]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/procfs.c
*** empty log message ***
[thirdparty/binutils-gdb.git] / gdb / procfs.c
CommitLineData
c906108c 1/* Machine independent support for SVR4 /proc (process file system) for GDB.
2555fe1a 2
4c38e0a4 3 Copyright (C) 1999, 2000, 2001, 2002, 2003, 2006, 2007, 2008, 2009, 2010
6aba47ca 4 Free Software Foundation, Inc.
2555fe1a 5
c3f6f71d
JM
6 Written by Michael Snyder at Cygnus Solutions.
7 Based on work by Fred Fish, Stu Grossman, Geoff Noer, and others.
c906108c 8
a9762ec7
JB
9 This file is part of GDB.
10
11 This program is free software; you can redistribute it and/or modify
12 it under the terms of the GNU General Public License as published by
13 the Free Software Foundation; either version 3 of the License, or
14 (at your option) any later version.
15
16 This program is distributed in the hope that it will be useful,
17 but WITHOUT ANY WARRANTY; without even the implied warranty of
18 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 GNU General Public License for more details.
20
21 You should have received a copy of the GNU General Public License
22 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c 23
c3f6f71d
JM
24#include "defs.h"
25#include "inferior.h"
26#include "target.h"
27#include "gdbcore.h"
65554fef 28#include "elf-bfd.h" /* for elfcore_write_* */
c3f6f71d 29#include "gdbcmd.h"
0fda6bd2 30#include "gdbthread.h"
7f7fe91e 31#include "regcache.h"
28439f5e 32#include "inf-child.h"
c906108c 33
c3f6f71d
JM
34#if defined (NEW_PROC_API)
35#define _STRUCTURED_PROC 1 /* Should be done by configure script. */
36#endif
c906108c 37
c3f6f71d 38#include <sys/procfs.h>
37de36c6 39#ifdef HAVE_SYS_FAULT_H
c3f6f71d 40#include <sys/fault.h>
37de36c6
KB
41#endif
42#ifdef HAVE_SYS_SYSCALL_H
c3f6f71d 43#include <sys/syscall.h>
37de36c6 44#endif
c3f6f71d 45#include <sys/errno.h>
2555fe1a 46#include "gdb_wait.h"
0fda6bd2
JM
47#include <signal.h>
48#include <ctype.h>
19958708 49#include "gdb_string.h"
df8f7274 50#include "gdb_assert.h"
44270758 51#include "inflow.h"
4e73f23d 52#include "auxv.h"
d1a7880c 53#include "procfs.h"
27087a3d 54#include "observer.h"
0fda6bd2 55
77382aee
PA
56/* This module provides the interface between GDB and the
57 /proc file system, which is used on many versions of Unix
58 as a means for debuggers to control other processes.
59
60 Examples of the systems that use this interface are:
61
62 Irix
63 Solaris
64 OSF
65 Unixware
66 AIX5
67
68 /proc works by imitating a file system: you open a simulated file
69 that represents the process you wish to interact with, and perform
70 operations on that "file" in order to examine or change the state
71 of the other process.
72
73 The most important thing to know about /proc and this module is
74 that there are two very different interfaces to /proc:
75
76 One that uses the ioctl system call, and another that uses read
77 and write system calls.
78
79 This module has to support both /proc interfaces. This means that
80 there are two different ways of doing every basic operation.
81
82 In order to keep most of the code simple and clean, I have defined
83 an interface "layer" which hides all these system calls. An ifdef
84 (NEW_PROC_API) determines which interface we are using, and most or
85 all occurrances of this ifdef should be confined to this interface
86 layer. */
87
88/* Determine which /proc API we are using: The ioctl API defines
89 PIOCSTATUS, while the read/write (multiple fd) API never does. */
c906108c 90
c3f6f71d 91#ifdef NEW_PROC_API
c906108c 92#include <sys/types.h>
4b14d3e4 93#include "gdb_dirent.h" /* opendir/readdir, for listing the LWP's */
c3f6f71d 94#endif
c906108c 95
c3f6f71d
JM
96#include <fcntl.h> /* for O_RDONLY */
97#include <unistd.h> /* for "X_OK" */
98#include "gdb_stat.h" /* for struct stat */
c906108c 99
103b3ef5
MS
100/* Note: procfs-utils.h must be included after the above system header
101 files, because it redefines various system calls using macros.
102 This may be incompatible with the prototype declarations. */
103
103b3ef5
MS
104#include "proc-utils.h"
105
77382aee 106/* Prototypes for supply_gregset etc. */
c60c0f5f
MS
107#include "gregset.h"
108
c3f6f71d 109/* =================== TARGET_OPS "MODULE" =================== */
c906108c 110
77382aee 111/* This module defines the GDB target vector and its methods. */
c906108c 112
136d6dae
VP
113static void procfs_attach (struct target_ops *, char *, int);
114static void procfs_detach (struct target_ops *, char *, int);
28439f5e
PA
115static void procfs_resume (struct target_ops *,
116 ptid_t, int, enum target_signal);
f9c72d52 117static void procfs_stop (ptid_t);
a14ed312 118static void procfs_files_info (struct target_ops *);
28439f5e
PA
119static void procfs_fetch_registers (struct target_ops *,
120 struct regcache *, int);
121static void procfs_store_registers (struct target_ops *,
122 struct regcache *, int);
39f77062 123static void procfs_notice_signals (ptid_t);
7d85a9c0 124static void procfs_kill_inferior (struct target_ops *ops);
136d6dae 125static void procfs_mourn_inferior (struct target_ops *ops);
77382aee 126static void procfs_create_inferior (struct target_ops *, char *,
136d6dae 127 char *, char **, int);
117de6a9 128static ptid_t procfs_wait (struct target_ops *,
4fcbb494 129 ptid_t, struct target_waitstatus *, int);
0b62613e 130static int procfs_xfer_memory (CORE_ADDR, gdb_byte *, int, int,
043780a1
AC
131 struct mem_attrib *attrib,
132 struct target_ops *);
4e73f23d
RM
133static LONGEST procfs_xfer_partial (struct target_ops *ops,
134 enum target_object object,
135 const char *annex,
0b62613e 136 gdb_byte *readbuf, const gdb_byte *writebuf,
4e73f23d 137 ULONGEST offset, LONGEST len);
a14ed312 138
28439f5e 139static int procfs_thread_alive (struct target_ops *ops, ptid_t);
a14ed312 140
28439f5e 141void procfs_find_new_threads (struct target_ops *ops);
117de6a9 142char *procfs_pid_to_str (struct target_ops *, ptid_t);
c3f6f71d 143
19958708
RM
144static int proc_find_memory_regions (int (*) (CORE_ADDR,
145 unsigned long,
146 int, int, int,
147 void *),
be4d1333
MS
148 void *);
149
150static char * procfs_make_note_section (bfd *, int *);
151
1e03ad20
KB
152static int procfs_can_use_hw_breakpoint (int, int, int);
153
c47ffbe3 154#if defined (PR_MODEL_NATIVE) && (PR_MODEL_NATIVE == PR_MODEL_LP64)
77382aee
PA
155/* When GDB is built as 64-bit application on Solaris, the auxv data
156 is presented in 64-bit format. We need to provide a custom parser
157 to handle that. */
c47ffbe3
VP
158static int
159procfs_auxv_parse (struct target_ops *ops, gdb_byte **readptr,
77382aee 160 gdb_byte *endptr, CORE_ADDR *typep, CORE_ADDR *valp)
c47ffbe3 161{
e17a4113 162 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch);
c47ffbe3
VP
163 gdb_byte *ptr = *readptr;
164
165 if (endptr == ptr)
166 return 0;
77382aee 167
c47ffbe3
VP
168 if (endptr - ptr < 8 * 2)
169 return -1;
170
e17a4113 171 *typep = extract_unsigned_integer (ptr, 4, byte_order);
c47ffbe3
VP
172 ptr += 8;
173 /* The size of data is always 64-bit. If the application is 32-bit,
174 it will be zero extended, as expected. */
e17a4113 175 *valp = extract_unsigned_integer (ptr, 8, byte_order);
c47ffbe3
VP
176 ptr += 8;
177
178 *readptr = ptr;
179 return 1;
180}
181#endif
182
d1a7880c 183struct target_ops *
28439f5e 184procfs_target (void)
c3f6f71d 185{
28439f5e
PA
186 struct target_ops *t = inf_child_target ();
187
77382aee
PA
188 t->to_shortname = "procfs";
189 t->to_longname = "Unix /proc child process";
190 t->to_doc =
c3f6f71d 191 "Unix /proc child process (started by the \"run\" command).";
77382aee
PA
192 t->to_create_inferior = procfs_create_inferior;
193 t->to_kill = procfs_kill_inferior;
194 t->to_mourn_inferior = procfs_mourn_inferior;
195 t->to_attach = procfs_attach;
196 t->to_detach = procfs_detach;
197 t->to_wait = procfs_wait;
198 t->to_resume = procfs_resume;
199 t->to_fetch_registers = procfs_fetch_registers;
200 t->to_store_registers = procfs_store_registers;
201 t->to_xfer_partial = procfs_xfer_partial;
28439f5e 202 t->deprecated_xfer_memory = procfs_xfer_memory;
77382aee
PA
203 t->to_notice_signals = procfs_notice_signals;
204 t->to_files_info = procfs_files_info;
205 t->to_stop = procfs_stop;
28439f5e 206
77382aee
PA
207 t->to_find_new_threads = procfs_find_new_threads;
208 t->to_thread_alive = procfs_thread_alive;
209 t->to_pid_to_str = procfs_pid_to_str;
28439f5e 210
77382aee 211 t->to_has_thread_control = tc_schedlock;
28439f5e
PA
212 t->to_find_memory_regions = proc_find_memory_regions;
213 t->to_make_corefile_notes = procfs_make_note_section;
c47ffbe3
VP
214
215#if defined(PR_MODEL_NATIVE) && (PR_MODEL_NATIVE == PR_MODEL_LP64)
28439f5e 216 t->to_auxv_parse = procfs_auxv_parse;
c47ffbe3
VP
217#endif
218
77382aee 219 t->to_magic = OPS_MAGIC;
28439f5e
PA
220
221 return t;
c3f6f71d 222}
c906108c 223
c3f6f71d
JM
224/* =================== END, TARGET_OPS "MODULE" =================== */
225
77382aee
PA
226/* World Unification:
227
228 Put any typedefs, defines etc. here that are required for the
229 unification of code that handles different versions of /proc. */
c3f6f71d
JM
230
231#ifdef NEW_PROC_API /* Solaris 7 && 8 method for watchpoints */
37de36c6 232#ifdef WA_READ
19958708 233 enum { READ_WATCHFLAG = WA_READ,
c3f6f71d
JM
234 WRITE_WATCHFLAG = WA_WRITE,
235 EXEC_WATCHFLAG = WA_EXEC,
236 AFTER_WATCHFLAG = WA_TRAPAFTER
237 };
238#endif
239#else /* Irix method for watchpoints */
19958708 240 enum { READ_WATCHFLAG = MA_READ,
c3f6f71d
JM
241 WRITE_WATCHFLAG = MA_WRITE,
242 EXEC_WATCHFLAG = MA_EXEC,
243 AFTER_WATCHFLAG = 0 /* trapafter not implemented */
244 };
245#endif
246
37de36c6
KB
247/* gdb_sigset_t */
248#ifdef HAVE_PR_SIGSET_T
249typedef pr_sigset_t gdb_sigset_t;
250#else
251typedef sigset_t gdb_sigset_t;
252#endif
253
254/* sigaction */
255#ifdef HAVE_PR_SIGACTION64_T
256typedef pr_sigaction64_t gdb_sigaction_t;
257#else
258typedef struct sigaction gdb_sigaction_t;
259#endif
260
261/* siginfo */
262#ifdef HAVE_PR_SIGINFO64_T
263typedef pr_siginfo64_t gdb_siginfo_t;
264#else
265typedef struct siginfo gdb_siginfo_t;
266#endif
267
3c95f01c
JB
268/* On mips-irix, praddset and prdelset are defined in such a way that
269 they return a value, which causes GCC to emit a -Wunused error
270 because the returned value is not used. Prevent this warning
271 by casting the return value to void. On sparc-solaris, this issue
272 does not exist because the definition of these macros already include
273 that cast to void. */
274#define gdb_praddset(sp, flag) ((void) praddset (sp, flag))
275#define gdb_prdelset(sp, flag) ((void) prdelset (sp, flag))
276
37de36c6
KB
277/* gdb_premptysysset */
278#ifdef premptysysset
279#define gdb_premptysysset premptysysset
280#else
281#define gdb_premptysysset premptyset
282#endif
283
284/* praddsysset */
285#ifdef praddsysset
286#define gdb_praddsysset praddsysset
287#else
3c95f01c 288#define gdb_praddsysset gdb_praddset
37de36c6
KB
289#endif
290
291/* prdelsysset */
292#ifdef prdelsysset
293#define gdb_prdelsysset prdelsysset
294#else
3c95f01c 295#define gdb_prdelsysset gdb_prdelset
37de36c6
KB
296#endif
297
298/* prissyssetmember */
299#ifdef prissyssetmember
300#define gdb_pr_issyssetmember prissyssetmember
301#else
302#define gdb_pr_issyssetmember prismember
303#endif
304
305/* As a feature test, saying ``#if HAVE_PRSYSENT_T'' everywhere isn't
306 as intuitively descriptive as it could be, so we'll define
307 DYNAMIC_SYSCALLS to mean the same thing. Anyway, at the time of
308 this writing, this feature is only found on AIX5 systems and
309 basically means that the set of syscalls is not fixed. I.e,
310 there's no nice table that one can #include to get all of the
311 syscall numbers. Instead, they're stored in /proc/PID/sysent
312 for each process. We are at least guaranteed that they won't
313 change over the lifetime of the process. But each process could
77382aee 314 (in theory) have different syscall numbers. */
37de36c6
KB
315#ifdef HAVE_PRSYSENT_T
316#define DYNAMIC_SYSCALLS
317#endif
c3f6f71d
JM
318
319
320
321/* =================== STRUCT PROCINFO "MODULE" =================== */
322
323 /* FIXME: this comment will soon be out of date W.R.T. threads. */
324
325/* The procinfo struct is a wrapper to hold all the state information
326 concerning a /proc process. There should be exactly one procinfo
327 for each process, and since GDB currently can debug only one
328 process at a time, that means there should be only one procinfo.
329 All of the LWP's of a process can be accessed indirectly thru the
330 single process procinfo.
331
332 However, against the day when GDB may debug more than one process,
333 this data structure is kept in a list (which for now will hold no
334 more than one member), and many functions will have a pointer to a
335 procinfo as an argument.
336
337 There will be a separate procinfo structure for use by the (not yet
338 implemented) "info proc" command, so that we can print useful
339 information about any random process without interfering with the
340 inferior's procinfo information. */
341
342#ifdef NEW_PROC_API
343/* format strings for /proc paths */
344# ifndef CTL_PROC_NAME_FMT
345# define MAIN_PROC_NAME_FMT "/proc/%d"
346# define CTL_PROC_NAME_FMT "/proc/%d/ctl"
347# define AS_PROC_NAME_FMT "/proc/%d/as"
348# define MAP_PROC_NAME_FMT "/proc/%d/map"
349# define STATUS_PROC_NAME_FMT "/proc/%d/status"
350# define MAX_PROC_NAME_SIZE sizeof("/proc/99999/lwp/8096/lstatus")
351# endif
352/* the name of the proc status struct depends on the implementation */
353typedef pstatus_t gdb_prstatus_t;
354typedef lwpstatus_t gdb_lwpstatus_t;
355#else /* ! NEW_PROC_API */
356/* format strings for /proc paths */
357# ifndef CTL_PROC_NAME_FMT
358# define MAIN_PROC_NAME_FMT "/proc/%05d"
359# define CTL_PROC_NAME_FMT "/proc/%05d"
360# define AS_PROC_NAME_FMT "/proc/%05d"
361# define MAP_PROC_NAME_FMT "/proc/%05d"
362# define STATUS_PROC_NAME_FMT "/proc/%05d"
363# define MAX_PROC_NAME_SIZE sizeof("/proc/ttttppppp")
364# endif
c906108c 365/* the name of the proc status struct depends on the implementation */
c5aa993b 366typedef prstatus_t gdb_prstatus_t;
c3f6f71d
JM
367typedef prstatus_t gdb_lwpstatus_t;
368#endif /* NEW_PROC_API */
c906108c 369
c3f6f71d
JM
370typedef struct procinfo {
371 struct procinfo *next;
372 int pid; /* Process ID */
373 int tid; /* Thread/LWP id */
c906108c 374
c3f6f71d
JM
375 /* process state */
376 int was_stopped;
377 int ignore_next_sigstop;
c906108c 378
19958708 379 /* The following four fd fields may be identical, or may contain
c3f6f71d
JM
380 several different fd's, depending on the version of /proc
381 (old ioctl or new read/write). */
c906108c 382
c3f6f71d 383 int ctl_fd; /* File descriptor for /proc control file */
77382aee
PA
384
385 /* The next three file descriptors are actually only needed in the
386 read/write, multiple-file-descriptor implemenation
387 (NEW_PROC_API). However, to avoid a bunch of #ifdefs in the
388 code, we will use them uniformly by (in the case of the ioctl
389 single-file-descriptor implementation) filling them with copies
390 of the control fd. */
c3f6f71d
JM
391 int status_fd; /* File descriptor for /proc status file */
392 int as_fd; /* File descriptor for /proc as file */
c906108c 393
c3f6f71d 394 char pathname[MAX_PROC_NAME_SIZE]; /* Pathname to /proc entry */
c906108c 395
c3f6f71d 396 fltset_t saved_fltset; /* Saved traced hardware fault set */
37de36c6
KB
397 gdb_sigset_t saved_sigset; /* Saved traced signal set */
398 gdb_sigset_t saved_sighold; /* Saved held signal set */
399 sysset_t *saved_exitset; /* Saved traced system call exit set */
400 sysset_t *saved_entryset; /* Saved traced system call entry set */
c906108c 401
c3f6f71d 402 gdb_prstatus_t prstatus; /* Current process status info */
c906108c 403
c3f6f71d
JM
404#ifndef NEW_PROC_API
405 gdb_fpregset_t fpregset; /* Current floating point registers */
c5aa993b 406#endif
37de36c6
KB
407
408#ifdef DYNAMIC_SYSCALLS
409 int num_syscalls; /* Total number of syscalls */
410 char **syscall_names; /* Syscall number to name map */
411#endif
19958708 412
c3f6f71d 413 struct procinfo *thread_list;
c906108c 414
c3f6f71d
JM
415 int status_valid : 1;
416 int gregs_valid : 1;
417 int fpregs_valid : 1;
418 int threads_valid: 1;
419} procinfo;
c906108c 420
c3f6f71d 421static char errmsg[128]; /* shared error msg buffer */
c906108c 422
c3f6f71d 423/* Function prototypes for procinfo module: */
c906108c 424
a14ed312
KB
425static procinfo *find_procinfo_or_die (int pid, int tid);
426static procinfo *find_procinfo (int pid, int tid);
427static procinfo *create_procinfo (int pid, int tid);
428static void destroy_procinfo (procinfo * p);
004527cb 429static void do_destroy_procinfo_cleanup (void *);
a14ed312
KB
430static void dead_procinfo (procinfo * p, char *msg, int killp);
431static int open_procinfo_files (procinfo * p, int which);
432static void close_procinfo_files (procinfo * p);
37de36c6
KB
433static int sysset_t_size (procinfo *p);
434static sysset_t *sysset_t_alloc (procinfo * pi);
435#ifdef DYNAMIC_SYSCALLS
436static void load_syscalls (procinfo *pi);
437static void free_syscalls (procinfo *pi);
438static int find_syscall (procinfo *pi, char *name);
439#endif /* DYNAMIC_SYSCALLS */
c906108c 440
e9ef4f39 441static int iterate_over_mappings
b8edc417
JK
442 (procinfo *pi, find_memory_region_ftype child_func, void *data,
443 int (*func) (struct prmap *map, find_memory_region_ftype child_func,
77382aee 444 void *data));
e9ef4f39 445
c3f6f71d
JM
446/* The head of the procinfo list: */
447static procinfo * procinfo_list;
c906108c 448
77382aee
PA
449/* Search the procinfo list. Return a pointer to procinfo, or NULL if
450 not found. */
c906108c 451
19958708 452static procinfo *
fba45db2 453find_procinfo (int pid, int tid)
c5aa993b 454{
c3f6f71d 455 procinfo *pi;
c906108c 456
c3f6f71d
JM
457 for (pi = procinfo_list; pi; pi = pi->next)
458 if (pi->pid == pid)
459 break;
c906108c 460
c3f6f71d
JM
461 if (pi)
462 if (tid)
463 {
464 /* Don't check threads_valid. If we're updating the
465 thread_list, we want to find whatever threads are already
466 here. This means that in general it is the caller's
467 responsibility to check threads_valid and update before
468 calling find_procinfo, if the caller wants to find a new
77382aee 469 thread. */
c3f6f71d
JM
470
471 for (pi = pi->thread_list; pi; pi = pi->next)
472 if (pi->tid == tid)
473 break;
474 }
c906108c 475
c3f6f71d
JM
476 return pi;
477}
c906108c 478
77382aee 479/* Calls find_procinfo, but errors on failure. */
c906108c 480
c3f6f71d 481static procinfo *
fba45db2 482find_procinfo_or_die (int pid, int tid)
c3f6f71d
JM
483{
484 procinfo *pi = find_procinfo (pid, tid);
c906108c 485
c3f6f71d 486 if (pi == NULL)
0fda6bd2
JM
487 {
488 if (tid)
77382aee
PA
489 error (_("\
490procfs: couldn't find pid %d (kernel thread %d) in procinfo list."),
0fda6bd2
JM
491 pid, tid);
492 else
8a3fe4f8 493 error (_("procfs: couldn't find pid %d in procinfo list."), pid);
0fda6bd2 494 }
c3f6f71d
JM
495 return pi;
496}
c906108c 497
77382aee
PA
498/* Wrapper for `open'. The appropriate open call is attempted; if
499 unsuccessful, it will be retried as many times as needed for the
500 EAGAIN and EINTR conditions.
19958708 501
77382aee
PA
502 For other conditions, retry the open a limited number of times. In
503 addition, a short sleep is imposed prior to retrying the open. The
504 reason for this sleep is to give the kernel a chance to catch up
505 and create the file in question in the event that GDB "wins" the
506 race to open a file before the kernel has created it. */
19958708 507
4d1bcd09
KB
508static int
509open_with_retry (const char *pathname, int flags)
510{
511 int retries_remaining, status;
512
513 retries_remaining = 2;
514
515 while (1)
516 {
517 status = open (pathname, flags);
518
519 if (status >= 0 || retries_remaining == 0)
520 break;
521 else if (errno != EINTR && errno != EAGAIN)
522 {
523 retries_remaining--;
524 sleep (1);
525 }
526 }
527
528 return status;
529}
530
77382aee
PA
531/* Open the file descriptor for the process or LWP. If NEW_PROC_API
532 is defined, we only open the control file descriptor; the others
533 are opened lazily as needed. Otherwise (if not NEW_PROC_API),
534 there is only one real file descriptor, but we keep multiple copies
535 of it so that the code that uses them does not have to be #ifdef'd.
536 Returns the file descriptor, or zero for failure. */
c906108c 537
c3f6f71d 538enum { FD_CTL, FD_STATUS, FD_AS };
c906108c 539
c3f6f71d 540static int
fba45db2 541open_procinfo_files (procinfo *pi, int which)
c3f6f71d 542{
0fda6bd2 543#ifdef NEW_PROC_API
c3f6f71d 544 char tmp[MAX_PROC_NAME_SIZE];
0fda6bd2 545#endif
c3f6f71d
JM
546 int fd;
547
77382aee
PA
548 /* This function is getting ALMOST long enough to break up into
549 several. Here is some rationale:
550
551 NEW_PROC_API (Solaris 2.6, Solaris 2.7, Unixware):
552 There are several file descriptors that may need to be open
553 for any given process or LWP. The ones we're intereted in are:
554 - control (ctl) write-only change the state
555 - status (status) read-only query the state
556 - address space (as) read/write access memory
557 - map (map) read-only virtual addr map
558 Most of these are opened lazily as they are needed.
559 The pathnames for the 'files' for an LWP look slightly
560 different from those of a first-class process:
561 Pathnames for a process (<proc-id>):
562 /proc/<proc-id>/ctl
563 /proc/<proc-id>/status
564 /proc/<proc-id>/as
565 /proc/<proc-id>/map
566 Pathnames for an LWP (lwp-id):
567 /proc/<proc-id>/lwp/<lwp-id>/lwpctl
568 /proc/<proc-id>/lwp/<lwp-id>/lwpstatus
569 An LWP has no map or address space file descriptor, since
570 the memory map and address space are shared by all LWPs.
571
572 Everyone else (Solaris 2.5, Irix, OSF)
573 There is only one file descriptor for each process or LWP.
574 For convenience, we copy the same file descriptor into all
575 three fields of the procinfo struct (ctl_fd, status_fd, and
576 as_fd, see NEW_PROC_API above) so that code that uses them
577 doesn't need any #ifdef's.
578 Pathname for all:
579 /proc/<proc-id>
580
581 Solaris 2.5 LWP's:
582 Each LWP has an independent file descriptor, but these
583 are not obtained via the 'open' system call like the rest:
584 instead, they're obtained thru an ioctl call (PIOCOPENLWP)
585 to the file descriptor of the parent process.
586
587 OSF threads:
588 These do not even have their own independent file descriptor.
589 All operations are carried out on the file descriptor of the
590 parent process. Therefore we just call open again for each
591 thread, getting a new handle for the same 'file'.
c3f6f71d
JM
592 */
593
594#ifdef NEW_PROC_API
77382aee
PA
595 /* In this case, there are several different file descriptors that
596 we might be asked to open. The control file descriptor will be
597 opened early, but the others will be opened lazily as they are
598 needed. */
c3f6f71d
JM
599
600 strcpy (tmp, pi->pathname);
601 switch (which) { /* which file descriptor to open? */
602 case FD_CTL:
603 if (pi->tid)
604 strcat (tmp, "/lwpctl");
605 else
606 strcat (tmp, "/ctl");
4d1bcd09 607 fd = open_with_retry (tmp, O_WRONLY);
c3f6f71d
JM
608 if (fd <= 0)
609 return 0; /* fail */
610 pi->ctl_fd = fd;
611 break;
612 case FD_AS:
613 if (pi->tid)
614 return 0; /* there is no 'as' file descriptor for an lwp */
615 strcat (tmp, "/as");
4d1bcd09 616 fd = open_with_retry (tmp, O_RDWR);
c3f6f71d
JM
617 if (fd <= 0)
618 return 0; /* fail */
619 pi->as_fd = fd;
620 break;
621 case FD_STATUS:
622 if (pi->tid)
623 strcat (tmp, "/lwpstatus");
624 else
625 strcat (tmp, "/status");
4d1bcd09 626 fd = open_with_retry (tmp, O_RDONLY);
c3f6f71d
JM
627 if (fd <= 0)
628 return 0; /* fail */
629 pi->status_fd = fd;
630 break;
631 default:
632 return 0; /* unknown file descriptor */
633 }
634#else /* not NEW_PROC_API */
77382aee
PA
635 /* In this case, there is only one file descriptor for each procinfo
636 (ie. each process or LWP). In fact, only the file descriptor for
637 the process can actually be opened by an 'open' system call. The
638 ones for the LWPs have to be obtained thru an IOCTL call on the
639 process's file descriptor.
640
641 For convenience, we copy each procinfo's single file descriptor
642 into all of the fields occupied by the several file descriptors
643 of the NEW_PROC_API implementation. That way, the code that uses
644 them can be written without ifdefs. */
c3f6f71d
JM
645
646
647#ifdef PIOCTSTATUS /* OSF */
4d1bcd09
KB
648 /* Only one FD; just open it. */
649 if ((fd = open_with_retry (pi->pathname, O_RDWR)) == 0)
c3f6f71d
JM
650 return 0;
651#else /* Sol 2.5, Irix, other? */
652 if (pi->tid == 0) /* Master procinfo for the process */
653 {
4d1bcd09 654 fd = open_with_retry (pi->pathname, O_RDWR);
c3f6f71d
JM
655 if (fd <= 0)
656 return 0; /* fail */
657 }
658 else /* LWP thread procinfo */
659 {
660#ifdef PIOCOPENLWP /* Sol 2.5, thread/LWP */
661 procinfo *process;
662 int lwpid = pi->tid;
663
664 /* Find the procinfo for the entire process. */
665 if ((process = find_procinfo (pi->pid, 0)) == NULL)
666 return 0; /* fail */
667
668 /* Now obtain the file descriptor for the LWP. */
669 if ((fd = ioctl (process->ctl_fd, PIOCOPENLWP, &lwpid)) <= 0)
670 return 0; /* fail */
671#else /* Irix, other? */
672 return 0; /* Don't know how to open threads */
673#endif /* Sol 2.5 PIOCOPENLWP */
674 }
675#endif /* OSF PIOCTSTATUS */
676 pi->ctl_fd = pi->as_fd = pi->status_fd = fd;
677#endif /* NEW_PROC_API */
c906108c 678
c3f6f71d
JM
679 return 1; /* success */
680}
c906108c 681
77382aee
PA
682/* Allocate a data structure and link it into the procinfo list.
683 First tries to find a pre-existing one (FIXME: why?). Returns the
684 pointer to new procinfo struct. */
c906108c 685
c3f6f71d 686static procinfo *
fba45db2 687create_procinfo (int pid, int tid)
c3f6f71d 688{
0b62613e 689 procinfo *pi, *parent = NULL;
c906108c 690
0d06e24b 691 if ((pi = find_procinfo (pid, tid)))
c3f6f71d 692 return pi; /* Already exists, nothing to do. */
c906108c 693
c3f6f71d
JM
694 /* find parent before doing malloc, to save having to cleanup */
695 if (tid != 0)
696 parent = find_procinfo_or_die (pid, 0); /* FIXME: should I
697 create it if it
698 doesn't exist yet? */
c906108c 699
c3f6f71d
JM
700 pi = (procinfo *) xmalloc (sizeof (procinfo));
701 memset (pi, 0, sizeof (procinfo));
702 pi->pid = pid;
703 pi->tid = tid;
c906108c 704
37de36c6
KB
705#ifdef DYNAMIC_SYSCALLS
706 load_syscalls (pi);
707#endif
708
1d5e0602
KB
709 pi->saved_entryset = sysset_t_alloc (pi);
710 pi->saved_exitset = sysset_t_alloc (pi);
711
c3f6f71d
JM
712 /* Chain into list. */
713 if (tid == 0)
714 {
715 sprintf (pi->pathname, MAIN_PROC_NAME_FMT, pid);
716 pi->next = procinfo_list;
717 procinfo_list = pi;
718 }
719 else
720 {
721#ifdef NEW_PROC_API
722 sprintf (pi->pathname, "/proc/%05d/lwp/%d", pid, tid);
723#else
724 sprintf (pi->pathname, MAIN_PROC_NAME_FMT, pid);
725#endif
726 pi->next = parent->thread_list;
727 parent->thread_list = pi;
728 }
729 return pi;
730}
c906108c 731
77382aee 732/* Close all file descriptors associated with the procinfo. */
c906108c 733
c3f6f71d 734static void
fba45db2 735close_procinfo_files (procinfo *pi)
c3f6f71d
JM
736{
737 if (pi->ctl_fd > 0)
738 close (pi->ctl_fd);
739#ifdef NEW_PROC_API
740 if (pi->as_fd > 0)
741 close (pi->as_fd);
742 if (pi->status_fd > 0)
743 close (pi->status_fd);
744#endif
745 pi->ctl_fd = pi->as_fd = pi->status_fd = 0;
746}
c906108c 747
77382aee 748/* Destructor function. Close, unlink and deallocate the object. */
c906108c 749
c3f6f71d 750static void
fba45db2 751destroy_one_procinfo (procinfo **list, procinfo *pi)
c3f6f71d
JM
752{
753 procinfo *ptr;
754
77382aee 755 /* Step one: unlink the procinfo from its list. */
c3f6f71d
JM
756 if (pi == *list)
757 *list = pi->next;
19958708 758 else
c3f6f71d
JM
759 for (ptr = *list; ptr; ptr = ptr->next)
760 if (ptr->next == pi)
761 {
762 ptr->next = pi->next;
763 break;
764 }
7a292a7a 765
77382aee 766 /* Step two: close any open file descriptors. */
c3f6f71d 767 close_procinfo_files (pi);
7a292a7a 768
77382aee 769 /* Step three: free the memory. */
37de36c6
KB
770#ifdef DYNAMIC_SYSCALLS
771 free_syscalls (pi);
772#endif
1d5e0602
KB
773 xfree (pi->saved_entryset);
774 xfree (pi->saved_exitset);
b8c9b27d 775 xfree (pi);
c3f6f71d 776}
c906108c 777
c3f6f71d 778static void
fba45db2 779destroy_procinfo (procinfo *pi)
c3f6f71d
JM
780{
781 procinfo *tmp;
c906108c 782
c3f6f71d
JM
783 if (pi->tid != 0) /* destroy a thread procinfo */
784 {
785 tmp = find_procinfo (pi->pid, 0); /* find the parent process */
786 destroy_one_procinfo (&tmp->thread_list, pi);
787 }
788 else /* destroy a process procinfo and all its threads */
789 {
790 /* First destroy the children, if any; */
791 while (pi->thread_list != NULL)
792 destroy_one_procinfo (&pi->thread_list, pi->thread_list);
793 /* Then destroy the parent. Genocide!!! */
794 destroy_one_procinfo (&procinfo_list, pi);
795 }
796}
c906108c 797
004527cb
AC
798static void
799do_destroy_procinfo_cleanup (void *pi)
800{
801 destroy_procinfo (pi);
802}
803
c3f6f71d 804enum { NOKILL, KILL };
c906108c 805
77382aee
PA
806/* To be called on a non_recoverable error for a procinfo. Prints
807 error messages, optionally sends a SIGKILL to the process, then
808 destroys the data structure. */
c906108c 809
c3f6f71d 810static void
fba45db2 811dead_procinfo (procinfo *pi, char *msg, int kill_p)
c3f6f71d
JM
812{
813 char procfile[80];
c906108c 814
c3f6f71d
JM
815 if (pi->pathname)
816 {
817 print_sys_errmsg (pi->pathname, errno);
818 }
819 else
820 {
821 sprintf (procfile, "process %d", pi->pid);
822 print_sys_errmsg (procfile, errno);
823 }
824 if (kill_p == KILL)
825 kill (pi->pid, SIGKILL);
c906108c 826
c3f6f71d 827 destroy_procinfo (pi);
0b62613e 828 error ("%s", msg);
c3f6f71d 829}
c906108c 830
77382aee
PA
831/* Returns the (complete) size of a sysset_t struct. Normally, this
832 is just sizeof (sysset_t), but in the case of Monterey/64, the
833 actual size of sysset_t isn't known until runtime. */
37de36c6
KB
834
835static int
836sysset_t_size (procinfo * pi)
837{
838#ifndef DYNAMIC_SYSCALLS
839 return sizeof (sysset_t);
840#else
841 return sizeof (sysset_t) - sizeof (uint64_t)
842 + sizeof (uint64_t) * ((pi->num_syscalls + (8 * sizeof (uint64_t) - 1))
843 / (8 * sizeof (uint64_t)));
844#endif
845}
846
77382aee 847/* Allocate and (partially) initialize a sysset_t struct. */
37de36c6
KB
848
849static sysset_t *
850sysset_t_alloc (procinfo * pi)
851{
852 sysset_t *ret;
853 int size = sysset_t_size (pi);
f4a14ae6 854
37de36c6
KB
855 ret = xmalloc (size);
856#ifdef DYNAMIC_SYSCALLS
77382aee
PA
857 ret->pr_size = ((pi->num_syscalls + (8 * sizeof (uint64_t) - 1))
858 / (8 * sizeof (uint64_t)));
37de36c6
KB
859#endif
860 return ret;
861}
862
863#ifdef DYNAMIC_SYSCALLS
864
77382aee 865/* Extract syscall numbers and names from /proc/<pid>/sysent. Initialize
37de36c6
KB
866 pi->num_syscalls with the number of syscalls and pi->syscall_names
867 with the names. (Certain numbers may be skipped in which case the
868 names for these numbers will be left as NULL.) */
869
870#define MAX_SYSCALL_NAME_LENGTH 256
871#define MAX_SYSCALLS 65536
872
873static void
874load_syscalls (procinfo *pi)
875{
876 char pathname[MAX_PROC_NAME_SIZE];
877 int sysent_fd;
878 prsysent_t header;
879 prsyscall_t *syscalls;
880 int i, size, maxcall;
881
882 pi->num_syscalls = 0;
883 pi->syscall_names = 0;
884
77382aee 885 /* Open the file descriptor for the sysent file. */
37de36c6 886 sprintf (pathname, "/proc/%d/sysent", pi->pid);
4d1bcd09 887 sysent_fd = open_with_retry (pathname, O_RDONLY);
37de36c6
KB
888 if (sysent_fd < 0)
889 {
8a3fe4f8 890 error (_("load_syscalls: Can't open /proc/%d/sysent"), pi->pid);
37de36c6
KB
891 }
892
893 size = sizeof header - sizeof (prsyscall_t);
894 if (read (sysent_fd, &header, size) != size)
895 {
8a3fe4f8 896 error (_("load_syscalls: Error reading /proc/%d/sysent"), pi->pid);
37de36c6
KB
897 }
898
899 if (header.pr_nsyscalls == 0)
900 {
77382aee
PA
901 error (_("\
902load_syscalls: /proc/%d/sysent contains no syscalls!"), pi->pid);
37de36c6
KB
903 }
904
905 size = header.pr_nsyscalls * sizeof (prsyscall_t);
906 syscalls = xmalloc (size);
907
908 if (read (sysent_fd, syscalls, size) != size)
909 {
910 xfree (syscalls);
8a3fe4f8 911 error (_("load_syscalls: Error reading /proc/%d/sysent"), pi->pid);
37de36c6
KB
912 }
913
914 /* Find maximum syscall number. This may not be the same as
915 pr_nsyscalls since that value refers to the number of entries
916 in the table. (Also, the docs indicate that some system
917 call numbers may be skipped.) */
918
919 maxcall = syscalls[0].pr_number;
920
921 for (i = 1; i < header.pr_nsyscalls; i++)
922 if (syscalls[i].pr_number > maxcall
77382aee 923 && syscalls[i].pr_nameoff > 0
37de36c6
KB
924 && syscalls[i].pr_number < MAX_SYSCALLS)
925 maxcall = syscalls[i].pr_number;
926
927 pi->num_syscalls = maxcall+1;
928 pi->syscall_names = xmalloc (pi->num_syscalls * sizeof (char *));
929
930 for (i = 0; i < pi->num_syscalls; i++)
931 pi->syscall_names[i] = NULL;
932
77382aee 933 /* Read the syscall names in. */
37de36c6
KB
934 for (i = 0; i < header.pr_nsyscalls; i++)
935 {
936 char namebuf[MAX_SYSCALL_NAME_LENGTH];
937 int nread;
938 int callnum;
939
940 if (syscalls[i].pr_number >= MAX_SYSCALLS
77382aee 941 || syscalls[i].pr_number < 0
37de36c6
KB
942 || syscalls[i].pr_nameoff <= 0
943 || (lseek (sysent_fd, (off_t) syscalls[i].pr_nameoff, SEEK_SET)
77382aee 944 != (off_t) syscalls[i].pr_nameoff))
37de36c6
KB
945 continue;
946
947 nread = read (sysent_fd, namebuf, sizeof namebuf);
948 if (nread <= 0)
949 continue;
950
951 callnum = syscalls[i].pr_number;
952
953 if (pi->syscall_names[callnum] != NULL)
954 {
955 /* FIXME: Generate warning */
956 continue;
957 }
958
959 namebuf[nread-1] = '\0';
960 size = strlen (namebuf) + 1;
961 pi->syscall_names[callnum] = xmalloc (size);
962 strncpy (pi->syscall_names[callnum], namebuf, size-1);
963 pi->syscall_names[callnum][size-1] = '\0';
964 }
19958708 965
37de36c6
KB
966 close (sysent_fd);
967 xfree (syscalls);
968}
969
77382aee 970/* Free the space allocated for the syscall names from the procinfo
37de36c6
KB
971 structure. */
972
973static void
974free_syscalls (procinfo *pi)
975{
976 if (pi->syscall_names)
977 {
978 int i;
979
980 for (i = 0; i < pi->num_syscalls; i++)
981 if (pi->syscall_names[i] != NULL)
982 xfree (pi->syscall_names[i]);
983
984 xfree (pi->syscall_names);
985 pi->syscall_names = 0;
986 }
987}
988
77382aee 989/* Given a name, look up (and return) the corresponding syscall number.
37de36c6 990 If no match is found, return -1. */
19958708 991
37de36c6
KB
992static int
993find_syscall (procinfo *pi, char *name)
994{
995 int i;
f4a14ae6 996
37de36c6
KB
997 for (i = 0; i < pi->num_syscalls; i++)
998 {
999 if (pi->syscall_names[i] && strcmp (name, pi->syscall_names[i]) == 0)
1000 return i;
1001 }
1002 return -1;
1003}
1004#endif
1005
c3f6f71d 1006/* =================== END, STRUCT PROCINFO "MODULE" =================== */
c906108c 1007
c3f6f71d 1008/* =================== /proc "MODULE" =================== */
c906108c 1009
77382aee
PA
1010/* This "module" is the interface layer between the /proc system API
1011 and the gdb target vector functions. This layer consists of access
1012 functions that encapsulate each of the basic operations that we
1013 need to use from the /proc API.
1014
1015 The main motivation for this layer is to hide the fact that there
1016 are two very different implementations of the /proc API. Rather
1017 than have a bunch of #ifdefs all thru the gdb target vector
1018 functions, we do our best to hide them all in here. */
c906108c 1019
a14ed312
KB
1020int proc_get_status (procinfo * pi);
1021long proc_flags (procinfo * pi);
1022int proc_why (procinfo * pi);
1023int proc_what (procinfo * pi);
1024int proc_set_run_on_last_close (procinfo * pi);
1025int proc_unset_run_on_last_close (procinfo * pi);
1026int proc_set_inherit_on_fork (procinfo * pi);
1027int proc_unset_inherit_on_fork (procinfo * pi);
1028int proc_set_async (procinfo * pi);
1029int proc_unset_async (procinfo * pi);
1030int proc_stop_process (procinfo * pi);
1031int proc_trace_signal (procinfo * pi, int signo);
1032int proc_ignore_signal (procinfo * pi, int signo);
1033int proc_clear_current_fault (procinfo * pi);
1034int proc_set_current_signal (procinfo * pi, int signo);
1035int proc_clear_current_signal (procinfo * pi);
1036int proc_set_gregs (procinfo * pi);
1037int proc_set_fpregs (procinfo * pi);
1038int proc_wait_for_stop (procinfo * pi);
1039int proc_run_process (procinfo * pi, int step, int signo);
1040int proc_kill (procinfo * pi, int signo);
1041int proc_parent_pid (procinfo * pi);
1042int proc_get_nthreads (procinfo * pi);
1043int proc_get_current_thread (procinfo * pi);
37de36c6 1044int proc_set_held_signals (procinfo * pi, gdb_sigset_t * sighold);
a14ed312
KB
1045int proc_set_traced_sysexit (procinfo * pi, sysset_t * sysset);
1046int proc_set_traced_sysentry (procinfo * pi, sysset_t * sysset);
1047int proc_set_traced_faults (procinfo * pi, fltset_t * fltset);
37de36c6 1048int proc_set_traced_signals (procinfo * pi, gdb_sigset_t * sigset);
a14ed312
KB
1049
1050int proc_update_threads (procinfo * pi);
1051int proc_iterate_over_threads (procinfo * pi,
8ab86381
KB
1052 int (*func) (procinfo *, procinfo *, void *),
1053 void *ptr);
a14ed312
KB
1054
1055gdb_gregset_t *proc_get_gregs (procinfo * pi);
1056gdb_fpregset_t *proc_get_fpregs (procinfo * pi);
1057sysset_t *proc_get_traced_sysexit (procinfo * pi, sysset_t * save);
1058sysset_t *proc_get_traced_sysentry (procinfo * pi, sysset_t * save);
1059fltset_t *proc_get_traced_faults (procinfo * pi, fltset_t * save);
37de36c6
KB
1060gdb_sigset_t *proc_get_traced_signals (procinfo * pi, gdb_sigset_t * save);
1061gdb_sigset_t *proc_get_held_signals (procinfo * pi, gdb_sigset_t * save);
1062gdb_sigset_t *proc_get_pending_signals (procinfo * pi, gdb_sigset_t * save);
1063gdb_sigaction_t *proc_get_signal_actions (procinfo * pi, gdb_sigaction_t *save);
a14ed312
KB
1064
1065void proc_warn (procinfo * pi, char *func, int line);
1066void proc_error (procinfo * pi, char *func, int line);
c906108c 1067
c3f6f71d 1068void
fba45db2 1069proc_warn (procinfo *pi, char *func, int line)
c3f6f71d
JM
1070{
1071 sprintf (errmsg, "procfs: %s line %d, %s", func, line, pi->pathname);
1072 print_sys_errmsg (errmsg, errno);
1073}
c906108c 1074
c3f6f71d 1075void
fba45db2 1076proc_error (procinfo *pi, char *func, int line)
c3f6f71d
JM
1077{
1078 sprintf (errmsg, "procfs: %s line %d, %s", func, line, pi->pathname);
1079 perror_with_name (errmsg);
1080}
c906108c 1081
77382aee
PA
1082/* Updates the status struct in the procinfo. There is a 'valid'
1083 flag, to let other functions know when this function needs to be
1084 called (so the status is only read when it is needed). The status
1085 file descriptor is also only opened when it is needed. Returns
1086 non-zero for success, zero for failure. */
c906108c 1087
c3f6f71d 1088int
fba45db2 1089proc_get_status (procinfo *pi)
c3f6f71d
JM
1090{
1091 /* Status file descriptor is opened "lazily" */
1092 if (pi->status_fd == 0 &&
1093 open_procinfo_files (pi, FD_STATUS) == 0)
1094 {
1095 pi->status_valid = 0;
1096 return 0;
1097 }
c906108c 1098
c3f6f71d
JM
1099#ifdef NEW_PROC_API
1100 if (lseek (pi->status_fd, 0, SEEK_SET) < 0)
1101 pi->status_valid = 0; /* fail */
1102 else
1103 {
19958708 1104 /* Sigh... I have to read a different data structure,
c3f6f71d
JM
1105 depending on whether this is a main process or an LWP. */
1106 if (pi->tid)
19958708
RM
1107 pi->status_valid = (read (pi->status_fd,
1108 (char *) &pi->prstatus.pr_lwp,
c3f6f71d
JM
1109 sizeof (lwpstatus_t))
1110 == sizeof (lwpstatus_t));
1111 else
1112 {
19958708 1113 pi->status_valid = (read (pi->status_fd,
c3f6f71d
JM
1114 (char *) &pi->prstatus,
1115 sizeof (gdb_prstatus_t))
1116 == sizeof (gdb_prstatus_t));
1117#if 0 /*def UNIXWARE*/
1118 if (pi->status_valid &&
1119 (pi->prstatus.pr_lwp.pr_flags & PR_ISTOP) &&
1120 pi->prstatus.pr_lwp.pr_why == PR_REQUESTED)
1121 /* Unixware peculiarity -- read the damn thing again! */
19958708 1122 pi->status_valid = (read (pi->status_fd,
c3f6f71d
JM
1123 (char *) &pi->prstatus,
1124 sizeof (gdb_prstatus_t))
1125 == sizeof (gdb_prstatus_t));
1126#endif /* UNIXWARE */
1127 }
1128 }
1129#else /* ioctl method */
1130#ifdef PIOCTSTATUS /* osf */
1131 if (pi->tid == 0) /* main process */
1132 {
1133 /* Just read the danged status. Now isn't that simple? */
19958708 1134 pi->status_valid =
c3f6f71d
JM
1135 (ioctl (pi->status_fd, PIOCSTATUS, &pi->prstatus) >= 0);
1136 }
1137 else
1138 {
1139 int win;
1140 struct {
1141 long pr_count;
1142 tid_t pr_error_thread;
1143 struct prstatus status;
1144 } thread_status;
1145
1146 thread_status.pr_count = 1;
1147 thread_status.status.pr_tid = pi->tid;
1148 win = (ioctl (pi->status_fd, PIOCTSTATUS, &thread_status) >= 0);
1149 if (win)
1150 {
19958708 1151 memcpy (&pi->prstatus, &thread_status.status,
c3f6f71d
JM
1152 sizeof (pi->prstatus));
1153 pi->status_valid = 1;
1154 }
1155 }
1156#else
77382aee 1157 /* Just read the danged status. Now isn't that simple? */
c3f6f71d
JM
1158 pi->status_valid = (ioctl (pi->status_fd, PIOCSTATUS, &pi->prstatus) >= 0);
1159#endif
1160#endif
c906108c 1161
c3f6f71d
JM
1162 if (pi->status_valid)
1163 {
19958708 1164 PROC_PRETTYFPRINT_STATUS (proc_flags (pi),
c3f6f71d 1165 proc_why (pi),
19958708 1166 proc_what (pi),
c3f6f71d
JM
1167 proc_get_current_thread (pi));
1168 }
c906108c 1169
77382aee 1170 /* The status struct includes general regs, so mark them valid too. */
c3f6f71d
JM
1171 pi->gregs_valid = pi->status_valid;
1172#ifdef NEW_PROC_API
77382aee
PA
1173 /* In the read/write multiple-fd model, the status struct includes
1174 the fp regs too, so mark them valid too. */
c3f6f71d
JM
1175 pi->fpregs_valid = pi->status_valid;
1176#endif
77382aee 1177 return pi->status_valid; /* True if success, false if failure. */
c3f6f71d 1178}
c906108c 1179
77382aee 1180/* Returns the process flags (pr_flags field). */
c3f6f71d
JM
1181
1182long
fba45db2 1183proc_flags (procinfo *pi)
c3f6f71d
JM
1184{
1185 if (!pi->status_valid)
1186 if (!proc_get_status (pi))
1187 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 1188
c3f6f71d 1189#ifdef NEW_PROC_API
0d06e24b
JM
1190# ifdef UNIXWARE
1191 /* UnixWare 7.1 puts process status flags, e.g. PR_ASYNC, in
1192 pstatus_t and LWP status flags, e.g. PR_STOPPED, in lwpstatus_t.
77382aee 1193 The two sets of flags don't overlap. */
0d06e24b
JM
1194 return pi->prstatus.pr_flags | pi->prstatus.pr_lwp.pr_flags;
1195# else
c3f6f71d 1196 return pi->prstatus.pr_lwp.pr_flags;
0d06e24b 1197# endif
c3f6f71d
JM
1198#else
1199 return pi->prstatus.pr_flags;
1200#endif
1201}
c906108c 1202
77382aee 1203/* Returns the pr_why field (why the process stopped). */
c906108c 1204
c3f6f71d 1205int
fba45db2 1206proc_why (procinfo *pi)
c3f6f71d
JM
1207{
1208 if (!pi->status_valid)
1209 if (!proc_get_status (pi))
1210 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 1211
c3f6f71d
JM
1212#ifdef NEW_PROC_API
1213 return pi->prstatus.pr_lwp.pr_why;
1214#else
1215 return pi->prstatus.pr_why;
1216#endif
1217}
c906108c 1218
77382aee 1219/* Returns the pr_what field (details of why the process stopped). */
c906108c 1220
c3f6f71d 1221int
fba45db2 1222proc_what (procinfo *pi)
c3f6f71d
JM
1223{
1224 if (!pi->status_valid)
1225 if (!proc_get_status (pi))
1226 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 1227
c3f6f71d
JM
1228#ifdef NEW_PROC_API
1229 return pi->prstatus.pr_lwp.pr_what;
1230#else
1231 return pi->prstatus.pr_what;
c906108c 1232#endif
c3f6f71d 1233}
c906108c 1234
77382aee
PA
1235/* This function is only called when PI is stopped by a watchpoint.
1236 Assuming the OS supports it, write to *ADDR the data address which
1237 triggered it and return 1. Return 0 if it is not possible to know
1238 the address. */
bf701c2c
PM
1239
1240static int
1241proc_watchpoint_address (procinfo *pi, CORE_ADDR *addr)
1242{
1243 if (!pi->status_valid)
1244 if (!proc_get_status (pi))
1245 return 0;
1246
1247#ifdef NEW_PROC_API
1248 *addr = (CORE_ADDR) gdbarch_pointer_to_address (target_gdbarch,
1249 builtin_type (target_gdbarch)->builtin_data_ptr,
1250 (gdb_byte *) &pi->prstatus.pr_lwp.pr_info.si_addr);
1251#else
1252 *addr = (CORE_ADDR) gdbarch_pointer_to_address (target_gdbarch,
1253 builtin_type (target_gdbarch)->builtin_data_ptr,
1254 (gdb_byte *) &pi->prstatus.pr_info.si_addr);
1255#endif
1256 return 1;
1257}
1258
c3f6f71d 1259#ifndef PIOCSSPCACT /* The following is not supported on OSF. */
77382aee
PA
1260
1261/* Returns the pr_nsysarg field (number of args to the current
1262 syscall). */
c3f6f71d
JM
1263
1264int
fba45db2 1265proc_nsysarg (procinfo *pi)
c3f6f71d
JM
1266{
1267 if (!pi->status_valid)
1268 if (!proc_get_status (pi))
1269 return 0;
19958708 1270
c3f6f71d
JM
1271#ifdef NEW_PROC_API
1272 return pi->prstatus.pr_lwp.pr_nsysarg;
1273#else
1274 return pi->prstatus.pr_nsysarg;
c906108c 1275#endif
c3f6f71d 1276}
c906108c 1277
77382aee
PA
1278/* Returns the pr_sysarg field (pointer to the arguments of current
1279 syscall). */
c906108c 1280
c3f6f71d 1281long *
fba45db2 1282proc_sysargs (procinfo *pi)
c3f6f71d
JM
1283{
1284 if (!pi->status_valid)
1285 if (!proc_get_status (pi))
1286 return NULL;
19958708 1287
c3f6f71d
JM
1288#ifdef NEW_PROC_API
1289 return (long *) &pi->prstatus.pr_lwp.pr_sysarg;
1290#else
1291 return (long *) &pi->prstatus.pr_sysarg;
1292#endif
1293}
c906108c 1294
77382aee
PA
1295/* Returns the pr_syscall field (id of current syscall if we are in
1296 one). */
c906108c 1297
c3f6f71d 1298int
fba45db2 1299proc_syscall (procinfo *pi)
c3f6f71d
JM
1300{
1301 if (!pi->status_valid)
1302 if (!proc_get_status (pi))
1303 return 0;
19958708 1304
c3f6f71d
JM
1305#ifdef NEW_PROC_API
1306 return pi->prstatus.pr_lwp.pr_syscall;
1307#else
1308 return pi->prstatus.pr_syscall;
1309#endif
1310}
1311#endif /* PIOCSSPCACT */
c906108c 1312
77382aee 1313/* Returns the pr_cursig field (current signal). */
c906108c 1314
c3f6f71d
JM
1315long
1316proc_cursig (struct procinfo *pi)
1317{
1318 if (!pi->status_valid)
1319 if (!proc_get_status (pi))
1320 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 1321
c3f6f71d
JM
1322#ifdef NEW_PROC_API
1323 return pi->prstatus.pr_lwp.pr_cursig;
1324#else
1325 return pi->prstatus.pr_cursig;
1326#endif
1327}
c906108c 1328
77382aee
PA
1329/* === I appologize for the messiness of this function.
1330 === This is an area where the different versions of
1331 === /proc are more inconsistent than usual.
1332
1333 Set or reset any of the following process flags:
1334 PR_FORK -- forked child will inherit trace flags
1335 PR_RLC -- traced process runs when last /proc file closed.
1336 PR_KLC -- traced process is killed when last /proc file closed.
1337 PR_ASYNC -- LWP's get to run/stop independently.
1338
1339 There are three methods for doing this function:
1340 1) Newest: read/write [PCSET/PCRESET/PCUNSET]
1341 [Sol6, Sol7, UW]
1342 2) Middle: PIOCSET/PIOCRESET
1343 [Irix, Sol5]
1344 3) Oldest: PIOCSFORK/PIOCRFORK/PIOCSRLC/PIOCRRLC
1345 [OSF, Sol5]
1346
1347 Note: Irix does not define PR_ASYNC.
1348 Note: OSF does not define PR_KLC.
1349 Note: OSF is the only one that can ONLY use the oldest method.
1350
1351 Arguments:
1352 pi -- the procinfo
1353 flag -- one of PR_FORK, PR_RLC, or PR_ASYNC
1354 mode -- 1 for set, 0 for reset.
1355
1356 Returns non-zero for success, zero for failure. */
c906108c 1357
c3f6f71d 1358enum { FLAG_RESET, FLAG_SET };
c906108c 1359
c3f6f71d 1360static int
fba45db2 1361proc_modify_flag (procinfo *pi, long flag, long mode)
c3f6f71d
JM
1362{
1363 long win = 0; /* default to fail */
1364
77382aee
PA
1365 /* These operations affect the process as a whole, and applying them
1366 to an individual LWP has the same meaning as applying them to the
1367 main process. Therefore, if we're ever called with a pointer to
1368 an LWP's procinfo, let's substitute the process's procinfo and
1369 avoid opening the LWP's file descriptor unnecessarily. */
c3f6f71d
JM
1370
1371 if (pi->pid != 0)
1372 pi = find_procinfo_or_die (pi->pid, 0);
1373
1374#ifdef NEW_PROC_API /* Newest method: UnixWare and newer Solarii */
19958708 1375 /* First normalize the PCUNSET/PCRESET command opcode
c3f6f71d
JM
1376 (which for no obvious reason has a different definition
1377 from one operating system to the next...) */
1378#ifdef PCUNSET
1379#define GDBRESET PCUNSET
37de36c6 1380#else
c3f6f71d
JM
1381#ifdef PCRESET
1382#define GDBRESET PCRESET
37de36c6 1383#endif
c906108c 1384#endif
c3f6f71d 1385 {
37de36c6 1386 procfs_ctl_t arg[2];
c906108c 1387
c3f6f71d
JM
1388 if (mode == FLAG_SET) /* Set the flag (RLC, FORK, or ASYNC) */
1389 arg[0] = PCSET;
1390 else /* Reset the flag */
1391 arg[0] = GDBRESET;
c5aa993b 1392
c3f6f71d
JM
1393 arg[1] = flag;
1394 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
1395 }
1396#else
1397#ifdef PIOCSET /* Irix/Sol5 method */
1398 if (mode == FLAG_SET) /* Set the flag (hopefully RLC, FORK, or ASYNC) */
1399 {
1400 win = (ioctl (pi->ctl_fd, PIOCSET, &flag) >= 0);
1401 }
1402 else /* Reset the flag */
1403 {
1404 win = (ioctl (pi->ctl_fd, PIOCRESET, &flag) >= 0);
1405 }
c906108c 1406
c3f6f71d
JM
1407#else
1408#ifdef PIOCSRLC /* Oldest method: OSF */
1409 switch (flag) {
1410 case PR_RLC:
1411 if (mode == FLAG_SET) /* Set run-on-last-close */
1412 {
1413 win = (ioctl (pi->ctl_fd, PIOCSRLC, NULL) >= 0);
1414 }
1415 else /* Clear run-on-last-close */
1416 {
1417 win = (ioctl (pi->ctl_fd, PIOCRRLC, NULL) >= 0);
1418 }
1419 break;
1420 case PR_FORK:
1421 if (mode == FLAG_SET) /* Set inherit-on-fork */
1422 {
1423 win = (ioctl (pi->ctl_fd, PIOCSFORK, NULL) >= 0);
1424 }
1425 else /* Clear inherit-on-fork */
1426 {
1427 win = (ioctl (pi->ctl_fd, PIOCRFORK, NULL) >= 0);
1428 }
1429 break;
1430 default:
1431 win = 0; /* fail -- unknown flag (can't do PR_ASYNC) */
1432 break;
1433 }
1434#endif
1435#endif
1436#endif
1437#undef GDBRESET
77382aee
PA
1438 /* The above operation renders the procinfo's cached pstatus
1439 obsolete. */
c3f6f71d 1440 pi->status_valid = 0;
c906108c 1441
c3f6f71d 1442 if (!win)
8a3fe4f8 1443 warning (_("procfs: modify_flag failed to turn %s %s"),
c3f6f71d
JM
1444 flag == PR_FORK ? "PR_FORK" :
1445 flag == PR_RLC ? "PR_RLC" :
1446#ifdef PR_ASYNC
1447 flag == PR_ASYNC ? "PR_ASYNC" :
0d06e24b
JM
1448#endif
1449#ifdef PR_KLC
1450 flag == PR_KLC ? "PR_KLC" :
c3f6f71d
JM
1451#endif
1452 "<unknown flag>",
1453 mode == FLAG_RESET ? "off" : "on");
c906108c 1454
c3f6f71d
JM
1455 return win;
1456}
c906108c 1457
77382aee
PA
1458/* Set the run_on_last_close flag. Process with all threads will
1459 become runnable when debugger closes all /proc fds. Returns
1460 non-zero for success, zero for failure. */
c906108c 1461
c3f6f71d 1462int
fba45db2 1463proc_set_run_on_last_close (procinfo *pi)
c906108c 1464{
c3f6f71d
JM
1465 return proc_modify_flag (pi, PR_RLC, FLAG_SET);
1466}
c906108c 1467
77382aee
PA
1468/* Reset the run_on_last_close flag. The process will NOT become
1469 runnable when debugger closes its file handles. Returns non-zero
1470 for success, zero for failure. */
c906108c 1471
c3f6f71d 1472int
fba45db2 1473proc_unset_run_on_last_close (procinfo *pi)
c3f6f71d
JM
1474{
1475 return proc_modify_flag (pi, PR_RLC, FLAG_RESET);
c906108c
SS
1476}
1477
0d06e24b 1478#ifdef PR_KLC
77382aee
PA
1479/* Set the kill_on_last_close flag. Process with all threads will be
1480 killed when debugger closes all /proc fds (or debugger exits or
1481 dies). Returns non-zero for success, zero for failure. */
0d06e24b
JM
1482
1483int
fba45db2 1484proc_set_kill_on_last_close (procinfo *pi)
0d06e24b
JM
1485{
1486 return proc_modify_flag (pi, PR_KLC, FLAG_SET);
1487}
1488
77382aee
PA
1489/* Reset the kill_on_last_close flag. Process will NOT be killed when
1490 debugger closes its file handles (or exits or dies). Returns
1491 non-zero for success, zero for failure. */
0d06e24b
JM
1492
1493int
fba45db2 1494proc_unset_kill_on_last_close (procinfo *pi)
0d06e24b
JM
1495{
1496 return proc_modify_flag (pi, PR_KLC, FLAG_RESET);
1497}
1498#endif /* PR_KLC */
1499
77382aee
PA
1500/* Set inherit_on_fork flag. If the process forks a child while we
1501 are registered for events in the parent, then we will also recieve
1502 events from the child. Returns non-zero for success, zero for
1503 failure. */
c906108c 1504
c3f6f71d 1505int
fba45db2 1506proc_set_inherit_on_fork (procinfo *pi)
c3f6f71d
JM
1507{
1508 return proc_modify_flag (pi, PR_FORK, FLAG_SET);
1509}
c5aa993b 1510
77382aee
PA
1511/* Reset inherit_on_fork flag. If the process forks a child while we
1512 are registered for events in the parent, then we will NOT recieve
1513 events from the child. Returns non-zero for success, zero for
1514 failure. */
c906108c 1515
c3f6f71d 1516int
fba45db2 1517proc_unset_inherit_on_fork (procinfo *pi)
c3f6f71d
JM
1518{
1519 return proc_modify_flag (pi, PR_FORK, FLAG_RESET);
1520}
c906108c 1521
c3f6f71d 1522#ifdef PR_ASYNC
77382aee
PA
1523/* Set PR_ASYNC flag. If one LWP stops because of a debug event
1524 (signal etc.), the remaining LWPs will continue to run. Returns
1525 non-zero for success, zero for failure. */
c906108c 1526
c3f6f71d 1527int
fba45db2 1528proc_set_async (procinfo *pi)
c3f6f71d
JM
1529{
1530 return proc_modify_flag (pi, PR_ASYNC, FLAG_SET);
1531}
c906108c 1532
77382aee
PA
1533/* Reset PR_ASYNC flag. If one LWP stops because of a debug event
1534 (signal etc.), then all other LWPs will stop as well. Returns
1535 non-zero for success, zero for failure. */
c906108c 1536
c3f6f71d 1537int
fba45db2 1538proc_unset_async (procinfo *pi)
c3f6f71d
JM
1539{
1540 return proc_modify_flag (pi, PR_ASYNC, FLAG_RESET);
1541}
1542#endif /* PR_ASYNC */
c906108c 1543
77382aee
PA
1544/* Request the process/LWP to stop. Does not wait. Returns non-zero
1545 for success, zero for failure. */
c906108c 1546
c3f6f71d 1547int
fba45db2 1548proc_stop_process (procinfo *pi)
c3f6f71d
JM
1549{
1550 int win;
c906108c 1551
77382aee
PA
1552 /* We might conceivably apply this operation to an LWP, and the
1553 LWP's ctl file descriptor might not be open. */
c906108c 1554
c3f6f71d
JM
1555 if (pi->ctl_fd == 0 &&
1556 open_procinfo_files (pi, FD_CTL) == 0)
1557 return 0;
1558 else
1559 {
1560#ifdef NEW_PROC_API
37de36c6 1561 procfs_ctl_t cmd = PCSTOP;
f4a14ae6 1562
c3f6f71d
JM
1563 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
1564#else /* ioctl method */
1565 win = (ioctl (pi->ctl_fd, PIOCSTOP, &pi->prstatus) >= 0);
1566 /* Note: the call also reads the prstatus. */
1567 if (win)
1568 {
1569 pi->status_valid = 1;
19958708 1570 PROC_PRETTYFPRINT_STATUS (proc_flags (pi),
c3f6f71d 1571 proc_why (pi),
19958708 1572 proc_what (pi),
c3f6f71d
JM
1573 proc_get_current_thread (pi));
1574 }
1575#endif
1576 }
c906108c 1577
c3f6f71d
JM
1578 return win;
1579}
c5aa993b 1580
77382aee
PA
1581/* Wait for the process or LWP to stop (block until it does). Returns
1582 non-zero for success, zero for failure. */
c906108c 1583
c3f6f71d 1584int
fba45db2 1585proc_wait_for_stop (procinfo *pi)
c906108c 1586{
c3f6f71d
JM
1587 int win;
1588
77382aee
PA
1589 /* We should never have to apply this operation to any procinfo
1590 except the one for the main process. If that ever changes for
1591 any reason, then take out the following clause and replace it
1592 with one that makes sure the ctl_fd is open. */
19958708 1593
c3f6f71d
JM
1594 if (pi->tid != 0)
1595 pi = find_procinfo_or_die (pi->pid, 0);
1596
1597#ifdef NEW_PROC_API
1598 {
37de36c6 1599 procfs_ctl_t cmd = PCWSTOP;
f4a14ae6 1600
c3f6f71d
JM
1601 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
1602 /* We been runnin' and we stopped -- need to update status. */
1603 pi->status_valid = 0;
1604 }
1605#else /* ioctl method */
1606 win = (ioctl (pi->ctl_fd, PIOCWSTOP, &pi->prstatus) >= 0);
1607 /* Above call also refreshes the prstatus. */
1608 if (win)
1609 {
1610 pi->status_valid = 1;
19958708 1611 PROC_PRETTYFPRINT_STATUS (proc_flags (pi),
c3f6f71d 1612 proc_why (pi),
19958708 1613 proc_what (pi),
c3f6f71d
JM
1614 proc_get_current_thread (pi));
1615 }
c906108c
SS
1616#endif
1617
c3f6f71d 1618 return win;
c906108c
SS
1619}
1620
77382aee
PA
1621/* Make the process or LWP runnable.
1622
1623 Options (not all are implemented):
1624 - single-step
1625 - clear current fault
1626 - clear current signal
1627 - abort the current system call
1628 - stop as soon as finished with system call
1629 - (ioctl): set traced signal set
1630 - (ioctl): set held signal set
1631 - (ioctl): set traced fault set
1632 - (ioctl): set start pc (vaddr)
1633
1634 Always clears the current fault. PI is the process or LWP to
1635 operate on. If STEP is true, set the process or LWP to trap after
1636 one instruction. If SIGNO is zero, clear the current signal if
1637 any; if non-zero, set the current signal to this one. Returns
1638 non-zero for success, zero for failure. */
c3f6f71d
JM
1639
1640int
fba45db2 1641proc_run_process (procinfo *pi, int step, int signo)
c3f6f71d
JM
1642{
1643 int win;
1644 int runflags;
1645
77382aee
PA
1646 /* We will probably have to apply this operation to individual
1647 threads, so make sure the control file descriptor is open. */
19958708 1648
c3f6f71d
JM
1649 if (pi->ctl_fd == 0 &&
1650 open_procinfo_files (pi, FD_CTL) == 0)
1651 {
1652 return 0;
1653 }
c906108c 1654
c3f6f71d
JM
1655 runflags = PRCFAULT; /* always clear current fault */
1656 if (step)
1657 runflags |= PRSTEP;
1658 if (signo == 0)
1659 runflags |= PRCSIG;
1660 else if (signo != -1) /* -1 means do nothing W.R.T. signals */
1661 proc_set_current_signal (pi, signo);
c5aa993b 1662
c3f6f71d
JM
1663#ifdef NEW_PROC_API
1664 {
37de36c6 1665 procfs_ctl_t cmd[2];
c906108c 1666
c3f6f71d
JM
1667 cmd[0] = PCRUN;
1668 cmd[1] = runflags;
1669 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
1670 }
1671#else /* ioctl method */
1672 {
1673 prrun_t prrun;
c906108c 1674
c3f6f71d
JM
1675 memset (&prrun, 0, sizeof (prrun));
1676 prrun.pr_flags = runflags;
1677 win = (ioctl (pi->ctl_fd, PIOCRUN, &prrun) >= 0);
1678 }
1679#endif
c906108c 1680
c3f6f71d
JM
1681 return win;
1682}
c906108c 1683
77382aee
PA
1684/* Register to trace signals in the process or LWP. Returns non-zero
1685 for success, zero for failure. */
c906108c 1686
c3f6f71d 1687int
37de36c6 1688proc_set_traced_signals (procinfo *pi, gdb_sigset_t *sigset)
c906108c 1689{
c3f6f71d
JM
1690 int win;
1691
77382aee
PA
1692 /* We should never have to apply this operation to any procinfo
1693 except the one for the main process. If that ever changes for
1694 any reason, then take out the following clause and replace it
1695 with one that makes sure the ctl_fd is open. */
19958708 1696
c3f6f71d
JM
1697 if (pi->tid != 0)
1698 pi = find_procinfo_or_die (pi->pid, 0);
1699
1700#ifdef NEW_PROC_API
1701 {
1702 struct {
37de36c6 1703 procfs_ctl_t cmd;
c3f6f71d 1704 /* Use char array to avoid alignment issues. */
37de36c6 1705 char sigset[sizeof (gdb_sigset_t)];
c3f6f71d 1706 } arg;
c906108c 1707
c3f6f71d 1708 arg.cmd = PCSTRACE;
37de36c6 1709 memcpy (&arg.sigset, sigset, sizeof (gdb_sigset_t));
c906108c 1710
c3f6f71d
JM
1711 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
1712 }
1713#else /* ioctl method */
1714 win = (ioctl (pi->ctl_fd, PIOCSTRACE, sigset) >= 0);
1715#endif
1716 /* The above operation renders the procinfo's cached pstatus obsolete. */
1717 pi->status_valid = 0;
c906108c 1718
c3f6f71d 1719 if (!win)
8a3fe4f8 1720 warning (_("procfs: set_traced_signals failed"));
c3f6f71d 1721 return win;
c906108c
SS
1722}
1723
77382aee
PA
1724/* Register to trace hardware faults in the process or LWP. Returns
1725 non-zero for success, zero for failure. */
c906108c 1726
c3f6f71d 1727int
fba45db2 1728proc_set_traced_faults (procinfo *pi, fltset_t *fltset)
c3f6f71d
JM
1729{
1730 int win;
1731
77382aee
PA
1732 /* We should never have to apply this operation to any procinfo
1733 except the one for the main process. If that ever changes for
1734 any reason, then take out the following clause and replace it
1735 with one that makes sure the ctl_fd is open. */
19958708 1736
c3f6f71d
JM
1737 if (pi->tid != 0)
1738 pi = find_procinfo_or_die (pi->pid, 0);
1739
1740#ifdef NEW_PROC_API
1741 {
1742 struct {
37de36c6 1743 procfs_ctl_t cmd;
c3f6f71d
JM
1744 /* Use char array to avoid alignment issues. */
1745 char fltset[sizeof (fltset_t)];
1746 } arg;
c906108c 1747
c3f6f71d
JM
1748 arg.cmd = PCSFAULT;
1749 memcpy (&arg.fltset, fltset, sizeof (fltset_t));
c906108c 1750
c3f6f71d
JM
1751 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
1752 }
1753#else /* ioctl method */
1754 win = (ioctl (pi->ctl_fd, PIOCSFAULT, fltset) >= 0);
1755#endif
1756 /* The above operation renders the procinfo's cached pstatus obsolete. */
1757 pi->status_valid = 0;
c906108c 1758
c3f6f71d
JM
1759 return win;
1760}
c5aa993b 1761
77382aee
PA
1762/* Register to trace entry to system calls in the process or LWP.
1763 Returns non-zero for success, zero for failure. */
c906108c 1764
c3f6f71d 1765int
fba45db2 1766proc_set_traced_sysentry (procinfo *pi, sysset_t *sysset)
c906108c 1767{
c3f6f71d
JM
1768 int win;
1769
77382aee
PA
1770 /* We should never have to apply this operation to any procinfo
1771 except the one for the main process. If that ever changes for
1772 any reason, then take out the following clause and replace it
1773 with one that makes sure the ctl_fd is open. */
19958708 1774
c3f6f71d
JM
1775 if (pi->tid != 0)
1776 pi = find_procinfo_or_die (pi->pid, 0);
1777
1778#ifdef NEW_PROC_API
1779 {
37de36c6
KB
1780 struct gdb_proc_ctl_pcsentry {
1781 procfs_ctl_t cmd;
c3f6f71d
JM
1782 /* Use char array to avoid alignment issues. */
1783 char sysset[sizeof (sysset_t)];
37de36c6
KB
1784 } *argp;
1785 int argp_size = sizeof (struct gdb_proc_ctl_pcsentry)
77382aee 1786 - sizeof (sysset_t)
37de36c6 1787 + sysset_t_size (pi);
c3f6f71d 1788
37de36c6 1789 argp = xmalloc (argp_size);
c3f6f71d 1790
37de36c6
KB
1791 argp->cmd = PCSENTRY;
1792 memcpy (&argp->sysset, sysset, sysset_t_size (pi));
1793
1794 win = (write (pi->ctl_fd, (char *) argp, argp_size) == argp_size);
1795 xfree (argp);
c3f6f71d
JM
1796 }
1797#else /* ioctl method */
1798 win = (ioctl (pi->ctl_fd, PIOCSENTRY, sysset) >= 0);
1799#endif
77382aee
PA
1800 /* The above operation renders the procinfo's cached pstatus
1801 obsolete. */
c3f6f71d 1802 pi->status_valid = 0;
19958708 1803
c3f6f71d 1804 return win;
c906108c
SS
1805}
1806
77382aee
PA
1807/* Register to trace exit from system calls in the process or LWP.
1808 Returns non-zero for success, zero for failure. */
c906108c 1809
c3f6f71d 1810int
fba45db2 1811proc_set_traced_sysexit (procinfo *pi, sysset_t *sysset)
c3f6f71d
JM
1812{
1813 int win;
1814
77382aee
PA
1815 /* We should never have to apply this operation to any procinfo
1816 except the one for the main process. If that ever changes for
1817 any reason, then take out the following clause and replace it
1818 with one that makes sure the ctl_fd is open. */
19958708 1819
c3f6f71d
JM
1820 if (pi->tid != 0)
1821 pi = find_procinfo_or_die (pi->pid, 0);
1822
1823#ifdef NEW_PROC_API
1824 {
37de36c6
KB
1825 struct gdb_proc_ctl_pcsexit {
1826 procfs_ctl_t cmd;
c3f6f71d
JM
1827 /* Use char array to avoid alignment issues. */
1828 char sysset[sizeof (sysset_t)];
37de36c6
KB
1829 } *argp;
1830 int argp_size = sizeof (struct gdb_proc_ctl_pcsexit)
77382aee 1831 - sizeof (sysset_t)
37de36c6 1832 + sysset_t_size (pi);
c906108c 1833
37de36c6 1834 argp = xmalloc (argp_size);
c906108c 1835
37de36c6
KB
1836 argp->cmd = PCSEXIT;
1837 memcpy (&argp->sysset, sysset, sysset_t_size (pi));
1838
1839 win = (write (pi->ctl_fd, (char *) argp, argp_size) == argp_size);
1840 xfree (argp);
c3f6f71d
JM
1841 }
1842#else /* ioctl method */
1843 win = (ioctl (pi->ctl_fd, PIOCSEXIT, sysset) >= 0);
1844#endif
77382aee
PA
1845 /* The above operation renders the procinfo's cached pstatus
1846 obsolete. */
c3f6f71d 1847 pi->status_valid = 0;
c906108c 1848
c3f6f71d
JM
1849 return win;
1850}
c906108c 1851
77382aee
PA
1852/* Specify the set of blocked / held signals in the process or LWP.
1853 Returns non-zero for success, zero for failure. */
c906108c 1854
c3f6f71d 1855int
37de36c6 1856proc_set_held_signals (procinfo *pi, gdb_sigset_t *sighold)
c906108c 1857{
c3f6f71d
JM
1858 int win;
1859
77382aee
PA
1860 /* We should never have to apply this operation to any procinfo
1861 except the one for the main process. If that ever changes for
1862 any reason, then take out the following clause and replace it
1863 with one that makes sure the ctl_fd is open. */
19958708 1864
c3f6f71d
JM
1865 if (pi->tid != 0)
1866 pi = find_procinfo_or_die (pi->pid, 0);
1867
1868#ifdef NEW_PROC_API
1869 {
1870 struct {
37de36c6 1871 procfs_ctl_t cmd;
c3f6f71d 1872 /* Use char array to avoid alignment issues. */
37de36c6 1873 char hold[sizeof (gdb_sigset_t)];
c3f6f71d
JM
1874 } arg;
1875
1876 arg.cmd = PCSHOLD;
37de36c6 1877 memcpy (&arg.hold, sighold, sizeof (gdb_sigset_t));
c3f6f71d
JM
1878 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
1879 }
c906108c 1880#else
c3f6f71d 1881 win = (ioctl (pi->ctl_fd, PIOCSHOLD, sighold) >= 0);
c906108c 1882#endif
77382aee
PA
1883 /* The above operation renders the procinfo's cached pstatus
1884 obsolete. */
c3f6f71d
JM
1885 pi->status_valid = 0;
1886
1887 return win;
c906108c
SS
1888}
1889
77382aee
PA
1890/* Returns the set of signals that are pending in the process or LWP.
1891 Will also copy the sigset if SAVE is non-zero. */
c906108c 1892
37de36c6
KB
1893gdb_sigset_t *
1894proc_get_pending_signals (procinfo *pi, gdb_sigset_t *save)
c3f6f71d 1895{
37de36c6 1896 gdb_sigset_t *ret = NULL;
c3f6f71d 1897
77382aee
PA
1898 /* We should never have to apply this operation to any procinfo
1899 except the one for the main process. If that ever changes for
1900 any reason, then take out the following clause and replace it
1901 with one that makes sure the ctl_fd is open. */
19958708 1902
c3f6f71d
JM
1903 if (pi->tid != 0)
1904 pi = find_procinfo_or_die (pi->pid, 0);
1905
1906 if (!pi->status_valid)
1907 if (!proc_get_status (pi))
1908 return NULL;
1909
1910#ifdef NEW_PROC_API
1911 ret = &pi->prstatus.pr_lwp.pr_lwppend;
1912#else
1913 ret = &pi->prstatus.pr_sigpend;
1914#endif
1915 if (save && ret)
37de36c6 1916 memcpy (save, ret, sizeof (gdb_sigset_t));
c906108c 1917
c3f6f71d
JM
1918 return ret;
1919}
c906108c 1920
77382aee
PA
1921/* Returns the set of signal actions. Will also copy the sigactionset
1922 if SAVE is non-zero. */
c906108c 1923
37de36c6
KB
1924gdb_sigaction_t *
1925proc_get_signal_actions (procinfo *pi, gdb_sigaction_t *save)
c3f6f71d 1926{
37de36c6 1927 gdb_sigaction_t *ret = NULL;
c3f6f71d 1928
77382aee
PA
1929 /* We should never have to apply this operation to any procinfo
1930 except the one for the main process. If that ever changes for
1931 any reason, then take out the following clause and replace it
1932 with one that makes sure the ctl_fd is open. */
19958708 1933
c3f6f71d
JM
1934 if (pi->tid != 0)
1935 pi = find_procinfo_or_die (pi->pid, 0);
1936
1937 if (!pi->status_valid)
1938 if (!proc_get_status (pi))
1939 return NULL;
1940
1941#ifdef NEW_PROC_API
1942 ret = &pi->prstatus.pr_lwp.pr_action;
1943#else
1944 ret = &pi->prstatus.pr_action;
1945#endif
1946 if (save && ret)
37de36c6 1947 memcpy (save, ret, sizeof (gdb_sigaction_t));
c906108c 1948
c3f6f71d
JM
1949 return ret;
1950}
c5aa993b 1951
77382aee
PA
1952/* Returns the set of signals that are held / blocked. Will also copy
1953 the sigset if SAVE is non-zero. */
c906108c 1954
37de36c6
KB
1955gdb_sigset_t *
1956proc_get_held_signals (procinfo *pi, gdb_sigset_t *save)
c906108c 1957{
37de36c6 1958 gdb_sigset_t *ret = NULL;
c3f6f71d 1959
77382aee
PA
1960 /* We should never have to apply this operation to any procinfo
1961 except the one for the main process. If that ever changes for
1962 any reason, then take out the following clause and replace it
1963 with one that makes sure the ctl_fd is open. */
19958708 1964
c3f6f71d
JM
1965 if (pi->tid != 0)
1966 pi = find_procinfo_or_die (pi->pid, 0);
1967
1968#ifdef NEW_PROC_API
1969 if (!pi->status_valid)
1970 if (!proc_get_status (pi))
1971 return NULL;
1972
1973#ifdef UNIXWARE
1974 ret = &pi->prstatus.pr_lwp.pr_context.uc_sigmask;
c906108c 1975#else
c3f6f71d
JM
1976 ret = &pi->prstatus.pr_lwp.pr_lwphold;
1977#endif /* UNIXWARE */
1978#else /* not NEW_PROC_API */
1979 {
37de36c6 1980 static gdb_sigset_t sigheld;
c3f6f71d
JM
1981
1982 if (ioctl (pi->ctl_fd, PIOCGHOLD, &sigheld) >= 0)
1983 ret = &sigheld;
1984 }
1985#endif /* NEW_PROC_API */
1986 if (save && ret)
37de36c6 1987 memcpy (save, ret, sizeof (gdb_sigset_t));
c3f6f71d
JM
1988
1989 return ret;
c906108c
SS
1990}
1991
77382aee
PA
1992/* Returns the set of signals that are traced / debugged. Will also
1993 copy the sigset if SAVE is non-zero. */
c3f6f71d 1994
37de36c6
KB
1995gdb_sigset_t *
1996proc_get_traced_signals (procinfo *pi, gdb_sigset_t *save)
c906108c 1997{
37de36c6 1998 gdb_sigset_t *ret = NULL;
c3f6f71d 1999
77382aee
PA
2000 /* We should never have to apply this operation to any procinfo
2001 except the one for the main process. If that ever changes for
2002 any reason, then take out the following clause and replace it
2003 with one that makes sure the ctl_fd is open. */
19958708 2004
c3f6f71d
JM
2005 if (pi->tid != 0)
2006 pi = find_procinfo_or_die (pi->pid, 0);
2007
2008#ifdef NEW_PROC_API
2009 if (!pi->status_valid)
2010 if (!proc_get_status (pi))
2011 return NULL;
2012
2013 ret = &pi->prstatus.pr_sigtrace;
2014#else
2015 {
37de36c6 2016 static gdb_sigset_t sigtrace;
c3f6f71d
JM
2017
2018 if (ioctl (pi->ctl_fd, PIOCGTRACE, &sigtrace) >= 0)
2019 ret = &sigtrace;
2020 }
c906108c 2021#endif
c3f6f71d 2022 if (save && ret)
37de36c6 2023 memcpy (save, ret, sizeof (gdb_sigset_t));
c906108c 2024
c3f6f71d
JM
2025 return ret;
2026}
c906108c 2027
77382aee
PA
2028/* Add SIGNO to the set of signals that are traced. Returns non-zero
2029 for success, zero for failure. */
c906108c 2030
c3f6f71d 2031int
fba45db2 2032proc_trace_signal (procinfo *pi, int signo)
c3f6f71d 2033{
37de36c6 2034 gdb_sigset_t temp;
c3f6f71d 2035
77382aee
PA
2036 /* We should never have to apply this operation to any procinfo
2037 except the one for the main process. If that ever changes for
2038 any reason, then take out the following clause and replace it
2039 with one that makes sure the ctl_fd is open. */
19958708 2040
c3f6f71d
JM
2041 if (pi->tid != 0)
2042 pi = find_procinfo_or_die (pi->pid, 0);
2043
2044 if (pi)
c906108c 2045 {
c3f6f71d 2046 if (proc_get_traced_signals (pi, &temp))
c906108c 2047 {
3c95f01c 2048 gdb_praddset (&temp, signo);
c3f6f71d 2049 return proc_set_traced_signals (pi, &temp);
c906108c
SS
2050 }
2051 }
c5aa993b 2052
c3f6f71d
JM
2053 return 0; /* failure */
2054}
c906108c 2055
77382aee
PA
2056/* Remove SIGNO from the set of signals that are traced. Returns
2057 non-zero for success, zero for failure. */
c906108c 2058
c3f6f71d 2059int
fba45db2 2060proc_ignore_signal (procinfo *pi, int signo)
c3f6f71d 2061{
37de36c6 2062 gdb_sigset_t temp;
c3f6f71d 2063
77382aee
PA
2064 /* We should never have to apply this operation to any procinfo
2065 except the one for the main process. If that ever changes for
2066 any reason, then take out the following clause and replace it
2067 with one that makes sure the ctl_fd is open. */
19958708 2068
c3f6f71d
JM
2069 if (pi->tid != 0)
2070 pi = find_procinfo_or_die (pi->pid, 0);
2071
2072 if (pi)
c906108c 2073 {
c3f6f71d 2074 if (proc_get_traced_signals (pi, &temp))
c906108c 2075 {
3c95f01c 2076 gdb_prdelset (&temp, signo);
c3f6f71d 2077 return proc_set_traced_signals (pi, &temp);
c906108c 2078 }
c906108c 2079 }
c906108c 2080
c3f6f71d 2081 return 0; /* failure */
c906108c
SS
2082}
2083
77382aee
PA
2084/* Returns the set of hardware faults that are traced /debugged. Will
2085 also copy the faultset if SAVE is non-zero. */
c3f6f71d
JM
2086
2087fltset_t *
fba45db2 2088proc_get_traced_faults (procinfo *pi, fltset_t *save)
c3f6f71d
JM
2089{
2090 fltset_t *ret = NULL;
2091
77382aee
PA
2092 /* We should never have to apply this operation to any procinfo
2093 except the one for the main process. If that ever changes for
2094 any reason, then take out the following clause and replace it
2095 with one that makes sure the ctl_fd is open. */
19958708 2096
c3f6f71d
JM
2097 if (pi->tid != 0)
2098 pi = find_procinfo_or_die (pi->pid, 0);
2099
2100#ifdef NEW_PROC_API
2101 if (!pi->status_valid)
2102 if (!proc_get_status (pi))
2103 return NULL;
2104
2105 ret = &pi->prstatus.pr_flttrace;
2106#else
2107 {
2108 static fltset_t flttrace;
2109
2110 if (ioctl (pi->ctl_fd, PIOCGFAULT, &flttrace) >= 0)
2111 ret = &flttrace;
2112 }
2113#endif
2114 if (save && ret)
2115 memcpy (save, ret, sizeof (fltset_t));
c906108c 2116
c3f6f71d
JM
2117 return ret;
2118}
c906108c 2119
77382aee
PA
2120/* Returns the set of syscalls that are traced /debugged on entry.
2121 Will also copy the syscall set if SAVE is non-zero. */
c906108c 2122
c3f6f71d 2123sysset_t *
fba45db2 2124proc_get_traced_sysentry (procinfo *pi, sysset_t *save)
c3f6f71d
JM
2125{
2126 sysset_t *ret = NULL;
2127
77382aee
PA
2128 /* We should never have to apply this operation to any procinfo
2129 except the one for the main process. If that ever changes for
2130 any reason, then take out the following clause and replace it
2131 with one that makes sure the ctl_fd is open. */
19958708 2132
c3f6f71d
JM
2133 if (pi->tid != 0)
2134 pi = find_procinfo_or_die (pi->pid, 0);
2135
2136#ifdef NEW_PROC_API
2137 if (!pi->status_valid)
2138 if (!proc_get_status (pi))
2139 return NULL;
2140
37de36c6 2141#ifndef DYNAMIC_SYSCALLS
c3f6f71d 2142 ret = &pi->prstatus.pr_sysentry;
37de36c6
KB
2143#else /* DYNAMIC_SYSCALLS */
2144 {
2145 static sysset_t *sysentry;
2146 size_t size;
2147
2148 if (!sysentry)
2149 sysentry = sysset_t_alloc (pi);
2150 ret = sysentry;
2151 if (pi->status_fd == 0 && open_procinfo_files (pi, FD_STATUS) == 0)
2152 return NULL;
2153 if (pi->prstatus.pr_sysentry_offset == 0)
2154 {
2155 gdb_premptysysset (sysentry);
2156 }
2157 else
2158 {
2159 int rsize;
2160
2161 if (lseek (pi->status_fd, (off_t) pi->prstatus.pr_sysentry_offset,
77382aee 2162 SEEK_SET)
37de36c6
KB
2163 != (off_t) pi->prstatus.pr_sysentry_offset)
2164 return NULL;
2165 size = sysset_t_size (pi);
2166 gdb_premptysysset (sysentry);
2167 rsize = read (pi->status_fd, sysentry, size);
2168 if (rsize < 0)
2169 return NULL;
2170 }
2171 }
2172#endif /* DYNAMIC_SYSCALLS */
2173#else /* !NEW_PROC_API */
c3f6f71d
JM
2174 {
2175 static sysset_t sysentry;
c906108c 2176
c3f6f71d
JM
2177 if (ioctl (pi->ctl_fd, PIOCGENTRY, &sysentry) >= 0)
2178 ret = &sysentry;
2179 }
37de36c6 2180#endif /* NEW_PROC_API */
c3f6f71d 2181 if (save && ret)
37de36c6 2182 memcpy (save, ret, sysset_t_size (pi));
c906108c 2183
c3f6f71d
JM
2184 return ret;
2185}
c5aa993b 2186
77382aee
PA
2187/* Returns the set of syscalls that are traced /debugged on exit.
2188 Will also copy the syscall set if SAVE is non-zero. */
c906108c 2189
c3f6f71d 2190sysset_t *
fba45db2 2191proc_get_traced_sysexit (procinfo *pi, sysset_t *save)
c906108c 2192{
c3f6f71d
JM
2193 sysset_t * ret = NULL;
2194
77382aee
PA
2195 /* We should never have to apply this operation to any procinfo
2196 except the one for the main process. If that ever changes for
2197 any reason, then take out the following clause and replace it
2198 with one that makes sure the ctl_fd is open. */
19958708 2199
c3f6f71d
JM
2200 if (pi->tid != 0)
2201 pi = find_procinfo_or_die (pi->pid, 0);
2202
2203#ifdef NEW_PROC_API
2204 if (!pi->status_valid)
2205 if (!proc_get_status (pi))
2206 return NULL;
2207
37de36c6 2208#ifndef DYNAMIC_SYSCALLS
c3f6f71d 2209 ret = &pi->prstatus.pr_sysexit;
37de36c6
KB
2210#else /* DYNAMIC_SYSCALLS */
2211 {
2212 static sysset_t *sysexit;
2213 size_t size;
2214
2215 if (!sysexit)
2216 sysexit = sysset_t_alloc (pi);
2217 ret = sysexit;
2218 if (pi->status_fd == 0 && open_procinfo_files (pi, FD_STATUS) == 0)
2219 return NULL;
2220 if (pi->prstatus.pr_sysexit_offset == 0)
2221 {
2222 gdb_premptysysset (sysexit);
2223 }
2224 else
2225 {
2226 int rsize;
2227
77382aee
PA
2228 if (lseek (pi->status_fd, (off_t) pi->prstatus.pr_sysexit_offset,
2229 SEEK_SET)
37de36c6
KB
2230 != (off_t) pi->prstatus.pr_sysexit_offset)
2231 return NULL;
2232 size = sysset_t_size (pi);
2233 gdb_premptysysset (sysexit);
2234 rsize = read (pi->status_fd, sysexit, size);
2235 if (rsize < 0)
2236 return NULL;
2237 }
2238 }
2239#endif /* DYNAMIC_SYSCALLS */
c3f6f71d
JM
2240#else
2241 {
2242 static sysset_t sysexit;
c5aa993b 2243
c3f6f71d
JM
2244 if (ioctl (pi->ctl_fd, PIOCGEXIT, &sysexit) >= 0)
2245 ret = &sysexit;
2246 }
2247#endif
2248 if (save && ret)
37de36c6 2249 memcpy (save, ret, sysset_t_size (pi));
c3f6f71d
JM
2250
2251 return ret;
2252}
c906108c 2253
77382aee
PA
2254/* The current fault (if any) is cleared; the associated signal will
2255 not be sent to the process or LWP when it resumes. Returns
2256 non-zero for success, zero for failure. */
c906108c 2257
c3f6f71d 2258int
fba45db2 2259proc_clear_current_fault (procinfo *pi)
c3f6f71d
JM
2260{
2261 int win;
2262
77382aee
PA
2263 /* We should never have to apply this operation to any procinfo
2264 except the one for the main process. If that ever changes for
2265 any reason, then take out the following clause and replace it
2266 with one that makes sure the ctl_fd is open. */
19958708 2267
c3f6f71d
JM
2268 if (pi->tid != 0)
2269 pi = find_procinfo_or_die (pi->pid, 0);
2270
2271#ifdef NEW_PROC_API
2272 {
37de36c6 2273 procfs_ctl_t cmd = PCCFAULT;
f4a14ae6 2274
c3f6f71d
JM
2275 win = (write (pi->ctl_fd, (void *) &cmd, sizeof (cmd)) == sizeof (cmd));
2276 }
2277#else
2278 win = (ioctl (pi->ctl_fd, PIOCCFAULT, 0) >= 0);
2279#endif
2280
2281 return win;
c906108c
SS
2282}
2283
77382aee
PA
2284/* Set the "current signal" that will be delivered next to the
2285 process. NOTE: semantics are different from those of KILL. This
2286 signal will be delivered to the process or LWP immediately when it
2287 is resumed (even if the signal is held/blocked); it will NOT
2288 immediately cause another event of interest, and will NOT first
2289 trap back to the debugger. Returns non-zero for success, zero for
2290 failure. */
c3f6f71d
JM
2291
2292int
fba45db2 2293proc_set_current_signal (procinfo *pi, int signo)
c3f6f71d
JM
2294{
2295 int win;
2296 struct {
37de36c6 2297 procfs_ctl_t cmd;
c3f6f71d 2298 /* Use char array to avoid alignment issues. */
37de36c6 2299 char sinfo[sizeof (gdb_siginfo_t)];
c3f6f71d 2300 } arg;
73930d4d 2301 gdb_siginfo_t mysinfo;
c162e8c9
JM
2302 ptid_t wait_ptid;
2303 struct target_waitstatus wait_status;
c3f6f71d 2304
77382aee
PA
2305 /* We should never have to apply this operation to any procinfo
2306 except the one for the main process. If that ever changes for
2307 any reason, then take out the following clause and replace it
2308 with one that makes sure the ctl_fd is open. */
19958708 2309
c3f6f71d
JM
2310 if (pi->tid != 0)
2311 pi = find_procinfo_or_die (pi->pid, 0);
2312
2313#ifdef PROCFS_DONT_PIOCSSIG_CURSIG
2314 /* With Alpha OSF/1 procfs, the kernel gets really confused if it
77382aee
PA
2315 receives a PIOCSSIG with a signal identical to the current
2316 signal, it messes up the current signal. Work around the kernel
2317 bug. */
c3f6f71d
JM
2318 if (signo > 0 &&
2319 signo == proc_cursig (pi))
2320 return 1; /* I assume this is a success? */
2321#endif
2322
2323 /* The pointer is just a type alias. */
c162e8c9
JM
2324 get_last_target_status (&wait_ptid, &wait_status);
2325 if (ptid_equal (wait_ptid, inferior_ptid)
2326 && wait_status.kind == TARGET_WAITKIND_STOPPED
2327 && wait_status.value.sig == target_signal_from_host (signo)
2328 && proc_get_status (pi)
2329#ifdef NEW_PROC_API
2330 && pi->prstatus.pr_lwp.pr_info.si_signo == signo
2331#else
2332 && pi->prstatus.pr_info.si_signo == signo
2333#endif
2334 )
2335 /* Use the siginfo associated with the signal being
2336 redelivered. */
2337#ifdef NEW_PROC_API
73930d4d 2338 memcpy (arg.sinfo, &pi->prstatus.pr_lwp.pr_info, sizeof (gdb_siginfo_t));
c162e8c9 2339#else
73930d4d 2340 memcpy (arg.sinfo, &pi->prstatus.pr_info, sizeof (gdb_siginfo_t));
c162e8c9
JM
2341#endif
2342 else
2343 {
73930d4d
KH
2344 mysinfo.si_signo = signo;
2345 mysinfo.si_code = 0;
2346 mysinfo.si_pid = getpid (); /* ?why? */
2347 mysinfo.si_uid = getuid (); /* ?why? */
2348 memcpy (arg.sinfo, &mysinfo, sizeof (gdb_siginfo_t));
c162e8c9 2349 }
c3f6f71d
JM
2350
2351#ifdef NEW_PROC_API
2352 arg.cmd = PCSSIG;
2353 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
2354#else
2355 win = (ioctl (pi->ctl_fd, PIOCSSIG, (void *) &arg.sinfo) >= 0);
2356#endif
c906108c 2357
c3f6f71d
JM
2358 return win;
2359}
c906108c 2360
77382aee
PA
2361/* The current signal (if any) is cleared, and is not sent to the
2362 process or LWP when it resumes. Returns non-zero for success, zero
2363 for failure. */
c906108c 2364
c3f6f71d 2365int
fba45db2 2366proc_clear_current_signal (procinfo *pi)
c3f6f71d
JM
2367{
2368 int win;
2369
77382aee
PA
2370 /* We should never have to apply this operation to any procinfo
2371 except the one for the main process. If that ever changes for
2372 any reason, then take out the following clause and replace it
2373 with one that makes sure the ctl_fd is open. */
19958708 2374
c3f6f71d
JM
2375 if (pi->tid != 0)
2376 pi = find_procinfo_or_die (pi->pid, 0);
2377
2378#ifdef NEW_PROC_API
2379 {
2380 struct {
37de36c6 2381 procfs_ctl_t cmd;
c3f6f71d 2382 /* Use char array to avoid alignment issues. */
37de36c6 2383 char sinfo[sizeof (gdb_siginfo_t)];
c3f6f71d 2384 } arg;
73930d4d 2385 gdb_siginfo_t mysinfo;
c3f6f71d
JM
2386
2387 arg.cmd = PCSSIG;
2388 /* The pointer is just a type alias. */
73930d4d
KH
2389 mysinfo.si_signo = 0;
2390 mysinfo.si_code = 0;
2391 mysinfo.si_errno = 0;
2392 mysinfo.si_pid = getpid (); /* ?why? */
2393 mysinfo.si_uid = getuid (); /* ?why? */
2394 memcpy (arg.sinfo, &mysinfo, sizeof (gdb_siginfo_t));
c3f6f71d
JM
2395
2396 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
2397 }
2398#else
2399 win = (ioctl (pi->ctl_fd, PIOCSSIG, 0) >= 0);
2400#endif
c906108c 2401
c3f6f71d
JM
2402 return win;
2403}
c906108c 2404
772cf8be
MK
2405/* Return the general-purpose registers for the process or LWP
2406 corresponding to PI. Upon failure, return NULL. */
c906108c 2407
c3f6f71d 2408gdb_gregset_t *
fba45db2 2409proc_get_gregs (procinfo *pi)
c3f6f71d
JM
2410{
2411 if (!pi->status_valid || !pi->gregs_valid)
2412 if (!proc_get_status (pi))
2413 return NULL;
2414
772cf8be
MK
2415 /* OK, sorry about the ifdef's. There's three cases instead of two,
2416 because in this case Unixware and Solaris/RW differ. */
c3f6f71d
JM
2417
2418#ifdef NEW_PROC_API
772cf8be 2419# ifdef UNIXWARE /* FIXME: Should be autoconfigured. */
c3f6f71d 2420 return &pi->prstatus.pr_lwp.pr_context.uc_mcontext.gregs;
772cf8be 2421# else
c3f6f71d 2422 return &pi->prstatus.pr_lwp.pr_reg;
772cf8be
MK
2423# endif
2424#else
c3f6f71d 2425 return &pi->prstatus.pr_reg;
772cf8be 2426#endif
c3f6f71d 2427}
c5aa993b 2428
772cf8be
MK
2429/* Return the general-purpose registers for the process or LWP
2430 corresponding to PI. Upon failure, return NULL. */
c906108c 2431
c3f6f71d 2432gdb_fpregset_t *
fba45db2 2433proc_get_fpregs (procinfo *pi)
c906108c 2434{
c3f6f71d
JM
2435#ifdef NEW_PROC_API
2436 if (!pi->status_valid || !pi->fpregs_valid)
2437 if (!proc_get_status (pi))
2438 return NULL;
2439
772cf8be 2440# ifdef UNIXWARE /* FIXME: Should be autoconfigured. */
c3f6f71d 2441 return &pi->prstatus.pr_lwp.pr_context.uc_mcontext.fpregs;
772cf8be 2442# else
c3f6f71d 2443 return &pi->prstatus.pr_lwp.pr_fpreg;
772cf8be 2444# endif
c5aa993b 2445
772cf8be 2446#else /* not NEW_PROC_API */
c3f6f71d 2447 if (pi->fpregs_valid)
772cf8be 2448 return &pi->fpregset; /* Already got 'em. */
c3f6f71d 2449 else
c906108c 2450 {
772cf8be 2451 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c906108c 2452 {
c3f6f71d 2453 return NULL;
c906108c 2454 }
c3f6f71d 2455 else
c906108c 2456 {
772cf8be 2457# ifdef PIOCTGFPREG
c3f6f71d
JM
2458 struct {
2459 long pr_count;
2460 tid_t pr_error_thread;
2461 tfpregset_t thread_1;
2462 } thread_fpregs;
2463
2464 thread_fpregs.pr_count = 1;
2465 thread_fpregs.thread_1.tid = pi->tid;
2466
772cf8be
MK
2467 if (pi->tid == 0
2468 && ioctl (pi->ctl_fd, PIOCGFPREG, &pi->fpregset) >= 0)
c3f6f71d
JM
2469 {
2470 pi->fpregs_valid = 1;
772cf8be 2471 return &pi->fpregset; /* Got 'em now! */
c3f6f71d 2472 }
772cf8be
MK
2473 else if (pi->tid != 0
2474 && ioctl (pi->ctl_fd, PIOCTGFPREG, &thread_fpregs) >= 0)
c3f6f71d
JM
2475 {
2476 memcpy (&pi->fpregset, &thread_fpregs.thread_1.pr_fpregs,
2477 sizeof (pi->fpregset));
2478 pi->fpregs_valid = 1;
772cf8be 2479 return &pi->fpregset; /* Got 'em now! */
c3f6f71d
JM
2480 }
2481 else
2482 {
2483 return NULL;
2484 }
772cf8be 2485# else
c3f6f71d
JM
2486 if (ioctl (pi->ctl_fd, PIOCGFPREG, &pi->fpregset) >= 0)
2487 {
2488 pi->fpregs_valid = 1;
772cf8be 2489 return &pi->fpregset; /* Got 'em now! */
c3f6f71d
JM
2490 }
2491 else
2492 {
2493 return NULL;
2494 }
772cf8be 2495# endif
c906108c 2496 }
c906108c 2497 }
772cf8be 2498#endif /* NEW_PROC_API */
c906108c
SS
2499}
2500
772cf8be
MK
2501/* Write the general-purpose registers back to the process or LWP
2502 corresponding to PI. Return non-zero for success, zero for
2503 failure. */
c3f6f71d
JM
2504
2505int
fba45db2 2506proc_set_gregs (procinfo *pi)
c906108c 2507{
c3f6f71d
JM
2508 gdb_gregset_t *gregs;
2509 int win;
c5aa993b 2510
772cf8be
MK
2511 gregs = proc_get_gregs (pi);
2512 if (gregs == NULL)
2513 return 0; /* proc_get_regs has already warned. */
c3f6f71d 2514
772cf8be 2515 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c906108c 2516 {
c3f6f71d 2517 return 0;
c906108c 2518 }
c3f6f71d 2519 else
c906108c 2520 {
c3f6f71d
JM
2521#ifdef NEW_PROC_API
2522 struct {
37de36c6 2523 procfs_ctl_t cmd;
c3f6f71d
JM
2524 /* Use char array to avoid alignment issues. */
2525 char gregs[sizeof (gdb_gregset_t)];
2526 } arg;
2527
772cf8be 2528 arg.cmd = PCSREG;
c3f6f71d
JM
2529 memcpy (&arg.gregs, gregs, sizeof (arg.gregs));
2530 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
2531#else
2532 win = (ioctl (pi->ctl_fd, PIOCSREG, gregs) >= 0);
2533#endif
c906108c 2534 }
c3f6f71d 2535
772cf8be 2536 /* Policy: writing the registers invalidates our cache. */
c3f6f71d
JM
2537 pi->gregs_valid = 0;
2538 return win;
c906108c
SS
2539}
2540
772cf8be
MK
2541/* Write the floating-pointer registers back to the process or LWP
2542 corresponding to PI. Return non-zero for success, zero for
2543 failure. */
c3f6f71d
JM
2544
2545int
fba45db2 2546proc_set_fpregs (procinfo *pi)
c906108c 2547{
c3f6f71d
JM
2548 gdb_fpregset_t *fpregs;
2549 int win;
2550
772cf8be
MK
2551 fpregs = proc_get_fpregs (pi);
2552 if (fpregs == NULL)
2553 return 0; /* proc_get_fpregs has already warned. */
c5aa993b 2554
772cf8be 2555 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c906108c 2556 {
c3f6f71d 2557 return 0;
c906108c 2558 }
c3f6f71d 2559 else
c906108c 2560 {
c3f6f71d
JM
2561#ifdef NEW_PROC_API
2562 struct {
37de36c6 2563 procfs_ctl_t cmd;
c3f6f71d
JM
2564 /* Use char array to avoid alignment issues. */
2565 char fpregs[sizeof (gdb_fpregset_t)];
2566 } arg;
2567
772cf8be 2568 arg.cmd = PCSFPREG;
c3f6f71d
JM
2569 memcpy (&arg.fpregs, fpregs, sizeof (arg.fpregs));
2570 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
2571#else
772cf8be 2572# ifdef PIOCTSFPREG
c3f6f71d
JM
2573 if (pi->tid == 0)
2574 win = (ioctl (pi->ctl_fd, PIOCSFPREG, fpregs) >= 0);
2575 else
2576 {
2577 struct {
2578 long pr_count;
2579 tid_t pr_error_thread;
2580 tfpregset_t thread_1;
2581 } thread_fpregs;
2582
2583 thread_fpregs.pr_count = 1;
2584 thread_fpregs.thread_1.tid = pi->tid;
2585 memcpy (&thread_fpregs.thread_1.pr_fpregs, fpregs,
2586 sizeof (*fpregs));
2587 win = (ioctl (pi->ctl_fd, PIOCTSFPREG, &thread_fpregs) >= 0);
2588 }
772cf8be 2589# else
c3f6f71d 2590 win = (ioctl (pi->ctl_fd, PIOCSFPREG, fpregs) >= 0);
772cf8be
MK
2591# endif
2592#endif /* NEW_PROC_API */
c906108c 2593 }
c3f6f71d 2594
772cf8be 2595 /* Policy: writing the registers invalidates our cache. */
c3f6f71d
JM
2596 pi->fpregs_valid = 0;
2597 return win;
c906108c
SS
2598}
2599
77382aee
PA
2600/* Send a signal to the proc or lwp with the semantics of "kill()".
2601 Returns non-zero for success, zero for failure. */
c906108c 2602
c3f6f71d 2603int
fba45db2 2604proc_kill (procinfo *pi, int signo)
c3f6f71d
JM
2605{
2606 int win;
c906108c 2607
77382aee
PA
2608 /* We might conceivably apply this operation to an LWP, and the
2609 LWP's ctl file descriptor might not be open. */
c906108c 2610
c3f6f71d
JM
2611 if (pi->ctl_fd == 0 &&
2612 open_procinfo_files (pi, FD_CTL) == 0)
2613 {
2614 return 0;
2615 }
2616 else
2617 {
2618#ifdef NEW_PROC_API
37de36c6 2619 procfs_ctl_t cmd[2];
c906108c 2620
c3f6f71d
JM
2621 cmd[0] = PCKILL;
2622 cmd[1] = signo;
2623 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
2624#else /* ioctl method */
2625 /* FIXME: do I need the Alpha OSF fixups present in
2626 procfs.c/unconditionally_kill_inferior? Perhaps only for SIGKILL? */
2627 win = (ioctl (pi->ctl_fd, PIOCKILL, &signo) >= 0);
2628#endif
2629 }
c906108c 2630
c3f6f71d
JM
2631 return win;
2632}
c906108c 2633
77382aee
PA
2634/* Find the pid of the process that started this one. Returns the
2635 parent process pid, or zero. */
c906108c 2636
c3f6f71d 2637int
fba45db2 2638proc_parent_pid (procinfo *pi)
c906108c 2639{
77382aee
PA
2640 /* We should never have to apply this operation to any procinfo
2641 except the one for the main process. If that ever changes for
2642 any reason, then take out the following clause and replace it
2643 with one that makes sure the ctl_fd is open. */
19958708 2644
c3f6f71d
JM
2645 if (pi->tid != 0)
2646 pi = find_procinfo_or_die (pi->pid, 0);
2647
2648 if (!pi->status_valid)
2649 if (!proc_get_status (pi))
2650 return 0;
c5aa993b 2651
c3f6f71d
JM
2652 return pi->prstatus.pr_ppid;
2653}
2654
9a043c1d
AC
2655/* Convert a target address (a.k.a. CORE_ADDR) into a host address
2656 (a.k.a void pointer)! */
2657
1ca8fce0
JB
2658#if (defined (PCWATCH) || defined (PIOCSWATCH)) \
2659 && !(defined (PIOCOPENLWP) || defined (UNIXWARE))
9a043c1d
AC
2660static void *
2661procfs_address_to_host_pointer (CORE_ADDR addr)
2662{
4e906f53 2663 struct type *ptr_type = builtin_type (target_gdbarch)->builtin_data_ptr;
9a043c1d
AC
2664 void *ptr;
2665
4e906f53 2666 gdb_assert (sizeof (ptr) == TYPE_LENGTH (ptr_type));
0b62613e
PA
2667 gdbarch_address_to_pointer (target_gdbarch, ptr_type,
2668 (gdb_byte *) &ptr, addr);
9a043c1d
AC
2669 return ptr;
2670}
1ca8fce0 2671#endif
9a043c1d 2672
c3f6f71d 2673int
fba45db2 2674proc_set_watchpoint (procinfo *pi, CORE_ADDR addr, int len, int wflags)
c3f6f71d 2675{
d1a7880c
PA
2676#if !defined (PCWATCH) && !defined (PIOCSWATCH)
2677 /* If neither or these is defined, we can't support watchpoints.
2678 This just avoids possibly failing to compile the below on such
2679 systems. */
c3f6f71d
JM
2680 return 0;
2681#else
2682/* Horrible hack! Detect Solaris 2.5, because this doesn't work on 2.5 */
2683#if defined (PIOCOPENLWP) || defined (UNIXWARE) /* Solaris 2.5: bail out */
2684 return 0;
2685#else
2686 struct {
37de36c6 2687 procfs_ctl_t cmd;
c3f6f71d
JM
2688 char watch[sizeof (prwatch_t)];
2689 } arg;
73930d4d 2690 prwatch_t pwatch;
c3f6f71d 2691
9a043c1d
AC
2692 /* NOTE: cagney/2003-02-01: Even more horrible hack. Need to
2693 convert a target address into something that can be stored in a
2694 native data structure. */
831e682e 2695#ifdef PCAGENT /* Horrible hack: only defined on Solaris 2.6+ */
73930d4d 2696 pwatch.pr_vaddr = (uintptr_t) procfs_address_to_host_pointer (addr);
831e682e 2697#else
73930d4d 2698 pwatch.pr_vaddr = (caddr_t) procfs_address_to_host_pointer (addr);
831e682e 2699#endif
73930d4d
KH
2700 pwatch.pr_size = len;
2701 pwatch.pr_wflags = wflags;
c3f6f71d
JM
2702#if defined(NEW_PROC_API) && defined (PCWATCH)
2703 arg.cmd = PCWATCH;
73930d4d 2704 memcpy (arg.watch, &pwatch, sizeof (prwatch_t));
c3f6f71d
JM
2705 return (write (pi->ctl_fd, &arg, sizeof (arg)) == sizeof (arg));
2706#else
2707#if defined (PIOCSWATCH)
73930d4d 2708 return (ioctl (pi->ctl_fd, PIOCSWATCH, &pwatch) >= 0);
c3f6f71d
JM
2709#else
2710 return 0; /* Fail */
2711#endif
2712#endif
2713#endif
2714#endif
c906108c
SS
2715}
2716
965b60ee 2717#if (defined(__i386__) || defined(__x86_64__)) && defined (sun)
c906108c 2718
c3f6f71d 2719#include <sys/sysi86.h>
c906108c 2720
77382aee
PA
2721/* The KEY is actually the value of the lower 16 bits of the GS
2722 register for the LWP that we're interested in. Returns the
2723 matching ssh struct (LDT entry). */
c906108c 2724
c3f6f71d 2725struct ssd *
fba45db2 2726proc_get_LDT_entry (procinfo *pi, int key)
c906108c 2727{
c3f6f71d
JM
2728 static struct ssd *ldt_entry = NULL;
2729#ifdef NEW_PROC_API
2730 char pathname[MAX_PROC_NAME_SIZE];
2731 struct cleanup *old_chain = NULL;
2732 int fd;
2733
2734 /* Allocate space for one LDT entry.
2735 This alloc must persist, because we return a pointer to it. */
2736 if (ldt_entry == NULL)
2737 ldt_entry = (struct ssd *) xmalloc (sizeof (struct ssd));
2738
2739 /* Open the file descriptor for the LDT table. */
2740 sprintf (pathname, "/proc/%d/ldt", pi->pid);
4d1bcd09 2741 if ((fd = open_with_retry (pathname, O_RDONLY)) < 0)
c906108c 2742 {
c3f6f71d
JM
2743 proc_warn (pi, "proc_get_LDT_entry (open)", __LINE__);
2744 return NULL;
c906108c 2745 }
c3f6f71d 2746 /* Make sure it gets closed again! */
004527cb 2747 old_chain = make_cleanup_close (fd);
c906108c 2748
c3f6f71d
JM
2749 /* Now 'read' thru the table, find a match and return it. */
2750 while (read (fd, ldt_entry, sizeof (struct ssd)) == sizeof (struct ssd))
c906108c 2751 {
c3f6f71d
JM
2752 if (ldt_entry->sel == 0 &&
2753 ldt_entry->bo == 0 &&
2754 ldt_entry->acc1 == 0 &&
2755 ldt_entry->acc2 == 0)
2756 break; /* end of table */
2757 /* If key matches, return this entry. */
2758 if (ldt_entry->sel == key)
2759 return ldt_entry;
c906108c 2760 }
c3f6f71d
JM
2761 /* Loop ended, match not found. */
2762 return NULL;
2763#else
2764 int nldt, i;
2765 static int nalloc = 0;
c906108c 2766
c3f6f71d
JM
2767 /* Get the number of LDT entries. */
2768 if (ioctl (pi->ctl_fd, PIOCNLDT, &nldt) < 0)
c906108c 2769 {
c3f6f71d
JM
2770 proc_warn (pi, "proc_get_LDT_entry (PIOCNLDT)", __LINE__);
2771 return NULL;
c906108c
SS
2772 }
2773
c3f6f71d
JM
2774 /* Allocate space for the number of LDT entries. */
2775 /* This alloc has to persist, 'cause we return a pointer to it. */
2776 if (nldt > nalloc)
c906108c 2777 {
19958708 2778 ldt_entry = (struct ssd *)
c3f6f71d
JM
2779 xrealloc (ldt_entry, (nldt + 1) * sizeof (struct ssd));
2780 nalloc = nldt;
2781 }
19958708 2782
c3f6f71d
JM
2783 /* Read the whole table in one gulp. */
2784 if (ioctl (pi->ctl_fd, PIOCLDT, ldt_entry) < 0)
2785 {
2786 proc_warn (pi, "proc_get_LDT_entry (PIOCLDT)", __LINE__);
2787 return NULL;
c906108c
SS
2788 }
2789
c3f6f71d
JM
2790 /* Search the table and return the (first) entry matching 'key'. */
2791 for (i = 0; i < nldt; i++)
2792 if (ldt_entry[i].sel == key)
2793 return &ldt_entry[i];
c906108c 2794
c3f6f71d
JM
2795 /* Loop ended, match not found. */
2796 return NULL;
2797#endif
2798}
c906108c 2799
77382aee 2800/* Returns the pointer to the LDT entry of PTID. */
965b60ee
JB
2801
2802struct ssd *
2803procfs_find_LDT_entry (ptid_t ptid)
2804{
2805 gdb_gregset_t *gregs;
2806 int key;
2807 procinfo *pi;
2808
2809 /* Find procinfo for the lwp. */
2810 if ((pi = find_procinfo (PIDGET (ptid), TIDGET (ptid))) == NULL)
2811 {
0b62613e 2812 warning (_("procfs_find_LDT_entry: could not find procinfo for %d:%ld."),
965b60ee
JB
2813 PIDGET (ptid), TIDGET (ptid));
2814 return NULL;
2815 }
2816 /* get its general registers. */
2817 if ((gregs = proc_get_gregs (pi)) == NULL)
2818 {
0b62613e 2819 warning (_("procfs_find_LDT_entry: could not read gregs for %d:%ld."),
965b60ee
JB
2820 PIDGET (ptid), TIDGET (ptid));
2821 return NULL;
2822 }
2823 /* Now extract the GS register's lower 16 bits. */
2824 key = (*gregs)[GS] & 0xffff;
2825
2826 /* Find the matching entry and return it. */
2827 return proc_get_LDT_entry (pi, key);
2828}
2829
2830#endif
c906108c 2831
c3f6f71d 2832/* =============== END, non-thread part of /proc "MODULE" =============== */
c906108c 2833
c3f6f71d 2834/* =================== Thread "MODULE" =================== */
c906108c 2835
c3f6f71d
JM
2836/* NOTE: you'll see more ifdefs and duplication of functions here,
2837 since there is a different way to do threads on every OS. */
c906108c 2838
77382aee 2839/* Returns the number of threads for the process. */
c906108c 2840
c3f6f71d 2841#if defined (PIOCNTHR) && defined (PIOCTLIST)
77382aee 2842/* OSF version */
19958708 2843int
fba45db2 2844proc_get_nthreads (procinfo *pi)
c3f6f71d
JM
2845{
2846 int nthreads = 0;
c906108c 2847
c3f6f71d
JM
2848 if (ioctl (pi->ctl_fd, PIOCNTHR, &nthreads) < 0)
2849 proc_warn (pi, "procfs: PIOCNTHR failed", __LINE__);
c906108c 2850
c3f6f71d 2851 return nthreads;
c906108c
SS
2852}
2853
c3f6f71d
JM
2854#else
2855#if defined (SYS_lwpcreate) || defined (SYS_lwp_create) /* FIXME: multiple */
77382aee 2856/* Solaris and Unixware version */
c3f6f71d 2857int
fba45db2 2858proc_get_nthreads (procinfo *pi)
c906108c 2859{
c3f6f71d
JM
2860 if (!pi->status_valid)
2861 if (!proc_get_status (pi))
2862 return 0;
c5aa993b 2863
77382aee
PA
2864 /* NEW_PROC_API: only works for the process procinfo, because the
2865 LWP procinfos do not get prstatus filled in. */
19958708 2866#ifdef NEW_PROC_API
c3f6f71d
JM
2867 if (pi->tid != 0) /* find the parent process procinfo */
2868 pi = find_procinfo_or_die (pi->pid, 0);
c5aa993b 2869#endif
c3f6f71d 2870 return pi->prstatus.pr_nlwp;
c906108c
SS
2871}
2872
c3f6f71d 2873#else
77382aee 2874/* Default version */
c3f6f71d 2875int
fba45db2 2876proc_get_nthreads (procinfo *pi)
c906108c 2877{
c3f6f71d
JM
2878 return 0;
2879}
2880#endif
2881#endif
2882
77382aee
PA
2883/* LWP version.
2884
2885 Return the ID of the thread that had an event of interest.
2886 (ie. the one that hit a breakpoint or other traced event). All
2887 other things being equal, this should be the ID of a thread that is
2888 currently executing. */
c3f6f71d
JM
2889
2890#if defined (SYS_lwpcreate) || defined (SYS_lwp_create) /* FIXME: multiple */
77382aee 2891/* Solaris and Unixware version */
c3f6f71d 2892int
fba45db2 2893proc_get_current_thread (procinfo *pi)
c3f6f71d 2894{
77382aee
PA
2895 /* Note: this should be applied to the root procinfo for the
2896 process, not to the procinfo for an LWP. If applied to the
2897 procinfo for an LWP, it will simply return that LWP's ID. In
2898 that case, find the parent process procinfo. */
19958708 2899
c3f6f71d
JM
2900 if (pi->tid != 0)
2901 pi = find_procinfo_or_die (pi->pid, 0);
2902
2903 if (!pi->status_valid)
2904 if (!proc_get_status (pi))
2905 return 0;
2906
2907#ifdef NEW_PROC_API
2908 return pi->prstatus.pr_lwp.pr_lwpid;
c906108c 2909#else
c3f6f71d 2910 return pi->prstatus.pr_who;
c906108c 2911#endif
c3f6f71d 2912}
c906108c 2913
c3f6f71d
JM
2914#else
2915#if defined (PIOCNTHR) && defined (PIOCTLIST)
77382aee 2916/* OSF version */
19958708 2917int
fba45db2 2918proc_get_current_thread (procinfo *pi)
c3f6f71d
JM
2919{
2920#if 0 /* FIXME: not ready for prime time? */
2921 return pi->prstatus.pr_tid;
2922#else
2923 return 0;
2924#endif
c906108c
SS
2925}
2926
c3f6f71d 2927#else
77382aee 2928/* Default version */
19958708 2929int
fba45db2 2930proc_get_current_thread (procinfo *pi)
c906108c 2931{
c3f6f71d
JM
2932 return 0;
2933}
2934
2935#endif
2936#endif
c906108c 2937
77382aee
PA
2938/* Discover the IDs of all the threads within the process, and create
2939 a procinfo for each of them (chained to the parent). This
2940 unfortunately requires a different method on every OS. Returns
2941 non-zero for success, zero for failure. */
c906108c 2942
c3f6f71d 2943int
fba45db2 2944proc_delete_dead_threads (procinfo *parent, procinfo *thread, void *ignore)
c3f6f71d
JM
2945{
2946 if (thread && parent) /* sanity */
c906108c 2947 {
c3f6f71d
JM
2948 thread->status_valid = 0;
2949 if (!proc_get_status (thread))
2950 destroy_one_procinfo (&parent->thread_list, thread);
2951 }
2952 return 0; /* keep iterating */
2953}
c5aa993b 2954
c3f6f71d 2955#if defined (PIOCLSTATUS)
77382aee 2956/* Solaris 2.5 (ioctl) version */
c3f6f71d 2957int
fba45db2 2958proc_update_threads (procinfo *pi)
c3f6f71d
JM
2959{
2960 gdb_prstatus_t *prstatus;
2961 struct cleanup *old_chain = NULL;
2962 procinfo *thread;
2963 int nlwp, i;
2964
77382aee
PA
2965 /* We should never have to apply this operation to any procinfo
2966 except the one for the main process. If that ever changes for
2967 any reason, then take out the following clause and replace it
2968 with one that makes sure the ctl_fd is open. */
19958708 2969
c3f6f71d
JM
2970 if (pi->tid != 0)
2971 pi = find_procinfo_or_die (pi->pid, 0);
2972
2973 proc_iterate_over_threads (pi, proc_delete_dead_threads, NULL);
2974
2975 if ((nlwp = proc_get_nthreads (pi)) <= 1)
2976 return 1; /* Process is not multi-threaded; nothing to do. */
2977
3c37485b 2978 prstatus = xmalloc (sizeof (gdb_prstatus_t) * (nlwp + 1));
c3f6f71d 2979
b8c9b27d 2980 old_chain = make_cleanup (xfree, prstatus);
c3f6f71d
JM
2981 if (ioctl (pi->ctl_fd, PIOCLSTATUS, prstatus) < 0)
2982 proc_error (pi, "update_threads (PIOCLSTATUS)", __LINE__);
2983
77382aee 2984 /* Skip element zero, which represents the process as a whole. */
c3f6f71d
JM
2985 for (i = 1; i < nlwp + 1; i++)
2986 {
2987 if ((thread = create_procinfo (pi->pid, prstatus[i].pr_who)) == NULL)
2988 proc_error (pi, "update_threads, create_procinfo", __LINE__);
c5aa993b 2989
c3f6f71d
JM
2990 memcpy (&thread->prstatus, &prstatus[i], sizeof (*prstatus));
2991 thread->status_valid = 1;
2992 }
2993 pi->threads_valid = 1;
2994 do_cleanups (old_chain);
2995 return 1;
2996}
2997#else
2998#ifdef NEW_PROC_API
77382aee 2999/* Unixware and Solaris 6 (and later) version */
004527cb
AC
3000static void
3001do_closedir_cleanup (void *dir)
3002{
3003 closedir (dir);
3004}
3005
c3f6f71d 3006int
fba45db2 3007proc_update_threads (procinfo *pi)
c3f6f71d
JM
3008{
3009 char pathname[MAX_PROC_NAME_SIZE + 16];
3010 struct dirent *direntry;
3011 struct cleanup *old_chain = NULL;
3012 procinfo *thread;
3013 DIR *dirp;
3014 int lwpid;
3015
77382aee
PA
3016 /* We should never have to apply this operation to any procinfo
3017 except the one for the main process. If that ever changes for
3018 any reason, then take out the following clause and replace it
3019 with one that makes sure the ctl_fd is open. */
19958708 3020
c3f6f71d
JM
3021 if (pi->tid != 0)
3022 pi = find_procinfo_or_die (pi->pid, 0);
3023
3024 proc_iterate_over_threads (pi, proc_delete_dead_threads, NULL);
3025
77382aee
PA
3026 /* Unixware
3027
3028 Note: this brute-force method is the only way I know of to
3029 accomplish this task on Unixware. This method will also work on
3030 Solaris 2.6 and 2.7. There is a much simpler and more elegant
3031 way to do this on Solaris, but the margins of this manuscript are
3032 too small to write it here... ;-) */
c3f6f71d
JM
3033
3034 strcpy (pathname, pi->pathname);
3035 strcat (pathname, "/lwp");
3036 if ((dirp = opendir (pathname)) == NULL)
3037 proc_error (pi, "update_threads, opendir", __LINE__);
3038
004527cb 3039 old_chain = make_cleanup (do_closedir_cleanup, dirp);
c3f6f71d
JM
3040 while ((direntry = readdir (dirp)) != NULL)
3041 if (direntry->d_name[0] != '.') /* skip '.' and '..' */
3042 {
3043 lwpid = atoi (&direntry->d_name[0]);
3044 if ((thread = create_procinfo (pi->pid, lwpid)) == NULL)
3045 proc_error (pi, "update_threads, create_procinfo", __LINE__);
3046 }
3047 pi->threads_valid = 1;
3048 do_cleanups (old_chain);
3049 return 1;
3050}
3051#else
3052#ifdef PIOCTLIST
77382aee 3053/* OSF version */
19958708 3054int
fba45db2 3055proc_update_threads (procinfo *pi)
c3f6f71d
JM
3056{
3057 int nthreads, i;
3058 tid_t *threads;
3059
77382aee
PA
3060 /* We should never have to apply this operation to any procinfo
3061 except the one for the main process. If that ever changes for
3062 any reason, then take out the following clause and replace it
3063 with one that makes sure the ctl_fd is open. */
19958708 3064
c3f6f71d
JM
3065 if (pi->tid != 0)
3066 pi = find_procinfo_or_die (pi->pid, 0);
3067
3068 proc_iterate_over_threads (pi, proc_delete_dead_threads, NULL);
3069
3070 nthreads = proc_get_nthreads (pi);
3071 if (nthreads < 2)
3072 return 0; /* nothing to do for 1 or fewer threads */
3073
3c37485b 3074 threads = xmalloc (nthreads * sizeof (tid_t));
19958708 3075
c3f6f71d
JM
3076 if (ioctl (pi->ctl_fd, PIOCTLIST, threads) < 0)
3077 proc_error (pi, "procfs: update_threads (PIOCTLIST)", __LINE__);
3078
3079 for (i = 0; i < nthreads; i++)
3080 {
3081 if (!find_procinfo (pi->pid, threads[i]))
3082 if (!create_procinfo (pi->pid, threads[i]))
3083 proc_error (pi, "update_threads, create_procinfo", __LINE__);
c906108c 3084 }
c3f6f71d
JM
3085 pi->threads_valid = 1;
3086 return 1;
c906108c 3087}
c3f6f71d 3088#else
77382aee 3089/* Default version */
c3f6f71d 3090int
fba45db2 3091proc_update_threads (procinfo *pi)
c3f6f71d
JM
3092{
3093 return 0;
3094}
3095#endif /* OSF PIOCTLIST */
3096#endif /* NEW_PROC_API */
3097#endif /* SOL 2.5 PIOCLSTATUS */
c906108c 3098
77382aee
PA
3099/* Given a pointer to a function, call that function once for each lwp
3100 in the procinfo list, until the function returns non-zero, in which
3101 event return the value returned by the function.
3102
3103 Note: this function does NOT call update_threads. If you want to
3104 discover new threads first, you must call that function explicitly.
3105 This function just makes a quick pass over the currently-known
3106 procinfos.
3107
3108 PI is the parent process procinfo. FUNC is the per-thread
3109 function. PTR is an opaque parameter for function. Returns the
3110 first non-zero return value from the callee, or zero. */
c3f6f71d
JM
3111
3112int
d0849a9a
KB
3113proc_iterate_over_threads (procinfo *pi,
3114 int (*func) (procinfo *, procinfo *, void *),
3115 void *ptr)
c906108c 3116{
c3f6f71d
JM
3117 procinfo *thread, *next;
3118 int retval = 0;
c906108c 3119
77382aee
PA
3120 /* We should never have to apply this operation to any procinfo
3121 except the one for the main process. If that ever changes for
3122 any reason, then take out the following clause and replace it
3123 with one that makes sure the ctl_fd is open. */
19958708 3124
c3f6f71d
JM
3125 if (pi->tid != 0)
3126 pi = find_procinfo_or_die (pi->pid, 0);
3127
3128 for (thread = pi->thread_list; thread != NULL; thread = next)
c906108c 3129 {
c3f6f71d
JM
3130 next = thread->next; /* in case thread is destroyed */
3131 if ((retval = (*func) (pi, thread, ptr)) != 0)
3132 break;
c906108c 3133 }
c3f6f71d
JM
3134
3135 return retval;
c906108c
SS
3136}
3137
c3f6f71d
JM
3138/* =================== END, Thread "MODULE" =================== */
3139
3140/* =================== END, /proc "MODULE" =================== */
3141
3142/* =================== GDB "MODULE" =================== */
3143
77382aee
PA
3144/* Here are all of the gdb target vector functions and their
3145 friends. */
c3f6f71d 3146
39f77062 3147static ptid_t do_attach (ptid_t ptid);
a14ed312 3148static void do_detach (int signo);
37de36c6 3149static int register_gdb_signals (procinfo *, gdb_sigset_t *);
9185ddce 3150static void proc_trace_syscalls_1 (procinfo *pi, int syscallnum,
77382aee 3151 int entry_or_exit, int mode, int from_tty);
9185ddce
JB
3152
3153/* On mips-irix, we need to insert a breakpoint at __dbx_link during
3154 the startup phase. The following two variables are used to record
3155 the address of the breakpoint, and the code that was replaced by
3156 a breakpoint. */
3157static int dbx_link_bpt_addr = 0;
8181d85f 3158static void *dbx_link_bpt;
c3f6f71d 3159
77382aee
PA
3160/* Sets up the inferior to be debugged. Registers to trace signals,
3161 hardware faults, and syscalls. Note: does not set RLC flag: caller
3162 may want to customize that. Returns zero for success (note!
3163 unlike most functions in this module); on failure, returns the LINE
3164 NUMBER where it failed! */
c3f6f71d
JM
3165
3166static int
fba45db2 3167procfs_debug_inferior (procinfo *pi)
c906108c 3168{
c3f6f71d 3169 fltset_t traced_faults;
37de36c6
KB
3170 gdb_sigset_t traced_signals;
3171 sysset_t *traced_syscall_entries;
3172 sysset_t *traced_syscall_exits;
3173 int status;
c906108c 3174
c3f6f71d
JM
3175#ifdef PROCFS_DONT_TRACE_FAULTS
3176 /* On some systems (OSF), we don't trace hardware faults.
3177 Apparently it's enough that we catch them as signals.
3178 Wonder why we don't just do that in general? */
3179 premptyset (&traced_faults); /* don't trace faults. */
3180#else
3181 /* Register to trace hardware faults in the child. */
3182 prfillset (&traced_faults); /* trace all faults... */
3c95f01c 3183 gdb_prdelset (&traced_faults, FLTPAGE); /* except page fault. */
c3f6f71d
JM
3184#endif
3185 if (!proc_set_traced_faults (pi, &traced_faults))
3186 return __LINE__;
c906108c 3187
c3f6f71d
JM
3188 /* Register to trace selected signals in the child. */
3189 premptyset (&traced_signals);
3190 if (!register_gdb_signals (pi, &traced_signals))
3191 return __LINE__;
3192
37de36c6 3193
c3f6f71d 3194 /* Register to trace the 'exit' system call (on entry). */
37de36c6
KB
3195 traced_syscall_entries = sysset_t_alloc (pi);
3196 gdb_premptysysset (traced_syscall_entries);
3197#ifdef SYS_exit
3198 gdb_praddsysset (traced_syscall_entries, SYS_exit);
3199#endif
c3f6f71d 3200#ifdef SYS_lwpexit
37de36c6 3201 gdb_praddsysset (traced_syscall_entries, SYS_lwpexit); /* And _lwp_exit... */
c3f6f71d
JM
3202#endif
3203#ifdef SYS_lwp_exit
37de36c6
KB
3204 gdb_praddsysset (traced_syscall_entries, SYS_lwp_exit);
3205#endif
3206#ifdef DYNAMIC_SYSCALLS
3207 {
3208 int callnum = find_syscall (pi, "_exit");
f4a14ae6 3209
37de36c6
KB
3210 if (callnum >= 0)
3211 gdb_praddsysset (traced_syscall_entries, callnum);
3212 }
c906108c
SS
3213#endif
3214
37de36c6
KB
3215 status = proc_set_traced_sysentry (pi, traced_syscall_entries);
3216 xfree (traced_syscall_entries);
3217 if (!status)
c3f6f71d
JM
3218 return __LINE__;
3219
3220#ifdef PRFS_STOPEXEC /* defined on OSF */
3221 /* OSF method for tracing exec syscalls. Quoting:
3222 Under Alpha OSF/1 we have to use a PIOCSSPCACT ioctl to trace
3223 exits from exec system calls because of the user level loader. */
3224 /* FIXME: make nice and maybe move into an access function. */
3225 {
3226 int prfs_flags;
3227
3228 if (ioctl (pi->ctl_fd, PIOCGSPCACT, &prfs_flags) < 0)
3229 return __LINE__;
3230
3231 prfs_flags |= PRFS_STOPEXEC;
3232
3233 if (ioctl (pi->ctl_fd, PIOCSSPCACT, &prfs_flags) < 0)
3234 return __LINE__;
3235 }
3236#else /* not PRFS_STOPEXEC */
3237 /* Everyone else's (except OSF) method for tracing exec syscalls */
3238 /* GW: Rationale...
3239 Not all systems with /proc have all the exec* syscalls with the same
3240 names. On the SGI, for example, there is no SYS_exec, but there
3241 *is* a SYS_execv. So, we try to account for that. */
3242
37de36c6
KB
3243 traced_syscall_exits = sysset_t_alloc (pi);
3244 gdb_premptysysset (traced_syscall_exits);
c3f6f71d 3245#ifdef SYS_exec
37de36c6 3246 gdb_praddsysset (traced_syscall_exits, SYS_exec);
c3f6f71d
JM
3247#endif
3248#ifdef SYS_execve
37de36c6 3249 gdb_praddsysset (traced_syscall_exits, SYS_execve);
c3f6f71d
JM
3250#endif
3251#ifdef SYS_execv
37de36c6 3252 gdb_praddsysset (traced_syscall_exits, SYS_execv);
c3f6f71d 3253#endif
c5aa993b 3254
c3f6f71d 3255#ifdef SYS_lwpcreate
37de36c6
KB
3256 gdb_praddsysset (traced_syscall_exits, SYS_lwpcreate);
3257 gdb_praddsysset (traced_syscall_exits, SYS_lwpexit);
c906108c 3258#endif
c5aa993b 3259
c3f6f71d 3260#ifdef SYS_lwp_create /* FIXME: once only, please */
37de36c6
KB
3261 gdb_praddsysset (traced_syscall_exits, SYS_lwp_create);
3262 gdb_praddsysset (traced_syscall_exits, SYS_lwp_exit);
c3f6f71d 3263#endif
c5aa993b 3264
37de36c6
KB
3265#ifdef DYNAMIC_SYSCALLS
3266 {
3267 int callnum = find_syscall (pi, "execve");
f4a14ae6 3268
37de36c6
KB
3269 if (callnum >= 0)
3270 gdb_praddsysset (traced_syscall_exits, callnum);
3271 callnum = find_syscall (pi, "ra_execve");
3272 if (callnum >= 0)
3273 gdb_praddsysset (traced_syscall_exits, callnum);
3274 }
3275#endif
c906108c 3276
37de36c6
KB
3277 status = proc_set_traced_sysexit (pi, traced_syscall_exits);
3278 xfree (traced_syscall_exits);
3279 if (!status)
c3f6f71d
JM
3280 return __LINE__;
3281
3282#endif /* PRFS_STOPEXEC */
3283 return 0;
c906108c
SS
3284}
3285
19958708 3286static void
136d6dae 3287procfs_attach (struct target_ops *ops, char *args, int from_tty)
c906108c 3288{
c3f6f71d
JM
3289 char *exec_file;
3290 int pid;
3291
74164c56 3292 pid = parse_pid_to_attach (args);
c3f6f71d 3293
c3f6f71d 3294 if (pid == getpid ())
8a3fe4f8 3295 error (_("Attaching GDB to itself is not a good idea..."));
c906108c 3296
c3f6f71d 3297 if (from_tty)
c906108c 3298 {
c3f6f71d
JM
3299 exec_file = get_exec_file (0);
3300
3301 if (exec_file)
a3f17187 3302 printf_filtered (_("Attaching to program `%s', %s\n"),
39f77062 3303 exec_file, target_pid_to_str (pid_to_ptid (pid)));
c3f6f71d 3304 else
a3f17187 3305 printf_filtered (_("Attaching to %s\n"),
77382aee 3306 target_pid_to_str (pid_to_ptid (pid)));
c3f6f71d
JM
3307
3308 fflush (stdout);
c906108c 3309 }
39f77062 3310 inferior_ptid = do_attach (pid_to_ptid (pid));
28439f5e 3311 push_target (ops);
c3f6f71d
JM
3312}
3313
19958708 3314static void
136d6dae 3315procfs_detach (struct target_ops *ops, char *args, int from_tty)
c3f6f71d 3316{
cc377e6b 3317 int sig = 0;
7f9f62ba 3318 int pid = PIDGET (inferior_ptid);
cc377e6b
MK
3319
3320 if (args)
3321 sig = atoi (args);
c3f6f71d
JM
3322
3323 if (from_tty)
c906108c 3324 {
cc377e6b
MK
3325 char *exec_file;
3326
c3f6f71d 3327 exec_file = get_exec_file (0);
cc377e6b 3328 if (exec_file == NULL)
c3f6f71d 3329 exec_file = "";
cc377e6b 3330
a3f17187 3331 printf_filtered (_("Detaching from program: %s, %s\n"), exec_file,
cc377e6b
MK
3332 target_pid_to_str (pid_to_ptid (pid)));
3333 gdb_flush (gdb_stdout);
c906108c 3334 }
19958708 3335
cc377e6b
MK
3336 do_detach (sig);
3337
39f77062 3338 inferior_ptid = null_ptid;
7f9f62ba 3339 detach_inferior (pid);
28439f5e 3340 unpush_target (ops);
c906108c
SS
3341}
3342
39f77062
KB
3343static ptid_t
3344do_attach (ptid_t ptid)
c906108c 3345{
c3f6f71d 3346 procinfo *pi;
181e7f93 3347 struct inferior *inf;
c3f6f71d 3348 int fail;
2689673f 3349 int lwpid;
c3f6f71d 3350
39f77062 3351 if ((pi = create_procinfo (PIDGET (ptid), 0)) == NULL)
8a3fe4f8 3352 perror (_("procfs: out of memory in 'attach'"));
c3f6f71d
JM
3353
3354 if (!open_procinfo_files (pi, FD_CTL))
3355 {
3356 fprintf_filtered (gdb_stderr, "procfs:%d -- ", __LINE__);
19958708 3357 sprintf (errmsg, "do_attach: couldn't open /proc file for process %d",
39f77062 3358 PIDGET (ptid));
c3f6f71d
JM
3359 dead_procinfo (pi, errmsg, NOKILL);
3360 }
c906108c 3361
c3f6f71d
JM
3362 /* Stop the process (if it isn't already stopped). */
3363 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
c906108c 3364 {
c3f6f71d
JM
3365 pi->was_stopped = 1;
3366 proc_prettyprint_why (proc_why (pi), proc_what (pi), 1);
c906108c
SS
3367 }
3368 else
3369 {
c3f6f71d
JM
3370 pi->was_stopped = 0;
3371 /* Set the process to run again when we close it. */
3372 if (!proc_set_run_on_last_close (pi))
3373 dead_procinfo (pi, "do_attach: couldn't set RLC.", NOKILL);
3374
3375 /* Now stop the process. */
3376 if (!proc_stop_process (pi))
3377 dead_procinfo (pi, "do_attach: couldn't stop the process.", NOKILL);
3378 pi->ignore_next_sigstop = 1;
c906108c 3379 }
c3f6f71d
JM
3380 /* Save some of the /proc state to be restored if we detach. */
3381 if (!proc_get_traced_faults (pi, &pi->saved_fltset))
3382 dead_procinfo (pi, "do_attach: couldn't save traced faults.", NOKILL);
3383 if (!proc_get_traced_signals (pi, &pi->saved_sigset))
3384 dead_procinfo (pi, "do_attach: couldn't save traced signals.", NOKILL);
37de36c6 3385 if (!proc_get_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d
JM
3386 dead_procinfo (pi, "do_attach: couldn't save traced syscall entries.",
3387 NOKILL);
37de36c6 3388 if (!proc_get_traced_sysexit (pi, pi->saved_exitset))
19958708 3389 dead_procinfo (pi, "do_attach: couldn't save traced syscall exits.",
c3f6f71d
JM
3390 NOKILL);
3391 if (!proc_get_held_signals (pi, &pi->saved_sighold))
3392 dead_procinfo (pi, "do_attach: couldn't save held signals.", NOKILL);
3393
3394 if ((fail = procfs_debug_inferior (pi)) != 0)
3395 dead_procinfo (pi, "do_attach: failed in procfs_debug_inferior", NOKILL);
3396
6c95b8df
PA
3397 inf = current_inferior ();
3398 inferior_appeared (inf, pi->pid);
c3f6f71d 3399 /* Let GDB know that the inferior was attached. */
181e7f93 3400 inf->attach_flag = 1;
2689673f
PA
3401
3402 /* Create a procinfo for the current lwp. */
3403 lwpid = proc_get_current_thread (pi);
3404 create_procinfo (pi->pid, lwpid);
3405
3406 /* Add it to gdb's thread list. */
3407 ptid = MERGEPID (pi->pid, lwpid);
3408 add_thread (ptid);
3409
3410 return ptid;
c906108c
SS
3411}
3412
3413static void
fba45db2 3414do_detach (int signo)
c906108c 3415{
c3f6f71d 3416 procinfo *pi;
c906108c 3417
c3f6f71d 3418 /* Find procinfo for the main process */
39f77062 3419 pi = find_procinfo_or_die (PIDGET (inferior_ptid), 0); /* FIXME: threads */
c3f6f71d
JM
3420 if (signo)
3421 if (!proc_set_current_signal (pi, signo))
3422 proc_warn (pi, "do_detach, set_current_signal", __LINE__);
c5aa993b 3423
c3f6f71d
JM
3424 if (!proc_set_traced_signals (pi, &pi->saved_sigset))
3425 proc_warn (pi, "do_detach, set_traced_signal", __LINE__);
c906108c 3426
c3f6f71d
JM
3427 if (!proc_set_traced_faults (pi, &pi->saved_fltset))
3428 proc_warn (pi, "do_detach, set_traced_faults", __LINE__);
3429
37de36c6 3430 if (!proc_set_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d
JM
3431 proc_warn (pi, "do_detach, set_traced_sysentry", __LINE__);
3432
37de36c6 3433 if (!proc_set_traced_sysexit (pi, pi->saved_exitset))
c3f6f71d
JM
3434 proc_warn (pi, "do_detach, set_traced_sysexit", __LINE__);
3435
3436 if (!proc_set_held_signals (pi, &pi->saved_sighold))
3437 proc_warn (pi, "do_detach, set_held_signals", __LINE__);
3438
3439 if (signo || (proc_flags (pi) & (PR_STOPPED | PR_ISTOP)))
3440 if (signo || !(pi->was_stopped) ||
e2e0b3e5 3441 query (_("Was stopped when attached, make it runnable again? ")))
c3f6f71d
JM
3442 {
3443 /* Clear any pending signal. */
3444 if (!proc_clear_current_fault (pi))
3445 proc_warn (pi, "do_detach, clear_current_fault", __LINE__);
3446
1a303dec
MS
3447 if (signo == 0 && !proc_clear_current_signal (pi))
3448 proc_warn (pi, "do_detach, clear_current_signal", __LINE__);
3449
c3f6f71d
JM
3450 if (!proc_set_run_on_last_close (pi))
3451 proc_warn (pi, "do_detach, set_rlc", __LINE__);
3452 }
3453
c3f6f71d 3454 destroy_procinfo (pi);
c906108c
SS
3455}
3456
772cf8be
MK
3457/* Fetch register REGNUM from the inferior. If REGNUM is -1, do this
3458 for all registers.
3459
3460 ??? Is the following note still relevant? We can't get individual
3461 registers with the PT_GETREGS ptrace(2) request either, yet we
3462 don't bother with caching at all in that case.
3463
3464 NOTE: Since the /proc interface cannot give us individual
3465 registers, we pay no attention to REGNUM, and just fetch them all.
3466 This results in the possibility that we will do unnecessarily many
3467 fetches, since we may be called repeatedly for individual
3468 registers. So we cache the results, and mark the cache invalid
3469 when the process is resumed. */
c3f6f71d 3470
c906108c 3471static void
28439f5e
PA
3472procfs_fetch_registers (struct target_ops *ops,
3473 struct regcache *regcache, int regnum)
c906108c 3474{
772cf8be
MK
3475 gdb_gregset_t *gregs;
3476 procinfo *pi;
3477 int pid = PIDGET (inferior_ptid);
3478 int tid = TIDGET (inferior_ptid);
40a6adc1 3479 struct gdbarch *gdbarch = get_regcache_arch (regcache);
c3f6f71d 3480
2689673f 3481 pi = find_procinfo_or_die (pid, tid);
c3f6f71d
JM
3482
3483 if (pi == NULL)
8a3fe4f8 3484 error (_("procfs: fetch_registers failed to find procinfo for %s"),
39f77062 3485 target_pid_to_str (inferior_ptid));
c3f6f71d 3486
772cf8be
MK
3487 gregs = proc_get_gregs (pi);
3488 if (gregs == NULL)
c3f6f71d
JM
3489 proc_error (pi, "fetch_registers, get_gregs", __LINE__);
3490
56be3814 3491 supply_gregset (regcache, (const gdb_gregset_t *) gregs);
c3f6f71d 3492
40a6adc1 3493 if (gdbarch_fp0_regnum (gdbarch) >= 0) /* Do we have an FPU? */
60054393 3494 {
772cf8be
MK
3495 gdb_fpregset_t *fpregs;
3496
40a6adc1
MD
3497 if ((regnum >= 0 && regnum < gdbarch_fp0_regnum (gdbarch))
3498 || regnum == gdbarch_pc_regnum (gdbarch)
3499 || regnum == gdbarch_sp_regnum (gdbarch))
772cf8be 3500 return; /* Not a floating point register. */
c5aa993b 3501
772cf8be
MK
3502 fpregs = proc_get_fpregs (pi);
3503 if (fpregs == NULL)
60054393 3504 proc_error (pi, "fetch_registers, get_fpregs", __LINE__);
c906108c 3505
56be3814 3506 supply_fpregset (regcache, (const gdb_fpregset_t *) fpregs);
60054393 3507 }
c906108c
SS
3508}
3509
772cf8be
MK
3510/* Store register REGNUM back into the inferior. If REGNUM is -1, do
3511 this for all registers.
3512
3513 NOTE: Since the /proc interface will not read individual registers,
3514 we will cache these requests until the process is resumed, and only
3515 then write them back to the inferior process.
77382aee 3516
772cf8be
MK
3517 FIXME: is that a really bad idea? Have to think about cases where
3518 writing one register might affect the value of others, etc. */
c906108c 3519
c3f6f71d 3520static void
28439f5e
PA
3521procfs_store_registers (struct target_ops *ops,
3522 struct regcache *regcache, int regnum)
c3f6f71d 3523{
772cf8be
MK
3524 gdb_gregset_t *gregs;
3525 procinfo *pi;
3526 int pid = PIDGET (inferior_ptid);
3527 int tid = TIDGET (inferior_ptid);
40a6adc1 3528 struct gdbarch *gdbarch = get_regcache_arch (regcache);
c3f6f71d 3529
2689673f 3530 pi = find_procinfo_or_die (pid, tid);
c3f6f71d
JM
3531
3532 if (pi == NULL)
8a3fe4f8 3533 error (_("procfs: store_registers: failed to find procinfo for %s"),
39f77062 3534 target_pid_to_str (inferior_ptid));
c906108c 3535
772cf8be
MK
3536 gregs = proc_get_gregs (pi);
3537 if (gregs == NULL)
c3f6f71d 3538 proc_error (pi, "store_registers, get_gregs", __LINE__);
c906108c 3539
56be3814 3540 fill_gregset (regcache, gregs, regnum);
c3f6f71d
JM
3541 if (!proc_set_gregs (pi))
3542 proc_error (pi, "store_registers, set_gregs", __LINE__);
c906108c 3543
40a6adc1 3544 if (gdbarch_fp0_regnum (gdbarch) >= 0) /* Do we have an FPU? */
60054393 3545 {
772cf8be
MK
3546 gdb_fpregset_t *fpregs;
3547
40a6adc1
MD
3548 if ((regnum >= 0 && regnum < gdbarch_fp0_regnum (gdbarch))
3549 || regnum == gdbarch_pc_regnum (gdbarch)
3550 || regnum == gdbarch_sp_regnum (gdbarch))
772cf8be 3551 return; /* Not a floating point register. */
60054393 3552
772cf8be
MK
3553 fpregs = proc_get_fpregs (pi);
3554 if (fpregs == NULL)
60054393
MS
3555 proc_error (pi, "store_registers, get_fpregs", __LINE__);
3556
56be3814 3557 fill_fpregset (regcache, fpregs, regnum);
60054393
MS
3558 if (!proc_set_fpregs (pi))
3559 proc_error (pi, "store_registers, set_fpregs", __LINE__);
3560 }
c3f6f71d 3561}
c906108c 3562
37de36c6
KB
3563static int
3564syscall_is_lwp_exit (procinfo *pi, int scall)
3565{
37de36c6
KB
3566#ifdef SYS_lwp_exit
3567 if (scall == SYS_lwp_exit)
3568 return 1;
3569#endif
3570#ifdef SYS_lwpexit
3571 if (scall == SYS_lwpexit)
3572 return 1;
3573#endif
3574 return 0;
3575}
3576
3577static int
3578syscall_is_exit (procinfo *pi, int scall)
3579{
3580#ifdef SYS_exit
3581 if (scall == SYS_exit)
3582 return 1;
3583#endif
3584#ifdef DYNAMIC_SYSCALLS
3585 if (find_syscall (pi, "_exit") == scall)
3586 return 1;
3587#endif
3588 return 0;
3589}
3590
3591static int
3592syscall_is_exec (procinfo *pi, int scall)
3593{
3594#ifdef SYS_exec
3595 if (scall == SYS_exec)
3596 return 1;
3597#endif
3598#ifdef SYS_execv
3599 if (scall == SYS_execv)
3600 return 1;
3601#endif
3602#ifdef SYS_execve
3603 if (scall == SYS_execve)
3604 return 1;
3605#endif
3606#ifdef DYNAMIC_SYSCALLS
3607 if (find_syscall (pi, "_execve"))
3608 return 1;
3609 if (find_syscall (pi, "ra_execve"))
3610 return 1;
3611#endif
3612 return 0;
3613}
3614
3615static int
3616syscall_is_lwp_create (procinfo *pi, int scall)
3617{
3618#ifdef SYS_lwp_create
3619 if (scall == SYS_lwp_create)
3620 return 1;
3621#endif
3622#ifdef SYS_lwpcreate
3623 if (scall == SYS_lwpcreate)
3624 return 1;
3625#endif
3626 return 0;
3627}
3628
7434dadd
JB
3629/* Remove the breakpoint that we inserted in __dbx_link().
3630 Does nothing if the breakpoint hasn't been inserted or has already
3631 been removed. */
3632
3633static void
3634remove_dbx_link_breakpoint (void)
3635{
3636 if (dbx_link_bpt_addr == 0)
3637 return;
3638
3639 if (deprecated_remove_raw_breakpoint (target_gdbarch, dbx_link_bpt) != 0)
3640 warning (_("Unable to remove __dbx_link breakpoint."));
3641
3642 dbx_link_bpt_addr = 0;
3643 dbx_link_bpt = NULL;
3644}
3645
3646#ifdef SYS_syssgi
3647/* Return the address of the __dbx_link() function in the file
3648 refernced by ABFD by scanning its symbol table. Return 0 if
3649 the symbol was not found. */
3650
3651static CORE_ADDR
3652dbx_link_addr (bfd *abfd)
3653{
3654 long storage_needed;
3655 asymbol **symbol_table;
3656 long number_of_symbols;
3657 long i;
3658
3659 storage_needed = bfd_get_symtab_upper_bound (abfd);
3660 if (storage_needed <= 0)
3661 return 0;
3662
3663 symbol_table = (asymbol **) xmalloc (storage_needed);
3664 make_cleanup (xfree, symbol_table);
3665
3666 number_of_symbols = bfd_canonicalize_symtab (abfd, symbol_table);
3667
3668 for (i = 0; i < number_of_symbols; i++)
3669 {
3670 asymbol *sym = symbol_table[i];
3671
3672 if ((sym->flags & BSF_GLOBAL)
77382aee
PA
3673 && sym->name != NULL && strcmp (sym->name, "__dbx_link") == 0)
3674 return (sym->value + sym->section->vma);
7434dadd
JB
3675 }
3676
3677 /* Symbol not found, return NULL. */
3678 return 0;
3679}
3680
3681/* Search the symbol table of the file referenced by FD for a symbol
3682 named __dbx_link(). If found, then insert a breakpoint at this location,
3683 and return nonzero. Return zero otherwise. */
3684
3685static int
3686insert_dbx_link_bpt_in_file (int fd, CORE_ADDR ignored)
3687{
3688 bfd *abfd;
3689 long storage_needed;
3690 CORE_ADDR sym_addr;
3691
3692 abfd = bfd_fdopenr ("unamed", 0, fd);
3693 if (abfd == NULL)
3694 {
3695 warning (_("Failed to create a bfd: %s."), bfd_errmsg (bfd_get_error ()));
3696 return 0;
3697 }
3698
3699 if (!bfd_check_format (abfd, bfd_object))
3700 {
3701 /* Not the correct format, so we can not possibly find the dbx_link
77382aee 3702 symbol in it. */
7434dadd
JB
3703 bfd_close (abfd);
3704 return 0;
3705 }
3706
3707 sym_addr = dbx_link_addr (abfd);
3708 if (sym_addr != 0)
3709 {
3710 /* Insert the breakpoint. */
3711 dbx_link_bpt_addr = sym_addr;
3712 dbx_link_bpt = deprecated_insert_raw_breakpoint (target_gdbarch, NULL,
3713 sym_addr);
3714 if (dbx_link_bpt == NULL)
77382aee
PA
3715 {
3716 warning (_("Failed to insert dbx_link breakpoint."));
3717 bfd_close (abfd);
3718 return 0;
3719 }
7434dadd
JB
3720 bfd_close (abfd);
3721 return 1;
3722 }
3723
3724 bfd_close (abfd);
3725 return 0;
3726}
3727
e294797a 3728/* Calls the supplied callback function once for each mapped address
77382aee
PA
3729 space in the process. The callback function receives an open file
3730 descriptor for the file corresponding to that mapped address space
3731 (if there is one), and the base address of the mapped space. Quit
3732 when the callback function returns a nonzero value, or at teh end
3733 of the mappings. Returns the first non-zero return value of the
3734 callback function, or zero. */
e294797a
JB
3735
3736static int
3737solib_mappings_callback (struct prmap *map, int (*func) (int, CORE_ADDR),
3738 void *data)
3739{
3740 procinfo *pi = data;
3741 int fd;
3742
3743#ifdef NEW_PROC_API
3744 char name[MAX_PROC_NAME_SIZE + sizeof (map->pr_mapname)];
3745
3746 if (map->pr_vaddr == 0 && map->pr_size == 0)
3747 return -1; /* sanity */
3748
3749 if (map->pr_mapname[0] == 0)
3750 {
3751 fd = -1; /* no map file */
3752 }
3753 else
3754 {
3755 sprintf (name, "/proc/%d/object/%s", pi->pid, map->pr_mapname);
3756 /* Note: caller's responsibility to close this fd! */
3757 fd = open_with_retry (name, O_RDONLY);
3758 /* Note: we don't test the above call for failure;
3759 we just pass the FD on as given. Sometimes there is
3760 no file, so the open may return failure, but that's
3761 not a problem. */
3762 }
3763#else
3764 fd = ioctl (pi->ctl_fd, PIOCOPENM, &map->pr_vaddr);
3765 /* Note: we don't test the above call for failure;
3766 we just pass the FD on as given. Sometimes there is
3767 no file, so the ioctl may return failure, but that's
3768 not a problem. */
3769#endif
3770 return (*func) (fd, (CORE_ADDR) map->pr_vaddr);
3771}
3772
7434dadd
JB
3773/* If the given memory region MAP contains a symbol named __dbx_link,
3774 insert a breakpoint at this location and return nonzero. Return
3775 zero otherwise. */
3776
3777static int
3778insert_dbx_link_bpt_in_region (struct prmap *map,
b8edc417 3779 find_memory_region_ftype child_func,
77382aee 3780 void *data)
7434dadd
JB
3781{
3782 procinfo *pi = (procinfo *) data;
3783
3784 /* We know the symbol we're looking for is in a text region, so
3785 only look for it if the region is a text one. */
3786 if (map->pr_mflags & MA_EXEC)
3787 return solib_mappings_callback (map, insert_dbx_link_bpt_in_file, pi);
3788
3789 return 0;
3790}
3791
3792/* Search all memory regions for a symbol named __dbx_link. If found,
3793 insert a breakpoint at its location, and return nonzero. Return zero
3794 otherwise. */
3795
3796static int
3797insert_dbx_link_breakpoint (procinfo *pi)
3798{
3799 return iterate_over_mappings (pi, NULL, pi, insert_dbx_link_bpt_in_region);
3800}
3801#endif
3802
77382aee
PA
3803/* Retrieve the next stop event from the child process. If child has
3804 not stopped yet, wait for it to stop. Translate /proc eventcodes
3805 (or possibly wait eventcodes) into gdb internal event codes.
3806 Returns the id of process (and possibly thread) that incurred the
3807 event. Event codes are returned through a pointer parameter. */
c906108c 3808
39f77062 3809static ptid_t
117de6a9 3810procfs_wait (struct target_ops *ops,
4fcbb494 3811 ptid_t ptid, struct target_waitstatus *status, int options)
c906108c 3812{
c3f6f71d
JM
3813 /* First cut: loosely based on original version 2.1 */
3814 procinfo *pi;
39f77062
KB
3815 int wstat;
3816 int temp_tid;
3817 ptid_t retval, temp_ptid;
c3f6f71d
JM
3818 int why, what, flags;
3819 int retry = 0;
c906108c 3820
c3f6f71d 3821wait_again:
c906108c 3822
c3f6f71d
JM
3823 retry++;
3824 wstat = 0;
39f77062 3825 retval = pid_to_ptid (-1);
c906108c 3826
c3f6f71d 3827 /* Find procinfo for main process */
39f77062 3828 pi = find_procinfo_or_die (PIDGET (inferior_ptid), 0);
c3f6f71d 3829 if (pi)
c906108c 3830 {
c3f6f71d
JM
3831 /* We must assume that the status is stale now... */
3832 pi->status_valid = 0;
3833 pi->gregs_valid = 0;
3834 pi->fpregs_valid = 0;
3835
3836#if 0 /* just try this out... */
3837 flags = proc_flags (pi);
3838 why = proc_why (pi);
3839 if ((flags & PR_STOPPED) && (why == PR_REQUESTED))
3840 pi->status_valid = 0; /* re-read again, IMMEDIATELY... */
3841#endif
3842 /* If child is not stopped, wait for it to stop. */
3843 if (!(proc_flags (pi) & (PR_STOPPED | PR_ISTOP)) &&
3844 !proc_wait_for_stop (pi))
c906108c 3845 {
c3f6f71d
JM
3846 /* wait_for_stop failed: has the child terminated? */
3847 if (errno == ENOENT)
c906108c 3848 {
39f77062
KB
3849 int wait_retval;
3850
c3f6f71d 3851 /* /proc file not found; presumably child has terminated. */
39f77062 3852 wait_retval = wait (&wstat); /* "wait" for the child's exit */
c3f6f71d 3853
39f77062 3854 if (wait_retval != PIDGET (inferior_ptid)) /* wrong child? */
8a3fe4f8 3855 error (_("procfs: couldn't stop process %d: wait returned %d."),
39f77062 3856 PIDGET (inferior_ptid), wait_retval);
c3f6f71d
JM
3857 /* FIXME: might I not just use waitpid?
3858 Or try find_procinfo to see if I know about this child? */
39f77062 3859 retval = pid_to_ptid (wait_retval);
c906108c 3860 }
d1566ff5
FN
3861 else if (errno == EINTR)
3862 goto wait_again;
c3f6f71d 3863 else
c906108c 3864 {
c3f6f71d
JM
3865 /* Unknown error from wait_for_stop. */
3866 proc_error (pi, "target_wait (wait_for_stop)", __LINE__);
c906108c 3867 }
c3f6f71d
JM
3868 }
3869 else
3870 {
3871 /* This long block is reached if either:
3872 a) the child was already stopped, or
3873 b) we successfully waited for the child with wait_for_stop.
3874 This block will analyze the /proc status, and translate it
3875 into a waitstatus for GDB.
3876
3877 If we actually had to call wait because the /proc file
19958708 3878 is gone (child terminated), then we skip this block,
c3f6f71d
JM
3879 because we already have a waitstatus. */
3880
3881 flags = proc_flags (pi);
3882 why = proc_why (pi);
3883 what = proc_what (pi);
3884
c3f6f71d 3885 if (flags & (PR_STOPPED | PR_ISTOP))
c906108c 3886 {
c3f6f71d
JM
3887#ifdef PR_ASYNC
3888 /* If it's running async (for single_thread control),
3889 set it back to normal again. */
3890 if (flags & PR_ASYNC)
3891 if (!proc_unset_async (pi))
3892 proc_error (pi, "target_wait, unset_async", __LINE__);
3893#endif
3894
3895 if (info_verbose)
3896 proc_prettyprint_why (why, what, 1);
3897
3898 /* The 'pid' we will return to GDB is composed of
3899 the process ID plus the lwp ID. */
3900 retval = MERGEPID (pi->pid, proc_get_current_thread (pi));
3901
3902 switch (why) {
3903 case PR_SIGNALLED:
3904 wstat = (what << 8) | 0177;
3905 break;
3906 case PR_SYSENTRY:
37de36c6 3907 if (syscall_is_lwp_exit (pi, what))
c3f6f71d 3908 {
17faa917
DJ
3909 if (print_thread_events)
3910 printf_unfiltered (_("[%s exited]\n"),
3911 target_pid_to_str (retval));
37de36c6
KB
3912 delete_thread (retval);
3913 status->kind = TARGET_WAITKIND_SPURIOUS;
3914 return retval;
3915 }
3916 else if (syscall_is_exit (pi, what))
3917 {
181e7f93
PA
3918 struct inferior *inf;
3919
37de36c6
KB
3920 /* Handle SYS_exit call only */
3921 /* Stopped at entry to SYS_exit.
19958708 3922 Make it runnable, resume it, then use
37de36c6 3923 the wait system call to get its exit code.
19958708 3924 Proc_run_process always clears the current
37de36c6
KB
3925 fault and signal.
3926 Then return its exit status. */
3927 pi->status_valid = 0;
3928 wstat = 0;
19958708 3929 /* FIXME: what we should do is return
37de36c6
KB
3930 TARGET_WAITKIND_SPURIOUS. */
3931 if (!proc_run_process (pi, 0, 0))
3932 proc_error (pi, "target_wait, run_process", __LINE__);
181e7f93
PA
3933
3934 inf = find_inferior_pid (pi->pid);
3935 if (inf->attach_flag)
c3f6f71d 3936 {
19958708 3937 /* Don't call wait: simulate waiting for exit,
37de36c6
KB
3938 return a "success" exit code. Bogus: what if
3939 it returns something else? */
3940 wstat = 0;
39f77062 3941 retval = inferior_ptid; /* ? ? ? */
37de36c6
KB
3942 }
3943 else
3944 {
3945 int temp = wait (&wstat);
3946
3947 /* FIXME: shouldn't I make sure I get the right
3948 event from the right process? If (for
3949 instance) I have killed an earlier inferior
3950 process but failed to clean up after it
3951 somehow, I could get its termination event
3952 here. */
3953
3954 /* If wait returns -1, that's what we return to GDB. */
3955 if (temp < 0)
39f77062 3956 retval = pid_to_ptid (temp);
c3f6f71d 3957 }
c3f6f71d 3958 }
37de36c6
KB
3959 else
3960 {
a3f17187 3961 printf_filtered (_("procfs: trapped on entry to "));
37de36c6
KB
3962 proc_prettyprint_syscall (proc_what (pi), 0);
3963 printf_filtered ("\n");
3964#ifndef PIOCSSPCACT
c3f6f71d 3965 {
37de36c6 3966 long i, nsysargs, *sysargs;
c3f6f71d 3967
37de36c6
KB
3968 if ((nsysargs = proc_nsysarg (pi)) > 0 &&
3969 (sysargs = proc_sysargs (pi)) != NULL)
3970 {
a3f17187 3971 printf_filtered (_("%ld syscall arguments:\n"), nsysargs);
37de36c6 3972 for (i = 0; i < nsysargs; i++)
19958708 3973 printf_filtered ("#%ld: 0x%08lx\n",
37de36c6
KB
3974 i, sysargs[i]);
3975 }
c3f6f71d 3976
c3f6f71d 3977 }
c3f6f71d 3978#endif
37de36c6
KB
3979 if (status)
3980 {
3981 /* How to exit gracefully, returning "unknown event" */
3982 status->kind = TARGET_WAITKIND_SPURIOUS;
39f77062 3983 return inferior_ptid;
37de36c6
KB
3984 }
3985 else
3986 {
3987 /* How to keep going without returning to wfi: */
39f77062 3988 target_resume (ptid, 0, TARGET_SIGNAL_0);
37de36c6
KB
3989 goto wait_again;
3990 }
3991 }
3992 break;
3993 case PR_SYSEXIT:
3994 if (syscall_is_exec (pi, what))
c3f6f71d 3995 {
37de36c6
KB
3996 /* Hopefully this is our own "fork-child" execing
3997 the real child. Hoax this event into a trap, and
3998 GDB will see the child about to execute its start
3999 address. */
4000 wstat = (SIGTRAP << 8) | 0177;
4001 }
9185ddce 4002#ifdef SYS_syssgi
77382aee
PA
4003 else if (what == SYS_syssgi)
4004 {
4005 /* see if we can break on dbx_link(). If yes, then
4006 we no longer need the SYS_syssgi notifications. */
4007 if (insert_dbx_link_breakpoint (pi))
4008 proc_trace_syscalls_1 (pi, SYS_syssgi, PR_SYSEXIT,
4009 FLAG_RESET, 0);
4010
4011 /* This is an internal event and should be transparent
4012 to wfi, so resume the execution and wait again. See
4013 comment in procfs_init_inferior() for more details. */
4014 target_resume (ptid, 0, TARGET_SIGNAL_0);
4015 goto wait_again;
4016 }
9185ddce 4017#endif
37de36c6
KB
4018 else if (syscall_is_lwp_create (pi, what))
4019 {
77382aee
PA
4020 /* This syscall is somewhat like fork/exec. We
4021 will get the event twice: once for the parent
4022 LWP, and once for the child. We should already
4023 know about the parent LWP, but the child will
4024 be new to us. So, whenever we get this event,
4025 if it represents a new thread, simply add the
4026 thread to the list. */
c3f6f71d 4027
37de36c6 4028 /* If not in procinfo list, add it. */
39f77062
KB
4029 temp_tid = proc_get_current_thread (pi);
4030 if (!find_procinfo (pi->pid, temp_tid))
4031 create_procinfo (pi->pid, temp_tid);
37de36c6 4032
39f77062 4033 temp_ptid = MERGEPID (pi->pid, temp_tid);
37de36c6 4034 /* If not in GDB's thread list, add it. */
39f77062 4035 if (!in_thread_list (temp_ptid))
93815fbf
VP
4036 add_thread (temp_ptid);
4037
37de36c6
KB
4038 /* Return to WFI, but tell it to immediately resume. */
4039 status->kind = TARGET_WAITKIND_SPURIOUS;
39f77062 4040 return inferior_ptid;
37de36c6
KB
4041 }
4042 else if (syscall_is_lwp_exit (pi, what))
4043 {
17faa917
DJ
4044 if (print_thread_events)
4045 printf_unfiltered (_("[%s exited]\n"),
4046 target_pid_to_str (retval));
37de36c6
KB
4047 delete_thread (retval);
4048 status->kind = TARGET_WAITKIND_SPURIOUS;
4049 return retval;
c3f6f71d 4050 }
37de36c6
KB
4051 else if (0)
4052 {
4053 /* FIXME: Do we need to handle SYS_sproc,
4054 SYS_fork, or SYS_vfork here? The old procfs
4055 seemed to use this event to handle threads on
4056 older (non-LWP) systems, where I'm assuming
19958708 4057 that threads were actually separate processes.
37de36c6
KB
4058 Irix, maybe? Anyway, low priority for now. */
4059 }
4060 else
4061 {
a3f17187 4062 printf_filtered (_("procfs: trapped on exit from "));
37de36c6
KB
4063 proc_prettyprint_syscall (proc_what (pi), 0);
4064 printf_filtered ("\n");
4065#ifndef PIOCSSPCACT
4066 {
4067 long i, nsysargs, *sysargs;
4068
4069 if ((nsysargs = proc_nsysarg (pi)) > 0 &&
4070 (sysargs = proc_sysargs (pi)) != NULL)
4071 {
77382aee
PA
4072 printf_filtered (_("%ld syscall arguments:\n"),
4073 nsysargs);
37de36c6 4074 for (i = 0; i < nsysargs; i++)
19958708 4075 printf_filtered ("#%ld: 0x%08lx\n",
37de36c6
KB
4076 i, sysargs[i]);
4077 }
4078 }
c3f6f71d 4079#endif
37de36c6 4080 status->kind = TARGET_WAITKIND_SPURIOUS;
39f77062 4081 return inferior_ptid;
37de36c6 4082 }
c3f6f71d
JM
4083 break;
4084 case PR_REQUESTED:
4085#if 0 /* FIXME */
4086 wstat = (SIGSTOP << 8) | 0177;
4087 break;
4088#else
4089 if (retry < 5)
4090 {
a3f17187 4091 printf_filtered (_("Retry #%d:\n"), retry);
c3f6f71d
JM
4092 pi->status_valid = 0;
4093 goto wait_again;
4094 }
4095 else
4096 {
4097 /* If not in procinfo list, add it. */
39f77062
KB
4098 temp_tid = proc_get_current_thread (pi);
4099 if (!find_procinfo (pi->pid, temp_tid))
4100 create_procinfo (pi->pid, temp_tid);
c3f6f71d
JM
4101
4102 /* If not in GDB's thread list, add it. */
39f77062
KB
4103 temp_ptid = MERGEPID (pi->pid, temp_tid);
4104 if (!in_thread_list (temp_ptid))
93815fbf 4105 add_thread (temp_ptid);
c3f6f71d
JM
4106
4107 status->kind = TARGET_WAITKIND_STOPPED;
4108 status->value.sig = 0;
4109 return retval;
4110 }
4111#endif
4112 case PR_JOBCONTROL:
4113 wstat = (what << 8) | 0177;
4114 break;
4115 case PR_FAULTED:
7af6341f 4116 switch (what) {
c3f6f71d
JM
4117#ifdef FLTWATCH
4118 case FLTWATCH:
4119 wstat = (SIGTRAP << 8) | 0177;
4120 break;
4121#endif
4122#ifdef FLTKWATCH
4123 case FLTKWATCH:
4124 wstat = (SIGTRAP << 8) | 0177;
4125 break;
4126#endif
4127 /* FIXME: use si_signo where possible. */
4128 case FLTPRIV:
4129#if (FLTILL != FLTPRIV) /* avoid "duplicate case" error */
4130 case FLTILL:
4131#endif
4132 wstat = (SIGILL << 8) | 0177;
4133 break;
4134 case FLTBPT:
4135#if (FLTTRACE != FLTBPT) /* avoid "duplicate case" error */
4136 case FLTTRACE:
4137#endif
77382aee
PA
4138 /* If we hit our __dbx_link() internal breakpoint,
4139 then remove it. See comments in procfs_init_inferior()
4140 for more details. */
4141 if (dbx_link_bpt_addr != 0
4142 && dbx_link_bpt_addr
fb14de7b 4143 == regcache_read_pc (get_current_regcache ()))
77382aee 4144 remove_dbx_link_breakpoint ();
9185ddce 4145
c3f6f71d
JM
4146 wstat = (SIGTRAP << 8) | 0177;
4147 break;
4148 case FLTSTACK:
4149 case FLTACCESS:
4150#if (FLTBOUNDS != FLTSTACK) /* avoid "duplicate case" error */
4151 case FLTBOUNDS:
4152#endif
4153 wstat = (SIGSEGV << 8) | 0177;
4154 break;
4155 case FLTIOVF:
4156 case FLTIZDIV:
4157#if (FLTFPE != FLTIOVF) /* avoid "duplicate case" error */
4158 case FLTFPE:
4159#endif
4160 wstat = (SIGFPE << 8) | 0177;
4161 break;
4162 case FLTPAGE: /* Recoverable page fault */
4163 default: /* FIXME: use si_signo if possible for fault */
39f77062 4164 retval = pid_to_ptid (-1);
c3f6f71d 4165 printf_filtered ("procfs:%d -- ", __LINE__);
a3f17187 4166 printf_filtered (_("child stopped for unknown reason:\n"));
c3f6f71d 4167 proc_prettyprint_why (why, what, 1);
8a3fe4f8 4168 error (_("... giving up..."));
c3f6f71d
JM
4169 break;
4170 }
4171 break; /* case PR_FAULTED: */
4172 default: /* switch (why) unmatched */
4173 printf_filtered ("procfs:%d -- ", __LINE__);
a3f17187 4174 printf_filtered (_("child stopped for unknown reason:\n"));
c3f6f71d 4175 proc_prettyprint_why (why, what, 1);
8a3fe4f8 4176 error (_("... giving up..."));
c3f6f71d
JM
4177 break;
4178 }
77382aee
PA
4179 /* Got this far without error: If retval isn't in the
4180 threads database, add it. */
39f77062
KB
4181 if (PIDGET (retval) > 0 &&
4182 !ptid_equal (retval, inferior_ptid) &&
c3f6f71d 4183 !in_thread_list (retval))
c906108c 4184 {
77382aee
PA
4185 /* We have a new thread. We need to add it both to
4186 GDB's list and to our own. If we don't create a
4187 procinfo, resume may be unhappy later. */
c3f6f71d
JM
4188 add_thread (retval);
4189 if (find_procinfo (PIDGET (retval), TIDGET (retval)) == NULL)
4190 create_procinfo (PIDGET (retval), TIDGET (retval));
c906108c 4191 }
c906108c 4192 }
c3f6f71d 4193 else /* flags do not indicate STOPPED */
c906108c 4194 {
c3f6f71d
JM
4195 /* surely this can't happen... */
4196 printf_filtered ("procfs:%d -- process not stopped.\n",
4197 __LINE__);
4198 proc_prettyprint_flags (flags, 1);
8a3fe4f8 4199 error (_("procfs: ...giving up..."));
c906108c 4200 }
c906108c 4201 }
c906108c 4202
c3f6f71d
JM
4203 if (status)
4204 store_waitstatus (status, wstat);
c906108c
SS
4205 }
4206
c3f6f71d
JM
4207 return retval;
4208}
c906108c 4209
4e73f23d
RM
4210/* Perform a partial transfer to/from the specified object. For
4211 memory transfers, fall back to the old memory xfer functions. */
4212
4213static LONGEST
4214procfs_xfer_partial (struct target_ops *ops, enum target_object object,
0b62613e
PA
4215 const char *annex, gdb_byte *readbuf,
4216 const gdb_byte *writebuf, ULONGEST offset, LONGEST len)
4e73f23d
RM
4217{
4218 switch (object)
4219 {
4220 case TARGET_OBJECT_MEMORY:
4221 if (readbuf)
0b62613e
PA
4222 return (*ops->deprecated_xfer_memory) (offset, readbuf,
4223 len, 0/*read*/, NULL, ops);
4e73f23d 4224 if (writebuf)
0b62613e
PA
4225 return (*ops->deprecated_xfer_memory) (offset, (gdb_byte *) writebuf,
4226 len, 1/*write*/, NULL, ops);
4e73f23d
RM
4227 return -1;
4228
4229#ifdef NEW_PROC_API
4230 case TARGET_OBJECT_AUXV:
9f2982ff 4231 return memory_xfer_auxv (ops, object, annex, readbuf, writebuf,
4e73f23d
RM
4232 offset, len);
4233#endif
4234
4235 default:
4236 if (ops->beneath != NULL)
4237 return ops->beneath->to_xfer_partial (ops->beneath, object, annex,
4238 readbuf, writebuf, offset, len);
4239 return -1;
4240 }
4241}
4242
4243
d0849a9a
KB
4244/* Transfer LEN bytes between GDB address MYADDR and target address
4245 MEMADDR. If DOWRITE is non-zero, transfer them to the target,
4246 otherwise transfer them from the target. TARGET is unused.
4247
4248 The return value is 0 if an error occurred or no bytes were
4249 transferred. Otherwise, it will be a positive value which
4250 indicates the number of bytes transferred between gdb and the
4251 target. (Note that the interface also makes provisions for
4252 negative values, but this capability isn't implemented here.) */
4253
c3f6f71d 4254static int
0b62613e 4255procfs_xfer_memory (CORE_ADDR memaddr, gdb_byte *myaddr, int len, int dowrite,
37de36c6 4256 struct mem_attrib *attrib, struct target_ops *target)
c3f6f71d
JM
4257{
4258 procinfo *pi;
4259 int nbytes = 0;
c906108c 4260
c3f6f71d 4261 /* Find procinfo for main process */
39f77062 4262 pi = find_procinfo_or_die (PIDGET (inferior_ptid), 0);
c3f6f71d
JM
4263 if (pi->as_fd == 0 &&
4264 open_procinfo_files (pi, FD_AS) == 0)
c906108c 4265 {
c3f6f71d
JM
4266 proc_warn (pi, "xfer_memory, open_proc_files", __LINE__);
4267 return 0;
c906108c 4268 }
c906108c 4269
c3f6f71d 4270 if (lseek (pi->as_fd, (off_t) memaddr, SEEK_SET) == (off_t) memaddr)
c906108c 4271 {
c3f6f71d 4272 if (dowrite)
c906108c 4273 {
c3f6f71d 4274#ifdef NEW_PROC_API
cce7e648 4275 PROCFS_NOTE ("write memory:\n");
c906108c 4276#else
cce7e648 4277 PROCFS_NOTE ("write memory:\n");
c906108c 4278#endif
c3f6f71d 4279 nbytes = write (pi->as_fd, myaddr, len);
c906108c 4280 }
c3f6f71d 4281 else
c906108c 4282 {
cce7e648 4283 PROCFS_NOTE ("read memory:\n");
c3f6f71d 4284 nbytes = read (pi->as_fd, myaddr, len);
c906108c 4285 }
c3f6f71d 4286 if (nbytes < 0)
c906108c 4287 {
c3f6f71d 4288 nbytes = 0;
c906108c 4289 }
c906108c 4290 }
c3f6f71d 4291 return nbytes;
c906108c
SS
4292}
4293
77382aee
PA
4294/* Called by target_resume before making child runnable. Mark cached
4295 registers and status's invalid. If there are "dirty" caches that
4296 need to be written back to the child process, do that.
c906108c 4297
77382aee
PA
4298 File descriptors are also cached. As they are a limited resource,
4299 we cannot hold onto them indefinitely. However, as they are
4300 expensive to open, we don't want to throw them away
4301 indescriminately either. As a compromise, we will keep the file
4302 descriptors for the parent process, but discard any file
4303 descriptors we may have accumulated for the threads.
4304
4305 As this function is called by iterate_over_threads, it always
4306 returns zero (so that iterate_over_threads will keep
4307 iterating). */
c3f6f71d
JM
4308
4309static int
fba45db2 4310invalidate_cache (procinfo *parent, procinfo *pi, void *ptr)
c906108c 4311{
77382aee
PA
4312 /* About to run the child; invalidate caches and do any other
4313 cleanup. */
c906108c 4314
c3f6f71d
JM
4315#if 0
4316 if (pi->gregs_dirty)
4317 if (parent == NULL ||
4318 proc_get_current_thread (parent) != pi->tid)
4319 if (!proc_set_gregs (pi)) /* flush gregs cache */
4320 proc_warn (pi, "target_resume, set_gregs",
4321 __LINE__);
a97b0ac8 4322 if (gdbarch_fp0_regnum (target_gdbarch) >= 0)
60054393
MS
4323 if (pi->fpregs_dirty)
4324 if (parent == NULL ||
4325 proc_get_current_thread (parent) != pi->tid)
4326 if (!proc_set_fpregs (pi)) /* flush fpregs cache */
19958708 4327 proc_warn (pi, "target_resume, set_fpregs",
60054393 4328 __LINE__);
c906108c 4329#endif
c906108c 4330
c3f6f71d 4331 if (parent != NULL)
c906108c 4332 {
c3f6f71d 4333 /* The presence of a parent indicates that this is an LWP.
19958708 4334 Close any file descriptors that it might have open.
c3f6f71d
JM
4335 We don't do this to the master (parent) procinfo. */
4336
4337 close_procinfo_files (pi);
c906108c 4338 }
c3f6f71d
JM
4339 pi->gregs_valid = 0;
4340 pi->fpregs_valid = 0;
4341#if 0
4342 pi->gregs_dirty = 0;
4343 pi->fpregs_dirty = 0;
c906108c 4344#endif
c3f6f71d
JM
4345 pi->status_valid = 0;
4346 pi->threads_valid = 0;
c906108c 4347
c3f6f71d 4348 return 0;
c906108c
SS
4349}
4350
0fda6bd2 4351#if 0
77382aee
PA
4352/* A callback function for iterate_over_threads. Find the
4353 asynchronous signal thread, and make it runnable. See if that
4354 helps matters any. */
c906108c 4355
c3f6f71d 4356static int
fba45db2 4357make_signal_thread_runnable (procinfo *process, procinfo *pi, void *ptr)
c906108c 4358{
c3f6f71d
JM
4359#ifdef PR_ASLWP
4360 if (proc_flags (pi) & PR_ASLWP)
c906108c 4361 {
c3f6f71d
JM
4362 if (!proc_run_process (pi, 0, -1))
4363 proc_error (pi, "make_signal_thread_runnable", __LINE__);
4364 return 1;
c906108c 4365 }
c906108c 4366#endif
c3f6f71d 4367 return 0;
c906108c 4368}
0fda6bd2 4369#endif
c906108c 4370
77382aee
PA
4371/* Make the child process runnable. Normally we will then call
4372 procfs_wait and wait for it to stop again (unless gdb is async).
4373
4374 If STEP is true, then arrange for the child to stop again after
4375 executing a single instruction. If SIGNO is zero, then cancel any
4376 pending signal; if non-zero, then arrange for the indicated signal
4377 to be delivered to the child when it runs. If PID is -1, then
4378 allow any child thread to run; if non-zero, then allow only the
4379 indicated thread to run. (not implemented yet). */
c906108c
SS
4380
4381static void
28439f5e
PA
4382procfs_resume (struct target_ops *ops,
4383 ptid_t ptid, int step, enum target_signal signo)
c906108c 4384{
c3f6f71d
JM
4385 procinfo *pi, *thread;
4386 int native_signo;
4387
19958708 4388 /* 2.1:
c3f6f71d 4389 prrun.prflags |= PRSVADDR;
19958708 4390 prrun.pr_vaddr = $PC; set resume address
c3f6f71d 4391 prrun.prflags |= PRSTRACE; trace signals in pr_trace (all)
19958708 4392 prrun.prflags |= PRSFAULT; trace faults in pr_fault (all but PAGE)
c3f6f71d
JM
4393 prrun.prflags |= PRCFAULT; clear current fault.
4394
4395 PRSTRACE and PRSFAULT can be done by other means
77382aee 4396 (proc_trace_signals, proc_trace_faults)
c3f6f71d
JM
4397 PRSVADDR is unnecessary.
4398 PRCFAULT may be replaced by a PIOCCFAULT call (proc_clear_current_fault)
4399 This basically leaves PRSTEP and PRCSIG.
4400 PRCSIG is like PIOCSSIG (proc_clear_current_signal).
4401 So basically PR_STEP is the sole argument that must be passed
77382aee 4402 to proc_run_process (for use in the prrun struct by ioctl). */
c3f6f71d
JM
4403
4404 /* Find procinfo for main process */
39f77062 4405 pi = find_procinfo_or_die (PIDGET (inferior_ptid), 0);
c3f6f71d 4406
77382aee 4407 /* First cut: ignore pid argument. */
c3f6f71d 4408 errno = 0;
c906108c 4409
c3f6f71d
JM
4410 /* Convert signal to host numbering. */
4411 if (signo == 0 ||
0fda6bd2 4412 (signo == TARGET_SIGNAL_STOP && pi->ignore_next_sigstop))
c3f6f71d
JM
4413 native_signo = 0;
4414 else
4415 native_signo = target_signal_to_host (signo);
c906108c 4416
c3f6f71d 4417 pi->ignore_next_sigstop = 0;
c906108c 4418
77382aee
PA
4419 /* Running the process voids all cached registers and status. */
4420 /* Void the threads' caches first. */
19958708 4421 proc_iterate_over_threads (pi, invalidate_cache, NULL);
c3f6f71d
JM
4422 /* Void the process procinfo's caches. */
4423 invalidate_cache (NULL, pi, NULL);
c906108c 4424
39f77062 4425 if (PIDGET (ptid) != -1)
c906108c 4426 {
77382aee
PA
4427 /* Resume a specific thread, presumably suppressing the
4428 others. */
39f77062 4429 thread = find_procinfo (PIDGET (ptid), TIDGET (ptid));
7de45904 4430 if (thread != NULL)
c906108c 4431 {
c3f6f71d
JM
4432 if (thread->tid != 0)
4433 {
77382aee
PA
4434 /* We're to resume a specific thread, and not the
4435 others. Set the child process's PR_ASYNC flag. */
c3f6f71d
JM
4436#ifdef PR_ASYNC
4437 if (!proc_set_async (pi))
4438 proc_error (pi, "target_resume, set_async", __LINE__);
4439#endif
4440#if 0
19958708 4441 proc_iterate_over_threads (pi,
c3f6f71d
JM
4442 make_signal_thread_runnable,
4443 NULL);
4444#endif
4445 pi = thread; /* substitute the thread's procinfo for run */
4446 }
c906108c
SS
4447 }
4448 }
c906108c 4449
c3f6f71d 4450 if (!proc_run_process (pi, step, native_signo))
c906108c 4451 {
c3f6f71d 4452 if (errno == EBUSY)
77382aee
PA
4453 warning (_("resume: target already running. "
4454 "Pretend to resume, and hope for the best!"));
c3f6f71d
JM
4455 else
4456 proc_error (pi, "target_resume", __LINE__);
c906108c 4457 }
c3f6f71d 4458}
c906108c 4459
77382aee
PA
4460/* Traverse the list of signals that GDB knows about (see "handle"
4461 command), and arrange for the target to be stopped or not,
4462 according to these settings. Returns non-zero for success, zero
4463 for failure. */
c906108c 4464
c3f6f71d 4465static int
37de36c6 4466register_gdb_signals (procinfo *pi, gdb_sigset_t *signals)
c3f6f71d
JM
4467{
4468 int signo;
c906108c 4469
c3f6f71d
JM
4470 for (signo = 0; signo < NSIG; signo ++)
4471 if (signal_stop_state (target_signal_from_host (signo)) == 0 &&
4472 signal_print_state (target_signal_from_host (signo)) == 0 &&
4473 signal_pass_state (target_signal_from_host (signo)) == 1)
3c95f01c 4474 gdb_prdelset (signals, signo);
c3f6f71d 4475 else
3c95f01c 4476 gdb_praddset (signals, signo);
c906108c 4477
c3f6f71d 4478 return proc_set_traced_signals (pi, signals);
c906108c
SS
4479}
4480
77382aee 4481/* Set up to trace signals in the child process. */
c906108c 4482
c3f6f71d 4483static void
39f77062 4484procfs_notice_signals (ptid_t ptid)
c3f6f71d 4485{
37de36c6 4486 gdb_sigset_t signals;
39f77062 4487 procinfo *pi = find_procinfo_or_die (PIDGET (ptid), 0);
c906108c 4488
c3f6f71d
JM
4489 if (proc_get_traced_signals (pi, &signals) &&
4490 register_gdb_signals (pi, &signals))
4491 return;
4492 else
4493 proc_error (pi, "notice_signals", __LINE__);
4494}
c906108c 4495
77382aee 4496/* Print status information about the child process. */
c906108c 4497
c3f6f71d 4498static void
fba45db2 4499procfs_files_info (struct target_ops *ignore)
c3f6f71d 4500{
181e7f93 4501 struct inferior *inf = current_inferior ();
f4a14ae6 4502
a3f17187 4503 printf_filtered (_("\tUsing the running image of %s %s via /proc.\n"),
181e7f93 4504 inf->attach_flag? "attached": "child",
39f77062 4505 target_pid_to_str (inferior_ptid));
c3f6f71d 4506}
c906108c 4507
77382aee
PA
4508/* Stop the child process asynchronously, as when the gdb user types
4509 control-c or presses a "stop" button. Works by sending
4510 kill(SIGINT) to the child's process group. */
c906108c 4511
c3f6f71d 4512static void
f9c72d52 4513procfs_stop (ptid_t ptid)
c3f6f71d 4514{
7e1789f5 4515 kill (-inferior_process_group (), SIGINT);
c906108c
SS
4516}
4517
77382aee
PA
4518/* Make it die. Wait for it to die. Clean up after it. Note: this
4519 should only be applied to the real process, not to an LWP, because
4520 of the check for parent-process. If we need this to work for an
4521 LWP, it needs some more logic. */
c906108c 4522
c3f6f71d 4523static void
fba45db2 4524unconditionally_kill_inferior (procinfo *pi)
c3f6f71d
JM
4525{
4526 int parent_pid;
c906108c 4527
c3f6f71d
JM
4528 parent_pid = proc_parent_pid (pi);
4529#ifdef PROCFS_NEED_CLEAR_CURSIG_FOR_KILL
4530 /* FIXME: use access functions */
4531 /* Alpha OSF/1-3.x procfs needs a clear of the current signal
4532 before the PIOCKILL, otherwise it might generate a corrupted core
4533 file for the inferior. */
4534 if (ioctl (pi->ctl_fd, PIOCSSIG, NULL) < 0)
4535 {
4536 printf_filtered ("unconditionally_kill: SSIG failed!\n");
4537 }
4538#endif
4539#ifdef PROCFS_NEED_PIOCSSIG_FOR_KILL
4540 /* Alpha OSF/1-2.x procfs needs a PIOCSSIG call with a SIGKILL signal
4541 to kill the inferior, otherwise it might remain stopped with a
4542 pending SIGKILL.
4543 We do not check the result of the PIOCSSIG, the inferior might have
4544 died already. */
4545 {
37de36c6 4546 gdb_siginfo_t newsiginfo;
c906108c 4547
c3f6f71d
JM
4548 memset ((char *) &newsiginfo, 0, sizeof (newsiginfo));
4549 newsiginfo.si_signo = SIGKILL;
4550 newsiginfo.si_code = 0;
4551 newsiginfo.si_errno = 0;
4552 newsiginfo.si_pid = getpid ();
4553 newsiginfo.si_uid = getuid ();
4554 /* FIXME: use proc_set_current_signal */
4555 ioctl (pi->ctl_fd, PIOCSSIG, &newsiginfo);
4556 }
4557#else /* PROCFS_NEED_PIOCSSIG_FOR_KILL */
4558 if (!proc_kill (pi, SIGKILL))
103b3ef5 4559 proc_error (pi, "unconditionally_kill, proc_kill", __LINE__);
c3f6f71d
JM
4560#endif /* PROCFS_NEED_PIOCSSIG_FOR_KILL */
4561 destroy_procinfo (pi);
c906108c 4562
c3f6f71d
JM
4563 /* If pi is GDB's child, wait for it to die. */
4564 if (parent_pid == getpid ())
19958708 4565 /* FIXME: should we use waitpid to make sure we get the right event?
c3f6f71d
JM
4566 Should we check the returned event? */
4567 {
0d06e24b 4568#if 0
c3f6f71d 4569 int status, ret;
c906108c 4570
c3f6f71d
JM
4571 ret = waitpid (pi->pid, &status, 0);
4572#else
4573 wait (NULL);
4574#endif
4575 }
4576}
c906108c 4577
77382aee
PA
4578/* We're done debugging it, and we want it to go away. Then we want
4579 GDB to forget all about it. */
c906108c 4580
19958708 4581static void
7d85a9c0 4582procfs_kill_inferior (struct target_ops *ops)
c906108c 4583{
39f77062 4584 if (!ptid_equal (inferior_ptid, null_ptid)) /* ? */
c3f6f71d
JM
4585 {
4586 /* Find procinfo for main process */
39f77062 4587 procinfo *pi = find_procinfo (PIDGET (inferior_ptid), 0);
c906108c 4588
c3f6f71d
JM
4589 if (pi)
4590 unconditionally_kill_inferior (pi);
4591 target_mourn_inferior ();
c906108c 4592 }
c3f6f71d
JM
4593}
4594
77382aee 4595/* Forget we ever debugged this thing! */
c906108c 4596
19958708 4597static void
136d6dae 4598procfs_mourn_inferior (struct target_ops *ops)
c3f6f71d
JM
4599{
4600 procinfo *pi;
c906108c 4601
39f77062 4602 if (!ptid_equal (inferior_ptid, null_ptid))
c3f6f71d
JM
4603 {
4604 /* Find procinfo for main process */
39f77062 4605 pi = find_procinfo (PIDGET (inferior_ptid), 0);
c3f6f71d
JM
4606 if (pi)
4607 destroy_procinfo (pi);
c906108c 4608 }
28439f5e 4609 unpush_target (ops);
8181d85f
DJ
4610
4611 if (dbx_link_bpt != NULL)
4612 {
a6d9a66e 4613 deprecated_remove_raw_breakpoint (target_gdbarch, dbx_link_bpt);
8181d85f
DJ
4614 dbx_link_bpt_addr = 0;
4615 dbx_link_bpt = NULL;
4616 }
4617
c3f6f71d
JM
4618 generic_mourn_inferior ();
4619}
c906108c 4620
77382aee
PA
4621/* When GDB forks to create a runnable inferior process, this function
4622 is called on the parent side of the fork. It's job is to do
4623 whatever is necessary to make the child ready to be debugged, and
4624 then wait for the child to synchronize. */
c906108c 4625
19958708 4626static void
28439f5e 4627procfs_init_inferior (struct target_ops *ops, int pid)
c3f6f71d
JM
4628{
4629 procinfo *pi;
37de36c6 4630 gdb_sigset_t signals;
c3f6f71d 4631 int fail;
2689673f 4632 int lwpid;
c906108c 4633
c3f6f71d
JM
4634 /* This routine called on the parent side (GDB side)
4635 after GDB forks the inferior. */
28439f5e 4636 push_target (ops);
c906108c 4637
c3f6f71d
JM
4638 if ((pi = create_procinfo (pid, 0)) == NULL)
4639 perror ("procfs: out of memory in 'init_inferior'");
4640
4641 if (!open_procinfo_files (pi, FD_CTL))
4642 proc_error (pi, "init_inferior, open_proc_files", __LINE__);
4643
4644 /*
4645 xmalloc // done
4646 open_procinfo_files // done
4647 link list // done
4648 prfillset (trace)
4649 procfs_notice_signals
4650 prfillset (fault)
4651 prdelset (FLTPAGE)
4652 PIOCWSTOP
4653 PIOCSFAULT
4654 */
4655
77382aee 4656 /* If not stopped yet, wait for it to stop. */
c3f6f71d
JM
4657 if (!(proc_flags (pi) & PR_STOPPED) &&
4658 !(proc_wait_for_stop (pi)))
4659 dead_procinfo (pi, "init_inferior: wait_for_stop failed", KILL);
4660
4661 /* Save some of the /proc state to be restored if we detach. */
4662 /* FIXME: Why? In case another debugger was debugging it?
4663 We're it's parent, for Ghu's sake! */
4664 if (!proc_get_traced_signals (pi, &pi->saved_sigset))
4665 proc_error (pi, "init_inferior, get_traced_signals", __LINE__);
4666 if (!proc_get_held_signals (pi, &pi->saved_sighold))
4667 proc_error (pi, "init_inferior, get_held_signals", __LINE__);
4668 if (!proc_get_traced_faults (pi, &pi->saved_fltset))
4669 proc_error (pi, "init_inferior, get_traced_faults", __LINE__);
37de36c6 4670 if (!proc_get_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d 4671 proc_error (pi, "init_inferior, get_traced_sysentry", __LINE__);
37de36c6 4672 if (!proc_get_traced_sysexit (pi, pi->saved_exitset))
c3f6f71d
JM
4673 proc_error (pi, "init_inferior, get_traced_sysexit", __LINE__);
4674
77382aee 4675 /* Register to trace selected signals in the child. */
c3f6f71d
JM
4676 prfillset (&signals);
4677 if (!register_gdb_signals (pi, &signals))
4678 proc_error (pi, "init_inferior, register_signals", __LINE__);
4679
4680 if ((fail = procfs_debug_inferior (pi)) != 0)
4681 proc_error (pi, "init_inferior (procfs_debug_inferior)", fail);
4682
0d06e24b
JM
4683 /* FIXME: logically, we should really be turning OFF run-on-last-close,
4684 and possibly even turning ON kill-on-last-close at this point. But
4685 I can't make that change without careful testing which I don't have
4686 time to do right now... */
c3f6f71d
JM
4687 /* Turn on run-on-last-close flag so that the child
4688 will die if GDB goes away for some reason. */
4689 if (!proc_set_run_on_last_close (pi))
4690 proc_error (pi, "init_inferior, set_RLC", __LINE__);
4691
2689673f
PA
4692 /* We now have have access to the lwpid of the main thread/lwp. */
4693 lwpid = proc_get_current_thread (pi);
4694
4695 /* Create a procinfo for the main lwp. */
4696 create_procinfo (pid, lwpid);
4697
4698 /* We already have a main thread registered in the thread table at
4699 this point, but it didn't have any lwp info yet. Notify the core
4700 about it. This changes inferior_ptid as well. */
4701 thread_change_ptid (pid_to_ptid (pid),
4702 MERGEPID (pid, lwpid));
c906108c 4703
46ac7a5d
AC
4704 /* Typically two, one trap to exec the shell, one to exec the
4705 program being debugged. Defined by "inferior.h". */
c3f6f71d 4706 startup_inferior (START_INFERIOR_TRAPS_EXPECTED);
9185ddce
JB
4707
4708#ifdef SYS_syssgi
4709 /* On mips-irix, we need to stop the inferior early enough during
4710 the startup phase in order to be able to load the shared library
4711 symbols and insert the breakpoints that are located in these shared
4712 libraries. Stopping at the program entry point is not good enough
4713 because the -init code is executed before the execution reaches
4714 that point.
4715
4716 So what we need to do is to insert a breakpoint in the runtime
4717 loader (rld), more precisely in __dbx_link(). This procedure is
4718 called by rld once all shared libraries have been mapped, but before
4719 the -init code is executed. Unfortuantely, this is not straightforward,
4720 as rld is not part of the executable we are running, and thus we need
4721 the inferior to run until rld itself has been mapped in memory.
77382aee 4722
9185ddce
JB
4723 For this, we trace all syssgi() syscall exit events. Each time
4724 we detect such an event, we iterate over each text memory maps,
4725 get its associated fd, and scan the symbol table for __dbx_link().
4726 When found, we know that rld has been mapped, and that we can insert
4727 the breakpoint at the symbol address. Once the dbx_link() breakpoint
4728 has been inserted, the syssgi() notifications are no longer necessary,
4729 so they should be canceled. */
4730 proc_trace_syscalls_1 (pi, SYS_syssgi, PR_SYSEXIT, FLAG_SET, 0);
9185ddce 4731#endif
c3f6f71d 4732}
c906108c 4733
77382aee
PA
4734/* When GDB forks to create a new process, this function is called on
4735 the child side of the fork before GDB exec's the user program. Its
4736 job is to make the child minimally debuggable, so that the parent
4737 GDB process can connect to the child and take over. This function
4738 should do only the minimum to make that possible, and to
4739 synchronize with the parent process. The parent process should
4740 take care of the details. */
c3f6f71d
JM
4741
4742static void
fba45db2 4743procfs_set_exec_trap (void)
c3f6f71d
JM
4744{
4745 /* This routine called on the child side (inferior side)
4746 after GDB forks the inferior. It must use only local variables,
4747 because it may be sharing data space with its parent. */
c906108c 4748
c3f6f71d 4749 procinfo *pi;
37de36c6 4750 sysset_t *exitset;
c906108c 4751
c3f6f71d 4752 if ((pi = create_procinfo (getpid (), 0)) == NULL)
e2e0b3e5 4753 perror_with_name (_("procfs: create_procinfo failed in child."));
c906108c 4754
c3f6f71d
JM
4755 if (open_procinfo_files (pi, FD_CTL) == 0)
4756 {
4757 proc_warn (pi, "set_exec_trap, open_proc_files", __LINE__);
4758 gdb_flush (gdb_stderr);
77382aee
PA
4759 /* No need to call "dead_procinfo", because we're going to
4760 exit. */
c3f6f71d
JM
4761 _exit (127);
4762 }
c906108c 4763
c3f6f71d
JM
4764#ifdef PRFS_STOPEXEC /* defined on OSF */
4765 /* OSF method for tracing exec syscalls. Quoting:
4766 Under Alpha OSF/1 we have to use a PIOCSSPCACT ioctl to trace
4767 exits from exec system calls because of the user level loader. */
77382aee 4768 /* FIXME: make nice and maybe move into an access function. */
c3f6f71d
JM
4769 {
4770 int prfs_flags;
c906108c 4771
c3f6f71d
JM
4772 if (ioctl (pi->ctl_fd, PIOCGSPCACT, &prfs_flags) < 0)
4773 {
4774 proc_warn (pi, "set_exec_trap (PIOCGSPCACT)", __LINE__);
4775 gdb_flush (gdb_stderr);
4776 _exit (127);
4777 }
4778 prfs_flags |= PRFS_STOPEXEC;
c906108c 4779
c3f6f71d
JM
4780 if (ioctl (pi->ctl_fd, PIOCSSPCACT, &prfs_flags) < 0)
4781 {
4782 proc_warn (pi, "set_exec_trap (PIOCSSPCACT)", __LINE__);
4783 gdb_flush (gdb_stderr);
4784 _exit (127);
4785 }
4786 }
4787#else /* not PRFS_STOPEXEC */
77382aee 4788 /* Everyone else's (except OSF) method for tracing exec syscalls. */
c3f6f71d
JM
4789 /* GW: Rationale...
4790 Not all systems with /proc have all the exec* syscalls with the same
4791 names. On the SGI, for example, there is no SYS_exec, but there
77382aee 4792 *is* a SYS_execv. So, we try to account for that. */
c906108c 4793
37de36c6
KB
4794 exitset = sysset_t_alloc (pi);
4795 gdb_premptysysset (exitset);
c3f6f71d 4796#ifdef SYS_exec
37de36c6 4797 gdb_praddsysset (exitset, SYS_exec);
c3f6f71d
JM
4798#endif
4799#ifdef SYS_execve
37de36c6 4800 gdb_praddsysset (exitset, SYS_execve);
c3f6f71d
JM
4801#endif
4802#ifdef SYS_execv
37de36c6 4803 gdb_praddsysset (exitset, SYS_execv);
c906108c 4804#endif
37de36c6
KB
4805#ifdef DYNAMIC_SYSCALLS
4806 {
4807 int callnum = find_syscall (pi, "execve");
4808
4809 if (callnum >= 0)
4810 gdb_praddsysset (exitset, callnum);
c906108c 4811
37de36c6
KB
4812 callnum = find_syscall (pi, "ra_execve");
4813 if (callnum >= 0)
4814 gdb_praddsysset (exitset, callnum);
4815 }
4816#endif /* DYNAMIC_SYSCALLS */
4817
4818 if (!proc_set_traced_sysexit (pi, exitset))
c906108c 4819 {
c3f6f71d
JM
4820 proc_warn (pi, "set_exec_trap, set_traced_sysexit", __LINE__);
4821 gdb_flush (gdb_stderr);
4822 _exit (127);
c906108c 4823 }
c3f6f71d
JM
4824#endif /* PRFS_STOPEXEC */
4825
4826 /* FIXME: should this be done in the parent instead? */
4827 /* Turn off inherit on fork flag so that all grand-children
4828 of gdb start with tracing flags cleared. */
4829 if (!proc_unset_inherit_on_fork (pi))
4830 proc_warn (pi, "set_exec_trap, unset_inherit", __LINE__);
4831
4832 /* Turn off run on last close flag, so that the child process
4833 cannot run away just because we close our handle on it.
4834 We want it to wait for the parent to attach. */
4835 if (!proc_unset_run_on_last_close (pi))
4836 proc_warn (pi, "set_exec_trap, unset_RLC", __LINE__);
4837
19958708 4838 /* FIXME: No need to destroy the procinfo --
c3f6f71d
JM
4839 we have our own address space, and we're about to do an exec! */
4840 /*destroy_procinfo (pi);*/
c906108c 4841}
c906108c 4842
77382aee
PA
4843/* This function is called BEFORE gdb forks the inferior process. Its
4844 only real responsibility is to set things up for the fork, and tell
4845 GDB which two functions to call after the fork (one for the parent,
4846 and one for the child).
4847
4848 This function does a complicated search for a unix shell program,
4849 which it then uses to parse arguments and environment variables to
4850 be sent to the child. I wonder whether this code could not be
4851 abstracted out and shared with other unix targets such as
4852 inf-ptrace? */
c906108c
SS
4853
4854static void
136d6dae
VP
4855procfs_create_inferior (struct target_ops *ops, char *exec_file,
4856 char *allargs, char **env, int from_tty)
c906108c
SS
4857{
4858 char *shell_file = getenv ("SHELL");
4859 char *tryname;
28439f5e
PA
4860 int pid;
4861
c906108c
SS
4862 if (shell_file != NULL && strchr (shell_file, '/') == NULL)
4863 {
4864
4865 /* We will be looking down the PATH to find shell_file. If we
c3f6f71d
JM
4866 just do this the normal way (via execlp, which operates by
4867 attempting an exec for each element of the PATH until it
4868 finds one which succeeds), then there will be an exec for
4869 each failed attempt, each of which will cause a PR_SYSEXIT
4870 stop, and we won't know how to distinguish the PR_SYSEXIT's
4871 for these failed execs with the ones for successful execs
4872 (whether the exec has succeeded is stored at that time in the
4873 carry bit or some such architecture-specific and
4874 non-ABI-specified place).
4875
4876 So I can't think of anything better than to search the PATH
4877 now. This has several disadvantages: (1) There is a race
4878 condition; if we find a file now and it is deleted before we
4879 exec it, we lose, even if the deletion leaves a valid file
4880 further down in the PATH, (2) there is no way to know exactly
4881 what an executable (in the sense of "capable of being
4882 exec'd") file is. Using access() loses because it may lose
4883 if the caller is the superuser; failing to use it loses if
4884 there are ACLs or some such. */
c906108c
SS
4885
4886 char *p;
4887 char *p1;
4888 /* FIXME-maybe: might want "set path" command so user can change what
c3f6f71d 4889 path is used from within GDB. */
c906108c
SS
4890 char *path = getenv ("PATH");
4891 int len;
4892 struct stat statbuf;
4893
4894 if (path == NULL)
4895 path = "/bin:/usr/bin";
4896
4897 tryname = alloca (strlen (path) + strlen (shell_file) + 2);
c3f6f71d 4898 for (p = path; p != NULL; p = p1 ? p1 + 1: NULL)
c906108c
SS
4899 {
4900 p1 = strchr (p, ':');
4901 if (p1 != NULL)
4902 len = p1 - p;
4903 else
4904 len = strlen (p);
4905 strncpy (tryname, p, len);
4906 tryname[len] = '\0';
4907 strcat (tryname, "/");
4908 strcat (tryname, shell_file);
4909 if (access (tryname, X_OK) < 0)
4910 continue;
4911 if (stat (tryname, &statbuf) < 0)
4912 continue;
4913 if (!S_ISREG (statbuf.st_mode))
4914 /* We certainly need to reject directories. I'm not quite
4915 as sure about FIFOs, sockets, etc., but I kind of doubt
4916 that people want to exec() these things. */
4917 continue;
4918 break;
4919 }
4920 if (p == NULL)
4921 /* Not found. This must be an error rather than merely passing
4922 the file to execlp(), because execlp() would try all the
4923 exec()s, causing GDB to get confused. */
8a3fe4f8 4924 error (_("procfs:%d -- Can't find shell %s in PATH"),
c3f6f71d 4925 __LINE__, shell_file);
c906108c
SS
4926
4927 shell_file = tryname;
4928 }
4929
28439f5e
PA
4930 pid = fork_inferior (exec_file, allargs, env, procfs_set_exec_trap,
4931 NULL, NULL, shell_file);
4932
4933 procfs_init_inferior (ops, pid);
27087a3d
JB
4934}
4935
4936/* An observer for the "inferior_created" event. */
c906108c 4937
27087a3d
JB
4938static void
4939procfs_inferior_created (struct target_ops *ops, int from_tty)
4940{
9185ddce 4941#ifdef SYS_syssgi
77382aee 4942 /* Make sure to cancel the syssgi() syscall-exit notifications.
9185ddce
JB
4943 They should normally have been removed by now, but they may still
4944 be activated if the inferior doesn't use shared libraries, or if
4945 we didn't locate __dbx_link, or if we never stopped in __dbx_link.
27087a3d
JB
4946 See procfs_init_inferior() for more details.
4947
4948 Since these notifications are only ever enabled when we spawned
4949 the inferior ourselves, there is nothing to do when the inferior
4950 was created by attaching to an already running process, or when
4951 debugging a core file. */
4952 if (current_inferior ()->attach_flag || !target_can_run (&current_target))
4953 return;
4954
9185ddce 4955 proc_trace_syscalls_1 (find_procinfo_or_die (PIDGET (inferior_ptid), 0),
77382aee 4956 SYS_syssgi, PR_SYSEXIT, FLAG_RESET, 0);
9185ddce 4957#endif
c906108c
SS
4958}
4959
77382aee 4960/* Callback for find_new_threads. Calls "add_thread". */
c906108c 4961
c3f6f71d 4962static int
fba45db2 4963procfs_notice_thread (procinfo *pi, procinfo *thread, void *ptr)
c906108c 4964{
39f77062 4965 ptid_t gdb_threadid = MERGEPID (pi->pid, thread->tid);
c906108c 4966
2689673f 4967 if (!in_thread_list (gdb_threadid) || is_exited (gdb_threadid))
c3f6f71d 4968 add_thread (gdb_threadid);
c906108c 4969
c3f6f71d
JM
4970 return 0;
4971}
4972
77382aee
PA
4973/* Query all the threads that the target knows about, and give them
4974 back to GDB to add to its list. */
c3f6f71d
JM
4975
4976void
28439f5e 4977procfs_find_new_threads (struct target_ops *ops)
c3f6f71d
JM
4978{
4979 procinfo *pi;
4980
4981 /* Find procinfo for main process */
39f77062 4982 pi = find_procinfo_or_die (PIDGET (inferior_ptid), 0);
c3f6f71d
JM
4983 proc_update_threads (pi);
4984 proc_iterate_over_threads (pi, procfs_notice_thread, NULL);
c906108c
SS
4985}
4986
77382aee
PA
4987/* Return true if the thread is still 'alive'. This guy doesn't
4988 really seem to be doing his job. Got to investigate how to tell
4989 when a thread is really gone. */
c906108c 4990
c906108c 4991static int
28439f5e 4992procfs_thread_alive (struct target_ops *ops, ptid_t ptid)
c906108c 4993{
c3f6f71d
JM
4994 int proc, thread;
4995 procinfo *pi;
c906108c 4996
39f77062
KB
4997 proc = PIDGET (ptid);
4998 thread = TIDGET (ptid);
c3f6f71d
JM
4999 /* If I don't know it, it ain't alive! */
5000 if ((pi = find_procinfo (proc, thread)) == NULL)
5001 return 0;
5002
5003 /* If I can't get its status, it ain't alive!
5004 What's more, I need to forget about it! */
5005 if (!proc_get_status (pi))
5006 {
5007 destroy_procinfo (pi);
5008 return 0;
5009 }
77382aee
PA
5010 /* I couldn't have got its status if it weren't alive, so it's
5011 alive. */
c3f6f71d 5012 return 1;
c906108c 5013}
c3f6f71d 5014
77382aee
PA
5015/* Convert PTID to a string. Returns the string in a static
5016 buffer. */
c3f6f71d
JM
5017
5018char *
117de6a9 5019procfs_pid_to_str (struct target_ops *ops, ptid_t ptid)
c3f6f71d
JM
5020{
5021 static char buf[80];
c3f6f71d 5022
5240ceac
MK
5023 if (TIDGET (ptid) == 0)
5024 sprintf (buf, "process %d", PIDGET (ptid));
c3f6f71d 5025 else
21749010 5026 sprintf (buf, "LWP %ld", TIDGET (ptid));
5240ceac
MK
5027
5028 return buf;
c3f6f71d
JM
5029}
5030
77382aee 5031/* Insert a watchpoint. */
c3f6f71d 5032
19958708 5033int
39f77062 5034procfs_set_watchpoint (ptid_t ptid, CORE_ADDR addr, int len, int rwflag,
77382aee 5035 int after)
c906108c 5036{
c3f6f71d 5037#ifndef UNIXWARE
37de36c6 5038#ifndef AIX5
c3f6f71d 5039 int pflags = 0;
19958708 5040 procinfo *pi;
c3f6f71d 5041
19958708 5042 pi = find_procinfo_or_die (PIDGET (ptid) == -1 ?
39f77062 5043 PIDGET (inferior_ptid) : PIDGET (ptid), 0);
c3f6f71d
JM
5044
5045 /* Translate from GDB's flags to /proc's */
5046 if (len > 0) /* len == 0 means delete watchpoint */
c906108c 5047 {
c3f6f71d
JM
5048 switch (rwflag) { /* FIXME: need an enum! */
5049 case hw_write: /* default watchpoint (write) */
5050 pflags = WRITE_WATCHFLAG;
5051 break;
5052 case hw_read: /* read watchpoint */
5053 pflags = READ_WATCHFLAG;
5054 break;
5055 case hw_access: /* access watchpoint */
5056 pflags = READ_WATCHFLAG | WRITE_WATCHFLAG;
5057 break;
5058 case hw_execute: /* execution HW breakpoint */
5059 pflags = EXEC_WATCHFLAG;
5060 break;
5061 default: /* Something weird. Return error. */
c906108c 5062 return -1;
c3f6f71d
JM
5063 }
5064 if (after) /* Stop after r/w access is completed. */
5065 pflags |= AFTER_WATCHFLAG;
5066 }
5067
5068 if (!proc_set_watchpoint (pi, addr, len, pflags))
5069 {
5070 if (errno == E2BIG) /* Typical error for no resources */
5071 return -1; /* fail */
5072 /* GDB may try to remove the same watchpoint twice.
5073 If a remove request returns no match, don't error. */
c906108c 5074 if (errno == ESRCH && len == 0)
c3f6f71d
JM
5075 return 0; /* ignore */
5076 proc_error (pi, "set_watchpoint", __LINE__);
c906108c 5077 }
37de36c6
KB
5078#endif /* AIX5 */
5079#endif /* UNIXWARE */
c906108c
SS
5080 return 0;
5081}
5082
1e03ad20
KB
5083/* Return non-zero if we can set a hardware watchpoint of type TYPE. TYPE
5084 is one of bp_hardware_watchpoint, bp_read_watchpoint, bp_write_watchpoint,
5085 or bp_hardware_watchpoint. CNT is the number of watchpoints used so
5086 far.
19958708 5087
1e03ad20
KB
5088 Note: procfs_can_use_hw_breakpoint() is not yet used by all
5089 procfs.c targets due to the fact that some of them still define
d92524f1 5090 target_can_use_hardware_watchpoint. */
1e03ad20
KB
5091
5092static int
5093procfs_can_use_hw_breakpoint (int type, int cnt, int othertype)
5094{
1e03ad20
KB
5095 /* Due to the way that proc_set_watchpoint() is implemented, host
5096 and target pointers must be of the same size. If they are not,
5097 we can't use hardware watchpoints. This limitation is due to the
9a043c1d
AC
5098 fact that proc_set_watchpoint() calls
5099 procfs_address_to_host_pointer(); a close inspection of
5100 procfs_address_to_host_pointer will reveal that an internal error
5101 will be generated when the host and target pointer sizes are
5102 different. */
4e906f53 5103 struct type *ptr_type = builtin_type (target_gdbarch)->builtin_data_ptr;
f4a14ae6 5104
4e906f53 5105 if (sizeof (void *) != TYPE_LENGTH (ptr_type))
1e03ad20
KB
5106 return 0;
5107
5108 /* Other tests here??? */
5109
5110 return 1;
1e03ad20
KB
5111}
5112
77382aee
PA
5113/* Returns non-zero if process is stopped on a hardware watchpoint
5114 fault, else returns zero. */
c3f6f71d 5115
25513619
PA
5116static int
5117procfs_stopped_by_watchpoint (void)
c906108c 5118{
c3f6f71d 5119 procinfo *pi;
c906108c 5120
25513619 5121 pi = find_procinfo_or_die (PIDGET (inferior_ptid), 0);
aaeb7efa 5122
c3f6f71d 5123 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
c906108c 5124 {
c3f6f71d 5125 if (proc_why (pi) == PR_FAULTED)
19958708 5126 {
c906108c 5127#ifdef FLTWATCH
c3f6f71d
JM
5128 if (proc_what (pi) == FLTWATCH)
5129 return 1;
c906108c
SS
5130#endif
5131#ifdef FLTKWATCH
c3f6f71d
JM
5132 if (proc_what (pi) == FLTKWATCH)
5133 return 1;
c906108c 5134#endif
c3f6f71d 5135 }
c906108c
SS
5136 }
5137 return 0;
5138}
c906108c 5139
77382aee
PA
5140/* Returns 1 if the OS knows the position of the triggered watchpoint,
5141 and sets *ADDR to that address. Returns 0 if OS cannot report that
5142 address. This function is only called if
5143 procfs_stopped_by_watchpoint returned 1, thus no further checks are
5144 done. The function also assumes that ADDR is not NULL. */
bf701c2c
PM
5145
5146static int
5147procfs_stopped_data_address (struct target_ops *targ, CORE_ADDR *addr)
5148{
5149 procinfo *pi;
5150
5151 pi = find_procinfo_or_die (PIDGET (inferior_ptid), 0);
5152 return proc_watchpoint_address (pi, addr);
5153}
5154
25513619 5155static int
0cf6dd15
TJB
5156procfs_insert_watchpoint (CORE_ADDR addr, int len, int type,
5157 struct expression *cond)
25513619 5158{
d92524f1 5159 if (!target_have_steppable_watchpoint
a97b0ac8 5160 && !gdbarch_have_nonsteppable_watchpoint (target_gdbarch))
25513619
PA
5161 {
5162 /* When a hardware watchpoint fires off the PC will be left at
5163 the instruction following the one which caused the
5164 watchpoint. It will *NOT* be necessary for GDB to step over
5165 the watchpoint. */
5166 return procfs_set_watchpoint (inferior_ptid, addr, len, type, 1);
5167 }
5168 else
5169 {
5170 /* When a hardware watchpoint fires off the PC will be left at
5171 the instruction which caused the watchpoint. It will be
5172 necessary for GDB to step over the watchpoint. */
5173 return procfs_set_watchpoint (inferior_ptid, addr, len, type, 0);
5174 }
5175}
5176
5177static int
0cf6dd15
TJB
5178procfs_remove_watchpoint (CORE_ADDR addr, int len, int type,
5179 struct expression *cond)
25513619
PA
5180{
5181 return procfs_set_watchpoint (inferior_ptid, addr, 0, 0, 0);
5182}
5183
5184static int
5185procfs_region_ok_for_hw_watchpoint (CORE_ADDR addr, int len)
5186{
5187 /* The man page for proc(4) on Solaris 2.6 and up says that the
5188 system can support "thousands" of hardware watchpoints, but gives
5189 no method for finding out how many; It doesn't say anything about
5190 the allowed size for the watched area either. So we just tell
5191 GDB 'yes'. */
5192 return 1;
5193}
5194
5195void
5196procfs_use_watchpoints (struct target_ops *t)
5197{
5198 t->to_stopped_by_watchpoint = procfs_stopped_by_watchpoint;
5199 t->to_insert_watchpoint = procfs_insert_watchpoint;
5200 t->to_remove_watchpoint = procfs_remove_watchpoint;
5201 t->to_region_ok_for_hw_watchpoint = procfs_region_ok_for_hw_watchpoint;
d1a7880c 5202 t->to_can_use_hw_breakpoint = procfs_can_use_hw_breakpoint;
bf701c2c 5203 t->to_stopped_data_address = procfs_stopped_data_address;
25513619
PA
5204}
5205
77382aee
PA
5206/* Memory Mappings Functions: */
5207
5208/* Call a callback function once for each mapping, passing it the
5209 mapping, an optional secondary callback function, and some optional
5210 opaque data. Quit and return the first non-zero value returned
5211 from the callback.
5212
5213 PI is the procinfo struct for the process to be mapped. FUNC is
5214 the callback function to be called by this iterator. DATA is the
5215 optional opaque data to be passed to the callback function.
5216 CHILD_FUNC is the optional secondary function pointer to be passed
5217 to the child function. Returns the first non-zero return value
5218 from the callback function, or zero. */
831e682e
MS
5219
5220static int
b8edc417 5221iterate_over_mappings (procinfo *pi, find_memory_region_ftype child_func,
e9ef4f39 5222 void *data,
19958708 5223 int (*func) (struct prmap *map,
b8edc417 5224 find_memory_region_ftype child_func,
831e682e
MS
5225 void *data))
5226{
5227 char pathname[MAX_PROC_NAME_SIZE];
5228 struct prmap *prmaps;
5229 struct prmap *prmap;
5230 int funcstat;
5231 int map_fd;
5232 int nmap;
5233#ifdef NEW_PROC_API
5234 struct stat sbuf;
5235#endif
5236
19958708 5237 /* Get the number of mappings, allocate space,
831e682e
MS
5238 and read the mappings into prmaps. */
5239#ifdef NEW_PROC_API
5240 /* Open map fd. */
5241 sprintf (pathname, "/proc/%d/map", pi->pid);
5242 if ((map_fd = open (pathname, O_RDONLY)) < 0)
5243 proc_error (pi, "iterate_over_mappings (open)", __LINE__);
5244
5245 /* Make sure it gets closed again. */
5246 make_cleanup_close (map_fd);
5247
19958708 5248 /* Use stat to determine the file size, and compute
831e682e
MS
5249 the number of prmap_t objects it contains. */
5250 if (fstat (map_fd, &sbuf) != 0)
5251 proc_error (pi, "iterate_over_mappings (fstat)", __LINE__);
5252
5253 nmap = sbuf.st_size / sizeof (prmap_t);
5254 prmaps = (struct prmap *) alloca ((nmap + 1) * sizeof (*prmaps));
5255 if (read (map_fd, (char *) prmaps, nmap * sizeof (*prmaps))
5256 != (nmap * sizeof (*prmaps)))
5257 proc_error (pi, "iterate_over_mappings (read)", __LINE__);
5258#else
5259 /* Use ioctl command PIOCNMAP to get number of mappings. */
5260 if (ioctl (pi->ctl_fd, PIOCNMAP, &nmap) != 0)
5261 proc_error (pi, "iterate_over_mappings (PIOCNMAP)", __LINE__);
5262
5263 prmaps = (struct prmap *) alloca ((nmap + 1) * sizeof (*prmaps));
5264 if (ioctl (pi->ctl_fd, PIOCMAP, prmaps) != 0)
5265 proc_error (pi, "iterate_over_mappings (PIOCMAP)", __LINE__);
5266#endif
5267
5268 for (prmap = prmaps; nmap > 0; prmap++, nmap--)
5269 if ((funcstat = (*func) (prmap, child_func, data)) != 0)
5270 return funcstat;
5271
5272 return 0;
5273}
5274
77382aee 5275/* Implements the to_find_memory_regions method. Calls an external
b8edc417 5276 function for each memory region.
77382aee 5277 Returns the integer value returned by the callback. */
be4d1333
MS
5278
5279static int
19958708 5280find_memory_regions_callback (struct prmap *map,
b8edc417 5281 find_memory_region_ftype func, void *data)
be4d1333 5282{
bf75638e 5283 return (*func) ((CORE_ADDR) map->pr_vaddr,
19958708 5284 map->pr_size,
be4d1333
MS
5285 (map->pr_mflags & MA_READ) != 0,
5286 (map->pr_mflags & MA_WRITE) != 0,
19958708 5287 (map->pr_mflags & MA_EXEC) != 0,
be4d1333
MS
5288 data);
5289}
5290
77382aee
PA
5291/* External interface. Calls a callback function once for each
5292 mapped memory region in the child process, passing as arguments:
5293
5294 CORE_ADDR virtual_address,
5295 unsigned long size,
5296 int read, TRUE if region is readable by the child
5297 int write, TRUE if region is writable by the child
5298 int execute TRUE if region is executable by the child.
5299
5300 Stops iterating and returns the first non-zero value returned by
5301 the callback. */
be4d1333
MS
5302
5303static int
b8edc417 5304proc_find_memory_regions (find_memory_region_ftype func, void *data)
be4d1333
MS
5305{
5306 procinfo *pi = find_procinfo_or_die (PIDGET (inferior_ptid), 0);
5307
19958708 5308 return iterate_over_mappings (pi, func, data,
be4d1333
MS
5309 find_memory_regions_callback);
5310}
5311
77382aee 5312/* Returns an ascii representation of a memory mapping's flags. */
c3f6f71d 5313
388faa48 5314static char *
5ae5f592 5315mappingflags (long flags)
388faa48
MS
5316{
5317 static char asciiflags[8];
5318
5319 strcpy (asciiflags, "-------");
5320#if defined (MA_PHYS)
5321 if (flags & MA_PHYS)
5322 asciiflags[0] = 'd';
5323#endif
5324 if (flags & MA_STACK)
5325 asciiflags[1] = 's';
5326 if (flags & MA_BREAK)
5327 asciiflags[2] = 'b';
5328 if (flags & MA_SHARED)
5329 asciiflags[3] = 's';
5330 if (flags & MA_READ)
5331 asciiflags[4] = 'r';
5332 if (flags & MA_WRITE)
5333 asciiflags[5] = 'w';
5334 if (flags & MA_EXEC)
5335 asciiflags[6] = 'x';
5336 return (asciiflags);
5337}
5338
77382aee
PA
5339/* Callback function, does the actual work for 'info proc
5340 mappings'. */
831e682e 5341
831e682e 5342static int
b8edc417 5343info_mappings_callback (struct prmap *map, find_memory_region_ftype ignore,
e9ef4f39 5344 void *unused)
831e682e 5345{
0b62613e 5346 unsigned int pr_off;
831e682e 5347
831e682e 5348#ifdef PCAGENT /* Horrible hack: only defined on Solaris 2.6+ */
0b62613e 5349 pr_off = (unsigned int) map->pr_offset;
831e682e 5350#else
0b62613e 5351 pr_off = map->pr_off;
831e682e 5352#endif
0b62613e 5353
a97b0ac8 5354 if (gdbarch_addr_bit (target_gdbarch) == 32)
f6a96b83 5355 printf_filtered ("\t%#10lx %#10lx %#10lx %#10x %7s\n",
0b62613e
PA
5356 (unsigned long) map->pr_vaddr,
5357 (unsigned long) map->pr_vaddr + map->pr_size - 1,
f6a96b83 5358 (unsigned long) map->pr_size,
0b62613e
PA
5359 pr_off,
5360 mappingflags (map->pr_mflags));
5361 else
f6a96b83 5362 printf_filtered (" %#18lx %#18lx %#10lx %#10x %7s\n",
0b62613e
PA
5363 (unsigned long) map->pr_vaddr,
5364 (unsigned long) map->pr_vaddr + map->pr_size - 1,
f6a96b83 5365 (unsigned long) map->pr_size,
0b62613e
PA
5366 pr_off,
5367 mappingflags (map->pr_mflags));
831e682e
MS
5368
5369 return 0;
5370}
5371
77382aee 5372/* Implement the "info proc mappings" subcommand. */
388faa48
MS
5373
5374static void
5375info_proc_mappings (procinfo *pi, int summary)
5376{
388faa48
MS
5377 if (summary)
5378 return; /* No output for summary mode. */
5379
a3f17187 5380 printf_filtered (_("Mapped address spaces:\n\n"));
a97b0ac8 5381 if (gdbarch_ptr_bit (target_gdbarch) == 32)
0b62613e
PA
5382 printf_filtered ("\t%10s %10s %10s %10s %7s\n",
5383 "Start Addr",
5384 " End Addr",
5385 " Size",
5386 " Offset",
5387 "Flags");
5388 else
5389 printf_filtered (" %18s %18s %10s %10s %7s\n",
5390 "Start Addr",
5391 " End Addr",
5392 " Size",
5393 " Offset",
5394 "Flags");
388faa48 5395
831e682e 5396 iterate_over_mappings (pi, NULL, NULL, info_mappings_callback);
388faa48
MS
5397 printf_filtered ("\n");
5398}
5399
77382aee 5400/* Implement the "info proc" command. */
c3f6f71d
JM
5401
5402static void
fba45db2 5403info_proc_cmd (char *args, int from_tty)
c906108c 5404{
c3f6f71d 5405 struct cleanup *old_chain;
388faa48
MS
5406 procinfo *process = NULL;
5407 procinfo *thread = NULL;
5408 char **argv = NULL;
5409 char *tmp = NULL;
5410 int pid = 0;
5411 int tid = 0;
5412 int mappings = 0;
c906108c 5413
c3f6f71d
JM
5414 old_chain = make_cleanup (null_cleanup, 0);
5415 if (args)
0fda6bd2 5416 {
d1a41061
PP
5417 argv = gdb_buildargv (args);
5418 make_cleanup_freeargv (argv);
0fda6bd2 5419 }
c3f6f71d
JM
5420 while (argv != NULL && *argv != NULL)
5421 {
5422 if (isdigit (argv[0][0]))
5423 {
5424 pid = strtoul (argv[0], &tmp, 10);
5425 if (*tmp == '/')
5426 tid = strtoul (++tmp, NULL, 10);
5427 }
5428 else if (argv[0][0] == '/')
5429 {
5430 tid = strtoul (argv[0] + 1, NULL, 10);
5431 }
388faa48
MS
5432 else if (strncmp (argv[0], "mappings", strlen (argv[0])) == 0)
5433 {
5434 mappings = 1;
5435 }
c3f6f71d
JM
5436 else
5437 {
5438 /* [...] */
5439 }
5440 argv++;
5441 }
5442 if (pid == 0)
39f77062 5443 pid = PIDGET (inferior_ptid);
c3f6f71d 5444 if (pid == 0)
8a3fe4f8 5445 error (_("No current process: you must name one."));
c3f6f71d 5446 else
c906108c 5447 {
c3f6f71d
JM
5448 /* Have pid, will travel.
5449 First see if it's a process we're already debugging. */
5450 process = find_procinfo (pid, 0);
5451 if (process == NULL)
5452 {
19958708 5453 /* No. So open a procinfo for it, but
c3f6f71d
JM
5454 remember to close it again when finished. */
5455 process = create_procinfo (pid, 0);
004527cb 5456 make_cleanup (do_destroy_procinfo_cleanup, process);
c3f6f71d
JM
5457 if (!open_procinfo_files (process, FD_CTL))
5458 proc_error (process, "info proc, open_procinfo_files", __LINE__);
5459 }
c906108c 5460 }
c3f6f71d
JM
5461 if (tid != 0)
5462 thread = create_procinfo (pid, tid);
5463
5464 if (process)
5465 {
a3f17187 5466 printf_filtered (_("process %d flags:\n"), process->pid);
c3f6f71d
JM
5467 proc_prettyprint_flags (proc_flags (process), 1);
5468 if (proc_flags (process) & (PR_STOPPED | PR_ISTOP))
5469 proc_prettyprint_why (proc_why (process), proc_what (process), 1);
5470 if (proc_get_nthreads (process) > 1)
19958708 5471 printf_filtered ("Process has %d threads.\n",
c3f6f71d
JM
5472 proc_get_nthreads (process));
5473 }
5474 if (thread)
5475 {
a3f17187 5476 printf_filtered (_("thread %d flags:\n"), thread->tid);
c3f6f71d
JM
5477 proc_prettyprint_flags (proc_flags (thread), 1);
5478 if (proc_flags (thread) & (PR_STOPPED | PR_ISTOP))
5479 proc_prettyprint_why (proc_why (thread), proc_what (thread), 1);
5480 }
5481
388faa48
MS
5482 if (mappings)
5483 {
5484 info_proc_mappings (process, 0);
5485 }
5486
c3f6f71d 5487 do_cleanups (old_chain);
c906108c
SS
5488}
5489
9185ddce
JB
5490/* Modify the status of the system call identified by SYSCALLNUM in
5491 the set of syscalls that are currently traced/debugged.
5492
5493 If ENTRY_OR_EXIT is set to PR_SYSENTRY, then the entry syscalls set
5494 will be updated. Otherwise, the exit syscalls set will be updated.
5495
5496 If MODE is FLAG_SET, then traces will be enabled. Otherwise, they
5497 will be disabled. */
5498
5499static void
5500proc_trace_syscalls_1 (procinfo *pi, int syscallnum, int entry_or_exit,
77382aee 5501 int mode, int from_tty)
9185ddce
JB
5502{
5503 sysset_t *sysset;
77382aee 5504
9185ddce
JB
5505 if (entry_or_exit == PR_SYSENTRY)
5506 sysset = proc_get_traced_sysentry (pi, NULL);
5507 else
5508 sysset = proc_get_traced_sysexit (pi, NULL);
5509
5510 if (sysset == NULL)
5511 proc_error (pi, "proc-trace, get_traced_sysset", __LINE__);
5512
5513 if (mode == FLAG_SET)
5514 gdb_praddsysset (sysset, syscallnum);
5515 else
5516 gdb_prdelsysset (sysset, syscallnum);
5517
5518 if (entry_or_exit == PR_SYSENTRY)
5519 {
5520 if (!proc_set_traced_sysentry (pi, sysset))
77382aee 5521 proc_error (pi, "proc-trace, set_traced_sysentry", __LINE__);
9185ddce
JB
5522 }
5523 else
5524 {
5525 if (!proc_set_traced_sysexit (pi, sysset))
77382aee 5526 proc_error (pi, "proc-trace, set_traced_sysexit", __LINE__);
9185ddce
JB
5527 }
5528}
5529
c3f6f71d 5530static void
fba45db2 5531proc_trace_syscalls (char *args, int from_tty, int entry_or_exit, int mode)
c906108c 5532{
c3f6f71d 5533 procinfo *pi;
c906108c 5534
39f77062 5535 if (PIDGET (inferior_ptid) <= 0)
8a3fe4f8 5536 error (_("you must be debugging a process to use this command."));
c906108c 5537
c3f6f71d 5538 if (args == NULL || args[0] == 0)
e2e0b3e5 5539 error_no_arg (_("system call to trace"));
c3f6f71d 5540
39f77062 5541 pi = find_procinfo_or_die (PIDGET (inferior_ptid), 0);
c3f6f71d
JM
5542 if (isdigit (args[0]))
5543 {
9185ddce 5544 const int syscallnum = atoi (args);
c906108c 5545
9185ddce 5546 proc_trace_syscalls_1 (pi, syscallnum, entry_or_exit, mode, from_tty);
c3f6f71d
JM
5547 }
5548}
5549
19958708 5550static void
fba45db2 5551proc_trace_sysentry_cmd (char *args, int from_tty)
c906108c 5552{
c3f6f71d
JM
5553 proc_trace_syscalls (args, from_tty, PR_SYSENTRY, FLAG_SET);
5554}
c906108c 5555
19958708 5556static void
fba45db2 5557proc_trace_sysexit_cmd (char *args, int from_tty)
c3f6f71d
JM
5558{
5559 proc_trace_syscalls (args, from_tty, PR_SYSEXIT, FLAG_SET);
c906108c 5560}
c906108c 5561
19958708 5562static void
fba45db2 5563proc_untrace_sysentry_cmd (char *args, int from_tty)
c3f6f71d
JM
5564{
5565 proc_trace_syscalls (args, from_tty, PR_SYSENTRY, FLAG_RESET);
5566}
5567
19958708 5568static void
fba45db2 5569proc_untrace_sysexit_cmd (char *args, int from_tty)
c906108c 5570{
c3f6f71d
JM
5571 proc_trace_syscalls (args, from_tty, PR_SYSEXIT, FLAG_RESET);
5572}
c906108c 5573
c906108c 5574
c906108c 5575void
fba45db2 5576_initialize_procfs (void)
c906108c 5577{
27087a3d
JB
5578 observer_attach_inferior_created (procfs_inferior_created);
5579
1bedd215
AC
5580 add_info ("proc", info_proc_cmd, _("\
5581Show /proc process information about any running process.\n\
388faa48 5582Specify process id, or use the program being debugged by default.\n\
1bedd215 5583Specify keyword 'mappings' for detailed info on memory mappings."));
19958708 5584 add_com ("proc-trace-entry", no_class, proc_trace_sysentry_cmd,
1bedd215 5585 _("Give a trace of entries into the syscall."));
19958708 5586 add_com ("proc-trace-exit", no_class, proc_trace_sysexit_cmd,
1bedd215 5587 _("Give a trace of exits from the syscall."));
19958708 5588 add_com ("proc-untrace-entry", no_class, proc_untrace_sysentry_cmd,
1bedd215 5589 _("Cancel a trace of entries into the syscall."));
19958708 5590 add_com ("proc-untrace-exit", no_class, proc_untrace_sysexit_cmd,
1bedd215 5591 _("Cancel a trace of exits from the syscall."));
c3f6f71d
JM
5592}
5593
5594/* =================== END, GDB "MODULE" =================== */
5595
5596
5597
77382aee
PA
5598/* miscellaneous stubs: */
5599
5600/* The following satisfy a few random symbols mostly created by the
5601 solaris threads implementation, which I will chase down later. */
c3f6f71d 5602
77382aee
PA
5603/* Return a pid for which we guarantee we will be able to find a
5604 'live' procinfo. */
c3f6f71d 5605
39f77062 5606ptid_t
fba45db2 5607procfs_first_available (void)
c3f6f71d 5608{
39f77062 5609 return pid_to_ptid (procinfo_list ? procinfo_list->pid : -1);
c3f6f71d 5610}
be4d1333
MS
5611
5612/* =================== GCORE .NOTE "MODULE" =================== */
65554fef
MS
5613#if defined (UNIXWARE) || defined (PIOCOPENLWP) || defined (PCAGENT)
5614/* gcore only implemented on solaris and unixware (so far) */
be4d1333
MS
5615
5616static char *
19958708 5617procfs_do_thread_registers (bfd *obfd, ptid_t ptid,
2020b7ab
PA
5618 char *note_data, int *note_size,
5619 enum target_signal stop_signal)
be4d1333 5620{
594f7785 5621 struct regcache *regcache = get_thread_regcache (ptid);
be4d1333
MS
5622 gdb_gregset_t gregs;
5623 gdb_fpregset_t fpregs;
5624 unsigned long merged_pid;
75125405 5625 struct cleanup *old_chain;
be4d1333
MS
5626
5627 merged_pid = TIDGET (ptid) << 16 | PIDGET (ptid);
5628
75125405
DJ
5629 /* This part is the old method for fetching registers.
5630 It should be replaced by the newer one using regsets
5631 once it is implemented in this platform:
5632 gdbarch_regset_from_core_section() and regset->collect_regset(). */
5633
5634 old_chain = save_inferior_ptid ();
5635 inferior_ptid = ptid;
5636 target_fetch_registers (regcache, -1);
5637
594f7785 5638 fill_gregset (regcache, &gregs, -1);
4c490650 5639#if defined (NEW_PROC_API)
65554fef
MS
5640 note_data = (char *) elfcore_write_lwpstatus (obfd,
5641 note_data,
5642 note_size,
19958708 5643 merged_pid,
65554fef
MS
5644 stop_signal,
5645 &gregs);
5646#else
be4d1333 5647 note_data = (char *) elfcore_write_prstatus (obfd,
65554fef
MS
5648 note_data,
5649 note_size,
19958708 5650 merged_pid,
be4d1333 5651 stop_signal,
65554fef
MS
5652 &gregs);
5653#endif
594f7785 5654 fill_fpregset (regcache, &fpregs, -1);
be4d1333
MS
5655 note_data = (char *) elfcore_write_prfpreg (obfd,
5656 note_data,
5657 note_size,
5658 &fpregs,
5659 sizeof (fpregs));
75125405
DJ
5660
5661 do_cleanups (old_chain);
5662
be4d1333
MS
5663 return note_data;
5664}
5665
5666struct procfs_corefile_thread_data {
5667 bfd *obfd;
5668 char *note_data;
5669 int *note_size;
2020b7ab 5670 enum target_signal stop_signal;
be4d1333
MS
5671};
5672
5673static int
65554fef 5674procfs_corefile_thread_callback (procinfo *pi, procinfo *thread, void *data)
be4d1333
MS
5675{
5676 struct procfs_corefile_thread_data *args = data;
be4d1333 5677
2689673f 5678 if (pi != NULL)
be4d1333 5679 {
75125405 5680 ptid_t ptid = MERGEPID (pi->pid, thread->tid);
f4a14ae6 5681
75125405 5682 args->note_data = procfs_do_thread_registers (args->obfd, ptid,
19958708 5683 args->note_data,
2020b7ab
PA
5684 args->note_size,
5685 args->stop_signal);
be4d1333
MS
5686 }
5687 return 0;
5688}
5689
a223f1e7
JB
5690static int
5691find_signalled_thread (struct thread_info *info, void *data)
5692{
5693 if (info->stop_signal != TARGET_SIGNAL_0
5694 && ptid_get_pid (info->ptid) == ptid_get_pid (inferior_ptid))
5695 return 1;
5696
5697 return 0;
5698}
5699
5700static enum target_signal
5701find_stop_signal (void)
5702{
5703 struct thread_info *info =
5704 iterate_over_threads (find_signalled_thread, NULL);
5705
5706 if (info)
5707 return info->stop_signal;
5708 else
5709 return TARGET_SIGNAL_0;
5710}
5711
be4d1333
MS
5712static char *
5713procfs_make_note_section (bfd *obfd, int *note_size)
5714{
5715 struct cleanup *old_chain;
5716 gdb_gregset_t gregs;
5717 gdb_fpregset_t fpregs;
5718 char fname[16] = {'\0'};
5719 char psargs[80] = {'\0'};
5720 procinfo *pi = find_procinfo_or_die (PIDGET (inferior_ptid), 0);
5721 char *note_data = NULL;
6dbdc4a3 5722 char *inf_args;
be4d1333 5723 struct procfs_corefile_thread_data thread_args;
0b62613e 5724 gdb_byte *auxv;
4e73f23d 5725 int auxv_len;
651c8d2d 5726 enum target_signal stop_signal;
be4d1333
MS
5727
5728 if (get_exec_file (0))
5729 {
5730 strncpy (fname, strrchr (get_exec_file (0), '/') + 1, sizeof (fname));
19958708 5731 strncpy (psargs, get_exec_file (0),
be4d1333 5732 sizeof (psargs));
6dbdc4a3
MS
5733
5734 inf_args = get_inferior_args ();
5735 if (inf_args && *inf_args &&
5736 strlen (inf_args) < ((int) sizeof (psargs) - (int) strlen (psargs)))
be4d1333 5737 {
19958708 5738 strncat (psargs, " ",
be4d1333 5739 sizeof (psargs) - strlen (psargs));
19958708 5740 strncat (psargs, inf_args,
be4d1333
MS
5741 sizeof (psargs) - strlen (psargs));
5742 }
5743 }
5744
19958708
RM
5745 note_data = (char *) elfcore_write_prpsinfo (obfd,
5746 note_data,
5747 note_size,
5748 fname,
be4d1333
MS
5749 psargs);
5750
651c8d2d
PA
5751 stop_signal = find_stop_signal ();
5752
8903eff6 5753#ifdef UNIXWARE
594f7785 5754 fill_gregset (get_current_regcache (), &gregs, -1);
19958708
RM
5755 note_data = elfcore_write_pstatus (obfd, note_data, note_size,
5756 PIDGET (inferior_ptid),
65554fef
MS
5757 stop_signal, &gregs);
5758#endif
5759
be4d1333
MS
5760 thread_args.obfd = obfd;
5761 thread_args.note_data = note_data;
5762 thread_args.note_size = note_size;
651c8d2d 5763 thread_args.stop_signal = stop_signal;
65554fef
MS
5764 proc_iterate_over_threads (pi, procfs_corefile_thread_callback, &thread_args);
5765
2689673f
PA
5766 /* There should be always at least one thread. */
5767 gdb_assert (thread_args.note_data != note_data);
5768 note_data = thread_args.note_data;
be4d1333 5769
13547ab6
DJ
5770 auxv_len = target_read_alloc (&current_target, TARGET_OBJECT_AUXV,
5771 NULL, &auxv);
4e73f23d
RM
5772 if (auxv_len > 0)
5773 {
5774 note_data = elfcore_write_note (obfd, note_data, note_size,
5775 "CORE", NT_AUXV, auxv, auxv_len);
5776 xfree (auxv);
5777 }
5778
be4d1333
MS
5779 make_cleanup (xfree, note_data);
5780 return note_data;
5781}
65554fef
MS
5782#else /* !(Solaris or Unixware) */
5783static char *
5784procfs_make_note_section (bfd *obfd, int *note_size)
5785{
8a3fe4f8 5786 error (_("gcore not implemented for this host."));
65554fef
MS
5787 return NULL; /* lint */
5788}
5789#endif /* Solaris or Unixware */
be4d1333 5790/* =================== END GCORE .NOTE "MODULE" =================== */