (args->obfd, ptid,
19958708 3851 args->note_data,
2020b7ab
PA
3852 args->note_size,
3853 args->stop_signal);
be4d1333
MS
3854 }
3855 return 0;
3856}
3857
a223f1e7
JB
3858static int
3859find_signalled_thread (struct thread_info *info, void *data)
3860{
a493e3e2 3861 if (info->suspend.stop_signal != GDB_SIGNAL_0
a223f1e7
JB
3862 && ptid_get_pid (info->ptid) == ptid_get_pid (inferior_ptid))
3863 return 1;
3864
3865 return 0;
3866}
3867
2ea28649 3868static enum gdb_signal
a223f1e7
JB
3869find_stop_signal (void)
3870{
3871 struct thread_info *info =
3872 iterate_over_threads (find_signalled_thread, NULL);
3873
3874 if (info)
16c381f0 3875 return info->suspend.stop_signal;
a223f1e7 3876 else
a493e3e2 3877 return GDB_SIGNAL_0;
a223f1e7
JB
3878}
3879
be4d1333 3880static char *
fc6691b2 3881procfs_make_note_section (struct target_ops *self, bfd *obfd, int *note_size)
be4d1333
MS
3882{
3883 struct cleanup *old_chain;
3884 gdb_gregset_t gregs;
3885 gdb_fpregset_t fpregs;
3886 char fname[16] = {'\0'};
3887 char psargs[80] = {'\0'};
dfd4cc63 3888 procinfo *pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
be4d1333 3889 char *note_data = NULL;
6dbdc4a3 3890 char *inf_args;
be4d1333 3891 struct procfs_corefile_thread_data thread_args;
0b62613e 3892 gdb_byte *auxv;
4e73f23d 3893 int auxv_len;
2ea28649 3894 enum gdb_signal stop_signal;
be4d1333
MS
3895
3896 if (get_exec_file (0))
3897 {
9f37bbcc 3898 strncpy (fname, lbasename (get_exec_file (0)), sizeof (fname));
4e2af517
JM
3899 fname[sizeof (fname) - 1] = 0;
3900 strncpy (psargs, get_exec_file (0), sizeof (psargs));
3901 psargs[sizeof (psargs) - 1] = 0;
6dbdc4a3
MS
3902
3903 inf_args = get_inferior_args ();
3904 if (inf_args && *inf_args &&
3905 strlen (inf_args) < ((int) sizeof (psargs) - (int) strlen (psargs)))
be4d1333 3906 {
19958708 3907 strncat (psargs, " ",
be4d1333 3908 sizeof (psargs) - strlen (psargs));
19958708 3909 strncat (psargs, inf_args,
be4d1333
MS
3910 sizeof (psargs) - strlen (psargs));
3911 }
3912 }
3913
19958708
RM
3914 note_data = (char *) elfcore_write_prpsinfo (obfd,
3915 note_data,
3916 note_size,
3917 fname,
be4d1333
MS
3918 psargs);
3919
651c8d2d
PA
3920 stop_signal = find_stop_signal ();
3921
3e3420f6
PA
3922 fill_gregset (get_current_regcache (), &gregs, -1);
3923 note_data = elfcore_write_pstatus (obfd, note_data, note_size,
dfd4cc63 3924 ptid_get_pid (inferior_ptid),
3e3420f6 3925 stop_signal, &gregs);
3e3420f6 3926
be4d1333
MS
3927 thread_args.obfd = obfd;
3928 thread_args.note_data = note_data;
3929 thread_args.note_size = note_size;
651c8d2d 3930 thread_args.stop_signal = stop_signal;
3e43a32a
MS
3931 proc_iterate_over_threads (pi, procfs_corefile_thread_callback,
3932 &thread_args);
2689673f 3933 note_data = thread_args.note_data;
be4d1333 3934
13547ab6
DJ
3935 auxv_len = target_read_alloc (&current_target, TARGET_OBJECT_AUXV,
3936 NULL, &auxv);
4e73f23d
RM
3937 if (auxv_len > 0)
3938 {
3939 note_data = elfcore_write_note (obfd, note_data, note_size,
3940 "CORE", NT_AUXV, auxv, auxv_len);
3941 xfree (auxv);
3942 }
3943
be4d1333
MS
3944 return note_data;
3945}
be4d1333 3946/* =================== END GCORE .NOTE "MODULE" =================== */