]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/procfs.c
Return target_xfer_status in to_xfer_partial
[thirdparty/binutils-gdb.git] / gdb / procfs.c
CommitLineData
c906108c 1/* Machine independent support for SVR4 /proc (process file system) for GDB.
2555fe1a 2
ecd75fc8 3 Copyright (C) 1999-2014 Free Software Foundation, Inc.
2555fe1a 4
c3f6f71d
JM
5 Written by Michael Snyder at Cygnus Solutions.
6 Based on work by Fred Fish, Stu Grossman, Geoff Noer, and others.
c906108c 7
a9762ec7
JB
8 This file is part of GDB.
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
14
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
21 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c 22
c3f6f71d
JM
23#include "defs.h"
24#include "inferior.h"
25#include "target.h"
26#include "gdbcore.h"
65554fef 27#include "elf-bfd.h" /* for elfcore_write_* */
c3f6f71d 28#include "gdbcmd.h"
0fda6bd2 29#include "gdbthread.h"
7f7fe91e 30#include "regcache.h"
28439f5e 31#include "inf-child.h"
c906108c 32
c3f6f71d 33#if defined (NEW_PROC_API)
0df8b418 34#define _STRUCTURED_PROC 1 /* Should be done by configure script. */
c3f6f71d 35#endif
c906108c 36
c3f6f71d 37#include <sys/procfs.h>
37de36c6 38#ifdef HAVE_SYS_FAULT_H
c3f6f71d 39#include <sys/fault.h>
37de36c6
KB
40#endif
41#ifdef HAVE_SYS_SYSCALL_H
c3f6f71d 42#include <sys/syscall.h>
37de36c6 43#endif
c3f6f71d 44#include <sys/errno.h>
2555fe1a 45#include "gdb_wait.h"
0fda6bd2
JM
46#include <signal.h>
47#include <ctype.h>
92107356 48#include "gdb_bfd.h"
0e9f083f 49#include <string.h>
df8f7274 50#include "gdb_assert.h"
44270758 51#include "inflow.h"
4e73f23d 52#include "auxv.h"
d1a7880c 53#include "procfs.h"
27087a3d 54#include "observer.h"
0fda6bd2 55
77382aee
PA
56/* This module provides the interface between GDB and the
57 /proc file system, which is used on many versions of Unix
58 as a means for debuggers to control other processes.
59
60 Examples of the systems that use this interface are:
61
62 Irix
63 Solaris
64 OSF
77382aee
PA
65 AIX5
66
67 /proc works by imitating a file system: you open a simulated file
68 that represents the process you wish to interact with, and perform
69 operations on that "file" in order to examine or change the state
70 of the other process.
71
72 The most important thing to know about /proc and this module is
73 that there are two very different interfaces to /proc:
74
75 One that uses the ioctl system call, and another that uses read
76 and write system calls.
77
78 This module has to support both /proc interfaces. This means that
79 there are two different ways of doing every basic operation.
80
81 In order to keep most of the code simple and clean, I have defined
82 an interface "layer" which hides all these system calls. An ifdef
83 (NEW_PROC_API) determines which interface we are using, and most or
84 all occurrances of this ifdef should be confined to this interface
85 layer. */
86
87/* Determine which /proc API we are using: The ioctl API defines
88 PIOCSTATUS, while the read/write (multiple fd) API never does. */
c906108c 89
c3f6f71d 90#ifdef NEW_PROC_API
c906108c 91#include <sys/types.h>
2978b111 92#include <dirent.h> /* opendir/readdir, for listing the LWP's */
c3f6f71d 93#endif
c906108c 94
c3f6f71d
JM
95#include <fcntl.h> /* for O_RDONLY */
96#include <unistd.h> /* for "X_OK" */
53ce3c39 97#include <sys/stat.h> /* for struct stat */
c906108c 98
103b3ef5
MS
99/* Note: procfs-utils.h must be included after the above system header
100 files, because it redefines various system calls using macros.
101 This may be incompatible with the prototype declarations. */
102
103b3ef5
MS
103#include "proc-utils.h"
104
77382aee 105/* Prototypes for supply_gregset etc. */
c60c0f5f
MS
106#include "gregset.h"
107
c3f6f71d 108/* =================== TARGET_OPS "MODULE" =================== */
c906108c 109
77382aee 110/* This module defines the GDB target vector and its methods. */
c906108c 111
136d6dae 112static void procfs_attach (struct target_ops *, char *, int);
52554a0e 113static void procfs_detach (struct target_ops *, const char *, int);
28439f5e 114static void procfs_resume (struct target_ops *,
2ea28649 115 ptid_t, int, enum gdb_signal);
f9c72d52 116static void procfs_stop (ptid_t);
a14ed312 117static void procfs_files_info (struct target_ops *);
28439f5e
PA
118static void procfs_fetch_registers (struct target_ops *,
119 struct regcache *, int);
120static void procfs_store_registers (struct target_ops *,
121 struct regcache *, int);
13bdd2e7 122static void procfs_pass_signals (int, unsigned char *);
7d85a9c0 123static void procfs_kill_inferior (struct target_ops *ops);
136d6dae 124static void procfs_mourn_inferior (struct target_ops *ops);
77382aee 125static void procfs_create_inferior (struct target_ops *, char *,
136d6dae 126 char *, char **, int);
117de6a9 127static ptid_t procfs_wait (struct target_ops *,
4fcbb494 128 ptid_t, struct target_waitstatus *, int);
0b62613e 129static int procfs_xfer_memory (CORE_ADDR, gdb_byte *, int, int,
043780a1
AC
130 struct mem_attrib *attrib,
131 struct target_ops *);
4ac248ca 132static target_xfer_partial_ftype procfs_xfer_partial;
a14ed312 133
28439f5e 134static int procfs_thread_alive (struct target_ops *ops, ptid_t);
a14ed312 135
d3581e61
JB
136static void procfs_find_new_threads (struct target_ops *ops);
137static char *procfs_pid_to_str (struct target_ops *, ptid_t);
c3f6f71d 138
1a04d88f 139static int proc_find_memory_regions (find_memory_region_ftype, void *);
be4d1333
MS
140
141static char * procfs_make_note_section (bfd *, int *);
142
1e03ad20
KB
143static int procfs_can_use_hw_breakpoint (int, int, int);
144
145b16a9
UW
145static void procfs_info_proc (struct target_ops *, char *,
146 enum info_proc_what);
147
c47ffbe3 148#if defined (PR_MODEL_NATIVE) && (PR_MODEL_NATIVE == PR_MODEL_LP64)
77382aee
PA
149/* When GDB is built as 64-bit application on Solaris, the auxv data
150 is presented in 64-bit format. We need to provide a custom parser
151 to handle that. */
c47ffbe3
VP
152static int
153procfs_auxv_parse (struct target_ops *ops, gdb_byte **readptr,
77382aee 154 gdb_byte *endptr, CORE_ADDR *typep, CORE_ADDR *valp)
c47ffbe3 155{
f5656ead 156 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
c47ffbe3
VP
157 gdb_byte *ptr = *readptr;
158
159 if (endptr == ptr)
160 return 0;
77382aee 161
c47ffbe3
VP
162 if (endptr - ptr < 8 * 2)
163 return -1;
164
e17a4113 165 *typep = extract_unsigned_integer (ptr, 4, byte_order);
c47ffbe3
VP
166 ptr += 8;
167 /* The size of data is always 64-bit. If the application is 32-bit,
168 it will be zero extended, as expected. */
e17a4113 169 *valp = extract_unsigned_integer (ptr, 8, byte_order);
c47ffbe3
VP
170 ptr += 8;
171
172 *readptr = ptr;
173 return 1;
174}
175#endif
176
d1a7880c 177struct target_ops *
28439f5e 178procfs_target (void)
c3f6f71d 179{
28439f5e
PA
180 struct target_ops *t = inf_child_target ();
181
77382aee
PA
182 t->to_shortname = "procfs";
183 t->to_longname = "Unix /proc child process";
184 t->to_doc =
c3f6f71d 185 "Unix /proc child process (started by the \"run\" command).";
77382aee
PA
186 t->to_create_inferior = procfs_create_inferior;
187 t->to_kill = procfs_kill_inferior;
188 t->to_mourn_inferior = procfs_mourn_inferior;
189 t->to_attach = procfs_attach;
190 t->to_detach = procfs_detach;
191 t->to_wait = procfs_wait;
192 t->to_resume = procfs_resume;
193 t->to_fetch_registers = procfs_fetch_registers;
194 t->to_store_registers = procfs_store_registers;
195 t->to_xfer_partial = procfs_xfer_partial;
28439f5e 196 t->deprecated_xfer_memory = procfs_xfer_memory;
2455069d 197 t->to_pass_signals = procfs_pass_signals;
77382aee
PA
198 t->to_files_info = procfs_files_info;
199 t->to_stop = procfs_stop;
28439f5e 200
77382aee
PA
201 t->to_find_new_threads = procfs_find_new_threads;
202 t->to_thread_alive = procfs_thread_alive;
203 t->to_pid_to_str = procfs_pid_to_str;
28439f5e 204
77382aee 205 t->to_has_thread_control = tc_schedlock;
28439f5e
PA
206 t->to_find_memory_regions = proc_find_memory_regions;
207 t->to_make_corefile_notes = procfs_make_note_section;
145b16a9 208 t->to_info_proc = procfs_info_proc;
c47ffbe3
VP
209
210#if defined(PR_MODEL_NATIVE) && (PR_MODEL_NATIVE == PR_MODEL_LP64)
28439f5e 211 t->to_auxv_parse = procfs_auxv_parse;
c47ffbe3
VP
212#endif
213
77382aee 214 t->to_magic = OPS_MAGIC;
28439f5e
PA
215
216 return t;
c3f6f71d 217}
c906108c 218
c3f6f71d
JM
219/* =================== END, TARGET_OPS "MODULE" =================== */
220
77382aee
PA
221/* World Unification:
222
223 Put any typedefs, defines etc. here that are required for the
224 unification of code that handles different versions of /proc. */
c3f6f71d
JM
225
226#ifdef NEW_PROC_API /* Solaris 7 && 8 method for watchpoints */
37de36c6 227#ifdef WA_READ
19958708 228 enum { READ_WATCHFLAG = WA_READ,
c3f6f71d
JM
229 WRITE_WATCHFLAG = WA_WRITE,
230 EXEC_WATCHFLAG = WA_EXEC,
231 AFTER_WATCHFLAG = WA_TRAPAFTER
232 };
233#endif
234#else /* Irix method for watchpoints */
19958708 235 enum { READ_WATCHFLAG = MA_READ,
c3f6f71d
JM
236 WRITE_WATCHFLAG = MA_WRITE,
237 EXEC_WATCHFLAG = MA_EXEC,
238 AFTER_WATCHFLAG = 0 /* trapafter not implemented */
239 };
240#endif
241
37de36c6
KB
242/* gdb_sigset_t */
243#ifdef HAVE_PR_SIGSET_T
244typedef pr_sigset_t gdb_sigset_t;
245#else
246typedef sigset_t gdb_sigset_t;
247#endif
248
249/* sigaction */
250#ifdef HAVE_PR_SIGACTION64_T
251typedef pr_sigaction64_t gdb_sigaction_t;
252#else
253typedef struct sigaction gdb_sigaction_t;
254#endif
255
256/* siginfo */
257#ifdef HAVE_PR_SIGINFO64_T
258typedef pr_siginfo64_t gdb_siginfo_t;
259#else
a5362b9a 260typedef siginfo_t gdb_siginfo_t;
37de36c6
KB
261#endif
262
3c95f01c
JB
263/* On mips-irix, praddset and prdelset are defined in such a way that
264 they return a value, which causes GCC to emit a -Wunused error
265 because the returned value is not used. Prevent this warning
266 by casting the return value to void. On sparc-solaris, this issue
267 does not exist because the definition of these macros already include
268 that cast to void. */
269#define gdb_praddset(sp, flag) ((void) praddset (sp, flag))
270#define gdb_prdelset(sp, flag) ((void) prdelset (sp, flag))
271
37de36c6
KB
272/* gdb_premptysysset */
273#ifdef premptysysset
274#define gdb_premptysysset premptysysset
275#else
276#define gdb_premptysysset premptyset
277#endif
278
279/* praddsysset */
280#ifdef praddsysset
281#define gdb_praddsysset praddsysset
282#else
3c95f01c 283#define gdb_praddsysset gdb_praddset
37de36c6
KB
284#endif
285
286/* prdelsysset */
287#ifdef prdelsysset
288#define gdb_prdelsysset prdelsysset
289#else
3c95f01c 290#define gdb_prdelsysset gdb_prdelset
37de36c6
KB
291#endif
292
293/* prissyssetmember */
294#ifdef prissyssetmember
295#define gdb_pr_issyssetmember prissyssetmember
296#else
297#define gdb_pr_issyssetmember prismember
298#endif
299
300/* As a feature test, saying ``#if HAVE_PRSYSENT_T'' everywhere isn't
301 as intuitively descriptive as it could be, so we'll define
302 DYNAMIC_SYSCALLS to mean the same thing. Anyway, at the time of
303 this writing, this feature is only found on AIX5 systems and
304 basically means that the set of syscalls is not fixed. I.e,
305 there's no nice table that one can #include to get all of the
306 syscall numbers. Instead, they're stored in /proc/PID/sysent
307 for each process. We are at least guaranteed that they won't
308 change over the lifetime of the process. But each process could
77382aee 309 (in theory) have different syscall numbers. */
37de36c6
KB
310#ifdef HAVE_PRSYSENT_T
311#define DYNAMIC_SYSCALLS
312#endif
c3f6f71d
JM
313
314
315
316/* =================== STRUCT PROCINFO "MODULE" =================== */
317
318 /* FIXME: this comment will soon be out of date W.R.T. threads. */
319
320/* The procinfo struct is a wrapper to hold all the state information
321 concerning a /proc process. There should be exactly one procinfo
322 for each process, and since GDB currently can debug only one
323 process at a time, that means there should be only one procinfo.
324 All of the LWP's of a process can be accessed indirectly thru the
325 single process procinfo.
326
327 However, against the day when GDB may debug more than one process,
328 this data structure is kept in a list (which for now will hold no
329 more than one member), and many functions will have a pointer to a
330 procinfo as an argument.
331
332 There will be a separate procinfo structure for use by the (not yet
333 implemented) "info proc" command, so that we can print useful
334 information about any random process without interfering with the
0df8b418 335 inferior's procinfo information. */
c3f6f71d
JM
336
337#ifdef NEW_PROC_API
338/* format strings for /proc paths */
339# ifndef CTL_PROC_NAME_FMT
340# define MAIN_PROC_NAME_FMT "/proc/%d"
341# define CTL_PROC_NAME_FMT "/proc/%d/ctl"
342# define AS_PROC_NAME_FMT "/proc/%d/as"
343# define MAP_PROC_NAME_FMT "/proc/%d/map"
344# define STATUS_PROC_NAME_FMT "/proc/%d/status"
345# define MAX_PROC_NAME_SIZE sizeof("/proc/99999/lwp/8096/lstatus")
346# endif
347/* the name of the proc status struct depends on the implementation */
348typedef pstatus_t gdb_prstatus_t;
349typedef lwpstatus_t gdb_lwpstatus_t;
350#else /* ! NEW_PROC_API */
351/* format strings for /proc paths */
352# ifndef CTL_PROC_NAME_FMT
353# define MAIN_PROC_NAME_FMT "/proc/%05d"
354# define CTL_PROC_NAME_FMT "/proc/%05d"
355# define AS_PROC_NAME_FMT "/proc/%05d"
356# define MAP_PROC_NAME_FMT "/proc/%05d"
357# define STATUS_PROC_NAME_FMT "/proc/%05d"
358# define MAX_PROC_NAME_SIZE sizeof("/proc/ttttppppp")
359# endif
0df8b418 360/* The name of the proc status struct depends on the implementation. */
c5aa993b 361typedef prstatus_t gdb_prstatus_t;
c3f6f71d
JM
362typedef prstatus_t gdb_lwpstatus_t;
363#endif /* NEW_PROC_API */
c906108c 364
c3f6f71d
JM
365typedef struct procinfo {
366 struct procinfo *next;
367 int pid; /* Process ID */
368 int tid; /* Thread/LWP id */
c906108c 369
c3f6f71d
JM
370 /* process state */
371 int was_stopped;
372 int ignore_next_sigstop;
c906108c 373
19958708 374 /* The following four fd fields may be identical, or may contain
c3f6f71d
JM
375 several different fd's, depending on the version of /proc
376 (old ioctl or new read/write). */
c906108c 377
c3f6f71d 378 int ctl_fd; /* File descriptor for /proc control file */
77382aee
PA
379
380 /* The next three file descriptors are actually only needed in the
381 read/write, multiple-file-descriptor implemenation
382 (NEW_PROC_API). However, to avoid a bunch of #ifdefs in the
383 code, we will use them uniformly by (in the case of the ioctl
384 single-file-descriptor implementation) filling them with copies
385 of the control fd. */
c3f6f71d
JM
386 int status_fd; /* File descriptor for /proc status file */
387 int as_fd; /* File descriptor for /proc as file */
c906108c 388
c3f6f71d 389 char pathname[MAX_PROC_NAME_SIZE]; /* Pathname to /proc entry */
c906108c 390
c3f6f71d 391 fltset_t saved_fltset; /* Saved traced hardware fault set */
37de36c6
KB
392 gdb_sigset_t saved_sigset; /* Saved traced signal set */
393 gdb_sigset_t saved_sighold; /* Saved held signal set */
394 sysset_t *saved_exitset; /* Saved traced system call exit set */
395 sysset_t *saved_entryset; /* Saved traced system call entry set */
c906108c 396
c3f6f71d 397 gdb_prstatus_t prstatus; /* Current process status info */
c906108c 398
c3f6f71d
JM
399#ifndef NEW_PROC_API
400 gdb_fpregset_t fpregset; /* Current floating point registers */
c5aa993b 401#endif
37de36c6
KB
402
403#ifdef DYNAMIC_SYSCALLS
404 int num_syscalls; /* Total number of syscalls */
405 char **syscall_names; /* Syscall number to name map */
406#endif
19958708 407
c3f6f71d 408 struct procinfo *thread_list;
c906108c 409
c3f6f71d
JM
410 int status_valid : 1;
411 int gregs_valid : 1;
412 int fpregs_valid : 1;
413 int threads_valid: 1;
414} procinfo;
c906108c 415
c3f6f71d 416static char errmsg[128]; /* shared error msg buffer */
c906108c 417
c3f6f71d 418/* Function prototypes for procinfo module: */
c906108c 419
a14ed312
KB
420static procinfo *find_procinfo_or_die (int pid, int tid);
421static procinfo *find_procinfo (int pid, int tid);
422static procinfo *create_procinfo (int pid, int tid);
423static void destroy_procinfo (procinfo * p);
004527cb 424static void do_destroy_procinfo_cleanup (void *);
a14ed312
KB
425static void dead_procinfo (procinfo * p, char *msg, int killp);
426static int open_procinfo_files (procinfo * p, int which);
427static void close_procinfo_files (procinfo * p);
37de36c6
KB
428static int sysset_t_size (procinfo *p);
429static sysset_t *sysset_t_alloc (procinfo * pi);
430#ifdef DYNAMIC_SYSCALLS
431static void load_syscalls (procinfo *pi);
432static void free_syscalls (procinfo *pi);
433static int find_syscall (procinfo *pi, char *name);
434#endif /* DYNAMIC_SYSCALLS */
c906108c 435
e9ef4f39 436static int iterate_over_mappings
b8edc417
JK
437 (procinfo *pi, find_memory_region_ftype child_func, void *data,
438 int (*func) (struct prmap *map, find_memory_region_ftype child_func,
77382aee 439 void *data));
e9ef4f39 440
c3f6f71d
JM
441/* The head of the procinfo list: */
442static procinfo * procinfo_list;
c906108c 443
77382aee
PA
444/* Search the procinfo list. Return a pointer to procinfo, or NULL if
445 not found. */
c906108c 446
19958708 447static procinfo *
fba45db2 448find_procinfo (int pid, int tid)
c5aa993b 449{
c3f6f71d 450 procinfo *pi;
c906108c 451
c3f6f71d
JM
452 for (pi = procinfo_list; pi; pi = pi->next)
453 if (pi->pid == pid)
454 break;
c906108c 455
c3f6f71d
JM
456 if (pi)
457 if (tid)
458 {
459 /* Don't check threads_valid. If we're updating the
460 thread_list, we want to find whatever threads are already
461 here. This means that in general it is the caller's
462 responsibility to check threads_valid and update before
463 calling find_procinfo, if the caller wants to find a new
77382aee 464 thread. */
c3f6f71d
JM
465
466 for (pi = pi->thread_list; pi; pi = pi->next)
467 if (pi->tid == tid)
468 break;
469 }
c906108c 470
c3f6f71d
JM
471 return pi;
472}
c906108c 473
77382aee 474/* Calls find_procinfo, but errors on failure. */
c906108c 475
c3f6f71d 476static procinfo *
fba45db2 477find_procinfo_or_die (int pid, int tid)
c3f6f71d
JM
478{
479 procinfo *pi = find_procinfo (pid, tid);
c906108c 480
c3f6f71d 481 if (pi == NULL)
0fda6bd2
JM
482 {
483 if (tid)
3e43a32a
MS
484 error (_("procfs: couldn't find pid %d "
485 "(kernel thread %d) in procinfo list."),
0fda6bd2
JM
486 pid, tid);
487 else
8a3fe4f8 488 error (_("procfs: couldn't find pid %d in procinfo list."), pid);
0fda6bd2 489 }
c3f6f71d
JM
490 return pi;
491}
c906108c 492
77382aee
PA
493/* Wrapper for `open'. The appropriate open call is attempted; if
494 unsuccessful, it will be retried as many times as needed for the
495 EAGAIN and EINTR conditions.
19958708 496
77382aee
PA
497 For other conditions, retry the open a limited number of times. In
498 addition, a short sleep is imposed prior to retrying the open. The
499 reason for this sleep is to give the kernel a chance to catch up
500 and create the file in question in the event that GDB "wins" the
501 race to open a file before the kernel has created it. */
19958708 502
4d1bcd09
KB
503static int
504open_with_retry (const char *pathname, int flags)
505{
506 int retries_remaining, status;
507
508 retries_remaining = 2;
509
510 while (1)
511 {
512 status = open (pathname, flags);
513
514 if (status >= 0 || retries_remaining == 0)
515 break;
516 else if (errno != EINTR && errno != EAGAIN)
517 {
518 retries_remaining--;
519 sleep (1);
520 }
521 }
522
523 return status;
524}
525
77382aee
PA
526/* Open the file descriptor for the process or LWP. If NEW_PROC_API
527 is defined, we only open the control file descriptor; the others
528 are opened lazily as needed. Otherwise (if not NEW_PROC_API),
529 there is only one real file descriptor, but we keep multiple copies
530 of it so that the code that uses them does not have to be #ifdef'd.
531 Returns the file descriptor, or zero for failure. */
c906108c 532
c3f6f71d 533enum { FD_CTL, FD_STATUS, FD_AS };
c906108c 534
c3f6f71d 535static int
fba45db2 536open_procinfo_files (procinfo *pi, int which)
c3f6f71d 537{
0fda6bd2 538#ifdef NEW_PROC_API
c3f6f71d 539 char tmp[MAX_PROC_NAME_SIZE];
0fda6bd2 540#endif
c3f6f71d
JM
541 int fd;
542
77382aee
PA
543 /* This function is getting ALMOST long enough to break up into
544 several. Here is some rationale:
545
05b4bd79 546 NEW_PROC_API (Solaris 2.6, Solaris 2.7):
77382aee
PA
547 There are several file descriptors that may need to be open
548 for any given process or LWP. The ones we're intereted in are:
549 - control (ctl) write-only change the state
550 - status (status) read-only query the state
551 - address space (as) read/write access memory
552 - map (map) read-only virtual addr map
553 Most of these are opened lazily as they are needed.
554 The pathnames for the 'files' for an LWP look slightly
555 different from those of a first-class process:
556 Pathnames for a process (<proc-id>):
557 /proc/<proc-id>/ctl
558 /proc/<proc-id>/status
559 /proc/<proc-id>/as
560 /proc/<proc-id>/map
561 Pathnames for an LWP (lwp-id):
562 /proc/<proc-id>/lwp/<lwp-id>/lwpctl
563 /proc/<proc-id>/lwp/<lwp-id>/lwpstatus
564 An LWP has no map or address space file descriptor, since
565 the memory map and address space are shared by all LWPs.
566
567 Everyone else (Solaris 2.5, Irix, OSF)
568 There is only one file descriptor for each process or LWP.
569 For convenience, we copy the same file descriptor into all
570 three fields of the procinfo struct (ctl_fd, status_fd, and
571 as_fd, see NEW_PROC_API above) so that code that uses them
572 doesn't need any #ifdef's.
573 Pathname for all:
574 /proc/<proc-id>
575
576 Solaris 2.5 LWP's:
577 Each LWP has an independent file descriptor, but these
578 are not obtained via the 'open' system call like the rest:
579 instead, they're obtained thru an ioctl call (PIOCOPENLWP)
580 to the file descriptor of the parent process.
581
582 OSF threads:
583 These do not even have their own independent file descriptor.
584 All operations are carried out on the file descriptor of the
585 parent process. Therefore we just call open again for each
0df8b418 586 thread, getting a new handle for the same 'file'. */
c3f6f71d
JM
587
588#ifdef NEW_PROC_API
77382aee
PA
589 /* In this case, there are several different file descriptors that
590 we might be asked to open. The control file descriptor will be
591 opened early, but the others will be opened lazily as they are
592 needed. */
c3f6f71d
JM
593
594 strcpy (tmp, pi->pathname);
0df8b418 595 switch (which) { /* Which file descriptor to open? */
c3f6f71d
JM
596 case FD_CTL:
597 if (pi->tid)
598 strcat (tmp, "/lwpctl");
599 else
600 strcat (tmp, "/ctl");
4d1bcd09 601 fd = open_with_retry (tmp, O_WRONLY);
e28cade7 602 if (fd < 0)
c3f6f71d
JM
603 return 0; /* fail */
604 pi->ctl_fd = fd;
605 break;
606 case FD_AS:
607 if (pi->tid)
0df8b418 608 return 0; /* There is no 'as' file descriptor for an lwp. */
c3f6f71d 609 strcat (tmp, "/as");
4d1bcd09 610 fd = open_with_retry (tmp, O_RDWR);
e28cade7 611 if (fd < 0)
c3f6f71d
JM
612 return 0; /* fail */
613 pi->as_fd = fd;
614 break;
615 case FD_STATUS:
616 if (pi->tid)
617 strcat (tmp, "/lwpstatus");
618 else
619 strcat (tmp, "/status");
4d1bcd09 620 fd = open_with_retry (tmp, O_RDONLY);
e28cade7 621 if (fd < 0)
c3f6f71d
JM
622 return 0; /* fail */
623 pi->status_fd = fd;
624 break;
625 default:
626 return 0; /* unknown file descriptor */
627 }
628#else /* not NEW_PROC_API */
77382aee
PA
629 /* In this case, there is only one file descriptor for each procinfo
630 (ie. each process or LWP). In fact, only the file descriptor for
631 the process can actually be opened by an 'open' system call. The
632 ones for the LWPs have to be obtained thru an IOCTL call on the
633 process's file descriptor.
634
635 For convenience, we copy each procinfo's single file descriptor
636 into all of the fields occupied by the several file descriptors
637 of the NEW_PROC_API implementation. That way, the code that uses
638 them can be written without ifdefs. */
c3f6f71d
JM
639
640
641#ifdef PIOCTSTATUS /* OSF */
0df8b418 642 /* Only one FD; just open it. */
e28cade7 643 if ((fd = open_with_retry (pi->pathname, O_RDWR)) < 0)
c3f6f71d 644 return 0;
0df8b418 645#else /* Sol 2.5, Irix, other? */
c3f6f71d
JM
646 if (pi->tid == 0) /* Master procinfo for the process */
647 {
4d1bcd09 648 fd = open_with_retry (pi->pathname, O_RDWR);
e28cade7 649 if (fd < 0)
c3f6f71d
JM
650 return 0; /* fail */
651 }
652 else /* LWP thread procinfo */
653 {
654#ifdef PIOCOPENLWP /* Sol 2.5, thread/LWP */
655 procinfo *process;
656 int lwpid = pi->tid;
657
0df8b418 658 /* Find the procinfo for the entire process. */
c3f6f71d
JM
659 if ((process = find_procinfo (pi->pid, 0)) == NULL)
660 return 0; /* fail */
661
0df8b418 662 /* Now obtain the file descriptor for the LWP. */
e28cade7 663 if ((fd = ioctl (process->ctl_fd, PIOCOPENLWP, &lwpid)) < 0)
c3f6f71d 664 return 0; /* fail */
0df8b418
MS
665#else /* Irix, other? */
666 return 0; /* Don't know how to open threads. */
c3f6f71d
JM
667#endif /* Sol 2.5 PIOCOPENLWP */
668 }
669#endif /* OSF PIOCTSTATUS */
670 pi->ctl_fd = pi->as_fd = pi->status_fd = fd;
671#endif /* NEW_PROC_API */
c906108c 672
c3f6f71d
JM
673 return 1; /* success */
674}
c906108c 675
77382aee
PA
676/* Allocate a data structure and link it into the procinfo list.
677 First tries to find a pre-existing one (FIXME: why?). Returns the
678 pointer to new procinfo struct. */
c906108c 679
c3f6f71d 680static procinfo *
fba45db2 681create_procinfo (int pid, int tid)
c3f6f71d 682{
0b62613e 683 procinfo *pi, *parent = NULL;
c906108c 684
0d06e24b 685 if ((pi = find_procinfo (pid, tid)))
0df8b418 686 return pi; /* Already exists, nothing to do. */
c906108c 687
0df8b418 688 /* Find parent before doing malloc, to save having to cleanup. */
c3f6f71d
JM
689 if (tid != 0)
690 parent = find_procinfo_or_die (pid, 0); /* FIXME: should I
691 create it if it
0df8b418 692 doesn't exist yet? */
c906108c 693
c3f6f71d
JM
694 pi = (procinfo *) xmalloc (sizeof (procinfo));
695 memset (pi, 0, sizeof (procinfo));
696 pi->pid = pid;
697 pi->tid = tid;
c906108c 698
37de36c6
KB
699#ifdef DYNAMIC_SYSCALLS
700 load_syscalls (pi);
701#endif
702
1d5e0602
KB
703 pi->saved_entryset = sysset_t_alloc (pi);
704 pi->saved_exitset = sysset_t_alloc (pi);
705
c3f6f71d
JM
706 /* Chain into list. */
707 if (tid == 0)
708 {
709 sprintf (pi->pathname, MAIN_PROC_NAME_FMT, pid);
710 pi->next = procinfo_list;
711 procinfo_list = pi;
712 }
713 else
714 {
715#ifdef NEW_PROC_API
716 sprintf (pi->pathname, "/proc/%05d/lwp/%d", pid, tid);
717#else
718 sprintf (pi->pathname, MAIN_PROC_NAME_FMT, pid);
719#endif
720 pi->next = parent->thread_list;
721 parent->thread_list = pi;
722 }
723 return pi;
724}
c906108c 725
77382aee 726/* Close all file descriptors associated with the procinfo. */
c906108c 727
c3f6f71d 728static void
fba45db2 729close_procinfo_files (procinfo *pi)
c3f6f71d
JM
730{
731 if (pi->ctl_fd > 0)
732 close (pi->ctl_fd);
733#ifdef NEW_PROC_API
734 if (pi->as_fd > 0)
735 close (pi->as_fd);
736 if (pi->status_fd > 0)
737 close (pi->status_fd);
738#endif
739 pi->ctl_fd = pi->as_fd = pi->status_fd = 0;
740}
c906108c 741
77382aee 742/* Destructor function. Close, unlink and deallocate the object. */
c906108c 743
c3f6f71d 744static void
fba45db2 745destroy_one_procinfo (procinfo **list, procinfo *pi)
c3f6f71d
JM
746{
747 procinfo *ptr;
748
77382aee 749 /* Step one: unlink the procinfo from its list. */
c3f6f71d
JM
750 if (pi == *list)
751 *list = pi->next;
19958708 752 else
c3f6f71d
JM
753 for (ptr = *list; ptr; ptr = ptr->next)
754 if (ptr->next == pi)
755 {
756 ptr->next = pi->next;
757 break;
758 }
7a292a7a 759
77382aee 760 /* Step two: close any open file descriptors. */
c3f6f71d 761 close_procinfo_files (pi);
7a292a7a 762
77382aee 763 /* Step three: free the memory. */
37de36c6
KB
764#ifdef DYNAMIC_SYSCALLS
765 free_syscalls (pi);
766#endif
1d5e0602
KB
767 xfree (pi->saved_entryset);
768 xfree (pi->saved_exitset);
b8c9b27d 769 xfree (pi);
c3f6f71d 770}
c906108c 771
c3f6f71d 772static void
fba45db2 773destroy_procinfo (procinfo *pi)
c3f6f71d
JM
774{
775 procinfo *tmp;
c906108c 776
0df8b418 777 if (pi->tid != 0) /* Destroy a thread procinfo. */
c3f6f71d 778 {
0df8b418 779 tmp = find_procinfo (pi->pid, 0); /* Find the parent process. */
c3f6f71d
JM
780 destroy_one_procinfo (&tmp->thread_list, pi);
781 }
0df8b418 782 else /* Destroy a process procinfo and all its threads. */
c3f6f71d
JM
783 {
784 /* First destroy the children, if any; */
785 while (pi->thread_list != NULL)
786 destroy_one_procinfo (&pi->thread_list, pi->thread_list);
787 /* Then destroy the parent. Genocide!!! */
788 destroy_one_procinfo (&procinfo_list, pi);
789 }
790}
c906108c 791
004527cb
AC
792static void
793do_destroy_procinfo_cleanup (void *pi)
794{
795 destroy_procinfo (pi);
796}
797
c3f6f71d 798enum { NOKILL, KILL };
c906108c 799
77382aee
PA
800/* To be called on a non_recoverable error for a procinfo. Prints
801 error messages, optionally sends a SIGKILL to the process, then
802 destroys the data structure. */
c906108c 803
c3f6f71d 804static void
fba45db2 805dead_procinfo (procinfo *pi, char *msg, int kill_p)
c3f6f71d
JM
806{
807 char procfile[80];
c906108c 808
c3f6f71d
JM
809 if (pi->pathname)
810 {
811 print_sys_errmsg (pi->pathname, errno);
812 }
813 else
814 {
815 sprintf (procfile, "process %d", pi->pid);
816 print_sys_errmsg (procfile, errno);
817 }
818 if (kill_p == KILL)
819 kill (pi->pid, SIGKILL);
c906108c 820
c3f6f71d 821 destroy_procinfo (pi);
0b62613e 822 error ("%s", msg);
c3f6f71d 823}
c906108c 824
77382aee
PA
825/* Returns the (complete) size of a sysset_t struct. Normally, this
826 is just sizeof (sysset_t), but in the case of Monterey/64, the
827 actual size of sysset_t isn't known until runtime. */
37de36c6
KB
828
829static int
830sysset_t_size (procinfo * pi)
831{
832#ifndef DYNAMIC_SYSCALLS
833 return sizeof (sysset_t);
834#else
835 return sizeof (sysset_t) - sizeof (uint64_t)
836 + sizeof (uint64_t) * ((pi->num_syscalls + (8 * sizeof (uint64_t) - 1))
837 / (8 * sizeof (uint64_t)));
838#endif
839}
840
77382aee 841/* Allocate and (partially) initialize a sysset_t struct. */
37de36c6
KB
842
843static sysset_t *
844sysset_t_alloc (procinfo * pi)
845{
846 sysset_t *ret;
847 int size = sysset_t_size (pi);
f4a14ae6 848
37de36c6
KB
849 ret = xmalloc (size);
850#ifdef DYNAMIC_SYSCALLS
77382aee
PA
851 ret->pr_size = ((pi->num_syscalls + (8 * sizeof (uint64_t) - 1))
852 / (8 * sizeof (uint64_t)));
37de36c6
KB
853#endif
854 return ret;
855}
856
857#ifdef DYNAMIC_SYSCALLS
858
77382aee 859/* Extract syscall numbers and names from /proc/<pid>/sysent. Initialize
37de36c6
KB
860 pi->num_syscalls with the number of syscalls and pi->syscall_names
861 with the names. (Certain numbers may be skipped in which case the
0df8b418 862 names for these numbers will be left as NULL.) */
37de36c6
KB
863
864#define MAX_SYSCALL_NAME_LENGTH 256
865#define MAX_SYSCALLS 65536
866
867static void
868load_syscalls (procinfo *pi)
869{
870 char pathname[MAX_PROC_NAME_SIZE];
871 int sysent_fd;
872 prsysent_t header;
873 prsyscall_t *syscalls;
874 int i, size, maxcall;
e28cade7 875 struct cleanup *cleanups;
37de36c6
KB
876
877 pi->num_syscalls = 0;
878 pi->syscall_names = 0;
879
77382aee 880 /* Open the file descriptor for the sysent file. */
37de36c6 881 sprintf (pathname, "/proc/%d/sysent", pi->pid);
4d1bcd09 882 sysent_fd = open_with_retry (pathname, O_RDONLY);
37de36c6
KB
883 if (sysent_fd < 0)
884 {
8a3fe4f8 885 error (_("load_syscalls: Can't open /proc/%d/sysent"), pi->pid);
37de36c6 886 }
e28cade7 887 cleanups = make_cleanup_close (sysent_fd);
37de36c6
KB
888
889 size = sizeof header - sizeof (prsyscall_t);
890 if (read (sysent_fd, &header, size) != size)
891 {
8a3fe4f8 892 error (_("load_syscalls: Error reading /proc/%d/sysent"), pi->pid);
37de36c6
KB
893 }
894
895 if (header.pr_nsyscalls == 0)
896 {
3e43a32a
MS
897 error (_("load_syscalls: /proc/%d/sysent contains no syscalls!"),
898 pi->pid);
37de36c6
KB
899 }
900
901 size = header.pr_nsyscalls * sizeof (prsyscall_t);
902 syscalls = xmalloc (size);
e28cade7 903 make_cleanup (free_current_contents, &syscalls);
37de36c6
KB
904
905 if (read (sysent_fd, syscalls, size) != size)
e28cade7 906 error (_("load_syscalls: Error reading /proc/%d/sysent"), pi->pid);
37de36c6
KB
907
908 /* Find maximum syscall number. This may not be the same as
909 pr_nsyscalls since that value refers to the number of entries
910 in the table. (Also, the docs indicate that some system
0df8b418 911 call numbers may be skipped.) */
37de36c6
KB
912
913 maxcall = syscalls[0].pr_number;
914
915 for (i = 1; i < header.pr_nsyscalls; i++)
916 if (syscalls[i].pr_number > maxcall
77382aee 917 && syscalls[i].pr_nameoff > 0
37de36c6
KB
918 && syscalls[i].pr_number < MAX_SYSCALLS)
919 maxcall = syscalls[i].pr_number;
920
921 pi->num_syscalls = maxcall+1;
922 pi->syscall_names = xmalloc (pi->num_syscalls * sizeof (char *));
923
924 for (i = 0; i < pi->num_syscalls; i++)
925 pi->syscall_names[i] = NULL;
926
77382aee 927 /* Read the syscall names in. */
37de36c6
KB
928 for (i = 0; i < header.pr_nsyscalls; i++)
929 {
930 char namebuf[MAX_SYSCALL_NAME_LENGTH];
931 int nread;
932 int callnum;
933
934 if (syscalls[i].pr_number >= MAX_SYSCALLS
77382aee 935 || syscalls[i].pr_number < 0
37de36c6
KB
936 || syscalls[i].pr_nameoff <= 0
937 || (lseek (sysent_fd, (off_t) syscalls[i].pr_nameoff, SEEK_SET)
77382aee 938 != (off_t) syscalls[i].pr_nameoff))
37de36c6
KB
939 continue;
940
941 nread = read (sysent_fd, namebuf, sizeof namebuf);
942 if (nread <= 0)
943 continue;
944
945 callnum = syscalls[i].pr_number;
946
947 if (pi->syscall_names[callnum] != NULL)
948 {
0df8b418 949 /* FIXME: Generate warning. */
37de36c6
KB
950 continue;
951 }
952
953 namebuf[nread-1] = '\0';
954 size = strlen (namebuf) + 1;
955 pi->syscall_names[callnum] = xmalloc (size);
956 strncpy (pi->syscall_names[callnum], namebuf, size-1);
957 pi->syscall_names[callnum][size-1] = '\0';
958 }
19958708 959
e28cade7 960 do_cleanups (cleanups);
37de36c6
KB
961}
962
77382aee 963/* Free the space allocated for the syscall names from the procinfo
37de36c6
KB
964 structure. */
965
966static void
967free_syscalls (procinfo *pi)
968{
969 if (pi->syscall_names)
970 {
971 int i;
972
973 for (i = 0; i < pi->num_syscalls; i++)
974 if (pi->syscall_names[i] != NULL)
975 xfree (pi->syscall_names[i]);
976
977 xfree (pi->syscall_names);
978 pi->syscall_names = 0;
979 }
980}
981
77382aee 982/* Given a name, look up (and return) the corresponding syscall number.
37de36c6 983 If no match is found, return -1. */
19958708 984
37de36c6
KB
985static int
986find_syscall (procinfo *pi, char *name)
987{
988 int i;
f4a14ae6 989
37de36c6
KB
990 for (i = 0; i < pi->num_syscalls; i++)
991 {
992 if (pi->syscall_names[i] && strcmp (name, pi->syscall_names[i]) == 0)
993 return i;
994 }
995 return -1;
996}
997#endif
998
c3f6f71d 999/* =================== END, STRUCT PROCINFO "MODULE" =================== */
c906108c 1000
c3f6f71d 1001/* =================== /proc "MODULE" =================== */
c906108c 1002
77382aee
PA
1003/* This "module" is the interface layer between the /proc system API
1004 and the gdb target vector functions. This layer consists of access
1005 functions that encapsulate each of the basic operations that we
1006 need to use from the /proc API.
1007
1008 The main motivation for this layer is to hide the fact that there
1009 are two very different implementations of the /proc API. Rather
1010 than have a bunch of #ifdefs all thru the gdb target vector
1011 functions, we do our best to hide them all in here. */
c906108c 1012
d3581e61
JB
1013static long proc_flags (procinfo * pi);
1014static int proc_why (procinfo * pi);
1015static int proc_what (procinfo * pi);
1016static int proc_set_current_signal (procinfo * pi, int signo);
1017static int proc_get_current_thread (procinfo * pi);
1018static int proc_iterate_over_threads
1019 (procinfo * pi,
1020 int (*func) (procinfo *, procinfo *, void *),
1021 void *ptr);
1022
1023static void
fba45db2 1024proc_warn (procinfo *pi, char *func, int line)
c3f6f71d
JM
1025{
1026 sprintf (errmsg, "procfs: %s line %d, %s", func, line, pi->pathname);
1027 print_sys_errmsg (errmsg, errno);
1028}
c906108c 1029
d3581e61 1030static void
fba45db2 1031proc_error (procinfo *pi, char *func, int line)
c3f6f71d
JM
1032{
1033 sprintf (errmsg, "procfs: %s line %d, %s", func, line, pi->pathname);
1034 perror_with_name (errmsg);
1035}
c906108c 1036
77382aee
PA
1037/* Updates the status struct in the procinfo. There is a 'valid'
1038 flag, to let other functions know when this function needs to be
1039 called (so the status is only read when it is needed). The status
1040 file descriptor is also only opened when it is needed. Returns
1041 non-zero for success, zero for failure. */
c906108c 1042
d3581e61 1043static int
fba45db2 1044proc_get_status (procinfo *pi)
c3f6f71d 1045{
0df8b418 1046 /* Status file descriptor is opened "lazily". */
c3f6f71d
JM
1047 if (pi->status_fd == 0 &&
1048 open_procinfo_files (pi, FD_STATUS) == 0)
1049 {
1050 pi->status_valid = 0;
1051 return 0;
1052 }
c906108c 1053
c3f6f71d
JM
1054#ifdef NEW_PROC_API
1055 if (lseek (pi->status_fd, 0, SEEK_SET) < 0)
1056 pi->status_valid = 0; /* fail */
1057 else
1058 {
19958708 1059 /* Sigh... I have to read a different data structure,
0df8b418 1060 depending on whether this is a main process or an LWP. */
c3f6f71d 1061 if (pi->tid)
19958708
RM
1062 pi->status_valid = (read (pi->status_fd,
1063 (char *) &pi->prstatus.pr_lwp,
c3f6f71d
JM
1064 sizeof (lwpstatus_t))
1065 == sizeof (lwpstatus_t));
1066 else
1067 {
19958708 1068 pi->status_valid = (read (pi->status_fd,
c3f6f71d
JM
1069 (char *) &pi->prstatus,
1070 sizeof (gdb_prstatus_t))
1071 == sizeof (gdb_prstatus_t));
c3f6f71d
JM
1072 }
1073 }
1074#else /* ioctl method */
1075#ifdef PIOCTSTATUS /* osf */
1076 if (pi->tid == 0) /* main process */
1077 {
0df8b418 1078 /* Just read the danged status. Now isn't that simple? */
19958708 1079 pi->status_valid =
c3f6f71d
JM
1080 (ioctl (pi->status_fd, PIOCSTATUS, &pi->prstatus) >= 0);
1081 }
1082 else
1083 {
1084 int win;
1085 struct {
1086 long pr_count;
1087 tid_t pr_error_thread;
1088 struct prstatus status;
1089 } thread_status;
1090
1091 thread_status.pr_count = 1;
1092 thread_status.status.pr_tid = pi->tid;
1093 win = (ioctl (pi->status_fd, PIOCTSTATUS, &thread_status) >= 0);
1094 if (win)
1095 {
19958708 1096 memcpy (&pi->prstatus, &thread_status.status,
c3f6f71d
JM
1097 sizeof (pi->prstatus));
1098 pi->status_valid = 1;
1099 }
1100 }
1101#else
77382aee 1102 /* Just read the danged status. Now isn't that simple? */
c3f6f71d
JM
1103 pi->status_valid = (ioctl (pi->status_fd, PIOCSTATUS, &pi->prstatus) >= 0);
1104#endif
1105#endif
c906108c 1106
c3f6f71d
JM
1107 if (pi->status_valid)
1108 {
19958708 1109 PROC_PRETTYFPRINT_STATUS (proc_flags (pi),
c3f6f71d 1110 proc_why (pi),
19958708 1111 proc_what (pi),
c3f6f71d
JM
1112 proc_get_current_thread (pi));
1113 }
c906108c 1114
77382aee 1115 /* The status struct includes general regs, so mark them valid too. */
c3f6f71d
JM
1116 pi->gregs_valid = pi->status_valid;
1117#ifdef NEW_PROC_API
77382aee
PA
1118 /* In the read/write multiple-fd model, the status struct includes
1119 the fp regs too, so mark them valid too. */
c3f6f71d
JM
1120 pi->fpregs_valid = pi->status_valid;
1121#endif
77382aee 1122 return pi->status_valid; /* True if success, false if failure. */
c3f6f71d 1123}
c906108c 1124
77382aee 1125/* Returns the process flags (pr_flags field). */
c3f6f71d 1126
d3581e61 1127static long
fba45db2 1128proc_flags (procinfo *pi)
c3f6f71d
JM
1129{
1130 if (!pi->status_valid)
1131 if (!proc_get_status (pi))
0df8b418 1132 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 1133
c3f6f71d
JM
1134#ifdef NEW_PROC_API
1135 return pi->prstatus.pr_lwp.pr_flags;
1136#else
1137 return pi->prstatus.pr_flags;
1138#endif
1139}
c906108c 1140
77382aee 1141/* Returns the pr_why field (why the process stopped). */
c906108c 1142
d3581e61 1143static int
fba45db2 1144proc_why (procinfo *pi)
c3f6f71d
JM
1145{
1146 if (!pi->status_valid)
1147 if (!proc_get_status (pi))
0df8b418 1148 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 1149
c3f6f71d
JM
1150#ifdef NEW_PROC_API
1151 return pi->prstatus.pr_lwp.pr_why;
1152#else
1153 return pi->prstatus.pr_why;
1154#endif
1155}
c906108c 1156
77382aee 1157/* Returns the pr_what field (details of why the process stopped). */
c906108c 1158
d3581e61 1159static int
fba45db2 1160proc_what (procinfo *pi)
c3f6f71d
JM
1161{
1162 if (!pi->status_valid)
1163 if (!proc_get_status (pi))
0df8b418 1164 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 1165
c3f6f71d
JM
1166#ifdef NEW_PROC_API
1167 return pi->prstatus.pr_lwp.pr_what;
1168#else
1169 return pi->prstatus.pr_what;
c906108c 1170#endif
c3f6f71d 1171}
c906108c 1172
77382aee
PA
1173/* This function is only called when PI is stopped by a watchpoint.
1174 Assuming the OS supports it, write to *ADDR the data address which
1175 triggered it and return 1. Return 0 if it is not possible to know
1176 the address. */
bf701c2c
PM
1177
1178static int
1179proc_watchpoint_address (procinfo *pi, CORE_ADDR *addr)
1180{
1181 if (!pi->status_valid)
1182 if (!proc_get_status (pi))
1183 return 0;
1184
1185#ifdef NEW_PROC_API
f5656ead
TT
1186 *addr = (CORE_ADDR) gdbarch_pointer_to_address (target_gdbarch (),
1187 builtin_type (target_gdbarch ())->builtin_data_ptr,
bf701c2c
PM
1188 (gdb_byte *) &pi->prstatus.pr_lwp.pr_info.si_addr);
1189#else
f5656ead
TT
1190 *addr = (CORE_ADDR) gdbarch_pointer_to_address (target_gdbarch (),
1191 builtin_type (target_gdbarch ())->builtin_data_ptr,
bf701c2c
PM
1192 (gdb_byte *) &pi->prstatus.pr_info.si_addr);
1193#endif
1194 return 1;
1195}
1196
c3f6f71d 1197#ifndef PIOCSSPCACT /* The following is not supported on OSF. */
77382aee
PA
1198
1199/* Returns the pr_nsysarg field (number of args to the current
1200 syscall). */
c3f6f71d 1201
d3581e61 1202static int
fba45db2 1203proc_nsysarg (procinfo *pi)
c3f6f71d
JM
1204{
1205 if (!pi->status_valid)
1206 if (!proc_get_status (pi))
1207 return 0;
19958708 1208
c3f6f71d
JM
1209#ifdef NEW_PROC_API
1210 return pi->prstatus.pr_lwp.pr_nsysarg;
1211#else
1212 return pi->prstatus.pr_nsysarg;
c906108c 1213#endif
c3f6f71d 1214}
c906108c 1215
77382aee
PA
1216/* Returns the pr_sysarg field (pointer to the arguments of current
1217 syscall). */
c906108c 1218
d3581e61 1219static long *
fba45db2 1220proc_sysargs (procinfo *pi)
c3f6f71d
JM
1221{
1222 if (!pi->status_valid)
1223 if (!proc_get_status (pi))
1224 return NULL;
19958708 1225
c3f6f71d
JM
1226#ifdef NEW_PROC_API
1227 return (long *) &pi->prstatus.pr_lwp.pr_sysarg;
1228#else
1229 return (long *) &pi->prstatus.pr_sysarg;
1230#endif
1231}
c3f6f71d 1232#endif /* PIOCSSPCACT */
c906108c 1233
d3581e61 1234#ifdef PROCFS_DONT_PIOCSSIG_CURSIG
77382aee 1235/* Returns the pr_cursig field (current signal). */
c906108c 1236
d3581e61 1237static long
c3f6f71d
JM
1238proc_cursig (struct procinfo *pi)
1239{
1240 if (!pi->status_valid)
1241 if (!proc_get_status (pi))
0df8b418 1242 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 1243
c3f6f71d
JM
1244#ifdef NEW_PROC_API
1245 return pi->prstatus.pr_lwp.pr_cursig;
1246#else
1247 return pi->prstatus.pr_cursig;
1248#endif
1249}
d3581e61 1250#endif /* PROCFS_DONT_PIOCSSIG_CURSIG */
c906108c 1251
77382aee
PA
1252/* === I appologize for the messiness of this function.
1253 === This is an area where the different versions of
1254 === /proc are more inconsistent than usual.
1255
1256 Set or reset any of the following process flags:
1257 PR_FORK -- forked child will inherit trace flags
1258 PR_RLC -- traced process runs when last /proc file closed.
1259 PR_KLC -- traced process is killed when last /proc file closed.
1260 PR_ASYNC -- LWP's get to run/stop independently.
1261
1262 There are three methods for doing this function:
1263 1) Newest: read/write [PCSET/PCRESET/PCUNSET]
1264 [Sol6, Sol7, UW]
1265 2) Middle: PIOCSET/PIOCRESET
1266 [Irix, Sol5]
1267 3) Oldest: PIOCSFORK/PIOCRFORK/PIOCSRLC/PIOCRRLC
1268 [OSF, Sol5]
1269
1270 Note: Irix does not define PR_ASYNC.
1271 Note: OSF does not define PR_KLC.
1272 Note: OSF is the only one that can ONLY use the oldest method.
1273
1274 Arguments:
1275 pi -- the procinfo
1276 flag -- one of PR_FORK, PR_RLC, or PR_ASYNC
1277 mode -- 1 for set, 0 for reset.
1278
1279 Returns non-zero for success, zero for failure. */
c906108c 1280
c3f6f71d 1281enum { FLAG_RESET, FLAG_SET };
c906108c 1282
c3f6f71d 1283static int
fba45db2 1284proc_modify_flag (procinfo *pi, long flag, long mode)
c3f6f71d
JM
1285{
1286 long win = 0; /* default to fail */
1287
77382aee
PA
1288 /* These operations affect the process as a whole, and applying them
1289 to an individual LWP has the same meaning as applying them to the
1290 main process. Therefore, if we're ever called with a pointer to
1291 an LWP's procinfo, let's substitute the process's procinfo and
1292 avoid opening the LWP's file descriptor unnecessarily. */
c3f6f71d
JM
1293
1294 if (pi->pid != 0)
1295 pi = find_procinfo_or_die (pi->pid, 0);
1296
05b4bd79 1297#ifdef NEW_PROC_API /* Newest method: Newer Solarii. */
19958708 1298 /* First normalize the PCUNSET/PCRESET command opcode
c3f6f71d
JM
1299 (which for no obvious reason has a different definition
1300 from one operating system to the next...) */
1301#ifdef PCUNSET
1302#define GDBRESET PCUNSET
37de36c6 1303#else
c3f6f71d
JM
1304#ifdef PCRESET
1305#define GDBRESET PCRESET
37de36c6 1306#endif
c906108c 1307#endif
c3f6f71d 1308 {
37de36c6 1309 procfs_ctl_t arg[2];
c906108c 1310
0df8b418 1311 if (mode == FLAG_SET) /* Set the flag (RLC, FORK, or ASYNC). */
c3f6f71d 1312 arg[0] = PCSET;
0df8b418 1313 else /* Reset the flag. */
c3f6f71d 1314 arg[0] = GDBRESET;
c5aa993b 1315
c3f6f71d
JM
1316 arg[1] = flag;
1317 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
1318 }
1319#else
1320#ifdef PIOCSET /* Irix/Sol5 method */
0df8b418 1321 if (mode == FLAG_SET) /* Set the flag (hopefully RLC, FORK, or ASYNC). */
c3f6f71d
JM
1322 {
1323 win = (ioctl (pi->ctl_fd, PIOCSET, &flag) >= 0);
1324 }
0df8b418 1325 else /* Reset the flag. */
c3f6f71d
JM
1326 {
1327 win = (ioctl (pi->ctl_fd, PIOCRESET, &flag) >= 0);
1328 }
c906108c 1329
c3f6f71d
JM
1330#else
1331#ifdef PIOCSRLC /* Oldest method: OSF */
1332 switch (flag) {
1333 case PR_RLC:
1334 if (mode == FLAG_SET) /* Set run-on-last-close */
1335 {
1336 win = (ioctl (pi->ctl_fd, PIOCSRLC, NULL) >= 0);
1337 }
1338 else /* Clear run-on-last-close */
1339 {
1340 win = (ioctl (pi->ctl_fd, PIOCRRLC, NULL) >= 0);
1341 }
1342 break;
1343 case PR_FORK:
1344 if (mode == FLAG_SET) /* Set inherit-on-fork */
1345 {
1346 win = (ioctl (pi->ctl_fd, PIOCSFORK, NULL) >= 0);
1347 }
1348 else /* Clear inherit-on-fork */
1349 {
1350 win = (ioctl (pi->ctl_fd, PIOCRFORK, NULL) >= 0);
1351 }
1352 break;
1353 default:
0df8b418 1354 win = 0; /* Fail -- unknown flag (can't do PR_ASYNC). */
c3f6f71d
JM
1355 break;
1356 }
1357#endif
1358#endif
1359#endif
1360#undef GDBRESET
77382aee
PA
1361 /* The above operation renders the procinfo's cached pstatus
1362 obsolete. */
c3f6f71d 1363 pi->status_valid = 0;
c906108c 1364
c3f6f71d 1365 if (!win)
8a3fe4f8 1366 warning (_("procfs: modify_flag failed to turn %s %s"),
c3f6f71d
JM
1367 flag == PR_FORK ? "PR_FORK" :
1368 flag == PR_RLC ? "PR_RLC" :
1369#ifdef PR_ASYNC
1370 flag == PR_ASYNC ? "PR_ASYNC" :
0d06e24b
JM
1371#endif
1372#ifdef PR_KLC
1373 flag == PR_KLC ? "PR_KLC" :
c3f6f71d
JM
1374#endif
1375 "<unknown flag>",
1376 mode == FLAG_RESET ? "off" : "on");
c906108c 1377
c3f6f71d
JM
1378 return win;
1379}
c906108c 1380
77382aee
PA
1381/* Set the run_on_last_close flag. Process with all threads will
1382 become runnable when debugger closes all /proc fds. Returns
1383 non-zero for success, zero for failure. */
c906108c 1384
d3581e61 1385static int
fba45db2 1386proc_set_run_on_last_close (procinfo *pi)
c906108c 1387{
c3f6f71d
JM
1388 return proc_modify_flag (pi, PR_RLC, FLAG_SET);
1389}
c906108c 1390
77382aee
PA
1391/* Reset the run_on_last_close flag. The process will NOT become
1392 runnable when debugger closes its file handles. Returns non-zero
1393 for success, zero for failure. */
c906108c 1394
d3581e61 1395static int
fba45db2 1396proc_unset_run_on_last_close (procinfo *pi)
c3f6f71d
JM
1397{
1398 return proc_modify_flag (pi, PR_RLC, FLAG_RESET);
c906108c
SS
1399}
1400
77382aee
PA
1401/* Reset inherit_on_fork flag. If the process forks a child while we
1402 are registered for events in the parent, then we will NOT recieve
1403 events from the child. Returns non-zero for success, zero for
1404 failure. */
c906108c 1405
d3581e61 1406static int
fba45db2 1407proc_unset_inherit_on_fork (procinfo *pi)
c3f6f71d
JM
1408{
1409 return proc_modify_flag (pi, PR_FORK, FLAG_RESET);
1410}
c906108c 1411
c3f6f71d 1412#ifdef PR_ASYNC
77382aee
PA
1413/* Set PR_ASYNC flag. If one LWP stops because of a debug event
1414 (signal etc.), the remaining LWPs will continue to run. Returns
1415 non-zero for success, zero for failure. */
c906108c 1416
d3581e61 1417static int
fba45db2 1418proc_set_async (procinfo *pi)
c3f6f71d
JM
1419{
1420 return proc_modify_flag (pi, PR_ASYNC, FLAG_SET);
1421}
c906108c 1422
77382aee
PA
1423/* Reset PR_ASYNC flag. If one LWP stops because of a debug event
1424 (signal etc.), then all other LWPs will stop as well. Returns
1425 non-zero for success, zero for failure. */
c906108c 1426
d3581e61 1427static int
fba45db2 1428proc_unset_async (procinfo *pi)
c3f6f71d
JM
1429{
1430 return proc_modify_flag (pi, PR_ASYNC, FLAG_RESET);
1431}
1432#endif /* PR_ASYNC */
c906108c 1433
77382aee
PA
1434/* Request the process/LWP to stop. Does not wait. Returns non-zero
1435 for success, zero for failure. */
c906108c 1436
d3581e61 1437static int
fba45db2 1438proc_stop_process (procinfo *pi)
c3f6f71d
JM
1439{
1440 int win;
c906108c 1441
77382aee
PA
1442 /* We might conceivably apply this operation to an LWP, and the
1443 LWP's ctl file descriptor might not be open. */
c906108c 1444
c3f6f71d
JM
1445 if (pi->ctl_fd == 0 &&
1446 open_procinfo_files (pi, FD_CTL) == 0)
1447 return 0;
1448 else
1449 {
1450#ifdef NEW_PROC_API
37de36c6 1451 procfs_ctl_t cmd = PCSTOP;
f4a14ae6 1452
c3f6f71d
JM
1453 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
1454#else /* ioctl method */
1455 win = (ioctl (pi->ctl_fd, PIOCSTOP, &pi->prstatus) >= 0);
1456 /* Note: the call also reads the prstatus. */
1457 if (win)
1458 {
1459 pi->status_valid = 1;
19958708 1460 PROC_PRETTYFPRINT_STATUS (proc_flags (pi),
c3f6f71d 1461 proc_why (pi),
19958708 1462 proc_what (pi),
c3f6f71d
JM
1463 proc_get_current_thread (pi));
1464 }
1465#endif
1466 }
c906108c 1467
c3f6f71d
JM
1468 return win;
1469}
c5aa993b 1470
77382aee
PA
1471/* Wait for the process or LWP to stop (block until it does). Returns
1472 non-zero for success, zero for failure. */
c906108c 1473
d3581e61 1474static int
fba45db2 1475proc_wait_for_stop (procinfo *pi)
c906108c 1476{
c3f6f71d
JM
1477 int win;
1478
77382aee
PA
1479 /* We should never have to apply this operation to any procinfo
1480 except the one for the main process. If that ever changes for
1481 any reason, then take out the following clause and replace it
1482 with one that makes sure the ctl_fd is open. */
19958708 1483
c3f6f71d
JM
1484 if (pi->tid != 0)
1485 pi = find_procinfo_or_die (pi->pid, 0);
1486
1487#ifdef NEW_PROC_API
1488 {
37de36c6 1489 procfs_ctl_t cmd = PCWSTOP;
f4a14ae6 1490
c3f6f71d
JM
1491 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
1492 /* We been runnin' and we stopped -- need to update status. */
1493 pi->status_valid = 0;
1494 }
1495#else /* ioctl method */
1496 win = (ioctl (pi->ctl_fd, PIOCWSTOP, &pi->prstatus) >= 0);
1497 /* Above call also refreshes the prstatus. */
1498 if (win)
1499 {
1500 pi->status_valid = 1;
19958708 1501 PROC_PRETTYFPRINT_STATUS (proc_flags (pi),
c3f6f71d 1502 proc_why (pi),
19958708 1503 proc_what (pi),
c3f6f71d
JM
1504 proc_get_current_thread (pi));
1505 }
c906108c
SS
1506#endif
1507
c3f6f71d 1508 return win;
c906108c
SS
1509}
1510
77382aee
PA
1511/* Make the process or LWP runnable.
1512
1513 Options (not all are implemented):
1514 - single-step
1515 - clear current fault
1516 - clear current signal
1517 - abort the current system call
1518 - stop as soon as finished with system call
1519 - (ioctl): set traced signal set
1520 - (ioctl): set held signal set
1521 - (ioctl): set traced fault set
1522 - (ioctl): set start pc (vaddr)
1523
1524 Always clears the current fault. PI is the process or LWP to
1525 operate on. If STEP is true, set the process or LWP to trap after
1526 one instruction. If SIGNO is zero, clear the current signal if
1527 any; if non-zero, set the current signal to this one. Returns
1528 non-zero for success, zero for failure. */
c3f6f71d 1529
d3581e61 1530static int
fba45db2 1531proc_run_process (procinfo *pi, int step, int signo)
c3f6f71d
JM
1532{
1533 int win;
1534 int runflags;
1535
77382aee
PA
1536 /* We will probably have to apply this operation to individual
1537 threads, so make sure the control file descriptor is open. */
19958708 1538
c3f6f71d
JM
1539 if (pi->ctl_fd == 0 &&
1540 open_procinfo_files (pi, FD_CTL) == 0)
1541 {
1542 return 0;
1543 }
c906108c 1544
0df8b418 1545 runflags = PRCFAULT; /* Always clear current fault. */
c3f6f71d
JM
1546 if (step)
1547 runflags |= PRSTEP;
1548 if (signo == 0)
1549 runflags |= PRCSIG;
0df8b418 1550 else if (signo != -1) /* -1 means do nothing W.R.T. signals. */
c3f6f71d 1551 proc_set_current_signal (pi, signo);
c5aa993b 1552
c3f6f71d
JM
1553#ifdef NEW_PROC_API
1554 {
37de36c6 1555 procfs_ctl_t cmd[2];
c906108c 1556
c3f6f71d
JM
1557 cmd[0] = PCRUN;
1558 cmd[1] = runflags;
1559 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
1560 }
1561#else /* ioctl method */
1562 {
1563 prrun_t prrun;
c906108c 1564
c3f6f71d
JM
1565 memset (&prrun, 0, sizeof (prrun));
1566 prrun.pr_flags = runflags;
1567 win = (ioctl (pi->ctl_fd, PIOCRUN, &prrun) >= 0);
1568 }
1569#endif
c906108c 1570
c3f6f71d
JM
1571 return win;
1572}
c906108c 1573
77382aee
PA
1574/* Register to trace signals in the process or LWP. Returns non-zero
1575 for success, zero for failure. */
c906108c 1576
d3581e61 1577static int
37de36c6 1578proc_set_traced_signals (procinfo *pi, gdb_sigset_t *sigset)
c906108c 1579{
c3f6f71d
JM
1580 int win;
1581
77382aee
PA
1582 /* We should never have to apply this operation to any procinfo
1583 except the one for the main process. If that ever changes for
1584 any reason, then take out the following clause and replace it
1585 with one that makes sure the ctl_fd is open. */
19958708 1586
c3f6f71d
JM
1587 if (pi->tid != 0)
1588 pi = find_procinfo_or_die (pi->pid, 0);
1589
1590#ifdef NEW_PROC_API
1591 {
1592 struct {
37de36c6 1593 procfs_ctl_t cmd;
c3f6f71d 1594 /* Use char array to avoid alignment issues. */
37de36c6 1595 char sigset[sizeof (gdb_sigset_t)];
c3f6f71d 1596 } arg;
c906108c 1597
c3f6f71d 1598 arg.cmd = PCSTRACE;
37de36c6 1599 memcpy (&arg.sigset, sigset, sizeof (gdb_sigset_t));
c906108c 1600
c3f6f71d
JM
1601 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
1602 }
1603#else /* ioctl method */
1604 win = (ioctl (pi->ctl_fd, PIOCSTRACE, sigset) >= 0);
1605#endif
0df8b418 1606 /* The above operation renders the procinfo's cached pstatus obsolete. */
c3f6f71d 1607 pi->status_valid = 0;
c906108c 1608
c3f6f71d 1609 if (!win)
8a3fe4f8 1610 warning (_("procfs: set_traced_signals failed"));
c3f6f71d 1611 return win;
c906108c
SS
1612}
1613
77382aee
PA
1614/* Register to trace hardware faults in the process or LWP. Returns
1615 non-zero for success, zero for failure. */
c906108c 1616
d3581e61 1617static int
fba45db2 1618proc_set_traced_faults (procinfo *pi, fltset_t *fltset)
c3f6f71d
JM
1619{
1620 int win;
1621
77382aee
PA
1622 /* We should never have to apply this operation to any procinfo
1623 except the one for the main process. If that ever changes for
1624 any reason, then take out the following clause and replace it
1625 with one that makes sure the ctl_fd is open. */
19958708 1626
c3f6f71d
JM
1627 if (pi->tid != 0)
1628 pi = find_procinfo_or_die (pi->pid, 0);
1629
1630#ifdef NEW_PROC_API
1631 {
1632 struct {
37de36c6 1633 procfs_ctl_t cmd;
c3f6f71d
JM
1634 /* Use char array to avoid alignment issues. */
1635 char fltset[sizeof (fltset_t)];
1636 } arg;
c906108c 1637
c3f6f71d
JM
1638 arg.cmd = PCSFAULT;
1639 memcpy (&arg.fltset, fltset, sizeof (fltset_t));
c906108c 1640
c3f6f71d
JM
1641 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
1642 }
1643#else /* ioctl method */
1644 win = (ioctl (pi->ctl_fd, PIOCSFAULT, fltset) >= 0);
1645#endif
0df8b418 1646 /* The above operation renders the procinfo's cached pstatus obsolete. */
c3f6f71d 1647 pi->status_valid = 0;
c906108c 1648
c3f6f71d
JM
1649 return win;
1650}
c5aa993b 1651
77382aee
PA
1652/* Register to trace entry to system calls in the process or LWP.
1653 Returns non-zero for success, zero for failure. */
c906108c 1654
d3581e61 1655static int
fba45db2 1656proc_set_traced_sysentry (procinfo *pi, sysset_t *sysset)
c906108c 1657{
c3f6f71d
JM
1658 int win;
1659
77382aee
PA
1660 /* We should never have to apply this operation to any procinfo
1661 except the one for the main process. If that ever changes for
1662 any reason, then take out the following clause and replace it
1663 with one that makes sure the ctl_fd is open. */
19958708 1664
c3f6f71d
JM
1665 if (pi->tid != 0)
1666 pi = find_procinfo_or_die (pi->pid, 0);
1667
1668#ifdef NEW_PROC_API
1669 {
37de36c6
KB
1670 struct gdb_proc_ctl_pcsentry {
1671 procfs_ctl_t cmd;
c3f6f71d
JM
1672 /* Use char array to avoid alignment issues. */
1673 char sysset[sizeof (sysset_t)];
37de36c6
KB
1674 } *argp;
1675 int argp_size = sizeof (struct gdb_proc_ctl_pcsentry)
77382aee 1676 - sizeof (sysset_t)
37de36c6 1677 + sysset_t_size (pi);
c3f6f71d 1678
37de36c6 1679 argp = xmalloc (argp_size);
c3f6f71d 1680
37de36c6
KB
1681 argp->cmd = PCSENTRY;
1682 memcpy (&argp->sysset, sysset, sysset_t_size (pi));
1683
1684 win = (write (pi->ctl_fd, (char *) argp, argp_size) == argp_size);
1685 xfree (argp);
c3f6f71d
JM
1686 }
1687#else /* ioctl method */
1688 win = (ioctl (pi->ctl_fd, PIOCSENTRY, sysset) >= 0);
1689#endif
77382aee
PA
1690 /* The above operation renders the procinfo's cached pstatus
1691 obsolete. */
c3f6f71d 1692 pi->status_valid = 0;
19958708 1693
c3f6f71d 1694 return win;
c906108c
SS
1695}
1696
77382aee
PA
1697/* Register to trace exit from system calls in the process or LWP.
1698 Returns non-zero for success, zero for failure. */
c906108c 1699
d3581e61 1700static int
fba45db2 1701proc_set_traced_sysexit (procinfo *pi, sysset_t *sysset)
c3f6f71d
JM
1702{
1703 int win;
1704
77382aee
PA
1705 /* We should never have to apply this operation to any procinfo
1706 except the one for the main process. If that ever changes for
1707 any reason, then take out the following clause and replace it
1708 with one that makes sure the ctl_fd is open. */
19958708 1709
c3f6f71d
JM
1710 if (pi->tid != 0)
1711 pi = find_procinfo_or_die (pi->pid, 0);
1712
1713#ifdef NEW_PROC_API
1714 {
37de36c6
KB
1715 struct gdb_proc_ctl_pcsexit {
1716 procfs_ctl_t cmd;
c3f6f71d
JM
1717 /* Use char array to avoid alignment issues. */
1718 char sysset[sizeof (sysset_t)];
37de36c6
KB
1719 } *argp;
1720 int argp_size = sizeof (struct gdb_proc_ctl_pcsexit)
77382aee 1721 - sizeof (sysset_t)
37de36c6 1722 + sysset_t_size (pi);
c906108c 1723
37de36c6 1724 argp = xmalloc (argp_size);
c906108c 1725
37de36c6
KB
1726 argp->cmd = PCSEXIT;
1727 memcpy (&argp->sysset, sysset, sysset_t_size (pi));
1728
1729 win = (write (pi->ctl_fd, (char *) argp, argp_size) == argp_size);
1730 xfree (argp);
c3f6f71d
JM
1731 }
1732#else /* ioctl method */
1733 win = (ioctl (pi->ctl_fd, PIOCSEXIT, sysset) >= 0);
1734#endif
77382aee
PA
1735 /* The above operation renders the procinfo's cached pstatus
1736 obsolete. */
c3f6f71d 1737 pi->status_valid = 0;
c906108c 1738
c3f6f71d
JM
1739 return win;
1740}
c906108c 1741
77382aee
PA
1742/* Specify the set of blocked / held signals in the process or LWP.
1743 Returns non-zero for success, zero for failure. */
c906108c 1744
d3581e61 1745static int
37de36c6 1746proc_set_held_signals (procinfo *pi, gdb_sigset_t *sighold)
c906108c 1747{
c3f6f71d
JM
1748 int win;
1749
77382aee
PA
1750 /* We should never have to apply this operation to any procinfo
1751 except the one for the main process. If that ever changes for
1752 any reason, then take out the following clause and replace it
1753 with one that makes sure the ctl_fd is open. */
19958708 1754
c3f6f71d
JM
1755 if (pi->tid != 0)
1756 pi = find_procinfo_or_die (pi->pid, 0);
1757
1758#ifdef NEW_PROC_API
1759 {
1760 struct {
37de36c6 1761 procfs_ctl_t cmd;
c3f6f71d 1762 /* Use char array to avoid alignment issues. */
37de36c6 1763 char hold[sizeof (gdb_sigset_t)];
c3f6f71d
JM
1764 } arg;
1765
1766 arg.cmd = PCSHOLD;
37de36c6 1767 memcpy (&arg.hold, sighold, sizeof (gdb_sigset_t));
c3f6f71d
JM
1768 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
1769 }
c906108c 1770#else
c3f6f71d 1771 win = (ioctl (pi->ctl_fd, PIOCSHOLD, sighold) >= 0);
c906108c 1772#endif
77382aee
PA
1773 /* The above operation renders the procinfo's cached pstatus
1774 obsolete. */
c3f6f71d
JM
1775 pi->status_valid = 0;
1776
1777 return win;
c906108c
SS
1778}
1779
77382aee
PA
1780/* Returns the set of signals that are held / blocked. Will also copy
1781 the sigset if SAVE is non-zero. */
c906108c 1782
d3581e61 1783static gdb_sigset_t *
37de36c6 1784proc_get_held_signals (procinfo *pi, gdb_sigset_t *save)
c906108c 1785{
37de36c6 1786 gdb_sigset_t *ret = NULL;
c3f6f71d 1787
77382aee
PA
1788 /* We should never have to apply this operation to any procinfo
1789 except the one for the main process. If that ever changes for
1790 any reason, then take out the following clause and replace it
1791 with one that makes sure the ctl_fd is open. */
19958708 1792
c3f6f71d
JM
1793 if (pi->tid != 0)
1794 pi = find_procinfo_or_die (pi->pid, 0);
1795
1796#ifdef NEW_PROC_API
1797 if (!pi->status_valid)
1798 if (!proc_get_status (pi))
1799 return NULL;
1800
c3f6f71d 1801 ret = &pi->prstatus.pr_lwp.pr_lwphold;
c3f6f71d
JM
1802#else /* not NEW_PROC_API */
1803 {
37de36c6 1804 static gdb_sigset_t sigheld;
c3f6f71d
JM
1805
1806 if (ioctl (pi->ctl_fd, PIOCGHOLD, &sigheld) >= 0)
1807 ret = &sigheld;
1808 }
1809#endif /* NEW_PROC_API */
1810 if (save && ret)
37de36c6 1811 memcpy (save, ret, sizeof (gdb_sigset_t));
c3f6f71d
JM
1812
1813 return ret;
c906108c
SS
1814}
1815
77382aee
PA
1816/* Returns the set of signals that are traced / debugged. Will also
1817 copy the sigset if SAVE is non-zero. */
c3f6f71d 1818
d3581e61 1819static gdb_sigset_t *
37de36c6 1820proc_get_traced_signals (procinfo *pi, gdb_sigset_t *save)
c906108c 1821{
37de36c6 1822 gdb_sigset_t *ret = NULL;
c3f6f71d 1823
77382aee
PA
1824 /* We should never have to apply this operation to any procinfo
1825 except the one for the main process. If that ever changes for
1826 any reason, then take out the following clause and replace it
1827 with one that makes sure the ctl_fd is open. */
19958708 1828
c3f6f71d
JM
1829 if (pi->tid != 0)
1830 pi = find_procinfo_or_die (pi->pid, 0);
1831
1832#ifdef NEW_PROC_API
1833 if (!pi->status_valid)
1834 if (!proc_get_status (pi))
1835 return NULL;
1836
1837 ret = &pi->prstatus.pr_sigtrace;
1838#else
1839 {
37de36c6 1840 static gdb_sigset_t sigtrace;
c3f6f71d
JM
1841
1842 if (ioctl (pi->ctl_fd, PIOCGTRACE, &sigtrace) >= 0)
1843 ret = &sigtrace;
1844 }
c906108c 1845#endif
c3f6f71d 1846 if (save && ret)
37de36c6 1847 memcpy (save, ret, sizeof (gdb_sigset_t));
c906108c 1848
c3f6f71d
JM
1849 return ret;
1850}
c906108c 1851
77382aee
PA
1852/* Returns the set of hardware faults that are traced /debugged. Will
1853 also copy the faultset if SAVE is non-zero. */
c3f6f71d 1854
d3581e61 1855static fltset_t *
fba45db2 1856proc_get_traced_faults (procinfo *pi, fltset_t *save)
c3f6f71d
JM
1857{
1858 fltset_t *ret = NULL;
1859
77382aee
PA
1860 /* We should never have to apply this operation to any procinfo
1861 except the one for the main process. If that ever changes for
1862 any reason, then take out the following clause and replace it
1863 with one that makes sure the ctl_fd is open. */
19958708 1864
c3f6f71d
JM
1865 if (pi->tid != 0)
1866 pi = find_procinfo_or_die (pi->pid, 0);
1867
1868#ifdef NEW_PROC_API
1869 if (!pi->status_valid)
1870 if (!proc_get_status (pi))
1871 return NULL;
1872
1873 ret = &pi->prstatus.pr_flttrace;
1874#else
1875 {
1876 static fltset_t flttrace;
1877
1878 if (ioctl (pi->ctl_fd, PIOCGFAULT, &flttrace) >= 0)
1879 ret = &flttrace;
1880 }
1881#endif
1882 if (save && ret)
1883 memcpy (save, ret, sizeof (fltset_t));
c906108c 1884
c3f6f71d
JM
1885 return ret;
1886}
c906108c 1887
77382aee
PA
1888/* Returns the set of syscalls that are traced /debugged on entry.
1889 Will also copy the syscall set if SAVE is non-zero. */
c906108c 1890
d3581e61 1891static sysset_t *
fba45db2 1892proc_get_traced_sysentry (procinfo *pi, sysset_t *save)
c3f6f71d
JM
1893{
1894 sysset_t *ret = NULL;
1895
77382aee
PA
1896 /* We should never have to apply this operation to any procinfo
1897 except the one for the main process. If that ever changes for
1898 any reason, then take out the following clause and replace it
1899 with one that makes sure the ctl_fd is open. */
19958708 1900
c3f6f71d
JM
1901 if (pi->tid != 0)
1902 pi = find_procinfo_or_die (pi->pid, 0);
1903
1904#ifdef NEW_PROC_API
1905 if (!pi->status_valid)
1906 if (!proc_get_status (pi))
1907 return NULL;
1908
37de36c6 1909#ifndef DYNAMIC_SYSCALLS
c3f6f71d 1910 ret = &pi->prstatus.pr_sysentry;
37de36c6
KB
1911#else /* DYNAMIC_SYSCALLS */
1912 {
1913 static sysset_t *sysentry;
1914 size_t size;
1915
1916 if (!sysentry)
1917 sysentry = sysset_t_alloc (pi);
1918 ret = sysentry;
1919 if (pi->status_fd == 0 && open_procinfo_files (pi, FD_STATUS) == 0)
1920 return NULL;
1921 if (pi->prstatus.pr_sysentry_offset == 0)
1922 {
1923 gdb_premptysysset (sysentry);
1924 }
1925 else
1926 {
1927 int rsize;
1928
1929 if (lseek (pi->status_fd, (off_t) pi->prstatus.pr_sysentry_offset,
77382aee 1930 SEEK_SET)
37de36c6
KB
1931 != (off_t) pi->prstatus.pr_sysentry_offset)
1932 return NULL;
1933 size = sysset_t_size (pi);
1934 gdb_premptysysset (sysentry);
1935 rsize = read (pi->status_fd, sysentry, size);
1936 if (rsize < 0)
1937 return NULL;
1938 }
1939 }
1940#endif /* DYNAMIC_SYSCALLS */
1941#else /* !NEW_PROC_API */
c3f6f71d
JM
1942 {
1943 static sysset_t sysentry;
c906108c 1944
c3f6f71d
JM
1945 if (ioctl (pi->ctl_fd, PIOCGENTRY, &sysentry) >= 0)
1946 ret = &sysentry;
1947 }
37de36c6 1948#endif /* NEW_PROC_API */
c3f6f71d 1949 if (save && ret)
37de36c6 1950 memcpy (save, ret, sysset_t_size (pi));
c906108c 1951
c3f6f71d
JM
1952 return ret;
1953}
c5aa993b 1954
77382aee
PA
1955/* Returns the set of syscalls that are traced /debugged on exit.
1956 Will also copy the syscall set if SAVE is non-zero. */
c906108c 1957
d3581e61 1958static sysset_t *
fba45db2 1959proc_get_traced_sysexit (procinfo *pi, sysset_t *save)
c906108c 1960{
c3f6f71d
JM
1961 sysset_t * ret = NULL;
1962
77382aee
PA
1963 /* We should never have to apply this operation to any procinfo
1964 except the one for the main process. If that ever changes for
1965 any reason, then take out the following clause and replace it
1966 with one that makes sure the ctl_fd is open. */
19958708 1967
c3f6f71d
JM
1968 if (pi->tid != 0)
1969 pi = find_procinfo_or_die (pi->pid, 0);
1970
1971#ifdef NEW_PROC_API
1972 if (!pi->status_valid)
1973 if (!proc_get_status (pi))
1974 return NULL;
1975
37de36c6 1976#ifndef DYNAMIC_SYSCALLS
c3f6f71d 1977 ret = &pi->prstatus.pr_sysexit;
37de36c6
KB
1978#else /* DYNAMIC_SYSCALLS */
1979 {
1980 static sysset_t *sysexit;
1981 size_t size;
1982
1983 if (!sysexit)
1984 sysexit = sysset_t_alloc (pi);
1985 ret = sysexit;
1986 if (pi->status_fd == 0 && open_procinfo_files (pi, FD_STATUS) == 0)
1987 return NULL;
1988 if (pi->prstatus.pr_sysexit_offset == 0)
1989 {
1990 gdb_premptysysset (sysexit);
1991 }
1992 else
1993 {
1994 int rsize;
1995
77382aee
PA
1996 if (lseek (pi->status_fd, (off_t) pi->prstatus.pr_sysexit_offset,
1997 SEEK_SET)
37de36c6
KB
1998 != (off_t) pi->prstatus.pr_sysexit_offset)
1999 return NULL;
2000 size = sysset_t_size (pi);
2001 gdb_premptysysset (sysexit);
2002 rsize = read (pi->status_fd, sysexit, size);
2003 if (rsize < 0)
2004 return NULL;
2005 }
2006 }
2007#endif /* DYNAMIC_SYSCALLS */
c3f6f71d
JM
2008#else
2009 {
2010 static sysset_t sysexit;
c5aa993b 2011
c3f6f71d
JM
2012 if (ioctl (pi->ctl_fd, PIOCGEXIT, &sysexit) >= 0)
2013 ret = &sysexit;
2014 }
2015#endif
2016 if (save && ret)
37de36c6 2017 memcpy (save, ret, sysset_t_size (pi));
c3f6f71d
JM
2018
2019 return ret;
2020}
c906108c 2021
77382aee
PA
2022/* The current fault (if any) is cleared; the associated signal will
2023 not be sent to the process or LWP when it resumes. Returns
2024 non-zero for success, zero for failure. */
c906108c 2025
d3581e61 2026static int
fba45db2 2027proc_clear_current_fault (procinfo *pi)
c3f6f71d
JM
2028{
2029 int win;
2030
77382aee
PA
2031 /* We should never have to apply this operation to any procinfo
2032 except the one for the main process. If that ever changes for
2033 any reason, then take out the following clause and replace it
2034 with one that makes sure the ctl_fd is open. */
19958708 2035
c3f6f71d
JM
2036 if (pi->tid != 0)
2037 pi = find_procinfo_or_die (pi->pid, 0);
2038
2039#ifdef NEW_PROC_API
2040 {
37de36c6 2041 procfs_ctl_t cmd = PCCFAULT;
f4a14ae6 2042
c3f6f71d
JM
2043 win = (write (pi->ctl_fd, (void *) &cmd, sizeof (cmd)) == sizeof (cmd));
2044 }
2045#else
2046 win = (ioctl (pi->ctl_fd, PIOCCFAULT, 0) >= 0);
2047#endif
2048
2049 return win;
c906108c
SS
2050}
2051
77382aee
PA
2052/* Set the "current signal" that will be delivered next to the
2053 process. NOTE: semantics are different from those of KILL. This
2054 signal will be delivered to the process or LWP immediately when it
2055 is resumed (even if the signal is held/blocked); it will NOT
2056 immediately cause another event of interest, and will NOT first
2057 trap back to the debugger. Returns non-zero for success, zero for
2058 failure. */
c3f6f71d 2059
d3581e61 2060static int
fba45db2 2061proc_set_current_signal (procinfo *pi, int signo)
c3f6f71d
JM
2062{
2063 int win;
2064 struct {
37de36c6 2065 procfs_ctl_t cmd;
c3f6f71d 2066 /* Use char array to avoid alignment issues. */
37de36c6 2067 char sinfo[sizeof (gdb_siginfo_t)];
c3f6f71d 2068 } arg;
73930d4d 2069 gdb_siginfo_t mysinfo;
c162e8c9
JM
2070 ptid_t wait_ptid;
2071 struct target_waitstatus wait_status;
c3f6f71d 2072
77382aee
PA
2073 /* We should never have to apply this operation to any procinfo
2074 except the one for the main process. If that ever changes for
2075 any reason, then take out the following clause and replace it
2076 with one that makes sure the ctl_fd is open. */
19958708 2077
c3f6f71d
JM
2078 if (pi->tid != 0)
2079 pi = find_procinfo_or_die (pi->pid, 0);
2080
2081#ifdef PROCFS_DONT_PIOCSSIG_CURSIG
2082 /* With Alpha OSF/1 procfs, the kernel gets really confused if it
77382aee
PA
2083 receives a PIOCSSIG with a signal identical to the current
2084 signal, it messes up the current signal. Work around the kernel
2085 bug. */
c3f6f71d
JM
2086 if (signo > 0 &&
2087 signo == proc_cursig (pi))
0df8b418 2088 return 1; /* I assume this is a success? */
c3f6f71d
JM
2089#endif
2090
2091 /* The pointer is just a type alias. */
c162e8c9
JM
2092 get_last_target_status (&wait_ptid, &wait_status);
2093 if (ptid_equal (wait_ptid, inferior_ptid)
2094 && wait_status.kind == TARGET_WAITKIND_STOPPED
2ea28649 2095 && wait_status.value.sig == gdb_signal_from_host (signo)
c162e8c9
JM
2096 && proc_get_status (pi)
2097#ifdef NEW_PROC_API
2098 && pi->prstatus.pr_lwp.pr_info.si_signo == signo
2099#else
2100 && pi->prstatus.pr_info.si_signo == signo
2101#endif
2102 )
2103 /* Use the siginfo associated with the signal being
2104 redelivered. */
2105#ifdef NEW_PROC_API
73930d4d 2106 memcpy (arg.sinfo, &pi->prstatus.pr_lwp.pr_info, sizeof (gdb_siginfo_t));
c162e8c9 2107#else
73930d4d 2108 memcpy (arg.sinfo, &pi->prstatus.pr_info, sizeof (gdb_siginfo_t));
c162e8c9
JM
2109#endif
2110 else
2111 {
73930d4d
KH
2112 mysinfo.si_signo = signo;
2113 mysinfo.si_code = 0;
2114 mysinfo.si_pid = getpid (); /* ?why? */
2115 mysinfo.si_uid = getuid (); /* ?why? */
2116 memcpy (arg.sinfo, &mysinfo, sizeof (gdb_siginfo_t));
c162e8c9 2117 }
c3f6f71d
JM
2118
2119#ifdef NEW_PROC_API
2120 arg.cmd = PCSSIG;
2121 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
2122#else
2123 win = (ioctl (pi->ctl_fd, PIOCSSIG, (void *) &arg.sinfo) >= 0);
2124#endif
c906108c 2125
c3f6f71d
JM
2126 return win;
2127}
c906108c 2128
77382aee
PA
2129/* The current signal (if any) is cleared, and is not sent to the
2130 process or LWP when it resumes. Returns non-zero for success, zero
2131 for failure. */
c906108c 2132
d3581e61 2133static int
fba45db2 2134proc_clear_current_signal (procinfo *pi)
c3f6f71d
JM
2135{
2136 int win;
2137
77382aee
PA
2138 /* We should never have to apply this operation to any procinfo
2139 except the one for the main process. If that ever changes for
2140 any reason, then take out the following clause and replace it
2141 with one that makes sure the ctl_fd is open. */
19958708 2142
c3f6f71d
JM
2143 if (pi->tid != 0)
2144 pi = find_procinfo_or_die (pi->pid, 0);
2145
2146#ifdef NEW_PROC_API
2147 {
2148 struct {
37de36c6 2149 procfs_ctl_t cmd;
c3f6f71d 2150 /* Use char array to avoid alignment issues. */
37de36c6 2151 char sinfo[sizeof (gdb_siginfo_t)];
c3f6f71d 2152 } arg;
73930d4d 2153 gdb_siginfo_t mysinfo;
c3f6f71d
JM
2154
2155 arg.cmd = PCSSIG;
2156 /* The pointer is just a type alias. */
73930d4d
KH
2157 mysinfo.si_signo = 0;
2158 mysinfo.si_code = 0;
2159 mysinfo.si_errno = 0;
2160 mysinfo.si_pid = getpid (); /* ?why? */
2161 mysinfo.si_uid = getuid (); /* ?why? */
2162 memcpy (arg.sinfo, &mysinfo, sizeof (gdb_siginfo_t));
c3f6f71d
JM
2163
2164 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
2165 }
2166#else
2167 win = (ioctl (pi->ctl_fd, PIOCSSIG, 0) >= 0);
2168#endif
c906108c 2169
c3f6f71d
JM
2170 return win;
2171}
c906108c 2172
772cf8be
MK
2173/* Return the general-purpose registers for the process or LWP
2174 corresponding to PI. Upon failure, return NULL. */
c906108c 2175
d3581e61 2176static gdb_gregset_t *
fba45db2 2177proc_get_gregs (procinfo *pi)
c3f6f71d
JM
2178{
2179 if (!pi->status_valid || !pi->gregs_valid)
2180 if (!proc_get_status (pi))
2181 return NULL;
2182
c3f6f71d 2183#ifdef NEW_PROC_API
c3f6f71d 2184 return &pi->prstatus.pr_lwp.pr_reg;
772cf8be 2185#else
c3f6f71d 2186 return &pi->prstatus.pr_reg;
772cf8be 2187#endif
c3f6f71d 2188}
c5aa993b 2189
772cf8be
MK
2190/* Return the general-purpose registers for the process or LWP
2191 corresponding to PI. Upon failure, return NULL. */
c906108c 2192
d3581e61 2193static gdb_fpregset_t *
fba45db2 2194proc_get_fpregs (procinfo *pi)
c906108c 2195{
c3f6f71d
JM
2196#ifdef NEW_PROC_API
2197 if (!pi->status_valid || !pi->fpregs_valid)
2198 if (!proc_get_status (pi))
2199 return NULL;
2200
c3f6f71d 2201 return &pi->prstatus.pr_lwp.pr_fpreg;
c5aa993b 2202
772cf8be 2203#else /* not NEW_PROC_API */
c3f6f71d 2204 if (pi->fpregs_valid)
772cf8be 2205 return &pi->fpregset; /* Already got 'em. */
c3f6f71d 2206 else
c906108c 2207 {
772cf8be 2208 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c906108c 2209 {
c3f6f71d 2210 return NULL;
c906108c 2211 }
c3f6f71d 2212 else
c906108c 2213 {
772cf8be 2214# ifdef PIOCTGFPREG
c3f6f71d
JM
2215 struct {
2216 long pr_count;
2217 tid_t pr_error_thread;
2218 tfpregset_t thread_1;
2219 } thread_fpregs;
2220
2221 thread_fpregs.pr_count = 1;
2222 thread_fpregs.thread_1.tid = pi->tid;
2223
772cf8be
MK
2224 if (pi->tid == 0
2225 && ioctl (pi->ctl_fd, PIOCGFPREG, &pi->fpregset) >= 0)
c3f6f71d
JM
2226 {
2227 pi->fpregs_valid = 1;
772cf8be 2228 return &pi->fpregset; /* Got 'em now! */
c3f6f71d 2229 }
772cf8be
MK
2230 else if (pi->tid != 0
2231 && ioctl (pi->ctl_fd, PIOCTGFPREG, &thread_fpregs) >= 0)
c3f6f71d
JM
2232 {
2233 memcpy (&pi->fpregset, &thread_fpregs.thread_1.pr_fpregs,
2234 sizeof (pi->fpregset));
2235 pi->fpregs_valid = 1;
772cf8be 2236 return &pi->fpregset; /* Got 'em now! */
c3f6f71d
JM
2237 }
2238 else
2239 {
2240 return NULL;
2241 }
772cf8be 2242# else
c3f6f71d
JM
2243 if (ioctl (pi->ctl_fd, PIOCGFPREG, &pi->fpregset) >= 0)
2244 {
2245 pi->fpregs_valid = 1;
772cf8be 2246 return &pi->fpregset; /* Got 'em now! */
c3f6f71d
JM
2247 }
2248 else
2249 {
2250 return NULL;
2251 }
772cf8be 2252# endif
c906108c 2253 }
c906108c 2254 }
772cf8be 2255#endif /* NEW_PROC_API */
c906108c
SS
2256}
2257
772cf8be
MK
2258/* Write the general-purpose registers back to the process or LWP
2259 corresponding to PI. Return non-zero for success, zero for
2260 failure. */
c3f6f71d 2261
d3581e61 2262static int
fba45db2 2263proc_set_gregs (procinfo *pi)
c906108c 2264{
c3f6f71d
JM
2265 gdb_gregset_t *gregs;
2266 int win;
c5aa993b 2267
772cf8be
MK
2268 gregs = proc_get_gregs (pi);
2269 if (gregs == NULL)
2270 return 0; /* proc_get_regs has already warned. */
c3f6f71d 2271
772cf8be 2272 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c906108c 2273 {
c3f6f71d 2274 return 0;
c906108c 2275 }
c3f6f71d 2276 else
c906108c 2277 {
c3f6f71d
JM
2278#ifdef NEW_PROC_API
2279 struct {
37de36c6 2280 procfs_ctl_t cmd;
c3f6f71d
JM
2281 /* Use char array to avoid alignment issues. */
2282 char gregs[sizeof (gdb_gregset_t)];
2283 } arg;
2284
772cf8be 2285 arg.cmd = PCSREG;
c3f6f71d
JM
2286 memcpy (&arg.gregs, gregs, sizeof (arg.gregs));
2287 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
2288#else
2289 win = (ioctl (pi->ctl_fd, PIOCSREG, gregs) >= 0);
2290#endif
c906108c 2291 }
c3f6f71d 2292
772cf8be 2293 /* Policy: writing the registers invalidates our cache. */
c3f6f71d
JM
2294 pi->gregs_valid = 0;
2295 return win;
c906108c
SS
2296}
2297
772cf8be
MK
2298/* Write the floating-pointer registers back to the process or LWP
2299 corresponding to PI. Return non-zero for success, zero for
2300 failure. */
c3f6f71d 2301
d3581e61 2302static int
fba45db2 2303proc_set_fpregs (procinfo *pi)
c906108c 2304{
c3f6f71d
JM
2305 gdb_fpregset_t *fpregs;
2306 int win;
2307
772cf8be
MK
2308 fpregs = proc_get_fpregs (pi);
2309 if (fpregs == NULL)
2310 return 0; /* proc_get_fpregs has already warned. */
c5aa993b 2311
772cf8be 2312 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c906108c 2313 {
c3f6f71d 2314 return 0;
c906108c 2315 }
c3f6f71d 2316 else
c906108c 2317 {
c3f6f71d
JM
2318#ifdef NEW_PROC_API
2319 struct {
37de36c6 2320 procfs_ctl_t cmd;
c3f6f71d
JM
2321 /* Use char array to avoid alignment issues. */
2322 char fpregs[sizeof (gdb_fpregset_t)];
2323 } arg;
2324
772cf8be 2325 arg.cmd = PCSFPREG;
c3f6f71d
JM
2326 memcpy (&arg.fpregs, fpregs, sizeof (arg.fpregs));
2327 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
2328#else
772cf8be 2329# ifdef PIOCTSFPREG
c3f6f71d
JM
2330 if (pi->tid == 0)
2331 win = (ioctl (pi->ctl_fd, PIOCSFPREG, fpregs) >= 0);
2332 else
2333 {
2334 struct {
2335 long pr_count;
2336 tid_t pr_error_thread;
2337 tfpregset_t thread_1;
2338 } thread_fpregs;
2339
2340 thread_fpregs.pr_count = 1;
2341 thread_fpregs.thread_1.tid = pi->tid;
2342 memcpy (&thread_fpregs.thread_1.pr_fpregs, fpregs,
2343 sizeof (*fpregs));
2344 win = (ioctl (pi->ctl_fd, PIOCTSFPREG, &thread_fpregs) >= 0);
2345 }
772cf8be 2346# else
c3f6f71d 2347 win = (ioctl (pi->ctl_fd, PIOCSFPREG, fpregs) >= 0);
772cf8be
MK
2348# endif
2349#endif /* NEW_PROC_API */
c906108c 2350 }
c3f6f71d 2351
772cf8be 2352 /* Policy: writing the registers invalidates our cache. */
c3f6f71d
JM
2353 pi->fpregs_valid = 0;
2354 return win;
c906108c
SS
2355}
2356
77382aee
PA
2357/* Send a signal to the proc or lwp with the semantics of "kill()".
2358 Returns non-zero for success, zero for failure. */
c906108c 2359
d3581e61 2360static int
fba45db2 2361proc_kill (procinfo *pi, int signo)
c3f6f71d
JM
2362{
2363 int win;
c906108c 2364
77382aee
PA
2365 /* We might conceivably apply this operation to an LWP, and the
2366 LWP's ctl file descriptor might not be open. */
c906108c 2367
c3f6f71d
JM
2368 if (pi->ctl_fd == 0 &&
2369 open_procinfo_files (pi, FD_CTL) == 0)
2370 {
2371 return 0;
2372 }
2373 else
2374 {
2375#ifdef NEW_PROC_API
37de36c6 2376 procfs_ctl_t cmd[2];
c906108c 2377
c3f6f71d
JM
2378 cmd[0] = PCKILL;
2379 cmd[1] = signo;
2380 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
2381#else /* ioctl method */
2382 /* FIXME: do I need the Alpha OSF fixups present in
0df8b418 2383 procfs.c/unconditionally_kill_inferior? Perhaps only for SIGKILL? */
c3f6f71d
JM
2384 win = (ioctl (pi->ctl_fd, PIOCKILL, &signo) >= 0);
2385#endif
2386 }
c906108c 2387
c3f6f71d
JM
2388 return win;
2389}
c906108c 2390
77382aee
PA
2391/* Find the pid of the process that started this one. Returns the
2392 parent process pid, or zero. */
c906108c 2393
d3581e61 2394static int
fba45db2 2395proc_parent_pid (procinfo *pi)
c906108c 2396{
77382aee
PA
2397 /* We should never have to apply this operation to any procinfo
2398 except the one for the main process. If that ever changes for
2399 any reason, then take out the following clause and replace it
2400 with one that makes sure the ctl_fd is open. */
19958708 2401
c3f6f71d
JM
2402 if (pi->tid != 0)
2403 pi = find_procinfo_or_die (pi->pid, 0);
2404
2405 if (!pi->status_valid)
2406 if (!proc_get_status (pi))
2407 return 0;
c5aa993b 2408
c3f6f71d
JM
2409 return pi->prstatus.pr_ppid;
2410}
2411
9a043c1d
AC
2412/* Convert a target address (a.k.a. CORE_ADDR) into a host address
2413 (a.k.a void pointer)! */
2414
1ca8fce0 2415#if (defined (PCWATCH) || defined (PIOCSWATCH)) \
05b4bd79 2416 && !(defined (PIOCOPENLWP))
9a043c1d
AC
2417static void *
2418procfs_address_to_host_pointer (CORE_ADDR addr)
2419{
f5656ead 2420 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
9a043c1d
AC
2421 void *ptr;
2422
4e906f53 2423 gdb_assert (sizeof (ptr) == TYPE_LENGTH (ptr_type));
f5656ead 2424 gdbarch_address_to_pointer (target_gdbarch (), ptr_type,
0b62613e 2425 (gdb_byte *) &ptr, addr);
9a043c1d
AC
2426 return ptr;
2427}
1ca8fce0 2428#endif
9a043c1d 2429
a0911fd0 2430static int
fba45db2 2431proc_set_watchpoint (procinfo *pi, CORE_ADDR addr, int len, int wflags)
c3f6f71d 2432{
d1a7880c
PA
2433#if !defined (PCWATCH) && !defined (PIOCSWATCH)
2434 /* If neither or these is defined, we can't support watchpoints.
2435 This just avoids possibly failing to compile the below on such
2436 systems. */
c3f6f71d
JM
2437 return 0;
2438#else
0df8b418 2439/* Horrible hack! Detect Solaris 2.5, because this doesn't work on 2.5. */
05b4bd79 2440#if defined (PIOCOPENLWP) /* Solaris 2.5: bail out. */
c3f6f71d
JM
2441 return 0;
2442#else
2443 struct {
37de36c6 2444 procfs_ctl_t cmd;
c3f6f71d
JM
2445 char watch[sizeof (prwatch_t)];
2446 } arg;
73930d4d 2447 prwatch_t pwatch;
c3f6f71d 2448
9a043c1d
AC
2449 /* NOTE: cagney/2003-02-01: Even more horrible hack. Need to
2450 convert a target address into something that can be stored in a
2451 native data structure. */
831e682e 2452#ifdef PCAGENT /* Horrible hack: only defined on Solaris 2.6+ */
73930d4d 2453 pwatch.pr_vaddr = (uintptr_t) procfs_address_to_host_pointer (addr);
831e682e 2454#else
73930d4d 2455 pwatch.pr_vaddr = (caddr_t) procfs_address_to_host_pointer (addr);
831e682e 2456#endif
73930d4d
KH
2457 pwatch.pr_size = len;
2458 pwatch.pr_wflags = wflags;
c3f6f71d
JM
2459#if defined(NEW_PROC_API) && defined (PCWATCH)
2460 arg.cmd = PCWATCH;
73930d4d 2461 memcpy (arg.watch, &pwatch, sizeof (prwatch_t));
c3f6f71d
JM
2462 return (write (pi->ctl_fd, &arg, sizeof (arg)) == sizeof (arg));
2463#else
2464#if defined (PIOCSWATCH)
73930d4d 2465 return (ioctl (pi->ctl_fd, PIOCSWATCH, &pwatch) >= 0);
c3f6f71d
JM
2466#else
2467 return 0; /* Fail */
2468#endif
2469#endif
2470#endif
2471#endif
c906108c
SS
2472}
2473
965b60ee 2474#if (defined(__i386__) || defined(__x86_64__)) && defined (sun)
c906108c 2475
c3f6f71d 2476#include <sys/sysi86.h>
c906108c 2477
77382aee
PA
2478/* The KEY is actually the value of the lower 16 bits of the GS
2479 register for the LWP that we're interested in. Returns the
2480 matching ssh struct (LDT entry). */
c906108c 2481
337c776f 2482static struct ssd *
fba45db2 2483proc_get_LDT_entry (procinfo *pi, int key)
c906108c 2484{
c3f6f71d
JM
2485 static struct ssd *ldt_entry = NULL;
2486#ifdef NEW_PROC_API
2487 char pathname[MAX_PROC_NAME_SIZE];
2488 struct cleanup *old_chain = NULL;
2489 int fd;
2490
2491 /* Allocate space for one LDT entry.
2492 This alloc must persist, because we return a pointer to it. */
2493 if (ldt_entry == NULL)
2494 ldt_entry = (struct ssd *) xmalloc (sizeof (struct ssd));
2495
2496 /* Open the file descriptor for the LDT table. */
2497 sprintf (pathname, "/proc/%d/ldt", pi->pid);
4d1bcd09 2498 if ((fd = open_with_retry (pathname, O_RDONLY)) < 0)
c906108c 2499 {
c3f6f71d
JM
2500 proc_warn (pi, "proc_get_LDT_entry (open)", __LINE__);
2501 return NULL;
c906108c 2502 }
0df8b418 2503 /* Make sure it gets closed again! */
004527cb 2504 old_chain = make_cleanup_close (fd);
c906108c 2505
c3f6f71d
JM
2506 /* Now 'read' thru the table, find a match and return it. */
2507 while (read (fd, ldt_entry, sizeof (struct ssd)) == sizeof (struct ssd))
c906108c 2508 {
c3f6f71d
JM
2509 if (ldt_entry->sel == 0 &&
2510 ldt_entry->bo == 0 &&
2511 ldt_entry->acc1 == 0 &&
2512 ldt_entry->acc2 == 0)
2513 break; /* end of table */
0df8b418 2514 /* If key matches, return this entry. */
c3f6f71d
JM
2515 if (ldt_entry->sel == key)
2516 return ldt_entry;
c906108c 2517 }
0df8b418 2518 /* Loop ended, match not found. */
c3f6f71d
JM
2519 return NULL;
2520#else
2521 int nldt, i;
2522 static int nalloc = 0;
c906108c 2523
c3f6f71d
JM
2524 /* Get the number of LDT entries. */
2525 if (ioctl (pi->ctl_fd, PIOCNLDT, &nldt) < 0)
c906108c 2526 {
c3f6f71d
JM
2527 proc_warn (pi, "proc_get_LDT_entry (PIOCNLDT)", __LINE__);
2528 return NULL;
c906108c
SS
2529 }
2530
0df8b418
MS
2531 /* Allocate space for the number of LDT entries. */
2532 /* This alloc has to persist, 'cause we return a pointer to it. */
c3f6f71d 2533 if (nldt > nalloc)
c906108c 2534 {
19958708 2535 ldt_entry = (struct ssd *)
c3f6f71d
JM
2536 xrealloc (ldt_entry, (nldt + 1) * sizeof (struct ssd));
2537 nalloc = nldt;
2538 }
19958708 2539
c3f6f71d
JM
2540 /* Read the whole table in one gulp. */
2541 if (ioctl (pi->ctl_fd, PIOCLDT, ldt_entry) < 0)
2542 {
2543 proc_warn (pi, "proc_get_LDT_entry (PIOCLDT)", __LINE__);
2544 return NULL;
c906108c
SS
2545 }
2546
0df8b418 2547 /* Search the table and return the (first) entry matching 'key'. */
c3f6f71d
JM
2548 for (i = 0; i < nldt; i++)
2549 if (ldt_entry[i].sel == key)
2550 return &ldt_entry[i];
c906108c 2551
0df8b418 2552 /* Loop ended, match not found. */
c3f6f71d
JM
2553 return NULL;
2554#endif
2555}
c906108c 2556
77382aee 2557/* Returns the pointer to the LDT entry of PTID. */
965b60ee
JB
2558
2559struct ssd *
2560procfs_find_LDT_entry (ptid_t ptid)
2561{
2562 gdb_gregset_t *gregs;
2563 int key;
2564 procinfo *pi;
2565
0df8b418 2566 /* Find procinfo for the lwp. */
dfd4cc63 2567 if ((pi = find_procinfo (ptid_get_pid (ptid), ptid_get_lwp (ptid))) == NULL)
965b60ee 2568 {
0b62613e 2569 warning (_("procfs_find_LDT_entry: could not find procinfo for %d:%ld."),
dfd4cc63 2570 ptid_get_pid (ptid), ptid_get_lwp (ptid));
965b60ee
JB
2571 return NULL;
2572 }
0df8b418 2573 /* get its general registers. */
965b60ee
JB
2574 if ((gregs = proc_get_gregs (pi)) == NULL)
2575 {
0b62613e 2576 warning (_("procfs_find_LDT_entry: could not read gregs for %d:%ld."),
dfd4cc63 2577 ptid_get_pid (ptid), ptid_get_lwp (ptid));
965b60ee
JB
2578 return NULL;
2579 }
0df8b418 2580 /* Now extract the GS register's lower 16 bits. */
965b60ee
JB
2581 key = (*gregs)[GS] & 0xffff;
2582
0df8b418 2583 /* Find the matching entry and return it. */
965b60ee
JB
2584 return proc_get_LDT_entry (pi, key);
2585}
2586
2587#endif
c906108c 2588
c3f6f71d 2589/* =============== END, non-thread part of /proc "MODULE" =============== */
c906108c 2590
c3f6f71d 2591/* =================== Thread "MODULE" =================== */
c906108c 2592
c3f6f71d
JM
2593/* NOTE: you'll see more ifdefs and duplication of functions here,
2594 since there is a different way to do threads on every OS. */
c906108c 2595
77382aee 2596/* Returns the number of threads for the process. */
c906108c 2597
c3f6f71d 2598#if defined (PIOCNTHR) && defined (PIOCTLIST)
77382aee 2599/* OSF version */
d3581e61 2600static int
fba45db2 2601proc_get_nthreads (procinfo *pi)
c3f6f71d
JM
2602{
2603 int nthreads = 0;
c906108c 2604
c3f6f71d
JM
2605 if (ioctl (pi->ctl_fd, PIOCNTHR, &nthreads) < 0)
2606 proc_warn (pi, "procfs: PIOCNTHR failed", __LINE__);
c906108c 2607
c3f6f71d 2608 return nthreads;
c906108c
SS
2609}
2610
c3f6f71d
JM
2611#else
2612#if defined (SYS_lwpcreate) || defined (SYS_lwp_create) /* FIXME: multiple */
05b4bd79 2613/* Solaris version */
d3581e61 2614static int
fba45db2 2615proc_get_nthreads (procinfo *pi)
c906108c 2616{
c3f6f71d
JM
2617 if (!pi->status_valid)
2618 if (!proc_get_status (pi))
2619 return 0;
c5aa993b 2620
77382aee
PA
2621 /* NEW_PROC_API: only works for the process procinfo, because the
2622 LWP procinfos do not get prstatus filled in. */
19958708 2623#ifdef NEW_PROC_API
0df8b418 2624 if (pi->tid != 0) /* Find the parent process procinfo. */
c3f6f71d 2625 pi = find_procinfo_or_die (pi->pid, 0);
c5aa993b 2626#endif
c3f6f71d 2627 return pi->prstatus.pr_nlwp;
c906108c
SS
2628}
2629
c3f6f71d 2630#else
77382aee 2631/* Default version */
d3581e61 2632static int
fba45db2 2633proc_get_nthreads (procinfo *pi)
c906108c 2634{
c3f6f71d
JM
2635 return 0;
2636}
2637#endif
2638#endif
2639
77382aee
PA
2640/* LWP version.
2641
2642 Return the ID of the thread that had an event of interest.
2643 (ie. the one that hit a breakpoint or other traced event). All
2644 other things being equal, this should be the ID of a thread that is
2645 currently executing. */
c3f6f71d
JM
2646
2647#if defined (SYS_lwpcreate) || defined (SYS_lwp_create) /* FIXME: multiple */
05b4bd79 2648/* Solaris version */
d3581e61 2649static int
fba45db2 2650proc_get_current_thread (procinfo *pi)
c3f6f71d 2651{
77382aee
PA
2652 /* Note: this should be applied to the root procinfo for the
2653 process, not to the procinfo for an LWP. If applied to the
2654 procinfo for an LWP, it will simply return that LWP's ID. In
2655 that case, find the parent process procinfo. */
19958708 2656
c3f6f71d
JM
2657 if (pi->tid != 0)
2658 pi = find_procinfo_or_die (pi->pid, 0);
2659
2660 if (!pi->status_valid)
2661 if (!proc_get_status (pi))
2662 return 0;
2663
2664#ifdef NEW_PROC_API
2665 return pi->prstatus.pr_lwp.pr_lwpid;
c906108c 2666#else
c3f6f71d 2667 return pi->prstatus.pr_who;
c906108c 2668#endif
c3f6f71d 2669}
c906108c 2670
c3f6f71d
JM
2671#else
2672#if defined (PIOCNTHR) && defined (PIOCTLIST)
77382aee 2673/* OSF version */
d3581e61 2674static int
fba45db2 2675proc_get_current_thread (procinfo *pi)
c3f6f71d 2676{
0df8b418 2677#if 0 /* FIXME: not ready for prime time? */
c3f6f71d
JM
2678 return pi->prstatus.pr_tid;
2679#else
2680 return 0;
2681#endif
c906108c
SS
2682}
2683
c3f6f71d 2684#else
77382aee 2685/* Default version */
d3581e61 2686static int
fba45db2 2687proc_get_current_thread (procinfo *pi)
c906108c 2688{
c3f6f71d
JM
2689 return 0;
2690}
2691
2692#endif
2693#endif
c906108c 2694
77382aee
PA
2695/* Discover the IDs of all the threads within the process, and create
2696 a procinfo for each of them (chained to the parent). This
2697 unfortunately requires a different method on every OS. Returns
2698 non-zero for success, zero for failure. */
c906108c 2699
a0911fd0 2700static int
fba45db2 2701proc_delete_dead_threads (procinfo *parent, procinfo *thread, void *ignore)
c3f6f71d
JM
2702{
2703 if (thread && parent) /* sanity */
c906108c 2704 {
c3f6f71d
JM
2705 thread->status_valid = 0;
2706 if (!proc_get_status (thread))
2707 destroy_one_procinfo (&parent->thread_list, thread);
2708 }
2709 return 0; /* keep iterating */
2710}
c5aa993b 2711
c3f6f71d 2712#if defined (PIOCLSTATUS)
77382aee 2713/* Solaris 2.5 (ioctl) version */
d3581e61 2714static int
fba45db2 2715proc_update_threads (procinfo *pi)
c3f6f71d
JM
2716{
2717 gdb_prstatus_t *prstatus;
2718 struct cleanup *old_chain = NULL;
2719 procinfo *thread;
2720 int nlwp, i;
2721
77382aee
PA
2722 /* We should never have to apply this operation to any procinfo
2723 except the one for the main process. If that ever changes for
2724 any reason, then take out the following clause and replace it
2725 with one that makes sure the ctl_fd is open. */
19958708 2726
c3f6f71d
JM
2727 if (pi->tid != 0)
2728 pi = find_procinfo_or_die (pi->pid, 0);
2729
2730 proc_iterate_over_threads (pi, proc_delete_dead_threads, NULL);
2731
2732 if ((nlwp = proc_get_nthreads (pi)) <= 1)
2733 return 1; /* Process is not multi-threaded; nothing to do. */
2734
3c37485b 2735 prstatus = xmalloc (sizeof (gdb_prstatus_t) * (nlwp + 1));
c3f6f71d 2736
b8c9b27d 2737 old_chain = make_cleanup (xfree, prstatus);
c3f6f71d
JM
2738 if (ioctl (pi->ctl_fd, PIOCLSTATUS, prstatus) < 0)
2739 proc_error (pi, "update_threads (PIOCLSTATUS)", __LINE__);
2740
77382aee 2741 /* Skip element zero, which represents the process as a whole. */
c3f6f71d
JM
2742 for (i = 1; i < nlwp + 1; i++)
2743 {
2744 if ((thread = create_procinfo (pi->pid, prstatus[i].pr_who)) == NULL)
2745 proc_error (pi, "update_threads, create_procinfo", __LINE__);
c5aa993b 2746
c3f6f71d
JM
2747 memcpy (&thread->prstatus, &prstatus[i], sizeof (*prstatus));
2748 thread->status_valid = 1;
2749 }
2750 pi->threads_valid = 1;
2751 do_cleanups (old_chain);
2752 return 1;
2753}
2754#else
2755#ifdef NEW_PROC_API
05b4bd79 2756/* Solaris 6 (and later) version. */
004527cb
AC
2757static void
2758do_closedir_cleanup (void *dir)
2759{
2760 closedir (dir);
2761}
2762
d3581e61 2763static int
fba45db2 2764proc_update_threads (procinfo *pi)
c3f6f71d
JM
2765{
2766 char pathname[MAX_PROC_NAME_SIZE + 16];
2767 struct dirent *direntry;
2768 struct cleanup *old_chain = NULL;
2769 procinfo *thread;
2770 DIR *dirp;
2771 int lwpid;
2772
77382aee
PA
2773 /* We should never have to apply this operation to any procinfo
2774 except the one for the main process. If that ever changes for
2775 any reason, then take out the following clause and replace it
2776 with one that makes sure the ctl_fd is open. */
19958708 2777
c3f6f71d
JM
2778 if (pi->tid != 0)
2779 pi = find_procinfo_or_die (pi->pid, 0);
2780
2781 proc_iterate_over_threads (pi, proc_delete_dead_threads, NULL);
2782
05b4bd79
PA
2783 /* Note: this brute-force method was originally devised for Unixware
2784 (support removed since), and will also work on Solaris 2.6 and
2785 2.7. The original comment mentioned the existence of a much
2786 simpler and more elegant way to do this on Solaris, but didn't
2787 point out what that was. */
c3f6f71d
JM
2788
2789 strcpy (pathname, pi->pathname);
2790 strcat (pathname, "/lwp");
2791 if ((dirp = opendir (pathname)) == NULL)
2792 proc_error (pi, "update_threads, opendir", __LINE__);
2793
004527cb 2794 old_chain = make_cleanup (do_closedir_cleanup, dirp);
c3f6f71d
JM
2795 while ((direntry = readdir (dirp)) != NULL)
2796 if (direntry->d_name[0] != '.') /* skip '.' and '..' */
2797 {
2798 lwpid = atoi (&direntry->d_name[0]);
2799 if ((thread = create_procinfo (pi->pid, lwpid)) == NULL)
2800 proc_error (pi, "update_threads, create_procinfo", __LINE__);
2801 }
2802 pi->threads_valid = 1;
2803 do_cleanups (old_chain);
2804 return 1;
2805}
2806#else
2807#ifdef PIOCTLIST
77382aee 2808/* OSF version */
d3581e61 2809static int
fba45db2 2810proc_update_threads (procinfo *pi)
c3f6f71d
JM
2811{
2812 int nthreads, i;
2813 tid_t *threads;
2814
77382aee
PA
2815 /* We should never have to apply this operation to any procinfo
2816 except the one for the main process. If that ever changes for
2817 any reason, then take out the following clause and replace it
2818 with one that makes sure the ctl_fd is open. */
19958708 2819
c3f6f71d
JM
2820 if (pi->tid != 0)
2821 pi = find_procinfo_or_die (pi->pid, 0);
2822
2823 proc_iterate_over_threads (pi, proc_delete_dead_threads, NULL);
2824
2825 nthreads = proc_get_nthreads (pi);
2826 if (nthreads < 2)
0df8b418 2827 return 0; /* Nothing to do for 1 or fewer threads. */
c3f6f71d 2828
3c37485b 2829 threads = xmalloc (nthreads * sizeof (tid_t));
19958708 2830
c3f6f71d
JM
2831 if (ioctl (pi->ctl_fd, PIOCTLIST, threads) < 0)
2832 proc_error (pi, "procfs: update_threads (PIOCTLIST)", __LINE__);
2833
2834 for (i = 0; i < nthreads; i++)
2835 {
2836 if (!find_procinfo (pi->pid, threads[i]))
2837 if (!create_procinfo (pi->pid, threads[i]))
2838 proc_error (pi, "update_threads, create_procinfo", __LINE__);
c906108c 2839 }
c3f6f71d
JM
2840 pi->threads_valid = 1;
2841 return 1;
c906108c 2842}
c3f6f71d 2843#else
77382aee 2844/* Default version */
d3581e61 2845static int
fba45db2 2846proc_update_threads (procinfo *pi)
c3f6f71d
JM
2847{
2848 return 0;
2849}
2850#endif /* OSF PIOCTLIST */
2851#endif /* NEW_PROC_API */
2852#endif /* SOL 2.5 PIOCLSTATUS */
c906108c 2853
77382aee
PA
2854/* Given a pointer to a function, call that function once for each lwp
2855 in the procinfo list, until the function returns non-zero, in which
2856 event return the value returned by the function.
2857
2858 Note: this function does NOT call update_threads. If you want to
2859 discover new threads first, you must call that function explicitly.
2860 This function just makes a quick pass over the currently-known
2861 procinfos.
2862
2863 PI is the parent process procinfo. FUNC is the per-thread
2864 function. PTR is an opaque parameter for function. Returns the
2865 first non-zero return value from the callee, or zero. */
c3f6f71d 2866
d3581e61 2867static int
d0849a9a
KB
2868proc_iterate_over_threads (procinfo *pi,
2869 int (*func) (procinfo *, procinfo *, void *),
2870 void *ptr)
c906108c 2871{
c3f6f71d
JM
2872 procinfo *thread, *next;
2873 int retval = 0;
c906108c 2874
77382aee
PA
2875 /* We should never have to apply this operation to any procinfo
2876 except the one for the main process. If that ever changes for
2877 any reason, then take out the following clause and replace it
2878 with one that makes sure the ctl_fd is open. */
19958708 2879
c3f6f71d
JM
2880 if (pi->tid != 0)
2881 pi = find_procinfo_or_die (pi->pid, 0);
2882
2883 for (thread = pi->thread_list; thread != NULL; thread = next)
c906108c 2884 {
0df8b418 2885 next = thread->next; /* In case thread is destroyed. */
c3f6f71d
JM
2886 if ((retval = (*func) (pi, thread, ptr)) != 0)
2887 break;
c906108c 2888 }
c3f6f71d
JM
2889
2890 return retval;
c906108c
SS
2891}
2892
c3f6f71d
JM
2893/* =================== END, Thread "MODULE" =================== */
2894
2895/* =================== END, /proc "MODULE" =================== */
2896
2897/* =================== GDB "MODULE" =================== */
2898
77382aee
PA
2899/* Here are all of the gdb target vector functions and their
2900 friends. */
c3f6f71d 2901
39f77062 2902static ptid_t do_attach (ptid_t ptid);
a14ed312 2903static void do_detach (int signo);
9185ddce 2904static void proc_trace_syscalls_1 (procinfo *pi, int syscallnum,
77382aee 2905 int entry_or_exit, int mode, int from_tty);
9185ddce
JB
2906
2907/* On mips-irix, we need to insert a breakpoint at __dbx_link during
2908 the startup phase. The following two variables are used to record
2909 the address of the breakpoint, and the code that was replaced by
2910 a breakpoint. */
2911static int dbx_link_bpt_addr = 0;
8181d85f 2912static void *dbx_link_bpt;
c3f6f71d 2913
77382aee
PA
2914/* Sets up the inferior to be debugged. Registers to trace signals,
2915 hardware faults, and syscalls. Note: does not set RLC flag: caller
2916 may want to customize that. Returns zero for success (note!
2917 unlike most functions in this module); on failure, returns the LINE
2918 NUMBER where it failed! */
c3f6f71d
JM
2919
2920static int
fba45db2 2921procfs_debug_inferior (procinfo *pi)
c906108c 2922{
c3f6f71d 2923 fltset_t traced_faults;
37de36c6
KB
2924 gdb_sigset_t traced_signals;
2925 sysset_t *traced_syscall_entries;
2926 sysset_t *traced_syscall_exits;
2927 int status;
c906108c 2928
c3f6f71d
JM
2929#ifdef PROCFS_DONT_TRACE_FAULTS
2930 /* On some systems (OSF), we don't trace hardware faults.
2931 Apparently it's enough that we catch them as signals.
0df8b418
MS
2932 Wonder why we don't just do that in general? */
2933 premptyset (&traced_faults); /* don't trace faults. */
c3f6f71d 2934#else
0df8b418
MS
2935 /* Register to trace hardware faults in the child. */
2936 prfillset (&traced_faults); /* trace all faults... */
3c95f01c 2937 gdb_prdelset (&traced_faults, FLTPAGE); /* except page fault. */
c3f6f71d
JM
2938#endif
2939 if (!proc_set_traced_faults (pi, &traced_faults))
2940 return __LINE__;
c906108c 2941
2455069d
UW
2942 /* Initially, register to trace all signals in the child. */
2943 prfillset (&traced_signals);
2944 if (!proc_set_traced_signals (pi, &traced_signals))
c3f6f71d
JM
2945 return __LINE__;
2946
37de36c6 2947
c3f6f71d 2948 /* Register to trace the 'exit' system call (on entry). */
37de36c6
KB
2949 traced_syscall_entries = sysset_t_alloc (pi);
2950 gdb_premptysysset (traced_syscall_entries);
2951#ifdef SYS_exit
2952 gdb_praddsysset (traced_syscall_entries, SYS_exit);
2953#endif
c3f6f71d 2954#ifdef SYS_lwpexit
0df8b418 2955 gdb_praddsysset (traced_syscall_entries, SYS_lwpexit);/* And _lwp_exit... */
c3f6f71d
JM
2956#endif
2957#ifdef SYS_lwp_exit
37de36c6
KB
2958 gdb_praddsysset (traced_syscall_entries, SYS_lwp_exit);
2959#endif
2960#ifdef DYNAMIC_SYSCALLS
2961 {
2962 int callnum = find_syscall (pi, "_exit");
f4a14ae6 2963
37de36c6
KB
2964 if (callnum >= 0)
2965 gdb_praddsysset (traced_syscall_entries, callnum);
2966 }
c906108c
SS
2967#endif
2968
37de36c6
KB
2969 status = proc_set_traced_sysentry (pi, traced_syscall_entries);
2970 xfree (traced_syscall_entries);
2971 if (!status)
c3f6f71d
JM
2972 return __LINE__;
2973
2974#ifdef PRFS_STOPEXEC /* defined on OSF */
2975 /* OSF method for tracing exec syscalls. Quoting:
2976 Under Alpha OSF/1 we have to use a PIOCSSPCACT ioctl to trace
2977 exits from exec system calls because of the user level loader. */
0df8b418 2978 /* FIXME: make nice and maybe move into an access function. */
c3f6f71d
JM
2979 {
2980 int prfs_flags;
2981
2982 if (ioctl (pi->ctl_fd, PIOCGSPCACT, &prfs_flags) < 0)
2983 return __LINE__;
2984
2985 prfs_flags |= PRFS_STOPEXEC;
2986
2987 if (ioctl (pi->ctl_fd, PIOCSSPCACT, &prfs_flags) < 0)
2988 return __LINE__;
2989 }
2990#else /* not PRFS_STOPEXEC */
0df8b418 2991 /* Everyone else's (except OSF) method for tracing exec syscalls. */
c3f6f71d
JM
2992 /* GW: Rationale...
2993 Not all systems with /proc have all the exec* syscalls with the same
2994 names. On the SGI, for example, there is no SYS_exec, but there
0df8b418 2995 *is* a SYS_execv. So, we try to account for that. */
c3f6f71d 2996
37de36c6
KB
2997 traced_syscall_exits = sysset_t_alloc (pi);
2998 gdb_premptysysset (traced_syscall_exits);
c3f6f71d 2999#ifdef SYS_exec
37de36c6 3000 gdb_praddsysset (traced_syscall_exits, SYS_exec);
c3f6f71d
JM
3001#endif
3002#ifdef SYS_execve
37de36c6 3003 gdb_praddsysset (traced_syscall_exits, SYS_execve);
c3f6f71d
JM
3004#endif
3005#ifdef SYS_execv
37de36c6 3006 gdb_praddsysset (traced_syscall_exits, SYS_execv);
c3f6f71d 3007#endif
c5aa993b 3008
c3f6f71d 3009#ifdef SYS_lwpcreate
37de36c6
KB
3010 gdb_praddsysset (traced_syscall_exits, SYS_lwpcreate);
3011 gdb_praddsysset (traced_syscall_exits, SYS_lwpexit);
c906108c 3012#endif
c5aa993b 3013
0df8b418 3014#ifdef SYS_lwp_create /* FIXME: once only, please. */
37de36c6
KB
3015 gdb_praddsysset (traced_syscall_exits, SYS_lwp_create);
3016 gdb_praddsysset (traced_syscall_exits, SYS_lwp_exit);
c3f6f71d 3017#endif
c5aa993b 3018
37de36c6
KB
3019#ifdef DYNAMIC_SYSCALLS
3020 {
3021 int callnum = find_syscall (pi, "execve");
f4a14ae6 3022
37de36c6
KB
3023 if (callnum >= 0)
3024 gdb_praddsysset (traced_syscall_exits, callnum);
3025 callnum = find_syscall (pi, "ra_execve");
3026 if (callnum >= 0)
3027 gdb_praddsysset (traced_syscall_exits, callnum);
3028 }
3029#endif
c906108c 3030
37de36c6
KB
3031 status = proc_set_traced_sysexit (pi, traced_syscall_exits);
3032 xfree (traced_syscall_exits);
3033 if (!status)
c3f6f71d
JM
3034 return __LINE__;
3035
3036#endif /* PRFS_STOPEXEC */
3037 return 0;
c906108c
SS
3038}
3039
19958708 3040static void
136d6dae 3041procfs_attach (struct target_ops *ops, char *args, int from_tty)
c906108c 3042{
c3f6f71d
JM
3043 char *exec_file;
3044 int pid;
3045
74164c56 3046 pid = parse_pid_to_attach (args);
c3f6f71d 3047
c3f6f71d 3048 if (pid == getpid ())
8a3fe4f8 3049 error (_("Attaching GDB to itself is not a good idea..."));
c906108c 3050
c3f6f71d 3051 if (from_tty)
c906108c 3052 {
c3f6f71d
JM
3053 exec_file = get_exec_file (0);
3054
3055 if (exec_file)
a3f17187 3056 printf_filtered (_("Attaching to program `%s', %s\n"),
39f77062 3057 exec_file, target_pid_to_str (pid_to_ptid (pid)));
c3f6f71d 3058 else
a3f17187 3059 printf_filtered (_("Attaching to %s\n"),
77382aee 3060 target_pid_to_str (pid_to_ptid (pid)));
c3f6f71d
JM
3061
3062 fflush (stdout);
c906108c 3063 }
39f77062 3064 inferior_ptid = do_attach (pid_to_ptid (pid));
28439f5e 3065 push_target (ops);
c3f6f71d
JM
3066}
3067
19958708 3068static void
52554a0e 3069procfs_detach (struct target_ops *ops, const char *args, int from_tty)
c3f6f71d 3070{
cc377e6b 3071 int sig = 0;
dfd4cc63 3072 int pid = ptid_get_pid (inferior_ptid);
cc377e6b
MK
3073
3074 if (args)
3075 sig = atoi (args);
c3f6f71d
JM
3076
3077 if (from_tty)
c906108c 3078 {
cc377e6b
MK
3079 char *exec_file;
3080
c3f6f71d 3081 exec_file = get_exec_file (0);
cc377e6b 3082 if (exec_file == NULL)
c3f6f71d 3083 exec_file = "";
cc377e6b 3084
a3f17187 3085 printf_filtered (_("Detaching from program: %s, %s\n"), exec_file,
cc377e6b
MK
3086 target_pid_to_str (pid_to_ptid (pid)));
3087 gdb_flush (gdb_stdout);
c906108c 3088 }
19958708 3089
cc377e6b
MK
3090 do_detach (sig);
3091
39f77062 3092 inferior_ptid = null_ptid;
7f9f62ba 3093 detach_inferior (pid);
28439f5e 3094 unpush_target (ops);
c906108c
SS
3095}
3096
39f77062
KB
3097static ptid_t
3098do_attach (ptid_t ptid)
c906108c 3099{
c3f6f71d 3100 procinfo *pi;
181e7f93 3101 struct inferior *inf;
c3f6f71d 3102 int fail;
2689673f 3103 int lwpid;
c3f6f71d 3104
dfd4cc63 3105 if ((pi = create_procinfo (ptid_get_pid (ptid), 0)) == NULL)
8a3fe4f8 3106 perror (_("procfs: out of memory in 'attach'"));
c3f6f71d
JM
3107
3108 if (!open_procinfo_files (pi, FD_CTL))
3109 {
3110 fprintf_filtered (gdb_stderr, "procfs:%d -- ", __LINE__);
19958708 3111 sprintf (errmsg, "do_attach: couldn't open /proc file for process %d",
dfd4cc63 3112 ptid_get_pid (ptid));
c3f6f71d
JM
3113 dead_procinfo (pi, errmsg, NOKILL);
3114 }
c906108c 3115
c3f6f71d
JM
3116 /* Stop the process (if it isn't already stopped). */
3117 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
c906108c 3118 {
c3f6f71d
JM
3119 pi->was_stopped = 1;
3120 proc_prettyprint_why (proc_why (pi), proc_what (pi), 1);
c906108c
SS
3121 }
3122 else
3123 {
c3f6f71d
JM
3124 pi->was_stopped = 0;
3125 /* Set the process to run again when we close it. */
3126 if (!proc_set_run_on_last_close (pi))
3127 dead_procinfo (pi, "do_attach: couldn't set RLC.", NOKILL);
3128
0df8b418 3129 /* Now stop the process. */
c3f6f71d
JM
3130 if (!proc_stop_process (pi))
3131 dead_procinfo (pi, "do_attach: couldn't stop the process.", NOKILL);
3132 pi->ignore_next_sigstop = 1;
c906108c 3133 }
c3f6f71d
JM
3134 /* Save some of the /proc state to be restored if we detach. */
3135 if (!proc_get_traced_faults (pi, &pi->saved_fltset))
3136 dead_procinfo (pi, "do_attach: couldn't save traced faults.", NOKILL);
3137 if (!proc_get_traced_signals (pi, &pi->saved_sigset))
3138 dead_procinfo (pi, "do_attach: couldn't save traced signals.", NOKILL);
37de36c6 3139 if (!proc_get_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d
JM
3140 dead_procinfo (pi, "do_attach: couldn't save traced syscall entries.",
3141 NOKILL);
37de36c6 3142 if (!proc_get_traced_sysexit (pi, pi->saved_exitset))
19958708 3143 dead_procinfo (pi, "do_attach: couldn't save traced syscall exits.",
c3f6f71d
JM
3144 NOKILL);
3145 if (!proc_get_held_signals (pi, &pi->saved_sighold))
3146 dead_procinfo (pi, "do_attach: couldn't save held signals.", NOKILL);
3147
3148 if ((fail = procfs_debug_inferior (pi)) != 0)
3149 dead_procinfo (pi, "do_attach: failed in procfs_debug_inferior", NOKILL);
3150
6c95b8df
PA
3151 inf = current_inferior ();
3152 inferior_appeared (inf, pi->pid);
c3f6f71d 3153 /* Let GDB know that the inferior was attached. */
181e7f93 3154 inf->attach_flag = 1;
2689673f
PA
3155
3156 /* Create a procinfo for the current lwp. */
3157 lwpid = proc_get_current_thread (pi);
3158 create_procinfo (pi->pid, lwpid);
3159
3160 /* Add it to gdb's thread list. */
dfd4cc63 3161 ptid = ptid_build (pi->pid, lwpid, 0);
2689673f
PA
3162 add_thread (ptid);
3163
3164 return ptid;
c906108c
SS
3165}
3166
3167static void
fba45db2 3168do_detach (int signo)
c906108c 3169{
c3f6f71d 3170 procinfo *pi;
c906108c 3171
0df8b418 3172 /* Find procinfo for the main process. */
dfd4cc63
LM
3173 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid),
3174 0); /* FIXME: threads */
c3f6f71d
JM
3175 if (signo)
3176 if (!proc_set_current_signal (pi, signo))
3177 proc_warn (pi, "do_detach, set_current_signal", __LINE__);
c5aa993b 3178
c3f6f71d
JM
3179 if (!proc_set_traced_signals (pi, &pi->saved_sigset))
3180 proc_warn (pi, "do_detach, set_traced_signal", __LINE__);
c906108c 3181
c3f6f71d
JM
3182 if (!proc_set_traced_faults (pi, &pi->saved_fltset))
3183 proc_warn (pi, "do_detach, set_traced_faults", __LINE__);
3184
37de36c6 3185 if (!proc_set_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d
JM
3186 proc_warn (pi, "do_detach, set_traced_sysentry", __LINE__);
3187
37de36c6 3188 if (!proc_set_traced_sysexit (pi, pi->saved_exitset))
c3f6f71d
JM
3189 proc_warn (pi, "do_detach, set_traced_sysexit", __LINE__);
3190
3191 if (!proc_set_held_signals (pi, &pi->saved_sighold))
3192 proc_warn (pi, "do_detach, set_held_signals", __LINE__);
3193
3194 if (signo || (proc_flags (pi) & (PR_STOPPED | PR_ISTOP)))
3195 if (signo || !(pi->was_stopped) ||
e2e0b3e5 3196 query (_("Was stopped when attached, make it runnable again? ")))
c3f6f71d
JM
3197 {
3198 /* Clear any pending signal. */
3199 if (!proc_clear_current_fault (pi))
3200 proc_warn (pi, "do_detach, clear_current_fault", __LINE__);
3201
1a303dec
MS
3202 if (signo == 0 && !proc_clear_current_signal (pi))
3203 proc_warn (pi, "do_detach, clear_current_signal", __LINE__);
3204
c3f6f71d
JM
3205 if (!proc_set_run_on_last_close (pi))
3206 proc_warn (pi, "do_detach, set_rlc", __LINE__);
3207 }
3208
c3f6f71d 3209 destroy_procinfo (pi);
c906108c
SS
3210}
3211
772cf8be
MK
3212/* Fetch register REGNUM from the inferior. If REGNUM is -1, do this
3213 for all registers.
3214
3215 ??? Is the following note still relevant? We can't get individual
3216 registers with the PT_GETREGS ptrace(2) request either, yet we
3217 don't bother with caching at all in that case.
3218
3219 NOTE: Since the /proc interface cannot give us individual
3220 registers, we pay no attention to REGNUM, and just fetch them all.
3221 This results in the possibility that we will do unnecessarily many
3222 fetches, since we may be called repeatedly for individual
3223 registers. So we cache the results, and mark the cache invalid
3224 when the process is resumed. */
c3f6f71d 3225
c906108c 3226static void
28439f5e
PA
3227procfs_fetch_registers (struct target_ops *ops,
3228 struct regcache *regcache, int regnum)
c906108c 3229{
772cf8be
MK
3230 gdb_gregset_t *gregs;
3231 procinfo *pi;
dfd4cc63
LM
3232 int pid = ptid_get_pid (inferior_ptid);
3233 int tid = ptid_get_lwp (inferior_ptid);
40a6adc1 3234 struct gdbarch *gdbarch = get_regcache_arch (regcache);
c3f6f71d 3235
2689673f 3236 pi = find_procinfo_or_die (pid, tid);
c3f6f71d
JM
3237
3238 if (pi == NULL)
8a3fe4f8 3239 error (_("procfs: fetch_registers failed to find procinfo for %s"),
39f77062 3240 target_pid_to_str (inferior_ptid));
c3f6f71d 3241
772cf8be
MK
3242 gregs = proc_get_gregs (pi);
3243 if (gregs == NULL)
c3f6f71d
JM
3244 proc_error (pi, "fetch_registers, get_gregs", __LINE__);
3245
56be3814 3246 supply_gregset (regcache, (const gdb_gregset_t *) gregs);
c3f6f71d 3247
40a6adc1 3248 if (gdbarch_fp0_regnum (gdbarch) >= 0) /* Do we have an FPU? */
60054393 3249 {
772cf8be
MK
3250 gdb_fpregset_t *fpregs;
3251
40a6adc1
MD
3252 if ((regnum >= 0 && regnum < gdbarch_fp0_regnum (gdbarch))
3253 || regnum == gdbarch_pc_regnum (gdbarch)
3254 || regnum == gdbarch_sp_regnum (gdbarch))
772cf8be 3255 return; /* Not a floating point register. */
c5aa993b 3256
772cf8be
MK
3257 fpregs = proc_get_fpregs (pi);
3258 if (fpregs == NULL)
60054393 3259 proc_error (pi, "fetch_registers, get_fpregs", __LINE__);
c906108c 3260
56be3814 3261 supply_fpregset (regcache, (const gdb_fpregset_t *) fpregs);
60054393 3262 }
c906108c
SS
3263}
3264
772cf8be
MK
3265/* Store register REGNUM back into the inferior. If REGNUM is -1, do
3266 this for all registers.
3267
3268 NOTE: Since the /proc interface will not read individual registers,
3269 we will cache these requests until the process is resumed, and only
3270 then write them back to the inferior process.
77382aee 3271
772cf8be
MK
3272 FIXME: is that a really bad idea? Have to think about cases where
3273 writing one register might affect the value of others, etc. */
c906108c 3274
c3f6f71d 3275static void
28439f5e
PA
3276procfs_store_registers (struct target_ops *ops,
3277 struct regcache *regcache, int regnum)
c3f6f71d 3278{
772cf8be
MK
3279 gdb_gregset_t *gregs;
3280 procinfo *pi;
dfd4cc63
LM
3281 int pid = ptid_get_pid (inferior_ptid);
3282 int tid = ptid_get_lwp (inferior_ptid);
40a6adc1 3283 struct gdbarch *gdbarch = get_regcache_arch (regcache);
c3f6f71d 3284
2689673f 3285 pi = find_procinfo_or_die (pid, tid);
c3f6f71d
JM
3286
3287 if (pi == NULL)
8a3fe4f8 3288 error (_("procfs: store_registers: failed to find procinfo for %s"),
39f77062 3289 target_pid_to_str (inferior_ptid));
c906108c 3290
772cf8be
MK
3291 gregs = proc_get_gregs (pi);
3292 if (gregs == NULL)
c3f6f71d 3293 proc_error (pi, "store_registers, get_gregs", __LINE__);
c906108c 3294
56be3814 3295 fill_gregset (regcache, gregs, regnum);
c3f6f71d
JM
3296 if (!proc_set_gregs (pi))
3297 proc_error (pi, "store_registers, set_gregs", __LINE__);
c906108c 3298
40a6adc1 3299 if (gdbarch_fp0_regnum (gdbarch) >= 0) /* Do we have an FPU? */
60054393 3300 {
772cf8be
MK
3301 gdb_fpregset_t *fpregs;
3302
40a6adc1
MD
3303 if ((regnum >= 0 && regnum < gdbarch_fp0_regnum (gdbarch))
3304 || regnum == gdbarch_pc_regnum (gdbarch)
3305 || regnum == gdbarch_sp_regnum (gdbarch))
772cf8be 3306 return; /* Not a floating point register. */
60054393 3307
772cf8be
MK
3308 fpregs = proc_get_fpregs (pi);
3309 if (fpregs == NULL)
60054393
MS
3310 proc_error (pi, "store_registers, get_fpregs", __LINE__);
3311
56be3814 3312 fill_fpregset (regcache, fpregs, regnum);
60054393
MS
3313 if (!proc_set_fpregs (pi))
3314 proc_error (pi, "store_registers, set_fpregs", __LINE__);
3315 }
c3f6f71d 3316}
c906108c 3317
37de36c6
KB
3318static int
3319syscall_is_lwp_exit (procinfo *pi, int scall)
3320{
37de36c6
KB
3321#ifdef SYS_lwp_exit
3322 if (scall == SYS_lwp_exit)
3323 return 1;
3324#endif
3325#ifdef SYS_lwpexit
3326 if (scall == SYS_lwpexit)
3327 return 1;
3328#endif
3329 return 0;
3330}
3331
3332static int
3333syscall_is_exit (procinfo *pi, int scall)
3334{
3335#ifdef SYS_exit
3336 if (scall == SYS_exit)
3337 return 1;
3338#endif
3339#ifdef DYNAMIC_SYSCALLS
3340 if (find_syscall (pi, "_exit") == scall)
3341 return 1;
3342#endif
3343 return 0;
3344}
3345
3346static int
3347syscall_is_exec (procinfo *pi, int scall)
3348{
3349#ifdef SYS_exec
3350 if (scall == SYS_exec)
3351 return 1;
3352#endif
3353#ifdef SYS_execv
3354 if (scall == SYS_execv)
3355 return 1;
3356#endif
3357#ifdef SYS_execve
3358 if (scall == SYS_execve)
3359 return 1;
3360#endif
3361#ifdef DYNAMIC_SYSCALLS
3362 if (find_syscall (pi, "_execve"))
3363 return 1;
3364 if (find_syscall (pi, "ra_execve"))
3365 return 1;
3366#endif
3367 return 0;
3368}
3369
3370static int
3371syscall_is_lwp_create (procinfo *pi, int scall)
3372{
3373#ifdef SYS_lwp_create
3374 if (scall == SYS_lwp_create)
3375 return 1;
3376#endif
3377#ifdef SYS_lwpcreate
3378 if (scall == SYS_lwpcreate)
3379 return 1;
3380#endif
3381 return 0;
3382}
3383
7434dadd
JB
3384/* Remove the breakpoint that we inserted in __dbx_link().
3385 Does nothing if the breakpoint hasn't been inserted or has already
3386 been removed. */
3387
3388static void
3389remove_dbx_link_breakpoint (void)
3390{
3391 if (dbx_link_bpt_addr == 0)
3392 return;
3393
f5656ead 3394 if (deprecated_remove_raw_breakpoint (target_gdbarch (), dbx_link_bpt) != 0)
7434dadd
JB
3395 warning (_("Unable to remove __dbx_link breakpoint."));
3396
3397 dbx_link_bpt_addr = 0;
3398 dbx_link_bpt = NULL;
3399}
3400
3401#ifdef SYS_syssgi
3402/* Return the address of the __dbx_link() function in the file
3403 refernced by ABFD by scanning its symbol table. Return 0 if
3404 the symbol was not found. */
3405
3406static CORE_ADDR
3407dbx_link_addr (bfd *abfd)
3408{
3409 long storage_needed;
3410 asymbol **symbol_table;
3411 long number_of_symbols;
3412 long i;
3413
3414 storage_needed = bfd_get_symtab_upper_bound (abfd);
3415 if (storage_needed <= 0)
3416 return 0;
3417
3418 symbol_table = (asymbol **) xmalloc (storage_needed);
3419 make_cleanup (xfree, symbol_table);
3420
3421 number_of_symbols = bfd_canonicalize_symtab (abfd, symbol_table);
3422
3423 for (i = 0; i < number_of_symbols; i++)
3424 {
3425 asymbol *sym = symbol_table[i];
3426
3427 if ((sym->flags & BSF_GLOBAL)
77382aee
PA
3428 && sym->name != NULL && strcmp (sym->name, "__dbx_link") == 0)
3429 return (sym->value + sym->section->vma);
7434dadd
JB
3430 }
3431
3432 /* Symbol not found, return NULL. */
3433 return 0;
3434}
3435
3436/* Search the symbol table of the file referenced by FD for a symbol
0df8b418 3437 named __dbx_link(). If found, then insert a breakpoint at this location,
7434dadd
JB
3438 and return nonzero. Return zero otherwise. */
3439
3440static int
3441insert_dbx_link_bpt_in_file (int fd, CORE_ADDR ignored)
3442{
3443 bfd *abfd;
3444 long storage_needed;
3445 CORE_ADDR sym_addr;
3446
64c31149 3447 abfd = gdb_bfd_fdopenr ("unamed", 0, fd);
7434dadd
JB
3448 if (abfd == NULL)
3449 {
3450 warning (_("Failed to create a bfd: %s."), bfd_errmsg (bfd_get_error ()));
3451 return 0;
3452 }
3453
3454 if (!bfd_check_format (abfd, bfd_object))
3455 {
3456 /* Not the correct format, so we can not possibly find the dbx_link
77382aee 3457 symbol in it. */
cbb099e8 3458 gdb_bfd_unref (abfd);
7434dadd
JB
3459 return 0;
3460 }
3461
3462 sym_addr = dbx_link_addr (abfd);
3463 if (sym_addr != 0)
3464 {
3465 /* Insert the breakpoint. */
3466 dbx_link_bpt_addr = sym_addr;
f5656ead 3467 dbx_link_bpt = deprecated_insert_raw_breakpoint (target_gdbarch (), NULL,
7434dadd
JB
3468 sym_addr);
3469 if (dbx_link_bpt == NULL)
77382aee
PA
3470 {
3471 warning (_("Failed to insert dbx_link breakpoint."));
cbb099e8 3472 gdb_bfd_unref (abfd);
77382aee
PA
3473 return 0;
3474 }
cbb099e8 3475 gdb_bfd_unref (abfd);
7434dadd
JB
3476 return 1;
3477 }
3478
cbb099e8 3479 gdb_bfd_unref (abfd);
7434dadd
JB
3480 return 0;
3481}
3482
e294797a 3483/* Calls the supplied callback function once for each mapped address
77382aee
PA
3484 space in the process. The callback function receives an open file
3485 descriptor for the file corresponding to that mapped address space
3486 (if there is one), and the base address of the mapped space. Quit
3487 when the callback function returns a nonzero value, or at teh end
3488 of the mappings. Returns the first non-zero return value of the
3489 callback function, or zero. */
e294797a
JB
3490
3491static int
3492solib_mappings_callback (struct prmap *map, int (*func) (int, CORE_ADDR),
3493 void *data)
3494{
3495 procinfo *pi = data;
3496 int fd;
3497
3498#ifdef NEW_PROC_API
3499 char name[MAX_PROC_NAME_SIZE + sizeof (map->pr_mapname)];
3500
3501 if (map->pr_vaddr == 0 && map->pr_size == 0)
3502 return -1; /* sanity */
3503
3504 if (map->pr_mapname[0] == 0)
3505 {
3506 fd = -1; /* no map file */
3507 }
3508 else
3509 {
3510 sprintf (name, "/proc/%d/object/%s", pi->pid, map->pr_mapname);
3511 /* Note: caller's responsibility to close this fd! */
3512 fd = open_with_retry (name, O_RDONLY);
3513 /* Note: we don't test the above call for failure;
3514 we just pass the FD on as given. Sometimes there is
3515 no file, so the open may return failure, but that's
3516 not a problem. */
3517 }
3518#else
3519 fd = ioctl (pi->ctl_fd, PIOCOPENM, &map->pr_vaddr);
3520 /* Note: we don't test the above call for failure;
3521 we just pass the FD on as given. Sometimes there is
3522 no file, so the ioctl may return failure, but that's
3523 not a problem. */
3524#endif
3525 return (*func) (fd, (CORE_ADDR) map->pr_vaddr);
3526}
3527
7434dadd
JB
3528/* If the given memory region MAP contains a symbol named __dbx_link,
3529 insert a breakpoint at this location and return nonzero. Return
3530 zero otherwise. */
3531
3532static int
3533insert_dbx_link_bpt_in_region (struct prmap *map,
b8edc417 3534 find_memory_region_ftype child_func,
77382aee 3535 void *data)
7434dadd
JB
3536{
3537 procinfo *pi = (procinfo *) data;
3538
3539 /* We know the symbol we're looking for is in a text region, so
3540 only look for it if the region is a text one. */
3541 if (map->pr_mflags & MA_EXEC)
3542 return solib_mappings_callback (map, insert_dbx_link_bpt_in_file, pi);
3543
3544 return 0;
3545}
3546
3547/* Search all memory regions for a symbol named __dbx_link. If found,
3548 insert a breakpoint at its location, and return nonzero. Return zero
3549 otherwise. */
3550
3551static int
3552insert_dbx_link_breakpoint (procinfo *pi)
3553{
3554 return iterate_over_mappings (pi, NULL, pi, insert_dbx_link_bpt_in_region);
3555}
3556#endif
3557
77382aee
PA
3558/* Retrieve the next stop event from the child process. If child has
3559 not stopped yet, wait for it to stop. Translate /proc eventcodes
3560 (or possibly wait eventcodes) into gdb internal event codes.
3561 Returns the id of process (and possibly thread) that incurred the
3562 event. Event codes are returned through a pointer parameter. */
c906108c 3563
39f77062 3564static ptid_t
117de6a9 3565procfs_wait (struct target_ops *ops,
4fcbb494 3566 ptid_t ptid, struct target_waitstatus *status, int options)
c906108c 3567{
0df8b418 3568 /* First cut: loosely based on original version 2.1. */
c3f6f71d 3569 procinfo *pi;
39f77062
KB
3570 int wstat;
3571 int temp_tid;
3572 ptid_t retval, temp_ptid;
c3f6f71d
JM
3573 int why, what, flags;
3574 int retry = 0;
c906108c 3575
c3f6f71d 3576wait_again:
c906108c 3577
c3f6f71d
JM
3578 retry++;
3579 wstat = 0;
39f77062 3580 retval = pid_to_ptid (-1);
c906108c 3581
0df8b418 3582 /* Find procinfo for main process. */
dfd4cc63 3583 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
c3f6f71d 3584 if (pi)
c906108c 3585 {
0df8b418 3586 /* We must assume that the status is stale now... */
c3f6f71d
JM
3587 pi->status_valid = 0;
3588 pi->gregs_valid = 0;
3589 pi->fpregs_valid = 0;
3590
0df8b418 3591#if 0 /* just try this out... */
c3f6f71d
JM
3592 flags = proc_flags (pi);
3593 why = proc_why (pi);
3594 if ((flags & PR_STOPPED) && (why == PR_REQUESTED))
0df8b418 3595 pi->status_valid = 0; /* re-read again, IMMEDIATELY... */
c3f6f71d
JM
3596#endif
3597 /* If child is not stopped, wait for it to stop. */
3598 if (!(proc_flags (pi) & (PR_STOPPED | PR_ISTOP)) &&
3599 !proc_wait_for_stop (pi))
c906108c 3600 {
0df8b418 3601 /* wait_for_stop failed: has the child terminated? */
c3f6f71d 3602 if (errno == ENOENT)
c906108c 3603 {
39f77062
KB
3604 int wait_retval;
3605
0df8b418
MS
3606 /* /proc file not found; presumably child has terminated. */
3607 wait_retval = wait (&wstat); /* "wait" for the child's exit. */
c3f6f71d 3608
dfd4cc63
LM
3609 /* Wrong child? */
3610 if (wait_retval != ptid_get_pid (inferior_ptid))
3e43a32a
MS
3611 error (_("procfs: couldn't stop "
3612 "process %d: wait returned %d."),
dfd4cc63 3613 ptid_get_pid (inferior_ptid), wait_retval);
c3f6f71d 3614 /* FIXME: might I not just use waitpid?
0df8b418 3615 Or try find_procinfo to see if I know about this child? */
39f77062 3616 retval = pid_to_ptid (wait_retval);
c906108c 3617 }
d1566ff5
FN
3618 else if (errno == EINTR)
3619 goto wait_again;
c3f6f71d 3620 else
c906108c 3621 {
0df8b418 3622 /* Unknown error from wait_for_stop. */
c3f6f71d 3623 proc_error (pi, "target_wait (wait_for_stop)", __LINE__);
c906108c 3624 }
c3f6f71d
JM
3625 }
3626 else
3627 {
3628 /* This long block is reached if either:
3629 a) the child was already stopped, or
3630 b) we successfully waited for the child with wait_for_stop.
3631 This block will analyze the /proc status, and translate it
3632 into a waitstatus for GDB.
3633
3634 If we actually had to call wait because the /proc file
19958708 3635 is gone (child terminated), then we skip this block,
c3f6f71d
JM
3636 because we already have a waitstatus. */
3637
3638 flags = proc_flags (pi);
3639 why = proc_why (pi);
3640 what = proc_what (pi);
3641
c3f6f71d 3642 if (flags & (PR_STOPPED | PR_ISTOP))
c906108c 3643 {
c3f6f71d
JM
3644#ifdef PR_ASYNC
3645 /* If it's running async (for single_thread control),
3646 set it back to normal again. */
3647 if (flags & PR_ASYNC)
3648 if (!proc_unset_async (pi))
3649 proc_error (pi, "target_wait, unset_async", __LINE__);
3650#endif
3651
3652 if (info_verbose)
3653 proc_prettyprint_why (why, what, 1);
3654
3655 /* The 'pid' we will return to GDB is composed of
3656 the process ID plus the lwp ID. */
dfd4cc63 3657 retval = ptid_build (pi->pid, proc_get_current_thread (pi), 0);
c3f6f71d
JM
3658
3659 switch (why) {
3660 case PR_SIGNALLED:
3661 wstat = (what << 8) | 0177;
3662 break;
3663 case PR_SYSENTRY:
37de36c6 3664 if (syscall_is_lwp_exit (pi, what))
c3f6f71d 3665 {
17faa917
DJ
3666 if (print_thread_events)
3667 printf_unfiltered (_("[%s exited]\n"),
3668 target_pid_to_str (retval));
37de36c6
KB
3669 delete_thread (retval);
3670 status->kind = TARGET_WAITKIND_SPURIOUS;
3671 return retval;
3672 }
3673 else if (syscall_is_exit (pi, what))
3674 {
181e7f93
PA
3675 struct inferior *inf;
3676
0df8b418 3677 /* Handle SYS_exit call only. */
37de36c6 3678 /* Stopped at entry to SYS_exit.
19958708 3679 Make it runnable, resume it, then use
37de36c6 3680 the wait system call to get its exit code.
19958708 3681 Proc_run_process always clears the current
37de36c6
KB
3682 fault and signal.
3683 Then return its exit status. */
3684 pi->status_valid = 0;
3685 wstat = 0;
19958708 3686 /* FIXME: what we should do is return
37de36c6
KB
3687 TARGET_WAITKIND_SPURIOUS. */
3688 if (!proc_run_process (pi, 0, 0))
3689 proc_error (pi, "target_wait, run_process", __LINE__);
181e7f93
PA
3690
3691 inf = find_inferior_pid (pi->pid);
3692 if (inf->attach_flag)
c3f6f71d 3693 {
19958708 3694 /* Don't call wait: simulate waiting for exit,
37de36c6
KB
3695 return a "success" exit code. Bogus: what if
3696 it returns something else? */
3697 wstat = 0;
39f77062 3698 retval = inferior_ptid; /* ? ? ? */
37de36c6
KB
3699 }
3700 else
3701 {
3702 int temp = wait (&wstat);
3703
3704 /* FIXME: shouldn't I make sure I get the right
3705 event from the right process? If (for
3706 instance) I have killed an earlier inferior
3707 process but failed to clean up after it
3708 somehow, I could get its termination event
3709 here. */
3710
0df8b418
MS
3711 /* If wait returns -1, that's what we return
3712 to GDB. */
37de36c6 3713 if (temp < 0)
39f77062 3714 retval = pid_to_ptid (temp);
c3f6f71d 3715 }
c3f6f71d 3716 }
37de36c6
KB
3717 else
3718 {
a3f17187 3719 printf_filtered (_("procfs: trapped on entry to "));
37de36c6
KB
3720 proc_prettyprint_syscall (proc_what (pi), 0);
3721 printf_filtered ("\n");
3722#ifndef PIOCSSPCACT
c3f6f71d 3723 {
37de36c6 3724 long i, nsysargs, *sysargs;
c3f6f71d 3725
37de36c6
KB
3726 if ((nsysargs = proc_nsysarg (pi)) > 0 &&
3727 (sysargs = proc_sysargs (pi)) != NULL)
3728 {
3e43a32a
MS
3729 printf_filtered (_("%ld syscall arguments:\n"),
3730 nsysargs);
37de36c6 3731 for (i = 0; i < nsysargs; i++)
19958708 3732 printf_filtered ("#%ld: 0x%08lx\n",
37de36c6
KB
3733 i, sysargs[i]);
3734 }
c3f6f71d 3735
c3f6f71d 3736 }
c3f6f71d 3737#endif
37de36c6
KB
3738 if (status)
3739 {
0df8b418
MS
3740 /* How to exit gracefully, returning "unknown
3741 event". */
37de36c6 3742 status->kind = TARGET_WAITKIND_SPURIOUS;
39f77062 3743 return inferior_ptid;
37de36c6
KB
3744 }
3745 else
3746 {
3747 /* How to keep going without returning to wfi: */
a493e3e2 3748 target_resume (ptid, 0, GDB_SIGNAL_0);
37de36c6
KB
3749 goto wait_again;
3750 }
3751 }
3752 break;
3753 case PR_SYSEXIT:
3754 if (syscall_is_exec (pi, what))
c3f6f71d 3755 {
37de36c6
KB
3756 /* Hopefully this is our own "fork-child" execing
3757 the real child. Hoax this event into a trap, and
3758 GDB will see the child about to execute its start
0df8b418 3759 address. */
37de36c6
KB
3760 wstat = (SIGTRAP << 8) | 0177;
3761 }
9185ddce 3762#ifdef SYS_syssgi
77382aee
PA
3763 else if (what == SYS_syssgi)
3764 {
3765 /* see if we can break on dbx_link(). If yes, then
3766 we no longer need the SYS_syssgi notifications. */
3767 if (insert_dbx_link_breakpoint (pi))
3768 proc_trace_syscalls_1 (pi, SYS_syssgi, PR_SYSEXIT,
3769 FLAG_RESET, 0);
3770
3771 /* This is an internal event and should be transparent
3772 to wfi, so resume the execution and wait again. See
3773 comment in procfs_init_inferior() for more details. */
a493e3e2 3774 target_resume (ptid, 0, GDB_SIGNAL_0);
77382aee
PA
3775 goto wait_again;
3776 }
9185ddce 3777#endif
37de36c6
KB
3778 else if (syscall_is_lwp_create (pi, what))
3779 {
77382aee
PA
3780 /* This syscall is somewhat like fork/exec. We
3781 will get the event twice: once for the parent
3782 LWP, and once for the child. We should already
3783 know about the parent LWP, but the child will
3784 be new to us. So, whenever we get this event,
3785 if it represents a new thread, simply add the
3786 thread to the list. */
c3f6f71d 3787
37de36c6 3788 /* If not in procinfo list, add it. */
39f77062
KB
3789 temp_tid = proc_get_current_thread (pi);
3790 if (!find_procinfo (pi->pid, temp_tid))
3791 create_procinfo (pi->pid, temp_tid);
37de36c6 3792
dfd4cc63 3793 temp_ptid = ptid_build (pi->pid, temp_tid, 0);
37de36c6 3794 /* If not in GDB's thread list, add it. */
39f77062 3795 if (!in_thread_list (temp_ptid))
93815fbf
VP
3796 add_thread (temp_ptid);
3797
0df8b418 3798 /* Return to WFI, but tell it to immediately resume. */
37de36c6 3799 status->kind = TARGET_WAITKIND_SPURIOUS;
39f77062 3800 return inferior_ptid;
37de36c6
KB
3801 }
3802 else if (syscall_is_lwp_exit (pi, what))
3803 {
17faa917
DJ
3804 if (print_thread_events)
3805 printf_unfiltered (_("[%s exited]\n"),
3806 target_pid_to_str (retval));
37de36c6
KB
3807 delete_thread (retval);
3808 status->kind = TARGET_WAITKIND_SPURIOUS;
3809 return retval;
c3f6f71d 3810 }
37de36c6
KB
3811 else if (0)
3812 {
3813 /* FIXME: Do we need to handle SYS_sproc,
3814 SYS_fork, or SYS_vfork here? The old procfs
3815 seemed to use this event to handle threads on
3816 older (non-LWP) systems, where I'm assuming
19958708 3817 that threads were actually separate processes.
37de36c6
KB
3818 Irix, maybe? Anyway, low priority for now. */
3819 }
3820 else
3821 {
a3f17187 3822 printf_filtered (_("procfs: trapped on exit from "));
37de36c6
KB
3823 proc_prettyprint_syscall (proc_what (pi), 0);
3824 printf_filtered ("\n");
3825#ifndef PIOCSSPCACT
3826 {
3827 long i, nsysargs, *sysargs;
3828
3829 if ((nsysargs = proc_nsysarg (pi)) > 0 &&
3830 (sysargs = proc_sysargs (pi)) != NULL)
3831 {
77382aee
PA
3832 printf_filtered (_("%ld syscall arguments:\n"),
3833 nsysargs);
37de36c6 3834 for (i = 0; i < nsysargs; i++)
19958708 3835 printf_filtered ("#%ld: 0x%08lx\n",
37de36c6
KB
3836 i, sysargs[i]);
3837 }
3838 }
c3f6f71d 3839#endif
37de36c6 3840 status->kind = TARGET_WAITKIND_SPURIOUS;
39f77062 3841 return inferior_ptid;
37de36c6 3842 }
c3f6f71d
JM
3843 break;
3844 case PR_REQUESTED:
3845#if 0 /* FIXME */
3846 wstat = (SIGSTOP << 8) | 0177;
3847 break;
3848#else
3849 if (retry < 5)
3850 {
a3f17187 3851 printf_filtered (_("Retry #%d:\n"), retry);
c3f6f71d
JM
3852 pi->status_valid = 0;
3853 goto wait_again;
3854 }
3855 else
3856 {
3857 /* If not in procinfo list, add it. */
39f77062
KB
3858 temp_tid = proc_get_current_thread (pi);
3859 if (!find_procinfo (pi->pid, temp_tid))
3860 create_procinfo (pi->pid, temp_tid);
c3f6f71d
JM
3861
3862 /* If not in GDB's thread list, add it. */
dfd4cc63 3863 temp_ptid = ptid_build (pi->pid, temp_tid, 0);
39f77062 3864 if (!in_thread_list (temp_ptid))
93815fbf 3865 add_thread (temp_ptid);
c3f6f71d
JM
3866
3867 status->kind = TARGET_WAITKIND_STOPPED;
3868 status->value.sig = 0;
3869 return retval;
3870 }
3871#endif
3872 case PR_JOBCONTROL:
3873 wstat = (what << 8) | 0177;
3874 break;
3875 case PR_FAULTED:
7af6341f 3876 switch (what) {
c3f6f71d
JM
3877#ifdef FLTWATCH
3878 case FLTWATCH:
3879 wstat = (SIGTRAP << 8) | 0177;
3880 break;
3881#endif
3882#ifdef FLTKWATCH
3883 case FLTKWATCH:
3884 wstat = (SIGTRAP << 8) | 0177;
3885 break;
3886#endif
0df8b418 3887 /* FIXME: use si_signo where possible. */
c3f6f71d 3888 case FLTPRIV:
0df8b418 3889#if (FLTILL != FLTPRIV) /* Avoid "duplicate case" error. */
c3f6f71d
JM
3890 case FLTILL:
3891#endif
3892 wstat = (SIGILL << 8) | 0177;
3893 break;
3894 case FLTBPT:
0df8b418 3895#if (FLTTRACE != FLTBPT) /* Avoid "duplicate case" error. */
c3f6f71d
JM
3896 case FLTTRACE:
3897#endif
77382aee
PA
3898 /* If we hit our __dbx_link() internal breakpoint,
3899 then remove it. See comments in procfs_init_inferior()
3900 for more details. */
3901 if (dbx_link_bpt_addr != 0
3902 && dbx_link_bpt_addr
fb14de7b 3903 == regcache_read_pc (get_current_regcache ()))
77382aee 3904 remove_dbx_link_breakpoint ();
9185ddce 3905
c3f6f71d
JM
3906 wstat = (SIGTRAP << 8) | 0177;
3907 break;
3908 case FLTSTACK:
3909 case FLTACCESS:
0df8b418 3910#if (FLTBOUNDS != FLTSTACK) /* Avoid "duplicate case" error. */
c3f6f71d
JM
3911 case FLTBOUNDS:
3912#endif
3913 wstat = (SIGSEGV << 8) | 0177;
3914 break;
3915 case FLTIOVF:
3916 case FLTIZDIV:
0df8b418 3917#if (FLTFPE != FLTIOVF) /* Avoid "duplicate case" error. */
c3f6f71d
JM
3918 case FLTFPE:
3919#endif
3920 wstat = (SIGFPE << 8) | 0177;
3921 break;
3e43a32a 3922 case FLTPAGE: /* Recoverable page fault */
0df8b418
MS
3923 default: /* FIXME: use si_signo if possible for
3924 fault. */
39f77062 3925 retval = pid_to_ptid (-1);
c3f6f71d 3926 printf_filtered ("procfs:%d -- ", __LINE__);
a3f17187 3927 printf_filtered (_("child stopped for unknown reason:\n"));
c3f6f71d 3928 proc_prettyprint_why (why, what, 1);
8a3fe4f8 3929 error (_("... giving up..."));
c3f6f71d
JM
3930 break;
3931 }
3932 break; /* case PR_FAULTED: */
3933 default: /* switch (why) unmatched */
3934 printf_filtered ("procfs:%d -- ", __LINE__);
a3f17187 3935 printf_filtered (_("child stopped for unknown reason:\n"));
c3f6f71d 3936 proc_prettyprint_why (why, what, 1);
8a3fe4f8 3937 error (_("... giving up..."));
c3f6f71d
JM
3938 break;
3939 }
77382aee
PA
3940 /* Got this far without error: If retval isn't in the
3941 threads database, add it. */
dfd4cc63 3942 if (ptid_get_pid (retval) > 0 &&
39f77062 3943 !ptid_equal (retval, inferior_ptid) &&
c3f6f71d 3944 !in_thread_list (retval))
c906108c 3945 {
77382aee
PA
3946 /* We have a new thread. We need to add it both to
3947 GDB's list and to our own. If we don't create a
3948 procinfo, resume may be unhappy later. */
c3f6f71d 3949 add_thread (retval);
dfd4cc63
LM
3950 if (find_procinfo (ptid_get_pid (retval),
3951 ptid_get_lwp (retval)) == NULL)
3952 create_procinfo (ptid_get_pid (retval),
3953 ptid_get_lwp (retval));
c906108c 3954 }
c906108c 3955 }
0df8b418 3956 else /* Flags do not indicate STOPPED. */
c906108c 3957 {
0df8b418 3958 /* surely this can't happen... */
c3f6f71d
JM
3959 printf_filtered ("procfs:%d -- process not stopped.\n",
3960 __LINE__);
3961 proc_prettyprint_flags (flags, 1);
8a3fe4f8 3962 error (_("procfs: ...giving up..."));
c906108c 3963 }
c906108c 3964 }
c906108c 3965
c3f6f71d
JM
3966 if (status)
3967 store_waitstatus (status, wstat);
c906108c
SS
3968 }
3969
c3f6f71d
JM
3970 return retval;
3971}
c906108c 3972
4e73f23d
RM
3973/* Perform a partial transfer to/from the specified object. For
3974 memory transfers, fall back to the old memory xfer functions. */
3975
9b409511 3976static enum target_xfer_status
4e73f23d 3977procfs_xfer_partial (struct target_ops *ops, enum target_object object,
0b62613e 3978 const char *annex, gdb_byte *readbuf,
9b409511
YQ
3979 const gdb_byte *writebuf, ULONGEST offset, ULONGEST len,
3980 ULONGEST *xfered_len)
4e73f23d
RM
3981{
3982 switch (object)
3983 {
3984 case TARGET_OBJECT_MEMORY:
3985 if (readbuf)
0b62613e
PA
3986 return (*ops->deprecated_xfer_memory) (offset, readbuf,
3987 len, 0/*read*/, NULL, ops);
4e73f23d 3988 if (writebuf)
0b62613e
PA
3989 return (*ops->deprecated_xfer_memory) (offset, (gdb_byte *) writebuf,
3990 len, 1/*write*/, NULL, ops);
2ed4b548 3991 return TARGET_XFER_E_IO;
4e73f23d
RM
3992
3993#ifdef NEW_PROC_API
3994 case TARGET_OBJECT_AUXV:
9f2982ff 3995 return memory_xfer_auxv (ops, object, annex, readbuf, writebuf,
9b409511 3996 offset, len, xfered_len);
4e73f23d
RM
3997#endif
3998
3999 default:
4000 if (ops->beneath != NULL)
4001 return ops->beneath->to_xfer_partial (ops->beneath, object, annex,
9b409511
YQ
4002 readbuf, writebuf, offset, len,
4003 xfered_len);
2ed4b548 4004 return TARGET_XFER_E_IO;
4e73f23d
RM
4005 }
4006}
4007
4008
d0849a9a
KB
4009/* Transfer LEN bytes between GDB address MYADDR and target address
4010 MEMADDR. If DOWRITE is non-zero, transfer them to the target,
4011 otherwise transfer them from the target. TARGET is unused.
4012
4013 The return value is 0 if an error occurred or no bytes were
4014 transferred. Otherwise, it will be a positive value which
4015 indicates the number of bytes transferred between gdb and the
4016 target. (Note that the interface also makes provisions for
0df8b418 4017 negative values, but this capability isn't implemented here.) */
d0849a9a 4018
c3f6f71d 4019static int
0b62613e 4020procfs_xfer_memory (CORE_ADDR memaddr, gdb_byte *myaddr, int len, int dowrite,
37de36c6 4021 struct mem_attrib *attrib, struct target_ops *target)
c3f6f71d
JM
4022{
4023 procinfo *pi;
4024 int nbytes = 0;
c906108c 4025
0df8b418 4026 /* Find procinfo for main process. */
dfd4cc63 4027 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
c3f6f71d
JM
4028 if (pi->as_fd == 0 &&
4029 open_procinfo_files (pi, FD_AS) == 0)
c906108c 4030 {
c3f6f71d
JM
4031 proc_warn (pi, "xfer_memory, open_proc_files", __LINE__);
4032 return 0;
c906108c 4033 }
c906108c 4034
c3f6f71d 4035 if (lseek (pi->as_fd, (off_t) memaddr, SEEK_SET) == (off_t) memaddr)
c906108c 4036 {
c3f6f71d 4037 if (dowrite)
c906108c 4038 {
c3f6f71d 4039#ifdef NEW_PROC_API
cce7e648 4040 PROCFS_NOTE ("write memory:\n");
c906108c 4041#else
cce7e648 4042 PROCFS_NOTE ("write memory:\n");
c906108c 4043#endif
c3f6f71d 4044 nbytes = write (pi->as_fd, myaddr, len);
c906108c 4045 }
c3f6f71d 4046 else
c906108c 4047 {
cce7e648 4048 PROCFS_NOTE ("read memory:\n");
c3f6f71d 4049 nbytes = read (pi->as_fd, myaddr, len);
c906108c 4050 }
c3f6f71d 4051 if (nbytes < 0)
c906108c 4052 {
c3f6f71d 4053 nbytes = 0;
c906108c 4054 }
c906108c 4055 }
c3f6f71d 4056 return nbytes;
c906108c
SS
4057}
4058
77382aee
PA
4059/* Called by target_resume before making child runnable. Mark cached
4060 registers and status's invalid. If there are "dirty" caches that
4061 need to be written back to the child process, do that.
c906108c 4062
77382aee
PA
4063 File descriptors are also cached. As they are a limited resource,
4064 we cannot hold onto them indefinitely. However, as they are
4065 expensive to open, we don't want to throw them away
4066 indescriminately either. As a compromise, we will keep the file
4067 descriptors for the parent process, but discard any file
4068 descriptors we may have accumulated for the threads.
4069
4070 As this function is called by iterate_over_threads, it always
4071 returns zero (so that iterate_over_threads will keep
4072 iterating). */
c3f6f71d
JM
4073
4074static int
fba45db2 4075invalidate_cache (procinfo *parent, procinfo *pi, void *ptr)
c906108c 4076{
77382aee
PA
4077 /* About to run the child; invalidate caches and do any other
4078 cleanup. */
c906108c 4079
c3f6f71d
JM
4080#if 0
4081 if (pi->gregs_dirty)
4082 if (parent == NULL ||
4083 proc_get_current_thread (parent) != pi->tid)
4084 if (!proc_set_gregs (pi)) /* flush gregs cache */
4085 proc_warn (pi, "target_resume, set_gregs",
4086 __LINE__);
f5656ead 4087 if (gdbarch_fp0_regnum (target_gdbarch ()) >= 0)
60054393
MS
4088 if (pi->fpregs_dirty)
4089 if (parent == NULL ||
4090 proc_get_current_thread (parent) != pi->tid)
4091 if (!proc_set_fpregs (pi)) /* flush fpregs cache */
19958708 4092 proc_warn (pi, "target_resume, set_fpregs",
60054393 4093 __LINE__);
c906108c 4094#endif
c906108c 4095
c3f6f71d 4096 if (parent != NULL)
c906108c 4097 {
c3f6f71d 4098 /* The presence of a parent indicates that this is an LWP.
19958708 4099 Close any file descriptors that it might have open.
c3f6f71d
JM
4100 We don't do this to the master (parent) procinfo. */
4101
4102 close_procinfo_files (pi);
c906108c 4103 }
c3f6f71d
JM
4104 pi->gregs_valid = 0;
4105 pi->fpregs_valid = 0;
4106#if 0
4107 pi->gregs_dirty = 0;
4108 pi->fpregs_dirty = 0;
c906108c 4109#endif
c3f6f71d
JM
4110 pi->status_valid = 0;
4111 pi->threads_valid = 0;
c906108c 4112
c3f6f71d 4113 return 0;
c906108c
SS
4114}
4115
0fda6bd2 4116#if 0
77382aee
PA
4117/* A callback function for iterate_over_threads. Find the
4118 asynchronous signal thread, and make it runnable. See if that
4119 helps matters any. */
c906108c 4120
c3f6f71d 4121static int
fba45db2 4122make_signal_thread_runnable (procinfo *process, procinfo *pi, void *ptr)
c906108c 4123{
c3f6f71d
JM
4124#ifdef PR_ASLWP
4125 if (proc_flags (pi) & PR_ASLWP)
c906108c 4126 {
c3f6f71d
JM
4127 if (!proc_run_process (pi, 0, -1))
4128 proc_error (pi, "make_signal_thread_runnable", __LINE__);
4129 return 1;
c906108c 4130 }
c906108c 4131#endif
c3f6f71d 4132 return 0;
c906108c 4133}
0fda6bd2 4134#endif
c906108c 4135
77382aee
PA
4136/* Make the child process runnable. Normally we will then call
4137 procfs_wait and wait for it to stop again (unless gdb is async).
4138
4139 If STEP is true, then arrange for the child to stop again after
4140 executing a single instruction. If SIGNO is zero, then cancel any
4141 pending signal; if non-zero, then arrange for the indicated signal
4142 to be delivered to the child when it runs. If PID is -1, then
4143 allow any child thread to run; if non-zero, then allow only the
4144 indicated thread to run. (not implemented yet). */
c906108c
SS
4145
4146static void
28439f5e 4147procfs_resume (struct target_ops *ops,
2ea28649 4148 ptid_t ptid, int step, enum gdb_signal signo)
c906108c 4149{
c3f6f71d
JM
4150 procinfo *pi, *thread;
4151 int native_signo;
4152
19958708 4153 /* 2.1:
c3f6f71d 4154 prrun.prflags |= PRSVADDR;
19958708 4155 prrun.pr_vaddr = $PC; set resume address
c3f6f71d 4156 prrun.prflags |= PRSTRACE; trace signals in pr_trace (all)
19958708 4157 prrun.prflags |= PRSFAULT; trace faults in pr_fault (all but PAGE)
c3f6f71d
JM
4158 prrun.prflags |= PRCFAULT; clear current fault.
4159
4160 PRSTRACE and PRSFAULT can be done by other means
77382aee 4161 (proc_trace_signals, proc_trace_faults)
c3f6f71d
JM
4162 PRSVADDR is unnecessary.
4163 PRCFAULT may be replaced by a PIOCCFAULT call (proc_clear_current_fault)
4164 This basically leaves PRSTEP and PRCSIG.
4165 PRCSIG is like PIOCSSIG (proc_clear_current_signal).
4166 So basically PR_STEP is the sole argument that must be passed
77382aee 4167 to proc_run_process (for use in the prrun struct by ioctl). */
c3f6f71d 4168
0df8b418 4169 /* Find procinfo for main process. */
dfd4cc63 4170 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
c3f6f71d 4171
77382aee 4172 /* First cut: ignore pid argument. */
c3f6f71d 4173 errno = 0;
c906108c 4174
c3f6f71d
JM
4175 /* Convert signal to host numbering. */
4176 if (signo == 0 ||
a493e3e2 4177 (signo == GDB_SIGNAL_STOP && pi->ignore_next_sigstop))
c3f6f71d
JM
4178 native_signo = 0;
4179 else
2ea28649 4180 native_signo = gdb_signal_to_host (signo);
c906108c 4181
c3f6f71d 4182 pi->ignore_next_sigstop = 0;
c906108c 4183
77382aee
PA
4184 /* Running the process voids all cached registers and status. */
4185 /* Void the threads' caches first. */
19958708 4186 proc_iterate_over_threads (pi, invalidate_cache, NULL);
c3f6f71d
JM
4187 /* Void the process procinfo's caches. */
4188 invalidate_cache (NULL, pi, NULL);
c906108c 4189
dfd4cc63 4190 if (ptid_get_pid (ptid) != -1)
c906108c 4191 {
77382aee
PA
4192 /* Resume a specific thread, presumably suppressing the
4193 others. */
dfd4cc63 4194 thread = find_procinfo (ptid_get_pid (ptid), ptid_get_lwp (ptid));
7de45904 4195 if (thread != NULL)
c906108c 4196 {
c3f6f71d
JM
4197 if (thread->tid != 0)
4198 {
77382aee
PA
4199 /* We're to resume a specific thread, and not the
4200 others. Set the child process's PR_ASYNC flag. */
c3f6f71d
JM
4201#ifdef PR_ASYNC
4202 if (!proc_set_async (pi))
4203 proc_error (pi, "target_resume, set_async", __LINE__);
4204#endif
4205#if 0
19958708 4206 proc_iterate_over_threads (pi,
c3f6f71d
JM
4207 make_signal_thread_runnable,
4208 NULL);
4209#endif
0df8b418
MS
4210 pi = thread; /* Substitute the thread's procinfo
4211 for run. */
c3f6f71d 4212 }
c906108c
SS
4213 }
4214 }
c906108c 4215
c3f6f71d 4216 if (!proc_run_process (pi, step, native_signo))
c906108c 4217 {
c3f6f71d 4218 if (errno == EBUSY)
77382aee
PA
4219 warning (_("resume: target already running. "
4220 "Pretend to resume, and hope for the best!"));
c3f6f71d
JM
4221 else
4222 proc_error (pi, "target_resume", __LINE__);
c906108c 4223 }
c3f6f71d 4224}
c906108c 4225
77382aee 4226/* Set up to trace signals in the child process. */
c906108c 4227
c3f6f71d 4228static void
2455069d 4229procfs_pass_signals (int numsigs, unsigned char *pass_signals)
c3f6f71d 4230{
37de36c6 4231 gdb_sigset_t signals;
dfd4cc63 4232 procinfo *pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
2455069d 4233 int signo;
c906108c 4234
2455069d
UW
4235 prfillset (&signals);
4236
4237 for (signo = 0; signo < NSIG; signo++)
4238 {
2ea28649 4239 int target_signo = gdb_signal_from_host (signo);
2455069d
UW
4240 if (target_signo < numsigs && pass_signals[target_signo])
4241 gdb_prdelset (&signals, signo);
4242 }
4243
4244 if (!proc_set_traced_signals (pi, &signals))
4245 proc_error (pi, "pass_signals", __LINE__);
c3f6f71d 4246}
c906108c 4247
77382aee 4248/* Print status information about the child process. */
c906108c 4249
c3f6f71d 4250static void
fba45db2 4251procfs_files_info (struct target_ops *ignore)
c3f6f71d 4252{
181e7f93 4253 struct inferior *inf = current_inferior ();
f4a14ae6 4254
a3f17187 4255 printf_filtered (_("\tUsing the running image of %s %s via /proc.\n"),
181e7f93 4256 inf->attach_flag? "attached": "child",
39f77062 4257 target_pid_to_str (inferior_ptid));
c3f6f71d 4258}
c906108c 4259
77382aee
PA
4260/* Stop the child process asynchronously, as when the gdb user types
4261 control-c or presses a "stop" button. Works by sending
4262 kill(SIGINT) to the child's process group. */
c906108c 4263
c3f6f71d 4264static void
f9c72d52 4265procfs_stop (ptid_t ptid)
c3f6f71d 4266{
7e1789f5 4267 kill (-inferior_process_group (), SIGINT);
c906108c
SS
4268}
4269
77382aee
PA
4270/* Make it die. Wait for it to die. Clean up after it. Note: this
4271 should only be applied to the real process, not to an LWP, because
4272 of the check for parent-process. If we need this to work for an
4273 LWP, it needs some more logic. */
c906108c 4274
c3f6f71d 4275static void
fba45db2 4276unconditionally_kill_inferior (procinfo *pi)
c3f6f71d
JM
4277{
4278 int parent_pid;
c906108c 4279
c3f6f71d
JM
4280 parent_pid = proc_parent_pid (pi);
4281#ifdef PROCFS_NEED_CLEAR_CURSIG_FOR_KILL
0df8b418 4282 /* FIXME: use access functions. */
c3f6f71d
JM
4283 /* Alpha OSF/1-3.x procfs needs a clear of the current signal
4284 before the PIOCKILL, otherwise it might generate a corrupted core
4285 file for the inferior. */
4286 if (ioctl (pi->ctl_fd, PIOCSSIG, NULL) < 0)
4287 {
4288 printf_filtered ("unconditionally_kill: SSIG failed!\n");
4289 }
4290#endif
4291#ifdef PROCFS_NEED_PIOCSSIG_FOR_KILL
4292 /* Alpha OSF/1-2.x procfs needs a PIOCSSIG call with a SIGKILL signal
4293 to kill the inferior, otherwise it might remain stopped with a
4294 pending SIGKILL.
4295 We do not check the result of the PIOCSSIG, the inferior might have
4296 died already. */
4297 {
37de36c6 4298 gdb_siginfo_t newsiginfo;
c906108c 4299
c3f6f71d
JM
4300 memset ((char *) &newsiginfo, 0, sizeof (newsiginfo));
4301 newsiginfo.si_signo = SIGKILL;
4302 newsiginfo.si_code = 0;
4303 newsiginfo.si_errno = 0;
4304 newsiginfo.si_pid = getpid ();
4305 newsiginfo.si_uid = getuid ();
0df8b418 4306 /* FIXME: use proc_set_current_signal. */
c3f6f71d
JM
4307 ioctl (pi->ctl_fd, PIOCSSIG, &newsiginfo);
4308 }
4309#else /* PROCFS_NEED_PIOCSSIG_FOR_KILL */
4310 if (!proc_kill (pi, SIGKILL))
103b3ef5 4311 proc_error (pi, "unconditionally_kill, proc_kill", __LINE__);
c3f6f71d
JM
4312#endif /* PROCFS_NEED_PIOCSSIG_FOR_KILL */
4313 destroy_procinfo (pi);
c906108c 4314
c3f6f71d
JM
4315 /* If pi is GDB's child, wait for it to die. */
4316 if (parent_pid == getpid ())
19958708 4317 /* FIXME: should we use waitpid to make sure we get the right event?
c3f6f71d
JM
4318 Should we check the returned event? */
4319 {
0d06e24b 4320#if 0
c3f6f71d 4321 int status, ret;
c906108c 4322
c3f6f71d
JM
4323 ret = waitpid (pi->pid, &status, 0);
4324#else
4325 wait (NULL);
4326#endif
4327 }
4328}
c906108c 4329
77382aee
PA
4330/* We're done debugging it, and we want it to go away. Then we want
4331 GDB to forget all about it. */
c906108c 4332
19958708 4333static void
7d85a9c0 4334procfs_kill_inferior (struct target_ops *ops)
c906108c 4335{
39f77062 4336 if (!ptid_equal (inferior_ptid, null_ptid)) /* ? */
c3f6f71d 4337 {
0df8b418 4338 /* Find procinfo for main process. */
dfd4cc63 4339 procinfo *pi = find_procinfo (ptid_get_pid (inferior_ptid), 0);
c906108c 4340
c3f6f71d
JM
4341 if (pi)
4342 unconditionally_kill_inferior (pi);
4343 target_mourn_inferior ();
c906108c 4344 }
c3f6f71d
JM
4345}
4346
77382aee 4347/* Forget we ever debugged this thing! */
c906108c 4348
19958708 4349static void
136d6dae 4350procfs_mourn_inferior (struct target_ops *ops)
c3f6f71d
JM
4351{
4352 procinfo *pi;
c906108c 4353
39f77062 4354 if (!ptid_equal (inferior_ptid, null_ptid))
c3f6f71d 4355 {
0df8b418 4356 /* Find procinfo for main process. */
dfd4cc63 4357 pi = find_procinfo (ptid_get_pid (inferior_ptid), 0);
c3f6f71d
JM
4358 if (pi)
4359 destroy_procinfo (pi);
c906108c 4360 }
28439f5e 4361 unpush_target (ops);
8181d85f
DJ
4362
4363 if (dbx_link_bpt != NULL)
4364 {
f5656ead 4365 deprecated_remove_raw_breakpoint (target_gdbarch (), dbx_link_bpt);
8181d85f
DJ
4366 dbx_link_bpt_addr = 0;
4367 dbx_link_bpt = NULL;
4368 }
4369
c3f6f71d
JM
4370 generic_mourn_inferior ();
4371}
c906108c 4372
77382aee
PA
4373/* When GDB forks to create a runnable inferior process, this function
4374 is called on the parent side of the fork. It's job is to do
4375 whatever is necessary to make the child ready to be debugged, and
4376 then wait for the child to synchronize. */
c906108c 4377
19958708 4378static void
28439f5e 4379procfs_init_inferior (struct target_ops *ops, int pid)
c3f6f71d
JM
4380{
4381 procinfo *pi;
37de36c6 4382 gdb_sigset_t signals;
c3f6f71d 4383 int fail;
2689673f 4384 int lwpid;
c906108c 4385
c3f6f71d
JM
4386 /* This routine called on the parent side (GDB side)
4387 after GDB forks the inferior. */
28439f5e 4388 push_target (ops);
c906108c 4389
c3f6f71d 4390 if ((pi = create_procinfo (pid, 0)) == NULL)
9b20d036 4391 perror (_("procfs: out of memory in 'init_inferior'"));
c3f6f71d
JM
4392
4393 if (!open_procinfo_files (pi, FD_CTL))
4394 proc_error (pi, "init_inferior, open_proc_files", __LINE__);
4395
4396 /*
4397 xmalloc // done
4398 open_procinfo_files // done
4399 link list // done
4400 prfillset (trace)
4401 procfs_notice_signals
4402 prfillset (fault)
4403 prdelset (FLTPAGE)
4404 PIOCWSTOP
4405 PIOCSFAULT
4406 */
4407
77382aee 4408 /* If not stopped yet, wait for it to stop. */
c3f6f71d
JM
4409 if (!(proc_flags (pi) & PR_STOPPED) &&
4410 !(proc_wait_for_stop (pi)))
4411 dead_procinfo (pi, "init_inferior: wait_for_stop failed", KILL);
4412
4413 /* Save some of the /proc state to be restored if we detach. */
4414 /* FIXME: Why? In case another debugger was debugging it?
0df8b418 4415 We're it's parent, for Ghu's sake! */
c3f6f71d
JM
4416 if (!proc_get_traced_signals (pi, &pi->saved_sigset))
4417 proc_error (pi, "init_inferior, get_traced_signals", __LINE__);
4418 if (!proc_get_held_signals (pi, &pi->saved_sighold))
4419 proc_error (pi, "init_inferior, get_held_signals", __LINE__);
4420 if (!proc_get_traced_faults (pi, &pi->saved_fltset))
4421 proc_error (pi, "init_inferior, get_traced_faults", __LINE__);
37de36c6 4422 if (!proc_get_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d 4423 proc_error (pi, "init_inferior, get_traced_sysentry", __LINE__);
37de36c6 4424 if (!proc_get_traced_sysexit (pi, pi->saved_exitset))
c3f6f71d
JM
4425 proc_error (pi, "init_inferior, get_traced_sysexit", __LINE__);
4426
c3f6f71d
JM
4427 if ((fail = procfs_debug_inferior (pi)) != 0)
4428 proc_error (pi, "init_inferior (procfs_debug_inferior)", fail);
4429
0d06e24b
JM
4430 /* FIXME: logically, we should really be turning OFF run-on-last-close,
4431 and possibly even turning ON kill-on-last-close at this point. But
4432 I can't make that change without careful testing which I don't have
4433 time to do right now... */
c3f6f71d
JM
4434 /* Turn on run-on-last-close flag so that the child
4435 will die if GDB goes away for some reason. */
4436 if (!proc_set_run_on_last_close (pi))
4437 proc_error (pi, "init_inferior, set_RLC", __LINE__);
4438
2689673f
PA
4439 /* We now have have access to the lwpid of the main thread/lwp. */
4440 lwpid = proc_get_current_thread (pi);
4441
4442 /* Create a procinfo for the main lwp. */
4443 create_procinfo (pid, lwpid);
4444
4445 /* We already have a main thread registered in the thread table at
4446 this point, but it didn't have any lwp info yet. Notify the core
4447 about it. This changes inferior_ptid as well. */
4448 thread_change_ptid (pid_to_ptid (pid),
793e1c06 4449 ptid_build (pid, lwpid, 0));
c906108c 4450
c3f6f71d 4451 startup_inferior (START_INFERIOR_TRAPS_EXPECTED);
9185ddce
JB
4452
4453#ifdef SYS_syssgi
4454 /* On mips-irix, we need to stop the inferior early enough during
4455 the startup phase in order to be able to load the shared library
4456 symbols and insert the breakpoints that are located in these shared
4457 libraries. Stopping at the program entry point is not good enough
4458 because the -init code is executed before the execution reaches
4459 that point.
4460
4461 So what we need to do is to insert a breakpoint in the runtime
4462 loader (rld), more precisely in __dbx_link(). This procedure is
4463 called by rld once all shared libraries have been mapped, but before
0df8b418 4464 the -init code is executed. Unfortuantely, this is not straightforward,
9185ddce
JB
4465 as rld is not part of the executable we are running, and thus we need
4466 the inferior to run until rld itself has been mapped in memory.
77382aee 4467
9185ddce
JB
4468 For this, we trace all syssgi() syscall exit events. Each time
4469 we detect such an event, we iterate over each text memory maps,
4470 get its associated fd, and scan the symbol table for __dbx_link().
4471 When found, we know that rld has been mapped, and that we can insert
4472 the breakpoint at the symbol address. Once the dbx_link() breakpoint
4473 has been inserted, the syssgi() notifications are no longer necessary,
4474 so they should be canceled. */
4475 proc_trace_syscalls_1 (pi, SYS_syssgi, PR_SYSEXIT, FLAG_SET, 0);
9185ddce 4476#endif
c3f6f71d 4477}
c906108c 4478
77382aee
PA
4479/* When GDB forks to create a new process, this function is called on
4480 the child side of the fork before GDB exec's the user program. Its
4481 job is to make the child minimally debuggable, so that the parent
4482 GDB process can connect to the child and take over. This function
4483 should do only the minimum to make that possible, and to
4484 synchronize with the parent process. The parent process should
4485 take care of the details. */
c3f6f71d
JM
4486
4487static void
fba45db2 4488procfs_set_exec_trap (void)
c3f6f71d
JM
4489{
4490 /* This routine called on the child side (inferior side)
4491 after GDB forks the inferior. It must use only local variables,
4492 because it may be sharing data space with its parent. */
c906108c 4493
c3f6f71d 4494 procinfo *pi;
37de36c6 4495 sysset_t *exitset;
c906108c 4496
c3f6f71d 4497 if ((pi = create_procinfo (getpid (), 0)) == NULL)
e2e0b3e5 4498 perror_with_name (_("procfs: create_procinfo failed in child."));
c906108c 4499
c3f6f71d
JM
4500 if (open_procinfo_files (pi, FD_CTL) == 0)
4501 {
4502 proc_warn (pi, "set_exec_trap, open_proc_files", __LINE__);
4503 gdb_flush (gdb_stderr);
77382aee
PA
4504 /* No need to call "dead_procinfo", because we're going to
4505 exit. */
c3f6f71d
JM
4506 _exit (127);
4507 }
c906108c 4508
c3f6f71d
JM
4509#ifdef PRFS_STOPEXEC /* defined on OSF */
4510 /* OSF method for tracing exec syscalls. Quoting:
4511 Under Alpha OSF/1 we have to use a PIOCSSPCACT ioctl to trace
4512 exits from exec system calls because of the user level loader. */
77382aee 4513 /* FIXME: make nice and maybe move into an access function. */
c3f6f71d
JM
4514 {
4515 int prfs_flags;
c906108c 4516
c3f6f71d
JM
4517 if (ioctl (pi->ctl_fd, PIOCGSPCACT, &prfs_flags) < 0)
4518 {
4519 proc_warn (pi, "set_exec_trap (PIOCGSPCACT)", __LINE__);
4520 gdb_flush (gdb_stderr);
4521 _exit (127);
4522 }
4523 prfs_flags |= PRFS_STOPEXEC;
c906108c 4524
c3f6f71d
JM
4525 if (ioctl (pi->ctl_fd, PIOCSSPCACT, &prfs_flags) < 0)
4526 {
4527 proc_warn (pi, "set_exec_trap (PIOCSSPCACT)", __LINE__);
4528 gdb_flush (gdb_stderr);
4529 _exit (127);
4530 }
4531 }
4532#else /* not PRFS_STOPEXEC */
77382aee 4533 /* Everyone else's (except OSF) method for tracing exec syscalls. */
c3f6f71d
JM
4534 /* GW: Rationale...
4535 Not all systems with /proc have all the exec* syscalls with the same
4536 names. On the SGI, for example, there is no SYS_exec, but there
77382aee 4537 *is* a SYS_execv. So, we try to account for that. */
c906108c 4538
37de36c6
KB
4539 exitset = sysset_t_alloc (pi);
4540 gdb_premptysysset (exitset);
c3f6f71d 4541#ifdef SYS_exec
37de36c6 4542 gdb_praddsysset (exitset, SYS_exec);
c3f6f71d
JM
4543#endif
4544#ifdef SYS_execve
37de36c6 4545 gdb_praddsysset (exitset, SYS_execve);
c3f6f71d
JM
4546#endif
4547#ifdef SYS_execv
37de36c6 4548 gdb_praddsysset (exitset, SYS_execv);
c906108c 4549#endif
37de36c6
KB
4550#ifdef DYNAMIC_SYSCALLS
4551 {
4552 int callnum = find_syscall (pi, "execve");
4553
4554 if (callnum >= 0)
4555 gdb_praddsysset (exitset, callnum);
c906108c 4556
37de36c6
KB
4557 callnum = find_syscall (pi, "ra_execve");
4558 if (callnum >= 0)
4559 gdb_praddsysset (exitset, callnum);
4560 }
4561#endif /* DYNAMIC_SYSCALLS */
4562
4563 if (!proc_set_traced_sysexit (pi, exitset))
c906108c 4564 {
c3f6f71d
JM
4565 proc_warn (pi, "set_exec_trap, set_traced_sysexit", __LINE__);
4566 gdb_flush (gdb_stderr);
4567 _exit (127);
c906108c 4568 }
c3f6f71d
JM
4569#endif /* PRFS_STOPEXEC */
4570
0df8b418 4571 /* FIXME: should this be done in the parent instead? */
c3f6f71d
JM
4572 /* Turn off inherit on fork flag so that all grand-children
4573 of gdb start with tracing flags cleared. */
4574 if (!proc_unset_inherit_on_fork (pi))
4575 proc_warn (pi, "set_exec_trap, unset_inherit", __LINE__);
4576
4577 /* Turn off run on last close flag, so that the child process
4578 cannot run away just because we close our handle on it.
4579 We want it to wait for the parent to attach. */
4580 if (!proc_unset_run_on_last_close (pi))
4581 proc_warn (pi, "set_exec_trap, unset_RLC", __LINE__);
4582
19958708 4583 /* FIXME: No need to destroy the procinfo --
0df8b418 4584 we have our own address space, and we're about to do an exec! */
c3f6f71d 4585 /*destroy_procinfo (pi);*/
c906108c 4586}
c906108c 4587
77382aee
PA
4588/* This function is called BEFORE gdb forks the inferior process. Its
4589 only real responsibility is to set things up for the fork, and tell
4590 GDB which two functions to call after the fork (one for the parent,
4591 and one for the child).
4592
4593 This function does a complicated search for a unix shell program,
4594 which it then uses to parse arguments and environment variables to
4595 be sent to the child. I wonder whether this code could not be
4596 abstracted out and shared with other unix targets such as
4597 inf-ptrace? */
c906108c
SS
4598
4599static void
136d6dae
VP
4600procfs_create_inferior (struct target_ops *ops, char *exec_file,
4601 char *allargs, char **env, int from_tty)
c906108c
SS
4602{
4603 char *shell_file = getenv ("SHELL");
4604 char *tryname;
28439f5e
PA
4605 int pid;
4606
c906108c
SS
4607 if (shell_file != NULL && strchr (shell_file, '/') == NULL)
4608 {
4609
4610 /* We will be looking down the PATH to find shell_file. If we
c3f6f71d
JM
4611 just do this the normal way (via execlp, which operates by
4612 attempting an exec for each element of the PATH until it
4613 finds one which succeeds), then there will be an exec for
4614 each failed attempt, each of which will cause a PR_SYSEXIT
4615 stop, and we won't know how to distinguish the PR_SYSEXIT's
4616 for these failed execs with the ones for successful execs
4617 (whether the exec has succeeded is stored at that time in the
4618 carry bit or some such architecture-specific and
4619 non-ABI-specified place).
4620
4621 So I can't think of anything better than to search the PATH
4622 now. This has several disadvantages: (1) There is a race
4623 condition; if we find a file now and it is deleted before we
4624 exec it, we lose, even if the deletion leaves a valid file
4625 further down in the PATH, (2) there is no way to know exactly
4626 what an executable (in the sense of "capable of being
4627 exec'd") file is. Using access() loses because it may lose
4628 if the caller is the superuser; failing to use it loses if
4629 there are ACLs or some such. */
c906108c
SS
4630
4631 char *p;
4632 char *p1;
4633 /* FIXME-maybe: might want "set path" command so user can change what
c3f6f71d 4634 path is used from within GDB. */
c906108c
SS
4635 char *path = getenv ("PATH");
4636 int len;
4637 struct stat statbuf;
4638
4639 if (path == NULL)
4640 path = "/bin:/usr/bin";
4641
4642 tryname = alloca (strlen (path) + strlen (shell_file) + 2);
c3f6f71d 4643 for (p = path; p != NULL; p = p1 ? p1 + 1: NULL)
c906108c
SS
4644 {
4645 p1 = strchr (p, ':');
4646 if (p1 != NULL)
4647 len = p1 - p;
4648 else
4649 len = strlen (p);
4650 strncpy (tryname, p, len);
4651 tryname[len] = '\0';
4652 strcat (tryname, "/");
4653 strcat (tryname, shell_file);
4654 if (access (tryname, X_OK) < 0)
4655 continue;
4656 if (stat (tryname, &statbuf) < 0)
4657 continue;
4658 if (!S_ISREG (statbuf.st_mode))
4659 /* We certainly need to reject directories. I'm not quite
4660 as sure about FIFOs, sockets, etc., but I kind of doubt
4661 that people want to exec() these things. */
4662 continue;
4663 break;
4664 }
4665 if (p == NULL)
4666 /* Not found. This must be an error rather than merely passing
4667 the file to execlp(), because execlp() would try all the
4668 exec()s, causing GDB to get confused. */
8a3fe4f8 4669 error (_("procfs:%d -- Can't find shell %s in PATH"),
c3f6f71d 4670 __LINE__, shell_file);
c906108c
SS
4671
4672 shell_file = tryname;
4673 }
4674
28439f5e 4675 pid = fork_inferior (exec_file, allargs, env, procfs_set_exec_trap,
e69860f1 4676 NULL, NULL, shell_file, NULL);
28439f5e
PA
4677
4678 procfs_init_inferior (ops, pid);
27087a3d
JB
4679}
4680
4681/* An observer for the "inferior_created" event. */
c906108c 4682
27087a3d
JB
4683static void
4684procfs_inferior_created (struct target_ops *ops, int from_tty)
4685{
9185ddce 4686#ifdef SYS_syssgi
77382aee 4687 /* Make sure to cancel the syssgi() syscall-exit notifications.
9185ddce
JB
4688 They should normally have been removed by now, but they may still
4689 be activated if the inferior doesn't use shared libraries, or if
4690 we didn't locate __dbx_link, or if we never stopped in __dbx_link.
27087a3d
JB
4691 See procfs_init_inferior() for more details.
4692
4693 Since these notifications are only ever enabled when we spawned
4694 the inferior ourselves, there is nothing to do when the inferior
4695 was created by attaching to an already running process, or when
4696 debugging a core file. */
4697 if (current_inferior ()->attach_flag || !target_can_run (&current_target))
4698 return;
4699
dfd4cc63
LM
4700 proc_trace_syscalls_1 (find_procinfo_or_die (ptid_get_pid (inferior_ptid),
4701 0), SYS_syssgi, PR_SYSEXIT, FLAG_RESET, 0);
9185ddce 4702#endif
c906108c
SS
4703}
4704
77382aee 4705/* Callback for find_new_threads. Calls "add_thread". */
c906108c 4706
c3f6f71d 4707static int
fba45db2 4708procfs_notice_thread (procinfo *pi, procinfo *thread, void *ptr)
c906108c 4709{
dfd4cc63 4710 ptid_t gdb_threadid = ptid_build (pi->pid, thread->tid, 0);
c906108c 4711
2689673f 4712 if (!in_thread_list (gdb_threadid) || is_exited (gdb_threadid))
c3f6f71d 4713 add_thread (gdb_threadid);
c906108c 4714
c3f6f71d
JM
4715 return 0;
4716}
4717
77382aee
PA
4718/* Query all the threads that the target knows about, and give them
4719 back to GDB to add to its list. */
c3f6f71d 4720
d3581e61 4721static void
28439f5e 4722procfs_find_new_threads (struct target_ops *ops)
c3f6f71d
JM
4723{
4724 procinfo *pi;
4725
0df8b418 4726 /* Find procinfo for main process. */
dfd4cc63 4727 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
c3f6f71d
JM
4728 proc_update_threads (pi);
4729 proc_iterate_over_threads (pi, procfs_notice_thread, NULL);
c906108c
SS
4730}
4731
77382aee
PA
4732/* Return true if the thread is still 'alive'. This guy doesn't
4733 really seem to be doing his job. Got to investigate how to tell
4734 when a thread is really gone. */
c906108c 4735
c906108c 4736static int
28439f5e 4737procfs_thread_alive (struct target_ops *ops, ptid_t ptid)
c906108c 4738{
c3f6f71d
JM
4739 int proc, thread;
4740 procinfo *pi;
c906108c 4741
dfd4cc63
LM
4742 proc = ptid_get_pid (ptid);
4743 thread = ptid_get_lwp (ptid);
0df8b418 4744 /* If I don't know it, it ain't alive! */
c3f6f71d
JM
4745 if ((pi = find_procinfo (proc, thread)) == NULL)
4746 return 0;
4747
4748 /* If I can't get its status, it ain't alive!
4749 What's more, I need to forget about it! */
4750 if (!proc_get_status (pi))
4751 {
4752 destroy_procinfo (pi);
4753 return 0;
4754 }
77382aee
PA
4755 /* I couldn't have got its status if it weren't alive, so it's
4756 alive. */
c3f6f71d 4757 return 1;
c906108c 4758}
c3f6f71d 4759
77382aee
PA
4760/* Convert PTID to a string. Returns the string in a static
4761 buffer. */
c3f6f71d 4762
d3581e61 4763static char *
117de6a9 4764procfs_pid_to_str (struct target_ops *ops, ptid_t ptid)
c3f6f71d
JM
4765{
4766 static char buf[80];
c3f6f71d 4767
dfd4cc63
LM
4768 if (ptid_get_lwp (ptid) == 0)
4769 sprintf (buf, "process %d", ptid_get_pid (ptid));
c3f6f71d 4770 else
dfd4cc63 4771 sprintf (buf, "LWP %ld", ptid_get_lwp (ptid));
5240ceac
MK
4772
4773 return buf;
c3f6f71d
JM
4774}
4775
77382aee 4776/* Insert a watchpoint. */
c3f6f71d 4777
a0911fd0 4778static int
39f77062 4779procfs_set_watchpoint (ptid_t ptid, CORE_ADDR addr, int len, int rwflag,
77382aee 4780 int after)
c906108c 4781{
37de36c6 4782#ifndef AIX5
c3f6f71d 4783 int pflags = 0;
19958708 4784 procinfo *pi;
c3f6f71d 4785
dfd4cc63
LM
4786 pi = find_procinfo_or_die (ptid_get_pid (ptid) == -1 ?
4787 ptid_get_pid (inferior_ptid) : ptid_get_pid (ptid),
4788 0);
c3f6f71d 4789
0df8b418
MS
4790 /* Translate from GDB's flags to /proc's. */
4791 if (len > 0) /* len == 0 means delete watchpoint. */
c906108c 4792 {
0df8b418 4793 switch (rwflag) { /* FIXME: need an enum! */
c3f6f71d
JM
4794 case hw_write: /* default watchpoint (write) */
4795 pflags = WRITE_WATCHFLAG;
4796 break;
4797 case hw_read: /* read watchpoint */
4798 pflags = READ_WATCHFLAG;
4799 break;
4800 case hw_access: /* access watchpoint */
4801 pflags = READ_WATCHFLAG | WRITE_WATCHFLAG;
4802 break;
4803 case hw_execute: /* execution HW breakpoint */
4804 pflags = EXEC_WATCHFLAG;
4805 break;
0df8b418 4806 default: /* Something weird. Return error. */
c906108c 4807 return -1;
c3f6f71d 4808 }
0df8b418 4809 if (after) /* Stop after r/w access is completed. */
c3f6f71d
JM
4810 pflags |= AFTER_WATCHFLAG;
4811 }
4812
4813 if (!proc_set_watchpoint (pi, addr, len, pflags))
4814 {
0df8b418 4815 if (errno == E2BIG) /* Typical error for no resources. */
c3f6f71d
JM
4816 return -1; /* fail */
4817 /* GDB may try to remove the same watchpoint twice.
4818 If a remove request returns no match, don't error. */
c906108c 4819 if (errno == ESRCH && len == 0)
c3f6f71d
JM
4820 return 0; /* ignore */
4821 proc_error (pi, "set_watchpoint", __LINE__);
c906108c 4822 }
37de36c6 4823#endif /* AIX5 */
c906108c
SS
4824 return 0;
4825}
4826
1e03ad20
KB
4827/* Return non-zero if we can set a hardware watchpoint of type TYPE. TYPE
4828 is one of bp_hardware_watchpoint, bp_read_watchpoint, bp_write_watchpoint,
4829 or bp_hardware_watchpoint. CNT is the number of watchpoints used so
4830 far.
19958708 4831
1e03ad20
KB
4832 Note: procfs_can_use_hw_breakpoint() is not yet used by all
4833 procfs.c targets due to the fact that some of them still define
d92524f1 4834 target_can_use_hardware_watchpoint. */
1e03ad20
KB
4835
4836static int
4837procfs_can_use_hw_breakpoint (int type, int cnt, int othertype)
4838{
1e03ad20
KB
4839 /* Due to the way that proc_set_watchpoint() is implemented, host
4840 and target pointers must be of the same size. If they are not,
4841 we can't use hardware watchpoints. This limitation is due to the
9a043c1d
AC
4842 fact that proc_set_watchpoint() calls
4843 procfs_address_to_host_pointer(); a close inspection of
4844 procfs_address_to_host_pointer will reveal that an internal error
4845 will be generated when the host and target pointer sizes are
4846 different. */
f5656ead 4847 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
f4a14ae6 4848
4e906f53 4849 if (sizeof (void *) != TYPE_LENGTH (ptr_type))
1e03ad20
KB
4850 return 0;
4851
4852 /* Other tests here??? */
4853
4854 return 1;
1e03ad20
KB
4855}
4856
77382aee
PA
4857/* Returns non-zero if process is stopped on a hardware watchpoint
4858 fault, else returns zero. */
c3f6f71d 4859
25513619
PA
4860static int
4861procfs_stopped_by_watchpoint (void)
c906108c 4862{
c3f6f71d 4863 procinfo *pi;
c906108c 4864
dfd4cc63 4865 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
aaeb7efa 4866
c3f6f71d 4867 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
c906108c 4868 {
c3f6f71d 4869 if (proc_why (pi) == PR_FAULTED)
19958708 4870 {
c906108c 4871#ifdef FLTWATCH
c3f6f71d
JM
4872 if (proc_what (pi) == FLTWATCH)
4873 return 1;
c906108c
SS
4874#endif
4875#ifdef FLTKWATCH
c3f6f71d
JM
4876 if (proc_what (pi) == FLTKWATCH)
4877 return 1;
c906108c 4878#endif
c3f6f71d 4879 }
c906108c
SS
4880 }
4881 return 0;
4882}
c906108c 4883
77382aee
PA
4884/* Returns 1 if the OS knows the position of the triggered watchpoint,
4885 and sets *ADDR to that address. Returns 0 if OS cannot report that
4886 address. This function is only called if
4887 procfs_stopped_by_watchpoint returned 1, thus no further checks are
4888 done. The function also assumes that ADDR is not NULL. */
bf701c2c
PM
4889
4890static int
4891procfs_stopped_data_address (struct target_ops *targ, CORE_ADDR *addr)
4892{
4893 procinfo *pi;
4894
dfd4cc63 4895 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
bf701c2c
PM
4896 return proc_watchpoint_address (pi, addr);
4897}
4898
25513619 4899static int
0cf6dd15
TJB
4900procfs_insert_watchpoint (CORE_ADDR addr, int len, int type,
4901 struct expression *cond)
25513619 4902{
d92524f1 4903 if (!target_have_steppable_watchpoint
f5656ead 4904 && !gdbarch_have_nonsteppable_watchpoint (target_gdbarch ()))
25513619
PA
4905 {
4906 /* When a hardware watchpoint fires off the PC will be left at
4907 the instruction following the one which caused the
4908 watchpoint. It will *NOT* be necessary for GDB to step over
4909 the watchpoint. */
4910 return procfs_set_watchpoint (inferior_ptid, addr, len, type, 1);
4911 }
4912 else
4913 {
4914 /* When a hardware watchpoint fires off the PC will be left at
4915 the instruction which caused the watchpoint. It will be
4916 necessary for GDB to step over the watchpoint. */
4917 return procfs_set_watchpoint (inferior_ptid, addr, len, type, 0);
4918 }
4919}
4920
4921static int
0cf6dd15
TJB
4922procfs_remove_watchpoint (CORE_ADDR addr, int len, int type,
4923 struct expression *cond)
25513619
PA
4924{
4925 return procfs_set_watchpoint (inferior_ptid, addr, 0, 0, 0);
4926}
4927
4928static int
4929procfs_region_ok_for_hw_watchpoint (CORE_ADDR addr, int len)
4930{
4931 /* The man page for proc(4) on Solaris 2.6 and up says that the
4932 system can support "thousands" of hardware watchpoints, but gives
4933 no method for finding out how many; It doesn't say anything about
4934 the allowed size for the watched area either. So we just tell
4935 GDB 'yes'. */
4936 return 1;
4937}
4938
4939void
4940procfs_use_watchpoints (struct target_ops *t)
4941{
4942 t->to_stopped_by_watchpoint = procfs_stopped_by_watchpoint;
4943 t->to_insert_watchpoint = procfs_insert_watchpoint;
4944 t->to_remove_watchpoint = procfs_remove_watchpoint;
4945 t->to_region_ok_for_hw_watchpoint = procfs_region_ok_for_hw_watchpoint;
d1a7880c 4946 t->to_can_use_hw_breakpoint = procfs_can_use_hw_breakpoint;
bf701c2c 4947 t->to_stopped_data_address = procfs_stopped_data_address;
25513619
PA
4948}
4949
77382aee
PA
4950/* Memory Mappings Functions: */
4951
4952/* Call a callback function once for each mapping, passing it the
4953 mapping, an optional secondary callback function, and some optional
4954 opaque data. Quit and return the first non-zero value returned
4955 from the callback.
4956
4957 PI is the procinfo struct for the process to be mapped. FUNC is
4958 the callback function to be called by this iterator. DATA is the
4959 optional opaque data to be passed to the callback function.
4960 CHILD_FUNC is the optional secondary function pointer to be passed
4961 to the child function. Returns the first non-zero return value
4962 from the callback function, or zero. */
831e682e
MS
4963
4964static int
b8edc417 4965iterate_over_mappings (procinfo *pi, find_memory_region_ftype child_func,
e9ef4f39 4966 void *data,
19958708 4967 int (*func) (struct prmap *map,
b8edc417 4968 find_memory_region_ftype child_func,
831e682e
MS
4969 void *data))
4970{
4971 char pathname[MAX_PROC_NAME_SIZE];
4972 struct prmap *prmaps;
4973 struct prmap *prmap;
4974 int funcstat;
4975 int map_fd;
4976 int nmap;
0a86f364 4977 struct cleanup *cleanups = make_cleanup (null_cleanup, NULL);
831e682e
MS
4978#ifdef NEW_PROC_API
4979 struct stat sbuf;
4980#endif
4981
19958708 4982 /* Get the number of mappings, allocate space,
831e682e
MS
4983 and read the mappings into prmaps. */
4984#ifdef NEW_PROC_API
0df8b418 4985 /* Open map fd. */
831e682e
MS
4986 sprintf (pathname, "/proc/%d/map", pi->pid);
4987 if ((map_fd = open (pathname, O_RDONLY)) < 0)
4988 proc_error (pi, "iterate_over_mappings (open)", __LINE__);
4989
0df8b418 4990 /* Make sure it gets closed again. */
831e682e
MS
4991 make_cleanup_close (map_fd);
4992
19958708 4993 /* Use stat to determine the file size, and compute
831e682e
MS
4994 the number of prmap_t objects it contains. */
4995 if (fstat (map_fd, &sbuf) != 0)
4996 proc_error (pi, "iterate_over_mappings (fstat)", __LINE__);
4997
4998 nmap = sbuf.st_size / sizeof (prmap_t);
4999 prmaps = (struct prmap *) alloca ((nmap + 1) * sizeof (*prmaps));
5000 if (read (map_fd, (char *) prmaps, nmap * sizeof (*prmaps))
5001 != (nmap * sizeof (*prmaps)))
5002 proc_error (pi, "iterate_over_mappings (read)", __LINE__);
5003#else
5004 /* Use ioctl command PIOCNMAP to get number of mappings. */
5005 if (ioctl (pi->ctl_fd, PIOCNMAP, &nmap) != 0)
5006 proc_error (pi, "iterate_over_mappings (PIOCNMAP)", __LINE__);
5007
5008 prmaps = (struct prmap *) alloca ((nmap + 1) * sizeof (*prmaps));
5009 if (ioctl (pi->ctl_fd, PIOCMAP, prmaps) != 0)
5010 proc_error (pi, "iterate_over_mappings (PIOCMAP)", __LINE__);
5011#endif
5012
5013 for (prmap = prmaps; nmap > 0; prmap++, nmap--)
5014 if ((funcstat = (*func) (prmap, child_func, data)) != 0)
0a86f364
JB
5015 {
5016 do_cleanups (cleanups);
5017 return funcstat;
5018 }
831e682e 5019
0a86f364 5020 do_cleanups (cleanups);
831e682e
MS
5021 return 0;
5022}
5023
77382aee 5024/* Implements the to_find_memory_regions method. Calls an external
b8edc417 5025 function for each memory region.
77382aee 5026 Returns the integer value returned by the callback. */
be4d1333
MS
5027
5028static int
19958708 5029find_memory_regions_callback (struct prmap *map,
b8edc417 5030 find_memory_region_ftype func, void *data)
be4d1333 5031{
bf75638e 5032 return (*func) ((CORE_ADDR) map->pr_vaddr,
19958708 5033 map->pr_size,
be4d1333
MS
5034 (map->pr_mflags & MA_READ) != 0,
5035 (map->pr_mflags & MA_WRITE) != 0,
19958708 5036 (map->pr_mflags & MA_EXEC) != 0,
4f69f4c2 5037 1, /* MODIFIED is unknown, pass it as true. */
be4d1333
MS
5038 data);
5039}
5040
77382aee
PA
5041/* External interface. Calls a callback function once for each
5042 mapped memory region in the child process, passing as arguments:
5043
5044 CORE_ADDR virtual_address,
5045 unsigned long size,
5046 int read, TRUE if region is readable by the child
5047 int write, TRUE if region is writable by the child
5048 int execute TRUE if region is executable by the child.
5049
5050 Stops iterating and returns the first non-zero value returned by
5051 the callback. */
be4d1333
MS
5052
5053static int
b8edc417 5054proc_find_memory_regions (find_memory_region_ftype func, void *data)
be4d1333 5055{
dfd4cc63 5056 procinfo *pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
be4d1333 5057
19958708 5058 return iterate_over_mappings (pi, func, data,
be4d1333
MS
5059 find_memory_regions_callback);
5060}
5061
77382aee 5062/* Returns an ascii representation of a memory mapping's flags. */
c3f6f71d 5063
388faa48 5064static char *
5ae5f592 5065mappingflags (long flags)
388faa48
MS
5066{
5067 static char asciiflags[8];
5068
5069 strcpy (asciiflags, "-------");
5070#if defined (MA_PHYS)
5071 if (flags & MA_PHYS)
5072 asciiflags[0] = 'd';
5073#endif
5074 if (flags & MA_STACK)
5075 asciiflags[1] = 's';
5076 if (flags & MA_BREAK)
5077 asciiflags[2] = 'b';
5078 if (flags & MA_SHARED)
5079 asciiflags[3] = 's';
5080 if (flags & MA_READ)
5081 asciiflags[4] = 'r';
5082 if (flags & MA_WRITE)
5083 asciiflags[5] = 'w';
5084 if (flags & MA_EXEC)
5085 asciiflags[6] = 'x';
5086 return (asciiflags);
5087}
5088
77382aee
PA
5089/* Callback function, does the actual work for 'info proc
5090 mappings'. */
831e682e 5091
831e682e 5092static int
b8edc417 5093info_mappings_callback (struct prmap *map, find_memory_region_ftype ignore,
e9ef4f39 5094 void *unused)
831e682e 5095{
0b62613e 5096 unsigned int pr_off;
831e682e 5097
831e682e 5098#ifdef PCAGENT /* Horrible hack: only defined on Solaris 2.6+ */
0b62613e 5099 pr_off = (unsigned int) map->pr_offset;
831e682e 5100#else
0b62613e 5101 pr_off = map->pr_off;
831e682e 5102#endif
0b62613e 5103
f5656ead 5104 if (gdbarch_addr_bit (target_gdbarch ()) == 32)
f6a96b83 5105 printf_filtered ("\t%#10lx %#10lx %#10lx %#10x %7s\n",
0b62613e
PA
5106 (unsigned long) map->pr_vaddr,
5107 (unsigned long) map->pr_vaddr + map->pr_size - 1,
f6a96b83 5108 (unsigned long) map->pr_size,
0b62613e
PA
5109 pr_off,
5110 mappingflags (map->pr_mflags));
5111 else
f6a96b83 5112 printf_filtered (" %#18lx %#18lx %#10lx %#10x %7s\n",
0b62613e
PA
5113 (unsigned long) map->pr_vaddr,
5114 (unsigned long) map->pr_vaddr + map->pr_size - 1,
f6a96b83 5115 (unsigned long) map->pr_size,
0b62613e
PA
5116 pr_off,
5117 mappingflags (map->pr_mflags));
831e682e
MS
5118
5119 return 0;
5120}
5121
77382aee 5122/* Implement the "info proc mappings" subcommand. */
388faa48
MS
5123
5124static void
5125info_proc_mappings (procinfo *pi, int summary)
5126{
388faa48 5127 if (summary)
0df8b418 5128 return; /* No output for summary mode. */
388faa48 5129
a3f17187 5130 printf_filtered (_("Mapped address spaces:\n\n"));
f5656ead 5131 if (gdbarch_ptr_bit (target_gdbarch ()) == 32)
0b62613e
PA
5132 printf_filtered ("\t%10s %10s %10s %10s %7s\n",
5133 "Start Addr",
5134 " End Addr",
5135 " Size",
5136 " Offset",
5137 "Flags");
5138 else
5139 printf_filtered (" %18s %18s %10s %10s %7s\n",
5140 "Start Addr",
5141 " End Addr",
5142 " Size",
5143 " Offset",
5144 "Flags");
388faa48 5145
831e682e 5146 iterate_over_mappings (pi, NULL, NULL, info_mappings_callback);
388faa48
MS
5147 printf_filtered ("\n");
5148}
5149
77382aee 5150/* Implement the "info proc" command. */
c3f6f71d
JM
5151
5152static void
145b16a9
UW
5153procfs_info_proc (struct target_ops *ops, char *args,
5154 enum info_proc_what what)
c906108c 5155{
c3f6f71d 5156 struct cleanup *old_chain;
388faa48
MS
5157 procinfo *process = NULL;
5158 procinfo *thread = NULL;
5159 char **argv = NULL;
5160 char *tmp = NULL;
5161 int pid = 0;
5162 int tid = 0;
5163 int mappings = 0;
c906108c 5164
145b16a9
UW
5165 switch (what)
5166 {
5167 case IP_MINIMAL:
5168 break;
5169
5170 case IP_MAPPINGS:
5171 case IP_ALL:
5172 mappings = 1;
5173 break;
5174
5175 default:
5176 error (_("Not supported on this target."));
5177 }
5178
c3f6f71d
JM
5179 old_chain = make_cleanup (null_cleanup, 0);
5180 if (args)
0fda6bd2 5181 {
d1a41061
PP
5182 argv = gdb_buildargv (args);
5183 make_cleanup_freeargv (argv);
0fda6bd2 5184 }
c3f6f71d
JM
5185 while (argv != NULL && *argv != NULL)
5186 {
5187 if (isdigit (argv[0][0]))
5188 {
5189 pid = strtoul (argv[0], &tmp, 10);
5190 if (*tmp == '/')
5191 tid = strtoul (++tmp, NULL, 10);
5192 }
5193 else if (argv[0][0] == '/')
5194 {
5195 tid = strtoul (argv[0] + 1, NULL, 10);
5196 }
c3f6f71d
JM
5197 argv++;
5198 }
5199 if (pid == 0)
dfd4cc63 5200 pid = ptid_get_pid (inferior_ptid);
c3f6f71d 5201 if (pid == 0)
8a3fe4f8 5202 error (_("No current process: you must name one."));
c3f6f71d 5203 else
c906108c 5204 {
c3f6f71d 5205 /* Have pid, will travel.
0df8b418 5206 First see if it's a process we're already debugging. */
c3f6f71d
JM
5207 process = find_procinfo (pid, 0);
5208 if (process == NULL)
5209 {
19958708 5210 /* No. So open a procinfo for it, but
c3f6f71d
JM
5211 remember to close it again when finished. */
5212 process = create_procinfo (pid, 0);
004527cb 5213 make_cleanup (do_destroy_procinfo_cleanup, process);
c3f6f71d
JM
5214 if (!open_procinfo_files (process, FD_CTL))
5215 proc_error (process, "info proc, open_procinfo_files", __LINE__);
5216 }
c906108c 5217 }
c3f6f71d
JM
5218 if (tid != 0)
5219 thread = create_procinfo (pid, tid);
5220
5221 if (process)
5222 {
a3f17187 5223 printf_filtered (_("process %d flags:\n"), process->pid);
c3f6f71d
JM
5224 proc_prettyprint_flags (proc_flags (process), 1);
5225 if (proc_flags (process) & (PR_STOPPED | PR_ISTOP))
5226 proc_prettyprint_why (proc_why (process), proc_what (process), 1);
5227 if (proc_get_nthreads (process) > 1)
19958708 5228 printf_filtered ("Process has %d threads.\n",
c3f6f71d
JM
5229 proc_get_nthreads (process));
5230 }
5231 if (thread)
5232 {
a3f17187 5233 printf_filtered (_("thread %d flags:\n"), thread->tid);
c3f6f71d
JM
5234 proc_prettyprint_flags (proc_flags (thread), 1);
5235 if (proc_flags (thread) & (PR_STOPPED | PR_ISTOP))
5236 proc_prettyprint_why (proc_why (thread), proc_what (thread), 1);
5237 }
5238
388faa48
MS
5239 if (mappings)
5240 {
5241 info_proc_mappings (process, 0);
5242 }
5243
c3f6f71d 5244 do_cleanups (old_chain);
c906108c
SS
5245}
5246
9185ddce
JB
5247/* Modify the status of the system call identified by SYSCALLNUM in
5248 the set of syscalls that are currently traced/debugged.
5249
5250 If ENTRY_OR_EXIT is set to PR_SYSENTRY, then the entry syscalls set
0df8b418 5251 will be updated. Otherwise, the exit syscalls set will be updated.
9185ddce 5252
0df8b418 5253 If MODE is FLAG_SET, then traces will be enabled. Otherwise, they
9185ddce
JB
5254 will be disabled. */
5255
5256static void
5257proc_trace_syscalls_1 (procinfo *pi, int syscallnum, int entry_or_exit,
77382aee 5258 int mode, int from_tty)
9185ddce
JB
5259{
5260 sysset_t *sysset;
77382aee 5261
9185ddce
JB
5262 if (entry_or_exit == PR_SYSENTRY)
5263 sysset = proc_get_traced_sysentry (pi, NULL);
5264 else
5265 sysset = proc_get_traced_sysexit (pi, NULL);
5266
5267 if (sysset == NULL)
5268 proc_error (pi, "proc-trace, get_traced_sysset", __LINE__);
5269
5270 if (mode == FLAG_SET)
5271 gdb_praddsysset (sysset, syscallnum);
5272 else
5273 gdb_prdelsysset (sysset, syscallnum);
5274
5275 if (entry_or_exit == PR_SYSENTRY)
5276 {
5277 if (!proc_set_traced_sysentry (pi, sysset))
77382aee 5278 proc_error (pi, "proc-trace, set_traced_sysentry", __LINE__);
9185ddce
JB
5279 }
5280 else
5281 {
5282 if (!proc_set_traced_sysexit (pi, sysset))
77382aee 5283 proc_error (pi, "proc-trace, set_traced_sysexit", __LINE__);
9185ddce
JB
5284 }
5285}
5286
c3f6f71d 5287static void
fba45db2 5288proc_trace_syscalls (char *args, int from_tty, int entry_or_exit, int mode)
c906108c 5289{
c3f6f71d 5290 procinfo *pi;
c906108c 5291
dfd4cc63 5292 if (ptid_get_pid (inferior_ptid) <= 0)
8a3fe4f8 5293 error (_("you must be debugging a process to use this command."));
c906108c 5294
c3f6f71d 5295 if (args == NULL || args[0] == 0)
e2e0b3e5 5296 error_no_arg (_("system call to trace"));
c3f6f71d 5297
dfd4cc63 5298 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
c3f6f71d
JM
5299 if (isdigit (args[0]))
5300 {
9185ddce 5301 const int syscallnum = atoi (args);
c906108c 5302
9185ddce 5303 proc_trace_syscalls_1 (pi, syscallnum, entry_or_exit, mode, from_tty);
c3f6f71d
JM
5304 }
5305}
5306
19958708 5307static void
fba45db2 5308proc_trace_sysentry_cmd (char *args, int from_tty)
c906108c 5309{
c3f6f71d
JM
5310 proc_trace_syscalls (args, from_tty, PR_SYSENTRY, FLAG_SET);
5311}
c906108c 5312
19958708 5313static void
fba45db2 5314proc_trace_sysexit_cmd (char *args, int from_tty)
c3f6f71d
JM
5315{
5316 proc_trace_syscalls (args, from_tty, PR_SYSEXIT, FLAG_SET);
c906108c 5317}
c906108c 5318
19958708 5319static void
fba45db2 5320proc_untrace_sysentry_cmd (char *args, int from_tty)
c3f6f71d
JM
5321{
5322 proc_trace_syscalls (args, from_tty, PR_SYSENTRY, FLAG_RESET);
5323}
5324
19958708 5325static void
fba45db2 5326proc_untrace_sysexit_cmd (char *args, int from_tty)
c906108c 5327{
c3f6f71d
JM
5328 proc_trace_syscalls (args, from_tty, PR_SYSEXIT, FLAG_RESET);
5329}
c906108c 5330
c906108c 5331
a0911fd0
MR
5332/* Provide a prototype to silence -Wmissing-prototypes. */
5333extern void _initialize_procfs (void);
5334
c906108c 5335void
fba45db2 5336_initialize_procfs (void)
c906108c 5337{
27087a3d
JB
5338 observer_attach_inferior_created (procfs_inferior_created);
5339
19958708 5340 add_com ("proc-trace-entry", no_class, proc_trace_sysentry_cmd,
1bedd215 5341 _("Give a trace of entries into the syscall."));
19958708 5342 add_com ("proc-trace-exit", no_class, proc_trace_sysexit_cmd,
1bedd215 5343 _("Give a trace of exits from the syscall."));
19958708 5344 add_com ("proc-untrace-entry", no_class, proc_untrace_sysentry_cmd,
1bedd215 5345 _("Cancel a trace of entries into the syscall."));
19958708 5346 add_com ("proc-untrace-exit", no_class, proc_untrace_sysexit_cmd,
1bedd215 5347 _("Cancel a trace of exits from the syscall."));
c3f6f71d
JM
5348}
5349
5350/* =================== END, GDB "MODULE" =================== */
5351
5352
5353
77382aee
PA
5354/* miscellaneous stubs: */
5355
5356/* The following satisfy a few random symbols mostly created by the
5357 solaris threads implementation, which I will chase down later. */
c3f6f71d 5358
77382aee
PA
5359/* Return a pid for which we guarantee we will be able to find a
5360 'live' procinfo. */
c3f6f71d 5361
39f77062 5362ptid_t
fba45db2 5363procfs_first_available (void)
c3f6f71d 5364{
39f77062 5365 return pid_to_ptid (procinfo_list ? procinfo_list->pid : -1);
c3f6f71d 5366}
be4d1333
MS
5367
5368/* =================== GCORE .NOTE "MODULE" =================== */
05b4bd79
PA
5369#if defined (PIOCOPENLWP) || defined (PCAGENT)
5370/* gcore only implemented on solaris (so far) */
be4d1333
MS
5371
5372static char *
19958708 5373procfs_do_thread_registers (bfd *obfd, ptid_t ptid,
2020b7ab 5374 char *note_data, int *note_size,
2ea28649 5375 enum gdb_signal stop_signal)
be4d1333 5376{
594f7785 5377 struct regcache *regcache = get_thread_regcache (ptid);
be4d1333
MS
5378 gdb_gregset_t gregs;
5379 gdb_fpregset_t fpregs;
5380 unsigned long merged_pid;
75125405 5381 struct cleanup *old_chain;
be4d1333 5382
dfd4cc63 5383 merged_pid = ptid_get_lwp (ptid) << 16 | ptid_get_pid (ptid);
be4d1333 5384
75125405
DJ
5385 /* This part is the old method for fetching registers.
5386 It should be replaced by the newer one using regsets
5387 once it is implemented in this platform:
0df8b418 5388 gdbarch_regset_from_core_section() and regset->collect_regset(). */
75125405
DJ
5389
5390 old_chain = save_inferior_ptid ();
5391 inferior_ptid = ptid;
5392 target_fetch_registers (regcache, -1);
5393
594f7785 5394 fill_gregset (regcache, &gregs, -1);
4c490650 5395#if defined (NEW_PROC_API)
65554fef
MS
5396 note_data = (char *) elfcore_write_lwpstatus (obfd,
5397 note_data,
5398 note_size,
19958708 5399 merged_pid,
65554fef
MS
5400 stop_signal,
5401 &gregs);
5402#else
be4d1333 5403 note_data = (char *) elfcore_write_prstatus (obfd,
65554fef
MS
5404 note_data,
5405 note_size,
19958708 5406 merged_pid,
be4d1333 5407 stop_signal,
65554fef
MS
5408 &gregs);
5409#endif
594f7785 5410 fill_fpregset (regcache, &fpregs, -1);
be4d1333
MS
5411 note_data = (char *) elfcore_write_prfpreg (obfd,
5412 note_data,
5413 note_size,
5414 &fpregs,
5415 sizeof (fpregs));
75125405
DJ
5416
5417 do_cleanups (old_chain);
5418
be4d1333
MS
5419 return note_data;
5420}
5421
5422struct procfs_corefile_thread_data {
5423 bfd *obfd;
5424 char *note_data;
5425 int *note_size;
2ea28649 5426 enum gdb_signal stop_signal;
be4d1333
MS
5427};
5428
5429static int
65554fef 5430procfs_corefile_thread_callback (procinfo *pi, procinfo *thread, void *data)
be4d1333
MS
5431{
5432 struct procfs_corefile_thread_data *args = data;
be4d1333 5433
2689673f 5434 if (pi != NULL)
be4d1333 5435 {
dfd4cc63 5436 ptid_t ptid = ptid_build (pi->pid, thread->tid, 0);
f4a14ae6 5437
75125405 5438 args->note_data = procfs_do_thread_registers (args->obfd, ptid,
19958708 5439 args->note_data,
2020b7ab
PA
5440 args->note_size,
5441 args->stop_signal);
be4d1333
MS
5442 }
5443 return 0;
5444}
5445
a223f1e7
JB
5446static int
5447find_signalled_thread (struct thread_info *info, void *data)
5448{
a493e3e2 5449 if (info->suspend.stop_signal != GDB_SIGNAL_0
a223f1e7
JB
5450 && ptid_get_pid (info->ptid) == ptid_get_pid (inferior_ptid))
5451 return 1;
5452
5453 return 0;
5454}
5455
2ea28649 5456static enum gdb_signal
a223f1e7
JB
5457find_stop_signal (void)
5458{
5459 struct thread_info *info =
5460 iterate_over_threads (find_signalled_thread, NULL);
5461
5462 if (info)
16c381f0 5463 return info->suspend.stop_signal;
a223f1e7 5464 else
a493e3e2 5465 return GDB_SIGNAL_0;
a223f1e7
JB
5466}
5467
be4d1333
MS
5468static char *
5469procfs_make_note_section (bfd *obfd, int *note_size)
5470{
5471 struct cleanup *old_chain;
5472 gdb_gregset_t gregs;
5473 gdb_fpregset_t fpregs;
5474 char fname[16] = {'\0'};
5475 char psargs[80] = {'\0'};
dfd4cc63 5476 procinfo *pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
be4d1333 5477 char *note_data = NULL;
6dbdc4a3 5478 char *inf_args;
be4d1333 5479 struct procfs_corefile_thread_data thread_args;
0b62613e 5480 gdb_byte *auxv;
4e73f23d 5481 int auxv_len;
2ea28649 5482 enum gdb_signal stop_signal;
be4d1333
MS
5483
5484 if (get_exec_file (0))
5485 {
9f37bbcc 5486 strncpy (fname, lbasename (get_exec_file (0)), sizeof (fname));
4e2af517
JM
5487 fname[sizeof (fname) - 1] = 0;
5488 strncpy (psargs, get_exec_file (0), sizeof (psargs));
5489 psargs[sizeof (psargs) - 1] = 0;
6dbdc4a3
MS
5490
5491 inf_args = get_inferior_args ();
5492 if (inf_args && *inf_args &&
5493 strlen (inf_args) < ((int) sizeof (psargs) - (int) strlen (psargs)))
be4d1333 5494 {
19958708 5495 strncat (psargs, " ",
be4d1333 5496 sizeof (psargs) - strlen (psargs));
19958708 5497 strncat (psargs, inf_args,
be4d1333
MS
5498 sizeof (psargs) - strlen (psargs));
5499 }
5500 }
5501
19958708
RM
5502 note_data = (char *) elfcore_write_prpsinfo (obfd,
5503 note_data,
5504 note_size,
5505 fname,
be4d1333
MS
5506 psargs);
5507
651c8d2d
PA
5508 stop_signal = find_stop_signal ();
5509
3e3420f6
PA
5510#ifdef NEW_PROC_API
5511 fill_gregset (get_current_regcache (), &gregs, -1);
5512 note_data = elfcore_write_pstatus (obfd, note_data, note_size,
dfd4cc63 5513 ptid_get_pid (inferior_ptid),
3e3420f6
PA
5514 stop_signal, &gregs);
5515#endif
5516
be4d1333
MS
5517 thread_args.obfd = obfd;
5518 thread_args.note_data = note_data;
5519 thread_args.note_size = note_size;
651c8d2d 5520 thread_args.stop_signal = stop_signal;
3e43a32a
MS
5521 proc_iterate_over_threads (pi, procfs_corefile_thread_callback,
5522 &thread_args);
2689673f 5523 note_data = thread_args.note_data;
be4d1333 5524
13547ab6
DJ
5525 auxv_len = target_read_alloc (&current_target, TARGET_OBJECT_AUXV,
5526 NULL, &auxv);
4e73f23d
RM
5527 if (auxv_len > 0)
5528 {
5529 note_data = elfcore_write_note (obfd, note_data, note_size,
5530 "CORE", NT_AUXV, auxv, auxv_len);
5531 xfree (auxv);
5532 }
5533
be4d1333
MS
5534 make_cleanup (xfree, note_data);
5535 return note_data;
5536}
05b4bd79 5537#else /* !Solaris */
65554fef
MS
5538static char *
5539procfs_make_note_section (bfd *obfd, int *note_size)
5540{
8a3fe4f8 5541 error (_("gcore not implemented for this host."));
65554fef
MS
5542 return NULL; /* lint */
5543}
05b4bd79 5544#endif /* Solaris */
be4d1333 5545/* =================== END GCORE .NOTE "MODULE" =================== */