]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/procfs.c
[GOLD] clone assert breakage
[thirdparty/binutils-gdb.git] / gdb / procfs.c
CommitLineData
c906108c 1/* Machine independent support for SVR4 /proc (process file system) for GDB.
2555fe1a 2
61baf725 3 Copyright (C) 1999-2017 Free Software Foundation, Inc.
2555fe1a 4
c3f6f71d
JM
5 Written by Michael Snyder at Cygnus Solutions.
6 Based on work by Fred Fish, Stu Grossman, Geoff Noer, and others.
c906108c 7
a9762ec7
JB
8 This file is part of GDB.
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
14
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
21 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c 22
c3f6f71d
JM
23#include "defs.h"
24#include "inferior.h"
45741a9c 25#include "infrun.h"
c3f6f71d
JM
26#include "target.h"
27#include "gdbcore.h"
65554fef 28#include "elf-bfd.h" /* for elfcore_write_* */
c3f6f71d 29#include "gdbcmd.h"
0fda6bd2 30#include "gdbthread.h"
7f7fe91e 31#include "regcache.h"
28439f5e 32#include "inf-child.h"
88fc5eb7 33#include "filestuff.h"
c906108c 34
c3f6f71d 35#if defined (NEW_PROC_API)
0df8b418 36#define _STRUCTURED_PROC 1 /* Should be done by configure script. */
c3f6f71d 37#endif
c906108c 38
c3f6f71d 39#include <sys/procfs.h>
37de36c6 40#ifdef HAVE_SYS_FAULT_H
c3f6f71d 41#include <sys/fault.h>
37de36c6
KB
42#endif
43#ifdef HAVE_SYS_SYSCALL_H
c3f6f71d 44#include <sys/syscall.h>
37de36c6 45#endif
2555fe1a 46#include "gdb_wait.h"
0fda6bd2
JM
47#include <signal.h>
48#include <ctype.h>
92107356 49#include "gdb_bfd.h"
44270758 50#include "inflow.h"
4e73f23d 51#include "auxv.h"
d1a7880c 52#include "procfs.h"
27087a3d 53#include "observer.h"
0fda6bd2 54
77382aee
PA
55/* This module provides the interface between GDB and the
56 /proc file system, which is used on many versions of Unix
57 as a means for debuggers to control other processes.
58
59 Examples of the systems that use this interface are:
60
61 Irix
62 Solaris
63 OSF
77382aee
PA
64 AIX5
65
66 /proc works by imitating a file system: you open a simulated file
67 that represents the process you wish to interact with, and perform
68 operations on that "file" in order to examine or change the state
69 of the other process.
70
71 The most important thing to know about /proc and this module is
72 that there are two very different interfaces to /proc:
73
74 One that uses the ioctl system call, and another that uses read
75 and write system calls.
76
77 This module has to support both /proc interfaces. This means that
78 there are two different ways of doing every basic operation.
79
80 In order to keep most of the code simple and clean, I have defined
81 an interface "layer" which hides all these system calls. An ifdef
82 (NEW_PROC_API) determines which interface we are using, and most or
83 all occurrances of this ifdef should be confined to this interface
84 layer. */
85
86/* Determine which /proc API we are using: The ioctl API defines
87 PIOCSTATUS, while the read/write (multiple fd) API never does. */
c906108c 88
c3f6f71d 89#ifdef NEW_PROC_API
c906108c 90#include <sys/types.h>
2978b111 91#include <dirent.h> /* opendir/readdir, for listing the LWP's */
c3f6f71d 92#endif
c906108c 93
c3f6f71d
JM
94#include <fcntl.h> /* for O_RDONLY */
95#include <unistd.h> /* for "X_OK" */
53ce3c39 96#include <sys/stat.h> /* for struct stat */
c906108c 97
103b3ef5
MS
98/* Note: procfs-utils.h must be included after the above system header
99 files, because it redefines various system calls using macros.
100 This may be incompatible with the prototype declarations. */
101
103b3ef5
MS
102#include "proc-utils.h"
103
77382aee 104/* Prototypes for supply_gregset etc. */
c60c0f5f
MS
105#include "gregset.h"
106
c3f6f71d 107/* =================== TARGET_OPS "MODULE" =================== */
c906108c 108
77382aee 109/* This module defines the GDB target vector and its methods. */
c906108c 110
c0939df1 111static void procfs_attach (struct target_ops *, const char *, int);
52554a0e 112static void procfs_detach (struct target_ops *, const char *, int);
28439f5e 113static void procfs_resume (struct target_ops *,
2ea28649 114 ptid_t, int, enum gdb_signal);
bfedc46a 115static void procfs_interrupt (struct target_ops *self, ptid_t);
a14ed312 116static void procfs_files_info (struct target_ops *);
28439f5e
PA
117static void procfs_fetch_registers (struct target_ops *,
118 struct regcache *, int);
119static void procfs_store_registers (struct target_ops *,
120 struct regcache *, int);
94bedb42
TT
121static void procfs_pass_signals (struct target_ops *self,
122 int, unsigned char *);
7d85a9c0 123static void procfs_kill_inferior (struct target_ops *ops);
136d6dae 124static void procfs_mourn_inferior (struct target_ops *ops);
5f2ad7a3
RO
125static void procfs_create_inferior (struct target_ops *, const char *,
126 const std::string &, char **, int);
117de6a9 127static ptid_t procfs_wait (struct target_ops *,
4fcbb494 128 ptid_t, struct target_waitstatus *, int);
e96027e0
PA
129static enum target_xfer_status procfs_xfer_memory (gdb_byte *,
130 const gdb_byte *,
131 ULONGEST, ULONGEST,
132 ULONGEST *);
4ac248ca 133static target_xfer_partial_ftype procfs_xfer_partial;
a14ed312 134
28439f5e 135static int procfs_thread_alive (struct target_ops *ops, ptid_t);
a14ed312 136
e8032dde 137static void procfs_update_thread_list (struct target_ops *ops);
7a114964 138static const char *procfs_pid_to_str (struct target_ops *, ptid_t);
c3f6f71d 139
2e73927c
TT
140static int proc_find_memory_regions (struct target_ops *self,
141 find_memory_region_ftype, void *);
be4d1333 142
fc6691b2
TT
143static char * procfs_make_note_section (struct target_ops *self,
144 bfd *, int *);
be4d1333 145
5461485a 146static int procfs_can_use_hw_breakpoint (struct target_ops *self,
f486487f 147 enum bptype, int, int);
1e03ad20 148
7bc112c1 149static void procfs_info_proc (struct target_ops *, const char *,
145b16a9
UW
150 enum info_proc_what);
151
c47ffbe3 152#if defined (PR_MODEL_NATIVE) && (PR_MODEL_NATIVE == PR_MODEL_LP64)
77382aee
PA
153/* When GDB is built as 64-bit application on Solaris, the auxv data
154 is presented in 64-bit format. We need to provide a custom parser
155 to handle that. */
c47ffbe3
VP
156static int
157procfs_auxv_parse (struct target_ops *ops, gdb_byte **readptr,
77382aee 158 gdb_byte *endptr, CORE_ADDR *typep, CORE_ADDR *valp)
c47ffbe3 159{
f5656ead 160 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
c47ffbe3
VP
161 gdb_byte *ptr = *readptr;
162
163 if (endptr == ptr)
164 return 0;
77382aee 165
c47ffbe3
VP
166 if (endptr - ptr < 8 * 2)
167 return -1;
168
e17a4113 169 *typep = extract_unsigned_integer (ptr, 4, byte_order);
c47ffbe3
VP
170 ptr += 8;
171 /* The size of data is always 64-bit. If the application is 32-bit,
172 it will be zero extended, as expected. */
e17a4113 173 *valp = extract_unsigned_integer (ptr, 8, byte_order);
c47ffbe3
VP
174 ptr += 8;
175
176 *readptr = ptr;
177 return 1;
178}
179#endif
180
d1a7880c 181struct target_ops *
28439f5e 182procfs_target (void)
c3f6f71d 183{
28439f5e
PA
184 struct target_ops *t = inf_child_target ();
185
77382aee
PA
186 t->to_create_inferior = procfs_create_inferior;
187 t->to_kill = procfs_kill_inferior;
188 t->to_mourn_inferior = procfs_mourn_inferior;
189 t->to_attach = procfs_attach;
190 t->to_detach = procfs_detach;
191 t->to_wait = procfs_wait;
192 t->to_resume = procfs_resume;
193 t->to_fetch_registers = procfs_fetch_registers;
194 t->to_store_registers = procfs_store_registers;
195 t->to_xfer_partial = procfs_xfer_partial;
2455069d 196 t->to_pass_signals = procfs_pass_signals;
77382aee 197 t->to_files_info = procfs_files_info;
bfedc46a 198 t->to_interrupt = procfs_interrupt;
28439f5e 199
e8032dde 200 t->to_update_thread_list = procfs_update_thread_list;
77382aee
PA
201 t->to_thread_alive = procfs_thread_alive;
202 t->to_pid_to_str = procfs_pid_to_str;
28439f5e 203
77382aee 204 t->to_has_thread_control = tc_schedlock;
28439f5e
PA
205 t->to_find_memory_regions = proc_find_memory_regions;
206 t->to_make_corefile_notes = procfs_make_note_section;
145b16a9 207 t->to_info_proc = procfs_info_proc;
c47ffbe3
VP
208
209#if defined(PR_MODEL_NATIVE) && (PR_MODEL_NATIVE == PR_MODEL_LP64)
28439f5e 210 t->to_auxv_parse = procfs_auxv_parse;
c47ffbe3
VP
211#endif
212
77382aee 213 t->to_magic = OPS_MAGIC;
28439f5e
PA
214
215 return t;
c3f6f71d 216}
c906108c 217
c3f6f71d
JM
218/* =================== END, TARGET_OPS "MODULE" =================== */
219
77382aee
PA
220/* World Unification:
221
222 Put any typedefs, defines etc. here that are required for the
223 unification of code that handles different versions of /proc. */
c3f6f71d
JM
224
225#ifdef NEW_PROC_API /* Solaris 7 && 8 method for watchpoints */
37de36c6 226#ifdef WA_READ
19958708 227 enum { READ_WATCHFLAG = WA_READ,
c3f6f71d
JM
228 WRITE_WATCHFLAG = WA_WRITE,
229 EXEC_WATCHFLAG = WA_EXEC,
230 AFTER_WATCHFLAG = WA_TRAPAFTER
231 };
232#endif
233#else /* Irix method for watchpoints */
19958708 234 enum { READ_WATCHFLAG = MA_READ,
c3f6f71d
JM
235 WRITE_WATCHFLAG = MA_WRITE,
236 EXEC_WATCHFLAG = MA_EXEC,
237 AFTER_WATCHFLAG = 0 /* trapafter not implemented */
238 };
239#endif
240
37de36c6
KB
241/* gdb_sigset_t */
242#ifdef HAVE_PR_SIGSET_T
243typedef pr_sigset_t gdb_sigset_t;
244#else
245typedef sigset_t gdb_sigset_t;
246#endif
247
248/* sigaction */
249#ifdef HAVE_PR_SIGACTION64_T
250typedef pr_sigaction64_t gdb_sigaction_t;
251#else
252typedef struct sigaction gdb_sigaction_t;
253#endif
254
255/* siginfo */
256#ifdef HAVE_PR_SIGINFO64_T
257typedef pr_siginfo64_t gdb_siginfo_t;
258#else
a5362b9a 259typedef siginfo_t gdb_siginfo_t;
37de36c6
KB
260#endif
261
3c95f01c
JB
262/* On mips-irix, praddset and prdelset are defined in such a way that
263 they return a value, which causes GCC to emit a -Wunused error
264 because the returned value is not used. Prevent this warning
265 by casting the return value to void. On sparc-solaris, this issue
266 does not exist because the definition of these macros already include
267 that cast to void. */
268#define gdb_praddset(sp, flag) ((void) praddset (sp, flag))
269#define gdb_prdelset(sp, flag) ((void) prdelset (sp, flag))
270
37de36c6
KB
271/* gdb_premptysysset */
272#ifdef premptysysset
273#define gdb_premptysysset premptysysset
274#else
275#define gdb_premptysysset premptyset
276#endif
277
278/* praddsysset */
279#ifdef praddsysset
280#define gdb_praddsysset praddsysset
281#else
3c95f01c 282#define gdb_praddsysset gdb_praddset
37de36c6
KB
283#endif
284
285/* prdelsysset */
286#ifdef prdelsysset
287#define gdb_prdelsysset prdelsysset
288#else
3c95f01c 289#define gdb_prdelsysset gdb_prdelset
37de36c6
KB
290#endif
291
292/* prissyssetmember */
293#ifdef prissyssetmember
294#define gdb_pr_issyssetmember prissyssetmember
295#else
296#define gdb_pr_issyssetmember prismember
297#endif
298
299/* As a feature test, saying ``#if HAVE_PRSYSENT_T'' everywhere isn't
300 as intuitively descriptive as it could be, so we'll define
301 DYNAMIC_SYSCALLS to mean the same thing. Anyway, at the time of
302 this writing, this feature is only found on AIX5 systems and
303 basically means that the set of syscalls is not fixed. I.e,
304 there's no nice table that one can #include to get all of the
305 syscall numbers. Instead, they're stored in /proc/PID/sysent
306 for each process. We are at least guaranteed that they won't
307 change over the lifetime of the process. But each process could
77382aee 308 (in theory) have different syscall numbers. */
37de36c6
KB
309#ifdef HAVE_PRSYSENT_T
310#define DYNAMIC_SYSCALLS
311#endif
c3f6f71d
JM
312
313
314
315/* =================== STRUCT PROCINFO "MODULE" =================== */
316
317 /* FIXME: this comment will soon be out of date W.R.T. threads. */
318
319/* The procinfo struct is a wrapper to hold all the state information
320 concerning a /proc process. There should be exactly one procinfo
321 for each process, and since GDB currently can debug only one
322 process at a time, that means there should be only one procinfo.
323 All of the LWP's of a process can be accessed indirectly thru the
324 single process procinfo.
325
326 However, against the day when GDB may debug more than one process,
327 this data structure is kept in a list (which for now will hold no
328 more than one member), and many functions will have a pointer to a
329 procinfo as an argument.
330
331 There will be a separate procinfo structure for use by the (not yet
332 implemented) "info proc" command, so that we can print useful
333 information about any random process without interfering with the
0df8b418 334 inferior's procinfo information. */
c3f6f71d
JM
335
336#ifdef NEW_PROC_API
337/* format strings for /proc paths */
338# ifndef CTL_PROC_NAME_FMT
339# define MAIN_PROC_NAME_FMT "/proc/%d"
340# define CTL_PROC_NAME_FMT "/proc/%d/ctl"
341# define AS_PROC_NAME_FMT "/proc/%d/as"
342# define MAP_PROC_NAME_FMT "/proc/%d/map"
343# define STATUS_PROC_NAME_FMT "/proc/%d/status"
344# define MAX_PROC_NAME_SIZE sizeof("/proc/99999/lwp/8096/lstatus")
345# endif
346/* the name of the proc status struct depends on the implementation */
347typedef pstatus_t gdb_prstatus_t;
348typedef lwpstatus_t gdb_lwpstatus_t;
349#else /* ! NEW_PROC_API */
350/* format strings for /proc paths */
351# ifndef CTL_PROC_NAME_FMT
352# define MAIN_PROC_NAME_FMT "/proc/%05d"
353# define CTL_PROC_NAME_FMT "/proc/%05d"
354# define AS_PROC_NAME_FMT "/proc/%05d"
355# define MAP_PROC_NAME_FMT "/proc/%05d"
356# define STATUS_PROC_NAME_FMT "/proc/%05d"
357# define MAX_PROC_NAME_SIZE sizeof("/proc/ttttppppp")
358# endif
0df8b418 359/* The name of the proc status struct depends on the implementation. */
c5aa993b 360typedef prstatus_t gdb_prstatus_t;
c3f6f71d
JM
361typedef prstatus_t gdb_lwpstatus_t;
362#endif /* NEW_PROC_API */
c906108c 363
c3f6f71d
JM
364typedef struct procinfo {
365 struct procinfo *next;
366 int pid; /* Process ID */
367 int tid; /* Thread/LWP id */
c906108c 368
c3f6f71d
JM
369 /* process state */
370 int was_stopped;
371 int ignore_next_sigstop;
c906108c 372
19958708 373 /* The following four fd fields may be identical, or may contain
c3f6f71d
JM
374 several different fd's, depending on the version of /proc
375 (old ioctl or new read/write). */
c906108c 376
c3f6f71d 377 int ctl_fd; /* File descriptor for /proc control file */
77382aee
PA
378
379 /* The next three file descriptors are actually only needed in the
380 read/write, multiple-file-descriptor implemenation
381 (NEW_PROC_API). However, to avoid a bunch of #ifdefs in the
382 code, we will use them uniformly by (in the case of the ioctl
383 single-file-descriptor implementation) filling them with copies
384 of the control fd. */
c3f6f71d
JM
385 int status_fd; /* File descriptor for /proc status file */
386 int as_fd; /* File descriptor for /proc as file */
c906108c 387
c3f6f71d 388 char pathname[MAX_PROC_NAME_SIZE]; /* Pathname to /proc entry */
c906108c 389
c3f6f71d 390 fltset_t saved_fltset; /* Saved traced hardware fault set */
37de36c6
KB
391 gdb_sigset_t saved_sigset; /* Saved traced signal set */
392 gdb_sigset_t saved_sighold; /* Saved held signal set */
393 sysset_t *saved_exitset; /* Saved traced system call exit set */
394 sysset_t *saved_entryset; /* Saved traced system call entry set */
c906108c 395
c3f6f71d 396 gdb_prstatus_t prstatus; /* Current process status info */
c906108c 397
c3f6f71d
JM
398#ifndef NEW_PROC_API
399 gdb_fpregset_t fpregset; /* Current floating point registers */
c5aa993b 400#endif
37de36c6
KB
401
402#ifdef DYNAMIC_SYSCALLS
403 int num_syscalls; /* Total number of syscalls */
404 char **syscall_names; /* Syscall number to name map */
405#endif
19958708 406
c3f6f71d 407 struct procinfo *thread_list;
c906108c 408
c3f6f71d
JM
409 int status_valid : 1;
410 int gregs_valid : 1;
411 int fpregs_valid : 1;
412 int threads_valid: 1;
413} procinfo;
c906108c 414
c3f6f71d 415static char errmsg[128]; /* shared error msg buffer */
c906108c 416
c3f6f71d 417/* Function prototypes for procinfo module: */
c906108c 418
a14ed312
KB
419static procinfo *find_procinfo_or_die (int pid, int tid);
420static procinfo *find_procinfo (int pid, int tid);
421static procinfo *create_procinfo (int pid, int tid);
422static void destroy_procinfo (procinfo * p);
004527cb 423static void do_destroy_procinfo_cleanup (void *);
995816ba 424static void dead_procinfo (procinfo * p, const char *msg, int killp);
a14ed312
KB
425static int open_procinfo_files (procinfo * p, int which);
426static void close_procinfo_files (procinfo * p);
37de36c6
KB
427static int sysset_t_size (procinfo *p);
428static sysset_t *sysset_t_alloc (procinfo * pi);
429#ifdef DYNAMIC_SYSCALLS
430static void load_syscalls (procinfo *pi);
431static void free_syscalls (procinfo *pi);
995816ba 432static int find_syscall (procinfo *pi, const char *name);
37de36c6 433#endif /* DYNAMIC_SYSCALLS */
c906108c 434
e9ef4f39 435static int iterate_over_mappings
b8edc417
JK
436 (procinfo *pi, find_memory_region_ftype child_func, void *data,
437 int (*func) (struct prmap *map, find_memory_region_ftype child_func,
77382aee 438 void *data));
e9ef4f39 439
c3f6f71d
JM
440/* The head of the procinfo list: */
441static procinfo * procinfo_list;
c906108c 442
77382aee
PA
443/* Search the procinfo list. Return a pointer to procinfo, or NULL if
444 not found. */
c906108c 445
19958708 446static procinfo *
fba45db2 447find_procinfo (int pid, int tid)
c5aa993b 448{
c3f6f71d 449 procinfo *pi;
c906108c 450
c3f6f71d
JM
451 for (pi = procinfo_list; pi; pi = pi->next)
452 if (pi->pid == pid)
453 break;
c906108c 454
c3f6f71d
JM
455 if (pi)
456 if (tid)
457 {
458 /* Don't check threads_valid. If we're updating the
459 thread_list, we want to find whatever threads are already
460 here. This means that in general it is the caller's
461 responsibility to check threads_valid and update before
462 calling find_procinfo, if the caller wants to find a new
77382aee 463 thread. */
c3f6f71d
JM
464
465 for (pi = pi->thread_list; pi; pi = pi->next)
466 if (pi->tid == tid)
467 break;
468 }
c906108c 469
c3f6f71d
JM
470 return pi;
471}
c906108c 472
77382aee 473/* Calls find_procinfo, but errors on failure. */
c906108c 474
c3f6f71d 475static procinfo *
fba45db2 476find_procinfo_or_die (int pid, int tid)
c3f6f71d
JM
477{
478 procinfo *pi = find_procinfo (pid, tid);
c906108c 479
c3f6f71d 480 if (pi == NULL)
0fda6bd2
JM
481 {
482 if (tid)
3e43a32a
MS
483 error (_("procfs: couldn't find pid %d "
484 "(kernel thread %d) in procinfo list."),
0fda6bd2
JM
485 pid, tid);
486 else
8a3fe4f8 487 error (_("procfs: couldn't find pid %d in procinfo list."), pid);
0fda6bd2 488 }
c3f6f71d
JM
489 return pi;
490}
c906108c 491
77382aee
PA
492/* Wrapper for `open'. The appropriate open call is attempted; if
493 unsuccessful, it will be retried as many times as needed for the
494 EAGAIN and EINTR conditions.
19958708 495
77382aee
PA
496 For other conditions, retry the open a limited number of times. In
497 addition, a short sleep is imposed prior to retrying the open. The
498 reason for this sleep is to give the kernel a chance to catch up
499 and create the file in question in the event that GDB "wins" the
500 race to open a file before the kernel has created it. */
19958708 501
4d1bcd09
KB
502static int
503open_with_retry (const char *pathname, int flags)
504{
505 int retries_remaining, status;
506
507 retries_remaining = 2;
508
509 while (1)
510 {
511 status = open (pathname, flags);
512
513 if (status >= 0 || retries_remaining == 0)
514 break;
515 else if (errno != EINTR && errno != EAGAIN)
516 {
517 retries_remaining--;
518 sleep (1);
519 }
520 }
521
522 return status;
523}
524
77382aee
PA
525/* Open the file descriptor for the process or LWP. If NEW_PROC_API
526 is defined, we only open the control file descriptor; the others
527 are opened lazily as needed. Otherwise (if not NEW_PROC_API),
528 there is only one real file descriptor, but we keep multiple copies
529 of it so that the code that uses them does not have to be #ifdef'd.
530 Returns the file descriptor, or zero for failure. */
c906108c 531
c3f6f71d 532enum { FD_CTL, FD_STATUS, FD_AS };
c906108c 533
c3f6f71d 534static int
fba45db2 535open_procinfo_files (procinfo *pi, int which)
c3f6f71d 536{
0fda6bd2 537#ifdef NEW_PROC_API
c3f6f71d 538 char tmp[MAX_PROC_NAME_SIZE];
0fda6bd2 539#endif
c3f6f71d
JM
540 int fd;
541
77382aee
PA
542 /* This function is getting ALMOST long enough to break up into
543 several. Here is some rationale:
544
05b4bd79 545 NEW_PROC_API (Solaris 2.6, Solaris 2.7):
77382aee
PA
546 There are several file descriptors that may need to be open
547 for any given process or LWP. The ones we're intereted in are:
548 - control (ctl) write-only change the state
549 - status (status) read-only query the state
550 - address space (as) read/write access memory
551 - map (map) read-only virtual addr map
552 Most of these are opened lazily as they are needed.
553 The pathnames for the 'files' for an LWP look slightly
554 different from those of a first-class process:
555 Pathnames for a process (<proc-id>):
556 /proc/<proc-id>/ctl
557 /proc/<proc-id>/status
558 /proc/<proc-id>/as
559 /proc/<proc-id>/map
560 Pathnames for an LWP (lwp-id):
561 /proc/<proc-id>/lwp/<lwp-id>/lwpctl
562 /proc/<proc-id>/lwp/<lwp-id>/lwpstatus
563 An LWP has no map or address space file descriptor, since
564 the memory map and address space are shared by all LWPs.
565
566 Everyone else (Solaris 2.5, Irix, OSF)
567 There is only one file descriptor for each process or LWP.
568 For convenience, we copy the same file descriptor into all
569 three fields of the procinfo struct (ctl_fd, status_fd, and
570 as_fd, see NEW_PROC_API above) so that code that uses them
571 doesn't need any #ifdef's.
572 Pathname for all:
573 /proc/<proc-id>
574
575 Solaris 2.5 LWP's:
576 Each LWP has an independent file descriptor, but these
577 are not obtained via the 'open' system call like the rest:
578 instead, they're obtained thru an ioctl call (PIOCOPENLWP)
579 to the file descriptor of the parent process.
580
581 OSF threads:
582 These do not even have their own independent file descriptor.
583 All operations are carried out on the file descriptor of the
584 parent process. Therefore we just call open again for each
0df8b418 585 thread, getting a new handle for the same 'file'. */
c3f6f71d
JM
586
587#ifdef NEW_PROC_API
77382aee
PA
588 /* In this case, there are several different file descriptors that
589 we might be asked to open. The control file descriptor will be
590 opened early, but the others will be opened lazily as they are
591 needed. */
c3f6f71d
JM
592
593 strcpy (tmp, pi->pathname);
0df8b418 594 switch (which) { /* Which file descriptor to open? */
c3f6f71d
JM
595 case FD_CTL:
596 if (pi->tid)
597 strcat (tmp, "/lwpctl");
598 else
599 strcat (tmp, "/ctl");
4d1bcd09 600 fd = open_with_retry (tmp, O_WRONLY);
e28cade7 601 if (fd < 0)
c3f6f71d
JM
602 return 0; /* fail */
603 pi->ctl_fd = fd;
604 break;
605 case FD_AS:
606 if (pi->tid)
0df8b418 607 return 0; /* There is no 'as' file descriptor for an lwp. */
c3f6f71d 608 strcat (tmp, "/as");
4d1bcd09 609 fd = open_with_retry (tmp, O_RDWR);
e28cade7 610 if (fd < 0)
c3f6f71d
JM
611 return 0; /* fail */
612 pi->as_fd = fd;
613 break;
614 case FD_STATUS:
615 if (pi->tid)
616 strcat (tmp, "/lwpstatus");
617 else
618 strcat (tmp, "/status");
4d1bcd09 619 fd = open_with_retry (tmp, O_RDONLY);
e28cade7 620 if (fd < 0)
c3f6f71d
JM
621 return 0; /* fail */
622 pi->status_fd = fd;
623 break;
624 default:
625 return 0; /* unknown file descriptor */
626 }
627#else /* not NEW_PROC_API */
77382aee
PA
628 /* In this case, there is only one file descriptor for each procinfo
629 (ie. each process or LWP). In fact, only the file descriptor for
630 the process can actually be opened by an 'open' system call. The
631 ones for the LWPs have to be obtained thru an IOCTL call on the
632 process's file descriptor.
633
634 For convenience, we copy each procinfo's single file descriptor
635 into all of the fields occupied by the several file descriptors
636 of the NEW_PROC_API implementation. That way, the code that uses
637 them can be written without ifdefs. */
c3f6f71d
JM
638
639
640#ifdef PIOCTSTATUS /* OSF */
0df8b418 641 /* Only one FD; just open it. */
e28cade7 642 if ((fd = open_with_retry (pi->pathname, O_RDWR)) < 0)
c3f6f71d 643 return 0;
0df8b418 644#else /* Sol 2.5, Irix, other? */
c3f6f71d
JM
645 if (pi->tid == 0) /* Master procinfo for the process */
646 {
4d1bcd09 647 fd = open_with_retry (pi->pathname, O_RDWR);
e28cade7 648 if (fd < 0)
c3f6f71d
JM
649 return 0; /* fail */
650 }
651 else /* LWP thread procinfo */
652 {
653#ifdef PIOCOPENLWP /* Sol 2.5, thread/LWP */
654 procinfo *process;
655 int lwpid = pi->tid;
656
0df8b418 657 /* Find the procinfo for the entire process. */
c3f6f71d
JM
658 if ((process = find_procinfo (pi->pid, 0)) == NULL)
659 return 0; /* fail */
660
0df8b418 661 /* Now obtain the file descriptor for the LWP. */
e28cade7 662 if ((fd = ioctl (process->ctl_fd, PIOCOPENLWP, &lwpid)) < 0)
c3f6f71d 663 return 0; /* fail */
0df8b418
MS
664#else /* Irix, other? */
665 return 0; /* Don't know how to open threads. */
c3f6f71d
JM
666#endif /* Sol 2.5 PIOCOPENLWP */
667 }
668#endif /* OSF PIOCTSTATUS */
669 pi->ctl_fd = pi->as_fd = pi->status_fd = fd;
670#endif /* NEW_PROC_API */
c906108c 671
c3f6f71d
JM
672 return 1; /* success */
673}
c906108c 674
77382aee
PA
675/* Allocate a data structure and link it into the procinfo list.
676 First tries to find a pre-existing one (FIXME: why?). Returns the
677 pointer to new procinfo struct. */
c906108c 678
c3f6f71d 679static procinfo *
fba45db2 680create_procinfo (int pid, int tid)
c3f6f71d 681{
0b62613e 682 procinfo *pi, *parent = NULL;
c906108c 683
0d06e24b 684 if ((pi = find_procinfo (pid, tid)))
0df8b418 685 return pi; /* Already exists, nothing to do. */
c906108c 686
0df8b418 687 /* Find parent before doing malloc, to save having to cleanup. */
c3f6f71d
JM
688 if (tid != 0)
689 parent = find_procinfo_or_die (pid, 0); /* FIXME: should I
690 create it if it
0df8b418 691 doesn't exist yet? */
c906108c 692
8d749320 693 pi = XNEW (procinfo);
c3f6f71d
JM
694 memset (pi, 0, sizeof (procinfo));
695 pi->pid = pid;
696 pi->tid = tid;
c906108c 697
37de36c6
KB
698#ifdef DYNAMIC_SYSCALLS
699 load_syscalls (pi);
700#endif
701
1d5e0602
KB
702 pi->saved_entryset = sysset_t_alloc (pi);
703 pi->saved_exitset = sysset_t_alloc (pi);
704
c3f6f71d
JM
705 /* Chain into list. */
706 if (tid == 0)
707 {
708 sprintf (pi->pathname, MAIN_PROC_NAME_FMT, pid);
709 pi->next = procinfo_list;
710 procinfo_list = pi;
711 }
712 else
713 {
714#ifdef NEW_PROC_API
715 sprintf (pi->pathname, "/proc/%05d/lwp/%d", pid, tid);
716#else
717 sprintf (pi->pathname, MAIN_PROC_NAME_FMT, pid);
718#endif
719 pi->next = parent->thread_list;
720 parent->thread_list = pi;
721 }
722 return pi;
723}
c906108c 724
77382aee 725/* Close all file descriptors associated with the procinfo. */
c906108c 726
c3f6f71d 727static void
fba45db2 728close_procinfo_files (procinfo *pi)
c3f6f71d
JM
729{
730 if (pi->ctl_fd > 0)
731 close (pi->ctl_fd);
732#ifdef NEW_PROC_API
733 if (pi->as_fd > 0)
734 close (pi->as_fd);
735 if (pi->status_fd > 0)
736 close (pi->status_fd);
737#endif
738 pi->ctl_fd = pi->as_fd = pi->status_fd = 0;
739}
c906108c 740
77382aee 741/* Destructor function. Close, unlink and deallocate the object. */
c906108c 742
c3f6f71d 743static void
fba45db2 744destroy_one_procinfo (procinfo **list, procinfo *pi)
c3f6f71d
JM
745{
746 procinfo *ptr;
747
77382aee 748 /* Step one: unlink the procinfo from its list. */
c3f6f71d
JM
749 if (pi == *list)
750 *list = pi->next;
19958708 751 else
c3f6f71d
JM
752 for (ptr = *list; ptr; ptr = ptr->next)
753 if (ptr->next == pi)
754 {
755 ptr->next = pi->next;
756 break;
757 }
7a292a7a 758
77382aee 759 /* Step two: close any open file descriptors. */
c3f6f71d 760 close_procinfo_files (pi);
7a292a7a 761
77382aee 762 /* Step three: free the memory. */
37de36c6
KB
763#ifdef DYNAMIC_SYSCALLS
764 free_syscalls (pi);
765#endif
1d5e0602
KB
766 xfree (pi->saved_entryset);
767 xfree (pi->saved_exitset);
b8c9b27d 768 xfree (pi);
c3f6f71d 769}
c906108c 770
c3f6f71d 771static void
fba45db2 772destroy_procinfo (procinfo *pi)
c3f6f71d
JM
773{
774 procinfo *tmp;
c906108c 775
0df8b418 776 if (pi->tid != 0) /* Destroy a thread procinfo. */
c3f6f71d 777 {
0df8b418 778 tmp = find_procinfo (pi->pid, 0); /* Find the parent process. */
c3f6f71d
JM
779 destroy_one_procinfo (&tmp->thread_list, pi);
780 }
0df8b418 781 else /* Destroy a process procinfo and all its threads. */
c3f6f71d
JM
782 {
783 /* First destroy the children, if any; */
784 while (pi->thread_list != NULL)
785 destroy_one_procinfo (&pi->thread_list, pi->thread_list);
786 /* Then destroy the parent. Genocide!!! */
787 destroy_one_procinfo (&procinfo_list, pi);
788 }
789}
c906108c 790
004527cb
AC
791static void
792do_destroy_procinfo_cleanup (void *pi)
793{
b196bc4c 794 destroy_procinfo ((procinfo *) pi);
004527cb
AC
795}
796
c3f6f71d 797enum { NOKILL, KILL };
c906108c 798
77382aee
PA
799/* To be called on a non_recoverable error for a procinfo. Prints
800 error messages, optionally sends a SIGKILL to the process, then
801 destroys the data structure. */
c906108c 802
c3f6f71d 803static void
995816ba 804dead_procinfo (procinfo *pi, const char *msg, int kill_p)
c3f6f71d
JM
805{
806 char procfile[80];
c906108c 807
c3f6f71d
JM
808 if (pi->pathname)
809 {
810 print_sys_errmsg (pi->pathname, errno);
811 }
812 else
813 {
814 sprintf (procfile, "process %d", pi->pid);
815 print_sys_errmsg (procfile, errno);
816 }
817 if (kill_p == KILL)
818 kill (pi->pid, SIGKILL);
c906108c 819
c3f6f71d 820 destroy_procinfo (pi);
0b62613e 821 error ("%s", msg);
c3f6f71d 822}
c906108c 823
77382aee
PA
824/* Returns the (complete) size of a sysset_t struct. Normally, this
825 is just sizeof (sysset_t), but in the case of Monterey/64, the
826 actual size of sysset_t isn't known until runtime. */
37de36c6
KB
827
828static int
829sysset_t_size (procinfo * pi)
830{
831#ifndef DYNAMIC_SYSCALLS
832 return sizeof (sysset_t);
833#else
834 return sizeof (sysset_t) - sizeof (uint64_t)
835 + sizeof (uint64_t) * ((pi->num_syscalls + (8 * sizeof (uint64_t) - 1))
836 / (8 * sizeof (uint64_t)));
837#endif
838}
839
77382aee 840/* Allocate and (partially) initialize a sysset_t struct. */
37de36c6
KB
841
842static sysset_t *
843sysset_t_alloc (procinfo * pi)
844{
845 sysset_t *ret;
846 int size = sysset_t_size (pi);
f4a14ae6 847
b196bc4c 848 ret = (sysset_t *) xmalloc (size);
37de36c6 849#ifdef DYNAMIC_SYSCALLS
77382aee
PA
850 ret->pr_size = ((pi->num_syscalls + (8 * sizeof (uint64_t) - 1))
851 / (8 * sizeof (uint64_t)));
37de36c6
KB
852#endif
853 return ret;
854}
855
856#ifdef DYNAMIC_SYSCALLS
857
77382aee 858/* Extract syscall numbers and names from /proc/<pid>/sysent. Initialize
37de36c6
KB
859 pi->num_syscalls with the number of syscalls and pi->syscall_names
860 with the names. (Certain numbers may be skipped in which case the
0df8b418 861 names for these numbers will be left as NULL.) */
37de36c6
KB
862
863#define MAX_SYSCALL_NAME_LENGTH 256
864#define MAX_SYSCALLS 65536
865
866static void
867load_syscalls (procinfo *pi)
868{
869 char pathname[MAX_PROC_NAME_SIZE];
870 int sysent_fd;
871 prsysent_t header;
872 prsyscall_t *syscalls;
873 int i, size, maxcall;
e28cade7 874 struct cleanup *cleanups;
37de36c6
KB
875
876 pi->num_syscalls = 0;
877 pi->syscall_names = 0;
878
77382aee 879 /* Open the file descriptor for the sysent file. */
37de36c6 880 sprintf (pathname, "/proc/%d/sysent", pi->pid);
4d1bcd09 881 sysent_fd = open_with_retry (pathname, O_RDONLY);
37de36c6
KB
882 if (sysent_fd < 0)
883 {
8a3fe4f8 884 error (_("load_syscalls: Can't open /proc/%d/sysent"), pi->pid);
37de36c6 885 }
e28cade7 886 cleanups = make_cleanup_close (sysent_fd);
37de36c6
KB
887
888 size = sizeof header - sizeof (prsyscall_t);
889 if (read (sysent_fd, &header, size) != size)
890 {
8a3fe4f8 891 error (_("load_syscalls: Error reading /proc/%d/sysent"), pi->pid);
37de36c6
KB
892 }
893
894 if (header.pr_nsyscalls == 0)
895 {
3e43a32a
MS
896 error (_("load_syscalls: /proc/%d/sysent contains no syscalls!"),
897 pi->pid);
37de36c6
KB
898 }
899
900 size = header.pr_nsyscalls * sizeof (prsyscall_t);
901 syscalls = xmalloc (size);
e28cade7 902 make_cleanup (free_current_contents, &syscalls);
37de36c6
KB
903
904 if (read (sysent_fd, syscalls, size) != size)
e28cade7 905 error (_("load_syscalls: Error reading /proc/%d/sysent"), pi->pid);
37de36c6
KB
906
907 /* Find maximum syscall number. This may not be the same as
908 pr_nsyscalls since that value refers to the number of entries
909 in the table. (Also, the docs indicate that some system
0df8b418 910 call numbers may be skipped.) */
37de36c6
KB
911
912 maxcall = syscalls[0].pr_number;
913
914 for (i = 1; i < header.pr_nsyscalls; i++)
915 if (syscalls[i].pr_number > maxcall
77382aee 916 && syscalls[i].pr_nameoff > 0
37de36c6
KB
917 && syscalls[i].pr_number < MAX_SYSCALLS)
918 maxcall = syscalls[i].pr_number;
919
920 pi->num_syscalls = maxcall+1;
8d749320 921 pi->syscall_names = XNEWVEC (char *, pi->num_syscalls);
37de36c6
KB
922
923 for (i = 0; i < pi->num_syscalls; i++)
924 pi->syscall_names[i] = NULL;
925
77382aee 926 /* Read the syscall names in. */
37de36c6
KB
927 for (i = 0; i < header.pr_nsyscalls; i++)
928 {
929 char namebuf[MAX_SYSCALL_NAME_LENGTH];
930 int nread;
931 int callnum;
932
933 if (syscalls[i].pr_number >= MAX_SYSCALLS
77382aee 934 || syscalls[i].pr_number < 0
37de36c6
KB
935 || syscalls[i].pr_nameoff <= 0
936 || (lseek (sysent_fd, (off_t) syscalls[i].pr_nameoff, SEEK_SET)
77382aee 937 != (off_t) syscalls[i].pr_nameoff))
37de36c6
KB
938 continue;
939
940 nread = read (sysent_fd, namebuf, sizeof namebuf);
941 if (nread <= 0)
942 continue;
943
944 callnum = syscalls[i].pr_number;
945
946 if (pi->syscall_names[callnum] != NULL)
947 {
0df8b418 948 /* FIXME: Generate warning. */
37de36c6
KB
949 continue;
950 }
951
952 namebuf[nread-1] = '\0';
953 size = strlen (namebuf) + 1;
954 pi->syscall_names[callnum] = xmalloc (size);
955 strncpy (pi->syscall_names[callnum], namebuf, size-1);
956 pi->syscall_names[callnum][size-1] = '\0';
957 }
19958708 958
e28cade7 959 do_cleanups (cleanups);
37de36c6
KB
960}
961
77382aee 962/* Free the space allocated for the syscall names from the procinfo
37de36c6
KB
963 structure. */
964
965static void
966free_syscalls (procinfo *pi)
967{
968 if (pi->syscall_names)
969 {
970 int i;
971
972 for (i = 0; i < pi->num_syscalls; i++)
973 if (pi->syscall_names[i] != NULL)
974 xfree (pi->syscall_names[i]);
975
976 xfree (pi->syscall_names);
977 pi->syscall_names = 0;
978 }
979}
980
77382aee 981/* Given a name, look up (and return) the corresponding syscall number.
37de36c6 982 If no match is found, return -1. */
19958708 983
37de36c6 984static int
995816ba 985find_syscall (procinfo *pi, const char *name)
37de36c6
KB
986{
987 int i;
f4a14ae6 988
37de36c6
KB
989 for (i = 0; i < pi->num_syscalls; i++)
990 {
991 if (pi->syscall_names[i] && strcmp (name, pi->syscall_names[i]) == 0)
992 return i;
993 }
994 return -1;
995}
996#endif
997
c3f6f71d 998/* =================== END, STRUCT PROCINFO "MODULE" =================== */
c906108c 999
c3f6f71d 1000/* =================== /proc "MODULE" =================== */
c906108c 1001
77382aee
PA
1002/* This "module" is the interface layer between the /proc system API
1003 and the gdb target vector functions. This layer consists of access
1004 functions that encapsulate each of the basic operations that we
1005 need to use from the /proc API.
1006
1007 The main motivation for this layer is to hide the fact that there
1008 are two very different implementations of the /proc API. Rather
1009 than have a bunch of #ifdefs all thru the gdb target vector
1010 functions, we do our best to hide them all in here. */
c906108c 1011
d3581e61
JB
1012static long proc_flags (procinfo * pi);
1013static int proc_why (procinfo * pi);
1014static int proc_what (procinfo * pi);
1015static int proc_set_current_signal (procinfo * pi, int signo);
1016static int proc_get_current_thread (procinfo * pi);
1017static int proc_iterate_over_threads
1018 (procinfo * pi,
1019 int (*func) (procinfo *, procinfo *, void *),
1020 void *ptr);
1021
1022static void
995816ba 1023proc_warn (procinfo *pi, const char *func, int line)
c3f6f71d
JM
1024{
1025 sprintf (errmsg, "procfs: %s line %d, %s", func, line, pi->pathname);
1026 print_sys_errmsg (errmsg, errno);
1027}
c906108c 1028
d3581e61 1029static void
995816ba 1030proc_error (procinfo *pi, const char *func, int line)
c3f6f71d
JM
1031{
1032 sprintf (errmsg, "procfs: %s line %d, %s", func, line, pi->pathname);
1033 perror_with_name (errmsg);
1034}
c906108c 1035
77382aee
PA
1036/* Updates the status struct in the procinfo. There is a 'valid'
1037 flag, to let other functions know when this function needs to be
1038 called (so the status is only read when it is needed). The status
1039 file descriptor is also only opened when it is needed. Returns
1040 non-zero for success, zero for failure. */
c906108c 1041
d3581e61 1042static int
fba45db2 1043proc_get_status (procinfo *pi)
c3f6f71d 1044{
0df8b418 1045 /* Status file descriptor is opened "lazily". */
c3f6f71d
JM
1046 if (pi->status_fd == 0 &&
1047 open_procinfo_files (pi, FD_STATUS) == 0)
1048 {
1049 pi->status_valid = 0;
1050 return 0;
1051 }
c906108c 1052
c3f6f71d
JM
1053#ifdef NEW_PROC_API
1054 if (lseek (pi->status_fd, 0, SEEK_SET) < 0)
1055 pi->status_valid = 0; /* fail */
1056 else
1057 {
19958708 1058 /* Sigh... I have to read a different data structure,
0df8b418 1059 depending on whether this is a main process or an LWP. */
c3f6f71d 1060 if (pi->tid)
19958708
RM
1061 pi->status_valid = (read (pi->status_fd,
1062 (char *) &pi->prstatus.pr_lwp,
c3f6f71d
JM
1063 sizeof (lwpstatus_t))
1064 == sizeof (lwpstatus_t));
1065 else
1066 {
19958708 1067 pi->status_valid = (read (pi->status_fd,
c3f6f71d
JM
1068 (char *) &pi->prstatus,
1069 sizeof (gdb_prstatus_t))
1070 == sizeof (gdb_prstatus_t));
c3f6f71d
JM
1071 }
1072 }
1073#else /* ioctl method */
1074#ifdef PIOCTSTATUS /* osf */
1075 if (pi->tid == 0) /* main process */
1076 {
0df8b418 1077 /* Just read the danged status. Now isn't that simple? */
19958708 1078 pi->status_valid =
c3f6f71d
JM
1079 (ioctl (pi->status_fd, PIOCSTATUS, &pi->prstatus) >= 0);
1080 }
1081 else
1082 {
1083 int win;
1084 struct {
1085 long pr_count;
1086 tid_t pr_error_thread;
1087 struct prstatus status;
1088 } thread_status;
1089
1090 thread_status.pr_count = 1;
1091 thread_status.status.pr_tid = pi->tid;
1092 win = (ioctl (pi->status_fd, PIOCTSTATUS, &thread_status) >= 0);
1093 if (win)
1094 {
19958708 1095 memcpy (&pi->prstatus, &thread_status.status,
c3f6f71d
JM
1096 sizeof (pi->prstatus));
1097 pi->status_valid = 1;
1098 }
1099 }
1100#else
77382aee 1101 /* Just read the danged status. Now isn't that simple? */
c3f6f71d
JM
1102 pi->status_valid = (ioctl (pi->status_fd, PIOCSTATUS, &pi->prstatus) >= 0);
1103#endif
1104#endif
c906108c 1105
c3f6f71d
JM
1106 if (pi->status_valid)
1107 {
19958708 1108 PROC_PRETTYFPRINT_STATUS (proc_flags (pi),
c3f6f71d 1109 proc_why (pi),
19958708 1110 proc_what (pi),
c3f6f71d
JM
1111 proc_get_current_thread (pi));
1112 }
c906108c 1113
77382aee 1114 /* The status struct includes general regs, so mark them valid too. */
c3f6f71d
JM
1115 pi->gregs_valid = pi->status_valid;
1116#ifdef NEW_PROC_API
77382aee
PA
1117 /* In the read/write multiple-fd model, the status struct includes
1118 the fp regs too, so mark them valid too. */
c3f6f71d
JM
1119 pi->fpregs_valid = pi->status_valid;
1120#endif
77382aee 1121 return pi->status_valid; /* True if success, false if failure. */
c3f6f71d 1122}
c906108c 1123
77382aee 1124/* Returns the process flags (pr_flags field). */
c3f6f71d 1125
d3581e61 1126static long
fba45db2 1127proc_flags (procinfo *pi)
c3f6f71d
JM
1128{
1129 if (!pi->status_valid)
1130 if (!proc_get_status (pi))
0df8b418 1131 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 1132
c3f6f71d
JM
1133#ifdef NEW_PROC_API
1134 return pi->prstatus.pr_lwp.pr_flags;
1135#else
1136 return pi->prstatus.pr_flags;
1137#endif
1138}
c906108c 1139
77382aee 1140/* Returns the pr_why field (why the process stopped). */
c906108c 1141
d3581e61 1142static int
fba45db2 1143proc_why (procinfo *pi)
c3f6f71d
JM
1144{
1145 if (!pi->status_valid)
1146 if (!proc_get_status (pi))
0df8b418 1147 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 1148
c3f6f71d
JM
1149#ifdef NEW_PROC_API
1150 return pi->prstatus.pr_lwp.pr_why;
1151#else
1152 return pi->prstatus.pr_why;
1153#endif
1154}
c906108c 1155
77382aee 1156/* Returns the pr_what field (details of why the process stopped). */
c906108c 1157
d3581e61 1158static int
fba45db2 1159proc_what (procinfo *pi)
c3f6f71d
JM
1160{
1161 if (!pi->status_valid)
1162 if (!proc_get_status (pi))
0df8b418 1163 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 1164
c3f6f71d
JM
1165#ifdef NEW_PROC_API
1166 return pi->prstatus.pr_lwp.pr_what;
1167#else
1168 return pi->prstatus.pr_what;
c906108c 1169#endif
c3f6f71d 1170}
c906108c 1171
77382aee
PA
1172/* This function is only called when PI is stopped by a watchpoint.
1173 Assuming the OS supports it, write to *ADDR the data address which
1174 triggered it and return 1. Return 0 if it is not possible to know
1175 the address. */
bf701c2c
PM
1176
1177static int
1178proc_watchpoint_address (procinfo *pi, CORE_ADDR *addr)
1179{
1180 if (!pi->status_valid)
1181 if (!proc_get_status (pi))
1182 return 0;
1183
1184#ifdef NEW_PROC_API
f5656ead
TT
1185 *addr = (CORE_ADDR) gdbarch_pointer_to_address (target_gdbarch (),
1186 builtin_type (target_gdbarch ())->builtin_data_ptr,
bf701c2c
PM
1187 (gdb_byte *) &pi->prstatus.pr_lwp.pr_info.si_addr);
1188#else
f5656ead
TT
1189 *addr = (CORE_ADDR) gdbarch_pointer_to_address (target_gdbarch (),
1190 builtin_type (target_gdbarch ())->builtin_data_ptr,
bf701c2c
PM
1191 (gdb_byte *) &pi->prstatus.pr_info.si_addr);
1192#endif
1193 return 1;
1194}
1195
c3f6f71d 1196#ifndef PIOCSSPCACT /* The following is not supported on OSF. */
77382aee
PA
1197
1198/* Returns the pr_nsysarg field (number of args to the current
1199 syscall). */
c3f6f71d 1200
d3581e61 1201static int
fba45db2 1202proc_nsysarg (procinfo *pi)
c3f6f71d
JM
1203{
1204 if (!pi->status_valid)
1205 if (!proc_get_status (pi))
1206 return 0;
19958708 1207
c3f6f71d
JM
1208#ifdef NEW_PROC_API
1209 return pi->prstatus.pr_lwp.pr_nsysarg;
1210#else
1211 return pi->prstatus.pr_nsysarg;
c906108c 1212#endif
c3f6f71d 1213}
c906108c 1214
77382aee
PA
1215/* Returns the pr_sysarg field (pointer to the arguments of current
1216 syscall). */
c906108c 1217
d3581e61 1218static long *
fba45db2 1219proc_sysargs (procinfo *pi)
c3f6f71d
JM
1220{
1221 if (!pi->status_valid)
1222 if (!proc_get_status (pi))
1223 return NULL;
19958708 1224
c3f6f71d
JM
1225#ifdef NEW_PROC_API
1226 return (long *) &pi->prstatus.pr_lwp.pr_sysarg;
1227#else
1228 return (long *) &pi->prstatus.pr_sysarg;
1229#endif
1230}
c3f6f71d 1231#endif /* PIOCSSPCACT */
c906108c 1232
d3581e61 1233#ifdef PROCFS_DONT_PIOCSSIG_CURSIG
77382aee 1234/* Returns the pr_cursig field (current signal). */
c906108c 1235
d3581e61 1236static long
c3f6f71d
JM
1237proc_cursig (struct procinfo *pi)
1238{
1239 if (!pi->status_valid)
1240 if (!proc_get_status (pi))
0df8b418 1241 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 1242
c3f6f71d
JM
1243#ifdef NEW_PROC_API
1244 return pi->prstatus.pr_lwp.pr_cursig;
1245#else
1246 return pi->prstatus.pr_cursig;
1247#endif
1248}
d3581e61 1249#endif /* PROCFS_DONT_PIOCSSIG_CURSIG */
c906108c 1250
77382aee
PA
1251/* === I appologize for the messiness of this function.
1252 === This is an area where the different versions of
1253 === /proc are more inconsistent than usual.
1254
1255 Set or reset any of the following process flags:
1256 PR_FORK -- forked child will inherit trace flags
1257 PR_RLC -- traced process runs when last /proc file closed.
1258 PR_KLC -- traced process is killed when last /proc file closed.
1259 PR_ASYNC -- LWP's get to run/stop independently.
1260
1261 There are three methods for doing this function:
1262 1) Newest: read/write [PCSET/PCRESET/PCUNSET]
1263 [Sol6, Sol7, UW]
1264 2) Middle: PIOCSET/PIOCRESET
1265 [Irix, Sol5]
1266 3) Oldest: PIOCSFORK/PIOCRFORK/PIOCSRLC/PIOCRRLC
1267 [OSF, Sol5]
1268
1269 Note: Irix does not define PR_ASYNC.
1270 Note: OSF does not define PR_KLC.
1271 Note: OSF is the only one that can ONLY use the oldest method.
1272
1273 Arguments:
1274 pi -- the procinfo
1275 flag -- one of PR_FORK, PR_RLC, or PR_ASYNC
1276 mode -- 1 for set, 0 for reset.
1277
1278 Returns non-zero for success, zero for failure. */
c906108c 1279
c3f6f71d 1280enum { FLAG_RESET, FLAG_SET };
c906108c 1281
c3f6f71d 1282static int
fba45db2 1283proc_modify_flag (procinfo *pi, long flag, long mode)
c3f6f71d
JM
1284{
1285 long win = 0; /* default to fail */
1286
77382aee
PA
1287 /* These operations affect the process as a whole, and applying them
1288 to an individual LWP has the same meaning as applying them to the
1289 main process. Therefore, if we're ever called with a pointer to
1290 an LWP's procinfo, let's substitute the process's procinfo and
1291 avoid opening the LWP's file descriptor unnecessarily. */
c3f6f71d
JM
1292
1293 if (pi->pid != 0)
1294 pi = find_procinfo_or_die (pi->pid, 0);
1295
05b4bd79 1296#ifdef NEW_PROC_API /* Newest method: Newer Solarii. */
19958708 1297 /* First normalize the PCUNSET/PCRESET command opcode
c3f6f71d
JM
1298 (which for no obvious reason has a different definition
1299 from one operating system to the next...) */
1300#ifdef PCUNSET
1301#define GDBRESET PCUNSET
37de36c6 1302#else
c3f6f71d
JM
1303#ifdef PCRESET
1304#define GDBRESET PCRESET
37de36c6 1305#endif
c906108c 1306#endif
c3f6f71d 1307 {
37de36c6 1308 procfs_ctl_t arg[2];
c906108c 1309
0df8b418 1310 if (mode == FLAG_SET) /* Set the flag (RLC, FORK, or ASYNC). */
c3f6f71d 1311 arg[0] = PCSET;
0df8b418 1312 else /* Reset the flag. */
c3f6f71d 1313 arg[0] = GDBRESET;
c5aa993b 1314
c3f6f71d
JM
1315 arg[1] = flag;
1316 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
1317 }
1318#else
1319#ifdef PIOCSET /* Irix/Sol5 method */
0df8b418 1320 if (mode == FLAG_SET) /* Set the flag (hopefully RLC, FORK, or ASYNC). */
c3f6f71d
JM
1321 {
1322 win = (ioctl (pi->ctl_fd, PIOCSET, &flag) >= 0);
1323 }
0df8b418 1324 else /* Reset the flag. */
c3f6f71d
JM
1325 {
1326 win = (ioctl (pi->ctl_fd, PIOCRESET, &flag) >= 0);
1327 }
c906108c 1328
c3f6f71d
JM
1329#else
1330#ifdef PIOCSRLC /* Oldest method: OSF */
1331 switch (flag) {
1332 case PR_RLC:
1333 if (mode == FLAG_SET) /* Set run-on-last-close */
1334 {
1335 win = (ioctl (pi->ctl_fd, PIOCSRLC, NULL) >= 0);
1336 }
1337 else /* Clear run-on-last-close */
1338 {
1339 win = (ioctl (pi->ctl_fd, PIOCRRLC, NULL) >= 0);
1340 }
1341 break;
1342 case PR_FORK:
1343 if (mode == FLAG_SET) /* Set inherit-on-fork */
1344 {
1345 win = (ioctl (pi->ctl_fd, PIOCSFORK, NULL) >= 0);
1346 }
1347 else /* Clear inherit-on-fork */
1348 {
1349 win = (ioctl (pi->ctl_fd, PIOCRFORK, NULL) >= 0);
1350 }
1351 break;
1352 default:
0df8b418 1353 win = 0; /* Fail -- unknown flag (can't do PR_ASYNC). */
c3f6f71d
JM
1354 break;
1355 }
1356#endif
1357#endif
1358#endif
1359#undef GDBRESET
77382aee
PA
1360 /* The above operation renders the procinfo's cached pstatus
1361 obsolete. */
c3f6f71d 1362 pi->status_valid = 0;
c906108c 1363
c3f6f71d 1364 if (!win)
8a3fe4f8 1365 warning (_("procfs: modify_flag failed to turn %s %s"),
c3f6f71d
JM
1366 flag == PR_FORK ? "PR_FORK" :
1367 flag == PR_RLC ? "PR_RLC" :
1368#ifdef PR_ASYNC
1369 flag == PR_ASYNC ? "PR_ASYNC" :
0d06e24b
JM
1370#endif
1371#ifdef PR_KLC
1372 flag == PR_KLC ? "PR_KLC" :
c3f6f71d
JM
1373#endif
1374 "<unknown flag>",
1375 mode == FLAG_RESET ? "off" : "on");
c906108c 1376
c3f6f71d
JM
1377 return win;
1378}
c906108c 1379
77382aee
PA
1380/* Set the run_on_last_close flag. Process with all threads will
1381 become runnable when debugger closes all /proc fds. Returns
1382 non-zero for success, zero for failure. */
c906108c 1383
d3581e61 1384static int
fba45db2 1385proc_set_run_on_last_close (procinfo *pi)
c906108c 1386{
c3f6f71d
JM
1387 return proc_modify_flag (pi, PR_RLC, FLAG_SET);
1388}
c906108c 1389
77382aee
PA
1390/* Reset the run_on_last_close flag. The process will NOT become
1391 runnable when debugger closes its file handles. Returns non-zero
1392 for success, zero for failure. */
c906108c 1393
d3581e61 1394static int
fba45db2 1395proc_unset_run_on_last_close (procinfo *pi)
c3f6f71d
JM
1396{
1397 return proc_modify_flag (pi, PR_RLC, FLAG_RESET);
c906108c
SS
1398}
1399
77382aee
PA
1400/* Reset inherit_on_fork flag. If the process forks a child while we
1401 are registered for events in the parent, then we will NOT recieve
1402 events from the child. Returns non-zero for success, zero for
1403 failure. */
c906108c 1404
d3581e61 1405static int
fba45db2 1406proc_unset_inherit_on_fork (procinfo *pi)
c3f6f71d
JM
1407{
1408 return proc_modify_flag (pi, PR_FORK, FLAG_RESET);
1409}
c906108c 1410
c3f6f71d 1411#ifdef PR_ASYNC
77382aee
PA
1412/* Set PR_ASYNC flag. If one LWP stops because of a debug event
1413 (signal etc.), the remaining LWPs will continue to run. Returns
1414 non-zero for success, zero for failure. */
c906108c 1415
d3581e61 1416static int
fba45db2 1417proc_set_async (procinfo *pi)
c3f6f71d
JM
1418{
1419 return proc_modify_flag (pi, PR_ASYNC, FLAG_SET);
1420}
c906108c 1421
77382aee
PA
1422/* Reset PR_ASYNC flag. If one LWP stops because of a debug event
1423 (signal etc.), then all other LWPs will stop as well. Returns
1424 non-zero for success, zero for failure. */
c906108c 1425
d3581e61 1426static int
fba45db2 1427proc_unset_async (procinfo *pi)
c3f6f71d
JM
1428{
1429 return proc_modify_flag (pi, PR_ASYNC, FLAG_RESET);
1430}
1431#endif /* PR_ASYNC */
c906108c 1432
77382aee
PA
1433/* Request the process/LWP to stop. Does not wait. Returns non-zero
1434 for success, zero for failure. */
c906108c 1435
d3581e61 1436static int
fba45db2 1437proc_stop_process (procinfo *pi)
c3f6f71d
JM
1438{
1439 int win;
c906108c 1440
77382aee
PA
1441 /* We might conceivably apply this operation to an LWP, and the
1442 LWP's ctl file descriptor might not be open. */
c906108c 1443
c3f6f71d
JM
1444 if (pi->ctl_fd == 0 &&
1445 open_procinfo_files (pi, FD_CTL) == 0)
1446 return 0;
1447 else
1448 {
1449#ifdef NEW_PROC_API
37de36c6 1450 procfs_ctl_t cmd = PCSTOP;
f4a14ae6 1451
c3f6f71d
JM
1452 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
1453#else /* ioctl method */
1454 win = (ioctl (pi->ctl_fd, PIOCSTOP, &pi->prstatus) >= 0);
1455 /* Note: the call also reads the prstatus. */
1456 if (win)
1457 {
1458 pi->status_valid = 1;
19958708 1459 PROC_PRETTYFPRINT_STATUS (proc_flags (pi),
c3f6f71d 1460 proc_why (pi),
19958708 1461 proc_what (pi),
c3f6f71d
JM
1462 proc_get_current_thread (pi));
1463 }
1464#endif
1465 }
c906108c 1466
c3f6f71d
JM
1467 return win;
1468}
c5aa993b 1469
77382aee
PA
1470/* Wait for the process or LWP to stop (block until it does). Returns
1471 non-zero for success, zero for failure. */
c906108c 1472
d3581e61 1473static int
fba45db2 1474proc_wait_for_stop (procinfo *pi)
c906108c 1475{
c3f6f71d
JM
1476 int win;
1477
77382aee
PA
1478 /* We should never have to apply this operation to any procinfo
1479 except the one for the main process. If that ever changes for
1480 any reason, then take out the following clause and replace it
1481 with one that makes sure the ctl_fd is open. */
19958708 1482
c3f6f71d
JM
1483 if (pi->tid != 0)
1484 pi = find_procinfo_or_die (pi->pid, 0);
1485
1486#ifdef NEW_PROC_API
1487 {
37de36c6 1488 procfs_ctl_t cmd = PCWSTOP;
f4a14ae6 1489
c3f6f71d
JM
1490 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
1491 /* We been runnin' and we stopped -- need to update status. */
1492 pi->status_valid = 0;
1493 }
1494#else /* ioctl method */
1495 win = (ioctl (pi->ctl_fd, PIOCWSTOP, &pi->prstatus) >= 0);
1496 /* Above call also refreshes the prstatus. */
1497 if (win)
1498 {
1499 pi->status_valid = 1;
19958708 1500 PROC_PRETTYFPRINT_STATUS (proc_flags (pi),
c3f6f71d 1501 proc_why (pi),
19958708 1502 proc_what (pi),
c3f6f71d
JM
1503 proc_get_current_thread (pi));
1504 }
c906108c
SS
1505#endif
1506
c3f6f71d 1507 return win;
c906108c
SS
1508}
1509
77382aee
PA
1510/* Make the process or LWP runnable.
1511
1512 Options (not all are implemented):
1513 - single-step
1514 - clear current fault
1515 - clear current signal
1516 - abort the current system call
1517 - stop as soon as finished with system call
1518 - (ioctl): set traced signal set
1519 - (ioctl): set held signal set
1520 - (ioctl): set traced fault set
1521 - (ioctl): set start pc (vaddr)
1522
1523 Always clears the current fault. PI is the process or LWP to
1524 operate on. If STEP is true, set the process or LWP to trap after
1525 one instruction. If SIGNO is zero, clear the current signal if
1526 any; if non-zero, set the current signal to this one. Returns
1527 non-zero for success, zero for failure. */
c3f6f71d 1528
d3581e61 1529static int
fba45db2 1530proc_run_process (procinfo *pi, int step, int signo)
c3f6f71d
JM
1531{
1532 int win;
1533 int runflags;
1534
77382aee
PA
1535 /* We will probably have to apply this operation to individual
1536 threads, so make sure the control file descriptor is open. */
19958708 1537
c3f6f71d
JM
1538 if (pi->ctl_fd == 0 &&
1539 open_procinfo_files (pi, FD_CTL) == 0)
1540 {
1541 return 0;
1542 }
c906108c 1543
0df8b418 1544 runflags = PRCFAULT; /* Always clear current fault. */
c3f6f71d
JM
1545 if (step)
1546 runflags |= PRSTEP;
1547 if (signo == 0)
1548 runflags |= PRCSIG;
0df8b418 1549 else if (signo != -1) /* -1 means do nothing W.R.T. signals. */
c3f6f71d 1550 proc_set_current_signal (pi, signo);
c5aa993b 1551
c3f6f71d
JM
1552#ifdef NEW_PROC_API
1553 {
37de36c6 1554 procfs_ctl_t cmd[2];
c906108c 1555
c3f6f71d
JM
1556 cmd[0] = PCRUN;
1557 cmd[1] = runflags;
1558 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
1559 }
1560#else /* ioctl method */
1561 {
1562 prrun_t prrun;
c906108c 1563
c3f6f71d
JM
1564 memset (&prrun, 0, sizeof (prrun));
1565 prrun.pr_flags = runflags;
1566 win = (ioctl (pi->ctl_fd, PIOCRUN, &prrun) >= 0);
1567 }
1568#endif
c906108c 1569
c3f6f71d
JM
1570 return win;
1571}
c906108c 1572
77382aee
PA
1573/* Register to trace signals in the process or LWP. Returns non-zero
1574 for success, zero for failure. */
c906108c 1575
d3581e61 1576static int
37de36c6 1577proc_set_traced_signals (procinfo *pi, gdb_sigset_t *sigset)
c906108c 1578{
c3f6f71d
JM
1579 int win;
1580
77382aee
PA
1581 /* We should never have to apply this operation to any procinfo
1582 except the one for the main process. If that ever changes for
1583 any reason, then take out the following clause and replace it
1584 with one that makes sure the ctl_fd is open. */
19958708 1585
c3f6f71d
JM
1586 if (pi->tid != 0)
1587 pi = find_procinfo_or_die (pi->pid, 0);
1588
1589#ifdef NEW_PROC_API
1590 {
1591 struct {
37de36c6 1592 procfs_ctl_t cmd;
c3f6f71d 1593 /* Use char array to avoid alignment issues. */
37de36c6 1594 char sigset[sizeof (gdb_sigset_t)];
c3f6f71d 1595 } arg;
c906108c 1596
c3f6f71d 1597 arg.cmd = PCSTRACE;
37de36c6 1598 memcpy (&arg.sigset, sigset, sizeof (gdb_sigset_t));
c906108c 1599
c3f6f71d
JM
1600 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
1601 }
1602#else /* ioctl method */
1603 win = (ioctl (pi->ctl_fd, PIOCSTRACE, sigset) >= 0);
1604#endif
0df8b418 1605 /* The above operation renders the procinfo's cached pstatus obsolete. */
c3f6f71d 1606 pi->status_valid = 0;
c906108c 1607
c3f6f71d 1608 if (!win)
8a3fe4f8 1609 warning (_("procfs: set_traced_signals failed"));
c3f6f71d 1610 return win;
c906108c
SS
1611}
1612
77382aee
PA
1613/* Register to trace hardware faults in the process or LWP. Returns
1614 non-zero for success, zero for failure. */
c906108c 1615
d3581e61 1616static int
fba45db2 1617proc_set_traced_faults (procinfo *pi, fltset_t *fltset)
c3f6f71d
JM
1618{
1619 int win;
1620
77382aee
PA
1621 /* We should never have to apply this operation to any procinfo
1622 except the one for the main process. If that ever changes for
1623 any reason, then take out the following clause and replace it
1624 with one that makes sure the ctl_fd is open. */
19958708 1625
c3f6f71d
JM
1626 if (pi->tid != 0)
1627 pi = find_procinfo_or_die (pi->pid, 0);
1628
1629#ifdef NEW_PROC_API
1630 {
1631 struct {
37de36c6 1632 procfs_ctl_t cmd;
c3f6f71d
JM
1633 /* Use char array to avoid alignment issues. */
1634 char fltset[sizeof (fltset_t)];
1635 } arg;
c906108c 1636
c3f6f71d
JM
1637 arg.cmd = PCSFAULT;
1638 memcpy (&arg.fltset, fltset, sizeof (fltset_t));
c906108c 1639
c3f6f71d
JM
1640 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
1641 }
1642#else /* ioctl method */
1643 win = (ioctl (pi->ctl_fd, PIOCSFAULT, fltset) >= 0);
1644#endif
0df8b418 1645 /* The above operation renders the procinfo's cached pstatus obsolete. */
c3f6f71d 1646 pi->status_valid = 0;
c906108c 1647
c3f6f71d
JM
1648 return win;
1649}
c5aa993b 1650
77382aee
PA
1651/* Register to trace entry to system calls in the process or LWP.
1652 Returns non-zero for success, zero for failure. */
c906108c 1653
d3581e61 1654static int
fba45db2 1655proc_set_traced_sysentry (procinfo *pi, sysset_t *sysset)
c906108c 1656{
c3f6f71d
JM
1657 int win;
1658
77382aee
PA
1659 /* We should never have to apply this operation to any procinfo
1660 except the one for the main process. If that ever changes for
1661 any reason, then take out the following clause and replace it
1662 with one that makes sure the ctl_fd is open. */
19958708 1663
c3f6f71d
JM
1664 if (pi->tid != 0)
1665 pi = find_procinfo_or_die (pi->pid, 0);
1666
1667#ifdef NEW_PROC_API
1668 {
37de36c6
KB
1669 struct gdb_proc_ctl_pcsentry {
1670 procfs_ctl_t cmd;
c3f6f71d
JM
1671 /* Use char array to avoid alignment issues. */
1672 char sysset[sizeof (sysset_t)];
37de36c6
KB
1673 } *argp;
1674 int argp_size = sizeof (struct gdb_proc_ctl_pcsentry)
77382aee 1675 - sizeof (sysset_t)
37de36c6 1676 + sysset_t_size (pi);
c3f6f71d 1677
b196bc4c 1678 argp = (struct gdb_proc_ctl_pcsentry *) xmalloc (argp_size);
c3f6f71d 1679
37de36c6
KB
1680 argp->cmd = PCSENTRY;
1681 memcpy (&argp->sysset, sysset, sysset_t_size (pi));
1682
1683 win = (write (pi->ctl_fd, (char *) argp, argp_size) == argp_size);
1684 xfree (argp);
c3f6f71d
JM
1685 }
1686#else /* ioctl method */
1687 win = (ioctl (pi->ctl_fd, PIOCSENTRY, sysset) >= 0);
1688#endif
77382aee
PA
1689 /* The above operation renders the procinfo's cached pstatus
1690 obsolete. */
c3f6f71d 1691 pi->status_valid = 0;
19958708 1692
c3f6f71d 1693 return win;
c906108c
SS
1694}
1695
77382aee
PA
1696/* Register to trace exit from system calls in the process or LWP.
1697 Returns non-zero for success, zero for failure. */
c906108c 1698
d3581e61 1699static int
fba45db2 1700proc_set_traced_sysexit (procinfo *pi, sysset_t *sysset)
c3f6f71d
JM
1701{
1702 int win;
1703
77382aee
PA
1704 /* We should never have to apply this operation to any procinfo
1705 except the one for the main process. If that ever changes for
1706 any reason, then take out the following clause and replace it
1707 with one that makes sure the ctl_fd is open. */
19958708 1708
c3f6f71d
JM
1709 if (pi->tid != 0)
1710 pi = find_procinfo_or_die (pi->pid, 0);
1711
1712#ifdef NEW_PROC_API
1713 {
37de36c6
KB
1714 struct gdb_proc_ctl_pcsexit {
1715 procfs_ctl_t cmd;
c3f6f71d
JM
1716 /* Use char array to avoid alignment issues. */
1717 char sysset[sizeof (sysset_t)];
37de36c6
KB
1718 } *argp;
1719 int argp_size = sizeof (struct gdb_proc_ctl_pcsexit)
77382aee 1720 - sizeof (sysset_t)
37de36c6 1721 + sysset_t_size (pi);
c906108c 1722
b196bc4c 1723 argp = (struct gdb_proc_ctl_pcsexit *) xmalloc (argp_size);
c906108c 1724
37de36c6
KB
1725 argp->cmd = PCSEXIT;
1726 memcpy (&argp->sysset, sysset, sysset_t_size (pi));
1727
1728 win = (write (pi->ctl_fd, (char *) argp, argp_size) == argp_size);
1729 xfree (argp);
c3f6f71d
JM
1730 }
1731#else /* ioctl method */
1732 win = (ioctl (pi->ctl_fd, PIOCSEXIT, sysset) >= 0);
1733#endif
77382aee
PA
1734 /* The above operation renders the procinfo's cached pstatus
1735 obsolete. */
c3f6f71d 1736 pi->status_valid = 0;
c906108c 1737
c3f6f71d
JM
1738 return win;
1739}
c906108c 1740
77382aee
PA
1741/* Specify the set of blocked / held signals in the process or LWP.
1742 Returns non-zero for success, zero for failure. */
c906108c 1743
d3581e61 1744static int
37de36c6 1745proc_set_held_signals (procinfo *pi, gdb_sigset_t *sighold)
c906108c 1746{
c3f6f71d
JM
1747 int win;
1748
77382aee
PA
1749 /* We should never have to apply this operation to any procinfo
1750 except the one for the main process. If that ever changes for
1751 any reason, then take out the following clause and replace it
1752 with one that makes sure the ctl_fd is open. */
19958708 1753
c3f6f71d
JM
1754 if (pi->tid != 0)
1755 pi = find_procinfo_or_die (pi->pid, 0);
1756
1757#ifdef NEW_PROC_API
1758 {
1759 struct {
37de36c6 1760 procfs_ctl_t cmd;
c3f6f71d 1761 /* Use char array to avoid alignment issues. */
37de36c6 1762 char hold[sizeof (gdb_sigset_t)];
c3f6f71d
JM
1763 } arg;
1764
1765 arg.cmd = PCSHOLD;
37de36c6 1766 memcpy (&arg.hold, sighold, sizeof (gdb_sigset_t));
c3f6f71d
JM
1767 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
1768 }
c906108c 1769#else
c3f6f71d 1770 win = (ioctl (pi->ctl_fd, PIOCSHOLD, sighold) >= 0);
c906108c 1771#endif
77382aee
PA
1772 /* The above operation renders the procinfo's cached pstatus
1773 obsolete. */
c3f6f71d
JM
1774 pi->status_valid = 0;
1775
1776 return win;
c906108c
SS
1777}
1778
77382aee
PA
1779/* Returns the set of signals that are held / blocked. Will also copy
1780 the sigset if SAVE is non-zero. */
c906108c 1781
d3581e61 1782static gdb_sigset_t *
37de36c6 1783proc_get_held_signals (procinfo *pi, gdb_sigset_t *save)
c906108c 1784{
37de36c6 1785 gdb_sigset_t *ret = NULL;
c3f6f71d 1786
77382aee
PA
1787 /* We should never have to apply this operation to any procinfo
1788 except the one for the main process. If that ever changes for
1789 any reason, then take out the following clause and replace it
1790 with one that makes sure the ctl_fd is open. */
19958708 1791
c3f6f71d
JM
1792 if (pi->tid != 0)
1793 pi = find_procinfo_or_die (pi->pid, 0);
1794
1795#ifdef NEW_PROC_API
1796 if (!pi->status_valid)
1797 if (!proc_get_status (pi))
1798 return NULL;
1799
c3f6f71d 1800 ret = &pi->prstatus.pr_lwp.pr_lwphold;
c3f6f71d
JM
1801#else /* not NEW_PROC_API */
1802 {
37de36c6 1803 static gdb_sigset_t sigheld;
c3f6f71d
JM
1804
1805 if (ioctl (pi->ctl_fd, PIOCGHOLD, &sigheld) >= 0)
1806 ret = &sigheld;
1807 }
1808#endif /* NEW_PROC_API */
1809 if (save && ret)
37de36c6 1810 memcpy (save, ret, sizeof (gdb_sigset_t));
c3f6f71d
JM
1811
1812 return ret;
c906108c
SS
1813}
1814
77382aee
PA
1815/* Returns the set of signals that are traced / debugged. Will also
1816 copy the sigset if SAVE is non-zero. */
c3f6f71d 1817
d3581e61 1818static gdb_sigset_t *
37de36c6 1819proc_get_traced_signals (procinfo *pi, gdb_sigset_t *save)
c906108c 1820{
37de36c6 1821 gdb_sigset_t *ret = NULL;
c3f6f71d 1822
77382aee
PA
1823 /* We should never have to apply this operation to any procinfo
1824 except the one for the main process. If that ever changes for
1825 any reason, then take out the following clause and replace it
1826 with one that makes sure the ctl_fd is open. */
19958708 1827
c3f6f71d
JM
1828 if (pi->tid != 0)
1829 pi = find_procinfo_or_die (pi->pid, 0);
1830
1831#ifdef NEW_PROC_API
1832 if (!pi->status_valid)
1833 if (!proc_get_status (pi))
1834 return NULL;
1835
1836 ret = &pi->prstatus.pr_sigtrace;
1837#else
1838 {
37de36c6 1839 static gdb_sigset_t sigtrace;
c3f6f71d
JM
1840
1841 if (ioctl (pi->ctl_fd, PIOCGTRACE, &sigtrace) >= 0)
1842 ret = &sigtrace;
1843 }
c906108c 1844#endif
c3f6f71d 1845 if (save && ret)
37de36c6 1846 memcpy (save, ret, sizeof (gdb_sigset_t));
c906108c 1847
c3f6f71d
JM
1848 return ret;
1849}
c906108c 1850
77382aee
PA
1851/* Returns the set of hardware faults that are traced /debugged. Will
1852 also copy the faultset if SAVE is non-zero. */
c3f6f71d 1853
d3581e61 1854static fltset_t *
fba45db2 1855proc_get_traced_faults (procinfo *pi, fltset_t *save)
c3f6f71d
JM
1856{
1857 fltset_t *ret = NULL;
1858
77382aee
PA
1859 /* We should never have to apply this operation to any procinfo
1860 except the one for the main process. If that ever changes for
1861 any reason, then take out the following clause and replace it
1862 with one that makes sure the ctl_fd is open. */
19958708 1863
c3f6f71d
JM
1864 if (pi->tid != 0)
1865 pi = find_procinfo_or_die (pi->pid, 0);
1866
1867#ifdef NEW_PROC_API
1868 if (!pi->status_valid)
1869 if (!proc_get_status (pi))
1870 return NULL;
1871
1872 ret = &pi->prstatus.pr_flttrace;
1873#else
1874 {
1875 static fltset_t flttrace;
1876
1877 if (ioctl (pi->ctl_fd, PIOCGFAULT, &flttrace) >= 0)
1878 ret = &flttrace;
1879 }
1880#endif
1881 if (save && ret)
1882 memcpy (save, ret, sizeof (fltset_t));
c906108c 1883
c3f6f71d
JM
1884 return ret;
1885}
c906108c 1886
77382aee
PA
1887/* Returns the set of syscalls that are traced /debugged on entry.
1888 Will also copy the syscall set if SAVE is non-zero. */
c906108c 1889
d3581e61 1890static sysset_t *
fba45db2 1891proc_get_traced_sysentry (procinfo *pi, sysset_t *save)
c3f6f71d
JM
1892{
1893 sysset_t *ret = NULL;
1894
77382aee
PA
1895 /* We should never have to apply this operation to any procinfo
1896 except the one for the main process. If that ever changes for
1897 any reason, then take out the following clause and replace it
1898 with one that makes sure the ctl_fd is open. */
19958708 1899
c3f6f71d
JM
1900 if (pi->tid != 0)
1901 pi = find_procinfo_or_die (pi->pid, 0);
1902
1903#ifdef NEW_PROC_API
1904 if (!pi->status_valid)
1905 if (!proc_get_status (pi))
1906 return NULL;
1907
37de36c6 1908#ifndef DYNAMIC_SYSCALLS
c3f6f71d 1909 ret = &pi->prstatus.pr_sysentry;
37de36c6
KB
1910#else /* DYNAMIC_SYSCALLS */
1911 {
1912 static sysset_t *sysentry;
1913 size_t size;
1914
1915 if (!sysentry)
1916 sysentry = sysset_t_alloc (pi);
1917 ret = sysentry;
1918 if (pi->status_fd == 0 && open_procinfo_files (pi, FD_STATUS) == 0)
1919 return NULL;
1920 if (pi->prstatus.pr_sysentry_offset == 0)
1921 {
1922 gdb_premptysysset (sysentry);
1923 }
1924 else
1925 {
1926 int rsize;
1927
1928 if (lseek (pi->status_fd, (off_t) pi->prstatus.pr_sysentry_offset,
77382aee 1929 SEEK_SET)
37de36c6
KB
1930 != (off_t) pi->prstatus.pr_sysentry_offset)
1931 return NULL;
1932 size = sysset_t_size (pi);
1933 gdb_premptysysset (sysentry);
1934 rsize = read (pi->status_fd, sysentry, size);
1935 if (rsize < 0)
1936 return NULL;
1937 }
1938 }
1939#endif /* DYNAMIC_SYSCALLS */
1940#else /* !NEW_PROC_API */
c3f6f71d
JM
1941 {
1942 static sysset_t sysentry;
c906108c 1943
c3f6f71d
JM
1944 if (ioctl (pi->ctl_fd, PIOCGENTRY, &sysentry) >= 0)
1945 ret = &sysentry;
1946 }
37de36c6 1947#endif /* NEW_PROC_API */
c3f6f71d 1948 if (save && ret)
37de36c6 1949 memcpy (save, ret, sysset_t_size (pi));
c906108c 1950
c3f6f71d
JM
1951 return ret;
1952}
c5aa993b 1953
77382aee
PA
1954/* Returns the set of syscalls that are traced /debugged on exit.
1955 Will also copy the syscall set if SAVE is non-zero. */
c906108c 1956
d3581e61 1957static sysset_t *
fba45db2 1958proc_get_traced_sysexit (procinfo *pi, sysset_t *save)
c906108c 1959{
c3f6f71d
JM
1960 sysset_t * ret = NULL;
1961
77382aee
PA
1962 /* We should never have to apply this operation to any procinfo
1963 except the one for the main process. If that ever changes for
1964 any reason, then take out the following clause and replace it
1965 with one that makes sure the ctl_fd is open. */
19958708 1966
c3f6f71d
JM
1967 if (pi->tid != 0)
1968 pi = find_procinfo_or_die (pi->pid, 0);
1969
1970#ifdef NEW_PROC_API
1971 if (!pi->status_valid)
1972 if (!proc_get_status (pi))
1973 return NULL;
1974
37de36c6 1975#ifndef DYNAMIC_SYSCALLS
c3f6f71d 1976 ret = &pi->prstatus.pr_sysexit;
37de36c6
KB
1977#else /* DYNAMIC_SYSCALLS */
1978 {
1979 static sysset_t *sysexit;
1980 size_t size;
1981
1982 if (!sysexit)
1983 sysexit = sysset_t_alloc (pi);
1984 ret = sysexit;
1985 if (pi->status_fd == 0 && open_procinfo_files (pi, FD_STATUS) == 0)
1986 return NULL;
1987 if (pi->prstatus.pr_sysexit_offset == 0)
1988 {
1989 gdb_premptysysset (sysexit);
1990 }
1991 else
1992 {
1993 int rsize;
1994
77382aee
PA
1995 if (lseek (pi->status_fd, (off_t) pi->prstatus.pr_sysexit_offset,
1996 SEEK_SET)
37de36c6
KB
1997 != (off_t) pi->prstatus.pr_sysexit_offset)
1998 return NULL;
1999 size = sysset_t_size (pi);
2000 gdb_premptysysset (sysexit);
2001 rsize = read (pi->status_fd, sysexit, size);
2002 if (rsize < 0)
2003 return NULL;
2004 }
2005 }
2006#endif /* DYNAMIC_SYSCALLS */
c3f6f71d
JM
2007#else
2008 {
2009 static sysset_t sysexit;
c5aa993b 2010
c3f6f71d
JM
2011 if (ioctl (pi->ctl_fd, PIOCGEXIT, &sysexit) >= 0)
2012 ret = &sysexit;
2013 }
2014#endif
2015 if (save && ret)
37de36c6 2016 memcpy (save, ret, sysset_t_size (pi));
c3f6f71d
JM
2017
2018 return ret;
2019}
c906108c 2020
77382aee
PA
2021/* The current fault (if any) is cleared; the associated signal will
2022 not be sent to the process or LWP when it resumes. Returns
2023 non-zero for success, zero for failure. */
c906108c 2024
d3581e61 2025static int
fba45db2 2026proc_clear_current_fault (procinfo *pi)
c3f6f71d
JM
2027{
2028 int win;
2029
77382aee
PA
2030 /* We should never have to apply this operation to any procinfo
2031 except the one for the main process. If that ever changes for
2032 any reason, then take out the following clause and replace it
2033 with one that makes sure the ctl_fd is open. */
19958708 2034
c3f6f71d
JM
2035 if (pi->tid != 0)
2036 pi = find_procinfo_or_die (pi->pid, 0);
2037
2038#ifdef NEW_PROC_API
2039 {
37de36c6 2040 procfs_ctl_t cmd = PCCFAULT;
f4a14ae6 2041
c3f6f71d
JM
2042 win = (write (pi->ctl_fd, (void *) &cmd, sizeof (cmd)) == sizeof (cmd));
2043 }
2044#else
2045 win = (ioctl (pi->ctl_fd, PIOCCFAULT, 0) >= 0);
2046#endif
2047
2048 return win;
c906108c
SS
2049}
2050
77382aee
PA
2051/* Set the "current signal" that will be delivered next to the
2052 process. NOTE: semantics are different from those of KILL. This
2053 signal will be delivered to the process or LWP immediately when it
2054 is resumed (even if the signal is held/blocked); it will NOT
2055 immediately cause another event of interest, and will NOT first
2056 trap back to the debugger. Returns non-zero for success, zero for
2057 failure. */
c3f6f71d 2058
d3581e61 2059static int
fba45db2 2060proc_set_current_signal (procinfo *pi, int signo)
c3f6f71d
JM
2061{
2062 int win;
2063 struct {
37de36c6 2064 procfs_ctl_t cmd;
c3f6f71d 2065 /* Use char array to avoid alignment issues. */
37de36c6 2066 char sinfo[sizeof (gdb_siginfo_t)];
c3f6f71d 2067 } arg;
73930d4d 2068 gdb_siginfo_t mysinfo;
c162e8c9
JM
2069 ptid_t wait_ptid;
2070 struct target_waitstatus wait_status;
c3f6f71d 2071
77382aee
PA
2072 /* We should never have to apply this operation to any procinfo
2073 except the one for the main process. If that ever changes for
2074 any reason, then take out the following clause and replace it
2075 with one that makes sure the ctl_fd is open. */
19958708 2076
c3f6f71d
JM
2077 if (pi->tid != 0)
2078 pi = find_procinfo_or_die (pi->pid, 0);
2079
2080#ifdef PROCFS_DONT_PIOCSSIG_CURSIG
2081 /* With Alpha OSF/1 procfs, the kernel gets really confused if it
77382aee
PA
2082 receives a PIOCSSIG with a signal identical to the current
2083 signal, it messes up the current signal. Work around the kernel
2084 bug. */
c3f6f71d
JM
2085 if (signo > 0 &&
2086 signo == proc_cursig (pi))
0df8b418 2087 return 1; /* I assume this is a success? */
c3f6f71d
JM
2088#endif
2089
2090 /* The pointer is just a type alias. */
c162e8c9
JM
2091 get_last_target_status (&wait_ptid, &wait_status);
2092 if (ptid_equal (wait_ptid, inferior_ptid)
2093 && wait_status.kind == TARGET_WAITKIND_STOPPED
2ea28649 2094 && wait_status.value.sig == gdb_signal_from_host (signo)
c162e8c9
JM
2095 && proc_get_status (pi)
2096#ifdef NEW_PROC_API
2097 && pi->prstatus.pr_lwp.pr_info.si_signo == signo
2098#else
2099 && pi->prstatus.pr_info.si_signo == signo
2100#endif
2101 )
2102 /* Use the siginfo associated with the signal being
2103 redelivered. */
2104#ifdef NEW_PROC_API
73930d4d 2105 memcpy (arg.sinfo, &pi->prstatus.pr_lwp.pr_info, sizeof (gdb_siginfo_t));
c162e8c9 2106#else
73930d4d 2107 memcpy (arg.sinfo, &pi->prstatus.pr_info, sizeof (gdb_siginfo_t));
c162e8c9
JM
2108#endif
2109 else
2110 {
73930d4d
KH
2111 mysinfo.si_signo = signo;
2112 mysinfo.si_code = 0;
2113 mysinfo.si_pid = getpid (); /* ?why? */
2114 mysinfo.si_uid = getuid (); /* ?why? */
2115 memcpy (arg.sinfo, &mysinfo, sizeof (gdb_siginfo_t));
c162e8c9 2116 }
c3f6f71d
JM
2117
2118#ifdef NEW_PROC_API
2119 arg.cmd = PCSSIG;
2120 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
2121#else
2122 win = (ioctl (pi->ctl_fd, PIOCSSIG, (void *) &arg.sinfo) >= 0);
2123#endif
c906108c 2124
c3f6f71d
JM
2125 return win;
2126}
c906108c 2127
77382aee
PA
2128/* The current signal (if any) is cleared, and is not sent to the
2129 process or LWP when it resumes. Returns non-zero for success, zero
2130 for failure. */
c906108c 2131
d3581e61 2132static int
fba45db2 2133proc_clear_current_signal (procinfo *pi)
c3f6f71d
JM
2134{
2135 int win;
2136
77382aee
PA
2137 /* We should never have to apply this operation to any procinfo
2138 except the one for the main process. If that ever changes for
2139 any reason, then take out the following clause and replace it
2140 with one that makes sure the ctl_fd is open. */
19958708 2141
c3f6f71d
JM
2142 if (pi->tid != 0)
2143 pi = find_procinfo_or_die (pi->pid, 0);
2144
2145#ifdef NEW_PROC_API
2146 {
2147 struct {
37de36c6 2148 procfs_ctl_t cmd;
c3f6f71d 2149 /* Use char array to avoid alignment issues. */
37de36c6 2150 char sinfo[sizeof (gdb_siginfo_t)];
c3f6f71d 2151 } arg;
73930d4d 2152 gdb_siginfo_t mysinfo;
c3f6f71d
JM
2153
2154 arg.cmd = PCSSIG;
2155 /* The pointer is just a type alias. */
73930d4d
KH
2156 mysinfo.si_signo = 0;
2157 mysinfo.si_code = 0;
2158 mysinfo.si_errno = 0;
2159 mysinfo.si_pid = getpid (); /* ?why? */
2160 mysinfo.si_uid = getuid (); /* ?why? */
2161 memcpy (arg.sinfo, &mysinfo, sizeof (gdb_siginfo_t));
c3f6f71d
JM
2162
2163 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
2164 }
2165#else
2166 win = (ioctl (pi->ctl_fd, PIOCSSIG, 0) >= 0);
2167#endif
c906108c 2168
c3f6f71d
JM
2169 return win;
2170}
c906108c 2171
772cf8be
MK
2172/* Return the general-purpose registers for the process or LWP
2173 corresponding to PI. Upon failure, return NULL. */
c906108c 2174
d3581e61 2175static gdb_gregset_t *
fba45db2 2176proc_get_gregs (procinfo *pi)
c3f6f71d
JM
2177{
2178 if (!pi->status_valid || !pi->gregs_valid)
2179 if (!proc_get_status (pi))
2180 return NULL;
2181
c3f6f71d 2182#ifdef NEW_PROC_API
c3f6f71d 2183 return &pi->prstatus.pr_lwp.pr_reg;
772cf8be 2184#else
c3f6f71d 2185 return &pi->prstatus.pr_reg;
772cf8be 2186#endif
c3f6f71d 2187}
c5aa993b 2188
772cf8be
MK
2189/* Return the general-purpose registers for the process or LWP
2190 corresponding to PI. Upon failure, return NULL. */
c906108c 2191
d3581e61 2192static gdb_fpregset_t *
fba45db2 2193proc_get_fpregs (procinfo *pi)
c906108c 2194{
c3f6f71d
JM
2195#ifdef NEW_PROC_API
2196 if (!pi->status_valid || !pi->fpregs_valid)
2197 if (!proc_get_status (pi))
2198 return NULL;
2199
c3f6f71d 2200 return &pi->prstatus.pr_lwp.pr_fpreg;
c5aa993b 2201
772cf8be 2202#else /* not NEW_PROC_API */
c3f6f71d 2203 if (pi->fpregs_valid)
772cf8be 2204 return &pi->fpregset; /* Already got 'em. */
c3f6f71d 2205 else
c906108c 2206 {
772cf8be 2207 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c906108c 2208 {
c3f6f71d 2209 return NULL;
c906108c 2210 }
c3f6f71d 2211 else
c906108c 2212 {
772cf8be 2213# ifdef PIOCTGFPREG
c3f6f71d
JM
2214 struct {
2215 long pr_count;
2216 tid_t pr_error_thread;
2217 tfpregset_t thread_1;
2218 } thread_fpregs;
2219
2220 thread_fpregs.pr_count = 1;
2221 thread_fpregs.thread_1.tid = pi->tid;
2222
772cf8be
MK
2223 if (pi->tid == 0
2224 && ioctl (pi->ctl_fd, PIOCGFPREG, &pi->fpregset) >= 0)
c3f6f71d
JM
2225 {
2226 pi->fpregs_valid = 1;
772cf8be 2227 return &pi->fpregset; /* Got 'em now! */
c3f6f71d 2228 }
772cf8be
MK
2229 else if (pi->tid != 0
2230 && ioctl (pi->ctl_fd, PIOCTGFPREG, &thread_fpregs) >= 0)
c3f6f71d
JM
2231 {
2232 memcpy (&pi->fpregset, &thread_fpregs.thread_1.pr_fpregs,
2233 sizeof (pi->fpregset));
2234 pi->fpregs_valid = 1;
772cf8be 2235 return &pi->fpregset; /* Got 'em now! */
c3f6f71d
JM
2236 }
2237 else
2238 {
2239 return NULL;
2240 }
772cf8be 2241# else
c3f6f71d
JM
2242 if (ioctl (pi->ctl_fd, PIOCGFPREG, &pi->fpregset) >= 0)
2243 {
2244 pi->fpregs_valid = 1;
772cf8be 2245 return &pi->fpregset; /* Got 'em now! */
c3f6f71d
JM
2246 }
2247 else
2248 {
2249 return NULL;
2250 }
772cf8be 2251# endif
c906108c 2252 }
c906108c 2253 }
772cf8be 2254#endif /* NEW_PROC_API */
c906108c
SS
2255}
2256
772cf8be
MK
2257/* Write the general-purpose registers back to the process or LWP
2258 corresponding to PI. Return non-zero for success, zero for
2259 failure. */
c3f6f71d 2260
d3581e61 2261static int
fba45db2 2262proc_set_gregs (procinfo *pi)
c906108c 2263{
c3f6f71d
JM
2264 gdb_gregset_t *gregs;
2265 int win;
c5aa993b 2266
772cf8be
MK
2267 gregs = proc_get_gregs (pi);
2268 if (gregs == NULL)
2269 return 0; /* proc_get_regs has already warned. */
c3f6f71d 2270
772cf8be 2271 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c906108c 2272 {
c3f6f71d 2273 return 0;
c906108c 2274 }
c3f6f71d 2275 else
c906108c 2276 {
c3f6f71d
JM
2277#ifdef NEW_PROC_API
2278 struct {
37de36c6 2279 procfs_ctl_t cmd;
c3f6f71d
JM
2280 /* Use char array to avoid alignment issues. */
2281 char gregs[sizeof (gdb_gregset_t)];
2282 } arg;
2283
772cf8be 2284 arg.cmd = PCSREG;
c3f6f71d
JM
2285 memcpy (&arg.gregs, gregs, sizeof (arg.gregs));
2286 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
2287#else
2288 win = (ioctl (pi->ctl_fd, PIOCSREG, gregs) >= 0);
2289#endif
c906108c 2290 }
c3f6f71d 2291
772cf8be 2292 /* Policy: writing the registers invalidates our cache. */
c3f6f71d
JM
2293 pi->gregs_valid = 0;
2294 return win;
c906108c
SS
2295}
2296
772cf8be
MK
2297/* Write the floating-pointer registers back to the process or LWP
2298 corresponding to PI. Return non-zero for success, zero for
2299 failure. */
c3f6f71d 2300
d3581e61 2301static int
fba45db2 2302proc_set_fpregs (procinfo *pi)
c906108c 2303{
c3f6f71d
JM
2304 gdb_fpregset_t *fpregs;
2305 int win;
2306
772cf8be
MK
2307 fpregs = proc_get_fpregs (pi);
2308 if (fpregs == NULL)
2309 return 0; /* proc_get_fpregs has already warned. */
c5aa993b 2310
772cf8be 2311 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c906108c 2312 {
c3f6f71d 2313 return 0;
c906108c 2314 }
c3f6f71d 2315 else
c906108c 2316 {
c3f6f71d
JM
2317#ifdef NEW_PROC_API
2318 struct {
37de36c6 2319 procfs_ctl_t cmd;
c3f6f71d
JM
2320 /* Use char array to avoid alignment issues. */
2321 char fpregs[sizeof (gdb_fpregset_t)];
2322 } arg;
2323
772cf8be 2324 arg.cmd = PCSFPREG;
c3f6f71d
JM
2325 memcpy (&arg.fpregs, fpregs, sizeof (arg.fpregs));
2326 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
2327#else
772cf8be 2328# ifdef PIOCTSFPREG
c3f6f71d
JM
2329 if (pi->tid == 0)
2330 win = (ioctl (pi->ctl_fd, PIOCSFPREG, fpregs) >= 0);
2331 else
2332 {
2333 struct {
2334 long pr_count;
2335 tid_t pr_error_thread;
2336 tfpregset_t thread_1;
2337 } thread_fpregs;
2338
2339 thread_fpregs.pr_count = 1;
2340 thread_fpregs.thread_1.tid = pi->tid;
2341 memcpy (&thread_fpregs.thread_1.pr_fpregs, fpregs,
2342 sizeof (*fpregs));
2343 win = (ioctl (pi->ctl_fd, PIOCTSFPREG, &thread_fpregs) >= 0);
2344 }
772cf8be 2345# else
c3f6f71d 2346 win = (ioctl (pi->ctl_fd, PIOCSFPREG, fpregs) >= 0);
772cf8be
MK
2347# endif
2348#endif /* NEW_PROC_API */
c906108c 2349 }
c3f6f71d 2350
772cf8be 2351 /* Policy: writing the registers invalidates our cache. */
c3f6f71d
JM
2352 pi->fpregs_valid = 0;
2353 return win;
c906108c
SS
2354}
2355
77382aee
PA
2356/* Send a signal to the proc or lwp with the semantics of "kill()".
2357 Returns non-zero for success, zero for failure. */
c906108c 2358
d3581e61 2359static int
fba45db2 2360proc_kill (procinfo *pi, int signo)
c3f6f71d
JM
2361{
2362 int win;
c906108c 2363
77382aee
PA
2364 /* We might conceivably apply this operation to an LWP, and the
2365 LWP's ctl file descriptor might not be open. */
c906108c 2366
c3f6f71d
JM
2367 if (pi->ctl_fd == 0 &&
2368 open_procinfo_files (pi, FD_CTL) == 0)
2369 {
2370 return 0;
2371 }
2372 else
2373 {
2374#ifdef NEW_PROC_API
37de36c6 2375 procfs_ctl_t cmd[2];
c906108c 2376
c3f6f71d
JM
2377 cmd[0] = PCKILL;
2378 cmd[1] = signo;
2379 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
2380#else /* ioctl method */
2381 /* FIXME: do I need the Alpha OSF fixups present in
0df8b418 2382 procfs.c/unconditionally_kill_inferior? Perhaps only for SIGKILL? */
c3f6f71d
JM
2383 win = (ioctl (pi->ctl_fd, PIOCKILL, &signo) >= 0);
2384#endif
2385 }
c906108c 2386
c3f6f71d
JM
2387 return win;
2388}
c906108c 2389
77382aee
PA
2390/* Find the pid of the process that started this one. Returns the
2391 parent process pid, or zero. */
c906108c 2392
d3581e61 2393static int
fba45db2 2394proc_parent_pid (procinfo *pi)
c906108c 2395{
77382aee
PA
2396 /* We should never have to apply this operation to any procinfo
2397 except the one for the main process. If that ever changes for
2398 any reason, then take out the following clause and replace it
2399 with one that makes sure the ctl_fd is open. */
19958708 2400
c3f6f71d
JM
2401 if (pi->tid != 0)
2402 pi = find_procinfo_or_die (pi->pid, 0);
2403
2404 if (!pi->status_valid)
2405 if (!proc_get_status (pi))
2406 return 0;
c5aa993b 2407
c3f6f71d
JM
2408 return pi->prstatus.pr_ppid;
2409}
2410
9a043c1d
AC
2411/* Convert a target address (a.k.a. CORE_ADDR) into a host address
2412 (a.k.a void pointer)! */
2413
1ca8fce0 2414#if (defined (PCWATCH) || defined (PIOCSWATCH)) \
05b4bd79 2415 && !(defined (PIOCOPENLWP))
9a043c1d
AC
2416static void *
2417procfs_address_to_host_pointer (CORE_ADDR addr)
2418{
f5656ead 2419 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
9a043c1d
AC
2420 void *ptr;
2421
4e906f53 2422 gdb_assert (sizeof (ptr) == TYPE_LENGTH (ptr_type));
f5656ead 2423 gdbarch_address_to_pointer (target_gdbarch (), ptr_type,
0b62613e 2424 (gdb_byte *) &ptr, addr);
9a043c1d
AC
2425 return ptr;
2426}
1ca8fce0 2427#endif
9a043c1d 2428
a0911fd0 2429static int
fba45db2 2430proc_set_watchpoint (procinfo *pi, CORE_ADDR addr, int len, int wflags)
c3f6f71d 2431{
d1a7880c
PA
2432#if !defined (PCWATCH) && !defined (PIOCSWATCH)
2433 /* If neither or these is defined, we can't support watchpoints.
2434 This just avoids possibly failing to compile the below on such
2435 systems. */
c3f6f71d
JM
2436 return 0;
2437#else
0df8b418 2438/* Horrible hack! Detect Solaris 2.5, because this doesn't work on 2.5. */
05b4bd79 2439#if defined (PIOCOPENLWP) /* Solaris 2.5: bail out. */
c3f6f71d
JM
2440 return 0;
2441#else
2442 struct {
37de36c6 2443 procfs_ctl_t cmd;
c3f6f71d
JM
2444 char watch[sizeof (prwatch_t)];
2445 } arg;
73930d4d 2446 prwatch_t pwatch;
c3f6f71d 2447
9a043c1d
AC
2448 /* NOTE: cagney/2003-02-01: Even more horrible hack. Need to
2449 convert a target address into something that can be stored in a
2450 native data structure. */
831e682e 2451#ifdef PCAGENT /* Horrible hack: only defined on Solaris 2.6+ */
73930d4d 2452 pwatch.pr_vaddr = (uintptr_t) procfs_address_to_host_pointer (addr);
831e682e 2453#else
73930d4d 2454 pwatch.pr_vaddr = (caddr_t) procfs_address_to_host_pointer (addr);
831e682e 2455#endif
73930d4d
KH
2456 pwatch.pr_size = len;
2457 pwatch.pr_wflags = wflags;
c3f6f71d
JM
2458#if defined(NEW_PROC_API) && defined (PCWATCH)
2459 arg.cmd = PCWATCH;
73930d4d 2460 memcpy (arg.watch, &pwatch, sizeof (prwatch_t));
c3f6f71d
JM
2461 return (write (pi->ctl_fd, &arg, sizeof (arg)) == sizeof (arg));
2462#else
2463#if defined (PIOCSWATCH)
73930d4d 2464 return (ioctl (pi->ctl_fd, PIOCSWATCH, &pwatch) >= 0);
c3f6f71d
JM
2465#else
2466 return 0; /* Fail */
2467#endif
2468#endif
2469#endif
2470#endif
c906108c
SS
2471}
2472
965b60ee 2473#if (defined(__i386__) || defined(__x86_64__)) && defined (sun)
c906108c 2474
c3f6f71d 2475#include <sys/sysi86.h>
c906108c 2476
77382aee
PA
2477/* The KEY is actually the value of the lower 16 bits of the GS
2478 register for the LWP that we're interested in. Returns the
2479 matching ssh struct (LDT entry). */
c906108c 2480
337c776f 2481static struct ssd *
fba45db2 2482proc_get_LDT_entry (procinfo *pi, int key)
c906108c 2483{
c3f6f71d
JM
2484 static struct ssd *ldt_entry = NULL;
2485#ifdef NEW_PROC_API
2486 char pathname[MAX_PROC_NAME_SIZE];
2487 struct cleanup *old_chain = NULL;
2488 int fd;
2489
2490 /* Allocate space for one LDT entry.
2491 This alloc must persist, because we return a pointer to it. */
2492 if (ldt_entry == NULL)
8d749320 2493 ldt_entry = XNEW (struct ssd);
c3f6f71d
JM
2494
2495 /* Open the file descriptor for the LDT table. */
2496 sprintf (pathname, "/proc/%d/ldt", pi->pid);
4d1bcd09 2497 if ((fd = open_with_retry (pathname, O_RDONLY)) < 0)
c906108c 2498 {
c3f6f71d
JM
2499 proc_warn (pi, "proc_get_LDT_entry (open)", __LINE__);
2500 return NULL;
c906108c 2501 }
0df8b418 2502 /* Make sure it gets closed again! */
004527cb 2503 old_chain = make_cleanup_close (fd);
c906108c 2504
c3f6f71d
JM
2505 /* Now 'read' thru the table, find a match and return it. */
2506 while (read (fd, ldt_entry, sizeof (struct ssd)) == sizeof (struct ssd))
c906108c 2507 {
c3f6f71d
JM
2508 if (ldt_entry->sel == 0 &&
2509 ldt_entry->bo == 0 &&
2510 ldt_entry->acc1 == 0 &&
2511 ldt_entry->acc2 == 0)
2512 break; /* end of table */
0df8b418 2513 /* If key matches, return this entry. */
c3f6f71d 2514 if (ldt_entry->sel == key)
b196bc4c
RO
2515 {
2516 do_cleanups (old_chain);
2517 return ldt_entry;
2518 }
c906108c 2519 }
0df8b418 2520 /* Loop ended, match not found. */
b196bc4c 2521 do_cleanups (old_chain);
c3f6f71d
JM
2522 return NULL;
2523#else
2524 int nldt, i;
2525 static int nalloc = 0;
c906108c 2526
c3f6f71d
JM
2527 /* Get the number of LDT entries. */
2528 if (ioctl (pi->ctl_fd, PIOCNLDT, &nldt) < 0)
c906108c 2529 {
c3f6f71d
JM
2530 proc_warn (pi, "proc_get_LDT_entry (PIOCNLDT)", __LINE__);
2531 return NULL;
c906108c
SS
2532 }
2533
0df8b418
MS
2534 /* Allocate space for the number of LDT entries. */
2535 /* This alloc has to persist, 'cause we return a pointer to it. */
c3f6f71d 2536 if (nldt > nalloc)
c906108c 2537 {
19958708 2538 ldt_entry = (struct ssd *)
c3f6f71d
JM
2539 xrealloc (ldt_entry, (nldt + 1) * sizeof (struct ssd));
2540 nalloc = nldt;
2541 }
19958708 2542
c3f6f71d
JM
2543 /* Read the whole table in one gulp. */
2544 if (ioctl (pi->ctl_fd, PIOCLDT, ldt_entry) < 0)
2545 {
2546 proc_warn (pi, "proc_get_LDT_entry (PIOCLDT)", __LINE__);
2547 return NULL;
c906108c
SS
2548 }
2549
0df8b418 2550 /* Search the table and return the (first) entry matching 'key'. */
c3f6f71d
JM
2551 for (i = 0; i < nldt; i++)
2552 if (ldt_entry[i].sel == key)
2553 return &ldt_entry[i];
c906108c 2554
0df8b418 2555 /* Loop ended, match not found. */
c3f6f71d
JM
2556 return NULL;
2557#endif
2558}
c906108c 2559
77382aee 2560/* Returns the pointer to the LDT entry of PTID. */
965b60ee
JB
2561
2562struct ssd *
2563procfs_find_LDT_entry (ptid_t ptid)
2564{
2565 gdb_gregset_t *gregs;
2566 int key;
2567 procinfo *pi;
2568
0df8b418 2569 /* Find procinfo for the lwp. */
dfd4cc63 2570 if ((pi = find_procinfo (ptid_get_pid (ptid), ptid_get_lwp (ptid))) == NULL)
965b60ee 2571 {
0b62613e 2572 warning (_("procfs_find_LDT_entry: could not find procinfo for %d:%ld."),
dfd4cc63 2573 ptid_get_pid (ptid), ptid_get_lwp (ptid));
965b60ee
JB
2574 return NULL;
2575 }
0df8b418 2576 /* get its general registers. */
965b60ee
JB
2577 if ((gregs = proc_get_gregs (pi)) == NULL)
2578 {
0b62613e 2579 warning (_("procfs_find_LDT_entry: could not read gregs for %d:%ld."),
dfd4cc63 2580 ptid_get_pid (ptid), ptid_get_lwp (ptid));
965b60ee
JB
2581 return NULL;
2582 }
0df8b418 2583 /* Now extract the GS register's lower 16 bits. */
965b60ee
JB
2584 key = (*gregs)[GS] & 0xffff;
2585
0df8b418 2586 /* Find the matching entry and return it. */
965b60ee
JB
2587 return proc_get_LDT_entry (pi, key);
2588}
2589
2590#endif
c906108c 2591
c3f6f71d 2592/* =============== END, non-thread part of /proc "MODULE" =============== */
c906108c 2593
c3f6f71d 2594/* =================== Thread "MODULE" =================== */
c906108c 2595
c3f6f71d
JM
2596/* NOTE: you'll see more ifdefs and duplication of functions here,
2597 since there is a different way to do threads on every OS. */
c906108c 2598
77382aee 2599/* Returns the number of threads for the process. */
c906108c 2600
c3f6f71d 2601#if defined (PIOCNTHR) && defined (PIOCTLIST)
77382aee 2602/* OSF version */
d3581e61 2603static int
fba45db2 2604proc_get_nthreads (procinfo *pi)
c3f6f71d
JM
2605{
2606 int nthreads = 0;
c906108c 2607
c3f6f71d
JM
2608 if (ioctl (pi->ctl_fd, PIOCNTHR, &nthreads) < 0)
2609 proc_warn (pi, "procfs: PIOCNTHR failed", __LINE__);
c906108c 2610
c3f6f71d 2611 return nthreads;
c906108c
SS
2612}
2613
c3f6f71d
JM
2614#else
2615#if defined (SYS_lwpcreate) || defined (SYS_lwp_create) /* FIXME: multiple */
05b4bd79 2616/* Solaris version */
d3581e61 2617static int
fba45db2 2618proc_get_nthreads (procinfo *pi)
c906108c 2619{
c3f6f71d
JM
2620 if (!pi->status_valid)
2621 if (!proc_get_status (pi))
2622 return 0;
c5aa993b 2623
77382aee
PA
2624 /* NEW_PROC_API: only works for the process procinfo, because the
2625 LWP procinfos do not get prstatus filled in. */
19958708 2626#ifdef NEW_PROC_API
0df8b418 2627 if (pi->tid != 0) /* Find the parent process procinfo. */
c3f6f71d 2628 pi = find_procinfo_or_die (pi->pid, 0);
c5aa993b 2629#endif
c3f6f71d 2630 return pi->prstatus.pr_nlwp;
c906108c
SS
2631}
2632
c3f6f71d 2633#else
77382aee 2634/* Default version */
d3581e61 2635static int
fba45db2 2636proc_get_nthreads (procinfo *pi)
c906108c 2637{
c3f6f71d
JM
2638 return 0;
2639}
2640#endif
2641#endif
2642
77382aee
PA
2643/* LWP version.
2644
2645 Return the ID of the thread that had an event of interest.
2646 (ie. the one that hit a breakpoint or other traced event). All
2647 other things being equal, this should be the ID of a thread that is
2648 currently executing. */
c3f6f71d
JM
2649
2650#if defined (SYS_lwpcreate) || defined (SYS_lwp_create) /* FIXME: multiple */
05b4bd79 2651/* Solaris version */
d3581e61 2652static int
fba45db2 2653proc_get_current_thread (procinfo *pi)
c3f6f71d 2654{
77382aee
PA
2655 /* Note: this should be applied to the root procinfo for the
2656 process, not to the procinfo for an LWP. If applied to the
2657 procinfo for an LWP, it will simply return that LWP's ID. In
2658 that case, find the parent process procinfo. */
19958708 2659
c3f6f71d
JM
2660 if (pi->tid != 0)
2661 pi = find_procinfo_or_die (pi->pid, 0);
2662
2663 if (!pi->status_valid)
2664 if (!proc_get_status (pi))
2665 return 0;
2666
2667#ifdef NEW_PROC_API
2668 return pi->prstatus.pr_lwp.pr_lwpid;
c906108c 2669#else
c3f6f71d 2670 return pi->prstatus.pr_who;
c906108c 2671#endif
c3f6f71d 2672}
c906108c 2673
c3f6f71d
JM
2674#else
2675#if defined (PIOCNTHR) && defined (PIOCTLIST)
77382aee 2676/* OSF version */
d3581e61 2677static int
fba45db2 2678proc_get_current_thread (procinfo *pi)
c3f6f71d 2679{
0df8b418 2680#if 0 /* FIXME: not ready for prime time? */
c3f6f71d
JM
2681 return pi->prstatus.pr_tid;
2682#else
2683 return 0;
2684#endif
c906108c
SS
2685}
2686
c3f6f71d 2687#else
77382aee 2688/* Default version */
d3581e61 2689static int
fba45db2 2690proc_get_current_thread (procinfo *pi)
c906108c 2691{
c3f6f71d
JM
2692 return 0;
2693}
2694
2695#endif
2696#endif
c906108c 2697
77382aee
PA
2698/* Discover the IDs of all the threads within the process, and create
2699 a procinfo for each of them (chained to the parent). This
2700 unfortunately requires a different method on every OS. Returns
2701 non-zero for success, zero for failure. */
c906108c 2702
a0911fd0 2703static int
fba45db2 2704proc_delete_dead_threads (procinfo *parent, procinfo *thread, void *ignore)
c3f6f71d
JM
2705{
2706 if (thread && parent) /* sanity */
c906108c 2707 {
c3f6f71d
JM
2708 thread->status_valid = 0;
2709 if (!proc_get_status (thread))
2710 destroy_one_procinfo (&parent->thread_list, thread);
2711 }
2712 return 0; /* keep iterating */
2713}
c5aa993b 2714
c3f6f71d 2715#if defined (PIOCLSTATUS)
77382aee 2716/* Solaris 2.5 (ioctl) version */
d3581e61 2717static int
fba45db2 2718proc_update_threads (procinfo *pi)
c3f6f71d
JM
2719{
2720 gdb_prstatus_t *prstatus;
2721 struct cleanup *old_chain = NULL;
2722 procinfo *thread;
2723 int nlwp, i;
2724
77382aee
PA
2725 /* We should never have to apply this operation to any procinfo
2726 except the one for the main process. If that ever changes for
2727 any reason, then take out the following clause and replace it
2728 with one that makes sure the ctl_fd is open. */
19958708 2729
c3f6f71d
JM
2730 if (pi->tid != 0)
2731 pi = find_procinfo_or_die (pi->pid, 0);
2732
2733 proc_iterate_over_threads (pi, proc_delete_dead_threads, NULL);
2734
2735 if ((nlwp = proc_get_nthreads (pi)) <= 1)
2736 return 1; /* Process is not multi-threaded; nothing to do. */
2737
8d749320 2738 prstatus = XNEWVEC (gdb_prstatus_t, nlwp + 1);
c3f6f71d 2739
b8c9b27d 2740 old_chain = make_cleanup (xfree, prstatus);
c3f6f71d
JM
2741 if (ioctl (pi->ctl_fd, PIOCLSTATUS, prstatus) < 0)
2742 proc_error (pi, "update_threads (PIOCLSTATUS)", __LINE__);
2743
77382aee 2744 /* Skip element zero, which represents the process as a whole. */
c3f6f71d
JM
2745 for (i = 1; i < nlwp + 1; i++)
2746 {
2747 if ((thread = create_procinfo (pi->pid, prstatus[i].pr_who)) == NULL)
2748 proc_error (pi, "update_threads, create_procinfo", __LINE__);
c5aa993b 2749
c3f6f71d
JM
2750 memcpy (&thread->prstatus, &prstatus[i], sizeof (*prstatus));
2751 thread->status_valid = 1;
2752 }
2753 pi->threads_valid = 1;
2754 do_cleanups (old_chain);
2755 return 1;
2756}
2757#else
2758#ifdef NEW_PROC_API
05b4bd79 2759/* Solaris 6 (and later) version. */
004527cb
AC
2760static void
2761do_closedir_cleanup (void *dir)
2762{
b196bc4c 2763 closedir ((DIR *) dir);
004527cb
AC
2764}
2765
d3581e61 2766static int
fba45db2 2767proc_update_threads (procinfo *pi)
c3f6f71d
JM
2768{
2769 char pathname[MAX_PROC_NAME_SIZE + 16];
2770 struct dirent *direntry;
2771 struct cleanup *old_chain = NULL;
2772 procinfo *thread;
2773 DIR *dirp;
2774 int lwpid;
2775
77382aee
PA
2776 /* We should never have to apply this operation to any procinfo
2777 except the one for the main process. If that ever changes for
2778 any reason, then take out the following clause and replace it
2779 with one that makes sure the ctl_fd is open. */
19958708 2780
c3f6f71d
JM
2781 if (pi->tid != 0)
2782 pi = find_procinfo_or_die (pi->pid, 0);
2783
2784 proc_iterate_over_threads (pi, proc_delete_dead_threads, NULL);
2785
05b4bd79
PA
2786 /* Note: this brute-force method was originally devised for Unixware
2787 (support removed since), and will also work on Solaris 2.6 and
2788 2.7. The original comment mentioned the existence of a much
2789 simpler and more elegant way to do this on Solaris, but didn't
2790 point out what that was. */
c3f6f71d
JM
2791
2792 strcpy (pathname, pi->pathname);
2793 strcat (pathname, "/lwp");
2794 if ((dirp = opendir (pathname)) == NULL)
2795 proc_error (pi, "update_threads, opendir", __LINE__);
2796
004527cb 2797 old_chain = make_cleanup (do_closedir_cleanup, dirp);
c3f6f71d
JM
2798 while ((direntry = readdir (dirp)) != NULL)
2799 if (direntry->d_name[0] != '.') /* skip '.' and '..' */
2800 {
2801 lwpid = atoi (&direntry->d_name[0]);
2802 if ((thread = create_procinfo (pi->pid, lwpid)) == NULL)
2803 proc_error (pi, "update_threads, create_procinfo", __LINE__);
2804 }
2805 pi->threads_valid = 1;
2806 do_cleanups (old_chain);
2807 return 1;
2808}
2809#else
2810#ifdef PIOCTLIST
77382aee 2811/* OSF version */
d3581e61 2812static int
fba45db2 2813proc_update_threads (procinfo *pi)
c3f6f71d
JM
2814{
2815 int nthreads, i;
2816 tid_t *threads;
2817
77382aee
PA
2818 /* We should never have to apply this operation to any procinfo
2819 except the one for the main process. If that ever changes for
2820 any reason, then take out the following clause and replace it
2821 with one that makes sure the ctl_fd is open. */
19958708 2822
c3f6f71d
JM
2823 if (pi->tid != 0)
2824 pi = find_procinfo_or_die (pi->pid, 0);
2825
2826 proc_iterate_over_threads (pi, proc_delete_dead_threads, NULL);
2827
2828 nthreads = proc_get_nthreads (pi);
2829 if (nthreads < 2)
0df8b418 2830 return 0; /* Nothing to do for 1 or fewer threads. */
c3f6f71d 2831
8d749320 2832 threads = XNEWVEC (tid_t, nthreads);
19958708 2833
c3f6f71d
JM
2834 if (ioctl (pi->ctl_fd, PIOCTLIST, threads) < 0)
2835 proc_error (pi, "procfs: update_threads (PIOCTLIST)", __LINE__);
2836
2837 for (i = 0; i < nthreads; i++)
2838 {
2839 if (!find_procinfo (pi->pid, threads[i]))
2840 if (!create_procinfo (pi->pid, threads[i]))
2841 proc_error (pi, "update_threads, create_procinfo", __LINE__);
c906108c 2842 }
c3f6f71d
JM
2843 pi->threads_valid = 1;
2844 return 1;
c906108c 2845}
c3f6f71d 2846#else
77382aee 2847/* Default version */
d3581e61 2848static int
fba45db2 2849proc_update_threads (procinfo *pi)
c3f6f71d
JM
2850{
2851 return 0;
2852}
2853#endif /* OSF PIOCTLIST */
2854#endif /* NEW_PROC_API */
2855#endif /* SOL 2.5 PIOCLSTATUS */
c906108c 2856
77382aee
PA
2857/* Given a pointer to a function, call that function once for each lwp
2858 in the procinfo list, until the function returns non-zero, in which
2859 event return the value returned by the function.
2860
2861 Note: this function does NOT call update_threads. If you want to
2862 discover new threads first, you must call that function explicitly.
2863 This function just makes a quick pass over the currently-known
2864 procinfos.
2865
2866 PI is the parent process procinfo. FUNC is the per-thread
2867 function. PTR is an opaque parameter for function. Returns the
2868 first non-zero return value from the callee, or zero. */
c3f6f71d 2869
d3581e61 2870static int
d0849a9a
KB
2871proc_iterate_over_threads (procinfo *pi,
2872 int (*func) (procinfo *, procinfo *, void *),
2873 void *ptr)
c906108c 2874{
c3f6f71d
JM
2875 procinfo *thread, *next;
2876 int retval = 0;
c906108c 2877
77382aee
PA
2878 /* We should never have to apply this operation to any procinfo
2879 except the one for the main process. If that ever changes for
2880 any reason, then take out the following clause and replace it
2881 with one that makes sure the ctl_fd is open. */
19958708 2882
c3f6f71d
JM
2883 if (pi->tid != 0)
2884 pi = find_procinfo_or_die (pi->pid, 0);
2885
2886 for (thread = pi->thread_list; thread != NULL; thread = next)
c906108c 2887 {
0df8b418 2888 next = thread->next; /* In case thread is destroyed. */
c3f6f71d
JM
2889 if ((retval = (*func) (pi, thread, ptr)) != 0)
2890 break;
c906108c 2891 }
c3f6f71d
JM
2892
2893 return retval;
c906108c
SS
2894}
2895
c3f6f71d
JM
2896/* =================== END, Thread "MODULE" =================== */
2897
2898/* =================== END, /proc "MODULE" =================== */
2899
2900/* =================== GDB "MODULE" =================== */
2901
77382aee
PA
2902/* Here are all of the gdb target vector functions and their
2903 friends. */
c3f6f71d 2904
39f77062 2905static ptid_t do_attach (ptid_t ptid);
a14ed312 2906static void do_detach (int signo);
9185ddce 2907static void proc_trace_syscalls_1 (procinfo *pi, int syscallnum,
77382aee 2908 int entry_or_exit, int mode, int from_tty);
9185ddce 2909
77382aee
PA
2910/* Sets up the inferior to be debugged. Registers to trace signals,
2911 hardware faults, and syscalls. Note: does not set RLC flag: caller
2912 may want to customize that. Returns zero for success (note!
2913 unlike most functions in this module); on failure, returns the LINE
2914 NUMBER where it failed! */
c3f6f71d
JM
2915
2916static int
fba45db2 2917procfs_debug_inferior (procinfo *pi)
c906108c 2918{
c3f6f71d 2919 fltset_t traced_faults;
37de36c6
KB
2920 gdb_sigset_t traced_signals;
2921 sysset_t *traced_syscall_entries;
2922 sysset_t *traced_syscall_exits;
2923 int status;
c906108c 2924
0df8b418
MS
2925 /* Register to trace hardware faults in the child. */
2926 prfillset (&traced_faults); /* trace all faults... */
3c95f01c 2927 gdb_prdelset (&traced_faults, FLTPAGE); /* except page fault. */
c3f6f71d
JM
2928 if (!proc_set_traced_faults (pi, &traced_faults))
2929 return __LINE__;
c906108c 2930
2455069d
UW
2931 /* Initially, register to trace all signals in the child. */
2932 prfillset (&traced_signals);
2933 if (!proc_set_traced_signals (pi, &traced_signals))
c3f6f71d
JM
2934 return __LINE__;
2935
37de36c6 2936
c3f6f71d 2937 /* Register to trace the 'exit' system call (on entry). */
37de36c6
KB
2938 traced_syscall_entries = sysset_t_alloc (pi);
2939 gdb_premptysysset (traced_syscall_entries);
2940#ifdef SYS_exit
2941 gdb_praddsysset (traced_syscall_entries, SYS_exit);
2942#endif
c3f6f71d 2943#ifdef SYS_lwpexit
0df8b418 2944 gdb_praddsysset (traced_syscall_entries, SYS_lwpexit);/* And _lwp_exit... */
c3f6f71d
JM
2945#endif
2946#ifdef SYS_lwp_exit
37de36c6
KB
2947 gdb_praddsysset (traced_syscall_entries, SYS_lwp_exit);
2948#endif
2949#ifdef DYNAMIC_SYSCALLS
2950 {
2951 int callnum = find_syscall (pi, "_exit");
f4a14ae6 2952
37de36c6
KB
2953 if (callnum >= 0)
2954 gdb_praddsysset (traced_syscall_entries, callnum);
2955 }
c906108c
SS
2956#endif
2957
37de36c6
KB
2958 status = proc_set_traced_sysentry (pi, traced_syscall_entries);
2959 xfree (traced_syscall_entries);
2960 if (!status)
c3f6f71d
JM
2961 return __LINE__;
2962
2963#ifdef PRFS_STOPEXEC /* defined on OSF */
2964 /* OSF method for tracing exec syscalls. Quoting:
2965 Under Alpha OSF/1 we have to use a PIOCSSPCACT ioctl to trace
2966 exits from exec system calls because of the user level loader. */
0df8b418 2967 /* FIXME: make nice and maybe move into an access function. */
c3f6f71d
JM
2968 {
2969 int prfs_flags;
2970
2971 if (ioctl (pi->ctl_fd, PIOCGSPCACT, &prfs_flags) < 0)
2972 return __LINE__;
2973
2974 prfs_flags |= PRFS_STOPEXEC;
2975
2976 if (ioctl (pi->ctl_fd, PIOCSSPCACT, &prfs_flags) < 0)
2977 return __LINE__;
2978 }
2979#else /* not PRFS_STOPEXEC */
0df8b418 2980 /* Everyone else's (except OSF) method for tracing exec syscalls. */
c3f6f71d
JM
2981 /* GW: Rationale...
2982 Not all systems with /proc have all the exec* syscalls with the same
2983 names. On the SGI, for example, there is no SYS_exec, but there
0df8b418 2984 *is* a SYS_execv. So, we try to account for that. */
c3f6f71d 2985
37de36c6
KB
2986 traced_syscall_exits = sysset_t_alloc (pi);
2987 gdb_premptysysset (traced_syscall_exits);
c3f6f71d 2988#ifdef SYS_exec
37de36c6 2989 gdb_praddsysset (traced_syscall_exits, SYS_exec);
c3f6f71d
JM
2990#endif
2991#ifdef SYS_execve
37de36c6 2992 gdb_praddsysset (traced_syscall_exits, SYS_execve);
c3f6f71d
JM
2993#endif
2994#ifdef SYS_execv
37de36c6 2995 gdb_praddsysset (traced_syscall_exits, SYS_execv);
c3f6f71d 2996#endif
c5aa993b 2997
c3f6f71d 2998#ifdef SYS_lwpcreate
37de36c6
KB
2999 gdb_praddsysset (traced_syscall_exits, SYS_lwpcreate);
3000 gdb_praddsysset (traced_syscall_exits, SYS_lwpexit);
c906108c 3001#endif
c5aa993b 3002
0df8b418 3003#ifdef SYS_lwp_create /* FIXME: once only, please. */
37de36c6
KB
3004 gdb_praddsysset (traced_syscall_exits, SYS_lwp_create);
3005 gdb_praddsysset (traced_syscall_exits, SYS_lwp_exit);
c3f6f71d 3006#endif
c5aa993b 3007
37de36c6
KB
3008#ifdef DYNAMIC_SYSCALLS
3009 {
3010 int callnum = find_syscall (pi, "execve");
f4a14ae6 3011
37de36c6
KB
3012 if (callnum >= 0)
3013 gdb_praddsysset (traced_syscall_exits, callnum);
3014 callnum = find_syscall (pi, "ra_execve");
3015 if (callnum >= 0)
3016 gdb_praddsysset (traced_syscall_exits, callnum);
3017 }
3018#endif
c906108c 3019
37de36c6
KB
3020 status = proc_set_traced_sysexit (pi, traced_syscall_exits);
3021 xfree (traced_syscall_exits);
3022 if (!status)
c3f6f71d
JM
3023 return __LINE__;
3024
3025#endif /* PRFS_STOPEXEC */
3026 return 0;
c906108c
SS
3027}
3028
19958708 3029static void
c0939df1 3030procfs_attach (struct target_ops *ops, const char *args, int from_tty)
c906108c 3031{
c3f6f71d
JM
3032 char *exec_file;
3033 int pid;
3034
74164c56 3035 pid = parse_pid_to_attach (args);
c3f6f71d 3036
c3f6f71d 3037 if (pid == getpid ())
8a3fe4f8 3038 error (_("Attaching GDB to itself is not a good idea..."));
c906108c 3039
c3f6f71d 3040 if (from_tty)
c906108c 3041 {
c3f6f71d
JM
3042 exec_file = get_exec_file (0);
3043
3044 if (exec_file)
a3f17187 3045 printf_filtered (_("Attaching to program `%s', %s\n"),
39f77062 3046 exec_file, target_pid_to_str (pid_to_ptid (pid)));
c3f6f71d 3047 else
a3f17187 3048 printf_filtered (_("Attaching to %s\n"),
77382aee 3049 target_pid_to_str (pid_to_ptid (pid)));
c3f6f71d
JM
3050
3051 fflush (stdout);
c906108c 3052 }
39f77062 3053 inferior_ptid = do_attach (pid_to_ptid (pid));
6a3cb8e8
PA
3054 if (!target_is_pushed (ops))
3055 push_target (ops);
c3f6f71d
JM
3056}
3057
19958708 3058static void
52554a0e 3059procfs_detach (struct target_ops *ops, const char *args, int from_tty)
c3f6f71d 3060{
cc377e6b 3061 int sig = 0;
dfd4cc63 3062 int pid = ptid_get_pid (inferior_ptid);
cc377e6b
MK
3063
3064 if (args)
3065 sig = atoi (args);
c3f6f71d
JM
3066
3067 if (from_tty)
c906108c 3068 {
995816ba 3069 const char *exec_file;
cc377e6b 3070
c3f6f71d 3071 exec_file = get_exec_file (0);
cc377e6b 3072 if (exec_file == NULL)
c3f6f71d 3073 exec_file = "";
cc377e6b 3074
a3f17187 3075 printf_filtered (_("Detaching from program: %s, %s\n"), exec_file,
cc377e6b
MK
3076 target_pid_to_str (pid_to_ptid (pid)));
3077 gdb_flush (gdb_stdout);
c906108c 3078 }
19958708 3079
cc377e6b
MK
3080 do_detach (sig);
3081
39f77062 3082 inferior_ptid = null_ptid;
7f9f62ba 3083 detach_inferior (pid);
6a3cb8e8 3084 inf_child_maybe_unpush_target (ops);
c906108c
SS
3085}
3086
39f77062
KB
3087static ptid_t
3088do_attach (ptid_t ptid)
c906108c 3089{
c3f6f71d 3090 procinfo *pi;
181e7f93 3091 struct inferior *inf;
c3f6f71d 3092 int fail;
2689673f 3093 int lwpid;
c3f6f71d 3094
dfd4cc63 3095 if ((pi = create_procinfo (ptid_get_pid (ptid), 0)) == NULL)
8a3fe4f8 3096 perror (_("procfs: out of memory in 'attach'"));
c3f6f71d
JM
3097
3098 if (!open_procinfo_files (pi, FD_CTL))
3099 {
3100 fprintf_filtered (gdb_stderr, "procfs:%d -- ", __LINE__);
19958708 3101 sprintf (errmsg, "do_attach: couldn't open /proc file for process %d",
dfd4cc63 3102 ptid_get_pid (ptid));
c3f6f71d
JM
3103 dead_procinfo (pi, errmsg, NOKILL);
3104 }
c906108c 3105
c3f6f71d
JM
3106 /* Stop the process (if it isn't already stopped). */
3107 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
c906108c 3108 {
c3f6f71d
JM
3109 pi->was_stopped = 1;
3110 proc_prettyprint_why (proc_why (pi), proc_what (pi), 1);
c906108c
SS
3111 }
3112 else
3113 {
c3f6f71d
JM
3114 pi->was_stopped = 0;
3115 /* Set the process to run again when we close it. */
3116 if (!proc_set_run_on_last_close (pi))
3117 dead_procinfo (pi, "do_attach: couldn't set RLC.", NOKILL);
3118
0df8b418 3119 /* Now stop the process. */
c3f6f71d
JM
3120 if (!proc_stop_process (pi))
3121 dead_procinfo (pi, "do_attach: couldn't stop the process.", NOKILL);
3122 pi->ignore_next_sigstop = 1;
c906108c 3123 }
c3f6f71d
JM
3124 /* Save some of the /proc state to be restored if we detach. */
3125 if (!proc_get_traced_faults (pi, &pi->saved_fltset))
3126 dead_procinfo (pi, "do_attach: couldn't save traced faults.", NOKILL);
3127 if (!proc_get_traced_signals (pi, &pi->saved_sigset))
3128 dead_procinfo (pi, "do_attach: couldn't save traced signals.", NOKILL);
37de36c6 3129 if (!proc_get_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d
JM
3130 dead_procinfo (pi, "do_attach: couldn't save traced syscall entries.",
3131 NOKILL);
37de36c6 3132 if (!proc_get_traced_sysexit (pi, pi->saved_exitset))
19958708 3133 dead_procinfo (pi, "do_attach: couldn't save traced syscall exits.",
c3f6f71d
JM
3134 NOKILL);
3135 if (!proc_get_held_signals (pi, &pi->saved_sighold))
3136 dead_procinfo (pi, "do_attach: couldn't save held signals.", NOKILL);
3137
3138 if ((fail = procfs_debug_inferior (pi)) != 0)
3139 dead_procinfo (pi, "do_attach: failed in procfs_debug_inferior", NOKILL);
3140
6c95b8df
PA
3141 inf = current_inferior ();
3142 inferior_appeared (inf, pi->pid);
c3f6f71d 3143 /* Let GDB know that the inferior was attached. */
181e7f93 3144 inf->attach_flag = 1;
2689673f
PA
3145
3146 /* Create a procinfo for the current lwp. */
3147 lwpid = proc_get_current_thread (pi);
3148 create_procinfo (pi->pid, lwpid);
3149
3150 /* Add it to gdb's thread list. */
dfd4cc63 3151 ptid = ptid_build (pi->pid, lwpid, 0);
2689673f
PA
3152 add_thread (ptid);
3153
3154 return ptid;
c906108c
SS
3155}
3156
3157static void
fba45db2 3158do_detach (int signo)
c906108c 3159{
c3f6f71d 3160 procinfo *pi;
c906108c 3161
0df8b418 3162 /* Find procinfo for the main process. */
dfd4cc63
LM
3163 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid),
3164 0); /* FIXME: threads */
c3f6f71d
JM
3165 if (signo)
3166 if (!proc_set_current_signal (pi, signo))
3167 proc_warn (pi, "do_detach, set_current_signal", __LINE__);
c5aa993b 3168
c3f6f71d
JM
3169 if (!proc_set_traced_signals (pi, &pi->saved_sigset))
3170 proc_warn (pi, "do_detach, set_traced_signal", __LINE__);
c906108c 3171
c3f6f71d
JM
3172 if (!proc_set_traced_faults (pi, &pi->saved_fltset))
3173 proc_warn (pi, "do_detach, set_traced_faults", __LINE__);
3174
37de36c6 3175 if (!proc_set_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d
JM
3176 proc_warn (pi, "do_detach, set_traced_sysentry", __LINE__);
3177
37de36c6 3178 if (!proc_set_traced_sysexit (pi, pi->saved_exitset))
c3f6f71d
JM
3179 proc_warn (pi, "do_detach, set_traced_sysexit", __LINE__);
3180
3181 if (!proc_set_held_signals (pi, &pi->saved_sighold))
3182 proc_warn (pi, "do_detach, set_held_signals", __LINE__);
3183
3184 if (signo || (proc_flags (pi) & (PR_STOPPED | PR_ISTOP)))
3185 if (signo || !(pi->was_stopped) ||
e2e0b3e5 3186 query (_("Was stopped when attached, make it runnable again? ")))
c3f6f71d
JM
3187 {
3188 /* Clear any pending signal. */
3189 if (!proc_clear_current_fault (pi))
3190 proc_warn (pi, "do_detach, clear_current_fault", __LINE__);
3191
1a303dec
MS
3192 if (signo == 0 && !proc_clear_current_signal (pi))
3193 proc_warn (pi, "do_detach, clear_current_signal", __LINE__);
3194
c3f6f71d
JM
3195 if (!proc_set_run_on_last_close (pi))
3196 proc_warn (pi, "do_detach, set_rlc", __LINE__);
3197 }
3198
c3f6f71d 3199 destroy_procinfo (pi);
c906108c
SS
3200}
3201
772cf8be
MK
3202/* Fetch register REGNUM from the inferior. If REGNUM is -1, do this
3203 for all registers.
3204
3205 ??? Is the following note still relevant? We can't get individual
3206 registers with the PT_GETREGS ptrace(2) request either, yet we
3207 don't bother with caching at all in that case.
3208
3209 NOTE: Since the /proc interface cannot give us individual
3210 registers, we pay no attention to REGNUM, and just fetch them all.
3211 This results in the possibility that we will do unnecessarily many
3212 fetches, since we may be called repeatedly for individual
3213 registers. So we cache the results, and mark the cache invalid
3214 when the process is resumed. */
c3f6f71d 3215
c906108c 3216static void
28439f5e
PA
3217procfs_fetch_registers (struct target_ops *ops,
3218 struct regcache *regcache, int regnum)
c906108c 3219{
772cf8be
MK
3220 gdb_gregset_t *gregs;
3221 procinfo *pi;
bcc0c096
SM
3222 ptid_t ptid = regcache_get_ptid (regcache);
3223 int pid = ptid_get_pid (ptid);
3224 int tid = ptid_get_lwp (ptid);
40a6adc1 3225 struct gdbarch *gdbarch = get_regcache_arch (regcache);
c3f6f71d 3226
2689673f 3227 pi = find_procinfo_or_die (pid, tid);
c3f6f71d
JM
3228
3229 if (pi == NULL)
8a3fe4f8 3230 error (_("procfs: fetch_registers failed to find procinfo for %s"),
bcc0c096 3231 target_pid_to_str (ptid));
c3f6f71d 3232
772cf8be
MK
3233 gregs = proc_get_gregs (pi);
3234 if (gregs == NULL)
c3f6f71d
JM
3235 proc_error (pi, "fetch_registers, get_gregs", __LINE__);
3236
56be3814 3237 supply_gregset (regcache, (const gdb_gregset_t *) gregs);
c3f6f71d 3238
40a6adc1 3239 if (gdbarch_fp0_regnum (gdbarch) >= 0) /* Do we have an FPU? */
60054393 3240 {
772cf8be
MK
3241 gdb_fpregset_t *fpregs;
3242
40a6adc1
MD
3243 if ((regnum >= 0 && regnum < gdbarch_fp0_regnum (gdbarch))
3244 || regnum == gdbarch_pc_regnum (gdbarch)
3245 || regnum == gdbarch_sp_regnum (gdbarch))
772cf8be 3246 return; /* Not a floating point register. */
c5aa993b 3247
772cf8be
MK
3248 fpregs = proc_get_fpregs (pi);
3249 if (fpregs == NULL)
60054393 3250 proc_error (pi, "fetch_registers, get_fpregs", __LINE__);
c906108c 3251
56be3814 3252 supply_fpregset (regcache, (const gdb_fpregset_t *) fpregs);
60054393 3253 }
c906108c
SS
3254}
3255
772cf8be
MK
3256/* Store register REGNUM back into the inferior. If REGNUM is -1, do
3257 this for all registers.
3258
3259 NOTE: Since the /proc interface will not read individual registers,
3260 we will cache these requests until the process is resumed, and only
3261 then write them back to the inferior process.
77382aee 3262
772cf8be
MK
3263 FIXME: is that a really bad idea? Have to think about cases where
3264 writing one register might affect the value of others, etc. */
c906108c 3265
c3f6f71d 3266static void
28439f5e
PA
3267procfs_store_registers (struct target_ops *ops,
3268 struct regcache *regcache, int regnum)
c3f6f71d 3269{
772cf8be
MK
3270 gdb_gregset_t *gregs;
3271 procinfo *pi;
bcc0c096
SM
3272 ptid_t ptid = regcache_get_ptid (regcache);
3273 int pid = ptid_get_pid (ptid);
3274 int tid = ptid_get_lwp (ptid);
40a6adc1 3275 struct gdbarch *gdbarch = get_regcache_arch (regcache);
c3f6f71d 3276
2689673f 3277 pi = find_procinfo_or_die (pid, tid);
c3f6f71d
JM
3278
3279 if (pi == NULL)
8a3fe4f8 3280 error (_("procfs: store_registers: failed to find procinfo for %s"),
bcc0c096 3281 target_pid_to_str (ptid));
c906108c 3282
772cf8be
MK
3283 gregs = proc_get_gregs (pi);
3284 if (gregs == NULL)
c3f6f71d 3285 proc_error (pi, "store_registers, get_gregs", __LINE__);
c906108c 3286
56be3814 3287 fill_gregset (regcache, gregs, regnum);
c3f6f71d
JM
3288 if (!proc_set_gregs (pi))
3289 proc_error (pi, "store_registers, set_gregs", __LINE__);
c906108c 3290
40a6adc1 3291 if (gdbarch_fp0_regnum (gdbarch) >= 0) /* Do we have an FPU? */
60054393 3292 {
772cf8be
MK
3293 gdb_fpregset_t *fpregs;
3294
40a6adc1
MD
3295 if ((regnum >= 0 && regnum < gdbarch_fp0_regnum (gdbarch))
3296 || regnum == gdbarch_pc_regnum (gdbarch)
3297 || regnum == gdbarch_sp_regnum (gdbarch))
772cf8be 3298 return; /* Not a floating point register. */
60054393 3299
772cf8be
MK
3300 fpregs = proc_get_fpregs (pi);
3301 if (fpregs == NULL)
60054393
MS
3302 proc_error (pi, "store_registers, get_fpregs", __LINE__);
3303
56be3814 3304 fill_fpregset (regcache, fpregs, regnum);
60054393
MS
3305 if (!proc_set_fpregs (pi))
3306 proc_error (pi, "store_registers, set_fpregs", __LINE__);
3307 }
c3f6f71d 3308}
c906108c 3309
37de36c6
KB
3310static int
3311syscall_is_lwp_exit (procinfo *pi, int scall)
3312{
37de36c6
KB
3313#ifdef SYS_lwp_exit
3314 if (scall == SYS_lwp_exit)
3315 return 1;
3316#endif
3317#ifdef SYS_lwpexit
3318 if (scall == SYS_lwpexit)
3319 return 1;
3320#endif
3321 return 0;
3322}
3323
3324static int
3325syscall_is_exit (procinfo *pi, int scall)
3326{
3327#ifdef SYS_exit
3328 if (scall == SYS_exit)
3329 return 1;
3330#endif
3331#ifdef DYNAMIC_SYSCALLS
3332 if (find_syscall (pi, "_exit") == scall)
3333 return 1;
3334#endif
3335 return 0;
3336}
3337
3338static int
3339syscall_is_exec (procinfo *pi, int scall)
3340{
3341#ifdef SYS_exec
3342 if (scall == SYS_exec)
3343 return 1;
3344#endif
3345#ifdef SYS_execv
3346 if (scall == SYS_execv)
3347 return 1;
3348#endif
3349#ifdef SYS_execve
3350 if (scall == SYS_execve)
3351 return 1;
3352#endif
3353#ifdef DYNAMIC_SYSCALLS
3354 if (find_syscall (pi, "_execve"))
3355 return 1;
3356 if (find_syscall (pi, "ra_execve"))
3357 return 1;
3358#endif
3359 return 0;
3360}
3361
3362static int
3363syscall_is_lwp_create (procinfo *pi, int scall)
3364{
3365#ifdef SYS_lwp_create
3366 if (scall == SYS_lwp_create)
3367 return 1;
3368#endif
3369#ifdef SYS_lwpcreate
3370 if (scall == SYS_lwpcreate)
3371 return 1;
3372#endif
3373 return 0;
3374}
3375
7434dadd
JB
3376#ifdef SYS_syssgi
3377/* Return the address of the __dbx_link() function in the file
3378 refernced by ABFD by scanning its symbol table. Return 0 if
3379 the symbol was not found. */
3380
3381static CORE_ADDR
3382dbx_link_addr (bfd *abfd)
3383{
3384 long storage_needed;
3385 asymbol **symbol_table;
3386 long number_of_symbols;
3387 long i;
3388
3389 storage_needed = bfd_get_symtab_upper_bound (abfd);
3390 if (storage_needed <= 0)
3391 return 0;
3392
3393 symbol_table = (asymbol **) xmalloc (storage_needed);
3394 make_cleanup (xfree, symbol_table);
3395
3396 number_of_symbols = bfd_canonicalize_symtab (abfd, symbol_table);
3397
3398 for (i = 0; i < number_of_symbols; i++)
3399 {
3400 asymbol *sym = symbol_table[i];
3401
3402 if ((sym->flags & BSF_GLOBAL)
77382aee
PA
3403 && sym->name != NULL && strcmp (sym->name, "__dbx_link") == 0)
3404 return (sym->value + sym->section->vma);
7434dadd
JB
3405 }
3406
3407 /* Symbol not found, return NULL. */
3408 return 0;
3409}
3410
3411/* Search the symbol table of the file referenced by FD for a symbol
0df8b418 3412 named __dbx_link(). If found, then insert a breakpoint at this location,
7434dadd
JB
3413 and return nonzero. Return zero otherwise. */
3414
3415static int
3416insert_dbx_link_bpt_in_file (int fd, CORE_ADDR ignored)
3417{
7434dadd
JB
3418 long storage_needed;
3419 CORE_ADDR sym_addr;
3420
192b62ce 3421 gdb_bfd_ref_ptr abfd (gdb_bfd_fdopenr ("unamed", 0, fd));
7434dadd
JB
3422 if (abfd == NULL)
3423 {
3424 warning (_("Failed to create a bfd: %s."), bfd_errmsg (bfd_get_error ()));
3425 return 0;
3426 }
3427
192b62ce 3428 if (!bfd_check_format (abfd.get (), bfd_object))
7434dadd
JB
3429 {
3430 /* Not the correct format, so we can not possibly find the dbx_link
77382aee 3431 symbol in it. */
7434dadd
JB
3432 return 0;
3433 }
3434
192b62ce 3435 sym_addr = dbx_link_addr (abfd.get ());
7434dadd
JB
3436 if (sym_addr != 0)
3437 {
f37f681c
PA
3438 struct breakpoint *dbx_link_bpt;
3439
7434dadd 3440 /* Insert the breakpoint. */
f37f681c
PA
3441 dbx_link_bpt
3442 = create_and_insert_solib_event_breakpoint (target_gdbarch (),
3443 sym_addr);
7434dadd 3444 if (dbx_link_bpt == NULL)
77382aee
PA
3445 {
3446 warning (_("Failed to insert dbx_link breakpoint."));
77382aee
PA
3447 return 0;
3448 }
7434dadd
JB
3449 return 1;
3450 }
3451
7434dadd
JB
3452 return 0;
3453}
3454
e294797a 3455/* Calls the supplied callback function once for each mapped address
77382aee
PA
3456 space in the process. The callback function receives an open file
3457 descriptor for the file corresponding to that mapped address space
3458 (if there is one), and the base address of the mapped space. Quit
3459 when the callback function returns a nonzero value, or at teh end
3460 of the mappings. Returns the first non-zero return value of the
3461 callback function, or zero. */
e294797a
JB
3462
3463static int
3464solib_mappings_callback (struct prmap *map, int (*func) (int, CORE_ADDR),
3465 void *data)
3466{
3467 procinfo *pi = data;
3468 int fd;
3469
3470#ifdef NEW_PROC_API
3471 char name[MAX_PROC_NAME_SIZE + sizeof (map->pr_mapname)];
3472
3473 if (map->pr_vaddr == 0 && map->pr_size == 0)
3474 return -1; /* sanity */
3475
3476 if (map->pr_mapname[0] == 0)
3477 {
3478 fd = -1; /* no map file */
3479 }
3480 else
3481 {
3482 sprintf (name, "/proc/%d/object/%s", pi->pid, map->pr_mapname);
3483 /* Note: caller's responsibility to close this fd! */
3484 fd = open_with_retry (name, O_RDONLY);
3485 /* Note: we don't test the above call for failure;
3486 we just pass the FD on as given. Sometimes there is
3487 no file, so the open may return failure, but that's
3488 not a problem. */
3489 }
3490#else
3491 fd = ioctl (pi->ctl_fd, PIOCOPENM, &map->pr_vaddr);
3492 /* Note: we don't test the above call for failure;
3493 we just pass the FD on as given. Sometimes there is
3494 no file, so the ioctl may return failure, but that's
3495 not a problem. */
3496#endif
3497 return (*func) (fd, (CORE_ADDR) map->pr_vaddr);
3498}
3499
7434dadd
JB
3500/* If the given memory region MAP contains a symbol named __dbx_link,
3501 insert a breakpoint at this location and return nonzero. Return
3502 zero otherwise. */
3503
3504static int
3505insert_dbx_link_bpt_in_region (struct prmap *map,
b8edc417 3506 find_memory_region_ftype child_func,
77382aee 3507 void *data)
7434dadd
JB
3508{
3509 procinfo *pi = (procinfo *) data;
3510
3511 /* We know the symbol we're looking for is in a text region, so
3512 only look for it if the region is a text one. */
3513 if (map->pr_mflags & MA_EXEC)
3514 return solib_mappings_callback (map, insert_dbx_link_bpt_in_file, pi);
3515
3516 return 0;
3517}
3518
3519/* Search all memory regions for a symbol named __dbx_link. If found,
3520 insert a breakpoint at its location, and return nonzero. Return zero
3521 otherwise. */
3522
3523static int
3524insert_dbx_link_breakpoint (procinfo *pi)
3525{
3526 return iterate_over_mappings (pi, NULL, pi, insert_dbx_link_bpt_in_region);
3527}
3528#endif
3529
77382aee
PA
3530/* Retrieve the next stop event from the child process. If child has
3531 not stopped yet, wait for it to stop. Translate /proc eventcodes
3532 (or possibly wait eventcodes) into gdb internal event codes.
3533 Returns the id of process (and possibly thread) that incurred the
3534 event. Event codes are returned through a pointer parameter. */
c906108c 3535
39f77062 3536static ptid_t
117de6a9 3537procfs_wait (struct target_ops *ops,
4fcbb494 3538 ptid_t ptid, struct target_waitstatus *status, int options)
c906108c 3539{
0df8b418 3540 /* First cut: loosely based on original version 2.1. */
c3f6f71d 3541 procinfo *pi;
39f77062
KB
3542 int wstat;
3543 int temp_tid;
3544 ptid_t retval, temp_ptid;
c3f6f71d
JM
3545 int why, what, flags;
3546 int retry = 0;
c906108c 3547
c3f6f71d 3548wait_again:
c906108c 3549
c3f6f71d
JM
3550 retry++;
3551 wstat = 0;
39f77062 3552 retval = pid_to_ptid (-1);
c906108c 3553
0df8b418 3554 /* Find procinfo for main process. */
dfd4cc63 3555 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
c3f6f71d 3556 if (pi)
c906108c 3557 {
0df8b418 3558 /* We must assume that the status is stale now... */
c3f6f71d
JM
3559 pi->status_valid = 0;
3560 pi->gregs_valid = 0;
3561 pi->fpregs_valid = 0;
3562
0df8b418 3563#if 0 /* just try this out... */
c3f6f71d
JM
3564 flags = proc_flags (pi);
3565 why = proc_why (pi);
3566 if ((flags & PR_STOPPED) && (why == PR_REQUESTED))
0df8b418 3567 pi->status_valid = 0; /* re-read again, IMMEDIATELY... */
c3f6f71d
JM
3568#endif
3569 /* If child is not stopped, wait for it to stop. */
3570 if (!(proc_flags (pi) & (PR_STOPPED | PR_ISTOP)) &&
3571 !proc_wait_for_stop (pi))
c906108c 3572 {
0df8b418 3573 /* wait_for_stop failed: has the child terminated? */
c3f6f71d 3574 if (errno == ENOENT)
c906108c 3575 {
39f77062
KB
3576 int wait_retval;
3577
0df8b418
MS
3578 /* /proc file not found; presumably child has terminated. */
3579 wait_retval = wait (&wstat); /* "wait" for the child's exit. */
c3f6f71d 3580
dfd4cc63
LM
3581 /* Wrong child? */
3582 if (wait_retval != ptid_get_pid (inferior_ptid))
3e43a32a
MS
3583 error (_("procfs: couldn't stop "
3584 "process %d: wait returned %d."),
dfd4cc63 3585 ptid_get_pid (inferior_ptid), wait_retval);
c3f6f71d 3586 /* FIXME: might I not just use waitpid?
0df8b418 3587 Or try find_procinfo to see if I know about this child? */
39f77062 3588 retval = pid_to_ptid (wait_retval);
c906108c 3589 }
d1566ff5
FN
3590 else if (errno == EINTR)
3591 goto wait_again;
c3f6f71d 3592 else
c906108c 3593 {
0df8b418 3594 /* Unknown error from wait_for_stop. */
c3f6f71d 3595 proc_error (pi, "target_wait (wait_for_stop)", __LINE__);
c906108c 3596 }
c3f6f71d
JM
3597 }
3598 else
3599 {
3600 /* This long block is reached if either:
3601 a) the child was already stopped, or
3602 b) we successfully waited for the child with wait_for_stop.
3603 This block will analyze the /proc status, and translate it
3604 into a waitstatus for GDB.
3605
3606 If we actually had to call wait because the /proc file
19958708 3607 is gone (child terminated), then we skip this block,
c3f6f71d
JM
3608 because we already have a waitstatus. */
3609
3610 flags = proc_flags (pi);
3611 why = proc_why (pi);
3612 what = proc_what (pi);
3613
c3f6f71d 3614 if (flags & (PR_STOPPED | PR_ISTOP))
c906108c 3615 {
c3f6f71d
JM
3616#ifdef PR_ASYNC
3617 /* If it's running async (for single_thread control),
3618 set it back to normal again. */
3619 if (flags & PR_ASYNC)
3620 if (!proc_unset_async (pi))
3621 proc_error (pi, "target_wait, unset_async", __LINE__);
3622#endif
3623
3624 if (info_verbose)
3625 proc_prettyprint_why (why, what, 1);
3626
3627 /* The 'pid' we will return to GDB is composed of
3628 the process ID plus the lwp ID. */
dfd4cc63 3629 retval = ptid_build (pi->pid, proc_get_current_thread (pi), 0);
c3f6f71d
JM
3630
3631 switch (why) {
3632 case PR_SIGNALLED:
3633 wstat = (what << 8) | 0177;
3634 break;
3635 case PR_SYSENTRY:
37de36c6 3636 if (syscall_is_lwp_exit (pi, what))
c3f6f71d 3637 {
17faa917
DJ
3638 if (print_thread_events)
3639 printf_unfiltered (_("[%s exited]\n"),
3640 target_pid_to_str (retval));
37de36c6
KB
3641 delete_thread (retval);
3642 status->kind = TARGET_WAITKIND_SPURIOUS;
3643 return retval;
3644 }
3645 else if (syscall_is_exit (pi, what))
3646 {
181e7f93
PA
3647 struct inferior *inf;
3648
0df8b418 3649 /* Handle SYS_exit call only. */
37de36c6 3650 /* Stopped at entry to SYS_exit.
19958708 3651 Make it runnable, resume it, then use
37de36c6 3652 the wait system call to get its exit code.
19958708 3653 Proc_run_process always clears the current
37de36c6
KB
3654 fault and signal.
3655 Then return its exit status. */
3656 pi->status_valid = 0;
3657 wstat = 0;
19958708 3658 /* FIXME: what we should do is return
37de36c6
KB
3659 TARGET_WAITKIND_SPURIOUS. */
3660 if (!proc_run_process (pi, 0, 0))
3661 proc_error (pi, "target_wait, run_process", __LINE__);
181e7f93
PA
3662
3663 inf = find_inferior_pid (pi->pid);
3664 if (inf->attach_flag)
c3f6f71d 3665 {
19958708 3666 /* Don't call wait: simulate waiting for exit,
37de36c6
KB
3667 return a "success" exit code. Bogus: what if
3668 it returns something else? */
3669 wstat = 0;
39f77062 3670 retval = inferior_ptid; /* ? ? ? */
37de36c6
KB
3671 }
3672 else
3673 {
3674 int temp = wait (&wstat);
3675
3676 /* FIXME: shouldn't I make sure I get the right
3677 event from the right process? If (for
3678 instance) I have killed an earlier inferior
3679 process but failed to clean up after it
3680 somehow, I could get its termination event
3681 here. */
3682
0df8b418
MS
3683 /* If wait returns -1, that's what we return
3684 to GDB. */
37de36c6 3685 if (temp < 0)
39f77062 3686 retval = pid_to_ptid (temp);
c3f6f71d 3687 }
c3f6f71d 3688 }
37de36c6
KB
3689 else
3690 {
a3f17187 3691 printf_filtered (_("procfs: trapped on entry to "));
37de36c6
KB
3692 proc_prettyprint_syscall (proc_what (pi), 0);
3693 printf_filtered ("\n");
3694#ifndef PIOCSSPCACT
c3f6f71d 3695 {
37de36c6 3696 long i, nsysargs, *sysargs;
c3f6f71d 3697
37de36c6
KB
3698 if ((nsysargs = proc_nsysarg (pi)) > 0 &&
3699 (sysargs = proc_sysargs (pi)) != NULL)
3700 {
3e43a32a
MS
3701 printf_filtered (_("%ld syscall arguments:\n"),
3702 nsysargs);
37de36c6 3703 for (i = 0; i < nsysargs; i++)
19958708 3704 printf_filtered ("#%ld: 0x%08lx\n",
37de36c6
KB
3705 i, sysargs[i]);
3706 }
c3f6f71d 3707
c3f6f71d 3708 }
c3f6f71d 3709#endif
37de36c6
KB
3710 if (status)
3711 {
0df8b418
MS
3712 /* How to exit gracefully, returning "unknown
3713 event". */
37de36c6 3714 status->kind = TARGET_WAITKIND_SPURIOUS;
39f77062 3715 return inferior_ptid;
37de36c6
KB
3716 }
3717 else
3718 {
3719 /* How to keep going without returning to wfi: */
049a8570 3720 target_continue_no_signal (ptid);
37de36c6
KB
3721 goto wait_again;
3722 }
3723 }
3724 break;
3725 case PR_SYSEXIT:
3726 if (syscall_is_exec (pi, what))
c3f6f71d 3727 {
37de36c6
KB
3728 /* Hopefully this is our own "fork-child" execing
3729 the real child. Hoax this event into a trap, and
3730 GDB will see the child about to execute its start
0df8b418 3731 address. */
37de36c6
KB
3732 wstat = (SIGTRAP << 8) | 0177;
3733 }
9185ddce 3734#ifdef SYS_syssgi
77382aee
PA
3735 else if (what == SYS_syssgi)
3736 {
3737 /* see if we can break on dbx_link(). If yes, then
3738 we no longer need the SYS_syssgi notifications. */
3739 if (insert_dbx_link_breakpoint (pi))
3740 proc_trace_syscalls_1 (pi, SYS_syssgi, PR_SYSEXIT,
3741 FLAG_RESET, 0);
3742
3743 /* This is an internal event and should be transparent
3744 to wfi, so resume the execution and wait again. See
3745 comment in procfs_init_inferior() for more details. */
049a8570 3746 target_continue_no_signal (ptid);
77382aee
PA
3747 goto wait_again;
3748 }
9185ddce 3749#endif
37de36c6
KB
3750 else if (syscall_is_lwp_create (pi, what))
3751 {
77382aee
PA
3752 /* This syscall is somewhat like fork/exec. We
3753 will get the event twice: once for the parent
3754 LWP, and once for the child. We should already
3755 know about the parent LWP, but the child will
3756 be new to us. So, whenever we get this event,
3757 if it represents a new thread, simply add the
3758 thread to the list. */
c3f6f71d 3759
37de36c6 3760 /* If not in procinfo list, add it. */
39f77062
KB
3761 temp_tid = proc_get_current_thread (pi);
3762 if (!find_procinfo (pi->pid, temp_tid))
3763 create_procinfo (pi->pid, temp_tid);
37de36c6 3764
dfd4cc63 3765 temp_ptid = ptid_build (pi->pid, temp_tid, 0);
37de36c6 3766 /* If not in GDB's thread list, add it. */
39f77062 3767 if (!in_thread_list (temp_ptid))
93815fbf
VP
3768 add_thread (temp_ptid);
3769
0df8b418 3770 /* Return to WFI, but tell it to immediately resume. */
37de36c6 3771 status->kind = TARGET_WAITKIND_SPURIOUS;
39f77062 3772 return inferior_ptid;
37de36c6
KB
3773 }
3774 else if (syscall_is_lwp_exit (pi, what))
3775 {
17faa917
DJ
3776 if (print_thread_events)
3777 printf_unfiltered (_("[%s exited]\n"),
3778 target_pid_to_str (retval));
37de36c6
KB
3779 delete_thread (retval);
3780 status->kind = TARGET_WAITKIND_SPURIOUS;
3781 return retval;
c3f6f71d 3782 }
37de36c6
KB
3783 else if (0)
3784 {
3785 /* FIXME: Do we need to handle SYS_sproc,
3786 SYS_fork, or SYS_vfork here? The old procfs
3787 seemed to use this event to handle threads on
3788 older (non-LWP) systems, where I'm assuming
19958708 3789 that threads were actually separate processes.
37de36c6
KB
3790 Irix, maybe? Anyway, low priority for now. */
3791 }
3792 else
3793 {
a3f17187 3794 printf_filtered (_("procfs: trapped on exit from "));
37de36c6
KB
3795 proc_prettyprint_syscall (proc_what (pi), 0);
3796 printf_filtered ("\n");
3797#ifndef PIOCSSPCACT
3798 {
3799 long i, nsysargs, *sysargs;
3800
3801 if ((nsysargs = proc_nsysarg (pi)) > 0 &&
3802 (sysargs = proc_sysargs (pi)) != NULL)
3803 {
77382aee
PA
3804 printf_filtered (_("%ld syscall arguments:\n"),
3805 nsysargs);
37de36c6 3806 for (i = 0; i < nsysargs; i++)
19958708 3807 printf_filtered ("#%ld: 0x%08lx\n",
37de36c6
KB
3808 i, sysargs[i]);
3809 }
3810 }
c3f6f71d 3811#endif
37de36c6 3812 status->kind = TARGET_WAITKIND_SPURIOUS;
39f77062 3813 return inferior_ptid;
37de36c6 3814 }
c3f6f71d
JM
3815 break;
3816 case PR_REQUESTED:
3817#if 0 /* FIXME */
3818 wstat = (SIGSTOP << 8) | 0177;
3819 break;
3820#else
3821 if (retry < 5)
3822 {
a3f17187 3823 printf_filtered (_("Retry #%d:\n"), retry);
c3f6f71d
JM
3824 pi->status_valid = 0;
3825 goto wait_again;
3826 }
3827 else
3828 {
3829 /* If not in procinfo list, add it. */
39f77062
KB
3830 temp_tid = proc_get_current_thread (pi);
3831 if (!find_procinfo (pi->pid, temp_tid))
3832 create_procinfo (pi->pid, temp_tid);
c3f6f71d
JM
3833
3834 /* If not in GDB's thread list, add it. */
dfd4cc63 3835 temp_ptid = ptid_build (pi->pid, temp_tid, 0);
39f77062 3836 if (!in_thread_list (temp_ptid))
93815fbf 3837 add_thread (temp_ptid);
c3f6f71d
JM
3838
3839 status->kind = TARGET_WAITKIND_STOPPED;
b196bc4c 3840 status->value.sig = GDB_SIGNAL_0;
c3f6f71d
JM
3841 return retval;
3842 }
3843#endif
3844 case PR_JOBCONTROL:
3845 wstat = (what << 8) | 0177;
3846 break;
3847 case PR_FAULTED:
7af6341f 3848 switch (what) {
c3f6f71d
JM
3849#ifdef FLTWATCH
3850 case FLTWATCH:
3851 wstat = (SIGTRAP << 8) | 0177;
3852 break;
3853#endif
3854#ifdef FLTKWATCH
3855 case FLTKWATCH:
3856 wstat = (SIGTRAP << 8) | 0177;
3857 break;
3858#endif
0df8b418 3859 /* FIXME: use si_signo where possible. */
c3f6f71d 3860 case FLTPRIV:
0df8b418 3861#if (FLTILL != FLTPRIV) /* Avoid "duplicate case" error. */
c3f6f71d
JM
3862 case FLTILL:
3863#endif
3864 wstat = (SIGILL << 8) | 0177;
3865 break;
3866 case FLTBPT:
0df8b418 3867#if (FLTTRACE != FLTBPT) /* Avoid "duplicate case" error. */
c3f6f71d
JM
3868 case FLTTRACE:
3869#endif
3870 wstat = (SIGTRAP << 8) | 0177;
3871 break;
3872 case FLTSTACK:
3873 case FLTACCESS:
0df8b418 3874#if (FLTBOUNDS != FLTSTACK) /* Avoid "duplicate case" error. */
c3f6f71d
JM
3875 case FLTBOUNDS:
3876#endif
3877 wstat = (SIGSEGV << 8) | 0177;
3878 break;
3879 case FLTIOVF:
3880 case FLTIZDIV:
0df8b418 3881#if (FLTFPE != FLTIOVF) /* Avoid "duplicate case" error. */
c3f6f71d
JM
3882 case FLTFPE:
3883#endif
3884 wstat = (SIGFPE << 8) | 0177;
3885 break;
3e43a32a 3886 case FLTPAGE: /* Recoverable page fault */
0df8b418
MS
3887 default: /* FIXME: use si_signo if possible for
3888 fault. */
39f77062 3889 retval = pid_to_ptid (-1);
c3f6f71d 3890 printf_filtered ("procfs:%d -- ", __LINE__);
a3f17187 3891 printf_filtered (_("child stopped for unknown reason:\n"));
c3f6f71d 3892 proc_prettyprint_why (why, what, 1);
8a3fe4f8 3893 error (_("... giving up..."));
c3f6f71d
JM
3894 break;
3895 }
3896 break; /* case PR_FAULTED: */
3897 default: /* switch (why) unmatched */
3898 printf_filtered ("procfs:%d -- ", __LINE__);
a3f17187 3899 printf_filtered (_("child stopped for unknown reason:\n"));
c3f6f71d 3900 proc_prettyprint_why (why, what, 1);
8a3fe4f8 3901 error (_("... giving up..."));
c3f6f71d
JM
3902 break;
3903 }
77382aee
PA
3904 /* Got this far without error: If retval isn't in the
3905 threads database, add it. */
dfd4cc63 3906 if (ptid_get_pid (retval) > 0 &&
39f77062 3907 !ptid_equal (retval, inferior_ptid) &&
c3f6f71d 3908 !in_thread_list (retval))
c906108c 3909 {
77382aee
PA
3910 /* We have a new thread. We need to add it both to
3911 GDB's list and to our own. If we don't create a
3912 procinfo, resume may be unhappy later. */
c3f6f71d 3913 add_thread (retval);
dfd4cc63
LM
3914 if (find_procinfo (ptid_get_pid (retval),
3915 ptid_get_lwp (retval)) == NULL)
3916 create_procinfo (ptid_get_pid (retval),
3917 ptid_get_lwp (retval));
c906108c 3918 }
c906108c 3919 }
0df8b418 3920 else /* Flags do not indicate STOPPED. */
c906108c 3921 {
0df8b418 3922 /* surely this can't happen... */
c3f6f71d
JM
3923 printf_filtered ("procfs:%d -- process not stopped.\n",
3924 __LINE__);
3925 proc_prettyprint_flags (flags, 1);
8a3fe4f8 3926 error (_("procfs: ...giving up..."));
c906108c 3927 }
c906108c 3928 }
c906108c 3929
c3f6f71d
JM
3930 if (status)
3931 store_waitstatus (status, wstat);
c906108c
SS
3932 }
3933
c3f6f71d
JM
3934 return retval;
3935}
c906108c 3936
4e73f23d
RM
3937/* Perform a partial transfer to/from the specified object. For
3938 memory transfers, fall back to the old memory xfer functions. */
3939
9b409511 3940static enum target_xfer_status
4e73f23d 3941procfs_xfer_partial (struct target_ops *ops, enum target_object object,
0b62613e 3942 const char *annex, gdb_byte *readbuf,
9b409511
YQ
3943 const gdb_byte *writebuf, ULONGEST offset, ULONGEST len,
3944 ULONGEST *xfered_len)
4e73f23d
RM
3945{
3946 switch (object)
3947 {
3948 case TARGET_OBJECT_MEMORY:
e96027e0 3949 return procfs_xfer_memory (readbuf, writebuf, offset, len, xfered_len);
4e73f23d
RM
3950
3951#ifdef NEW_PROC_API
3952 case TARGET_OBJECT_AUXV:
9f2982ff 3953 return memory_xfer_auxv (ops, object, annex, readbuf, writebuf,
9b409511 3954 offset, len, xfered_len);
4e73f23d
RM
3955#endif
3956
3957 default:
e75fdfca
TT
3958 return ops->beneath->to_xfer_partial (ops->beneath, object, annex,
3959 readbuf, writebuf, offset, len,
3960 xfered_len);
4e73f23d
RM
3961 }
3962}
3963
e96027e0
PA
3964/* Helper for procfs_xfer_partial that handles memory transfers.
3965 Arguments are like target_xfer_partial. */
4e73f23d 3966
e96027e0
PA
3967static enum target_xfer_status
3968procfs_xfer_memory (gdb_byte *readbuf, const gdb_byte *writebuf,
3969 ULONGEST memaddr, ULONGEST len, ULONGEST *xfered_len)
c3f6f71d
JM
3970{
3971 procinfo *pi;
e96027e0 3972 int nbytes;
c906108c 3973
0df8b418 3974 /* Find procinfo for main process. */
dfd4cc63 3975 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
c3f6f71d
JM
3976 if (pi->as_fd == 0 &&
3977 open_procinfo_files (pi, FD_AS) == 0)
c906108c 3978 {
c3f6f71d 3979 proc_warn (pi, "xfer_memory, open_proc_files", __LINE__);
e96027e0 3980 return TARGET_XFER_E_IO;
c906108c 3981 }
c906108c 3982
e96027e0
PA
3983 if (lseek (pi->as_fd, (off_t) memaddr, SEEK_SET) != (off_t) memaddr)
3984 return TARGET_XFER_E_IO;
3985
3986 if (writebuf != NULL)
c906108c 3987 {
e96027e0
PA
3988 PROCFS_NOTE ("write memory:\n");
3989 nbytes = write (pi->as_fd, writebuf, len);
3990 }
3991 else
3992 {
3993 PROCFS_NOTE ("read memory:\n");
3994 nbytes = read (pi->as_fd, readbuf, len);
c906108c 3995 }
e96027e0
PA
3996 if (nbytes <= 0)
3997 return TARGET_XFER_E_IO;
3998 *xfered_len = nbytes;
3999 return TARGET_XFER_OK;
c906108c
SS
4000}
4001
77382aee
PA
4002/* Called by target_resume before making child runnable. Mark cached
4003 registers and status's invalid. If there are "dirty" caches that
4004 need to be written back to the child process, do that.
c906108c 4005
77382aee
PA
4006 File descriptors are also cached. As they are a limited resource,
4007 we cannot hold onto them indefinitely. However, as they are
4008 expensive to open, we don't want to throw them away
4009 indescriminately either. As a compromise, we will keep the file
4010 descriptors for the parent process, but discard any file
4011 descriptors we may have accumulated for the threads.
4012
4013 As this function is called by iterate_over_threads, it always
4014 returns zero (so that iterate_over_threads will keep
4015 iterating). */
c3f6f71d
JM
4016
4017static int
fba45db2 4018invalidate_cache (procinfo *parent, procinfo *pi, void *ptr)
c906108c 4019{
77382aee
PA
4020 /* About to run the child; invalidate caches and do any other
4021 cleanup. */
c906108c 4022
c3f6f71d
JM
4023#if 0
4024 if (pi->gregs_dirty)
4025 if (parent == NULL ||
4026 proc_get_current_thread (parent) != pi->tid)
4027 if (!proc_set_gregs (pi)) /* flush gregs cache */
4028 proc_warn (pi, "target_resume, set_gregs",
4029 __LINE__);
f5656ead 4030 if (gdbarch_fp0_regnum (target_gdbarch ()) >= 0)
60054393
MS
4031 if (pi->fpregs_dirty)
4032 if (parent == NULL ||
4033 proc_get_current_thread (parent) != pi->tid)
4034 if (!proc_set_fpregs (pi)) /* flush fpregs cache */
19958708 4035 proc_warn (pi, "target_resume, set_fpregs",
60054393 4036 __LINE__);
c906108c 4037#endif
c906108c 4038
c3f6f71d 4039 if (parent != NULL)
c906108c 4040 {
c3f6f71d 4041 /* The presence of a parent indicates that this is an LWP.
19958708 4042 Close any file descriptors that it might have open.
c3f6f71d
JM
4043 We don't do this to the master (parent) procinfo. */
4044
4045 close_procinfo_files (pi);
c906108c 4046 }
c3f6f71d
JM
4047 pi->gregs_valid = 0;
4048 pi->fpregs_valid = 0;
4049#if 0
4050 pi->gregs_dirty = 0;
4051 pi->fpregs_dirty = 0;
c906108c 4052#endif
c3f6f71d
JM
4053 pi->status_valid = 0;
4054 pi->threads_valid = 0;
c906108c 4055
c3f6f71d 4056 return 0;
c906108c
SS
4057}
4058
0fda6bd2 4059#if 0
77382aee
PA
4060/* A callback function for iterate_over_threads. Find the
4061 asynchronous signal thread, and make it runnable. See if that
4062 helps matters any. */
c906108c 4063
c3f6f71d 4064static int
fba45db2 4065make_signal_thread_runnable (procinfo *process, procinfo *pi, void *ptr)
c906108c 4066{
c3f6f71d
JM
4067#ifdef PR_ASLWP
4068 if (proc_flags (pi) & PR_ASLWP)
c906108c 4069 {
c3f6f71d
JM
4070 if (!proc_run_process (pi, 0, -1))
4071 proc_error (pi, "make_signal_thread_runnable", __LINE__);
4072 return 1;
c906108c 4073 }
c906108c 4074#endif
c3f6f71d 4075 return 0;
c906108c 4076}
0fda6bd2 4077#endif
c906108c 4078
77382aee
PA
4079/* Make the child process runnable. Normally we will then call
4080 procfs_wait and wait for it to stop again (unless gdb is async).
4081
4082 If STEP is true, then arrange for the child to stop again after
4083 executing a single instruction. If SIGNO is zero, then cancel any
4084 pending signal; if non-zero, then arrange for the indicated signal
4085 to be delivered to the child when it runs. If PID is -1, then
4086 allow any child thread to run; if non-zero, then allow only the
4087 indicated thread to run. (not implemented yet). */
c906108c
SS
4088
4089static void
28439f5e 4090procfs_resume (struct target_ops *ops,
2ea28649 4091 ptid_t ptid, int step, enum gdb_signal signo)
c906108c 4092{
c3f6f71d
JM
4093 procinfo *pi, *thread;
4094 int native_signo;
4095
19958708 4096 /* 2.1:
c3f6f71d 4097 prrun.prflags |= PRSVADDR;
19958708 4098 prrun.pr_vaddr = $PC; set resume address
c3f6f71d 4099 prrun.prflags |= PRSTRACE; trace signals in pr_trace (all)
19958708 4100 prrun.prflags |= PRSFAULT; trace faults in pr_fault (all but PAGE)
c3f6f71d
JM
4101 prrun.prflags |= PRCFAULT; clear current fault.
4102
4103 PRSTRACE and PRSFAULT can be done by other means
77382aee 4104 (proc_trace_signals, proc_trace_faults)
c3f6f71d
JM
4105 PRSVADDR is unnecessary.
4106 PRCFAULT may be replaced by a PIOCCFAULT call (proc_clear_current_fault)
4107 This basically leaves PRSTEP and PRCSIG.
4108 PRCSIG is like PIOCSSIG (proc_clear_current_signal).
4109 So basically PR_STEP is the sole argument that must be passed
77382aee 4110 to proc_run_process (for use in the prrun struct by ioctl). */
c3f6f71d 4111
0df8b418 4112 /* Find procinfo for main process. */
dfd4cc63 4113 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
c3f6f71d 4114
77382aee 4115 /* First cut: ignore pid argument. */
c3f6f71d 4116 errno = 0;
c906108c 4117
c3f6f71d
JM
4118 /* Convert signal to host numbering. */
4119 if (signo == 0 ||
a493e3e2 4120 (signo == GDB_SIGNAL_STOP && pi->ignore_next_sigstop))
c3f6f71d
JM
4121 native_signo = 0;
4122 else
2ea28649 4123 native_signo = gdb_signal_to_host (signo);
c906108c 4124
c3f6f71d 4125 pi->ignore_next_sigstop = 0;
c906108c 4126
77382aee
PA
4127 /* Running the process voids all cached registers and status. */
4128 /* Void the threads' caches first. */
19958708 4129 proc_iterate_over_threads (pi, invalidate_cache, NULL);
c3f6f71d
JM
4130 /* Void the process procinfo's caches. */
4131 invalidate_cache (NULL, pi, NULL);
c906108c 4132
dfd4cc63 4133 if (ptid_get_pid (ptid) != -1)
c906108c 4134 {
77382aee
PA
4135 /* Resume a specific thread, presumably suppressing the
4136 others. */
dfd4cc63 4137 thread = find_procinfo (ptid_get_pid (ptid), ptid_get_lwp (ptid));
7de45904 4138 if (thread != NULL)
c906108c 4139 {
c3f6f71d
JM
4140 if (thread->tid != 0)
4141 {
77382aee
PA
4142 /* We're to resume a specific thread, and not the
4143 others. Set the child process's PR_ASYNC flag. */
c3f6f71d
JM
4144#ifdef PR_ASYNC
4145 if (!proc_set_async (pi))
4146 proc_error (pi, "target_resume, set_async", __LINE__);
4147#endif
4148#if 0
19958708 4149 proc_iterate_over_threads (pi,
c3f6f71d
JM
4150 make_signal_thread_runnable,
4151 NULL);
4152#endif
0df8b418
MS
4153 pi = thread; /* Substitute the thread's procinfo
4154 for run. */
c3f6f71d 4155 }
c906108c
SS
4156 }
4157 }
c906108c 4158
c3f6f71d 4159 if (!proc_run_process (pi, step, native_signo))
c906108c 4160 {
c3f6f71d 4161 if (errno == EBUSY)
77382aee
PA
4162 warning (_("resume: target already running. "
4163 "Pretend to resume, and hope for the best!"));
c3f6f71d
JM
4164 else
4165 proc_error (pi, "target_resume", __LINE__);
c906108c 4166 }
c3f6f71d 4167}
c906108c 4168
77382aee 4169/* Set up to trace signals in the child process. */
c906108c 4170
c3f6f71d 4171static void
94bedb42
TT
4172procfs_pass_signals (struct target_ops *self,
4173 int numsigs, unsigned char *pass_signals)
c3f6f71d 4174{
37de36c6 4175 gdb_sigset_t signals;
dfd4cc63 4176 procinfo *pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
2455069d 4177 int signo;
c906108c 4178
2455069d
UW
4179 prfillset (&signals);
4180
4181 for (signo = 0; signo < NSIG; signo++)
4182 {
2ea28649 4183 int target_signo = gdb_signal_from_host (signo);
2455069d
UW
4184 if (target_signo < numsigs && pass_signals[target_signo])
4185 gdb_prdelset (&signals, signo);
4186 }
4187
4188 if (!proc_set_traced_signals (pi, &signals))
4189 proc_error (pi, "pass_signals", __LINE__);
c3f6f71d 4190}
c906108c 4191
77382aee 4192/* Print status information about the child process. */
c906108c 4193
c3f6f71d 4194static void
fba45db2 4195procfs_files_info (struct target_ops *ignore)
c3f6f71d 4196{
181e7f93 4197 struct inferior *inf = current_inferior ();
f4a14ae6 4198
a3f17187 4199 printf_filtered (_("\tUsing the running image of %s %s via /proc.\n"),
181e7f93 4200 inf->attach_flag? "attached": "child",
39f77062 4201 target_pid_to_str (inferior_ptid));
c3f6f71d 4202}
c906108c 4203
77382aee
PA
4204/* Stop the child process asynchronously, as when the gdb user types
4205 control-c or presses a "stop" button. Works by sending
4206 kill(SIGINT) to the child's process group. */
c906108c 4207
c3f6f71d 4208static void
bfedc46a 4209procfs_interrupt (struct target_ops *self, ptid_t ptid)
c3f6f71d 4210{
7e1789f5 4211 kill (-inferior_process_group (), SIGINT);
c906108c
SS
4212}
4213
77382aee
PA
4214/* Make it die. Wait for it to die. Clean up after it. Note: this
4215 should only be applied to the real process, not to an LWP, because
4216 of the check for parent-process. If we need this to work for an
4217 LWP, it needs some more logic. */
c906108c 4218
c3f6f71d 4219static void
fba45db2 4220unconditionally_kill_inferior (procinfo *pi)
c3f6f71d
JM
4221{
4222 int parent_pid;
c906108c 4223
c3f6f71d 4224 parent_pid = proc_parent_pid (pi);
c3f6f71d
JM
4225#ifdef PROCFS_NEED_PIOCSSIG_FOR_KILL
4226 /* Alpha OSF/1-2.x procfs needs a PIOCSSIG call with a SIGKILL signal
4227 to kill the inferior, otherwise it might remain stopped with a
4228 pending SIGKILL.
4229 We do not check the result of the PIOCSSIG, the inferior might have
4230 died already. */
4231 {
37de36c6 4232 gdb_siginfo_t newsiginfo;
c906108c 4233
c3f6f71d
JM
4234 memset ((char *) &newsiginfo, 0, sizeof (newsiginfo));
4235 newsiginfo.si_signo = SIGKILL;
4236 newsiginfo.si_code = 0;
4237 newsiginfo.si_errno = 0;
4238 newsiginfo.si_pid = getpid ();
4239 newsiginfo.si_uid = getuid ();
0df8b418 4240 /* FIXME: use proc_set_current_signal. */
c3f6f71d
JM
4241 ioctl (pi->ctl_fd, PIOCSSIG, &newsiginfo);
4242 }
4243#else /* PROCFS_NEED_PIOCSSIG_FOR_KILL */
4244 if (!proc_kill (pi, SIGKILL))
103b3ef5 4245 proc_error (pi, "unconditionally_kill, proc_kill", __LINE__);
c3f6f71d
JM
4246#endif /* PROCFS_NEED_PIOCSSIG_FOR_KILL */
4247 destroy_procinfo (pi);
c906108c 4248
c3f6f71d
JM
4249 /* If pi is GDB's child, wait for it to die. */
4250 if (parent_pid == getpid ())
19958708 4251 /* FIXME: should we use waitpid to make sure we get the right event?
c3f6f71d
JM
4252 Should we check the returned event? */
4253 {
0d06e24b 4254#if 0
c3f6f71d 4255 int status, ret;
c906108c 4256
c3f6f71d
JM
4257 ret = waitpid (pi->pid, &status, 0);
4258#else
4259 wait (NULL);
4260#endif
4261 }
4262}
c906108c 4263
77382aee
PA
4264/* We're done debugging it, and we want it to go away. Then we want
4265 GDB to forget all about it. */
c906108c 4266
19958708 4267static void
7d85a9c0 4268procfs_kill_inferior (struct target_ops *ops)
c906108c 4269{
39f77062 4270 if (!ptid_equal (inferior_ptid, null_ptid)) /* ? */
c3f6f71d 4271 {
0df8b418 4272 /* Find procinfo for main process. */
dfd4cc63 4273 procinfo *pi = find_procinfo (ptid_get_pid (inferior_ptid), 0);
c906108c 4274
c3f6f71d
JM
4275 if (pi)
4276 unconditionally_kill_inferior (pi);
bc1e6c81 4277 target_mourn_inferior (inferior_ptid);
c906108c 4278 }
c3f6f71d
JM
4279}
4280
77382aee 4281/* Forget we ever debugged this thing! */
c906108c 4282
19958708 4283static void
136d6dae 4284procfs_mourn_inferior (struct target_ops *ops)
c3f6f71d
JM
4285{
4286 procinfo *pi;
c906108c 4287
39f77062 4288 if (!ptid_equal (inferior_ptid, null_ptid))
c3f6f71d 4289 {
0df8b418 4290 /* Find procinfo for main process. */
dfd4cc63 4291 pi = find_procinfo (ptid_get_pid (inferior_ptid), 0);
c3f6f71d
JM
4292 if (pi)
4293 destroy_procinfo (pi);
c906108c 4294 }
6a3cb8e8
PA
4295
4296 generic_mourn_inferior ();
8181d85f 4297
6a3cb8e8 4298 inf_child_maybe_unpush_target (ops);
c3f6f71d 4299}
c906108c 4300
77382aee
PA
4301/* When GDB forks to create a runnable inferior process, this function
4302 is called on the parent side of the fork. It's job is to do
4303 whatever is necessary to make the child ready to be debugged, and
4304 then wait for the child to synchronize. */
c906108c 4305
19958708 4306static void
28439f5e 4307procfs_init_inferior (struct target_ops *ops, int pid)
c3f6f71d
JM
4308{
4309 procinfo *pi;
37de36c6 4310 gdb_sigset_t signals;
c3f6f71d 4311 int fail;
2689673f 4312 int lwpid;
c906108c 4313
c3f6f71d
JM
4314 /* This routine called on the parent side (GDB side)
4315 after GDB forks the inferior. */
6a3cb8e8
PA
4316 if (!target_is_pushed (ops))
4317 push_target (ops);
c906108c 4318
c3f6f71d 4319 if ((pi = create_procinfo (pid, 0)) == NULL)
9b20d036 4320 perror (_("procfs: out of memory in 'init_inferior'"));
c3f6f71d
JM
4321
4322 if (!open_procinfo_files (pi, FD_CTL))
4323 proc_error (pi, "init_inferior, open_proc_files", __LINE__);
4324
4325 /*
4326 xmalloc // done
4327 open_procinfo_files // done
4328 link list // done
4329 prfillset (trace)
4330 procfs_notice_signals
4331 prfillset (fault)
4332 prdelset (FLTPAGE)
4333 PIOCWSTOP
4334 PIOCSFAULT
4335 */
4336
77382aee 4337 /* If not stopped yet, wait for it to stop. */
c3f6f71d
JM
4338 if (!(proc_flags (pi) & PR_STOPPED) &&
4339 !(proc_wait_for_stop (pi)))
4340 dead_procinfo (pi, "init_inferior: wait_for_stop failed", KILL);
4341
4342 /* Save some of the /proc state to be restored if we detach. */
4343 /* FIXME: Why? In case another debugger was debugging it?
0df8b418 4344 We're it's parent, for Ghu's sake! */
c3f6f71d
JM
4345 if (!proc_get_traced_signals (pi, &pi->saved_sigset))
4346 proc_error (pi, "init_inferior, get_traced_signals", __LINE__);
4347 if (!proc_get_held_signals (pi, &pi->saved_sighold))
4348 proc_error (pi, "init_inferior, get_held_signals", __LINE__);
4349 if (!proc_get_traced_faults (pi, &pi->saved_fltset))
4350 proc_error (pi, "init_inferior, get_traced_faults", __LINE__);
37de36c6 4351 if (!proc_get_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d 4352 proc_error (pi, "init_inferior, get_traced_sysentry", __LINE__);
37de36c6 4353 if (!proc_get_traced_sysexit (pi, pi->saved_exitset))
c3f6f71d
JM
4354 proc_error (pi, "init_inferior, get_traced_sysexit", __LINE__);
4355
c3f6f71d
JM
4356 if ((fail = procfs_debug_inferior (pi)) != 0)
4357 proc_error (pi, "init_inferior (procfs_debug_inferior)", fail);
4358
0d06e24b
JM
4359 /* FIXME: logically, we should really be turning OFF run-on-last-close,
4360 and possibly even turning ON kill-on-last-close at this point. But
4361 I can't make that change without careful testing which I don't have
4362 time to do right now... */
c3f6f71d
JM
4363 /* Turn on run-on-last-close flag so that the child
4364 will die if GDB goes away for some reason. */
4365 if (!proc_set_run_on_last_close (pi))
4366 proc_error (pi, "init_inferior, set_RLC", __LINE__);
4367
2689673f
PA
4368 /* We now have have access to the lwpid of the main thread/lwp. */
4369 lwpid = proc_get_current_thread (pi);
4370
4371 /* Create a procinfo for the main lwp. */
4372 create_procinfo (pid, lwpid);
4373
4374 /* We already have a main thread registered in the thread table at
4375 this point, but it didn't have any lwp info yet. Notify the core
4376 about it. This changes inferior_ptid as well. */
4377 thread_change_ptid (pid_to_ptid (pid),
793e1c06 4378 ptid_build (pid, lwpid, 0));
c906108c 4379
2090129c 4380 gdb_startup_inferior (pid, START_INFERIOR_TRAPS_EXPECTED);
9185ddce
JB
4381
4382#ifdef SYS_syssgi
4383 /* On mips-irix, we need to stop the inferior early enough during
4384 the startup phase in order to be able to load the shared library
4385 symbols and insert the breakpoints that are located in these shared
4386 libraries. Stopping at the program entry point is not good enough
4387 because the -init code is executed before the execution reaches
4388 that point.
4389
4390 So what we need to do is to insert a breakpoint in the runtime
4391 loader (rld), more precisely in __dbx_link(). This procedure is
4392 called by rld once all shared libraries have been mapped, but before
0df8b418 4393 the -init code is executed. Unfortuantely, this is not straightforward,
9185ddce
JB
4394 as rld is not part of the executable we are running, and thus we need
4395 the inferior to run until rld itself has been mapped in memory.
77382aee 4396
9185ddce
JB
4397 For this, we trace all syssgi() syscall exit events. Each time
4398 we detect such an event, we iterate over each text memory maps,
4399 get its associated fd, and scan the symbol table for __dbx_link().
4400 When found, we know that rld has been mapped, and that we can insert
4401 the breakpoint at the symbol address. Once the dbx_link() breakpoint
4402 has been inserted, the syssgi() notifications are no longer necessary,
4403 so they should be canceled. */
4404 proc_trace_syscalls_1 (pi, SYS_syssgi, PR_SYSEXIT, FLAG_SET, 0);
9185ddce 4405#endif
c3f6f71d 4406}
c906108c 4407
77382aee
PA
4408/* When GDB forks to create a new process, this function is called on
4409 the child side of the fork before GDB exec's the user program. Its
4410 job is to make the child minimally debuggable, so that the parent
4411 GDB process can connect to the child and take over. This function
4412 should do only the minimum to make that possible, and to
4413 synchronize with the parent process. The parent process should
4414 take care of the details. */
c3f6f71d
JM
4415
4416static void
fba45db2 4417procfs_set_exec_trap (void)
c3f6f71d
JM
4418{
4419 /* This routine called on the child side (inferior side)
4420 after GDB forks the inferior. It must use only local variables,
4421 because it may be sharing data space with its parent. */
c906108c 4422
c3f6f71d 4423 procinfo *pi;
37de36c6 4424 sysset_t *exitset;
c906108c 4425
c3f6f71d 4426 if ((pi = create_procinfo (getpid (), 0)) == NULL)
e2e0b3e5 4427 perror_with_name (_("procfs: create_procinfo failed in child."));
c906108c 4428
c3f6f71d
JM
4429 if (open_procinfo_files (pi, FD_CTL) == 0)
4430 {
4431 proc_warn (pi, "set_exec_trap, open_proc_files", __LINE__);
4432 gdb_flush (gdb_stderr);
77382aee
PA
4433 /* No need to call "dead_procinfo", because we're going to
4434 exit. */
c3f6f71d
JM
4435 _exit (127);
4436 }
c906108c 4437
c3f6f71d
JM
4438#ifdef PRFS_STOPEXEC /* defined on OSF */
4439 /* OSF method for tracing exec syscalls. Quoting:
4440 Under Alpha OSF/1 we have to use a PIOCSSPCACT ioctl to trace
4441 exits from exec system calls because of the user level loader. */
77382aee 4442 /* FIXME: make nice and maybe move into an access function. */
c3f6f71d
JM
4443 {
4444 int prfs_flags;
c906108c 4445
c3f6f71d
JM
4446 if (ioctl (pi->ctl_fd, PIOCGSPCACT, &prfs_flags) < 0)
4447 {
4448 proc_warn (pi, "set_exec_trap (PIOCGSPCACT)", __LINE__);
4449 gdb_flush (gdb_stderr);
4450 _exit (127);
4451 }
4452 prfs_flags |= PRFS_STOPEXEC;
c906108c 4453
c3f6f71d
JM
4454 if (ioctl (pi->ctl_fd, PIOCSSPCACT, &prfs_flags) < 0)
4455 {
4456 proc_warn (pi, "set_exec_trap (PIOCSSPCACT)", __LINE__);
4457 gdb_flush (gdb_stderr);
4458 _exit (127);
4459 }
4460 }
4461#else /* not PRFS_STOPEXEC */
77382aee 4462 /* Everyone else's (except OSF) method for tracing exec syscalls. */
c3f6f71d
JM
4463 /* GW: Rationale...
4464 Not all systems with /proc have all the exec* syscalls with the same
4465 names. On the SGI, for example, there is no SYS_exec, but there
77382aee 4466 *is* a SYS_execv. So, we try to account for that. */
c906108c 4467
37de36c6
KB
4468 exitset = sysset_t_alloc (pi);
4469 gdb_premptysysset (exitset);
c3f6f71d 4470#ifdef SYS_exec
37de36c6 4471 gdb_praddsysset (exitset, SYS_exec);
c3f6f71d
JM
4472#endif
4473#ifdef SYS_execve
37de36c6 4474 gdb_praddsysset (exitset, SYS_execve);
c3f6f71d
JM
4475#endif
4476#ifdef SYS_execv
37de36c6 4477 gdb_praddsysset (exitset, SYS_execv);
c906108c 4478#endif
37de36c6
KB
4479#ifdef DYNAMIC_SYSCALLS
4480 {
4481 int callnum = find_syscall (pi, "execve");
4482
4483 if (callnum >= 0)
4484 gdb_praddsysset (exitset, callnum);
c906108c 4485
37de36c6
KB
4486 callnum = find_syscall (pi, "ra_execve");
4487 if (callnum >= 0)
4488 gdb_praddsysset (exitset, callnum);
4489 }
4490#endif /* DYNAMIC_SYSCALLS */
4491
4492 if (!proc_set_traced_sysexit (pi, exitset))
c906108c 4493 {
c3f6f71d
JM
4494 proc_warn (pi, "set_exec_trap, set_traced_sysexit", __LINE__);
4495 gdb_flush (gdb_stderr);
4496 _exit (127);
c906108c 4497 }
c3f6f71d
JM
4498#endif /* PRFS_STOPEXEC */
4499
0df8b418 4500 /* FIXME: should this be done in the parent instead? */
c3f6f71d
JM
4501 /* Turn off inherit on fork flag so that all grand-children
4502 of gdb start with tracing flags cleared. */
4503 if (!proc_unset_inherit_on_fork (pi))
4504 proc_warn (pi, "set_exec_trap, unset_inherit", __LINE__);
4505
4506 /* Turn off run on last close flag, so that the child process
4507 cannot run away just because we close our handle on it.
4508 We want it to wait for the parent to attach. */
4509 if (!proc_unset_run_on_last_close (pi))
4510 proc_warn (pi, "set_exec_trap, unset_RLC", __LINE__);
4511
19958708 4512 /* FIXME: No need to destroy the procinfo --
0df8b418 4513 we have our own address space, and we're about to do an exec! */
c3f6f71d 4514 /*destroy_procinfo (pi);*/
c906108c 4515}
c906108c 4516
77382aee
PA
4517/* This function is called BEFORE gdb forks the inferior process. Its
4518 only real responsibility is to set things up for the fork, and tell
4519 GDB which two functions to call after the fork (one for the parent,
4520 and one for the child).
4521
4522 This function does a complicated search for a unix shell program,
4523 which it then uses to parse arguments and environment variables to
4524 be sent to the child. I wonder whether this code could not be
4525 abstracted out and shared with other unix targets such as
4526 inf-ptrace? */
c906108c
SS
4527
4528static void
7c5ded6a
SDJ
4529procfs_create_inferior (struct target_ops *ops, const char *exec_file,
4530 const std::string &allargs, char **env, int from_tty)
c906108c
SS
4531{
4532 char *shell_file = getenv ("SHELL");
4533 char *tryname;
28439f5e
PA
4534 int pid;
4535
c906108c
SS
4536 if (shell_file != NULL && strchr (shell_file, '/') == NULL)
4537 {
4538
4539 /* We will be looking down the PATH to find shell_file. If we
c3f6f71d
JM
4540 just do this the normal way (via execlp, which operates by
4541 attempting an exec for each element of the PATH until it
4542 finds one which succeeds), then there will be an exec for
4543 each failed attempt, each of which will cause a PR_SYSEXIT
4544 stop, and we won't know how to distinguish the PR_SYSEXIT's
4545 for these failed execs with the ones for successful execs
4546 (whether the exec has succeeded is stored at that time in the
4547 carry bit or some such architecture-specific and
4548 non-ABI-specified place).
4549
4550 So I can't think of anything better than to search the PATH
4551 now. This has several disadvantages: (1) There is a race
4552 condition; if we find a file now and it is deleted before we
4553 exec it, we lose, even if the deletion leaves a valid file
4554 further down in the PATH, (2) there is no way to know exactly
4555 what an executable (in the sense of "capable of being
4556 exec'd") file is. Using access() loses because it may lose
4557 if the caller is the superuser; failing to use it loses if
4558 there are ACLs or some such. */
c906108c 4559
995816ba
PA
4560 const char *p;
4561 const char *p1;
c906108c 4562 /* FIXME-maybe: might want "set path" command so user can change what
c3f6f71d 4563 path is used from within GDB. */
995816ba 4564 const char *path = getenv ("PATH");
c906108c
SS
4565 int len;
4566 struct stat statbuf;
4567
4568 if (path == NULL)
4569 path = "/bin:/usr/bin";
4570
b196bc4c 4571 tryname = (char *) alloca (strlen (path) + strlen (shell_file) + 2);
c3f6f71d 4572 for (p = path; p != NULL; p = p1 ? p1 + 1: NULL)
c906108c
SS
4573 {
4574 p1 = strchr (p, ':');
4575 if (p1 != NULL)
4576 len = p1 - p;
4577 else
4578 len = strlen (p);
4579 strncpy (tryname, p, len);
4580 tryname[len] = '\0';
4581 strcat (tryname, "/");
4582 strcat (tryname, shell_file);
4583 if (access (tryname, X_OK) < 0)
4584 continue;
4585 if (stat (tryname, &statbuf) < 0)
4586 continue;
4587 if (!S_ISREG (statbuf.st_mode))
4588 /* We certainly need to reject directories. I'm not quite
4589 as sure about FIFOs, sockets, etc., but I kind of doubt
4590 that people want to exec() these things. */
4591 continue;
4592 break;
4593 }
4594 if (p == NULL)
4595 /* Not found. This must be an error rather than merely passing
4596 the file to execlp(), because execlp() would try all the
4597 exec()s, causing GDB to get confused. */
8a3fe4f8 4598 error (_("procfs:%d -- Can't find shell %s in PATH"),
c3f6f71d 4599 __LINE__, shell_file);
c906108c
SS
4600
4601 shell_file = tryname;
4602 }
4603
28439f5e 4604 pid = fork_inferior (exec_file, allargs, env, procfs_set_exec_trap,
e69860f1 4605 NULL, NULL, shell_file, NULL);
28439f5e 4606
2090129c
SDJ
4607 /* We have something that executes now. We'll be running through
4608 the shell at this point (if startup-with-shell is true), but the
4609 pid shouldn't change. */
4610 add_thread_silent (pid_to_ptid (pid));
4611
28439f5e 4612 procfs_init_inferior (ops, pid);
27087a3d
JB
4613}
4614
4615/* An observer for the "inferior_created" event. */
c906108c 4616
27087a3d
JB
4617static void
4618procfs_inferior_created (struct target_ops *ops, int from_tty)
4619{
9185ddce 4620#ifdef SYS_syssgi
77382aee 4621 /* Make sure to cancel the syssgi() syscall-exit notifications.
9185ddce
JB
4622 They should normally have been removed by now, but they may still
4623 be activated if the inferior doesn't use shared libraries, or if
4624 we didn't locate __dbx_link, or if we never stopped in __dbx_link.
27087a3d
JB
4625 See procfs_init_inferior() for more details.
4626
4627 Since these notifications are only ever enabled when we spawned
4628 the inferior ourselves, there is nothing to do when the inferior
4629 was created by attaching to an already running process, or when
4630 debugging a core file. */
4631 if (current_inferior ()->attach_flag || !target_can_run (&current_target))
4632 return;
4633
dfd4cc63
LM
4634 proc_trace_syscalls_1 (find_procinfo_or_die (ptid_get_pid (inferior_ptid),
4635 0), SYS_syssgi, PR_SYSEXIT, FLAG_RESET, 0);
9185ddce 4636#endif
c906108c
SS
4637}
4638
e8032dde 4639/* Callback for update_thread_list. Calls "add_thread". */
c906108c 4640
c3f6f71d 4641static int
fba45db2 4642procfs_notice_thread (procinfo *pi, procinfo *thread, void *ptr)
c906108c 4643{
dfd4cc63 4644 ptid_t gdb_threadid = ptid_build (pi->pid, thread->tid, 0);
c906108c 4645
2689673f 4646 if (!in_thread_list (gdb_threadid) || is_exited (gdb_threadid))
c3f6f71d 4647 add_thread (gdb_threadid);
c906108c 4648
c3f6f71d
JM
4649 return 0;
4650}
4651
77382aee
PA
4652/* Query all the threads that the target knows about, and give them
4653 back to GDB to add to its list. */
c3f6f71d 4654
d3581e61 4655static void
e8032dde 4656procfs_update_thread_list (struct target_ops *ops)
c3f6f71d
JM
4657{
4658 procinfo *pi;
4659
e8032dde
PA
4660 prune_threads ();
4661
0df8b418 4662 /* Find procinfo for main process. */
dfd4cc63 4663 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
c3f6f71d
JM
4664 proc_update_threads (pi);
4665 proc_iterate_over_threads (pi, procfs_notice_thread, NULL);
c906108c
SS
4666}
4667
77382aee
PA
4668/* Return true if the thread is still 'alive'. This guy doesn't
4669 really seem to be doing his job. Got to investigate how to tell
4670 when a thread is really gone. */
c906108c 4671
c906108c 4672static int
28439f5e 4673procfs_thread_alive (struct target_ops *ops, ptid_t ptid)
c906108c 4674{
c3f6f71d
JM
4675 int proc, thread;
4676 procinfo *pi;
c906108c 4677
dfd4cc63
LM
4678 proc = ptid_get_pid (ptid);
4679 thread = ptid_get_lwp (ptid);
0df8b418 4680 /* If I don't know it, it ain't alive! */
c3f6f71d
JM
4681 if ((pi = find_procinfo (proc, thread)) == NULL)
4682 return 0;
4683
4684 /* If I can't get its status, it ain't alive!
4685 What's more, I need to forget about it! */
4686 if (!proc_get_status (pi))
4687 {
4688 destroy_procinfo (pi);
4689 return 0;
4690 }
77382aee
PA
4691 /* I couldn't have got its status if it weren't alive, so it's
4692 alive. */
c3f6f71d 4693 return 1;
c906108c 4694}
c3f6f71d 4695
77382aee
PA
4696/* Convert PTID to a string. Returns the string in a static
4697 buffer. */
c3f6f71d 4698
7a114964 4699static const char *
117de6a9 4700procfs_pid_to_str (struct target_ops *ops, ptid_t ptid)
c3f6f71d
JM
4701{
4702 static char buf[80];
c3f6f71d 4703
dfd4cc63
LM
4704 if (ptid_get_lwp (ptid) == 0)
4705 sprintf (buf, "process %d", ptid_get_pid (ptid));
c3f6f71d 4706 else
dfd4cc63 4707 sprintf (buf, "LWP %ld", ptid_get_lwp (ptid));
5240ceac
MK
4708
4709 return buf;
c3f6f71d
JM
4710}
4711
77382aee 4712/* Insert a watchpoint. */
c3f6f71d 4713
a0911fd0 4714static int
39f77062 4715procfs_set_watchpoint (ptid_t ptid, CORE_ADDR addr, int len, int rwflag,
77382aee 4716 int after)
c906108c 4717{
37de36c6 4718#ifndef AIX5
c3f6f71d 4719 int pflags = 0;
19958708 4720 procinfo *pi;
c3f6f71d 4721
dfd4cc63
LM
4722 pi = find_procinfo_or_die (ptid_get_pid (ptid) == -1 ?
4723 ptid_get_pid (inferior_ptid) : ptid_get_pid (ptid),
4724 0);
c3f6f71d 4725
0df8b418
MS
4726 /* Translate from GDB's flags to /proc's. */
4727 if (len > 0) /* len == 0 means delete watchpoint. */
c906108c 4728 {
0df8b418 4729 switch (rwflag) { /* FIXME: need an enum! */
c3f6f71d
JM
4730 case hw_write: /* default watchpoint (write) */
4731 pflags = WRITE_WATCHFLAG;
4732 break;
4733 case hw_read: /* read watchpoint */
4734 pflags = READ_WATCHFLAG;
4735 break;
4736 case hw_access: /* access watchpoint */
4737 pflags = READ_WATCHFLAG | WRITE_WATCHFLAG;
4738 break;
4739 case hw_execute: /* execution HW breakpoint */
4740 pflags = EXEC_WATCHFLAG;
4741 break;
0df8b418 4742 default: /* Something weird. Return error. */
c906108c 4743 return -1;
c3f6f71d 4744 }
0df8b418 4745 if (after) /* Stop after r/w access is completed. */
c3f6f71d
JM
4746 pflags |= AFTER_WATCHFLAG;
4747 }
4748
4749 if (!proc_set_watchpoint (pi, addr, len, pflags))
4750 {
0df8b418 4751 if (errno == E2BIG) /* Typical error for no resources. */
c3f6f71d
JM
4752 return -1; /* fail */
4753 /* GDB may try to remove the same watchpoint twice.
4754 If a remove request returns no match, don't error. */
c906108c 4755 if (errno == ESRCH && len == 0)
c3f6f71d
JM
4756 return 0; /* ignore */
4757 proc_error (pi, "set_watchpoint", __LINE__);
c906108c 4758 }
37de36c6 4759#endif /* AIX5 */
c906108c
SS
4760 return 0;
4761}
4762
1e03ad20
KB
4763/* Return non-zero if we can set a hardware watchpoint of type TYPE. TYPE
4764 is one of bp_hardware_watchpoint, bp_read_watchpoint, bp_write_watchpoint,
4765 or bp_hardware_watchpoint. CNT is the number of watchpoints used so
4766 far.
19958708 4767
1e03ad20
KB
4768 Note: procfs_can_use_hw_breakpoint() is not yet used by all
4769 procfs.c targets due to the fact that some of them still define
d92524f1 4770 target_can_use_hardware_watchpoint. */
1e03ad20
KB
4771
4772static int
5461485a 4773procfs_can_use_hw_breakpoint (struct target_ops *self,
f486487f
SM
4774 enum bptype type,
4775 int cnt, int othertype)
1e03ad20 4776{
1e03ad20
KB
4777 /* Due to the way that proc_set_watchpoint() is implemented, host
4778 and target pointers must be of the same size. If they are not,
4779 we can't use hardware watchpoints. This limitation is due to the
9a043c1d
AC
4780 fact that proc_set_watchpoint() calls
4781 procfs_address_to_host_pointer(); a close inspection of
4782 procfs_address_to_host_pointer will reveal that an internal error
4783 will be generated when the host and target pointer sizes are
4784 different. */
f5656ead 4785 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
f4a14ae6 4786
4e906f53 4787 if (sizeof (void *) != TYPE_LENGTH (ptr_type))
1e03ad20
KB
4788 return 0;
4789
4790 /* Other tests here??? */
4791
4792 return 1;
1e03ad20
KB
4793}
4794
77382aee
PA
4795/* Returns non-zero if process is stopped on a hardware watchpoint
4796 fault, else returns zero. */
c3f6f71d 4797
25513619 4798static int
6a109b6b 4799procfs_stopped_by_watchpoint (struct target_ops *ops)
c906108c 4800{
c3f6f71d 4801 procinfo *pi;
c906108c 4802
dfd4cc63 4803 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
aaeb7efa 4804
c3f6f71d 4805 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
c906108c 4806 {
c3f6f71d 4807 if (proc_why (pi) == PR_FAULTED)
19958708 4808 {
c906108c 4809#ifdef FLTWATCH
c3f6f71d
JM
4810 if (proc_what (pi) == FLTWATCH)
4811 return 1;
c906108c
SS
4812#endif
4813#ifdef FLTKWATCH
c3f6f71d
JM
4814 if (proc_what (pi) == FLTKWATCH)
4815 return 1;
c906108c 4816#endif
c3f6f71d 4817 }
c906108c
SS
4818 }
4819 return 0;
4820}
c906108c 4821
77382aee
PA
4822/* Returns 1 if the OS knows the position of the triggered watchpoint,
4823 and sets *ADDR to that address. Returns 0 if OS cannot report that
4824 address. This function is only called if
4825 procfs_stopped_by_watchpoint returned 1, thus no further checks are
4826 done. The function also assumes that ADDR is not NULL. */
bf701c2c
PM
4827
4828static int
4829procfs_stopped_data_address (struct target_ops *targ, CORE_ADDR *addr)
4830{
4831 procinfo *pi;
4832
dfd4cc63 4833 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
bf701c2c
PM
4834 return proc_watchpoint_address (pi, addr);
4835}
4836
25513619 4837static int
7bb99c53 4838procfs_insert_watchpoint (struct target_ops *self,
f486487f
SM
4839 CORE_ADDR addr, int len,
4840 enum target_hw_bp_type type,
0cf6dd15 4841 struct expression *cond)
25513619 4842{
d92524f1 4843 if (!target_have_steppable_watchpoint
f5656ead 4844 && !gdbarch_have_nonsteppable_watchpoint (target_gdbarch ()))
25513619
PA
4845 {
4846 /* When a hardware watchpoint fires off the PC will be left at
4847 the instruction following the one which caused the
4848 watchpoint. It will *NOT* be necessary for GDB to step over
4849 the watchpoint. */
4850 return procfs_set_watchpoint (inferior_ptid, addr, len, type, 1);
4851 }
4852 else
4853 {
4854 /* When a hardware watchpoint fires off the PC will be left at
4855 the instruction which caused the watchpoint. It will be
4856 necessary for GDB to step over the watchpoint. */
4857 return procfs_set_watchpoint (inferior_ptid, addr, len, type, 0);
4858 }
4859}
4860
4861static int
11b5219a 4862procfs_remove_watchpoint (struct target_ops *self,
f486487f
SM
4863 CORE_ADDR addr, int len,
4864 enum target_hw_bp_type type,
0cf6dd15 4865 struct expression *cond)
25513619
PA
4866{
4867 return procfs_set_watchpoint (inferior_ptid, addr, 0, 0, 0);
4868}
4869
4870static int
31568a15
TT
4871procfs_region_ok_for_hw_watchpoint (struct target_ops *self,
4872 CORE_ADDR addr, int len)
25513619
PA
4873{
4874 /* The man page for proc(4) on Solaris 2.6 and up says that the
4875 system can support "thousands" of hardware watchpoints, but gives
4876 no method for finding out how many; It doesn't say anything about
4877 the allowed size for the watched area either. So we just tell
4878 GDB 'yes'. */
4879 return 1;
4880}
4881
4882void
4883procfs_use_watchpoints (struct target_ops *t)
4884{
4885 t->to_stopped_by_watchpoint = procfs_stopped_by_watchpoint;
4886 t->to_insert_watchpoint = procfs_insert_watchpoint;
4887 t->to_remove_watchpoint = procfs_remove_watchpoint;
4888 t->to_region_ok_for_hw_watchpoint = procfs_region_ok_for_hw_watchpoint;
d1a7880c 4889 t->to_can_use_hw_breakpoint = procfs_can_use_hw_breakpoint;
bf701c2c 4890 t->to_stopped_data_address = procfs_stopped_data_address;
25513619
PA
4891}
4892
77382aee
PA
4893/* Memory Mappings Functions: */
4894
4895/* Call a callback function once for each mapping, passing it the
4896 mapping, an optional secondary callback function, and some optional
4897 opaque data. Quit and return the first non-zero value returned
4898 from the callback.
4899
4900 PI is the procinfo struct for the process to be mapped. FUNC is
4901 the callback function to be called by this iterator. DATA is the
4902 optional opaque data to be passed to the callback function.
4903 CHILD_FUNC is the optional secondary function pointer to be passed
4904 to the child function. Returns the first non-zero return value
4905 from the callback function, or zero. */
831e682e
MS
4906
4907static int
b8edc417 4908iterate_over_mappings (procinfo *pi, find_memory_region_ftype child_func,
e9ef4f39 4909 void *data,
19958708 4910 int (*func) (struct prmap *map,
b8edc417 4911 find_memory_region_ftype child_func,
831e682e
MS
4912 void *data))
4913{
4914 char pathname[MAX_PROC_NAME_SIZE];
4915 struct prmap *prmaps;
4916 struct prmap *prmap;
4917 int funcstat;
4918 int map_fd;
4919 int nmap;
0a86f364 4920 struct cleanup *cleanups = make_cleanup (null_cleanup, NULL);
831e682e
MS
4921#ifdef NEW_PROC_API
4922 struct stat sbuf;
4923#endif
4924
19958708 4925 /* Get the number of mappings, allocate space,
831e682e
MS
4926 and read the mappings into prmaps. */
4927#ifdef NEW_PROC_API
0df8b418 4928 /* Open map fd. */
831e682e
MS
4929 sprintf (pathname, "/proc/%d/map", pi->pid);
4930 if ((map_fd = open (pathname, O_RDONLY)) < 0)
4931 proc_error (pi, "iterate_over_mappings (open)", __LINE__);
4932
0df8b418 4933 /* Make sure it gets closed again. */
831e682e
MS
4934 make_cleanup_close (map_fd);
4935
19958708 4936 /* Use stat to determine the file size, and compute
831e682e
MS
4937 the number of prmap_t objects it contains. */
4938 if (fstat (map_fd, &sbuf) != 0)
4939 proc_error (pi, "iterate_over_mappings (fstat)", __LINE__);
4940
4941 nmap = sbuf.st_size / sizeof (prmap_t);
4942 prmaps = (struct prmap *) alloca ((nmap + 1) * sizeof (*prmaps));
4943 if (read (map_fd, (char *) prmaps, nmap * sizeof (*prmaps))
4944 != (nmap * sizeof (*prmaps)))
4945 proc_error (pi, "iterate_over_mappings (read)", __LINE__);
4946#else
4947 /* Use ioctl command PIOCNMAP to get number of mappings. */
4948 if (ioctl (pi->ctl_fd, PIOCNMAP, &nmap) != 0)
4949 proc_error (pi, "iterate_over_mappings (PIOCNMAP)", __LINE__);
4950
4951 prmaps = (struct prmap *) alloca ((nmap + 1) * sizeof (*prmaps));
4952 if (ioctl (pi->ctl_fd, PIOCMAP, prmaps) != 0)
4953 proc_error (pi, "iterate_over_mappings (PIOCMAP)", __LINE__);
4954#endif
4955
4956 for (prmap = prmaps; nmap > 0; prmap++, nmap--)
4957 if ((funcstat = (*func) (prmap, child_func, data)) != 0)
0a86f364
JB
4958 {
4959 do_cleanups (cleanups);
4960 return funcstat;
4961 }
831e682e 4962
0a86f364 4963 do_cleanups (cleanups);
831e682e
MS
4964 return 0;
4965}
4966
77382aee 4967/* Implements the to_find_memory_regions method. Calls an external
b8edc417 4968 function for each memory region.
77382aee 4969 Returns the integer value returned by the callback. */
be4d1333
MS
4970
4971static int
19958708 4972find_memory_regions_callback (struct prmap *map,
b8edc417 4973 find_memory_region_ftype func, void *data)
be4d1333 4974{
bf75638e 4975 return (*func) ((CORE_ADDR) map->pr_vaddr,
19958708 4976 map->pr_size,
be4d1333
MS
4977 (map->pr_mflags & MA_READ) != 0,
4978 (map->pr_mflags & MA_WRITE) != 0,
19958708 4979 (map->pr_mflags & MA_EXEC) != 0,
4f69f4c2 4980 1, /* MODIFIED is unknown, pass it as true. */
be4d1333
MS
4981 data);
4982}
4983
77382aee
PA
4984/* External interface. Calls a callback function once for each
4985 mapped memory region in the child process, passing as arguments:
4986
4987 CORE_ADDR virtual_address,
4988 unsigned long size,
4989 int read, TRUE if region is readable by the child
4990 int write, TRUE if region is writable by the child
4991 int execute TRUE if region is executable by the child.
4992
4993 Stops iterating and returns the first non-zero value returned by
4994 the callback. */
be4d1333
MS
4995
4996static int
2e73927c
TT
4997proc_find_memory_regions (struct target_ops *self,
4998 find_memory_region_ftype func, void *data)
be4d1333 4999{
dfd4cc63 5000 procinfo *pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
be4d1333 5001
19958708 5002 return iterate_over_mappings (pi, func, data,
be4d1333
MS
5003 find_memory_regions_callback);
5004}
5005
77382aee 5006/* Returns an ascii representation of a memory mapping's flags. */
c3f6f71d 5007
388faa48 5008static char *
5ae5f592 5009mappingflags (long flags)
388faa48
MS
5010{
5011 static char asciiflags[8];
5012
5013 strcpy (asciiflags, "-------");
5014#if defined (MA_PHYS)
5015 if (flags & MA_PHYS)
5016 asciiflags[0] = 'd';
5017#endif
5018 if (flags & MA_STACK)
5019 asciiflags[1] = 's';
5020 if (flags & MA_BREAK)
5021 asciiflags[2] = 'b';
5022 if (flags & MA_SHARED)
5023 asciiflags[3] = 's';
5024 if (flags & MA_READ)
5025 asciiflags[4] = 'r';
5026 if (flags & MA_WRITE)
5027 asciiflags[5] = 'w';
5028 if (flags & MA_EXEC)
5029 asciiflags[6] = 'x';
5030 return (asciiflags);
5031}
5032
77382aee
PA
5033/* Callback function, does the actual work for 'info proc
5034 mappings'. */
831e682e 5035
831e682e 5036static int
b8edc417 5037info_mappings_callback (struct prmap *map, find_memory_region_ftype ignore,
e9ef4f39 5038 void *unused)
831e682e 5039{
0b62613e 5040 unsigned int pr_off;
831e682e 5041
831e682e 5042#ifdef PCAGENT /* Horrible hack: only defined on Solaris 2.6+ */
0b62613e 5043 pr_off = (unsigned int) map->pr_offset;
831e682e 5044#else
0b62613e 5045 pr_off = map->pr_off;
831e682e 5046#endif
0b62613e 5047
f5656ead 5048 if (gdbarch_addr_bit (target_gdbarch ()) == 32)
f6a96b83 5049 printf_filtered ("\t%#10lx %#10lx %#10lx %#10x %7s\n",
0b62613e
PA
5050 (unsigned long) map->pr_vaddr,
5051 (unsigned long) map->pr_vaddr + map->pr_size - 1,
f6a96b83 5052 (unsigned long) map->pr_size,
0b62613e
PA
5053 pr_off,
5054 mappingflags (map->pr_mflags));
5055 else
f6a96b83 5056 printf_filtered (" %#18lx %#18lx %#10lx %#10x %7s\n",
0b62613e
PA
5057 (unsigned long) map->pr_vaddr,
5058 (unsigned long) map->pr_vaddr + map->pr_size - 1,
f6a96b83 5059 (unsigned long) map->pr_size,
0b62613e
PA
5060 pr_off,
5061 mappingflags (map->pr_mflags));
831e682e
MS
5062
5063 return 0;
5064}
5065
77382aee 5066/* Implement the "info proc mappings" subcommand. */
388faa48
MS
5067
5068static void
5069info_proc_mappings (procinfo *pi, int summary)
5070{
388faa48 5071 if (summary)
0df8b418 5072 return; /* No output for summary mode. */
388faa48 5073
a3f17187 5074 printf_filtered (_("Mapped address spaces:\n\n"));
f5656ead 5075 if (gdbarch_ptr_bit (target_gdbarch ()) == 32)
0b62613e
PA
5076 printf_filtered ("\t%10s %10s %10s %10s %7s\n",
5077 "Start Addr",
5078 " End Addr",
5079 " Size",
5080 " Offset",
5081 "Flags");
5082 else
5083 printf_filtered (" %18s %18s %10s %10s %7s\n",
5084 "Start Addr",
5085 " End Addr",
5086 " Size",
5087 " Offset",
5088 "Flags");
388faa48 5089
831e682e 5090 iterate_over_mappings (pi, NULL, NULL, info_mappings_callback);
388faa48
MS
5091 printf_filtered ("\n");
5092}
5093
77382aee 5094/* Implement the "info proc" command. */
c3f6f71d
JM
5095
5096static void
7bc112c1 5097procfs_info_proc (struct target_ops *ops, const char *args,
145b16a9 5098 enum info_proc_what what)
c906108c 5099{
c3f6f71d 5100 struct cleanup *old_chain;
388faa48
MS
5101 procinfo *process = NULL;
5102 procinfo *thread = NULL;
388faa48
MS
5103 char *tmp = NULL;
5104 int pid = 0;
5105 int tid = 0;
5106 int mappings = 0;
c906108c 5107
145b16a9
UW
5108 switch (what)
5109 {
5110 case IP_MINIMAL:
5111 break;
5112
5113 case IP_MAPPINGS:
5114 case IP_ALL:
5115 mappings = 1;
5116 break;
5117
5118 default:
5119 error (_("Not supported on this target."));
5120 }
5121
c3f6f71d 5122 old_chain = make_cleanup (null_cleanup, 0);
773a1edc
TT
5123 gdb_argv built_argv (args);
5124 for (char *arg : argv)
c3f6f71d 5125 {
773a1edc 5126 if (isdigit (arg[0]))
c3f6f71d 5127 {
773a1edc 5128 pid = strtoul (arg, &tmp, 10);
c3f6f71d
JM
5129 if (*tmp == '/')
5130 tid = strtoul (++tmp, NULL, 10);
5131 }
773a1edc 5132 else if (arg[0] == '/')
c3f6f71d 5133 {
773a1edc 5134 tid = strtoul (arg + 1, NULL, 10);
c3f6f71d 5135 }
c3f6f71d
JM
5136 }
5137 if (pid == 0)
dfd4cc63 5138 pid = ptid_get_pid (inferior_ptid);
c3f6f71d 5139 if (pid == 0)
8a3fe4f8 5140 error (_("No current process: you must name one."));
c3f6f71d 5141 else
c906108c 5142 {
c3f6f71d 5143 /* Have pid, will travel.
0df8b418 5144 First see if it's a process we're already debugging. */
c3f6f71d
JM
5145 process = find_procinfo (pid, 0);
5146 if (process == NULL)
5147 {
19958708 5148 /* No. So open a procinfo for it, but
c3f6f71d
JM
5149 remember to close it again when finished. */
5150 process = create_procinfo (pid, 0);
004527cb 5151 make_cleanup (do_destroy_procinfo_cleanup, process);
c3f6f71d
JM
5152 if (!open_procinfo_files (process, FD_CTL))
5153 proc_error (process, "info proc, open_procinfo_files", __LINE__);
5154 }
c906108c 5155 }
c3f6f71d
JM
5156 if (tid != 0)
5157 thread = create_procinfo (pid, tid);
5158
5159 if (process)
5160 {
a3f17187 5161 printf_filtered (_("process %d flags:\n"), process->pid);
c3f6f71d
JM
5162 proc_prettyprint_flags (proc_flags (process), 1);
5163 if (proc_flags (process) & (PR_STOPPED | PR_ISTOP))
5164 proc_prettyprint_why (proc_why (process), proc_what (process), 1);
5165 if (proc_get_nthreads (process) > 1)
19958708 5166 printf_filtered ("Process has %d threads.\n",
c3f6f71d
JM
5167 proc_get_nthreads (process));
5168 }
5169 if (thread)
5170 {
a3f17187 5171 printf_filtered (_("thread %d flags:\n"), thread->tid);
c3f6f71d
JM
5172 proc_prettyprint_flags (proc_flags (thread), 1);
5173 if (proc_flags (thread) & (PR_STOPPED | PR_ISTOP))
5174 proc_prettyprint_why (proc_why (thread), proc_what (thread), 1);
5175 }
5176
388faa48
MS
5177 if (mappings)
5178 {
5179 info_proc_mappings (process, 0);
5180 }
5181
c3f6f71d 5182 do_cleanups (old_chain);
c906108c
SS
5183}
5184
9185ddce
JB
5185/* Modify the status of the system call identified by SYSCALLNUM in
5186 the set of syscalls that are currently traced/debugged.
5187
5188 If ENTRY_OR_EXIT is set to PR_SYSENTRY, then the entry syscalls set
0df8b418 5189 will be updated. Otherwise, the exit syscalls set will be updated.
9185ddce 5190
0df8b418 5191 If MODE is FLAG_SET, then traces will be enabled. Otherwise, they
9185ddce
JB
5192 will be disabled. */
5193
5194static void
5195proc_trace_syscalls_1 (procinfo *pi, int syscallnum, int entry_or_exit,
77382aee 5196 int mode, int from_tty)
9185ddce
JB
5197{
5198 sysset_t *sysset;
77382aee 5199
9185ddce
JB
5200 if (entry_or_exit == PR_SYSENTRY)
5201 sysset = proc_get_traced_sysentry (pi, NULL);
5202 else
5203 sysset = proc_get_traced_sysexit (pi, NULL);
5204
5205 if (sysset == NULL)
5206 proc_error (pi, "proc-trace, get_traced_sysset", __LINE__);
5207
5208 if (mode == FLAG_SET)
5209 gdb_praddsysset (sysset, syscallnum);
5210 else
5211 gdb_prdelsysset (sysset, syscallnum);
5212
5213 if (entry_or_exit == PR_SYSENTRY)
5214 {
5215 if (!proc_set_traced_sysentry (pi, sysset))
77382aee 5216 proc_error (pi, "proc-trace, set_traced_sysentry", __LINE__);
9185ddce
JB
5217 }
5218 else
5219 {
5220 if (!proc_set_traced_sysexit (pi, sysset))
77382aee 5221 proc_error (pi, "proc-trace, set_traced_sysexit", __LINE__);
9185ddce
JB
5222 }
5223}
5224
c3f6f71d 5225static void
fba45db2 5226proc_trace_syscalls (char *args, int from_tty, int entry_or_exit, int mode)
c906108c 5227{
c3f6f71d 5228 procinfo *pi;
c906108c 5229
dfd4cc63 5230 if (ptid_get_pid (inferior_ptid) <= 0)
8a3fe4f8 5231 error (_("you must be debugging a process to use this command."));
c906108c 5232
c3f6f71d 5233 if (args == NULL || args[0] == 0)
e2e0b3e5 5234 error_no_arg (_("system call to trace"));
c3f6f71d 5235
dfd4cc63 5236 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
c3f6f71d
JM
5237 if (isdigit (args[0]))
5238 {
9185ddce 5239 const int syscallnum = atoi (args);
c906108c 5240
9185ddce 5241 proc_trace_syscalls_1 (pi, syscallnum, entry_or_exit, mode, from_tty);
c3f6f71d
JM
5242 }
5243}
5244
19958708 5245static void
fba45db2 5246proc_trace_sysentry_cmd (char *args, int from_tty)
c906108c 5247{
c3f6f71d
JM
5248 proc_trace_syscalls (args, from_tty, PR_SYSENTRY, FLAG_SET);
5249}
c906108c 5250
19958708 5251static void
fba45db2 5252proc_trace_sysexit_cmd (char *args, int from_tty)
c3f6f71d
JM
5253{
5254 proc_trace_syscalls (args, from_tty, PR_SYSEXIT, FLAG_SET);
c906108c 5255}
c906108c 5256
19958708 5257static void
fba45db2 5258proc_untrace_sysentry_cmd (char *args, int from_tty)
c3f6f71d
JM
5259{
5260 proc_trace_syscalls (args, from_tty, PR_SYSENTRY, FLAG_RESET);
5261}
5262
19958708 5263static void
fba45db2 5264proc_untrace_sysexit_cmd (char *args, int from_tty)
c906108c 5265{
c3f6f71d
JM
5266 proc_trace_syscalls (args, from_tty, PR_SYSEXIT, FLAG_RESET);
5267}
c906108c 5268
c906108c 5269void
fba45db2 5270_initialize_procfs (void)
c906108c 5271{
27087a3d
JB
5272 observer_attach_inferior_created (procfs_inferior_created);
5273
19958708 5274 add_com ("proc-trace-entry", no_class, proc_trace_sysentry_cmd,
1bedd215 5275 _("Give a trace of entries into the syscall."));
19958708 5276 add_com ("proc-trace-exit", no_class, proc_trace_sysexit_cmd,
1bedd215 5277 _("Give a trace of exits from the syscall."));
19958708 5278 add_com ("proc-untrace-entry", no_class, proc_untrace_sysentry_cmd,
1bedd215 5279 _("Cancel a trace of entries into the syscall."));
19958708 5280 add_com ("proc-untrace-exit", no_class, proc_untrace_sysexit_cmd,
1bedd215 5281 _("Cancel a trace of exits from the syscall."));
c3f6f71d
JM
5282}
5283
5284/* =================== END, GDB "MODULE" =================== */
5285
5286
5287
77382aee
PA
5288/* miscellaneous stubs: */
5289
5290/* The following satisfy a few random symbols mostly created by the
5291 solaris threads implementation, which I will chase down later. */
c3f6f71d 5292
77382aee
PA
5293/* Return a pid for which we guarantee we will be able to find a
5294 'live' procinfo. */
c3f6f71d 5295
39f77062 5296ptid_t
fba45db2 5297procfs_first_available (void)
c3f6f71d 5298{
39f77062 5299 return pid_to_ptid (procinfo_list ? procinfo_list->pid : -1);
c3f6f71d 5300}
be4d1333
MS
5301
5302/* =================== GCORE .NOTE "MODULE" =================== */
05b4bd79
PA
5303#if defined (PIOCOPENLWP) || defined (PCAGENT)
5304/* gcore only implemented on solaris (so far) */
be4d1333
MS
5305
5306static char *
19958708 5307procfs_do_thread_registers (bfd *obfd, ptid_t ptid,
2020b7ab 5308 char *note_data, int *note_size,
2ea28649 5309 enum gdb_signal stop_signal)
be4d1333 5310{
594f7785 5311 struct regcache *regcache = get_thread_regcache (ptid);
be4d1333
MS
5312 gdb_gregset_t gregs;
5313 gdb_fpregset_t fpregs;
5314 unsigned long merged_pid;
5315
dfd4cc63 5316 merged_pid = ptid_get_lwp (ptid) << 16 | ptid_get_pid (ptid);
be4d1333 5317
75125405
DJ
5318 /* This part is the old method for fetching registers.
5319 It should be replaced by the newer one using regsets
5320 once it is implemented in this platform:
29082443 5321 gdbarch_iterate_over_regset_sections(). */
75125405 5322
2989a365 5323 scoped_restore save_inferior_ptid = make_scoped_restore (&inferior_ptid);
75125405
DJ
5324 inferior_ptid = ptid;
5325 target_fetch_registers (regcache, -1);
5326
594f7785 5327 fill_gregset (regcache, &gregs, -1);
4c490650 5328#if defined (NEW_PROC_API)
65554fef
MS
5329 note_data = (char *) elfcore_write_lwpstatus (obfd,
5330 note_data,
5331 note_size,
19958708 5332 merged_pid,
65554fef
MS
5333 stop_signal,
5334 &gregs);
5335#else
be4d1333 5336 note_data = (char *) elfcore_write_prstatus (obfd,
65554fef
MS
5337 note_data,
5338 note_size,
19958708 5339 merged_pid,
be4d1333 5340 stop_signal,
65554fef
MS
5341 &gregs);
5342#endif
594f7785 5343 fill_fpregset (regcache, &fpregs, -1);
be4d1333
MS
5344 note_data = (char *) elfcore_write_prfpreg (obfd,
5345 note_data,
5346 note_size,
5347 &fpregs,
5348 sizeof (fpregs));
75125405 5349
be4d1333
MS
5350 return note_data;
5351}
5352
5353struct procfs_corefile_thread_data {
5354 bfd *obfd;
5355 char *note_data;
5356 int *note_size;
2ea28649 5357 enum gdb_signal stop_signal;
be4d1333
MS
5358};
5359
5360static int
65554fef 5361procfs_corefile_thread_callback (procinfo *pi, procinfo *thread, void *data)
be4d1333 5362{
b196bc4c
RO
5363 struct procfs_corefile_thread_data *args
5364 = (struct procfs_corefile_thread_data *) data;
be4d1333 5365
2689673f 5366 if (pi != NULL)
be4d1333 5367 {
dfd4cc63 5368 ptid_t ptid = ptid_build (pi->pid, thread->tid, 0);
f4a14ae6 5369
75125405 5370 args->note_data = procfs_do_thread_registers (args->obfd, ptid,
19958708 5371 args->note_data,
2020b7ab
PA
5372 args->note_size,
5373 args->stop_signal);
be4d1333
MS
5374 }
5375 return 0;
5376}
5377
a223f1e7
JB
5378static int
5379find_signalled_thread (struct thread_info *info, void *data)
5380{
a493e3e2 5381 if (info->suspend.stop_signal != GDB_SIGNAL_0
a223f1e7
JB
5382 && ptid_get_pid (info->ptid) == ptid_get_pid (inferior_ptid))
5383 return 1;
5384
5385 return 0;
5386}
5387
2ea28649 5388static enum gdb_signal
a223f1e7
JB
5389find_stop_signal (void)
5390{
5391 struct thread_info *info =
5392 iterate_over_threads (find_signalled_thread, NULL);
5393
5394 if (info)
16c381f0 5395 return info->suspend.stop_signal;
a223f1e7 5396 else
a493e3e2 5397 return GDB_SIGNAL_0;
a223f1e7
JB
5398}
5399
be4d1333 5400static char *
fc6691b2 5401procfs_make_note_section (struct target_ops *self, bfd *obfd, int *note_size)
be4d1333
MS
5402{
5403 struct cleanup *old_chain;
5404 gdb_gregset_t gregs;
5405 gdb_fpregset_t fpregs;
5406 char fname[16] = {'\0'};
5407 char psargs[80] = {'\0'};
dfd4cc63 5408 procinfo *pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
be4d1333 5409 char *note_data = NULL;
6dbdc4a3 5410 char *inf_args;
be4d1333 5411 struct procfs_corefile_thread_data thread_args;
0b62613e 5412 gdb_byte *auxv;
4e73f23d 5413 int auxv_len;
2ea28649 5414 enum gdb_signal stop_signal;
be4d1333
MS
5415
5416 if (get_exec_file (0))
5417 {
9f37bbcc 5418 strncpy (fname, lbasename (get_exec_file (0)), sizeof (fname));
4e2af517
JM
5419 fname[sizeof (fname) - 1] = 0;
5420 strncpy (psargs, get_exec_file (0), sizeof (psargs));
5421 psargs[sizeof (psargs) - 1] = 0;
6dbdc4a3
MS
5422
5423 inf_args = get_inferior_args ();
5424 if (inf_args && *inf_args &&
5425 strlen (inf_args) < ((int) sizeof (psargs) - (int) strlen (psargs)))
be4d1333 5426 {
19958708 5427 strncat (psargs, " ",
be4d1333 5428 sizeof (psargs) - strlen (psargs));
19958708 5429 strncat (psargs, inf_args,
be4d1333
MS
5430 sizeof (psargs) - strlen (psargs));
5431 }
5432 }
5433
19958708
RM
5434 note_data = (char *) elfcore_write_prpsinfo (obfd,
5435 note_data,
5436 note_size,
5437 fname,
be4d1333
MS
5438 psargs);
5439
651c8d2d
PA
5440 stop_signal = find_stop_signal ();
5441
3e3420f6
PA
5442#ifdef NEW_PROC_API
5443 fill_gregset (get_current_regcache (), &gregs, -1);
5444 note_data = elfcore_write_pstatus (obfd, note_data, note_size,
dfd4cc63 5445 ptid_get_pid (inferior_ptid),
3e3420f6
PA
5446 stop_signal, &gregs);
5447#endif
5448
be4d1333
MS
5449 thread_args.obfd = obfd;
5450 thread_args.note_data = note_data;
5451 thread_args.note_size = note_size;
651c8d2d 5452 thread_args.stop_signal = stop_signal;
3e43a32a
MS
5453 proc_iterate_over_threads (pi, procfs_corefile_thread_callback,
5454 &thread_args);
2689673f 5455 note_data = thread_args.note_data;
be4d1333 5456
13547ab6
DJ
5457 auxv_len = target_read_alloc (&current_target, TARGET_OBJECT_AUXV,
5458 NULL, &auxv);
4e73f23d
RM
5459 if (auxv_len > 0)
5460 {
5461 note_data = elfcore_write_note (obfd, note_data, note_size,
5462 "CORE", NT_AUXV, auxv, auxv_len);
5463 xfree (auxv);
5464 }
5465
be4d1333
MS
5466 return note_data;
5467}
05b4bd79 5468#else /* !Solaris */
65554fef 5469static char *
fc6691b2 5470procfs_make_note_section (struct target_ops *self, bfd *obfd, int *note_size)
65554fef 5471{
8a3fe4f8 5472 error (_("gcore not implemented for this host."));
65554fef
MS
5473 return NULL; /* lint */
5474}
05b4bd79 5475#endif /* Solaris */
be4d1333 5476/* =================== END GCORE .NOTE "MODULE" =================== */