parse_number("0") reads uninitialized memory
[deliverable/binutils-gdb.git] / gdb / procfs.c
CommitLineData
c906108c 1/* Machine independent support for SVR4 /proc (process file system) for GDB.
2555fe1a 2
ecd75fc8 3 Copyright (C) 1999-2014 Free Software Foundation, Inc.
2555fe1a 4
c3f6f71d
JM
5 Written by Michael Snyder at Cygnus Solutions.
6 Based on work by Fred Fish, Stu Grossman, Geoff Noer, and others.
c906108c 7
a9762ec7
JB
8 This file is part of GDB.
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
14
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
21 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c 22
c3f6f71d
JM
23#include "defs.h"
24#include "inferior.h"
45741a9c 25#include "infrun.h"
c3f6f71d
JM
26#include "target.h"
27#include "gdbcore.h"
65554fef 28#include "elf-bfd.h" /* for elfcore_write_* */
c3f6f71d 29#include "gdbcmd.h"
0fda6bd2 30#include "gdbthread.h"
7f7fe91e 31#include "regcache.h"
28439f5e 32#include "inf-child.h"
c906108c 33
c3f6f71d 34#if defined (NEW_PROC_API)
0df8b418 35#define _STRUCTURED_PROC 1 /* Should be done by configure script. */
c3f6f71d 36#endif
c906108c 37
c3f6f71d 38#include <sys/procfs.h>
37de36c6 39#ifdef HAVE_SYS_FAULT_H
c3f6f71d 40#include <sys/fault.h>
37de36c6
KB
41#endif
42#ifdef HAVE_SYS_SYSCALL_H
c3f6f71d 43#include <sys/syscall.h>
37de36c6 44#endif
2555fe1a 45#include "gdb_wait.h"
0fda6bd2
JM
46#include <signal.h>
47#include <ctype.h>
92107356 48#include "gdb_bfd.h"
44270758 49#include "inflow.h"
4e73f23d 50#include "auxv.h"
d1a7880c 51#include "procfs.h"
27087a3d 52#include "observer.h"
0fda6bd2 53
77382aee
PA
54/* This module provides the interface between GDB and the
55 /proc file system, which is used on many versions of Unix
56 as a means for debuggers to control other processes.
57
58 Examples of the systems that use this interface are:
59
60 Irix
61 Solaris
62 OSF
77382aee
PA
63 AIX5
64
65 /proc works by imitating a file system: you open a simulated file
66 that represents the process you wish to interact with, and perform
67 operations on that "file" in order to examine or change the state
68 of the other process.
69
70 The most important thing to know about /proc and this module is
71 that there are two very different interfaces to /proc:
72
73 One that uses the ioctl system call, and another that uses read
74 and write system calls.
75
76 This module has to support both /proc interfaces. This means that
77 there are two different ways of doing every basic operation.
78
79 In order to keep most of the code simple and clean, I have defined
80 an interface "layer" which hides all these system calls. An ifdef
81 (NEW_PROC_API) determines which interface we are using, and most or
82 all occurrances of this ifdef should be confined to this interface
83 layer. */
84
85/* Determine which /proc API we are using: The ioctl API defines
86 PIOCSTATUS, while the read/write (multiple fd) API never does. */
c906108c 87
c3f6f71d 88#ifdef NEW_PROC_API
c906108c 89#include <sys/types.h>
2978b111 90#include <dirent.h> /* opendir/readdir, for listing the LWP's */
c3f6f71d 91#endif
c906108c 92
c3f6f71d
JM
93#include <fcntl.h> /* for O_RDONLY */
94#include <unistd.h> /* for "X_OK" */
53ce3c39 95#include <sys/stat.h> /* for struct stat */
c906108c 96
103b3ef5
MS
97/* Note: procfs-utils.h must be included after the above system header
98 files, because it redefines various system calls using macros.
99 This may be incompatible with the prototype declarations. */
100
103b3ef5
MS
101#include "proc-utils.h"
102
77382aee 103/* Prototypes for supply_gregset etc. */
c60c0f5f
MS
104#include "gregset.h"
105
c3f6f71d 106/* =================== TARGET_OPS "MODULE" =================== */
c906108c 107
77382aee 108/* This module defines the GDB target vector and its methods. */
c906108c 109
c0939df1 110static void procfs_attach (struct target_ops *, const char *, int);
52554a0e 111static void procfs_detach (struct target_ops *, const char *, int);
28439f5e 112static void procfs_resume (struct target_ops *,
2ea28649 113 ptid_t, int, enum gdb_signal);
1eab8a48 114static void procfs_stop (struct target_ops *self, ptid_t);
a14ed312 115static void procfs_files_info (struct target_ops *);
28439f5e
PA
116static void procfs_fetch_registers (struct target_ops *,
117 struct regcache *, int);
118static void procfs_store_registers (struct target_ops *,
119 struct regcache *, int);
94bedb42
TT
120static void procfs_pass_signals (struct target_ops *self,
121 int, unsigned char *);
7d85a9c0 122static void procfs_kill_inferior (struct target_ops *ops);
136d6dae 123static void procfs_mourn_inferior (struct target_ops *ops);
77382aee 124static void procfs_create_inferior (struct target_ops *, char *,
136d6dae 125 char *, char **, int);
117de6a9 126static ptid_t procfs_wait (struct target_ops *,
4fcbb494 127 ptid_t, struct target_waitstatus *, int);
e96027e0
PA
128static enum target_xfer_status procfs_xfer_memory (gdb_byte *,
129 const gdb_byte *,
130 ULONGEST, ULONGEST,
131 ULONGEST *);
4ac248ca 132static target_xfer_partial_ftype procfs_xfer_partial;
a14ed312 133
28439f5e 134static int procfs_thread_alive (struct target_ops *ops, ptid_t);
a14ed312 135
d3581e61
JB
136static void procfs_find_new_threads (struct target_ops *ops);
137static char *procfs_pid_to_str (struct target_ops *, ptid_t);
c3f6f71d 138
2e73927c
TT
139static int proc_find_memory_regions (struct target_ops *self,
140 find_memory_region_ftype, void *);
be4d1333 141
fc6691b2
TT
142static char * procfs_make_note_section (struct target_ops *self,
143 bfd *, int *);
be4d1333 144
5461485a
TT
145static int procfs_can_use_hw_breakpoint (struct target_ops *self,
146 int, int, int);
1e03ad20 147
7bc112c1 148static void procfs_info_proc (struct target_ops *, const char *,
145b16a9
UW
149 enum info_proc_what);
150
c47ffbe3 151#if defined (PR_MODEL_NATIVE) && (PR_MODEL_NATIVE == PR_MODEL_LP64)
77382aee
PA
152/* When GDB is built as 64-bit application on Solaris, the auxv data
153 is presented in 64-bit format. We need to provide a custom parser
154 to handle that. */
c47ffbe3
VP
155static int
156procfs_auxv_parse (struct target_ops *ops, gdb_byte **readptr,
77382aee 157 gdb_byte *endptr, CORE_ADDR *typep, CORE_ADDR *valp)
c47ffbe3 158{
f5656ead 159 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
c47ffbe3
VP
160 gdb_byte *ptr = *readptr;
161
162 if (endptr == ptr)
163 return 0;
77382aee 164
c47ffbe3
VP
165 if (endptr - ptr < 8 * 2)
166 return -1;
167
e17a4113 168 *typep = extract_unsigned_integer (ptr, 4, byte_order);
c47ffbe3
VP
169 ptr += 8;
170 /* The size of data is always 64-bit. If the application is 32-bit,
171 it will be zero extended, as expected. */
e17a4113 172 *valp = extract_unsigned_integer (ptr, 8, byte_order);
c47ffbe3
VP
173 ptr += 8;
174
175 *readptr = ptr;
176 return 1;
177}
178#endif
179
d1a7880c 180struct target_ops *
28439f5e 181procfs_target (void)
c3f6f71d 182{
28439f5e
PA
183 struct target_ops *t = inf_child_target ();
184
77382aee
PA
185 t->to_create_inferior = procfs_create_inferior;
186 t->to_kill = procfs_kill_inferior;
187 t->to_mourn_inferior = procfs_mourn_inferior;
188 t->to_attach = procfs_attach;
189 t->to_detach = procfs_detach;
190 t->to_wait = procfs_wait;
191 t->to_resume = procfs_resume;
192 t->to_fetch_registers = procfs_fetch_registers;
193 t->to_store_registers = procfs_store_registers;
194 t->to_xfer_partial = procfs_xfer_partial;
2455069d 195 t->to_pass_signals = procfs_pass_signals;
77382aee
PA
196 t->to_files_info = procfs_files_info;
197 t->to_stop = procfs_stop;
28439f5e 198
77382aee
PA
199 t->to_find_new_threads = procfs_find_new_threads;
200 t->to_thread_alive = procfs_thread_alive;
201 t->to_pid_to_str = procfs_pid_to_str;
28439f5e 202
77382aee 203 t->to_has_thread_control = tc_schedlock;
28439f5e
PA
204 t->to_find_memory_regions = proc_find_memory_regions;
205 t->to_make_corefile_notes = procfs_make_note_section;
145b16a9 206 t->to_info_proc = procfs_info_proc;
c47ffbe3
VP
207
208#if defined(PR_MODEL_NATIVE) && (PR_MODEL_NATIVE == PR_MODEL_LP64)
28439f5e 209 t->to_auxv_parse = procfs_auxv_parse;
c47ffbe3
VP
210#endif
211
77382aee 212 t->to_magic = OPS_MAGIC;
28439f5e
PA
213
214 return t;
c3f6f71d 215}
c906108c 216
c3f6f71d
JM
217/* =================== END, TARGET_OPS "MODULE" =================== */
218
77382aee
PA
219/* World Unification:
220
221 Put any typedefs, defines etc. here that are required for the
222 unification of code that handles different versions of /proc. */
c3f6f71d
JM
223
224#ifdef NEW_PROC_API /* Solaris 7 && 8 method for watchpoints */
37de36c6 225#ifdef WA_READ
19958708 226 enum { READ_WATCHFLAG = WA_READ,
c3f6f71d
JM
227 WRITE_WATCHFLAG = WA_WRITE,
228 EXEC_WATCHFLAG = WA_EXEC,
229 AFTER_WATCHFLAG = WA_TRAPAFTER
230 };
231#endif
232#else /* Irix method for watchpoints */
19958708 233 enum { READ_WATCHFLAG = MA_READ,
c3f6f71d
JM
234 WRITE_WATCHFLAG = MA_WRITE,
235 EXEC_WATCHFLAG = MA_EXEC,
236 AFTER_WATCHFLAG = 0 /* trapafter not implemented */
237 };
238#endif
239
37de36c6
KB
240/* gdb_sigset_t */
241#ifdef HAVE_PR_SIGSET_T
242typedef pr_sigset_t gdb_sigset_t;
243#else
244typedef sigset_t gdb_sigset_t;
245#endif
246
247/* sigaction */
248#ifdef HAVE_PR_SIGACTION64_T
249typedef pr_sigaction64_t gdb_sigaction_t;
250#else
251typedef struct sigaction gdb_sigaction_t;
252#endif
253
254/* siginfo */
255#ifdef HAVE_PR_SIGINFO64_T
256typedef pr_siginfo64_t gdb_siginfo_t;
257#else
a5362b9a 258typedef siginfo_t gdb_siginfo_t;
37de36c6
KB
259#endif
260
3c95f01c
JB
261/* On mips-irix, praddset and prdelset are defined in such a way that
262 they return a value, which causes GCC to emit a -Wunused error
263 because the returned value is not used. Prevent this warning
264 by casting the return value to void. On sparc-solaris, this issue
265 does not exist because the definition of these macros already include
266 that cast to void. */
267#define gdb_praddset(sp, flag) ((void) praddset (sp, flag))
268#define gdb_prdelset(sp, flag) ((void) prdelset (sp, flag))
269
37de36c6
KB
270/* gdb_premptysysset */
271#ifdef premptysysset
272#define gdb_premptysysset premptysysset
273#else
274#define gdb_premptysysset premptyset
275#endif
276
277/* praddsysset */
278#ifdef praddsysset
279#define gdb_praddsysset praddsysset
280#else
3c95f01c 281#define gdb_praddsysset gdb_praddset
37de36c6
KB
282#endif
283
284/* prdelsysset */
285#ifdef prdelsysset
286#define gdb_prdelsysset prdelsysset
287#else
3c95f01c 288#define gdb_prdelsysset gdb_prdelset
37de36c6
KB
289#endif
290
291/* prissyssetmember */
292#ifdef prissyssetmember
293#define gdb_pr_issyssetmember prissyssetmember
294#else
295#define gdb_pr_issyssetmember prismember
296#endif
297
298/* As a feature test, saying ``#if HAVE_PRSYSENT_T'' everywhere isn't
299 as intuitively descriptive as it could be, so we'll define
300 DYNAMIC_SYSCALLS to mean the same thing. Anyway, at the time of
301 this writing, this feature is only found on AIX5 systems and
302 basically means that the set of syscalls is not fixed. I.e,
303 there's no nice table that one can #include to get all of the
304 syscall numbers. Instead, they're stored in /proc/PID/sysent
305 for each process. We are at least guaranteed that they won't
306 change over the lifetime of the process. But each process could
77382aee 307 (in theory) have different syscall numbers. */
37de36c6
KB
308#ifdef HAVE_PRSYSENT_T
309#define DYNAMIC_SYSCALLS
310#endif
c3f6f71d
JM
311
312
313
314/* =================== STRUCT PROCINFO "MODULE" =================== */
315
316 /* FIXME: this comment will soon be out of date W.R.T. threads. */
317
318/* The procinfo struct is a wrapper to hold all the state information
319 concerning a /proc process. There should be exactly one procinfo
320 for each process, and since GDB currently can debug only one
321 process at a time, that means there should be only one procinfo.
322 All of the LWP's of a process can be accessed indirectly thru the
323 single process procinfo.
324
325 However, against the day when GDB may debug more than one process,
326 this data structure is kept in a list (which for now will hold no
327 more than one member), and many functions will have a pointer to a
328 procinfo as an argument.
329
330 There will be a separate procinfo structure for use by the (not yet
331 implemented) "info proc" command, so that we can print useful
332 information about any random process without interfering with the
0df8b418 333 inferior's procinfo information. */
c3f6f71d
JM
334
335#ifdef NEW_PROC_API
336/* format strings for /proc paths */
337# ifndef CTL_PROC_NAME_FMT
338# define MAIN_PROC_NAME_FMT "/proc/%d"
339# define CTL_PROC_NAME_FMT "/proc/%d/ctl"
340# define AS_PROC_NAME_FMT "/proc/%d/as"
341# define MAP_PROC_NAME_FMT "/proc/%d/map"
342# define STATUS_PROC_NAME_FMT "/proc/%d/status"
343# define MAX_PROC_NAME_SIZE sizeof("/proc/99999/lwp/8096/lstatus")
344# endif
345/* the name of the proc status struct depends on the implementation */
346typedef pstatus_t gdb_prstatus_t;
347typedef lwpstatus_t gdb_lwpstatus_t;
348#else /* ! NEW_PROC_API */
349/* format strings for /proc paths */
350# ifndef CTL_PROC_NAME_FMT
351# define MAIN_PROC_NAME_FMT "/proc/%05d"
352# define CTL_PROC_NAME_FMT "/proc/%05d"
353# define AS_PROC_NAME_FMT "/proc/%05d"
354# define MAP_PROC_NAME_FMT "/proc/%05d"
355# define STATUS_PROC_NAME_FMT "/proc/%05d"
356# define MAX_PROC_NAME_SIZE sizeof("/proc/ttttppppp")
357# endif
0df8b418 358/* The name of the proc status struct depends on the implementation. */
c5aa993b 359typedef prstatus_t gdb_prstatus_t;
c3f6f71d
JM
360typedef prstatus_t gdb_lwpstatus_t;
361#endif /* NEW_PROC_API */
c906108c 362
c3f6f71d
JM
363typedef struct procinfo {
364 struct procinfo *next;
365 int pid; /* Process ID */
366 int tid; /* Thread/LWP id */
c906108c 367
c3f6f71d
JM
368 /* process state */
369 int was_stopped;
370 int ignore_next_sigstop;
c906108c 371
19958708 372 /* The following four fd fields may be identical, or may contain
c3f6f71d
JM
373 several different fd's, depending on the version of /proc
374 (old ioctl or new read/write). */
c906108c 375
c3f6f71d 376 int ctl_fd; /* File descriptor for /proc control file */
77382aee
PA
377
378 /* The next three file descriptors are actually only needed in the
379 read/write, multiple-file-descriptor implemenation
380 (NEW_PROC_API). However, to avoid a bunch of #ifdefs in the
381 code, we will use them uniformly by (in the case of the ioctl
382 single-file-descriptor implementation) filling them with copies
383 of the control fd. */
c3f6f71d
JM
384 int status_fd; /* File descriptor for /proc status file */
385 int as_fd; /* File descriptor for /proc as file */
c906108c 386
c3f6f71d 387 char pathname[MAX_PROC_NAME_SIZE]; /* Pathname to /proc entry */
c906108c 388
c3f6f71d 389 fltset_t saved_fltset; /* Saved traced hardware fault set */
37de36c6
KB
390 gdb_sigset_t saved_sigset; /* Saved traced signal set */
391 gdb_sigset_t saved_sighold; /* Saved held signal set */
392 sysset_t *saved_exitset; /* Saved traced system call exit set */
393 sysset_t *saved_entryset; /* Saved traced system call entry set */
c906108c 394
c3f6f71d 395 gdb_prstatus_t prstatus; /* Current process status info */
c906108c 396
c3f6f71d
JM
397#ifndef NEW_PROC_API
398 gdb_fpregset_t fpregset; /* Current floating point registers */
c5aa993b 399#endif
37de36c6
KB
400
401#ifdef DYNAMIC_SYSCALLS
402 int num_syscalls; /* Total number of syscalls */
403 char **syscall_names; /* Syscall number to name map */
404#endif
19958708 405
c3f6f71d 406 struct procinfo *thread_list;
c906108c 407
c3f6f71d
JM
408 int status_valid : 1;
409 int gregs_valid : 1;
410 int fpregs_valid : 1;
411 int threads_valid: 1;
412} procinfo;
c906108c 413
c3f6f71d 414static char errmsg[128]; /* shared error msg buffer */
c906108c 415
c3f6f71d 416/* Function prototypes for procinfo module: */
c906108c 417
a14ed312
KB
418static procinfo *find_procinfo_or_die (int pid, int tid);
419static procinfo *find_procinfo (int pid, int tid);
420static procinfo *create_procinfo (int pid, int tid);
421static void destroy_procinfo (procinfo * p);
004527cb 422static void do_destroy_procinfo_cleanup (void *);
a14ed312
KB
423static void dead_procinfo (procinfo * p, char *msg, int killp);
424static int open_procinfo_files (procinfo * p, int which);
425static void close_procinfo_files (procinfo * p);
37de36c6
KB
426static int sysset_t_size (procinfo *p);
427static sysset_t *sysset_t_alloc (procinfo * pi);
428#ifdef DYNAMIC_SYSCALLS
429static void load_syscalls (procinfo *pi);
430static void free_syscalls (procinfo *pi);
431static int find_syscall (procinfo *pi, char *name);
432#endif /* DYNAMIC_SYSCALLS */
c906108c 433
e9ef4f39 434static int iterate_over_mappings
b8edc417
JK
435 (procinfo *pi, find_memory_region_ftype child_func, void *data,
436 int (*func) (struct prmap *map, find_memory_region_ftype child_func,
77382aee 437 void *data));
e9ef4f39 438
c3f6f71d
JM
439/* The head of the procinfo list: */
440static procinfo * procinfo_list;
c906108c 441
77382aee
PA
442/* Search the procinfo list. Return a pointer to procinfo, or NULL if
443 not found. */
c906108c 444
19958708 445static procinfo *
fba45db2 446find_procinfo (int pid, int tid)
c5aa993b 447{
c3f6f71d 448 procinfo *pi;
c906108c 449
c3f6f71d
JM
450 for (pi = procinfo_list; pi; pi = pi->next)
451 if (pi->pid == pid)
452 break;
c906108c 453
c3f6f71d
JM
454 if (pi)
455 if (tid)
456 {
457 /* Don't check threads_valid. If we're updating the
458 thread_list, we want to find whatever threads are already
459 here. This means that in general it is the caller's
460 responsibility to check threads_valid and update before
461 calling find_procinfo, if the caller wants to find a new
77382aee 462 thread. */
c3f6f71d
JM
463
464 for (pi = pi->thread_list; pi; pi = pi->next)
465 if (pi->tid == tid)
466 break;
467 }
c906108c 468
c3f6f71d
JM
469 return pi;
470}
c906108c 471
77382aee 472/* Calls find_procinfo, but errors on failure. */
c906108c 473
c3f6f71d 474static procinfo *
fba45db2 475find_procinfo_or_die (int pid, int tid)
c3f6f71d
JM
476{
477 procinfo *pi = find_procinfo (pid, tid);
c906108c 478
c3f6f71d 479 if (pi == NULL)
0fda6bd2
JM
480 {
481 if (tid)
3e43a32a
MS
482 error (_("procfs: couldn't find pid %d "
483 "(kernel thread %d) in procinfo list."),
0fda6bd2
JM
484 pid, tid);
485 else
8a3fe4f8 486 error (_("procfs: couldn't find pid %d in procinfo list."), pid);
0fda6bd2 487 }
c3f6f71d
JM
488 return pi;
489}
c906108c 490
77382aee
PA
491/* Wrapper for `open'. The appropriate open call is attempted; if
492 unsuccessful, it will be retried as many times as needed for the
493 EAGAIN and EINTR conditions.
19958708 494
77382aee
PA
495 For other conditions, retry the open a limited number of times. In
496 addition, a short sleep is imposed prior to retrying the open. The
497 reason for this sleep is to give the kernel a chance to catch up
498 and create the file in question in the event that GDB "wins" the
499 race to open a file before the kernel has created it. */
19958708 500
4d1bcd09
KB
501static int
502open_with_retry (const char *pathname, int flags)
503{
504 int retries_remaining, status;
505
506 retries_remaining = 2;
507
508 while (1)
509 {
510 status = open (pathname, flags);
511
512 if (status >= 0 || retries_remaining == 0)
513 break;
514 else if (errno != EINTR && errno != EAGAIN)
515 {
516 retries_remaining--;
517 sleep (1);
518 }
519 }
520
521 return status;
522}
523
77382aee
PA
524/* Open the file descriptor for the process or LWP. If NEW_PROC_API
525 is defined, we only open the control file descriptor; the others
526 are opened lazily as needed. Otherwise (if not NEW_PROC_API),
527 there is only one real file descriptor, but we keep multiple copies
528 of it so that the code that uses them does not have to be #ifdef'd.
529 Returns the file descriptor, or zero for failure. */
c906108c 530
c3f6f71d 531enum { FD_CTL, FD_STATUS, FD_AS };
c906108c 532
c3f6f71d 533static int
fba45db2 534open_procinfo_files (procinfo *pi, int which)
c3f6f71d 535{
0fda6bd2 536#ifdef NEW_PROC_API
c3f6f71d 537 char tmp[MAX_PROC_NAME_SIZE];
0fda6bd2 538#endif
c3f6f71d
JM
539 int fd;
540
77382aee
PA
541 /* This function is getting ALMOST long enough to break up into
542 several. Here is some rationale:
543
05b4bd79 544 NEW_PROC_API (Solaris 2.6, Solaris 2.7):
77382aee
PA
545 There are several file descriptors that may need to be open
546 for any given process or LWP. The ones we're intereted in are:
547 - control (ctl) write-only change the state
548 - status (status) read-only query the state
549 - address space (as) read/write access memory
550 - map (map) read-only virtual addr map
551 Most of these are opened lazily as they are needed.
552 The pathnames for the 'files' for an LWP look slightly
553 different from those of a first-class process:
554 Pathnames for a process (<proc-id>):
555 /proc/<proc-id>/ctl
556 /proc/<proc-id>/status
557 /proc/<proc-id>/as
558 /proc/<proc-id>/map
559 Pathnames for an LWP (lwp-id):
560 /proc/<proc-id>/lwp/<lwp-id>/lwpctl
561 /proc/<proc-id>/lwp/<lwp-id>/lwpstatus
562 An LWP has no map or address space file descriptor, since
563 the memory map and address space are shared by all LWPs.
564
565 Everyone else (Solaris 2.5, Irix, OSF)
566 There is only one file descriptor for each process or LWP.
567 For convenience, we copy the same file descriptor into all
568 three fields of the procinfo struct (ctl_fd, status_fd, and
569 as_fd, see NEW_PROC_API above) so that code that uses them
570 doesn't need any #ifdef's.
571 Pathname for all:
572 /proc/<proc-id>
573
574 Solaris 2.5 LWP's:
575 Each LWP has an independent file descriptor, but these
576 are not obtained via the 'open' system call like the rest:
577 instead, they're obtained thru an ioctl call (PIOCOPENLWP)
578 to the file descriptor of the parent process.
579
580 OSF threads:
581 These do not even have their own independent file descriptor.
582 All operations are carried out on the file descriptor of the
583 parent process. Therefore we just call open again for each
0df8b418 584 thread, getting a new handle for the same 'file'. */
c3f6f71d
JM
585
586#ifdef NEW_PROC_API
77382aee
PA
587 /* In this case, there are several different file descriptors that
588 we might be asked to open. The control file descriptor will be
589 opened early, but the others will be opened lazily as they are
590 needed. */
c3f6f71d
JM
591
592 strcpy (tmp, pi->pathname);
0df8b418 593 switch (which) { /* Which file descriptor to open? */
c3f6f71d
JM
594 case FD_CTL:
595 if (pi->tid)
596 strcat (tmp, "/lwpctl");
597 else
598 strcat (tmp, "/ctl");
4d1bcd09 599 fd = open_with_retry (tmp, O_WRONLY);
e28cade7 600 if (fd < 0)
c3f6f71d
JM
601 return 0; /* fail */
602 pi->ctl_fd = fd;
603 break;
604 case FD_AS:
605 if (pi->tid)
0df8b418 606 return 0; /* There is no 'as' file descriptor for an lwp. */
c3f6f71d 607 strcat (tmp, "/as");
4d1bcd09 608 fd = open_with_retry (tmp, O_RDWR);
e28cade7 609 if (fd < 0)
c3f6f71d
JM
610 return 0; /* fail */
611 pi->as_fd = fd;
612 break;
613 case FD_STATUS:
614 if (pi->tid)
615 strcat (tmp, "/lwpstatus");
616 else
617 strcat (tmp, "/status");
4d1bcd09 618 fd = open_with_retry (tmp, O_RDONLY);
e28cade7 619 if (fd < 0)
c3f6f71d
JM
620 return 0; /* fail */
621 pi->status_fd = fd;
622 break;
623 default:
624 return 0; /* unknown file descriptor */
625 }
626#else /* not NEW_PROC_API */
77382aee
PA
627 /* In this case, there is only one file descriptor for each procinfo
628 (ie. each process or LWP). In fact, only the file descriptor for
629 the process can actually be opened by an 'open' system call. The
630 ones for the LWPs have to be obtained thru an IOCTL call on the
631 process's file descriptor.
632
633 For convenience, we copy each procinfo's single file descriptor
634 into all of the fields occupied by the several file descriptors
635 of the NEW_PROC_API implementation. That way, the code that uses
636 them can be written without ifdefs. */
c3f6f71d
JM
637
638
639#ifdef PIOCTSTATUS /* OSF */
0df8b418 640 /* Only one FD; just open it. */
e28cade7 641 if ((fd = open_with_retry (pi->pathname, O_RDWR)) < 0)
c3f6f71d 642 return 0;
0df8b418 643#else /* Sol 2.5, Irix, other? */
c3f6f71d
JM
644 if (pi->tid == 0) /* Master procinfo for the process */
645 {
4d1bcd09 646 fd = open_with_retry (pi->pathname, O_RDWR);
e28cade7 647 if (fd < 0)
c3f6f71d
JM
648 return 0; /* fail */
649 }
650 else /* LWP thread procinfo */
651 {
652#ifdef PIOCOPENLWP /* Sol 2.5, thread/LWP */
653 procinfo *process;
654 int lwpid = pi->tid;
655
0df8b418 656 /* Find the procinfo for the entire process. */
c3f6f71d
JM
657 if ((process = find_procinfo (pi->pid, 0)) == NULL)
658 return 0; /* fail */
659
0df8b418 660 /* Now obtain the file descriptor for the LWP. */
e28cade7 661 if ((fd = ioctl (process->ctl_fd, PIOCOPENLWP, &lwpid)) < 0)
c3f6f71d 662 return 0; /* fail */
0df8b418
MS
663#else /* Irix, other? */
664 return 0; /* Don't know how to open threads. */
c3f6f71d
JM
665#endif /* Sol 2.5 PIOCOPENLWP */
666 }
667#endif /* OSF PIOCTSTATUS */
668 pi->ctl_fd = pi->as_fd = pi->status_fd = fd;
669#endif /* NEW_PROC_API */
c906108c 670
c3f6f71d
JM
671 return 1; /* success */
672}
c906108c 673
77382aee
PA
674/* Allocate a data structure and link it into the procinfo list.
675 First tries to find a pre-existing one (FIXME: why?). Returns the
676 pointer to new procinfo struct. */
c906108c 677
c3f6f71d 678static procinfo *
fba45db2 679create_procinfo (int pid, int tid)
c3f6f71d 680{
0b62613e 681 procinfo *pi, *parent = NULL;
c906108c 682
0d06e24b 683 if ((pi = find_procinfo (pid, tid)))
0df8b418 684 return pi; /* Already exists, nothing to do. */
c906108c 685
0df8b418 686 /* Find parent before doing malloc, to save having to cleanup. */
c3f6f71d
JM
687 if (tid != 0)
688 parent = find_procinfo_or_die (pid, 0); /* FIXME: should I
689 create it if it
0df8b418 690 doesn't exist yet? */
c906108c 691
c3f6f71d
JM
692 pi = (procinfo *) xmalloc (sizeof (procinfo));
693 memset (pi, 0, sizeof (procinfo));
694 pi->pid = pid;
695 pi->tid = tid;
c906108c 696
37de36c6
KB
697#ifdef DYNAMIC_SYSCALLS
698 load_syscalls (pi);
699#endif
700
1d5e0602
KB
701 pi->saved_entryset = sysset_t_alloc (pi);
702 pi->saved_exitset = sysset_t_alloc (pi);
703
c3f6f71d
JM
704 /* Chain into list. */
705 if (tid == 0)
706 {
707 sprintf (pi->pathname, MAIN_PROC_NAME_FMT, pid);
708 pi->next = procinfo_list;
709 procinfo_list = pi;
710 }
711 else
712 {
713#ifdef NEW_PROC_API
714 sprintf (pi->pathname, "/proc/%05d/lwp/%d", pid, tid);
715#else
716 sprintf (pi->pathname, MAIN_PROC_NAME_FMT, pid);
717#endif
718 pi->next = parent->thread_list;
719 parent->thread_list = pi;
720 }
721 return pi;
722}
c906108c 723
77382aee 724/* Close all file descriptors associated with the procinfo. */
c906108c 725
c3f6f71d 726static void
fba45db2 727close_procinfo_files (procinfo *pi)
c3f6f71d
JM
728{
729 if (pi->ctl_fd > 0)
730 close (pi->ctl_fd);
731#ifdef NEW_PROC_API
732 if (pi->as_fd > 0)
733 close (pi->as_fd);
734 if (pi->status_fd > 0)
735 close (pi->status_fd);
736#endif
737 pi->ctl_fd = pi->as_fd = pi->status_fd = 0;
738}
c906108c 739
77382aee 740/* Destructor function. Close, unlink and deallocate the object. */
c906108c 741
c3f6f71d 742static void
fba45db2 743destroy_one_procinfo (procinfo **list, procinfo *pi)
c3f6f71d
JM
744{
745 procinfo *ptr;
746
77382aee 747 /* Step one: unlink the procinfo from its list. */
c3f6f71d
JM
748 if (pi == *list)
749 *list = pi->next;
19958708 750 else
c3f6f71d
JM
751 for (ptr = *list; ptr; ptr = ptr->next)
752 if (ptr->next == pi)
753 {
754 ptr->next = pi->next;
755 break;
756 }
7a292a7a 757
77382aee 758 /* Step two: close any open file descriptors. */
c3f6f71d 759 close_procinfo_files (pi);
7a292a7a 760
77382aee 761 /* Step three: free the memory. */
37de36c6
KB
762#ifdef DYNAMIC_SYSCALLS
763 free_syscalls (pi);
764#endif
1d5e0602
KB
765 xfree (pi->saved_entryset);
766 xfree (pi->saved_exitset);
b8c9b27d 767 xfree (pi);
c3f6f71d 768}
c906108c 769
c3f6f71d 770static void
fba45db2 771destroy_procinfo (procinfo *pi)
c3f6f71d
JM
772{
773 procinfo *tmp;
c906108c 774
0df8b418 775 if (pi->tid != 0) /* Destroy a thread procinfo. */
c3f6f71d 776 {
0df8b418 777 tmp = find_procinfo (pi->pid, 0); /* Find the parent process. */
c3f6f71d
JM
778 destroy_one_procinfo (&tmp->thread_list, pi);
779 }
0df8b418 780 else /* Destroy a process procinfo and all its threads. */
c3f6f71d
JM
781 {
782 /* First destroy the children, if any; */
783 while (pi->thread_list != NULL)
784 destroy_one_procinfo (&pi->thread_list, pi->thread_list);
785 /* Then destroy the parent. Genocide!!! */
786 destroy_one_procinfo (&procinfo_list, pi);
787 }
788}
c906108c 789
004527cb
AC
790static void
791do_destroy_procinfo_cleanup (void *pi)
792{
793 destroy_procinfo (pi);
794}
795
c3f6f71d 796enum { NOKILL, KILL };
c906108c 797
77382aee
PA
798/* To be called on a non_recoverable error for a procinfo. Prints
799 error messages, optionally sends a SIGKILL to the process, then
800 destroys the data structure. */
c906108c 801
c3f6f71d 802static void
fba45db2 803dead_procinfo (procinfo *pi, char *msg, int kill_p)
c3f6f71d
JM
804{
805 char procfile[80];
c906108c 806
c3f6f71d
JM
807 if (pi->pathname)
808 {
809 print_sys_errmsg (pi->pathname, errno);
810 }
811 else
812 {
813 sprintf (procfile, "process %d", pi->pid);
814 print_sys_errmsg (procfile, errno);
815 }
816 if (kill_p == KILL)
817 kill (pi->pid, SIGKILL);
c906108c 818
c3f6f71d 819 destroy_procinfo (pi);
0b62613e 820 error ("%s", msg);
c3f6f71d 821}
c906108c 822
77382aee
PA
823/* Returns the (complete) size of a sysset_t struct. Normally, this
824 is just sizeof (sysset_t), but in the case of Monterey/64, the
825 actual size of sysset_t isn't known until runtime. */
37de36c6
KB
826
827static int
828sysset_t_size (procinfo * pi)
829{
830#ifndef DYNAMIC_SYSCALLS
831 return sizeof (sysset_t);
832#else
833 return sizeof (sysset_t) - sizeof (uint64_t)
834 + sizeof (uint64_t) * ((pi->num_syscalls + (8 * sizeof (uint64_t) - 1))
835 / (8 * sizeof (uint64_t)));
836#endif
837}
838
77382aee 839/* Allocate and (partially) initialize a sysset_t struct. */
37de36c6
KB
840
841static sysset_t *
842sysset_t_alloc (procinfo * pi)
843{
844 sysset_t *ret;
845 int size = sysset_t_size (pi);
f4a14ae6 846
37de36c6
KB
847 ret = xmalloc (size);
848#ifdef DYNAMIC_SYSCALLS
77382aee
PA
849 ret->pr_size = ((pi->num_syscalls + (8 * sizeof (uint64_t) - 1))
850 / (8 * sizeof (uint64_t)));
37de36c6
KB
851#endif
852 return ret;
853}
854
855#ifdef DYNAMIC_SYSCALLS
856
77382aee 857/* Extract syscall numbers and names from /proc/<pid>/sysent. Initialize
37de36c6
KB
858 pi->num_syscalls with the number of syscalls and pi->syscall_names
859 with the names. (Certain numbers may be skipped in which case the
0df8b418 860 names for these numbers will be left as NULL.) */
37de36c6
KB
861
862#define MAX_SYSCALL_NAME_LENGTH 256
863#define MAX_SYSCALLS 65536
864
865static void
866load_syscalls (procinfo *pi)
867{
868 char pathname[MAX_PROC_NAME_SIZE];
869 int sysent_fd;
870 prsysent_t header;
871 prsyscall_t *syscalls;
872 int i, size, maxcall;
e28cade7 873 struct cleanup *cleanups;
37de36c6
KB
874
875 pi->num_syscalls = 0;
876 pi->syscall_names = 0;
877
77382aee 878 /* Open the file descriptor for the sysent file. */
37de36c6 879 sprintf (pathname, "/proc/%d/sysent", pi->pid);
4d1bcd09 880 sysent_fd = open_with_retry (pathname, O_RDONLY);
37de36c6
KB
881 if (sysent_fd < 0)
882 {
8a3fe4f8 883 error (_("load_syscalls: Can't open /proc/%d/sysent"), pi->pid);
37de36c6 884 }
e28cade7 885 cleanups = make_cleanup_close (sysent_fd);
37de36c6
KB
886
887 size = sizeof header - sizeof (prsyscall_t);
888 if (read (sysent_fd, &header, size) != size)
889 {
8a3fe4f8 890 error (_("load_syscalls: Error reading /proc/%d/sysent"), pi->pid);
37de36c6
KB
891 }
892
893 if (header.pr_nsyscalls == 0)
894 {
3e43a32a
MS
895 error (_("load_syscalls: /proc/%d/sysent contains no syscalls!"),
896 pi->pid);
37de36c6
KB
897 }
898
899 size = header.pr_nsyscalls * sizeof (prsyscall_t);
900 syscalls = xmalloc (size);
e28cade7 901 make_cleanup (free_current_contents, &syscalls);
37de36c6
KB
902
903 if (read (sysent_fd, syscalls, size) != size)
e28cade7 904 error (_("load_syscalls: Error reading /proc/%d/sysent"), pi->pid);
37de36c6
KB
905
906 /* Find maximum syscall number. This may not be the same as
907 pr_nsyscalls since that value refers to the number of entries
908 in the table. (Also, the docs indicate that some system
0df8b418 909 call numbers may be skipped.) */
37de36c6
KB
910
911 maxcall = syscalls[0].pr_number;
912
913 for (i = 1; i < header.pr_nsyscalls; i++)
914 if (syscalls[i].pr_number > maxcall
77382aee 915 && syscalls[i].pr_nameoff > 0
37de36c6
KB
916 && syscalls[i].pr_number < MAX_SYSCALLS)
917 maxcall = syscalls[i].pr_number;
918
919 pi->num_syscalls = maxcall+1;
920 pi->syscall_names = xmalloc (pi->num_syscalls * sizeof (char *));
921
922 for (i = 0; i < pi->num_syscalls; i++)
923 pi->syscall_names[i] = NULL;
924
77382aee 925 /* Read the syscall names in. */
37de36c6
KB
926 for (i = 0; i < header.pr_nsyscalls; i++)
927 {
928 char namebuf[MAX_SYSCALL_NAME_LENGTH];
929 int nread;
930 int callnum;
931
932 if (syscalls[i].pr_number >= MAX_SYSCALLS
77382aee 933 || syscalls[i].pr_number < 0
37de36c6
KB
934 || syscalls[i].pr_nameoff <= 0
935 || (lseek (sysent_fd, (off_t) syscalls[i].pr_nameoff, SEEK_SET)
77382aee 936 != (off_t) syscalls[i].pr_nameoff))
37de36c6
KB
937 continue;
938
939 nread = read (sysent_fd, namebuf, sizeof namebuf);
940 if (nread <= 0)
941 continue;
942
943 callnum = syscalls[i].pr_number;
944
945 if (pi->syscall_names[callnum] != NULL)
946 {
0df8b418 947 /* FIXME: Generate warning. */
37de36c6
KB
948 continue;
949 }
950
951 namebuf[nread-1] = '\0';
952 size = strlen (namebuf) + 1;
953 pi->syscall_names[callnum] = xmalloc (size);
954 strncpy (pi->syscall_names[callnum], namebuf, size-1);
955 pi->syscall_names[callnum][size-1] = '\0';
956 }
19958708 957
e28cade7 958 do_cleanups (cleanups);
37de36c6
KB
959}
960
77382aee 961/* Free the space allocated for the syscall names from the procinfo
37de36c6
KB
962 structure. */
963
964static void
965free_syscalls (procinfo *pi)
966{
967 if (pi->syscall_names)
968 {
969 int i;
970
971 for (i = 0; i < pi->num_syscalls; i++)
972 if (pi->syscall_names[i] != NULL)
973 xfree (pi->syscall_names[i]);
974
975 xfree (pi->syscall_names);
976 pi->syscall_names = 0;
977 }
978}
979
77382aee 980/* Given a name, look up (and return) the corresponding syscall number.
37de36c6 981 If no match is found, return -1. */
19958708 982
37de36c6
KB
983static int
984find_syscall (procinfo *pi, char *name)
985{
986 int i;
f4a14ae6 987
37de36c6
KB
988 for (i = 0; i < pi->num_syscalls; i++)
989 {
990 if (pi->syscall_names[i] && strcmp (name, pi->syscall_names[i]) == 0)
991 return i;
992 }
993 return -1;
994}
995#endif
996
c3f6f71d 997/* =================== END, STRUCT PROCINFO "MODULE" =================== */
c906108c 998
c3f6f71d 999/* =================== /proc "MODULE" =================== */
c906108c 1000
77382aee
PA
1001/* This "module" is the interface layer between the /proc system API
1002 and the gdb target vector functions. This layer consists of access
1003 functions that encapsulate each of the basic operations that we
1004 need to use from the /proc API.
1005
1006 The main motivation for this layer is to hide the fact that there
1007 are two very different implementations of the /proc API. Rather
1008 than have a bunch of #ifdefs all thru the gdb target vector
1009 functions, we do our best to hide them all in here. */
c906108c 1010
d3581e61
JB
1011static long proc_flags (procinfo * pi);
1012static int proc_why (procinfo * pi);
1013static int proc_what (procinfo * pi);
1014static int proc_set_current_signal (procinfo * pi, int signo);
1015static int proc_get_current_thread (procinfo * pi);
1016static int proc_iterate_over_threads
1017 (procinfo * pi,
1018 int (*func) (procinfo *, procinfo *, void *),
1019 void *ptr);
1020
1021static void
fba45db2 1022proc_warn (procinfo *pi, char *func, int line)
c3f6f71d
JM
1023{
1024 sprintf (errmsg, "procfs: %s line %d, %s", func, line, pi->pathname);
1025 print_sys_errmsg (errmsg, errno);
1026}
c906108c 1027
d3581e61 1028static void
fba45db2 1029proc_error (procinfo *pi, char *func, int line)
c3f6f71d
JM
1030{
1031 sprintf (errmsg, "procfs: %s line %d, %s", func, line, pi->pathname);
1032 perror_with_name (errmsg);
1033}
c906108c 1034
77382aee
PA
1035/* Updates the status struct in the procinfo. There is a 'valid'
1036 flag, to let other functions know when this function needs to be
1037 called (so the status is only read when it is needed). The status
1038 file descriptor is also only opened when it is needed. Returns
1039 non-zero for success, zero for failure. */
c906108c 1040
d3581e61 1041static int
fba45db2 1042proc_get_status (procinfo *pi)
c3f6f71d 1043{
0df8b418 1044 /* Status file descriptor is opened "lazily". */
c3f6f71d
JM
1045 if (pi->status_fd == 0 &&
1046 open_procinfo_files (pi, FD_STATUS) == 0)
1047 {
1048 pi->status_valid = 0;
1049 return 0;
1050 }
c906108c 1051
c3f6f71d
JM
1052#ifdef NEW_PROC_API
1053 if (lseek (pi->status_fd, 0, SEEK_SET) < 0)
1054 pi->status_valid = 0; /* fail */
1055 else
1056 {
19958708 1057 /* Sigh... I have to read a different data structure,
0df8b418 1058 depending on whether this is a main process or an LWP. */
c3f6f71d 1059 if (pi->tid)
19958708
RM
1060 pi->status_valid = (read (pi->status_fd,
1061 (char *) &pi->prstatus.pr_lwp,
c3f6f71d
JM
1062 sizeof (lwpstatus_t))
1063 == sizeof (lwpstatus_t));
1064 else
1065 {
19958708 1066 pi->status_valid = (read (pi->status_fd,
c3f6f71d
JM
1067 (char *) &pi->prstatus,
1068 sizeof (gdb_prstatus_t))
1069 == sizeof (gdb_prstatus_t));
c3f6f71d
JM
1070 }
1071 }
1072#else /* ioctl method */
1073#ifdef PIOCTSTATUS /* osf */
1074 if (pi->tid == 0) /* main process */
1075 {
0df8b418 1076 /* Just read the danged status. Now isn't that simple? */
19958708 1077 pi->status_valid =
c3f6f71d
JM
1078 (ioctl (pi->status_fd, PIOCSTATUS, &pi->prstatus) >= 0);
1079 }
1080 else
1081 {
1082 int win;
1083 struct {
1084 long pr_count;
1085 tid_t pr_error_thread;
1086 struct prstatus status;
1087 } thread_status;
1088
1089 thread_status.pr_count = 1;
1090 thread_status.status.pr_tid = pi->tid;
1091 win = (ioctl (pi->status_fd, PIOCTSTATUS, &thread_status) >= 0);
1092 if (win)
1093 {
19958708 1094 memcpy (&pi->prstatus, &thread_status.status,
c3f6f71d
JM
1095 sizeof (pi->prstatus));
1096 pi->status_valid = 1;
1097 }
1098 }
1099#else
77382aee 1100 /* Just read the danged status. Now isn't that simple? */
c3f6f71d
JM
1101 pi->status_valid = (ioctl (pi->status_fd, PIOCSTATUS, &pi->prstatus) >= 0);
1102#endif
1103#endif
c906108c 1104
c3f6f71d
JM
1105 if (pi->status_valid)
1106 {
19958708 1107 PROC_PRETTYFPRINT_STATUS (proc_flags (pi),
c3f6f71d 1108 proc_why (pi),
19958708 1109 proc_what (pi),
c3f6f71d
JM
1110 proc_get_current_thread (pi));
1111 }
c906108c 1112
77382aee 1113 /* The status struct includes general regs, so mark them valid too. */
c3f6f71d
JM
1114 pi->gregs_valid = pi->status_valid;
1115#ifdef NEW_PROC_API
77382aee
PA
1116 /* In the read/write multiple-fd model, the status struct includes
1117 the fp regs too, so mark them valid too. */
c3f6f71d
JM
1118 pi->fpregs_valid = pi->status_valid;
1119#endif
77382aee 1120 return pi->status_valid; /* True if success, false if failure. */
c3f6f71d 1121}
c906108c 1122
77382aee 1123/* Returns the process flags (pr_flags field). */
c3f6f71d 1124
d3581e61 1125static long
fba45db2 1126proc_flags (procinfo *pi)
c3f6f71d
JM
1127{
1128 if (!pi->status_valid)
1129 if (!proc_get_status (pi))
0df8b418 1130 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 1131
c3f6f71d
JM
1132#ifdef NEW_PROC_API
1133 return pi->prstatus.pr_lwp.pr_flags;
1134#else
1135 return pi->prstatus.pr_flags;
1136#endif
1137}
c906108c 1138
77382aee 1139/* Returns the pr_why field (why the process stopped). */
c906108c 1140
d3581e61 1141static int
fba45db2 1142proc_why (procinfo *pi)
c3f6f71d
JM
1143{
1144 if (!pi->status_valid)
1145 if (!proc_get_status (pi))
0df8b418 1146 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 1147
c3f6f71d
JM
1148#ifdef NEW_PROC_API
1149 return pi->prstatus.pr_lwp.pr_why;
1150#else
1151 return pi->prstatus.pr_why;
1152#endif
1153}
c906108c 1154
77382aee 1155/* Returns the pr_what field (details of why the process stopped). */
c906108c 1156
d3581e61 1157static int
fba45db2 1158proc_what (procinfo *pi)
c3f6f71d
JM
1159{
1160 if (!pi->status_valid)
1161 if (!proc_get_status (pi))
0df8b418 1162 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 1163
c3f6f71d
JM
1164#ifdef NEW_PROC_API
1165 return pi->prstatus.pr_lwp.pr_what;
1166#else
1167 return pi->prstatus.pr_what;
c906108c 1168#endif
c3f6f71d 1169}
c906108c 1170
77382aee
PA
1171/* This function is only called when PI is stopped by a watchpoint.
1172 Assuming the OS supports it, write to *ADDR the data address which
1173 triggered it and return 1. Return 0 if it is not possible to know
1174 the address. */
bf701c2c
PM
1175
1176static int
1177proc_watchpoint_address (procinfo *pi, CORE_ADDR *addr)
1178{
1179 if (!pi->status_valid)
1180 if (!proc_get_status (pi))
1181 return 0;
1182
1183#ifdef NEW_PROC_API
f5656ead
TT
1184 *addr = (CORE_ADDR) gdbarch_pointer_to_address (target_gdbarch (),
1185 builtin_type (target_gdbarch ())->builtin_data_ptr,
bf701c2c
PM
1186 (gdb_byte *) &pi->prstatus.pr_lwp.pr_info.si_addr);
1187#else
f5656ead
TT
1188 *addr = (CORE_ADDR) gdbarch_pointer_to_address (target_gdbarch (),
1189 builtin_type (target_gdbarch ())->builtin_data_ptr,
bf701c2c
PM
1190 (gdb_byte *) &pi->prstatus.pr_info.si_addr);
1191#endif
1192 return 1;
1193}
1194
c3f6f71d 1195#ifndef PIOCSSPCACT /* The following is not supported on OSF. */
77382aee
PA
1196
1197/* Returns the pr_nsysarg field (number of args to the current
1198 syscall). */
c3f6f71d 1199
d3581e61 1200static int
fba45db2 1201proc_nsysarg (procinfo *pi)
c3f6f71d
JM
1202{
1203 if (!pi->status_valid)
1204 if (!proc_get_status (pi))
1205 return 0;
19958708 1206
c3f6f71d
JM
1207#ifdef NEW_PROC_API
1208 return pi->prstatus.pr_lwp.pr_nsysarg;
1209#else
1210 return pi->prstatus.pr_nsysarg;
c906108c 1211#endif
c3f6f71d 1212}
c906108c 1213
77382aee
PA
1214/* Returns the pr_sysarg field (pointer to the arguments of current
1215 syscall). */
c906108c 1216
d3581e61 1217static long *
fba45db2 1218proc_sysargs (procinfo *pi)
c3f6f71d
JM
1219{
1220 if (!pi->status_valid)
1221 if (!proc_get_status (pi))
1222 return NULL;
19958708 1223
c3f6f71d
JM
1224#ifdef NEW_PROC_API
1225 return (long *) &pi->prstatus.pr_lwp.pr_sysarg;
1226#else
1227 return (long *) &pi->prstatus.pr_sysarg;
1228#endif
1229}
c3f6f71d 1230#endif /* PIOCSSPCACT */
c906108c 1231
d3581e61 1232#ifdef PROCFS_DONT_PIOCSSIG_CURSIG
77382aee 1233/* Returns the pr_cursig field (current signal). */
c906108c 1234
d3581e61 1235static long
c3f6f71d
JM
1236proc_cursig (struct procinfo *pi)
1237{
1238 if (!pi->status_valid)
1239 if (!proc_get_status (pi))
0df8b418 1240 return 0; /* FIXME: not a good failure value (but what is?) */
c906108c 1241
c3f6f71d
JM
1242#ifdef NEW_PROC_API
1243 return pi->prstatus.pr_lwp.pr_cursig;
1244#else
1245 return pi->prstatus.pr_cursig;
1246#endif
1247}
d3581e61 1248#endif /* PROCFS_DONT_PIOCSSIG_CURSIG */
c906108c 1249
77382aee
PA
1250/* === I appologize for the messiness of this function.
1251 === This is an area where the different versions of
1252 === /proc are more inconsistent than usual.
1253
1254 Set or reset any of the following process flags:
1255 PR_FORK -- forked child will inherit trace flags
1256 PR_RLC -- traced process runs when last /proc file closed.
1257 PR_KLC -- traced process is killed when last /proc file closed.
1258 PR_ASYNC -- LWP's get to run/stop independently.
1259
1260 There are three methods for doing this function:
1261 1) Newest: read/write [PCSET/PCRESET/PCUNSET]
1262 [Sol6, Sol7, UW]
1263 2) Middle: PIOCSET/PIOCRESET
1264 [Irix, Sol5]
1265 3) Oldest: PIOCSFORK/PIOCRFORK/PIOCSRLC/PIOCRRLC
1266 [OSF, Sol5]
1267
1268 Note: Irix does not define PR_ASYNC.
1269 Note: OSF does not define PR_KLC.
1270 Note: OSF is the only one that can ONLY use the oldest method.
1271
1272 Arguments:
1273 pi -- the procinfo
1274 flag -- one of PR_FORK, PR_RLC, or PR_ASYNC
1275 mode -- 1 for set, 0 for reset.
1276
1277 Returns non-zero for success, zero for failure. */
c906108c 1278
c3f6f71d 1279enum { FLAG_RESET, FLAG_SET };
c906108c 1280
c3f6f71d 1281static int
fba45db2 1282proc_modify_flag (procinfo *pi, long flag, long mode)
c3f6f71d
JM
1283{
1284 long win = 0; /* default to fail */
1285
77382aee
PA
1286 /* These operations affect the process as a whole, and applying them
1287 to an individual LWP has the same meaning as applying them to the
1288 main process. Therefore, if we're ever called with a pointer to
1289 an LWP's procinfo, let's substitute the process's procinfo and
1290 avoid opening the LWP's file descriptor unnecessarily. */
c3f6f71d
JM
1291
1292 if (pi->pid != 0)
1293 pi = find_procinfo_or_die (pi->pid, 0);
1294
05b4bd79 1295#ifdef NEW_PROC_API /* Newest method: Newer Solarii. */
19958708 1296 /* First normalize the PCUNSET/PCRESET command opcode
c3f6f71d
JM
1297 (which for no obvious reason has a different definition
1298 from one operating system to the next...) */
1299#ifdef PCUNSET
1300#define GDBRESET PCUNSET
37de36c6 1301#else
c3f6f71d
JM
1302#ifdef PCRESET
1303#define GDBRESET PCRESET
37de36c6 1304#endif
c906108c 1305#endif
c3f6f71d 1306 {
37de36c6 1307 procfs_ctl_t arg[2];
c906108c 1308
0df8b418 1309 if (mode == FLAG_SET) /* Set the flag (RLC, FORK, or ASYNC). */
c3f6f71d 1310 arg[0] = PCSET;
0df8b418 1311 else /* Reset the flag. */
c3f6f71d 1312 arg[0] = GDBRESET;
c5aa993b 1313
c3f6f71d
JM
1314 arg[1] = flag;
1315 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
1316 }
1317#else
1318#ifdef PIOCSET /* Irix/Sol5 method */
0df8b418 1319 if (mode == FLAG_SET) /* Set the flag (hopefully RLC, FORK, or ASYNC). */
c3f6f71d
JM
1320 {
1321 win = (ioctl (pi->ctl_fd, PIOCSET, &flag) >= 0);
1322 }
0df8b418 1323 else /* Reset the flag. */
c3f6f71d
JM
1324 {
1325 win = (ioctl (pi->ctl_fd, PIOCRESET, &flag) >= 0);
1326 }
c906108c 1327
c3f6f71d
JM
1328#else
1329#ifdef PIOCSRLC /* Oldest method: OSF */
1330 switch (flag) {
1331 case PR_RLC:
1332 if (mode == FLAG_SET) /* Set run-on-last-close */
1333 {
1334 win = (ioctl (pi->ctl_fd, PIOCSRLC, NULL) >= 0);
1335 }
1336 else /* Clear run-on-last-close */
1337 {
1338 win = (ioctl (pi->ctl_fd, PIOCRRLC, NULL) >= 0);
1339 }
1340 break;
1341 case PR_FORK:
1342 if (mode == FLAG_SET) /* Set inherit-on-fork */
1343 {
1344 win = (ioctl (pi->ctl_fd, PIOCSFORK, NULL) >= 0);
1345 }
1346 else /* Clear inherit-on-fork */
1347 {
1348 win = (ioctl (pi->ctl_fd, PIOCRFORK, NULL) >= 0);
1349 }
1350 break;
1351 default:
0df8b418 1352 win = 0; /* Fail -- unknown flag (can't do PR_ASYNC). */
c3f6f71d
JM
1353 break;
1354 }
1355#endif
1356#endif
1357#endif
1358#undef GDBRESET
77382aee
PA
1359 /* The above operation renders the procinfo's cached pstatus
1360 obsolete. */
c3f6f71d 1361 pi->status_valid = 0;
c906108c 1362
c3f6f71d 1363 if (!win)
8a3fe4f8 1364 warning (_("procfs: modify_flag failed to turn %s %s"),
c3f6f71d
JM
1365 flag == PR_FORK ? "PR_FORK" :
1366 flag == PR_RLC ? "PR_RLC" :
1367#ifdef PR_ASYNC
1368 flag == PR_ASYNC ? "PR_ASYNC" :
0d06e24b
JM
1369#endif
1370#ifdef PR_KLC
1371 flag == PR_KLC ? "PR_KLC" :
c3f6f71d
JM
1372#endif
1373 "<unknown flag>",
1374 mode == FLAG_RESET ? "off" : "on");
c906108c 1375
c3f6f71d
JM
1376 return win;
1377}
c906108c 1378
77382aee
PA
1379/* Set the run_on_last_close flag. Process with all threads will
1380 become runnable when debugger closes all /proc fds. Returns
1381 non-zero for success, zero for failure. */
c906108c 1382
d3581e61 1383static int
fba45db2 1384proc_set_run_on_last_close (procinfo *pi)
c906108c 1385{
c3f6f71d
JM
1386 return proc_modify_flag (pi, PR_RLC, FLAG_SET);
1387}
c906108c 1388
77382aee
PA
1389/* Reset the run_on_last_close flag. The process will NOT become
1390 runnable when debugger closes its file handles. Returns non-zero
1391 for success, zero for failure. */
c906108c 1392
d3581e61 1393static int
fba45db2 1394proc_unset_run_on_last_close (procinfo *pi)
c3f6f71d
JM
1395{
1396 return proc_modify_flag (pi, PR_RLC, FLAG_RESET);
c906108c
SS
1397}
1398
77382aee
PA
1399/* Reset inherit_on_fork flag. If the process forks a child while we
1400 are registered for events in the parent, then we will NOT recieve
1401 events from the child. Returns non-zero for success, zero for
1402 failure. */
c906108c 1403
d3581e61 1404static int
fba45db2 1405proc_unset_inherit_on_fork (procinfo *pi)
c3f6f71d
JM
1406{
1407 return proc_modify_flag (pi, PR_FORK, FLAG_RESET);
1408}
c906108c 1409
c3f6f71d 1410#ifdef PR_ASYNC
77382aee
PA
1411/* Set PR_ASYNC flag. If one LWP stops because of a debug event
1412 (signal etc.), the remaining LWPs will continue to run. Returns
1413 non-zero for success, zero for failure. */
c906108c 1414
d3581e61 1415static int
fba45db2 1416proc_set_async (procinfo *pi)
c3f6f71d
JM
1417{
1418 return proc_modify_flag (pi, PR_ASYNC, FLAG_SET);
1419}
c906108c 1420
77382aee
PA
1421/* Reset PR_ASYNC flag. If one LWP stops because of a debug event
1422 (signal etc.), then all other LWPs will stop as well. Returns
1423 non-zero for success, zero for failure. */
c906108c 1424
d3581e61 1425static int
fba45db2 1426proc_unset_async (procinfo *pi)
c3f6f71d
JM
1427{
1428 return proc_modify_flag (pi, PR_ASYNC, FLAG_RESET);
1429}
1430#endif /* PR_ASYNC */
c906108c 1431
77382aee
PA
1432/* Request the process/LWP to stop. Does not wait. Returns non-zero
1433 for success, zero for failure. */
c906108c 1434
d3581e61 1435static int
fba45db2 1436proc_stop_process (procinfo *pi)
c3f6f71d
JM
1437{
1438 int win;
c906108c 1439
77382aee
PA
1440 /* We might conceivably apply this operation to an LWP, and the
1441 LWP's ctl file descriptor might not be open. */
c906108c 1442
c3f6f71d
JM
1443 if (pi->ctl_fd == 0 &&
1444 open_procinfo_files (pi, FD_CTL) == 0)
1445 return 0;
1446 else
1447 {
1448#ifdef NEW_PROC_API
37de36c6 1449 procfs_ctl_t cmd = PCSTOP;
f4a14ae6 1450
c3f6f71d
JM
1451 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
1452#else /* ioctl method */
1453 win = (ioctl (pi->ctl_fd, PIOCSTOP, &pi->prstatus) >= 0);
1454 /* Note: the call also reads the prstatus. */
1455 if (win)
1456 {
1457 pi->status_valid = 1;
19958708 1458 PROC_PRETTYFPRINT_STATUS (proc_flags (pi),
c3f6f71d 1459 proc_why (pi),
19958708 1460 proc_what (pi),
c3f6f71d
JM
1461 proc_get_current_thread (pi));
1462 }
1463#endif
1464 }
c906108c 1465
c3f6f71d
JM
1466 return win;
1467}
c5aa993b 1468
77382aee
PA
1469/* Wait for the process or LWP to stop (block until it does). Returns
1470 non-zero for success, zero for failure. */
c906108c 1471
d3581e61 1472static int
fba45db2 1473proc_wait_for_stop (procinfo *pi)
c906108c 1474{
c3f6f71d
JM
1475 int win;
1476
77382aee
PA
1477 /* We should never have to apply this operation to any procinfo
1478 except the one for the main process. If that ever changes for
1479 any reason, then take out the following clause and replace it
1480 with one that makes sure the ctl_fd is open. */
19958708 1481
c3f6f71d
JM
1482 if (pi->tid != 0)
1483 pi = find_procinfo_or_die (pi->pid, 0);
1484
1485#ifdef NEW_PROC_API
1486 {
37de36c6 1487 procfs_ctl_t cmd = PCWSTOP;
f4a14ae6 1488
c3f6f71d
JM
1489 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
1490 /* We been runnin' and we stopped -- need to update status. */
1491 pi->status_valid = 0;
1492 }
1493#else /* ioctl method */
1494 win = (ioctl (pi->ctl_fd, PIOCWSTOP, &pi->prstatus) >= 0);
1495 /* Above call also refreshes the prstatus. */
1496 if (win)
1497 {
1498 pi->status_valid = 1;
19958708 1499 PROC_PRETTYFPRINT_STATUS (proc_flags (pi),
c3f6f71d 1500 proc_why (pi),
19958708 1501 proc_what (pi),
c3f6f71d
JM
1502 proc_get_current_thread (pi));
1503 }
c906108c
SS
1504#endif
1505
c3f6f71d 1506 return win;
c906108c
SS
1507}
1508
77382aee
PA
1509/* Make the process or LWP runnable.
1510
1511 Options (not all are implemented):
1512 - single-step
1513 - clear current fault
1514 - clear current signal
1515 - abort the current system call
1516 - stop as soon as finished with system call
1517 - (ioctl): set traced signal set
1518 - (ioctl): set held signal set
1519 - (ioctl): set traced fault set
1520 - (ioctl): set start pc (vaddr)
1521
1522 Always clears the current fault. PI is the process or LWP to
1523 operate on. If STEP is true, set the process or LWP to trap after
1524 one instruction. If SIGNO is zero, clear the current signal if
1525 any; if non-zero, set the current signal to this one. Returns
1526 non-zero for success, zero for failure. */
c3f6f71d 1527
d3581e61 1528static int
fba45db2 1529proc_run_process (procinfo *pi, int step, int signo)
c3f6f71d
JM
1530{
1531 int win;
1532 int runflags;
1533
77382aee
PA
1534 /* We will probably have to apply this operation to individual
1535 threads, so make sure the control file descriptor is open. */
19958708 1536
c3f6f71d
JM
1537 if (pi->ctl_fd == 0 &&
1538 open_procinfo_files (pi, FD_CTL) == 0)
1539 {
1540 return 0;
1541 }
c906108c 1542
0df8b418 1543 runflags = PRCFAULT; /* Always clear current fault. */
c3f6f71d
JM
1544 if (step)
1545 runflags |= PRSTEP;
1546 if (signo == 0)
1547 runflags |= PRCSIG;
0df8b418 1548 else if (signo != -1) /* -1 means do nothing W.R.T. signals. */
c3f6f71d 1549 proc_set_current_signal (pi, signo);
c5aa993b 1550
c3f6f71d
JM
1551#ifdef NEW_PROC_API
1552 {
37de36c6 1553 procfs_ctl_t cmd[2];
c906108c 1554
c3f6f71d
JM
1555 cmd[0] = PCRUN;
1556 cmd[1] = runflags;
1557 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
1558 }
1559#else /* ioctl method */
1560 {
1561 prrun_t prrun;
c906108c 1562
c3f6f71d
JM
1563 memset (&prrun, 0, sizeof (prrun));
1564 prrun.pr_flags = runflags;
1565 win = (ioctl (pi->ctl_fd, PIOCRUN, &prrun) >= 0);
1566 }
1567#endif
c906108c 1568
c3f6f71d
JM
1569 return win;
1570}
c906108c 1571
77382aee
PA
1572/* Register to trace signals in the process or LWP. Returns non-zero
1573 for success, zero for failure. */
c906108c 1574
d3581e61 1575static int
37de36c6 1576proc_set_traced_signals (procinfo *pi, gdb_sigset_t *sigset)
c906108c 1577{
c3f6f71d
JM
1578 int win;
1579
77382aee
PA
1580 /* We should never have to apply this operation to any procinfo
1581 except the one for the main process. If that ever changes for
1582 any reason, then take out the following clause and replace it
1583 with one that makes sure the ctl_fd is open. */
19958708 1584
c3f6f71d
JM
1585 if (pi->tid != 0)
1586 pi = find_procinfo_or_die (pi->pid, 0);
1587
1588#ifdef NEW_PROC_API
1589 {
1590 struct {
37de36c6 1591 procfs_ctl_t cmd;
c3f6f71d 1592 /* Use char array to avoid alignment issues. */
37de36c6 1593 char sigset[sizeof (gdb_sigset_t)];
c3f6f71d 1594 } arg;
c906108c 1595
c3f6f71d 1596 arg.cmd = PCSTRACE;
37de36c6 1597 memcpy (&arg.sigset, sigset, sizeof (gdb_sigset_t));
c906108c 1598
c3f6f71d
JM
1599 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
1600 }
1601#else /* ioctl method */
1602 win = (ioctl (pi->ctl_fd, PIOCSTRACE, sigset) >= 0);
1603#endif
0df8b418 1604 /* The above operation renders the procinfo's cached pstatus obsolete. */
c3f6f71d 1605 pi->status_valid = 0;
c906108c 1606
c3f6f71d 1607 if (!win)
8a3fe4f8 1608 warning (_("procfs: set_traced_signals failed"));
c3f6f71d 1609 return win;
c906108c
SS
1610}
1611
77382aee
PA
1612/* Register to trace hardware faults in the process or LWP. Returns
1613 non-zero for success, zero for failure. */
c906108c 1614
d3581e61 1615static int
fba45db2 1616proc_set_traced_faults (procinfo *pi, fltset_t *fltset)
c3f6f71d
JM
1617{
1618 int win;
1619
77382aee
PA
1620 /* We should never have to apply this operation to any procinfo
1621 except the one for the main process. If that ever changes for
1622 any reason, then take out the following clause and replace it
1623 with one that makes sure the ctl_fd is open. */
19958708 1624
c3f6f71d
JM
1625 if (pi->tid != 0)
1626 pi = find_procinfo_or_die (pi->pid, 0);
1627
1628#ifdef NEW_PROC_API
1629 {
1630 struct {
37de36c6 1631 procfs_ctl_t cmd;
c3f6f71d
JM
1632 /* Use char array to avoid alignment issues. */
1633 char fltset[sizeof (fltset_t)];
1634 } arg;
c906108c 1635
c3f6f71d
JM
1636 arg.cmd = PCSFAULT;
1637 memcpy (&arg.fltset, fltset, sizeof (fltset_t));
c906108c 1638
c3f6f71d
JM
1639 win = (write (pi->ctl_fd, (char *) &arg, sizeof (arg)) == sizeof (arg));
1640 }
1641#else /* ioctl method */
1642 win = (ioctl (pi->ctl_fd, PIOCSFAULT, fltset) >= 0);
1643#endif
0df8b418 1644 /* The above operation renders the procinfo's cached pstatus obsolete. */
c3f6f71d 1645 pi->status_valid = 0;
c906108c 1646
c3f6f71d
JM
1647 return win;
1648}
c5aa993b 1649
77382aee
PA
1650/* Register to trace entry to system calls in the process or LWP.
1651 Returns non-zero for success, zero for failure. */
c906108c 1652
d3581e61 1653static int
fba45db2 1654proc_set_traced_sysentry (procinfo *pi, sysset_t *sysset)
c906108c 1655{
c3f6f71d
JM
1656 int win;
1657
77382aee
PA
1658 /* We should never have to apply this operation to any procinfo
1659 except the one for the main process. If that ever changes for
1660 any reason, then take out the following clause and replace it
1661 with one that makes sure the ctl_fd is open. */
19958708 1662
c3f6f71d
JM
1663 if (pi->tid != 0)
1664 pi = find_procinfo_or_die (pi->pid, 0);
1665
1666#ifdef NEW_PROC_API
1667 {
37de36c6
KB
1668 struct gdb_proc_ctl_pcsentry {
1669 procfs_ctl_t cmd;
c3f6f71d
JM
1670 /* Use char array to avoid alignment issues. */
1671 char sysset[sizeof (sysset_t)];
37de36c6
KB
1672 } *argp;
1673 int argp_size = sizeof (struct gdb_proc_ctl_pcsentry)
77382aee 1674 - sizeof (sysset_t)
37de36c6 1675 + sysset_t_size (pi);
c3f6f71d 1676
37de36c6 1677 argp = xmalloc (argp_size);
c3f6f71d 1678
37de36c6
KB
1679 argp->cmd = PCSENTRY;
1680 memcpy (&argp->sysset, sysset, sysset_t_size (pi));
1681
1682 win = (write (pi->ctl_fd, (char *) argp, argp_size) == argp_size);
1683 xfree (argp);
c3f6f71d
JM
1684 }
1685#else /* ioctl method */
1686 win = (ioctl (pi->ctl_fd, PIOCSENTRY, sysset) >= 0);
1687#endif
77382aee
PA
1688 /* The above operation renders the procinfo's cached pstatus
1689 obsolete. */
c3f6f71d 1690 pi->status_valid = 0;
19958708 1691
c3f6f71d 1692 return win;
c906108c
SS
1693}
1694
77382aee
PA
1695/* Register to trace exit from system calls in the process or LWP.
1696 Returns non-zero for success, zero for failure. */
c906108c 1697
d3581e61 1698static int
fba45db2 1699proc_set_traced_sysexit (procinfo *pi, sysset_t *sysset)
c3f6f71d
JM
1700{
1701 int win;
1702
77382aee
PA
1703 /* We should never have to apply this operation to any procinfo
1704 except the one for the main process. If that ever changes for
1705 any reason, then take out the following clause and replace it
1706 with one that makes sure the ctl_fd is open. */
19958708 1707
c3f6f71d
JM
1708 if (pi->tid != 0)
1709 pi = find_procinfo_or_die (pi->pid, 0);
1710
1711#ifdef NEW_PROC_API
1712 {
37de36c6
KB
1713 struct gdb_proc_ctl_pcsexit {
1714 procfs_ctl_t cmd;
c3f6f71d
JM
1715 /* Use char array to avoid alignment issues. */
1716 char sysset[sizeof (sysset_t)];
37de36c6
KB
1717 } *argp;
1718 int argp_size = sizeof (struct gdb_proc_ctl_pcsexit)
77382aee 1719 - sizeof (sysset_t)
37de36c6 1720 + sysset_t_size (pi);
c906108c 1721
37de36c6 1722 argp = xmalloc (argp_size);
c906108c 1723
37de36c6
KB
1724 argp->cmd = PCSEXIT;
1725 memcpy (&argp->sysset, sysset, sysset_t_size (pi));
1726
1727 win = (write (pi->ctl_fd, (char *) argp, argp_size) == argp_size);
1728 xfree (argp);
c3f6f71d
JM
1729 }
1730#else /* ioctl method */
1731 win = (ioctl (pi->ctl_fd, PIOCSEXIT, sysset) >= 0);
1732#endif
77382aee
PA
1733 /* The above operation renders the procinfo's cached pstatus
1734 obsolete. */
c3f6f71d 1735 pi->status_valid = 0;
c906108c 1736
c3f6f71d
JM
1737 return win;
1738}
c906108c 1739
77382aee
PA
1740/* Specify the set of blocked / held signals in the process or LWP.
1741 Returns non-zero for success, zero for failure. */
c906108c 1742
d3581e61 1743static int
37de36c6 1744proc_set_held_signals (procinfo *pi, gdb_sigset_t *sighold)
c906108c 1745{
c3f6f71d
JM
1746 int win;
1747
77382aee
PA
1748 /* We should never have to apply this operation to any procinfo
1749 except the one for the main process. If that ever changes for
1750 any reason, then take out the following clause and replace it
1751 with one that makes sure the ctl_fd is open. */
19958708 1752
c3f6f71d
JM
1753 if (pi->tid != 0)
1754 pi = find_procinfo_or_die (pi->pid, 0);
1755
1756#ifdef NEW_PROC_API
1757 {
1758 struct {
37de36c6 1759 procfs_ctl_t cmd;
c3f6f71d 1760 /* Use char array to avoid alignment issues. */
37de36c6 1761 char hold[sizeof (gdb_sigset_t)];
c3f6f71d
JM
1762 } arg;
1763
1764 arg.cmd = PCSHOLD;
37de36c6 1765 memcpy (&arg.hold, sighold, sizeof (gdb_sigset_t));
c3f6f71d
JM
1766 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
1767 }
c906108c 1768#else
c3f6f71d 1769 win = (ioctl (pi->ctl_fd, PIOCSHOLD, sighold) >= 0);
c906108c 1770#endif
77382aee
PA
1771 /* The above operation renders the procinfo's cached pstatus
1772 obsolete. */
c3f6f71d
JM
1773 pi->status_valid = 0;
1774
1775 return win;
c906108c
SS
1776}
1777
77382aee
PA
1778/* Returns the set of signals that are held / blocked. Will also copy
1779 the sigset if SAVE is non-zero. */
c906108c 1780
d3581e61 1781static gdb_sigset_t *
37de36c6 1782proc_get_held_signals (procinfo *pi, gdb_sigset_t *save)
c906108c 1783{
37de36c6 1784 gdb_sigset_t *ret = NULL;
c3f6f71d 1785
77382aee
PA
1786 /* We should never have to apply this operation to any procinfo
1787 except the one for the main process. If that ever changes for
1788 any reason, then take out the following clause and replace it
1789 with one that makes sure the ctl_fd is open. */
19958708 1790
c3f6f71d
JM
1791 if (pi->tid != 0)
1792 pi = find_procinfo_or_die (pi->pid, 0);
1793
1794#ifdef NEW_PROC_API
1795 if (!pi->status_valid)
1796 if (!proc_get_status (pi))
1797 return NULL;
1798
c3f6f71d 1799 ret = &pi->prstatus.pr_lwp.pr_lwphold;
c3f6f71d
JM
1800#else /* not NEW_PROC_API */
1801 {
37de36c6 1802 static gdb_sigset_t sigheld;
c3f6f71d
JM
1803
1804 if (ioctl (pi->ctl_fd, PIOCGHOLD, &sigheld) >= 0)
1805 ret = &sigheld;
1806 }
1807#endif /* NEW_PROC_API */
1808 if (save && ret)
37de36c6 1809 memcpy (save, ret, sizeof (gdb_sigset_t));
c3f6f71d
JM
1810
1811 return ret;
c906108c
SS
1812}
1813
77382aee
PA
1814/* Returns the set of signals that are traced / debugged. Will also
1815 copy the sigset if SAVE is non-zero. */
c3f6f71d 1816
d3581e61 1817static gdb_sigset_t *
37de36c6 1818proc_get_traced_signals (procinfo *pi, gdb_sigset_t *save)
c906108c 1819{
37de36c6 1820 gdb_sigset_t *ret = NULL;
c3f6f71d 1821
77382aee
PA
1822 /* We should never have to apply this operation to any procinfo
1823 except the one for the main process. If that ever changes for
1824 any reason, then take out the following clause and replace it
1825 with one that makes sure the ctl_fd is open. */
19958708 1826
c3f6f71d
JM
1827 if (pi->tid != 0)
1828 pi = find_procinfo_or_die (pi->pid, 0);
1829
1830#ifdef NEW_PROC_API
1831 if (!pi->status_valid)
1832 if (!proc_get_status (pi))
1833 return NULL;
1834
1835 ret = &pi->prstatus.pr_sigtrace;
1836#else
1837 {
37de36c6 1838 static gdb_sigset_t sigtrace;
c3f6f71d
JM
1839
1840 if (ioctl (pi->ctl_fd, PIOCGTRACE, &sigtrace) >= 0)
1841 ret = &sigtrace;
1842 }
c906108c 1843#endif
c3f6f71d 1844 if (save && ret)
37de36c6 1845 memcpy (save, ret, sizeof (gdb_sigset_t));
c906108c 1846
c3f6f71d
JM
1847 return ret;
1848}
c906108c 1849
77382aee
PA
1850/* Returns the set of hardware faults that are traced /debugged. Will
1851 also copy the faultset if SAVE is non-zero. */
c3f6f71d 1852
d3581e61 1853static fltset_t *
fba45db2 1854proc_get_traced_faults (procinfo *pi, fltset_t *save)
c3f6f71d
JM
1855{
1856 fltset_t *ret = NULL;
1857
77382aee
PA
1858 /* We should never have to apply this operation to any procinfo
1859 except the one for the main process. If that ever changes for
1860 any reason, then take out the following clause and replace it
1861 with one that makes sure the ctl_fd is open. */
19958708 1862
c3f6f71d
JM
1863 if (pi->tid != 0)
1864 pi = find_procinfo_or_die (pi->pid, 0);
1865
1866#ifdef NEW_PROC_API
1867 if (!pi->status_valid)
1868 if (!proc_get_status (pi))
1869 return NULL;
1870
1871 ret = &pi->prstatus.pr_flttrace;
1872#else
1873 {
1874 static fltset_t flttrace;
1875
1876 if (ioctl (pi->ctl_fd, PIOCGFAULT, &flttrace) >= 0)
1877 ret = &flttrace;
1878 }
1879#endif
1880 if (save && ret)
1881 memcpy (save, ret, sizeof (fltset_t));
c906108c 1882
c3f6f71d
JM
1883 return ret;
1884}
c906108c 1885
77382aee
PA
1886/* Returns the set of syscalls that are traced /debugged on entry.
1887 Will also copy the syscall set if SAVE is non-zero. */
c906108c 1888
d3581e61 1889static sysset_t *
fba45db2 1890proc_get_traced_sysentry (procinfo *pi, sysset_t *save)
c3f6f71d
JM
1891{
1892 sysset_t *ret = NULL;
1893
77382aee
PA
1894 /* We should never have to apply this operation to any procinfo
1895 except the one for the main process. If that ever changes for
1896 any reason, then take out the following clause and replace it
1897 with one that makes sure the ctl_fd is open. */
19958708 1898
c3f6f71d
JM
1899 if (pi->tid != 0)
1900 pi = find_procinfo_or_die (pi->pid, 0);
1901
1902#ifdef NEW_PROC_API
1903 if (!pi->status_valid)
1904 if (!proc_get_status (pi))
1905 return NULL;
1906
37de36c6 1907#ifndef DYNAMIC_SYSCALLS
c3f6f71d 1908 ret = &pi->prstatus.pr_sysentry;
37de36c6
KB
1909#else /* DYNAMIC_SYSCALLS */
1910 {
1911 static sysset_t *sysentry;
1912 size_t size;
1913
1914 if (!sysentry)
1915 sysentry = sysset_t_alloc (pi);
1916 ret = sysentry;
1917 if (pi->status_fd == 0 && open_procinfo_files (pi, FD_STATUS) == 0)
1918 return NULL;
1919 if (pi->prstatus.pr_sysentry_offset == 0)
1920 {
1921 gdb_premptysysset (sysentry);
1922 }
1923 else
1924 {
1925 int rsize;
1926
1927 if (lseek (pi->status_fd, (off_t) pi->prstatus.pr_sysentry_offset,
77382aee 1928 SEEK_SET)
37de36c6
KB
1929 != (off_t) pi->prstatus.pr_sysentry_offset)
1930 return NULL;
1931 size = sysset_t_size (pi);
1932 gdb_premptysysset (sysentry);
1933 rsize = read (pi->status_fd, sysentry, size);
1934 if (rsize < 0)
1935 return NULL;
1936 }
1937 }
1938#endif /* DYNAMIC_SYSCALLS */
1939#else /* !NEW_PROC_API */
c3f6f71d
JM
1940 {
1941 static sysset_t sysentry;
c906108c 1942
c3f6f71d
JM
1943 if (ioctl (pi->ctl_fd, PIOCGENTRY, &sysentry) >= 0)
1944 ret = &sysentry;
1945 }
37de36c6 1946#endif /* NEW_PROC_API */
c3f6f71d 1947 if (save && ret)
37de36c6 1948 memcpy (save, ret, sysset_t_size (pi));
c906108c 1949
c3f6f71d
JM
1950 return ret;
1951}
c5aa993b 1952
77382aee
PA
1953/* Returns the set of syscalls that are traced /debugged on exit.
1954 Will also copy the syscall set if SAVE is non-zero. */
c906108c 1955
d3581e61 1956static sysset_t *
fba45db2 1957proc_get_traced_sysexit (procinfo *pi, sysset_t *save)
c906108c 1958{
c3f6f71d
JM
1959 sysset_t * ret = NULL;
1960
77382aee
PA
1961 /* We should never have to apply this operation to any procinfo
1962 except the one for the main process. If that ever changes for
1963 any reason, then take out the following clause and replace it
1964 with one that makes sure the ctl_fd is open. */
19958708 1965
c3f6f71d
JM
1966 if (pi->tid != 0)
1967 pi = find_procinfo_or_die (pi->pid, 0);
1968
1969#ifdef NEW_PROC_API
1970 if (!pi->status_valid)
1971 if (!proc_get_status (pi))
1972 return NULL;
1973
37de36c6 1974#ifndef DYNAMIC_SYSCALLS
c3f6f71d 1975 ret = &pi->prstatus.pr_sysexit;
37de36c6
KB
1976#else /* DYNAMIC_SYSCALLS */
1977 {
1978 static sysset_t *sysexit;
1979 size_t size;
1980
1981 if (!sysexit)
1982 sysexit = sysset_t_alloc (pi);
1983 ret = sysexit;
1984 if (pi->status_fd == 0 && open_procinfo_files (pi, FD_STATUS) == 0)
1985 return NULL;
1986 if (pi->prstatus.pr_sysexit_offset == 0)
1987 {
1988 gdb_premptysysset (sysexit);
1989 }
1990 else
1991 {
1992 int rsize;
1993
77382aee
PA
1994 if (lseek (pi->status_fd, (off_t) pi->prstatus.pr_sysexit_offset,
1995 SEEK_SET)
37de36c6
KB
1996 != (off_t) pi->prstatus.pr_sysexit_offset)
1997 return NULL;
1998 size = sysset_t_size (pi);
1999 gdb_premptysysset (sysexit);
2000 rsize = read (pi->status_fd, sysexit, size);
2001 if (rsize < 0)
2002 return NULL;
2003 }
2004 }
2005#endif /* DYNAMIC_SYSCALLS */
c3f6f71d
JM
2006#else
2007 {
2008 static sysset_t sysexit;
c5aa993b 2009
c3f6f71d
JM
2010 if (ioctl (pi->ctl_fd, PIOCGEXIT, &sysexit) >= 0)
2011 ret = &sysexit;
2012 }
2013#endif
2014 if (save && ret)
37de36c6 2015 memcpy (save, ret, sysset_t_size (pi));
c3f6f71d
JM
2016
2017 return ret;
2018}
c906108c 2019
77382aee
PA
2020/* The current fault (if any) is cleared; the associated signal will
2021 not be sent to the process or LWP when it resumes. Returns
2022 non-zero for success, zero for failure. */
c906108c 2023
d3581e61 2024static int
fba45db2 2025proc_clear_current_fault (procinfo *pi)
c3f6f71d
JM
2026{
2027 int win;
2028
77382aee
PA
2029 /* We should never have to apply this operation to any procinfo
2030 except the one for the main process. If that ever changes for
2031 any reason, then take out the following clause and replace it
2032 with one that makes sure the ctl_fd is open. */
19958708 2033
c3f6f71d
JM
2034 if (pi->tid != 0)
2035 pi = find_procinfo_or_die (pi->pid, 0);
2036
2037#ifdef NEW_PROC_API
2038 {
37de36c6 2039 procfs_ctl_t cmd = PCCFAULT;
f4a14ae6 2040
c3f6f71d
JM
2041 win = (write (pi->ctl_fd, (void *) &cmd, sizeof (cmd)) == sizeof (cmd));
2042 }
2043#else
2044 win = (ioctl (pi->ctl_fd, PIOCCFAULT, 0) >= 0);
2045#endif
2046
2047 return win;
c906108c
SS
2048}
2049
77382aee
PA
2050/* Set the "current signal" that will be delivered next to the
2051 process. NOTE: semantics are different from those of KILL. This
2052 signal will be delivered to the process or LWP immediately when it
2053 is resumed (even if the signal is held/blocked); it will NOT
2054 immediately cause another event of interest, and will NOT first
2055 trap back to the debugger. Returns non-zero for success, zero for
2056 failure. */
c3f6f71d 2057
d3581e61 2058static int
fba45db2 2059proc_set_current_signal (procinfo *pi, int signo)
c3f6f71d
JM
2060{
2061 int win;
2062 struct {
37de36c6 2063 procfs_ctl_t cmd;
c3f6f71d 2064 /* Use char array to avoid alignment issues. */
37de36c6 2065 char sinfo[sizeof (gdb_siginfo_t)];
c3f6f71d 2066 } arg;
73930d4d 2067 gdb_siginfo_t mysinfo;
c162e8c9
JM
2068 ptid_t wait_ptid;
2069 struct target_waitstatus wait_status;
c3f6f71d 2070
77382aee
PA
2071 /* We should never have to apply this operation to any procinfo
2072 except the one for the main process. If that ever changes for
2073 any reason, then take out the following clause and replace it
2074 with one that makes sure the ctl_fd is open. */
19958708 2075
c3f6f71d
JM
2076 if (pi->tid != 0)
2077 pi = find_procinfo_or_die (pi->pid, 0);
2078
2079#ifdef PROCFS_DONT_PIOCSSIG_CURSIG
2080 /* With Alpha OSF/1 procfs, the kernel gets really confused if it
77382aee
PA
2081 receives a PIOCSSIG with a signal identical to the current
2082 signal, it messes up the current signal. Work around the kernel
2083 bug. */
c3f6f71d
JM
2084 if (signo > 0 &&
2085 signo == proc_cursig (pi))
0df8b418 2086 return 1; /* I assume this is a success? */
c3f6f71d
JM
2087#endif
2088
2089 /* The pointer is just a type alias. */
c162e8c9
JM
2090 get_last_target_status (&wait_ptid, &wait_status);
2091 if (ptid_equal (wait_ptid, inferior_ptid)
2092 && wait_status.kind == TARGET_WAITKIND_STOPPED
2ea28649 2093 && wait_status.value.sig == gdb_signal_from_host (signo)
c162e8c9
JM
2094 && proc_get_status (pi)
2095#ifdef NEW_PROC_API
2096 && pi->prstatus.pr_lwp.pr_info.si_signo == signo
2097#else
2098 && pi->prstatus.pr_info.si_signo == signo
2099#endif
2100 )
2101 /* Use the siginfo associated with the signal being
2102 redelivered. */
2103#ifdef NEW_PROC_API
73930d4d 2104 memcpy (arg.sinfo, &pi->prstatus.pr_lwp.pr_info, sizeof (gdb_siginfo_t));
c162e8c9 2105#else
73930d4d 2106 memcpy (arg.sinfo, &pi->prstatus.pr_info, sizeof (gdb_siginfo_t));
c162e8c9
JM
2107#endif
2108 else
2109 {
73930d4d
KH
2110 mysinfo.si_signo = signo;
2111 mysinfo.si_code = 0;
2112 mysinfo.si_pid = getpid (); /* ?why? */
2113 mysinfo.si_uid = getuid (); /* ?why? */
2114 memcpy (arg.sinfo, &mysinfo, sizeof (gdb_siginfo_t));
c162e8c9 2115 }
c3f6f71d
JM
2116
2117#ifdef NEW_PROC_API
2118 arg.cmd = PCSSIG;
2119 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
2120#else
2121 win = (ioctl (pi->ctl_fd, PIOCSSIG, (void *) &arg.sinfo) >= 0);
2122#endif
c906108c 2123
c3f6f71d
JM
2124 return win;
2125}
c906108c 2126
77382aee
PA
2127/* The current signal (if any) is cleared, and is not sent to the
2128 process or LWP when it resumes. Returns non-zero for success, zero
2129 for failure. */
c906108c 2130
d3581e61 2131static int
fba45db2 2132proc_clear_current_signal (procinfo *pi)
c3f6f71d
JM
2133{
2134 int win;
2135
77382aee
PA
2136 /* We should never have to apply this operation to any procinfo
2137 except the one for the main process. If that ever changes for
2138 any reason, then take out the following clause and replace it
2139 with one that makes sure the ctl_fd is open. */
19958708 2140
c3f6f71d
JM
2141 if (pi->tid != 0)
2142 pi = find_procinfo_or_die (pi->pid, 0);
2143
2144#ifdef NEW_PROC_API
2145 {
2146 struct {
37de36c6 2147 procfs_ctl_t cmd;
c3f6f71d 2148 /* Use char array to avoid alignment issues. */
37de36c6 2149 char sinfo[sizeof (gdb_siginfo_t)];
c3f6f71d 2150 } arg;
73930d4d 2151 gdb_siginfo_t mysinfo;
c3f6f71d
JM
2152
2153 arg.cmd = PCSSIG;
2154 /* The pointer is just a type alias. */
73930d4d
KH
2155 mysinfo.si_signo = 0;
2156 mysinfo.si_code = 0;
2157 mysinfo.si_errno = 0;
2158 mysinfo.si_pid = getpid (); /* ?why? */
2159 mysinfo.si_uid = getuid (); /* ?why? */
2160 memcpy (arg.sinfo, &mysinfo, sizeof (gdb_siginfo_t));
c3f6f71d
JM
2161
2162 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
2163 }
2164#else
2165 win = (ioctl (pi->ctl_fd, PIOCSSIG, 0) >= 0);
2166#endif
c906108c 2167
c3f6f71d
JM
2168 return win;
2169}
c906108c 2170
772cf8be
MK
2171/* Return the general-purpose registers for the process or LWP
2172 corresponding to PI. Upon failure, return NULL. */
c906108c 2173
d3581e61 2174static gdb_gregset_t *
fba45db2 2175proc_get_gregs (procinfo *pi)
c3f6f71d
JM
2176{
2177 if (!pi->status_valid || !pi->gregs_valid)
2178 if (!proc_get_status (pi))
2179 return NULL;
2180
c3f6f71d 2181#ifdef NEW_PROC_API
c3f6f71d 2182 return &pi->prstatus.pr_lwp.pr_reg;
772cf8be 2183#else
c3f6f71d 2184 return &pi->prstatus.pr_reg;
772cf8be 2185#endif
c3f6f71d 2186}
c5aa993b 2187
772cf8be
MK
2188/* Return the general-purpose registers for the process or LWP
2189 corresponding to PI. Upon failure, return NULL. */
c906108c 2190
d3581e61 2191static gdb_fpregset_t *
fba45db2 2192proc_get_fpregs (procinfo *pi)
c906108c 2193{
c3f6f71d
JM
2194#ifdef NEW_PROC_API
2195 if (!pi->status_valid || !pi->fpregs_valid)
2196 if (!proc_get_status (pi))
2197 return NULL;
2198
c3f6f71d 2199 return &pi->prstatus.pr_lwp.pr_fpreg;
c5aa993b 2200
772cf8be 2201#else /* not NEW_PROC_API */
c3f6f71d 2202 if (pi->fpregs_valid)
772cf8be 2203 return &pi->fpregset; /* Already got 'em. */
c3f6f71d 2204 else
c906108c 2205 {
772cf8be 2206 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c906108c 2207 {
c3f6f71d 2208 return NULL;
c906108c 2209 }
c3f6f71d 2210 else
c906108c 2211 {
772cf8be 2212# ifdef PIOCTGFPREG
c3f6f71d
JM
2213 struct {
2214 long pr_count;
2215 tid_t pr_error_thread;
2216 tfpregset_t thread_1;
2217 } thread_fpregs;
2218
2219 thread_fpregs.pr_count = 1;
2220 thread_fpregs.thread_1.tid = pi->tid;
2221
772cf8be
MK
2222 if (pi->tid == 0
2223 && ioctl (pi->ctl_fd, PIOCGFPREG, &pi->fpregset) >= 0)
c3f6f71d
JM
2224 {
2225 pi->fpregs_valid = 1;
772cf8be 2226 return &pi->fpregset; /* Got 'em now! */
c3f6f71d 2227 }
772cf8be
MK
2228 else if (pi->tid != 0
2229 && ioctl (pi->ctl_fd, PIOCTGFPREG, &thread_fpregs) >= 0)
c3f6f71d
JM
2230 {
2231 memcpy (&pi->fpregset, &thread_fpregs.thread_1.pr_fpregs,
2232 sizeof (pi->fpregset));
2233 pi->fpregs_valid = 1;
772cf8be 2234 return &pi->fpregset; /* Got 'em now! */
c3f6f71d
JM
2235 }
2236 else
2237 {
2238 return NULL;
2239 }
772cf8be 2240# else
c3f6f71d
JM
2241 if (ioctl (pi->ctl_fd, PIOCGFPREG, &pi->fpregset) >= 0)
2242 {
2243 pi->fpregs_valid = 1;
772cf8be 2244 return &pi->fpregset; /* Got 'em now! */
c3f6f71d
JM
2245 }
2246 else
2247 {
2248 return NULL;
2249 }
772cf8be 2250# endif
c906108c 2251 }
c906108c 2252 }
772cf8be 2253#endif /* NEW_PROC_API */
c906108c
SS
2254}
2255
772cf8be
MK
2256/* Write the general-purpose registers back to the process or LWP
2257 corresponding to PI. Return non-zero for success, zero for
2258 failure. */
c3f6f71d 2259
d3581e61 2260static int
fba45db2 2261proc_set_gregs (procinfo *pi)
c906108c 2262{
c3f6f71d
JM
2263 gdb_gregset_t *gregs;
2264 int win;
c5aa993b 2265
772cf8be
MK
2266 gregs = proc_get_gregs (pi);
2267 if (gregs == NULL)
2268 return 0; /* proc_get_regs has already warned. */
c3f6f71d 2269
772cf8be 2270 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c906108c 2271 {
c3f6f71d 2272 return 0;
c906108c 2273 }
c3f6f71d 2274 else
c906108c 2275 {
c3f6f71d
JM
2276#ifdef NEW_PROC_API
2277 struct {
37de36c6 2278 procfs_ctl_t cmd;
c3f6f71d
JM
2279 /* Use char array to avoid alignment issues. */
2280 char gregs[sizeof (gdb_gregset_t)];
2281 } arg;
2282
772cf8be 2283 arg.cmd = PCSREG;
c3f6f71d
JM
2284 memcpy (&arg.gregs, gregs, sizeof (arg.gregs));
2285 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
2286#else
2287 win = (ioctl (pi->ctl_fd, PIOCSREG, gregs) >= 0);
2288#endif
c906108c 2289 }
c3f6f71d 2290
772cf8be 2291 /* Policy: writing the registers invalidates our cache. */
c3f6f71d
JM
2292 pi->gregs_valid = 0;
2293 return win;
c906108c
SS
2294}
2295
772cf8be
MK
2296/* Write the floating-pointer registers back to the process or LWP
2297 corresponding to PI. Return non-zero for success, zero for
2298 failure. */
c3f6f71d 2299
d3581e61 2300static int
fba45db2 2301proc_set_fpregs (procinfo *pi)
c906108c 2302{
c3f6f71d
JM
2303 gdb_fpregset_t *fpregs;
2304 int win;
2305
772cf8be
MK
2306 fpregs = proc_get_fpregs (pi);
2307 if (fpregs == NULL)
2308 return 0; /* proc_get_fpregs has already warned. */
c5aa993b 2309
772cf8be 2310 if (pi->ctl_fd == 0 && open_procinfo_files (pi, FD_CTL) == 0)
c906108c 2311 {
c3f6f71d 2312 return 0;
c906108c 2313 }
c3f6f71d 2314 else
c906108c 2315 {
c3f6f71d
JM
2316#ifdef NEW_PROC_API
2317 struct {
37de36c6 2318 procfs_ctl_t cmd;
c3f6f71d
JM
2319 /* Use char array to avoid alignment issues. */
2320 char fpregs[sizeof (gdb_fpregset_t)];
2321 } arg;
2322
772cf8be 2323 arg.cmd = PCSFPREG;
c3f6f71d
JM
2324 memcpy (&arg.fpregs, fpregs, sizeof (arg.fpregs));
2325 win = (write (pi->ctl_fd, (void *) &arg, sizeof (arg)) == sizeof (arg));
2326#else
772cf8be 2327# ifdef PIOCTSFPREG
c3f6f71d
JM
2328 if (pi->tid == 0)
2329 win = (ioctl (pi->ctl_fd, PIOCSFPREG, fpregs) >= 0);
2330 else
2331 {
2332 struct {
2333 long pr_count;
2334 tid_t pr_error_thread;
2335 tfpregset_t thread_1;
2336 } thread_fpregs;
2337
2338 thread_fpregs.pr_count = 1;
2339 thread_fpregs.thread_1.tid = pi->tid;
2340 memcpy (&thread_fpregs.thread_1.pr_fpregs, fpregs,
2341 sizeof (*fpregs));
2342 win = (ioctl (pi->ctl_fd, PIOCTSFPREG, &thread_fpregs) >= 0);
2343 }
772cf8be 2344# else
c3f6f71d 2345 win = (ioctl (pi->ctl_fd, PIOCSFPREG, fpregs) >= 0);
772cf8be
MK
2346# endif
2347#endif /* NEW_PROC_API */
c906108c 2348 }
c3f6f71d 2349
772cf8be 2350 /* Policy: writing the registers invalidates our cache. */
c3f6f71d
JM
2351 pi->fpregs_valid = 0;
2352 return win;
c906108c
SS
2353}
2354
77382aee
PA
2355/* Send a signal to the proc or lwp with the semantics of "kill()".
2356 Returns non-zero for success, zero for failure. */
c906108c 2357
d3581e61 2358static int
fba45db2 2359proc_kill (procinfo *pi, int signo)
c3f6f71d
JM
2360{
2361 int win;
c906108c 2362
77382aee
PA
2363 /* We might conceivably apply this operation to an LWP, and the
2364 LWP's ctl file descriptor might not be open. */
c906108c 2365
c3f6f71d
JM
2366 if (pi->ctl_fd == 0 &&
2367 open_procinfo_files (pi, FD_CTL) == 0)
2368 {
2369 return 0;
2370 }
2371 else
2372 {
2373#ifdef NEW_PROC_API
37de36c6 2374 procfs_ctl_t cmd[2];
c906108c 2375
c3f6f71d
JM
2376 cmd[0] = PCKILL;
2377 cmd[1] = signo;
2378 win = (write (pi->ctl_fd, (char *) &cmd, sizeof (cmd)) == sizeof (cmd));
2379#else /* ioctl method */
2380 /* FIXME: do I need the Alpha OSF fixups present in
0df8b418 2381 procfs.c/unconditionally_kill_inferior? Perhaps only for SIGKILL? */
c3f6f71d
JM
2382 win = (ioctl (pi->ctl_fd, PIOCKILL, &signo) >= 0);
2383#endif
2384 }
c906108c 2385
c3f6f71d
JM
2386 return win;
2387}
c906108c 2388
77382aee
PA
2389/* Find the pid of the process that started this one. Returns the
2390 parent process pid, or zero. */
c906108c 2391
d3581e61 2392static int
fba45db2 2393proc_parent_pid (procinfo *pi)
c906108c 2394{
77382aee
PA
2395 /* We should never have to apply this operation to any procinfo
2396 except the one for the main process. If that ever changes for
2397 any reason, then take out the following clause and replace it
2398 with one that makes sure the ctl_fd is open. */
19958708 2399
c3f6f71d
JM
2400 if (pi->tid != 0)
2401 pi = find_procinfo_or_die (pi->pid, 0);
2402
2403 if (!pi->status_valid)
2404 if (!proc_get_status (pi))
2405 return 0;
c5aa993b 2406
c3f6f71d
JM
2407 return pi->prstatus.pr_ppid;
2408}
2409
9a043c1d
AC
2410/* Convert a target address (a.k.a. CORE_ADDR) into a host address
2411 (a.k.a void pointer)! */
2412
1ca8fce0 2413#if (defined (PCWATCH) || defined (PIOCSWATCH)) \
05b4bd79 2414 && !(defined (PIOCOPENLWP))
9a043c1d
AC
2415static void *
2416procfs_address_to_host_pointer (CORE_ADDR addr)
2417{
f5656ead 2418 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
9a043c1d
AC
2419 void *ptr;
2420
4e906f53 2421 gdb_assert (sizeof (ptr) == TYPE_LENGTH (ptr_type));
f5656ead 2422 gdbarch_address_to_pointer (target_gdbarch (), ptr_type,
0b62613e 2423 (gdb_byte *) &ptr, addr);
9a043c1d
AC
2424 return ptr;
2425}
1ca8fce0 2426#endif
9a043c1d 2427
a0911fd0 2428static int
fba45db2 2429proc_set_watchpoint (procinfo *pi, CORE_ADDR addr, int len, int wflags)
c3f6f71d 2430{
d1a7880c
PA
2431#if !defined (PCWATCH) && !defined (PIOCSWATCH)
2432 /* If neither or these is defined, we can't support watchpoints.
2433 This just avoids possibly failing to compile the below on such
2434 systems. */
c3f6f71d
JM
2435 return 0;
2436#else
0df8b418 2437/* Horrible hack! Detect Solaris 2.5, because this doesn't work on 2.5. */
05b4bd79 2438#if defined (PIOCOPENLWP) /* Solaris 2.5: bail out. */
c3f6f71d
JM
2439 return 0;
2440#else
2441 struct {
37de36c6 2442 procfs_ctl_t cmd;
c3f6f71d
JM
2443 char watch[sizeof (prwatch_t)];
2444 } arg;
73930d4d 2445 prwatch_t pwatch;
c3f6f71d 2446
9a043c1d
AC
2447 /* NOTE: cagney/2003-02-01: Even more horrible hack. Need to
2448 convert a target address into something that can be stored in a
2449 native data structure. */
831e682e 2450#ifdef PCAGENT /* Horrible hack: only defined on Solaris 2.6+ */
73930d4d 2451 pwatch.pr_vaddr = (uintptr_t) procfs_address_to_host_pointer (addr);
831e682e 2452#else
73930d4d 2453 pwatch.pr_vaddr = (caddr_t) procfs_address_to_host_pointer (addr);
831e682e 2454#endif
73930d4d
KH
2455 pwatch.pr_size = len;
2456 pwatch.pr_wflags = wflags;
c3f6f71d
JM
2457#if defined(NEW_PROC_API) && defined (PCWATCH)
2458 arg.cmd = PCWATCH;
73930d4d 2459 memcpy (arg.watch, &pwatch, sizeof (prwatch_t));
c3f6f71d
JM
2460 return (write (pi->ctl_fd, &arg, sizeof (arg)) == sizeof (arg));
2461#else
2462#if defined (PIOCSWATCH)
73930d4d 2463 return (ioctl (pi->ctl_fd, PIOCSWATCH, &pwatch) >= 0);
c3f6f71d
JM
2464#else
2465 return 0; /* Fail */
2466#endif
2467#endif
2468#endif
2469#endif
c906108c
SS
2470}
2471
965b60ee 2472#if (defined(__i386__) || defined(__x86_64__)) && defined (sun)
c906108c 2473
c3f6f71d 2474#include <sys/sysi86.h>
c906108c 2475
77382aee
PA
2476/* The KEY is actually the value of the lower 16 bits of the GS
2477 register for the LWP that we're interested in. Returns the
2478 matching ssh struct (LDT entry). */
c906108c 2479
337c776f 2480static struct ssd *
fba45db2 2481proc_get_LDT_entry (procinfo *pi, int key)
c906108c 2482{
c3f6f71d
JM
2483 static struct ssd *ldt_entry = NULL;
2484#ifdef NEW_PROC_API
2485 char pathname[MAX_PROC_NAME_SIZE];
2486 struct cleanup *old_chain = NULL;
2487 int fd;
2488
2489 /* Allocate space for one LDT entry.
2490 This alloc must persist, because we return a pointer to it. */
2491 if (ldt_entry == NULL)
2492 ldt_entry = (struct ssd *) xmalloc (sizeof (struct ssd));
2493
2494 /* Open the file descriptor for the LDT table. */
2495 sprintf (pathname, "/proc/%d/ldt", pi->pid);
4d1bcd09 2496 if ((fd = open_with_retry (pathname, O_RDONLY)) < 0)
c906108c 2497 {
c3f6f71d
JM
2498 proc_warn (pi, "proc_get_LDT_entry (open)", __LINE__);
2499 return NULL;
c906108c 2500 }
0df8b418 2501 /* Make sure it gets closed again! */
004527cb 2502 old_chain = make_cleanup_close (fd);
c906108c 2503
c3f6f71d
JM
2504 /* Now 'read' thru the table, find a match and return it. */
2505 while (read (fd, ldt_entry, sizeof (struct ssd)) == sizeof (struct ssd))
c906108c 2506 {
c3f6f71d
JM
2507 if (ldt_entry->sel == 0 &&
2508 ldt_entry->bo == 0 &&
2509 ldt_entry->acc1 == 0 &&
2510 ldt_entry->acc2 == 0)
2511 break; /* end of table */
0df8b418 2512 /* If key matches, return this entry. */
c3f6f71d
JM
2513 if (ldt_entry->sel == key)
2514 return ldt_entry;
c906108c 2515 }
0df8b418 2516 /* Loop ended, match not found. */
c3f6f71d
JM
2517 return NULL;
2518#else
2519 int nldt, i;
2520 static int nalloc = 0;
c906108c 2521
c3f6f71d
JM
2522 /* Get the number of LDT entries. */
2523 if (ioctl (pi->ctl_fd, PIOCNLDT, &nldt) < 0)
c906108c 2524 {
c3f6f71d
JM
2525 proc_warn (pi, "proc_get_LDT_entry (PIOCNLDT)", __LINE__);
2526 return NULL;
c906108c
SS
2527 }
2528
0df8b418
MS
2529 /* Allocate space for the number of LDT entries. */
2530 /* This alloc has to persist, 'cause we return a pointer to it. */
c3f6f71d 2531 if (nldt > nalloc)
c906108c 2532 {
19958708 2533 ldt_entry = (struct ssd *)
c3f6f71d
JM
2534 xrealloc (ldt_entry, (nldt + 1) * sizeof (struct ssd));
2535 nalloc = nldt;
2536 }
19958708 2537
c3f6f71d
JM
2538 /* Read the whole table in one gulp. */
2539 if (ioctl (pi->ctl_fd, PIOCLDT, ldt_entry) < 0)
2540 {
2541 proc_warn (pi, "proc_get_LDT_entry (PIOCLDT)", __LINE__);
2542 return NULL;
c906108c
SS
2543 }
2544
0df8b418 2545 /* Search the table and return the (first) entry matching 'key'. */
c3f6f71d
JM
2546 for (i = 0; i < nldt; i++)
2547 if (ldt_entry[i].sel == key)
2548 return &ldt_entry[i];
c906108c 2549
0df8b418 2550 /* Loop ended, match not found. */
c3f6f71d
JM
2551 return NULL;
2552#endif
2553}
c906108c 2554
77382aee 2555/* Returns the pointer to the LDT entry of PTID. */
965b60ee
JB
2556
2557struct ssd *
2558procfs_find_LDT_entry (ptid_t ptid)
2559{
2560 gdb_gregset_t *gregs;
2561 int key;
2562 procinfo *pi;
2563
0df8b418 2564 /* Find procinfo for the lwp. */
dfd4cc63 2565 if ((pi = find_procinfo (ptid_get_pid (ptid), ptid_get_lwp (ptid))) == NULL)
965b60ee 2566 {
0b62613e 2567 warning (_("procfs_find_LDT_entry: could not find procinfo for %d:%ld."),
dfd4cc63 2568 ptid_get_pid (ptid), ptid_get_lwp (ptid));
965b60ee
JB
2569 return NULL;
2570 }
0df8b418 2571 /* get its general registers. */
965b60ee
JB
2572 if ((gregs = proc_get_gregs (pi)) == NULL)
2573 {
0b62613e 2574 warning (_("procfs_find_LDT_entry: could not read gregs for %d:%ld."),
dfd4cc63 2575 ptid_get_pid (ptid), ptid_get_lwp (ptid));
965b60ee
JB
2576 return NULL;
2577 }
0df8b418 2578 /* Now extract the GS register's lower 16 bits. */
965b60ee
JB
2579 key = (*gregs)[GS] & 0xffff;
2580
0df8b418 2581 /* Find the matching entry and return it. */
965b60ee
JB
2582 return proc_get_LDT_entry (pi, key);
2583}
2584
2585#endif
c906108c 2586
c3f6f71d 2587/* =============== END, non-thread part of /proc "MODULE" =============== */
c906108c 2588
c3f6f71d 2589/* =================== Thread "MODULE" =================== */
c906108c 2590
c3f6f71d
JM
2591/* NOTE: you'll see more ifdefs and duplication of functions here,
2592 since there is a different way to do threads on every OS. */
c906108c 2593
77382aee 2594/* Returns the number of threads for the process. */
c906108c 2595
c3f6f71d 2596#if defined (PIOCNTHR) && defined (PIOCTLIST)
77382aee 2597/* OSF version */
d3581e61 2598static int
fba45db2 2599proc_get_nthreads (procinfo *pi)
c3f6f71d
JM
2600{
2601 int nthreads = 0;
c906108c 2602
c3f6f71d
JM
2603 if (ioctl (pi->ctl_fd, PIOCNTHR, &nthreads) < 0)
2604 proc_warn (pi, "procfs: PIOCNTHR failed", __LINE__);
c906108c 2605
c3f6f71d 2606 return nthreads;
c906108c
SS
2607}
2608
c3f6f71d
JM
2609#else
2610#if defined (SYS_lwpcreate) || defined (SYS_lwp_create) /* FIXME: multiple */
05b4bd79 2611/* Solaris version */
d3581e61 2612static int
fba45db2 2613proc_get_nthreads (procinfo *pi)
c906108c 2614{
c3f6f71d
JM
2615 if (!pi->status_valid)
2616 if (!proc_get_status (pi))
2617 return 0;
c5aa993b 2618
77382aee
PA
2619 /* NEW_PROC_API: only works for the process procinfo, because the
2620 LWP procinfos do not get prstatus filled in. */
19958708 2621#ifdef NEW_PROC_API
0df8b418 2622 if (pi->tid != 0) /* Find the parent process procinfo. */
c3f6f71d 2623 pi = find_procinfo_or_die (pi->pid, 0);
c5aa993b 2624#endif
c3f6f71d 2625 return pi->prstatus.pr_nlwp;
c906108c
SS
2626}
2627
c3f6f71d 2628#else
77382aee 2629/* Default version */
d3581e61 2630static int
fba45db2 2631proc_get_nthreads (procinfo *pi)
c906108c 2632{
c3f6f71d
JM
2633 return 0;
2634}
2635#endif
2636#endif
2637
77382aee
PA
2638/* LWP version.
2639
2640 Return the ID of the thread that had an event of interest.
2641 (ie. the one that hit a breakpoint or other traced event). All
2642 other things being equal, this should be the ID of a thread that is
2643 currently executing. */
c3f6f71d
JM
2644
2645#if defined (SYS_lwpcreate) || defined (SYS_lwp_create) /* FIXME: multiple */
05b4bd79 2646/* Solaris version */
d3581e61 2647static int
fba45db2 2648proc_get_current_thread (procinfo *pi)
c3f6f71d 2649{
77382aee
PA
2650 /* Note: this should be applied to the root procinfo for the
2651 process, not to the procinfo for an LWP. If applied to the
2652 procinfo for an LWP, it will simply return that LWP's ID. In
2653 that case, find the parent process procinfo. */
19958708 2654
c3f6f71d
JM
2655 if (pi->tid != 0)
2656 pi = find_procinfo_or_die (pi->pid, 0);
2657
2658 if (!pi->status_valid)
2659 if (!proc_get_status (pi))
2660 return 0;
2661
2662#ifdef NEW_PROC_API
2663 return pi->prstatus.pr_lwp.pr_lwpid;
c906108c 2664#else
c3f6f71d 2665 return pi->prstatus.pr_who;
c906108c 2666#endif
c3f6f71d 2667}
c906108c 2668
c3f6f71d
JM
2669#else
2670#if defined (PIOCNTHR) && defined (PIOCTLIST)
77382aee 2671/* OSF version */
d3581e61 2672static int
fba45db2 2673proc_get_current_thread (procinfo *pi)
c3f6f71d 2674{
0df8b418 2675#if 0 /* FIXME: not ready for prime time? */
c3f6f71d
JM
2676 return pi->prstatus.pr_tid;
2677#else
2678 return 0;
2679#endif
c906108c
SS
2680}
2681
c3f6f71d 2682#else
77382aee 2683/* Default version */
d3581e61 2684static int
fba45db2 2685proc_get_current_thread (procinfo *pi)
c906108c 2686{
c3f6f71d
JM
2687 return 0;
2688}
2689
2690#endif
2691#endif
c906108c 2692
77382aee
PA
2693/* Discover the IDs of all the threads within the process, and create
2694 a procinfo for each of them (chained to the parent). This
2695 unfortunately requires a different method on every OS. Returns
2696 non-zero for success, zero for failure. */
c906108c 2697
a0911fd0 2698static int
fba45db2 2699proc_delete_dead_threads (procinfo *parent, procinfo *thread, void *ignore)
c3f6f71d
JM
2700{
2701 if (thread && parent) /* sanity */
c906108c 2702 {
c3f6f71d
JM
2703 thread->status_valid = 0;
2704 if (!proc_get_status (thread))
2705 destroy_one_procinfo (&parent->thread_list, thread);
2706 }
2707 return 0; /* keep iterating */
2708}
c5aa993b 2709
c3f6f71d 2710#if defined (PIOCLSTATUS)
77382aee 2711/* Solaris 2.5 (ioctl) version */
d3581e61 2712static int
fba45db2 2713proc_update_threads (procinfo *pi)
c3f6f71d
JM
2714{
2715 gdb_prstatus_t *prstatus;
2716 struct cleanup *old_chain = NULL;
2717 procinfo *thread;
2718 int nlwp, i;
2719
77382aee
PA
2720 /* We should never have to apply this operation to any procinfo
2721 except the one for the main process. If that ever changes for
2722 any reason, then take out the following clause and replace it
2723 with one that makes sure the ctl_fd is open. */
19958708 2724
c3f6f71d
JM
2725 if (pi->tid != 0)
2726 pi = find_procinfo_or_die (pi->pid, 0);
2727
2728 proc_iterate_over_threads (pi, proc_delete_dead_threads, NULL);
2729
2730 if ((nlwp = proc_get_nthreads (pi)) <= 1)
2731 return 1; /* Process is not multi-threaded; nothing to do. */
2732
3c37485b 2733 prstatus = xmalloc (sizeof (gdb_prstatus_t) * (nlwp + 1));
c3f6f71d 2734
b8c9b27d 2735 old_chain = make_cleanup (xfree, prstatus);
c3f6f71d
JM
2736 if (ioctl (pi->ctl_fd, PIOCLSTATUS, prstatus) < 0)
2737 proc_error (pi, "update_threads (PIOCLSTATUS)", __LINE__);
2738
77382aee 2739 /* Skip element zero, which represents the process as a whole. */
c3f6f71d
JM
2740 for (i = 1; i < nlwp + 1; i++)
2741 {
2742 if ((thread = create_procinfo (pi->pid, prstatus[i].pr_who)) == NULL)
2743 proc_error (pi, "update_threads, create_procinfo", __LINE__);
c5aa993b 2744
c3f6f71d
JM
2745 memcpy (&thread->prstatus, &prstatus[i], sizeof (*prstatus));
2746 thread->status_valid = 1;
2747 }
2748 pi->threads_valid = 1;
2749 do_cleanups (old_chain);
2750 return 1;
2751}
2752#else
2753#ifdef NEW_PROC_API
05b4bd79 2754/* Solaris 6 (and later) version. */
004527cb
AC
2755static void
2756do_closedir_cleanup (void *dir)
2757{
2758 closedir (dir);
2759}
2760
d3581e61 2761static int
fba45db2 2762proc_update_threads (procinfo *pi)
c3f6f71d
JM
2763{
2764 char pathname[MAX_PROC_NAME_SIZE + 16];
2765 struct dirent *direntry;
2766 struct cleanup *old_chain = NULL;
2767 procinfo *thread;
2768 DIR *dirp;
2769 int lwpid;
2770
77382aee
PA
2771 /* We should never have to apply this operation to any procinfo
2772 except the one for the main process. If that ever changes for
2773 any reason, then take out the following clause and replace it
2774 with one that makes sure the ctl_fd is open. */
19958708 2775
c3f6f71d
JM
2776 if (pi->tid != 0)
2777 pi = find_procinfo_or_die (pi->pid, 0);
2778
2779 proc_iterate_over_threads (pi, proc_delete_dead_threads, NULL);
2780
05b4bd79
PA
2781 /* Note: this brute-force method was originally devised for Unixware
2782 (support removed since), and will also work on Solaris 2.6 and
2783 2.7. The original comment mentioned the existence of a much
2784 simpler and more elegant way to do this on Solaris, but didn't
2785 point out what that was. */
c3f6f71d
JM
2786
2787 strcpy (pathname, pi->pathname);
2788 strcat (pathname, "/lwp");
2789 if ((dirp = opendir (pathname)) == NULL)
2790 proc_error (pi, "update_threads, opendir", __LINE__);
2791
004527cb 2792 old_chain = make_cleanup (do_closedir_cleanup, dirp);
c3f6f71d
JM
2793 while ((direntry = readdir (dirp)) != NULL)
2794 if (direntry->d_name[0] != '.') /* skip '.' and '..' */
2795 {
2796 lwpid = atoi (&direntry->d_name[0]);
2797 if ((thread = create_procinfo (pi->pid, lwpid)) == NULL)
2798 proc_error (pi, "update_threads, create_procinfo", __LINE__);
2799 }
2800 pi->threads_valid = 1;
2801 do_cleanups (old_chain);
2802 return 1;
2803}
2804#else
2805#ifdef PIOCTLIST
77382aee 2806/* OSF version */
d3581e61 2807static int
fba45db2 2808proc_update_threads (procinfo *pi)
c3f6f71d
JM
2809{
2810 int nthreads, i;
2811 tid_t *threads;
2812
77382aee
PA
2813 /* We should never have to apply this operation to any procinfo
2814 except the one for the main process. If that ever changes for
2815 any reason, then take out the following clause and replace it
2816 with one that makes sure the ctl_fd is open. */
19958708 2817
c3f6f71d
JM
2818 if (pi->tid != 0)
2819 pi = find_procinfo_or_die (pi->pid, 0);
2820
2821 proc_iterate_over_threads (pi, proc_delete_dead_threads, NULL);
2822
2823 nthreads = proc_get_nthreads (pi);
2824 if (nthreads < 2)
0df8b418 2825 return 0; /* Nothing to do for 1 or fewer threads. */
c3f6f71d 2826
3c37485b 2827 threads = xmalloc (nthreads * sizeof (tid_t));
19958708 2828
c3f6f71d
JM
2829 if (ioctl (pi->ctl_fd, PIOCTLIST, threads) < 0)
2830 proc_error (pi, "procfs: update_threads (PIOCTLIST)", __LINE__);
2831
2832 for (i = 0; i < nthreads; i++)
2833 {
2834 if (!find_procinfo (pi->pid, threads[i]))
2835 if (!create_procinfo (pi->pid, threads[i]))
2836 proc_error (pi, "update_threads, create_procinfo", __LINE__);
c906108c 2837 }
c3f6f71d
JM
2838 pi->threads_valid = 1;
2839 return 1;
c906108c 2840}
c3f6f71d 2841#else
77382aee 2842/* Default version */
d3581e61 2843static int
fba45db2 2844proc_update_threads (procinfo *pi)
c3f6f71d
JM
2845{
2846 return 0;
2847}
2848#endif /* OSF PIOCTLIST */
2849#endif /* NEW_PROC_API */
2850#endif /* SOL 2.5 PIOCLSTATUS */
c906108c 2851
77382aee
PA
2852/* Given a pointer to a function, call that function once for each lwp
2853 in the procinfo list, until the function returns non-zero, in which
2854 event return the value returned by the function.
2855
2856 Note: this function does NOT call update_threads. If you want to
2857 discover new threads first, you must call that function explicitly.
2858 This function just makes a quick pass over the currently-known
2859 procinfos.
2860
2861 PI is the parent process procinfo. FUNC is the per-thread
2862 function. PTR is an opaque parameter for function. Returns the
2863 first non-zero return value from the callee, or zero. */
c3f6f71d 2864
d3581e61 2865static int
d0849a9a
KB
2866proc_iterate_over_threads (procinfo *pi,
2867 int (*func) (procinfo *, procinfo *, void *),
2868 void *ptr)
c906108c 2869{
c3f6f71d
JM
2870 procinfo *thread, *next;
2871 int retval = 0;
c906108c 2872
77382aee
PA
2873 /* We should never have to apply this operation to any procinfo
2874 except the one for the main process. If that ever changes for
2875 any reason, then take out the following clause and replace it
2876 with one that makes sure the ctl_fd is open. */
19958708 2877
c3f6f71d
JM
2878 if (pi->tid != 0)
2879 pi = find_procinfo_or_die (pi->pid, 0);
2880
2881 for (thread = pi->thread_list; thread != NULL; thread = next)
c906108c 2882 {
0df8b418 2883 next = thread->next; /* In case thread is destroyed. */
c3f6f71d
JM
2884 if ((retval = (*func) (pi, thread, ptr)) != 0)
2885 break;
c906108c 2886 }
c3f6f71d
JM
2887
2888 return retval;
c906108c
SS
2889}
2890
c3f6f71d
JM
2891/* =================== END, Thread "MODULE" =================== */
2892
2893/* =================== END, /proc "MODULE" =================== */
2894
2895/* =================== GDB "MODULE" =================== */
2896
77382aee
PA
2897/* Here are all of the gdb target vector functions and their
2898 friends. */
c3f6f71d 2899
39f77062 2900static ptid_t do_attach (ptid_t ptid);
a14ed312 2901static void do_detach (int signo);
9185ddce 2902static void proc_trace_syscalls_1 (procinfo *pi, int syscallnum,
77382aee 2903 int entry_or_exit, int mode, int from_tty);
9185ddce
JB
2904
2905/* On mips-irix, we need to insert a breakpoint at __dbx_link during
2906 the startup phase. The following two variables are used to record
2907 the address of the breakpoint, and the code that was replaced by
2908 a breakpoint. */
2909static int dbx_link_bpt_addr = 0;
8181d85f 2910static void *dbx_link_bpt;
c3f6f71d 2911
77382aee
PA
2912/* Sets up the inferior to be debugged. Registers to trace signals,
2913 hardware faults, and syscalls. Note: does not set RLC flag: caller
2914 may want to customize that. Returns zero for success (note!
2915 unlike most functions in this module); on failure, returns the LINE
2916 NUMBER where it failed! */
c3f6f71d
JM
2917
2918static int
fba45db2 2919procfs_debug_inferior (procinfo *pi)
c906108c 2920{
c3f6f71d 2921 fltset_t traced_faults;
37de36c6
KB
2922 gdb_sigset_t traced_signals;
2923 sysset_t *traced_syscall_entries;
2924 sysset_t *traced_syscall_exits;
2925 int status;
c906108c 2926
c3f6f71d
JM
2927#ifdef PROCFS_DONT_TRACE_FAULTS
2928 /* On some systems (OSF), we don't trace hardware faults.
2929 Apparently it's enough that we catch them as signals.
0df8b418
MS
2930 Wonder why we don't just do that in general? */
2931 premptyset (&traced_faults); /* don't trace faults. */
c3f6f71d 2932#else
0df8b418
MS
2933 /* Register to trace hardware faults in the child. */
2934 prfillset (&traced_faults); /* trace all faults... */
3c95f01c 2935 gdb_prdelset (&traced_faults, FLTPAGE); /* except page fault. */
c3f6f71d
JM
2936#endif
2937 if (!proc_set_traced_faults (pi, &traced_faults))
2938 return __LINE__;
c906108c 2939
2455069d
UW
2940 /* Initially, register to trace all signals in the child. */
2941 prfillset (&traced_signals);
2942 if (!proc_set_traced_signals (pi, &traced_signals))
c3f6f71d
JM
2943 return __LINE__;
2944
37de36c6 2945
c3f6f71d 2946 /* Register to trace the 'exit' system call (on entry). */
37de36c6
KB
2947 traced_syscall_entries = sysset_t_alloc (pi);
2948 gdb_premptysysset (traced_syscall_entries);
2949#ifdef SYS_exit
2950 gdb_praddsysset (traced_syscall_entries, SYS_exit);
2951#endif
c3f6f71d 2952#ifdef SYS_lwpexit
0df8b418 2953 gdb_praddsysset (traced_syscall_entries, SYS_lwpexit);/* And _lwp_exit... */
c3f6f71d
JM
2954#endif
2955#ifdef SYS_lwp_exit
37de36c6
KB
2956 gdb_praddsysset (traced_syscall_entries, SYS_lwp_exit);
2957#endif
2958#ifdef DYNAMIC_SYSCALLS
2959 {
2960 int callnum = find_syscall (pi, "_exit");
f4a14ae6 2961
37de36c6
KB
2962 if (callnum >= 0)
2963 gdb_praddsysset (traced_syscall_entries, callnum);
2964 }
c906108c
SS
2965#endif
2966
37de36c6
KB
2967 status = proc_set_traced_sysentry (pi, traced_syscall_entries);
2968 xfree (traced_syscall_entries);
2969 if (!status)
c3f6f71d
JM
2970 return __LINE__;
2971
2972#ifdef PRFS_STOPEXEC /* defined on OSF */
2973 /* OSF method for tracing exec syscalls. Quoting:
2974 Under Alpha OSF/1 we have to use a PIOCSSPCACT ioctl to trace
2975 exits from exec system calls because of the user level loader. */
0df8b418 2976 /* FIXME: make nice and maybe move into an access function. */
c3f6f71d
JM
2977 {
2978 int prfs_flags;
2979
2980 if (ioctl (pi->ctl_fd, PIOCGSPCACT, &prfs_flags) < 0)
2981 return __LINE__;
2982
2983 prfs_flags |= PRFS_STOPEXEC;
2984
2985 if (ioctl (pi->ctl_fd, PIOCSSPCACT, &prfs_flags) < 0)
2986 return __LINE__;
2987 }
2988#else /* not PRFS_STOPEXEC */
0df8b418 2989 /* Everyone else's (except OSF) method for tracing exec syscalls. */
c3f6f71d
JM
2990 /* GW: Rationale...
2991 Not all systems with /proc have all the exec* syscalls with the same
2992 names. On the SGI, for example, there is no SYS_exec, but there
0df8b418 2993 *is* a SYS_execv. So, we try to account for that. */
c3f6f71d 2994
37de36c6
KB
2995 traced_syscall_exits = sysset_t_alloc (pi);
2996 gdb_premptysysset (traced_syscall_exits);
c3f6f71d 2997#ifdef SYS_exec
37de36c6 2998 gdb_praddsysset (traced_syscall_exits, SYS_exec);
c3f6f71d
JM
2999#endif
3000#ifdef SYS_execve
37de36c6 3001 gdb_praddsysset (traced_syscall_exits, SYS_execve);
c3f6f71d
JM
3002#endif
3003#ifdef SYS_execv
37de36c6 3004 gdb_praddsysset (traced_syscall_exits, SYS_execv);
c3f6f71d 3005#endif
c5aa993b 3006
c3f6f71d 3007#ifdef SYS_lwpcreate
37de36c6
KB
3008 gdb_praddsysset (traced_syscall_exits, SYS_lwpcreate);
3009 gdb_praddsysset (traced_syscall_exits, SYS_lwpexit);
c906108c 3010#endif
c5aa993b 3011
0df8b418 3012#ifdef SYS_lwp_create /* FIXME: once only, please. */
37de36c6
KB
3013 gdb_praddsysset (traced_syscall_exits, SYS_lwp_create);
3014 gdb_praddsysset (traced_syscall_exits, SYS_lwp_exit);
c3f6f71d 3015#endif
c5aa993b 3016
37de36c6
KB
3017#ifdef DYNAMIC_SYSCALLS
3018 {
3019 int callnum = find_syscall (pi, "execve");
f4a14ae6 3020
37de36c6
KB
3021 if (callnum >= 0)
3022 gdb_praddsysset (traced_syscall_exits, callnum);
3023 callnum = find_syscall (pi, "ra_execve");
3024 if (callnum >= 0)
3025 gdb_praddsysset (traced_syscall_exits, callnum);
3026 }
3027#endif
c906108c 3028
37de36c6
KB
3029 status = proc_set_traced_sysexit (pi, traced_syscall_exits);
3030 xfree (traced_syscall_exits);
3031 if (!status)
c3f6f71d
JM
3032 return __LINE__;
3033
3034#endif /* PRFS_STOPEXEC */
3035 return 0;
c906108c
SS
3036}
3037
19958708 3038static void
c0939df1 3039procfs_attach (struct target_ops *ops, const char *args, int from_tty)
c906108c 3040{
c3f6f71d
JM
3041 char *exec_file;
3042 int pid;
3043
74164c56 3044 pid = parse_pid_to_attach (args);
c3f6f71d 3045
c3f6f71d 3046 if (pid == getpid ())
8a3fe4f8 3047 error (_("Attaching GDB to itself is not a good idea..."));
c906108c 3048
c3f6f71d 3049 if (from_tty)
c906108c 3050 {
c3f6f71d
JM
3051 exec_file = get_exec_file (0);
3052
3053 if (exec_file)
a3f17187 3054 printf_filtered (_("Attaching to program `%s', %s\n"),
39f77062 3055 exec_file, target_pid_to_str (pid_to_ptid (pid)));
c3f6f71d 3056 else
a3f17187 3057 printf_filtered (_("Attaching to %s\n"),
77382aee 3058 target_pid_to_str (pid_to_ptid (pid)));
c3f6f71d
JM
3059
3060 fflush (stdout);
c906108c 3061 }
39f77062 3062 inferior_ptid = do_attach (pid_to_ptid (pid));
6a3cb8e8
PA
3063 if (!target_is_pushed (ops))
3064 push_target (ops);
c3f6f71d
JM
3065}
3066
19958708 3067static void
52554a0e 3068procfs_detach (struct target_ops *ops, const char *args, int from_tty)
c3f6f71d 3069{
cc377e6b 3070 int sig = 0;
dfd4cc63 3071 int pid = ptid_get_pid (inferior_ptid);
cc377e6b
MK
3072
3073 if (args)
3074 sig = atoi (args);
c3f6f71d
JM
3075
3076 if (from_tty)
c906108c 3077 {
cc377e6b
MK
3078 char *exec_file;
3079
c3f6f71d 3080 exec_file = get_exec_file (0);
cc377e6b 3081 if (exec_file == NULL)
c3f6f71d 3082 exec_file = "";
cc377e6b 3083
a3f17187 3084 printf_filtered (_("Detaching from program: %s, %s\n"), exec_file,
cc377e6b
MK
3085 target_pid_to_str (pid_to_ptid (pid)));
3086 gdb_flush (gdb_stdout);
c906108c 3087 }
19958708 3088
cc377e6b
MK
3089 do_detach (sig);
3090
39f77062 3091 inferior_ptid = null_ptid;
7f9f62ba 3092 detach_inferior (pid);
6a3cb8e8 3093 inf_child_maybe_unpush_target (ops);
c906108c
SS
3094}
3095
39f77062
KB
3096static ptid_t
3097do_attach (ptid_t ptid)
c906108c 3098{
c3f6f71d 3099 procinfo *pi;
181e7f93 3100 struct inferior *inf;
c3f6f71d 3101 int fail;
2689673f 3102 int lwpid;
c3f6f71d 3103
dfd4cc63 3104 if ((pi = create_procinfo (ptid_get_pid (ptid), 0)) == NULL)
8a3fe4f8 3105 perror (_("procfs: out of memory in 'attach'"));
c3f6f71d
JM
3106
3107 if (!open_procinfo_files (pi, FD_CTL))
3108 {
3109 fprintf_filtered (gdb_stderr, "procfs:%d -- ", __LINE__);
19958708 3110 sprintf (errmsg, "do_attach: couldn't open /proc file for process %d",
dfd4cc63 3111 ptid_get_pid (ptid));
c3f6f71d
JM
3112 dead_procinfo (pi, errmsg, NOKILL);
3113 }
c906108c 3114
c3f6f71d
JM
3115 /* Stop the process (if it isn't already stopped). */
3116 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
c906108c 3117 {
c3f6f71d
JM
3118 pi->was_stopped = 1;
3119 proc_prettyprint_why (proc_why (pi), proc_what (pi), 1);
c906108c
SS
3120 }
3121 else
3122 {
c3f6f71d
JM
3123 pi->was_stopped = 0;
3124 /* Set the process to run again when we close it. */
3125 if (!proc_set_run_on_last_close (pi))
3126 dead_procinfo (pi, "do_attach: couldn't set RLC.", NOKILL);
3127
0df8b418 3128 /* Now stop the process. */
c3f6f71d
JM
3129 if (!proc_stop_process (pi))
3130 dead_procinfo (pi, "do_attach: couldn't stop the process.", NOKILL);
3131 pi->ignore_next_sigstop = 1;
c906108c 3132 }
c3f6f71d
JM
3133 /* Save some of the /proc state to be restored if we detach. */
3134 if (!proc_get_traced_faults (pi, &pi->saved_fltset))
3135 dead_procinfo (pi, "do_attach: couldn't save traced faults.", NOKILL);
3136 if (!proc_get_traced_signals (pi, &pi->saved_sigset))
3137 dead_procinfo (pi, "do_attach: couldn't save traced signals.", NOKILL);
37de36c6 3138 if (!proc_get_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d
JM
3139 dead_procinfo (pi, "do_attach: couldn't save traced syscall entries.",
3140 NOKILL);
37de36c6 3141 if (!proc_get_traced_sysexit (pi, pi->saved_exitset))
19958708 3142 dead_procinfo (pi, "do_attach: couldn't save traced syscall exits.",
c3f6f71d
JM
3143 NOKILL);
3144 if (!proc_get_held_signals (pi, &pi->saved_sighold))
3145 dead_procinfo (pi, "do_attach: couldn't save held signals.", NOKILL);
3146
3147 if ((fail = procfs_debug_inferior (pi)) != 0)
3148 dead_procinfo (pi, "do_attach: failed in procfs_debug_inferior", NOKILL);
3149
6c95b8df
PA
3150 inf = current_inferior ();
3151 inferior_appeared (inf, pi->pid);
c3f6f71d 3152 /* Let GDB know that the inferior was attached. */
181e7f93 3153 inf->attach_flag = 1;
2689673f
PA
3154
3155 /* Create a procinfo for the current lwp. */
3156 lwpid = proc_get_current_thread (pi);
3157 create_procinfo (pi->pid, lwpid);
3158
3159 /* Add it to gdb's thread list. */
dfd4cc63 3160 ptid = ptid_build (pi->pid, lwpid, 0);
2689673f
PA
3161 add_thread (ptid);
3162
3163 return ptid;
c906108c
SS
3164}
3165
3166static void
fba45db2 3167do_detach (int signo)
c906108c 3168{
c3f6f71d 3169 procinfo *pi;
c906108c 3170
0df8b418 3171 /* Find procinfo for the main process. */
dfd4cc63
LM
3172 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid),
3173 0); /* FIXME: threads */
c3f6f71d
JM
3174 if (signo)
3175 if (!proc_set_current_signal (pi, signo))
3176 proc_warn (pi, "do_detach, set_current_signal", __LINE__);
c5aa993b 3177
c3f6f71d
JM
3178 if (!proc_set_traced_signals (pi, &pi->saved_sigset))
3179 proc_warn (pi, "do_detach, set_traced_signal", __LINE__);
c906108c 3180
c3f6f71d
JM
3181 if (!proc_set_traced_faults (pi, &pi->saved_fltset))
3182 proc_warn (pi, "do_detach, set_traced_faults", __LINE__);
3183
37de36c6 3184 if (!proc_set_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d
JM
3185 proc_warn (pi, "do_detach, set_traced_sysentry", __LINE__);
3186
37de36c6 3187 if (!proc_set_traced_sysexit (pi, pi->saved_exitset))
c3f6f71d
JM
3188 proc_warn (pi, "do_detach, set_traced_sysexit", __LINE__);
3189
3190 if (!proc_set_held_signals (pi, &pi->saved_sighold))
3191 proc_warn (pi, "do_detach, set_held_signals", __LINE__);
3192
3193 if (signo || (proc_flags (pi) & (PR_STOPPED | PR_ISTOP)))
3194 if (signo || !(pi->was_stopped) ||
e2e0b3e5 3195 query (_("Was stopped when attached, make it runnable again? ")))
c3f6f71d
JM
3196 {
3197 /* Clear any pending signal. */
3198 if (!proc_clear_current_fault (pi))
3199 proc_warn (pi, "do_detach, clear_current_fault", __LINE__);
3200
1a303dec
MS
3201 if (signo == 0 && !proc_clear_current_signal (pi))
3202 proc_warn (pi, "do_detach, clear_current_signal", __LINE__);
3203
c3f6f71d
JM
3204 if (!proc_set_run_on_last_close (pi))
3205 proc_warn (pi, "do_detach, set_rlc", __LINE__);
3206 }
3207
c3f6f71d 3208 destroy_procinfo (pi);
c906108c
SS
3209}
3210
772cf8be
MK
3211/* Fetch register REGNUM from the inferior. If REGNUM is -1, do this
3212 for all registers.
3213
3214 ??? Is the following note still relevant? We can't get individual
3215 registers with the PT_GETREGS ptrace(2) request either, yet we
3216 don't bother with caching at all in that case.
3217
3218 NOTE: Since the /proc interface cannot give us individual
3219 registers, we pay no attention to REGNUM, and just fetch them all.
3220 This results in the possibility that we will do unnecessarily many
3221 fetches, since we may be called repeatedly for individual
3222 registers. So we cache the results, and mark the cache invalid
3223 when the process is resumed. */
c3f6f71d 3224
c906108c 3225static void
28439f5e
PA
3226procfs_fetch_registers (struct target_ops *ops,
3227 struct regcache *regcache, int regnum)
c906108c 3228{
772cf8be
MK
3229 gdb_gregset_t *gregs;
3230 procinfo *pi;
dfd4cc63
LM
3231 int pid = ptid_get_pid (inferior_ptid);
3232 int tid = ptid_get_lwp (inferior_ptid);
40a6adc1 3233 struct gdbarch *gdbarch = get_regcache_arch (regcache);
c3f6f71d 3234
2689673f 3235 pi = find_procinfo_or_die (pid, tid);
c3f6f71d
JM
3236
3237 if (pi == NULL)
8a3fe4f8 3238 error (_("procfs: fetch_registers failed to find procinfo for %s"),
39f77062 3239 target_pid_to_str (inferior_ptid));
c3f6f71d 3240
772cf8be
MK
3241 gregs = proc_get_gregs (pi);
3242 if (gregs == NULL)
c3f6f71d
JM
3243 proc_error (pi, "fetch_registers, get_gregs", __LINE__);
3244
56be3814 3245 supply_gregset (regcache, (const gdb_gregset_t *) gregs);
c3f6f71d 3246
40a6adc1 3247 if (gdbarch_fp0_regnum (gdbarch) >= 0) /* Do we have an FPU? */
60054393 3248 {
772cf8be
MK
3249 gdb_fpregset_t *fpregs;
3250
40a6adc1
MD
3251 if ((regnum >= 0 && regnum < gdbarch_fp0_regnum (gdbarch))
3252 || regnum == gdbarch_pc_regnum (gdbarch)
3253 || regnum == gdbarch_sp_regnum (gdbarch))
772cf8be 3254 return; /* Not a floating point register. */
c5aa993b 3255
772cf8be
MK
3256 fpregs = proc_get_fpregs (pi);
3257 if (fpregs == NULL)
60054393 3258 proc_error (pi, "fetch_registers, get_fpregs", __LINE__);
c906108c 3259
56be3814 3260 supply_fpregset (regcache, (const gdb_fpregset_t *) fpregs);
60054393 3261 }
c906108c
SS
3262}
3263
772cf8be
MK
3264/* Store register REGNUM back into the inferior. If REGNUM is -1, do
3265 this for all registers.
3266
3267 NOTE: Since the /proc interface will not read individual registers,
3268 we will cache these requests until the process is resumed, and only
3269 then write them back to the inferior process.
77382aee 3270
772cf8be
MK
3271 FIXME: is that a really bad idea? Have to think about cases where
3272 writing one register might affect the value of others, etc. */
c906108c 3273
c3f6f71d 3274static void
28439f5e
PA
3275procfs_store_registers (struct target_ops *ops,
3276 struct regcache *regcache, int regnum)
c3f6f71d 3277{
772cf8be
MK
3278 gdb_gregset_t *gregs;
3279 procinfo *pi;
dfd4cc63
LM
3280 int pid = ptid_get_pid (inferior_ptid);
3281 int tid = ptid_get_lwp (inferior_ptid);
40a6adc1 3282 struct gdbarch *gdbarch = get_regcache_arch (regcache);
c3f6f71d 3283
2689673f 3284 pi = find_procinfo_or_die (pid, tid);
c3f6f71d
JM
3285
3286 if (pi == NULL)
8a3fe4f8 3287 error (_("procfs: store_registers: failed to find procinfo for %s"),
39f77062 3288 target_pid_to_str (inferior_ptid));
c906108c 3289
772cf8be
MK
3290 gregs = proc_get_gregs (pi);
3291 if (gregs == NULL)
c3f6f71d 3292 proc_error (pi, "store_registers, get_gregs", __LINE__);
c906108c 3293
56be3814 3294 fill_gregset (regcache, gregs, regnum);
c3f6f71d
JM
3295 if (!proc_set_gregs (pi))
3296 proc_error (pi, "store_registers, set_gregs", __LINE__);
c906108c 3297
40a6adc1 3298 if (gdbarch_fp0_regnum (gdbarch) >= 0) /* Do we have an FPU? */
60054393 3299 {
772cf8be
MK
3300 gdb_fpregset_t *fpregs;
3301
40a6adc1
MD
3302 if ((regnum >= 0 && regnum < gdbarch_fp0_regnum (gdbarch))
3303 || regnum == gdbarch_pc_regnum (gdbarch)
3304 || regnum == gdbarch_sp_regnum (gdbarch))
772cf8be 3305 return; /* Not a floating point register. */
60054393 3306
772cf8be
MK
3307 fpregs = proc_get_fpregs (pi);
3308 if (fpregs == NULL)
60054393
MS
3309 proc_error (pi, "store_registers, get_fpregs", __LINE__);
3310
56be3814 3311 fill_fpregset (regcache, fpregs, regnum);
60054393
MS
3312 if (!proc_set_fpregs (pi))
3313 proc_error (pi, "store_registers, set_fpregs", __LINE__);
3314 }
c3f6f71d 3315}
c906108c 3316
37de36c6
KB
3317static int
3318syscall_is_lwp_exit (procinfo *pi, int scall)
3319{
37de36c6
KB
3320#ifdef SYS_lwp_exit
3321 if (scall == SYS_lwp_exit)
3322 return 1;
3323#endif
3324#ifdef SYS_lwpexit
3325 if (scall == SYS_lwpexit)
3326 return 1;
3327#endif
3328 return 0;
3329}
3330
3331static int
3332syscall_is_exit (procinfo *pi, int scall)
3333{
3334#ifdef SYS_exit
3335 if (scall == SYS_exit)
3336 return 1;
3337#endif
3338#ifdef DYNAMIC_SYSCALLS
3339 if (find_syscall (pi, "_exit") == scall)
3340 return 1;
3341#endif
3342 return 0;
3343}
3344
3345static int
3346syscall_is_exec (procinfo *pi, int scall)
3347{
3348#ifdef SYS_exec
3349 if (scall == SYS_exec)
3350 return 1;
3351#endif
3352#ifdef SYS_execv
3353 if (scall == SYS_execv)
3354 return 1;
3355#endif
3356#ifdef SYS_execve
3357 if (scall == SYS_execve)
3358 return 1;
3359#endif
3360#ifdef DYNAMIC_SYSCALLS
3361 if (find_syscall (pi, "_execve"))
3362 return 1;
3363 if (find_syscall (pi, "ra_execve"))
3364 return 1;
3365#endif
3366 return 0;
3367}
3368
3369static int
3370syscall_is_lwp_create (procinfo *pi, int scall)
3371{
3372#ifdef SYS_lwp_create
3373 if (scall == SYS_lwp_create)
3374 return 1;
3375#endif
3376#ifdef SYS_lwpcreate
3377 if (scall == SYS_lwpcreate)
3378 return 1;
3379#endif
3380 return 0;
3381}
3382
7434dadd
JB
3383/* Remove the breakpoint that we inserted in __dbx_link().
3384 Does nothing if the breakpoint hasn't been inserted or has already
3385 been removed. */
3386
3387static void
3388remove_dbx_link_breakpoint (void)
3389{
3390 if (dbx_link_bpt_addr == 0)
3391 return;
3392
f5656ead 3393 if (deprecated_remove_raw_breakpoint (target_gdbarch (), dbx_link_bpt) != 0)
7434dadd
JB
3394 warning (_("Unable to remove __dbx_link breakpoint."));
3395
3396 dbx_link_bpt_addr = 0;
3397 dbx_link_bpt = NULL;
3398}
3399
3400#ifdef SYS_syssgi
3401/* Return the address of the __dbx_link() function in the file
3402 refernced by ABFD by scanning its symbol table. Return 0 if
3403 the symbol was not found. */
3404
3405static CORE_ADDR
3406dbx_link_addr (bfd *abfd)
3407{
3408 long storage_needed;
3409 asymbol **symbol_table;
3410 long number_of_symbols;
3411 long i;
3412
3413 storage_needed = bfd_get_symtab_upper_bound (abfd);
3414 if (storage_needed <= 0)
3415 return 0;
3416
3417 symbol_table = (asymbol **) xmalloc (storage_needed);
3418 make_cleanup (xfree, symbol_table);
3419
3420 number_of_symbols = bfd_canonicalize_symtab (abfd, symbol_table);
3421
3422 for (i = 0; i < number_of_symbols; i++)
3423 {
3424 asymbol *sym = symbol_table[i];
3425
3426 if ((sym->flags & BSF_GLOBAL)
77382aee
PA
3427 && sym->name != NULL && strcmp (sym->name, "__dbx_link") == 0)
3428 return (sym->value + sym->section->vma);
7434dadd
JB
3429 }
3430
3431 /* Symbol not found, return NULL. */
3432 return 0;
3433}
3434
3435/* Search the symbol table of the file referenced by FD for a symbol
0df8b418 3436 named __dbx_link(). If found, then insert a breakpoint at this location,
7434dadd
JB
3437 and return nonzero. Return zero otherwise. */
3438
3439static int
3440insert_dbx_link_bpt_in_file (int fd, CORE_ADDR ignored)
3441{
3442 bfd *abfd;
3443 long storage_needed;
3444 CORE_ADDR sym_addr;
3445
64c31149 3446 abfd = gdb_bfd_fdopenr ("unamed", 0, fd);
7434dadd
JB
3447 if (abfd == NULL)
3448 {
3449 warning (_("Failed to create a bfd: %s."), bfd_errmsg (bfd_get_error ()));
3450 return 0;
3451 }
3452
3453 if (!bfd_check_format (abfd, bfd_object))
3454 {
3455 /* Not the correct format, so we can not possibly find the dbx_link
77382aee 3456 symbol in it. */
cbb099e8 3457 gdb_bfd_unref (abfd);
7434dadd
JB
3458 return 0;
3459 }
3460
3461 sym_addr = dbx_link_addr (abfd);
3462 if (sym_addr != 0)
3463 {
3464 /* Insert the breakpoint. */
3465 dbx_link_bpt_addr = sym_addr;
f5656ead 3466 dbx_link_bpt = deprecated_insert_raw_breakpoint (target_gdbarch (), NULL,
7434dadd
JB
3467 sym_addr);
3468 if (dbx_link_bpt == NULL)
77382aee
PA
3469 {
3470 warning (_("Failed to insert dbx_link breakpoint."));
cbb099e8 3471 gdb_bfd_unref (abfd);
77382aee
PA
3472 return 0;
3473 }
cbb099e8 3474 gdb_bfd_unref (abfd);
7434dadd
JB
3475 return 1;
3476 }
3477
cbb099e8 3478 gdb_bfd_unref (abfd);
7434dadd
JB
3479 return 0;
3480}
3481
e294797a 3482/* Calls the supplied callback function once for each mapped address
77382aee
PA
3483 space in the process. The callback function receives an open file
3484 descriptor for the file corresponding to that mapped address space
3485 (if there is one), and the base address of the mapped space. Quit
3486 when the callback function returns a nonzero value, or at teh end
3487 of the mappings. Returns the first non-zero return value of the
3488 callback function, or zero. */
e294797a
JB
3489
3490static int
3491solib_mappings_callback (struct prmap *map, int (*func) (int, CORE_ADDR),
3492 void *data)
3493{
3494 procinfo *pi = data;
3495 int fd;
3496
3497#ifdef NEW_PROC_API
3498 char name[MAX_PROC_NAME_SIZE + sizeof (map->pr_mapname)];
3499
3500 if (map->pr_vaddr == 0 && map->pr_size == 0)
3501 return -1; /* sanity */
3502
3503 if (map->pr_mapname[0] == 0)
3504 {
3505 fd = -1; /* no map file */
3506 }
3507 else
3508 {
3509 sprintf (name, "/proc/%d/object/%s", pi->pid, map->pr_mapname);
3510 /* Note: caller's responsibility to close this fd! */
3511 fd = open_with_retry (name, O_RDONLY);
3512 /* Note: we don't test the above call for failure;
3513 we just pass the FD on as given. Sometimes there is
3514 no file, so the open may return failure, but that's
3515 not a problem. */
3516 }
3517#else
3518 fd = ioctl (pi->ctl_fd, PIOCOPENM, &map->pr_vaddr);
3519 /* Note: we don't test the above call for failure;
3520 we just pass the FD on as given. Sometimes there is
3521 no file, so the ioctl may return failure, but that's
3522 not a problem. */
3523#endif
3524 return (*func) (fd, (CORE_ADDR) map->pr_vaddr);
3525}
3526
7434dadd
JB
3527/* If the given memory region MAP contains a symbol named __dbx_link,
3528 insert a breakpoint at this location and return nonzero. Return
3529 zero otherwise. */
3530
3531static int
3532insert_dbx_link_bpt_in_region (struct prmap *map,
b8edc417 3533 find_memory_region_ftype child_func,
77382aee 3534 void *data)
7434dadd
JB
3535{
3536 procinfo *pi = (procinfo *) data;
3537
3538 /* We know the symbol we're looking for is in a text region, so
3539 only look for it if the region is a text one. */
3540 if (map->pr_mflags & MA_EXEC)
3541 return solib_mappings_callback (map, insert_dbx_link_bpt_in_file, pi);
3542
3543 return 0;
3544}
3545
3546/* Search all memory regions for a symbol named __dbx_link. If found,
3547 insert a breakpoint at its location, and return nonzero. Return zero
3548 otherwise. */
3549
3550static int
3551insert_dbx_link_breakpoint (procinfo *pi)
3552{
3553 return iterate_over_mappings (pi, NULL, pi, insert_dbx_link_bpt_in_region);
3554}
3555#endif
3556
77382aee
PA
3557/* Retrieve the next stop event from the child process. If child has
3558 not stopped yet, wait for it to stop. Translate /proc eventcodes
3559 (or possibly wait eventcodes) into gdb internal event codes.
3560 Returns the id of process (and possibly thread) that incurred the
3561 event. Event codes are returned through a pointer parameter. */
c906108c 3562
39f77062 3563static ptid_t
117de6a9 3564procfs_wait (struct target_ops *ops,
4fcbb494 3565 ptid_t ptid, struct target_waitstatus *status, int options)
c906108c 3566{
0df8b418 3567 /* First cut: loosely based on original version 2.1. */
c3f6f71d 3568 procinfo *pi;
39f77062
KB
3569 int wstat;
3570 int temp_tid;
3571 ptid_t retval, temp_ptid;
c3f6f71d
JM
3572 int why, what, flags;
3573 int retry = 0;
c906108c 3574
c3f6f71d 3575wait_again:
c906108c 3576
c3f6f71d
JM
3577 retry++;
3578 wstat = 0;
39f77062 3579 retval = pid_to_ptid (-1);
c906108c 3580
0df8b418 3581 /* Find procinfo for main process. */
dfd4cc63 3582 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
c3f6f71d 3583 if (pi)
c906108c 3584 {
0df8b418 3585 /* We must assume that the status is stale now... */
c3f6f71d
JM
3586 pi->status_valid = 0;
3587 pi->gregs_valid = 0;
3588 pi->fpregs_valid = 0;
3589
0df8b418 3590#if 0 /* just try this out... */
c3f6f71d
JM
3591 flags = proc_flags (pi);
3592 why = proc_why (pi);
3593 if ((flags & PR_STOPPED) && (why == PR_REQUESTED))
0df8b418 3594 pi->status_valid = 0; /* re-read again, IMMEDIATELY... */
c3f6f71d
JM
3595#endif
3596 /* If child is not stopped, wait for it to stop. */
3597 if (!(proc_flags (pi) & (PR_STOPPED | PR_ISTOP)) &&
3598 !proc_wait_for_stop (pi))
c906108c 3599 {
0df8b418 3600 /* wait_for_stop failed: has the child terminated? */
c3f6f71d 3601 if (errno == ENOENT)
c906108c 3602 {
39f77062
KB
3603 int wait_retval;
3604
0df8b418
MS
3605 /* /proc file not found; presumably child has terminated. */
3606 wait_retval = wait (&wstat); /* "wait" for the child's exit. */
c3f6f71d 3607
dfd4cc63
LM
3608 /* Wrong child? */
3609 if (wait_retval != ptid_get_pid (inferior_ptid))
3e43a32a
MS
3610 error (_("procfs: couldn't stop "
3611 "process %d: wait returned %d."),
dfd4cc63 3612 ptid_get_pid (inferior_ptid), wait_retval);
c3f6f71d 3613 /* FIXME: might I not just use waitpid?
0df8b418 3614 Or try find_procinfo to see if I know about this child? */
39f77062 3615 retval = pid_to_ptid (wait_retval);
c906108c 3616 }
d1566ff5
FN
3617 else if (errno == EINTR)
3618 goto wait_again;
c3f6f71d 3619 else
c906108c 3620 {
0df8b418 3621 /* Unknown error from wait_for_stop. */
c3f6f71d 3622 proc_error (pi, "target_wait (wait_for_stop)", __LINE__);
c906108c 3623 }
c3f6f71d
JM
3624 }
3625 else
3626 {
3627 /* This long block is reached if either:
3628 a) the child was already stopped, or
3629 b) we successfully waited for the child with wait_for_stop.
3630 This block will analyze the /proc status, and translate it
3631 into a waitstatus for GDB.
3632
3633 If we actually had to call wait because the /proc file
19958708 3634 is gone (child terminated), then we skip this block,
c3f6f71d
JM
3635 because we already have a waitstatus. */
3636
3637 flags = proc_flags (pi);
3638 why = proc_why (pi);
3639 what = proc_what (pi);
3640
c3f6f71d 3641 if (flags & (PR_STOPPED | PR_ISTOP))
c906108c 3642 {
c3f6f71d
JM
3643#ifdef PR_ASYNC
3644 /* If it's running async (for single_thread control),
3645 set it back to normal again. */
3646 if (flags & PR_ASYNC)
3647 if (!proc_unset_async (pi))
3648 proc_error (pi, "target_wait, unset_async", __LINE__);
3649#endif
3650
3651 if (info_verbose)
3652 proc_prettyprint_why (why, what, 1);
3653
3654 /* The 'pid' we will return to GDB is composed of
3655 the process ID plus the lwp ID. */
dfd4cc63 3656 retval = ptid_build (pi->pid, proc_get_current_thread (pi), 0);
c3f6f71d
JM
3657
3658 switch (why) {
3659 case PR_SIGNALLED:
3660 wstat = (what << 8) | 0177;
3661 break;
3662 case PR_SYSENTRY:
37de36c6 3663 if (syscall_is_lwp_exit (pi, what))
c3f6f71d 3664 {
17faa917
DJ
3665 if (print_thread_events)
3666 printf_unfiltered (_("[%s exited]\n"),
3667 target_pid_to_str (retval));
37de36c6
KB
3668 delete_thread (retval);
3669 status->kind = TARGET_WAITKIND_SPURIOUS;
3670 return retval;
3671 }
3672 else if (syscall_is_exit (pi, what))
3673 {
181e7f93
PA
3674 struct inferior *inf;
3675
0df8b418 3676 /* Handle SYS_exit call only. */
37de36c6 3677 /* Stopped at entry to SYS_exit.
19958708 3678 Make it runnable, resume it, then use
37de36c6 3679 the wait system call to get its exit code.
19958708 3680 Proc_run_process always clears the current
37de36c6
KB
3681 fault and signal.
3682 Then return its exit status. */
3683 pi->status_valid = 0;
3684 wstat = 0;
19958708 3685 /* FIXME: what we should do is return
37de36c6
KB
3686 TARGET_WAITKIND_SPURIOUS. */
3687 if (!proc_run_process (pi, 0, 0))
3688 proc_error (pi, "target_wait, run_process", __LINE__);
181e7f93
PA
3689
3690 inf = find_inferior_pid (pi->pid);
3691 if (inf->attach_flag)
c3f6f71d 3692 {
19958708 3693 /* Don't call wait: simulate waiting for exit,
37de36c6
KB
3694 return a "success" exit code. Bogus: what if
3695 it returns something else? */
3696 wstat = 0;
39f77062 3697 retval = inferior_ptid; /* ? ? ? */
37de36c6
KB
3698 }
3699 else
3700 {
3701 int temp = wait (&wstat);
3702
3703 /* FIXME: shouldn't I make sure I get the right
3704 event from the right process? If (for
3705 instance) I have killed an earlier inferior
3706 process but failed to clean up after it
3707 somehow, I could get its termination event
3708 here. */
3709
0df8b418
MS
3710 /* If wait returns -1, that's what we return
3711 to GDB. */
37de36c6 3712 if (temp < 0)
39f77062 3713 retval = pid_to_ptid (temp);
c3f6f71d 3714 }
c3f6f71d 3715 }
37de36c6
KB
3716 else
3717 {
a3f17187 3718 printf_filtered (_("procfs: trapped on entry to "));
37de36c6
KB
3719 proc_prettyprint_syscall (proc_what (pi), 0);
3720 printf_filtered ("\n");
3721#ifndef PIOCSSPCACT
c3f6f71d 3722 {
37de36c6 3723 long i, nsysargs, *sysargs;
c3f6f71d 3724
37de36c6
KB
3725 if ((nsysargs = proc_nsysarg (pi)) > 0 &&
3726 (sysargs = proc_sysargs (pi)) != NULL)
3727 {
3e43a32a
MS
3728 printf_filtered (_("%ld syscall arguments:\n"),
3729 nsysargs);
37de36c6 3730 for (i = 0; i < nsysargs; i++)
19958708 3731 printf_filtered ("#%ld: 0x%08lx\n",
37de36c6
KB
3732 i, sysargs[i]);
3733 }
c3f6f71d 3734
c3f6f71d 3735 }
c3f6f71d 3736#endif
37de36c6
KB
3737 if (status)
3738 {
0df8b418
MS
3739 /* How to exit gracefully, returning "unknown
3740 event". */
37de36c6 3741 status->kind = TARGET_WAITKIND_SPURIOUS;
39f77062 3742 return inferior_ptid;
37de36c6
KB
3743 }
3744 else
3745 {
3746 /* How to keep going without returning to wfi: */
a493e3e2 3747 target_resume (ptid, 0, GDB_SIGNAL_0);
37de36c6
KB
3748 goto wait_again;
3749 }
3750 }
3751 break;
3752 case PR_SYSEXIT:
3753 if (syscall_is_exec (pi, what))
c3f6f71d 3754 {
37de36c6
KB
3755 /* Hopefully this is our own "fork-child" execing
3756 the real child. Hoax this event into a trap, and
3757 GDB will see the child about to execute its start
0df8b418 3758 address. */
37de36c6
KB
3759 wstat = (SIGTRAP << 8) | 0177;
3760 }
9185ddce 3761#ifdef SYS_syssgi
77382aee
PA
3762 else if (what == SYS_syssgi)
3763 {
3764 /* see if we can break on dbx_link(). If yes, then
3765 we no longer need the SYS_syssgi notifications. */
3766 if (insert_dbx_link_breakpoint (pi))
3767 proc_trace_syscalls_1 (pi, SYS_syssgi, PR_SYSEXIT,
3768 FLAG_RESET, 0);
3769
3770 /* This is an internal event and should be transparent
3771 to wfi, so resume the execution and wait again. See
3772 comment in procfs_init_inferior() for more details. */
a493e3e2 3773 target_resume (ptid, 0, GDB_SIGNAL_0);
77382aee
PA
3774 goto wait_again;
3775 }
9185ddce 3776#endif
37de36c6
KB
3777 else if (syscall_is_lwp_create (pi, what))
3778 {
77382aee
PA
3779 /* This syscall is somewhat like fork/exec. We
3780 will get the event twice: once for the parent
3781 LWP, and once for the child. We should already
3782 know about the parent LWP, but the child will
3783 be new to us. So, whenever we get this event,
3784 if it represents a new thread, simply add the
3785 thread to the list. */
c3f6f71d 3786
37de36c6 3787 /* If not in procinfo list, add it. */
39f77062
KB
3788 temp_tid = proc_get_current_thread (pi);
3789 if (!find_procinfo (pi->pid, temp_tid))
3790 create_procinfo (pi->pid, temp_tid);
37de36c6 3791
dfd4cc63 3792 temp_ptid = ptid_build (pi->pid, temp_tid, 0);
37de36c6 3793 /* If not in GDB's thread list, add it. */
39f77062 3794 if (!in_thread_list (temp_ptid))
93815fbf
VP
3795 add_thread (temp_ptid);
3796
0df8b418 3797 /* Return to WFI, but tell it to immediately resume. */
37de36c6 3798 status->kind = TARGET_WAITKIND_SPURIOUS;
39f77062 3799 return inferior_ptid;
37de36c6
KB
3800 }
3801 else if (syscall_is_lwp_exit (pi, what))
3802 {
17faa917
DJ
3803 if (print_thread_events)
3804 printf_unfiltered (_("[%s exited]\n"),
3805 target_pid_to_str (retval));
37de36c6
KB
3806 delete_thread (retval);
3807 status->kind = TARGET_WAITKIND_SPURIOUS;
3808 return retval;
c3f6f71d 3809 }
37de36c6
KB
3810 else if (0)
3811 {
3812 /* FIXME: Do we need to handle SYS_sproc,
3813 SYS_fork, or SYS_vfork here? The old procfs
3814 seemed to use this event to handle threads on
3815 older (non-LWP) systems, where I'm assuming
19958708 3816 that threads were actually separate processes.
37de36c6
KB
3817 Irix, maybe? Anyway, low priority for now. */
3818 }
3819 else
3820 {
a3f17187 3821 printf_filtered (_("procfs: trapped on exit from "));
37de36c6
KB
3822 proc_prettyprint_syscall (proc_what (pi), 0);
3823 printf_filtered ("\n");
3824#ifndef PIOCSSPCACT
3825 {
3826 long i, nsysargs, *sysargs;
3827
3828 if ((nsysargs = proc_nsysarg (pi)) > 0 &&
3829 (sysargs = proc_sysargs (pi)) != NULL)
3830 {
77382aee
PA
3831 printf_filtered (_("%ld syscall arguments:\n"),
3832 nsysargs);
37de36c6 3833 for (i = 0; i < nsysargs; i++)
19958708 3834 printf_filtered ("#%ld: 0x%08lx\n",
37de36c6
KB
3835 i, sysargs[i]);
3836 }
3837 }
c3f6f71d 3838#endif
37de36c6 3839 status->kind = TARGET_WAITKIND_SPURIOUS;
39f77062 3840 return inferior_ptid;
37de36c6 3841 }
c3f6f71d
JM
3842 break;
3843 case PR_REQUESTED:
3844#if 0 /* FIXME */
3845 wstat = (SIGSTOP << 8) | 0177;
3846 break;
3847#else
3848 if (retry < 5)
3849 {
a3f17187 3850 printf_filtered (_("Retry #%d:\n"), retry);
c3f6f71d
JM
3851 pi->status_valid = 0;
3852 goto wait_again;
3853 }
3854 else
3855 {
3856 /* If not in procinfo list, add it. */
39f77062
KB
3857 temp_tid = proc_get_current_thread (pi);
3858 if (!find_procinfo (pi->pid, temp_tid))
3859 create_procinfo (pi->pid, temp_tid);
c3f6f71d
JM
3860
3861 /* If not in GDB's thread list, add it. */
dfd4cc63 3862 temp_ptid = ptid_build (pi->pid, temp_tid, 0);
39f77062 3863 if (!in_thread_list (temp_ptid))
93815fbf 3864 add_thread (temp_ptid);
c3f6f71d
JM
3865
3866 status->kind = TARGET_WAITKIND_STOPPED;
3867 status->value.sig = 0;
3868 return retval;
3869 }
3870#endif
3871 case PR_JOBCONTROL:
3872 wstat = (what << 8) | 0177;
3873 break;
3874 case PR_FAULTED:
7af6341f 3875 switch (what) {
c3f6f71d
JM
3876#ifdef FLTWATCH
3877 case FLTWATCH:
3878 wstat = (SIGTRAP << 8) | 0177;
3879 break;
3880#endif
3881#ifdef FLTKWATCH
3882 case FLTKWATCH:
3883 wstat = (SIGTRAP << 8) | 0177;
3884 break;
3885#endif
0df8b418 3886 /* FIXME: use si_signo where possible. */
c3f6f71d 3887 case FLTPRIV:
0df8b418 3888#if (FLTILL != FLTPRIV) /* Avoid "duplicate case" error. */
c3f6f71d
JM
3889 case FLTILL:
3890#endif
3891 wstat = (SIGILL << 8) | 0177;
3892 break;
3893 case FLTBPT:
0df8b418 3894#if (FLTTRACE != FLTBPT) /* Avoid "duplicate case" error. */
c3f6f71d
JM
3895 case FLTTRACE:
3896#endif
77382aee
PA
3897 /* If we hit our __dbx_link() internal breakpoint,
3898 then remove it. See comments in procfs_init_inferior()
3899 for more details. */
3900 if (dbx_link_bpt_addr != 0
3901 && dbx_link_bpt_addr
fb14de7b 3902 == regcache_read_pc (get_current_regcache ()))
77382aee 3903 remove_dbx_link_breakpoint ();
9185ddce 3904
c3f6f71d
JM
3905 wstat = (SIGTRAP << 8) | 0177;
3906 break;
3907 case FLTSTACK:
3908 case FLTACCESS:
0df8b418 3909#if (FLTBOUNDS != FLTSTACK) /* Avoid "duplicate case" error. */
c3f6f71d
JM
3910 case FLTBOUNDS:
3911#endif
3912 wstat = (SIGSEGV << 8) | 0177;
3913 break;
3914 case FLTIOVF:
3915 case FLTIZDIV:
0df8b418 3916#if (FLTFPE != FLTIOVF) /* Avoid "duplicate case" error. */
c3f6f71d
JM
3917 case FLTFPE:
3918#endif
3919 wstat = (SIGFPE << 8) | 0177;
3920 break;
3e43a32a 3921 case FLTPAGE: /* Recoverable page fault */
0df8b418
MS
3922 default: /* FIXME: use si_signo if possible for
3923 fault. */
39f77062 3924 retval = pid_to_ptid (-1);
c3f6f71d 3925 printf_filtered ("procfs:%d -- ", __LINE__);
a3f17187 3926 printf_filtered (_("child stopped for unknown reason:\n"));
c3f6f71d 3927 proc_prettyprint_why (why, what, 1);
8a3fe4f8 3928 error (_("... giving up..."));
c3f6f71d
JM
3929 break;
3930 }
3931 break; /* case PR_FAULTED: */
3932 default: /* switch (why) unmatched */
3933 printf_filtered ("procfs:%d -- ", __LINE__);
a3f17187 3934 printf_filtered (_("child stopped for unknown reason:\n"));
c3f6f71d 3935 proc_prettyprint_why (why, what, 1);
8a3fe4f8 3936 error (_("... giving up..."));
c3f6f71d
JM
3937 break;
3938 }
77382aee
PA
3939 /* Got this far without error: If retval isn't in the
3940 threads database, add it. */
dfd4cc63 3941 if (ptid_get_pid (retval) > 0 &&
39f77062 3942 !ptid_equal (retval, inferior_ptid) &&
c3f6f71d 3943 !in_thread_list (retval))
c906108c 3944 {
77382aee
PA
3945 /* We have a new thread. We need to add it both to
3946 GDB's list and to our own. If we don't create a
3947 procinfo, resume may be unhappy later. */
c3f6f71d 3948 add_thread (retval);
dfd4cc63
LM
3949 if (find_procinfo (ptid_get_pid (retval),
3950 ptid_get_lwp (retval)) == NULL)
3951 create_procinfo (ptid_get_pid (retval),
3952 ptid_get_lwp (retval));
c906108c 3953 }
c906108c 3954 }
0df8b418 3955 else /* Flags do not indicate STOPPED. */
c906108c 3956 {
0df8b418 3957 /* surely this can't happen... */
c3f6f71d
JM
3958 printf_filtered ("procfs:%d -- process not stopped.\n",
3959 __LINE__);
3960 proc_prettyprint_flags (flags, 1);
8a3fe4f8 3961 error (_("procfs: ...giving up..."));
c906108c 3962 }
c906108c 3963 }
c906108c 3964
c3f6f71d
JM
3965 if (status)
3966 store_waitstatus (status, wstat);
c906108c
SS
3967 }
3968
c3f6f71d
JM
3969 return retval;
3970}
c906108c 3971
4e73f23d
RM
3972/* Perform a partial transfer to/from the specified object. For
3973 memory transfers, fall back to the old memory xfer functions. */
3974
9b409511 3975static enum target_xfer_status
4e73f23d 3976procfs_xfer_partial (struct target_ops *ops, enum target_object object,
0b62613e 3977 const char *annex, gdb_byte *readbuf,
9b409511
YQ
3978 const gdb_byte *writebuf, ULONGEST offset, ULONGEST len,
3979 ULONGEST *xfered_len)
4e73f23d
RM
3980{
3981 switch (object)
3982 {
3983 case TARGET_OBJECT_MEMORY:
e96027e0 3984 return procfs_xfer_memory (readbuf, writebuf, offset, len, xfered_len);
4e73f23d
RM
3985
3986#ifdef NEW_PROC_API
3987 case TARGET_OBJECT_AUXV:
9f2982ff 3988 return memory_xfer_auxv (ops, object, annex, readbuf, writebuf,
9b409511 3989 offset, len, xfered_len);
4e73f23d
RM
3990#endif
3991
3992 default:
e75fdfca
TT
3993 return ops->beneath->to_xfer_partial (ops->beneath, object, annex,
3994 readbuf, writebuf, offset, len,
3995 xfered_len);
4e73f23d
RM
3996 }
3997}
3998
e96027e0
PA
3999/* Helper for procfs_xfer_partial that handles memory transfers.
4000 Arguments are like target_xfer_partial. */
4e73f23d 4001
e96027e0
PA
4002static enum target_xfer_status
4003procfs_xfer_memory (gdb_byte *readbuf, const gdb_byte *writebuf,
4004 ULONGEST memaddr, ULONGEST len, ULONGEST *xfered_len)
c3f6f71d
JM
4005{
4006 procinfo *pi;
e96027e0 4007 int nbytes;
c906108c 4008
0df8b418 4009 /* Find procinfo for main process. */
dfd4cc63 4010 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
c3f6f71d
JM
4011 if (pi->as_fd == 0 &&
4012 open_procinfo_files (pi, FD_AS) == 0)
c906108c 4013 {
c3f6f71d 4014 proc_warn (pi, "xfer_memory, open_proc_files", __LINE__);
e96027e0 4015 return TARGET_XFER_E_IO;
c906108c 4016 }
c906108c 4017
e96027e0
PA
4018 if (lseek (pi->as_fd, (off_t) memaddr, SEEK_SET) != (off_t) memaddr)
4019 return TARGET_XFER_E_IO;
4020
4021 if (writebuf != NULL)
c906108c 4022 {
e96027e0
PA
4023 PROCFS_NOTE ("write memory:\n");
4024 nbytes = write (pi->as_fd, writebuf, len);
4025 }
4026 else
4027 {
4028 PROCFS_NOTE ("read memory:\n");
4029 nbytes = read (pi->as_fd, readbuf, len);
c906108c 4030 }
e96027e0
PA
4031 if (nbytes <= 0)
4032 return TARGET_XFER_E_IO;
4033 *xfered_len = nbytes;
4034 return TARGET_XFER_OK;
c906108c
SS
4035}
4036
77382aee
PA
4037/* Called by target_resume before making child runnable. Mark cached
4038 registers and status's invalid. If there are "dirty" caches that
4039 need to be written back to the child process, do that.
c906108c 4040
77382aee
PA
4041 File descriptors are also cached. As they are a limited resource,
4042 we cannot hold onto them indefinitely. However, as they are
4043 expensive to open, we don't want to throw them away
4044 indescriminately either. As a compromise, we will keep the file
4045 descriptors for the parent process, but discard any file
4046 descriptors we may have accumulated for the threads.
4047
4048 As this function is called by iterate_over_threads, it always
4049 returns zero (so that iterate_over_threads will keep
4050 iterating). */
c3f6f71d
JM
4051
4052static int
fba45db2 4053invalidate_cache (procinfo *parent, procinfo *pi, void *ptr)
c906108c 4054{
77382aee
PA
4055 /* About to run the child; invalidate caches and do any other
4056 cleanup. */
c906108c 4057
c3f6f71d
JM
4058#if 0
4059 if (pi->gregs_dirty)
4060 if (parent == NULL ||
4061 proc_get_current_thread (parent) != pi->tid)
4062 if (!proc_set_gregs (pi)) /* flush gregs cache */
4063 proc_warn (pi, "target_resume, set_gregs",
4064 __LINE__);
f5656ead 4065 if (gdbarch_fp0_regnum (target_gdbarch ()) >= 0)
60054393
MS
4066 if (pi->fpregs_dirty)
4067 if (parent == NULL ||
4068 proc_get_current_thread (parent) != pi->tid)
4069 if (!proc_set_fpregs (pi)) /* flush fpregs cache */
19958708 4070 proc_warn (pi, "target_resume, set_fpregs",
60054393 4071 __LINE__);
c906108c 4072#endif
c906108c 4073
c3f6f71d 4074 if (parent != NULL)
c906108c 4075 {
c3f6f71d 4076 /* The presence of a parent indicates that this is an LWP.
19958708 4077 Close any file descriptors that it might have open.
c3f6f71d
JM
4078 We don't do this to the master (parent) procinfo. */
4079
4080 close_procinfo_files (pi);
c906108c 4081 }
c3f6f71d
JM
4082 pi->gregs_valid = 0;
4083 pi->fpregs_valid = 0;
4084#if 0
4085 pi->gregs_dirty = 0;
4086 pi->fpregs_dirty = 0;
c906108c 4087#endif
c3f6f71d
JM
4088 pi->status_valid = 0;
4089 pi->threads_valid = 0;
c906108c 4090
c3f6f71d 4091 return 0;
c906108c
SS
4092}
4093
0fda6bd2 4094#if 0
77382aee
PA
4095/* A callback function for iterate_over_threads. Find the
4096 asynchronous signal thread, and make it runnable. See if that
4097 helps matters any. */
c906108c 4098
c3f6f71d 4099static int
fba45db2 4100make_signal_thread_runnable (procinfo *process, procinfo *pi, void *ptr)
c906108c 4101{
c3f6f71d
JM
4102#ifdef PR_ASLWP
4103 if (proc_flags (pi) & PR_ASLWP)
c906108c 4104 {
c3f6f71d
JM
4105 if (!proc_run_process (pi, 0, -1))
4106 proc_error (pi, "make_signal_thread_runnable", __LINE__);
4107 return 1;
c906108c 4108 }
c906108c 4109#endif
c3f6f71d 4110 return 0;
c906108c 4111}
0fda6bd2 4112#endif
c906108c 4113
77382aee
PA
4114/* Make the child process runnable. Normally we will then call
4115 procfs_wait and wait for it to stop again (unless gdb is async).
4116
4117 If STEP is true, then arrange for the child to stop again after
4118 executing a single instruction. If SIGNO is zero, then cancel any
4119 pending signal; if non-zero, then arrange for the indicated signal
4120 to be delivered to the child when it runs. If PID is -1, then
4121 allow any child thread to run; if non-zero, then allow only the
4122 indicated thread to run. (not implemented yet). */
c906108c
SS
4123
4124static void
28439f5e 4125procfs_resume (struct target_ops *ops,
2ea28649 4126 ptid_t ptid, int step, enum gdb_signal signo)
c906108c 4127{
c3f6f71d
JM
4128 procinfo *pi, *thread;
4129 int native_signo;
4130
19958708 4131 /* 2.1:
c3f6f71d 4132 prrun.prflags |= PRSVADDR;
19958708 4133 prrun.pr_vaddr = $PC; set resume address
c3f6f71d 4134 prrun.prflags |= PRSTRACE; trace signals in pr_trace (all)
19958708 4135 prrun.prflags |= PRSFAULT; trace faults in pr_fault (all but PAGE)
c3f6f71d
JM
4136 prrun.prflags |= PRCFAULT; clear current fault.
4137
4138 PRSTRACE and PRSFAULT can be done by other means
77382aee 4139 (proc_trace_signals, proc_trace_faults)
c3f6f71d
JM
4140 PRSVADDR is unnecessary.
4141 PRCFAULT may be replaced by a PIOCCFAULT call (proc_clear_current_fault)
4142 This basically leaves PRSTEP and PRCSIG.
4143 PRCSIG is like PIOCSSIG (proc_clear_current_signal).
4144 So basically PR_STEP is the sole argument that must be passed
77382aee 4145 to proc_run_process (for use in the prrun struct by ioctl). */
c3f6f71d 4146
0df8b418 4147 /* Find procinfo for main process. */
dfd4cc63 4148 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
c3f6f71d 4149
77382aee 4150 /* First cut: ignore pid argument. */
c3f6f71d 4151 errno = 0;
c906108c 4152
c3f6f71d
JM
4153 /* Convert signal to host numbering. */
4154 if (signo == 0 ||
a493e3e2 4155 (signo == GDB_SIGNAL_STOP && pi->ignore_next_sigstop))
c3f6f71d
JM
4156 native_signo = 0;
4157 else
2ea28649 4158 native_signo = gdb_signal_to_host (signo);
c906108c 4159
c3f6f71d 4160 pi->ignore_next_sigstop = 0;
c906108c 4161
77382aee
PA
4162 /* Running the process voids all cached registers and status. */
4163 /* Void the threads' caches first. */
19958708 4164 proc_iterate_over_threads (pi, invalidate_cache, NULL);
c3f6f71d
JM
4165 /* Void the process procinfo's caches. */
4166 invalidate_cache (NULL, pi, NULL);
c906108c 4167
dfd4cc63 4168 if (ptid_get_pid (ptid) != -1)
c906108c 4169 {
77382aee
PA
4170 /* Resume a specific thread, presumably suppressing the
4171 others. */
dfd4cc63 4172 thread = find_procinfo (ptid_get_pid (ptid), ptid_get_lwp (ptid));
7de45904 4173 if (thread != NULL)
c906108c 4174 {
c3f6f71d
JM
4175 if (thread->tid != 0)
4176 {
77382aee
PA
4177 /* We're to resume a specific thread, and not the
4178 others. Set the child process's PR_ASYNC flag. */
c3f6f71d
JM
4179#ifdef PR_ASYNC
4180 if (!proc_set_async (pi))
4181 proc_error (pi, "target_resume, set_async", __LINE__);
4182#endif
4183#if 0
19958708 4184 proc_iterate_over_threads (pi,
c3f6f71d
JM
4185 make_signal_thread_runnable,
4186 NULL);
4187#endif
0df8b418
MS
4188 pi = thread; /* Substitute the thread's procinfo
4189 for run. */
c3f6f71d 4190 }
c906108c
SS
4191 }
4192 }
c906108c 4193
c3f6f71d 4194 if (!proc_run_process (pi, step, native_signo))
c906108c 4195 {
c3f6f71d 4196 if (errno == EBUSY)
77382aee
PA
4197 warning (_("resume: target already running. "
4198 "Pretend to resume, and hope for the best!"));
c3f6f71d
JM
4199 else
4200 proc_error (pi, "target_resume", __LINE__);
c906108c 4201 }
c3f6f71d 4202}
c906108c 4203
77382aee 4204/* Set up to trace signals in the child process. */
c906108c 4205
c3f6f71d 4206static void
94bedb42
TT
4207procfs_pass_signals (struct target_ops *self,
4208 int numsigs, unsigned char *pass_signals)
c3f6f71d 4209{
37de36c6 4210 gdb_sigset_t signals;
dfd4cc63 4211 procinfo *pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
2455069d 4212 int signo;
c906108c 4213
2455069d
UW
4214 prfillset (&signals);
4215
4216 for (signo = 0; signo < NSIG; signo++)
4217 {
2ea28649 4218 int target_signo = gdb_signal_from_host (signo);
2455069d
UW
4219 if (target_signo < numsigs && pass_signals[target_signo])
4220 gdb_prdelset (&signals, signo);
4221 }
4222
4223 if (!proc_set_traced_signals (pi, &signals))
4224 proc_error (pi, "pass_signals", __LINE__);
c3f6f71d 4225}
c906108c 4226
77382aee 4227/* Print status information about the child process. */
c906108c 4228
c3f6f71d 4229static void
fba45db2 4230procfs_files_info (struct target_ops *ignore)
c3f6f71d 4231{
181e7f93 4232 struct inferior *inf = current_inferior ();
f4a14ae6 4233
a3f17187 4234 printf_filtered (_("\tUsing the running image of %s %s via /proc.\n"),
181e7f93 4235 inf->attach_flag? "attached": "child",
39f77062 4236 target_pid_to_str (inferior_ptid));
c3f6f71d 4237}
c906108c 4238
77382aee
PA
4239/* Stop the child process asynchronously, as when the gdb user types
4240 control-c or presses a "stop" button. Works by sending
4241 kill(SIGINT) to the child's process group. */
c906108c 4242
c3f6f71d 4243static void
1eab8a48 4244procfs_stop (struct target_ops *self, ptid_t ptid)
c3f6f71d 4245{
7e1789f5 4246 kill (-inferior_process_group (), SIGINT);
c906108c
SS
4247}
4248
77382aee
PA
4249/* Make it die. Wait for it to die. Clean up after it. Note: this
4250 should only be applied to the real process, not to an LWP, because
4251 of the check for parent-process. If we need this to work for an
4252 LWP, it needs some more logic. */
c906108c 4253
c3f6f71d 4254static void
fba45db2 4255unconditionally_kill_inferior (procinfo *pi)
c3f6f71d
JM
4256{
4257 int parent_pid;
c906108c 4258
c3f6f71d
JM
4259 parent_pid = proc_parent_pid (pi);
4260#ifdef PROCFS_NEED_CLEAR_CURSIG_FOR_KILL
0df8b418 4261 /* FIXME: use access functions. */
c3f6f71d
JM
4262 /* Alpha OSF/1-3.x procfs needs a clear of the current signal
4263 before the PIOCKILL, otherwise it might generate a corrupted core
4264 file for the inferior. */
4265 if (ioctl (pi->ctl_fd, PIOCSSIG, NULL) < 0)
4266 {
4267 printf_filtered ("unconditionally_kill: SSIG failed!\n");
4268 }
4269#endif
4270#ifdef PROCFS_NEED_PIOCSSIG_FOR_KILL
4271 /* Alpha OSF/1-2.x procfs needs a PIOCSSIG call with a SIGKILL signal
4272 to kill the inferior, otherwise it might remain stopped with a
4273 pending SIGKILL.
4274 We do not check the result of the PIOCSSIG, the inferior might have
4275 died already. */
4276 {
37de36c6 4277 gdb_siginfo_t newsiginfo;
c906108c 4278
c3f6f71d
JM
4279 memset ((char *) &newsiginfo, 0, sizeof (newsiginfo));
4280 newsiginfo.si_signo = SIGKILL;
4281 newsiginfo.si_code = 0;
4282 newsiginfo.si_errno = 0;
4283 newsiginfo.si_pid = getpid ();
4284 newsiginfo.si_uid = getuid ();
0df8b418 4285 /* FIXME: use proc_set_current_signal. */
c3f6f71d
JM
4286 ioctl (pi->ctl_fd, PIOCSSIG, &newsiginfo);
4287 }
4288#else /* PROCFS_NEED_PIOCSSIG_FOR_KILL */
4289 if (!proc_kill (pi, SIGKILL))
103b3ef5 4290 proc_error (pi, "unconditionally_kill, proc_kill", __LINE__);
c3f6f71d
JM
4291#endif /* PROCFS_NEED_PIOCSSIG_FOR_KILL */
4292 destroy_procinfo (pi);
c906108c 4293
c3f6f71d
JM
4294 /* If pi is GDB's child, wait for it to die. */
4295 if (parent_pid == getpid ())
19958708 4296 /* FIXME: should we use waitpid to make sure we get the right event?
c3f6f71d
JM
4297 Should we check the returned event? */
4298 {
0d06e24b 4299#if 0
c3f6f71d 4300 int status, ret;
c906108c 4301
c3f6f71d
JM
4302 ret = waitpid (pi->pid, &status, 0);
4303#else
4304 wait (NULL);
4305#endif
4306 }
4307}
c906108c 4308
77382aee
PA
4309/* We're done debugging it, and we want it to go away. Then we want
4310 GDB to forget all about it. */
c906108c 4311
19958708 4312static void
7d85a9c0 4313procfs_kill_inferior (struct target_ops *ops)
c906108c 4314{
39f77062 4315 if (!ptid_equal (inferior_ptid, null_ptid)) /* ? */
c3f6f71d 4316 {
0df8b418 4317 /* Find procinfo for main process. */
dfd4cc63 4318 procinfo *pi = find_procinfo (ptid_get_pid (inferior_ptid), 0);
c906108c 4319
c3f6f71d
JM
4320 if (pi)
4321 unconditionally_kill_inferior (pi);
4322 target_mourn_inferior ();
c906108c 4323 }
c3f6f71d
JM
4324}
4325
77382aee 4326/* Forget we ever debugged this thing! */
c906108c 4327
19958708 4328static void
136d6dae 4329procfs_mourn_inferior (struct target_ops *ops)
c3f6f71d
JM
4330{
4331 procinfo *pi;
c906108c 4332
39f77062 4333 if (!ptid_equal (inferior_ptid, null_ptid))
c3f6f71d 4334 {
0df8b418 4335 /* Find procinfo for main process. */
dfd4cc63 4336 pi = find_procinfo (ptid_get_pid (inferior_ptid), 0);
c3f6f71d
JM
4337 if (pi)
4338 destroy_procinfo (pi);
c906108c 4339 }
6a3cb8e8
PA
4340
4341 generic_mourn_inferior ();
8181d85f
DJ
4342
4343 if (dbx_link_bpt != NULL)
4344 {
f5656ead 4345 deprecated_remove_raw_breakpoint (target_gdbarch (), dbx_link_bpt);
8181d85f
DJ
4346 dbx_link_bpt_addr = 0;
4347 dbx_link_bpt = NULL;
4348 }
4349
6a3cb8e8 4350 inf_child_maybe_unpush_target (ops);
c3f6f71d 4351}
c906108c 4352
77382aee
PA
4353/* When GDB forks to create a runnable inferior process, this function
4354 is called on the parent side of the fork. It's job is to do
4355 whatever is necessary to make the child ready to be debugged, and
4356 then wait for the child to synchronize. */
c906108c 4357
19958708 4358static void
28439f5e 4359procfs_init_inferior (struct target_ops *ops, int pid)
c3f6f71d
JM
4360{
4361 procinfo *pi;
37de36c6 4362 gdb_sigset_t signals;
c3f6f71d 4363 int fail;
2689673f 4364 int lwpid;
c906108c 4365
c3f6f71d
JM
4366 /* This routine called on the parent side (GDB side)
4367 after GDB forks the inferior. */
6a3cb8e8
PA
4368 if (!target_is_pushed (ops))
4369 push_target (ops);
c906108c 4370
c3f6f71d 4371 if ((pi = create_procinfo (pid, 0)) == NULL)
9b20d036 4372 perror (_("procfs: out of memory in 'init_inferior'"));
c3f6f71d
JM
4373
4374 if (!open_procinfo_files (pi, FD_CTL))
4375 proc_error (pi, "init_inferior, open_proc_files", __LINE__);
4376
4377 /*
4378 xmalloc // done
4379 open_procinfo_files // done
4380 link list // done
4381 prfillset (trace)
4382 procfs_notice_signals
4383 prfillset (fault)
4384 prdelset (FLTPAGE)
4385 PIOCWSTOP
4386 PIOCSFAULT
4387 */
4388
77382aee 4389 /* If not stopped yet, wait for it to stop. */
c3f6f71d
JM
4390 if (!(proc_flags (pi) & PR_STOPPED) &&
4391 !(proc_wait_for_stop (pi)))
4392 dead_procinfo (pi, "init_inferior: wait_for_stop failed", KILL);
4393
4394 /* Save some of the /proc state to be restored if we detach. */
4395 /* FIXME: Why? In case another debugger was debugging it?
0df8b418 4396 We're it's parent, for Ghu's sake! */
c3f6f71d
JM
4397 if (!proc_get_traced_signals (pi, &pi->saved_sigset))
4398 proc_error (pi, "init_inferior, get_traced_signals", __LINE__);
4399 if (!proc_get_held_signals (pi, &pi->saved_sighold))
4400 proc_error (pi, "init_inferior, get_held_signals", __LINE__);
4401 if (!proc_get_traced_faults (pi, &pi->saved_fltset))
4402 proc_error (pi, "init_inferior, get_traced_faults", __LINE__);
37de36c6 4403 if (!proc_get_traced_sysentry (pi, pi->saved_entryset))
c3f6f71d 4404 proc_error (pi, "init_inferior, get_traced_sysentry", __LINE__);
37de36c6 4405 if (!proc_get_traced_sysexit (pi, pi->saved_exitset))
c3f6f71d
JM
4406 proc_error (pi, "init_inferior, get_traced_sysexit", __LINE__);
4407
c3f6f71d
JM
4408 if ((fail = procfs_debug_inferior (pi)) != 0)
4409 proc_error (pi, "init_inferior (procfs_debug_inferior)", fail);
4410
0d06e24b
JM
4411 /* FIXME: logically, we should really be turning OFF run-on-last-close,
4412 and possibly even turning ON kill-on-last-close at this point. But
4413 I can't make that change without careful testing which I don't have
4414 time to do right now... */
c3f6f71d
JM
4415 /* Turn on run-on-last-close flag so that the child
4416 will die if GDB goes away for some reason. */
4417 if (!proc_set_run_on_last_close (pi))
4418 proc_error (pi, "init_inferior, set_RLC", __LINE__);
4419
2689673f
PA
4420 /* We now have have access to the lwpid of the main thread/lwp. */
4421 lwpid = proc_get_current_thread (pi);
4422
4423 /* Create a procinfo for the main lwp. */
4424 create_procinfo (pid, lwpid);
4425
4426 /* We already have a main thread registered in the thread table at
4427 this point, but it didn't have any lwp info yet. Notify the core
4428 about it. This changes inferior_ptid as well. */
4429 thread_change_ptid (pid_to_ptid (pid),
793e1c06 4430 ptid_build (pid, lwpid, 0));
c906108c 4431
c3f6f71d 4432 startup_inferior (START_INFERIOR_TRAPS_EXPECTED);
9185ddce
JB
4433
4434#ifdef SYS_syssgi
4435 /* On mips-irix, we need to stop the inferior early enough during
4436 the startup phase in order to be able to load the shared library
4437 symbols and insert the breakpoints that are located in these shared
4438 libraries. Stopping at the program entry point is not good enough
4439 because the -init code is executed before the execution reaches
4440 that point.
4441
4442 So what we need to do is to insert a breakpoint in the runtime
4443 loader (rld), more precisely in __dbx_link(). This procedure is
4444 called by rld once all shared libraries have been mapped, but before
0df8b418 4445 the -init code is executed. Unfortuantely, this is not straightforward,
9185ddce
JB
4446 as rld is not part of the executable we are running, and thus we need
4447 the inferior to run until rld itself has been mapped in memory.
77382aee 4448
9185ddce
JB
4449 For this, we trace all syssgi() syscall exit events. Each time
4450 we detect such an event, we iterate over each text memory maps,
4451 get its associated fd, and scan the symbol table for __dbx_link().
4452 When found, we know that rld has been mapped, and that we can insert
4453 the breakpoint at the symbol address. Once the dbx_link() breakpoint
4454 has been inserted, the syssgi() notifications are no longer necessary,
4455 so they should be canceled. */
4456 proc_trace_syscalls_1 (pi, SYS_syssgi, PR_SYSEXIT, FLAG_SET, 0);
9185ddce 4457#endif
c3f6f71d 4458}
c906108c 4459
77382aee
PA
4460/* When GDB forks to create a new process, this function is called on
4461 the child side of the fork before GDB exec's the user program. Its
4462 job is to make the child minimally debuggable, so that the parent
4463 GDB process can connect to the child and take over. This function
4464 should do only the minimum to make that possible, and to
4465 synchronize with the parent process. The parent process should
4466 take care of the details. */
c3f6f71d
JM
4467
4468static void
fba45db2 4469procfs_set_exec_trap (void)
c3f6f71d
JM
4470{
4471 /* This routine called on the child side (inferior side)
4472 after GDB forks the inferior. It must use only local variables,
4473 because it may be sharing data space with its parent. */
c906108c 4474
c3f6f71d 4475 procinfo *pi;
37de36c6 4476 sysset_t *exitset;
c906108c 4477
c3f6f71d 4478 if ((pi = create_procinfo (getpid (), 0)) == NULL)
e2e0b3e5 4479 perror_with_name (_("procfs: create_procinfo failed in child."));
c906108c 4480
c3f6f71d
JM
4481 if (open_procinfo_files (pi, FD_CTL) == 0)
4482 {
4483 proc_warn (pi, "set_exec_trap, open_proc_files", __LINE__);
4484 gdb_flush (gdb_stderr);
77382aee
PA
4485 /* No need to call "dead_procinfo", because we're going to
4486 exit. */
c3f6f71d
JM
4487 _exit (127);
4488 }
c906108c 4489
c3f6f71d
JM
4490#ifdef PRFS_STOPEXEC /* defined on OSF */
4491 /* OSF method for tracing exec syscalls. Quoting:
4492 Under Alpha OSF/1 we have to use a PIOCSSPCACT ioctl to trace
4493 exits from exec system calls because of the user level loader. */
77382aee 4494 /* FIXME: make nice and maybe move into an access function. */
c3f6f71d
JM
4495 {
4496 int prfs_flags;
c906108c 4497
c3f6f71d
JM
4498 if (ioctl (pi->ctl_fd, PIOCGSPCACT, &prfs_flags) < 0)
4499 {
4500 proc_warn (pi, "set_exec_trap (PIOCGSPCACT)", __LINE__);
4501 gdb_flush (gdb_stderr);
4502 _exit (127);
4503 }
4504 prfs_flags |= PRFS_STOPEXEC;
c906108c 4505
c3f6f71d
JM
4506 if (ioctl (pi->ctl_fd, PIOCSSPCACT, &prfs_flags) < 0)
4507 {
4508 proc_warn (pi, "set_exec_trap (PIOCSSPCACT)", __LINE__);
4509 gdb_flush (gdb_stderr);
4510 _exit (127);
4511 }
4512 }
4513#else /* not PRFS_STOPEXEC */
77382aee 4514 /* Everyone else's (except OSF) method for tracing exec syscalls. */
c3f6f71d
JM
4515 /* GW: Rationale...
4516 Not all systems with /proc have all the exec* syscalls with the same
4517 names. On the SGI, for example, there is no SYS_exec, but there
77382aee 4518 *is* a SYS_execv. So, we try to account for that. */
c906108c 4519
37de36c6
KB
4520 exitset = sysset_t_alloc (pi);
4521 gdb_premptysysset (exitset);
c3f6f71d 4522#ifdef SYS_exec
37de36c6 4523 gdb_praddsysset (exitset, SYS_exec);
c3f6f71d
JM
4524#endif
4525#ifdef SYS_execve
37de36c6 4526 gdb_praddsysset (exitset, SYS_execve);
c3f6f71d
JM
4527#endif
4528#ifdef SYS_execv
37de36c6 4529 gdb_praddsysset (exitset, SYS_execv);
c906108c 4530#endif
37de36c6
KB
4531#ifdef DYNAMIC_SYSCALLS
4532 {
4533 int callnum = find_syscall (pi, "execve");
4534
4535 if (callnum >= 0)
4536 gdb_praddsysset (exitset, callnum);
c906108c 4537
37de36c6
KB
4538 callnum = find_syscall (pi, "ra_execve");
4539 if (callnum >= 0)
4540 gdb_praddsysset (exitset, callnum);
4541 }
4542#endif /* DYNAMIC_SYSCALLS */
4543
4544 if (!proc_set_traced_sysexit (pi, exitset))
c906108c 4545 {
c3f6f71d
JM
4546 proc_warn (pi, "set_exec_trap, set_traced_sysexit", __LINE__);
4547 gdb_flush (gdb_stderr);
4548 _exit (127);
c906108c 4549 }
c3f6f71d
JM
4550#endif /* PRFS_STOPEXEC */
4551
0df8b418 4552 /* FIXME: should this be done in the parent instead? */
c3f6f71d
JM
4553 /* Turn off inherit on fork flag so that all grand-children
4554 of gdb start with tracing flags cleared. */
4555 if (!proc_unset_inherit_on_fork (pi))
4556 proc_warn (pi, "set_exec_trap, unset_inherit", __LINE__);
4557
4558 /* Turn off run on last close flag, so that the child process
4559 cannot run away just because we close our handle on it.
4560 We want it to wait for the parent to attach. */
4561 if (!proc_unset_run_on_last_close (pi))
4562 proc_warn (pi, "set_exec_trap, unset_RLC", __LINE__);
4563
19958708 4564 /* FIXME: No need to destroy the procinfo --
0df8b418 4565 we have our own address space, and we're about to do an exec! */
c3f6f71d 4566 /*destroy_procinfo (pi);*/
c906108c 4567}
c906108c 4568
77382aee
PA
4569/* This function is called BEFORE gdb forks the inferior process. Its
4570 only real responsibility is to set things up for the fork, and tell
4571 GDB which two functions to call after the fork (one for the parent,
4572 and one for the child).
4573
4574 This function does a complicated search for a unix shell program,
4575 which it then uses to parse arguments and environment variables to
4576 be sent to the child. I wonder whether this code could not be
4577 abstracted out and shared with other unix targets such as
4578 inf-ptrace? */
c906108c
SS
4579
4580static void
136d6dae
VP
4581procfs_create_inferior (struct target_ops *ops, char *exec_file,
4582 char *allargs, char **env, int from_tty)
c906108c
SS
4583{
4584 char *shell_file = getenv ("SHELL");
4585 char *tryname;
28439f5e
PA
4586 int pid;
4587
c906108c
SS
4588 if (shell_file != NULL && strchr (shell_file, '/') == NULL)
4589 {
4590
4591 /* We will be looking down the PATH to find shell_file. If we
c3f6f71d
JM
4592 just do this the normal way (via execlp, which operates by
4593 attempting an exec for each element of the PATH until it
4594 finds one which succeeds), then there will be an exec for
4595 each failed attempt, each of which will cause a PR_SYSEXIT
4596 stop, and we won't know how to distinguish the PR_SYSEXIT's
4597 for these failed execs with the ones for successful execs
4598 (whether the exec has succeeded is stored at that time in the
4599 carry bit or some such architecture-specific and
4600 non-ABI-specified place).
4601
4602 So I can't think of anything better than to search the PATH
4603 now. This has several disadvantages: (1) There is a race
4604 condition; if we find a file now and it is deleted before we
4605 exec it, we lose, even if the deletion leaves a valid file
4606 further down in the PATH, (2) there is no way to know exactly
4607 what an executable (in the sense of "capable of being
4608 exec'd") file is. Using access() loses because it may lose
4609 if the caller is the superuser; failing to use it loses if
4610 there are ACLs or some such. */
c906108c
SS
4611
4612 char *p;
4613 char *p1;
4614 /* FIXME-maybe: might want "set path" command so user can change what
c3f6f71d 4615 path is used from within GDB. */
c906108c
SS
4616 char *path = getenv ("PATH");
4617 int len;
4618 struct stat statbuf;
4619
4620 if (path == NULL)
4621 path = "/bin:/usr/bin";
4622
4623 tryname = alloca (strlen (path) + strlen (shell_file) + 2);
c3f6f71d 4624 for (p = path; p != NULL; p = p1 ? p1 + 1: NULL)
c906108c
SS
4625 {
4626 p1 = strchr (p, ':');
4627 if (p1 != NULL)
4628 len = p1 - p;
4629 else
4630 len = strlen (p);
4631 strncpy (tryname, p, len);
4632 tryname[len] = '\0';
4633 strcat (tryname, "/");
4634 strcat (tryname, shell_file);
4635 if (access (tryname, X_OK) < 0)
4636 continue;
4637 if (stat (tryname, &statbuf) < 0)
4638 continue;
4639 if (!S_ISREG (statbuf.st_mode))
4640 /* We certainly need to reject directories. I'm not quite
4641 as sure about FIFOs, sockets, etc., but I kind of doubt
4642 that people want to exec() these things. */
4643 continue;
4644 break;
4645 }
4646 if (p == NULL)
4647 /* Not found. This must be an error rather than merely passing
4648 the file to execlp(), because execlp() would try all the
4649 exec()s, causing GDB to get confused. */
8a3fe4f8 4650 error (_("procfs:%d -- Can't find shell %s in PATH"),
c3f6f71d 4651 __LINE__, shell_file);
c906108c
SS
4652
4653 shell_file = tryname;
4654 }
4655
28439f5e 4656 pid = fork_inferior (exec_file, allargs, env, procfs_set_exec_trap,
e69860f1 4657 NULL, NULL, shell_file, NULL);
28439f5e
PA
4658
4659 procfs_init_inferior (ops, pid);
27087a3d
JB
4660}
4661
4662/* An observer for the "inferior_created" event. */
c906108c 4663
27087a3d
JB
4664static void
4665procfs_inferior_created (struct target_ops *ops, int from_tty)
4666{
9185ddce 4667#ifdef SYS_syssgi
77382aee 4668 /* Make sure to cancel the syssgi() syscall-exit notifications.
9185ddce
JB
4669 They should normally have been removed by now, but they may still
4670 be activated if the inferior doesn't use shared libraries, or if
4671 we didn't locate __dbx_link, or if we never stopped in __dbx_link.
27087a3d
JB
4672 See procfs_init_inferior() for more details.
4673
4674 Since these notifications are only ever enabled when we spawned
4675 the inferior ourselves, there is nothing to do when the inferior
4676 was created by attaching to an already running process, or when
4677 debugging a core file. */
4678 if (current_inferior ()->attach_flag || !target_can_run (&current_target))
4679 return;
4680
dfd4cc63
LM
4681 proc_trace_syscalls_1 (find_procinfo_or_die (ptid_get_pid (inferior_ptid),
4682 0), SYS_syssgi, PR_SYSEXIT, FLAG_RESET, 0);
9185ddce 4683#endif
c906108c
SS
4684}
4685
77382aee 4686/* Callback for find_new_threads. Calls "add_thread". */
c906108c 4687
c3f6f71d 4688static int
fba45db2 4689procfs_notice_thread (procinfo *pi, procinfo *thread, void *ptr)
c906108c 4690{
dfd4cc63 4691 ptid_t gdb_threadid = ptid_build (pi->pid, thread->tid, 0);
c906108c 4692
2689673f 4693 if (!in_thread_list (gdb_threadid) || is_exited (gdb_threadid))
c3f6f71d 4694 add_thread (gdb_threadid);
c906108c 4695
c3f6f71d
JM
4696 return 0;
4697}
4698
77382aee
PA
4699/* Query all the threads that the target knows about, and give them
4700 back to GDB to add to its list. */
c3f6f71d 4701
d3581e61 4702static void
28439f5e 4703procfs_find_new_threads (struct target_ops *ops)
c3f6f71d
JM
4704{
4705 procinfo *pi;
4706
0df8b418 4707 /* Find procinfo for main process. */
dfd4cc63 4708 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
c3f6f71d
JM
4709 proc_update_threads (pi);
4710 proc_iterate_over_threads (pi, procfs_notice_thread, NULL);
c906108c
SS
4711}
4712
77382aee
PA
4713/* Return true if the thread is still 'alive'. This guy doesn't
4714 really seem to be doing his job. Got to investigate how to tell
4715 when a thread is really gone. */
c906108c 4716
c906108c 4717static int
28439f5e 4718procfs_thread_alive (struct target_ops *ops, ptid_t ptid)
c906108c 4719{
c3f6f71d
JM
4720 int proc, thread;
4721 procinfo *pi;
c906108c 4722
dfd4cc63
LM
4723 proc = ptid_get_pid (ptid);
4724 thread = ptid_get_lwp (ptid);
0df8b418 4725 /* If I don't know it, it ain't alive! */
c3f6f71d
JM
4726 if ((pi = find_procinfo (proc, thread)) == NULL)
4727 return 0;
4728
4729 /* If I can't get its status, it ain't alive!
4730 What's more, I need to forget about it! */
4731 if (!proc_get_status (pi))
4732 {
4733 destroy_procinfo (pi);
4734 return 0;
4735 }
77382aee
PA
4736 /* I couldn't have got its status if it weren't alive, so it's
4737 alive. */
c3f6f71d 4738 return 1;
c906108c 4739}
c3f6f71d 4740
77382aee
PA
4741/* Convert PTID to a string. Returns the string in a static
4742 buffer. */
c3f6f71d 4743
d3581e61 4744static char *
117de6a9 4745procfs_pid_to_str (struct target_ops *ops, ptid_t ptid)
c3f6f71d
JM
4746{
4747 static char buf[80];
c3f6f71d 4748
dfd4cc63
LM
4749 if (ptid_get_lwp (ptid) == 0)
4750 sprintf (buf, "process %d", ptid_get_pid (ptid));
c3f6f71d 4751 else
dfd4cc63 4752 sprintf (buf, "LWP %ld", ptid_get_lwp (ptid));
5240ceac
MK
4753
4754 return buf;
c3f6f71d
JM
4755}
4756
77382aee 4757/* Insert a watchpoint. */
c3f6f71d 4758
a0911fd0 4759static int
39f77062 4760procfs_set_watchpoint (ptid_t ptid, CORE_ADDR addr, int len, int rwflag,
77382aee 4761 int after)
c906108c 4762{
37de36c6 4763#ifndef AIX5
c3f6f71d 4764 int pflags = 0;
19958708 4765 procinfo *pi;
c3f6f71d 4766
dfd4cc63
LM
4767 pi = find_procinfo_or_die (ptid_get_pid (ptid) == -1 ?
4768 ptid_get_pid (inferior_ptid) : ptid_get_pid (ptid),
4769 0);
c3f6f71d 4770
0df8b418
MS
4771 /* Translate from GDB's flags to /proc's. */
4772 if (len > 0) /* len == 0 means delete watchpoint. */
c906108c 4773 {
0df8b418 4774 switch (rwflag) { /* FIXME: need an enum! */
c3f6f71d
JM
4775 case hw_write: /* default watchpoint (write) */
4776 pflags = WRITE_WATCHFLAG;
4777 break;
4778 case hw_read: /* read watchpoint */
4779 pflags = READ_WATCHFLAG;
4780 break;
4781 case hw_access: /* access watchpoint */
4782 pflags = READ_WATCHFLAG | WRITE_WATCHFLAG;
4783 break;
4784 case hw_execute: /* execution HW breakpoint */
4785 pflags = EXEC_WATCHFLAG;
4786 break;
0df8b418 4787 default: /* Something weird. Return error. */
c906108c 4788 return -1;
c3f6f71d 4789 }
0df8b418 4790 if (after) /* Stop after r/w access is completed. */
c3f6f71d
JM
4791 pflags |= AFTER_WATCHFLAG;
4792 }
4793
4794 if (!proc_set_watchpoint (pi, addr, len, pflags))
4795 {
0df8b418 4796 if (errno == E2BIG) /* Typical error for no resources. */
c3f6f71d
JM
4797 return -1; /* fail */
4798 /* GDB may try to remove the same watchpoint twice.
4799 If a remove request returns no match, don't error. */
c906108c 4800 if (errno == ESRCH && len == 0)
c3f6f71d
JM
4801 return 0; /* ignore */
4802 proc_error (pi, "set_watchpoint", __LINE__);
c906108c 4803 }
37de36c6 4804#endif /* AIX5 */
c906108c
SS
4805 return 0;
4806}
4807
1e03ad20
KB
4808/* Return non-zero if we can set a hardware watchpoint of type TYPE. TYPE
4809 is one of bp_hardware_watchpoint, bp_read_watchpoint, bp_write_watchpoint,
4810 or bp_hardware_watchpoint. CNT is the number of watchpoints used so
4811 far.
19958708 4812
1e03ad20
KB
4813 Note: procfs_can_use_hw_breakpoint() is not yet used by all
4814 procfs.c targets due to the fact that some of them still define
d92524f1 4815 target_can_use_hardware_watchpoint. */
1e03ad20
KB
4816
4817static int
5461485a
TT
4818procfs_can_use_hw_breakpoint (struct target_ops *self,
4819 int type, int cnt, int othertype)
1e03ad20 4820{
1e03ad20
KB
4821 /* Due to the way that proc_set_watchpoint() is implemented, host
4822 and target pointers must be of the same size. If they are not,
4823 we can't use hardware watchpoints. This limitation is due to the
9a043c1d
AC
4824 fact that proc_set_watchpoint() calls
4825 procfs_address_to_host_pointer(); a close inspection of
4826 procfs_address_to_host_pointer will reveal that an internal error
4827 will be generated when the host and target pointer sizes are
4828 different. */
f5656ead 4829 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
f4a14ae6 4830
4e906f53 4831 if (sizeof (void *) != TYPE_LENGTH (ptr_type))
1e03ad20
KB
4832 return 0;
4833
4834 /* Other tests here??? */
4835
4836 return 1;
1e03ad20
KB
4837}
4838
77382aee
PA
4839/* Returns non-zero if process is stopped on a hardware watchpoint
4840 fault, else returns zero. */
c3f6f71d 4841
25513619 4842static int
6a109b6b 4843procfs_stopped_by_watchpoint (struct target_ops *ops)
c906108c 4844{
c3f6f71d 4845 procinfo *pi;
c906108c 4846
dfd4cc63 4847 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
aaeb7efa 4848
c3f6f71d 4849 if (proc_flags (pi) & (PR_STOPPED | PR_ISTOP))
c906108c 4850 {
c3f6f71d 4851 if (proc_why (pi) == PR_FAULTED)
19958708 4852 {
c906108c 4853#ifdef FLTWATCH
c3f6f71d
JM
4854 if (proc_what (pi) == FLTWATCH)
4855 return 1;
c906108c
SS
4856#endif
4857#ifdef FLTKWATCH
c3f6f71d
JM
4858 if (proc_what (pi) == FLTKWATCH)
4859 return 1;
c906108c 4860#endif
c3f6f71d 4861 }
c906108c
SS
4862 }
4863 return 0;
4864}
c906108c 4865
77382aee
PA
4866/* Returns 1 if the OS knows the position of the triggered watchpoint,
4867 and sets *ADDR to that address. Returns 0 if OS cannot report that
4868 address. This function is only called if
4869 procfs_stopped_by_watchpoint returned 1, thus no further checks are
4870 done. The function also assumes that ADDR is not NULL. */
bf701c2c
PM
4871
4872static int
4873procfs_stopped_data_address (struct target_ops *targ, CORE_ADDR *addr)
4874{
4875 procinfo *pi;
4876
dfd4cc63 4877 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
bf701c2c
PM
4878 return proc_watchpoint_address (pi, addr);
4879}
4880
25513619 4881static int
7bb99c53
TT
4882procfs_insert_watchpoint (struct target_ops *self,
4883 CORE_ADDR addr, int len, int type,
0cf6dd15 4884 struct expression *cond)
25513619 4885{
d92524f1 4886 if (!target_have_steppable_watchpoint
f5656ead 4887 && !gdbarch_have_nonsteppable_watchpoint (target_gdbarch ()))
25513619
PA
4888 {
4889 /* When a hardware watchpoint fires off the PC will be left at
4890 the instruction following the one which caused the
4891 watchpoint. It will *NOT* be necessary for GDB to step over
4892 the watchpoint. */
4893 return procfs_set_watchpoint (inferior_ptid, addr, len, type, 1);
4894 }
4895 else
4896 {
4897 /* When a hardware watchpoint fires off the PC will be left at
4898 the instruction which caused the watchpoint. It will be
4899 necessary for GDB to step over the watchpoint. */
4900 return procfs_set_watchpoint (inferior_ptid, addr, len, type, 0);
4901 }
4902}
4903
4904static int
11b5219a
TT
4905procfs_remove_watchpoint (struct target_ops *self,
4906 CORE_ADDR addr, int len, int type,
0cf6dd15 4907 struct expression *cond)
25513619
PA
4908{
4909 return procfs_set_watchpoint (inferior_ptid, addr, 0, 0, 0);
4910}
4911
4912static int
31568a15
TT
4913procfs_region_ok_for_hw_watchpoint (struct target_ops *self,
4914 CORE_ADDR addr, int len)
25513619
PA
4915{
4916 /* The man page for proc(4) on Solaris 2.6 and up says that the
4917 system can support "thousands" of hardware watchpoints, but gives
4918 no method for finding out how many; It doesn't say anything about
4919 the allowed size for the watched area either. So we just tell
4920 GDB 'yes'. */
4921 return 1;
4922}
4923
4924void
4925procfs_use_watchpoints (struct target_ops *t)
4926{
4927 t->to_stopped_by_watchpoint = procfs_stopped_by_watchpoint;
4928 t->to_insert_watchpoint = procfs_insert_watchpoint;
4929 t->to_remove_watchpoint = procfs_remove_watchpoint;
4930 t->to_region_ok_for_hw_watchpoint = procfs_region_ok_for_hw_watchpoint;
d1a7880c 4931 t->to_can_use_hw_breakpoint = procfs_can_use_hw_breakpoint;
bf701c2c 4932 t->to_stopped_data_address = procfs_stopped_data_address;
25513619
PA
4933}
4934
77382aee
PA
4935/* Memory Mappings Functions: */
4936
4937/* Call a callback function once for each mapping, passing it the
4938 mapping, an optional secondary callback function, and some optional
4939 opaque data. Quit and return the first non-zero value returned
4940 from the callback.
4941
4942 PI is the procinfo struct for the process to be mapped. FUNC is
4943 the callback function to be called by this iterator. DATA is the
4944 optional opaque data to be passed to the callback function.
4945 CHILD_FUNC is the optional secondary function pointer to be passed
4946 to the child function. Returns the first non-zero return value
4947 from the callback function, or zero. */
831e682e
MS
4948
4949static int
b8edc417 4950iterate_over_mappings (procinfo *pi, find_memory_region_ftype child_func,
e9ef4f39 4951 void *data,
19958708 4952 int (*func) (struct prmap *map,
b8edc417 4953 find_memory_region_ftype child_func,
831e682e
MS
4954 void *data))
4955{
4956 char pathname[MAX_PROC_NAME_SIZE];
4957 struct prmap *prmaps;
4958 struct prmap *prmap;
4959 int funcstat;
4960 int map_fd;
4961 int nmap;
0a86f364 4962 struct cleanup *cleanups = make_cleanup (null_cleanup, NULL);
831e682e
MS
4963#ifdef NEW_PROC_API
4964 struct stat sbuf;
4965#endif
4966
19958708 4967 /* Get the number of mappings, allocate space,
831e682e
MS
4968 and read the mappings into prmaps. */
4969#ifdef NEW_PROC_API
0df8b418 4970 /* Open map fd. */
831e682e
MS
4971 sprintf (pathname, "/proc/%d/map", pi->pid);
4972 if ((map_fd = open (pathname, O_RDONLY)) < 0)
4973 proc_error (pi, "iterate_over_mappings (open)", __LINE__);
4974
0df8b418 4975 /* Make sure it gets closed again. */
831e682e
MS
4976 make_cleanup_close (map_fd);
4977
19958708 4978 /* Use stat to determine the file size, and compute
831e682e
MS
4979 the number of prmap_t objects it contains. */
4980 if (fstat (map_fd, &sbuf) != 0)
4981 proc_error (pi, "iterate_over_mappings (fstat)", __LINE__);
4982
4983 nmap = sbuf.st_size / sizeof (prmap_t);
4984 prmaps = (struct prmap *) alloca ((nmap + 1) * sizeof (*prmaps));
4985 if (read (map_fd, (char *) prmaps, nmap * sizeof (*prmaps))
4986 != (nmap * sizeof (*prmaps)))
4987 proc_error (pi, "iterate_over_mappings (read)", __LINE__);
4988#else
4989 /* Use ioctl command PIOCNMAP to get number of mappings. */
4990 if (ioctl (pi->ctl_fd, PIOCNMAP, &nmap) != 0)
4991 proc_error (pi, "iterate_over_mappings (PIOCNMAP)", __LINE__);
4992
4993 prmaps = (struct prmap *) alloca ((nmap + 1) * sizeof (*prmaps));
4994 if (ioctl (pi->ctl_fd, PIOCMAP, prmaps) != 0)
4995 proc_error (pi, "iterate_over_mappings (PIOCMAP)", __LINE__);
4996#endif
4997
4998 for (prmap = prmaps; nmap > 0; prmap++, nmap--)
4999 if ((funcstat = (*func) (prmap, child_func, data)) != 0)
0a86f364
JB
5000 {
5001 do_cleanups (cleanups);
5002 return funcstat;
5003 }
831e682e 5004
0a86f364 5005 do_cleanups (cleanups);
831e682e
MS
5006 return 0;
5007}
5008
77382aee 5009/* Implements the to_find_memory_regions method. Calls an external
b8edc417 5010 function for each memory region.
77382aee 5011 Returns the integer value returned by the callback. */
be4d1333
MS
5012
5013static int
19958708 5014find_memory_regions_callback (struct prmap *map,
b8edc417 5015 find_memory_region_ftype func, void *data)
be4d1333 5016{
bf75638e 5017 return (*func) ((CORE_ADDR) map->pr_vaddr,
19958708 5018 map->pr_size,
be4d1333
MS
5019 (map->pr_mflags & MA_READ) != 0,
5020 (map->pr_mflags & MA_WRITE) != 0,
19958708 5021 (map->pr_mflags & MA_EXEC) != 0,
4f69f4c2 5022 1, /* MODIFIED is unknown, pass it as true. */
be4d1333
MS
5023 data);
5024}
5025
77382aee
PA
5026/* External interface. Calls a callback function once for each
5027 mapped memory region in the child process, passing as arguments:
5028
5029 CORE_ADDR virtual_address,
5030 unsigned long size,
5031 int read, TRUE if region is readable by the child
5032 int write, TRUE if region is writable by the child
5033 int execute TRUE if region is executable by the child.
5034
5035 Stops iterating and returns the first non-zero value returned by
5036 the callback. */
be4d1333
MS
5037
5038static int
2e73927c
TT
5039proc_find_memory_regions (struct target_ops *self,
5040 find_memory_region_ftype func, void *data)
be4d1333 5041{
dfd4cc63 5042 procinfo *pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
be4d1333 5043
19958708 5044 return iterate_over_mappings (pi, func, data,
be4d1333
MS
5045 find_memory_regions_callback);
5046}
5047
77382aee 5048/* Returns an ascii representation of a memory mapping's flags. */
c3f6f71d 5049
388faa48 5050static char *
5ae5f592 5051mappingflags (long flags)
388faa48
MS
5052{
5053 static char asciiflags[8];
5054
5055 strcpy (asciiflags, "-------");
5056#if defined (MA_PHYS)
5057 if (flags & MA_PHYS)
5058 asciiflags[0] = 'd';
5059#endif
5060 if (flags & MA_STACK)
5061 asciiflags[1] = 's';
5062 if (flags & MA_BREAK)
5063 asciiflags[2] = 'b';
5064 if (flags & MA_SHARED)
5065 asciiflags[3] = 's';
5066 if (flags & MA_READ)
5067 asciiflags[4] = 'r';
5068 if (flags & MA_WRITE)
5069 asciiflags[5] = 'w';
5070 if (flags & MA_EXEC)
5071 asciiflags[6] = 'x';
5072 return (asciiflags);
5073}
5074
77382aee
PA
5075/* Callback function, does the actual work for 'info proc
5076 mappings'. */
831e682e 5077
831e682e 5078static int
b8edc417 5079info_mappings_callback (struct prmap *map, find_memory_region_ftype ignore,
e9ef4f39 5080 void *unused)
831e682e 5081{
0b62613e 5082 unsigned int pr_off;
831e682e 5083
831e682e 5084#ifdef PCAGENT /* Horrible hack: only defined on Solaris 2.6+ */
0b62613e 5085 pr_off = (unsigned int) map->pr_offset;
831e682e 5086#else
0b62613e 5087 pr_off = map->pr_off;
831e682e 5088#endif
0b62613e 5089
f5656ead 5090 if (gdbarch_addr_bit (target_gdbarch ()) == 32)
f6a96b83 5091 printf_filtered ("\t%#10lx %#10lx %#10lx %#10x %7s\n",
0b62613e
PA
5092 (unsigned long) map->pr_vaddr,
5093 (unsigned long) map->pr_vaddr + map->pr_size - 1,
f6a96b83 5094 (unsigned long) map->pr_size,
0b62613e
PA
5095 pr_off,
5096 mappingflags (map->pr_mflags));
5097 else
f6a96b83 5098 printf_filtered (" %#18lx %#18lx %#10lx %#10x %7s\n",
0b62613e
PA
5099 (unsigned long) map->pr_vaddr,
5100 (unsigned long) map->pr_vaddr + map->pr_size - 1,
f6a96b83 5101 (unsigned long) map->pr_size,
0b62613e
PA
5102 pr_off,
5103 mappingflags (map->pr_mflags));
831e682e
MS
5104
5105 return 0;
5106}
5107
77382aee 5108/* Implement the "info proc mappings" subcommand. */
388faa48
MS
5109
5110static void
5111info_proc_mappings (procinfo *pi, int summary)
5112{
388faa48 5113 if (summary)
0df8b418 5114 return; /* No output for summary mode. */
388faa48 5115
a3f17187 5116 printf_filtered (_("Mapped address spaces:\n\n"));
f5656ead 5117 if (gdbarch_ptr_bit (target_gdbarch ()) == 32)
0b62613e
PA
5118 printf_filtered ("\t%10s %10s %10s %10s %7s\n",
5119 "Start Addr",
5120 " End Addr",
5121 " Size",
5122 " Offset",
5123 "Flags");
5124 else
5125 printf_filtered (" %18s %18s %10s %10s %7s\n",
5126 "Start Addr",
5127 " End Addr",
5128 " Size",
5129 " Offset",
5130 "Flags");
388faa48 5131
831e682e 5132 iterate_over_mappings (pi, NULL, NULL, info_mappings_callback);
388faa48
MS
5133 printf_filtered ("\n");
5134}
5135
77382aee 5136/* Implement the "info proc" command. */
c3f6f71d
JM
5137
5138static void
7bc112c1 5139procfs_info_proc (struct target_ops *ops, const char *args,
145b16a9 5140 enum info_proc_what what)
c906108c 5141{
c3f6f71d 5142 struct cleanup *old_chain;
388faa48
MS
5143 procinfo *process = NULL;
5144 procinfo *thread = NULL;
5145 char **argv = NULL;
5146 char *tmp = NULL;
5147 int pid = 0;
5148 int tid = 0;
5149 int mappings = 0;
c906108c 5150
145b16a9
UW
5151 switch (what)
5152 {
5153 case IP_MINIMAL:
5154 break;
5155
5156 case IP_MAPPINGS:
5157 case IP_ALL:
5158 mappings = 1;
5159 break;
5160
5161 default:
5162 error (_("Not supported on this target."));
5163 }
5164
c3f6f71d
JM
5165 old_chain = make_cleanup (null_cleanup, 0);
5166 if (args)
0fda6bd2 5167 {
d1a41061
PP
5168 argv = gdb_buildargv (args);
5169 make_cleanup_freeargv (argv);
0fda6bd2 5170 }
c3f6f71d
JM
5171 while (argv != NULL && *argv != NULL)
5172 {
5173 if (isdigit (argv[0][0]))
5174 {
5175 pid = strtoul (argv[0], &tmp, 10);
5176 if (*tmp == '/')
5177 tid = strtoul (++tmp, NULL, 10);
5178 }
5179 else if (argv[0][0] == '/')
5180 {
5181 tid = strtoul (argv[0] + 1, NULL, 10);
5182 }
c3f6f71d
JM
5183 argv++;
5184 }
5185 if (pid == 0)
dfd4cc63 5186 pid = ptid_get_pid (inferior_ptid);
c3f6f71d 5187 if (pid == 0)
8a3fe4f8 5188 error (_("No current process: you must name one."));
c3f6f71d 5189 else
c906108c 5190 {
c3f6f71d 5191 /* Have pid, will travel.
0df8b418 5192 First see if it's a process we're already debugging. */
c3f6f71d
JM
5193 process = find_procinfo (pid, 0);
5194 if (process == NULL)
5195 {
19958708 5196 /* No. So open a procinfo for it, but
c3f6f71d
JM
5197 remember to close it again when finished. */
5198 process = create_procinfo (pid, 0);
004527cb 5199 make_cleanup (do_destroy_procinfo_cleanup, process);
c3f6f71d
JM
5200 if (!open_procinfo_files (process, FD_CTL))
5201 proc_error (process, "info proc, open_procinfo_files", __LINE__);
5202 }
c906108c 5203 }
c3f6f71d
JM
5204 if (tid != 0)
5205 thread = create_procinfo (pid, tid);
5206
5207 if (process)
5208 {
a3f17187 5209 printf_filtered (_("process %d flags:\n"), process->pid);
c3f6f71d
JM
5210 proc_prettyprint_flags (proc_flags (process), 1);
5211 if (proc_flags (process) & (PR_STOPPED | PR_ISTOP))
5212 proc_prettyprint_why (proc_why (process), proc_what (process), 1);
5213 if (proc_get_nthreads (process) > 1)
19958708 5214 printf_filtered ("Process has %d threads.\n",
c3f6f71d
JM
5215 proc_get_nthreads (process));
5216 }
5217 if (thread)
5218 {
a3f17187 5219 printf_filtered (_("thread %d flags:\n"), thread->tid);
c3f6f71d
JM
5220 proc_prettyprint_flags (proc_flags (thread), 1);
5221 if (proc_flags (thread) & (PR_STOPPED | PR_ISTOP))
5222 proc_prettyprint_why (proc_why (thread), proc_what (thread), 1);
5223 }
5224
388faa48
MS
5225 if (mappings)
5226 {
5227 info_proc_mappings (process, 0);
5228 }
5229
c3f6f71d 5230 do_cleanups (old_chain);
c906108c
SS
5231}
5232
9185ddce
JB
5233/* Modify the status of the system call identified by SYSCALLNUM in
5234 the set of syscalls that are currently traced/debugged.
5235
5236 If ENTRY_OR_EXIT is set to PR_SYSENTRY, then the entry syscalls set
0df8b418 5237 will be updated. Otherwise, the exit syscalls set will be updated.
9185ddce 5238
0df8b418 5239 If MODE is FLAG_SET, then traces will be enabled. Otherwise, they
9185ddce
JB
5240 will be disabled. */
5241
5242static void
5243proc_trace_syscalls_1 (procinfo *pi, int syscallnum, int entry_or_exit,
77382aee 5244 int mode, int from_tty)
9185ddce
JB
5245{
5246 sysset_t *sysset;
77382aee 5247
9185ddce
JB
5248 if (entry_or_exit == PR_SYSENTRY)
5249 sysset = proc_get_traced_sysentry (pi, NULL);
5250 else
5251 sysset = proc_get_traced_sysexit (pi, NULL);
5252
5253 if (sysset == NULL)
5254 proc_error (pi, "proc-trace, get_traced_sysset", __LINE__);
5255
5256 if (mode == FLAG_SET)
5257 gdb_praddsysset (sysset, syscallnum);
5258 else
5259 gdb_prdelsysset (sysset, syscallnum);
5260
5261 if (entry_or_exit == PR_SYSENTRY)
5262 {
5263 if (!proc_set_traced_sysentry (pi, sysset))
77382aee 5264 proc_error (pi, "proc-trace, set_traced_sysentry", __LINE__);
9185ddce
JB
5265 }
5266 else
5267 {
5268 if (!proc_set_traced_sysexit (pi, sysset))
77382aee 5269 proc_error (pi, "proc-trace, set_traced_sysexit", __LINE__);
9185ddce
JB
5270 }
5271}
5272
c3f6f71d 5273static void
fba45db2 5274proc_trace_syscalls (char *args, int from_tty, int entry_or_exit, int mode)
c906108c 5275{
c3f6f71d 5276 procinfo *pi;
c906108c 5277
dfd4cc63 5278 if (ptid_get_pid (inferior_ptid) <= 0)
8a3fe4f8 5279 error (_("you must be debugging a process to use this command."));
c906108c 5280
c3f6f71d 5281 if (args == NULL || args[0] == 0)
e2e0b3e5 5282 error_no_arg (_("system call to trace"));
c3f6f71d 5283
dfd4cc63 5284 pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
c3f6f71d
JM
5285 if (isdigit (args[0]))
5286 {
9185ddce 5287 const int syscallnum = atoi (args);
c906108c 5288
9185ddce 5289 proc_trace_syscalls_1 (pi, syscallnum, entry_or_exit, mode, from_tty);
c3f6f71d
JM
5290 }
5291}
5292
19958708 5293static void
fba45db2 5294proc_trace_sysentry_cmd (char *args, int from_tty)
c906108c 5295{
c3f6f71d
JM
5296 proc_trace_syscalls (args, from_tty, PR_SYSENTRY, FLAG_SET);
5297}
c906108c 5298
19958708 5299static void
fba45db2 5300proc_trace_sysexit_cmd (char *args, int from_tty)
c3f6f71d
JM
5301{
5302 proc_trace_syscalls (args, from_tty, PR_SYSEXIT, FLAG_SET);
c906108c 5303}
c906108c 5304
19958708 5305static void
fba45db2 5306proc_untrace_sysentry_cmd (char *args, int from_tty)
c3f6f71d
JM
5307{
5308 proc_trace_syscalls (args, from_tty, PR_SYSENTRY, FLAG_RESET);
5309}
5310
19958708 5311static void
fba45db2 5312proc_untrace_sysexit_cmd (char *args, int from_tty)
c906108c 5313{
c3f6f71d
JM
5314 proc_trace_syscalls (args, from_tty, PR_SYSEXIT, FLAG_RESET);
5315}
c906108c 5316
c906108c 5317
a0911fd0
MR
5318/* Provide a prototype to silence -Wmissing-prototypes. */
5319extern void _initialize_procfs (void);
5320
c906108c 5321void
fba45db2 5322_initialize_procfs (void)
c906108c 5323{
27087a3d
JB
5324 observer_attach_inferior_created (procfs_inferior_created);
5325
19958708 5326 add_com ("proc-trace-entry", no_class, proc_trace_sysentry_cmd,
1bedd215 5327 _("Give a trace of entries into the syscall."));
19958708 5328 add_com ("proc-trace-exit", no_class, proc_trace_sysexit_cmd,
1bedd215 5329 _("Give a trace of exits from the syscall."));
19958708 5330 add_com ("proc-untrace-entry", no_class, proc_untrace_sysentry_cmd,
1bedd215 5331 _("Cancel a trace of entries into the syscall."));
19958708 5332 add_com ("proc-untrace-exit", no_class, proc_untrace_sysexit_cmd,
1bedd215 5333 _("Cancel a trace of exits from the syscall."));
c3f6f71d
JM
5334}
5335
5336/* =================== END, GDB "MODULE" =================== */
5337
5338
5339
77382aee
PA
5340/* miscellaneous stubs: */
5341
5342/* The following satisfy a few random symbols mostly created by the
5343 solaris threads implementation, which I will chase down later. */
c3f6f71d 5344
77382aee
PA
5345/* Return a pid for which we guarantee we will be able to find a
5346 'live' procinfo. */
c3f6f71d 5347
39f77062 5348ptid_t
fba45db2 5349procfs_first_available (void)
c3f6f71d 5350{
39f77062 5351 return pid_to_ptid (procinfo_list ? procinfo_list->pid : -1);
c3f6f71d 5352}
be4d1333
MS
5353
5354/* =================== GCORE .NOTE "MODULE" =================== */
05b4bd79
PA
5355#if defined (PIOCOPENLWP) || defined (PCAGENT)
5356/* gcore only implemented on solaris (so far) */
be4d1333
MS
5357
5358static char *
19958708 5359procfs_do_thread_registers (bfd *obfd, ptid_t ptid,
2020b7ab 5360 char *note_data, int *note_size,
2ea28649 5361 enum gdb_signal stop_signal)
be4d1333 5362{
594f7785 5363 struct regcache *regcache = get_thread_regcache (ptid);
be4d1333
MS
5364 gdb_gregset_t gregs;
5365 gdb_fpregset_t fpregs;
5366 unsigned long merged_pid;
75125405 5367 struct cleanup *old_chain;
be4d1333 5368
dfd4cc63 5369 merged_pid = ptid_get_lwp (ptid) << 16 | ptid_get_pid (ptid);
be4d1333 5370
75125405
DJ
5371 /* This part is the old method for fetching registers.
5372 It should be replaced by the newer one using regsets
5373 once it is implemented in this platform:
0df8b418 5374 gdbarch_regset_from_core_section() and regset->collect_regset(). */
75125405
DJ
5375
5376 old_chain = save_inferior_ptid ();
5377 inferior_ptid = ptid;
5378 target_fetch_registers (regcache, -1);
5379
594f7785 5380 fill_gregset (regcache, &gregs, -1);
4c490650 5381#if defined (NEW_PROC_API)
65554fef
MS
5382 note_data = (char *) elfcore_write_lwpstatus (obfd,
5383 note_data,
5384 note_size,
19958708 5385 merged_pid,
65554fef
MS
5386 stop_signal,
5387 &gregs);
5388#else
be4d1333 5389 note_data = (char *) elfcore_write_prstatus (obfd,
65554fef
MS
5390 note_data,
5391 note_size,
19958708 5392 merged_pid,
be4d1333 5393 stop_signal,
65554fef
MS
5394 &gregs);
5395#endif
594f7785 5396 fill_fpregset (regcache, &fpregs, -1);
be4d1333
MS
5397 note_data = (char *) elfcore_write_prfpreg (obfd,
5398 note_data,
5399 note_size,
5400 &fpregs,
5401 sizeof (fpregs));
75125405
DJ
5402
5403 do_cleanups (old_chain);
5404
be4d1333
MS
5405 return note_data;
5406}
5407
5408struct procfs_corefile_thread_data {
5409 bfd *obfd;
5410 char *note_data;
5411 int *note_size;
2ea28649 5412 enum gdb_signal stop_signal;
be4d1333
MS
5413};
5414
5415static int
65554fef 5416procfs_corefile_thread_callback (procinfo *pi, procinfo *thread, void *data)
be4d1333
MS
5417{
5418 struct procfs_corefile_thread_data *args = data;
be4d1333 5419
2689673f 5420 if (pi != NULL)
be4d1333 5421 {
dfd4cc63 5422 ptid_t ptid = ptid_build (pi->pid, thread->tid, 0);
f4a14ae6 5423
75125405 5424 args->note_data = procfs_do_thread_registers (args->obfd, ptid,
19958708 5425 args->note_data,
2020b7ab
PA
5426 args->note_size,
5427 args->stop_signal);
be4d1333
MS
5428 }
5429 return 0;
5430}
5431
a223f1e7
JB
5432static int
5433find_signalled_thread (struct thread_info *info, void *data)
5434{
a493e3e2 5435 if (info->suspend.stop_signal != GDB_SIGNAL_0
a223f1e7
JB
5436 && ptid_get_pid (info->ptid) == ptid_get_pid (inferior_ptid))
5437 return 1;
5438
5439 return 0;
5440}
5441
2ea28649 5442static enum gdb_signal
a223f1e7
JB
5443find_stop_signal (void)
5444{
5445 struct thread_info *info =
5446 iterate_over_threads (find_signalled_thread, NULL);
5447
5448 if (info)
16c381f0 5449 return info->suspend.stop_signal;
a223f1e7 5450 else
a493e3e2 5451 return GDB_SIGNAL_0;
a223f1e7
JB
5452}
5453
be4d1333 5454static char *
fc6691b2 5455procfs_make_note_section (struct target_ops *self, bfd *obfd, int *note_size)
be4d1333
MS
5456{
5457 struct cleanup *old_chain;
5458 gdb_gregset_t gregs;
5459 gdb_fpregset_t fpregs;
5460 char fname[16] = {'\0'};
5461 char psargs[80] = {'\0'};
dfd4cc63 5462 procinfo *pi = find_procinfo_or_die (ptid_get_pid (inferior_ptid), 0);
be4d1333 5463 char *note_data = NULL;
6dbdc4a3 5464 char *inf_args;
be4d1333 5465 struct procfs_corefile_thread_data thread_args;
0b62613e 5466 gdb_byte *auxv;
4e73f23d 5467 int auxv_len;
2ea28649 5468 enum gdb_signal stop_signal;
be4d1333
MS
5469
5470 if (get_exec_file (0))
5471 {
9f37bbcc 5472 strncpy (fname, lbasename (get_exec_file (0)), sizeof (fname));
4e2af517
JM
5473 fname[sizeof (fname) - 1] = 0;
5474 strncpy (psargs, get_exec_file (0), sizeof (psargs));
5475 psargs[sizeof (psargs) - 1] = 0;
6dbdc4a3
MS
5476
5477 inf_args = get_inferior_args ();
5478 if (inf_args && *inf_args &&
5479 strlen (inf_args) < ((int) sizeof (psargs) - (int) strlen (psargs)))
be4d1333 5480 {
19958708 5481 strncat (psargs, " ",
be4d1333 5482 sizeof (psargs) - strlen (psargs));
19958708 5483 strncat (psargs, inf_args,
be4d1333
MS
5484 sizeof (psargs) - strlen (psargs));
5485 }
5486 }
5487
19958708
RM
5488 note_data = (char *) elfcore_write_prpsinfo (obfd,
5489 note_data,
5490 note_size,
5491 fname,
be4d1333
MS
5492 psargs);
5493
651c8d2d
PA
5494 stop_signal = find_stop_signal ();
5495
3e3420f6
PA
5496#ifdef NEW_PROC_API
5497 fill_gregset (get_current_regcache (), &gregs, -1);
5498 note_data = elfcore_write_pstatus (obfd, note_data, note_size,
dfd4cc63 5499 ptid_get_pid (inferior_ptid),
3e3420f6
PA
5500 stop_signal, &gregs);
5501#endif
5502
be4d1333
MS
5503 thread_args.obfd = obfd;
5504 thread_args.note_data = note_data;
5505 thread_args.note_size = note_size;
651c8d2d 5506 thread_args.stop_signal = stop_signal;
3e43a32a
MS
5507 proc_iterate_over_threads (pi, procfs_corefile_thread_callback,
5508 &thread_args);
2689673f 5509 note_data = thread_args.note_data;
be4d1333 5510
13547ab6
DJ
5511 auxv_len = target_read_alloc (&current_target, TARGET_OBJECT_AUXV,
5512 NULL, &auxv);
4e73f23d
RM
5513 if (auxv_len > 0)
5514 {
5515 note_data = elfcore_write_note (obfd, note_data, note_size,
5516 "CORE", NT_AUXV, auxv, auxv_len);
5517 xfree (auxv);
5518 }
5519
be4d1333
MS
5520 return note_data;
5521}
05b4bd79 5522#else /* !Solaris */
65554fef 5523static char *
fc6691b2 5524procfs_make_note_section (struct target_ops *self, bfd *obfd, int *note_size)
65554fef 5525{
8a3fe4f8 5526 error (_("gcore not implemented for this host."));
65554fef
MS
5527 return NULL; /* lint */
5528}
05b4bd79 5529#endif /* Solaris */
be4d1333 5530/* =================== END GCORE .NOTE "MODULE" =================== */
This page took 1.928395 seconds and 4 git commands to generate.