Multi-target support
[deliverable/binutils-gdb.git] / gdb / procfs.c
CommitLineData
44122162 1/* Machine independent support for Solaris /proc (process file system) for GDB.
2555fe1a 2
b811d2c2 3 Copyright (C) 1999-2020 Free Software Foundation, Inc.
2555fe1a 4
c3f6f71d
JM
5 Written by Michael Snyder at Cygnus Solutions.
6 Based on work by Fred Fish, Stu Grossman, Geoff Noer, and others.
c906108c 7
a9762ec7
JB
8 This file is part of GDB.
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
14
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
21 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c 22
c3f6f71d
JM
23#include "defs.h"
24#include "inferior.h"
45741a9c 25#include "infrun.h"
c3f6f71d
JM
26#include "target.h"
27#include "gdbcore.h"
65554fef 28#include "elf-bfd.h" /* for elfcore_write_* */
c3f6f71d 29#include "gdbcmd.h"
0fda6bd2 30#include "gdbthread.h"
7f7fe91e 31#include "regcache.h"
28439f5e 32#include "inf-child.h"
4fa7574e 33#include "nat/fork-inferior.h"
0d12e84c 34#include "gdbarch.h"
c906108c 35
0df8b418 36#define _STRUCTURED_PROC 1 /* Should be done by configure script. */
c906108c 37
c3f6f71d
JM
38#include <sys/procfs.h>
39#include <sys/fault.h>
40#include <sys/syscall.h>
268a13a5 41#include "gdbsupport/gdb_wait.h"
0fda6bd2
JM
42#include <signal.h>
43#include <ctype.h>
92107356 44#include "gdb_bfd.h"
44270758 45#include "inflow.h"
4e73f23d 46#include "auxv.h"
d1a7880c 47#include "procfs.h"
76727919 48#include "observable.h"
268a13a5
TT
49#include "gdbsupport/scoped_fd.h"
50#include "gdbsupport/pathstuff.h"
0fda6bd2 51
77382aee
PA
52/* This module provides the interface between GDB and the
53 /proc file system, which is used on many versions of Unix
54 as a means for debuggers to control other processes.
55
77382aee
PA
56 /proc works by imitating a file system: you open a simulated file
57 that represents the process you wish to interact with, and perform
58 operations on that "file" in order to examine or change the state
59 of the other process.
60
61 The most important thing to know about /proc and this module is
62 that there are two very different interfaces to /proc:
63
64 One that uses the ioctl system call, and another that uses read
65 and write system calls.
66
44122162
RO
67 This module supports only the Solaris version of the read/write
68 interface. */
77382aee 69
c906108c 70#include <sys/types.h>
2978b111 71#include <dirent.h> /* opendir/readdir, for listing the LWP's */
c906108c 72
c3f6f71d
JM
73#include <fcntl.h> /* for O_RDONLY */
74#include <unistd.h> /* for "X_OK" */
53ce3c39 75#include <sys/stat.h> /* for struct stat */
c906108c 76
103b3ef5
MS
77/* Note: procfs-utils.h must be included after the above system header
78 files, because it redefines various system calls using macros.
79 This may be incompatible with the prototype declarations. */
80
103b3ef5
MS
81#include "proc-utils.h"
82
77382aee 83/* Prototypes for supply_gregset etc. */
c60c0f5f
MS
84#include "gregset.h"
85
c3f6f71d 86/* =================== TARGET_OPS "MODULE" =================== */
c906108c 87
77382aee 88/* This module defines the GDB target vector and its methods. */
c906108c 89
f6ac5f3d 90
e96027e0
PA
91static enum target_xfer_status procfs_xfer_memory (gdb_byte *,
92 const gdb_byte *,
93 ULONGEST, ULONGEST,
94 ULONGEST *);
a14ed312 95
f6ac5f3d
PA
96class procfs_target final : public inf_child_target
97{
98public:
99 void create_inferior (const char *, const std::string &,
100 char **, int) override;
101
102 void kill () override;
103
104 void mourn_inferior () override;
105
106 void attach (const char *, int) override;
107 void detach (inferior *inf, int) override;
108
109 void resume (ptid_t, int, enum gdb_signal) override;
110 ptid_t wait (ptid_t, struct target_waitstatus *, int) override;
111
112 void fetch_registers (struct regcache *, int) override;
113 void store_registers (struct regcache *, int) override;
114
115 enum target_xfer_status xfer_partial (enum target_object object,
116 const char *annex,
117 gdb_byte *readbuf,
118 const gdb_byte *writebuf,
119 ULONGEST offset, ULONGEST len,
120 ULONGEST *xfered_len) override;
121
adc6a863 122 void pass_signals (gdb::array_view<const unsigned char>) override;
a14ed312 123
f6ac5f3d 124 void files_info () override;
c3f6f71d 125
f6ac5f3d 126 void update_thread_list () override;
be4d1333 127
57810aa7 128 bool thread_alive (ptid_t ptid) override;
be4d1333 129
a068643d 130 std::string pid_to_str (ptid_t) override;
1e03ad20 131
4206c05e
RO
132 char *pid_to_exec_file (int pid) override;
133
f6ac5f3d
PA
134 thread_control_capabilities get_thread_control_capabilities () override
135 { return tc_schedlock; }
145b16a9 136
f6ac5f3d
PA
137 /* find_memory_regions support method for gcore */
138 int find_memory_regions (find_memory_region_ftype func, void *data)
139 override;
b5c8fcb1 140
f6ac5f3d 141 char *make_corefile_notes (bfd *, int *) override;
b5c8fcb1 142
f6ac5f3d
PA
143 bool info_proc (const char *, enum info_proc_what) override;
144
c475f569 145#if PR_MODEL_NATIVE == PR_MODEL_LP64
f6ac5f3d
PA
146 int auxv_parse (gdb_byte **readptr,
147 gdb_byte *endptr, CORE_ADDR *typep, CORE_ADDR *valp)
148 override;
149#endif
150
57810aa7 151 bool stopped_by_watchpoint () override;
f6ac5f3d
PA
152
153 int insert_watchpoint (CORE_ADDR, int, enum target_hw_bp_type,
154 struct expression *) override;
155
156 int remove_watchpoint (CORE_ADDR, int, enum target_hw_bp_type,
157 struct expression *) override;
158
159 int region_ok_for_hw_watchpoint (CORE_ADDR, int) override;
160
161 int can_use_hw_breakpoint (enum bptype, int, int) override;
57810aa7 162 bool stopped_data_address (CORE_ADDR *) override;
5b6d1e4f
PA
163
164 void procfs_init_inferior (int pid);
f6ac5f3d 165};
b5c8fcb1 166
f6ac5f3d 167static procfs_target the_procfs_target;
b5c8fcb1 168
c475f569 169#if PR_MODEL_NATIVE == PR_MODEL_LP64
77382aee
PA
170/* When GDB is built as 64-bit application on Solaris, the auxv data
171 is presented in 64-bit format. We need to provide a custom parser
172 to handle that. */
f6ac5f3d
PA
173int
174procfs_target::auxv_parse (gdb_byte **readptr,
175 gdb_byte *endptr, CORE_ADDR *typep, CORE_ADDR *valp)
c47ffbe3 176{
f5656ead 177 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
c47ffbe3
VP
178 gdb_byte *ptr = *readptr;
179
180 if (endptr == ptr)
181 return 0;
77382aee 182
c47ffbe3
VP
183 if (endptr - ptr < 8 * 2)
184 return -1;
185
e17a4113 186 *typep = extract_unsigned_integer (ptr, 4, byte_order);
c47ffbe3
VP
187 ptr += 8;
188 /* The size of data is always 64-bit. If the application is 32-bit,
189 it will be zero extended, as expected. */
e17a4113 190 *valp = extract_unsigned_integer (ptr, 8, byte_order);
c47ffbe3
VP
191 ptr += 8;
192
193 *readptr = ptr;
194 return 1;
195}
196#endif
197
c3f6f71d
JM
198/* =================== END, TARGET_OPS "MODULE" =================== */
199
77382aee
PA
200/* World Unification:
201
202 Put any typedefs, defines etc. here that are required for the
203 unification of code that handles different versions of /proc. */
c3f6f71d 204
44122162
RO
205enum { READ_WATCHFLAG = WA_READ,
206 WRITE_WATCHFLAG = WA_WRITE,
207 EXEC_WATCHFLAG = WA_EXEC,
208 AFTER_WATCHFLAG = WA_TRAPAFTER
209};
c3f6f71d
JM
210
211
212/* =================== STRUCT PROCINFO "MODULE" =================== */
213
214 /* FIXME: this comment will soon be out of date W.R.T. threads. */
215
216/* The procinfo struct is a wrapper to hold all the state information
217 concerning a /proc process. There should be exactly one procinfo
218 for each process, and since GDB currently can debug only one
219 process at a time, that means there should be only one procinfo.
220 All of the LWP's of a process can be accessed indirectly thru the
221 single process procinfo.
222
223 However, against the day when GDB may debug more than one process,
224 this data structure is kept in a list (which for now will hold no
225 more than one member), and many functions will have a pointer to a
226 procinfo as an argument.
227
228 There will be a separate procinfo structure for use by the (not yet
229 implemented) "info proc" command, so that we can print useful
230 information about any random process without interfering with the
0df8b418 231 inferior's procinfo information. */
c3f6f71d 232
c3f6f71d 233/* format strings for /proc paths */
44122162
RO
234#define MAIN_PROC_NAME_FMT "/proc/%d"
235#define CTL_PROC_NAME_FMT "/proc/%d/ctl"
236#define AS_PROC_NAME_FMT "/proc/%d/as"
237#define MAP_PROC_NAME_FMT "/proc/%d/map"
238#define STATUS_PROC_NAME_FMT "/proc/%d/status"
13db92d3 239#define MAX_PROC_NAME_SIZE sizeof("/proc/999999/lwp/0123456789/lwpstatus")
c906108c 240
c3f6f71d
JM
241typedef struct procinfo {
242 struct procinfo *next;
243 int pid; /* Process ID */
244 int tid; /* Thread/LWP id */
c906108c 245
c3f6f71d
JM
246 /* process state */
247 int was_stopped;
248 int ignore_next_sigstop;
c906108c 249
c3f6f71d 250 int ctl_fd; /* File descriptor for /proc control file */
c3f6f71d
JM
251 int status_fd; /* File descriptor for /proc status file */
252 int as_fd; /* File descriptor for /proc as file */
c906108c 253
c3f6f71d 254 char pathname[MAX_PROC_NAME_SIZE]; /* Pathname to /proc entry */
c906108c 255
c3f6f71d 256 fltset_t saved_fltset; /* Saved traced hardware fault set */
44122162
RO
257 sigset_t saved_sigset; /* Saved traced signal set */
258 sigset_t saved_sighold; /* Saved held signal set */
37de36c6
KB
259 sysset_t *saved_exitset; /* Saved traced system call exit set */
260 sysset_t *saved_entryset; /* Saved traced system call entry set */
c906108c 261
44122162 262 pstatus_t prstatus; /* Current process status info */
19958708 263
c3f6f71d 264 struct procinfo *thread_list;
c906108c 265
c3f6f71d
JM
266 int status_valid : 1;
267 int gregs_valid : 1;
268 int fpregs_valid : 1;
269 int threads_valid: 1;
270} procinfo;
c906108c 271
c3f6f71d 272static char errmsg[128]; /* shared error msg buffer */
c906108c 273
c3f6f71d 274/* Function prototypes for procinfo module: */
c906108c 275
a14ed312
KB
276static procinfo *find_procinfo_or_die (int pid, int tid);
277static procinfo *find_procinfo (int pid, int tid);
278static procinfo *create_procinfo (int pid, int tid);
44122162 279static void destroy_procinfo (procinfo *p);
44122162
RO
280static void dead_procinfo (procinfo *p, const char *msg, int killp);
281static int open_procinfo_files (procinfo *p, int which);
282static void close_procinfo_files (procinfo *p);
c906108c 283
e9ef4f39 284static int iterate_over_mappings
b8edc417
JK
285 (procinfo *pi, find_memory_region_ftype child_func, void *data,
286 int (*func) (struct prmap *map, find_memory_region_ftype child_func,
77382aee 287 void *data));
e9ef4f39 288
c3f6f71d 289/* The head of the procinfo list: */
44122162 290static procinfo *procinfo_list;
c906108c 291
77382aee
PA
292/* Search the procinfo list. Return a pointer to procinfo, or NULL if
293 not found. */
c906108c 294
19958708 295static procinfo *
fba45db2 296find_procinfo (int pid, int tid)
c5aa993b 297{
c3f6f71d 298 procinfo *pi;
c906108c 299
c3f6f71d
JM
300 for (pi = procinfo_list; pi; pi = pi->next)
301 if (pi->pid == pid)
302 break;
c906108c 303
c3f6f71d
JM
304 if (pi)
305 if (tid)
306 {
307 /* Don't check threads_valid. If we're updating the
308 thread_list, we want to find whatever threads are already
309 here. This means that in general it is the caller's
310 responsibility to check threads_valid and update before
311 calling find_procinfo, if the caller wants to find a new
77382aee 312 thread. */
c3f6f71d
JM
313
314 for (pi = pi->thread_list; pi; pi = pi->next)
315 if (pi->tid == tid)
316 break;
317 }
c906108c 318
c3f6f71d
JM
319 return pi;
320}
c906108c 321
77382aee 322/* Calls find_procinfo, but errors on failure. */
c906108c 323
c3f6f71d 324static procinfo *
fba45db2 325find_procinfo_or_die (int pid, int tid)
c3f6f71d
JM
326{
327 procinfo *pi = find_procinfo (pid, tid);
c906108c 328
c3f6f71d 329 if (pi == NULL)
0fda6bd2
JM
330 {
331 if (tid)
3e43a32a
MS
332 error (_("procfs: couldn't find pid %d "
333 "(kernel thread %d) in procinfo list."),
0fda6bd2
JM
334 pid, tid);
335 else
8a3fe4f8 336 error (_("procfs: couldn't find pid %d in procinfo list."), pid);
0fda6bd2 337 }
c3f6f71d
JM
338 return pi;
339}
c906108c 340
77382aee
PA
341/* Wrapper for `open'. The appropriate open call is attempted; if
342 unsuccessful, it will be retried as many times as needed for the
343 EAGAIN and EINTR conditions.
19958708 344
77382aee
PA
345 For other conditions, retry the open a limited number of times. In
346 addition, a short sleep is imposed prior to retrying the open. The
347 reason for this sleep is to give the kernel a chance to catch up
348 and create the file in question in the event that GDB "wins" the
349 race to open a file before the kernel has created it. */
19958708 350
4d1bcd09
KB
351static int
352open_with_retry (const char *pathname, int flags)
353{
354 int retries_remaining, status;
355
356 retries_remaining = 2;
357
358 while (1)
359 {
360 status = open (pathname, flags);
361
362 if (status >= 0 || retries_remaining == 0)
363 break;
364 else if (errno != EINTR && errno != EAGAIN)
365 {
366 retries_remaining--;
367 sleep (1);
368 }
369 }
370
371 return status;
372}
373
44122162
RO
374/* Open the file descriptor for the process or LWP. We only open the
375 control file descriptor; the others are opened lazily as needed.
77382aee 376 Returns the file descriptor, or zero for failure. */
c906108c 377
c3f6f71d 378enum { FD_CTL, FD_STATUS, FD_AS };
c906108c 379
c3f6f71d 380static int
fba45db2 381open_procinfo_files (procinfo *pi, int which)
c3f6f71d
JM
382{
383 char tmp[MAX_PROC_NAME_SIZE];
384 int fd;
385
77382aee
PA
386 /* This function is getting ALMOST long enough to break up into
387 several. Here is some rationale:
388
77382aee 389 There are several file descriptors that may need to be open
85102364 390 for any given process or LWP. The ones we're interested in are:
77382aee
PA
391 - control (ctl) write-only change the state
392 - status (status) read-only query the state
393 - address space (as) read/write access memory
394 - map (map) read-only virtual addr map
395 Most of these are opened lazily as they are needed.
396 The pathnames for the 'files' for an LWP look slightly
397 different from those of a first-class process:
398 Pathnames for a process (<proc-id>):
399 /proc/<proc-id>/ctl
400 /proc/<proc-id>/status
401 /proc/<proc-id>/as
402 /proc/<proc-id>/map
403 Pathnames for an LWP (lwp-id):
404 /proc/<proc-id>/lwp/<lwp-id>/lwpctl
405 /proc/<proc-id>/lwp/<lwp-id>/lwpstatus
406 An LWP has no map or address space file descriptor, since
44122162
RO
407 the memory map and address space are shared by all LWPs. */
408
77382aee
PA
409 /* In this case, there are several different file descriptors that
410 we might be asked to open. The control file descriptor will be
411 opened early, but the others will be opened lazily as they are
412 needed. */
c3f6f71d
JM
413
414 strcpy (tmp, pi->pathname);
0df8b418 415 switch (which) { /* Which file descriptor to open? */
c3f6f71d
JM
416 case FD_CTL:
417 if (pi->tid)
418 strcat (tmp, "/lwpctl");
419 else
420 strcat (tmp, "/ctl");
4d1bcd09 421 fd = open_with_retry (tmp, O_WRONLY);
e28cade7 422 if (fd < 0)
c3f6f71d
JM
423 return 0; /* fail */
424 pi->ctl_fd = fd;
425 break;
426 case FD_AS:
427 if (pi->tid)
0df8b418 428 return 0; /* There is no 'as' file descriptor for an lwp. */
c3f6f71d 429 strcat (tmp, "/as");
4d1bcd09 430 fd = open_with_retry (tmp, O_RDWR);
e28cade7 431 if (fd < 0)
c3f6f71d
JM
432 return 0; /* fail */
433 pi->as_fd = fd;
434 break;
435 case FD_STATUS:
436 if (pi->tid)
437 strcat (tmp, "/lwpstatus");
438 else
439 strcat (tmp, "/status");
4d1bcd09 440 fd = open_with_retry (tmp, O_RDONLY);
e28cade7 441 if (fd < 0)
c3f6f71d
JM
442 return 0; /* fail */
443 pi->status_fd = fd;
444 break;
445 default:
446 return 0; /* unknown file descriptor */
447 }
c906108c 448
c3f6f71d
JM
449 return 1; /* success */
450}
c906108c 451
77382aee
PA
452/* Allocate a data structure and link it into the procinfo list.
453 First tries to find a pre-existing one (FIXME: why?). Returns the
454 pointer to new procinfo struct. */
c906108c 455
c3f6f71d 456static procinfo *
fba45db2 457create_procinfo (int pid, int tid)
c3f6f71d 458{
0b62613e 459 procinfo *pi, *parent = NULL;
c906108c 460
c475f569
RO
461 pi = find_procinfo (pid, tid);
462 if (pi != NULL)
0df8b418 463 return pi; /* Already exists, nothing to do. */
c906108c 464
0df8b418 465 /* Find parent before doing malloc, to save having to cleanup. */
c3f6f71d
JM
466 if (tid != 0)
467 parent = find_procinfo_or_die (pid, 0); /* FIXME: should I
468 create it if it
0df8b418 469 doesn't exist yet? */
c906108c 470
8d749320 471 pi = XNEW (procinfo);
c3f6f71d
JM
472 memset (pi, 0, sizeof (procinfo));
473 pi->pid = pid;
474 pi->tid = tid;
c906108c 475
c475f569
RO
476 pi->saved_entryset = XNEW (sysset_t);
477 pi->saved_exitset = XNEW (sysset_t);
1d5e0602 478
c3f6f71d
JM
479 /* Chain into list. */
480 if (tid == 0)
481 {
c475f569 482 xsnprintf (pi->pathname, sizeof (pi->pathname), MAIN_PROC_NAME_FMT, pid);
c3f6f71d
JM
483 pi->next = procinfo_list;
484 procinfo_list = pi;
485 }
486 else
487 {
c475f569
RO
488 xsnprintf (pi->pathname, sizeof (pi->pathname), "/proc/%d/lwp/%d",
489 pid, tid);
c3f6f71d
JM
490 pi->next = parent->thread_list;
491 parent->thread_list = pi;
492 }
493 return pi;
494}
c906108c 495
77382aee 496/* Close all file descriptors associated with the procinfo. */
c906108c 497
c3f6f71d 498static void
fba45db2 499close_procinfo_files (procinfo *pi)
c3f6f71d
JM
500{
501 if (pi->ctl_fd > 0)
502 close (pi->ctl_fd);
c3f6f71d
JM
503 if (pi->as_fd > 0)
504 close (pi->as_fd);
505 if (pi->status_fd > 0)
506 close (pi->status_fd);
c3f6f71d
JM
507 pi->ctl_fd = pi->as_fd = pi->status_fd = 0;
508}
c906108c 509
77382aee 510/* Destructor function. Close, unlink and deallocate the object. */
c906108c 511
c3f6f71d 512static void
fba45db2 513destroy_one_procinfo (procinfo **list, procinfo *pi)
c3f6f71d
JM
514{
515 procinfo *ptr;
516
77382aee 517 /* Step one: unlink the procinfo from its list. */
c3f6f71d
JM
518 if (pi == *list)
519 *list = pi->next;
19958708 520 else
c3f6f71d
JM
521 for (ptr = *list; ptr; ptr = ptr->next)
522 if (ptr->next == pi)
523 {
524 ptr->next = pi->next;
525 break;
526 }
7a292a7a 527
77382aee 528 /* Step two: close any open file descriptors. */
c3f6f71d 529 close_procinfo_files (pi);
7a292a7a 530
77382aee 531 /* Step three: free the memory. */
1d5e0602
KB
532 xfree (pi->saved_entryset);
533 xfree (pi->saved_exitset);
b8c9b27d 534 xfree (pi);
c3f6f71d 535}
c906108c 536
c3f6f71d 537static void
fba45db2 538destroy_procinfo (procinfo *pi)
c3f6f71d
JM
539{
540 procinfo *tmp;
c906108c 541
0df8b418 542 if (pi->tid != 0) /* Destroy a thread procinfo. */
c3f6f71d 543 {
0df8b418 544 tmp = find_procinfo (pi->pid, 0); /* Find the parent process. */
c3f6f71d
JM
545 destroy_one_procinfo (&tmp->thread_list, pi);
546 }
0df8b418 547 else /* Destroy a process procinfo and all its threads. */
c3f6f71d
JM
548 {
549 /* First destroy the children, if any; */
550 while (pi->thread_list != NULL)
551 destroy_one_procinfo (&pi->thread_list, pi->thread_list);
552 /* Then destroy the parent. Genocide!!! */
553 destroy_one_procinfo (&procinfo_list, pi);
554 }
555}
c906108c 556
5b4cbbe3
TT
557/* A deleter that calls destroy_procinfo. */
558struct procinfo_deleter
004527cb 559{
5b4cbbe3
TT
560 void operator() (procinfo *pi) const
561 {
562 destroy_procinfo (pi);
563 }
564};
565
566typedef std::unique_ptr<procinfo, procinfo_deleter> procinfo_up;
004527cb 567
c3f6f71d 568enum { NOKILL, KILL };
c906108c 569
77382aee
PA
570/* To be called on a non_recoverable error for a procinfo. Prints
571 error messages, optionally sends a SIGKILL to the process, then
572 destroys the data structure. */
c906108c 573
c3f6f71d 574static void
995816ba 575dead_procinfo (procinfo *pi, const char *msg, int kill_p)
c3f6f71d
JM
576{
577 char procfile[80];
c906108c 578
c3f6f71d 579 if (pi->pathname)
c475f569 580 print_sys_errmsg (pi->pathname, errno);
c3f6f71d
JM
581 else
582 {
c475f569 583 xsnprintf (procfile, sizeof (procfile), "process %d", pi->pid);
c3f6f71d
JM
584 print_sys_errmsg (procfile, errno);
585 }
586 if (kill_p == KILL)
587 kill (pi->pid, SIGKILL);
c906108c 588
c3f6f71d 589 destroy_procinfo (pi);
0b62613e 590 error ("%s", msg);
c3f6f71d 591}
c906108c 592
c3f6f71d 593/* =================== END, STRUCT PROCINFO "MODULE" =================== */
c906108c 594
c3f6f71d 595/* =================== /proc "MODULE" =================== */
c906108c 596
77382aee
PA
597/* This "module" is the interface layer between the /proc system API
598 and the gdb target vector functions. This layer consists of access
599 functions that encapsulate each of the basic operations that we
600 need to use from the /proc API.
601
602 The main motivation for this layer is to hide the fact that there
603 are two very different implementations of the /proc API. Rather
604 than have a bunch of #ifdefs all thru the gdb target vector
605 functions, we do our best to hide them all in here. */
c906108c 606
44122162
RO
607static long proc_flags (procinfo *pi);
608static int proc_why (procinfo *pi);
609static int proc_what (procinfo *pi);
610static int proc_set_current_signal (procinfo *pi, int signo);
611static int proc_get_current_thread (procinfo *pi);
d3581e61 612static int proc_iterate_over_threads
44122162 613 (procinfo *pi,
d3581e61
JB
614 int (*func) (procinfo *, procinfo *, void *),
615 void *ptr);
616
617static void
995816ba 618proc_warn (procinfo *pi, const char *func, int line)
c3f6f71d 619{
c475f569
RO
620 xsnprintf (errmsg, sizeof (errmsg), "procfs: %s line %d, %s",
621 func, line, pi->pathname);
c3f6f71d
JM
622 print_sys_errmsg (errmsg, errno);
623}
c906108c 624
d3581e61 625static void
995816ba 626proc_error (procinfo *pi, const char *func, int line)
c3f6f71d 627{
c475f569
RO
628 xsnprintf (errmsg, sizeof (errmsg), "procfs: %s line %d, %s",
629 func, line, pi->pathname);
c3f6f71d
JM
630 perror_with_name (errmsg);
631}
c906108c 632
77382aee
PA
633/* Updates the status struct in the procinfo. There is a 'valid'
634 flag, to let other functions know when this function needs to be
635 called (so the status is only read when it is needed). The status
636 file descriptor is also only opened when it is needed. Returns
637 non-zero for success, zero for failure. */
c906108c 638
d3581e61 639static int
fba45db2 640proc_get_status (procinfo *pi)
c3f6f71d 641{
0df8b418 642 /* Status file descriptor is opened "lazily". */
c475f569 643 if (pi->status_fd == 0 && open_procinfo_files (pi, FD_STATUS) == 0)
c3f6f71d
JM
644 {
645 pi->status_valid = 0;
646 return 0;
647 }
c906108c 648
c3f6f71d
JM
649 if (lseek (pi->status_fd, 0, SEEK_SET) < 0)
650 pi->status_valid = 0; /* fail */
651 else
652 {
19958708 653 /* Sigh... I have to read a different data structure,
0df8b418 654 depending on whether this is a main process or an LWP. */
c3f6f71d 655 if (pi->tid)
19958708
RM
656 pi->status_valid = (read (pi->status_fd,
657 (char *) &pi->prstatus.pr_lwp,
c3f6f71d
JM
658 sizeof (lwpstatus_t))
659 == sizeof (lwpstatus_t));
660 else
661 {
19958708 662 pi->status_valid = (read (pi->status_fd,
c3f6f71d 663 (char *) &pi->prstatus,
44122162
RO
664 sizeof (pstatus_t))
665 == sizeof (pstatus_t));
c3f6f71d
JM
666 }
667 }
c906108c 668
c3f6f71d
JM
669 if (pi->status_valid)
670 {
19958708 671 PROC_PRETTYFPRINT_STATUS (proc_flags (pi),
c3f6f71d 672 proc_why (pi),
19958708 673 proc_what (pi),
c3f6f71d
JM
674 proc_get_current_thread (pi));
675 }
c906108c 676
77382aee 677 /* The status struct includes general regs, so mark them valid too. */
c3f6f71d 678 pi->gregs_valid = pi->status_valid;
77382aee
PA
679 /* In the read/write multiple-fd model, the status struct includes
680 the fp regs too, so mark them valid too. */
c3f6f71d 681 pi->fpregs_valid = pi->status_valid;
77382aee 682 return pi->status_valid; /* True if success, false if failure. */
c3f6f71d 683}
c906108c 684
77382aee 685/* Returns the process flags (pr_flags field). */
c3f6f71d 686
d3581e61 687static long
fba45db2 688proc_flags (procinfo *pi)
c3f6f71d
JM
689{
690 if (!pi->status_valid)
691 if (!proc_get_status (pi))
0df8b418 692 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 693
c3f6f71d 694 return pi->prstatus.pr_lwp.pr_flags;
c3f6f71d 695}
c906108c 696
77382aee 697/* Returns the pr_why field (why the process stopped). */
c906108c 698
d3581e61 699static int
fba45db2 700proc_why (procinfo *pi)
c3f6f71d
JM
701{
702 if (!pi->status_valid)
703 if (!proc_get_status (pi))
0df8b418 704 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 705
c3f6f71d 706 return pi->prstatus.pr_lwp.pr_why;
c3f6f71d 707}
c906108c 708
77382aee 709/* Returns the pr_what field (details of why the process stopped). */
c906108c 710
d3581e61 711static int
fba45db2 712proc_what (procinfo *pi)
c3f6f71d
JM
713{
714 if (!pi->status_valid)
715 if (!proc_get_status (pi))
0df8b418 716 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 717
c3f6f71d 718 return pi->prstatus.pr_lwp.pr_what;
c3f6f71d 719}
c906108c 720
77382aee
PA
721/* This function is only called when PI is stopped by a watchpoint.
722 Assuming the OS supports it, write to *ADDR the data address which
723 triggered it and return 1. Return 0 if it is not possible to know
724 the address. */
bf701c2c
PM
725
726static int
727proc_watchpoint_address (procinfo *pi, CORE_ADDR *addr)
728{
729 if (!pi->status_valid)
730 if (!proc_get_status (pi))
731 return 0;
732
f5656ead
TT
733 *addr = (CORE_ADDR) gdbarch_pointer_to_address (target_gdbarch (),
734 builtin_type (target_gdbarch ())->builtin_data_ptr,
bf701c2c 735 (gdb_byte *) &pi->prstatus.pr_lwp.pr_info.si_addr);
bf701c2c
PM
736 return 1;
737}
738
77382aee
PA
739/* Returns the pr_nsysarg field (number of args to the current
740 syscall). */
c3f6f71d 741
d3581e61 742static int
fba45db2 743proc_nsysarg (procinfo *pi)
c3f6f71d
JM
744{
745 if (!pi->status_valid)
746 if (!proc_get_status (pi))
747 return 0;
19958708 748
c3f6f71d 749 return pi->prstatus.pr_lwp.pr_nsysarg;
c3f6f71d 750}
c906108c 751
77382aee
PA
752/* Returns the pr_sysarg field (pointer to the arguments of current
753 syscall). */
c906108c 754
d3581e61 755static long *
fba45db2 756proc_sysargs (procinfo *pi)
c3f6f71d
JM
757{
758 if (!pi->status_valid)
759 if (!proc_get_status (pi))
760 return NULL;
19958708 761
c3f6f71d 762 return (long *) &pi->prstatus.pr_lwp.pr_sysarg;
c3f6f71d 763}
77382aee 764
44122162 765/* Set or reset any of the following process flags:
77382aee
PA
766 PR_FORK -- forked child will inherit trace flags
767 PR_RLC -- traced process runs when last /proc file closed.
768 PR_KLC -- traced process is killed when last /proc file closed.
769 PR_ASYNC -- LWP's get to run/stop independently.
770
44122162 771 This function is done using read/write [PCSET/PCRESET/PCUNSET].
77382aee
PA
772
773 Arguments:
774 pi -- the procinfo
775 flag -- one of PR_FORK, PR_RLC, or PR_ASYNC
776 mode -- 1 for set, 0 for reset.
777
778 Returns non-zero for success, zero for failure. */
c906108c 779
c3f6f71d 780enum { FLAG_RESET, FLAG_SET };
c906108c 781
c3f6f71d 782static int
fba45db2 783proc_modify_flag (procinfo *pi, long flag, long mode)
c3f6f71d
JM
784{
785 long win = 0; /* default to fail */
786
77382aee
PA
787 /* These operations affect the process as a whole, and applying them
788 to an individual LWP has the same meaning as applying them to the
789 main process. Therefore, if we're ever called with a pointer to
790 an LWP's procinfo, let's substitute the process's procinfo and
791 avoid opening the LWP's file descriptor unnecessarily. */
c3f6f71d
JM
792
793 if (pi->pid != 0)
794 pi = find_procinfo_or_die (pi->pid, 0);
795
44122162 796 procfs_ctl_t arg[2];
c5aa993b 797
44122162
RO
798 if (mode == FLAG_SET) /* Set the flag (RLC, FORK, or ASYNC). */
799 arg[0] = PCSET;
0df8b418 800 else /* Reset the flag. */
44122162
RO
801 arg[0] = PCUNSET;
802
803 arg[1] = flag;
804 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 805
77382aee
PA
806 /* The above operation renders the procinfo's cached pstatus
807 obsolete. */
c3f6f71d 808 pi->status_valid = 0;
c906108c 809
c3f6f71d 810 if (!win)
8a3fe4f8 811 warning (_("procfs: modify_flag failed to turn %s %s"),
c3f6f71d
JM
812 flag == PR_FORK ? "PR_FORK" :
813 flag == PR_RLC ? "PR_RLC" :
c3f6f71d 814 flag == PR_ASYNC ? "PR_ASYNC" :
0d06e24b 815 flag == PR_KLC ? "PR_KLC" :
c3f6f71d
JM
816 "<unknown flag>",
817 mode == FLAG_RESET ? "off" : "on");
c906108c 818
c3f6f71d
JM
819 return win;
820}
c906108c 821
77382aee
PA
822/* Set the run_on_last_close flag. Process with all threads will
823 become runnable when debugger closes all /proc fds. Returns
824 non-zero for success, zero for failure. */
c906108c 825
d3581e61 826static int
fba45db2 827proc_set_run_on_last_close (procinfo *pi)
c906108c 828{
c3f6f71d
JM
829 return proc_modify_flag (pi, PR_RLC, FLAG_SET);
830}
c906108c 831
77382aee
PA
832/* Reset the run_on_last_close flag. The process will NOT become
833 runnable when debugger closes its file handles. Returns non-zero
834 for success, zero for failure. */
c906108c 835
d3581e61 836static int
fba45db2 837proc_unset_run_on_last_close (procinfo *pi)
c3f6f71d
JM
838{
839 return proc_modify_flag (pi, PR_RLC, FLAG_RESET);
c906108c
SS
840}
841
77382aee 842/* Reset inherit_on_fork flag. If the process forks a child while we
85102364 843 are registered for events in the parent, then we will NOT receive
77382aee
PA
844 events from the child. Returns non-zero for success, zero for
845 failure. */
c906108c 846
d3581e61 847static int
fba45db2 848proc_unset_inherit_on_fork (procinfo *pi)
c3f6f71d
JM
849{
850 return proc_modify_flag (pi, PR_FORK, FLAG_RESET);
851}
c906108c 852
77382aee
PA
853/* Set PR_ASYNC flag. If one LWP stops because of a debug event
854 (signal etc.), the remaining LWPs will continue to run. Returns
855 non-zero for success, zero for failure. */
c906108c 856
d3581e61 857static int
fba45db2 858proc_set_async (procinfo *pi)
c3f6f71d
JM
859{
860 return proc_modify_flag (pi, PR_ASYNC, FLAG_SET);
861}
c906108c 862
77382aee
PA
863/* Reset PR_ASYNC flag. If one LWP stops because of a debug event
864 (signal etc.), then all other LWPs will stop as well. Returns
865 non-zero for success, zero for failure. */
c906108c 866
d3581e61 867static int
fba45db2 868proc_unset_async (procinfo *pi)
c3f6f71d
JM
869{
870 return proc_modify_flag (pi, PR_ASYNC, FLAG_RESET);
871}
c906108c 872
77382aee
PA
873/* Request the process/LWP to stop. Does not wait. Returns non-zero
874 for success, zero for failure. */
c906108c 875
d3581e61 876static int
fba45db2 877proc_stop_process (procinfo *pi)
c3f6f71d
JM
878{
879 int win;
c906108c 880
77382aee
PA
881 /* We might conceivably apply this operation to an LWP, and the
882 LWP's ctl file descriptor might not be open. */
c906108c 883
c475f569 884 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c3f6f71d
JM
885 return 0;
886 else
887 {
37de36c6 888 procfs_ctl_t cmd = PCSTOP;
f4a14ae6 889
c3f6f71d 890 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d 891 }
c906108c 892
c3f6f71d
JM
893 return win;
894}
c5aa993b 895
77382aee
PA
896/* Wait for the process or LWP to stop (block until it does). Returns
897 non-zero for success, zero for failure. */
c906108c 898
d3581e61 899static int
fba45db2 900proc_wait_for_stop (procinfo *pi)
c906108c 901{
c3f6f71d
JM
902 int win;
903
77382aee
PA
904 /* We should never have to apply this operation to any procinfo
905 except the one for the main process. If that ever changes for
906 any reason, then take out the following clause and replace it
907 with one that makes sure the ctl_fd is open. */
19958708 908
c3f6f71d
JM
909 if (pi->tid != 0)
910 pi = find_procinfo_or_die (pi->pid, 0);
911
44122162 912 procfs_ctl_t cmd = PCWSTOP;
f4a14ae6 913
92137da0
RO
914 set_sigint_trap ();
915
44122162 916 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
92137da0
RO
917
918 clear_sigint_trap ();
919
44122162
RO
920 /* We been runnin' and we stopped -- need to update status. */
921 pi->status_valid = 0;
c906108c 922
c3f6f71d 923 return win;
c906108c
SS
924}
925
77382aee
PA
926/* Make the process or LWP runnable.
927
928 Options (not all are implemented):
929 - single-step
930 - clear current fault
931 - clear current signal
932 - abort the current system call
933 - stop as soon as finished with system call
934 - (ioctl): set traced signal set
935 - (ioctl): set held signal set
936 - (ioctl): set traced fault set
937 - (ioctl): set start pc (vaddr)
938
939 Always clears the current fault. PI is the process or LWP to
940 operate on. If STEP is true, set the process or LWP to trap after
941 one instruction. If SIGNO is zero, clear the current signal if
942 any; if non-zero, set the current signal to this one. Returns
943 non-zero for success, zero for failure. */
c3f6f71d 944
d3581e61 945static int
fba45db2 946proc_run_process (procinfo *pi, int step, int signo)
c3f6f71d
JM
947{
948 int win;
949 int runflags;
950
77382aee
PA
951 /* We will probably have to apply this operation to individual
952 threads, so make sure the control file descriptor is open. */
19958708 953
c475f569
RO
954 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
955 return 0;
c906108c 956
0df8b418 957 runflags = PRCFAULT; /* Always clear current fault. */
c3f6f71d
JM
958 if (step)
959 runflags |= PRSTEP;
960 if (signo == 0)
961 runflags |= PRCSIG;
0df8b418 962 else if (signo != -1) /* -1 means do nothing W.R.T. signals. */
c3f6f71d 963 proc_set_current_signal (pi, signo);
c5aa993b 964
44122162 965 procfs_ctl_t cmd[2];
c906108c 966
44122162
RO
967 cmd[0] = PCRUN;
968 cmd[1] = runflags;
969 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c906108c 970
c3f6f71d
JM
971 return win;
972}
c906108c 973
77382aee
PA
974/* Register to trace signals in the process or LWP. Returns non-zero
975 for success, zero for failure. */
c906108c 976
d3581e61 977static int
44122162 978proc_set_traced_signals (procinfo *pi, sigset_t *sigset)
c906108c 979{
c3f6f71d
JM
980 int win;
981
77382aee
PA
982 /* We should never have to apply this operation to any procinfo
983 except the one for the main process. If that ever changes for
984 any reason, then take out the following clause and replace it
985 with one that makes sure the ctl_fd is open. */
19958708 986
c3f6f71d
JM
987 if (pi->tid != 0)
988 pi = find_procinfo_or_die (pi->pid, 0);
989
44122162
RO
990 struct {
991 procfs_ctl_t cmd;
992 /* Use char array to avoid alignment issues. */
993 char sigset[sizeof (sigset_t)];
994 } arg;
c906108c 995
44122162
RO
996 arg.cmd = PCSTRACE;
997 memcpy (&arg.sigset, sigset, sizeof (sigset_t));
998
999 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1000
0df8b418 1001 /* The above operation renders the procinfo's cached pstatus obsolete. */
c3f6f71d 1002 pi->status_valid = 0;
c906108c 1003
c3f6f71d 1004 if (!win)
8a3fe4f8 1005 warning (_("procfs: set_traced_signals failed"));
c3f6f71d 1006 return win;
c906108c
SS
1007}
1008
77382aee
PA
1009/* Register to trace hardware faults in the process or LWP. Returns
1010 non-zero for success, zero for failure. */
c906108c 1011
d3581e61 1012static int
fba45db2 1013proc_set_traced_faults (procinfo *pi, fltset_t *fltset)
c3f6f71d
JM
1014{
1015 int win;
1016
77382aee
PA
1017 /* We should never have to apply this operation to any procinfo
1018 except the one for the main process. If that ever changes for
1019 any reason, then take out the following clause and replace it
1020 with one that makes sure the ctl_fd is open. */
19958708 1021
c3f6f71d
JM
1022 if (pi->tid != 0)
1023 pi = find_procinfo_or_die (pi->pid, 0);
1024
44122162
RO
1025 struct {
1026 procfs_ctl_t cmd;
1027 /* Use char array to avoid alignment issues. */
1028 char fltset[sizeof (fltset_t)];
1029 } arg;
1030
1031 arg.cmd = PCSFAULT;
1032 memcpy (&arg.fltset, fltset, sizeof (fltset_t));
c906108c 1033
44122162 1034 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1035
0df8b418 1036 /* The above operation renders the procinfo's cached pstatus obsolete. */
c3f6f71d 1037 pi->status_valid = 0;
c906108c 1038
c3f6f71d
JM
1039 return win;
1040}
c5aa993b 1041
77382aee
PA
1042/* Register to trace entry to system calls in the process or LWP.
1043 Returns non-zero for success, zero for failure. */
c906108c 1044
d3581e61 1045static int
fba45db2 1046proc_set_traced_sysentry (procinfo *pi, sysset_t *sysset)
c906108c 1047{
c3f6f71d
JM
1048 int win;
1049
77382aee
PA
1050 /* We should never have to apply this operation to any procinfo
1051 except the one for the main process. If that ever changes for
1052 any reason, then take out the following clause and replace it
1053 with one that makes sure the ctl_fd is open. */
19958708 1054
c3f6f71d
JM
1055 if (pi->tid != 0)
1056 pi = find_procinfo_or_die (pi->pid, 0);
1057
c475f569 1058 struct {
44122162
RO
1059 procfs_ctl_t cmd;
1060 /* Use char array to avoid alignment issues. */
1061 char sysset[sizeof (sysset_t)];
c475f569 1062 } arg;
c3f6f71d 1063
c475f569
RO
1064 arg.cmd = PCSENTRY;
1065 memcpy (&arg.sysset, sysset, sizeof (sysset_t));
44122162 1066
c475f569 1067 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
37de36c6 1068
77382aee
PA
1069 /* The above operation renders the procinfo's cached pstatus
1070 obsolete. */
c3f6f71d 1071 pi->status_valid = 0;
19958708 1072
c3f6f71d 1073 return win;
c906108c
SS
1074}
1075
77382aee
PA
1076/* Register to trace exit from system calls in the process or LWP.
1077 Returns non-zero for success, zero for failure. */
c906108c 1078
d3581e61 1079static int
fba45db2 1080proc_set_traced_sysexit (procinfo *pi, sysset_t *sysset)
c3f6f71d
JM
1081{
1082 int win;
1083
77382aee
PA
1084 /* We should never have to apply this operation to any procinfo
1085 except the one for the main process. If that ever changes for
1086 any reason, then take out the following clause and replace it
1087 with one that makes sure the ctl_fd is open. */
19958708 1088
c3f6f71d
JM
1089 if (pi->tid != 0)
1090 pi = find_procinfo_or_die (pi->pid, 0);
1091
44122162
RO
1092 struct gdb_proc_ctl_pcsexit {
1093 procfs_ctl_t cmd;
1094 /* Use char array to avoid alignment issues. */
1095 char sysset[sizeof (sysset_t)];
c475f569 1096 } arg;
c906108c 1097
c475f569
RO
1098 arg.cmd = PCSEXIT;
1099 memcpy (&arg.sysset, sysset, sizeof (sysset_t));
c906108c 1100
c475f569 1101 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
37de36c6 1102
77382aee
PA
1103 /* The above operation renders the procinfo's cached pstatus
1104 obsolete. */
c3f6f71d 1105 pi->status_valid = 0;
c906108c 1106
c3f6f71d
JM
1107 return win;
1108}
c906108c 1109
77382aee
PA
1110/* Specify the set of blocked / held signals in the process or LWP.
1111 Returns non-zero for success, zero for failure. */
c906108c 1112
d3581e61 1113static int
44122162 1114proc_set_held_signals (procinfo *pi, sigset_t *sighold)
c906108c 1115{
c3f6f71d
JM
1116 int win;
1117
77382aee
PA
1118 /* We should never have to apply this operation to any procinfo
1119 except the one for the main process. If that ever changes for
1120 any reason, then take out the following clause and replace it
1121 with one that makes sure the ctl_fd is open. */
19958708 1122
c3f6f71d
JM
1123 if (pi->tid != 0)
1124 pi = find_procinfo_or_die (pi->pid, 0);
1125
44122162
RO
1126 struct {
1127 procfs_ctl_t cmd;
1128 /* Use char array to avoid alignment issues. */
1129 char hold[sizeof (sigset_t)];
1130 } arg;
1131
1132 arg.cmd = PCSHOLD;
1133 memcpy (&arg.hold, sighold, sizeof (sigset_t));
1134 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
1135
77382aee
PA
1136 /* The above operation renders the procinfo's cached pstatus
1137 obsolete. */
c3f6f71d
JM
1138 pi->status_valid = 0;
1139
1140 return win;
c906108c
SS
1141}
1142
77382aee
PA
1143/* Returns the set of signals that are held / blocked. Will also copy
1144 the sigset if SAVE is non-zero. */
c906108c 1145
44122162
RO
1146static sigset_t *
1147proc_get_held_signals (procinfo *pi, sigset_t *save)
c906108c 1148{
44122162 1149 sigset_t *ret = NULL;
c3f6f71d 1150
77382aee
PA
1151 /* We should never have to apply this operation to any procinfo
1152 except the one for the main process. If that ever changes for
1153 any reason, then take out the following clause and replace it
1154 with one that makes sure the ctl_fd is open. */
19958708 1155
c3f6f71d
JM
1156 if (pi->tid != 0)
1157 pi = find_procinfo_or_die (pi->pid, 0);
1158
c3f6f71d
JM
1159 if (!pi->status_valid)
1160 if (!proc_get_status (pi))
1161 return NULL;
1162
c3f6f71d 1163 ret = &pi->prstatus.pr_lwp.pr_lwphold;
c3f6f71d 1164 if (save && ret)
44122162 1165 memcpy (save, ret, sizeof (sigset_t));
c3f6f71d
JM
1166
1167 return ret;
c906108c
SS
1168}
1169
77382aee
PA
1170/* Returns the set of signals that are traced / debugged. Will also
1171 copy the sigset if SAVE is non-zero. */
c3f6f71d 1172
44122162
RO
1173static sigset_t *
1174proc_get_traced_signals (procinfo *pi, sigset_t *save)
c906108c 1175{
44122162 1176 sigset_t *ret = NULL;
c3f6f71d 1177
77382aee
PA
1178 /* We should never have to apply this operation to any procinfo
1179 except the one for the main process. If that ever changes for
1180 any reason, then take out the following clause and replace it
1181 with one that makes sure the ctl_fd is open. */
19958708 1182
c3f6f71d
JM
1183 if (pi->tid != 0)
1184 pi = find_procinfo_or_die (pi->pid, 0);
1185
c3f6f71d
JM
1186 if (!pi->status_valid)
1187 if (!proc_get_status (pi))
1188 return NULL;
1189
1190 ret = &pi->prstatus.pr_sigtrace;
c3f6f71d 1191 if (save && ret)
44122162 1192 memcpy (save, ret, sizeof (sigset_t));
c906108c 1193
c3f6f71d
JM
1194 return ret;
1195}
c906108c 1196
77382aee
PA
1197/* Returns the set of hardware faults that are traced /debugged. Will
1198 also copy the faultset if SAVE is non-zero. */
c3f6f71d 1199
d3581e61 1200static fltset_t *
fba45db2 1201proc_get_traced_faults (procinfo *pi, fltset_t *save)
c3f6f71d
JM
1202{
1203 fltset_t *ret = NULL;
1204
77382aee
PA
1205 /* We should never have to apply this operation to any procinfo
1206 except the one for the main process. If that ever changes for
1207 any reason, then take out the following clause and replace it
1208 with one that makes sure the ctl_fd is open. */
19958708 1209
c3f6f71d
JM
1210 if (pi->tid != 0)
1211 pi = find_procinfo_or_die (pi->pid, 0);
1212
c3f6f71d
JM
1213 if (!pi->status_valid)
1214 if (!proc_get_status (pi))
1215 return NULL;
1216
1217 ret = &pi->prstatus.pr_flttrace;
c3f6f71d
JM
1218 if (save && ret)
1219 memcpy (save, ret, sizeof (fltset_t));
c906108c 1220
c3f6f71d
JM
1221 return ret;
1222}
c906108c 1223
77382aee
PA
1224/* Returns the set of syscalls that are traced /debugged on entry.
1225 Will also copy the syscall set if SAVE is non-zero. */
c906108c 1226
d3581e61 1227static sysset_t *
fba45db2 1228proc_get_traced_sysentry (procinfo *pi, sysset_t *save)
c3f6f71d
JM
1229{
1230 sysset_t *ret = NULL;
1231
77382aee
PA
1232 /* We should never have to apply this operation to any procinfo
1233 except the one for the main process. If that ever changes for
1234 any reason, then take out the following clause and replace it
1235 with one that makes sure the ctl_fd is open. */
19958708 1236
c3f6f71d
JM
1237 if (pi->tid != 0)
1238 pi = find_procinfo_or_die (pi->pid, 0);
1239
c3f6f71d
JM
1240 if (!pi->status_valid)
1241 if (!proc_get_status (pi))
1242 return NULL;
1243
1244 ret = &pi->prstatus.pr_sysentry;
c3f6f71d 1245 if (save && ret)
44122162 1246 memcpy (save, ret, sizeof (sysset_t));
c906108c 1247
c3f6f71d
JM
1248 return ret;
1249}
c5aa993b 1250
77382aee
PA
1251/* Returns the set of syscalls that are traced /debugged on exit.
1252 Will also copy the syscall set if SAVE is non-zero. */
c906108c 1253
d3581e61 1254static sysset_t *
fba45db2 1255proc_get_traced_sysexit (procinfo *pi, sysset_t *save)
c906108c 1256{
44122162 1257 sysset_t *ret = NULL;
c3f6f71d 1258
77382aee
PA
1259 /* We should never have to apply this operation to any procinfo
1260 except the one for the main process. If that ever changes for
1261 any reason, then take out the following clause and replace it
1262 with one that makes sure the ctl_fd is open. */
19958708 1263
c3f6f71d
JM
1264 if (pi->tid != 0)
1265 pi = find_procinfo_or_die (pi->pid, 0);
1266
c3f6f71d
JM
1267 if (!pi->status_valid)
1268 if (!proc_get_status (pi))
1269 return NULL;
1270
1271 ret = &pi->prstatus.pr_sysexit;
c3f6f71d 1272 if (save && ret)
44122162 1273 memcpy (save, ret, sizeof (sysset_t));
c3f6f71d
JM
1274
1275 return ret;
1276}
c906108c 1277
77382aee
PA
1278/* The current fault (if any) is cleared; the associated signal will
1279 not be sent to the process or LWP when it resumes. Returns
1280 non-zero for success, zero for failure. */
c906108c 1281
d3581e61 1282static int
fba45db2 1283proc_clear_current_fault (procinfo *pi)
c3f6f71d
JM
1284{
1285 int win;
1286
77382aee
PA
1287 /* We should never have to apply this operation to any procinfo
1288 except the one for the main process. If that ever changes for
1289 any reason, then take out the following clause and replace it
1290 with one that makes sure the ctl_fd is open. */
19958708 1291
c3f6f71d
JM
1292 if (pi->tid != 0)
1293 pi = find_procinfo_or_die (pi->pid, 0);
1294
44122162 1295 procfs_ctl_t cmd = PCCFAULT;
f4a14ae6 1296
44122162 1297 win = (write (pi->ctl_fd, (void *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d
JM
1298
1299 return win;
c906108c
SS
1300}
1301
77382aee
PA
1302/* Set the "current signal" that will be delivered next to the
1303 process. NOTE: semantics are different from those of KILL. This
1304 signal will be delivered to the process or LWP immediately when it
1305 is resumed (even if the signal is held/blocked); it will NOT
1306 immediately cause another event of interest, and will NOT first
1307 trap back to the debugger. Returns non-zero for success, zero for
1308 failure. */
c3f6f71d 1309
d3581e61 1310static int
fba45db2 1311proc_set_current_signal (procinfo *pi, int signo)
c3f6f71d
JM
1312{
1313 int win;
1314 struct {
37de36c6 1315 procfs_ctl_t cmd;
c3f6f71d 1316 /* Use char array to avoid alignment issues. */
44122162 1317 char sinfo[sizeof (siginfo_t)];
c3f6f71d 1318 } arg;
44122162 1319 siginfo_t mysinfo;
5b6d1e4f 1320 process_stratum_target *wait_target;
c162e8c9
JM
1321 ptid_t wait_ptid;
1322 struct target_waitstatus wait_status;
c3f6f71d 1323
77382aee
PA
1324 /* We should never have to apply this operation to any procinfo
1325 except the one for the main process. If that ever changes for
1326 any reason, then take out the following clause and replace it
1327 with one that makes sure the ctl_fd is open. */
19958708 1328
c3f6f71d
JM
1329 if (pi->tid != 0)
1330 pi = find_procinfo_or_die (pi->pid, 0);
1331
c3f6f71d 1332 /* The pointer is just a type alias. */
5b6d1e4f
PA
1333 get_last_target_status (&wait_target, &wait_ptid, &wait_status);
1334 if (wait_target == &the_procfs_target
1335 && wait_ptid == inferior_ptid
c162e8c9 1336 && wait_status.kind == TARGET_WAITKIND_STOPPED
2ea28649 1337 && wait_status.value.sig == gdb_signal_from_host (signo)
c162e8c9 1338 && proc_get_status (pi)
c162e8c9 1339 && pi->prstatus.pr_lwp.pr_info.si_signo == signo
c162e8c9
JM
1340 )
1341 /* Use the siginfo associated with the signal being
1342 redelivered. */
44122162 1343 memcpy (arg.sinfo, &pi->prstatus.pr_lwp.pr_info, sizeof (siginfo_t));
c162e8c9
JM
1344 else
1345 {
73930d4d
KH
1346 mysinfo.si_signo = signo;
1347 mysinfo.si_code = 0;
1348 mysinfo.si_pid = getpid (); /* ?why? */
1349 mysinfo.si_uid = getuid (); /* ?why? */
44122162 1350 memcpy (arg.sinfo, &mysinfo, sizeof (siginfo_t));
c162e8c9 1351 }
c3f6f71d 1352
c3f6f71d
JM
1353 arg.cmd = PCSSIG;
1354 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1355
c3f6f71d
JM
1356 return win;
1357}
c906108c 1358
77382aee
PA
1359/* The current signal (if any) is cleared, and is not sent to the
1360 process or LWP when it resumes. Returns non-zero for success, zero
1361 for failure. */
c906108c 1362
d3581e61 1363static int
fba45db2 1364proc_clear_current_signal (procinfo *pi)
c3f6f71d
JM
1365{
1366 int win;
1367
77382aee
PA
1368 /* We should never have to apply this operation to any procinfo
1369 except the one for the main process. If that ever changes for
1370 any reason, then take out the following clause and replace it
1371 with one that makes sure the ctl_fd is open. */
19958708 1372
c3f6f71d
JM
1373 if (pi->tid != 0)
1374 pi = find_procinfo_or_die (pi->pid, 0);
1375
44122162
RO
1376 struct {
1377 procfs_ctl_t cmd;
1378 /* Use char array to avoid alignment issues. */
1379 char sinfo[sizeof (siginfo_t)];
1380 } arg;
1381 siginfo_t mysinfo;
1382
1383 arg.cmd = PCSSIG;
1384 /* The pointer is just a type alias. */
1385 mysinfo.si_signo = 0;
1386 mysinfo.si_code = 0;
1387 mysinfo.si_errno = 0;
1388 mysinfo.si_pid = getpid (); /* ?why? */
1389 mysinfo.si_uid = getuid (); /* ?why? */
1390 memcpy (arg.sinfo, &mysinfo, sizeof (siginfo_t));
1391
1392 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1393
c3f6f71d
JM
1394 return win;
1395}
c906108c 1396
772cf8be
MK
1397/* Return the general-purpose registers for the process or LWP
1398 corresponding to PI. Upon failure, return NULL. */
c906108c 1399
d3581e61 1400static gdb_gregset_t *
fba45db2 1401proc_get_gregs (procinfo *pi)
c3f6f71d
JM
1402{
1403 if (!pi->status_valid || !pi->gregs_valid)
1404 if (!proc_get_status (pi))
1405 return NULL;
1406
c3f6f71d 1407 return &pi->prstatus.pr_lwp.pr_reg;
c3f6f71d 1408}
c5aa993b 1409
772cf8be
MK
1410/* Return the general-purpose registers for the process or LWP
1411 corresponding to PI. Upon failure, return NULL. */
c906108c 1412
d3581e61 1413static gdb_fpregset_t *
fba45db2 1414proc_get_fpregs (procinfo *pi)
c906108c 1415{
c3f6f71d
JM
1416 if (!pi->status_valid || !pi->fpregs_valid)
1417 if (!proc_get_status (pi))
1418 return NULL;
1419
c3f6f71d 1420 return &pi->prstatus.pr_lwp.pr_fpreg;
c906108c
SS
1421}
1422
772cf8be
MK
1423/* Write the general-purpose registers back to the process or LWP
1424 corresponding to PI. Return non-zero for success, zero for
1425 failure. */
c3f6f71d 1426
d3581e61 1427static int
fba45db2 1428proc_set_gregs (procinfo *pi)
c906108c 1429{
c3f6f71d
JM
1430 gdb_gregset_t *gregs;
1431 int win;
c5aa993b 1432
772cf8be
MK
1433 gregs = proc_get_gregs (pi);
1434 if (gregs == NULL)
1435 return 0; /* proc_get_regs has already warned. */
c3f6f71d 1436
772cf8be 1437 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c475f569 1438 return 0;
c3f6f71d 1439 else
c906108c 1440 {
c3f6f71d 1441 struct {
37de36c6 1442 procfs_ctl_t cmd;
c3f6f71d
JM
1443 /* Use char array to avoid alignment issues. */
1444 char gregs[sizeof (gdb_gregset_t)];
1445 } arg;
1446
772cf8be 1447 arg.cmd = PCSREG;
c3f6f71d
JM
1448 memcpy (&arg.gregs, gregs, sizeof (arg.gregs));
1449 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1450 }
c3f6f71d 1451
772cf8be 1452 /* Policy: writing the registers invalidates our cache. */
c3f6f71d
JM
1453 pi->gregs_valid = 0;
1454 return win;
c906108c
SS
1455}
1456
772cf8be
MK
1457/* Write the floating-pointer registers back to the process or LWP
1458 corresponding to PI. Return non-zero for success, zero for
1459 failure. */
c3f6f71d 1460
d3581e61 1461static int
fba45db2 1462proc_set_fpregs (procinfo *pi)
c906108c 1463{
c3f6f71d
JM
1464 gdb_fpregset_t *fpregs;
1465 int win;
1466
772cf8be
MK
1467 fpregs = proc_get_fpregs (pi);
1468 if (fpregs == NULL)
1469 return 0; /* proc_get_fpregs has already warned. */
c5aa993b 1470
772cf8be 1471 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c475f569 1472 return 0;
c3f6f71d 1473 else
c906108c 1474 {
c3f6f71d 1475 struct {
37de36c6 1476 procfs_ctl_t cmd;
c3f6f71d
JM
1477 /* Use char array to avoid alignment issues. */
1478 char fpregs[sizeof (gdb_fpregset_t)];
1479 } arg;
1480
772cf8be 1481 arg.cmd = PCSFPREG;
c3f6f71d
JM
1482 memcpy (&arg.fpregs, fpregs, sizeof (arg.fpregs));
1483 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1484 }
c3f6f71d 1485
772cf8be 1486 /* Policy: writing the registers invalidates our cache. */
c3f6f71d
JM
1487 pi->fpregs_valid = 0;
1488 return win;
c906108c
SS
1489}
1490
77382aee
PA
1491/* Send a signal to the proc or lwp with the semantics of "kill()".
1492 Returns non-zero for success, zero for failure. */
c906108c 1493
d3581e61 1494static int
fba45db2 1495proc_kill (procinfo *pi, int signo)
c3f6f71d
JM
1496{
1497 int win;
c906108c 1498
77382aee
PA
1499 /* We might conceivably apply this operation to an LWP, and the
1500 LWP's ctl file descriptor might not be open. */
c906108c 1501
c475f569
RO
1502 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
1503 return 0;
c3f6f71d
JM
1504 else
1505 {
37de36c6 1506 procfs_ctl_t cmd[2];
c906108c 1507
c3f6f71d
JM
1508 cmd[0] = PCKILL;
1509 cmd[1] = signo;
1510 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d 1511 }
c906108c 1512
c3f6f71d
JM
1513 return win;
1514}
c906108c 1515
77382aee
PA
1516/* Find the pid of the process that started this one. Returns the
1517 parent process pid, or zero. */
c906108c 1518
d3581e61 1519static int
fba45db2 1520proc_parent_pid (procinfo *pi)
c906108c 1521{
77382aee
PA
1522 /* We should never have to apply this operation to any procinfo
1523 except the one for the main process. If that ever changes for
1524 any reason, then take out the following clause and replace it
1525 with one that makes sure the ctl_fd is open. */
19958708 1526
c3f6f71d
JM
1527 if (pi->tid != 0)
1528 pi = find_procinfo_or_die (pi->pid, 0);
1529
1530 if (!pi->status_valid)
1531 if (!proc_get_status (pi))
1532 return 0;
c5aa993b 1533
c3f6f71d
JM
1534 return pi->prstatus.pr_ppid;
1535}
1536
9a043c1d
AC
1537/* Convert a target address (a.k.a. CORE_ADDR) into a host address
1538 (a.k.a void pointer)! */
1539
1540static void *
1541procfs_address_to_host_pointer (CORE_ADDR addr)
1542{
f5656ead 1543 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
9a043c1d
AC
1544 void *ptr;
1545
4e906f53 1546 gdb_assert (sizeof (ptr) == TYPE_LENGTH (ptr_type));
f5656ead 1547 gdbarch_address_to_pointer (target_gdbarch (), ptr_type,
0b62613e 1548 (gdb_byte *) &ptr, addr);
9a043c1d
AC
1549 return ptr;
1550}
1551
a0911fd0 1552static int
fba45db2 1553proc_set_watchpoint (procinfo *pi, CORE_ADDR addr, int len, int wflags)
c3f6f71d 1554{
c3f6f71d 1555 struct {
37de36c6 1556 procfs_ctl_t cmd;
c3f6f71d
JM
1557 char watch[sizeof (prwatch_t)];
1558 } arg;
73930d4d 1559 prwatch_t pwatch;
c3f6f71d 1560
9a043c1d
AC
1561 /* NOTE: cagney/2003-02-01: Even more horrible hack. Need to
1562 convert a target address into something that can be stored in a
1563 native data structure. */
73930d4d 1564 pwatch.pr_vaddr = (uintptr_t) procfs_address_to_host_pointer (addr);
73930d4d
KH
1565 pwatch.pr_size = len;
1566 pwatch.pr_wflags = wflags;
c3f6f71d 1567 arg.cmd = PCWATCH;
73930d4d 1568 memcpy (arg.watch, &pwatch, sizeof (prwatch_t));
c3f6f71d 1569 return (write (pi->ctl_fd, &arg, sizeof (arg)) == sizeof (arg));
c906108c
SS
1570}
1571
965b60ee 1572#if (defined(__i386__) || defined(__x86_64__)) && defined (sun)
c906108c 1573
c3f6f71d 1574#include <sys/sysi86.h>
c906108c 1575
77382aee
PA
1576/* The KEY is actually the value of the lower 16 bits of the GS
1577 register for the LWP that we're interested in. Returns the
1578 matching ssh struct (LDT entry). */
c906108c 1579
337c776f 1580static struct ssd *
c475f569 1581proc_get_LDT_entry (procinfo *pi, int key) /* ARI: editCase function */
c906108c 1582{
c3f6f71d 1583 static struct ssd *ldt_entry = NULL;
c3f6f71d 1584 char pathname[MAX_PROC_NAME_SIZE];
c3f6f71d
JM
1585
1586 /* Allocate space for one LDT entry.
1587 This alloc must persist, because we return a pointer to it. */
1588 if (ldt_entry == NULL)
8d749320 1589 ldt_entry = XNEW (struct ssd);
c3f6f71d
JM
1590
1591 /* Open the file descriptor for the LDT table. */
c475f569 1592 xsnprintf (pathname, sizeof (pathname), "/proc/%d/ldt", pi->pid);
5dc1a704
TT
1593 scoped_fd fd (open_with_retry (pathname, O_RDONLY));
1594 if (fd.get () < 0)
c906108c 1595 {
c3f6f71d
JM
1596 proc_warn (pi, "proc_get_LDT_entry (open)", __LINE__);
1597 return NULL;
c906108c
SS
1598 }
1599
c3f6f71d 1600 /* Now 'read' thru the table, find a match and return it. */
5dc1a704
TT
1601 while (read (fd.get (), ldt_entry, sizeof (struct ssd))
1602 == sizeof (struct ssd))
c906108c 1603 {
c475f569
RO
1604 if (ldt_entry->sel == 0
1605 && ldt_entry->bo == 0
1606 && ldt_entry->acc1 == 0
1607 && ldt_entry->acc2 == 0)
c3f6f71d 1608 break; /* end of table */
0df8b418 1609 /* If key matches, return this entry. */
c3f6f71d 1610 if (ldt_entry->sel == key)
70b33f19 1611 return ldt_entry;
c906108c 1612 }
0df8b418 1613 /* Loop ended, match not found. */
c3f6f71d 1614 return NULL;
c3f6f71d 1615}
c906108c 1616
77382aee 1617/* Returns the pointer to the LDT entry of PTID. */
965b60ee
JB
1618
1619struct ssd *
c475f569 1620procfs_find_LDT_entry (ptid_t ptid) /* ARI: editCase function */
965b60ee
JB
1621{
1622 gdb_gregset_t *gregs;
1623 int key;
1624 procinfo *pi;
1625
0df8b418 1626 /* Find procinfo for the lwp. */
c475f569
RO
1627 pi = find_procinfo (ptid.pid (), ptid.lwp ());
1628 if (pi == NULL)
965b60ee 1629 {
0b62613e 1630 warning (_("procfs_find_LDT_entry: could not find procinfo for %d:%ld."),
e38504b3 1631 ptid.pid (), ptid.lwp ());
965b60ee
JB
1632 return NULL;
1633 }
0df8b418 1634 /* get its general registers. */
c475f569
RO
1635 gregs = proc_get_gregs (pi);
1636 if (gregs == NULL)
965b60ee 1637 {
0b62613e 1638 warning (_("procfs_find_LDT_entry: could not read gregs for %d:%ld."),
e38504b3 1639 ptid.pid (), ptid.lwp ());
965b60ee
JB
1640 return NULL;
1641 }
0df8b418 1642 /* Now extract the GS register's lower 16 bits. */
965b60ee
JB
1643 key = (*gregs)[GS] & 0xffff;
1644
0df8b418 1645 /* Find the matching entry and return it. */
965b60ee
JB
1646 return proc_get_LDT_entry (pi, key);
1647}
1648
1649#endif
c906108c 1650
c3f6f71d 1651/* =============== END, non-thread part of /proc "MODULE" =============== */
c906108c 1652
c3f6f71d 1653/* =================== Thread "MODULE" =================== */
c906108c 1654
44122162
RO
1655/* NOTE: you'll see more ifdefs and duplication of functions here,
1656 since there is a different way to do threads on every OS. */
c906108c 1657
44122162 1658/* Returns the number of threads for the process. */
c906108c 1659
d3581e61 1660static int
fba45db2 1661proc_get_nthreads (procinfo *pi)
c906108c 1662{
c3f6f71d
JM
1663 if (!pi->status_valid)
1664 if (!proc_get_status (pi))
1665 return 0;
c5aa993b 1666
44122162
RO
1667 /* Only works for the process procinfo, because the LWP procinfos do not
1668 get prstatus filled in. */
0df8b418 1669 if (pi->tid != 0) /* Find the parent process procinfo. */
c3f6f71d 1670 pi = find_procinfo_or_die (pi->pid, 0);
c3f6f71d 1671 return pi->prstatus.pr_nlwp;
c906108c
SS
1672}
1673
77382aee
PA
1674/* LWP version.
1675
1676 Return the ID of the thread that had an event of interest.
1677 (ie. the one that hit a breakpoint or other traced event). All
1678 other things being equal, this should be the ID of a thread that is
1679 currently executing. */
c3f6f71d 1680
d3581e61 1681static int
fba45db2 1682proc_get_current_thread (procinfo *pi)
c3f6f71d 1683{
77382aee
PA
1684 /* Note: this should be applied to the root procinfo for the
1685 process, not to the procinfo for an LWP. If applied to the
1686 procinfo for an LWP, it will simply return that LWP's ID. In
1687 that case, find the parent process procinfo. */
19958708 1688
c3f6f71d
JM
1689 if (pi->tid != 0)
1690 pi = find_procinfo_or_die (pi->pid, 0);
1691
1692 if (!pi->status_valid)
1693 if (!proc_get_status (pi))
1694 return 0;
1695
c3f6f71d 1696 return pi->prstatus.pr_lwp.pr_lwpid;
c3f6f71d
JM
1697}
1698
77382aee
PA
1699/* Discover the IDs of all the threads within the process, and create
1700 a procinfo for each of them (chained to the parent). This
1701 unfortunately requires a different method on every OS. Returns
1702 non-zero for success, zero for failure. */
c906108c 1703
a0911fd0 1704static int
fba45db2 1705proc_delete_dead_threads (procinfo *parent, procinfo *thread, void *ignore)
c3f6f71d
JM
1706{
1707 if (thread && parent) /* sanity */
c906108c 1708 {
c3f6f71d
JM
1709 thread->status_valid = 0;
1710 if (!proc_get_status (thread))
1711 destroy_one_procinfo (&parent->thread_list, thread);
1712 }
1713 return 0; /* keep iterating */
1714}
c5aa993b 1715
d3581e61 1716static int
fba45db2 1717proc_update_threads (procinfo *pi)
c3f6f71d
JM
1718{
1719 char pathname[MAX_PROC_NAME_SIZE + 16];
1720 struct dirent *direntry;
c3f6f71d 1721 procinfo *thread;
f0b3976b 1722 gdb_dir_up dirp;
c3f6f71d
JM
1723 int lwpid;
1724
77382aee
PA
1725 /* We should never have to apply this operation to any procinfo
1726 except the one for the main process. If that ever changes for
1727 any reason, then take out the following clause and replace it
1728 with one that makes sure the ctl_fd is open. */
19958708 1729
c3f6f71d
JM
1730 if (pi->tid != 0)
1731 pi = find_procinfo_or_die (pi->pid, 0);
1732
1733 proc_iterate_over_threads (pi, proc_delete_dead_threads, NULL);
1734
05b4bd79
PA
1735 /* Note: this brute-force method was originally devised for Unixware
1736 (support removed since), and will also work on Solaris 2.6 and
1737 2.7. The original comment mentioned the existence of a much
1738 simpler and more elegant way to do this on Solaris, but didn't
1739 point out what that was. */
c3f6f71d
JM
1740
1741 strcpy (pathname, pi->pathname);
1742 strcat (pathname, "/lwp");
f0b3976b
TT
1743 dirp.reset (opendir (pathname));
1744 if (dirp == NULL)
c3f6f71d
JM
1745 proc_error (pi, "update_threads, opendir", __LINE__);
1746
f0b3976b 1747 while ((direntry = readdir (dirp.get ())) != NULL)
c3f6f71d
JM
1748 if (direntry->d_name[0] != '.') /* skip '.' and '..' */
1749 {
1750 lwpid = atoi (&direntry->d_name[0]);
c475f569
RO
1751 thread = create_procinfo (pi->pid, lwpid);
1752 if (thread == NULL)
c3f6f71d
JM
1753 proc_error (pi, "update_threads, create_procinfo", __LINE__);
1754 }
1755 pi->threads_valid = 1;
c3f6f71d
JM
1756 return 1;
1757}
c906108c 1758
77382aee
PA
1759/* Given a pointer to a function, call that function once for each lwp
1760 in the procinfo list, until the function returns non-zero, in which
1761 event return the value returned by the function.
1762
1763 Note: this function does NOT call update_threads. If you want to
1764 discover new threads first, you must call that function explicitly.
1765 This function just makes a quick pass over the currently-known
1766 procinfos.
1767
1768 PI is the parent process procinfo. FUNC is the per-thread
1769 function. PTR is an opaque parameter for function. Returns the
1770 first non-zero return value from the callee, or zero. */
c3f6f71d 1771
d3581e61 1772static int
d0849a9a
KB
1773proc_iterate_over_threads (procinfo *pi,
1774 int (*func) (procinfo *, procinfo *, void *),
1775 void *ptr)
c906108c 1776{
c3f6f71d
JM
1777 procinfo *thread, *next;
1778 int retval = 0;
c906108c 1779
77382aee
PA
1780 /* We should never have to apply this operation to any procinfo
1781 except the one for the main process. If that ever changes for
1782 any reason, then take out the following clause and replace it
1783 with one that makes sure the ctl_fd is open. */
19958708 1784
c3f6f71d
JM
1785 if (pi->tid != 0)
1786 pi = find_procinfo_or_die (pi->pid, 0);
1787
1788 for (thread = pi->thread_list; thread != NULL; thread = next)
c906108c 1789 {
0df8b418 1790 next = thread->next; /* In case thread is destroyed. */
c475f569
RO
1791 retval = (*func) (pi, thread, ptr);
1792 if (retval != 0)
c3f6f71d 1793 break;
c906108c 1794 }
c3f6f71d
JM
1795
1796 return retval;
c906108c
SS
1797}
1798
c3f6f71d
JM
1799/* =================== END, Thread "MODULE" =================== */
1800
1801/* =================== END, /proc "MODULE" =================== */
1802
1803/* =================== GDB "MODULE" =================== */
1804
77382aee
PA
1805/* Here are all of the gdb target vector functions and their
1806 friends. */
c3f6f71d 1807
39f77062 1808static ptid_t do_attach (ptid_t ptid);
6bd6f3b6 1809static void do_detach ();
9185ddce 1810static void proc_trace_syscalls_1 (procinfo *pi, int syscallnum,
77382aee 1811 int entry_or_exit, int mode, int from_tty);
9185ddce 1812
77382aee
PA
1813/* Sets up the inferior to be debugged. Registers to trace signals,
1814 hardware faults, and syscalls. Note: does not set RLC flag: caller
1815 may want to customize that. Returns zero for success (note!
1816 unlike most functions in this module); on failure, returns the LINE
1817 NUMBER where it failed! */
c3f6f71d
JM
1818
1819static int
fba45db2 1820procfs_debug_inferior (procinfo *pi)
c906108c 1821{
c3f6f71d 1822 fltset_t traced_faults;
44122162 1823 sigset_t traced_signals;
37de36c6
KB
1824 sysset_t *traced_syscall_entries;
1825 sysset_t *traced_syscall_exits;
1826 int status;
c906108c 1827
0df8b418
MS
1828 /* Register to trace hardware faults in the child. */
1829 prfillset (&traced_faults); /* trace all faults... */
44122162 1830 prdelset (&traced_faults, FLTPAGE); /* except page fault. */
c3f6f71d
JM
1831 if (!proc_set_traced_faults (pi, &traced_faults))
1832 return __LINE__;
c906108c 1833
2455069d
UW
1834 /* Initially, register to trace all signals in the child. */
1835 prfillset (&traced_signals);
1836 if (!proc_set_traced_signals (pi, &traced_signals))
c3f6f71d
JM
1837 return __LINE__;
1838
37de36c6 1839
c3f6f71d 1840 /* Register to trace the 'exit' system call (on entry). */
c475f569 1841 traced_syscall_entries = XNEW (sysset_t);
44122162
RO
1842 premptyset (traced_syscall_entries);
1843 praddset (traced_syscall_entries, SYS_exit);
1844 praddset (traced_syscall_entries, SYS_lwp_exit);
c906108c 1845
37de36c6
KB
1846 status = proc_set_traced_sysentry (pi, traced_syscall_entries);
1847 xfree (traced_syscall_entries);
1848 if (!status)
c3f6f71d
JM
1849 return __LINE__;
1850
44122162 1851 /* Method for tracing exec syscalls. */
c3f6f71d
JM
1852 /* GW: Rationale...
1853 Not all systems with /proc have all the exec* syscalls with the same
1854 names. On the SGI, for example, there is no SYS_exec, but there
0df8b418 1855 *is* a SYS_execv. So, we try to account for that. */
c3f6f71d 1856
c475f569 1857 traced_syscall_exits = XNEW (sysset_t);
44122162 1858 premptyset (traced_syscall_exits);
c3f6f71d 1859#ifdef SYS_exec
44122162 1860 praddset (traced_syscall_exits, SYS_exec);
37de36c6 1861#endif
44122162
RO
1862 praddset (traced_syscall_exits, SYS_execve);
1863 praddset (traced_syscall_exits, SYS_lwp_create);
1864 praddset (traced_syscall_exits, SYS_lwp_exit);
c906108c 1865
37de36c6
KB
1866 status = proc_set_traced_sysexit (pi, traced_syscall_exits);
1867 xfree (traced_syscall_exits);
1868 if (!status)
c3f6f71d
JM
1869 return __LINE__;
1870
c3f6f71d 1871 return 0;
c906108c
SS
1872}
1873
f6ac5f3d
PA
1874void
1875procfs_target::attach (const char *args, int from_tty)
c906108c 1876{
c3f6f71d
JM
1877 int pid;
1878
74164c56 1879 pid = parse_pid_to_attach (args);
c3f6f71d 1880
c3f6f71d 1881 if (pid == getpid ())
8a3fe4f8 1882 error (_("Attaching GDB to itself is not a good idea..."));
c906108c 1883
c3f6f71d 1884 if (from_tty)
c906108c 1885 {
d9fa87f4 1886 const char *exec_file = get_exec_file (0);
c3f6f71d
JM
1887
1888 if (exec_file)
a3f17187 1889 printf_filtered (_("Attaching to program `%s', %s\n"),
a068643d 1890 exec_file, target_pid_to_str (ptid_t (pid)).c_str ());
c3f6f71d 1891 else
a3f17187 1892 printf_filtered (_("Attaching to %s\n"),
a068643d 1893 target_pid_to_str (ptid_t (pid)).c_str ());
c3f6f71d
JM
1894
1895 fflush (stdout);
c906108c 1896 }
f2907e49 1897 inferior_ptid = do_attach (ptid_t (pid));
f6ac5f3d
PA
1898 if (!target_is_pushed (this))
1899 push_target (this);
c3f6f71d
JM
1900}
1901
f6ac5f3d
PA
1902void
1903procfs_target::detach (inferior *inf, int from_tty)
c3f6f71d 1904{
e99b03dc 1905 int pid = inferior_ptid.pid ();
cc377e6b 1906
c3f6f71d 1907 if (from_tty)
c906108c 1908 {
995816ba 1909 const char *exec_file;
cc377e6b 1910
c3f6f71d 1911 exec_file = get_exec_file (0);
cc377e6b 1912 if (exec_file == NULL)
c3f6f71d 1913 exec_file = "";
cc377e6b 1914
a3f17187 1915 printf_filtered (_("Detaching from program: %s, %s\n"), exec_file,
a068643d 1916 target_pid_to_str (ptid_t (pid)).c_str ());
c906108c 1917 }
19958708 1918
6bd6f3b6 1919 do_detach ();
cc377e6b 1920
39f77062 1921 inferior_ptid = null_ptid;
b7a08269 1922 detach_inferior (inf);
f6ac5f3d 1923 maybe_unpush_target ();
c906108c
SS
1924}
1925
39f77062
KB
1926static ptid_t
1927do_attach (ptid_t ptid)
c906108c 1928{
c3f6f71d 1929 procinfo *pi;
181e7f93 1930 struct inferior *inf;
c3f6f71d 1931 int fail;
2689673f 1932 int lwpid;
c3f6f71d 1933
c475f569
RO
1934 pi = create_procinfo (ptid.pid (), 0);
1935 if (pi == NULL)
8a3fe4f8 1936 perror (_("procfs: out of memory in 'attach'"));
c3f6f71d
JM
1937
1938 if (!open_procinfo_files (pi, FD_CTL))
1939 {
1940 fprintf_filtered (gdb_stderr, "procfs:%d -- ", __LINE__);
c475f569
RO
1941 xsnprintf (errmsg, sizeof (errmsg),
1942 "do_attach: couldn't open /proc file for process %d",
1943 ptid.pid ());
c3f6f71d
JM
1944 dead_procinfo (pi, errmsg, NOKILL);
1945 }
c906108c 1946
c3f6f71d
JM
1947 /* Stop the process (if it isn't already stopped). */
1948 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
c906108c 1949 {
c3f6f71d
JM
1950 pi->was_stopped = 1;
1951 proc_prettyprint_why (proc_why (pi), proc_what (pi), 1);
c906108c
SS
1952 }
1953 else
1954 {
c3f6f71d
JM
1955 pi->was_stopped = 0;
1956 /* Set the process to run again when we close it. */
1957 if (!proc_set_run_on_last_close (pi))
1958 dead_procinfo (pi, "do_attach: couldn't set RLC.", NOKILL);
1959
0df8b418 1960 /* Now stop the process. */
c3f6f71d
JM
1961 if (!proc_stop_process (pi))
1962 dead_procinfo (pi, "do_attach: couldn't stop the process.", NOKILL);
1963 pi->ignore_next_sigstop = 1;
c906108c 1964 }
c3f6f71d
JM
1965 /* Save some of the /proc state to be restored if we detach. */
1966 if (!proc_get_traced_faults (pi, &pi->saved_fltset))
1967 dead_procinfo (pi, "do_attach: couldn't save traced faults.", NOKILL);
1968 if (!proc_get_traced_signals (pi, &pi->saved_sigset))
1969 dead_procinfo (pi, "do_attach: couldn't save traced signals.", NOKILL);
37de36c6 1970 if (!proc_get_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d
JM
1971 dead_procinfo (pi, "do_attach: couldn't save traced syscall entries.",
1972 NOKILL);
37de36c6 1973 if (!proc_get_traced_sysexit (pi, pi->saved_exitset))
19958708 1974 dead_procinfo (pi, "do_attach: couldn't save traced syscall exits.",
c3f6f71d
JM
1975 NOKILL);
1976 if (!proc_get_held_signals (pi, &pi->saved_sighold))
1977 dead_procinfo (pi, "do_attach: couldn't save held signals.", NOKILL);
1978
c475f569
RO
1979 fail = procfs_debug_inferior (pi);
1980 if (fail != 0)
c3f6f71d
JM
1981 dead_procinfo (pi, "do_attach: failed in procfs_debug_inferior", NOKILL);
1982
6c95b8df
PA
1983 inf = current_inferior ();
1984 inferior_appeared (inf, pi->pid);
c3f6f71d 1985 /* Let GDB know that the inferior was attached. */
181e7f93 1986 inf->attach_flag = 1;
2689673f
PA
1987
1988 /* Create a procinfo for the current lwp. */
1989 lwpid = proc_get_current_thread (pi);
1990 create_procinfo (pi->pid, lwpid);
1991
1992 /* Add it to gdb's thread list. */
fd79271b 1993 ptid = ptid_t (pi->pid, lwpid, 0);
5b6d1e4f 1994 add_thread (&the_procfs_target, ptid);
2689673f
PA
1995
1996 return ptid;
c906108c
SS
1997}
1998
1999static void
6bd6f3b6 2000do_detach ()
c906108c 2001{
c3f6f71d 2002 procinfo *pi;
c906108c 2003
0df8b418 2004 /* Find procinfo for the main process. */
e99b03dc 2005 pi = find_procinfo_or_die (inferior_ptid.pid (),
dfd4cc63 2006 0); /* FIXME: threads */
c5aa993b 2007
c3f6f71d
JM
2008 if (!proc_set_traced_signals (pi, &pi->saved_sigset))
2009 proc_warn (pi, "do_detach, set_traced_signal", __LINE__);
c906108c 2010
c3f6f71d
JM
2011 if (!proc_set_traced_faults (pi, &pi->saved_fltset))
2012 proc_warn (pi, "do_detach, set_traced_faults", __LINE__);
2013
37de36c6 2014 if (!proc_set_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d
JM
2015 proc_warn (pi, "do_detach, set_traced_sysentry", __LINE__);
2016
37de36c6 2017 if (!proc_set_traced_sysexit (pi, pi->saved_exitset))
c3f6f71d
JM
2018 proc_warn (pi, "do_detach, set_traced_sysexit", __LINE__);
2019
2020 if (!proc_set_held_signals (pi, &pi->saved_sighold))
2021 proc_warn (pi, "do_detach, set_held_signals", __LINE__);
2022
6bd6f3b6
SM
2023 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
2024 if (!(pi->was_stopped)
2025 || query (_("Was stopped when attached, make it runnable again? ")))
c3f6f71d
JM
2026 {
2027 /* Clear any pending signal. */
2028 if (!proc_clear_current_fault (pi))
2029 proc_warn (pi, "do_detach, clear_current_fault", __LINE__);
2030
6bd6f3b6 2031 if (!proc_clear_current_signal (pi))
1a303dec
MS
2032 proc_warn (pi, "do_detach, clear_current_signal", __LINE__);
2033
c3f6f71d
JM
2034 if (!proc_set_run_on_last_close (pi))
2035 proc_warn (pi, "do_detach, set_rlc", __LINE__);
2036 }
2037
c3f6f71d 2038 destroy_procinfo (pi);
c906108c
SS
2039}
2040
772cf8be
MK
2041/* Fetch register REGNUM from the inferior. If REGNUM is -1, do this
2042 for all registers.
2043
2044 ??? Is the following note still relevant? We can't get individual
2045 registers with the PT_GETREGS ptrace(2) request either, yet we
2046 don't bother with caching at all in that case.
2047
2048 NOTE: Since the /proc interface cannot give us individual
2049 registers, we pay no attention to REGNUM, and just fetch them all.
2050 This results in the possibility that we will do unnecessarily many
2051 fetches, since we may be called repeatedly for individual
2052 registers. So we cache the results, and mark the cache invalid
2053 when the process is resumed. */
c3f6f71d 2054
f6ac5f3d
PA
2055void
2056procfs_target::fetch_registers (struct regcache *regcache, int regnum)
c906108c 2057{
772cf8be
MK
2058 gdb_gregset_t *gregs;
2059 procinfo *pi;
222312d3 2060 ptid_t ptid = regcache->ptid ();
e99b03dc 2061 int pid = ptid.pid ();
e38504b3 2062 int tid = ptid.lwp ();
ac7936df 2063 struct gdbarch *gdbarch = regcache->arch ();
c3f6f71d 2064
2689673f 2065 pi = find_procinfo_or_die (pid, tid);
c3f6f71d
JM
2066
2067 if (pi == NULL)
8a3fe4f8 2068 error (_("procfs: fetch_registers failed to find procinfo for %s"),
a068643d 2069 target_pid_to_str (ptid).c_str ());
c3f6f71d 2070
772cf8be
MK
2071 gregs = proc_get_gregs (pi);
2072 if (gregs == NULL)
c3f6f71d
JM
2073 proc_error (pi, "fetch_registers, get_gregs", __LINE__);
2074
56be3814 2075 supply_gregset (regcache, (const gdb_gregset_t *) gregs);
c3f6f71d 2076
40a6adc1 2077 if (gdbarch_fp0_regnum (gdbarch) >= 0) /* Do we have an FPU? */
60054393 2078 {
772cf8be
MK
2079 gdb_fpregset_t *fpregs;
2080
40a6adc1
MD
2081 if ((regnum >= 0 && regnum < gdbarch_fp0_regnum (gdbarch))
2082 || regnum == gdbarch_pc_regnum (gdbarch)
2083 || regnum == gdbarch_sp_regnum (gdbarch))
772cf8be 2084 return; /* Not a floating point register. */
c5aa993b 2085
772cf8be
MK
2086 fpregs = proc_get_fpregs (pi);
2087 if (fpregs == NULL)
60054393 2088 proc_error (pi, "fetch_registers, get_fpregs", __LINE__);
c906108c 2089
56be3814 2090 supply_fpregset (regcache, (const gdb_fpregset_t *) fpregs);
60054393 2091 }
c906108c
SS
2092}
2093
772cf8be
MK
2094/* Store register REGNUM back into the inferior. If REGNUM is -1, do
2095 this for all registers.
2096
2097 NOTE: Since the /proc interface will not read individual registers,
2098 we will cache these requests until the process is resumed, and only
2099 then write them back to the inferior process.
77382aee 2100
772cf8be
MK
2101 FIXME: is that a really bad idea? Have to think about cases where
2102 writing one register might affect the value of others, etc. */
c906108c 2103
f6ac5f3d
PA
2104void
2105procfs_target::store_registers (struct regcache *regcache, int regnum)
c3f6f71d 2106{
772cf8be
MK
2107 gdb_gregset_t *gregs;
2108 procinfo *pi;
222312d3 2109 ptid_t ptid = regcache->ptid ();
e99b03dc 2110 int pid = ptid.pid ();
e38504b3 2111 int tid = ptid.lwp ();
ac7936df 2112 struct gdbarch *gdbarch = regcache->arch ();
c3f6f71d 2113
2689673f 2114 pi = find_procinfo_or_die (pid, tid);
c3f6f71d
JM
2115
2116 if (pi == NULL)
8a3fe4f8 2117 error (_("procfs: store_registers: failed to find procinfo for %s"),
a068643d 2118 target_pid_to_str (ptid).c_str ());
c906108c 2119
772cf8be
MK
2120 gregs = proc_get_gregs (pi);
2121 if (gregs == NULL)
c3f6f71d 2122 proc_error (pi, "store_registers, get_gregs", __LINE__);
c906108c 2123
56be3814 2124 fill_gregset (regcache, gregs, regnum);
c3f6f71d
JM
2125 if (!proc_set_gregs (pi))
2126 proc_error (pi, "store_registers, set_gregs", __LINE__);
c906108c 2127
40a6adc1 2128 if (gdbarch_fp0_regnum (gdbarch) >= 0) /* Do we have an FPU? */
60054393 2129 {
772cf8be
MK
2130 gdb_fpregset_t *fpregs;
2131
40a6adc1
MD
2132 if ((regnum >= 0 && regnum < gdbarch_fp0_regnum (gdbarch))
2133 || regnum == gdbarch_pc_regnum (gdbarch)
2134 || regnum == gdbarch_sp_regnum (gdbarch))
772cf8be 2135 return; /* Not a floating point register. */
60054393 2136
772cf8be
MK
2137 fpregs = proc_get_fpregs (pi);
2138 if (fpregs == NULL)
60054393
MS
2139 proc_error (pi, "store_registers, get_fpregs", __LINE__);
2140
56be3814 2141 fill_fpregset (regcache, fpregs, regnum);
60054393
MS
2142 if (!proc_set_fpregs (pi))
2143 proc_error (pi, "store_registers, set_fpregs", __LINE__);
2144 }
c3f6f71d 2145}
c906108c 2146
37de36c6
KB
2147static int
2148syscall_is_lwp_exit (procinfo *pi, int scall)
2149{
37de36c6
KB
2150 if (scall == SYS_lwp_exit)
2151 return 1;
37de36c6
KB
2152 return 0;
2153}
2154
2155static int
2156syscall_is_exit (procinfo *pi, int scall)
2157{
37de36c6
KB
2158 if (scall == SYS_exit)
2159 return 1;
37de36c6
KB
2160 return 0;
2161}
2162
2163static int
2164syscall_is_exec (procinfo *pi, int scall)
2165{
2166#ifdef SYS_exec
2167 if (scall == SYS_exec)
2168 return 1;
2169#endif
37de36c6
KB
2170 if (scall == SYS_execve)
2171 return 1;
37de36c6
KB
2172 return 0;
2173}
2174
2175static int
2176syscall_is_lwp_create (procinfo *pi, int scall)
2177{
37de36c6
KB
2178 if (scall == SYS_lwp_create)
2179 return 1;
37de36c6
KB
2180 return 0;
2181}
2182
77382aee
PA
2183/* Retrieve the next stop event from the child process. If child has
2184 not stopped yet, wait for it to stop. Translate /proc eventcodes
2185 (or possibly wait eventcodes) into gdb internal event codes.
2186 Returns the id of process (and possibly thread) that incurred the
2187 event. Event codes are returned through a pointer parameter. */
c906108c 2188
f6ac5f3d
PA
2189ptid_t
2190procfs_target::wait (ptid_t ptid, struct target_waitstatus *status,
2191 int options)
c906108c 2192{
0df8b418 2193 /* First cut: loosely based on original version 2.1. */
c3f6f71d 2194 procinfo *pi;
39f77062
KB
2195 int wstat;
2196 int temp_tid;
2197 ptid_t retval, temp_ptid;
c3f6f71d
JM
2198 int why, what, flags;
2199 int retry = 0;
c906108c 2200
c3f6f71d 2201wait_again:
c906108c 2202
c3f6f71d
JM
2203 retry++;
2204 wstat = 0;
f2907e49 2205 retval = ptid_t (-1);
c906108c 2206
0df8b418 2207 /* Find procinfo for main process. */
e99b03dc 2208 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c3f6f71d 2209 if (pi)
c906108c 2210 {
0df8b418 2211 /* We must assume that the status is stale now... */
c3f6f71d
JM
2212 pi->status_valid = 0;
2213 pi->gregs_valid = 0;
2214 pi->fpregs_valid = 0;
2215
0df8b418 2216#if 0 /* just try this out... */
c3f6f71d
JM
2217 flags = proc_flags (pi);
2218 why = proc_why (pi);
2219 if ((flags & PR_STOPPED) && (why == PR_REQUESTED))
0df8b418 2220 pi->status_valid = 0; /* re-read again, IMMEDIATELY... */
c3f6f71d
JM
2221#endif
2222 /* If child is not stopped, wait for it to stop. */
c475f569
RO
2223 if (!(proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
2224 && !proc_wait_for_stop (pi))
c906108c 2225 {
0df8b418 2226 /* wait_for_stop failed: has the child terminated? */
c3f6f71d 2227 if (errno == ENOENT)
c906108c 2228 {
39f77062
KB
2229 int wait_retval;
2230
0df8b418 2231 /* /proc file not found; presumably child has terminated. */
f6ac5f3d 2232 wait_retval = ::wait (&wstat); /* "wait" for the child's exit. */
c3f6f71d 2233
dfd4cc63 2234 /* Wrong child? */
e99b03dc 2235 if (wait_retval != inferior_ptid.pid ())
3e43a32a
MS
2236 error (_("procfs: couldn't stop "
2237 "process %d: wait returned %d."),
e99b03dc 2238 inferior_ptid.pid (), wait_retval);
c3f6f71d 2239 /* FIXME: might I not just use waitpid?
0df8b418 2240 Or try find_procinfo to see if I know about this child? */
f2907e49 2241 retval = ptid_t (wait_retval);
c906108c 2242 }
d1566ff5
FN
2243 else if (errno == EINTR)
2244 goto wait_again;
c3f6f71d 2245 else
c906108c 2246 {
0df8b418 2247 /* Unknown error from wait_for_stop. */
c3f6f71d 2248 proc_error (pi, "target_wait (wait_for_stop)", __LINE__);
c906108c 2249 }
c3f6f71d
JM
2250 }
2251 else
2252 {
2253 /* This long block is reached if either:
2254 a) the child was already stopped, or
2255 b) we successfully waited for the child with wait_for_stop.
2256 This block will analyze the /proc status, and translate it
2257 into a waitstatus for GDB.
2258
2259 If we actually had to call wait because the /proc file
19958708 2260 is gone (child terminated), then we skip this block,
c3f6f71d
JM
2261 because we already have a waitstatus. */
2262
2263 flags = proc_flags (pi);
2264 why = proc_why (pi);
2265 what = proc_what (pi);
2266
c3f6f71d 2267 if (flags & (PR_STOPPED | PR_ISTOP))
c906108c 2268 {
c3f6f71d
JM
2269 /* If it's running async (for single_thread control),
2270 set it back to normal again. */
2271 if (flags & PR_ASYNC)
2272 if (!proc_unset_async (pi))
2273 proc_error (pi, "target_wait, unset_async", __LINE__);
c3f6f71d
JM
2274
2275 if (info_verbose)
2276 proc_prettyprint_why (why, what, 1);
2277
2278 /* The 'pid' we will return to GDB is composed of
2279 the process ID plus the lwp ID. */
fd79271b 2280 retval = ptid_t (pi->pid, proc_get_current_thread (pi), 0);
c3f6f71d
JM
2281
2282 switch (why) {
2283 case PR_SIGNALLED:
2284 wstat = (what << 8) | 0177;
2285 break;
2286 case PR_SYSENTRY:
37de36c6 2287 if (syscall_is_lwp_exit (pi, what))
c3f6f71d 2288 {
17faa917
DJ
2289 if (print_thread_events)
2290 printf_unfiltered (_("[%s exited]\n"),
a068643d 2291 target_pid_to_str (retval).c_str ());
5b6d1e4f 2292 delete_thread (find_thread_ptid (this, retval));
37de36c6
KB
2293 status->kind = TARGET_WAITKIND_SPURIOUS;
2294 return retval;
2295 }
2296 else if (syscall_is_exit (pi, what))
2297 {
181e7f93
PA
2298 struct inferior *inf;
2299
0df8b418 2300 /* Handle SYS_exit call only. */
37de36c6 2301 /* Stopped at entry to SYS_exit.
19958708 2302 Make it runnable, resume it, then use
37de36c6 2303 the wait system call to get its exit code.
19958708 2304 Proc_run_process always clears the current
37de36c6
KB
2305 fault and signal.
2306 Then return its exit status. */
2307 pi->status_valid = 0;
2308 wstat = 0;
19958708 2309 /* FIXME: what we should do is return
37de36c6
KB
2310 TARGET_WAITKIND_SPURIOUS. */
2311 if (!proc_run_process (pi, 0, 0))
2312 proc_error (pi, "target_wait, run_process", __LINE__);
181e7f93 2313
5b6d1e4f 2314 inf = find_inferior_pid (this, pi->pid);
181e7f93 2315 if (inf->attach_flag)
c3f6f71d 2316 {
19958708 2317 /* Don't call wait: simulate waiting for exit,
37de36c6
KB
2318 return a "success" exit code. Bogus: what if
2319 it returns something else? */
2320 wstat = 0;
39f77062 2321 retval = inferior_ptid; /* ? ? ? */
37de36c6
KB
2322 }
2323 else
2324 {
f6ac5f3d 2325 int temp = ::wait (&wstat);
37de36c6
KB
2326
2327 /* FIXME: shouldn't I make sure I get the right
2328 event from the right process? If (for
2329 instance) I have killed an earlier inferior
2330 process but failed to clean up after it
2331 somehow, I could get its termination event
2332 here. */
2333
0df8b418
MS
2334 /* If wait returns -1, that's what we return
2335 to GDB. */
37de36c6 2336 if (temp < 0)
f2907e49 2337 retval = ptid_t (temp);
c3f6f71d 2338 }
c3f6f71d 2339 }
37de36c6
KB
2340 else
2341 {
a3f17187 2342 printf_filtered (_("procfs: trapped on entry to "));
37de36c6
KB
2343 proc_prettyprint_syscall (proc_what (pi), 0);
2344 printf_filtered ("\n");
44122162
RO
2345
2346 long i, nsysargs, *sysargs;
2347
c475f569
RO
2348 nsysargs = proc_nsysarg (pi);
2349 sysargs = proc_sysargs (pi);
2350
2351 if (nsysargs > 0 && sysargs != NULL)
44122162
RO
2352 {
2353 printf_filtered (_("%ld syscall arguments:\n"),
2354 nsysargs);
2355 for (i = 0; i < nsysargs; i++)
2356 printf_filtered ("#%ld: 0x%08lx\n",
2357 i, sysargs[i]);
2358 }
2359
37de36c6
KB
2360 if (status)
2361 {
0df8b418
MS
2362 /* How to exit gracefully, returning "unknown
2363 event". */
37de36c6 2364 status->kind = TARGET_WAITKIND_SPURIOUS;
39f77062 2365 return inferior_ptid;
37de36c6
KB
2366 }
2367 else
2368 {
2369 /* How to keep going without returning to wfi: */
049a8570 2370 target_continue_no_signal (ptid);
37de36c6
KB
2371 goto wait_again;
2372 }
2373 }
2374 break;
2375 case PR_SYSEXIT:
2376 if (syscall_is_exec (pi, what))
c3f6f71d 2377 {
37de36c6
KB
2378 /* Hopefully this is our own "fork-child" execing
2379 the real child. Hoax this event into a trap, and
2380 GDB will see the child about to execute its start
0df8b418 2381 address. */
37de36c6
KB
2382 wstat = (SIGTRAP << 8) | 0177;
2383 }
2384 else if (syscall_is_lwp_create (pi, what))
2385 {
77382aee
PA
2386 /* This syscall is somewhat like fork/exec. We
2387 will get the event twice: once for the parent
2388 LWP, and once for the child. We should already
2389 know about the parent LWP, but the child will
2390 be new to us. So, whenever we get this event,
2391 if it represents a new thread, simply add the
2392 thread to the list. */
c3f6f71d 2393
37de36c6 2394 /* If not in procinfo list, add it. */
39f77062
KB
2395 temp_tid = proc_get_current_thread (pi);
2396 if (!find_procinfo (pi->pid, temp_tid))
2397 create_procinfo (pi->pid, temp_tid);
37de36c6 2398
fd79271b 2399 temp_ptid = ptid_t (pi->pid, temp_tid, 0);
37de36c6 2400 /* If not in GDB's thread list, add it. */
5b6d1e4f
PA
2401 if (!in_thread_list (this, temp_ptid))
2402 add_thread (this, temp_ptid);
93815fbf 2403
0df8b418 2404 /* Return to WFI, but tell it to immediately resume. */
37de36c6 2405 status->kind = TARGET_WAITKIND_SPURIOUS;
39f77062 2406 return inferior_ptid;
37de36c6
KB
2407 }
2408 else if (syscall_is_lwp_exit (pi, what))
2409 {
17faa917
DJ
2410 if (print_thread_events)
2411 printf_unfiltered (_("[%s exited]\n"),
a068643d 2412 target_pid_to_str (retval).c_str ());
5b6d1e4f 2413 delete_thread (find_thread_ptid (this, retval));
37de36c6
KB
2414 status->kind = TARGET_WAITKIND_SPURIOUS;
2415 return retval;
c3f6f71d 2416 }
37de36c6
KB
2417 else if (0)
2418 {
2419 /* FIXME: Do we need to handle SYS_sproc,
2420 SYS_fork, or SYS_vfork here? The old procfs
2421 seemed to use this event to handle threads on
2422 older (non-LWP) systems, where I'm assuming
19958708 2423 that threads were actually separate processes.
37de36c6
KB
2424 Irix, maybe? Anyway, low priority for now. */
2425 }
2426 else
2427 {
a3f17187 2428 printf_filtered (_("procfs: trapped on exit from "));
37de36c6
KB
2429 proc_prettyprint_syscall (proc_what (pi), 0);
2430 printf_filtered ("\n");
44122162
RO
2431
2432 long i, nsysargs, *sysargs;
2433
c475f569
RO
2434 nsysargs = proc_nsysarg (pi);
2435 sysargs = proc_sysargs (pi);
2436
2437 if (nsysargs > 0 && sysargs != NULL)
44122162
RO
2438 {
2439 printf_filtered (_("%ld syscall arguments:\n"),
2440 nsysargs);
2441 for (i = 0; i < nsysargs; i++)
2442 printf_filtered ("#%ld: 0x%08lx\n",
2443 i, sysargs[i]);
2444 }
2445
37de36c6 2446 status->kind = TARGET_WAITKIND_SPURIOUS;
39f77062 2447 return inferior_ptid;
37de36c6 2448 }
c3f6f71d
JM
2449 break;
2450 case PR_REQUESTED:
2451#if 0 /* FIXME */
2452 wstat = (SIGSTOP << 8) | 0177;
2453 break;
2454#else
2455 if (retry < 5)
2456 {
a3f17187 2457 printf_filtered (_("Retry #%d:\n"), retry);
c3f6f71d
JM
2458 pi->status_valid = 0;
2459 goto wait_again;
2460 }
2461 else
2462 {
2463 /* If not in procinfo list, add it. */
39f77062
KB
2464 temp_tid = proc_get_current_thread (pi);
2465 if (!find_procinfo (pi->pid, temp_tid))
2466 create_procinfo (pi->pid, temp_tid);
c3f6f71d
JM
2467
2468 /* If not in GDB's thread list, add it. */
fd79271b 2469 temp_ptid = ptid_t (pi->pid, temp_tid, 0);
5b6d1e4f
PA
2470 if (!in_thread_list (this, temp_ptid))
2471 add_thread (this, temp_ptid);
c3f6f71d
JM
2472
2473 status->kind = TARGET_WAITKIND_STOPPED;
b196bc4c 2474 status->value.sig = GDB_SIGNAL_0;
c3f6f71d
JM
2475 return retval;
2476 }
2477#endif
2478 case PR_JOBCONTROL:
2479 wstat = (what << 8) | 0177;
2480 break;
2481 case PR_FAULTED:
7a289707
RO
2482 {
2483 int signo = pi->prstatus.pr_lwp.pr_info.si_signo;
2484 if (signo != 0)
2485 wstat = (signo << 8) | 0177;
c3f6f71d 2486 }
7a289707 2487 break;
c3f6f71d
JM
2488 default: /* switch (why) unmatched */
2489 printf_filtered ("procfs:%d -- ", __LINE__);
a3f17187 2490 printf_filtered (_("child stopped for unknown reason:\n"));
c3f6f71d 2491 proc_prettyprint_why (why, what, 1);
8a3fe4f8 2492 error (_("... giving up..."));
c3f6f71d
JM
2493 break;
2494 }
77382aee
PA
2495 /* Got this far without error: If retval isn't in the
2496 threads database, add it. */
c475f569
RO
2497 if (retval.pid () > 0
2498 && retval != inferior_ptid
5b6d1e4f 2499 && !in_thread_list (this, retval))
c906108c 2500 {
77382aee
PA
2501 /* We have a new thread. We need to add it both to
2502 GDB's list and to our own. If we don't create a
2503 procinfo, resume may be unhappy later. */
5b6d1e4f 2504 add_thread (this, retval);
e99b03dc 2505 if (find_procinfo (retval.pid (),
e38504b3 2506 retval.lwp ()) == NULL)
e99b03dc 2507 create_procinfo (retval.pid (),
e38504b3 2508 retval.lwp ());
c906108c 2509 }
c906108c 2510 }
0df8b418 2511 else /* Flags do not indicate STOPPED. */
c906108c 2512 {
0df8b418 2513 /* surely this can't happen... */
c3f6f71d
JM
2514 printf_filtered ("procfs:%d -- process not stopped.\n",
2515 __LINE__);
2516 proc_prettyprint_flags (flags, 1);
8a3fe4f8 2517 error (_("procfs: ...giving up..."));
c906108c 2518 }
c906108c 2519 }
c906108c 2520
c3f6f71d
JM
2521 if (status)
2522 store_waitstatus (status, wstat);
c906108c
SS
2523 }
2524
c3f6f71d
JM
2525 return retval;
2526}
c906108c 2527
4e73f23d
RM
2528/* Perform a partial transfer to/from the specified object. For
2529 memory transfers, fall back to the old memory xfer functions. */
2530
f6ac5f3d
PA
2531enum target_xfer_status
2532procfs_target::xfer_partial (enum target_object object,
2533 const char *annex, gdb_byte *readbuf,
2534 const gdb_byte *writebuf, ULONGEST offset,
2535 ULONGEST len, ULONGEST *xfered_len)
4e73f23d
RM
2536{
2537 switch (object)
2538 {
2539 case TARGET_OBJECT_MEMORY:
e96027e0 2540 return procfs_xfer_memory (readbuf, writebuf, offset, len, xfered_len);
4e73f23d 2541
4e73f23d 2542 case TARGET_OBJECT_AUXV:
f6ac5f3d 2543 return memory_xfer_auxv (this, object, annex, readbuf, writebuf,
9b409511 2544 offset, len, xfered_len);
4e73f23d
RM
2545
2546 default:
4360561f
TT
2547 return this->beneath ()->xfer_partial (object, annex,
2548 readbuf, writebuf, offset, len,
2549 xfered_len);
4e73f23d
RM
2550 }
2551}
2552
e96027e0
PA
2553/* Helper for procfs_xfer_partial that handles memory transfers.
2554 Arguments are like target_xfer_partial. */
4e73f23d 2555
e96027e0
PA
2556static enum target_xfer_status
2557procfs_xfer_memory (gdb_byte *readbuf, const gdb_byte *writebuf,
2558 ULONGEST memaddr, ULONGEST len, ULONGEST *xfered_len)
c3f6f71d
JM
2559{
2560 procinfo *pi;
e96027e0 2561 int nbytes;
c906108c 2562
0df8b418 2563 /* Find procinfo for main process. */
e99b03dc 2564 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c475f569 2565 if (pi->as_fd == 0 && open_procinfo_files (pi, FD_AS) == 0)
c906108c 2566 {
c3f6f71d 2567 proc_warn (pi, "xfer_memory, open_proc_files", __LINE__);
e96027e0 2568 return TARGET_XFER_E_IO;
c906108c 2569 }
c906108c 2570
e96027e0
PA
2571 if (lseek (pi->as_fd, (off_t) memaddr, SEEK_SET) != (off_t) memaddr)
2572 return TARGET_XFER_E_IO;
2573
2574 if (writebuf != NULL)
c906108c 2575 {
e96027e0
PA
2576 PROCFS_NOTE ("write memory:\n");
2577 nbytes = write (pi->as_fd, writebuf, len);
2578 }
2579 else
2580 {
2581 PROCFS_NOTE ("read memory:\n");
2582 nbytes = read (pi->as_fd, readbuf, len);
c906108c 2583 }
e96027e0
PA
2584 if (nbytes <= 0)
2585 return TARGET_XFER_E_IO;
2586 *xfered_len = nbytes;
2587 return TARGET_XFER_OK;
c906108c
SS
2588}
2589
77382aee
PA
2590/* Called by target_resume before making child runnable. Mark cached
2591 registers and status's invalid. If there are "dirty" caches that
2592 need to be written back to the child process, do that.
c906108c 2593
77382aee
PA
2594 File descriptors are also cached. As they are a limited resource,
2595 we cannot hold onto them indefinitely. However, as they are
2596 expensive to open, we don't want to throw them away
85102364 2597 indiscriminately either. As a compromise, we will keep the file
77382aee
PA
2598 descriptors for the parent process, but discard any file
2599 descriptors we may have accumulated for the threads.
2600
2601 As this function is called by iterate_over_threads, it always
2602 returns zero (so that iterate_over_threads will keep
2603 iterating). */
c3f6f71d
JM
2604
2605static int
fba45db2 2606invalidate_cache (procinfo *parent, procinfo *pi, void *ptr)
c906108c 2607{
77382aee
PA
2608 /* About to run the child; invalidate caches and do any other
2609 cleanup. */
c906108c 2610
c3f6f71d
JM
2611#if 0
2612 if (pi->gregs_dirty)
c475f569 2613 if (parent == NULL || proc_get_current_thread (parent) != pi->tid)
c3f6f71d
JM
2614 if (!proc_set_gregs (pi)) /* flush gregs cache */
2615 proc_warn (pi, "target_resume, set_gregs",
2616 __LINE__);
f5656ead 2617 if (gdbarch_fp0_regnum (target_gdbarch ()) >= 0)
60054393 2618 if (pi->fpregs_dirty)
c475f569 2619 if (parent == NULL || proc_get_current_thread (parent) != pi->tid)
60054393 2620 if (!proc_set_fpregs (pi)) /* flush fpregs cache */
19958708 2621 proc_warn (pi, "target_resume, set_fpregs",
60054393 2622 __LINE__);
c906108c 2623#endif
c906108c 2624
c3f6f71d 2625 if (parent != NULL)
c906108c 2626 {
c3f6f71d 2627 /* The presence of a parent indicates that this is an LWP.
19958708 2628 Close any file descriptors that it might have open.
c3f6f71d
JM
2629 We don't do this to the master (parent) procinfo. */
2630
2631 close_procinfo_files (pi);
c906108c 2632 }
c3f6f71d
JM
2633 pi->gregs_valid = 0;
2634 pi->fpregs_valid = 0;
2635#if 0
2636 pi->gregs_dirty = 0;
2637 pi->fpregs_dirty = 0;
c906108c 2638#endif
c3f6f71d
JM
2639 pi->status_valid = 0;
2640 pi->threads_valid = 0;
c906108c 2641
c3f6f71d 2642 return 0;
c906108c
SS
2643}
2644
0fda6bd2 2645#if 0
77382aee
PA
2646/* A callback function for iterate_over_threads. Find the
2647 asynchronous signal thread, and make it runnable. See if that
2648 helps matters any. */
c906108c 2649
c3f6f71d 2650static int
fba45db2 2651make_signal_thread_runnable (procinfo *process, procinfo *pi, void *ptr)
c906108c 2652{
c3f6f71d
JM
2653#ifdef PR_ASLWP
2654 if (proc_flags (pi) & PR_ASLWP)
c906108c 2655 {
c3f6f71d
JM
2656 if (!proc_run_process (pi, 0, -1))
2657 proc_error (pi, "make_signal_thread_runnable", __LINE__);
2658 return 1;
c906108c 2659 }
c906108c 2660#endif
c3f6f71d 2661 return 0;
c906108c 2662}
0fda6bd2 2663#endif
c906108c 2664
77382aee
PA
2665/* Make the child process runnable. Normally we will then call
2666 procfs_wait and wait for it to stop again (unless gdb is async).
2667
2668 If STEP is true, then arrange for the child to stop again after
2669 executing a single instruction. If SIGNO is zero, then cancel any
2670 pending signal; if non-zero, then arrange for the indicated signal
2671 to be delivered to the child when it runs. If PID is -1, then
2672 allow any child thread to run; if non-zero, then allow only the
2673 indicated thread to run. (not implemented yet). */
c906108c 2674
f6ac5f3d
PA
2675void
2676procfs_target::resume (ptid_t ptid, int step, enum gdb_signal signo)
c906108c 2677{
c3f6f71d
JM
2678 procinfo *pi, *thread;
2679 int native_signo;
2680
19958708 2681 /* 2.1:
c3f6f71d 2682 prrun.prflags |= PRSVADDR;
19958708 2683 prrun.pr_vaddr = $PC; set resume address
c3f6f71d 2684 prrun.prflags |= PRSTRACE; trace signals in pr_trace (all)
19958708 2685 prrun.prflags |= PRSFAULT; trace faults in pr_fault (all but PAGE)
c3f6f71d
JM
2686 prrun.prflags |= PRCFAULT; clear current fault.
2687
2688 PRSTRACE and PRSFAULT can be done by other means
77382aee 2689 (proc_trace_signals, proc_trace_faults)
c3f6f71d
JM
2690 PRSVADDR is unnecessary.
2691 PRCFAULT may be replaced by a PIOCCFAULT call (proc_clear_current_fault)
2692 This basically leaves PRSTEP and PRCSIG.
2693 PRCSIG is like PIOCSSIG (proc_clear_current_signal).
2694 So basically PR_STEP is the sole argument that must be passed
77382aee 2695 to proc_run_process (for use in the prrun struct by ioctl). */
c3f6f71d 2696
0df8b418 2697 /* Find procinfo for main process. */
e99b03dc 2698 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c3f6f71d 2699
77382aee 2700 /* First cut: ignore pid argument. */
c3f6f71d 2701 errno = 0;
c906108c 2702
c3f6f71d 2703 /* Convert signal to host numbering. */
c475f569 2704 if (signo == 0 || (signo == GDB_SIGNAL_STOP && pi->ignore_next_sigstop))
c3f6f71d
JM
2705 native_signo = 0;
2706 else
2ea28649 2707 native_signo = gdb_signal_to_host (signo);
c906108c 2708
c3f6f71d 2709 pi->ignore_next_sigstop = 0;
c906108c 2710
77382aee
PA
2711 /* Running the process voids all cached registers and status. */
2712 /* Void the threads' caches first. */
19958708 2713 proc_iterate_over_threads (pi, invalidate_cache, NULL);
c3f6f71d
JM
2714 /* Void the process procinfo's caches. */
2715 invalidate_cache (NULL, pi, NULL);
c906108c 2716
e99b03dc 2717 if (ptid.pid () != -1)
c906108c 2718 {
77382aee
PA
2719 /* Resume a specific thread, presumably suppressing the
2720 others. */
e38504b3 2721 thread = find_procinfo (ptid.pid (), ptid.lwp ());
7de45904 2722 if (thread != NULL)
c906108c 2723 {
c3f6f71d
JM
2724 if (thread->tid != 0)
2725 {
77382aee
PA
2726 /* We're to resume a specific thread, and not the
2727 others. Set the child process's PR_ASYNC flag. */
c3f6f71d
JM
2728 if (!proc_set_async (pi))
2729 proc_error (pi, "target_resume, set_async", __LINE__);
c3f6f71d 2730#if 0
19958708 2731 proc_iterate_over_threads (pi,
c3f6f71d
JM
2732 make_signal_thread_runnable,
2733 NULL);
2734#endif
0df8b418
MS
2735 pi = thread; /* Substitute the thread's procinfo
2736 for run. */
c3f6f71d 2737 }
c906108c
SS
2738 }
2739 }
c906108c 2740
c3f6f71d 2741 if (!proc_run_process (pi, step, native_signo))
c906108c 2742 {
c3f6f71d 2743 if (errno == EBUSY)
77382aee
PA
2744 warning (_("resume: target already running. "
2745 "Pretend to resume, and hope for the best!"));
c3f6f71d
JM
2746 else
2747 proc_error (pi, "target_resume", __LINE__);
c906108c 2748 }
c3f6f71d 2749}
c906108c 2750
77382aee 2751/* Set up to trace signals in the child process. */
c906108c 2752
f6ac5f3d 2753void
adc6a863 2754procfs_target::pass_signals (gdb::array_view<const unsigned char> pass_signals)
c3f6f71d 2755{
44122162 2756 sigset_t signals;
e99b03dc 2757 procinfo *pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
2455069d 2758 int signo;
c906108c 2759
2455069d
UW
2760 prfillset (&signals);
2761
2762 for (signo = 0; signo < NSIG; signo++)
2763 {
2ea28649 2764 int target_signo = gdb_signal_from_host (signo);
adc6a863 2765 if (target_signo < pass_signals.size () && pass_signals[target_signo])
44122162 2766 prdelset (&signals, signo);
2455069d
UW
2767 }
2768
2769 if (!proc_set_traced_signals (pi, &signals))
2770 proc_error (pi, "pass_signals", __LINE__);
c3f6f71d 2771}
c906108c 2772
77382aee 2773/* Print status information about the child process. */
c906108c 2774
f6ac5f3d
PA
2775void
2776procfs_target::files_info ()
c3f6f71d 2777{
181e7f93 2778 struct inferior *inf = current_inferior ();
f4a14ae6 2779
a3f17187 2780 printf_filtered (_("\tUsing the running image of %s %s via /proc.\n"),
181e7f93 2781 inf->attach_flag? "attached": "child",
a068643d 2782 target_pid_to_str (inferior_ptid).c_str ());
c3f6f71d 2783}
c906108c 2784
77382aee
PA
2785/* Make it die. Wait for it to die. Clean up after it. Note: this
2786 should only be applied to the real process, not to an LWP, because
2787 of the check for parent-process. If we need this to work for an
2788 LWP, it needs some more logic. */
c906108c 2789
c3f6f71d 2790static void
fba45db2 2791unconditionally_kill_inferior (procinfo *pi)
c3f6f71d
JM
2792{
2793 int parent_pid;
c906108c 2794
c3f6f71d 2795 parent_pid = proc_parent_pid (pi);
c3f6f71d 2796 if (!proc_kill (pi, SIGKILL))
103b3ef5 2797 proc_error (pi, "unconditionally_kill, proc_kill", __LINE__);
c3f6f71d 2798 destroy_procinfo (pi);
c906108c 2799
c3f6f71d
JM
2800 /* If pi is GDB's child, wait for it to die. */
2801 if (parent_pid == getpid ())
19958708 2802 /* FIXME: should we use waitpid to make sure we get the right event?
c3f6f71d
JM
2803 Should we check the returned event? */
2804 {
0d06e24b 2805#if 0
c3f6f71d 2806 int status, ret;
c906108c 2807
c3f6f71d
JM
2808 ret = waitpid (pi->pid, &status, 0);
2809#else
2810 wait (NULL);
2811#endif
2812 }
2813}
c906108c 2814
77382aee
PA
2815/* We're done debugging it, and we want it to go away. Then we want
2816 GDB to forget all about it. */
c906108c 2817
f6ac5f3d
PA
2818void
2819procfs_target::kill ()
c906108c 2820{
d7e15655 2821 if (inferior_ptid != null_ptid) /* ? */
c3f6f71d 2822 {
0df8b418 2823 /* Find procinfo for main process. */
e99b03dc 2824 procinfo *pi = find_procinfo (inferior_ptid.pid (), 0);
c906108c 2825
c3f6f71d
JM
2826 if (pi)
2827 unconditionally_kill_inferior (pi);
bc1e6c81 2828 target_mourn_inferior (inferior_ptid);
c906108c 2829 }
c3f6f71d
JM
2830}
2831
77382aee 2832/* Forget we ever debugged this thing! */
c906108c 2833
f6ac5f3d
PA
2834void
2835procfs_target::mourn_inferior ()
c3f6f71d
JM
2836{
2837 procinfo *pi;
c906108c 2838
d7e15655 2839 if (inferior_ptid != null_ptid)
c3f6f71d 2840 {
0df8b418 2841 /* Find procinfo for main process. */
e99b03dc 2842 pi = find_procinfo (inferior_ptid.pid (), 0);
c3f6f71d
JM
2843 if (pi)
2844 destroy_procinfo (pi);
c906108c 2845 }
6a3cb8e8
PA
2846
2847 generic_mourn_inferior ();
8181d85f 2848
f6ac5f3d 2849 maybe_unpush_target ();
c3f6f71d 2850}
c906108c 2851
77382aee
PA
2852/* When GDB forks to create a runnable inferior process, this function
2853 is called on the parent side of the fork. It's job is to do
2854 whatever is necessary to make the child ready to be debugged, and
2855 then wait for the child to synchronize. */
c906108c 2856
5b6d1e4f
PA
2857void
2858procfs_target::procfs_init_inferior (int pid)
c3f6f71d
JM
2859{
2860 procinfo *pi;
c3f6f71d 2861 int fail;
2689673f 2862 int lwpid;
c906108c 2863
c3f6f71d
JM
2864 /* This routine called on the parent side (GDB side)
2865 after GDB forks the inferior. */
5b6d1e4f
PA
2866 if (!target_is_pushed (this))
2867 push_target (this);
c906108c 2868
c475f569
RO
2869 pi = create_procinfo (pid, 0);
2870 if (pi == NULL)
9b20d036 2871 perror (_("procfs: out of memory in 'init_inferior'"));
c3f6f71d
JM
2872
2873 if (!open_procinfo_files (pi, FD_CTL))
2874 proc_error (pi, "init_inferior, open_proc_files", __LINE__);
2875
2876 /*
2877 xmalloc // done
2878 open_procinfo_files // done
2879 link list // done
2880 prfillset (trace)
2881 procfs_notice_signals
2882 prfillset (fault)
2883 prdelset (FLTPAGE)
2884 PIOCWSTOP
2885 PIOCSFAULT
2886 */
2887
77382aee 2888 /* If not stopped yet, wait for it to stop. */
c475f569 2889 if (!(proc_flags (pi) & PR_STOPPED) && !(proc_wait_for_stop (pi)))
c3f6f71d
JM
2890 dead_procinfo (pi, "init_inferior: wait_for_stop failed", KILL);
2891
2892 /* Save some of the /proc state to be restored if we detach. */
2893 /* FIXME: Why? In case another debugger was debugging it?
0df8b418 2894 We're it's parent, for Ghu's sake! */
c3f6f71d
JM
2895 if (!proc_get_traced_signals (pi, &pi->saved_sigset))
2896 proc_error (pi, "init_inferior, get_traced_signals", __LINE__);
2897 if (!proc_get_held_signals (pi, &pi->saved_sighold))
2898 proc_error (pi, "init_inferior, get_held_signals", __LINE__);
2899 if (!proc_get_traced_faults (pi, &pi->saved_fltset))
2900 proc_error (pi, "init_inferior, get_traced_faults", __LINE__);
37de36c6 2901 if (!proc_get_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d 2902 proc_error (pi, "init_inferior, get_traced_sysentry", __LINE__);
37de36c6 2903 if (!proc_get_traced_sysexit (pi, pi->saved_exitset))
c3f6f71d
JM
2904 proc_error (pi, "init_inferior, get_traced_sysexit", __LINE__);
2905
c475f569
RO
2906 fail = procfs_debug_inferior (pi);
2907 if (fail != 0)
c3f6f71d
JM
2908 proc_error (pi, "init_inferior (procfs_debug_inferior)", fail);
2909
0d06e24b
JM
2910 /* FIXME: logically, we should really be turning OFF run-on-last-close,
2911 and possibly even turning ON kill-on-last-close at this point. But
2912 I can't make that change without careful testing which I don't have
2913 time to do right now... */
c3f6f71d
JM
2914 /* Turn on run-on-last-close flag so that the child
2915 will die if GDB goes away for some reason. */
2916 if (!proc_set_run_on_last_close (pi))
2917 proc_error (pi, "init_inferior, set_RLC", __LINE__);
2918
2689673f
PA
2919 /* We now have have access to the lwpid of the main thread/lwp. */
2920 lwpid = proc_get_current_thread (pi);
2921
2922 /* Create a procinfo for the main lwp. */
2923 create_procinfo (pid, lwpid);
2924
2925 /* We already have a main thread registered in the thread table at
2926 this point, but it didn't have any lwp info yet. Notify the core
2927 about it. This changes inferior_ptid as well. */
5b6d1e4f 2928 thread_change_ptid (this, ptid_t (pid), ptid_t (pid, lwpid, 0));
c906108c 2929
2090129c 2930 gdb_startup_inferior (pid, START_INFERIOR_TRAPS_EXPECTED);
c3f6f71d 2931}
c906108c 2932
77382aee
PA
2933/* When GDB forks to create a new process, this function is called on
2934 the child side of the fork before GDB exec's the user program. Its
2935 job is to make the child minimally debuggable, so that the parent
2936 GDB process can connect to the child and take over. This function
2937 should do only the minimum to make that possible, and to
2938 synchronize with the parent process. The parent process should
2939 take care of the details. */
c3f6f71d
JM
2940
2941static void
fba45db2 2942procfs_set_exec_trap (void)
c3f6f71d
JM
2943{
2944 /* This routine called on the child side (inferior side)
2945 after GDB forks the inferior. It must use only local variables,
2946 because it may be sharing data space with its parent. */
c906108c 2947
c3f6f71d 2948 procinfo *pi;
37de36c6 2949 sysset_t *exitset;
c906108c 2950
c475f569
RO
2951 pi = create_procinfo (getpid (), 0);
2952 if (pi == NULL)
e2e0b3e5 2953 perror_with_name (_("procfs: create_procinfo failed in child."));
c906108c 2954
c3f6f71d
JM
2955 if (open_procinfo_files (pi, FD_CTL) == 0)
2956 {
2957 proc_warn (pi, "set_exec_trap, open_proc_files", __LINE__);
2958 gdb_flush (gdb_stderr);
77382aee
PA
2959 /* No need to call "dead_procinfo", because we're going to
2960 exit. */
c3f6f71d
JM
2961 _exit (127);
2962 }
c906108c 2963
44122162 2964 /* Method for tracing exec syscalls. */
c3f6f71d
JM
2965 /* GW: Rationale...
2966 Not all systems with /proc have all the exec* syscalls with the same
2967 names. On the SGI, for example, there is no SYS_exec, but there
77382aee 2968 *is* a SYS_execv. So, we try to account for that. */
c906108c 2969
c475f569 2970 exitset = XNEW (sysset_t);
44122162 2971 premptyset (exitset);
c3f6f71d 2972#ifdef SYS_exec
44122162 2973 praddset (exitset, SYS_exec);
c906108c 2974#endif
44122162 2975 praddset (exitset, SYS_execve);
37de36c6
KB
2976
2977 if (!proc_set_traced_sysexit (pi, exitset))
c906108c 2978 {
c3f6f71d
JM
2979 proc_warn (pi, "set_exec_trap, set_traced_sysexit", __LINE__);
2980 gdb_flush (gdb_stderr);
2981 _exit (127);
c906108c 2982 }
c3f6f71d 2983
0df8b418 2984 /* FIXME: should this be done in the parent instead? */
c3f6f71d
JM
2985 /* Turn off inherit on fork flag so that all grand-children
2986 of gdb start with tracing flags cleared. */
2987 if (!proc_unset_inherit_on_fork (pi))
2988 proc_warn (pi, "set_exec_trap, unset_inherit", __LINE__);
2989
2990 /* Turn off run on last close flag, so that the child process
2991 cannot run away just because we close our handle on it.
2992 We want it to wait for the parent to attach. */
2993 if (!proc_unset_run_on_last_close (pi))
2994 proc_warn (pi, "set_exec_trap, unset_RLC", __LINE__);
2995
19958708 2996 /* FIXME: No need to destroy the procinfo --
0df8b418 2997 we have our own address space, and we're about to do an exec! */
c3f6f71d 2998 /*destroy_procinfo (pi);*/
c906108c 2999}
c906108c 3000
77382aee
PA
3001/* This function is called BEFORE gdb forks the inferior process. Its
3002 only real responsibility is to set things up for the fork, and tell
3003 GDB which two functions to call after the fork (one for the parent,
3004 and one for the child).
3005
3006 This function does a complicated search for a unix shell program,
3007 which it then uses to parse arguments and environment variables to
3008 be sent to the child. I wonder whether this code could not be
3009 abstracted out and shared with other unix targets such as
3010 inf-ptrace? */
c906108c 3011
f6ac5f3d
PA
3012void
3013procfs_target::create_inferior (const char *exec_file,
3014 const std::string &allargs,
3015 char **env, int from_tty)
c906108c 3016{
974e6844 3017 const char *shell_file = get_shell ();
c906108c 3018 char *tryname;
28439f5e
PA
3019 int pid;
3020
974e6844 3021 if (strchr (shell_file, '/') == NULL)
c906108c
SS
3022 {
3023
3024 /* We will be looking down the PATH to find shell_file. If we
c3f6f71d
JM
3025 just do this the normal way (via execlp, which operates by
3026 attempting an exec for each element of the PATH until it
3027 finds one which succeeds), then there will be an exec for
3028 each failed attempt, each of which will cause a PR_SYSEXIT
3029 stop, and we won't know how to distinguish the PR_SYSEXIT's
3030 for these failed execs with the ones for successful execs
3031 (whether the exec has succeeded is stored at that time in the
3032 carry bit or some such architecture-specific and
3033 non-ABI-specified place).
3034
3035 So I can't think of anything better than to search the PATH
3036 now. This has several disadvantages: (1) There is a race
3037 condition; if we find a file now and it is deleted before we
3038 exec it, we lose, even if the deletion leaves a valid file
3039 further down in the PATH, (2) there is no way to know exactly
3040 what an executable (in the sense of "capable of being
3041 exec'd") file is. Using access() loses because it may lose
3042 if the caller is the superuser; failing to use it loses if
3043 there are ACLs or some such. */
c906108c 3044
995816ba
PA
3045 const char *p;
3046 const char *p1;
c906108c 3047 /* FIXME-maybe: might want "set path" command so user can change what
c3f6f71d 3048 path is used from within GDB. */
995816ba 3049 const char *path = getenv ("PATH");
c906108c
SS
3050 int len;
3051 struct stat statbuf;
3052
3053 if (path == NULL)
3054 path = "/bin:/usr/bin";
3055
b196bc4c 3056 tryname = (char *) alloca (strlen (path) + strlen (shell_file) + 2);
c3f6f71d 3057 for (p = path; p != NULL; p = p1 ? p1 + 1: NULL)
c906108c
SS
3058 {
3059 p1 = strchr (p, ':');
3060 if (p1 != NULL)
3061 len = p1 - p;
3062 else
3063 len = strlen (p);
3064 strncpy (tryname, p, len);
3065 tryname[len] = '\0';
3066 strcat (tryname, "/");
3067 strcat (tryname, shell_file);
3068 if (access (tryname, X_OK) < 0)
3069 continue;
3070 if (stat (tryname, &statbuf) < 0)
3071 continue;
3072 if (!S_ISREG (statbuf.st_mode))
3073 /* We certainly need to reject directories. I'm not quite
3074 as sure about FIFOs, sockets, etc., but I kind of doubt
3075 that people want to exec() these things. */
3076 continue;
3077 break;
3078 }
3079 if (p == NULL)
3080 /* Not found. This must be an error rather than merely passing
3081 the file to execlp(), because execlp() would try all the
3082 exec()s, causing GDB to get confused. */
8a3fe4f8 3083 error (_("procfs:%d -- Can't find shell %s in PATH"),
c3f6f71d 3084 __LINE__, shell_file);
c906108c
SS
3085
3086 shell_file = tryname;
3087 }
3088
28439f5e 3089 pid = fork_inferior (exec_file, allargs, env, procfs_set_exec_trap,
e69860f1 3090 NULL, NULL, shell_file, NULL);
28439f5e 3091
2090129c
SDJ
3092 /* We have something that executes now. We'll be running through
3093 the shell at this point (if startup-with-shell is true), but the
3094 pid shouldn't change. */
5b6d1e4f 3095 add_thread_silent (this, ptid_t (pid));
2090129c 3096
5b6d1e4f 3097 procfs_init_inferior (pid);
27087a3d
JB
3098}
3099
3100/* An observer for the "inferior_created" event. */
c906108c 3101
27087a3d
JB
3102static void
3103procfs_inferior_created (struct target_ops *ops, int from_tty)
3104{
c906108c
SS
3105}
3106
e8032dde 3107/* Callback for update_thread_list. Calls "add_thread". */
c906108c 3108
c3f6f71d 3109static int
fba45db2 3110procfs_notice_thread (procinfo *pi, procinfo *thread, void *ptr)
c906108c 3111{
fd79271b 3112 ptid_t gdb_threadid = ptid_t (pi->pid, thread->tid, 0);
c906108c 3113
5b6d1e4f 3114 thread_info *thr = find_thread_ptid (&the_procfs_target, gdb_threadid);
24bce9bb 3115 if (thr == NULL || thr->state == THREAD_EXITED)
5b6d1e4f 3116 add_thread (&the_procfs_target, gdb_threadid);
c906108c 3117
c3f6f71d
JM
3118 return 0;
3119}
3120
77382aee
PA
3121/* Query all the threads that the target knows about, and give them
3122 back to GDB to add to its list. */
c3f6f71d 3123
f6ac5f3d
PA
3124void
3125procfs_target::update_thread_list ()
c3f6f71d
JM
3126{
3127 procinfo *pi;
3128
e8032dde
PA
3129 prune_threads ();
3130
0df8b418 3131 /* Find procinfo for main process. */
e99b03dc 3132 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c3f6f71d
JM
3133 proc_update_threads (pi);
3134 proc_iterate_over_threads (pi, procfs_notice_thread, NULL);
c906108c
SS
3135}
3136
77382aee
PA
3137/* Return true if the thread is still 'alive'. This guy doesn't
3138 really seem to be doing his job. Got to investigate how to tell
3139 when a thread is really gone. */
c906108c 3140
57810aa7 3141bool
f6ac5f3d 3142procfs_target::thread_alive (ptid_t ptid)
c906108c 3143{
c3f6f71d
JM
3144 int proc, thread;
3145 procinfo *pi;
c906108c 3146
e99b03dc 3147 proc = ptid.pid ();
e38504b3 3148 thread = ptid.lwp ();
0df8b418 3149 /* If I don't know it, it ain't alive! */
c475f569
RO
3150 pi = find_procinfo (proc, thread);
3151 if (pi == NULL)
57810aa7 3152 return false;
c3f6f71d
JM
3153
3154 /* If I can't get its status, it ain't alive!
3155 What's more, I need to forget about it! */
3156 if (!proc_get_status (pi))
3157 {
3158 destroy_procinfo (pi);
57810aa7 3159 return false;
c3f6f71d 3160 }
77382aee
PA
3161 /* I couldn't have got its status if it weren't alive, so it's
3162 alive. */
57810aa7 3163 return true;
c906108c 3164}
c3f6f71d 3165
a068643d 3166/* Convert PTID to a string. */
c3f6f71d 3167
a068643d 3168std::string
f6ac5f3d 3169procfs_target::pid_to_str (ptid_t ptid)
c3f6f71d 3170{
e38504b3 3171 if (ptid.lwp () == 0)
a068643d 3172 return string_printf ("process %d", ptid.pid ());
c3f6f71d 3173 else
a068643d 3174 return string_printf ("LWP %ld", ptid.lwp ());
c3f6f71d
JM
3175}
3176
4206c05e
RO
3177/* Accepts an integer PID; Returns a string representing a file that
3178 can be opened to get the symbols for the child process. */
3179
3180char *
3181procfs_target::pid_to_exec_file (int pid)
3182{
3183 static char buf[PATH_MAX];
3184 char name[PATH_MAX];
3185
3186 /* Solaris 11 introduced /proc/<proc-id>/execname. */
c475f569 3187 xsnprintf (name, sizeof (name), "/proc/%d/execname", pid);
4206c05e
RO
3188 scoped_fd fd (gdb_open_cloexec (name, O_RDONLY, 0));
3189 if (fd.get () < 0 || read (fd.get (), buf, PATH_MAX - 1) < 0)
3190 {
3191 /* If that fails, fall back to /proc/<proc-id>/path/a.out introduced in
3192 Solaris 10. */
3193 ssize_t len;
3194
c475f569 3195 xsnprintf (name, sizeof (name), "/proc/%d/path/a.out", pid);
4206c05e
RO
3196 len = readlink (name, buf, PATH_MAX - 1);
3197 if (len <= 0)
3198 strcpy (buf, name);
3199 else
3200 buf[len] = '\0';
3201 }
3202
3203 return buf;
3204}
3205
77382aee 3206/* Insert a watchpoint. */
c3f6f71d 3207
a0911fd0 3208static int
39f77062 3209procfs_set_watchpoint (ptid_t ptid, CORE_ADDR addr, int len, int rwflag,
77382aee 3210 int after)
c906108c 3211{
c3f6f71d 3212 int pflags = 0;
19958708 3213 procinfo *pi;
c3f6f71d 3214
e99b03dc
TT
3215 pi = find_procinfo_or_die (ptid.pid () == -1 ?
3216 inferior_ptid.pid () : ptid.pid (),
dfd4cc63 3217 0);
c3f6f71d 3218
0df8b418
MS
3219 /* Translate from GDB's flags to /proc's. */
3220 if (len > 0) /* len == 0 means delete watchpoint. */
c906108c 3221 {
0df8b418 3222 switch (rwflag) { /* FIXME: need an enum! */
c3f6f71d
JM
3223 case hw_write: /* default watchpoint (write) */
3224 pflags = WRITE_WATCHFLAG;
3225 break;
3226 case hw_read: /* read watchpoint */
3227 pflags = READ_WATCHFLAG;
3228 break;
3229 case hw_access: /* access watchpoint */
3230 pflags = READ_WATCHFLAG | WRITE_WATCHFLAG;
3231 break;
3232 case hw_execute: /* execution HW breakpoint */
3233 pflags = EXEC_WATCHFLAG;
3234 break;
0df8b418 3235 default: /* Something weird. Return error. */
c906108c 3236 return -1;
c3f6f71d 3237 }
0df8b418 3238 if (after) /* Stop after r/w access is completed. */
c3f6f71d
JM
3239 pflags |= AFTER_WATCHFLAG;
3240 }
3241
3242 if (!proc_set_watchpoint (pi, addr, len, pflags))
3243 {
0df8b418 3244 if (errno == E2BIG) /* Typical error for no resources. */
c3f6f71d
JM
3245 return -1; /* fail */
3246 /* GDB may try to remove the same watchpoint twice.
3247 If a remove request returns no match, don't error. */
c906108c 3248 if (errno == ESRCH && len == 0)
c3f6f71d
JM
3249 return 0; /* ignore */
3250 proc_error (pi, "set_watchpoint", __LINE__);
c906108c
SS
3251 }
3252 return 0;
3253}
3254
1e03ad20
KB
3255/* Return non-zero if we can set a hardware watchpoint of type TYPE. TYPE
3256 is one of bp_hardware_watchpoint, bp_read_watchpoint, bp_write_watchpoint,
3257 or bp_hardware_watchpoint. CNT is the number of watchpoints used so
3258 far.
19958708 3259
1e03ad20
KB
3260 Note: procfs_can_use_hw_breakpoint() is not yet used by all
3261 procfs.c targets due to the fact that some of them still define
d92524f1 3262 target_can_use_hardware_watchpoint. */
1e03ad20 3263
f6ac5f3d
PA
3264int
3265procfs_target::can_use_hw_breakpoint (enum bptype type, int cnt, int othertype)
1e03ad20 3266{
1e03ad20
KB
3267 /* Due to the way that proc_set_watchpoint() is implemented, host
3268 and target pointers must be of the same size. If they are not,
3269 we can't use hardware watchpoints. This limitation is due to the
9a043c1d
AC
3270 fact that proc_set_watchpoint() calls
3271 procfs_address_to_host_pointer(); a close inspection of
3272 procfs_address_to_host_pointer will reveal that an internal error
3273 will be generated when the host and target pointer sizes are
3274 different. */
f5656ead 3275 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
f4a14ae6 3276
4e906f53 3277 if (sizeof (void *) != TYPE_LENGTH (ptr_type))
1e03ad20
KB
3278 return 0;
3279
3280 /* Other tests here??? */
3281
3282 return 1;
1e03ad20
KB
3283}
3284
77382aee
PA
3285/* Returns non-zero if process is stopped on a hardware watchpoint
3286 fault, else returns zero. */
c3f6f71d 3287
57810aa7 3288bool
f6ac5f3d 3289procfs_target::stopped_by_watchpoint ()
c906108c 3290{
c3f6f71d 3291 procinfo *pi;
c906108c 3292
e99b03dc 3293 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
aaeb7efa 3294
c3f6f71d 3295 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
c475f569
RO
3296 if (proc_why (pi) == PR_FAULTED)
3297 if (proc_what (pi) == FLTWATCH)
3298 return true;
57810aa7 3299 return false;
c906108c 3300}
c906108c 3301
77382aee
PA
3302/* Returns 1 if the OS knows the position of the triggered watchpoint,
3303 and sets *ADDR to that address. Returns 0 if OS cannot report that
3304 address. This function is only called if
3305 procfs_stopped_by_watchpoint returned 1, thus no further checks are
3306 done. The function also assumes that ADDR is not NULL. */
bf701c2c 3307
57810aa7 3308bool
f6ac5f3d 3309procfs_target::stopped_data_address (CORE_ADDR *addr)
bf701c2c
PM
3310{
3311 procinfo *pi;
3312
e99b03dc 3313 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
bf701c2c
PM
3314 return proc_watchpoint_address (pi, addr);
3315}
3316
f6ac5f3d
PA
3317int
3318procfs_target::insert_watchpoint (CORE_ADDR addr, int len,
3319 enum target_hw_bp_type type,
3320 struct expression *cond)
25513619 3321{
d92524f1 3322 if (!target_have_steppable_watchpoint
f5656ead 3323 && !gdbarch_have_nonsteppable_watchpoint (target_gdbarch ()))
c475f569
RO
3324 /* When a hardware watchpoint fires off the PC will be left at
3325 the instruction following the one which caused the
3326 watchpoint. It will *NOT* be necessary for GDB to step over
3327 the watchpoint. */
3328 return procfs_set_watchpoint (inferior_ptid, addr, len, type, 1);
25513619 3329 else
c475f569
RO
3330 /* When a hardware watchpoint fires off the PC will be left at
3331 the instruction which caused the watchpoint. It will be
3332 necessary for GDB to step over the watchpoint. */
3333 return procfs_set_watchpoint (inferior_ptid, addr, len, type, 0);
25513619
PA
3334}
3335
f6ac5f3d
PA
3336int
3337procfs_target::remove_watchpoint (CORE_ADDR addr, int len,
3338 enum target_hw_bp_type type,
3339 struct expression *cond)
25513619
PA
3340{
3341 return procfs_set_watchpoint (inferior_ptid, addr, 0, 0, 0);
3342}
3343
f6ac5f3d
PA
3344int
3345procfs_target::region_ok_for_hw_watchpoint (CORE_ADDR addr, int len)
25513619
PA
3346{
3347 /* The man page for proc(4) on Solaris 2.6 and up says that the
3348 system can support "thousands" of hardware watchpoints, but gives
3349 no method for finding out how many; It doesn't say anything about
3350 the allowed size for the watched area either. So we just tell
3351 GDB 'yes'. */
3352 return 1;
3353}
3354
77382aee
PA
3355/* Memory Mappings Functions: */
3356
3357/* Call a callback function once for each mapping, passing it the
3358 mapping, an optional secondary callback function, and some optional
3359 opaque data. Quit and return the first non-zero value returned
3360 from the callback.
3361
3362 PI is the procinfo struct for the process to be mapped. FUNC is
3363 the callback function to be called by this iterator. DATA is the
3364 optional opaque data to be passed to the callback function.
3365 CHILD_FUNC is the optional secondary function pointer to be passed
3366 to the child function. Returns the first non-zero return value
3367 from the callback function, or zero. */
831e682e
MS
3368
3369static int
b8edc417 3370iterate_over_mappings (procinfo *pi, find_memory_region_ftype child_func,
e9ef4f39 3371 void *data,
19958708 3372 int (*func) (struct prmap *map,
b8edc417 3373 find_memory_region_ftype child_func,
831e682e
MS
3374 void *data))
3375{
3376 char pathname[MAX_PROC_NAME_SIZE];
3377 struct prmap *prmaps;
3378 struct prmap *prmap;
3379 int funcstat;
831e682e 3380 int nmap;
831e682e 3381 struct stat sbuf;
831e682e 3382
19958708 3383 /* Get the number of mappings, allocate space,
831e682e 3384 and read the mappings into prmaps. */
0df8b418 3385 /* Open map fd. */
c475f569 3386 xsnprintf (pathname, sizeof (pathname), "/proc/%d/map", pi->pid);
831e682e 3387
5dc1a704
TT
3388 scoped_fd map_fd (open (pathname, O_RDONLY));
3389 if (map_fd.get () < 0)
3390 proc_error (pi, "iterate_over_mappings (open)", __LINE__);
831e682e 3391
19958708 3392 /* Use stat to determine the file size, and compute
831e682e 3393 the number of prmap_t objects it contains. */
5dc1a704 3394 if (fstat (map_fd.get (), &sbuf) != 0)
831e682e
MS
3395 proc_error (pi, "iterate_over_mappings (fstat)", __LINE__);
3396
3397 nmap = sbuf.st_size / sizeof (prmap_t);
3398 prmaps = (struct prmap *) alloca ((nmap + 1) * sizeof (*prmaps));
5dc1a704 3399 if (read (map_fd.get (), (char *) prmaps, nmap * sizeof (*prmaps))
831e682e
MS
3400 != (nmap * sizeof (*prmaps)))
3401 proc_error (pi, "iterate_over_mappings (read)", __LINE__);
831e682e
MS
3402
3403 for (prmap = prmaps; nmap > 0; prmap++, nmap--)
c475f569
RO
3404 {
3405 funcstat = (*func) (prmap, child_func, data);
3406 if (funcstat != 0)
3407 return funcstat;
3408 }
831e682e
MS
3409
3410 return 0;
3411}
3412
77382aee 3413/* Implements the to_find_memory_regions method. Calls an external
b8edc417 3414 function for each memory region.
77382aee 3415 Returns the integer value returned by the callback. */
be4d1333
MS
3416
3417static int
19958708 3418find_memory_regions_callback (struct prmap *map,
b8edc417 3419 find_memory_region_ftype func, void *data)
be4d1333 3420{
bf75638e 3421 return (*func) ((CORE_ADDR) map->pr_vaddr,
19958708 3422 map->pr_size,
be4d1333
MS
3423 (map->pr_mflags & MA_READ) != 0,
3424 (map->pr_mflags & MA_WRITE) != 0,
19958708 3425 (map->pr_mflags & MA_EXEC) != 0,
4f69f4c2 3426 1, /* MODIFIED is unknown, pass it as true. */
be4d1333
MS
3427 data);
3428}
3429
77382aee
PA
3430/* External interface. Calls a callback function once for each
3431 mapped memory region in the child process, passing as arguments:
3432
3433 CORE_ADDR virtual_address,
3434 unsigned long size,
3435 int read, TRUE if region is readable by the child
3436 int write, TRUE if region is writable by the child
3437 int execute TRUE if region is executable by the child.
3438
3439 Stops iterating and returns the first non-zero value returned by
3440 the callback. */
be4d1333 3441
f6ac5f3d
PA
3442int
3443procfs_target::find_memory_regions (find_memory_region_ftype func, void *data)
be4d1333 3444{
e99b03dc 3445 procinfo *pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
be4d1333 3446
19958708 3447 return iterate_over_mappings (pi, func, data,
be4d1333
MS
3448 find_memory_regions_callback);
3449}
3450
77382aee 3451/* Returns an ascii representation of a memory mapping's flags. */
c3f6f71d 3452
388faa48 3453static char *
5ae5f592 3454mappingflags (long flags)
388faa48
MS
3455{
3456 static char asciiflags[8];
3457
3458 strcpy (asciiflags, "-------");
388faa48
MS
3459 if (flags & MA_STACK)
3460 asciiflags[1] = 's';
3461 if (flags & MA_BREAK)
3462 asciiflags[2] = 'b';
3463 if (flags & MA_SHARED)
3464 asciiflags[3] = 's';
3465 if (flags & MA_READ)
3466 asciiflags[4] = 'r';
3467 if (flags & MA_WRITE)
3468 asciiflags[5] = 'w';
3469 if (flags & MA_EXEC)
3470 asciiflags[6] = 'x';
3471 return (asciiflags);
3472}
3473
77382aee
PA
3474/* Callback function, does the actual work for 'info proc
3475 mappings'. */
831e682e 3476
831e682e 3477static int
b8edc417 3478info_mappings_callback (struct prmap *map, find_memory_region_ftype ignore,
e9ef4f39 3479 void *unused)
831e682e 3480{
0b62613e 3481 unsigned int pr_off;
831e682e 3482
0b62613e 3483 pr_off = (unsigned int) map->pr_offset;
0b62613e 3484
f5656ead 3485 if (gdbarch_addr_bit (target_gdbarch ()) == 32)
f6a96b83 3486 printf_filtered ("\t%#10lx %#10lx %#10lx %#10x %7s\n",
0b62613e
PA
3487 (unsigned long) map->pr_vaddr,
3488 (unsigned long) map->pr_vaddr + map->pr_size - 1,
f6a96b83 3489 (unsigned long) map->pr_size,
0b62613e
PA
3490 pr_off,
3491 mappingflags (map->pr_mflags));
3492 else
f6a96b83 3493 printf_filtered (" %#18lx %#18lx %#10lx %#10x %7s\n",
0b62613e
PA
3494 (unsigned long) map->pr_vaddr,
3495 (unsigned long) map->pr_vaddr + map->pr_size - 1,
f6a96b83 3496 (unsigned long) map->pr_size,
0b62613e
PA
3497 pr_off,
3498 mappingflags (map->pr_mflags));
831e682e
MS
3499
3500 return 0;
3501}
3502
77382aee 3503/* Implement the "info proc mappings" subcommand. */
388faa48
MS
3504
3505static void
3506info_proc_mappings (procinfo *pi, int summary)
3507{
388faa48 3508 if (summary)
0df8b418 3509 return; /* No output for summary mode. */
388faa48 3510
a3f17187 3511 printf_filtered (_("Mapped address spaces:\n\n"));
f5656ead 3512 if (gdbarch_ptr_bit (target_gdbarch ()) == 32)
0b62613e
PA
3513 printf_filtered ("\t%10s %10s %10s %10s %7s\n",
3514 "Start Addr",
3515 " End Addr",
3516 " Size",
3517 " Offset",
3518 "Flags");
3519 else
3520 printf_filtered (" %18s %18s %10s %10s %7s\n",
3521 "Start Addr",
3522 " End Addr",
3523 " Size",
3524 " Offset",
3525 "Flags");
388faa48 3526
831e682e 3527 iterate_over_mappings (pi, NULL, NULL, info_mappings_callback);
388faa48
MS
3528 printf_filtered ("\n");
3529}
3530
77382aee 3531/* Implement the "info proc" command. */
c3f6f71d 3532
f6ac5f3d
PA
3533bool
3534procfs_target::info_proc (const char *args, enum info_proc_what what)
c906108c 3535{
388faa48
MS
3536 procinfo *process = NULL;
3537 procinfo *thread = NULL;
388faa48
MS
3538 char *tmp = NULL;
3539 int pid = 0;
3540 int tid = 0;
3541 int mappings = 0;
c906108c 3542
145b16a9
UW
3543 switch (what)
3544 {
3545 case IP_MINIMAL:
3546 break;
3547
3548 case IP_MAPPINGS:
3549 case IP_ALL:
3550 mappings = 1;
3551 break;
3552
3553 default:
3554 error (_("Not supported on this target."));
3555 }
3556
773a1edc 3557 gdb_argv built_argv (args);
4fa7574e 3558 for (char *arg : built_argv)
c3f6f71d 3559 {
773a1edc 3560 if (isdigit (arg[0]))
c3f6f71d 3561 {
773a1edc 3562 pid = strtoul (arg, &tmp, 10);
c3f6f71d
JM
3563 if (*tmp == '/')
3564 tid = strtoul (++tmp, NULL, 10);
3565 }
773a1edc 3566 else if (arg[0] == '/')
c3f6f71d 3567 {
773a1edc 3568 tid = strtoul (arg + 1, NULL, 10);
c3f6f71d 3569 }
c3f6f71d 3570 }
5b4cbbe3
TT
3571
3572 procinfo_up temporary_procinfo;
c3f6f71d 3573 if (pid == 0)
e99b03dc 3574 pid = inferior_ptid.pid ();
c3f6f71d 3575 if (pid == 0)
8a3fe4f8 3576 error (_("No current process: you must name one."));
c3f6f71d 3577 else
c906108c 3578 {
c3f6f71d 3579 /* Have pid, will travel.
0df8b418 3580 First see if it's a process we're already debugging. */
c3f6f71d
JM
3581 process = find_procinfo (pid, 0);
3582 if (process == NULL)
3583 {
19958708 3584 /* No. So open a procinfo for it, but
c3f6f71d
JM
3585 remember to close it again when finished. */
3586 process = create_procinfo (pid, 0);
5b4cbbe3 3587 temporary_procinfo.reset (process);
c3f6f71d
JM
3588 if (!open_procinfo_files (process, FD_CTL))
3589 proc_error (process, "info proc, open_procinfo_files", __LINE__);
3590 }
c906108c 3591 }
c3f6f71d
JM
3592 if (tid != 0)
3593 thread = create_procinfo (pid, tid);
3594
3595 if (process)
3596 {
a3f17187 3597 printf_filtered (_("process %d flags:\n"), process->pid);
c3f6f71d
JM
3598 proc_prettyprint_flags (proc_flags (process), 1);
3599 if (proc_flags (process) & (PR_STOPPED | PR_ISTOP))
3600 proc_prettyprint_why (proc_why (process), proc_what (process), 1);
3601 if (proc_get_nthreads (process) > 1)
19958708 3602 printf_filtered ("Process has %d threads.\n",
c3f6f71d
JM
3603 proc_get_nthreads (process));
3604 }
3605 if (thread)
3606 {
a3f17187 3607 printf_filtered (_("thread %d flags:\n"), thread->tid);
c3f6f71d
JM
3608 proc_prettyprint_flags (proc_flags (thread), 1);
3609 if (proc_flags (thread) & (PR_STOPPED | PR_ISTOP))
3610 proc_prettyprint_why (proc_why (thread), proc_what (thread), 1);
3611 }
3612
388faa48 3613 if (mappings)
c475f569 3614 info_proc_mappings (process, 0);
388faa48 3615
f6ac5f3d 3616 return true;
c906108c
SS
3617}
3618
9185ddce
JB
3619/* Modify the status of the system call identified by SYSCALLNUM in
3620 the set of syscalls that are currently traced/debugged.
3621
3622 If ENTRY_OR_EXIT is set to PR_SYSENTRY, then the entry syscalls set
0df8b418 3623 will be updated. Otherwise, the exit syscalls set will be updated.
9185ddce 3624
0df8b418 3625 If MODE is FLAG_SET, then traces will be enabled. Otherwise, they
9185ddce
JB
3626 will be disabled. */
3627
3628static void
3629proc_trace_syscalls_1 (procinfo *pi, int syscallnum, int entry_or_exit,
77382aee 3630 int mode, int from_tty)
9185ddce
JB
3631{
3632 sysset_t *sysset;
77382aee 3633
9185ddce
JB
3634 if (entry_or_exit == PR_SYSENTRY)
3635 sysset = proc_get_traced_sysentry (pi, NULL);
3636 else
3637 sysset = proc_get_traced_sysexit (pi, NULL);
3638
3639 if (sysset == NULL)
3640 proc_error (pi, "proc-trace, get_traced_sysset", __LINE__);
3641
3642 if (mode == FLAG_SET)
44122162 3643 praddset (sysset, syscallnum);
9185ddce 3644 else
44122162 3645 prdelset (sysset, syscallnum);
9185ddce
JB
3646
3647 if (entry_or_exit == PR_SYSENTRY)
3648 {
3649 if (!proc_set_traced_sysentry (pi, sysset))
77382aee 3650 proc_error (pi, "proc-trace, set_traced_sysentry", __LINE__);
9185ddce
JB
3651 }
3652 else
3653 {
3654 if (!proc_set_traced_sysexit (pi, sysset))
77382aee 3655 proc_error (pi, "proc-trace, set_traced_sysexit", __LINE__);
9185ddce
JB
3656 }
3657}
3658
c3f6f71d 3659static void
0b39b52e 3660proc_trace_syscalls (const char *args, int from_tty, int entry_or_exit, int mode)
c906108c 3661{
c3f6f71d 3662 procinfo *pi;
c906108c 3663
e99b03dc 3664 if (inferior_ptid.pid () <= 0)
8a3fe4f8 3665 error (_("you must be debugging a process to use this command."));
c906108c 3666
c3f6f71d 3667 if (args == NULL || args[0] == 0)
e2e0b3e5 3668 error_no_arg (_("system call to trace"));
c3f6f71d 3669
e99b03dc 3670 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c3f6f71d
JM
3671 if (isdigit (args[0]))
3672 {
9185ddce 3673 const int syscallnum = atoi (args);
c906108c 3674
9185ddce 3675 proc_trace_syscalls_1 (pi, syscallnum, entry_or_exit, mode, from_tty);
c3f6f71d
JM
3676 }
3677}
3678
19958708 3679static void
0b39b52e 3680proc_trace_sysentry_cmd (const char *args, int from_tty)
c906108c 3681{
c3f6f71d
JM
3682 proc_trace_syscalls (args, from_tty, PR_SYSENTRY, FLAG_SET);
3683}
c906108c 3684
19958708 3685static void
0b39b52e 3686proc_trace_sysexit_cmd (const char *args, int from_tty)
c3f6f71d
JM
3687{
3688 proc_trace_syscalls (args, from_tty, PR_SYSEXIT, FLAG_SET);
c906108c 3689}
c906108c 3690
19958708 3691static void
0b39b52e 3692proc_untrace_sysentry_cmd (const char *args, int from_tty)
c3f6f71d
JM
3693{
3694 proc_trace_syscalls (args, from_tty, PR_SYSENTRY, FLAG_RESET);
3695}
3696
19958708 3697static void
0b39b52e 3698proc_untrace_sysexit_cmd (const char *args, int from_tty)
c906108c 3699{
c3f6f71d
JM
3700 proc_trace_syscalls (args, from_tty, PR_SYSEXIT, FLAG_RESET);
3701}
c906108c 3702
c906108c 3703void
fba45db2 3704_initialize_procfs (void)
c906108c 3705{
76727919 3706 gdb::observers::inferior_created.attach (procfs_inferior_created);
27087a3d 3707
19958708 3708 add_com ("proc-trace-entry", no_class, proc_trace_sysentry_cmd,
1bedd215 3709 _("Give a trace of entries into the syscall."));
19958708 3710 add_com ("proc-trace-exit", no_class, proc_trace_sysexit_cmd,
1bedd215 3711 _("Give a trace of exits from the syscall."));
19958708 3712 add_com ("proc-untrace-entry", no_class, proc_untrace_sysentry_cmd,
1bedd215 3713 _("Cancel a trace of entries into the syscall."));
19958708 3714 add_com ("proc-untrace-exit", no_class, proc_untrace_sysexit_cmd,
1bedd215 3715 _("Cancel a trace of exits from the syscall."));
c1955e17 3716
62c808ae 3717 add_inf_child_target (&the_procfs_target);
c3f6f71d
JM
3718}
3719
3720/* =================== END, GDB "MODULE" =================== */
3721
3722
3723
77382aee
PA
3724/* miscellaneous stubs: */
3725
3726/* The following satisfy a few random symbols mostly created by the
3727 solaris threads implementation, which I will chase down later. */
c3f6f71d 3728
77382aee
PA
3729/* Return a pid for which we guarantee we will be able to find a
3730 'live' procinfo. */
c3f6f71d 3731
39f77062 3732ptid_t
fba45db2 3733procfs_first_available (void)
c3f6f71d 3734{
f2907e49 3735 return ptid_t (procinfo_list ? procinfo_list->pid : -1);
c3f6f71d 3736}
be4d1333
MS
3737
3738/* =================== GCORE .NOTE "MODULE" =================== */
3739
3740static char *
19958708 3741procfs_do_thread_registers (bfd *obfd, ptid_t ptid,
2020b7ab 3742 char *note_data, int *note_size,
2ea28649 3743 enum gdb_signal stop_signal)
be4d1333 3744{
5b6d1e4f 3745 struct regcache *regcache = get_thread_regcache (&the_procfs_target, ptid);
be4d1333
MS
3746 gdb_gregset_t gregs;
3747 gdb_fpregset_t fpregs;
3748 unsigned long merged_pid;
3749
e38504b3 3750 merged_pid = ptid.lwp () << 16 | ptid.pid ();
be4d1333 3751
75125405
DJ
3752 /* This part is the old method for fetching registers.
3753 It should be replaced by the newer one using regsets
3754 once it is implemented in this platform:
29082443 3755 gdbarch_iterate_over_regset_sections(). */
75125405 3756
2989a365 3757 scoped_restore save_inferior_ptid = make_scoped_restore (&inferior_ptid);
75125405
DJ
3758 inferior_ptid = ptid;
3759 target_fetch_registers (regcache, -1);
3760
594f7785 3761 fill_gregset (regcache, &gregs, -1);
65554fef
MS
3762 note_data = (char *) elfcore_write_lwpstatus (obfd,
3763 note_data,
3764 note_size,
19958708 3765 merged_pid,
65554fef
MS
3766 stop_signal,
3767 &gregs);
594f7785 3768 fill_fpregset (regcache, &fpregs, -1);
be4d1333
MS
3769 note_data = (char *) elfcore_write_prfpreg (obfd,
3770 note_data,
3771 note_size,
3772 &fpregs,
3773 sizeof (fpregs));
75125405 3774
be4d1333
MS
3775 return note_data;
3776}
3777
3778struct procfs_corefile_thread_data {
3779 bfd *obfd;
3780 char *note_data;
3781 int *note_size;
2ea28649 3782 enum gdb_signal stop_signal;
be4d1333
MS
3783};
3784
3785static int
65554fef 3786procfs_corefile_thread_callback (procinfo *pi, procinfo *thread, void *data)
be4d1333 3787{
b196bc4c
RO
3788 struct procfs_corefile_thread_data *args
3789 = (struct procfs_corefile_thread_data *) data;
be4d1333 3790
2689673f 3791 if (pi != NULL)
be4d1333 3792 {
fd79271b 3793 ptid_t ptid = ptid_t (pi->pid, thread->tid, 0);
f4a14ae6 3794
75125405 3795 args->note_data = procfs_do_thread_registers (args->obfd, ptid,
19958708 3796 args->note_data,
2020b7ab
PA
3797 args->note_size,
3798 args->stop_signal);
be4d1333
MS
3799 }
3800 return 0;
3801}
3802
a223f1e7
JB
3803static int
3804find_signalled_thread (struct thread_info *info, void *data)
3805{
a493e3e2 3806 if (info->suspend.stop_signal != GDB_SIGNAL_0
e99b03dc 3807 && info->ptid.pid () == inferior_ptid.pid ())
a223f1e7
JB
3808 return 1;
3809
3810 return 0;
3811}
3812
2ea28649 3813static enum gdb_signal
a223f1e7
JB
3814find_stop_signal (void)
3815{
3816 struct thread_info *info =
3817 iterate_over_threads (find_signalled_thread, NULL);
3818
3819 if (info)
16c381f0 3820 return info->suspend.stop_signal;
a223f1e7 3821 else
a493e3e2 3822 return GDB_SIGNAL_0;
a223f1e7
JB
3823}
3824
f6ac5f3d
PA
3825char *
3826procfs_target::make_corefile_notes (bfd *obfd, int *note_size)
be4d1333 3827{
be4d1333 3828 gdb_gregset_t gregs;
be4d1333
MS
3829 char fname[16] = {'\0'};
3830 char psargs[80] = {'\0'};
e99b03dc 3831 procinfo *pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
be4d1333 3832 char *note_data = NULL;
cbaaa0ca 3833 const char *inf_args;
be4d1333 3834 struct procfs_corefile_thread_data thread_args;
2ea28649 3835 enum gdb_signal stop_signal;
be4d1333
MS
3836
3837 if (get_exec_file (0))
3838 {
9f37bbcc 3839 strncpy (fname, lbasename (get_exec_file (0)), sizeof (fname));
4e2af517
JM
3840 fname[sizeof (fname) - 1] = 0;
3841 strncpy (psargs, get_exec_file (0), sizeof (psargs));
3842 psargs[sizeof (psargs) - 1] = 0;
6dbdc4a3
MS
3843
3844 inf_args = get_inferior_args ();
c475f569
RO
3845 if (inf_args && *inf_args
3846 && (strlen (inf_args)
3847 < ((int) sizeof (psargs) - (int) strlen (psargs))))
be4d1333 3848 {
19958708 3849 strncat (psargs, " ",
be4d1333 3850 sizeof (psargs) - strlen (psargs));
19958708 3851 strncat (psargs, inf_args,
be4d1333
MS
3852 sizeof (psargs) - strlen (psargs));
3853 }
3854 }
3855
19958708
RM
3856 note_data = (char *) elfcore_write_prpsinfo (obfd,
3857 note_data,
3858 note_size,
3859 fname,
be4d1333
MS
3860 psargs);
3861
651c8d2d
PA
3862 stop_signal = find_stop_signal ();
3863
3e3420f6
PA
3864 fill_gregset (get_current_regcache (), &gregs, -1);
3865 note_data = elfcore_write_pstatus (obfd, note_data, note_size,
e99b03dc 3866 inferior_ptid.pid (),
3e3420f6 3867 stop_signal, &gregs);
3e3420f6 3868
be4d1333
MS
3869 thread_args.obfd = obfd;
3870 thread_args.note_data = note_data;
3871 thread_args.note_size = note_size;
651c8d2d 3872 thread_args.stop_signal = stop_signal;
3e43a32a
MS
3873 proc_iterate_over_threads (pi, procfs_corefile_thread_callback,
3874 &thread_args);
2689673f 3875 note_data = thread_args.note_data;
be4d1333 3876
62c808ae
RO
3877 gdb::optional<gdb::byte_vector> auxv =
3878 target_read_alloc (current_top_target (), TARGET_OBJECT_AUXV, NULL);
3879 if (auxv && !auxv->empty ())
3880 note_data = elfcore_write_note (obfd, note_data, note_size,
3881 "CORE", NT_AUXV, auxv->data (),
3882 auxv->size ());
4e73f23d 3883
be4d1333
MS
3884 return note_data;
3885}
be4d1333 3886/* =================== END GCORE .NOTE "MODULE" =================== */
This page took 2.428186 seconds and 4 git commands to generate.