[gdb/testsuite] Fix gdb.base/coredump-filter-build-id.exp with older eu-unstrip
[deliverable/binutils-gdb.git] / gdb / procfs.c
CommitLineData
44122162 1/* Machine independent support for Solaris /proc (process file system) for GDB.
2555fe1a 2
3666a048 3 Copyright (C) 1999-2021 Free Software Foundation, Inc.
2555fe1a 4
c3f6f71d
JM
5 Written by Michael Snyder at Cygnus Solutions.
6 Based on work by Fred Fish, Stu Grossman, Geoff Noer, and others.
c906108c 7
a9762ec7
JB
8 This file is part of GDB.
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
14
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
21 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c 22
c3f6f71d
JM
23#include "defs.h"
24#include "inferior.h"
45741a9c 25#include "infrun.h"
c3f6f71d
JM
26#include "target.h"
27#include "gdbcore.h"
65554fef 28#include "elf-bfd.h" /* for elfcore_write_* */
c3f6f71d 29#include "gdbcmd.h"
0fda6bd2 30#include "gdbthread.h"
7f7fe91e 31#include "regcache.h"
28439f5e 32#include "inf-child.h"
4fa7574e 33#include "nat/fork-inferior.h"
0d12e84c 34#include "gdbarch.h"
c906108c 35
c3f6f71d
JM
36#include <sys/procfs.h>
37#include <sys/fault.h>
38#include <sys/syscall.h>
268a13a5 39#include "gdbsupport/gdb_wait.h"
0fda6bd2
JM
40#include <signal.h>
41#include <ctype.h>
92107356 42#include "gdb_bfd.h"
4e73f23d 43#include "auxv.h"
d1a7880c 44#include "procfs.h"
76727919 45#include "observable.h"
268a13a5
TT
46#include "gdbsupport/scoped_fd.h"
47#include "gdbsupport/pathstuff.h"
0fda6bd2 48
77382aee
PA
49/* This module provides the interface between GDB and the
50 /proc file system, which is used on many versions of Unix
51 as a means for debuggers to control other processes.
52
77382aee
PA
53 /proc works by imitating a file system: you open a simulated file
54 that represents the process you wish to interact with, and perform
55 operations on that "file" in order to examine or change the state
56 of the other process.
57
58 The most important thing to know about /proc and this module is
59 that there are two very different interfaces to /proc:
60
61 One that uses the ioctl system call, and another that uses read
62 and write system calls.
63
44122162
RO
64 This module supports only the Solaris version of the read/write
65 interface. */
77382aee 66
c906108c 67#include <sys/types.h>
2978b111 68#include <dirent.h> /* opendir/readdir, for listing the LWP's */
c906108c 69
c3f6f71d
JM
70#include <fcntl.h> /* for O_RDONLY */
71#include <unistd.h> /* for "X_OK" */
53ce3c39 72#include <sys/stat.h> /* for struct stat */
c906108c 73
103b3ef5
MS
74/* Note: procfs-utils.h must be included after the above system header
75 files, because it redefines various system calls using macros.
76 This may be incompatible with the prototype declarations. */
77
103b3ef5
MS
78#include "proc-utils.h"
79
77382aee 80/* Prototypes for supply_gregset etc. */
c60c0f5f
MS
81#include "gregset.h"
82
c3f6f71d 83/* =================== TARGET_OPS "MODULE" =================== */
c906108c 84
77382aee 85/* This module defines the GDB target vector and its methods. */
c906108c 86
f6ac5f3d 87
e96027e0
PA
88static enum target_xfer_status procfs_xfer_memory (gdb_byte *,
89 const gdb_byte *,
90 ULONGEST, ULONGEST,
91 ULONGEST *);
a14ed312 92
f6ac5f3d
PA
93class procfs_target final : public inf_child_target
94{
95public:
96 void create_inferior (const char *, const std::string &,
97 char **, int) override;
98
99 void kill () override;
100
101 void mourn_inferior () override;
102
103 void attach (const char *, int) override;
104 void detach (inferior *inf, int) override;
105
106 void resume (ptid_t, int, enum gdb_signal) override;
b60cea74 107 ptid_t wait (ptid_t, struct target_waitstatus *, target_wait_flags) override;
f6ac5f3d
PA
108
109 void fetch_registers (struct regcache *, int) override;
110 void store_registers (struct regcache *, int) override;
111
112 enum target_xfer_status xfer_partial (enum target_object object,
113 const char *annex,
114 gdb_byte *readbuf,
115 const gdb_byte *writebuf,
116 ULONGEST offset, ULONGEST len,
117 ULONGEST *xfered_len) override;
118
adc6a863 119 void pass_signals (gdb::array_view<const unsigned char>) override;
a14ed312 120
f6ac5f3d 121 void files_info () override;
c3f6f71d 122
f6ac5f3d 123 void update_thread_list () override;
be4d1333 124
57810aa7 125 bool thread_alive (ptid_t ptid) override;
be4d1333 126
a068643d 127 std::string pid_to_str (ptid_t) override;
1e03ad20 128
4206c05e
RO
129 char *pid_to_exec_file (int pid) override;
130
f6ac5f3d
PA
131 thread_control_capabilities get_thread_control_capabilities () override
132 { return tc_schedlock; }
145b16a9 133
f6ac5f3d
PA
134 /* find_memory_regions support method for gcore */
135 int find_memory_regions (find_memory_region_ftype func, void *data)
136 override;
b5c8fcb1 137
24f5300a 138 gdb::unique_xmalloc_ptr<char> make_corefile_notes (bfd *, int *) override;
b5c8fcb1 139
f6ac5f3d
PA
140 bool info_proc (const char *, enum info_proc_what) override;
141
c475f569 142#if PR_MODEL_NATIVE == PR_MODEL_LP64
f6ac5f3d
PA
143 int auxv_parse (gdb_byte **readptr,
144 gdb_byte *endptr, CORE_ADDR *typep, CORE_ADDR *valp)
145 override;
146#endif
147
57810aa7 148 bool stopped_by_watchpoint () override;
f6ac5f3d
PA
149
150 int insert_watchpoint (CORE_ADDR, int, enum target_hw_bp_type,
151 struct expression *) override;
152
153 int remove_watchpoint (CORE_ADDR, int, enum target_hw_bp_type,
154 struct expression *) override;
155
156 int region_ok_for_hw_watchpoint (CORE_ADDR, int) override;
157
158 int can_use_hw_breakpoint (enum bptype, int, int) override;
57810aa7 159 bool stopped_data_address (CORE_ADDR *) override;
5b6d1e4f
PA
160
161 void procfs_init_inferior (int pid);
f6ac5f3d 162};
b5c8fcb1 163
f6ac5f3d 164static procfs_target the_procfs_target;
b5c8fcb1 165
c475f569 166#if PR_MODEL_NATIVE == PR_MODEL_LP64
77382aee
PA
167/* When GDB is built as 64-bit application on Solaris, the auxv data
168 is presented in 64-bit format. We need to provide a custom parser
169 to handle that. */
f6ac5f3d
PA
170int
171procfs_target::auxv_parse (gdb_byte **readptr,
172 gdb_byte *endptr, CORE_ADDR *typep, CORE_ADDR *valp)
c47ffbe3 173{
f5656ead 174 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
c47ffbe3
VP
175 gdb_byte *ptr = *readptr;
176
177 if (endptr == ptr)
178 return 0;
77382aee 179
c47ffbe3
VP
180 if (endptr - ptr < 8 * 2)
181 return -1;
182
e17a4113 183 *typep = extract_unsigned_integer (ptr, 4, byte_order);
c47ffbe3
VP
184 ptr += 8;
185 /* The size of data is always 64-bit. If the application is 32-bit,
186 it will be zero extended, as expected. */
e17a4113 187 *valp = extract_unsigned_integer (ptr, 8, byte_order);
c47ffbe3
VP
188 ptr += 8;
189
190 *readptr = ptr;
191 return 1;
192}
193#endif
194
c3f6f71d
JM
195/* =================== END, TARGET_OPS "MODULE" =================== */
196
c3f6f71d
JM
197/* =================== STRUCT PROCINFO "MODULE" =================== */
198
199 /* FIXME: this comment will soon be out of date W.R.T. threads. */
200
201/* The procinfo struct is a wrapper to hold all the state information
202 concerning a /proc process. There should be exactly one procinfo
203 for each process, and since GDB currently can debug only one
204 process at a time, that means there should be only one procinfo.
205 All of the LWP's of a process can be accessed indirectly thru the
206 single process procinfo.
207
208 However, against the day when GDB may debug more than one process,
209 this data structure is kept in a list (which for now will hold no
210 more than one member), and many functions will have a pointer to a
211 procinfo as an argument.
212
213 There will be a separate procinfo structure for use by the (not yet
214 implemented) "info proc" command, so that we can print useful
215 information about any random process without interfering with the
0df8b418 216 inferior's procinfo information. */
c3f6f71d 217
c3f6f71d 218/* format strings for /proc paths */
44122162
RO
219#define CTL_PROC_NAME_FMT "/proc/%d/ctl"
220#define AS_PROC_NAME_FMT "/proc/%d/as"
221#define MAP_PROC_NAME_FMT "/proc/%d/map"
222#define STATUS_PROC_NAME_FMT "/proc/%d/status"
13db92d3 223#define MAX_PROC_NAME_SIZE sizeof("/proc/999999/lwp/0123456789/lwpstatus")
c906108c 224
c3f6f71d
JM
225typedef struct procinfo {
226 struct procinfo *next;
227 int pid; /* Process ID */
228 int tid; /* Thread/LWP id */
c906108c 229
c3f6f71d
JM
230 /* process state */
231 int was_stopped;
232 int ignore_next_sigstop;
c906108c 233
c3f6f71d 234 int ctl_fd; /* File descriptor for /proc control file */
c3f6f71d
JM
235 int status_fd; /* File descriptor for /proc status file */
236 int as_fd; /* File descriptor for /proc as file */
c906108c 237
c3f6f71d 238 char pathname[MAX_PROC_NAME_SIZE]; /* Pathname to /proc entry */
c906108c 239
c3f6f71d 240 fltset_t saved_fltset; /* Saved traced hardware fault set */
44122162
RO
241 sigset_t saved_sigset; /* Saved traced signal set */
242 sigset_t saved_sighold; /* Saved held signal set */
37de36c6
KB
243 sysset_t *saved_exitset; /* Saved traced system call exit set */
244 sysset_t *saved_entryset; /* Saved traced system call entry set */
c906108c 245
44122162 246 pstatus_t prstatus; /* Current process status info */
19958708 247
c3f6f71d 248 struct procinfo *thread_list;
c906108c 249
c3f6f71d
JM
250 int status_valid : 1;
251 int gregs_valid : 1;
252 int fpregs_valid : 1;
253 int threads_valid: 1;
254} procinfo;
c906108c 255
c3f6f71d 256static char errmsg[128]; /* shared error msg buffer */
c906108c 257
c3f6f71d 258/* Function prototypes for procinfo module: */
c906108c 259
a14ed312
KB
260static procinfo *find_procinfo_or_die (int pid, int tid);
261static procinfo *find_procinfo (int pid, int tid);
262static procinfo *create_procinfo (int pid, int tid);
44122162 263static void destroy_procinfo (procinfo *p);
44122162
RO
264static void dead_procinfo (procinfo *p, const char *msg, int killp);
265static int open_procinfo_files (procinfo *p, int which);
266static void close_procinfo_files (procinfo *p);
c906108c 267
e9ef4f39 268static int iterate_over_mappings
b8edc417
JK
269 (procinfo *pi, find_memory_region_ftype child_func, void *data,
270 int (*func) (struct prmap *map, find_memory_region_ftype child_func,
77382aee 271 void *data));
e9ef4f39 272
c3f6f71d 273/* The head of the procinfo list: */
44122162 274static procinfo *procinfo_list;
c906108c 275
77382aee
PA
276/* Search the procinfo list. Return a pointer to procinfo, or NULL if
277 not found. */
c906108c 278
19958708 279static procinfo *
fba45db2 280find_procinfo (int pid, int tid)
c5aa993b 281{
c3f6f71d 282 procinfo *pi;
c906108c 283
c3f6f71d
JM
284 for (pi = procinfo_list; pi; pi = pi->next)
285 if (pi->pid == pid)
286 break;
c906108c 287
c3f6f71d
JM
288 if (pi)
289 if (tid)
290 {
291 /* Don't check threads_valid. If we're updating the
292 thread_list, we want to find whatever threads are already
293 here. This means that in general it is the caller's
294 responsibility to check threads_valid and update before
295 calling find_procinfo, if the caller wants to find a new
77382aee 296 thread. */
c3f6f71d
JM
297
298 for (pi = pi->thread_list; pi; pi = pi->next)
299 if (pi->tid == tid)
300 break;
301 }
c906108c 302
c3f6f71d
JM
303 return pi;
304}
c906108c 305
77382aee 306/* Calls find_procinfo, but errors on failure. */
c906108c 307
c3f6f71d 308static procinfo *
fba45db2 309find_procinfo_or_die (int pid, int tid)
c3f6f71d
JM
310{
311 procinfo *pi = find_procinfo (pid, tid);
c906108c 312
c3f6f71d 313 if (pi == NULL)
0fda6bd2
JM
314 {
315 if (tid)
3e43a32a
MS
316 error (_("procfs: couldn't find pid %d "
317 "(kernel thread %d) in procinfo list."),
0fda6bd2
JM
318 pid, tid);
319 else
8a3fe4f8 320 error (_("procfs: couldn't find pid %d in procinfo list."), pid);
0fda6bd2 321 }
c3f6f71d
JM
322 return pi;
323}
c906108c 324
77382aee
PA
325/* Wrapper for `open'. The appropriate open call is attempted; if
326 unsuccessful, it will be retried as many times as needed for the
327 EAGAIN and EINTR conditions.
19958708 328
77382aee
PA
329 For other conditions, retry the open a limited number of times. In
330 addition, a short sleep is imposed prior to retrying the open. The
331 reason for this sleep is to give the kernel a chance to catch up
332 and create the file in question in the event that GDB "wins" the
333 race to open a file before the kernel has created it. */
19958708 334
4d1bcd09
KB
335static int
336open_with_retry (const char *pathname, int flags)
337{
338 int retries_remaining, status;
339
340 retries_remaining = 2;
341
342 while (1)
343 {
344 status = open (pathname, flags);
345
346 if (status >= 0 || retries_remaining == 0)
347 break;
348 else if (errno != EINTR && errno != EAGAIN)
349 {
350 retries_remaining--;
351 sleep (1);
352 }
353 }
354
355 return status;
356}
357
44122162
RO
358/* Open the file descriptor for the process or LWP. We only open the
359 control file descriptor; the others are opened lazily as needed.
77382aee 360 Returns the file descriptor, or zero for failure. */
c906108c 361
c3f6f71d 362enum { FD_CTL, FD_STATUS, FD_AS };
c906108c 363
c3f6f71d 364static int
fba45db2 365open_procinfo_files (procinfo *pi, int which)
c3f6f71d
JM
366{
367 char tmp[MAX_PROC_NAME_SIZE];
368 int fd;
369
77382aee
PA
370 /* This function is getting ALMOST long enough to break up into
371 several. Here is some rationale:
372
77382aee 373 There are several file descriptors that may need to be open
196535a6 374 for any given process or LWP. The ones we're interested in are:
77382aee
PA
375 - control (ctl) write-only change the state
376 - status (status) read-only query the state
377 - address space (as) read/write access memory
378 - map (map) read-only virtual addr map
196535a6
RO
379 Most of these are opened lazily as they are needed.
380 The pathnames for the 'files' for an LWP look slightly
381 different from those of a first-class process:
77382aee
PA
382 Pathnames for a process (<proc-id>):
383 /proc/<proc-id>/ctl
384 /proc/<proc-id>/status
385 /proc/<proc-id>/as
386 /proc/<proc-id>/map
387 Pathnames for an LWP (lwp-id):
388 /proc/<proc-id>/lwp/<lwp-id>/lwpctl
389 /proc/<proc-id>/lwp/<lwp-id>/lwpstatus
196535a6
RO
390 An LWP has no map or address space file descriptor, since
391 the memory map and address space are shared by all LWPs. */
44122162 392
77382aee
PA
393 /* In this case, there are several different file descriptors that
394 we might be asked to open. The control file descriptor will be
395 opened early, but the others will be opened lazily as they are
396 needed. */
c3f6f71d
JM
397
398 strcpy (tmp, pi->pathname);
0df8b418 399 switch (which) { /* Which file descriptor to open? */
c3f6f71d
JM
400 case FD_CTL:
401 if (pi->tid)
402 strcat (tmp, "/lwpctl");
403 else
404 strcat (tmp, "/ctl");
4d1bcd09 405 fd = open_with_retry (tmp, O_WRONLY);
e28cade7 406 if (fd < 0)
c3f6f71d
JM
407 return 0; /* fail */
408 pi->ctl_fd = fd;
409 break;
410 case FD_AS:
411 if (pi->tid)
0df8b418 412 return 0; /* There is no 'as' file descriptor for an lwp. */
c3f6f71d 413 strcat (tmp, "/as");
4d1bcd09 414 fd = open_with_retry (tmp, O_RDWR);
e28cade7 415 if (fd < 0)
c3f6f71d
JM
416 return 0; /* fail */
417 pi->as_fd = fd;
418 break;
419 case FD_STATUS:
420 if (pi->tid)
421 strcat (tmp, "/lwpstatus");
422 else
423 strcat (tmp, "/status");
4d1bcd09 424 fd = open_with_retry (tmp, O_RDONLY);
e28cade7 425 if (fd < 0)
c3f6f71d
JM
426 return 0; /* fail */
427 pi->status_fd = fd;
428 break;
429 default:
430 return 0; /* unknown file descriptor */
431 }
c906108c 432
c3f6f71d
JM
433 return 1; /* success */
434}
c906108c 435
77382aee
PA
436/* Allocate a data structure and link it into the procinfo list.
437 First tries to find a pre-existing one (FIXME: why?). Returns the
438 pointer to new procinfo struct. */
c906108c 439
c3f6f71d 440static procinfo *
fba45db2 441create_procinfo (int pid, int tid)
c3f6f71d 442{
0b62613e 443 procinfo *pi, *parent = NULL;
c906108c 444
c475f569
RO
445 pi = find_procinfo (pid, tid);
446 if (pi != NULL)
0df8b418 447 return pi; /* Already exists, nothing to do. */
c906108c 448
0df8b418 449 /* Find parent before doing malloc, to save having to cleanup. */
c3f6f71d
JM
450 if (tid != 0)
451 parent = find_procinfo_or_die (pid, 0); /* FIXME: should I
452 create it if it
0df8b418 453 doesn't exist yet? */
c906108c 454
8d749320 455 pi = XNEW (procinfo);
c3f6f71d
JM
456 memset (pi, 0, sizeof (procinfo));
457 pi->pid = pid;
458 pi->tid = tid;
c906108c 459
c475f569
RO
460 pi->saved_entryset = XNEW (sysset_t);
461 pi->saved_exitset = XNEW (sysset_t);
1d5e0602 462
c3f6f71d
JM
463 /* Chain into list. */
464 if (tid == 0)
465 {
196535a6 466 xsnprintf (pi->pathname, sizeof (pi->pathname), "/proc/%d", pid);
c3f6f71d
JM
467 pi->next = procinfo_list;
468 procinfo_list = pi;
469 }
470 else
471 {
c475f569
RO
472 xsnprintf (pi->pathname, sizeof (pi->pathname), "/proc/%d/lwp/%d",
473 pid, tid);
c3f6f71d
JM
474 pi->next = parent->thread_list;
475 parent->thread_list = pi;
476 }
477 return pi;
478}
c906108c 479
77382aee 480/* Close all file descriptors associated with the procinfo. */
c906108c 481
c3f6f71d 482static void
fba45db2 483close_procinfo_files (procinfo *pi)
c3f6f71d
JM
484{
485 if (pi->ctl_fd > 0)
486 close (pi->ctl_fd);
c3f6f71d
JM
487 if (pi->as_fd > 0)
488 close (pi->as_fd);
489 if (pi->status_fd > 0)
490 close (pi->status_fd);
c3f6f71d
JM
491 pi->ctl_fd = pi->as_fd = pi->status_fd = 0;
492}
c906108c 493
77382aee 494/* Destructor function. Close, unlink and deallocate the object. */
c906108c 495
c3f6f71d 496static void
fba45db2 497destroy_one_procinfo (procinfo **list, procinfo *pi)
c3f6f71d
JM
498{
499 procinfo *ptr;
500
77382aee 501 /* Step one: unlink the procinfo from its list. */
c3f6f71d
JM
502 if (pi == *list)
503 *list = pi->next;
19958708 504 else
c3f6f71d
JM
505 for (ptr = *list; ptr; ptr = ptr->next)
506 if (ptr->next == pi)
507 {
508 ptr->next = pi->next;
509 break;
510 }
7a292a7a 511
77382aee 512 /* Step two: close any open file descriptors. */
c3f6f71d 513 close_procinfo_files (pi);
7a292a7a 514
77382aee 515 /* Step three: free the memory. */
1d5e0602
KB
516 xfree (pi->saved_entryset);
517 xfree (pi->saved_exitset);
b8c9b27d 518 xfree (pi);
c3f6f71d 519}
c906108c 520
c3f6f71d 521static void
fba45db2 522destroy_procinfo (procinfo *pi)
c3f6f71d
JM
523{
524 procinfo *tmp;
c906108c 525
0df8b418 526 if (pi->tid != 0) /* Destroy a thread procinfo. */
c3f6f71d 527 {
0df8b418 528 tmp = find_procinfo (pi->pid, 0); /* Find the parent process. */
c3f6f71d
JM
529 destroy_one_procinfo (&tmp->thread_list, pi);
530 }
0df8b418 531 else /* Destroy a process procinfo and all its threads. */
c3f6f71d
JM
532 {
533 /* First destroy the children, if any; */
534 while (pi->thread_list != NULL)
535 destroy_one_procinfo (&pi->thread_list, pi->thread_list);
536 /* Then destroy the parent. Genocide!!! */
537 destroy_one_procinfo (&procinfo_list, pi);
538 }
539}
c906108c 540
5b4cbbe3
TT
541/* A deleter that calls destroy_procinfo. */
542struct procinfo_deleter
004527cb 543{
5b4cbbe3
TT
544 void operator() (procinfo *pi) const
545 {
546 destroy_procinfo (pi);
547 }
548};
549
550typedef std::unique_ptr<procinfo, procinfo_deleter> procinfo_up;
004527cb 551
c3f6f71d 552enum { NOKILL, KILL };
c906108c 553
77382aee
PA
554/* To be called on a non_recoverable error for a procinfo. Prints
555 error messages, optionally sends a SIGKILL to the process, then
556 destroys the data structure. */
c906108c 557
c3f6f71d 558static void
995816ba 559dead_procinfo (procinfo *pi, const char *msg, int kill_p)
c3f6f71d
JM
560{
561 char procfile[80];
c906108c 562
c3f6f71d 563 if (pi->pathname)
c475f569 564 print_sys_errmsg (pi->pathname, errno);
c3f6f71d
JM
565 else
566 {
c475f569 567 xsnprintf (procfile, sizeof (procfile), "process %d", pi->pid);
c3f6f71d
JM
568 print_sys_errmsg (procfile, errno);
569 }
570 if (kill_p == KILL)
571 kill (pi->pid, SIGKILL);
c906108c 572
c3f6f71d 573 destroy_procinfo (pi);
0b62613e 574 error ("%s", msg);
c3f6f71d 575}
c906108c 576
c3f6f71d 577/* =================== END, STRUCT PROCINFO "MODULE" =================== */
c906108c 578
196535a6 579/* =================== /proc "MODULE" =================== */
c906108c 580
77382aee
PA
581/* This "module" is the interface layer between the /proc system API
582 and the gdb target vector functions. This layer consists of access
583 functions that encapsulate each of the basic operations that we
584 need to use from the /proc API.
585
586 The main motivation for this layer is to hide the fact that there
196535a6 587 were two very different implementations of the /proc API. */
c906108c 588
44122162
RO
589static long proc_flags (procinfo *pi);
590static int proc_why (procinfo *pi);
591static int proc_what (procinfo *pi);
592static int proc_set_current_signal (procinfo *pi, int signo);
593static int proc_get_current_thread (procinfo *pi);
d3581e61 594static int proc_iterate_over_threads
44122162 595 (procinfo *pi,
d3581e61
JB
596 int (*func) (procinfo *, procinfo *, void *),
597 void *ptr);
598
599static void
995816ba 600proc_warn (procinfo *pi, const char *func, int line)
c3f6f71d 601{
c475f569
RO
602 xsnprintf (errmsg, sizeof (errmsg), "procfs: %s line %d, %s",
603 func, line, pi->pathname);
c3f6f71d
JM
604 print_sys_errmsg (errmsg, errno);
605}
c906108c 606
d3581e61 607static void
995816ba 608proc_error (procinfo *pi, const char *func, int line)
c3f6f71d 609{
c475f569
RO
610 xsnprintf (errmsg, sizeof (errmsg), "procfs: %s line %d, %s",
611 func, line, pi->pathname);
c3f6f71d
JM
612 perror_with_name (errmsg);
613}
c906108c 614
77382aee
PA
615/* Updates the status struct in the procinfo. There is a 'valid'
616 flag, to let other functions know when this function needs to be
617 called (so the status is only read when it is needed). The status
618 file descriptor is also only opened when it is needed. Returns
619 non-zero for success, zero for failure. */
c906108c 620
d3581e61 621static int
fba45db2 622proc_get_status (procinfo *pi)
c3f6f71d 623{
0df8b418 624 /* Status file descriptor is opened "lazily". */
c475f569 625 if (pi->status_fd == 0 && open_procinfo_files (pi, FD_STATUS) == 0)
c3f6f71d
JM
626 {
627 pi->status_valid = 0;
628 return 0;
629 }
c906108c 630
c3f6f71d
JM
631 if (lseek (pi->status_fd, 0, SEEK_SET) < 0)
632 pi->status_valid = 0; /* fail */
633 else
634 {
19958708 635 /* Sigh... I have to read a different data structure,
0df8b418 636 depending on whether this is a main process or an LWP. */
c3f6f71d 637 if (pi->tid)
19958708
RM
638 pi->status_valid = (read (pi->status_fd,
639 (char *) &pi->prstatus.pr_lwp,
c3f6f71d
JM
640 sizeof (lwpstatus_t))
641 == sizeof (lwpstatus_t));
642 else
643 {
19958708 644 pi->status_valid = (read (pi->status_fd,
c3f6f71d 645 (char *) &pi->prstatus,
44122162
RO
646 sizeof (pstatus_t))
647 == sizeof (pstatus_t));
c3f6f71d
JM
648 }
649 }
c906108c 650
c3f6f71d
JM
651 if (pi->status_valid)
652 {
19958708 653 PROC_PRETTYFPRINT_STATUS (proc_flags (pi),
c3f6f71d 654 proc_why (pi),
19958708 655 proc_what (pi),
c3f6f71d
JM
656 proc_get_current_thread (pi));
657 }
c906108c 658
77382aee 659 /* The status struct includes general regs, so mark them valid too. */
c3f6f71d 660 pi->gregs_valid = pi->status_valid;
77382aee
PA
661 /* In the read/write multiple-fd model, the status struct includes
662 the fp regs too, so mark them valid too. */
c3f6f71d 663 pi->fpregs_valid = pi->status_valid;
77382aee 664 return pi->status_valid; /* True if success, false if failure. */
c3f6f71d 665}
c906108c 666
77382aee 667/* Returns the process flags (pr_flags field). */
c3f6f71d 668
d3581e61 669static long
fba45db2 670proc_flags (procinfo *pi)
c3f6f71d
JM
671{
672 if (!pi->status_valid)
673 if (!proc_get_status (pi))
0df8b418 674 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 675
c3f6f71d 676 return pi->prstatus.pr_lwp.pr_flags;
c3f6f71d 677}
c906108c 678
77382aee 679/* Returns the pr_why field (why the process stopped). */
c906108c 680
d3581e61 681static int
fba45db2 682proc_why (procinfo *pi)
c3f6f71d
JM
683{
684 if (!pi->status_valid)
685 if (!proc_get_status (pi))
0df8b418 686 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 687
c3f6f71d 688 return pi->prstatus.pr_lwp.pr_why;
c3f6f71d 689}
c906108c 690
77382aee 691/* Returns the pr_what field (details of why the process stopped). */
c906108c 692
d3581e61 693static int
fba45db2 694proc_what (procinfo *pi)
c3f6f71d
JM
695{
696 if (!pi->status_valid)
697 if (!proc_get_status (pi))
0df8b418 698 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 699
c3f6f71d 700 return pi->prstatus.pr_lwp.pr_what;
c3f6f71d 701}
c906108c 702
77382aee
PA
703/* This function is only called when PI is stopped by a watchpoint.
704 Assuming the OS supports it, write to *ADDR the data address which
705 triggered it and return 1. Return 0 if it is not possible to know
706 the address. */
bf701c2c
PM
707
708static int
709proc_watchpoint_address (procinfo *pi, CORE_ADDR *addr)
710{
711 if (!pi->status_valid)
712 if (!proc_get_status (pi))
713 return 0;
714
f5656ead
TT
715 *addr = (CORE_ADDR) gdbarch_pointer_to_address (target_gdbarch (),
716 builtin_type (target_gdbarch ())->builtin_data_ptr,
bf701c2c 717 (gdb_byte *) &pi->prstatus.pr_lwp.pr_info.si_addr);
bf701c2c
PM
718 return 1;
719}
720
77382aee
PA
721/* Returns the pr_nsysarg field (number of args to the current
722 syscall). */
c3f6f71d 723
d3581e61 724static int
fba45db2 725proc_nsysarg (procinfo *pi)
c3f6f71d
JM
726{
727 if (!pi->status_valid)
728 if (!proc_get_status (pi))
729 return 0;
19958708 730
c3f6f71d 731 return pi->prstatus.pr_lwp.pr_nsysarg;
c3f6f71d 732}
c906108c 733
77382aee
PA
734/* Returns the pr_sysarg field (pointer to the arguments of current
735 syscall). */
c906108c 736
d3581e61 737static long *
fba45db2 738proc_sysargs (procinfo *pi)
c3f6f71d
JM
739{
740 if (!pi->status_valid)
741 if (!proc_get_status (pi))
742 return NULL;
19958708 743
c3f6f71d 744 return (long *) &pi->prstatus.pr_lwp.pr_sysarg;
c3f6f71d 745}
77382aee 746
44122162 747/* Set or reset any of the following process flags:
77382aee
PA
748 PR_FORK -- forked child will inherit trace flags
749 PR_RLC -- traced process runs when last /proc file closed.
750 PR_KLC -- traced process is killed when last /proc file closed.
751 PR_ASYNC -- LWP's get to run/stop independently.
752
44122162 753 This function is done using read/write [PCSET/PCRESET/PCUNSET].
77382aee
PA
754
755 Arguments:
756 pi -- the procinfo
757 flag -- one of PR_FORK, PR_RLC, or PR_ASYNC
758 mode -- 1 for set, 0 for reset.
759
760 Returns non-zero for success, zero for failure. */
c906108c 761
c3f6f71d 762enum { FLAG_RESET, FLAG_SET };
c906108c 763
c3f6f71d 764static int
fba45db2 765proc_modify_flag (procinfo *pi, long flag, long mode)
c3f6f71d
JM
766{
767 long win = 0; /* default to fail */
768
77382aee
PA
769 /* These operations affect the process as a whole, and applying them
770 to an individual LWP has the same meaning as applying them to the
771 main process. Therefore, if we're ever called with a pointer to
772 an LWP's procinfo, let's substitute the process's procinfo and
773 avoid opening the LWP's file descriptor unnecessarily. */
c3f6f71d
JM
774
775 if (pi->pid != 0)
776 pi = find_procinfo_or_die (pi->pid, 0);
777
44122162 778 procfs_ctl_t arg[2];
c5aa993b 779
44122162
RO
780 if (mode == FLAG_SET) /* Set the flag (RLC, FORK, or ASYNC). */
781 arg[0] = PCSET;
0df8b418 782 else /* Reset the flag. */
44122162
RO
783 arg[0] = PCUNSET;
784
785 arg[1] = flag;
786 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 787
77382aee
PA
788 /* The above operation renders the procinfo's cached pstatus
789 obsolete. */
c3f6f71d 790 pi->status_valid = 0;
c906108c 791
c3f6f71d 792 if (!win)
8a3fe4f8 793 warning (_("procfs: modify_flag failed to turn %s %s"),
c3f6f71d
JM
794 flag == PR_FORK ? "PR_FORK" :
795 flag == PR_RLC ? "PR_RLC" :
c3f6f71d 796 flag == PR_ASYNC ? "PR_ASYNC" :
0d06e24b 797 flag == PR_KLC ? "PR_KLC" :
c3f6f71d
JM
798 "<unknown flag>",
799 mode == FLAG_RESET ? "off" : "on");
c906108c 800
c3f6f71d
JM
801 return win;
802}
c906108c 803
77382aee
PA
804/* Set the run_on_last_close flag. Process with all threads will
805 become runnable when debugger closes all /proc fds. Returns
806 non-zero for success, zero for failure. */
c906108c 807
d3581e61 808static int
fba45db2 809proc_set_run_on_last_close (procinfo *pi)
c906108c 810{
c3f6f71d
JM
811 return proc_modify_flag (pi, PR_RLC, FLAG_SET);
812}
c906108c 813
77382aee
PA
814/* Reset the run_on_last_close flag. The process will NOT become
815 runnable when debugger closes its file handles. Returns non-zero
816 for success, zero for failure. */
c906108c 817
d3581e61 818static int
fba45db2 819proc_unset_run_on_last_close (procinfo *pi)
c3f6f71d
JM
820{
821 return proc_modify_flag (pi, PR_RLC, FLAG_RESET);
c906108c
SS
822}
823
77382aee 824/* Reset inherit_on_fork flag. If the process forks a child while we
85102364 825 are registered for events in the parent, then we will NOT receive
77382aee
PA
826 events from the child. Returns non-zero for success, zero for
827 failure. */
c906108c 828
d3581e61 829static int
fba45db2 830proc_unset_inherit_on_fork (procinfo *pi)
c3f6f71d
JM
831{
832 return proc_modify_flag (pi, PR_FORK, FLAG_RESET);
833}
c906108c 834
77382aee
PA
835/* Set PR_ASYNC flag. If one LWP stops because of a debug event
836 (signal etc.), the remaining LWPs will continue to run. Returns
837 non-zero for success, zero for failure. */
c906108c 838
d3581e61 839static int
fba45db2 840proc_set_async (procinfo *pi)
c3f6f71d
JM
841{
842 return proc_modify_flag (pi, PR_ASYNC, FLAG_SET);
843}
c906108c 844
77382aee
PA
845/* Reset PR_ASYNC flag. If one LWP stops because of a debug event
846 (signal etc.), then all other LWPs will stop as well. Returns
847 non-zero for success, zero for failure. */
c906108c 848
d3581e61 849static int
fba45db2 850proc_unset_async (procinfo *pi)
c3f6f71d
JM
851{
852 return proc_modify_flag (pi, PR_ASYNC, FLAG_RESET);
853}
c906108c 854
77382aee
PA
855/* Request the process/LWP to stop. Does not wait. Returns non-zero
856 for success, zero for failure. */
c906108c 857
d3581e61 858static int
fba45db2 859proc_stop_process (procinfo *pi)
c3f6f71d
JM
860{
861 int win;
c906108c 862
77382aee
PA
863 /* We might conceivably apply this operation to an LWP, and the
864 LWP's ctl file descriptor might not be open. */
c906108c 865
c475f569 866 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c3f6f71d
JM
867 return 0;
868 else
869 {
37de36c6 870 procfs_ctl_t cmd = PCSTOP;
f4a14ae6 871
c3f6f71d 872 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d 873 }
c906108c 874
c3f6f71d
JM
875 return win;
876}
c5aa993b 877
77382aee
PA
878/* Wait for the process or LWP to stop (block until it does). Returns
879 non-zero for success, zero for failure. */
c906108c 880
d3581e61 881static int
fba45db2 882proc_wait_for_stop (procinfo *pi)
c906108c 883{
c3f6f71d
JM
884 int win;
885
77382aee
PA
886 /* We should never have to apply this operation to any procinfo
887 except the one for the main process. If that ever changes for
888 any reason, then take out the following clause and replace it
889 with one that makes sure the ctl_fd is open. */
19958708 890
c3f6f71d
JM
891 if (pi->tid != 0)
892 pi = find_procinfo_or_die (pi->pid, 0);
893
44122162 894 procfs_ctl_t cmd = PCWSTOP;
f4a14ae6 895
92137da0
RO
896 set_sigint_trap ();
897
44122162 898 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
92137da0
RO
899
900 clear_sigint_trap ();
901
44122162
RO
902 /* We been runnin' and we stopped -- need to update status. */
903 pi->status_valid = 0;
c906108c 904
c3f6f71d 905 return win;
c906108c
SS
906}
907
77382aee
PA
908/* Make the process or LWP runnable.
909
910 Options (not all are implemented):
911 - single-step
912 - clear current fault
913 - clear current signal
914 - abort the current system call
915 - stop as soon as finished with system call
77382aee
PA
916
917 Always clears the current fault. PI is the process or LWP to
918 operate on. If STEP is true, set the process or LWP to trap after
919 one instruction. If SIGNO is zero, clear the current signal if
920 any; if non-zero, set the current signal to this one. Returns
921 non-zero for success, zero for failure. */
c3f6f71d 922
d3581e61 923static int
fba45db2 924proc_run_process (procinfo *pi, int step, int signo)
c3f6f71d
JM
925{
926 int win;
927 int runflags;
928
77382aee
PA
929 /* We will probably have to apply this operation to individual
930 threads, so make sure the control file descriptor is open. */
19958708 931
c475f569
RO
932 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
933 return 0;
c906108c 934
0df8b418 935 runflags = PRCFAULT; /* Always clear current fault. */
c3f6f71d
JM
936 if (step)
937 runflags |= PRSTEP;
938 if (signo == 0)
939 runflags |= PRCSIG;
0df8b418 940 else if (signo != -1) /* -1 means do nothing W.R.T. signals. */
c3f6f71d 941 proc_set_current_signal (pi, signo);
c5aa993b 942
44122162 943 procfs_ctl_t cmd[2];
c906108c 944
44122162
RO
945 cmd[0] = PCRUN;
946 cmd[1] = runflags;
947 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c906108c 948
c3f6f71d
JM
949 return win;
950}
c906108c 951
77382aee
PA
952/* Register to trace signals in the process or LWP. Returns non-zero
953 for success, zero for failure. */
c906108c 954
d3581e61 955static int
44122162 956proc_set_traced_signals (procinfo *pi, sigset_t *sigset)
c906108c 957{
c3f6f71d
JM
958 int win;
959
77382aee
PA
960 /* We should never have to apply this operation to any procinfo
961 except the one for the main process. If that ever changes for
962 any reason, then take out the following clause and replace it
963 with one that makes sure the ctl_fd is open. */
19958708 964
c3f6f71d
JM
965 if (pi->tid != 0)
966 pi = find_procinfo_or_die (pi->pid, 0);
967
44122162
RO
968 struct {
969 procfs_ctl_t cmd;
970 /* Use char array to avoid alignment issues. */
971 char sigset[sizeof (sigset_t)];
972 } arg;
c906108c 973
44122162
RO
974 arg.cmd = PCSTRACE;
975 memcpy (&arg.sigset, sigset, sizeof (sigset_t));
976
977 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 978
0df8b418 979 /* The above operation renders the procinfo's cached pstatus obsolete. */
c3f6f71d 980 pi->status_valid = 0;
c906108c 981
c3f6f71d 982 if (!win)
8a3fe4f8 983 warning (_("procfs: set_traced_signals failed"));
c3f6f71d 984 return win;
c906108c
SS
985}
986
77382aee
PA
987/* Register to trace hardware faults in the process or LWP. Returns
988 non-zero for success, zero for failure. */
c906108c 989
d3581e61 990static int
fba45db2 991proc_set_traced_faults (procinfo *pi, fltset_t *fltset)
c3f6f71d
JM
992{
993 int win;
994
77382aee
PA
995 /* We should never have to apply this operation to any procinfo
996 except the one for the main process. If that ever changes for
997 any reason, then take out the following clause and replace it
998 with one that makes sure the ctl_fd is open. */
19958708 999
c3f6f71d
JM
1000 if (pi->tid != 0)
1001 pi = find_procinfo_or_die (pi->pid, 0);
1002
44122162
RO
1003 struct {
1004 procfs_ctl_t cmd;
1005 /* Use char array to avoid alignment issues. */
1006 char fltset[sizeof (fltset_t)];
1007 } arg;
1008
1009 arg.cmd = PCSFAULT;
1010 memcpy (&arg.fltset, fltset, sizeof (fltset_t));
c906108c 1011
44122162 1012 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1013
0df8b418 1014 /* The above operation renders the procinfo's cached pstatus obsolete. */
c3f6f71d 1015 pi->status_valid = 0;
c906108c 1016
c3f6f71d
JM
1017 return win;
1018}
c5aa993b 1019
77382aee
PA
1020/* Register to trace entry to system calls in the process or LWP.
1021 Returns non-zero for success, zero for failure. */
c906108c 1022
d3581e61 1023static int
fba45db2 1024proc_set_traced_sysentry (procinfo *pi, sysset_t *sysset)
c906108c 1025{
c3f6f71d
JM
1026 int win;
1027
77382aee
PA
1028 /* We should never have to apply this operation to any procinfo
1029 except the one for the main process. If that ever changes for
1030 any reason, then take out the following clause and replace it
1031 with one that makes sure the ctl_fd is open. */
19958708 1032
c3f6f71d
JM
1033 if (pi->tid != 0)
1034 pi = find_procinfo_or_die (pi->pid, 0);
1035
c475f569 1036 struct {
44122162
RO
1037 procfs_ctl_t cmd;
1038 /* Use char array to avoid alignment issues. */
1039 char sysset[sizeof (sysset_t)];
c475f569 1040 } arg;
c3f6f71d 1041
c475f569
RO
1042 arg.cmd = PCSENTRY;
1043 memcpy (&arg.sysset, sysset, sizeof (sysset_t));
44122162 1044
c475f569 1045 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
37de36c6 1046
77382aee
PA
1047 /* The above operation renders the procinfo's cached pstatus
1048 obsolete. */
c3f6f71d 1049 pi->status_valid = 0;
19958708 1050
c3f6f71d 1051 return win;
c906108c
SS
1052}
1053
77382aee
PA
1054/* Register to trace exit from system calls in the process or LWP.
1055 Returns non-zero for success, zero for failure. */
c906108c 1056
d3581e61 1057static int
fba45db2 1058proc_set_traced_sysexit (procinfo *pi, sysset_t *sysset)
c3f6f71d
JM
1059{
1060 int win;
1061
77382aee
PA
1062 /* We should never have to apply this operation to any procinfo
1063 except the one for the main process. If that ever changes for
1064 any reason, then take out the following clause and replace it
1065 with one that makes sure the ctl_fd is open. */
19958708 1066
c3f6f71d
JM
1067 if (pi->tid != 0)
1068 pi = find_procinfo_or_die (pi->pid, 0);
1069
44122162
RO
1070 struct gdb_proc_ctl_pcsexit {
1071 procfs_ctl_t cmd;
1072 /* Use char array to avoid alignment issues. */
1073 char sysset[sizeof (sysset_t)];
c475f569 1074 } arg;
c906108c 1075
c475f569
RO
1076 arg.cmd = PCSEXIT;
1077 memcpy (&arg.sysset, sysset, sizeof (sysset_t));
c906108c 1078
c475f569 1079 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
37de36c6 1080
77382aee
PA
1081 /* The above operation renders the procinfo's cached pstatus
1082 obsolete. */
c3f6f71d 1083 pi->status_valid = 0;
c906108c 1084
c3f6f71d
JM
1085 return win;
1086}
c906108c 1087
77382aee
PA
1088/* Specify the set of blocked / held signals in the process or LWP.
1089 Returns non-zero for success, zero for failure. */
c906108c 1090
d3581e61 1091static int
44122162 1092proc_set_held_signals (procinfo *pi, sigset_t *sighold)
c906108c 1093{
c3f6f71d
JM
1094 int win;
1095
77382aee
PA
1096 /* We should never have to apply this operation to any procinfo
1097 except the one for the main process. If that ever changes for
1098 any reason, then take out the following clause and replace it
1099 with one that makes sure the ctl_fd is open. */
19958708 1100
c3f6f71d
JM
1101 if (pi->tid != 0)
1102 pi = find_procinfo_or_die (pi->pid, 0);
1103
44122162
RO
1104 struct {
1105 procfs_ctl_t cmd;
1106 /* Use char array to avoid alignment issues. */
1107 char hold[sizeof (sigset_t)];
1108 } arg;
1109
1110 arg.cmd = PCSHOLD;
1111 memcpy (&arg.hold, sighold, sizeof (sigset_t));
1112 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
1113
77382aee
PA
1114 /* The above operation renders the procinfo's cached pstatus
1115 obsolete. */
c3f6f71d
JM
1116 pi->status_valid = 0;
1117
1118 return win;
c906108c
SS
1119}
1120
77382aee
PA
1121/* Returns the set of signals that are held / blocked. Will also copy
1122 the sigset if SAVE is non-zero. */
c906108c 1123
44122162
RO
1124static sigset_t *
1125proc_get_held_signals (procinfo *pi, sigset_t *save)
c906108c 1126{
44122162 1127 sigset_t *ret = NULL;
c3f6f71d 1128
77382aee
PA
1129 /* We should never have to apply this operation to any procinfo
1130 except the one for the main process. If that ever changes for
1131 any reason, then take out the following clause and replace it
1132 with one that makes sure the ctl_fd is open. */
19958708 1133
c3f6f71d
JM
1134 if (pi->tid != 0)
1135 pi = find_procinfo_or_die (pi->pid, 0);
1136
c3f6f71d
JM
1137 if (!pi->status_valid)
1138 if (!proc_get_status (pi))
1139 return NULL;
1140
c3f6f71d 1141 ret = &pi->prstatus.pr_lwp.pr_lwphold;
c3f6f71d 1142 if (save && ret)
44122162 1143 memcpy (save, ret, sizeof (sigset_t));
c3f6f71d
JM
1144
1145 return ret;
c906108c
SS
1146}
1147
77382aee
PA
1148/* Returns the set of signals that are traced / debugged. Will also
1149 copy the sigset if SAVE is non-zero. */
c3f6f71d 1150
44122162
RO
1151static sigset_t *
1152proc_get_traced_signals (procinfo *pi, sigset_t *save)
c906108c 1153{
44122162 1154 sigset_t *ret = NULL;
c3f6f71d 1155
77382aee
PA
1156 /* We should never have to apply this operation to any procinfo
1157 except the one for the main process. If that ever changes for
1158 any reason, then take out the following clause and replace it
1159 with one that makes sure the ctl_fd is open. */
19958708 1160
c3f6f71d
JM
1161 if (pi->tid != 0)
1162 pi = find_procinfo_or_die (pi->pid, 0);
1163
c3f6f71d
JM
1164 if (!pi->status_valid)
1165 if (!proc_get_status (pi))
1166 return NULL;
1167
1168 ret = &pi->prstatus.pr_sigtrace;
c3f6f71d 1169 if (save && ret)
44122162 1170 memcpy (save, ret, sizeof (sigset_t));
c906108c 1171
c3f6f71d
JM
1172 return ret;
1173}
c906108c 1174
77382aee
PA
1175/* Returns the set of hardware faults that are traced /debugged. Will
1176 also copy the faultset if SAVE is non-zero. */
c3f6f71d 1177
d3581e61 1178static fltset_t *
fba45db2 1179proc_get_traced_faults (procinfo *pi, fltset_t *save)
c3f6f71d
JM
1180{
1181 fltset_t *ret = NULL;
1182
77382aee
PA
1183 /* We should never have to apply this operation to any procinfo
1184 except the one for the main process. If that ever changes for
1185 any reason, then take out the following clause and replace it
1186 with one that makes sure the ctl_fd is open. */
19958708 1187
c3f6f71d
JM
1188 if (pi->tid != 0)
1189 pi = find_procinfo_or_die (pi->pid, 0);
1190
c3f6f71d
JM
1191 if (!pi->status_valid)
1192 if (!proc_get_status (pi))
1193 return NULL;
1194
1195 ret = &pi->prstatus.pr_flttrace;
c3f6f71d
JM
1196 if (save && ret)
1197 memcpy (save, ret, sizeof (fltset_t));
c906108c 1198
c3f6f71d
JM
1199 return ret;
1200}
c906108c 1201
77382aee
PA
1202/* Returns the set of syscalls that are traced /debugged on entry.
1203 Will also copy the syscall set if SAVE is non-zero. */
c906108c 1204
d3581e61 1205static sysset_t *
fba45db2 1206proc_get_traced_sysentry (procinfo *pi, sysset_t *save)
c3f6f71d
JM
1207{
1208 sysset_t *ret = NULL;
1209
77382aee
PA
1210 /* We should never have to apply this operation to any procinfo
1211 except the one for the main process. If that ever changes for
1212 any reason, then take out the following clause and replace it
1213 with one that makes sure the ctl_fd is open. */
19958708 1214
c3f6f71d
JM
1215 if (pi->tid != 0)
1216 pi = find_procinfo_or_die (pi->pid, 0);
1217
c3f6f71d
JM
1218 if (!pi->status_valid)
1219 if (!proc_get_status (pi))
1220 return NULL;
1221
1222 ret = &pi->prstatus.pr_sysentry;
c3f6f71d 1223 if (save && ret)
44122162 1224 memcpy (save, ret, sizeof (sysset_t));
c906108c 1225
c3f6f71d
JM
1226 return ret;
1227}
c5aa993b 1228
77382aee
PA
1229/* Returns the set of syscalls that are traced /debugged on exit.
1230 Will also copy the syscall set if SAVE is non-zero. */
c906108c 1231
d3581e61 1232static sysset_t *
fba45db2 1233proc_get_traced_sysexit (procinfo *pi, sysset_t *save)
c906108c 1234{
44122162 1235 sysset_t *ret = NULL;
c3f6f71d 1236
77382aee
PA
1237 /* We should never have to apply this operation to any procinfo
1238 except the one for the main process. If that ever changes for
1239 any reason, then take out the following clause and replace it
1240 with one that makes sure the ctl_fd is open. */
19958708 1241
c3f6f71d
JM
1242 if (pi->tid != 0)
1243 pi = find_procinfo_or_die (pi->pid, 0);
1244
c3f6f71d
JM
1245 if (!pi->status_valid)
1246 if (!proc_get_status (pi))
1247 return NULL;
1248
1249 ret = &pi->prstatus.pr_sysexit;
c3f6f71d 1250 if (save && ret)
44122162 1251 memcpy (save, ret, sizeof (sysset_t));
c3f6f71d
JM
1252
1253 return ret;
1254}
c906108c 1255
77382aee
PA
1256/* The current fault (if any) is cleared; the associated signal will
1257 not be sent to the process or LWP when it resumes. Returns
1258 non-zero for success, zero for failure. */
c906108c 1259
d3581e61 1260static int
fba45db2 1261proc_clear_current_fault (procinfo *pi)
c3f6f71d
JM
1262{
1263 int win;
1264
77382aee
PA
1265 /* We should never have to apply this operation to any procinfo
1266 except the one for the main process. If that ever changes for
1267 any reason, then take out the following clause and replace it
1268 with one that makes sure the ctl_fd is open. */
19958708 1269
c3f6f71d
JM
1270 if (pi->tid != 0)
1271 pi = find_procinfo_or_die (pi->pid, 0);
1272
44122162 1273 procfs_ctl_t cmd = PCCFAULT;
f4a14ae6 1274
44122162 1275 win = (write (pi->ctl_fd, (void *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d
JM
1276
1277 return win;
c906108c
SS
1278}
1279
77382aee
PA
1280/* Set the "current signal" that will be delivered next to the
1281 process. NOTE: semantics are different from those of KILL. This
1282 signal will be delivered to the process or LWP immediately when it
1283 is resumed (even if the signal is held/blocked); it will NOT
1284 immediately cause another event of interest, and will NOT first
1285 trap back to the debugger. Returns non-zero for success, zero for
1286 failure. */
c3f6f71d 1287
d3581e61 1288static int
fba45db2 1289proc_set_current_signal (procinfo *pi, int signo)
c3f6f71d
JM
1290{
1291 int win;
1292 struct {
37de36c6 1293 procfs_ctl_t cmd;
c3f6f71d 1294 /* Use char array to avoid alignment issues. */
44122162 1295 char sinfo[sizeof (siginfo_t)];
c3f6f71d 1296 } arg;
44122162 1297 siginfo_t mysinfo;
5b6d1e4f 1298 process_stratum_target *wait_target;
c162e8c9
JM
1299 ptid_t wait_ptid;
1300 struct target_waitstatus wait_status;
c3f6f71d 1301
77382aee
PA
1302 /* We should never have to apply this operation to any procinfo
1303 except the one for the main process. If that ever changes for
1304 any reason, then take out the following clause and replace it
1305 with one that makes sure the ctl_fd is open. */
19958708 1306
c3f6f71d
JM
1307 if (pi->tid != 0)
1308 pi = find_procinfo_or_die (pi->pid, 0);
1309
c3f6f71d 1310 /* The pointer is just a type alias. */
5b6d1e4f
PA
1311 get_last_target_status (&wait_target, &wait_ptid, &wait_status);
1312 if (wait_target == &the_procfs_target
1313 && wait_ptid == inferior_ptid
c162e8c9 1314 && wait_status.kind == TARGET_WAITKIND_STOPPED
2ea28649 1315 && wait_status.value.sig == gdb_signal_from_host (signo)
c162e8c9 1316 && proc_get_status (pi)
c162e8c9 1317 && pi->prstatus.pr_lwp.pr_info.si_signo == signo
c162e8c9
JM
1318 )
1319 /* Use the siginfo associated with the signal being
1320 redelivered. */
44122162 1321 memcpy (arg.sinfo, &pi->prstatus.pr_lwp.pr_info, sizeof (siginfo_t));
c162e8c9
JM
1322 else
1323 {
73930d4d
KH
1324 mysinfo.si_signo = signo;
1325 mysinfo.si_code = 0;
1326 mysinfo.si_pid = getpid (); /* ?why? */
1327 mysinfo.si_uid = getuid (); /* ?why? */
44122162 1328 memcpy (arg.sinfo, &mysinfo, sizeof (siginfo_t));
c162e8c9 1329 }
c3f6f71d 1330
c3f6f71d
JM
1331 arg.cmd = PCSSIG;
1332 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1333
c3f6f71d
JM
1334 return win;
1335}
c906108c 1336
77382aee
PA
1337/* The current signal (if any) is cleared, and is not sent to the
1338 process or LWP when it resumes. Returns non-zero for success, zero
1339 for failure. */
c906108c 1340
d3581e61 1341static int
fba45db2 1342proc_clear_current_signal (procinfo *pi)
c3f6f71d
JM
1343{
1344 int win;
1345
77382aee
PA
1346 /* We should never have to apply this operation to any procinfo
1347 except the one for the main process. If that ever changes for
1348 any reason, then take out the following clause and replace it
1349 with one that makes sure the ctl_fd is open. */
19958708 1350
c3f6f71d
JM
1351 if (pi->tid != 0)
1352 pi = find_procinfo_or_die (pi->pid, 0);
1353
44122162
RO
1354 struct {
1355 procfs_ctl_t cmd;
1356 /* Use char array to avoid alignment issues. */
1357 char sinfo[sizeof (siginfo_t)];
1358 } arg;
1359 siginfo_t mysinfo;
1360
1361 arg.cmd = PCSSIG;
1362 /* The pointer is just a type alias. */
1363 mysinfo.si_signo = 0;
1364 mysinfo.si_code = 0;
1365 mysinfo.si_errno = 0;
1366 mysinfo.si_pid = getpid (); /* ?why? */
1367 mysinfo.si_uid = getuid (); /* ?why? */
1368 memcpy (arg.sinfo, &mysinfo, sizeof (siginfo_t));
1369
1370 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1371
c3f6f71d
JM
1372 return win;
1373}
c906108c 1374
772cf8be
MK
1375/* Return the general-purpose registers for the process or LWP
1376 corresponding to PI. Upon failure, return NULL. */
c906108c 1377
d3581e61 1378static gdb_gregset_t *
fba45db2 1379proc_get_gregs (procinfo *pi)
c3f6f71d
JM
1380{
1381 if (!pi->status_valid || !pi->gregs_valid)
1382 if (!proc_get_status (pi))
1383 return NULL;
1384
c3f6f71d 1385 return &pi->prstatus.pr_lwp.pr_reg;
c3f6f71d 1386}
c5aa993b 1387
772cf8be
MK
1388/* Return the general-purpose registers for the process or LWP
1389 corresponding to PI. Upon failure, return NULL. */
c906108c 1390
d3581e61 1391static gdb_fpregset_t *
fba45db2 1392proc_get_fpregs (procinfo *pi)
c906108c 1393{
c3f6f71d
JM
1394 if (!pi->status_valid || !pi->fpregs_valid)
1395 if (!proc_get_status (pi))
1396 return NULL;
1397
c3f6f71d 1398 return &pi->prstatus.pr_lwp.pr_fpreg;
c906108c
SS
1399}
1400
772cf8be
MK
1401/* Write the general-purpose registers back to the process or LWP
1402 corresponding to PI. Return non-zero for success, zero for
1403 failure. */
c3f6f71d 1404
d3581e61 1405static int
fba45db2 1406proc_set_gregs (procinfo *pi)
c906108c 1407{
c3f6f71d
JM
1408 gdb_gregset_t *gregs;
1409 int win;
c5aa993b 1410
772cf8be
MK
1411 gregs = proc_get_gregs (pi);
1412 if (gregs == NULL)
1413 return 0; /* proc_get_regs has already warned. */
c3f6f71d 1414
772cf8be 1415 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c475f569 1416 return 0;
c3f6f71d 1417 else
c906108c 1418 {
c3f6f71d 1419 struct {
37de36c6 1420 procfs_ctl_t cmd;
c3f6f71d
JM
1421 /* Use char array to avoid alignment issues. */
1422 char gregs[sizeof (gdb_gregset_t)];
1423 } arg;
1424
772cf8be 1425 arg.cmd = PCSREG;
c3f6f71d
JM
1426 memcpy (&arg.gregs, gregs, sizeof (arg.gregs));
1427 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1428 }
c3f6f71d 1429
772cf8be 1430 /* Policy: writing the registers invalidates our cache. */
c3f6f71d
JM
1431 pi->gregs_valid = 0;
1432 return win;
c906108c
SS
1433}
1434
772cf8be
MK
1435/* Write the floating-pointer registers back to the process or LWP
1436 corresponding to PI. Return non-zero for success, zero for
1437 failure. */
c3f6f71d 1438
d3581e61 1439static int
fba45db2 1440proc_set_fpregs (procinfo *pi)
c906108c 1441{
c3f6f71d
JM
1442 gdb_fpregset_t *fpregs;
1443 int win;
1444
772cf8be
MK
1445 fpregs = proc_get_fpregs (pi);
1446 if (fpregs == NULL)
1447 return 0; /* proc_get_fpregs has already warned. */
c5aa993b 1448
772cf8be 1449 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c475f569 1450 return 0;
c3f6f71d 1451 else
c906108c 1452 {
c3f6f71d 1453 struct {
37de36c6 1454 procfs_ctl_t cmd;
c3f6f71d
JM
1455 /* Use char array to avoid alignment issues. */
1456 char fpregs[sizeof (gdb_fpregset_t)];
1457 } arg;
1458
772cf8be 1459 arg.cmd = PCSFPREG;
c3f6f71d
JM
1460 memcpy (&arg.fpregs, fpregs, sizeof (arg.fpregs));
1461 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1462 }
c3f6f71d 1463
772cf8be 1464 /* Policy: writing the registers invalidates our cache. */
c3f6f71d
JM
1465 pi->fpregs_valid = 0;
1466 return win;
c906108c
SS
1467}
1468
77382aee
PA
1469/* Send a signal to the proc or lwp with the semantics of "kill()".
1470 Returns non-zero for success, zero for failure. */
c906108c 1471
d3581e61 1472static int
fba45db2 1473proc_kill (procinfo *pi, int signo)
c3f6f71d
JM
1474{
1475 int win;
c906108c 1476
77382aee
PA
1477 /* We might conceivably apply this operation to an LWP, and the
1478 LWP's ctl file descriptor might not be open. */
c906108c 1479
c475f569
RO
1480 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
1481 return 0;
c3f6f71d
JM
1482 else
1483 {
37de36c6 1484 procfs_ctl_t cmd[2];
c906108c 1485
c3f6f71d
JM
1486 cmd[0] = PCKILL;
1487 cmd[1] = signo;
1488 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d 1489 }
c906108c 1490
c3f6f71d
JM
1491 return win;
1492}
c906108c 1493
77382aee
PA
1494/* Find the pid of the process that started this one. Returns the
1495 parent process pid, or zero. */
c906108c 1496
d3581e61 1497static int
fba45db2 1498proc_parent_pid (procinfo *pi)
c906108c 1499{
77382aee
PA
1500 /* We should never have to apply this operation to any procinfo
1501 except the one for the main process. If that ever changes for
1502 any reason, then take out the following clause and replace it
1503 with one that makes sure the ctl_fd is open. */
19958708 1504
c3f6f71d
JM
1505 if (pi->tid != 0)
1506 pi = find_procinfo_or_die (pi->pid, 0);
1507
1508 if (!pi->status_valid)
1509 if (!proc_get_status (pi))
1510 return 0;
c5aa993b 1511
c3f6f71d
JM
1512 return pi->prstatus.pr_ppid;
1513}
1514
9a043c1d
AC
1515/* Convert a target address (a.k.a. CORE_ADDR) into a host address
1516 (a.k.a void pointer)! */
1517
1518static void *
1519procfs_address_to_host_pointer (CORE_ADDR addr)
1520{
f5656ead 1521 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
9a043c1d
AC
1522 void *ptr;
1523
4e906f53 1524 gdb_assert (sizeof (ptr) == TYPE_LENGTH (ptr_type));
f5656ead 1525 gdbarch_address_to_pointer (target_gdbarch (), ptr_type,
0b62613e 1526 (gdb_byte *) &ptr, addr);
9a043c1d
AC
1527 return ptr;
1528}
1529
a0911fd0 1530static int
fba45db2 1531proc_set_watchpoint (procinfo *pi, CORE_ADDR addr, int len, int wflags)
c3f6f71d 1532{
c3f6f71d 1533 struct {
37de36c6 1534 procfs_ctl_t cmd;
c3f6f71d
JM
1535 char watch[sizeof (prwatch_t)];
1536 } arg;
73930d4d 1537 prwatch_t pwatch;
c3f6f71d 1538
9a043c1d
AC
1539 /* NOTE: cagney/2003-02-01: Even more horrible hack. Need to
1540 convert a target address into something that can be stored in a
1541 native data structure. */
73930d4d 1542 pwatch.pr_vaddr = (uintptr_t) procfs_address_to_host_pointer (addr);
73930d4d
KH
1543 pwatch.pr_size = len;
1544 pwatch.pr_wflags = wflags;
c3f6f71d 1545 arg.cmd = PCWATCH;
73930d4d 1546 memcpy (arg.watch, &pwatch, sizeof (prwatch_t));
c3f6f71d 1547 return (write (pi->ctl_fd, &arg, sizeof (arg)) == sizeof (arg));
c906108c
SS
1548}
1549
c3f6f71d 1550/* =============== END, non-thread part of /proc "MODULE" =============== */
c906108c 1551
c3f6f71d 1552/* =================== Thread "MODULE" =================== */
c906108c 1553
44122162 1554/* Returns the number of threads for the process. */
c906108c 1555
d3581e61 1556static int
fba45db2 1557proc_get_nthreads (procinfo *pi)
c906108c 1558{
c3f6f71d
JM
1559 if (!pi->status_valid)
1560 if (!proc_get_status (pi))
1561 return 0;
c5aa993b 1562
44122162
RO
1563 /* Only works for the process procinfo, because the LWP procinfos do not
1564 get prstatus filled in. */
0df8b418 1565 if (pi->tid != 0) /* Find the parent process procinfo. */
c3f6f71d 1566 pi = find_procinfo_or_die (pi->pid, 0);
c3f6f71d 1567 return pi->prstatus.pr_nlwp;
c906108c
SS
1568}
1569
196535a6 1570/* Return the ID of the thread that had an event of interest.
77382aee
PA
1571 (ie. the one that hit a breakpoint or other traced event). All
1572 other things being equal, this should be the ID of a thread that is
1573 currently executing. */
c3f6f71d 1574
d3581e61 1575static int
fba45db2 1576proc_get_current_thread (procinfo *pi)
c3f6f71d 1577{
77382aee
PA
1578 /* Note: this should be applied to the root procinfo for the
1579 process, not to the procinfo for an LWP. If applied to the
1580 procinfo for an LWP, it will simply return that LWP's ID. In
1581 that case, find the parent process procinfo. */
19958708 1582
c3f6f71d
JM
1583 if (pi->tid != 0)
1584 pi = find_procinfo_or_die (pi->pid, 0);
1585
1586 if (!pi->status_valid)
1587 if (!proc_get_status (pi))
1588 return 0;
1589
c3f6f71d 1590 return pi->prstatus.pr_lwp.pr_lwpid;
c3f6f71d
JM
1591}
1592
77382aee 1593/* Discover the IDs of all the threads within the process, and create
196535a6 1594 a procinfo for each of them (chained to the parent). Returns
77382aee 1595 non-zero for success, zero for failure. */
c906108c 1596
a0911fd0 1597static int
fba45db2 1598proc_delete_dead_threads (procinfo *parent, procinfo *thread, void *ignore)
c3f6f71d
JM
1599{
1600 if (thread && parent) /* sanity */
c906108c 1601 {
c3f6f71d
JM
1602 thread->status_valid = 0;
1603 if (!proc_get_status (thread))
1604 destroy_one_procinfo (&parent->thread_list, thread);
1605 }
1606 return 0; /* keep iterating */
1607}
c5aa993b 1608
d3581e61 1609static int
fba45db2 1610proc_update_threads (procinfo *pi)
c3f6f71d
JM
1611{
1612 char pathname[MAX_PROC_NAME_SIZE + 16];
1613 struct dirent *direntry;
c3f6f71d 1614 procinfo *thread;
f0b3976b 1615 gdb_dir_up dirp;
c3f6f71d
JM
1616 int lwpid;
1617
77382aee
PA
1618 /* We should never have to apply this operation to any procinfo
1619 except the one for the main process. If that ever changes for
1620 any reason, then take out the following clause and replace it
1621 with one that makes sure the ctl_fd is open. */
19958708 1622
c3f6f71d
JM
1623 if (pi->tid != 0)
1624 pi = find_procinfo_or_die (pi->pid, 0);
1625
1626 proc_iterate_over_threads (pi, proc_delete_dead_threads, NULL);
1627
05b4bd79
PA
1628 /* Note: this brute-force method was originally devised for Unixware
1629 (support removed since), and will also work on Solaris 2.6 and
1630 2.7. The original comment mentioned the existence of a much
1631 simpler and more elegant way to do this on Solaris, but didn't
1632 point out what that was. */
c3f6f71d
JM
1633
1634 strcpy (pathname, pi->pathname);
1635 strcat (pathname, "/lwp");
f0b3976b
TT
1636 dirp.reset (opendir (pathname));
1637 if (dirp == NULL)
c3f6f71d
JM
1638 proc_error (pi, "update_threads, opendir", __LINE__);
1639
f0b3976b 1640 while ((direntry = readdir (dirp.get ())) != NULL)
c3f6f71d
JM
1641 if (direntry->d_name[0] != '.') /* skip '.' and '..' */
1642 {
1643 lwpid = atoi (&direntry->d_name[0]);
c475f569
RO
1644 thread = create_procinfo (pi->pid, lwpid);
1645 if (thread == NULL)
c3f6f71d
JM
1646 proc_error (pi, "update_threads, create_procinfo", __LINE__);
1647 }
1648 pi->threads_valid = 1;
c3f6f71d
JM
1649 return 1;
1650}
c906108c 1651
77382aee
PA
1652/* Given a pointer to a function, call that function once for each lwp
1653 in the procinfo list, until the function returns non-zero, in which
1654 event return the value returned by the function.
1655
1656 Note: this function does NOT call update_threads. If you want to
1657 discover new threads first, you must call that function explicitly.
1658 This function just makes a quick pass over the currently-known
1659 procinfos.
1660
1661 PI is the parent process procinfo. FUNC is the per-thread
1662 function. PTR is an opaque parameter for function. Returns the
1663 first non-zero return value from the callee, or zero. */
c3f6f71d 1664
d3581e61 1665static int
d0849a9a
KB
1666proc_iterate_over_threads (procinfo *pi,
1667 int (*func) (procinfo *, procinfo *, void *),
1668 void *ptr)
c906108c 1669{
c3f6f71d
JM
1670 procinfo *thread, *next;
1671 int retval = 0;
c906108c 1672
77382aee
PA
1673 /* We should never have to apply this operation to any procinfo
1674 except the one for the main process. If that ever changes for
1675 any reason, then take out the following clause and replace it
1676 with one that makes sure the ctl_fd is open. */
19958708 1677
c3f6f71d
JM
1678 if (pi->tid != 0)
1679 pi = find_procinfo_or_die (pi->pid, 0);
1680
1681 for (thread = pi->thread_list; thread != NULL; thread = next)
c906108c 1682 {
0df8b418 1683 next = thread->next; /* In case thread is destroyed. */
c475f569
RO
1684 retval = (*func) (pi, thread, ptr);
1685 if (retval != 0)
c3f6f71d 1686 break;
c906108c 1687 }
c3f6f71d
JM
1688
1689 return retval;
c906108c
SS
1690}
1691
c3f6f71d
JM
1692/* =================== END, Thread "MODULE" =================== */
1693
1694/* =================== END, /proc "MODULE" =================== */
1695
1696/* =================== GDB "MODULE" =================== */
1697
77382aee
PA
1698/* Here are all of the gdb target vector functions and their
1699 friends. */
c3f6f71d 1700
7fb43e53 1701static void do_attach (ptid_t ptid);
6bd6f3b6 1702static void do_detach ();
9185ddce 1703static void proc_trace_syscalls_1 (procinfo *pi, int syscallnum,
77382aee 1704 int entry_or_exit, int mode, int from_tty);
9185ddce 1705
77382aee
PA
1706/* Sets up the inferior to be debugged. Registers to trace signals,
1707 hardware faults, and syscalls. Note: does not set RLC flag: caller
1708 may want to customize that. Returns zero for success (note!
1709 unlike most functions in this module); on failure, returns the LINE
1710 NUMBER where it failed! */
c3f6f71d
JM
1711
1712static int
fba45db2 1713procfs_debug_inferior (procinfo *pi)
c906108c 1714{
c3f6f71d 1715 fltset_t traced_faults;
44122162 1716 sigset_t traced_signals;
37de36c6
KB
1717 sysset_t *traced_syscall_entries;
1718 sysset_t *traced_syscall_exits;
1719 int status;
c906108c 1720
0df8b418
MS
1721 /* Register to trace hardware faults in the child. */
1722 prfillset (&traced_faults); /* trace all faults... */
44122162 1723 prdelset (&traced_faults, FLTPAGE); /* except page fault. */
c3f6f71d
JM
1724 if (!proc_set_traced_faults (pi, &traced_faults))
1725 return __LINE__;
c906108c 1726
2455069d
UW
1727 /* Initially, register to trace all signals in the child. */
1728 prfillset (&traced_signals);
1729 if (!proc_set_traced_signals (pi, &traced_signals))
c3f6f71d
JM
1730 return __LINE__;
1731
37de36c6 1732
c3f6f71d 1733 /* Register to trace the 'exit' system call (on entry). */
c475f569 1734 traced_syscall_entries = XNEW (sysset_t);
44122162
RO
1735 premptyset (traced_syscall_entries);
1736 praddset (traced_syscall_entries, SYS_exit);
1737 praddset (traced_syscall_entries, SYS_lwp_exit);
c906108c 1738
37de36c6
KB
1739 status = proc_set_traced_sysentry (pi, traced_syscall_entries);
1740 xfree (traced_syscall_entries);
1741 if (!status)
c3f6f71d
JM
1742 return __LINE__;
1743
44122162 1744 /* Method for tracing exec syscalls. */
c475f569 1745 traced_syscall_exits = XNEW (sysset_t);
44122162 1746 premptyset (traced_syscall_exits);
44122162
RO
1747 praddset (traced_syscall_exits, SYS_execve);
1748 praddset (traced_syscall_exits, SYS_lwp_create);
1749 praddset (traced_syscall_exits, SYS_lwp_exit);
c906108c 1750
37de36c6
KB
1751 status = proc_set_traced_sysexit (pi, traced_syscall_exits);
1752 xfree (traced_syscall_exits);
1753 if (!status)
c3f6f71d
JM
1754 return __LINE__;
1755
c3f6f71d 1756 return 0;
c906108c
SS
1757}
1758
f6ac5f3d
PA
1759void
1760procfs_target::attach (const char *args, int from_tty)
c906108c 1761{
c3f6f71d
JM
1762 int pid;
1763
74164c56 1764 pid = parse_pid_to_attach (args);
c3f6f71d 1765
c3f6f71d 1766 if (pid == getpid ())
8a3fe4f8 1767 error (_("Attaching GDB to itself is not a good idea..."));
c906108c 1768
de146e19 1769 /* Push the target if needed, ensure it gets un-pushed it if attach fails. */
25b48839 1770 inferior *inf = current_inferior ();
de146e19 1771 target_unpush_up unpusher;
c8fbd44a 1772 if (!inf->target_is_pushed (this))
de146e19 1773 {
25b48839 1774 inf->push_target (this);
de146e19
SM
1775 unpusher.reset (this);
1776 }
1777
c3f6f71d 1778 if (from_tty)
c906108c 1779 {
d9fa87f4 1780 const char *exec_file = get_exec_file (0);
c3f6f71d
JM
1781
1782 if (exec_file)
a3f17187 1783 printf_filtered (_("Attaching to program `%s', %s\n"),
a068643d 1784 exec_file, target_pid_to_str (ptid_t (pid)).c_str ());
c3f6f71d 1785 else
a3f17187 1786 printf_filtered (_("Attaching to %s\n"),
a068643d 1787 target_pid_to_str (ptid_t (pid)).c_str ());
c3f6f71d
JM
1788
1789 fflush (stdout);
c906108c 1790 }
de146e19 1791
7fb43e53 1792 do_attach (ptid_t (pid));
de146e19
SM
1793
1794 /* Everything went fine, keep the target pushed. */
1795 unpusher.release ();
c3f6f71d
JM
1796}
1797
f6ac5f3d
PA
1798void
1799procfs_target::detach (inferior *inf, int from_tty)
c3f6f71d 1800{
e99b03dc 1801 int pid = inferior_ptid.pid ();
cc377e6b 1802
c3f6f71d 1803 if (from_tty)
c906108c 1804 {
995816ba 1805 const char *exec_file;
cc377e6b 1806
c3f6f71d 1807 exec_file = get_exec_file (0);
cc377e6b 1808 if (exec_file == NULL)
c3f6f71d 1809 exec_file = "";
cc377e6b 1810
a3f17187 1811 printf_filtered (_("Detaching from program: %s, %s\n"), exec_file,
a068643d 1812 target_pid_to_str (ptid_t (pid)).c_str ());
c906108c 1813 }
19958708 1814
6bd6f3b6 1815 do_detach ();
cc377e6b 1816
7fb43e53 1817 switch_to_no_thread ();
b7a08269 1818 detach_inferior (inf);
f6ac5f3d 1819 maybe_unpush_target ();
c906108c
SS
1820}
1821
7fb43e53 1822static void
39f77062 1823do_attach (ptid_t ptid)
c906108c 1824{
c3f6f71d 1825 procinfo *pi;
181e7f93 1826 struct inferior *inf;
c3f6f71d 1827 int fail;
2689673f 1828 int lwpid;
c3f6f71d 1829
c475f569
RO
1830 pi = create_procinfo (ptid.pid (), 0);
1831 if (pi == NULL)
8a3fe4f8 1832 perror (_("procfs: out of memory in 'attach'"));
c3f6f71d
JM
1833
1834 if (!open_procinfo_files (pi, FD_CTL))
1835 {
1836 fprintf_filtered (gdb_stderr, "procfs:%d -- ", __LINE__);
c475f569
RO
1837 xsnprintf (errmsg, sizeof (errmsg),
1838 "do_attach: couldn't open /proc file for process %d",
1839 ptid.pid ());
c3f6f71d
JM
1840 dead_procinfo (pi, errmsg, NOKILL);
1841 }
c906108c 1842
c3f6f71d
JM
1843 /* Stop the process (if it isn't already stopped). */
1844 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
c906108c 1845 {
c3f6f71d
JM
1846 pi->was_stopped = 1;
1847 proc_prettyprint_why (proc_why (pi), proc_what (pi), 1);
c906108c
SS
1848 }
1849 else
1850 {
c3f6f71d
JM
1851 pi->was_stopped = 0;
1852 /* Set the process to run again when we close it. */
1853 if (!proc_set_run_on_last_close (pi))
1854 dead_procinfo (pi, "do_attach: couldn't set RLC.", NOKILL);
1855
0df8b418 1856 /* Now stop the process. */
c3f6f71d
JM
1857 if (!proc_stop_process (pi))
1858 dead_procinfo (pi, "do_attach: couldn't stop the process.", NOKILL);
1859 pi->ignore_next_sigstop = 1;
c906108c 1860 }
c3f6f71d
JM
1861 /* Save some of the /proc state to be restored if we detach. */
1862 if (!proc_get_traced_faults (pi, &pi->saved_fltset))
1863 dead_procinfo (pi, "do_attach: couldn't save traced faults.", NOKILL);
1864 if (!proc_get_traced_signals (pi, &pi->saved_sigset))
1865 dead_procinfo (pi, "do_attach: couldn't save traced signals.", NOKILL);
37de36c6 1866 if (!proc_get_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d
JM
1867 dead_procinfo (pi, "do_attach: couldn't save traced syscall entries.",
1868 NOKILL);
37de36c6 1869 if (!proc_get_traced_sysexit (pi, pi->saved_exitset))
19958708 1870 dead_procinfo (pi, "do_attach: couldn't save traced syscall exits.",
c3f6f71d
JM
1871 NOKILL);
1872 if (!proc_get_held_signals (pi, &pi->saved_sighold))
1873 dead_procinfo (pi, "do_attach: couldn't save held signals.", NOKILL);
1874
c475f569
RO
1875 fail = procfs_debug_inferior (pi);
1876 if (fail != 0)
c3f6f71d
JM
1877 dead_procinfo (pi, "do_attach: failed in procfs_debug_inferior", NOKILL);
1878
6c95b8df
PA
1879 inf = current_inferior ();
1880 inferior_appeared (inf, pi->pid);
c3f6f71d 1881 /* Let GDB know that the inferior was attached. */
181e7f93 1882 inf->attach_flag = 1;
2689673f
PA
1883
1884 /* Create a procinfo for the current lwp. */
1885 lwpid = proc_get_current_thread (pi);
1886 create_procinfo (pi->pid, lwpid);
1887
1888 /* Add it to gdb's thread list. */
fd79271b 1889 ptid = ptid_t (pi->pid, lwpid, 0);
7fb43e53
PA
1890 thread_info *thr = add_thread (&the_procfs_target, ptid);
1891 switch_to_thread (thr);
c906108c
SS
1892}
1893
1894static void
6bd6f3b6 1895do_detach ()
c906108c 1896{
c3f6f71d 1897 procinfo *pi;
c906108c 1898
0df8b418 1899 /* Find procinfo for the main process. */
e99b03dc 1900 pi = find_procinfo_or_die (inferior_ptid.pid (),
dfd4cc63 1901 0); /* FIXME: threads */
c5aa993b 1902
c3f6f71d
JM
1903 if (!proc_set_traced_signals (pi, &pi->saved_sigset))
1904 proc_warn (pi, "do_detach, set_traced_signal", __LINE__);
c906108c 1905
c3f6f71d
JM
1906 if (!proc_set_traced_faults (pi, &pi->saved_fltset))
1907 proc_warn (pi, "do_detach, set_traced_faults", __LINE__);
1908
37de36c6 1909 if (!proc_set_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d
JM
1910 proc_warn (pi, "do_detach, set_traced_sysentry", __LINE__);
1911
37de36c6 1912 if (!proc_set_traced_sysexit (pi, pi->saved_exitset))
c3f6f71d
JM
1913 proc_warn (pi, "do_detach, set_traced_sysexit", __LINE__);
1914
1915 if (!proc_set_held_signals (pi, &pi->saved_sighold))
1916 proc_warn (pi, "do_detach, set_held_signals", __LINE__);
1917
6bd6f3b6
SM
1918 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
1919 if (!(pi->was_stopped)
1920 || query (_("Was stopped when attached, make it runnable again? ")))
c3f6f71d
JM
1921 {
1922 /* Clear any pending signal. */
1923 if (!proc_clear_current_fault (pi))
1924 proc_warn (pi, "do_detach, clear_current_fault", __LINE__);
1925
6bd6f3b6 1926 if (!proc_clear_current_signal (pi))
1a303dec
MS
1927 proc_warn (pi, "do_detach, clear_current_signal", __LINE__);
1928
c3f6f71d
JM
1929 if (!proc_set_run_on_last_close (pi))
1930 proc_warn (pi, "do_detach, set_rlc", __LINE__);
1931 }
1932
c3f6f71d 1933 destroy_procinfo (pi);
c906108c
SS
1934}
1935
772cf8be
MK
1936/* Fetch register REGNUM from the inferior. If REGNUM is -1, do this
1937 for all registers.
1938
772cf8be
MK
1939 NOTE: Since the /proc interface cannot give us individual
1940 registers, we pay no attention to REGNUM, and just fetch them all.
1941 This results in the possibility that we will do unnecessarily many
1942 fetches, since we may be called repeatedly for individual
1943 registers. So we cache the results, and mark the cache invalid
1944 when the process is resumed. */
c3f6f71d 1945
f6ac5f3d
PA
1946void
1947procfs_target::fetch_registers (struct regcache *regcache, int regnum)
c906108c 1948{
772cf8be
MK
1949 gdb_gregset_t *gregs;
1950 procinfo *pi;
222312d3 1951 ptid_t ptid = regcache->ptid ();
e99b03dc 1952 int pid = ptid.pid ();
e38504b3 1953 int tid = ptid.lwp ();
ac7936df 1954 struct gdbarch *gdbarch = regcache->arch ();
c3f6f71d 1955
2689673f 1956 pi = find_procinfo_or_die (pid, tid);
c3f6f71d
JM
1957
1958 if (pi == NULL)
8a3fe4f8 1959 error (_("procfs: fetch_registers failed to find procinfo for %s"),
a068643d 1960 target_pid_to_str (ptid).c_str ());
c3f6f71d 1961
772cf8be
MK
1962 gregs = proc_get_gregs (pi);
1963 if (gregs == NULL)
c3f6f71d
JM
1964 proc_error (pi, "fetch_registers, get_gregs", __LINE__);
1965
56be3814 1966 supply_gregset (regcache, (const gdb_gregset_t *) gregs);
c3f6f71d 1967
40a6adc1 1968 if (gdbarch_fp0_regnum (gdbarch) >= 0) /* Do we have an FPU? */
60054393 1969 {
772cf8be
MK
1970 gdb_fpregset_t *fpregs;
1971
40a6adc1
MD
1972 if ((regnum >= 0 && regnum < gdbarch_fp0_regnum (gdbarch))
1973 || regnum == gdbarch_pc_regnum (gdbarch)
1974 || regnum == gdbarch_sp_regnum (gdbarch))
772cf8be 1975 return; /* Not a floating point register. */
c5aa993b 1976
772cf8be
MK
1977 fpregs = proc_get_fpregs (pi);
1978 if (fpregs == NULL)
60054393 1979 proc_error (pi, "fetch_registers, get_fpregs", __LINE__);
c906108c 1980
56be3814 1981 supply_fpregset (regcache, (const gdb_fpregset_t *) fpregs);
60054393 1982 }
c906108c
SS
1983}
1984
772cf8be
MK
1985/* Store register REGNUM back into the inferior. If REGNUM is -1, do
1986 this for all registers.
1987
1988 NOTE: Since the /proc interface will not read individual registers,
1989 we will cache these requests until the process is resumed, and only
1990 then write them back to the inferior process.
77382aee 1991
772cf8be
MK
1992 FIXME: is that a really bad idea? Have to think about cases where
1993 writing one register might affect the value of others, etc. */
c906108c 1994
f6ac5f3d
PA
1995void
1996procfs_target::store_registers (struct regcache *regcache, int regnum)
c3f6f71d 1997{
772cf8be
MK
1998 gdb_gregset_t *gregs;
1999 procinfo *pi;
222312d3 2000 ptid_t ptid = regcache->ptid ();
e99b03dc 2001 int pid = ptid.pid ();
e38504b3 2002 int tid = ptid.lwp ();
ac7936df 2003 struct gdbarch *gdbarch = regcache->arch ();
c3f6f71d 2004
2689673f 2005 pi = find_procinfo_or_die (pid, tid);
c3f6f71d
JM
2006
2007 if (pi == NULL)
8a3fe4f8 2008 error (_("procfs: store_registers: failed to find procinfo for %s"),
a068643d 2009 target_pid_to_str (ptid).c_str ());
c906108c 2010
772cf8be
MK
2011 gregs = proc_get_gregs (pi);
2012 if (gregs == NULL)
c3f6f71d 2013 proc_error (pi, "store_registers, get_gregs", __LINE__);
c906108c 2014
56be3814 2015 fill_gregset (regcache, gregs, regnum);
c3f6f71d
JM
2016 if (!proc_set_gregs (pi))
2017 proc_error (pi, "store_registers, set_gregs", __LINE__);
c906108c 2018
40a6adc1 2019 if (gdbarch_fp0_regnum (gdbarch) >= 0) /* Do we have an FPU? */
60054393 2020 {
772cf8be
MK
2021 gdb_fpregset_t *fpregs;
2022
40a6adc1
MD
2023 if ((regnum >= 0 && regnum < gdbarch_fp0_regnum (gdbarch))
2024 || regnum == gdbarch_pc_regnum (gdbarch)
2025 || regnum == gdbarch_sp_regnum (gdbarch))
772cf8be 2026 return; /* Not a floating point register. */
60054393 2027
772cf8be
MK
2028 fpregs = proc_get_fpregs (pi);
2029 if (fpregs == NULL)
60054393
MS
2030 proc_error (pi, "store_registers, get_fpregs", __LINE__);
2031
56be3814 2032 fill_fpregset (regcache, fpregs, regnum);
60054393
MS
2033 if (!proc_set_fpregs (pi))
2034 proc_error (pi, "store_registers, set_fpregs", __LINE__);
2035 }
c3f6f71d 2036}
c906108c 2037
77382aee
PA
2038/* Retrieve the next stop event from the child process. If child has
2039 not stopped yet, wait for it to stop. Translate /proc eventcodes
2040 (or possibly wait eventcodes) into gdb internal event codes.
2041 Returns the id of process (and possibly thread) that incurred the
2042 event. Event codes are returned through a pointer parameter. */
c906108c 2043
f6ac5f3d
PA
2044ptid_t
2045procfs_target::wait (ptid_t ptid, struct target_waitstatus *status,
b60cea74 2046 target_wait_flags options)
c906108c 2047{
0df8b418 2048 /* First cut: loosely based on original version 2.1. */
c3f6f71d 2049 procinfo *pi;
39f77062
KB
2050 int wstat;
2051 int temp_tid;
2052 ptid_t retval, temp_ptid;
c3f6f71d
JM
2053 int why, what, flags;
2054 int retry = 0;
c906108c 2055
c3f6f71d 2056wait_again:
c906108c 2057
c3f6f71d
JM
2058 retry++;
2059 wstat = 0;
f2907e49 2060 retval = ptid_t (-1);
c906108c 2061
0df8b418 2062 /* Find procinfo for main process. */
f8098322
PA
2063
2064 /* procfs_target currently only supports one inferior. */
2065 inferior *inf = current_inferior ();
2066
2067 pi = find_procinfo_or_die (inf->pid, 0);
c3f6f71d 2068 if (pi)
c906108c 2069 {
0df8b418 2070 /* We must assume that the status is stale now... */
c3f6f71d
JM
2071 pi->status_valid = 0;
2072 pi->gregs_valid = 0;
2073 pi->fpregs_valid = 0;
2074
0df8b418 2075#if 0 /* just try this out... */
c3f6f71d
JM
2076 flags = proc_flags (pi);
2077 why = proc_why (pi);
2078 if ((flags & PR_STOPPED) && (why == PR_REQUESTED))
0df8b418 2079 pi->status_valid = 0; /* re-read again, IMMEDIATELY... */
c3f6f71d
JM
2080#endif
2081 /* If child is not stopped, wait for it to stop. */
c475f569
RO
2082 if (!(proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
2083 && !proc_wait_for_stop (pi))
c906108c 2084 {
0df8b418 2085 /* wait_for_stop failed: has the child terminated? */
c3f6f71d 2086 if (errno == ENOENT)
c906108c 2087 {
39f77062
KB
2088 int wait_retval;
2089
0df8b418 2090 /* /proc file not found; presumably child has terminated. */
f6ac5f3d 2091 wait_retval = ::wait (&wstat); /* "wait" for the child's exit. */
c3f6f71d 2092
dfd4cc63 2093 /* Wrong child? */
f8098322 2094 if (wait_retval != inf->pid)
3e43a32a
MS
2095 error (_("procfs: couldn't stop "
2096 "process %d: wait returned %d."),
f8098322 2097 inf->pid, wait_retval);
c3f6f71d 2098 /* FIXME: might I not just use waitpid?
0df8b418 2099 Or try find_procinfo to see if I know about this child? */
f2907e49 2100 retval = ptid_t (wait_retval);
c906108c 2101 }
d1566ff5
FN
2102 else if (errno == EINTR)
2103 goto wait_again;
c3f6f71d 2104 else
c906108c 2105 {
0df8b418 2106 /* Unknown error from wait_for_stop. */
c3f6f71d 2107 proc_error (pi, "target_wait (wait_for_stop)", __LINE__);
c906108c 2108 }
c3f6f71d
JM
2109 }
2110 else
2111 {
2112 /* This long block is reached if either:
2113 a) the child was already stopped, or
2114 b) we successfully waited for the child with wait_for_stop.
2115 This block will analyze the /proc status, and translate it
2116 into a waitstatus for GDB.
2117
2118 If we actually had to call wait because the /proc file
19958708 2119 is gone (child terminated), then we skip this block,
c3f6f71d
JM
2120 because we already have a waitstatus. */
2121
2122 flags = proc_flags (pi);
2123 why = proc_why (pi);
2124 what = proc_what (pi);
2125
c3f6f71d 2126 if (flags & (PR_STOPPED | PR_ISTOP))
c906108c 2127 {
c3f6f71d
JM
2128 /* If it's running async (for single_thread control),
2129 set it back to normal again. */
2130 if (flags & PR_ASYNC)
2131 if (!proc_unset_async (pi))
2132 proc_error (pi, "target_wait, unset_async", __LINE__);
c3f6f71d
JM
2133
2134 if (info_verbose)
2135 proc_prettyprint_why (why, what, 1);
2136
2137 /* The 'pid' we will return to GDB is composed of
2138 the process ID plus the lwp ID. */
fd79271b 2139 retval = ptid_t (pi->pid, proc_get_current_thread (pi), 0);
c3f6f71d
JM
2140
2141 switch (why) {
2142 case PR_SIGNALLED:
2143 wstat = (what << 8) | 0177;
2144 break;
2145 case PR_SYSENTRY:
196535a6 2146 if (what == SYS_lwp_exit)
c3f6f71d 2147 {
17faa917
DJ
2148 if (print_thread_events)
2149 printf_unfiltered (_("[%s exited]\n"),
a068643d 2150 target_pid_to_str (retval).c_str ());
5b6d1e4f 2151 delete_thread (find_thread_ptid (this, retval));
f8098322
PA
2152 target_continue_no_signal (ptid);
2153 goto wait_again;
37de36c6 2154 }
196535a6 2155 else if (what == SYS_exit)
37de36c6 2156 {
0df8b418 2157 /* Handle SYS_exit call only. */
37de36c6 2158 /* Stopped at entry to SYS_exit.
19958708 2159 Make it runnable, resume it, then use
37de36c6 2160 the wait system call to get its exit code.
19958708 2161 Proc_run_process always clears the current
37de36c6
KB
2162 fault and signal.
2163 Then return its exit status. */
2164 pi->status_valid = 0;
2165 wstat = 0;
19958708 2166 /* FIXME: what we should do is return
37de36c6
KB
2167 TARGET_WAITKIND_SPURIOUS. */
2168 if (!proc_run_process (pi, 0, 0))
2169 proc_error (pi, "target_wait, run_process", __LINE__);
181e7f93 2170
181e7f93 2171 if (inf->attach_flag)
c3f6f71d 2172 {
19958708 2173 /* Don't call wait: simulate waiting for exit,
37de36c6
KB
2174 return a "success" exit code. Bogus: what if
2175 it returns something else? */
2176 wstat = 0;
f8098322 2177 retval = ptid_t (inf->pid); /* ? ? ? */
37de36c6
KB
2178 }
2179 else
2180 {
f6ac5f3d 2181 int temp = ::wait (&wstat);
37de36c6
KB
2182
2183 /* FIXME: shouldn't I make sure I get the right
2184 event from the right process? If (for
2185 instance) I have killed an earlier inferior
2186 process but failed to clean up after it
2187 somehow, I could get its termination event
2188 here. */
2189
0df8b418
MS
2190 /* If wait returns -1, that's what we return
2191 to GDB. */
37de36c6 2192 if (temp < 0)
f2907e49 2193 retval = ptid_t (temp);
c3f6f71d 2194 }
c3f6f71d 2195 }
37de36c6
KB
2196 else
2197 {
a3f17187 2198 printf_filtered (_("procfs: trapped on entry to "));
37de36c6
KB
2199 proc_prettyprint_syscall (proc_what (pi), 0);
2200 printf_filtered ("\n");
44122162
RO
2201
2202 long i, nsysargs, *sysargs;
2203
c475f569
RO
2204 nsysargs = proc_nsysarg (pi);
2205 sysargs = proc_sysargs (pi);
2206
2207 if (nsysargs > 0 && sysargs != NULL)
44122162
RO
2208 {
2209 printf_filtered (_("%ld syscall arguments:\n"),
2210 nsysargs);
2211 for (i = 0; i < nsysargs; i++)
2212 printf_filtered ("#%ld: 0x%08lx\n",
2213 i, sysargs[i]);
2214 }
2215
f8098322
PA
2216 /* How to keep going without returning to wfi: */
2217 target_continue_no_signal (ptid);
2218 goto wait_again;
37de36c6
KB
2219 }
2220 break;
2221 case PR_SYSEXIT:
196535a6 2222 if (what == SYS_execve)
c3f6f71d 2223 {
37de36c6
KB
2224 /* Hopefully this is our own "fork-child" execing
2225 the real child. Hoax this event into a trap, and
2226 GDB will see the child about to execute its start
0df8b418 2227 address. */
37de36c6
KB
2228 wstat = (SIGTRAP << 8) | 0177;
2229 }
196535a6 2230 else if (what == SYS_lwp_create)
37de36c6 2231 {
77382aee
PA
2232 /* This syscall is somewhat like fork/exec. We
2233 will get the event twice: once for the parent
2234 LWP, and once for the child. We should already
2235 know about the parent LWP, but the child will
2236 be new to us. So, whenever we get this event,
2237 if it represents a new thread, simply add the
2238 thread to the list. */
c3f6f71d 2239
37de36c6 2240 /* If not in procinfo list, add it. */
39f77062
KB
2241 temp_tid = proc_get_current_thread (pi);
2242 if (!find_procinfo (pi->pid, temp_tid))
2243 create_procinfo (pi->pid, temp_tid);
37de36c6 2244
fd79271b 2245 temp_ptid = ptid_t (pi->pid, temp_tid, 0);
37de36c6 2246 /* If not in GDB's thread list, add it. */
5b6d1e4f
PA
2247 if (!in_thread_list (this, temp_ptid))
2248 add_thread (this, temp_ptid);
93815fbf 2249
f8098322
PA
2250 target_continue_no_signal (ptid);
2251 goto wait_again;
37de36c6 2252 }
196535a6 2253 else if (what == SYS_lwp_exit)
37de36c6 2254 {
17faa917
DJ
2255 if (print_thread_events)
2256 printf_unfiltered (_("[%s exited]\n"),
a068643d 2257 target_pid_to_str (retval).c_str ());
5b6d1e4f 2258 delete_thread (find_thread_ptid (this, retval));
37de36c6
KB
2259 status->kind = TARGET_WAITKIND_SPURIOUS;
2260 return retval;
c3f6f71d 2261 }
37de36c6
KB
2262 else
2263 {
a3f17187 2264 printf_filtered (_("procfs: trapped on exit from "));
37de36c6
KB
2265 proc_prettyprint_syscall (proc_what (pi), 0);
2266 printf_filtered ("\n");
44122162
RO
2267
2268 long i, nsysargs, *sysargs;
2269
c475f569
RO
2270 nsysargs = proc_nsysarg (pi);
2271 sysargs = proc_sysargs (pi);
2272
2273 if (nsysargs > 0 && sysargs != NULL)
44122162
RO
2274 {
2275 printf_filtered (_("%ld syscall arguments:\n"),
2276 nsysargs);
2277 for (i = 0; i < nsysargs; i++)
2278 printf_filtered ("#%ld: 0x%08lx\n",
2279 i, sysargs[i]);
2280 }
2281
f8098322
PA
2282 target_continue_no_signal (ptid);
2283 goto wait_again;
37de36c6 2284 }
c3f6f71d
JM
2285 break;
2286 case PR_REQUESTED:
2287#if 0 /* FIXME */
2288 wstat = (SIGSTOP << 8) | 0177;
2289 break;
2290#else
2291 if (retry < 5)
2292 {
a3f17187 2293 printf_filtered (_("Retry #%d:\n"), retry);
c3f6f71d
JM
2294 pi->status_valid = 0;
2295 goto wait_again;
2296 }
2297 else
2298 {
2299 /* If not in procinfo list, add it. */
39f77062
KB
2300 temp_tid = proc_get_current_thread (pi);
2301 if (!find_procinfo (pi->pid, temp_tid))
2302 create_procinfo (pi->pid, temp_tid);
c3f6f71d
JM
2303
2304 /* If not in GDB's thread list, add it. */
fd79271b 2305 temp_ptid = ptid_t (pi->pid, temp_tid, 0);
5b6d1e4f
PA
2306 if (!in_thread_list (this, temp_ptid))
2307 add_thread (this, temp_ptid);
c3f6f71d
JM
2308
2309 status->kind = TARGET_WAITKIND_STOPPED;
b196bc4c 2310 status->value.sig = GDB_SIGNAL_0;
c3f6f71d
JM
2311 return retval;
2312 }
2313#endif
2314 case PR_JOBCONTROL:
2315 wstat = (what << 8) | 0177;
2316 break;
2317 case PR_FAULTED:
7a289707
RO
2318 {
2319 int signo = pi->prstatus.pr_lwp.pr_info.si_signo;
2320 if (signo != 0)
2321 wstat = (signo << 8) | 0177;
c3f6f71d 2322 }
7a289707 2323 break;
c3f6f71d
JM
2324 default: /* switch (why) unmatched */
2325 printf_filtered ("procfs:%d -- ", __LINE__);
a3f17187 2326 printf_filtered (_("child stopped for unknown reason:\n"));
c3f6f71d 2327 proc_prettyprint_why (why, what, 1);
8a3fe4f8 2328 error (_("... giving up..."));
c3f6f71d
JM
2329 break;
2330 }
77382aee
PA
2331 /* Got this far without error: If retval isn't in the
2332 threads database, add it. */
c475f569 2333 if (retval.pid () > 0
5b6d1e4f 2334 && !in_thread_list (this, retval))
c906108c 2335 {
77382aee
PA
2336 /* We have a new thread. We need to add it both to
2337 GDB's list and to our own. If we don't create a
2338 procinfo, resume may be unhappy later. */
5b6d1e4f 2339 add_thread (this, retval);
e99b03dc 2340 if (find_procinfo (retval.pid (),
e38504b3 2341 retval.lwp ()) == NULL)
e99b03dc 2342 create_procinfo (retval.pid (),
e38504b3 2343 retval.lwp ());
c906108c 2344 }
c906108c 2345 }
0df8b418 2346 else /* Flags do not indicate STOPPED. */
c906108c 2347 {
0df8b418 2348 /* surely this can't happen... */
c3f6f71d
JM
2349 printf_filtered ("procfs:%d -- process not stopped.\n",
2350 __LINE__);
2351 proc_prettyprint_flags (flags, 1);
8a3fe4f8 2352 error (_("procfs: ...giving up..."));
c906108c 2353 }
c906108c 2354 }
c906108c 2355
c3f6f71d
JM
2356 if (status)
2357 store_waitstatus (status, wstat);
c906108c
SS
2358 }
2359
c3f6f71d
JM
2360 return retval;
2361}
c906108c 2362
4e73f23d
RM
2363/* Perform a partial transfer to/from the specified object. For
2364 memory transfers, fall back to the old memory xfer functions. */
2365
f6ac5f3d
PA
2366enum target_xfer_status
2367procfs_target::xfer_partial (enum target_object object,
2368 const char *annex, gdb_byte *readbuf,
2369 const gdb_byte *writebuf, ULONGEST offset,
2370 ULONGEST len, ULONGEST *xfered_len)
4e73f23d
RM
2371{
2372 switch (object)
2373 {
2374 case TARGET_OBJECT_MEMORY:
e96027e0 2375 return procfs_xfer_memory (readbuf, writebuf, offset, len, xfered_len);
4e73f23d 2376
4e73f23d 2377 case TARGET_OBJECT_AUXV:
f6ac5f3d 2378 return memory_xfer_auxv (this, object, annex, readbuf, writebuf,
9b409511 2379 offset, len, xfered_len);
4e73f23d
RM
2380
2381 default:
4360561f
TT
2382 return this->beneath ()->xfer_partial (object, annex,
2383 readbuf, writebuf, offset, len,
2384 xfered_len);
4e73f23d
RM
2385 }
2386}
2387
e96027e0
PA
2388/* Helper for procfs_xfer_partial that handles memory transfers.
2389 Arguments are like target_xfer_partial. */
4e73f23d 2390
e96027e0
PA
2391static enum target_xfer_status
2392procfs_xfer_memory (gdb_byte *readbuf, const gdb_byte *writebuf,
2393 ULONGEST memaddr, ULONGEST len, ULONGEST *xfered_len)
c3f6f71d
JM
2394{
2395 procinfo *pi;
e96027e0 2396 int nbytes;
c906108c 2397
0df8b418 2398 /* Find procinfo for main process. */
e99b03dc 2399 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c475f569 2400 if (pi->as_fd == 0 && open_procinfo_files (pi, FD_AS) == 0)
c906108c 2401 {
c3f6f71d 2402 proc_warn (pi, "xfer_memory, open_proc_files", __LINE__);
e96027e0 2403 return TARGET_XFER_E_IO;
c906108c 2404 }
c906108c 2405
e96027e0
PA
2406 if (lseek (pi->as_fd, (off_t) memaddr, SEEK_SET) != (off_t) memaddr)
2407 return TARGET_XFER_E_IO;
2408
2409 if (writebuf != NULL)
c906108c 2410 {
e96027e0
PA
2411 PROCFS_NOTE ("write memory:\n");
2412 nbytes = write (pi->as_fd, writebuf, len);
2413 }
2414 else
2415 {
2416 PROCFS_NOTE ("read memory:\n");
2417 nbytes = read (pi->as_fd, readbuf, len);
c906108c 2418 }
e96027e0
PA
2419 if (nbytes <= 0)
2420 return TARGET_XFER_E_IO;
2421 *xfered_len = nbytes;
2422 return TARGET_XFER_OK;
c906108c
SS
2423}
2424
77382aee
PA
2425/* Called by target_resume before making child runnable. Mark cached
2426 registers and status's invalid. If there are "dirty" caches that
2427 need to be written back to the child process, do that.
c906108c 2428
77382aee
PA
2429 File descriptors are also cached. As they are a limited resource,
2430 we cannot hold onto them indefinitely. However, as they are
2431 expensive to open, we don't want to throw them away
85102364 2432 indiscriminately either. As a compromise, we will keep the file
77382aee
PA
2433 descriptors for the parent process, but discard any file
2434 descriptors we may have accumulated for the threads.
2435
2436 As this function is called by iterate_over_threads, it always
2437 returns zero (so that iterate_over_threads will keep
2438 iterating). */
c3f6f71d
JM
2439
2440static int
fba45db2 2441invalidate_cache (procinfo *parent, procinfo *pi, void *ptr)
c906108c 2442{
77382aee
PA
2443 /* About to run the child; invalidate caches and do any other
2444 cleanup. */
c906108c 2445
c3f6f71d 2446 if (parent != NULL)
c906108c 2447 {
c3f6f71d 2448 /* The presence of a parent indicates that this is an LWP.
19958708 2449 Close any file descriptors that it might have open.
c3f6f71d
JM
2450 We don't do this to the master (parent) procinfo. */
2451
2452 close_procinfo_files (pi);
c906108c 2453 }
c3f6f71d
JM
2454 pi->gregs_valid = 0;
2455 pi->fpregs_valid = 0;
c3f6f71d
JM
2456 pi->status_valid = 0;
2457 pi->threads_valid = 0;
c906108c 2458
c3f6f71d 2459 return 0;
c906108c
SS
2460}
2461
77382aee
PA
2462/* Make the child process runnable. Normally we will then call
2463 procfs_wait and wait for it to stop again (unless gdb is async).
2464
2465 If STEP is true, then arrange for the child to stop again after
2466 executing a single instruction. If SIGNO is zero, then cancel any
2467 pending signal; if non-zero, then arrange for the indicated signal
2468 to be delivered to the child when it runs. If PID is -1, then
2469 allow any child thread to run; if non-zero, then allow only the
2470 indicated thread to run. (not implemented yet). */
c906108c 2471
f6ac5f3d
PA
2472void
2473procfs_target::resume (ptid_t ptid, int step, enum gdb_signal signo)
c906108c 2474{
c3f6f71d
JM
2475 procinfo *pi, *thread;
2476 int native_signo;
2477
196535a6
RO
2478 /* FIXME: Check/reword. */
2479
2480 /* prrun.prflags |= PRCFAULT; clear current fault.
2481 PRCFAULT may be replaced by a PCCFAULT call (proc_clear_current_fault)
c3f6f71d 2482 This basically leaves PRSTEP and PRCSIG.
196535a6 2483 PRCSIG is like PCSSIG (proc_clear_current_signal).
c3f6f71d 2484 So basically PR_STEP is the sole argument that must be passed
196535a6 2485 to proc_run_process. */
c3f6f71d 2486
0df8b418 2487 /* Find procinfo for main process. */
e99b03dc 2488 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c3f6f71d 2489
77382aee 2490 /* First cut: ignore pid argument. */
c3f6f71d 2491 errno = 0;
c906108c 2492
c3f6f71d 2493 /* Convert signal to host numbering. */
c475f569 2494 if (signo == 0 || (signo == GDB_SIGNAL_STOP && pi->ignore_next_sigstop))
c3f6f71d
JM
2495 native_signo = 0;
2496 else
2ea28649 2497 native_signo = gdb_signal_to_host (signo);
c906108c 2498
c3f6f71d 2499 pi->ignore_next_sigstop = 0;
c906108c 2500
77382aee
PA
2501 /* Running the process voids all cached registers and status. */
2502 /* Void the threads' caches first. */
19958708 2503 proc_iterate_over_threads (pi, invalidate_cache, NULL);
c3f6f71d
JM
2504 /* Void the process procinfo's caches. */
2505 invalidate_cache (NULL, pi, NULL);
c906108c 2506
e99b03dc 2507 if (ptid.pid () != -1)
c906108c 2508 {
77382aee
PA
2509 /* Resume a specific thread, presumably suppressing the
2510 others. */
e38504b3 2511 thread = find_procinfo (ptid.pid (), ptid.lwp ());
7de45904 2512 if (thread != NULL)
c906108c 2513 {
c3f6f71d
JM
2514 if (thread->tid != 0)
2515 {
77382aee
PA
2516 /* We're to resume a specific thread, and not the
2517 others. Set the child process's PR_ASYNC flag. */
c3f6f71d
JM
2518 if (!proc_set_async (pi))
2519 proc_error (pi, "target_resume, set_async", __LINE__);
0df8b418
MS
2520 pi = thread; /* Substitute the thread's procinfo
2521 for run. */
c3f6f71d 2522 }
c906108c
SS
2523 }
2524 }
c906108c 2525
c3f6f71d 2526 if (!proc_run_process (pi, step, native_signo))
c906108c 2527 {
c3f6f71d 2528 if (errno == EBUSY)
77382aee
PA
2529 warning (_("resume: target already running. "
2530 "Pretend to resume, and hope for the best!"));
c3f6f71d
JM
2531 else
2532 proc_error (pi, "target_resume", __LINE__);
c906108c 2533 }
c3f6f71d 2534}
c906108c 2535
77382aee 2536/* Set up to trace signals in the child process. */
c906108c 2537
f6ac5f3d 2538void
adc6a863 2539procfs_target::pass_signals (gdb::array_view<const unsigned char> pass_signals)
c3f6f71d 2540{
44122162 2541 sigset_t signals;
e99b03dc 2542 procinfo *pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
2455069d 2543 int signo;
c906108c 2544
2455069d
UW
2545 prfillset (&signals);
2546
2547 for (signo = 0; signo < NSIG; signo++)
2548 {
2ea28649 2549 int target_signo = gdb_signal_from_host (signo);
adc6a863 2550 if (target_signo < pass_signals.size () && pass_signals[target_signo])
44122162 2551 prdelset (&signals, signo);
2455069d
UW
2552 }
2553
2554 if (!proc_set_traced_signals (pi, &signals))
2555 proc_error (pi, "pass_signals", __LINE__);
c3f6f71d 2556}
c906108c 2557
77382aee 2558/* Print status information about the child process. */
c906108c 2559
f6ac5f3d
PA
2560void
2561procfs_target::files_info ()
c3f6f71d 2562{
181e7f93 2563 struct inferior *inf = current_inferior ();
f4a14ae6 2564
a3f17187 2565 printf_filtered (_("\tUsing the running image of %s %s via /proc.\n"),
181e7f93 2566 inf->attach_flag? "attached": "child",
a068643d 2567 target_pid_to_str (inferior_ptid).c_str ());
c3f6f71d 2568}
c906108c 2569
77382aee
PA
2570/* Make it die. Wait for it to die. Clean up after it. Note: this
2571 should only be applied to the real process, not to an LWP, because
2572 of the check for parent-process. If we need this to work for an
2573 LWP, it needs some more logic. */
c906108c 2574
c3f6f71d 2575static void
fba45db2 2576unconditionally_kill_inferior (procinfo *pi)
c3f6f71d
JM
2577{
2578 int parent_pid;
c906108c 2579
c3f6f71d 2580 parent_pid = proc_parent_pid (pi);
c3f6f71d 2581 if (!proc_kill (pi, SIGKILL))
103b3ef5 2582 proc_error (pi, "unconditionally_kill, proc_kill", __LINE__);
c3f6f71d 2583 destroy_procinfo (pi);
c906108c 2584
c3f6f71d
JM
2585 /* If pi is GDB's child, wait for it to die. */
2586 if (parent_pid == getpid ())
19958708 2587 /* FIXME: should we use waitpid to make sure we get the right event?
c3f6f71d
JM
2588 Should we check the returned event? */
2589 {
0d06e24b 2590#if 0
c3f6f71d 2591 int status, ret;
c906108c 2592
c3f6f71d
JM
2593 ret = waitpid (pi->pid, &status, 0);
2594#else
2595 wait (NULL);
2596#endif
2597 }
2598}
c906108c 2599
77382aee
PA
2600/* We're done debugging it, and we want it to go away. Then we want
2601 GDB to forget all about it. */
c906108c 2602
f6ac5f3d
PA
2603void
2604procfs_target::kill ()
c906108c 2605{
d7e15655 2606 if (inferior_ptid != null_ptid) /* ? */
c3f6f71d 2607 {
0df8b418 2608 /* Find procinfo for main process. */
e99b03dc 2609 procinfo *pi = find_procinfo (inferior_ptid.pid (), 0);
c906108c 2610
c3f6f71d
JM
2611 if (pi)
2612 unconditionally_kill_inferior (pi);
bc1e6c81 2613 target_mourn_inferior (inferior_ptid);
c906108c 2614 }
c3f6f71d
JM
2615}
2616
77382aee 2617/* Forget we ever debugged this thing! */
c906108c 2618
f6ac5f3d
PA
2619void
2620procfs_target::mourn_inferior ()
c3f6f71d
JM
2621{
2622 procinfo *pi;
c906108c 2623
d7e15655 2624 if (inferior_ptid != null_ptid)
c3f6f71d 2625 {
0df8b418 2626 /* Find procinfo for main process. */
e99b03dc 2627 pi = find_procinfo (inferior_ptid.pid (), 0);
c3f6f71d
JM
2628 if (pi)
2629 destroy_procinfo (pi);
c906108c 2630 }
6a3cb8e8
PA
2631
2632 generic_mourn_inferior ();
8181d85f 2633
f6ac5f3d 2634 maybe_unpush_target ();
c3f6f71d 2635}
c906108c 2636
77382aee
PA
2637/* When GDB forks to create a runnable inferior process, this function
2638 is called on the parent side of the fork. It's job is to do
2639 whatever is necessary to make the child ready to be debugged, and
2640 then wait for the child to synchronize. */
c906108c 2641
5b6d1e4f
PA
2642void
2643procfs_target::procfs_init_inferior (int pid)
c3f6f71d
JM
2644{
2645 procinfo *pi;
c3f6f71d 2646 int fail;
2689673f 2647 int lwpid;
c906108c 2648
c475f569
RO
2649 pi = create_procinfo (pid, 0);
2650 if (pi == NULL)
9b20d036 2651 perror (_("procfs: out of memory in 'init_inferior'"));
c3f6f71d
JM
2652
2653 if (!open_procinfo_files (pi, FD_CTL))
2654 proc_error (pi, "init_inferior, open_proc_files", __LINE__);
2655
2656 /*
2657 xmalloc // done
2658 open_procinfo_files // done
2659 link list // done
2660 prfillset (trace)
2661 procfs_notice_signals
2662 prfillset (fault)
2663 prdelset (FLTPAGE)
c3f6f71d
JM
2664 */
2665
77382aee 2666 /* If not stopped yet, wait for it to stop. */
c475f569 2667 if (!(proc_flags (pi) & PR_STOPPED) && !(proc_wait_for_stop (pi)))
c3f6f71d
JM
2668 dead_procinfo (pi, "init_inferior: wait_for_stop failed", KILL);
2669
2670 /* Save some of the /proc state to be restored if we detach. */
2671 /* FIXME: Why? In case another debugger was debugging it?
0df8b418 2672 We're it's parent, for Ghu's sake! */
c3f6f71d
JM
2673 if (!proc_get_traced_signals (pi, &pi->saved_sigset))
2674 proc_error (pi, "init_inferior, get_traced_signals", __LINE__);
2675 if (!proc_get_held_signals (pi, &pi->saved_sighold))
2676 proc_error (pi, "init_inferior, get_held_signals", __LINE__);
2677 if (!proc_get_traced_faults (pi, &pi->saved_fltset))
2678 proc_error (pi, "init_inferior, get_traced_faults", __LINE__);
37de36c6 2679 if (!proc_get_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d 2680 proc_error (pi, "init_inferior, get_traced_sysentry", __LINE__);
37de36c6 2681 if (!proc_get_traced_sysexit (pi, pi->saved_exitset))
c3f6f71d
JM
2682 proc_error (pi, "init_inferior, get_traced_sysexit", __LINE__);
2683
c475f569
RO
2684 fail = procfs_debug_inferior (pi);
2685 if (fail != 0)
c3f6f71d
JM
2686 proc_error (pi, "init_inferior (procfs_debug_inferior)", fail);
2687
0d06e24b
JM
2688 /* FIXME: logically, we should really be turning OFF run-on-last-close,
2689 and possibly even turning ON kill-on-last-close at this point. But
2690 I can't make that change without careful testing which I don't have
2691 time to do right now... */
c3f6f71d
JM
2692 /* Turn on run-on-last-close flag so that the child
2693 will die if GDB goes away for some reason. */
2694 if (!proc_set_run_on_last_close (pi))
2695 proc_error (pi, "init_inferior, set_RLC", __LINE__);
2696
2689673f
PA
2697 /* We now have have access to the lwpid of the main thread/lwp. */
2698 lwpid = proc_get_current_thread (pi);
2699
2700 /* Create a procinfo for the main lwp. */
2701 create_procinfo (pid, lwpid);
2702
2703 /* We already have a main thread registered in the thread table at
2704 this point, but it didn't have any lwp info yet. Notify the core
2705 about it. This changes inferior_ptid as well. */
5b6d1e4f 2706 thread_change_ptid (this, ptid_t (pid), ptid_t (pid, lwpid, 0));
c906108c 2707
2090129c 2708 gdb_startup_inferior (pid, START_INFERIOR_TRAPS_EXPECTED);
c3f6f71d 2709}
c906108c 2710
77382aee
PA
2711/* When GDB forks to create a new process, this function is called on
2712 the child side of the fork before GDB exec's the user program. Its
2713 job is to make the child minimally debuggable, so that the parent
2714 GDB process can connect to the child and take over. This function
2715 should do only the minimum to make that possible, and to
2716 synchronize with the parent process. The parent process should
2717 take care of the details. */
c3f6f71d
JM
2718
2719static void
fba45db2 2720procfs_set_exec_trap (void)
c3f6f71d
JM
2721{
2722 /* This routine called on the child side (inferior side)
2723 after GDB forks the inferior. It must use only local variables,
2724 because it may be sharing data space with its parent. */
c906108c 2725
c3f6f71d 2726 procinfo *pi;
37de36c6 2727 sysset_t *exitset;
c906108c 2728
c475f569
RO
2729 pi = create_procinfo (getpid (), 0);
2730 if (pi == NULL)
e2e0b3e5 2731 perror_with_name (_("procfs: create_procinfo failed in child."));
c906108c 2732
c3f6f71d
JM
2733 if (open_procinfo_files (pi, FD_CTL) == 0)
2734 {
2735 proc_warn (pi, "set_exec_trap, open_proc_files", __LINE__);
2736 gdb_flush (gdb_stderr);
77382aee
PA
2737 /* No need to call "dead_procinfo", because we're going to
2738 exit. */
c3f6f71d
JM
2739 _exit (127);
2740 }
c906108c 2741
c475f569 2742 exitset = XNEW (sysset_t);
44122162 2743 premptyset (exitset);
44122162 2744 praddset (exitset, SYS_execve);
37de36c6
KB
2745
2746 if (!proc_set_traced_sysexit (pi, exitset))
c906108c 2747 {
c3f6f71d
JM
2748 proc_warn (pi, "set_exec_trap, set_traced_sysexit", __LINE__);
2749 gdb_flush (gdb_stderr);
2750 _exit (127);
c906108c 2751 }
c3f6f71d 2752
0df8b418 2753 /* FIXME: should this be done in the parent instead? */
c3f6f71d
JM
2754 /* Turn off inherit on fork flag so that all grand-children
2755 of gdb start with tracing flags cleared. */
2756 if (!proc_unset_inherit_on_fork (pi))
2757 proc_warn (pi, "set_exec_trap, unset_inherit", __LINE__);
2758
2759 /* Turn off run on last close flag, so that the child process
2760 cannot run away just because we close our handle on it.
2761 We want it to wait for the parent to attach. */
2762 if (!proc_unset_run_on_last_close (pi))
2763 proc_warn (pi, "set_exec_trap, unset_RLC", __LINE__);
2764
19958708 2765 /* FIXME: No need to destroy the procinfo --
0df8b418 2766 we have our own address space, and we're about to do an exec! */
c3f6f71d 2767 /*destroy_procinfo (pi);*/
c906108c 2768}
c906108c 2769
c6d36836
RO
2770/* Dummy function to be sure fork_inferior uses fork(2) and not vfork(2).
2771 This avoids a possible deadlock gdb and its vfork'ed child. */
2772static void
2773procfs_pre_trace (void)
2774{
2775}
2776
77382aee
PA
2777/* This function is called BEFORE gdb forks the inferior process. Its
2778 only real responsibility is to set things up for the fork, and tell
2779 GDB which two functions to call after the fork (one for the parent,
2780 and one for the child).
2781
2782 This function does a complicated search for a unix shell program,
2783 which it then uses to parse arguments and environment variables to
2784 be sent to the child. I wonder whether this code could not be
2785 abstracted out and shared with other unix targets such as
2786 inf-ptrace? */
c906108c 2787
f6ac5f3d
PA
2788void
2789procfs_target::create_inferior (const char *exec_file,
2790 const std::string &allargs,
2791 char **env, int from_tty)
c906108c 2792{
974e6844 2793 const char *shell_file = get_shell ();
c906108c 2794 char *tryname;
28439f5e
PA
2795 int pid;
2796
974e6844 2797 if (strchr (shell_file, '/') == NULL)
c906108c
SS
2798 {
2799
2800 /* We will be looking down the PATH to find shell_file. If we
c3f6f71d
JM
2801 just do this the normal way (via execlp, which operates by
2802 attempting an exec for each element of the PATH until it
2803 finds one which succeeds), then there will be an exec for
2804 each failed attempt, each of which will cause a PR_SYSEXIT
2805 stop, and we won't know how to distinguish the PR_SYSEXIT's
2806 for these failed execs with the ones for successful execs
2807 (whether the exec has succeeded is stored at that time in the
2808 carry bit or some such architecture-specific and
2809 non-ABI-specified place).
2810
2811 So I can't think of anything better than to search the PATH
2812 now. This has several disadvantages: (1) There is a race
2813 condition; if we find a file now and it is deleted before we
2814 exec it, we lose, even if the deletion leaves a valid file
2815 further down in the PATH, (2) there is no way to know exactly
2816 what an executable (in the sense of "capable of being
2817 exec'd") file is. Using access() loses because it may lose
2818 if the caller is the superuser; failing to use it loses if
2819 there are ACLs or some such. */
c906108c 2820
995816ba
PA
2821 const char *p;
2822 const char *p1;
c906108c 2823 /* FIXME-maybe: might want "set path" command so user can change what
c3f6f71d 2824 path is used from within GDB. */
995816ba 2825 const char *path = getenv ("PATH");
c906108c
SS
2826 int len;
2827 struct stat statbuf;
2828
2829 if (path == NULL)
2830 path = "/bin:/usr/bin";
2831
b196bc4c 2832 tryname = (char *) alloca (strlen (path) + strlen (shell_file) + 2);
c3f6f71d 2833 for (p = path; p != NULL; p = p1 ? p1 + 1: NULL)
c906108c
SS
2834 {
2835 p1 = strchr (p, ':');
2836 if (p1 != NULL)
2837 len = p1 - p;
2838 else
2839 len = strlen (p);
2840 strncpy (tryname, p, len);
2841 tryname[len] = '\0';
2842 strcat (tryname, "/");
2843 strcat (tryname, shell_file);
2844 if (access (tryname, X_OK) < 0)
2845 continue;
2846 if (stat (tryname, &statbuf) < 0)
2847 continue;
2848 if (!S_ISREG (statbuf.st_mode))
2849 /* We certainly need to reject directories. I'm not quite
2850 as sure about FIFOs, sockets, etc., but I kind of doubt
2851 that people want to exec() these things. */
2852 continue;
2853 break;
2854 }
2855 if (p == NULL)
2856 /* Not found. This must be an error rather than merely passing
2857 the file to execlp(), because execlp() would try all the
2858 exec()s, causing GDB to get confused. */
8a3fe4f8 2859 error (_("procfs:%d -- Can't find shell %s in PATH"),
c3f6f71d 2860 __LINE__, shell_file);
c906108c
SS
2861
2862 shell_file = tryname;
2863 }
2864
25b48839 2865 inferior *inf = current_inferior ();
c8fbd44a 2866 if (!inf->target_is_pushed (this))
25b48839 2867 inf->push_target (this);
cf6f3e86 2868
28439f5e 2869 pid = fork_inferior (exec_file, allargs, env, procfs_set_exec_trap,
c6d36836 2870 NULL, procfs_pre_trace, shell_file, NULL);
28439f5e 2871
2090129c
SDJ
2872 /* We have something that executes now. We'll be running through
2873 the shell at this point (if startup-with-shell is true), but the
2874 pid shouldn't change. */
7fb43e53
PA
2875 thread_info *thr = add_thread_silent (this, ptid_t (pid));
2876 switch_to_thread (thr);
2090129c 2877
5b6d1e4f 2878 procfs_init_inferior (pid);
27087a3d
JB
2879}
2880
e8032dde 2881/* Callback for update_thread_list. Calls "add_thread". */
c906108c 2882
c3f6f71d 2883static int
fba45db2 2884procfs_notice_thread (procinfo *pi, procinfo *thread, void *ptr)
c906108c 2885{
fd79271b 2886 ptid_t gdb_threadid = ptid_t (pi->pid, thread->tid, 0);
c906108c 2887
5b6d1e4f 2888 thread_info *thr = find_thread_ptid (&the_procfs_target, gdb_threadid);
24bce9bb 2889 if (thr == NULL || thr->state == THREAD_EXITED)
5b6d1e4f 2890 add_thread (&the_procfs_target, gdb_threadid);
c906108c 2891
c3f6f71d
JM
2892 return 0;
2893}
2894
77382aee
PA
2895/* Query all the threads that the target knows about, and give them
2896 back to GDB to add to its list. */
c3f6f71d 2897
f6ac5f3d
PA
2898void
2899procfs_target::update_thread_list ()
c3f6f71d
JM
2900{
2901 procinfo *pi;
2902
e8032dde
PA
2903 prune_threads ();
2904
0df8b418 2905 /* Find procinfo for main process. */
e99b03dc 2906 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c3f6f71d
JM
2907 proc_update_threads (pi);
2908 proc_iterate_over_threads (pi, procfs_notice_thread, NULL);
c906108c
SS
2909}
2910
77382aee
PA
2911/* Return true if the thread is still 'alive'. This guy doesn't
2912 really seem to be doing his job. Got to investigate how to tell
2913 when a thread is really gone. */
c906108c 2914
57810aa7 2915bool
f6ac5f3d 2916procfs_target::thread_alive (ptid_t ptid)
c906108c 2917{
c3f6f71d
JM
2918 int proc, thread;
2919 procinfo *pi;
c906108c 2920
e99b03dc 2921 proc = ptid.pid ();
e38504b3 2922 thread = ptid.lwp ();
0df8b418 2923 /* If I don't know it, it ain't alive! */
c475f569
RO
2924 pi = find_procinfo (proc, thread);
2925 if (pi == NULL)
57810aa7 2926 return false;
c3f6f71d
JM
2927
2928 /* If I can't get its status, it ain't alive!
2929 What's more, I need to forget about it! */
2930 if (!proc_get_status (pi))
2931 {
2932 destroy_procinfo (pi);
57810aa7 2933 return false;
c3f6f71d 2934 }
77382aee
PA
2935 /* I couldn't have got its status if it weren't alive, so it's
2936 alive. */
57810aa7 2937 return true;
c906108c 2938}
c3f6f71d 2939
a068643d 2940/* Convert PTID to a string. */
c3f6f71d 2941
a068643d 2942std::string
f6ac5f3d 2943procfs_target::pid_to_str (ptid_t ptid)
c3f6f71d 2944{
e38504b3 2945 if (ptid.lwp () == 0)
a068643d 2946 return string_printf ("process %d", ptid.pid ());
c3f6f71d 2947 else
a068643d 2948 return string_printf ("LWP %ld", ptid.lwp ());
c3f6f71d
JM
2949}
2950
4206c05e
RO
2951/* Accepts an integer PID; Returns a string representing a file that
2952 can be opened to get the symbols for the child process. */
2953
2954char *
2955procfs_target::pid_to_exec_file (int pid)
2956{
2957 static char buf[PATH_MAX];
2958 char name[PATH_MAX];
2959
2960 /* Solaris 11 introduced /proc/<proc-id>/execname. */
c475f569 2961 xsnprintf (name, sizeof (name), "/proc/%d/execname", pid);
4206c05e
RO
2962 scoped_fd fd (gdb_open_cloexec (name, O_RDONLY, 0));
2963 if (fd.get () < 0 || read (fd.get (), buf, PATH_MAX - 1) < 0)
2964 {
2965 /* If that fails, fall back to /proc/<proc-id>/path/a.out introduced in
2966 Solaris 10. */
2967 ssize_t len;
2968
c475f569 2969 xsnprintf (name, sizeof (name), "/proc/%d/path/a.out", pid);
4206c05e
RO
2970 len = readlink (name, buf, PATH_MAX - 1);
2971 if (len <= 0)
2972 strcpy (buf, name);
2973 else
2974 buf[len] = '\0';
2975 }
2976
2977 return buf;
2978}
2979
77382aee 2980/* Insert a watchpoint. */
c3f6f71d 2981
a0911fd0 2982static int
39f77062 2983procfs_set_watchpoint (ptid_t ptid, CORE_ADDR addr, int len, int rwflag,
77382aee 2984 int after)
c906108c 2985{
c3f6f71d 2986 int pflags = 0;
19958708 2987 procinfo *pi;
c3f6f71d 2988
e99b03dc
TT
2989 pi = find_procinfo_or_die (ptid.pid () == -1 ?
2990 inferior_ptid.pid () : ptid.pid (),
dfd4cc63 2991 0);
c3f6f71d 2992
0df8b418
MS
2993 /* Translate from GDB's flags to /proc's. */
2994 if (len > 0) /* len == 0 means delete watchpoint. */
c906108c 2995 {
0df8b418 2996 switch (rwflag) { /* FIXME: need an enum! */
c3f6f71d 2997 case hw_write: /* default watchpoint (write) */
196535a6 2998 pflags = WA_WRITE;
c3f6f71d
JM
2999 break;
3000 case hw_read: /* read watchpoint */
196535a6 3001 pflags = WA_READ;
c3f6f71d
JM
3002 break;
3003 case hw_access: /* access watchpoint */
196535a6 3004 pflags = WA_READ | WA_WRITE;
c3f6f71d
JM
3005 break;
3006 case hw_execute: /* execution HW breakpoint */
196535a6 3007 pflags = WA_EXEC;
c3f6f71d 3008 break;
0df8b418 3009 default: /* Something weird. Return error. */
c906108c 3010 return -1;
c3f6f71d 3011 }
0df8b418 3012 if (after) /* Stop after r/w access is completed. */
196535a6 3013 pflags |= WA_TRAPAFTER;
c3f6f71d
JM
3014 }
3015
3016 if (!proc_set_watchpoint (pi, addr, len, pflags))
3017 {
0df8b418 3018 if (errno == E2BIG) /* Typical error for no resources. */
c3f6f71d
JM
3019 return -1; /* fail */
3020 /* GDB may try to remove the same watchpoint twice.
3021 If a remove request returns no match, don't error. */
c906108c 3022 if (errno == ESRCH && len == 0)
c3f6f71d
JM
3023 return 0; /* ignore */
3024 proc_error (pi, "set_watchpoint", __LINE__);
c906108c
SS
3025 }
3026 return 0;
3027}
3028
1e03ad20
KB
3029/* Return non-zero if we can set a hardware watchpoint of type TYPE. TYPE
3030 is one of bp_hardware_watchpoint, bp_read_watchpoint, bp_write_watchpoint,
3031 or bp_hardware_watchpoint. CNT is the number of watchpoints used so
196535a6 3032 far. */
1e03ad20 3033
f6ac5f3d
PA
3034int
3035procfs_target::can_use_hw_breakpoint (enum bptype type, int cnt, int othertype)
1e03ad20 3036{
1e03ad20
KB
3037 /* Due to the way that proc_set_watchpoint() is implemented, host
3038 and target pointers must be of the same size. If they are not,
3039 we can't use hardware watchpoints. This limitation is due to the
9a043c1d
AC
3040 fact that proc_set_watchpoint() calls
3041 procfs_address_to_host_pointer(); a close inspection of
3042 procfs_address_to_host_pointer will reveal that an internal error
3043 will be generated when the host and target pointer sizes are
3044 different. */
f5656ead 3045 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
f4a14ae6 3046
4e906f53 3047 if (sizeof (void *) != TYPE_LENGTH (ptr_type))
1e03ad20
KB
3048 return 0;
3049
3050 /* Other tests here??? */
3051
3052 return 1;
1e03ad20
KB
3053}
3054
77382aee
PA
3055/* Returns non-zero if process is stopped on a hardware watchpoint
3056 fault, else returns zero. */
c3f6f71d 3057
57810aa7 3058bool
f6ac5f3d 3059procfs_target::stopped_by_watchpoint ()
c906108c 3060{
c3f6f71d 3061 procinfo *pi;
c906108c 3062
e99b03dc 3063 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
aaeb7efa 3064
c3f6f71d 3065 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
c475f569
RO
3066 if (proc_why (pi) == PR_FAULTED)
3067 if (proc_what (pi) == FLTWATCH)
3068 return true;
57810aa7 3069 return false;
c906108c 3070}
c906108c 3071
77382aee
PA
3072/* Returns 1 if the OS knows the position of the triggered watchpoint,
3073 and sets *ADDR to that address. Returns 0 if OS cannot report that
3074 address. This function is only called if
3075 procfs_stopped_by_watchpoint returned 1, thus no further checks are
3076 done. The function also assumes that ADDR is not NULL. */
bf701c2c 3077
57810aa7 3078bool
f6ac5f3d 3079procfs_target::stopped_data_address (CORE_ADDR *addr)
bf701c2c
PM
3080{
3081 procinfo *pi;
3082
e99b03dc 3083 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
bf701c2c
PM
3084 return proc_watchpoint_address (pi, addr);
3085}
3086
f6ac5f3d
PA
3087int
3088procfs_target::insert_watchpoint (CORE_ADDR addr, int len,
3089 enum target_hw_bp_type type,
3090 struct expression *cond)
25513619 3091{
9aed480c 3092 if (!target_have_steppable_watchpoint ()
f5656ead 3093 && !gdbarch_have_nonsteppable_watchpoint (target_gdbarch ()))
c475f569
RO
3094 /* When a hardware watchpoint fires off the PC will be left at
3095 the instruction following the one which caused the
3096 watchpoint. It will *NOT* be necessary for GDB to step over
3097 the watchpoint. */
3098 return procfs_set_watchpoint (inferior_ptid, addr, len, type, 1);
25513619 3099 else
c475f569
RO
3100 /* When a hardware watchpoint fires off the PC will be left at
3101 the instruction which caused the watchpoint. It will be
3102 necessary for GDB to step over the watchpoint. */
3103 return procfs_set_watchpoint (inferior_ptid, addr, len, type, 0);
25513619
PA
3104}
3105
f6ac5f3d
PA
3106int
3107procfs_target::remove_watchpoint (CORE_ADDR addr, int len,
3108 enum target_hw_bp_type type,
3109 struct expression *cond)
25513619
PA
3110{
3111 return procfs_set_watchpoint (inferior_ptid, addr, 0, 0, 0);
3112}
3113
f6ac5f3d
PA
3114int
3115procfs_target::region_ok_for_hw_watchpoint (CORE_ADDR addr, int len)
25513619
PA
3116{
3117 /* The man page for proc(4) on Solaris 2.6 and up says that the
3118 system can support "thousands" of hardware watchpoints, but gives
3119 no method for finding out how many; It doesn't say anything about
3120 the allowed size for the watched area either. So we just tell
3121 GDB 'yes'. */
3122 return 1;
3123}
3124
77382aee
PA
3125/* Memory Mappings Functions: */
3126
3127/* Call a callback function once for each mapping, passing it the
3128 mapping, an optional secondary callback function, and some optional
3129 opaque data. Quit and return the first non-zero value returned
3130 from the callback.
3131
3132 PI is the procinfo struct for the process to be mapped. FUNC is
3133 the callback function to be called by this iterator. DATA is the
3134 optional opaque data to be passed to the callback function.
3135 CHILD_FUNC is the optional secondary function pointer to be passed
3136 to the child function. Returns the first non-zero return value
3137 from the callback function, or zero. */
831e682e
MS
3138
3139static int
b8edc417 3140iterate_over_mappings (procinfo *pi, find_memory_region_ftype child_func,
e9ef4f39 3141 void *data,
19958708 3142 int (*func) (struct prmap *map,
b8edc417 3143 find_memory_region_ftype child_func,
831e682e
MS
3144 void *data))
3145{
3146 char pathname[MAX_PROC_NAME_SIZE];
3147 struct prmap *prmaps;
3148 struct prmap *prmap;
3149 int funcstat;
831e682e 3150 int nmap;
831e682e 3151 struct stat sbuf;
831e682e 3152
19958708 3153 /* Get the number of mappings, allocate space,
831e682e 3154 and read the mappings into prmaps. */
0df8b418 3155 /* Open map fd. */
c475f569 3156 xsnprintf (pathname, sizeof (pathname), "/proc/%d/map", pi->pid);
831e682e 3157
5dc1a704
TT
3158 scoped_fd map_fd (open (pathname, O_RDONLY));
3159 if (map_fd.get () < 0)
3160 proc_error (pi, "iterate_over_mappings (open)", __LINE__);
831e682e 3161
19958708 3162 /* Use stat to determine the file size, and compute
831e682e 3163 the number of prmap_t objects it contains. */
5dc1a704 3164 if (fstat (map_fd.get (), &sbuf) != 0)
831e682e
MS
3165 proc_error (pi, "iterate_over_mappings (fstat)", __LINE__);
3166
3167 nmap = sbuf.st_size / sizeof (prmap_t);
3168 prmaps = (struct prmap *) alloca ((nmap + 1) * sizeof (*prmaps));
5dc1a704 3169 if (read (map_fd.get (), (char *) prmaps, nmap * sizeof (*prmaps))
831e682e
MS
3170 != (nmap * sizeof (*prmaps)))
3171 proc_error (pi, "iterate_over_mappings (read)", __LINE__);
831e682e
MS
3172
3173 for (prmap = prmaps; nmap > 0; prmap++, nmap--)
c475f569
RO
3174 {
3175 funcstat = (*func) (prmap, child_func, data);
3176 if (funcstat != 0)
3177 return funcstat;
3178 }
831e682e
MS
3179
3180 return 0;
3181}
3182
77382aee 3183/* Implements the to_find_memory_regions method. Calls an external
b8edc417 3184 function for each memory region.
77382aee 3185 Returns the integer value returned by the callback. */
be4d1333
MS
3186
3187static int
19958708 3188find_memory_regions_callback (struct prmap *map,
b8edc417 3189 find_memory_region_ftype func, void *data)
be4d1333 3190{
bf75638e 3191 return (*func) ((CORE_ADDR) map->pr_vaddr,
19958708 3192 map->pr_size,
be4d1333
MS
3193 (map->pr_mflags & MA_READ) != 0,
3194 (map->pr_mflags & MA_WRITE) != 0,
19958708 3195 (map->pr_mflags & MA_EXEC) != 0,
4f69f4c2 3196 1, /* MODIFIED is unknown, pass it as true. */
be4d1333
MS
3197 data);
3198}
3199
77382aee
PA
3200/* External interface. Calls a callback function once for each
3201 mapped memory region in the child process, passing as arguments:
3202
3203 CORE_ADDR virtual_address,
3204 unsigned long size,
3205 int read, TRUE if region is readable by the child
3206 int write, TRUE if region is writable by the child
3207 int execute TRUE if region is executable by the child.
3208
3209 Stops iterating and returns the first non-zero value returned by
3210 the callback. */
be4d1333 3211
f6ac5f3d
PA
3212int
3213procfs_target::find_memory_regions (find_memory_region_ftype func, void *data)
be4d1333 3214{
e99b03dc 3215 procinfo *pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
be4d1333 3216
19958708 3217 return iterate_over_mappings (pi, func, data,
be4d1333
MS
3218 find_memory_regions_callback);
3219}
3220
77382aee 3221/* Returns an ascii representation of a memory mapping's flags. */
c3f6f71d 3222
388faa48 3223static char *
5ae5f592 3224mappingflags (long flags)
388faa48
MS
3225{
3226 static char asciiflags[8];
3227
3228 strcpy (asciiflags, "-------");
388faa48
MS
3229 if (flags & MA_STACK)
3230 asciiflags[1] = 's';
3231 if (flags & MA_BREAK)
3232 asciiflags[2] = 'b';
3233 if (flags & MA_SHARED)
3234 asciiflags[3] = 's';
3235 if (flags & MA_READ)
3236 asciiflags[4] = 'r';
3237 if (flags & MA_WRITE)
3238 asciiflags[5] = 'w';
3239 if (flags & MA_EXEC)
3240 asciiflags[6] = 'x';
3241 return (asciiflags);
3242}
3243
77382aee
PA
3244/* Callback function, does the actual work for 'info proc
3245 mappings'. */
831e682e 3246
831e682e 3247static int
b8edc417 3248info_mappings_callback (struct prmap *map, find_memory_region_ftype ignore,
e9ef4f39 3249 void *unused)
831e682e 3250{
0b62613e 3251 unsigned int pr_off;
831e682e 3252
0b62613e 3253 pr_off = (unsigned int) map->pr_offset;
0b62613e 3254
f5656ead 3255 if (gdbarch_addr_bit (target_gdbarch ()) == 32)
f6a96b83 3256 printf_filtered ("\t%#10lx %#10lx %#10lx %#10x %7s\n",
0b62613e
PA
3257 (unsigned long) map->pr_vaddr,
3258 (unsigned long) map->pr_vaddr + map->pr_size - 1,
f6a96b83 3259 (unsigned long) map->pr_size,
0b62613e
PA
3260 pr_off,
3261 mappingflags (map->pr_mflags));
3262 else
f6a96b83 3263 printf_filtered (" %#18lx %#18lx %#10lx %#10x %7s\n",
0b62613e
PA
3264 (unsigned long) map->pr_vaddr,
3265 (unsigned long) map->pr_vaddr + map->pr_size - 1,
f6a96b83 3266 (unsigned long) map->pr_size,
0b62613e
PA
3267 pr_off,
3268 mappingflags (map->pr_mflags));
831e682e
MS
3269
3270 return 0;
3271}
3272
77382aee 3273/* Implement the "info proc mappings" subcommand. */
388faa48
MS
3274
3275static void
3276info_proc_mappings (procinfo *pi, int summary)
3277{
388faa48 3278 if (summary)
0df8b418 3279 return; /* No output for summary mode. */
388faa48 3280
a3f17187 3281 printf_filtered (_("Mapped address spaces:\n\n"));
f5656ead 3282 if (gdbarch_ptr_bit (target_gdbarch ()) == 32)
0b62613e
PA
3283 printf_filtered ("\t%10s %10s %10s %10s %7s\n",
3284 "Start Addr",
3285 " End Addr",
3286 " Size",
3287 " Offset",
3288 "Flags");
3289 else
3290 printf_filtered (" %18s %18s %10s %10s %7s\n",
3291 "Start Addr",
3292 " End Addr",
3293 " Size",
3294 " Offset",
3295 "Flags");
388faa48 3296
831e682e 3297 iterate_over_mappings (pi, NULL, NULL, info_mappings_callback);
388faa48
MS
3298 printf_filtered ("\n");
3299}
3300
77382aee 3301/* Implement the "info proc" command. */
c3f6f71d 3302
f6ac5f3d
PA
3303bool
3304procfs_target::info_proc (const char *args, enum info_proc_what what)
c906108c 3305{
388faa48
MS
3306 procinfo *process = NULL;
3307 procinfo *thread = NULL;
388faa48
MS
3308 char *tmp = NULL;
3309 int pid = 0;
3310 int tid = 0;
3311 int mappings = 0;
c906108c 3312
145b16a9
UW
3313 switch (what)
3314 {
3315 case IP_MINIMAL:
3316 break;
3317
3318 case IP_MAPPINGS:
3319 case IP_ALL:
3320 mappings = 1;
3321 break;
3322
3323 default:
3324 error (_("Not supported on this target."));
3325 }
3326
773a1edc 3327 gdb_argv built_argv (args);
4fa7574e 3328 for (char *arg : built_argv)
c3f6f71d 3329 {
773a1edc 3330 if (isdigit (arg[0]))
c3f6f71d 3331 {
773a1edc 3332 pid = strtoul (arg, &tmp, 10);
c3f6f71d
JM
3333 if (*tmp == '/')
3334 tid = strtoul (++tmp, NULL, 10);
3335 }
773a1edc 3336 else if (arg[0] == '/')
c3f6f71d 3337 {
773a1edc 3338 tid = strtoul (arg + 1, NULL, 10);
c3f6f71d 3339 }
c3f6f71d 3340 }
5b4cbbe3
TT
3341
3342 procinfo_up temporary_procinfo;
c3f6f71d 3343 if (pid == 0)
e99b03dc 3344 pid = inferior_ptid.pid ();
c3f6f71d 3345 if (pid == 0)
8a3fe4f8 3346 error (_("No current process: you must name one."));
c3f6f71d 3347 else
c906108c 3348 {
c3f6f71d 3349 /* Have pid, will travel.
0df8b418 3350 First see if it's a process we're already debugging. */
c3f6f71d
JM
3351 process = find_procinfo (pid, 0);
3352 if (process == NULL)
3353 {
19958708 3354 /* No. So open a procinfo for it, but
c3f6f71d
JM
3355 remember to close it again when finished. */
3356 process = create_procinfo (pid, 0);
5b4cbbe3 3357 temporary_procinfo.reset (process);
c3f6f71d
JM
3358 if (!open_procinfo_files (process, FD_CTL))
3359 proc_error (process, "info proc, open_procinfo_files", __LINE__);
3360 }
c906108c 3361 }
c3f6f71d
JM
3362 if (tid != 0)
3363 thread = create_procinfo (pid, tid);
3364
3365 if (process)
3366 {
a3f17187 3367 printf_filtered (_("process %d flags:\n"), process->pid);
c3f6f71d
JM
3368 proc_prettyprint_flags (proc_flags (process), 1);
3369 if (proc_flags (process) & (PR_STOPPED | PR_ISTOP))
3370 proc_prettyprint_why (proc_why (process), proc_what (process), 1);
3371 if (proc_get_nthreads (process) > 1)
19958708 3372 printf_filtered ("Process has %d threads.\n",
c3f6f71d
JM
3373 proc_get_nthreads (process));
3374 }
3375 if (thread)
3376 {
a3f17187 3377 printf_filtered (_("thread %d flags:\n"), thread->tid);
c3f6f71d
JM
3378 proc_prettyprint_flags (proc_flags (thread), 1);
3379 if (proc_flags (thread) & (PR_STOPPED | PR_ISTOP))
3380 proc_prettyprint_why (proc_why (thread), proc_what (thread), 1);
3381 }
3382
388faa48 3383 if (mappings)
c475f569 3384 info_proc_mappings (process, 0);
388faa48 3385
f6ac5f3d 3386 return true;
c906108c
SS
3387}
3388
9185ddce
JB
3389/* Modify the status of the system call identified by SYSCALLNUM in
3390 the set of syscalls that are currently traced/debugged.
3391
3392 If ENTRY_OR_EXIT is set to PR_SYSENTRY, then the entry syscalls set
0df8b418 3393 will be updated. Otherwise, the exit syscalls set will be updated.
9185ddce 3394
0df8b418 3395 If MODE is FLAG_SET, then traces will be enabled. Otherwise, they
9185ddce
JB
3396 will be disabled. */
3397
3398static void
3399proc_trace_syscalls_1 (procinfo *pi, int syscallnum, int entry_or_exit,
77382aee 3400 int mode, int from_tty)
9185ddce
JB
3401{
3402 sysset_t *sysset;
77382aee 3403
9185ddce
JB
3404 if (entry_or_exit == PR_SYSENTRY)
3405 sysset = proc_get_traced_sysentry (pi, NULL);
3406 else
3407 sysset = proc_get_traced_sysexit (pi, NULL);
3408
3409 if (sysset == NULL)
3410 proc_error (pi, "proc-trace, get_traced_sysset", __LINE__);
3411
3412 if (mode == FLAG_SET)
44122162 3413 praddset (sysset, syscallnum);
9185ddce 3414 else
44122162 3415 prdelset (sysset, syscallnum);
9185ddce
JB
3416
3417 if (entry_or_exit == PR_SYSENTRY)
3418 {
3419 if (!proc_set_traced_sysentry (pi, sysset))
77382aee 3420 proc_error (pi, "proc-trace, set_traced_sysentry", __LINE__);
9185ddce
JB
3421 }
3422 else
3423 {
3424 if (!proc_set_traced_sysexit (pi, sysset))
77382aee 3425 proc_error (pi, "proc-trace, set_traced_sysexit", __LINE__);
9185ddce
JB
3426 }
3427}
3428
c3f6f71d 3429static void
0b39b52e 3430proc_trace_syscalls (const char *args, int from_tty, int entry_or_exit, int mode)
c906108c 3431{
c3f6f71d 3432 procinfo *pi;
c906108c 3433
e99b03dc 3434 if (inferior_ptid.pid () <= 0)
8a3fe4f8 3435 error (_("you must be debugging a process to use this command."));
c906108c 3436
c3f6f71d 3437 if (args == NULL || args[0] == 0)
e2e0b3e5 3438 error_no_arg (_("system call to trace"));
c3f6f71d 3439
e99b03dc 3440 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c3f6f71d
JM
3441 if (isdigit (args[0]))
3442 {
9185ddce 3443 const int syscallnum = atoi (args);
c906108c 3444
9185ddce 3445 proc_trace_syscalls_1 (pi, syscallnum, entry_or_exit, mode, from_tty);
c3f6f71d
JM
3446 }
3447}
3448
19958708 3449static void
0b39b52e 3450proc_trace_sysentry_cmd (const char *args, int from_tty)
c906108c 3451{
c3f6f71d
JM
3452 proc_trace_syscalls (args, from_tty, PR_SYSENTRY, FLAG_SET);
3453}
c906108c 3454
19958708 3455static void
0b39b52e 3456proc_trace_sysexit_cmd (const char *args, int from_tty)
c3f6f71d
JM
3457{
3458 proc_trace_syscalls (args, from_tty, PR_SYSEXIT, FLAG_SET);
c906108c 3459}
c906108c 3460
19958708 3461static void
0b39b52e 3462proc_untrace_sysentry_cmd (const char *args, int from_tty)
c3f6f71d
JM
3463{
3464 proc_trace_syscalls (args, from_tty, PR_SYSENTRY, FLAG_RESET);
3465}
3466
19958708 3467static void
0b39b52e 3468proc_untrace_sysexit_cmd (const char *args, int from_tty)
c906108c 3469{
c3f6f71d
JM
3470 proc_trace_syscalls (args, from_tty, PR_SYSEXIT, FLAG_RESET);
3471}
c906108c 3472
6c265988 3473void _initialize_procfs ();
c906108c 3474void
6c265988 3475_initialize_procfs ()
c906108c 3476{
19958708 3477 add_com ("proc-trace-entry", no_class, proc_trace_sysentry_cmd,
1bedd215 3478 _("Give a trace of entries into the syscall."));
19958708 3479 add_com ("proc-trace-exit", no_class, proc_trace_sysexit_cmd,
1bedd215 3480 _("Give a trace of exits from the syscall."));
19958708 3481 add_com ("proc-untrace-entry", no_class, proc_untrace_sysentry_cmd,
1bedd215 3482 _("Cancel a trace of entries into the syscall."));
19958708 3483 add_com ("proc-untrace-exit", no_class, proc_untrace_sysexit_cmd,
1bedd215 3484 _("Cancel a trace of exits from the syscall."));
c1955e17 3485
62c808ae 3486 add_inf_child_target (&the_procfs_target);
c3f6f71d
JM
3487}
3488
3489/* =================== END, GDB "MODULE" =================== */
3490
3491
3492
77382aee
PA
3493/* miscellaneous stubs: */
3494
3495/* The following satisfy a few random symbols mostly created by the
3496 solaris threads implementation, which I will chase down later. */
c3f6f71d 3497
77382aee
PA
3498/* Return a pid for which we guarantee we will be able to find a
3499 'live' procinfo. */
c3f6f71d 3500
39f77062 3501ptid_t
fba45db2 3502procfs_first_available (void)
c3f6f71d 3503{
f2907e49 3504 return ptid_t (procinfo_list ? procinfo_list->pid : -1);
c3f6f71d 3505}
be4d1333
MS
3506
3507/* =================== GCORE .NOTE "MODULE" =================== */
3508
24f5300a 3509static void
19958708 3510procfs_do_thread_registers (bfd *obfd, ptid_t ptid,
24f5300a
SM
3511 gdb::unique_xmalloc_ptr<char> &note_data,
3512 int *note_size, enum gdb_signal stop_signal)
be4d1333 3513{
5b6d1e4f 3514 struct regcache *regcache = get_thread_regcache (&the_procfs_target, ptid);
be4d1333
MS
3515 gdb_gregset_t gregs;
3516 gdb_fpregset_t fpregs;
3517 unsigned long merged_pid;
3518
e38504b3 3519 merged_pid = ptid.lwp () << 16 | ptid.pid ();
be4d1333 3520
75125405
DJ
3521 /* This part is the old method for fetching registers.
3522 It should be replaced by the newer one using regsets
3523 once it is implemented in this platform:
29082443 3524 gdbarch_iterate_over_regset_sections(). */
75125405 3525
75125405
DJ
3526 target_fetch_registers (regcache, -1);
3527
594f7785 3528 fill_gregset (regcache, &gregs, -1);
24f5300a
SM
3529 note_data.reset (elfcore_write_lwpstatus (obfd,
3530 note_data.release (),
3531 note_size,
3532 merged_pid,
3533 stop_signal,
3534 &gregs));
594f7785 3535 fill_fpregset (regcache, &fpregs, -1);
24f5300a
SM
3536 note_data.reset (elfcore_write_prfpreg (obfd,
3537 note_data.release (),
3538 note_size,
3539 &fpregs,
3540 sizeof (fpregs)));
be4d1333
MS
3541}
3542
24f5300a
SM
3543struct procfs_corefile_thread_data
3544{
3545 procfs_corefile_thread_data (bfd *obfd,
3546 gdb::unique_xmalloc_ptr<char> &note_data,
3547 int *note_size, gdb_signal stop_signal)
3548 : obfd (obfd), note_data (note_data), note_size (note_size),
3549 stop_signal (stop_signal)
3550 {}
3551
be4d1333 3552 bfd *obfd;
24f5300a 3553 gdb::unique_xmalloc_ptr<char> &note_data;
be4d1333 3554 int *note_size;
2ea28649 3555 enum gdb_signal stop_signal;
be4d1333
MS
3556};
3557
3558static int
65554fef 3559procfs_corefile_thread_callback (procinfo *pi, procinfo *thread, void *data)
be4d1333 3560{
b196bc4c
RO
3561 struct procfs_corefile_thread_data *args
3562 = (struct procfs_corefile_thread_data *) data;
be4d1333 3563
2689673f 3564 if (pi != NULL)
be4d1333 3565 {
fd79271b 3566 ptid_t ptid = ptid_t (pi->pid, thread->tid, 0);
f4a14ae6 3567
24f5300a
SM
3568 procfs_do_thread_registers (args->obfd, ptid,
3569 args->note_data,
3570 args->note_size,
3571 args->stop_signal);
be4d1333
MS
3572 }
3573 return 0;
3574}
3575
a223f1e7
JB
3576static int
3577find_signalled_thread (struct thread_info *info, void *data)
3578{
a493e3e2 3579 if (info->suspend.stop_signal != GDB_SIGNAL_0
e99b03dc 3580 && info->ptid.pid () == inferior_ptid.pid ())
a223f1e7
JB
3581 return 1;
3582
3583 return 0;
3584}
3585
2ea28649 3586static enum gdb_signal
a223f1e7
JB
3587find_stop_signal (void)
3588{
3589 struct thread_info *info =
3590 iterate_over_threads (find_signalled_thread, NULL);
3591
3592 if (info)
16c381f0 3593 return info->suspend.stop_signal;
a223f1e7 3594 else
a493e3e2 3595 return GDB_SIGNAL_0;
a223f1e7
JB
3596}
3597
24f5300a 3598gdb::unique_xmalloc_ptr<char>
f6ac5f3d 3599procfs_target::make_corefile_notes (bfd *obfd, int *note_size)
be4d1333 3600{
be4d1333 3601 gdb_gregset_t gregs;
be4d1333
MS
3602 char fname[16] = {'\0'};
3603 char psargs[80] = {'\0'};
e99b03dc 3604 procinfo *pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
24f5300a 3605 gdb::unique_xmalloc_ptr<char> note_data;
cbaaa0ca 3606 const char *inf_args;
2ea28649 3607 enum gdb_signal stop_signal;
be4d1333
MS
3608
3609 if (get_exec_file (0))
3610 {
9f37bbcc 3611 strncpy (fname, lbasename (get_exec_file (0)), sizeof (fname));
4e2af517
JM
3612 fname[sizeof (fname) - 1] = 0;
3613 strncpy (psargs, get_exec_file (0), sizeof (psargs));
3614 psargs[sizeof (psargs) - 1] = 0;
6dbdc4a3
MS
3615
3616 inf_args = get_inferior_args ();
c475f569
RO
3617 if (inf_args && *inf_args
3618 && (strlen (inf_args)
3619 < ((int) sizeof (psargs) - (int) strlen (psargs))))
be4d1333 3620 {
19958708 3621 strncat (psargs, " ",
be4d1333 3622 sizeof (psargs) - strlen (psargs));
19958708 3623 strncat (psargs, inf_args,
be4d1333
MS
3624 sizeof (psargs) - strlen (psargs));
3625 }
3626 }
3627
24f5300a
SM
3628 note_data.reset (elfcore_write_prpsinfo (obfd,
3629 note_data.release (),
3630 note_size,
3631 fname,
3632 psargs));
be4d1333 3633
651c8d2d
PA
3634 stop_signal = find_stop_signal ();
3635
3e3420f6 3636 fill_gregset (get_current_regcache (), &gregs, -1);
24f5300a
SM
3637 note_data.reset (elfcore_write_pstatus (obfd, note_data.release (), note_size,
3638 inferior_ptid.pid (),
3639 stop_signal, &gregs));
3640
3641 procfs_corefile_thread_data thread_args (obfd, note_data, note_size,
3642 stop_signal);
3e43a32a
MS
3643 proc_iterate_over_threads (pi, procfs_corefile_thread_callback,
3644 &thread_args);
be4d1333 3645
62c808ae 3646 gdb::optional<gdb::byte_vector> auxv =
328d42d8
SM
3647 target_read_alloc (current_inferior ()->top_target (),
3648 TARGET_OBJECT_AUXV, NULL);
62c808ae 3649 if (auxv && !auxv->empty ())
24f5300a
SM
3650 note_data.reset (elfcore_write_note (obfd, note_data.release (), note_size,
3651 "CORE", NT_AUXV, auxv->data (),
3652 auxv->size ()));
4e73f23d 3653
be4d1333
MS
3654 return note_data;
3655}
be4d1333 3656/* =================== END GCORE .NOTE "MODULE" =================== */
This page took 2.51563 seconds and 4 git commands to generate.