Can't interrupt process without controlling terminal on Solaris (PR gdb/8527)
[deliverable/binutils-gdb.git] / gdb / procfs.c
CommitLineData
44122162 1/* Machine independent support for Solaris /proc (process file system) for GDB.
2555fe1a 2
42a4f53d 3 Copyright (C) 1999-2019 Free Software Foundation, Inc.
2555fe1a 4
c3f6f71d
JM
5 Written by Michael Snyder at Cygnus Solutions.
6 Based on work by Fred Fish, Stu Grossman, Geoff Noer, and others.
c906108c 7
a9762ec7
JB
8 This file is part of GDB.
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
14
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
21 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c 22
c3f6f71d
JM
23#include "defs.h"
24#include "inferior.h"
45741a9c 25#include "infrun.h"
c3f6f71d
JM
26#include "target.h"
27#include "gdbcore.h"
65554fef 28#include "elf-bfd.h" /* for elfcore_write_* */
c3f6f71d 29#include "gdbcmd.h"
0fda6bd2 30#include "gdbthread.h"
7f7fe91e 31#include "regcache.h"
28439f5e 32#include "inf-child.h"
4fa7574e 33#include "nat/fork-inferior.h"
0747795c 34#include "common/filestuff.h"
c906108c 35
0df8b418 36#define _STRUCTURED_PROC 1 /* Should be done by configure script. */
c906108c 37
c3f6f71d
JM
38#include <sys/procfs.h>
39#include <sys/fault.h>
40#include <sys/syscall.h>
0747795c 41#include "common/gdb_wait.h"
0fda6bd2
JM
42#include <signal.h>
43#include <ctype.h>
92107356 44#include "gdb_bfd.h"
44270758 45#include "inflow.h"
4e73f23d 46#include "auxv.h"
d1a7880c 47#include "procfs.h"
76727919 48#include "observable.h"
5dc1a704 49#include "common/scoped_fd.h"
30a7953d 50#include "common/pathstuff.h"
0fda6bd2 51
77382aee
PA
52/* This module provides the interface between GDB and the
53 /proc file system, which is used on many versions of Unix
54 as a means for debuggers to control other processes.
55
77382aee
PA
56 /proc works by imitating a file system: you open a simulated file
57 that represents the process you wish to interact with, and perform
58 operations on that "file" in order to examine or change the state
59 of the other process.
60
61 The most important thing to know about /proc and this module is
62 that there are two very different interfaces to /proc:
63
64 One that uses the ioctl system call, and another that uses read
65 and write system calls.
66
44122162
RO
67 This module supports only the Solaris version of the read/write
68 interface. */
77382aee 69
c906108c 70#include <sys/types.h>
2978b111 71#include <dirent.h> /* opendir/readdir, for listing the LWP's */
c906108c 72
c3f6f71d
JM
73#include <fcntl.h> /* for O_RDONLY */
74#include <unistd.h> /* for "X_OK" */
53ce3c39 75#include <sys/stat.h> /* for struct stat */
c906108c 76
103b3ef5
MS
77/* Note: procfs-utils.h must be included after the above system header
78 files, because it redefines various system calls using macros.
79 This may be incompatible with the prototype declarations. */
80
103b3ef5
MS
81#include "proc-utils.h"
82
77382aee 83/* Prototypes for supply_gregset etc. */
c60c0f5f
MS
84#include "gregset.h"
85
c3f6f71d 86/* =================== TARGET_OPS "MODULE" =================== */
c906108c 87
77382aee 88/* This module defines the GDB target vector and its methods. */
c906108c 89
f6ac5f3d 90
e96027e0
PA
91static enum target_xfer_status procfs_xfer_memory (gdb_byte *,
92 const gdb_byte *,
93 ULONGEST, ULONGEST,
94 ULONGEST *);
a14ed312 95
f6ac5f3d
PA
96class procfs_target final : public inf_child_target
97{
98public:
99 void create_inferior (const char *, const std::string &,
100 char **, int) override;
101
102 void kill () override;
103
104 void mourn_inferior () override;
105
106 void attach (const char *, int) override;
107 void detach (inferior *inf, int) override;
108
109 void resume (ptid_t, int, enum gdb_signal) override;
110 ptid_t wait (ptid_t, struct target_waitstatus *, int) override;
111
112 void fetch_registers (struct regcache *, int) override;
113 void store_registers (struct regcache *, int) override;
114
115 enum target_xfer_status xfer_partial (enum target_object object,
116 const char *annex,
117 gdb_byte *readbuf,
118 const gdb_byte *writebuf,
119 ULONGEST offset, ULONGEST len,
120 ULONGEST *xfered_len) override;
121
adc6a863 122 void pass_signals (gdb::array_view<const unsigned char>) override;
a14ed312 123
f6ac5f3d 124 void files_info () override;
c3f6f71d 125
f6ac5f3d 126 void update_thread_list () override;
be4d1333 127
57810aa7 128 bool thread_alive (ptid_t ptid) override;
be4d1333 129
f6ac5f3d 130 const char *pid_to_str (ptid_t) override;
1e03ad20 131
4206c05e
RO
132 char *pid_to_exec_file (int pid) override;
133
f6ac5f3d
PA
134 thread_control_capabilities get_thread_control_capabilities () override
135 { return tc_schedlock; }
145b16a9 136
f6ac5f3d
PA
137 /* find_memory_regions support method for gcore */
138 int find_memory_regions (find_memory_region_ftype func, void *data)
139 override;
b5c8fcb1 140
f6ac5f3d 141 char *make_corefile_notes (bfd *, int *) override;
b5c8fcb1 142
f6ac5f3d
PA
143 bool info_proc (const char *, enum info_proc_what) override;
144
c475f569 145#if PR_MODEL_NATIVE == PR_MODEL_LP64
f6ac5f3d
PA
146 int auxv_parse (gdb_byte **readptr,
147 gdb_byte *endptr, CORE_ADDR *typep, CORE_ADDR *valp)
148 override;
149#endif
150
57810aa7 151 bool stopped_by_watchpoint () override;
f6ac5f3d
PA
152
153 int insert_watchpoint (CORE_ADDR, int, enum target_hw_bp_type,
154 struct expression *) override;
155
156 int remove_watchpoint (CORE_ADDR, int, enum target_hw_bp_type,
157 struct expression *) override;
158
159 int region_ok_for_hw_watchpoint (CORE_ADDR, int) override;
160
161 int can_use_hw_breakpoint (enum bptype, int, int) override;
57810aa7 162 bool stopped_data_address (CORE_ADDR *) override;
f6ac5f3d 163};
b5c8fcb1 164
f6ac5f3d 165static procfs_target the_procfs_target;
b5c8fcb1 166
c475f569 167#if PR_MODEL_NATIVE == PR_MODEL_LP64
77382aee
PA
168/* When GDB is built as 64-bit application on Solaris, the auxv data
169 is presented in 64-bit format. We need to provide a custom parser
170 to handle that. */
f6ac5f3d
PA
171int
172procfs_target::auxv_parse (gdb_byte **readptr,
173 gdb_byte *endptr, CORE_ADDR *typep, CORE_ADDR *valp)
c47ffbe3 174{
f5656ead 175 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
c47ffbe3
VP
176 gdb_byte *ptr = *readptr;
177
178 if (endptr == ptr)
179 return 0;
77382aee 180
c47ffbe3
VP
181 if (endptr - ptr < 8 * 2)
182 return -1;
183
e17a4113 184 *typep = extract_unsigned_integer (ptr, 4, byte_order);
c47ffbe3
VP
185 ptr += 8;
186 /* The size of data is always 64-bit. If the application is 32-bit,
187 it will be zero extended, as expected. */
e17a4113 188 *valp = extract_unsigned_integer (ptr, 8, byte_order);
c47ffbe3
VP
189 ptr += 8;
190
191 *readptr = ptr;
192 return 1;
193}
194#endif
195
c3f6f71d
JM
196/* =================== END, TARGET_OPS "MODULE" =================== */
197
77382aee
PA
198/* World Unification:
199
200 Put any typedefs, defines etc. here that are required for the
201 unification of code that handles different versions of /proc. */
c3f6f71d 202
44122162
RO
203enum { READ_WATCHFLAG = WA_READ,
204 WRITE_WATCHFLAG = WA_WRITE,
205 EXEC_WATCHFLAG = WA_EXEC,
206 AFTER_WATCHFLAG = WA_TRAPAFTER
207};
c3f6f71d
JM
208
209
210/* =================== STRUCT PROCINFO "MODULE" =================== */
211
212 /* FIXME: this comment will soon be out of date W.R.T. threads. */
213
214/* The procinfo struct is a wrapper to hold all the state information
215 concerning a /proc process. There should be exactly one procinfo
216 for each process, and since GDB currently can debug only one
217 process at a time, that means there should be only one procinfo.
218 All of the LWP's of a process can be accessed indirectly thru the
219 single process procinfo.
220
221 However, against the day when GDB may debug more than one process,
222 this data structure is kept in a list (which for now will hold no
223 more than one member), and many functions will have a pointer to a
224 procinfo as an argument.
225
226 There will be a separate procinfo structure for use by the (not yet
227 implemented) "info proc" command, so that we can print useful
228 information about any random process without interfering with the
0df8b418 229 inferior's procinfo information. */
c3f6f71d 230
c3f6f71d 231/* format strings for /proc paths */
44122162
RO
232#define MAIN_PROC_NAME_FMT "/proc/%d"
233#define CTL_PROC_NAME_FMT "/proc/%d/ctl"
234#define AS_PROC_NAME_FMT "/proc/%d/as"
235#define MAP_PROC_NAME_FMT "/proc/%d/map"
236#define STATUS_PROC_NAME_FMT "/proc/%d/status"
13db92d3 237#define MAX_PROC_NAME_SIZE sizeof("/proc/999999/lwp/0123456789/lwpstatus")
c906108c 238
c3f6f71d
JM
239typedef struct procinfo {
240 struct procinfo *next;
241 int pid; /* Process ID */
242 int tid; /* Thread/LWP id */
c906108c 243
c3f6f71d
JM
244 /* process state */
245 int was_stopped;
246 int ignore_next_sigstop;
c906108c 247
c3f6f71d 248 int ctl_fd; /* File descriptor for /proc control file */
c3f6f71d
JM
249 int status_fd; /* File descriptor for /proc status file */
250 int as_fd; /* File descriptor for /proc as file */
c906108c 251
c3f6f71d 252 char pathname[MAX_PROC_NAME_SIZE]; /* Pathname to /proc entry */
c906108c 253
c3f6f71d 254 fltset_t saved_fltset; /* Saved traced hardware fault set */
44122162
RO
255 sigset_t saved_sigset; /* Saved traced signal set */
256 sigset_t saved_sighold; /* Saved held signal set */
37de36c6
KB
257 sysset_t *saved_exitset; /* Saved traced system call exit set */
258 sysset_t *saved_entryset; /* Saved traced system call entry set */
c906108c 259
44122162 260 pstatus_t prstatus; /* Current process status info */
19958708 261
c3f6f71d 262 struct procinfo *thread_list;
c906108c 263
c3f6f71d
JM
264 int status_valid : 1;
265 int gregs_valid : 1;
266 int fpregs_valid : 1;
267 int threads_valid: 1;
268} procinfo;
c906108c 269
c3f6f71d 270static char errmsg[128]; /* shared error msg buffer */
c906108c 271
c3f6f71d 272/* Function prototypes for procinfo module: */
c906108c 273
a14ed312
KB
274static procinfo *find_procinfo_or_die (int pid, int tid);
275static procinfo *find_procinfo (int pid, int tid);
276static procinfo *create_procinfo (int pid, int tid);
44122162 277static void destroy_procinfo (procinfo *p);
44122162
RO
278static void dead_procinfo (procinfo *p, const char *msg, int killp);
279static int open_procinfo_files (procinfo *p, int which);
280static void close_procinfo_files (procinfo *p);
c906108c 281
e9ef4f39 282static int iterate_over_mappings
b8edc417
JK
283 (procinfo *pi, find_memory_region_ftype child_func, void *data,
284 int (*func) (struct prmap *map, find_memory_region_ftype child_func,
77382aee 285 void *data));
e9ef4f39 286
c3f6f71d 287/* The head of the procinfo list: */
44122162 288static procinfo *procinfo_list;
c906108c 289
77382aee
PA
290/* Search the procinfo list. Return a pointer to procinfo, or NULL if
291 not found. */
c906108c 292
19958708 293static procinfo *
fba45db2 294find_procinfo (int pid, int tid)
c5aa993b 295{
c3f6f71d 296 procinfo *pi;
c906108c 297
c3f6f71d
JM
298 for (pi = procinfo_list; pi; pi = pi->next)
299 if (pi->pid == pid)
300 break;
c906108c 301
c3f6f71d
JM
302 if (pi)
303 if (tid)
304 {
305 /* Don't check threads_valid. If we're updating the
306 thread_list, we want to find whatever threads are already
307 here. This means that in general it is the caller's
308 responsibility to check threads_valid and update before
309 calling find_procinfo, if the caller wants to find a new
77382aee 310 thread. */
c3f6f71d
JM
311
312 for (pi = pi->thread_list; pi; pi = pi->next)
313 if (pi->tid == tid)
314 break;
315 }
c906108c 316
c3f6f71d
JM
317 return pi;
318}
c906108c 319
77382aee 320/* Calls find_procinfo, but errors on failure. */
c906108c 321
c3f6f71d 322static procinfo *
fba45db2 323find_procinfo_or_die (int pid, int tid)
c3f6f71d
JM
324{
325 procinfo *pi = find_procinfo (pid, tid);
c906108c 326
c3f6f71d 327 if (pi == NULL)
0fda6bd2
JM
328 {
329 if (tid)
3e43a32a
MS
330 error (_("procfs: couldn't find pid %d "
331 "(kernel thread %d) in procinfo list."),
0fda6bd2
JM
332 pid, tid);
333 else
8a3fe4f8 334 error (_("procfs: couldn't find pid %d in procinfo list."), pid);
0fda6bd2 335 }
c3f6f71d
JM
336 return pi;
337}
c906108c 338
77382aee
PA
339/* Wrapper for `open'. The appropriate open call is attempted; if
340 unsuccessful, it will be retried as many times as needed for the
341 EAGAIN and EINTR conditions.
19958708 342
77382aee
PA
343 For other conditions, retry the open a limited number of times. In
344 addition, a short sleep is imposed prior to retrying the open. The
345 reason for this sleep is to give the kernel a chance to catch up
346 and create the file in question in the event that GDB "wins" the
347 race to open a file before the kernel has created it. */
19958708 348
4d1bcd09
KB
349static int
350open_with_retry (const char *pathname, int flags)
351{
352 int retries_remaining, status;
353
354 retries_remaining = 2;
355
356 while (1)
357 {
358 status = open (pathname, flags);
359
360 if (status >= 0 || retries_remaining == 0)
361 break;
362 else if (errno != EINTR && errno != EAGAIN)
363 {
364 retries_remaining--;
365 sleep (1);
366 }
367 }
368
369 return status;
370}
371
44122162
RO
372/* Open the file descriptor for the process or LWP. We only open the
373 control file descriptor; the others are opened lazily as needed.
77382aee 374 Returns the file descriptor, or zero for failure. */
c906108c 375
c3f6f71d 376enum { FD_CTL, FD_STATUS, FD_AS };
c906108c 377
c3f6f71d 378static int
fba45db2 379open_procinfo_files (procinfo *pi, int which)
c3f6f71d
JM
380{
381 char tmp[MAX_PROC_NAME_SIZE];
382 int fd;
383
77382aee
PA
384 /* This function is getting ALMOST long enough to break up into
385 several. Here is some rationale:
386
77382aee
PA
387 There are several file descriptors that may need to be open
388 for any given process or LWP. The ones we're intereted in are:
389 - control (ctl) write-only change the state
390 - status (status) read-only query the state
391 - address space (as) read/write access memory
392 - map (map) read-only virtual addr map
393 Most of these are opened lazily as they are needed.
394 The pathnames for the 'files' for an LWP look slightly
395 different from those of a first-class process:
396 Pathnames for a process (<proc-id>):
397 /proc/<proc-id>/ctl
398 /proc/<proc-id>/status
399 /proc/<proc-id>/as
400 /proc/<proc-id>/map
401 Pathnames for an LWP (lwp-id):
402 /proc/<proc-id>/lwp/<lwp-id>/lwpctl
403 /proc/<proc-id>/lwp/<lwp-id>/lwpstatus
404 An LWP has no map or address space file descriptor, since
44122162
RO
405 the memory map and address space are shared by all LWPs. */
406
77382aee
PA
407 /* In this case, there are several different file descriptors that
408 we might be asked to open. The control file descriptor will be
409 opened early, but the others will be opened lazily as they are
410 needed. */
c3f6f71d
JM
411
412 strcpy (tmp, pi->pathname);
0df8b418 413 switch (which) { /* Which file descriptor to open? */
c3f6f71d
JM
414 case FD_CTL:
415 if (pi->tid)
416 strcat (tmp, "/lwpctl");
417 else
418 strcat (tmp, "/ctl");
4d1bcd09 419 fd = open_with_retry (tmp, O_WRONLY);
e28cade7 420 if (fd < 0)
c3f6f71d
JM
421 return 0; /* fail */
422 pi->ctl_fd = fd;
423 break;
424 case FD_AS:
425 if (pi->tid)
0df8b418 426 return 0; /* There is no 'as' file descriptor for an lwp. */
c3f6f71d 427 strcat (tmp, "/as");
4d1bcd09 428 fd = open_with_retry (tmp, O_RDWR);
e28cade7 429 if (fd < 0)
c3f6f71d
JM
430 return 0; /* fail */
431 pi->as_fd = fd;
432 break;
433 case FD_STATUS:
434 if (pi->tid)
435 strcat (tmp, "/lwpstatus");
436 else
437 strcat (tmp, "/status");
4d1bcd09 438 fd = open_with_retry (tmp, O_RDONLY);
e28cade7 439 if (fd < 0)
c3f6f71d
JM
440 return 0; /* fail */
441 pi->status_fd = fd;
442 break;
443 default:
444 return 0; /* unknown file descriptor */
445 }
c906108c 446
c3f6f71d
JM
447 return 1; /* success */
448}
c906108c 449
77382aee
PA
450/* Allocate a data structure and link it into the procinfo list.
451 First tries to find a pre-existing one (FIXME: why?). Returns the
452 pointer to new procinfo struct. */
c906108c 453
c3f6f71d 454static procinfo *
fba45db2 455create_procinfo (int pid, int tid)
c3f6f71d 456{
0b62613e 457 procinfo *pi, *parent = NULL;
c906108c 458
c475f569
RO
459 pi = find_procinfo (pid, tid);
460 if (pi != NULL)
0df8b418 461 return pi; /* Already exists, nothing to do. */
c906108c 462
0df8b418 463 /* Find parent before doing malloc, to save having to cleanup. */
c3f6f71d
JM
464 if (tid != 0)
465 parent = find_procinfo_or_die (pid, 0); /* FIXME: should I
466 create it if it
0df8b418 467 doesn't exist yet? */
c906108c 468
8d749320 469 pi = XNEW (procinfo);
c3f6f71d
JM
470 memset (pi, 0, sizeof (procinfo));
471 pi->pid = pid;
472 pi->tid = tid;
c906108c 473
c475f569
RO
474 pi->saved_entryset = XNEW (sysset_t);
475 pi->saved_exitset = XNEW (sysset_t);
1d5e0602 476
c3f6f71d
JM
477 /* Chain into list. */
478 if (tid == 0)
479 {
c475f569 480 xsnprintf (pi->pathname, sizeof (pi->pathname), MAIN_PROC_NAME_FMT, pid);
c3f6f71d
JM
481 pi->next = procinfo_list;
482 procinfo_list = pi;
483 }
484 else
485 {
c475f569
RO
486 xsnprintf (pi->pathname, sizeof (pi->pathname), "/proc/%d/lwp/%d",
487 pid, tid);
c3f6f71d
JM
488 pi->next = parent->thread_list;
489 parent->thread_list = pi;
490 }
491 return pi;
492}
c906108c 493
77382aee 494/* Close all file descriptors associated with the procinfo. */
c906108c 495
c3f6f71d 496static void
fba45db2 497close_procinfo_files (procinfo *pi)
c3f6f71d
JM
498{
499 if (pi->ctl_fd > 0)
500 close (pi->ctl_fd);
c3f6f71d
JM
501 if (pi->as_fd > 0)
502 close (pi->as_fd);
503 if (pi->status_fd > 0)
504 close (pi->status_fd);
c3f6f71d
JM
505 pi->ctl_fd = pi->as_fd = pi->status_fd = 0;
506}
c906108c 507
77382aee 508/* Destructor function. Close, unlink and deallocate the object. */
c906108c 509
c3f6f71d 510static void
fba45db2 511destroy_one_procinfo (procinfo **list, procinfo *pi)
c3f6f71d
JM
512{
513 procinfo *ptr;
514
77382aee 515 /* Step one: unlink the procinfo from its list. */
c3f6f71d
JM
516 if (pi == *list)
517 *list = pi->next;
19958708 518 else
c3f6f71d
JM
519 for (ptr = *list; ptr; ptr = ptr->next)
520 if (ptr->next == pi)
521 {
522 ptr->next = pi->next;
523 break;
524 }
7a292a7a 525
77382aee 526 /* Step two: close any open file descriptors. */
c3f6f71d 527 close_procinfo_files (pi);
7a292a7a 528
77382aee 529 /* Step three: free the memory. */
1d5e0602
KB
530 xfree (pi->saved_entryset);
531 xfree (pi->saved_exitset);
b8c9b27d 532 xfree (pi);
c3f6f71d 533}
c906108c 534
c3f6f71d 535static void
fba45db2 536destroy_procinfo (procinfo *pi)
c3f6f71d
JM
537{
538 procinfo *tmp;
c906108c 539
0df8b418 540 if (pi->tid != 0) /* Destroy a thread procinfo. */
c3f6f71d 541 {
0df8b418 542 tmp = find_procinfo (pi->pid, 0); /* Find the parent process. */
c3f6f71d
JM
543 destroy_one_procinfo (&tmp->thread_list, pi);
544 }
0df8b418 545 else /* Destroy a process procinfo and all its threads. */
c3f6f71d
JM
546 {
547 /* First destroy the children, if any; */
548 while (pi->thread_list != NULL)
549 destroy_one_procinfo (&pi->thread_list, pi->thread_list);
550 /* Then destroy the parent. Genocide!!! */
551 destroy_one_procinfo (&procinfo_list, pi);
552 }
553}
c906108c 554
5b4cbbe3
TT
555/* A deleter that calls destroy_procinfo. */
556struct procinfo_deleter
004527cb 557{
5b4cbbe3
TT
558 void operator() (procinfo *pi) const
559 {
560 destroy_procinfo (pi);
561 }
562};
563
564typedef std::unique_ptr<procinfo, procinfo_deleter> procinfo_up;
004527cb 565
c3f6f71d 566enum { NOKILL, KILL };
c906108c 567
77382aee
PA
568/* To be called on a non_recoverable error for a procinfo. Prints
569 error messages, optionally sends a SIGKILL to the process, then
570 destroys the data structure. */
c906108c 571
c3f6f71d 572static void
995816ba 573dead_procinfo (procinfo *pi, const char *msg, int kill_p)
c3f6f71d
JM
574{
575 char procfile[80];
c906108c 576
c3f6f71d 577 if (pi->pathname)
c475f569 578 print_sys_errmsg (pi->pathname, errno);
c3f6f71d
JM
579 else
580 {
c475f569 581 xsnprintf (procfile, sizeof (procfile), "process %d", pi->pid);
c3f6f71d
JM
582 print_sys_errmsg (procfile, errno);
583 }
584 if (kill_p == KILL)
585 kill (pi->pid, SIGKILL);
c906108c 586
c3f6f71d 587 destroy_procinfo (pi);
0b62613e 588 error ("%s", msg);
c3f6f71d 589}
c906108c 590
c3f6f71d 591/* =================== END, STRUCT PROCINFO "MODULE" =================== */
c906108c 592
c3f6f71d 593/* =================== /proc "MODULE" =================== */
c906108c 594
77382aee
PA
595/* This "module" is the interface layer between the /proc system API
596 and the gdb target vector functions. This layer consists of access
597 functions that encapsulate each of the basic operations that we
598 need to use from the /proc API.
599
600 The main motivation for this layer is to hide the fact that there
601 are two very different implementations of the /proc API. Rather
602 than have a bunch of #ifdefs all thru the gdb target vector
603 functions, we do our best to hide them all in here. */
c906108c 604
44122162
RO
605static long proc_flags (procinfo *pi);
606static int proc_why (procinfo *pi);
607static int proc_what (procinfo *pi);
608static int proc_set_current_signal (procinfo *pi, int signo);
609static int proc_get_current_thread (procinfo *pi);
d3581e61 610static int proc_iterate_over_threads
44122162 611 (procinfo *pi,
d3581e61
JB
612 int (*func) (procinfo *, procinfo *, void *),
613 void *ptr);
614
615static void
995816ba 616proc_warn (procinfo *pi, const char *func, int line)
c3f6f71d 617{
c475f569
RO
618 xsnprintf (errmsg, sizeof (errmsg), "procfs: %s line %d, %s",
619 func, line, pi->pathname);
c3f6f71d
JM
620 print_sys_errmsg (errmsg, errno);
621}
c906108c 622
d3581e61 623static void
995816ba 624proc_error (procinfo *pi, const char *func, int line)
c3f6f71d 625{
c475f569
RO
626 xsnprintf (errmsg, sizeof (errmsg), "procfs: %s line %d, %s",
627 func, line, pi->pathname);
c3f6f71d
JM
628 perror_with_name (errmsg);
629}
c906108c 630
77382aee
PA
631/* Updates the status struct in the procinfo. There is a 'valid'
632 flag, to let other functions know when this function needs to be
633 called (so the status is only read when it is needed). The status
634 file descriptor is also only opened when it is needed. Returns
635 non-zero for success, zero for failure. */
c906108c 636
d3581e61 637static int
fba45db2 638proc_get_status (procinfo *pi)
c3f6f71d 639{
0df8b418 640 /* Status file descriptor is opened "lazily". */
c475f569 641 if (pi->status_fd == 0 && open_procinfo_files (pi, FD_STATUS) == 0)
c3f6f71d
JM
642 {
643 pi->status_valid = 0;
644 return 0;
645 }
c906108c 646
c3f6f71d
JM
647 if (lseek (pi->status_fd, 0, SEEK_SET) < 0)
648 pi->status_valid = 0; /* fail */
649 else
650 {
19958708 651 /* Sigh... I have to read a different data structure,
0df8b418 652 depending on whether this is a main process or an LWP. */
c3f6f71d 653 if (pi->tid)
19958708
RM
654 pi->status_valid = (read (pi->status_fd,
655 (char *) &pi->prstatus.pr_lwp,
c3f6f71d
JM
656 sizeof (lwpstatus_t))
657 == sizeof (lwpstatus_t));
658 else
659 {
19958708 660 pi->status_valid = (read (pi->status_fd,
c3f6f71d 661 (char *) &pi->prstatus,
44122162
RO
662 sizeof (pstatus_t))
663 == sizeof (pstatus_t));
c3f6f71d
JM
664 }
665 }
c906108c 666
c3f6f71d
JM
667 if (pi->status_valid)
668 {
19958708 669 PROC_PRETTYFPRINT_STATUS (proc_flags (pi),
c3f6f71d 670 proc_why (pi),
19958708 671 proc_what (pi),
c3f6f71d
JM
672 proc_get_current_thread (pi));
673 }
c906108c 674
77382aee 675 /* The status struct includes general regs, so mark them valid too. */
c3f6f71d 676 pi->gregs_valid = pi->status_valid;
77382aee
PA
677 /* In the read/write multiple-fd model, the status struct includes
678 the fp regs too, so mark them valid too. */
c3f6f71d 679 pi->fpregs_valid = pi->status_valid;
77382aee 680 return pi->status_valid; /* True if success, false if failure. */
c3f6f71d 681}
c906108c 682
77382aee 683/* Returns the process flags (pr_flags field). */
c3f6f71d 684
d3581e61 685static long
fba45db2 686proc_flags (procinfo *pi)
c3f6f71d
JM
687{
688 if (!pi->status_valid)
689 if (!proc_get_status (pi))
0df8b418 690 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 691
c3f6f71d 692 return pi->prstatus.pr_lwp.pr_flags;
c3f6f71d 693}
c906108c 694
77382aee 695/* Returns the pr_why field (why the process stopped). */
c906108c 696
d3581e61 697static int
fba45db2 698proc_why (procinfo *pi)
c3f6f71d
JM
699{
700 if (!pi->status_valid)
701 if (!proc_get_status (pi))
0df8b418 702 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 703
c3f6f71d 704 return pi->prstatus.pr_lwp.pr_why;
c3f6f71d 705}
c906108c 706
77382aee 707/* Returns the pr_what field (details of why the process stopped). */
c906108c 708
d3581e61 709static int
fba45db2 710proc_what (procinfo *pi)
c3f6f71d
JM
711{
712 if (!pi->status_valid)
713 if (!proc_get_status (pi))
0df8b418 714 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 715
c3f6f71d 716 return pi->prstatus.pr_lwp.pr_what;
c3f6f71d 717}
c906108c 718
77382aee
PA
719/* This function is only called when PI is stopped by a watchpoint.
720 Assuming the OS supports it, write to *ADDR the data address which
721 triggered it and return 1. Return 0 if it is not possible to know
722 the address. */
bf701c2c
PM
723
724static int
725proc_watchpoint_address (procinfo *pi, CORE_ADDR *addr)
726{
727 if (!pi->status_valid)
728 if (!proc_get_status (pi))
729 return 0;
730
f5656ead
TT
731 *addr = (CORE_ADDR) gdbarch_pointer_to_address (target_gdbarch (),
732 builtin_type (target_gdbarch ())->builtin_data_ptr,
bf701c2c 733 (gdb_byte *) &pi->prstatus.pr_lwp.pr_info.si_addr);
bf701c2c
PM
734 return 1;
735}
736
77382aee
PA
737/* Returns the pr_nsysarg field (number of args to the current
738 syscall). */
c3f6f71d 739
d3581e61 740static int
fba45db2 741proc_nsysarg (procinfo *pi)
c3f6f71d
JM
742{
743 if (!pi->status_valid)
744 if (!proc_get_status (pi))
745 return 0;
19958708 746
c3f6f71d 747 return pi->prstatus.pr_lwp.pr_nsysarg;
c3f6f71d 748}
c906108c 749
77382aee
PA
750/* Returns the pr_sysarg field (pointer to the arguments of current
751 syscall). */
c906108c 752
d3581e61 753static long *
fba45db2 754proc_sysargs (procinfo *pi)
c3f6f71d
JM
755{
756 if (!pi->status_valid)
757 if (!proc_get_status (pi))
758 return NULL;
19958708 759
c3f6f71d 760 return (long *) &pi->prstatus.pr_lwp.pr_sysarg;
c3f6f71d 761}
77382aee 762
44122162 763/* Set or reset any of the following process flags:
77382aee
PA
764 PR_FORK -- forked child will inherit trace flags
765 PR_RLC -- traced process runs when last /proc file closed.
766 PR_KLC -- traced process is killed when last /proc file closed.
767 PR_ASYNC -- LWP's get to run/stop independently.
768
44122162 769 This function is done using read/write [PCSET/PCRESET/PCUNSET].
77382aee
PA
770
771 Arguments:
772 pi -- the procinfo
773 flag -- one of PR_FORK, PR_RLC, or PR_ASYNC
774 mode -- 1 for set, 0 for reset.
775
776 Returns non-zero for success, zero for failure. */
c906108c 777
c3f6f71d 778enum { FLAG_RESET, FLAG_SET };
c906108c 779
c3f6f71d 780static int
fba45db2 781proc_modify_flag (procinfo *pi, long flag, long mode)
c3f6f71d
JM
782{
783 long win = 0; /* default to fail */
784
77382aee
PA
785 /* These operations affect the process as a whole, and applying them
786 to an individual LWP has the same meaning as applying them to the
787 main process. Therefore, if we're ever called with a pointer to
788 an LWP's procinfo, let's substitute the process's procinfo and
789 avoid opening the LWP's file descriptor unnecessarily. */
c3f6f71d
JM
790
791 if (pi->pid != 0)
792 pi = find_procinfo_or_die (pi->pid, 0);
793
44122162 794 procfs_ctl_t arg[2];
c5aa993b 795
44122162
RO
796 if (mode == FLAG_SET) /* Set the flag (RLC, FORK, or ASYNC). */
797 arg[0] = PCSET;
0df8b418 798 else /* Reset the flag. */
44122162
RO
799 arg[0] = PCUNSET;
800
801 arg[1] = flag;
802 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 803
77382aee
PA
804 /* The above operation renders the procinfo's cached pstatus
805 obsolete. */
c3f6f71d 806 pi->status_valid = 0;
c906108c 807
c3f6f71d 808 if (!win)
8a3fe4f8 809 warning (_("procfs: modify_flag failed to turn %s %s"),
c3f6f71d
JM
810 flag == PR_FORK ? "PR_FORK" :
811 flag == PR_RLC ? "PR_RLC" :
c3f6f71d 812 flag == PR_ASYNC ? "PR_ASYNC" :
0d06e24b 813 flag == PR_KLC ? "PR_KLC" :
c3f6f71d
JM
814 "<unknown flag>",
815 mode == FLAG_RESET ? "off" : "on");
c906108c 816
c3f6f71d
JM
817 return win;
818}
c906108c 819
77382aee
PA
820/* Set the run_on_last_close flag. Process with all threads will
821 become runnable when debugger closes all /proc fds. Returns
822 non-zero for success, zero for failure. */
c906108c 823
d3581e61 824static int
fba45db2 825proc_set_run_on_last_close (procinfo *pi)
c906108c 826{
c3f6f71d
JM
827 return proc_modify_flag (pi, PR_RLC, FLAG_SET);
828}
c906108c 829
77382aee
PA
830/* Reset the run_on_last_close flag. The process will NOT become
831 runnable when debugger closes its file handles. Returns non-zero
832 for success, zero for failure. */
c906108c 833
d3581e61 834static int
fba45db2 835proc_unset_run_on_last_close (procinfo *pi)
c3f6f71d
JM
836{
837 return proc_modify_flag (pi, PR_RLC, FLAG_RESET);
c906108c
SS
838}
839
77382aee
PA
840/* Reset inherit_on_fork flag. If the process forks a child while we
841 are registered for events in the parent, then we will NOT recieve
842 events from the child. Returns non-zero for success, zero for
843 failure. */
c906108c 844
d3581e61 845static int
fba45db2 846proc_unset_inherit_on_fork (procinfo *pi)
c3f6f71d
JM
847{
848 return proc_modify_flag (pi, PR_FORK, FLAG_RESET);
849}
c906108c 850
77382aee
PA
851/* Set PR_ASYNC flag. If one LWP stops because of a debug event
852 (signal etc.), the remaining LWPs will continue to run. Returns
853 non-zero for success, zero for failure. */
c906108c 854
d3581e61 855static int
fba45db2 856proc_set_async (procinfo *pi)
c3f6f71d
JM
857{
858 return proc_modify_flag (pi, PR_ASYNC, FLAG_SET);
859}
c906108c 860
77382aee
PA
861/* Reset PR_ASYNC flag. If one LWP stops because of a debug event
862 (signal etc.), then all other LWPs will stop as well. Returns
863 non-zero for success, zero for failure. */
c906108c 864
d3581e61 865static int
fba45db2 866proc_unset_async (procinfo *pi)
c3f6f71d
JM
867{
868 return proc_modify_flag (pi, PR_ASYNC, FLAG_RESET);
869}
c906108c 870
77382aee
PA
871/* Request the process/LWP to stop. Does not wait. Returns non-zero
872 for success, zero for failure. */
c906108c 873
d3581e61 874static int
fba45db2 875proc_stop_process (procinfo *pi)
c3f6f71d
JM
876{
877 int win;
c906108c 878
77382aee
PA
879 /* We might conceivably apply this operation to an LWP, and the
880 LWP's ctl file descriptor might not be open. */
c906108c 881
c475f569 882 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c3f6f71d
JM
883 return 0;
884 else
885 {
37de36c6 886 procfs_ctl_t cmd = PCSTOP;
f4a14ae6 887
c3f6f71d 888 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d 889 }
c906108c 890
c3f6f71d
JM
891 return win;
892}
c5aa993b 893
77382aee
PA
894/* Wait for the process or LWP to stop (block until it does). Returns
895 non-zero for success, zero for failure. */
c906108c 896
d3581e61 897static int
fba45db2 898proc_wait_for_stop (procinfo *pi)
c906108c 899{
c3f6f71d
JM
900 int win;
901
77382aee
PA
902 /* We should never have to apply this operation to any procinfo
903 except the one for the main process. If that ever changes for
904 any reason, then take out the following clause and replace it
905 with one that makes sure the ctl_fd is open. */
19958708 906
c3f6f71d
JM
907 if (pi->tid != 0)
908 pi = find_procinfo_or_die (pi->pid, 0);
909
44122162 910 procfs_ctl_t cmd = PCWSTOP;
f4a14ae6 911
92137da0
RO
912 set_sigint_trap ();
913
44122162 914 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
92137da0
RO
915
916 clear_sigint_trap ();
917
44122162
RO
918 /* We been runnin' and we stopped -- need to update status. */
919 pi->status_valid = 0;
c906108c 920
c3f6f71d 921 return win;
c906108c
SS
922}
923
77382aee
PA
924/* Make the process or LWP runnable.
925
926 Options (not all are implemented):
927 - single-step
928 - clear current fault
929 - clear current signal
930 - abort the current system call
931 - stop as soon as finished with system call
932 - (ioctl): set traced signal set
933 - (ioctl): set held signal set
934 - (ioctl): set traced fault set
935 - (ioctl): set start pc (vaddr)
936
937 Always clears the current fault. PI is the process or LWP to
938 operate on. If STEP is true, set the process or LWP to trap after
939 one instruction. If SIGNO is zero, clear the current signal if
940 any; if non-zero, set the current signal to this one. Returns
941 non-zero for success, zero for failure. */
c3f6f71d 942
d3581e61 943static int
fba45db2 944proc_run_process (procinfo *pi, int step, int signo)
c3f6f71d
JM
945{
946 int win;
947 int runflags;
948
77382aee
PA
949 /* We will probably have to apply this operation to individual
950 threads, so make sure the control file descriptor is open. */
19958708 951
c475f569
RO
952 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
953 return 0;
c906108c 954
0df8b418 955 runflags = PRCFAULT; /* Always clear current fault. */
c3f6f71d
JM
956 if (step)
957 runflags |= PRSTEP;
958 if (signo == 0)
959 runflags |= PRCSIG;
0df8b418 960 else if (signo != -1) /* -1 means do nothing W.R.T. signals. */
c3f6f71d 961 proc_set_current_signal (pi, signo);
c5aa993b 962
44122162 963 procfs_ctl_t cmd[2];
c906108c 964
44122162
RO
965 cmd[0] = PCRUN;
966 cmd[1] = runflags;
967 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c906108c 968
c3f6f71d
JM
969 return win;
970}
c906108c 971
77382aee
PA
972/* Register to trace signals in the process or LWP. Returns non-zero
973 for success, zero for failure. */
c906108c 974
d3581e61 975static int
44122162 976proc_set_traced_signals (procinfo *pi, sigset_t *sigset)
c906108c 977{
c3f6f71d
JM
978 int win;
979
77382aee
PA
980 /* We should never have to apply this operation to any procinfo
981 except the one for the main process. If that ever changes for
982 any reason, then take out the following clause and replace it
983 with one that makes sure the ctl_fd is open. */
19958708 984
c3f6f71d
JM
985 if (pi->tid != 0)
986 pi = find_procinfo_or_die (pi->pid, 0);
987
44122162
RO
988 struct {
989 procfs_ctl_t cmd;
990 /* Use char array to avoid alignment issues. */
991 char sigset[sizeof (sigset_t)];
992 } arg;
c906108c 993
44122162
RO
994 arg.cmd = PCSTRACE;
995 memcpy (&arg.sigset, sigset, sizeof (sigset_t));
996
997 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 998
0df8b418 999 /* The above operation renders the procinfo's cached pstatus obsolete. */
c3f6f71d 1000 pi->status_valid = 0;
c906108c 1001
c3f6f71d 1002 if (!win)
8a3fe4f8 1003 warning (_("procfs: set_traced_signals failed"));
c3f6f71d 1004 return win;
c906108c
SS
1005}
1006
77382aee
PA
1007/* Register to trace hardware faults in the process or LWP. Returns
1008 non-zero for success, zero for failure. */
c906108c 1009
d3581e61 1010static int
fba45db2 1011proc_set_traced_faults (procinfo *pi, fltset_t *fltset)
c3f6f71d
JM
1012{
1013 int win;
1014
77382aee
PA
1015 /* We should never have to apply this operation to any procinfo
1016 except the one for the main process. If that ever changes for
1017 any reason, then take out the following clause and replace it
1018 with one that makes sure the ctl_fd is open. */
19958708 1019
c3f6f71d
JM
1020 if (pi->tid != 0)
1021 pi = find_procinfo_or_die (pi->pid, 0);
1022
44122162
RO
1023 struct {
1024 procfs_ctl_t cmd;
1025 /* Use char array to avoid alignment issues. */
1026 char fltset[sizeof (fltset_t)];
1027 } arg;
1028
1029 arg.cmd = PCSFAULT;
1030 memcpy (&arg.fltset, fltset, sizeof (fltset_t));
c906108c 1031
44122162 1032 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1033
0df8b418 1034 /* The above operation renders the procinfo's cached pstatus obsolete. */
c3f6f71d 1035 pi->status_valid = 0;
c906108c 1036
c3f6f71d
JM
1037 return win;
1038}
c5aa993b 1039
77382aee
PA
1040/* Register to trace entry to system calls in the process or LWP.
1041 Returns non-zero for success, zero for failure. */
c906108c 1042
d3581e61 1043static int
fba45db2 1044proc_set_traced_sysentry (procinfo *pi, sysset_t *sysset)
c906108c 1045{
c3f6f71d
JM
1046 int win;
1047
77382aee
PA
1048 /* We should never have to apply this operation to any procinfo
1049 except the one for the main process. If that ever changes for
1050 any reason, then take out the following clause and replace it
1051 with one that makes sure the ctl_fd is open. */
19958708 1052
c3f6f71d
JM
1053 if (pi->tid != 0)
1054 pi = find_procinfo_or_die (pi->pid, 0);
1055
c475f569 1056 struct {
44122162
RO
1057 procfs_ctl_t cmd;
1058 /* Use char array to avoid alignment issues. */
1059 char sysset[sizeof (sysset_t)];
c475f569 1060 } arg;
c3f6f71d 1061
c475f569
RO
1062 arg.cmd = PCSENTRY;
1063 memcpy (&arg.sysset, sysset, sizeof (sysset_t));
44122162 1064
c475f569 1065 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
37de36c6 1066
77382aee
PA
1067 /* The above operation renders the procinfo's cached pstatus
1068 obsolete. */
c3f6f71d 1069 pi->status_valid = 0;
19958708 1070
c3f6f71d 1071 return win;
c906108c
SS
1072}
1073
77382aee
PA
1074/* Register to trace exit from system calls in the process or LWP.
1075 Returns non-zero for success, zero for failure. */
c906108c 1076
d3581e61 1077static int
fba45db2 1078proc_set_traced_sysexit (procinfo *pi, sysset_t *sysset)
c3f6f71d
JM
1079{
1080 int win;
1081
77382aee
PA
1082 /* We should never have to apply this operation to any procinfo
1083 except the one for the main process. If that ever changes for
1084 any reason, then take out the following clause and replace it
1085 with one that makes sure the ctl_fd is open. */
19958708 1086
c3f6f71d
JM
1087 if (pi->tid != 0)
1088 pi = find_procinfo_or_die (pi->pid, 0);
1089
44122162
RO
1090 struct gdb_proc_ctl_pcsexit {
1091 procfs_ctl_t cmd;
1092 /* Use char array to avoid alignment issues. */
1093 char sysset[sizeof (sysset_t)];
c475f569 1094 } arg;
c906108c 1095
c475f569
RO
1096 arg.cmd = PCSEXIT;
1097 memcpy (&arg.sysset, sysset, sizeof (sysset_t));
c906108c 1098
c475f569 1099 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
37de36c6 1100
77382aee
PA
1101 /* The above operation renders the procinfo's cached pstatus
1102 obsolete. */
c3f6f71d 1103 pi->status_valid = 0;
c906108c 1104
c3f6f71d
JM
1105 return win;
1106}
c906108c 1107
77382aee
PA
1108/* Specify the set of blocked / held signals in the process or LWP.
1109 Returns non-zero for success, zero for failure. */
c906108c 1110
d3581e61 1111static int
44122162 1112proc_set_held_signals (procinfo *pi, sigset_t *sighold)
c906108c 1113{
c3f6f71d
JM
1114 int win;
1115
77382aee
PA
1116 /* We should never have to apply this operation to any procinfo
1117 except the one for the main process. If that ever changes for
1118 any reason, then take out the following clause and replace it
1119 with one that makes sure the ctl_fd is open. */
19958708 1120
c3f6f71d
JM
1121 if (pi->tid != 0)
1122 pi = find_procinfo_or_die (pi->pid, 0);
1123
44122162
RO
1124 struct {
1125 procfs_ctl_t cmd;
1126 /* Use char array to avoid alignment issues. */
1127 char hold[sizeof (sigset_t)];
1128 } arg;
1129
1130 arg.cmd = PCSHOLD;
1131 memcpy (&arg.hold, sighold, sizeof (sigset_t));
1132 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
1133
77382aee
PA
1134 /* The above operation renders the procinfo's cached pstatus
1135 obsolete. */
c3f6f71d
JM
1136 pi->status_valid = 0;
1137
1138 return win;
c906108c
SS
1139}
1140
77382aee
PA
1141/* Returns the set of signals that are held / blocked. Will also copy
1142 the sigset if SAVE is non-zero. */
c906108c 1143
44122162
RO
1144static sigset_t *
1145proc_get_held_signals (procinfo *pi, sigset_t *save)
c906108c 1146{
44122162 1147 sigset_t *ret = NULL;
c3f6f71d 1148
77382aee
PA
1149 /* We should never have to apply this operation to any procinfo
1150 except the one for the main process. If that ever changes for
1151 any reason, then take out the following clause and replace it
1152 with one that makes sure the ctl_fd is open. */
19958708 1153
c3f6f71d
JM
1154 if (pi->tid != 0)
1155 pi = find_procinfo_or_die (pi->pid, 0);
1156
c3f6f71d
JM
1157 if (!pi->status_valid)
1158 if (!proc_get_status (pi))
1159 return NULL;
1160
c3f6f71d 1161 ret = &pi->prstatus.pr_lwp.pr_lwphold;
c3f6f71d 1162 if (save && ret)
44122162 1163 memcpy (save, ret, sizeof (sigset_t));
c3f6f71d
JM
1164
1165 return ret;
c906108c
SS
1166}
1167
77382aee
PA
1168/* Returns the set of signals that are traced / debugged. Will also
1169 copy the sigset if SAVE is non-zero. */
c3f6f71d 1170
44122162
RO
1171static sigset_t *
1172proc_get_traced_signals (procinfo *pi, sigset_t *save)
c906108c 1173{
44122162 1174 sigset_t *ret = NULL;
c3f6f71d 1175
77382aee
PA
1176 /* We should never have to apply this operation to any procinfo
1177 except the one for the main process. If that ever changes for
1178 any reason, then take out the following clause and replace it
1179 with one that makes sure the ctl_fd is open. */
19958708 1180
c3f6f71d
JM
1181 if (pi->tid != 0)
1182 pi = find_procinfo_or_die (pi->pid, 0);
1183
c3f6f71d
JM
1184 if (!pi->status_valid)
1185 if (!proc_get_status (pi))
1186 return NULL;
1187
1188 ret = &pi->prstatus.pr_sigtrace;
c3f6f71d 1189 if (save && ret)
44122162 1190 memcpy (save, ret, sizeof (sigset_t));
c906108c 1191
c3f6f71d
JM
1192 return ret;
1193}
c906108c 1194
77382aee
PA
1195/* Returns the set of hardware faults that are traced /debugged. Will
1196 also copy the faultset if SAVE is non-zero. */
c3f6f71d 1197
d3581e61 1198static fltset_t *
fba45db2 1199proc_get_traced_faults (procinfo *pi, fltset_t *save)
c3f6f71d
JM
1200{
1201 fltset_t *ret = NULL;
1202
77382aee
PA
1203 /* We should never have to apply this operation to any procinfo
1204 except the one for the main process. If that ever changes for
1205 any reason, then take out the following clause and replace it
1206 with one that makes sure the ctl_fd is open. */
19958708 1207
c3f6f71d
JM
1208 if (pi->tid != 0)
1209 pi = find_procinfo_or_die (pi->pid, 0);
1210
c3f6f71d
JM
1211 if (!pi->status_valid)
1212 if (!proc_get_status (pi))
1213 return NULL;
1214
1215 ret = &pi->prstatus.pr_flttrace;
c3f6f71d
JM
1216 if (save && ret)
1217 memcpy (save, ret, sizeof (fltset_t));
c906108c 1218
c3f6f71d
JM
1219 return ret;
1220}
c906108c 1221
77382aee
PA
1222/* Returns the set of syscalls that are traced /debugged on entry.
1223 Will also copy the syscall set if SAVE is non-zero. */
c906108c 1224
d3581e61 1225static sysset_t *
fba45db2 1226proc_get_traced_sysentry (procinfo *pi, sysset_t *save)
c3f6f71d
JM
1227{
1228 sysset_t *ret = NULL;
1229
77382aee
PA
1230 /* We should never have to apply this operation to any procinfo
1231 except the one for the main process. If that ever changes for
1232 any reason, then take out the following clause and replace it
1233 with one that makes sure the ctl_fd is open. */
19958708 1234
c3f6f71d
JM
1235 if (pi->tid != 0)
1236 pi = find_procinfo_or_die (pi->pid, 0);
1237
c3f6f71d
JM
1238 if (!pi->status_valid)
1239 if (!proc_get_status (pi))
1240 return NULL;
1241
1242 ret = &pi->prstatus.pr_sysentry;
c3f6f71d 1243 if (save && ret)
44122162 1244 memcpy (save, ret, sizeof (sysset_t));
c906108c 1245
c3f6f71d
JM
1246 return ret;
1247}
c5aa993b 1248
77382aee
PA
1249/* Returns the set of syscalls that are traced /debugged on exit.
1250 Will also copy the syscall set if SAVE is non-zero. */
c906108c 1251
d3581e61 1252static sysset_t *
fba45db2 1253proc_get_traced_sysexit (procinfo *pi, sysset_t *save)
c906108c 1254{
44122162 1255 sysset_t *ret = NULL;
c3f6f71d 1256
77382aee
PA
1257 /* We should never have to apply this operation to any procinfo
1258 except the one for the main process. If that ever changes for
1259 any reason, then take out the following clause and replace it
1260 with one that makes sure the ctl_fd is open. */
19958708 1261
c3f6f71d
JM
1262 if (pi->tid != 0)
1263 pi = find_procinfo_or_die (pi->pid, 0);
1264
c3f6f71d
JM
1265 if (!pi->status_valid)
1266 if (!proc_get_status (pi))
1267 return NULL;
1268
1269 ret = &pi->prstatus.pr_sysexit;
c3f6f71d 1270 if (save && ret)
44122162 1271 memcpy (save, ret, sizeof (sysset_t));
c3f6f71d
JM
1272
1273 return ret;
1274}
c906108c 1275
77382aee
PA
1276/* The current fault (if any) is cleared; the associated signal will
1277 not be sent to the process or LWP when it resumes. Returns
1278 non-zero for success, zero for failure. */
c906108c 1279
d3581e61 1280static int
fba45db2 1281proc_clear_current_fault (procinfo *pi)
c3f6f71d
JM
1282{
1283 int win;
1284
77382aee
PA
1285 /* We should never have to apply this operation to any procinfo
1286 except the one for the main process. If that ever changes for
1287 any reason, then take out the following clause and replace it
1288 with one that makes sure the ctl_fd is open. */
19958708 1289
c3f6f71d
JM
1290 if (pi->tid != 0)
1291 pi = find_procinfo_or_die (pi->pid, 0);
1292
44122162 1293 procfs_ctl_t cmd = PCCFAULT;
f4a14ae6 1294
44122162 1295 win = (write (pi->ctl_fd, (void *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d
JM
1296
1297 return win;
c906108c
SS
1298}
1299
77382aee
PA
1300/* Set the "current signal" that will be delivered next to the
1301 process. NOTE: semantics are different from those of KILL. This
1302 signal will be delivered to the process or LWP immediately when it
1303 is resumed (even if the signal is held/blocked); it will NOT
1304 immediately cause another event of interest, and will NOT first
1305 trap back to the debugger. Returns non-zero for success, zero for
1306 failure. */
c3f6f71d 1307
d3581e61 1308static int
fba45db2 1309proc_set_current_signal (procinfo *pi, int signo)
c3f6f71d
JM
1310{
1311 int win;
1312 struct {
37de36c6 1313 procfs_ctl_t cmd;
c3f6f71d 1314 /* Use char array to avoid alignment issues. */
44122162 1315 char sinfo[sizeof (siginfo_t)];
c3f6f71d 1316 } arg;
44122162 1317 siginfo_t mysinfo;
c162e8c9
JM
1318 ptid_t wait_ptid;
1319 struct target_waitstatus wait_status;
c3f6f71d 1320
77382aee
PA
1321 /* We should never have to apply this operation to any procinfo
1322 except the one for the main process. If that ever changes for
1323 any reason, then take out the following clause and replace it
1324 with one that makes sure the ctl_fd is open. */
19958708 1325
c3f6f71d
JM
1326 if (pi->tid != 0)
1327 pi = find_procinfo_or_die (pi->pid, 0);
1328
c3f6f71d 1329 /* The pointer is just a type alias. */
c162e8c9 1330 get_last_target_status (&wait_ptid, &wait_status);
d7e15655 1331 if (wait_ptid == inferior_ptid
c162e8c9 1332 && wait_status.kind == TARGET_WAITKIND_STOPPED
2ea28649 1333 && wait_status.value.sig == gdb_signal_from_host (signo)
c162e8c9 1334 && proc_get_status (pi)
c162e8c9 1335 && pi->prstatus.pr_lwp.pr_info.si_signo == signo
c162e8c9
JM
1336 )
1337 /* Use the siginfo associated with the signal being
1338 redelivered. */
44122162 1339 memcpy (arg.sinfo, &pi->prstatus.pr_lwp.pr_info, sizeof (siginfo_t));
c162e8c9
JM
1340 else
1341 {
73930d4d
KH
1342 mysinfo.si_signo = signo;
1343 mysinfo.si_code = 0;
1344 mysinfo.si_pid = getpid (); /* ?why? */
1345 mysinfo.si_uid = getuid (); /* ?why? */
44122162 1346 memcpy (arg.sinfo, &mysinfo, sizeof (siginfo_t));
c162e8c9 1347 }
c3f6f71d 1348
c3f6f71d
JM
1349 arg.cmd = PCSSIG;
1350 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1351
c3f6f71d
JM
1352 return win;
1353}
c906108c 1354
77382aee
PA
1355/* The current signal (if any) is cleared, and is not sent to the
1356 process or LWP when it resumes. Returns non-zero for success, zero
1357 for failure. */
c906108c 1358
d3581e61 1359static int
fba45db2 1360proc_clear_current_signal (procinfo *pi)
c3f6f71d
JM
1361{
1362 int win;
1363
77382aee
PA
1364 /* We should never have to apply this operation to any procinfo
1365 except the one for the main process. If that ever changes for
1366 any reason, then take out the following clause and replace it
1367 with one that makes sure the ctl_fd is open. */
19958708 1368
c3f6f71d
JM
1369 if (pi->tid != 0)
1370 pi = find_procinfo_or_die (pi->pid, 0);
1371
44122162
RO
1372 struct {
1373 procfs_ctl_t cmd;
1374 /* Use char array to avoid alignment issues. */
1375 char sinfo[sizeof (siginfo_t)];
1376 } arg;
1377 siginfo_t mysinfo;
1378
1379 arg.cmd = PCSSIG;
1380 /* The pointer is just a type alias. */
1381 mysinfo.si_signo = 0;
1382 mysinfo.si_code = 0;
1383 mysinfo.si_errno = 0;
1384 mysinfo.si_pid = getpid (); /* ?why? */
1385 mysinfo.si_uid = getuid (); /* ?why? */
1386 memcpy (arg.sinfo, &mysinfo, sizeof (siginfo_t));
1387
1388 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1389
c3f6f71d
JM
1390 return win;
1391}
c906108c 1392
772cf8be
MK
1393/* Return the general-purpose registers for the process or LWP
1394 corresponding to PI. Upon failure, return NULL. */
c906108c 1395
d3581e61 1396static gdb_gregset_t *
fba45db2 1397proc_get_gregs (procinfo *pi)
c3f6f71d
JM
1398{
1399 if (!pi->status_valid || !pi->gregs_valid)
1400 if (!proc_get_status (pi))
1401 return NULL;
1402
c3f6f71d 1403 return &pi->prstatus.pr_lwp.pr_reg;
c3f6f71d 1404}
c5aa993b 1405
772cf8be
MK
1406/* Return the general-purpose registers for the process or LWP
1407 corresponding to PI. Upon failure, return NULL. */
c906108c 1408
d3581e61 1409static gdb_fpregset_t *
fba45db2 1410proc_get_fpregs (procinfo *pi)
c906108c 1411{
c3f6f71d
JM
1412 if (!pi->status_valid || !pi->fpregs_valid)
1413 if (!proc_get_status (pi))
1414 return NULL;
1415
c3f6f71d 1416 return &pi->prstatus.pr_lwp.pr_fpreg;
c906108c
SS
1417}
1418
772cf8be
MK
1419/* Write the general-purpose registers back to the process or LWP
1420 corresponding to PI. Return non-zero for success, zero for
1421 failure. */
c3f6f71d 1422
d3581e61 1423static int
fba45db2 1424proc_set_gregs (procinfo *pi)
c906108c 1425{
c3f6f71d
JM
1426 gdb_gregset_t *gregs;
1427 int win;
c5aa993b 1428
772cf8be
MK
1429 gregs = proc_get_gregs (pi);
1430 if (gregs == NULL)
1431 return 0; /* proc_get_regs has already warned. */
c3f6f71d 1432
772cf8be 1433 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c475f569 1434 return 0;
c3f6f71d 1435 else
c906108c 1436 {
c3f6f71d 1437 struct {
37de36c6 1438 procfs_ctl_t cmd;
c3f6f71d
JM
1439 /* Use char array to avoid alignment issues. */
1440 char gregs[sizeof (gdb_gregset_t)];
1441 } arg;
1442
772cf8be 1443 arg.cmd = PCSREG;
c3f6f71d
JM
1444 memcpy (&arg.gregs, gregs, sizeof (arg.gregs));
1445 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1446 }
c3f6f71d 1447
772cf8be 1448 /* Policy: writing the registers invalidates our cache. */
c3f6f71d
JM
1449 pi->gregs_valid = 0;
1450 return win;
c906108c
SS
1451}
1452
772cf8be
MK
1453/* Write the floating-pointer registers back to the process or LWP
1454 corresponding to PI. Return non-zero for success, zero for
1455 failure. */
c3f6f71d 1456
d3581e61 1457static int
fba45db2 1458proc_set_fpregs (procinfo *pi)
c906108c 1459{
c3f6f71d
JM
1460 gdb_fpregset_t *fpregs;
1461 int win;
1462
772cf8be
MK
1463 fpregs = proc_get_fpregs (pi);
1464 if (fpregs == NULL)
1465 return 0; /* proc_get_fpregs has already warned. */
c5aa993b 1466
772cf8be 1467 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c475f569 1468 return 0;
c3f6f71d 1469 else
c906108c 1470 {
c3f6f71d 1471 struct {
37de36c6 1472 procfs_ctl_t cmd;
c3f6f71d
JM
1473 /* Use char array to avoid alignment issues. */
1474 char fpregs[sizeof (gdb_fpregset_t)];
1475 } arg;
1476
772cf8be 1477 arg.cmd = PCSFPREG;
c3f6f71d
JM
1478 memcpy (&arg.fpregs, fpregs, sizeof (arg.fpregs));
1479 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
c906108c 1480 }
c3f6f71d 1481
772cf8be 1482 /* Policy: writing the registers invalidates our cache. */
c3f6f71d
JM
1483 pi->fpregs_valid = 0;
1484 return win;
c906108c
SS
1485}
1486
77382aee
PA
1487/* Send a signal to the proc or lwp with the semantics of "kill()".
1488 Returns non-zero for success, zero for failure. */
c906108c 1489
d3581e61 1490static int
fba45db2 1491proc_kill (procinfo *pi, int signo)
c3f6f71d
JM
1492{
1493 int win;
c906108c 1494
77382aee
PA
1495 /* We might conceivably apply this operation to an LWP, and the
1496 LWP's ctl file descriptor might not be open. */
c906108c 1497
c475f569
RO
1498 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
1499 return 0;
c3f6f71d
JM
1500 else
1501 {
37de36c6 1502 procfs_ctl_t cmd[2];
c906108c 1503
c3f6f71d
JM
1504 cmd[0] = PCKILL;
1505 cmd[1] = signo;
1506 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
c3f6f71d 1507 }
c906108c 1508
c3f6f71d
JM
1509 return win;
1510}
c906108c 1511
77382aee
PA
1512/* Find the pid of the process that started this one. Returns the
1513 parent process pid, or zero. */
c906108c 1514
d3581e61 1515static int
fba45db2 1516proc_parent_pid (procinfo *pi)
c906108c 1517{
77382aee
PA
1518 /* We should never have to apply this operation to any procinfo
1519 except the one for the main process. If that ever changes for
1520 any reason, then take out the following clause and replace it
1521 with one that makes sure the ctl_fd is open. */
19958708 1522
c3f6f71d
JM
1523 if (pi->tid != 0)
1524 pi = find_procinfo_or_die (pi->pid, 0);
1525
1526 if (!pi->status_valid)
1527 if (!proc_get_status (pi))
1528 return 0;
c5aa993b 1529
c3f6f71d
JM
1530 return pi->prstatus.pr_ppid;
1531}
1532
9a043c1d
AC
1533/* Convert a target address (a.k.a. CORE_ADDR) into a host address
1534 (a.k.a void pointer)! */
1535
1536static void *
1537procfs_address_to_host_pointer (CORE_ADDR addr)
1538{
f5656ead 1539 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
9a043c1d
AC
1540 void *ptr;
1541
4e906f53 1542 gdb_assert (sizeof (ptr) == TYPE_LENGTH (ptr_type));
f5656ead 1543 gdbarch_address_to_pointer (target_gdbarch (), ptr_type,
0b62613e 1544 (gdb_byte *) &ptr, addr);
9a043c1d
AC
1545 return ptr;
1546}
1547
a0911fd0 1548static int
fba45db2 1549proc_set_watchpoint (procinfo *pi, CORE_ADDR addr, int len, int wflags)
c3f6f71d 1550{
c3f6f71d 1551 struct {
37de36c6 1552 procfs_ctl_t cmd;
c3f6f71d
JM
1553 char watch[sizeof (prwatch_t)];
1554 } arg;
73930d4d 1555 prwatch_t pwatch;
c3f6f71d 1556
9a043c1d
AC
1557 /* NOTE: cagney/2003-02-01: Even more horrible hack. Need to
1558 convert a target address into something that can be stored in a
1559 native data structure. */
73930d4d 1560 pwatch.pr_vaddr = (uintptr_t) procfs_address_to_host_pointer (addr);
73930d4d
KH
1561 pwatch.pr_size = len;
1562 pwatch.pr_wflags = wflags;
c3f6f71d 1563 arg.cmd = PCWATCH;
73930d4d 1564 memcpy (arg.watch, &pwatch, sizeof (prwatch_t));
c3f6f71d 1565 return (write (pi->ctl_fd, &arg, sizeof (arg)) == sizeof (arg));
c906108c
SS
1566}
1567
965b60ee 1568#if (defined(__i386__) || defined(__x86_64__)) && defined (sun)
c906108c 1569
c3f6f71d 1570#include <sys/sysi86.h>
c906108c 1571
77382aee
PA
1572/* The KEY is actually the value of the lower 16 bits of the GS
1573 register for the LWP that we're interested in. Returns the
1574 matching ssh struct (LDT entry). */
c906108c 1575
337c776f 1576static struct ssd *
c475f569 1577proc_get_LDT_entry (procinfo *pi, int key) /* ARI: editCase function */
c906108c 1578{
c3f6f71d 1579 static struct ssd *ldt_entry = NULL;
c3f6f71d 1580 char pathname[MAX_PROC_NAME_SIZE];
c3f6f71d
JM
1581
1582 /* Allocate space for one LDT entry.
1583 This alloc must persist, because we return a pointer to it. */
1584 if (ldt_entry == NULL)
8d749320 1585 ldt_entry = XNEW (struct ssd);
c3f6f71d
JM
1586
1587 /* Open the file descriptor for the LDT table. */
c475f569 1588 xsnprintf (pathname, sizeof (pathname), "/proc/%d/ldt", pi->pid);
5dc1a704
TT
1589 scoped_fd fd (open_with_retry (pathname, O_RDONLY));
1590 if (fd.get () < 0)
c906108c 1591 {
c3f6f71d
JM
1592 proc_warn (pi, "proc_get_LDT_entry (open)", __LINE__);
1593 return NULL;
c906108c
SS
1594 }
1595
c3f6f71d 1596 /* Now 'read' thru the table, find a match and return it. */
5dc1a704
TT
1597 while (read (fd.get (), ldt_entry, sizeof (struct ssd))
1598 == sizeof (struct ssd))
c906108c 1599 {
c475f569
RO
1600 if (ldt_entry->sel == 0
1601 && ldt_entry->bo == 0
1602 && ldt_entry->acc1 == 0
1603 && ldt_entry->acc2 == 0)
c3f6f71d 1604 break; /* end of table */
0df8b418 1605 /* If key matches, return this entry. */
c3f6f71d 1606 if (ldt_entry->sel == key)
70b33f19 1607 return ldt_entry;
c906108c 1608 }
0df8b418 1609 /* Loop ended, match not found. */
c3f6f71d 1610 return NULL;
c3f6f71d 1611}
c906108c 1612
77382aee 1613/* Returns the pointer to the LDT entry of PTID. */
965b60ee
JB
1614
1615struct ssd *
c475f569 1616procfs_find_LDT_entry (ptid_t ptid) /* ARI: editCase function */
965b60ee
JB
1617{
1618 gdb_gregset_t *gregs;
1619 int key;
1620 procinfo *pi;
1621
0df8b418 1622 /* Find procinfo for the lwp. */
c475f569
RO
1623 pi = find_procinfo (ptid.pid (), ptid.lwp ());
1624 if (pi == NULL)
965b60ee 1625 {
0b62613e 1626 warning (_("procfs_find_LDT_entry: could not find procinfo for %d:%ld."),
e38504b3 1627 ptid.pid (), ptid.lwp ());
965b60ee
JB
1628 return NULL;
1629 }
0df8b418 1630 /* get its general registers. */
c475f569
RO
1631 gregs = proc_get_gregs (pi);
1632 if (gregs == NULL)
965b60ee 1633 {
0b62613e 1634 warning (_("procfs_find_LDT_entry: could not read gregs for %d:%ld."),
e38504b3 1635 ptid.pid (), ptid.lwp ());
965b60ee
JB
1636 return NULL;
1637 }
0df8b418 1638 /* Now extract the GS register's lower 16 bits. */
965b60ee
JB
1639 key = (*gregs)[GS] & 0xffff;
1640
0df8b418 1641 /* Find the matching entry and return it. */
965b60ee
JB
1642 return proc_get_LDT_entry (pi, key);
1643}
1644
1645#endif
c906108c 1646
c3f6f71d 1647/* =============== END, non-thread part of /proc "MODULE" =============== */
c906108c 1648
c3f6f71d 1649/* =================== Thread "MODULE" =================== */
c906108c 1650
44122162
RO
1651/* NOTE: you'll see more ifdefs and duplication of functions here,
1652 since there is a different way to do threads on every OS. */
c906108c 1653
44122162 1654/* Returns the number of threads for the process. */
c906108c 1655
d3581e61 1656static int
fba45db2 1657proc_get_nthreads (procinfo *pi)
c906108c 1658{
c3f6f71d
JM
1659 if (!pi->status_valid)
1660 if (!proc_get_status (pi))
1661 return 0;
c5aa993b 1662
44122162
RO
1663 /* Only works for the process procinfo, because the LWP procinfos do not
1664 get prstatus filled in. */
0df8b418 1665 if (pi->tid != 0) /* Find the parent process procinfo. */
c3f6f71d 1666 pi = find_procinfo_or_die (pi->pid, 0);
c3f6f71d 1667 return pi->prstatus.pr_nlwp;
c906108c
SS
1668}
1669
77382aee
PA
1670/* LWP version.
1671
1672 Return the ID of the thread that had an event of interest.
1673 (ie. the one that hit a breakpoint or other traced event). All
1674 other things being equal, this should be the ID of a thread that is
1675 currently executing. */
c3f6f71d 1676
d3581e61 1677static int
fba45db2 1678proc_get_current_thread (procinfo *pi)
c3f6f71d 1679{
77382aee
PA
1680 /* Note: this should be applied to the root procinfo for the
1681 process, not to the procinfo for an LWP. If applied to the
1682 procinfo for an LWP, it will simply return that LWP's ID. In
1683 that case, find the parent process procinfo. */
19958708 1684
c3f6f71d
JM
1685 if (pi->tid != 0)
1686 pi = find_procinfo_or_die (pi->pid, 0);
1687
1688 if (!pi->status_valid)
1689 if (!proc_get_status (pi))
1690 return 0;
1691
c3f6f71d 1692 return pi->prstatus.pr_lwp.pr_lwpid;
c3f6f71d
JM
1693}
1694
77382aee
PA
1695/* Discover the IDs of all the threads within the process, and create
1696 a procinfo for each of them (chained to the parent). This
1697 unfortunately requires a different method on every OS. Returns
1698 non-zero for success, zero for failure. */
c906108c 1699
a0911fd0 1700static int
fba45db2 1701proc_delete_dead_threads (procinfo *parent, procinfo *thread, void *ignore)
c3f6f71d
JM
1702{
1703 if (thread && parent) /* sanity */
c906108c 1704 {
c3f6f71d
JM
1705 thread->status_valid = 0;
1706 if (!proc_get_status (thread))
1707 destroy_one_procinfo (&parent->thread_list, thread);
1708 }
1709 return 0; /* keep iterating */
1710}
c5aa993b 1711
d3581e61 1712static int
fba45db2 1713proc_update_threads (procinfo *pi)
c3f6f71d
JM
1714{
1715 char pathname[MAX_PROC_NAME_SIZE + 16];
1716 struct dirent *direntry;
c3f6f71d 1717 procinfo *thread;
f0b3976b 1718 gdb_dir_up dirp;
c3f6f71d
JM
1719 int lwpid;
1720
77382aee
PA
1721 /* We should never have to apply this operation to any procinfo
1722 except the one for the main process. If that ever changes for
1723 any reason, then take out the following clause and replace it
1724 with one that makes sure the ctl_fd is open. */
19958708 1725
c3f6f71d
JM
1726 if (pi->tid != 0)
1727 pi = find_procinfo_or_die (pi->pid, 0);
1728
1729 proc_iterate_over_threads (pi, proc_delete_dead_threads, NULL);
1730
05b4bd79
PA
1731 /* Note: this brute-force method was originally devised for Unixware
1732 (support removed since), and will also work on Solaris 2.6 and
1733 2.7. The original comment mentioned the existence of a much
1734 simpler and more elegant way to do this on Solaris, but didn't
1735 point out what that was. */
c3f6f71d
JM
1736
1737 strcpy (pathname, pi->pathname);
1738 strcat (pathname, "/lwp");
f0b3976b
TT
1739 dirp.reset (opendir (pathname));
1740 if (dirp == NULL)
c3f6f71d
JM
1741 proc_error (pi, "update_threads, opendir", __LINE__);
1742
f0b3976b 1743 while ((direntry = readdir (dirp.get ())) != NULL)
c3f6f71d
JM
1744 if (direntry->d_name[0] != '.') /* skip '.' and '..' */
1745 {
1746 lwpid = atoi (&direntry->d_name[0]);
c475f569
RO
1747 thread = create_procinfo (pi->pid, lwpid);
1748 if (thread == NULL)
c3f6f71d
JM
1749 proc_error (pi, "update_threads, create_procinfo", __LINE__);
1750 }
1751 pi->threads_valid = 1;
c3f6f71d
JM
1752 return 1;
1753}
c906108c 1754
77382aee
PA
1755/* Given a pointer to a function, call that function once for each lwp
1756 in the procinfo list, until the function returns non-zero, in which
1757 event return the value returned by the function.
1758
1759 Note: this function does NOT call update_threads. If you want to
1760 discover new threads first, you must call that function explicitly.
1761 This function just makes a quick pass over the currently-known
1762 procinfos.
1763
1764 PI is the parent process procinfo. FUNC is the per-thread
1765 function. PTR is an opaque parameter for function. Returns the
1766 first non-zero return value from the callee, or zero. */
c3f6f71d 1767
d3581e61 1768static int
d0849a9a
KB
1769proc_iterate_over_threads (procinfo *pi,
1770 int (*func) (procinfo *, procinfo *, void *),
1771 void *ptr)
c906108c 1772{
c3f6f71d
JM
1773 procinfo *thread, *next;
1774 int retval = 0;
c906108c 1775
77382aee
PA
1776 /* We should never have to apply this operation to any procinfo
1777 except the one for the main process. If that ever changes for
1778 any reason, then take out the following clause and replace it
1779 with one that makes sure the ctl_fd is open. */
19958708 1780
c3f6f71d
JM
1781 if (pi->tid != 0)
1782 pi = find_procinfo_or_die (pi->pid, 0);
1783
1784 for (thread = pi->thread_list; thread != NULL; thread = next)
c906108c 1785 {
0df8b418 1786 next = thread->next; /* In case thread is destroyed. */
c475f569
RO
1787 retval = (*func) (pi, thread, ptr);
1788 if (retval != 0)
c3f6f71d 1789 break;
c906108c 1790 }
c3f6f71d
JM
1791
1792 return retval;
c906108c
SS
1793}
1794
c3f6f71d
JM
1795/* =================== END, Thread "MODULE" =================== */
1796
1797/* =================== END, /proc "MODULE" =================== */
1798
1799/* =================== GDB "MODULE" =================== */
1800
77382aee
PA
1801/* Here are all of the gdb target vector functions and their
1802 friends. */
c3f6f71d 1803
39f77062 1804static ptid_t do_attach (ptid_t ptid);
6bd6f3b6 1805static void do_detach ();
9185ddce 1806static void proc_trace_syscalls_1 (procinfo *pi, int syscallnum,
77382aee 1807 int entry_or_exit, int mode, int from_tty);
9185ddce 1808
77382aee
PA
1809/* Sets up the inferior to be debugged. Registers to trace signals,
1810 hardware faults, and syscalls. Note: does not set RLC flag: caller
1811 may want to customize that. Returns zero for success (note!
1812 unlike most functions in this module); on failure, returns the LINE
1813 NUMBER where it failed! */
c3f6f71d
JM
1814
1815static int
fba45db2 1816procfs_debug_inferior (procinfo *pi)
c906108c 1817{
c3f6f71d 1818 fltset_t traced_faults;
44122162 1819 sigset_t traced_signals;
37de36c6
KB
1820 sysset_t *traced_syscall_entries;
1821 sysset_t *traced_syscall_exits;
1822 int status;
c906108c 1823
0df8b418
MS
1824 /* Register to trace hardware faults in the child. */
1825 prfillset (&traced_faults); /* trace all faults... */
44122162 1826 prdelset (&traced_faults, FLTPAGE); /* except page fault. */
c3f6f71d
JM
1827 if (!proc_set_traced_faults (pi, &traced_faults))
1828 return __LINE__;
c906108c 1829
2455069d
UW
1830 /* Initially, register to trace all signals in the child. */
1831 prfillset (&traced_signals);
1832 if (!proc_set_traced_signals (pi, &traced_signals))
c3f6f71d
JM
1833 return __LINE__;
1834
37de36c6 1835
c3f6f71d 1836 /* Register to trace the 'exit' system call (on entry). */
c475f569 1837 traced_syscall_entries = XNEW (sysset_t);
44122162
RO
1838 premptyset (traced_syscall_entries);
1839 praddset (traced_syscall_entries, SYS_exit);
1840 praddset (traced_syscall_entries, SYS_lwp_exit);
c906108c 1841
37de36c6
KB
1842 status = proc_set_traced_sysentry (pi, traced_syscall_entries);
1843 xfree (traced_syscall_entries);
1844 if (!status)
c3f6f71d
JM
1845 return __LINE__;
1846
44122162 1847 /* Method for tracing exec syscalls. */
c3f6f71d
JM
1848 /* GW: Rationale...
1849 Not all systems with /proc have all the exec* syscalls with the same
1850 names. On the SGI, for example, there is no SYS_exec, but there
0df8b418 1851 *is* a SYS_execv. So, we try to account for that. */
c3f6f71d 1852
c475f569 1853 traced_syscall_exits = XNEW (sysset_t);
44122162 1854 premptyset (traced_syscall_exits);
c3f6f71d 1855#ifdef SYS_exec
44122162 1856 praddset (traced_syscall_exits, SYS_exec);
37de36c6 1857#endif
44122162
RO
1858 praddset (traced_syscall_exits, SYS_execve);
1859 praddset (traced_syscall_exits, SYS_lwp_create);
1860 praddset (traced_syscall_exits, SYS_lwp_exit);
c906108c 1861
37de36c6
KB
1862 status = proc_set_traced_sysexit (pi, traced_syscall_exits);
1863 xfree (traced_syscall_exits);
1864 if (!status)
c3f6f71d
JM
1865 return __LINE__;
1866
c3f6f71d 1867 return 0;
c906108c
SS
1868}
1869
f6ac5f3d
PA
1870void
1871procfs_target::attach (const char *args, int from_tty)
c906108c 1872{
c3f6f71d
JM
1873 char *exec_file;
1874 int pid;
1875
74164c56 1876 pid = parse_pid_to_attach (args);
c3f6f71d 1877
c3f6f71d 1878 if (pid == getpid ())
8a3fe4f8 1879 error (_("Attaching GDB to itself is not a good idea..."));
c906108c 1880
c3f6f71d 1881 if (from_tty)
c906108c 1882 {
c3f6f71d
JM
1883 exec_file = get_exec_file (0);
1884
1885 if (exec_file)
a3f17187 1886 printf_filtered (_("Attaching to program `%s', %s\n"),
f2907e49 1887 exec_file, target_pid_to_str (ptid_t (pid)));
c3f6f71d 1888 else
a3f17187 1889 printf_filtered (_("Attaching to %s\n"),
f2907e49 1890 target_pid_to_str (ptid_t (pid)));
c3f6f71d
JM
1891
1892 fflush (stdout);
c906108c 1893 }
f2907e49 1894 inferior_ptid = do_attach (ptid_t (pid));
f6ac5f3d
PA
1895 if (!target_is_pushed (this))
1896 push_target (this);
c3f6f71d
JM
1897}
1898
f6ac5f3d
PA
1899void
1900procfs_target::detach (inferior *inf, int from_tty)
c3f6f71d 1901{
e99b03dc 1902 int pid = inferior_ptid.pid ();
cc377e6b 1903
c3f6f71d 1904 if (from_tty)
c906108c 1905 {
995816ba 1906 const char *exec_file;
cc377e6b 1907
c3f6f71d 1908 exec_file = get_exec_file (0);
cc377e6b 1909 if (exec_file == NULL)
c3f6f71d 1910 exec_file = "";
cc377e6b 1911
a3f17187 1912 printf_filtered (_("Detaching from program: %s, %s\n"), exec_file,
f2907e49 1913 target_pid_to_str (ptid_t (pid)));
cc377e6b 1914 gdb_flush (gdb_stdout);
c906108c 1915 }
19958708 1916
6bd6f3b6 1917 do_detach ();
cc377e6b 1918
39f77062 1919 inferior_ptid = null_ptid;
b7a08269 1920 detach_inferior (inf);
f6ac5f3d 1921 maybe_unpush_target ();
c906108c
SS
1922}
1923
39f77062
KB
1924static ptid_t
1925do_attach (ptid_t ptid)
c906108c 1926{
c3f6f71d 1927 procinfo *pi;
181e7f93 1928 struct inferior *inf;
c3f6f71d 1929 int fail;
2689673f 1930 int lwpid;
c3f6f71d 1931
c475f569
RO
1932 pi = create_procinfo (ptid.pid (), 0);
1933 if (pi == NULL)
8a3fe4f8 1934 perror (_("procfs: out of memory in 'attach'"));
c3f6f71d
JM
1935
1936 if (!open_procinfo_files (pi, FD_CTL))
1937 {
1938 fprintf_filtered (gdb_stderr, "procfs:%d -- ", __LINE__);
c475f569
RO
1939 xsnprintf (errmsg, sizeof (errmsg),
1940 "do_attach: couldn't open /proc file for process %d",
1941 ptid.pid ());
c3f6f71d
JM
1942 dead_procinfo (pi, errmsg, NOKILL);
1943 }
c906108c 1944
c3f6f71d
JM
1945 /* Stop the process (if it isn't already stopped). */
1946 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
c906108c 1947 {
c3f6f71d
JM
1948 pi->was_stopped = 1;
1949 proc_prettyprint_why (proc_why (pi), proc_what (pi), 1);
c906108c
SS
1950 }
1951 else
1952 {
c3f6f71d
JM
1953 pi->was_stopped = 0;
1954 /* Set the process to run again when we close it. */
1955 if (!proc_set_run_on_last_close (pi))
1956 dead_procinfo (pi, "do_attach: couldn't set RLC.", NOKILL);
1957
0df8b418 1958 /* Now stop the process. */
c3f6f71d
JM
1959 if (!proc_stop_process (pi))
1960 dead_procinfo (pi, "do_attach: couldn't stop the process.", NOKILL);
1961 pi->ignore_next_sigstop = 1;
c906108c 1962 }
c3f6f71d
JM
1963 /* Save some of the /proc state to be restored if we detach. */
1964 if (!proc_get_traced_faults (pi, &pi->saved_fltset))
1965 dead_procinfo (pi, "do_attach: couldn't save traced faults.", NOKILL);
1966 if (!proc_get_traced_signals (pi, &pi->saved_sigset))
1967 dead_procinfo (pi, "do_attach: couldn't save traced signals.", NOKILL);
37de36c6 1968 if (!proc_get_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d
JM
1969 dead_procinfo (pi, "do_attach: couldn't save traced syscall entries.",
1970 NOKILL);
37de36c6 1971 if (!proc_get_traced_sysexit (pi, pi->saved_exitset))
19958708 1972 dead_procinfo (pi, "do_attach: couldn't save traced syscall exits.",
c3f6f71d
JM
1973 NOKILL);
1974 if (!proc_get_held_signals (pi, &pi->saved_sighold))
1975 dead_procinfo (pi, "do_attach: couldn't save held signals.", NOKILL);
1976
c475f569
RO
1977 fail = procfs_debug_inferior (pi);
1978 if (fail != 0)
c3f6f71d
JM
1979 dead_procinfo (pi, "do_attach: failed in procfs_debug_inferior", NOKILL);
1980
6c95b8df
PA
1981 inf = current_inferior ();
1982 inferior_appeared (inf, pi->pid);
c3f6f71d 1983 /* Let GDB know that the inferior was attached. */
181e7f93 1984 inf->attach_flag = 1;
2689673f
PA
1985
1986 /* Create a procinfo for the current lwp. */
1987 lwpid = proc_get_current_thread (pi);
1988 create_procinfo (pi->pid, lwpid);
1989
1990 /* Add it to gdb's thread list. */
fd79271b 1991 ptid = ptid_t (pi->pid, lwpid, 0);
2689673f
PA
1992 add_thread (ptid);
1993
1994 return ptid;
c906108c
SS
1995}
1996
1997static void
6bd6f3b6 1998do_detach ()
c906108c 1999{
c3f6f71d 2000 procinfo *pi;
c906108c 2001
0df8b418 2002 /* Find procinfo for the main process. */
e99b03dc 2003 pi = find_procinfo_or_die (inferior_ptid.pid (),
dfd4cc63 2004 0); /* FIXME: threads */
c5aa993b 2005
c3f6f71d
JM
2006 if (!proc_set_traced_signals (pi, &pi->saved_sigset))
2007 proc_warn (pi, "do_detach, set_traced_signal", __LINE__);
c906108c 2008
c3f6f71d
JM
2009 if (!proc_set_traced_faults (pi, &pi->saved_fltset))
2010 proc_warn (pi, "do_detach, set_traced_faults", __LINE__);
2011
37de36c6 2012 if (!proc_set_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d
JM
2013 proc_warn (pi, "do_detach, set_traced_sysentry", __LINE__);
2014
37de36c6 2015 if (!proc_set_traced_sysexit (pi, pi->saved_exitset))
c3f6f71d
JM
2016 proc_warn (pi, "do_detach, set_traced_sysexit", __LINE__);
2017
2018 if (!proc_set_held_signals (pi, &pi->saved_sighold))
2019 proc_warn (pi, "do_detach, set_held_signals", __LINE__);
2020
6bd6f3b6
SM
2021 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
2022 if (!(pi->was_stopped)
2023 || query (_("Was stopped when attached, make it runnable again? ")))
c3f6f71d
JM
2024 {
2025 /* Clear any pending signal. */
2026 if (!proc_clear_current_fault (pi))
2027 proc_warn (pi, "do_detach, clear_current_fault", __LINE__);
2028
6bd6f3b6 2029 if (!proc_clear_current_signal (pi))
1a303dec
MS
2030 proc_warn (pi, "do_detach, clear_current_signal", __LINE__);
2031
c3f6f71d
JM
2032 if (!proc_set_run_on_last_close (pi))
2033 proc_warn (pi, "do_detach, set_rlc", __LINE__);
2034 }
2035
c3f6f71d 2036 destroy_procinfo (pi);
c906108c
SS
2037}
2038
772cf8be
MK
2039/* Fetch register REGNUM from the inferior. If REGNUM is -1, do this
2040 for all registers.
2041
2042 ??? Is the following note still relevant? We can't get individual
2043 registers with the PT_GETREGS ptrace(2) request either, yet we
2044 don't bother with caching at all in that case.
2045
2046 NOTE: Since the /proc interface cannot give us individual
2047 registers, we pay no attention to REGNUM, and just fetch them all.
2048 This results in the possibility that we will do unnecessarily many
2049 fetches, since we may be called repeatedly for individual
2050 registers. So we cache the results, and mark the cache invalid
2051 when the process is resumed. */
c3f6f71d 2052
f6ac5f3d
PA
2053void
2054procfs_target::fetch_registers (struct regcache *regcache, int regnum)
c906108c 2055{
772cf8be
MK
2056 gdb_gregset_t *gregs;
2057 procinfo *pi;
222312d3 2058 ptid_t ptid = regcache->ptid ();
e99b03dc 2059 int pid = ptid.pid ();
e38504b3 2060 int tid = ptid.lwp ();
ac7936df 2061 struct gdbarch *gdbarch = regcache->arch ();
c3f6f71d 2062
2689673f 2063 pi = find_procinfo_or_die (pid, tid);
c3f6f71d
JM
2064
2065 if (pi == NULL)
8a3fe4f8 2066 error (_("procfs: fetch_registers failed to find procinfo for %s"),
bcc0c096 2067 target_pid_to_str (ptid));
c3f6f71d 2068
772cf8be
MK
2069 gregs = proc_get_gregs (pi);
2070 if (gregs == NULL)
c3f6f71d
JM
2071 proc_error (pi, "fetch_registers, get_gregs", __LINE__);
2072
56be3814 2073 supply_gregset (regcache, (const gdb_gregset_t *) gregs);
c3f6f71d 2074
40a6adc1 2075 if (gdbarch_fp0_regnum (gdbarch) >= 0) /* Do we have an FPU? */
60054393 2076 {
772cf8be
MK
2077 gdb_fpregset_t *fpregs;
2078
40a6adc1
MD
2079 if ((regnum >= 0 && regnum < gdbarch_fp0_regnum (gdbarch))
2080 || regnum == gdbarch_pc_regnum (gdbarch)
2081 || regnum == gdbarch_sp_regnum (gdbarch))
772cf8be 2082 return; /* Not a floating point register. */
c5aa993b 2083
772cf8be
MK
2084 fpregs = proc_get_fpregs (pi);
2085 if (fpregs == NULL)
60054393 2086 proc_error (pi, "fetch_registers, get_fpregs", __LINE__);
c906108c 2087
56be3814 2088 supply_fpregset (regcache, (const gdb_fpregset_t *) fpregs);
60054393 2089 }
c906108c
SS
2090}
2091
772cf8be
MK
2092/* Store register REGNUM back into the inferior. If REGNUM is -1, do
2093 this for all registers.
2094
2095 NOTE: Since the /proc interface will not read individual registers,
2096 we will cache these requests until the process is resumed, and only
2097 then write them back to the inferior process.
77382aee 2098
772cf8be
MK
2099 FIXME: is that a really bad idea? Have to think about cases where
2100 writing one register might affect the value of others, etc. */
c906108c 2101
f6ac5f3d
PA
2102void
2103procfs_target::store_registers (struct regcache *regcache, int regnum)
c3f6f71d 2104{
772cf8be
MK
2105 gdb_gregset_t *gregs;
2106 procinfo *pi;
222312d3 2107 ptid_t ptid = regcache->ptid ();
e99b03dc 2108 int pid = ptid.pid ();
e38504b3 2109 int tid = ptid.lwp ();
ac7936df 2110 struct gdbarch *gdbarch = regcache->arch ();
c3f6f71d 2111
2689673f 2112 pi = find_procinfo_or_die (pid, tid);
c3f6f71d
JM
2113
2114 if (pi == NULL)
8a3fe4f8 2115 error (_("procfs: store_registers: failed to find procinfo for %s"),
bcc0c096 2116 target_pid_to_str (ptid));
c906108c 2117
772cf8be
MK
2118 gregs = proc_get_gregs (pi);
2119 if (gregs == NULL)
c3f6f71d 2120 proc_error (pi, "store_registers, get_gregs", __LINE__);
c906108c 2121
56be3814 2122 fill_gregset (regcache, gregs, regnum);
c3f6f71d
JM
2123 if (!proc_set_gregs (pi))
2124 proc_error (pi, "store_registers, set_gregs", __LINE__);
c906108c 2125
40a6adc1 2126 if (gdbarch_fp0_regnum (gdbarch) >= 0) /* Do we have an FPU? */
60054393 2127 {
772cf8be
MK
2128 gdb_fpregset_t *fpregs;
2129
40a6adc1
MD
2130 if ((regnum >= 0 && regnum < gdbarch_fp0_regnum (gdbarch))
2131 || regnum == gdbarch_pc_regnum (gdbarch)
2132 || regnum == gdbarch_sp_regnum (gdbarch))
772cf8be 2133 return; /* Not a floating point register. */
60054393 2134
772cf8be
MK
2135 fpregs = proc_get_fpregs (pi);
2136 if (fpregs == NULL)
60054393
MS
2137 proc_error (pi, "store_registers, get_fpregs", __LINE__);
2138
56be3814 2139 fill_fpregset (regcache, fpregs, regnum);
60054393
MS
2140 if (!proc_set_fpregs (pi))
2141 proc_error (pi, "store_registers, set_fpregs", __LINE__);
2142 }
c3f6f71d 2143}
c906108c 2144
37de36c6
KB
2145static int
2146syscall_is_lwp_exit (procinfo *pi, int scall)
2147{
37de36c6
KB
2148 if (scall == SYS_lwp_exit)
2149 return 1;
37de36c6
KB
2150 return 0;
2151}
2152
2153static int
2154syscall_is_exit (procinfo *pi, int scall)
2155{
37de36c6
KB
2156 if (scall == SYS_exit)
2157 return 1;
37de36c6
KB
2158 return 0;
2159}
2160
2161static int
2162syscall_is_exec (procinfo *pi, int scall)
2163{
2164#ifdef SYS_exec
2165 if (scall == SYS_exec)
2166 return 1;
2167#endif
37de36c6
KB
2168 if (scall == SYS_execve)
2169 return 1;
37de36c6
KB
2170 return 0;
2171}
2172
2173static int
2174syscall_is_lwp_create (procinfo *pi, int scall)
2175{
37de36c6
KB
2176 if (scall == SYS_lwp_create)
2177 return 1;
37de36c6
KB
2178 return 0;
2179}
2180
77382aee
PA
2181/* Retrieve the next stop event from the child process. If child has
2182 not stopped yet, wait for it to stop. Translate /proc eventcodes
2183 (or possibly wait eventcodes) into gdb internal event codes.
2184 Returns the id of process (and possibly thread) that incurred the
2185 event. Event codes are returned through a pointer parameter. */
c906108c 2186
f6ac5f3d
PA
2187ptid_t
2188procfs_target::wait (ptid_t ptid, struct target_waitstatus *status,
2189 int options)
c906108c 2190{
0df8b418 2191 /* First cut: loosely based on original version 2.1. */
c3f6f71d 2192 procinfo *pi;
39f77062
KB
2193 int wstat;
2194 int temp_tid;
2195 ptid_t retval, temp_ptid;
c3f6f71d
JM
2196 int why, what, flags;
2197 int retry = 0;
c906108c 2198
c3f6f71d 2199wait_again:
c906108c 2200
c3f6f71d
JM
2201 retry++;
2202 wstat = 0;
f2907e49 2203 retval = ptid_t (-1);
c906108c 2204
0df8b418 2205 /* Find procinfo for main process. */
e99b03dc 2206 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c3f6f71d 2207 if (pi)
c906108c 2208 {
0df8b418 2209 /* We must assume that the status is stale now... */
c3f6f71d
JM
2210 pi->status_valid = 0;
2211 pi->gregs_valid = 0;
2212 pi->fpregs_valid = 0;
2213
0df8b418 2214#if 0 /* just try this out... */
c3f6f71d
JM
2215 flags = proc_flags (pi);
2216 why = proc_why (pi);
2217 if ((flags & PR_STOPPED) && (why == PR_REQUESTED))
0df8b418 2218 pi->status_valid = 0; /* re-read again, IMMEDIATELY... */
c3f6f71d
JM
2219#endif
2220 /* If child is not stopped, wait for it to stop. */
c475f569
RO
2221 if (!(proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
2222 && !proc_wait_for_stop (pi))
c906108c 2223 {
0df8b418 2224 /* wait_for_stop failed: has the child terminated? */
c3f6f71d 2225 if (errno == ENOENT)
c906108c 2226 {
39f77062
KB
2227 int wait_retval;
2228
0df8b418 2229 /* /proc file not found; presumably child has terminated. */
f6ac5f3d 2230 wait_retval = ::wait (&wstat); /* "wait" for the child's exit. */
c3f6f71d 2231
dfd4cc63 2232 /* Wrong child? */
e99b03dc 2233 if (wait_retval != inferior_ptid.pid ())
3e43a32a
MS
2234 error (_("procfs: couldn't stop "
2235 "process %d: wait returned %d."),
e99b03dc 2236 inferior_ptid.pid (), wait_retval);
c3f6f71d 2237 /* FIXME: might I not just use waitpid?
0df8b418 2238 Or try find_procinfo to see if I know about this child? */
f2907e49 2239 retval = ptid_t (wait_retval);
c906108c 2240 }
d1566ff5
FN
2241 else if (errno == EINTR)
2242 goto wait_again;
c3f6f71d 2243 else
c906108c 2244 {
0df8b418 2245 /* Unknown error from wait_for_stop. */
c3f6f71d 2246 proc_error (pi, "target_wait (wait_for_stop)", __LINE__);
c906108c 2247 }
c3f6f71d
JM
2248 }
2249 else
2250 {
2251 /* This long block is reached if either:
2252 a) the child was already stopped, or
2253 b) we successfully waited for the child with wait_for_stop.
2254 This block will analyze the /proc status, and translate it
2255 into a waitstatus for GDB.
2256
2257 If we actually had to call wait because the /proc file
19958708 2258 is gone (child terminated), then we skip this block,
c3f6f71d
JM
2259 because we already have a waitstatus. */
2260
2261 flags = proc_flags (pi);
2262 why = proc_why (pi);
2263 what = proc_what (pi);
2264
c3f6f71d 2265 if (flags & (PR_STOPPED | PR_ISTOP))
c906108c 2266 {
c3f6f71d
JM
2267 /* If it's running async (for single_thread control),
2268 set it back to normal again. */
2269 if (flags & PR_ASYNC)
2270 if (!proc_unset_async (pi))
2271 proc_error (pi, "target_wait, unset_async", __LINE__);
c3f6f71d
JM
2272
2273 if (info_verbose)
2274 proc_prettyprint_why (why, what, 1);
2275
2276 /* The 'pid' we will return to GDB is composed of
2277 the process ID plus the lwp ID. */
fd79271b 2278 retval = ptid_t (pi->pid, proc_get_current_thread (pi), 0);
c3f6f71d
JM
2279
2280 switch (why) {
2281 case PR_SIGNALLED:
2282 wstat = (what << 8) | 0177;
2283 break;
2284 case PR_SYSENTRY:
37de36c6 2285 if (syscall_is_lwp_exit (pi, what))
c3f6f71d 2286 {
17faa917
DJ
2287 if (print_thread_events)
2288 printf_unfiltered (_("[%s exited]\n"),
2289 target_pid_to_str (retval));
b7a08269 2290 delete_thread (find_thread_ptid (retval));
37de36c6
KB
2291 status->kind = TARGET_WAITKIND_SPURIOUS;
2292 return retval;
2293 }
2294 else if (syscall_is_exit (pi, what))
2295 {
181e7f93
PA
2296 struct inferior *inf;
2297
0df8b418 2298 /* Handle SYS_exit call only. */
37de36c6 2299 /* Stopped at entry to SYS_exit.
19958708 2300 Make it runnable, resume it, then use
37de36c6 2301 the wait system call to get its exit code.
19958708 2302 Proc_run_process always clears the current
37de36c6
KB
2303 fault and signal.
2304 Then return its exit status. */
2305 pi->status_valid = 0;
2306 wstat = 0;
19958708 2307 /* FIXME: what we should do is return
37de36c6
KB
2308 TARGET_WAITKIND_SPURIOUS. */
2309 if (!proc_run_process (pi, 0, 0))
2310 proc_error (pi, "target_wait, run_process", __LINE__);
181e7f93
PA
2311
2312 inf = find_inferior_pid (pi->pid);
2313 if (inf->attach_flag)
c3f6f71d 2314 {
19958708 2315 /* Don't call wait: simulate waiting for exit,
37de36c6
KB
2316 return a "success" exit code. Bogus: what if
2317 it returns something else? */
2318 wstat = 0;
39f77062 2319 retval = inferior_ptid; /* ? ? ? */
37de36c6
KB
2320 }
2321 else
2322 {
f6ac5f3d 2323 int temp = ::wait (&wstat);
37de36c6
KB
2324
2325 /* FIXME: shouldn't I make sure I get the right
2326 event from the right process? If (for
2327 instance) I have killed an earlier inferior
2328 process but failed to clean up after it
2329 somehow, I could get its termination event
2330 here. */
2331
0df8b418
MS
2332 /* If wait returns -1, that's what we return
2333 to GDB. */
37de36c6 2334 if (temp < 0)
f2907e49 2335 retval = ptid_t (temp);
c3f6f71d 2336 }
c3f6f71d 2337 }
37de36c6
KB
2338 else
2339 {
a3f17187 2340 printf_filtered (_("procfs: trapped on entry to "));
37de36c6
KB
2341 proc_prettyprint_syscall (proc_what (pi), 0);
2342 printf_filtered ("\n");
44122162
RO
2343
2344 long i, nsysargs, *sysargs;
2345
c475f569
RO
2346 nsysargs = proc_nsysarg (pi);
2347 sysargs = proc_sysargs (pi);
2348
2349 if (nsysargs > 0 && sysargs != NULL)
44122162
RO
2350 {
2351 printf_filtered (_("%ld syscall arguments:\n"),
2352 nsysargs);
2353 for (i = 0; i < nsysargs; i++)
2354 printf_filtered ("#%ld: 0x%08lx\n",
2355 i, sysargs[i]);
2356 }
2357
37de36c6
KB
2358 if (status)
2359 {
0df8b418
MS
2360 /* How to exit gracefully, returning "unknown
2361 event". */
37de36c6 2362 status->kind = TARGET_WAITKIND_SPURIOUS;
39f77062 2363 return inferior_ptid;
37de36c6
KB
2364 }
2365 else
2366 {
2367 /* How to keep going without returning to wfi: */
049a8570 2368 target_continue_no_signal (ptid);
37de36c6
KB
2369 goto wait_again;
2370 }
2371 }
2372 break;
2373 case PR_SYSEXIT:
2374 if (syscall_is_exec (pi, what))
c3f6f71d 2375 {
37de36c6
KB
2376 /* Hopefully this is our own "fork-child" execing
2377 the real child. Hoax this event into a trap, and
2378 GDB will see the child about to execute its start
0df8b418 2379 address. */
37de36c6
KB
2380 wstat = (SIGTRAP << 8) | 0177;
2381 }
2382 else if (syscall_is_lwp_create (pi, what))
2383 {
77382aee
PA
2384 /* This syscall is somewhat like fork/exec. We
2385 will get the event twice: once for the parent
2386 LWP, and once for the child. We should already
2387 know about the parent LWP, but the child will
2388 be new to us. So, whenever we get this event,
2389 if it represents a new thread, simply add the
2390 thread to the list. */
c3f6f71d 2391
37de36c6 2392 /* If not in procinfo list, add it. */
39f77062
KB
2393 temp_tid = proc_get_current_thread (pi);
2394 if (!find_procinfo (pi->pid, temp_tid))
2395 create_procinfo (pi->pid, temp_tid);
37de36c6 2396
fd79271b 2397 temp_ptid = ptid_t (pi->pid, temp_tid, 0);
37de36c6 2398 /* If not in GDB's thread list, add it. */
39f77062 2399 if (!in_thread_list (temp_ptid))
93815fbf
VP
2400 add_thread (temp_ptid);
2401
0df8b418 2402 /* Return to WFI, but tell it to immediately resume. */
37de36c6 2403 status->kind = TARGET_WAITKIND_SPURIOUS;
39f77062 2404 return inferior_ptid;
37de36c6
KB
2405 }
2406 else if (syscall_is_lwp_exit (pi, what))
2407 {
17faa917
DJ
2408 if (print_thread_events)
2409 printf_unfiltered (_("[%s exited]\n"),
2410 target_pid_to_str (retval));
b7a08269 2411 delete_thread (find_thread_ptid (retval));
37de36c6
KB
2412 status->kind = TARGET_WAITKIND_SPURIOUS;
2413 return retval;
c3f6f71d 2414 }
37de36c6
KB
2415 else if (0)
2416 {
2417 /* FIXME: Do we need to handle SYS_sproc,
2418 SYS_fork, or SYS_vfork here? The old procfs
2419 seemed to use this event to handle threads on
2420 older (non-LWP) systems, where I'm assuming
19958708 2421 that threads were actually separate processes.
37de36c6
KB
2422 Irix, maybe? Anyway, low priority for now. */
2423 }
2424 else
2425 {
a3f17187 2426 printf_filtered (_("procfs: trapped on exit from "));
37de36c6
KB
2427 proc_prettyprint_syscall (proc_what (pi), 0);
2428 printf_filtered ("\n");
44122162
RO
2429
2430 long i, nsysargs, *sysargs;
2431
c475f569
RO
2432 nsysargs = proc_nsysarg (pi);
2433 sysargs = proc_sysargs (pi);
2434
2435 if (nsysargs > 0 && sysargs != NULL)
44122162
RO
2436 {
2437 printf_filtered (_("%ld syscall arguments:\n"),
2438 nsysargs);
2439 for (i = 0; i < nsysargs; i++)
2440 printf_filtered ("#%ld: 0x%08lx\n",
2441 i, sysargs[i]);
2442 }
2443
37de36c6 2444 status->kind = TARGET_WAITKIND_SPURIOUS;
39f77062 2445 return inferior_ptid;
37de36c6 2446 }
c3f6f71d
JM
2447 break;
2448 case PR_REQUESTED:
2449#if 0 /* FIXME */
2450 wstat = (SIGSTOP << 8) | 0177;
2451 break;
2452#else
2453 if (retry < 5)
2454 {
a3f17187 2455 printf_filtered (_("Retry #%d:\n"), retry);
c3f6f71d
JM
2456 pi->status_valid = 0;
2457 goto wait_again;
2458 }
2459 else
2460 {
2461 /* If not in procinfo list, add it. */
39f77062
KB
2462 temp_tid = proc_get_current_thread (pi);
2463 if (!find_procinfo (pi->pid, temp_tid))
2464 create_procinfo (pi->pid, temp_tid);
c3f6f71d
JM
2465
2466 /* If not in GDB's thread list, add it. */
fd79271b 2467 temp_ptid = ptid_t (pi->pid, temp_tid, 0);
39f77062 2468 if (!in_thread_list (temp_ptid))
93815fbf 2469 add_thread (temp_ptid);
c3f6f71d
JM
2470
2471 status->kind = TARGET_WAITKIND_STOPPED;
b196bc4c 2472 status->value.sig = GDB_SIGNAL_0;
c3f6f71d
JM
2473 return retval;
2474 }
2475#endif
2476 case PR_JOBCONTROL:
2477 wstat = (what << 8) | 0177;
2478 break;
2479 case PR_FAULTED:
7af6341f 2480 switch (what) {
c3f6f71d
JM
2481 case FLTWATCH:
2482 wstat = (SIGTRAP << 8) | 0177;
2483 break;
0df8b418 2484 /* FIXME: use si_signo where possible. */
c3f6f71d 2485 case FLTPRIV:
c3f6f71d 2486 case FLTILL:
c3f6f71d
JM
2487 wstat = (SIGILL << 8) | 0177;
2488 break;
2489 case FLTBPT:
c3f6f71d 2490 case FLTTRACE:
c3f6f71d
JM
2491 wstat = (SIGTRAP << 8) | 0177;
2492 break;
2493 case FLTSTACK:
2494 case FLTACCESS:
c3f6f71d 2495 case FLTBOUNDS:
c3f6f71d
JM
2496 wstat = (SIGSEGV << 8) | 0177;
2497 break;
2498 case FLTIOVF:
2499 case FLTIZDIV:
c3f6f71d 2500 case FLTFPE:
c3f6f71d
JM
2501 wstat = (SIGFPE << 8) | 0177;
2502 break;
3e43a32a 2503 case FLTPAGE: /* Recoverable page fault */
0df8b418
MS
2504 default: /* FIXME: use si_signo if possible for
2505 fault. */
f2907e49 2506 retval = ptid_t (-1);
c3f6f71d 2507 printf_filtered ("procfs:%d -- ", __LINE__);
a3f17187 2508 printf_filtered (_("child stopped for unknown reason:\n"));
c3f6f71d 2509 proc_prettyprint_why (why, what, 1);
8a3fe4f8 2510 error (_("... giving up..."));
c3f6f71d
JM
2511 break;
2512 }
2513 break; /* case PR_FAULTED: */
2514 default: /* switch (why) unmatched */
2515 printf_filtered ("procfs:%d -- ", __LINE__);
a3f17187 2516 printf_filtered (_("child stopped for unknown reason:\n"));
c3f6f71d 2517 proc_prettyprint_why (why, what, 1);
8a3fe4f8 2518 error (_("... giving up..."));
c3f6f71d
JM
2519 break;
2520 }
77382aee
PA
2521 /* Got this far without error: If retval isn't in the
2522 threads database, add it. */
c475f569
RO
2523 if (retval.pid () > 0
2524 && retval != inferior_ptid
2525 && !in_thread_list (retval))
c906108c 2526 {
77382aee
PA
2527 /* We have a new thread. We need to add it both to
2528 GDB's list and to our own. If we don't create a
2529 procinfo, resume may be unhappy later. */
c3f6f71d 2530 add_thread (retval);
e99b03dc 2531 if (find_procinfo (retval.pid (),
e38504b3 2532 retval.lwp ()) == NULL)
e99b03dc 2533 create_procinfo (retval.pid (),
e38504b3 2534 retval.lwp ());
c906108c 2535 }
c906108c 2536 }
0df8b418 2537 else /* Flags do not indicate STOPPED. */
c906108c 2538 {
0df8b418 2539 /* surely this can't happen... */
c3f6f71d
JM
2540 printf_filtered ("procfs:%d -- process not stopped.\n",
2541 __LINE__);
2542 proc_prettyprint_flags (flags, 1);
8a3fe4f8 2543 error (_("procfs: ...giving up..."));
c906108c 2544 }
c906108c 2545 }
c906108c 2546
c3f6f71d
JM
2547 if (status)
2548 store_waitstatus (status, wstat);
c906108c
SS
2549 }
2550
c3f6f71d
JM
2551 return retval;
2552}
c906108c 2553
4e73f23d
RM
2554/* Perform a partial transfer to/from the specified object. For
2555 memory transfers, fall back to the old memory xfer functions. */
2556
f6ac5f3d
PA
2557enum target_xfer_status
2558procfs_target::xfer_partial (enum target_object object,
2559 const char *annex, gdb_byte *readbuf,
2560 const gdb_byte *writebuf, ULONGEST offset,
2561 ULONGEST len, ULONGEST *xfered_len)
4e73f23d
RM
2562{
2563 switch (object)
2564 {
2565 case TARGET_OBJECT_MEMORY:
e96027e0 2566 return procfs_xfer_memory (readbuf, writebuf, offset, len, xfered_len);
4e73f23d 2567
4e73f23d 2568 case TARGET_OBJECT_AUXV:
f6ac5f3d 2569 return memory_xfer_auxv (this, object, annex, readbuf, writebuf,
9b409511 2570 offset, len, xfered_len);
4e73f23d
RM
2571
2572 default:
4360561f
TT
2573 return this->beneath ()->xfer_partial (object, annex,
2574 readbuf, writebuf, offset, len,
2575 xfered_len);
4e73f23d
RM
2576 }
2577}
2578
e96027e0
PA
2579/* Helper for procfs_xfer_partial that handles memory transfers.
2580 Arguments are like target_xfer_partial. */
4e73f23d 2581
e96027e0
PA
2582static enum target_xfer_status
2583procfs_xfer_memory (gdb_byte *readbuf, const gdb_byte *writebuf,
2584 ULONGEST memaddr, ULONGEST len, ULONGEST *xfered_len)
c3f6f71d
JM
2585{
2586 procinfo *pi;
e96027e0 2587 int nbytes;
c906108c 2588
0df8b418 2589 /* Find procinfo for main process. */
e99b03dc 2590 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c475f569 2591 if (pi->as_fd == 0 && open_procinfo_files (pi, FD_AS) == 0)
c906108c 2592 {
c3f6f71d 2593 proc_warn (pi, "xfer_memory, open_proc_files", __LINE__);
e96027e0 2594 return TARGET_XFER_E_IO;
c906108c 2595 }
c906108c 2596
e96027e0
PA
2597 if (lseek (pi->as_fd, (off_t) memaddr, SEEK_SET) != (off_t) memaddr)
2598 return TARGET_XFER_E_IO;
2599
2600 if (writebuf != NULL)
c906108c 2601 {
e96027e0
PA
2602 PROCFS_NOTE ("write memory:\n");
2603 nbytes = write (pi->as_fd, writebuf, len);
2604 }
2605 else
2606 {
2607 PROCFS_NOTE ("read memory:\n");
2608 nbytes = read (pi->as_fd, readbuf, len);
c906108c 2609 }
e96027e0
PA
2610 if (nbytes <= 0)
2611 return TARGET_XFER_E_IO;
2612 *xfered_len = nbytes;
2613 return TARGET_XFER_OK;
c906108c
SS
2614}
2615
77382aee
PA
2616/* Called by target_resume before making child runnable. Mark cached
2617 registers and status's invalid. If there are "dirty" caches that
2618 need to be written back to the child process, do that.
c906108c 2619
77382aee
PA
2620 File descriptors are also cached. As they are a limited resource,
2621 we cannot hold onto them indefinitely. However, as they are
2622 expensive to open, we don't want to throw them away
2623 indescriminately either. As a compromise, we will keep the file
2624 descriptors for the parent process, but discard any file
2625 descriptors we may have accumulated for the threads.
2626
2627 As this function is called by iterate_over_threads, it always
2628 returns zero (so that iterate_over_threads will keep
2629 iterating). */
c3f6f71d
JM
2630
2631static int
fba45db2 2632invalidate_cache (procinfo *parent, procinfo *pi, void *ptr)
c906108c 2633{
77382aee
PA
2634 /* About to run the child; invalidate caches and do any other
2635 cleanup. */
c906108c 2636
c3f6f71d
JM
2637#if 0
2638 if (pi->gregs_dirty)
c475f569 2639 if (parent == NULL || proc_get_current_thread (parent) != pi->tid)
c3f6f71d
JM
2640 if (!proc_set_gregs (pi)) /* flush gregs cache */
2641 proc_warn (pi, "target_resume, set_gregs",
2642 __LINE__);
f5656ead 2643 if (gdbarch_fp0_regnum (target_gdbarch ()) >= 0)
60054393 2644 if (pi->fpregs_dirty)
c475f569 2645 if (parent == NULL || proc_get_current_thread (parent) != pi->tid)
60054393 2646 if (!proc_set_fpregs (pi)) /* flush fpregs cache */
19958708 2647 proc_warn (pi, "target_resume, set_fpregs",
60054393 2648 __LINE__);
c906108c 2649#endif
c906108c 2650
c3f6f71d 2651 if (parent != NULL)
c906108c 2652 {
c3f6f71d 2653 /* The presence of a parent indicates that this is an LWP.
19958708 2654 Close any file descriptors that it might have open.
c3f6f71d
JM
2655 We don't do this to the master (parent) procinfo. */
2656
2657 close_procinfo_files (pi);
c906108c 2658 }
c3f6f71d
JM
2659 pi->gregs_valid = 0;
2660 pi->fpregs_valid = 0;
2661#if 0
2662 pi->gregs_dirty = 0;
2663 pi->fpregs_dirty = 0;
c906108c 2664#endif
c3f6f71d
JM
2665 pi->status_valid = 0;
2666 pi->threads_valid = 0;
c906108c 2667
c3f6f71d 2668 return 0;
c906108c
SS
2669}
2670
0fda6bd2 2671#if 0
77382aee
PA
2672/* A callback function for iterate_over_threads. Find the
2673 asynchronous signal thread, and make it runnable. See if that
2674 helps matters any. */
c906108c 2675
c3f6f71d 2676static int
fba45db2 2677make_signal_thread_runnable (procinfo *process, procinfo *pi, void *ptr)
c906108c 2678{
c3f6f71d
JM
2679#ifdef PR_ASLWP
2680 if (proc_flags (pi) & PR_ASLWP)
c906108c 2681 {
c3f6f71d
JM
2682 if (!proc_run_process (pi, 0, -1))
2683 proc_error (pi, "make_signal_thread_runnable", __LINE__);
2684 return 1;
c906108c 2685 }
c906108c 2686#endif
c3f6f71d 2687 return 0;
c906108c 2688}
0fda6bd2 2689#endif
c906108c 2690
77382aee
PA
2691/* Make the child process runnable. Normally we will then call
2692 procfs_wait and wait for it to stop again (unless gdb is async).
2693
2694 If STEP is true, then arrange for the child to stop again after
2695 executing a single instruction. If SIGNO is zero, then cancel any
2696 pending signal; if non-zero, then arrange for the indicated signal
2697 to be delivered to the child when it runs. If PID is -1, then
2698 allow any child thread to run; if non-zero, then allow only the
2699 indicated thread to run. (not implemented yet). */
c906108c 2700
f6ac5f3d
PA
2701void
2702procfs_target::resume (ptid_t ptid, int step, enum gdb_signal signo)
c906108c 2703{
c3f6f71d
JM
2704 procinfo *pi, *thread;
2705 int native_signo;
2706
19958708 2707 /* 2.1:
c3f6f71d 2708 prrun.prflags |= PRSVADDR;
19958708 2709 prrun.pr_vaddr = $PC; set resume address
c3f6f71d 2710 prrun.prflags |= PRSTRACE; trace signals in pr_trace (all)
19958708 2711 prrun.prflags |= PRSFAULT; trace faults in pr_fault (all but PAGE)
c3f6f71d
JM
2712 prrun.prflags |= PRCFAULT; clear current fault.
2713
2714 PRSTRACE and PRSFAULT can be done by other means
77382aee 2715 (proc_trace_signals, proc_trace_faults)
c3f6f71d
JM
2716 PRSVADDR is unnecessary.
2717 PRCFAULT may be replaced by a PIOCCFAULT call (proc_clear_current_fault)
2718 This basically leaves PRSTEP and PRCSIG.
2719 PRCSIG is like PIOCSSIG (proc_clear_current_signal).
2720 So basically PR_STEP is the sole argument that must be passed
77382aee 2721 to proc_run_process (for use in the prrun struct by ioctl). */
c3f6f71d 2722
0df8b418 2723 /* Find procinfo for main process. */
e99b03dc 2724 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c3f6f71d 2725
77382aee 2726 /* First cut: ignore pid argument. */
c3f6f71d 2727 errno = 0;
c906108c 2728
c3f6f71d 2729 /* Convert signal to host numbering. */
c475f569 2730 if (signo == 0 || (signo == GDB_SIGNAL_STOP && pi->ignore_next_sigstop))
c3f6f71d
JM
2731 native_signo = 0;
2732 else
2ea28649 2733 native_signo = gdb_signal_to_host (signo);
c906108c 2734
c3f6f71d 2735 pi->ignore_next_sigstop = 0;
c906108c 2736
77382aee
PA
2737 /* Running the process voids all cached registers and status. */
2738 /* Void the threads' caches first. */
19958708 2739 proc_iterate_over_threads (pi, invalidate_cache, NULL);
c3f6f71d
JM
2740 /* Void the process procinfo's caches. */
2741 invalidate_cache (NULL, pi, NULL);
c906108c 2742
e99b03dc 2743 if (ptid.pid () != -1)
c906108c 2744 {
77382aee
PA
2745 /* Resume a specific thread, presumably suppressing the
2746 others. */
e38504b3 2747 thread = find_procinfo (ptid.pid (), ptid.lwp ());
7de45904 2748 if (thread != NULL)
c906108c 2749 {
c3f6f71d
JM
2750 if (thread->tid != 0)
2751 {
77382aee
PA
2752 /* We're to resume a specific thread, and not the
2753 others. Set the child process's PR_ASYNC flag. */
c3f6f71d
JM
2754 if (!proc_set_async (pi))
2755 proc_error (pi, "target_resume, set_async", __LINE__);
c3f6f71d 2756#if 0
19958708 2757 proc_iterate_over_threads (pi,
c3f6f71d
JM
2758 make_signal_thread_runnable,
2759 NULL);
2760#endif
0df8b418
MS
2761 pi = thread; /* Substitute the thread's procinfo
2762 for run. */
c3f6f71d 2763 }
c906108c
SS
2764 }
2765 }
c906108c 2766
c3f6f71d 2767 if (!proc_run_process (pi, step, native_signo))
c906108c 2768 {
c3f6f71d 2769 if (errno == EBUSY)
77382aee
PA
2770 warning (_("resume: target already running. "
2771 "Pretend to resume, and hope for the best!"));
c3f6f71d
JM
2772 else
2773 proc_error (pi, "target_resume", __LINE__);
c906108c 2774 }
c3f6f71d 2775}
c906108c 2776
77382aee 2777/* Set up to trace signals in the child process. */
c906108c 2778
f6ac5f3d 2779void
adc6a863 2780procfs_target::pass_signals (gdb::array_view<const unsigned char> pass_signals)
c3f6f71d 2781{
44122162 2782 sigset_t signals;
e99b03dc 2783 procinfo *pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
2455069d 2784 int signo;
c906108c 2785
2455069d
UW
2786 prfillset (&signals);
2787
2788 for (signo = 0; signo < NSIG; signo++)
2789 {
2ea28649 2790 int target_signo = gdb_signal_from_host (signo);
adc6a863 2791 if (target_signo < pass_signals.size () && pass_signals[target_signo])
44122162 2792 prdelset (&signals, signo);
2455069d
UW
2793 }
2794
2795 if (!proc_set_traced_signals (pi, &signals))
2796 proc_error (pi, "pass_signals", __LINE__);
c3f6f71d 2797}
c906108c 2798
77382aee 2799/* Print status information about the child process. */
c906108c 2800
f6ac5f3d
PA
2801void
2802procfs_target::files_info ()
c3f6f71d 2803{
181e7f93 2804 struct inferior *inf = current_inferior ();
f4a14ae6 2805
a3f17187 2806 printf_filtered (_("\tUsing the running image of %s %s via /proc.\n"),
181e7f93 2807 inf->attach_flag? "attached": "child",
39f77062 2808 target_pid_to_str (inferior_ptid));
c3f6f71d 2809}
c906108c 2810
77382aee
PA
2811/* Make it die. Wait for it to die. Clean up after it. Note: this
2812 should only be applied to the real process, not to an LWP, because
2813 of the check for parent-process. If we need this to work for an
2814 LWP, it needs some more logic. */
c906108c 2815
c3f6f71d 2816static void
fba45db2 2817unconditionally_kill_inferior (procinfo *pi)
c3f6f71d
JM
2818{
2819 int parent_pid;
c906108c 2820
c3f6f71d 2821 parent_pid = proc_parent_pid (pi);
c3f6f71d 2822 if (!proc_kill (pi, SIGKILL))
103b3ef5 2823 proc_error (pi, "unconditionally_kill, proc_kill", __LINE__);
c3f6f71d 2824 destroy_procinfo (pi);
c906108c 2825
c3f6f71d
JM
2826 /* If pi is GDB's child, wait for it to die. */
2827 if (parent_pid == getpid ())
19958708 2828 /* FIXME: should we use waitpid to make sure we get the right event?
c3f6f71d
JM
2829 Should we check the returned event? */
2830 {
0d06e24b 2831#if 0
c3f6f71d 2832 int status, ret;
c906108c 2833
c3f6f71d
JM
2834 ret = waitpid (pi->pid, &status, 0);
2835#else
2836 wait (NULL);
2837#endif
2838 }
2839}
c906108c 2840
77382aee
PA
2841/* We're done debugging it, and we want it to go away. Then we want
2842 GDB to forget all about it. */
c906108c 2843
f6ac5f3d
PA
2844void
2845procfs_target::kill ()
c906108c 2846{
d7e15655 2847 if (inferior_ptid != null_ptid) /* ? */
c3f6f71d 2848 {
0df8b418 2849 /* Find procinfo for main process. */
e99b03dc 2850 procinfo *pi = find_procinfo (inferior_ptid.pid (), 0);
c906108c 2851
c3f6f71d
JM
2852 if (pi)
2853 unconditionally_kill_inferior (pi);
bc1e6c81 2854 target_mourn_inferior (inferior_ptid);
c906108c 2855 }
c3f6f71d
JM
2856}
2857
77382aee 2858/* Forget we ever debugged this thing! */
c906108c 2859
f6ac5f3d
PA
2860void
2861procfs_target::mourn_inferior ()
c3f6f71d
JM
2862{
2863 procinfo *pi;
c906108c 2864
d7e15655 2865 if (inferior_ptid != null_ptid)
c3f6f71d 2866 {
0df8b418 2867 /* Find procinfo for main process. */
e99b03dc 2868 pi = find_procinfo (inferior_ptid.pid (), 0);
c3f6f71d
JM
2869 if (pi)
2870 destroy_procinfo (pi);
c906108c 2871 }
6a3cb8e8
PA
2872
2873 generic_mourn_inferior ();
8181d85f 2874
f6ac5f3d 2875 maybe_unpush_target ();
c3f6f71d 2876}
c906108c 2877
77382aee
PA
2878/* When GDB forks to create a runnable inferior process, this function
2879 is called on the parent side of the fork. It's job is to do
2880 whatever is necessary to make the child ready to be debugged, and
2881 then wait for the child to synchronize. */
c906108c 2882
19958708 2883static void
28439f5e 2884procfs_init_inferior (struct target_ops *ops, int pid)
c3f6f71d
JM
2885{
2886 procinfo *pi;
c3f6f71d 2887 int fail;
2689673f 2888 int lwpid;
c906108c 2889
c3f6f71d
JM
2890 /* This routine called on the parent side (GDB side)
2891 after GDB forks the inferior. */
6a3cb8e8
PA
2892 if (!target_is_pushed (ops))
2893 push_target (ops);
c906108c 2894
c475f569
RO
2895 pi = create_procinfo (pid, 0);
2896 if (pi == NULL)
9b20d036 2897 perror (_("procfs: out of memory in 'init_inferior'"));
c3f6f71d
JM
2898
2899 if (!open_procinfo_files (pi, FD_CTL))
2900 proc_error (pi, "init_inferior, open_proc_files", __LINE__);
2901
2902 /*
2903 xmalloc // done
2904 open_procinfo_files // done
2905 link list // done
2906 prfillset (trace)
2907 procfs_notice_signals
2908 prfillset (fault)
2909 prdelset (FLTPAGE)
2910 PIOCWSTOP
2911 PIOCSFAULT
2912 */
2913
77382aee 2914 /* If not stopped yet, wait for it to stop. */
c475f569 2915 if (!(proc_flags (pi) & PR_STOPPED) && !(proc_wait_for_stop (pi)))
c3f6f71d
JM
2916 dead_procinfo (pi, "init_inferior: wait_for_stop failed", KILL);
2917
2918 /* Save some of the /proc state to be restored if we detach. */
2919 /* FIXME: Why? In case another debugger was debugging it?
0df8b418 2920 We're it's parent, for Ghu's sake! */
c3f6f71d
JM
2921 if (!proc_get_traced_signals (pi, &pi->saved_sigset))
2922 proc_error (pi, "init_inferior, get_traced_signals", __LINE__);
2923 if (!proc_get_held_signals (pi, &pi->saved_sighold))
2924 proc_error (pi, "init_inferior, get_held_signals", __LINE__);
2925 if (!proc_get_traced_faults (pi, &pi->saved_fltset))
2926 proc_error (pi, "init_inferior, get_traced_faults", __LINE__);
37de36c6 2927 if (!proc_get_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d 2928 proc_error (pi, "init_inferior, get_traced_sysentry", __LINE__);
37de36c6 2929 if (!proc_get_traced_sysexit (pi, pi->saved_exitset))
c3f6f71d
JM
2930 proc_error (pi, "init_inferior, get_traced_sysexit", __LINE__);
2931
c475f569
RO
2932 fail = procfs_debug_inferior (pi);
2933 if (fail != 0)
c3f6f71d
JM
2934 proc_error (pi, "init_inferior (procfs_debug_inferior)", fail);
2935
0d06e24b
JM
2936 /* FIXME: logically, we should really be turning OFF run-on-last-close,
2937 and possibly even turning ON kill-on-last-close at this point. But
2938 I can't make that change without careful testing which I don't have
2939 time to do right now... */
c3f6f71d
JM
2940 /* Turn on run-on-last-close flag so that the child
2941 will die if GDB goes away for some reason. */
2942 if (!proc_set_run_on_last_close (pi))
2943 proc_error (pi, "init_inferior, set_RLC", __LINE__);
2944
2689673f
PA
2945 /* We now have have access to the lwpid of the main thread/lwp. */
2946 lwpid = proc_get_current_thread (pi);
2947
2948 /* Create a procinfo for the main lwp. */
2949 create_procinfo (pid, lwpid);
2950
2951 /* We already have a main thread registered in the thread table at
2952 this point, but it didn't have any lwp info yet. Notify the core
2953 about it. This changes inferior_ptid as well. */
f2907e49 2954 thread_change_ptid (ptid_t (pid),
fd79271b 2955 ptid_t (pid, lwpid, 0));
c906108c 2956
2090129c 2957 gdb_startup_inferior (pid, START_INFERIOR_TRAPS_EXPECTED);
c3f6f71d 2958}
c906108c 2959
77382aee
PA
2960/* When GDB forks to create a new process, this function is called on
2961 the child side of the fork before GDB exec's the user program. Its
2962 job is to make the child minimally debuggable, so that the parent
2963 GDB process can connect to the child and take over. This function
2964 should do only the minimum to make that possible, and to
2965 synchronize with the parent process. The parent process should
2966 take care of the details. */
c3f6f71d
JM
2967
2968static void
fba45db2 2969procfs_set_exec_trap (void)
c3f6f71d
JM
2970{
2971 /* This routine called on the child side (inferior side)
2972 after GDB forks the inferior. It must use only local variables,
2973 because it may be sharing data space with its parent. */
c906108c 2974
c3f6f71d 2975 procinfo *pi;
37de36c6 2976 sysset_t *exitset;
c906108c 2977
c475f569
RO
2978 pi = create_procinfo (getpid (), 0);
2979 if (pi == NULL)
e2e0b3e5 2980 perror_with_name (_("procfs: create_procinfo failed in child."));
c906108c 2981
c3f6f71d
JM
2982 if (open_procinfo_files (pi, FD_CTL) == 0)
2983 {
2984 proc_warn (pi, "set_exec_trap, open_proc_files", __LINE__);
2985 gdb_flush (gdb_stderr);
77382aee
PA
2986 /* No need to call "dead_procinfo", because we're going to
2987 exit. */
c3f6f71d
JM
2988 _exit (127);
2989 }
c906108c 2990
44122162 2991 /* Method for tracing exec syscalls. */
c3f6f71d
JM
2992 /* GW: Rationale...
2993 Not all systems with /proc have all the exec* syscalls with the same
2994 names. On the SGI, for example, there is no SYS_exec, but there
77382aee 2995 *is* a SYS_execv. So, we try to account for that. */
c906108c 2996
c475f569 2997 exitset = XNEW (sysset_t);
44122162 2998 premptyset (exitset);
c3f6f71d 2999#ifdef SYS_exec
44122162 3000 praddset (exitset, SYS_exec);
c906108c 3001#endif
44122162 3002 praddset (exitset, SYS_execve);
37de36c6
KB
3003
3004 if (!proc_set_traced_sysexit (pi, exitset))
c906108c 3005 {
c3f6f71d
JM
3006 proc_warn (pi, "set_exec_trap, set_traced_sysexit", __LINE__);
3007 gdb_flush (gdb_stderr);
3008 _exit (127);
c906108c 3009 }
c3f6f71d 3010
0df8b418 3011 /* FIXME: should this be done in the parent instead? */
c3f6f71d
JM
3012 /* Turn off inherit on fork flag so that all grand-children
3013 of gdb start with tracing flags cleared. */
3014 if (!proc_unset_inherit_on_fork (pi))
3015 proc_warn (pi, "set_exec_trap, unset_inherit", __LINE__);
3016
3017 /* Turn off run on last close flag, so that the child process
3018 cannot run away just because we close our handle on it.
3019 We want it to wait for the parent to attach. */
3020 if (!proc_unset_run_on_last_close (pi))
3021 proc_warn (pi, "set_exec_trap, unset_RLC", __LINE__);
3022
19958708 3023 /* FIXME: No need to destroy the procinfo --
0df8b418 3024 we have our own address space, and we're about to do an exec! */
c3f6f71d 3025 /*destroy_procinfo (pi);*/
c906108c 3026}
c906108c 3027
77382aee
PA
3028/* This function is called BEFORE gdb forks the inferior process. Its
3029 only real responsibility is to set things up for the fork, and tell
3030 GDB which two functions to call after the fork (one for the parent,
3031 and one for the child).
3032
3033 This function does a complicated search for a unix shell program,
3034 which it then uses to parse arguments and environment variables to
3035 be sent to the child. I wonder whether this code could not be
3036 abstracted out and shared with other unix targets such as
3037 inf-ptrace? */
c906108c 3038
f6ac5f3d
PA
3039void
3040procfs_target::create_inferior (const char *exec_file,
3041 const std::string &allargs,
3042 char **env, int from_tty)
c906108c 3043{
974e6844 3044 const char *shell_file = get_shell ();
c906108c 3045 char *tryname;
28439f5e
PA
3046 int pid;
3047
974e6844 3048 if (strchr (shell_file, '/') == NULL)
c906108c
SS
3049 {
3050
3051 /* We will be looking down the PATH to find shell_file. If we
c3f6f71d
JM
3052 just do this the normal way (via execlp, which operates by
3053 attempting an exec for each element of the PATH until it
3054 finds one which succeeds), then there will be an exec for
3055 each failed attempt, each of which will cause a PR_SYSEXIT
3056 stop, and we won't know how to distinguish the PR_SYSEXIT's
3057 for these failed execs with the ones for successful execs
3058 (whether the exec has succeeded is stored at that time in the
3059 carry bit or some such architecture-specific and
3060 non-ABI-specified place).
3061
3062 So I can't think of anything better than to search the PATH
3063 now. This has several disadvantages: (1) There is a race
3064 condition; if we find a file now and it is deleted before we
3065 exec it, we lose, even if the deletion leaves a valid file
3066 further down in the PATH, (2) there is no way to know exactly
3067 what an executable (in the sense of "capable of being
3068 exec'd") file is. Using access() loses because it may lose
3069 if the caller is the superuser; failing to use it loses if
3070 there are ACLs or some such. */
c906108c 3071
995816ba
PA
3072 const char *p;
3073 const char *p1;
c906108c 3074 /* FIXME-maybe: might want "set path" command so user can change what
c3f6f71d 3075 path is used from within GDB. */
995816ba 3076 const char *path = getenv ("PATH");
c906108c
SS
3077 int len;
3078 struct stat statbuf;
3079
3080 if (path == NULL)
3081 path = "/bin:/usr/bin";
3082
b196bc4c 3083 tryname = (char *) alloca (strlen (path) + strlen (shell_file) + 2);
c3f6f71d 3084 for (p = path; p != NULL; p = p1 ? p1 + 1: NULL)
c906108c
SS
3085 {
3086 p1 = strchr (p, ':');
3087 if (p1 != NULL)
3088 len = p1 - p;
3089 else
3090 len = strlen (p);
3091 strncpy (tryname, p, len);
3092 tryname[len] = '\0';
3093 strcat (tryname, "/");
3094 strcat (tryname, shell_file);
3095 if (access (tryname, X_OK) < 0)
3096 continue;
3097 if (stat (tryname, &statbuf) < 0)
3098 continue;
3099 if (!S_ISREG (statbuf.st_mode))
3100 /* We certainly need to reject directories. I'm not quite
3101 as sure about FIFOs, sockets, etc., but I kind of doubt
3102 that people want to exec() these things. */
3103 continue;
3104 break;
3105 }
3106 if (p == NULL)
3107 /* Not found. This must be an error rather than merely passing
3108 the file to execlp(), because execlp() would try all the
3109 exec()s, causing GDB to get confused. */
8a3fe4f8 3110 error (_("procfs:%d -- Can't find shell %s in PATH"),
c3f6f71d 3111 __LINE__, shell_file);
c906108c
SS
3112
3113 shell_file = tryname;
3114 }
3115
28439f5e 3116 pid = fork_inferior (exec_file, allargs, env, procfs_set_exec_trap,
e69860f1 3117 NULL, NULL, shell_file, NULL);
28439f5e 3118
2090129c
SDJ
3119 /* We have something that executes now. We'll be running through
3120 the shell at this point (if startup-with-shell is true), but the
3121 pid shouldn't change. */
f2907e49 3122 add_thread_silent (ptid_t (pid));
2090129c 3123
f6ac5f3d 3124 procfs_init_inferior (this, pid);
27087a3d
JB
3125}
3126
3127/* An observer for the "inferior_created" event. */
c906108c 3128
27087a3d
JB
3129static void
3130procfs_inferior_created (struct target_ops *ops, int from_tty)
3131{
c906108c
SS
3132}
3133
e8032dde 3134/* Callback for update_thread_list. Calls "add_thread". */
c906108c 3135
c3f6f71d 3136static int
fba45db2 3137procfs_notice_thread (procinfo *pi, procinfo *thread, void *ptr)
c906108c 3138{
fd79271b 3139 ptid_t gdb_threadid = ptid_t (pi->pid, thread->tid, 0);
c906108c 3140
24bce9bb
PA
3141 thread_info *thr = find_thread_ptid (gdb_threadid);
3142 if (thr == NULL || thr->state == THREAD_EXITED)
c3f6f71d 3143 add_thread (gdb_threadid);
c906108c 3144
c3f6f71d
JM
3145 return 0;
3146}
3147
77382aee
PA
3148/* Query all the threads that the target knows about, and give them
3149 back to GDB to add to its list. */
c3f6f71d 3150
f6ac5f3d
PA
3151void
3152procfs_target::update_thread_list ()
c3f6f71d
JM
3153{
3154 procinfo *pi;
3155
e8032dde
PA
3156 prune_threads ();
3157
0df8b418 3158 /* Find procinfo for main process. */
e99b03dc 3159 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c3f6f71d
JM
3160 proc_update_threads (pi);
3161 proc_iterate_over_threads (pi, procfs_notice_thread, NULL);
c906108c
SS
3162}
3163
77382aee
PA
3164/* Return true if the thread is still 'alive'. This guy doesn't
3165 really seem to be doing his job. Got to investigate how to tell
3166 when a thread is really gone. */
c906108c 3167
57810aa7 3168bool
f6ac5f3d 3169procfs_target::thread_alive (ptid_t ptid)
c906108c 3170{
c3f6f71d
JM
3171 int proc, thread;
3172 procinfo *pi;
c906108c 3173
e99b03dc 3174 proc = ptid.pid ();
e38504b3 3175 thread = ptid.lwp ();
0df8b418 3176 /* If I don't know it, it ain't alive! */
c475f569
RO
3177 pi = find_procinfo (proc, thread);
3178 if (pi == NULL)
57810aa7 3179 return false;
c3f6f71d
JM
3180
3181 /* If I can't get its status, it ain't alive!
3182 What's more, I need to forget about it! */
3183 if (!proc_get_status (pi))
3184 {
3185 destroy_procinfo (pi);
57810aa7 3186 return false;
c3f6f71d 3187 }
77382aee
PA
3188 /* I couldn't have got its status if it weren't alive, so it's
3189 alive. */
57810aa7 3190 return true;
c906108c 3191}
c3f6f71d 3192
77382aee
PA
3193/* Convert PTID to a string. Returns the string in a static
3194 buffer. */
c3f6f71d 3195
f6ac5f3d
PA
3196const char *
3197procfs_target::pid_to_str (ptid_t ptid)
c3f6f71d
JM
3198{
3199 static char buf[80];
c3f6f71d 3200
e38504b3 3201 if (ptid.lwp () == 0)
c475f569 3202 xsnprintf (buf, sizeof (buf), "process %d", ptid.pid ());
c3f6f71d 3203 else
c475f569 3204 xsnprintf (buf, sizeof (buf), "LWP %ld", ptid.lwp ());
5240ceac
MK
3205
3206 return buf;
c3f6f71d
JM
3207}
3208
4206c05e
RO
3209/* Accepts an integer PID; Returns a string representing a file that
3210 can be opened to get the symbols for the child process. */
3211
3212char *
3213procfs_target::pid_to_exec_file (int pid)
3214{
3215 static char buf[PATH_MAX];
3216 char name[PATH_MAX];
3217
3218 /* Solaris 11 introduced /proc/<proc-id>/execname. */
c475f569 3219 xsnprintf (name, sizeof (name), "/proc/%d/execname", pid);
4206c05e
RO
3220 scoped_fd fd (gdb_open_cloexec (name, O_RDONLY, 0));
3221 if (fd.get () < 0 || read (fd.get (), buf, PATH_MAX - 1) < 0)
3222 {
3223 /* If that fails, fall back to /proc/<proc-id>/path/a.out introduced in
3224 Solaris 10. */
3225 ssize_t len;
3226
c475f569 3227 xsnprintf (name, sizeof (name), "/proc/%d/path/a.out", pid);
4206c05e
RO
3228 len = readlink (name, buf, PATH_MAX - 1);
3229 if (len <= 0)
3230 strcpy (buf, name);
3231 else
3232 buf[len] = '\0';
3233 }
3234
3235 return buf;
3236}
3237
77382aee 3238/* Insert a watchpoint. */
c3f6f71d 3239
a0911fd0 3240static int
39f77062 3241procfs_set_watchpoint (ptid_t ptid, CORE_ADDR addr, int len, int rwflag,
77382aee 3242 int after)
c906108c 3243{
c3f6f71d 3244 int pflags = 0;
19958708 3245 procinfo *pi;
c3f6f71d 3246
e99b03dc
TT
3247 pi = find_procinfo_or_die (ptid.pid () == -1 ?
3248 inferior_ptid.pid () : ptid.pid (),
dfd4cc63 3249 0);
c3f6f71d 3250
0df8b418
MS
3251 /* Translate from GDB's flags to /proc's. */
3252 if (len > 0) /* len == 0 means delete watchpoint. */
c906108c 3253 {
0df8b418 3254 switch (rwflag) { /* FIXME: need an enum! */
c3f6f71d
JM
3255 case hw_write: /* default watchpoint (write) */
3256 pflags = WRITE_WATCHFLAG;
3257 break;
3258 case hw_read: /* read watchpoint */
3259 pflags = READ_WATCHFLAG;
3260 break;
3261 case hw_access: /* access watchpoint */
3262 pflags = READ_WATCHFLAG | WRITE_WATCHFLAG;
3263 break;
3264 case hw_execute: /* execution HW breakpoint */
3265 pflags = EXEC_WATCHFLAG;
3266 break;
0df8b418 3267 default: /* Something weird. Return error. */
c906108c 3268 return -1;
c3f6f71d 3269 }
0df8b418 3270 if (after) /* Stop after r/w access is completed. */
c3f6f71d
JM
3271 pflags |= AFTER_WATCHFLAG;
3272 }
3273
3274 if (!proc_set_watchpoint (pi, addr, len, pflags))
3275 {
0df8b418 3276 if (errno == E2BIG) /* Typical error for no resources. */
c3f6f71d
JM
3277 return -1; /* fail */
3278 /* GDB may try to remove the same watchpoint twice.
3279 If a remove request returns no match, don't error. */
c906108c 3280 if (errno == ESRCH && len == 0)
c3f6f71d
JM
3281 return 0; /* ignore */
3282 proc_error (pi, "set_watchpoint", __LINE__);
c906108c
SS
3283 }
3284 return 0;
3285}
3286
1e03ad20
KB
3287/* Return non-zero if we can set a hardware watchpoint of type TYPE. TYPE
3288 is one of bp_hardware_watchpoint, bp_read_watchpoint, bp_write_watchpoint,
3289 or bp_hardware_watchpoint. CNT is the number of watchpoints used so
3290 far.
19958708 3291
1e03ad20
KB
3292 Note: procfs_can_use_hw_breakpoint() is not yet used by all
3293 procfs.c targets due to the fact that some of them still define
d92524f1 3294 target_can_use_hardware_watchpoint. */
1e03ad20 3295
f6ac5f3d
PA
3296int
3297procfs_target::can_use_hw_breakpoint (enum bptype type, int cnt, int othertype)
1e03ad20 3298{
1e03ad20
KB
3299 /* Due to the way that proc_set_watchpoint() is implemented, host
3300 and target pointers must be of the same size. If they are not,
3301 we can't use hardware watchpoints. This limitation is due to the
9a043c1d
AC
3302 fact that proc_set_watchpoint() calls
3303 procfs_address_to_host_pointer(); a close inspection of
3304 procfs_address_to_host_pointer will reveal that an internal error
3305 will be generated when the host and target pointer sizes are
3306 different. */
f5656ead 3307 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
f4a14ae6 3308
4e906f53 3309 if (sizeof (void *) != TYPE_LENGTH (ptr_type))
1e03ad20
KB
3310 return 0;
3311
3312 /* Other tests here??? */
3313
3314 return 1;
1e03ad20
KB
3315}
3316
77382aee
PA
3317/* Returns non-zero if process is stopped on a hardware watchpoint
3318 fault, else returns zero. */
c3f6f71d 3319
57810aa7 3320bool
f6ac5f3d 3321procfs_target::stopped_by_watchpoint ()
c906108c 3322{
c3f6f71d 3323 procinfo *pi;
c906108c 3324
e99b03dc 3325 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
aaeb7efa 3326
c3f6f71d 3327 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
c475f569
RO
3328 if (proc_why (pi) == PR_FAULTED)
3329 if (proc_what (pi) == FLTWATCH)
3330 return true;
57810aa7 3331 return false;
c906108c 3332}
c906108c 3333
77382aee
PA
3334/* Returns 1 if the OS knows the position of the triggered watchpoint,
3335 and sets *ADDR to that address. Returns 0 if OS cannot report that
3336 address. This function is only called if
3337 procfs_stopped_by_watchpoint returned 1, thus no further checks are
3338 done. The function also assumes that ADDR is not NULL. */
bf701c2c 3339
57810aa7 3340bool
f6ac5f3d 3341procfs_target::stopped_data_address (CORE_ADDR *addr)
bf701c2c
PM
3342{
3343 procinfo *pi;
3344
e99b03dc 3345 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
bf701c2c
PM
3346 return proc_watchpoint_address (pi, addr);
3347}
3348
f6ac5f3d
PA
3349int
3350procfs_target::insert_watchpoint (CORE_ADDR addr, int len,
3351 enum target_hw_bp_type type,
3352 struct expression *cond)
25513619 3353{
d92524f1 3354 if (!target_have_steppable_watchpoint
f5656ead 3355 && !gdbarch_have_nonsteppable_watchpoint (target_gdbarch ()))
c475f569
RO
3356 /* When a hardware watchpoint fires off the PC will be left at
3357 the instruction following the one which caused the
3358 watchpoint. It will *NOT* be necessary for GDB to step over
3359 the watchpoint. */
3360 return procfs_set_watchpoint (inferior_ptid, addr, len, type, 1);
25513619 3361 else
c475f569
RO
3362 /* When a hardware watchpoint fires off the PC will be left at
3363 the instruction which caused the watchpoint. It will be
3364 necessary for GDB to step over the watchpoint. */
3365 return procfs_set_watchpoint (inferior_ptid, addr, len, type, 0);
25513619
PA
3366}
3367
f6ac5f3d
PA
3368int
3369procfs_target::remove_watchpoint (CORE_ADDR addr, int len,
3370 enum target_hw_bp_type type,
3371 struct expression *cond)
25513619
PA
3372{
3373 return procfs_set_watchpoint (inferior_ptid, addr, 0, 0, 0);
3374}
3375
f6ac5f3d
PA
3376int
3377procfs_target::region_ok_for_hw_watchpoint (CORE_ADDR addr, int len)
25513619
PA
3378{
3379 /* The man page for proc(4) on Solaris 2.6 and up says that the
3380 system can support "thousands" of hardware watchpoints, but gives
3381 no method for finding out how many; It doesn't say anything about
3382 the allowed size for the watched area either. So we just tell
3383 GDB 'yes'. */
3384 return 1;
3385}
3386
77382aee
PA
3387/* Memory Mappings Functions: */
3388
3389/* Call a callback function once for each mapping, passing it the
3390 mapping, an optional secondary callback function, and some optional
3391 opaque data. Quit and return the first non-zero value returned
3392 from the callback.
3393
3394 PI is the procinfo struct for the process to be mapped. FUNC is
3395 the callback function to be called by this iterator. DATA is the
3396 optional opaque data to be passed to the callback function.
3397 CHILD_FUNC is the optional secondary function pointer to be passed
3398 to the child function. Returns the first non-zero return value
3399 from the callback function, or zero. */
831e682e
MS
3400
3401static int
b8edc417 3402iterate_over_mappings (procinfo *pi, find_memory_region_ftype child_func,
e9ef4f39 3403 void *data,
19958708 3404 int (*func) (struct prmap *map,
b8edc417 3405 find_memory_region_ftype child_func,
831e682e
MS
3406 void *data))
3407{
3408 char pathname[MAX_PROC_NAME_SIZE];
3409 struct prmap *prmaps;
3410 struct prmap *prmap;
3411 int funcstat;
831e682e 3412 int nmap;
831e682e 3413 struct stat sbuf;
831e682e 3414
19958708 3415 /* Get the number of mappings, allocate space,
831e682e 3416 and read the mappings into prmaps. */
0df8b418 3417 /* Open map fd. */
c475f569 3418 xsnprintf (pathname, sizeof (pathname), "/proc/%d/map", pi->pid);
831e682e 3419
5dc1a704
TT
3420 scoped_fd map_fd (open (pathname, O_RDONLY));
3421 if (map_fd.get () < 0)
3422 proc_error (pi, "iterate_over_mappings (open)", __LINE__);
831e682e 3423
19958708 3424 /* Use stat to determine the file size, and compute
831e682e 3425 the number of prmap_t objects it contains. */
5dc1a704 3426 if (fstat (map_fd.get (), &sbuf) != 0)
831e682e
MS
3427 proc_error (pi, "iterate_over_mappings (fstat)", __LINE__);
3428
3429 nmap = sbuf.st_size / sizeof (prmap_t);
3430 prmaps = (struct prmap *) alloca ((nmap + 1) * sizeof (*prmaps));
5dc1a704 3431 if (read (map_fd.get (), (char *) prmaps, nmap * sizeof (*prmaps))
831e682e
MS
3432 != (nmap * sizeof (*prmaps)))
3433 proc_error (pi, "iterate_over_mappings (read)", __LINE__);
831e682e
MS
3434
3435 for (prmap = prmaps; nmap > 0; prmap++, nmap--)
c475f569
RO
3436 {
3437 funcstat = (*func) (prmap, child_func, data);
3438 if (funcstat != 0)
3439 return funcstat;
3440 }
831e682e
MS
3441
3442 return 0;
3443}
3444
77382aee 3445/* Implements the to_find_memory_regions method. Calls an external
b8edc417 3446 function for each memory region.
77382aee 3447 Returns the integer value returned by the callback. */
be4d1333
MS
3448
3449static int
19958708 3450find_memory_regions_callback (struct prmap *map,
b8edc417 3451 find_memory_region_ftype func, void *data)
be4d1333 3452{
bf75638e 3453 return (*func) ((CORE_ADDR) map->pr_vaddr,
19958708 3454 map->pr_size,
be4d1333
MS
3455 (map->pr_mflags & MA_READ) != 0,
3456 (map->pr_mflags & MA_WRITE) != 0,
19958708 3457 (map->pr_mflags & MA_EXEC) != 0,
4f69f4c2 3458 1, /* MODIFIED is unknown, pass it as true. */
be4d1333
MS
3459 data);
3460}
3461
77382aee
PA
3462/* External interface. Calls a callback function once for each
3463 mapped memory region in the child process, passing as arguments:
3464
3465 CORE_ADDR virtual_address,
3466 unsigned long size,
3467 int read, TRUE if region is readable by the child
3468 int write, TRUE if region is writable by the child
3469 int execute TRUE if region is executable by the child.
3470
3471 Stops iterating and returns the first non-zero value returned by
3472 the callback. */
be4d1333 3473
f6ac5f3d
PA
3474int
3475procfs_target::find_memory_regions (find_memory_region_ftype func, void *data)
be4d1333 3476{
e99b03dc 3477 procinfo *pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
be4d1333 3478
19958708 3479 return iterate_over_mappings (pi, func, data,
be4d1333
MS
3480 find_memory_regions_callback);
3481}
3482
77382aee 3483/* Returns an ascii representation of a memory mapping's flags. */
c3f6f71d 3484
388faa48 3485static char *
5ae5f592 3486mappingflags (long flags)
388faa48
MS
3487{
3488 static char asciiflags[8];
3489
3490 strcpy (asciiflags, "-------");
388faa48
MS
3491 if (flags & MA_STACK)
3492 asciiflags[1] = 's';
3493 if (flags & MA_BREAK)
3494 asciiflags[2] = 'b';
3495 if (flags & MA_SHARED)
3496 asciiflags[3] = 's';
3497 if (flags & MA_READ)
3498 asciiflags[4] = 'r';
3499 if (flags & MA_WRITE)
3500 asciiflags[5] = 'w';
3501 if (flags & MA_EXEC)
3502 asciiflags[6] = 'x';
3503 return (asciiflags);
3504}
3505
77382aee
PA
3506/* Callback function, does the actual work for 'info proc
3507 mappings'. */
831e682e 3508
831e682e 3509static int
b8edc417 3510info_mappings_callback (struct prmap *map, find_memory_region_ftype ignore,
e9ef4f39 3511 void *unused)
831e682e 3512{
0b62613e 3513 unsigned int pr_off;
831e682e 3514
0b62613e 3515 pr_off = (unsigned int) map->pr_offset;
0b62613e 3516
f5656ead 3517 if (gdbarch_addr_bit (target_gdbarch ()) == 32)
f6a96b83 3518 printf_filtered ("\t%#10lx %#10lx %#10lx %#10x %7s\n",
0b62613e
PA
3519 (unsigned long) map->pr_vaddr,
3520 (unsigned long) map->pr_vaddr + map->pr_size - 1,
f6a96b83 3521 (unsigned long) map->pr_size,
0b62613e
PA
3522 pr_off,
3523 mappingflags (map->pr_mflags));
3524 else
f6a96b83 3525 printf_filtered (" %#18lx %#18lx %#10lx %#10x %7s\n",
0b62613e
PA
3526 (unsigned long) map->pr_vaddr,
3527 (unsigned long) map->pr_vaddr + map->pr_size - 1,
f6a96b83 3528 (unsigned long) map->pr_size,
0b62613e
PA
3529 pr_off,
3530 mappingflags (map->pr_mflags));
831e682e
MS
3531
3532 return 0;
3533}
3534
77382aee 3535/* Implement the "info proc mappings" subcommand. */
388faa48
MS
3536
3537static void
3538info_proc_mappings (procinfo *pi, int summary)
3539{
388faa48 3540 if (summary)
0df8b418 3541 return; /* No output for summary mode. */
388faa48 3542
a3f17187 3543 printf_filtered (_("Mapped address spaces:\n\n"));
f5656ead 3544 if (gdbarch_ptr_bit (target_gdbarch ()) == 32)
0b62613e
PA
3545 printf_filtered ("\t%10s %10s %10s %10s %7s\n",
3546 "Start Addr",
3547 " End Addr",
3548 " Size",
3549 " Offset",
3550 "Flags");
3551 else
3552 printf_filtered (" %18s %18s %10s %10s %7s\n",
3553 "Start Addr",
3554 " End Addr",
3555 " Size",
3556 " Offset",
3557 "Flags");
388faa48 3558
831e682e 3559 iterate_over_mappings (pi, NULL, NULL, info_mappings_callback);
388faa48
MS
3560 printf_filtered ("\n");
3561}
3562
77382aee 3563/* Implement the "info proc" command. */
c3f6f71d 3564
f6ac5f3d
PA
3565bool
3566procfs_target::info_proc (const char *args, enum info_proc_what what)
c906108c 3567{
388faa48
MS
3568 procinfo *process = NULL;
3569 procinfo *thread = NULL;
388faa48
MS
3570 char *tmp = NULL;
3571 int pid = 0;
3572 int tid = 0;
3573 int mappings = 0;
c906108c 3574
145b16a9
UW
3575 switch (what)
3576 {
3577 case IP_MINIMAL:
3578 break;
3579
3580 case IP_MAPPINGS:
3581 case IP_ALL:
3582 mappings = 1;
3583 break;
3584
3585 default:
3586 error (_("Not supported on this target."));
3587 }
3588
773a1edc 3589 gdb_argv built_argv (args);
4fa7574e 3590 for (char *arg : built_argv)
c3f6f71d 3591 {
773a1edc 3592 if (isdigit (arg[0]))
c3f6f71d 3593 {
773a1edc 3594 pid = strtoul (arg, &tmp, 10);
c3f6f71d
JM
3595 if (*tmp == '/')
3596 tid = strtoul (++tmp, NULL, 10);
3597 }
773a1edc 3598 else if (arg[0] == '/')
c3f6f71d 3599 {
773a1edc 3600 tid = strtoul (arg + 1, NULL, 10);
c3f6f71d 3601 }
c3f6f71d 3602 }
5b4cbbe3
TT
3603
3604 procinfo_up temporary_procinfo;
c3f6f71d 3605 if (pid == 0)
e99b03dc 3606 pid = inferior_ptid.pid ();
c3f6f71d 3607 if (pid == 0)
8a3fe4f8 3608 error (_("No current process: you must name one."));
c3f6f71d 3609 else
c906108c 3610 {
c3f6f71d 3611 /* Have pid, will travel.
0df8b418 3612 First see if it's a process we're already debugging. */
c3f6f71d
JM
3613 process = find_procinfo (pid, 0);
3614 if (process == NULL)
3615 {
19958708 3616 /* No. So open a procinfo for it, but
c3f6f71d
JM
3617 remember to close it again when finished. */
3618 process = create_procinfo (pid, 0);
5b4cbbe3 3619 temporary_procinfo.reset (process);
c3f6f71d
JM
3620 if (!open_procinfo_files (process, FD_CTL))
3621 proc_error (process, "info proc, open_procinfo_files", __LINE__);
3622 }
c906108c 3623 }
c3f6f71d
JM
3624 if (tid != 0)
3625 thread = create_procinfo (pid, tid);
3626
3627 if (process)
3628 {
a3f17187 3629 printf_filtered (_("process %d flags:\n"), process->pid);
c3f6f71d
JM
3630 proc_prettyprint_flags (proc_flags (process), 1);
3631 if (proc_flags (process) & (PR_STOPPED | PR_ISTOP))
3632 proc_prettyprint_why (proc_why (process), proc_what (process), 1);
3633 if (proc_get_nthreads (process) > 1)
19958708 3634 printf_filtered ("Process has %d threads.\n",
c3f6f71d
JM
3635 proc_get_nthreads (process));
3636 }
3637 if (thread)
3638 {
a3f17187 3639 printf_filtered (_("thread %d flags:\n"), thread->tid);
c3f6f71d
JM
3640 proc_prettyprint_flags (proc_flags (thread), 1);
3641 if (proc_flags (thread) & (PR_STOPPED | PR_ISTOP))
3642 proc_prettyprint_why (proc_why (thread), proc_what (thread), 1);
3643 }
3644
388faa48 3645 if (mappings)
c475f569 3646 info_proc_mappings (process, 0);
388faa48 3647
f6ac5f3d 3648 return true;
c906108c
SS
3649}
3650
9185ddce
JB
3651/* Modify the status of the system call identified by SYSCALLNUM in
3652 the set of syscalls that are currently traced/debugged.
3653
3654 If ENTRY_OR_EXIT is set to PR_SYSENTRY, then the entry syscalls set
0df8b418 3655 will be updated. Otherwise, the exit syscalls set will be updated.
9185ddce 3656
0df8b418 3657 If MODE is FLAG_SET, then traces will be enabled. Otherwise, they
9185ddce
JB
3658 will be disabled. */
3659
3660static void
3661proc_trace_syscalls_1 (procinfo *pi, int syscallnum, int entry_or_exit,
77382aee 3662 int mode, int from_tty)
9185ddce
JB
3663{
3664 sysset_t *sysset;
77382aee 3665
9185ddce
JB
3666 if (entry_or_exit == PR_SYSENTRY)
3667 sysset = proc_get_traced_sysentry (pi, NULL);
3668 else
3669 sysset = proc_get_traced_sysexit (pi, NULL);
3670
3671 if (sysset == NULL)
3672 proc_error (pi, "proc-trace, get_traced_sysset", __LINE__);
3673
3674 if (mode == FLAG_SET)
44122162 3675 praddset (sysset, syscallnum);
9185ddce 3676 else
44122162 3677 prdelset (sysset, syscallnum);
9185ddce
JB
3678
3679 if (entry_or_exit == PR_SYSENTRY)
3680 {
3681 if (!proc_set_traced_sysentry (pi, sysset))
77382aee 3682 proc_error (pi, "proc-trace, set_traced_sysentry", __LINE__);
9185ddce
JB
3683 }
3684 else
3685 {
3686 if (!proc_set_traced_sysexit (pi, sysset))
77382aee 3687 proc_error (pi, "proc-trace, set_traced_sysexit", __LINE__);
9185ddce
JB
3688 }
3689}
3690
c3f6f71d 3691static void
0b39b52e 3692proc_trace_syscalls (const char *args, int from_tty, int entry_or_exit, int mode)
c906108c 3693{
c3f6f71d 3694 procinfo *pi;
c906108c 3695
e99b03dc 3696 if (inferior_ptid.pid () <= 0)
8a3fe4f8 3697 error (_("you must be debugging a process to use this command."));
c906108c 3698
c3f6f71d 3699 if (args == NULL || args[0] == 0)
e2e0b3e5 3700 error_no_arg (_("system call to trace"));
c3f6f71d 3701
e99b03dc 3702 pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
c3f6f71d
JM
3703 if (isdigit (args[0]))
3704 {
9185ddce 3705 const int syscallnum = atoi (args);
c906108c 3706
9185ddce 3707 proc_trace_syscalls_1 (pi, syscallnum, entry_or_exit, mode, from_tty);
c3f6f71d
JM
3708 }
3709}
3710
19958708 3711static void
0b39b52e 3712proc_trace_sysentry_cmd (const char *args, int from_tty)
c906108c 3713{
c3f6f71d
JM
3714 proc_trace_syscalls (args, from_tty, PR_SYSENTRY, FLAG_SET);
3715}
c906108c 3716
19958708 3717static void
0b39b52e 3718proc_trace_sysexit_cmd (const char *args, int from_tty)
c3f6f71d
JM
3719{
3720 proc_trace_syscalls (args, from_tty, PR_SYSEXIT, FLAG_SET);
c906108c 3721}
c906108c 3722
19958708 3723static void
0b39b52e 3724proc_untrace_sysentry_cmd (const char *args, int from_tty)
c3f6f71d
JM
3725{
3726 proc_trace_syscalls (args, from_tty, PR_SYSENTRY, FLAG_RESET);
3727}
3728
19958708 3729static void
0b39b52e 3730proc_untrace_sysexit_cmd (const char *args, int from_tty)
c906108c 3731{
c3f6f71d
JM
3732 proc_trace_syscalls (args, from_tty, PR_SYSEXIT, FLAG_RESET);
3733}
c906108c 3734
c906108c 3735void
fba45db2 3736_initialize_procfs (void)
c906108c 3737{
76727919 3738 gdb::observers::inferior_created.attach (procfs_inferior_created);
27087a3d 3739
19958708 3740 add_com ("proc-trace-entry", no_class, proc_trace_sysentry_cmd,
1bedd215 3741 _("Give a trace of entries into the syscall."));
19958708 3742 add_com ("proc-trace-exit", no_class, proc_trace_sysexit_cmd,
1bedd215 3743 _("Give a trace of exits from the syscall."));
19958708 3744 add_com ("proc-untrace-entry", no_class, proc_untrace_sysentry_cmd,
1bedd215 3745 _("Cancel a trace of entries into the syscall."));
19958708 3746 add_com ("proc-untrace-exit", no_class, proc_untrace_sysexit_cmd,
1bedd215 3747 _("Cancel a trace of exits from the syscall."));
c1955e17 3748
62c808ae 3749 add_inf_child_target (&the_procfs_target);
c3f6f71d
JM
3750}
3751
3752/* =================== END, GDB "MODULE" =================== */
3753
3754
3755
77382aee
PA
3756/* miscellaneous stubs: */
3757
3758/* The following satisfy a few random symbols mostly created by the
3759 solaris threads implementation, which I will chase down later. */
c3f6f71d 3760
77382aee
PA
3761/* Return a pid for which we guarantee we will be able to find a
3762 'live' procinfo. */
c3f6f71d 3763
39f77062 3764ptid_t
fba45db2 3765procfs_first_available (void)
c3f6f71d 3766{
f2907e49 3767 return ptid_t (procinfo_list ? procinfo_list->pid : -1);
c3f6f71d 3768}
be4d1333
MS
3769
3770/* =================== GCORE .NOTE "MODULE" =================== */
3771
3772static char *
19958708 3773procfs_do_thread_registers (bfd *obfd, ptid_t ptid,
2020b7ab 3774 char *note_data, int *note_size,
2ea28649 3775 enum gdb_signal stop_signal)
be4d1333 3776{
594f7785 3777 struct regcache *regcache = get_thread_regcache (ptid);
be4d1333
MS
3778 gdb_gregset_t gregs;
3779 gdb_fpregset_t fpregs;
3780 unsigned long merged_pid;
3781
e38504b3 3782 merged_pid = ptid.lwp () << 16 | ptid.pid ();
be4d1333 3783
75125405
DJ
3784 /* This part is the old method for fetching registers.
3785 It should be replaced by the newer one using regsets
3786 once it is implemented in this platform:
29082443 3787 gdbarch_iterate_over_regset_sections(). */
75125405 3788
2989a365 3789 scoped_restore save_inferior_ptid = make_scoped_restore (&inferior_ptid);
75125405
DJ
3790 inferior_ptid = ptid;
3791 target_fetch_registers (regcache, -1);
3792
594f7785 3793 fill_gregset (regcache, &gregs, -1);
65554fef
MS
3794 note_data = (char *) elfcore_write_lwpstatus (obfd,
3795 note_data,
3796 note_size,
19958708 3797 merged_pid,
65554fef
MS
3798 stop_signal,
3799 &gregs);
594f7785 3800 fill_fpregset (regcache, &fpregs, -1);
be4d1333
MS
3801 note_data = (char *) elfcore_write_prfpreg (obfd,
3802 note_data,
3803 note_size,
3804 &fpregs,
3805 sizeof (fpregs));
75125405 3806
be4d1333
MS
3807 return note_data;
3808}
3809
3810struct procfs_corefile_thread_data {
3811 bfd *obfd;
3812 char *note_data;
3813 int *note_size;
2ea28649 3814 enum gdb_signal stop_signal;
be4d1333
MS
3815};
3816
3817static int
65554fef 3818procfs_corefile_thread_callback (procinfo *pi, procinfo *thread, void *data)
be4d1333 3819{
b196bc4c
RO
3820 struct procfs_corefile_thread_data *args
3821 = (struct procfs_corefile_thread_data *) data;
be4d1333 3822
2689673f 3823 if (pi != NULL)
be4d1333 3824 {
fd79271b 3825 ptid_t ptid = ptid_t (pi->pid, thread->tid, 0);
f4a14ae6 3826
75125405 3827 args->note_data = procfs_do_thread_registers (args->obfd, ptid,
19958708 3828 args->note_data,
2020b7ab
PA
3829 args->note_size,
3830 args->stop_signal);
be4d1333
MS
3831 }
3832 return 0;
3833}
3834
a223f1e7
JB
3835static int
3836find_signalled_thread (struct thread_info *info, void *data)
3837{
a493e3e2 3838 if (info->suspend.stop_signal != GDB_SIGNAL_0
e99b03dc 3839 && info->ptid.pid () == inferior_ptid.pid ())
a223f1e7
JB
3840 return 1;
3841
3842 return 0;
3843}
3844
2ea28649 3845static enum gdb_signal
a223f1e7
JB
3846find_stop_signal (void)
3847{
3848 struct thread_info *info =
3849 iterate_over_threads (find_signalled_thread, NULL);
3850
3851 if (info)
16c381f0 3852 return info->suspend.stop_signal;
a223f1e7 3853 else
a493e3e2 3854 return GDB_SIGNAL_0;
a223f1e7
JB
3855}
3856
f6ac5f3d
PA
3857char *
3858procfs_target::make_corefile_notes (bfd *obfd, int *note_size)
be4d1333 3859{
be4d1333 3860 gdb_gregset_t gregs;
be4d1333
MS
3861 char fname[16] = {'\0'};
3862 char psargs[80] = {'\0'};
e99b03dc 3863 procinfo *pi = find_procinfo_or_die (inferior_ptid.pid (), 0);
be4d1333 3864 char *note_data = NULL;
cbaaa0ca 3865 const char *inf_args;
be4d1333 3866 struct procfs_corefile_thread_data thread_args;
2ea28649 3867 enum gdb_signal stop_signal;
be4d1333
MS
3868
3869 if (get_exec_file (0))
3870 {
9f37bbcc 3871 strncpy (fname, lbasename (get_exec_file (0)), sizeof (fname));
4e2af517
JM
3872 fname[sizeof (fname) - 1] = 0;
3873 strncpy (psargs, get_exec_file (0), sizeof (psargs));
3874 psargs[sizeof (psargs) - 1] = 0;
6dbdc4a3
MS
3875
3876 inf_args = get_inferior_args ();
c475f569
RO
3877 if (inf_args && *inf_args
3878 && (strlen (inf_args)
3879 < ((int) sizeof (psargs) - (int) strlen (psargs))))
be4d1333 3880 {
19958708 3881 strncat (psargs, " ",
be4d1333 3882 sizeof (psargs) - strlen (psargs));
19958708 3883 strncat (psargs, inf_args,
be4d1333
MS
3884 sizeof (psargs) - strlen (psargs));
3885 }
3886 }
3887
19958708
RM
3888 note_data = (char *) elfcore_write_prpsinfo (obfd,
3889 note_data,
3890 note_size,
3891 fname,
be4d1333
MS
3892 psargs);
3893
651c8d2d
PA
3894 stop_signal = find_stop_signal ();
3895
3e3420f6
PA
3896 fill_gregset (get_current_regcache (), &gregs, -1);
3897 note_data = elfcore_write_pstatus (obfd, note_data, note_size,
e99b03dc 3898 inferior_ptid.pid (),
3e3420f6 3899 stop_signal, &gregs);
3e3420f6 3900
be4d1333
MS
3901 thread_args.obfd = obfd;
3902 thread_args.note_data = note_data;
3903 thread_args.note_size = note_size;
651c8d2d 3904 thread_args.stop_signal = stop_signal;
3e43a32a
MS
3905 proc_iterate_over_threads (pi, procfs_corefile_thread_callback,
3906 &thread_args);
2689673f 3907 note_data = thread_args.note_data;
be4d1333 3908
62c808ae
RO
3909 gdb::optional<gdb::byte_vector> auxv =
3910 target_read_alloc (current_top_target (), TARGET_OBJECT_AUXV, NULL);
3911 if (auxv && !auxv->empty ())
3912 note_data = elfcore_write_note (obfd, note_data, note_size,
3913 "CORE", NT_AUXV, auxv->data (),
3914 auxv->size ());
4e73f23d 3915
be4d1333
MS
3916 return note_data;
3917}
be4d1333 3918/* =================== END GCORE .NOTE "MODULE" =================== */
This page took 2.237911 seconds and 4 git commands to generate.