* A few more improvements to gx jit prototype.
[deliverable/binutils-gdb.git] / gdb / procfs.c
CommitLineData
35f5886e 1/* Machine independent support for SVR4 /proc (process file system) for GDB.
f0fce3b8 2 Copyright 1991, 1992-97, 1998 Free Software Foundation, Inc.
234a732d
GN
3 Written by Fred Fish at Cygnus Support. Changes for sysv4.2mp procfs
4 compatibility by Geoffrey Noer at Cygnus Solutions.
35f5886e
FF
5
6This file is part of GDB.
7
8This program is free software; you can redistribute it and/or modify
9it under the terms of the GNU General Public License as published by
10the Free Software Foundation; either version 2 of the License, or
11(at your option) any later version.
12
13This program is distributed in the hope that it will be useful,
14but WITHOUT ANY WARRANTY; without even the implied warranty of
15MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16GNU General Public License for more details.
17
18You should have received a copy of the GNU General Public License
19along with this program; if not, write to the Free Software
6c9638b4 20Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
35f5886e
FF
21
22
23/* N O T E S
24
25For information on the details of using /proc consult section proc(4)
26in the UNIX System V Release 4 System Administrator's Reference Manual.
27
234a732d
GN
28The general register and floating point register sets are manipulated
29separately. This file makes the assumption that if FP0_REGNUM is
35f5886e
FF
30defined, then support for the floating point register set is desired,
31regardless of whether or not the actual target has floating point hardware.
32
33 */
34
35
5129100c 36#include "defs.h"
35f5886e 37
08f74b92 38#include <sys/types.h>
407a8389 39#include <time.h>
2592eef8
PS
40#include <sys/fault.h>
41#include <sys/syscall.h>
35f5886e
FF
42#include <sys/procfs.h>
43#include <fcntl.h>
44#include <errno.h>
2b576293 45#include "gdb_string.h"
de43d7d0
SG
46#include <stropts.h>
47#include <poll.h>
08f74b92 48#include <unistd.h>
2b576293 49#include "gdb_stat.h"
35f5886e 50
35f5886e
FF
51#include "inferior.h"
52#include "target.h"
51b57ded 53#include "command.h"
3fbdd536 54#include "gdbcore.h"
fdfa3315 55#include "gdbthread.h"
cc221e76 56
1e50f1b4
JM
57#if !defined(SYS_lwp_create) && defined(SYS_lwpcreate)
58# define SYS_lwp_create SYS_lwpcreate
59#endif
60
61#if !defined(SYS_lwp_exit) && defined(SYS_lwpexit)
62# define SYS_lwp_exit SYS_lwpexit
63#endif
64
65#if !defined(SYS_lwp_wait) && defined(SYS_lwpwait)
66# define SYS_lwp_wait SYS_lwpwait
67#endif
68
69#if !defined(SYS_lwp_self) && defined(SYS_lwpself)
70# define SYS_lwp_self SYS_lwpself
71#endif
72
73#if !defined(SYS_lwp_info) && defined(SYS_lwpinfo)
74# define SYS_lwp_info SYS_lwpinfo
75#endif
76
77#if !defined(SYS_lwp_private) && defined(SYS_lwpprivate)
78# define SYS_lwp_private SYS_lwpprivate
79#endif
80
81#if !defined(SYS_lwp_kill) && defined(SYS_lwpkill)
82# define SYS_lwp_kill SYS_lwpkill
83#endif
84
85#if !defined(SYS_lwp_suspend) && defined(SYS_lwpsuspend)
86# define SYS_lwp_suspend SYS_lwpsuspend
87#endif
88
89#if !defined(SYS_lwp_continue) && defined(SYS_lwpcontinue)
90# define SYS_lwp_continue SYS_lwpcontinue
91#endif
92
234a732d
GN
93/* the name of the proc status struct depends on the implementation */
94#ifdef HAVE_PSTATUS_T
95 typedef pstatus_t gdb_prstatus_t;
96#else
97 typedef prstatus_t gdb_prstatus_t;
98#endif
99
cc221e76 100#define MAX_SYSCALLS 256 /* Maximum number of syscalls for table */
35f5886e 101
234a732d
GN
102/* proc name formats may vary depending on the proc implementation */
103#ifdef HAVE_MULTIPLE_PROC_FDS
95b71071
PS
104# ifndef CTL_PROC_NAME_FMT
105# define CTL_PROC_NAME_FMT "/proc/%d/ctl"
106# define AS_PROC_NAME_FMT "/proc/%d/as"
107# define MAP_PROC_NAME_FMT "/proc/%d/map"
108# define STATUS_PROC_NAME_FMT "/proc/%d/status"
109# endif
234a732d 110#else /* HAVE_MULTIPLE_PROC_FDS */
95b71071
PS
111# ifndef CTL_PROC_NAME_FMT
112# define CTL_PROC_NAME_FMT "/proc/%05d"
113# define AS_PROC_NAME_FMT "/proc/%05d"
114# define MAP_PROC_NAME_FMT "/proc/%05d"
115# define STATUS_PROC_NAME_FMT "/proc/%05d"
116# endif
234a732d
GN
117#endif /* HAVE_MULTIPLE_PROC_FDS */
118
15af627c
FL
119
120/* These #ifdefs are for sol2.x in particular. sol2.x has
121 both a "gregset_t" and a "prgregset_t", which have
122 similar uses but different layouts. sol2.x gdb tries to
123 use prgregset_t (and prfpregset_t) everywhere. */
124
125#ifdef GDB_GREGSET_TYPE
126 typedef GDB_GREGSET_TYPE gdb_gregset_t;
127#else
128 typedef gregset_t gdb_gregset_t;
129#endif
130
131#ifdef GDB_FPREGSET_TYPE
132 typedef GDB_FPREGSET_TYPE gdb_fpregset_t;
133#else
134 typedef fpregset_t gdb_fpregset_t;
135#endif
136
137
234a732d 138#define MAX_PROC_NAME_SIZE sizeof("/proc/1234567890/status")
35f5886e 139
3fbdd536
JG
140extern struct target_ops procfs_ops; /* Forward declaration */
141
8fc2b417
SG
142int procfs_suppress_run = 0; /* Non-zero if procfs should pretend not to
143 be a runnable target. Used by targets
144 that can sit atop procfs, such as solaris
145 thread support. */
146
35f5886e
FF
147#if 1 /* FIXME: Gross and ugly hack to resolve coredep.c global */
148CORE_ADDR kernel_u_addr;
149#endif
150
cc221e76
FF
151#ifdef BROKEN_SIGINFO_H /* Workaround broken SGS <sys/siginfo.h> */
152#undef si_pid
153#define si_pid _data._proc.pid
154#undef si_uid
155#define si_uid _data._proc._pdata._kill.uid
156#endif /* BROKEN_SIGINFO_H */
157
234a732d
GN
158/* Define structures for passing commands to /proc/pid/ctl file. Note that
159 while we create these for the PROCFS_USE_READ_WRITE world, we use them
160 and ignore the extra cmd int in other proc schemes.
161*/
162/* generic ctl msg */
163struct proc_ctl {
164 int cmd;
165 long data;
166};
167
168/* set general registers */
169struct greg_ctl {
170 int cmd;
15af627c 171 gdb_gregset_t gregset;
234a732d
GN
172};
173
174/* set fp registers */
175struct fpreg_ctl {
176 int cmd;
15af627c 177 gdb_fpregset_t fpregset;
234a732d
GN
178};
179
180/* set signals to be traced */
181struct sig_ctl {
182 int cmd;
183 sigset_t sigset;
184};
185
186/* set faults to be traced */
187struct flt_ctl {
188 int cmd;
189 fltset_t fltset;
190};
191
192/* set system calls to be traced */
193struct sys_ctl {
194 int cmd;
195 sysset_t sysset;
196};
197
198/* set current signal to be traced */
199struct sigi_ctl {
200 int cmd;
201 siginfo_t siginfo;
202};
203
35f5886e
FF
204/* All access to the inferior, either one started by gdb or one that has
205 been attached to, is controlled by an instance of a procinfo structure,
206 defined below. Since gdb currently only handles one inferior at a time,
a39ad5ce
FF
207 the procinfo structure for the inferior is statically allocated and
208 only one exists at any given time. There is a separate procinfo
209 structure for use by the "info proc" command, so that we can print
210 useful information about any random process without interfering with
211 the inferior's procinfo information. */
35f5886e
FF
212
213struct procinfo {
de43d7d0 214 struct procinfo *next;
35f5886e 215 int pid; /* Process ID of inferior */
234a732d
GN
216 int ctl_fd; /* File descriptor for /proc ctl file */
217 int status_fd; /* File descriptor for /proc status file */
218 int as_fd; /* File descriptor for /proc as file */
219 int map_fd; /* File descriptor for /proc map file */
35f5886e 220 char *pathname; /* Pathname to /proc entry */
de43d7d0 221 int had_event; /* poll/select says something happened */
35f5886e 222 int was_stopped; /* Nonzero if was stopped prior to attach */
d65eee73 223 int nopass_next_sigstop; /* Don't pass a sigstop on next resume */
234a732d 224#ifndef HAVE_NO_PRRUN_T
35f5886e 225 prrun_t prrun; /* Control state when it is run */
234a732d
GN
226#endif
227 gdb_prstatus_t prstatus; /* Current process status info */
228 struct greg_ctl gregset; /* General register set */
229 struct fpreg_ctl fpregset; /* Floating point register set */
230 struct flt_ctl fltset; /* Current traced hardware fault set */
231 struct sig_ctl trace; /* Current traced signal set */
232 struct sys_ctl exitset; /* Current traced system call exit set */
233 struct sys_ctl entryset; /* Current traced system call entry set */
234 struct sig_ctl saved_sighold; /* Saved held signal set */
235 struct flt_ctl saved_fltset; /* Saved traced hardware fault set */
236 struct sig_ctl saved_trace; /* Saved traced signal set */
237 struct sys_ctl saved_exitset; /* Saved traced system call exit set */
238 struct sys_ctl saved_entryset;/* Saved traced system call entry set */
3780c337
MS
239 int num_syscall_handlers; /* Number of syscall trap handlers
240 currently installed */
241 /* Pointer to list of syscall trap handlers */
242 struct procfs_syscall_handler *syscall_handlers;
15af627c
FL
243 int saved_rtnval; /* return value and status for wait(), */
244 int saved_statval; /* as supplied by a syscall handler. */
8fc2b417 245 int new_child; /* Non-zero if it's a new thread */
a39ad5ce
FF
246};
247
de43d7d0
SG
248/* List of inferior process information */
249static struct procinfo *procinfo_list = NULL;
de43d7d0
SG
250static struct pollfd *poll_list; /* pollfds used for waiting on /proc */
251
252static int num_poll_list = 0; /* Number of entries in poll_list */
253
cc221e76
FF
254/* Much of the information used in the /proc interface, particularly for
255 printing status information, is kept as tables of structures of the
256 following form. These tables can be used to map numeric values to
257 their symbolic names and to a string that describes their specific use. */
258
259struct trans {
260 int value; /* The numeric value */
261 char *name; /* The equivalent symbolic value */
262 char *desc; /* Short description of value */
263};
264
265/* Translate bits in the pr_flags member of the prstatus structure, into the
266 names and desc information. */
267
268static struct trans pr_flag_table[] =
269{
270#if defined (PR_STOPPED)
e3be225e 271 { PR_STOPPED, "PR_STOPPED", "Process is stopped" },
cc221e76
FF
272#endif
273#if defined (PR_ISTOP)
e3be225e 274 { PR_ISTOP, "PR_ISTOP", "Stopped on an event of interest" },
cc221e76
FF
275#endif
276#if defined (PR_DSTOP)
e3be225e 277 { PR_DSTOP, "PR_DSTOP", "A stop directive is in effect" },
cc221e76
FF
278#endif
279#if defined (PR_ASLEEP)
e3be225e 280 { PR_ASLEEP, "PR_ASLEEP", "Sleeping in an interruptible system call" },
cc221e76
FF
281#endif
282#if defined (PR_FORK)
e3be225e 283 { PR_FORK, "PR_FORK", "Inherit-on-fork is in effect" },
cc221e76
FF
284#endif
285#if defined (PR_RLC)
e3be225e 286 { PR_RLC, "PR_RLC", "Run-on-last-close is in effect" },
cc221e76
FF
287#endif
288#if defined (PR_PTRACE)
e3be225e 289 { PR_PTRACE, "PR_PTRACE", "Process is being controlled by ptrace" },
cc221e76
FF
290#endif
291#if defined (PR_PCINVAL)
e3be225e 292 { PR_PCINVAL, "PR_PCINVAL", "PC refers to an invalid virtual address" },
cc221e76
FF
293#endif
294#if defined (PR_ISSYS)
e3be225e 295 { PR_ISSYS, "PR_ISSYS", "Is a system process" },
5c1c5e67
FF
296#endif
297#if defined (PR_STEP)
e3be225e 298 { PR_STEP, "PR_STEP", "Process has single step pending" },
5c1c5e67
FF
299#endif
300#if defined (PR_KLC)
e3be225e 301 { PR_KLC, "PR_KLC", "Kill-on-last-close is in effect" },
5c1c5e67
FF
302#endif
303#if defined (PR_ASYNC)
e3be225e 304 { PR_ASYNC, "PR_ASYNC", "Asynchronous stop is in effect" },
5c1c5e67
FF
305#endif
306#if defined (PR_PCOMPAT)
e3be225e 307 { PR_PCOMPAT, "PR_PCOMPAT", "Ptrace compatibility mode in effect" },
3780c337
MS
308#endif
309#if defined (PR_MSACCT)
310 { PR_MSACCT, "PR_MSACCT", "Microstate accounting enabled" },
311#endif
312#if defined (PR_BPTADJ)
313 { PR_BPTADJ, "PR_BPTADJ", "Breakpoint PC adjustment in effect" },
314#endif
315#if defined (PR_ASLWP)
316 { PR_ASLWP, "PR_ASLWP", "Asynchronus signal LWP" },
cc221e76 317#endif
e3be225e 318 { 0, NULL, NULL }
cc221e76
FF
319};
320
321/* Translate values in the pr_why field of the prstatus struct. */
322
323static struct trans pr_why_table[] =
324{
325#if defined (PR_REQUESTED)
e3be225e 326 { PR_REQUESTED, "PR_REQUESTED", "Directed to stop via PIOCSTOP/PIOCWSTOP" },
cc221e76
FF
327#endif
328#if defined (PR_SIGNALLED)
e3be225e 329 { PR_SIGNALLED, "PR_SIGNALLED", "Receipt of a traced signal" },
cc221e76 330#endif
cc221e76 331#if defined (PR_SYSENTRY)
e3be225e 332 { PR_SYSENTRY, "PR_SYSENTRY", "Entry to a traced system call" },
cc221e76
FF
333#endif
334#if defined (PR_SYSEXIT)
e3be225e 335 { PR_SYSEXIT, "PR_SYSEXIT", "Exit from a traced system call" },
cc221e76
FF
336#endif
337#if defined (PR_JOBCONTROL)
e3be225e 338 { PR_JOBCONTROL, "PR_JOBCONTROL", "Default job control stop signal action" },
5c1c5e67 339#endif
3780c337
MS
340#if defined (PR_FAULTED)
341 { PR_FAULTED, "PR_FAULTED", "Incurred a traced hardware fault" },
342#endif
5c1c5e67 343#if defined (PR_SUSPENDED)
e3be225e 344 { PR_SUSPENDED, "PR_SUSPENDED", "Process suspended" },
3780c337
MS
345#endif
346#if defined (PR_CHECKPOINT)
347 { PR_CHECKPOINT, "PR_CHECKPOINT", "(???)" },
cc221e76 348#endif
e3be225e 349 { 0, NULL, NULL }
cc221e76
FF
350};
351
352/* Hardware fault translation table. */
353
354static struct trans faults_table[] =
355{
356#if defined (FLTILL)
e3be225e 357 { FLTILL, "FLTILL", "Illegal instruction" },
cc221e76
FF
358#endif
359#if defined (FLTPRIV)
e3be225e 360 { FLTPRIV, "FLTPRIV", "Privileged instruction" },
cc221e76
FF
361#endif
362#if defined (FLTBPT)
e3be225e 363 { FLTBPT, "FLTBPT", "Breakpoint trap" },
cc221e76
FF
364#endif
365#if defined (FLTTRACE)
e3be225e 366 { FLTTRACE, "FLTTRACE", "Trace trap" },
cc221e76
FF
367#endif
368#if defined (FLTACCESS)
e3be225e 369 { FLTACCESS, "FLTACCESS", "Memory access fault" },
cc221e76
FF
370#endif
371#if defined (FLTBOUNDS)
e3be225e 372 { FLTBOUNDS, "FLTBOUNDS", "Memory bounds violation" },
cc221e76
FF
373#endif
374#if defined (FLTIOVF)
e3be225e 375 { FLTIOVF, "FLTIOVF", "Integer overflow" },
cc221e76
FF
376#endif
377#if defined (FLTIZDIV)
e3be225e 378 { FLTIZDIV, "FLTIZDIV", "Integer zero divide" },
cc221e76
FF
379#endif
380#if defined (FLTFPE)
e3be225e 381 { FLTFPE, "FLTFPE", "Floating-point exception" },
cc221e76
FF
382#endif
383#if defined (FLTSTACK)
e3be225e 384 { FLTSTACK, "FLTSTACK", "Unrecoverable stack fault" },
cc221e76
FF
385#endif
386#if defined (FLTPAGE)
e3be225e 387 { FLTPAGE, "FLTPAGE", "Recoverable page fault" },
cc221e76 388#endif
e3be225e 389 { 0, NULL, NULL }
cc221e76
FF
390};
391
392/* Translation table for signal generation information. See UNIX System
393 V Release 4 Programmer's Reference Manual, siginfo(5). */
394
395static struct sigcode {
396 int signo;
397 int code;
398 char *codename;
399 char *desc;
400} siginfo_table[] = {
401#if defined (SIGILL) && defined (ILL_ILLOPC)
e3be225e 402 { SIGILL, ILL_ILLOPC, "ILL_ILLOPC", "Illegal opcode" },
cc221e76
FF
403#endif
404#if defined (SIGILL) && defined (ILL_ILLOPN)
e3be225e 405 { SIGILL, ILL_ILLOPN, "ILL_ILLOPN", "Illegal operand", },
cc221e76
FF
406#endif
407#if defined (SIGILL) && defined (ILL_ILLADR)
e3be225e 408 { SIGILL, ILL_ILLADR, "ILL_ILLADR", "Illegal addressing mode" },
cc221e76
FF
409#endif
410#if defined (SIGILL) && defined (ILL_ILLTRP)
e3be225e 411 { SIGILL, ILL_ILLTRP, "ILL_ILLTRP", "Illegal trap" },
cc221e76
FF
412#endif
413#if defined (SIGILL) && defined (ILL_PRVOPC)
e3be225e 414 { SIGILL, ILL_PRVOPC, "ILL_PRVOPC", "Privileged opcode" },
cc221e76
FF
415#endif
416#if defined (SIGILL) && defined (ILL_PRVREG)
e3be225e 417 { SIGILL, ILL_PRVREG, "ILL_PRVREG", "Privileged register" },
cc221e76
FF
418#endif
419#if defined (SIGILL) && defined (ILL_COPROC)
e3be225e 420 { SIGILL, ILL_COPROC, "ILL_COPROC", "Coprocessor error" },
cc221e76
FF
421#endif
422#if defined (SIGILL) && defined (ILL_BADSTK)
e3be225e 423 { SIGILL, ILL_BADSTK, "ILL_BADSTK", "Internal stack error" },
cc221e76
FF
424#endif
425#if defined (SIGFPE) && defined (FPE_INTDIV)
e3be225e 426 { SIGFPE, FPE_INTDIV, "FPE_INTDIV", "Integer divide by zero" },
cc221e76
FF
427#endif
428#if defined (SIGFPE) && defined (FPE_INTOVF)
e3be225e 429 { SIGFPE, FPE_INTOVF, "FPE_INTOVF", "Integer overflow" },
cc221e76
FF
430#endif
431#if defined (SIGFPE) && defined (FPE_FLTDIV)
e3be225e 432 { SIGFPE, FPE_FLTDIV, "FPE_FLTDIV", "Floating point divide by zero" },
cc221e76
FF
433#endif
434#if defined (SIGFPE) && defined (FPE_FLTOVF)
e3be225e 435 { SIGFPE, FPE_FLTOVF, "FPE_FLTOVF", "Floating point overflow" },
cc221e76
FF
436#endif
437#if defined (SIGFPE) && defined (FPE_FLTUND)
e3be225e 438 { SIGFPE, FPE_FLTUND, "FPE_FLTUND", "Floating point underflow" },
cc221e76
FF
439#endif
440#if defined (SIGFPE) && defined (FPE_FLTRES)
e3be225e 441 { SIGFPE, FPE_FLTRES, "FPE_FLTRES", "Floating point inexact result" },
cc221e76
FF
442#endif
443#if defined (SIGFPE) && defined (FPE_FLTINV)
e3be225e 444 { SIGFPE, FPE_FLTINV, "FPE_FLTINV", "Invalid floating point operation" },
cc221e76
FF
445#endif
446#if defined (SIGFPE) && defined (FPE_FLTSUB)
e3be225e 447 { SIGFPE, FPE_FLTSUB, "FPE_FLTSUB", "Subscript out of range" },
cc221e76
FF
448#endif
449#if defined (SIGSEGV) && defined (SEGV_MAPERR)
e3be225e 450 { SIGSEGV, SEGV_MAPERR, "SEGV_MAPERR", "Address not mapped to object" },
cc221e76
FF
451#endif
452#if defined (SIGSEGV) && defined (SEGV_ACCERR)
e3be225e 453 { SIGSEGV, SEGV_ACCERR, "SEGV_ACCERR", "Invalid permissions for object" },
cc221e76
FF
454#endif
455#if defined (SIGBUS) && defined (BUS_ADRALN)
e3be225e 456 { SIGBUS, BUS_ADRALN, "BUS_ADRALN", "Invalid address alignment" },
cc221e76
FF
457#endif
458#if defined (SIGBUS) && defined (BUS_ADRERR)
e3be225e 459 { SIGBUS, BUS_ADRERR, "BUS_ADRERR", "Non-existent physical address" },
cc221e76
FF
460#endif
461#if defined (SIGBUS) && defined (BUS_OBJERR)
e3be225e 462 { SIGBUS, BUS_OBJERR, "BUS_OBJERR", "Object specific hardware error" },
cc221e76
FF
463#endif
464#if defined (SIGTRAP) && defined (TRAP_BRKPT)
e3be225e 465 { SIGTRAP, TRAP_BRKPT, "TRAP_BRKPT", "Process breakpoint" },
cc221e76
FF
466#endif
467#if defined (SIGTRAP) && defined (TRAP_TRACE)
e3be225e 468 { SIGTRAP, TRAP_TRACE, "TRAP_TRACE", "Process trace trap" },
cc221e76
FF
469#endif
470#if defined (SIGCLD) && defined (CLD_EXITED)
e3be225e 471 { SIGCLD, CLD_EXITED, "CLD_EXITED", "Child has exited" },
cc221e76
FF
472#endif
473#if defined (SIGCLD) && defined (CLD_KILLED)
e3be225e 474 { SIGCLD, CLD_KILLED, "CLD_KILLED", "Child was killed" },
cc221e76
FF
475#endif
476#if defined (SIGCLD) && defined (CLD_DUMPED)
e3be225e 477 { SIGCLD, CLD_DUMPED, "CLD_DUMPED", "Child has terminated abnormally" },
cc221e76
FF
478#endif
479#if defined (SIGCLD) && defined (CLD_TRAPPED)
e3be225e 480 { SIGCLD, CLD_TRAPPED, "CLD_TRAPPED", "Traced child has trapped" },
cc221e76
FF
481#endif
482#if defined (SIGCLD) && defined (CLD_STOPPED)
e3be225e 483 { SIGCLD, CLD_STOPPED, "CLD_STOPPED", "Child has stopped" },
cc221e76
FF
484#endif
485#if defined (SIGCLD) && defined (CLD_CONTINUED)
e3be225e 486 { SIGCLD, CLD_CONTINUED, "CLD_CONTINUED", "Stopped child had continued" },
cc221e76
FF
487#endif
488#if defined (SIGPOLL) && defined (POLL_IN)
e3be225e 489 { SIGPOLL, POLL_IN, "POLL_IN", "Input input available" },
cc221e76
FF
490#endif
491#if defined (SIGPOLL) && defined (POLL_OUT)
e3be225e 492 { SIGPOLL, POLL_OUT, "POLL_OUT", "Output buffers available" },
cc221e76
FF
493#endif
494#if defined (SIGPOLL) && defined (POLL_MSG)
e3be225e 495 { SIGPOLL, POLL_MSG, "POLL_MSG", "Input message available" },
cc221e76
FF
496#endif
497#if defined (SIGPOLL) && defined (POLL_ERR)
e3be225e 498 { SIGPOLL, POLL_ERR, "POLL_ERR", "I/O error" },
cc221e76
FF
499#endif
500#if defined (SIGPOLL) && defined (POLL_PRI)
e3be225e 501 { SIGPOLL, POLL_PRI, "POLL_PRI", "High priority input available" },
cc221e76
FF
502#endif
503#if defined (SIGPOLL) && defined (POLL_HUP)
e3be225e 504 { SIGPOLL, POLL_HUP, "POLL_HUP", "Device disconnected" },
cc221e76 505#endif
e3be225e 506 { 0, 0, NULL, NULL }
cc221e76
FF
507};
508
cc221e76
FF
509static char *syscall_table[MAX_SYSCALLS];
510
1ab3bf1b
JG
511/* Prototypes for local functions */
512
b607efe7
FF
513static void procfs_stop PARAMS ((void));
514
515static int procfs_thread_alive PARAMS ((int));
516
517static int procfs_can_run PARAMS ((void));
518
519static void procfs_mourn_inferior PARAMS ((void));
520
521static void procfs_fetch_registers PARAMS ((int));
522
523static int procfs_wait PARAMS ((int, struct target_waitstatus *));
524
525static void procfs_open PARAMS ((char *, int));
526
527static void procfs_files_info PARAMS ((struct target_ops *));
528
529static void procfs_prepare_to_store PARAMS ((void));
530
531static void procfs_detach PARAMS ((char *, int));
532
533static void procfs_attach PARAMS ((char *, int));
534
535static void proc_set_exec_trap PARAMS ((void));
536
537static int procfs_init_inferior PARAMS ((int));
538
539static struct procinfo *create_procinfo PARAMS ((int));
540
541static void procfs_store_registers PARAMS ((int));
542
543static int procfs_xfer_memory PARAMS ((CORE_ADDR, char *, int, int, struct target_ops *));
544
545static void procfs_kill_inferior PARAMS ((void));
546
547static char *sigcodedesc PARAMS ((siginfo_t *));
548
549static char *sigcodename PARAMS ((siginfo_t *));
550
551static struct procinfo *wait_fd PARAMS ((void));
552
553static void remove_fd PARAMS ((struct procinfo *));
554
555static void add_fd PARAMS ((struct procinfo *));
556
e3be225e 557static void set_proc_siginfo PARAMS ((struct procinfo *, int));
6b801388 558
e3be225e 559static void init_syscall_table PARAMS ((void));
cc221e76 560
e3be225e 561static char *syscallname PARAMS ((int));
cc221e76 562
e3be225e 563static char *signalname PARAMS ((int));
cc221e76 564
e3be225e 565static char *errnoname PARAMS ((int));
4ace50a5 566
e3be225e 567static int proc_address_to_fd PARAMS ((struct procinfo *, CORE_ADDR, int));
1ab3bf1b 568
234a732d 569static int open_proc_file PARAMS ((int, struct procinfo *, int, int));
1ab3bf1b 570
e3be225e 571static void close_proc_file PARAMS ((struct procinfo *));
1ab3bf1b 572
e3be225e 573static void unconditionally_kill_inferior PARAMS ((struct procinfo *));
1ab3bf1b 574
3780c337 575static NORETURN void proc_init_failed PARAMS ((struct procinfo *, char *, int)) ATTR_NORETURN;
1ab3bf1b 576
e3be225e 577static void info_proc PARAMS ((char *, int));
cc221e76 578
e3be225e 579static void info_proc_flags PARAMS ((struct procinfo *, int));
cc221e76 580
e3be225e 581static void info_proc_stop PARAMS ((struct procinfo *, int));
1ab3bf1b 582
e3be225e 583static void info_proc_siginfo PARAMS ((struct procinfo *, int));
cc221e76 584
e3be225e 585static void info_proc_syscalls PARAMS ((struct procinfo *, int));
cc221e76 586
e3be225e 587static void info_proc_mappings PARAMS ((struct procinfo *, int));
cc221e76 588
e3be225e 589static void info_proc_signals PARAMS ((struct procinfo *, int));
cc221e76 590
e3be225e 591static void info_proc_faults PARAMS ((struct procinfo *, int));
1ab3bf1b 592
e3be225e 593static char *mappingflags PARAMS ((long));
1ab3bf1b 594
e3be225e 595static char *lookupname PARAMS ((struct trans *, unsigned int, char *));
cc221e76 596
e3be225e 597static char *lookupdesc PARAMS ((struct trans *, unsigned int));
cc221e76 598
e3be225e 599static int do_attach PARAMS ((int pid));
3fbdd536 600
e3be225e 601static void do_detach PARAMS ((int siggnal));
3fbdd536 602
e3be225e 603static void procfs_create_inferior PARAMS ((char *, char *, char **));
3fbdd536 604
e3be225e 605static void procfs_notice_signals PARAMS ((int pid));
de43d7d0 606
234a732d
GN
607static void notice_signals PARAMS ((struct procinfo *, struct sig_ctl *));
608
e3be225e 609static struct procinfo *find_procinfo PARAMS ((pid_t pid, int okfail));
3950a34e 610
234a732d 611static int procfs_write_pcwstop PARAMS ((struct procinfo *));
3780c337 612static int procfs_read_status PARAMS ((struct procinfo *));
234a732d
GN
613static void procfs_write_pckill PARAMS ((struct procinfo *));
614
8fc2b417
SG
615typedef int syscall_func_t PARAMS ((struct procinfo *pi, int syscall_num,
616 int why, int *rtnval, int *statval));
617
618static void procfs_set_syscall_trap PARAMS ((struct procinfo *pi,
619 int syscall_num, int flags,
620 syscall_func_t *func));
621
622static void procfs_clear_syscall_trap PARAMS ((struct procinfo *pi,
623 int syscall_num, int errok));
624
625#define PROCFS_SYSCALL_ENTRY 0x1 /* Trap on entry to sys call */
626#define PROCFS_SYSCALL_EXIT 0x2 /* Trap on exit from sys call */
627
628static syscall_func_t procfs_exit_handler;
629
630static syscall_func_t procfs_exec_handler;
631
632#ifdef SYS_sproc
633static syscall_func_t procfs_sproc_handler;
634static syscall_func_t procfs_fork_handler;
635#endif
636
637#ifdef SYS_lwp_create
638static syscall_func_t procfs_lwp_creation_handler;
639#endif
640
641static void modify_inherit_on_fork_flag PARAMS ((int fd, int flag));
642static void modify_run_on_last_close_flag PARAMS ((int fd, int flag));
643
644/* */
645
646struct procfs_syscall_handler
647{
648 int syscall_num; /* The number of the system call being handled */
649 /* The function to be called */
650 syscall_func_t *func;
651};
652
653static void procfs_resume PARAMS ((int pid, int step,
654 enum target_signal signo));
655
1ab3bf1b
JG
656/* External function prototypes that can't be easily included in any
657 header file because the args are typedefs in system include files. */
658
15af627c 659extern void supply_gregset PARAMS ((gdb_gregset_t *));
1ab3bf1b 660
15af627c 661extern void fill_gregset PARAMS ((gdb_gregset_t *, int));
1ab3bf1b 662
234a732d 663#ifdef FP0_REGNUM
15af627c 664extern void supply_fpregset PARAMS ((gdb_fpregset_t *));
1ab3bf1b 665
15af627c 666extern void fill_fpregset PARAMS ((gdb_fpregset_t *, int));
234a732d 667#endif
35f5886e 668
cc221e76
FF
669/*
670
de43d7d0
SG
671LOCAL FUNCTION
672
673 find_procinfo -- convert a process id to a struct procinfo
674
675SYNOPSIS
676
677 static struct procinfo * find_procinfo (pid_t pid, int okfail);
678
679DESCRIPTION
680
681 Given a process id, look it up in the procinfo chain. Returns
682 a struct procinfo *. If can't find pid, then call error(),
683 unless okfail is set, in which case, return NULL;
684 */
685
686static struct procinfo *
687find_procinfo (pid, okfail)
688 pid_t pid;
689 int okfail;
690{
691 struct procinfo *procinfo;
692
693 for (procinfo = procinfo_list; procinfo; procinfo = procinfo->next)
694 if (procinfo->pid == pid)
695 return procinfo;
696
697 if (okfail)
698 return NULL;
699
700 error ("procfs (find_procinfo): Couldn't locate pid %d", pid);
701}
702
703/*
704
7c5d526e
SG
705LOCAL MACRO
706
707 current_procinfo -- convert inferior_pid to a struct procinfo
708
709SYNOPSIS
710
711 static struct procinfo * current_procinfo;
712
713DESCRIPTION
714
715 Looks up inferior_pid in the procinfo chain. Always returns a
716 struct procinfo *. If process can't be found, we error() out.
717 */
718
719#define current_procinfo find_procinfo (inferior_pid, 0)
720
721/*
722
de43d7d0
SG
723LOCAL FUNCTION
724
725 add_fd -- Add the fd to the poll/select list
726
727SYNOPSIS
728
729 static void add_fd (struct procinfo *);
730
731DESCRIPTION
732
733 Add the fd of the supplied procinfo to the list of fds used for
734 poll/select operations.
735 */
736
737static void
738add_fd (pi)
739 struct procinfo *pi;
740{
741 if (num_poll_list <= 0)
742 poll_list = (struct pollfd *) xmalloc (sizeof (struct pollfd));
743 else
744 poll_list = (struct pollfd *) xrealloc (poll_list,
745 (num_poll_list + 1)
746 * sizeof (struct pollfd));
234a732d
GN
747 poll_list[num_poll_list].fd = pi->ctl_fd;
748#ifdef UNIXWARE
749 poll_list[num_poll_list].events = POLLWRNORM;
750#else
de43d7d0 751 poll_list[num_poll_list].events = POLLPRI;
234a732d 752#endif
de43d7d0
SG
753
754 num_poll_list++;
755}
756
3780c337
MS
757/*
758
759LOCAL FUNCTION
760
761 remove_fd -- Remove the fd from the poll/select list
762
763SYNOPSIS
764
765 static void remove_fd (struct procinfo *);
766
767DESCRIPTION
768
769 Remove the fd of the supplied procinfo from the list of fds used
770 for poll/select operations.
771 */
772
de43d7d0
SG
773static void
774remove_fd (pi)
775 struct procinfo *pi;
776{
777 int i;
778
779 for (i = 0; i < num_poll_list; i++)
780 {
234a732d 781 if (poll_list[i].fd == pi->ctl_fd)
de43d7d0
SG
782 {
783 if (i != num_poll_list - 1)
8fc2b417 784 memcpy (poll_list + i, poll_list + i + 1,
de43d7d0
SG
785 (num_poll_list - i - 1) * sizeof (struct pollfd));
786
787 num_poll_list--;
788
789 if (num_poll_list == 0)
790 free (poll_list);
791 else
792 poll_list = (struct pollfd *) xrealloc (poll_list,
793 num_poll_list
794 * sizeof (struct pollfd));
795 return;
796 }
797 }
798}
799
234a732d
GN
800/*
801
802LOCAL FUNCTION
803
804 procfs_read_status - get procfs fd status
805
806SYNOPSIS
807
808 static int procfs_read_status (pi) struct procinfo *pi;
809
810DESCRIPTION
811
812 Given a pointer to a procinfo struct, get the status of
813 the status_fd in the appropriate way. Returns 0 on failure,
814 1 on success.
815 */
816
817static int
818procfs_read_status (pi)
819 struct procinfo *pi;
820{
821#ifdef PROCFS_USE_READ_WRITE
822 if ((lseek (pi->status_fd, 0, SEEK_SET) < 0) ||
823 (read (pi->status_fd, (char *) &pi->prstatus,
824 sizeof (gdb_prstatus_t)) != sizeof (gdb_prstatus_t)))
825#else
826 if (ioctl (pi->status_fd, PIOCSTATUS, &pi->prstatus) < 0)
827#endif
828 return 0;
829 else
830 return 1;
831}
832
833/*
834
835LOCAL FUNCTION
836
837 procfs_write_pcwstop - send a PCWSTOP to procfs fd
838
839SYNOPSIS
840
841 static int procfs_write_pcwstop (pi) struct procinfo *pi;
842
843DESCRIPTION
844
845 Given a pointer to a procinfo struct, send a PCWSTOP to
846 the ctl_fd in the appropriate way. Returns 0 on failure,
847 1 on success.
848 */
849
850static int
851procfs_write_pcwstop (pi)
852 struct procinfo *pi;
853{
854#ifdef PROCFS_USE_READ_WRITE
855 long cmd = PCWSTOP;
856 if (write (pi->ctl_fd, (char *) &cmd, sizeof (long)) < 0)
857#else
858 if (ioctl (pi->ctl_fd, PIOCWSTOP, &pi->prstatus) < 0)
859#endif
860 return 0;
861 else
862 return 1;
863}
864
865/*
866
867LOCAL FUNCTION
868
869 procfs_write_pckill - send a kill to procfs fd
870
871SYNOPSIS
872
873 static void procfs_write_pckill (pi) struct procinfo *pi;
874
875DESCRIPTION
876
877 Given a pointer to a procinfo struct, send a kill to
878 the ctl_fd in the appropriate way. Returns 0 on failure,
879 1 on success.
880 */
881
882static void
883procfs_write_pckill (pi)
884 struct procinfo *pi;
885{
886#ifdef PROCFS_USE_READ_WRITE
887 struct proc_ctl pctl;
888 pctl.cmd = PCKILL;
889 pctl.data = SIGKILL;
890 write (pi->ctl_fd, &pctl, sizeof (struct proc_ctl));
891#else
892 int signo = SIGKILL;
893 ioctl (pi->ctl_fd, PIOCKILL, &signo);
894#endif
895}
896
7c5d526e
SG
897static struct procinfo *
898wait_fd ()
899{
f14465c3 900 struct procinfo *pi, *next_pi;
b607efe7 901#ifndef LOSING_POLL
7c5d526e
SG
902 int num_fds;
903 int i;
b607efe7 904#endif
de43d7d0 905
1e75b5f5 906 set_sigint_trap (); /* Causes SIGINT to be passed on to the
7c5d526e 907 attached process. */
429f1c9f 908 set_sigio_trap ();
de43d7d0 909
f14465c3 910 wait_again:
7c5d526e 911#ifndef LOSING_POLL
e172af81
FF
912 while (1)
913 {
914 num_fds = poll (poll_list, num_poll_list, -1);
915 if (num_fds > 0)
916 break;
917 if (num_fds < 0 && errno == EINTR)
918 continue;
919 print_sys_errmsg ("poll failed", errno);
920 error ("Poll failed, returned %d", num_fds);
921 }
234a732d 922#else /* LOSING_POLL */
7c5d526e 923 pi = current_procinfo;
de43d7d0 924
234a732d 925 while (!procfs_write_pcwstop (pi))
7c5d526e 926 {
cef0333e
PS
927 if (errno == ENOENT)
928 {
929 /* Process exited. */
930 pi->prstatus.pr_flags = 0;
931 break;
932 }
933 else if (errno != EINTR)
8afd05c0
JK
934 {
935 print_sys_errmsg (pi->pathname, errno);
234a732d 936 error ("procfs_write_pcwstop failed");
8afd05c0 937 }
7c5d526e 938 }
fb63d460 939 pi->had_event = 1;
234a732d 940#endif /* LOSING_POLL */
7c5d526e 941
1e75b5f5 942 clear_sigint_trap ();
429f1c9f 943 clear_sigio_trap ();
de43d7d0 944
7c5d526e 945#ifndef LOSING_POLL
de43d7d0 946
7c5d526e
SG
947 for (i = 0; i < num_poll_list && num_fds > 0; i++)
948 {
3780c337
MS
949 if (0 == (poll_list[i].revents &
950 (POLLWRNORM | POLLPRI | POLLERR | POLLHUP | POLLNVAL)))
7c5d526e 951 continue;
f14465c3 952 for (pi = procinfo_list; pi; pi = next_pi)
7c5d526e 953 {
f14465c3 954 next_pi = pi->next;
234a732d 955 if (poll_list[i].fd == pi->ctl_fd)
7c5d526e 956 {
f14465c3
MS
957 num_fds--;
958 if ((poll_list[i].revents & POLLHUP) != 0 ||
959 !procfs_read_status(pi))
960 { /* The LWP has apparently terminated. */
1e50f1b4
JM
961 if (num_poll_list <= 1)
962 {
963 pi->prstatus.pr_flags = 0;
964 pi->had_event = 1;
965 break;
966 }
3780c337 967 if (info_verbose)
f14465c3 968 printf_filtered ("LWP %d exited.\n",
3780c337 969 (pi->pid >> 16) & 0xffff);
f14465c3
MS
970 close_proc_file (pi);
971 if (num_fds != 0)
972 continue; /* already another event to process */
973 else
974 goto wait_again; /* wait for another event */
7c5d526e 975 }
7c5d526e
SG
976 pi->had_event = 1;
977 break;
978 }
979 }
980 if (!pi)
8fc2b417 981 error ("wait_fd: Couldn't find procinfo for fd %d\n",
7c5d526e
SG
982 poll_list[i].fd);
983 }
984#endif /* LOSING_POLL */
985
986 return pi;
987}
de43d7d0
SG
988
989/*
990
cc221e76
FF
991LOCAL FUNCTION
992
993 lookupdesc -- translate a value to a summary desc string
994
995SYNOPSIS
996
997 static char *lookupdesc (struct trans *transp, unsigned int val);
998
999DESCRIPTION
1000
1001 Given a pointer to a translation table and a value to be translated,
1002 lookup the desc string and return it.
1003 */
1004
1005static char *
1006lookupdesc (transp, val)
1007 struct trans *transp;
1008 unsigned int val;
1009{
1010 char *desc;
1011
1012 for (desc = NULL; transp -> name != NULL; transp++)
1013 {
1014 if (transp -> value == val)
1015 {
1016 desc = transp -> desc;
1017 break;
1018 }
1019 }
1020
1021 /* Didn't find a translation for the specified value, set a default one. */
1022
1023 if (desc == NULL)
1024 {
1025 desc = "Unknown";
1026 }
1027 return (desc);
1028}
1029
1030/*
1031
1032LOCAL FUNCTION
1033
1034 lookupname -- translate a value to symbolic name
1035
1036SYNOPSIS
1037
1038 static char *lookupname (struct trans *transp, unsigned int val,
1039 char *prefix);
1040
1041DESCRIPTION
1042
1043 Given a pointer to a translation table, a value to be translated,
1044 and a default prefix to return if the value can't be translated,
1045 match the value with one of the translation table entries and
1046 return a pointer to the symbolic name.
1047
1048 If no match is found it just returns the value as a printable string,
1049 with the given prefix. The previous such value, if any, is freed
1050 at this time.
1051 */
1052
1053static char *
1054lookupname (transp, val, prefix)
1055 struct trans *transp;
1056 unsigned int val;
1057 char *prefix;
1058{
1059 static char *locbuf;
1060 char *name;
1061
1062 for (name = NULL; transp -> name != NULL; transp++)
1063 {
1064 if (transp -> value == val)
1065 {
1066 name = transp -> name;
1067 break;
1068 }
1069 }
1070
1071 /* Didn't find a translation for the specified value, build a default
1072 one using the specified prefix and return it. The lifetime of
1073 the value is only until the next one is needed. */
1074
1075 if (name == NULL)
1076 {
1077 if (locbuf != NULL)
1078 {
1079 free (locbuf);
1080 }
1081 locbuf = xmalloc (strlen (prefix) + 16);
4ed3a9ea 1082 sprintf (locbuf, "%s %u", prefix, val);
cc221e76
FF
1083 name = locbuf;
1084 }
1085 return (name);
1086}
1087
1088static char *
1089sigcodename (sip)
1090 siginfo_t *sip;
1091{
1092 struct sigcode *scp;
1093 char *name = NULL;
1094 static char locbuf[32];
1095
1096 for (scp = siginfo_table; scp -> codename != NULL; scp++)
1097 {
1098 if ((scp -> signo == sip -> si_signo) &&
1099 (scp -> code == sip -> si_code))
1100 {
1101 name = scp -> codename;
1102 break;
1103 }
1104 }
1105 if (name == NULL)
1106 {
4ed3a9ea 1107 sprintf (locbuf, "sigcode %u", sip -> si_signo);
cc221e76
FF
1108 name = locbuf;
1109 }
1110 return (name);
1111}
1112
3fbdd536
JG
1113static char *
1114sigcodedesc (sip)
cc221e76
FF
1115 siginfo_t *sip;
1116{
1117 struct sigcode *scp;
1118 char *desc = NULL;
1119
1120 for (scp = siginfo_table; scp -> codename != NULL; scp++)
1121 {
1122 if ((scp -> signo == sip -> si_signo) &&
1123 (scp -> code == sip -> si_code))
1124 {
1125 desc = scp -> desc;
1126 break;
1127 }
1128 }
1129 if (desc == NULL)
1130 {
1131 desc = "Unrecognized signal or trap use";
1132 }
1133 return (desc);
1134}
1135
1136/*
1137
1138LOCAL FUNCTION
1139
1140 syscallname - translate a system call number into a system call name
1141
1142SYNOPSIS
1143
1144 char *syscallname (int syscallnum)
1145
1146DESCRIPTION
1147
1148 Given a system call number, translate it into the printable name
1149 of a system call, or into "syscall <num>" if it is an unknown
1150 number.
1151 */
1152
1153static char *
1154syscallname (syscallnum)
1155 int syscallnum;
1156{
1157 static char locbuf[32];
cc221e76 1158
8fc2b417
SG
1159 if (syscallnum >= 0 && syscallnum < MAX_SYSCALLS
1160 && syscall_table[syscallnum] != NULL)
1161 return syscall_table[syscallnum];
cc221e76
FF
1162 else
1163 {
4ed3a9ea 1164 sprintf (locbuf, "syscall %u", syscallnum);
8fc2b417 1165 return locbuf;
cc221e76 1166 }
cc221e76
FF
1167}
1168
1169/*
1170
1171LOCAL FUNCTION
1172
1173 init_syscall_table - initialize syscall translation table
1174
1175SYNOPSIS
1176
1177 void init_syscall_table (void)
1178
1179DESCRIPTION
1180
1181 Dynamically initialize the translation table to convert system
1182 call numbers into printable system call names. Done once per
1183 gdb run, on initialization.
1184
1185NOTES
1186
1187 This is awfully ugly, but preprocessor tricks to make it prettier
1188 tend to be nonportable.
1189 */
1190
1191static void
1192init_syscall_table ()
1193{
cc221e76
FF
1194#if defined (SYS_exit)
1195 syscall_table[SYS_exit] = "exit";
1196#endif
1197#if defined (SYS_fork)
1198 syscall_table[SYS_fork] = "fork";
1199#endif
1200#if defined (SYS_read)
1201 syscall_table[SYS_read] = "read";
1202#endif
1203#if defined (SYS_write)
1204 syscall_table[SYS_write] = "write";
1205#endif
1206#if defined (SYS_open)
1207 syscall_table[SYS_open] = "open";
1208#endif
1209#if defined (SYS_close)
1210 syscall_table[SYS_close] = "close";
1211#endif
1212#if defined (SYS_wait)
1213 syscall_table[SYS_wait] = "wait";
1214#endif
1215#if defined (SYS_creat)
1216 syscall_table[SYS_creat] = "creat";
1217#endif
1218#if defined (SYS_link)
1219 syscall_table[SYS_link] = "link";
1220#endif
1221#if defined (SYS_unlink)
1222 syscall_table[SYS_unlink] = "unlink";
1223#endif
1224#if defined (SYS_exec)
1225 syscall_table[SYS_exec] = "exec";
1226#endif
1227#if defined (SYS_execv)
1228 syscall_table[SYS_execv] = "execv";
1229#endif
1230#if defined (SYS_execve)
1231 syscall_table[SYS_execve] = "execve";
1232#endif
1233#if defined (SYS_chdir)
1234 syscall_table[SYS_chdir] = "chdir";
1235#endif
1236#if defined (SYS_time)
1237 syscall_table[SYS_time] = "time";
1238#endif
1239#if defined (SYS_mknod)
1240 syscall_table[SYS_mknod] = "mknod";
1241#endif
1242#if defined (SYS_chmod)
1243 syscall_table[SYS_chmod] = "chmod";
1244#endif
1245#if defined (SYS_chown)
1246 syscall_table[SYS_chown] = "chown";
1247#endif
1248#if defined (SYS_brk)
1249 syscall_table[SYS_brk] = "brk";
1250#endif
1251#if defined (SYS_stat)
1252 syscall_table[SYS_stat] = "stat";
1253#endif
1254#if defined (SYS_lseek)
1255 syscall_table[SYS_lseek] = "lseek";
1256#endif
1257#if defined (SYS_getpid)
1258 syscall_table[SYS_getpid] = "getpid";
1259#endif
1260#if defined (SYS_mount)
1261 syscall_table[SYS_mount] = "mount";
1262#endif
1263#if defined (SYS_umount)
1264 syscall_table[SYS_umount] = "umount";
1265#endif
1266#if defined (SYS_setuid)
1267 syscall_table[SYS_setuid] = "setuid";
1268#endif
1269#if defined (SYS_getuid)
1270 syscall_table[SYS_getuid] = "getuid";
1271#endif
1272#if defined (SYS_stime)
1273 syscall_table[SYS_stime] = "stime";
1274#endif
1275#if defined (SYS_ptrace)
1276 syscall_table[SYS_ptrace] = "ptrace";
1277#endif
1278#if defined (SYS_alarm)
1279 syscall_table[SYS_alarm] = "alarm";
1280#endif
1281#if defined (SYS_fstat)
1282 syscall_table[SYS_fstat] = "fstat";
1283#endif
1284#if defined (SYS_pause)
1285 syscall_table[SYS_pause] = "pause";
1286#endif
1287#if defined (SYS_utime)
1288 syscall_table[SYS_utime] = "utime";
1289#endif
1290#if defined (SYS_stty)
1291 syscall_table[SYS_stty] = "stty";
1292#endif
1293#if defined (SYS_gtty)
1294 syscall_table[SYS_gtty] = "gtty";
1295#endif
1296#if defined (SYS_access)
1297 syscall_table[SYS_access] = "access";
1298#endif
1299#if defined (SYS_nice)
1300 syscall_table[SYS_nice] = "nice";
1301#endif
1302#if defined (SYS_statfs)
1303 syscall_table[SYS_statfs] = "statfs";
1304#endif
1305#if defined (SYS_sync)
1306 syscall_table[SYS_sync] = "sync";
1307#endif
1308#if defined (SYS_kill)
1309 syscall_table[SYS_kill] = "kill";
1310#endif
1311#if defined (SYS_fstatfs)
1312 syscall_table[SYS_fstatfs] = "fstatfs";
1313#endif
1314#if defined (SYS_pgrpsys)
1315 syscall_table[SYS_pgrpsys] = "pgrpsys";
1316#endif
1317#if defined (SYS_xenix)
1318 syscall_table[SYS_xenix] = "xenix";
1319#endif
1320#if defined (SYS_dup)
1321 syscall_table[SYS_dup] = "dup";
1322#endif
1323#if defined (SYS_pipe)
1324 syscall_table[SYS_pipe] = "pipe";
1325#endif
1326#if defined (SYS_times)
1327 syscall_table[SYS_times] = "times";
1328#endif
1329#if defined (SYS_profil)
1330 syscall_table[SYS_profil] = "profil";
1331#endif
1332#if defined (SYS_plock)
1333 syscall_table[SYS_plock] = "plock";
1334#endif
1335#if defined (SYS_setgid)
1336 syscall_table[SYS_setgid] = "setgid";
1337#endif
1338#if defined (SYS_getgid)
1339 syscall_table[SYS_getgid] = "getgid";
1340#endif
1341#if defined (SYS_signal)
1342 syscall_table[SYS_signal] = "signal";
1343#endif
1344#if defined (SYS_msgsys)
1345 syscall_table[SYS_msgsys] = "msgsys";
1346#endif
1347#if defined (SYS_sys3b)
1348 syscall_table[SYS_sys3b] = "sys3b";
1349#endif
234a732d
GN
1350#if defined (SYS_sysi86)
1351 syscall_table[SYS_sysi86] = "sysi86";
1352#endif
cc221e76
FF
1353#if defined (SYS_acct)
1354 syscall_table[SYS_acct] = "acct";
1355#endif
1356#if defined (SYS_shmsys)
1357 syscall_table[SYS_shmsys] = "shmsys";
1358#endif
1359#if defined (SYS_semsys)
1360 syscall_table[SYS_semsys] = "semsys";
1361#endif
1362#if defined (SYS_ioctl)
1363 syscall_table[SYS_ioctl] = "ioctl";
1364#endif
1365#if defined (SYS_uadmin)
1366 syscall_table[SYS_uadmin] = "uadmin";
1367#endif
1368#if defined (SYS_utssys)
1369 syscall_table[SYS_utssys] = "utssys";
1370#endif
1371#if defined (SYS_fsync)
1372 syscall_table[SYS_fsync] = "fsync";
1373#endif
1374#if defined (SYS_umask)
1375 syscall_table[SYS_umask] = "umask";
1376#endif
1377#if defined (SYS_chroot)
1378 syscall_table[SYS_chroot] = "chroot";
1379#endif
1380#if defined (SYS_fcntl)
1381 syscall_table[SYS_fcntl] = "fcntl";
1382#endif
1383#if defined (SYS_ulimit)
1384 syscall_table[SYS_ulimit] = "ulimit";
1385#endif
1386#if defined (SYS_rfsys)
1387 syscall_table[SYS_rfsys] = "rfsys";
1388#endif
1389#if defined (SYS_rmdir)
1390 syscall_table[SYS_rmdir] = "rmdir";
1391#endif
1392#if defined (SYS_mkdir)
1393 syscall_table[SYS_mkdir] = "mkdir";
1394#endif
1395#if defined (SYS_getdents)
1396 syscall_table[SYS_getdents] = "getdents";
1397#endif
1398#if defined (SYS_sysfs)
1399 syscall_table[SYS_sysfs] = "sysfs";
1400#endif
1401#if defined (SYS_getmsg)
1402 syscall_table[SYS_getmsg] = "getmsg";
1403#endif
1404#if defined (SYS_putmsg)
1405 syscall_table[SYS_putmsg] = "putmsg";
1406#endif
1407#if defined (SYS_poll)
1408 syscall_table[SYS_poll] = "poll";
1409#endif
1410#if defined (SYS_lstat)
1411 syscall_table[SYS_lstat] = "lstat";
1412#endif
1413#if defined (SYS_symlink)
1414 syscall_table[SYS_symlink] = "symlink";
1415#endif
1416#if defined (SYS_readlink)
1417 syscall_table[SYS_readlink] = "readlink";
1418#endif
1419#if defined (SYS_setgroups)
1420 syscall_table[SYS_setgroups] = "setgroups";
1421#endif
1422#if defined (SYS_getgroups)
1423 syscall_table[SYS_getgroups] = "getgroups";
1424#endif
1425#if defined (SYS_fchmod)
1426 syscall_table[SYS_fchmod] = "fchmod";
1427#endif
1428#if defined (SYS_fchown)
1429 syscall_table[SYS_fchown] = "fchown";
1430#endif
1431#if defined (SYS_sigprocmask)
1432 syscall_table[SYS_sigprocmask] = "sigprocmask";
1433#endif
1434#if defined (SYS_sigsuspend)
1435 syscall_table[SYS_sigsuspend] = "sigsuspend";
1436#endif
1437#if defined (SYS_sigaltstack)
1438 syscall_table[SYS_sigaltstack] = "sigaltstack";
1439#endif
1440#if defined (SYS_sigaction)
1441 syscall_table[SYS_sigaction] = "sigaction";
1442#endif
1443#if defined (SYS_sigpending)
1444 syscall_table[SYS_sigpending] = "sigpending";
1445#endif
1446#if defined (SYS_context)
1447 syscall_table[SYS_context] = "context";
1448#endif
1449#if defined (SYS_evsys)
1450 syscall_table[SYS_evsys] = "evsys";
1451#endif
1452#if defined (SYS_evtrapret)
1453 syscall_table[SYS_evtrapret] = "evtrapret";
1454#endif
1455#if defined (SYS_statvfs)
1456 syscall_table[SYS_statvfs] = "statvfs";
1457#endif
1458#if defined (SYS_fstatvfs)
1459 syscall_table[SYS_fstatvfs] = "fstatvfs";
1460#endif
1461#if defined (SYS_nfssys)
1462 syscall_table[SYS_nfssys] = "nfssys";
1463#endif
1464#if defined (SYS_waitsys)
1465 syscall_table[SYS_waitsys] = "waitsys";
1466#endif
1467#if defined (SYS_sigsendsys)
1468 syscall_table[SYS_sigsendsys] = "sigsendsys";
1469#endif
1470#if defined (SYS_hrtsys)
1471 syscall_table[SYS_hrtsys] = "hrtsys";
1472#endif
1473#if defined (SYS_acancel)
1474 syscall_table[SYS_acancel] = "acancel";
1475#endif
1476#if defined (SYS_async)
1477 syscall_table[SYS_async] = "async";
1478#endif
1479#if defined (SYS_priocntlsys)
1480 syscall_table[SYS_priocntlsys] = "priocntlsys";
1481#endif
1482#if defined (SYS_pathconf)
1483 syscall_table[SYS_pathconf] = "pathconf";
1484#endif
1485#if defined (SYS_mincore)
1486 syscall_table[SYS_mincore] = "mincore";
1487#endif
1488#if defined (SYS_mmap)
1489 syscall_table[SYS_mmap] = "mmap";
1490#endif
1491#if defined (SYS_mprotect)
1492 syscall_table[SYS_mprotect] = "mprotect";
1493#endif
1494#if defined (SYS_munmap)
1495 syscall_table[SYS_munmap] = "munmap";
1496#endif
1497#if defined (SYS_fpathconf)
1498 syscall_table[SYS_fpathconf] = "fpathconf";
1499#endif
1500#if defined (SYS_vfork)
1501 syscall_table[SYS_vfork] = "vfork";
1502#endif
1503#if defined (SYS_fchdir)
1504 syscall_table[SYS_fchdir] = "fchdir";
1505#endif
1506#if defined (SYS_readv)
1507 syscall_table[SYS_readv] = "readv";
1508#endif
1509#if defined (SYS_writev)
1510 syscall_table[SYS_writev] = "writev";
1511#endif
1512#if defined (SYS_xstat)
1513 syscall_table[SYS_xstat] = "xstat";
1514#endif
1515#if defined (SYS_lxstat)
1516 syscall_table[SYS_lxstat] = "lxstat";
1517#endif
1518#if defined (SYS_fxstat)
1519 syscall_table[SYS_fxstat] = "fxstat";
1520#endif
1521#if defined (SYS_xmknod)
1522 syscall_table[SYS_xmknod] = "xmknod";
1523#endif
1524#if defined (SYS_clocal)
1525 syscall_table[SYS_clocal] = "clocal";
1526#endif
1527#if defined (SYS_setrlimit)
1528 syscall_table[SYS_setrlimit] = "setrlimit";
1529#endif
1530#if defined (SYS_getrlimit)
1531 syscall_table[SYS_getrlimit] = "getrlimit";
1532#endif
1533#if defined (SYS_lchown)
1534 syscall_table[SYS_lchown] = "lchown";
1535#endif
1536#if defined (SYS_memcntl)
1537 syscall_table[SYS_memcntl] = "memcntl";
1538#endif
1539#if defined (SYS_getpmsg)
1540 syscall_table[SYS_getpmsg] = "getpmsg";
1541#endif
1542#if defined (SYS_putpmsg)
1543 syscall_table[SYS_putpmsg] = "putpmsg";
1544#endif
1545#if defined (SYS_rename)
1546 syscall_table[SYS_rename] = "rename";
1547#endif
1548#if defined (SYS_uname)
1549 syscall_table[SYS_uname] = "uname";
1550#endif
1551#if defined (SYS_setegid)
1552 syscall_table[SYS_setegid] = "setegid";
1553#endif
1554#if defined (SYS_sysconfig)
1555 syscall_table[SYS_sysconfig] = "sysconfig";
1556#endif
1557#if defined (SYS_adjtime)
1558 syscall_table[SYS_adjtime] = "adjtime";
1559#endif
1560#if defined (SYS_systeminfo)
1561 syscall_table[SYS_systeminfo] = "systeminfo";
1562#endif
1563#if defined (SYS_seteuid)
1564 syscall_table[SYS_seteuid] = "seteuid";
1565#endif
de43d7d0
SG
1566#if defined (SYS_sproc)
1567 syscall_table[SYS_sproc] = "sproc";
1568#endif
234a732d
GN
1569#if defined (SYS_keyctl)
1570 syscall_table[SYS_keyctl] = "keyctl";
1571#endif
1572#if defined (SYS_secsys)
1573 syscall_table[SYS_secsys] = "secsys";
1574#endif
1575#if defined (SYS_filepriv)
1576 syscall_table[SYS_filepriv] = "filepriv";
1577#endif
1578#if defined (SYS_procpriv)
1579 syscall_table[SYS_procpriv] = "procpriv";
1580#endif
1581#if defined (SYS_devstat)
1582 syscall_table[SYS_devstat] = "devstat";
1583#endif
1584#if defined (SYS_aclipc)
1585 syscall_table[SYS_aclipc] = "aclipc";
1586#endif
1587#if defined (SYS_fdevstat)
1588 syscall_table[SYS_fdevstat] = "fdevstat";
1589#endif
1590#if defined (SYS_flvlfile)
1591 syscall_table[SYS_flvlfile] = "flvlfile";
1592#endif
1593#if defined (SYS_lvlfile)
1594 syscall_table[SYS_lvlfile] = "lvlfile";
1595#endif
1596#if defined (SYS_lvlequal)
1597 syscall_table[SYS_lvlequal] = "lvlequal";
1598#endif
1599#if defined (SYS_lvlproc)
1600 syscall_table[SYS_lvlproc] = "lvlproc";
1601#endif
1602#if defined (SYS_lvlipc)
1603 syscall_table[SYS_lvlipc] = "lvlipc";
1604#endif
1605#if defined (SYS_acl)
1606 syscall_table[SYS_acl] = "acl";
1607#endif
1608#if defined (SYS_auditevt)
1609 syscall_table[SYS_auditevt] = "auditevt";
1610#endif
1611#if defined (SYS_auditctl)
1612 syscall_table[SYS_auditctl] = "auditctl";
1613#endif
1614#if defined (SYS_auditdmp)
1615 syscall_table[SYS_auditdmp] = "auditdmp";
1616#endif
1617#if defined (SYS_auditlog)
1618 syscall_table[SYS_auditlog] = "auditlog";
1619#endif
1620#if defined (SYS_auditbuf)
1621 syscall_table[SYS_auditbuf] = "auditbuf";
1622#endif
1623#if defined (SYS_lvldom)
1624 syscall_table[SYS_lvldom] = "lvldom";
1625#endif
1626#if defined (SYS_lvlvfs)
1627 syscall_table[SYS_lvlvfs] = "lvlvfs";
1628#endif
1629#if defined (SYS_mkmld)
1630 syscall_table[SYS_mkmld] = "mkmld";
1631#endif
1632#if defined (SYS_mldmode)
1633 syscall_table[SYS_mldmode] = "mldmode";
1634#endif
1635#if defined (SYS_secadvise)
1636 syscall_table[SYS_secadvise] = "secadvise";
1637#endif
1638#if defined (SYS_online)
1639 syscall_table[SYS_online] = "online";
1640#endif
1641#if defined (SYS_setitimer)
1642 syscall_table[SYS_setitimer] = "setitimer";
1643#endif
1644#if defined (SYS_getitimer)
1645 syscall_table[SYS_getitimer] = "getitimer";
1646#endif
1647#if defined (SYS_gettimeofday)
1648 syscall_table[SYS_gettimeofday] = "gettimeofday";
1649#endif
1650#if defined (SYS_settimeofday)
1651 syscall_table[SYS_settimeofday] = "settimeofday";
1652#endif
3780c337
MS
1653#if defined (SYS_lwp_create)
1654 syscall_table[SYS_lwp_create] = "_lwp_create";
234a732d 1655#endif
3780c337
MS
1656#if defined (SYS_lwp_exit)
1657 syscall_table[SYS_lwp_exit] = "_lwp_exit";
234a732d 1658#endif
3780c337
MS
1659#if defined (SYS_lwp_wait)
1660 syscall_table[SYS_lwp_wait] = "_lwp_wait";
234a732d 1661#endif
3780c337
MS
1662#if defined (SYS_lwp_self)
1663 syscall_table[SYS_lwp_self] = "_lwp_self";
234a732d 1664#endif
3780c337
MS
1665#if defined (SYS_lwp_info)
1666 syscall_table[SYS_lwp_info] = "_lwp_info";
234a732d 1667#endif
3780c337
MS
1668#if defined (SYS_lwp_private)
1669 syscall_table[SYS_lwp_private] = "_lwp_private";
234a732d
GN
1670#endif
1671#if defined (SYS_processor_bind)
1672 syscall_table[SYS_processor_bind] = "processor_bind";
1673#endif
1674#if defined (SYS_processor_exbind)
1675 syscall_table[SYS_processor_exbind] = "processor_exbind";
1676#endif
1677#if defined (SYS_prepblock)
1678 syscall_table[SYS_prepblock] = "prepblock";
1679#endif
1680#if defined (SYS_block)
1681 syscall_table[SYS_block] = "block";
1682#endif
1683#if defined (SYS_rdblock)
1684 syscall_table[SYS_rdblock] = "rdblock";
1685#endif
1686#if defined (SYS_unblock)
1687 syscall_table[SYS_unblock] = "unblock";
1688#endif
1689#if defined (SYS_cancelblock)
1690 syscall_table[SYS_cancelblock] = "cancelblock";
1691#endif
1692#if defined (SYS_pread)
1693 syscall_table[SYS_pread] = "pread";
1694#endif
1695#if defined (SYS_pwrite)
1696 syscall_table[SYS_pwrite] = "pwrite";
1697#endif
1698#if defined (SYS_truncate)
1699 syscall_table[SYS_truncate] = "truncate";
1700#endif
1701#if defined (SYS_ftruncate)
1702 syscall_table[SYS_ftruncate] = "ftruncate";
1703#endif
3780c337
MS
1704#if defined (SYS_lwp_kill)
1705 syscall_table[SYS_lwp_kill] = "_lwp_kill";
234a732d
GN
1706#endif
1707#if defined (SYS_sigwait)
1708 syscall_table[SYS_sigwait] = "sigwait";
1709#endif
1710#if defined (SYS_fork1)
1711 syscall_table[SYS_fork1] = "fork1";
1712#endif
1713#if defined (SYS_forkall)
1714 syscall_table[SYS_forkall] = "forkall";
1715#endif
1716#if defined (SYS_modload)
1717 syscall_table[SYS_modload] = "modload";
1718#endif
1719#if defined (SYS_moduload)
1720 syscall_table[SYS_moduload] = "moduload";
1721#endif
1722#if defined (SYS_modpath)
1723 syscall_table[SYS_modpath] = "modpath";
1724#endif
1725#if defined (SYS_modstat)
1726 syscall_table[SYS_modstat] = "modstat";
1727#endif
1728#if defined (SYS_modadm)
1729 syscall_table[SYS_modadm] = "modadm";
1730#endif
1731#if defined (SYS_getksym)
1732 syscall_table[SYS_getksym] = "getksym";
1733#endif
3780c337
MS
1734#if defined (SYS_lwp_suspend)
1735 syscall_table[SYS_lwp_suspend] = "_lwp_suspend";
234a732d 1736#endif
3780c337
MS
1737#if defined (SYS_lwp_continue)
1738 syscall_table[SYS_lwp_continue] = "_lwp_continue";
234a732d
GN
1739#endif
1740#if defined (SYS_priocntllst)
1741 syscall_table[SYS_priocntllst] = "priocntllst";
1742#endif
1743#if defined (SYS_sleep)
1744 syscall_table[SYS_sleep] = "sleep";
1745#endif
1746#if defined (SYS_lwp_sema_wait)
3780c337 1747 syscall_table[SYS_lwp_sema_wait] = "_lwp_sema_wait";
234a732d
GN
1748#endif
1749#if defined (SYS_lwp_sema_post)
3780c337 1750 syscall_table[SYS_lwp_sema_post] = "_lwp_sema_post";
234a732d
GN
1751#endif
1752#if defined (SYS_lwp_sema_trywait)
1753 syscall_table[SYS_lwp_sema_trywait] = "lwp_sema_trywait";
1754#endif
1e50f1b4
JM
1755#if defined(SYS_fstatvfs64)
1756 syscall_table[SYS_fstatvfs64] = "fstatvfs64";
1757#endif
1758#if defined(SYS_statvfs64)
1759 syscall_table[SYS_statvfs64] = "statvfs64";
1760#endif
1761#if defined(SYS_ftruncate64)
1762 syscall_table[SYS_ftruncate64] = "ftruncate64";
1763#endif
1764#if defined(SYS_truncate64)
1765 syscall_table[SYS_truncate64] = "truncate64";
1766#endif
1767#if defined(SYS_getrlimit64)
1768 syscall_table[SYS_getrlimit64] = "getrlimit64";
1769#endif
1770#if defined(SYS_setrlimit64)
1771 syscall_table[SYS_setrlimit64] = "setrlimit64";
1772#endif
1773#if defined(SYS_lseek64)
1774 syscall_table[SYS_lseek64] = "lseek64";
1775#endif
1776#if defined(SYS_mmap64)
1777 syscall_table[SYS_mmap64] = "mmap64";
1778#endif
1779#if defined(SYS_pread64)
1780 syscall_table[SYS_pread64] = "pread64";
1781#endif
1782#if defined(SYS_creat64)
1783 syscall_table[SYS_creat64] = "creat64";
1784#endif
1785#if defined(SYS_dshmsys)
1786 syscall_table[SYS_dshmsys] = "dshmsys";
1787#endif
1788#if defined(SYS_invlpg)
1789 syscall_table[SYS_invlpg] = "invlpg";
1790#endif
1791#if defined(SYS_cg_ids)
1792 syscall_table[SYS_cg_ids] = "cg_ids";
1793#endif
1794#if defined(SYS_cg_processors)
1795 syscall_table[SYS_cg_processors] = "cg_processors";
1796#endif
1797#if defined(SYS_cg_info)
1798 syscall_table[SYS_cg_info] = "cg_info";
1799#endif
1800#if defined(SYS_cg_bind)
1801 syscall_table[SYS_cg_bind] = "cg_bind";
1802#endif
1803#if defined(SYS_cg_current)
1804 syscall_table[SYS_cg_current] = "cg_current";
1805#endif
1806#if defined(SYS_cg_memloc)
1807 syscall_table[SYS_cg_memloc] = "cg_memloc";
1808#endif
cc221e76 1809}
35f5886e
FF
1810
1811/*
1812
3fbdd536 1813LOCAL FUNCTION
35f5886e 1814
3fbdd536 1815 procfs_kill_inferior - kill any currently inferior
35f5886e
FF
1816
1817SYNOPSIS
1818
3fbdd536 1819 void procfs_kill_inferior (void)
35f5886e
FF
1820
1821DESCRIPTION
1822
1823 Kill any current inferior.
1824
1825NOTES
1826
1827 Kills even attached inferiors. Presumably the user has already
1828 been prompted that the inferior is an attached one rather than
1829 one started by gdb. (FIXME?)
1830
1831*/
1832
3fbdd536
JG
1833static void
1834procfs_kill_inferior ()
35f5886e 1835{
de43d7d0 1836 target_mourn_inferior ();
35f5886e
FF
1837}
1838
1839/*
1840
1841LOCAL FUNCTION
1842
1843 unconditionally_kill_inferior - terminate the inferior
1844
1845SYNOPSIS
1846
de43d7d0 1847 static void unconditionally_kill_inferior (struct procinfo *)
35f5886e
FF
1848
1849DESCRIPTION
1850
de43d7d0 1851 Kill the specified inferior.
35f5886e
FF
1852
1853NOTE
1854
1855 A possibly useful enhancement would be to first try sending
1856 the inferior a terminate signal, politely asking it to commit
de43d7d0
SG
1857 suicide, before we murder it (we could call that
1858 politely_kill_inferior()).
35f5886e
FF
1859
1860*/
1861
1862static void
de43d7d0
SG
1863unconditionally_kill_inferior (pi)
1864 struct procinfo *pi;
35f5886e 1865{
de43d7d0 1866 int ppid;
234a732d 1867 struct proc_ctl pctl;
35f5886e 1868
de43d7d0
SG
1869 ppid = pi->prstatus.pr_ppid;
1870
b6753b3f
PS
1871#ifdef PROCFS_NEED_CLEAR_CURSIG_FOR_KILL
1872 /* Alpha OSF/1-3.x procfs needs a clear of the current signal
1873 before the PIOCKILL, otherwise it might generate a corrupted core
1874 file for the inferior. */
234a732d 1875 ioctl (pi->ctl_fd, PIOCSSIG, NULL);
b6753b3f 1876#endif
2592eef8 1877#ifdef PROCFS_NEED_PIOCSSIG_FOR_KILL
b6753b3f 1878 /* Alpha OSF/1-2.x procfs needs a PIOCSSIG call with a SIGKILL signal
f5de4904
PS
1879 to kill the inferior, otherwise it might remain stopped with a
1880 pending SIGKILL.
2592eef8
PS
1881 We do not check the result of the PIOCSSIG, the inferior might have
1882 died already. */
1883 {
1884 struct siginfo newsiginfo;
1885
1886 memset ((char *) &newsiginfo, 0, sizeof (newsiginfo));
234a732d 1887 newsiginfo.si_signo = SIGKILL;
2592eef8
PS
1888 newsiginfo.si_code = 0;
1889 newsiginfo.si_errno = 0;
1890 newsiginfo.si_pid = getpid ();
1891 newsiginfo.si_uid = getuid ();
234a732d 1892 ioctl (pi->ctl_fd, PIOCSSIG, &newsiginfo);
2592eef8 1893 }
234a732d
GN
1894#else /* PROCFS_NEED_PIOCSSIG_FOR_KILL */
1895 procfs_write_pckill (pi);
1896#endif /* PROCFS_NEED_PIOCSSIG_FOR_KILL */
2592eef8 1897
de43d7d0
SG
1898 close_proc_file (pi);
1899
1900/* Only wait() for our direct children. Our grandchildren zombies are killed
1901 by the death of their parents. */
1902
1903 if (ppid == getpid())
1904 wait ((int *) 0);
35f5886e
FF
1905}
1906
1907/*
1908
3fbdd536 1909LOCAL FUNCTION
35f5886e 1910
3fbdd536 1911 procfs_xfer_memory -- copy data to or from inferior memory space
35f5886e
FF
1912
1913SYNOPSIS
1914
3fbdd536 1915 int procfs_xfer_memory (CORE_ADDR memaddr, char *myaddr, int len,
35f5886e
FF
1916 int dowrite, struct target_ops target)
1917
1918DESCRIPTION
1919
1920 Copy LEN bytes to/from inferior's memory starting at MEMADDR
1921 from/to debugger memory starting at MYADDR. Copy from inferior
1922 if DOWRITE is zero or to inferior if DOWRITE is nonzero.
1923
1924 Returns the length copied, which is either the LEN argument or
3fbdd536 1925 zero. This xfer function does not do partial moves, since procfs_ops
35f5886e
FF
1926 doesn't allow memory operations to cross below us in the target stack
1927 anyway.
1928
1929NOTES
1930
1931 The /proc interface makes this an almost trivial task.
1932 */
1933
3fbdd536
JG
1934static int
1935procfs_xfer_memory (memaddr, myaddr, len, dowrite, target)
1ab3bf1b
JG
1936 CORE_ADDR memaddr;
1937 char *myaddr;
1938 int len;
1939 int dowrite;
1940 struct target_ops *target; /* ignored */
35f5886e
FF
1941{
1942 int nbytes = 0;
de43d7d0 1943 struct procinfo *pi;
35f5886e 1944
de43d7d0
SG
1945 pi = current_procinfo;
1946
234a732d 1947 if (lseek(pi->as_fd, (off_t) memaddr, SEEK_SET) == (off_t) memaddr)
35f5886e
FF
1948 {
1949 if (dowrite)
1950 {
234a732d 1951 nbytes = write (pi->as_fd, myaddr, len);
35f5886e
FF
1952 }
1953 else
1954 {
234a732d 1955 nbytes = read (pi->as_fd, myaddr, len);
35f5886e
FF
1956 }
1957 if (nbytes < 0)
1958 {
1959 nbytes = 0;
1960 }
1961 }
1962 return (nbytes);
1963}
1964
1965/*
1966
3fbdd536 1967LOCAL FUNCTION
35f5886e 1968
3fbdd536 1969 procfs_store_registers -- copy register values back to inferior
35f5886e
FF
1970
1971SYNOPSIS
1972
3fbdd536 1973 void procfs_store_registers (int regno)
35f5886e
FF
1974
1975DESCRIPTION
1976
1977 Store our current register values back into the inferior. If
1978 REGNO is -1 then store all the register, otherwise store just
1979 the value specified by REGNO.
1980
1981NOTES
1982
1983 If we are storing only a single register, we first have to get all
1984 the current values from the process, overwrite the desired register
1985 in the gregset with the one we want from gdb's registers, and then
1986 send the whole set back to the process. For writing all the
1987 registers, all we have to do is generate the gregset and send it to
1988 the process.
1989
1990 Also note that the process has to be stopped on an event of interest
1991 for this to work, which basically means that it has to have been
1992 run under the control of one of the other /proc ioctl calls and not
1993 ptrace. Since we don't use ptrace anyway, we don't worry about this
1994 fine point, but it is worth noting for future reference.
1995
1996 Gdb is confused about what this function is supposed to return.
1997 Some versions return a value, others return nothing. Some are
1998 declared to return a value and actually return nothing. Gdb ignores
1999 anything returned. (FIXME)
2000
2001 */
2002
3fbdd536
JG
2003static void
2004procfs_store_registers (regno)
1ab3bf1b 2005 int regno;
35f5886e 2006{
de43d7d0 2007 struct procinfo *pi;
234a732d
GN
2008#ifdef PROCFS_USE_READ_WRITE
2009 struct greg_ctl greg;
2010 struct fpreg_ctl fpreg;
2011#endif
de43d7d0
SG
2012
2013 pi = current_procinfo;
2014
234a732d 2015#ifdef PROCFS_USE_READ_WRITE
35f5886e
FF
2016 if (regno != -1)
2017 {
234a732d
GN
2018 procfs_read_status (pi);
2019 memcpy ((char *) &greg.gregset,
2020 (char *) &pi->prstatus.pr_lwp.pr_context.uc_mcontext.gregs,
15af627c 2021 sizeof (gdb_gregset_t));
35f5886e 2022 }
234a732d
GN
2023 fill_gregset (&greg.gregset, regno);
2024 greg.cmd = PCSREG;
2025 write (pi->ctl_fd, &greg, sizeof (greg));
2026#else /* PROCFS_USE_READ_WRITE */
2027 if (regno != -1)
2028 {
2029 ioctl (pi->ctl_fd, PIOCGREG, &pi->gregset.gregset);
2030 }
2031 fill_gregset (&pi->gregset.gregset, regno);
2032 ioctl (pi->ctl_fd, PIOCSREG, &pi->gregset.gregset);
2033#endif /* PROCFS_USE_READ_WRITE */
35f5886e
FF
2034
2035#if defined (FP0_REGNUM)
2036
2037 /* Now repeat everything using the floating point register set, if the
2038 target has floating point hardware. Since we ignore the returned value,
2039 we'll never know whether it worked or not anyway. */
2040
234a732d 2041#ifdef PROCFS_USE_READ_WRITE
35f5886e
FF
2042 if (regno != -1)
2043 {
234a732d
GN
2044 procfs_read_status (pi);
2045 memcpy ((char *) &fpreg.fpregset,
2046 (char *) &pi->prstatus.pr_lwp.pr_context.uc_mcontext.fpregs,
15af627c 2047 sizeof (gdb_fpregset_t));
35f5886e 2048 }
234a732d
GN
2049 fill_fpregset (&fpreg.fpregset, regno);
2050 fpreg.cmd = PCSFPREG;
2051 write (pi->ctl_fd, &fpreg, sizeof (fpreg));
2052#else /* PROCFS_USE_READ_WRITE */
2053 if (regno != -1)
2054 {
2055 ioctl (pi->ctl_fd, PIOCGFPREG, &pi->fpregset.fpregset);
2056 }
2057 fill_fpregset (&pi->fpregset.fpregset, regno);
2058 ioctl (pi->ctl_fd, PIOCSFPREG, &pi->fpregset.fpregset);
2059#endif /* PROCFS_USE_READ_WRITE */
35f5886e
FF
2060
2061#endif /* FP0_REGNUM */
2062
2063}
2064
2065/*
2066
3fbdd536 2067LOCAL FUNCTION
35f5886e 2068
3780c337 2069 init_procinfo - setup a procinfo struct and connect it to a process
de43d7d0
SG
2070
2071SYNOPSIS
2072
3780c337 2073 struct procinfo * init_procinfo (int pid)
de43d7d0
SG
2074
2075DESCRIPTION
2076
eca4a350
SG
2077 Allocate a procinfo structure, open the /proc file and then set up the
2078 set of signals and faults that are to be traced. Returns a pointer to
3780c337 2079 the new procinfo structure.
de43d7d0
SG
2080
2081NOTES
2082
2083 If proc_init_failed ever gets called, control returns to the command
2084 processing loop via the standard error handling code.
2085
2086 */
2087
eca4a350 2088static struct procinfo *
3780c337 2089init_procinfo (pid, kill)
de43d7d0 2090 int pid;
3780c337 2091 int kill;
de43d7d0 2092{
3780c337
MS
2093 struct procinfo *pi = (struct procinfo *)
2094 xmalloc (sizeof (struct procinfo));
1e50f1b4
JM
2095 struct sig_ctl sctl;
2096 struct flt_ctl fctl;
de43d7d0 2097
3780c337 2098 memset ((char *) pi, 0, sizeof (*pi));
234a732d 2099 if (!open_proc_file (pid, pi, O_RDWR, 1))
3780c337 2100 proc_init_failed (pi, "can't open process file", kill);
de43d7d0 2101
8fc2b417
SG
2102 /* open_proc_file may modify pid. */
2103
2104 pid = pi -> pid;
2105
de43d7d0
SG
2106 /* Add new process to process info list */
2107
2108 pi->next = procinfo_list;
2109 procinfo_list = pi;
2110
2111 add_fd (pi); /* Add to list for poll/select */
2112
3780c337
MS
2113 /* Remember some things about the inferior that we will, or might, change
2114 so that we can restore them when we detach. */
234a732d 2115#ifdef UNIXWARE
3780c337
MS
2116 memcpy ((char *) &pi->saved_trace.sigset,
2117 (char *) &pi->prstatus.pr_sigtrace, sizeof (sigset_t));
2118 memcpy ((char *) &pi->saved_fltset.fltset,
2119 (char *) &pi->prstatus.pr_flttrace, sizeof (fltset_t));
2120 memcpy ((char *) &pi->saved_entryset.sysset,
2121 (char *) &pi->prstatus.pr_sysentry, sizeof (sysset_t));
2122 memcpy ((char *) &pi->saved_exitset.sysset,
2123 (char *) &pi->prstatus.pr_sysexit, sizeof (sysset_t));
2124
2125 /* Set up trace and fault sets, as gdb expects them. */
2126
234a732d 2127 prfillset (&sctl.sigset);
3780c337 2128 notice_signals (pi, &sctl);
234a732d
GN
2129 prfillset (&fctl.fltset);
2130 prdelset (&fctl.fltset, FLTPAGE);
3780c337
MS
2131
2132#else /* ! UNIXWARE */
2133 ioctl (pi->ctl_fd, PIOCGTRACE, &pi->saved_trace.sigset);
2134 ioctl (pi->ctl_fd, PIOCGHOLD, &pi->saved_sighold.sigset);
2135 ioctl (pi->ctl_fd, PIOCGFAULT, &pi->saved_fltset.fltset);
2136 ioctl (pi->ctl_fd, PIOCGENTRY, &pi->saved_entryset.sysset);
2137 ioctl (pi->ctl_fd, PIOCGEXIT, &pi->saved_exitset.sysset);
2138
2139 /* Set up trace and fault sets, as gdb expects them. */
2140
de43d7d0
SG
2141 memset ((char *) &pi->prrun, 0, sizeof (pi->prrun));
2142 prfillset (&pi->prrun.pr_trace);
2143 procfs_notice_signals (pid);
2144 prfillset (&pi->prrun.pr_fault);
2145 prdelset (&pi->prrun.pr_fault, FLTPAGE);
b9e58503
PS
2146#ifdef PROCFS_DONT_TRACE_FAULTS
2147 premptyset (&pi->prrun.pr_fault);
2592eef8 2148#endif
234a732d 2149#endif /* UNIXWARE */
2592eef8 2150
234a732d 2151 if (!procfs_read_status (pi))
3780c337 2152 proc_init_failed (pi, "procfs_read_status failed", kill);
8fc2b417 2153
3780c337
MS
2154 return pi;
2155}
2156
2157/*
2158
2159LOCAL FUNCTION
2160
2161 create_procinfo - initialize access to a /proc entry
2162
2163SYNOPSIS
2164
2165 struct procinfo * create_procinfo (int pid)
2166
2167DESCRIPTION
2168
2169 Allocate a procinfo structure, open the /proc file and then set up the
2170 set of signals and faults that are to be traced. Returns a pointer to
2171 the new procinfo structure.
2172
2173NOTES
2174
2175 If proc_init_failed ever gets called, control returns to the command
2176 processing loop via the standard error handling code.
2177
2178 */
2179
2180static struct procinfo *
2181create_procinfo (pid)
2182 int pid;
2183{
2184 struct procinfo *pi;
2185 struct sig_ctl sctl;
2186 struct flt_ctl fctl;
2187
2188 pi = find_procinfo (pid, 1);
2189 if (pi != NULL)
2190 return pi; /* All done! It already exists */
2191
2192 pi = init_procinfo (pid, 1);
8fc2b417 2193
234a732d 2194#ifndef UNIXWARE
3780c337
MS
2195/* A bug in Solaris (2.5 at least) causes PIOCWSTOP to hang on LWPs that are
2196 already stopped, even if they all have PR_ASYNC set. */
8fc2b417 2197 if (!(pi->prstatus.pr_flags & PR_STOPPED))
234a732d
GN
2198#endif
2199 if (!procfs_write_pcwstop (pi))
3780c337 2200 proc_init_failed (pi, "procfs_write_pcwstop failed", 1);
de43d7d0 2201
234a732d
GN
2202#ifdef PROCFS_USE_READ_WRITE
2203 fctl.cmd = PCSFAULT;
2204 if (write (pi->ctl_fd, (char *) &fctl, sizeof (struct flt_ctl)) < 0)
3780c337 2205 proc_init_failed (pi, "PCSFAULT failed", 1);
234a732d
GN
2206#else
2207 if (ioctl (pi->ctl_fd, PIOCSFAULT, &pi->prrun.pr_fault) < 0)
3780c337 2208 proc_init_failed (pi, "PIOCSFAULT failed", 1);
234a732d 2209#endif
eca4a350
SG
2210
2211 return pi;
de43d7d0
SG
2212}
2213
2214/*
2215
8fc2b417
SG
2216LOCAL FUNCTION
2217
2218 procfs_exit_handler - handle entry into the _exit syscall
2219
2220SYNOPSIS
2221
2222 int procfs_exit_handler (pi, syscall_num, why, rtnvalp, statvalp)
2223
2224DESCRIPTION
2225
2226 This routine is called when an inferior process enters the _exit()
2227 system call. It continues the process, and then collects the exit
2228 status and pid which are returned in *statvalp and *rtnvalp. After
2229 that it returns non-zero to indicate that procfs_wait should wake up.
2230
2231NOTES
2232 There is probably a better way to do this.
2233
2234 */
2235
2236static int
2237procfs_exit_handler (pi, syscall_num, why, rtnvalp, statvalp)
2238 struct procinfo *pi;
2239 int syscall_num;
2240 int why;
2241 int *rtnvalp;
2242 int *statvalp;
2243{
3780c337 2244 struct procinfo *temp_pi, *next_pi;
1e50f1b4 2245 struct proc_ctl pctl;
3780c337 2246
1e50f1b4
JM
2247#ifdef UNIXWARE
2248 pctl.cmd = PCRUN;
2249 pctl.data = PRCFAULT;
2250#else
8fc2b417 2251 pi->prrun.pr_flags = PRCFAULT;
1e50f1b4 2252#endif
8fc2b417 2253
1e50f1b4
JM
2254#ifdef PROCFS_USE_READ_WRITE
2255 if (write (pi->ctl_fd, (char *)&pctl, sizeof (struct proc_ctl)) < 0)
2256#else
234a732d 2257 if (ioctl (pi->ctl_fd, PIOCRUN, &pi->prrun) != 0)
1e50f1b4 2258#endif
8fc2b417
SG
2259 perror_with_name (pi->pathname);
2260
3780c337
MS
2261 if (attach_flag)
2262 {
2263 /* Claim it exited (don't call wait). */
2264 if (info_verbose)
2265 printf_filtered ("(attached process has exited)\n");
2266 *statvalp = 0;
2267 *rtnvalp = inferior_pid;
2268 }
2269 else
2270 {
2271 *rtnvalp = wait (statvalp);
2272 if (*rtnvalp >= 0)
2273 *rtnvalp = pi->pid;
2274 }
8fc2b417 2275
3780c337
MS
2276 /* Close ALL open proc file handles,
2277 except the one that called SYS_exit. */
2278 for (temp_pi = procinfo_list; temp_pi; temp_pi = next_pi)
2279 {
2280 next_pi = temp_pi->next;
2281 if (temp_pi == pi)
2282 continue; /* Handled below */
2283 close_proc_file (temp_pi);
2284 }
8fc2b417
SG
2285 return 1;
2286}
2287
2288/*
2289
2290LOCAL FUNCTION
2291
2292 procfs_exec_handler - handle exit from the exec family of syscalls
2293
2294SYNOPSIS
2295
2296 int procfs_exec_handler (pi, syscall_num, why, rtnvalp, statvalp)
2297
2298DESCRIPTION
2299
2300 This routine is called when an inferior process is about to finish any
2301 of the exec() family of system calls. It pretends that we got a
2302 SIGTRAP (for compatibility with ptrace behavior), and returns non-zero
2303 to tell procfs_wait to wake up.
2304
2305NOTES
2306 This need for compatibility with ptrace is questionable. In the
2307 future, it shouldn't be necessary.
2308
2309 */
2310
2311static int
2312procfs_exec_handler (pi, syscall_num, why, rtnvalp, statvalp)
2313 struct procinfo *pi;
2314 int syscall_num;
2315 int why;
2316 int *rtnvalp;
2317 int *statvalp;
2318{
2319 *statvalp = (SIGTRAP << 8) | 0177;
2320
2321 return 1;
2322}
2323
234a732d
GN
2324#if defined(SYS_sproc) && !defined(UNIXWARE)
2325/* IRIX lwp creation system call */
8fc2b417
SG
2326
2327/*
2328
2329LOCAL FUNCTION
2330
2331 procfs_sproc_handler - handle exit from the sproc syscall
2332
2333SYNOPSIS
2334
2335 int procfs_sproc_handler (pi, syscall_num, why, rtnvalp, statvalp)
2336
2337DESCRIPTION
2338
2339 This routine is called when an inferior process is about to finish an
2340 sproc() system call. This is the system call that IRIX uses to create
2341 a lightweight process. When the target process gets this event, we can
2342 look at rval1 to find the new child processes ID, and create a new
2343 procinfo struct from that.
2344
2345 After that, it pretends that we got a SIGTRAP, and returns non-zero
2346 to tell procfs_wait to wake up. Subsequently, wait_for_inferior gets
2347 woken up, sees the new process and continues it.
2348
2349NOTES
2350 We actually never see the child exiting from sproc because we will
2351 shortly stop the child with PIOCSTOP, which is then registered as the
2352 event of interest.
2353 */
2354
2355static int
2356procfs_sproc_handler (pi, syscall_num, why, rtnvalp, statvalp)
2357 struct procinfo *pi;
2358 int syscall_num;
2359 int why;
2360 int *rtnvalp;
2361 int *statvalp;
2362{
2363/* We've just detected the completion of an sproc system call. Now we need to
2364 setup a procinfo struct for this thread, and notify the thread system of the
2365 new arrival. */
2366
2367/* If sproc failed, then nothing interesting happened. Continue the process
2368 and go back to sleep. */
2369
2370 if (pi->prstatus.pr_errno != 0)
2371 {
2372 pi->prrun.pr_flags &= PRSTEP;
2373 pi->prrun.pr_flags |= PRCFAULT;
2374
234a732d 2375 if (ioctl (pi->ctl_fd, PIOCRUN, &pi->prrun) != 0)
8fc2b417
SG
2376 perror_with_name (pi->pathname);
2377
2378 return 0;
2379 }
2380
2381 /* At this point, the new thread is stopped at it's first instruction, and
2382 the parent is stopped at the exit from sproc. */
2383
2384 /* Notify the caller of the arrival of a new thread. */
2385 create_procinfo (pi->prstatus.pr_rval1);
2386
2387 *rtnvalp = pi->prstatus.pr_rval1;
2388 *statvalp = (SIGTRAP << 8) | 0177;
2389
2390 return 1;
2391}
2392
2393/*
2394
2395LOCAL FUNCTION
2396
2397 procfs_fork_handler - handle exit from the fork syscall
2398
2399SYNOPSIS
2400
2401 int procfs_fork_handler (pi, syscall_num, why, rtnvalp, statvalp)
2402
2403DESCRIPTION
2404
2405 This routine is called when an inferior process is about to finish a
2406 fork() system call. We will open up the new process, and then close
2407 it, which releases it from the clutches of the debugger.
2408
2409 After that, we continue the target process as though nothing had
2410 happened.
2411
2412NOTES
2413 This is necessary for IRIX because we have to set PR_FORK in order
2414 to catch the creation of lwps (via sproc()). When an actual fork
2415 occurs, it becomes necessary to reset the forks debugger flags and
2416 continue it because we can't hack multiple processes yet.
2417 */
2418
2419static int
2420procfs_fork_handler (pi, syscall_num, why, rtnvalp, statvalp)
2421 struct procinfo *pi;
2422 int syscall_num;
2423 int why;
2424 int *rtnvalp;
2425 int *statvalp;
2426{
2427 struct procinfo *pitemp;
2428
2429/* At this point, we've detected the completion of a fork (or vfork) call in
2430 our child. The grandchild is also stopped because we set inherit-on-fork
2431 earlier. (Note that nobody has the grandchilds' /proc file open at this
2432 point.) We will release the grandchild from the debugger by opening it's
2433 /proc file and then closing it. Since run-on-last-close is set, the
2434 grandchild continues on its' merry way. */
2435
2436
2437 pitemp = create_procinfo (pi->prstatus.pr_rval1);
2438 if (pitemp)
2439 close_proc_file (pitemp);
2440
234a732d 2441 if (ioctl (pi->ctl_fd, PIOCRUN, &pi->prrun) != 0)
8fc2b417
SG
2442 perror_with_name (pi->pathname);
2443
2444 return 0;
2445}
234a732d 2446#endif /* SYS_sproc && !UNIXWARE */
8fc2b417
SG
2447
2448/*
2449
de43d7d0
SG
2450LOCAL FUNCTION
2451
3780c337 2452 procfs_set_inferior_syscall_traps - setup the syscall traps
35f5886e
FF
2453
2454SYNOPSIS
2455
3780c337 2456 void procfs_set_inferior_syscall_traps (struct procinfo *pip)
35f5886e
FF
2457
2458DESCRIPTION
2459
3780c337
MS
2460 Called for each "procinfo" (process, thread, or LWP) in the
2461 inferior, to register for notification of and handlers for
2462 syscall traps in the inferior.
cc221e76 2463
35f5886e
FF
2464 */
2465
3780c337
MS
2466static void
2467procfs_set_inferior_syscall_traps (pip)
2468 struct procinfo *pip;
35f5886e 2469{
8fc2b417
SG
2470 procfs_set_syscall_trap (pip, SYS_exit, PROCFS_SYSCALL_ENTRY,
2471 procfs_exit_handler);
2472
b6823237 2473#ifndef PRFS_STOPEXEC
8fc2b417
SG
2474#ifdef SYS_exec
2475 procfs_set_syscall_trap (pip, SYS_exec, PROCFS_SYSCALL_EXIT,
2476 procfs_exec_handler);
2477#endif
2478#ifdef SYS_execv
2479 procfs_set_syscall_trap (pip, SYS_execv, PROCFS_SYSCALL_EXIT,
2480 procfs_exec_handler);
2481#endif
2482#ifdef SYS_execve
2483 procfs_set_syscall_trap (pip, SYS_execve, PROCFS_SYSCALL_EXIT,
2484 procfs_exec_handler);
2485#endif
b6823237 2486#endif /* PRFS_STOPEXEC */
8fc2b417
SG
2487
2488 /* Setup traps on exit from sproc() */
2489
2490#ifdef SYS_sproc
2491 procfs_set_syscall_trap (pip, SYS_sproc, PROCFS_SYSCALL_EXIT,
2492 procfs_sproc_handler);
2493 procfs_set_syscall_trap (pip, SYS_fork, PROCFS_SYSCALL_EXIT,
2494 procfs_fork_handler);
2495#ifdef SYS_vfork
2496 procfs_set_syscall_trap (pip, SYS_vfork, PROCFS_SYSCALL_EXIT,
2497 procfs_fork_handler);
2498#endif
2499/* Turn on inherit-on-fork flag so that all children of the target process
2500 start with tracing flags set. This allows us to trap lwp creation. Note
2501 that we also have to trap on fork and vfork in order to disable all tracing
2502 in the targets child processes. */
2503
234a732d 2504 modify_inherit_on_fork_flag (pip->ctl_fd, 1);
8fc2b417
SG
2505#endif
2506
2507#ifdef SYS_lwp_create
2508 procfs_set_syscall_trap (pip, SYS_lwp_create, PROCFS_SYSCALL_EXIT,
2509 procfs_lwp_creation_handler);
2510#endif
3780c337
MS
2511}
2512
2513/*
2514
2515LOCAL FUNCTION
2516
2517 procfs_init_inferior - initialize target vector and access to a
2518 /proc entry
2519
2520SYNOPSIS
2521
2522 int procfs_init_inferior (int pid)
2523
2524DESCRIPTION
2525
2526 When gdb starts an inferior, this function is called in the parent
2527 process immediately after the fork. It waits for the child to stop
2528 on the return from the exec system call (the child itself takes care
2529 of ensuring that this is set up), then sets up the set of signals
2530 and faults that are to be traced. Returns the pid, which may have had
2531 the thread-id added to it.
2532
2533NOTES
2534
2535 If proc_init_failed ever gets called, control returns to the command
2536 processing loop via the standard error handling code.
2537
2538 */
2539
2540static int
2541procfs_init_inferior (pid)
2542 int pid;
2543{
2544 struct procinfo *pip;
2545
2546 push_target (&procfs_ops);
2547
2548 pip = create_procinfo (pid);
2549
2550 procfs_set_inferior_syscall_traps (pip);
8fc2b417
SG
2551
2552 /* create_procinfo may change the pid, so we have to update inferior_pid
2553 here before calling other gdb routines that need the right pid. */
2554
2555 pid = pip -> pid;
2556 inferior_pid = pid;
2557
2558 add_thread (pip -> pid); /* Setup initial thread */
bc28a06c 2559
2592eef8
PS
2560#ifdef START_INFERIOR_TRAPS_EXPECTED
2561 startup_inferior (START_INFERIOR_TRAPS_EXPECTED);
2562#else
bc28a06c
JK
2563 /* One trap to exec the shell, one to exec the program being debugged. */
2564 startup_inferior (2);
2592eef8 2565#endif
8fc2b417
SG
2566
2567 return pid;
35f5886e
FF
2568}
2569
2570/*
2571
cc221e76
FF
2572GLOBAL FUNCTION
2573
3950a34e 2574 procfs_notice_signals
cc221e76
FF
2575
2576SYNOPSIS
2577
952a820e 2578 static void procfs_notice_signals (int pid);
cc221e76
FF
2579
2580DESCRIPTION
2581
2582 When the user changes the state of gdb's signal handling via the
2583 "handle" command, this function gets called to see if any change
2584 in the /proc interface is required. It is also called internally
2585 by other /proc interface functions to initialize the state of
2586 the traced signal set.
2587
2588 One thing it does is that signals for which the state is "nostop",
2589 "noprint", and "pass", have their trace bits reset in the pr_trace
2590 field, so that they are no longer traced. This allows them to be
2591 delivered directly to the inferior without the debugger ever being
2592 involved.
2593 */
2594
3950a34e 2595static void
de43d7d0 2596procfs_notice_signals (pid)
952a820e 2597 int pid;
cc221e76 2598{
de43d7d0 2599 struct procinfo *pi;
234a732d 2600 struct sig_ctl sctl;
cc221e76 2601
de43d7d0
SG
2602 pi = find_procinfo (pid, 0);
2603
234a732d
GN
2604#ifdef UNIXWARE
2605 premptyset (&sctl.sigset);
2606#else
234c4096 2607 sctl.sigset = pi->prrun.pr_trace;
234a732d
GN
2608#endif
2609
2610 notice_signals (pi, &sctl);
95b71071
PS
2611
2612#ifndef UNIXWARE
2613 pi->prrun.pr_trace = sctl.sigset;
2614#endif
234a732d
GN
2615}
2616
2617static void
2618notice_signals (pi, sctl)
2619 struct procinfo *pi;
2620 struct sig_ctl *sctl;
2621{
2622 int signo;
2623
de43d7d0 2624 for (signo = 0; signo < NSIG; signo++)
cc221e76 2625 {
67ac9759
JK
2626 if (signal_stop_state (target_signal_from_host (signo)) == 0 &&
2627 signal_print_state (target_signal_from_host (signo)) == 0 &&
2628 signal_pass_state (target_signal_from_host (signo)) == 1)
cc221e76 2629 {
234a732d 2630 prdelset (&sctl->sigset, signo);
cc221e76 2631 }
de43d7d0 2632 else
cc221e76 2633 {
234a732d 2634 praddset (&sctl->sigset, signo);
cc221e76
FF
2635 }
2636 }
234a732d
GN
2637#ifdef PROCFS_USE_READ_WRITE
2638 sctl->cmd = PCSTRACE;
2639 if (write (pi->ctl_fd, (char *) sctl, sizeof (struct sig_ctl)) < 0)
2640#else
2641 if (ioctl (pi->ctl_fd, PIOCSTRACE, &sctl->sigset))
2642#endif
de43d7d0
SG
2643 {
2644 print_sys_errmsg ("PIOCSTRACE failed", errno);
2645 }
cc221e76
FF
2646}
2647
2648/*
2649
3fbdd536 2650LOCAL FUNCTION
35f5886e
FF
2651
2652 proc_set_exec_trap -- arrange for exec'd child to halt at startup
2653
2654SYNOPSIS
2655
2656 void proc_set_exec_trap (void)
2657
2658DESCRIPTION
2659
2660 This function is called in the child process when starting up
2661 an inferior, prior to doing the exec of the actual inferior.
2662 It sets the child process's exitset to make exit from the exec
2663 system call an event of interest to stop on, and then simply
2664 returns. The child does the exec, the system call returns, and
2665 the child stops at the first instruction, ready for the gdb
2666 parent process to take control of it.
2667
2668NOTE
2669
2670 We need to use all local variables since the child may be sharing
2671 it's data space with the parent, if vfork was used rather than
2672 fork.
cc221e76
FF
2673
2674 Also note that we want to turn off the inherit-on-fork flag in
2675 the child process so that any grand-children start with all
2676 tracing flags cleared.
35f5886e
FF
2677 */
2678
3fbdd536 2679static void
1ab3bf1b 2680proc_set_exec_trap ()
35f5886e 2681{
234a732d
GN
2682 struct sys_ctl exitset;
2683 struct sys_ctl entryset;
2684 char procname[MAX_PROC_NAME_SIZE];
35f5886e
FF
2685 int fd;
2686
234a732d
GN
2687 sprintf (procname, CTL_PROC_NAME_FMT, getpid ());
2688#ifdef UNIXWARE
2689 if ((fd = open (procname, O_WRONLY)) < 0)
2690#else
35f5886e 2691 if ((fd = open (procname, O_RDWR)) < 0)
234a732d 2692#endif
35f5886e
FF
2693 {
2694 perror (procname);
199b2450 2695 gdb_flush (gdb_stderr);
35f5886e
FF
2696 _exit (127);
2697 }
234a732d
GN
2698 premptyset (&exitset.sysset);
2699 premptyset (&entryset.sysset);
407a8389 2700
b6823237 2701#ifdef PRFS_STOPEXEC
2592eef8 2702 /* Under Alpha OSF/1 we have to use a PIOCSSPCACT ioctl to trace
b6823237 2703 exits from exec system calls because of the user level loader. */
2592eef8
PS
2704 {
2705 int prfs_flags;
2706
2707 if (ioctl (fd, PIOCGSPCACT, &prfs_flags) < 0)
2708 {
2709 perror (procname);
2710 gdb_flush (gdb_stderr);
2711 _exit (127);
2712 }
b6823237 2713 prfs_flags |= PRFS_STOPEXEC;
2592eef8
PS
2714 if (ioctl (fd, PIOCSSPCACT, &prfs_flags) < 0)
2715 {
2716 perror (procname);
2717 gdb_flush (gdb_stderr);
2718 _exit (127);
2719 }
2720 }
b6823237 2721#else /* PRFS_STOPEXEC */
cc221e76
FF
2722 /* GW: Rationale...
2723 Not all systems with /proc have all the exec* syscalls with the same
2724 names. On the SGI, for example, there is no SYS_exec, but there
2725 *is* a SYS_execv. So, we try to account for that. */
2726
407a8389 2727#ifdef SYS_exec
234a732d 2728 praddset (&exitset.sysset, SYS_exec);
407a8389
SG
2729#endif
2730#ifdef SYS_execve
234a732d 2731 praddset (&exitset.sysset, SYS_execve);
407a8389
SG
2732#endif
2733#ifdef SYS_execv
234a732d 2734 praddset (&exitset.sysset, SYS_execv);
407a8389
SG
2735#endif
2736
234a732d
GN
2737#ifdef PROCFS_USE_READ_WRITE
2738 exitset.cmd = PCSEXIT;
2739 if (write (fd, (char *) &exitset, sizeof (struct sys_ctl)) < 0)
2740#else
2741 if (ioctl (fd, PIOCSEXIT, &exitset.sysset) < 0)
2742#endif
35f5886e
FF
2743 {
2744 perror (procname);
199b2450 2745 gdb_flush (gdb_stderr);
35f5886e
FF
2746 _exit (127);
2747 }
b6823237 2748#endif /* PRFS_STOPEXEC */
cc221e76 2749
234a732d 2750 praddset (&entryset.sysset, SYS_exit);
fb63d460 2751
234a732d
GN
2752#ifdef PROCFS_USE_READ_WRITE
2753 entryset.cmd = PCSENTRY;
2754 if (write (fd, (char *) &entryset, sizeof (struct sys_ctl)) < 0)
2755#else
2756 if (ioctl (fd, PIOCSENTRY, &entryset.sysset) < 0)
2757#endif
fb63d460
SG
2758 {
2759 perror (procname);
199b2450 2760 gdb_flush (gdb_stderr);
fb63d460
SG
2761 _exit (126);
2762 }
2763
cc221e76
FF
2764 /* Turn off inherit-on-fork flag so that all grand-children of gdb
2765 start with tracing flags cleared. */
2766
8fc2b417 2767 modify_inherit_on_fork_flag (fd, 0);
ec8ceca3
JG
2768
2769 /* Turn on run-on-last-close flag so that this process will not hang
2770 if GDB goes away for some reason. */
2771
8fc2b417
SG
2772 modify_run_on_last_close_flag (fd, 1);
2773
1ba38e79
MS
2774#ifndef UNIXWARE /* since this is a solaris-ism, we don't want it */
2775 /* NOTE: revisit when doing thread support for UW */
8fc2b417 2776#ifdef PR_ASYNC
ec8ceca3 2777 {
8fc2b417 2778 long pr_flags;
234a732d 2779 struct proc_ctl pctl;
8fc2b417
SG
2780
2781/* Solaris needs this to make procfs treat all threads seperately. Without
2782 this, all threads halt whenever something happens to any thread. Since
2783 GDB wants to control all this itself, it needs to set PR_ASYNC. */
2784
2785 pr_flags = PR_ASYNC;
234a732d
GN
2786#ifdef PROCFS_USE_READ_WRITE
2787 pctl.cmd = PCSET;
2788 pctl.data = PR_FORK|PR_ASYNC;
2789 write (fd, (char *) &pctl, sizeof (struct proc_ctl));
2790#else
8fc2b417 2791 ioctl (fd, PIOCSET, &pr_flags);
234a732d 2792#endif
ec8ceca3 2793 }
8fc2b417 2794#endif /* PR_ASYNC */
1ba38e79 2795#endif /* !UNIXWARE */
35f5886e
FF
2796}
2797
f8b76e70
FF
2798/*
2799
a39ad5ce
FF
2800GLOBAL FUNCTION
2801
2802 proc_iterate_over_mappings -- call function for every mapped space
2803
2804SYNOPSIS
2805
2806 int proc_iterate_over_mappings (int (*func)())
2807
2808DESCRIPTION
2809
2810 Given a pointer to a function, call that function for every
2811 mapped address space, passing it an open file descriptor for
2812 the file corresponding to that mapped address space (if any)
2813 and the base address of the mapped space. Quit when we hit
2814 the end of the mappings or the function returns nonzero.
2815 */
2816
234a732d
GN
2817#ifdef UNIXWARE
2818int
2819proc_iterate_over_mappings (func)
2820 int (*func) PARAMS ((int, CORE_ADDR));
2821{
2822 int nmap;
2823 int fd;
2824 int funcstat = 0;
2825 prmap_t *prmaps;
2826 prmap_t *prmap;
2827 struct procinfo *pi;
2828 struct stat sbuf;
2829
2830 pi = current_procinfo;
2831
2832 if (fstat (pi->map_fd, &sbuf) < 0)
2833 return 0;
2834
2835 nmap = sbuf.st_size / sizeof (prmap_t);
2836 prmaps = (prmap_t *) alloca (nmap * sizeof(prmap_t));
2837 if ((lseek (pi->map_fd, 0, SEEK_SET) == 0) &&
2838 (read (pi->map_fd, (char *) prmaps, nmap * sizeof (prmap_t)) ==
2839 (nmap * sizeof (prmap_t))))
2840 {
2841 int i = 0;
2842 for (prmap = prmaps; i < nmap && funcstat == 0; ++prmap, ++i)
2843 {
2844 char name[sizeof ("/proc/1234567890/object") +
2845 sizeof (prmap->pr_mapname)];
2846 sprintf (name, "/proc/%d/object/%s", pi->pid, prmap->pr_mapname);
2847 if ((fd = open (name, O_RDONLY)) == -1)
2848 {
2849 funcstat = 1;
2850 break;
2851 }
2852 funcstat = (*func) (fd, (CORE_ADDR) prmap->pr_vaddr);
2853 close (fd);
2854 }
2855 }
2856 return (funcstat);
2857}
2858#else /* UNIXWARE */
a39ad5ce 2859int
1ab3bf1b
JG
2860proc_iterate_over_mappings (func)
2861 int (*func) PARAMS ((int, CORE_ADDR));
a39ad5ce
FF
2862{
2863 int nmap;
2864 int fd;
2865 int funcstat = 0;
2866 struct prmap *prmaps;
2867 struct prmap *prmap;
de43d7d0
SG
2868 struct procinfo *pi;
2869
2870 pi = current_procinfo;
a39ad5ce 2871
234a732d 2872 if (ioctl (pi->map_fd, PIOCNMAP, &nmap) == 0)
a39ad5ce 2873 {
1ab3bf1b 2874 prmaps = (struct prmap *) alloca ((nmap + 1) * sizeof (*prmaps));
234a732d 2875 if (ioctl (pi->map_fd, PIOCMAP, prmaps) == 0)
a39ad5ce
FF
2876 {
2877 for (prmap = prmaps; prmap -> pr_size && funcstat == 0; ++prmap)
2878 {
de43d7d0 2879 fd = proc_address_to_fd (pi, (CORE_ADDR) prmap -> pr_vaddr, 0);
1ab3bf1b 2880 funcstat = (*func) (fd, (CORE_ADDR) prmap -> pr_vaddr);
a39ad5ce
FF
2881 close (fd);
2882 }
2883 }
2884 }
2885 return (funcstat);
2886}
234a732d 2887#endif /* UNIXWARE */
a39ad5ce 2888
3fbdd536 2889#if 0 /* Currently unused */
a39ad5ce
FF
2890/*
2891
f8b76e70
FF
2892GLOBAL FUNCTION
2893
2894 proc_base_address -- find base address for segment containing address
2895
2896SYNOPSIS
2897
2898 CORE_ADDR proc_base_address (CORE_ADDR addr)
2899
2900DESCRIPTION
2901
2902 Given an address of a location in the inferior, find and return
2903 the base address of the mapped segment containing that address.
2904
2905 This is used for example, by the shared library support code,
2906 where we have the pc value for some location in the shared library
2907 where we are stopped, and need to know the base address of the
2908 segment containing that address.
2909*/
2910
f8b76e70 2911CORE_ADDR
1ab3bf1b 2912proc_base_address (addr)
cc221e76 2913 CORE_ADDR addr;
f8b76e70
FF
2914{
2915 int nmap;
2916 struct prmap *prmaps;
2917 struct prmap *prmap;
2918 CORE_ADDR baseaddr = 0;
de43d7d0 2919 struct procinfo *pi;
f8b76e70 2920
de43d7d0
SG
2921 pi = current_procinfo;
2922
234a732d 2923 if (ioctl (pi->map_fd, PIOCNMAP, &nmap) == 0)
f8b76e70 2924 {
1ab3bf1b 2925 prmaps = (struct prmap *) alloca ((nmap + 1) * sizeof (*prmaps));
234a732d 2926 if (ioctl (pi->map_fd, PIOCMAP, prmaps) == 0)
f8b76e70
FF
2927 {
2928 for (prmap = prmaps; prmap -> pr_size; ++prmap)
2929 {
2930 if ((prmap -> pr_vaddr <= (caddr_t) addr) &&
2931 (prmap -> pr_vaddr + prmap -> pr_size > (caddr_t) addr))
2932 {
2933 baseaddr = (CORE_ADDR) prmap -> pr_vaddr;
2934 break;
2935 }
2936 }
2937 }
2938 }
2939 return (baseaddr);
2940}
2941
1ab3bf1b
JG
2942#endif /* 0 */
2943
1e50f1b4 2944#ifndef UNIXWARE
f8b76e70
FF
2945/*
2946
cc221e76 2947LOCAL FUNCTION
f8b76e70
FF
2948
2949 proc_address_to_fd -- return open fd for file mapped to address
2950
2951SYNOPSIS
2952
de43d7d0 2953 int proc_address_to_fd (struct procinfo *pi, CORE_ADDR addr, complain)
f8b76e70
FF
2954
2955DESCRIPTION
2956
2957 Given an address in the current inferior's address space, use the
2958 /proc interface to find an open file descriptor for the file that
2959 this address was mapped in from. Return -1 if there is no current
2960 inferior. Print a warning message if there is an inferior but
2961 the address corresponds to no file (IE a bogus address).
2962
2963*/
2964
1ab3bf1b 2965static int
de43d7d0
SG
2966proc_address_to_fd (pi, addr, complain)
2967 struct procinfo *pi;
1ab3bf1b
JG
2968 CORE_ADDR addr;
2969 int complain;
f8b76e70
FF
2970{
2971 int fd = -1;
2972
234a732d 2973 if ((fd = ioctl (pi->ctl_fd, PIOCOPENM, (caddr_t *) &addr)) < 0)
f8b76e70 2974 {
de43d7d0 2975 if (complain)
f8b76e70 2976 {
de43d7d0
SG
2977 print_sys_errmsg (pi->pathname, errno);
2978 warning ("can't find mapped file for address 0x%x", addr);
f8b76e70
FF
2979 }
2980 }
2981 return (fd);
2982}
1e50f1b4 2983#endif /* !UNIXWARE */
35f5886e 2984
3fbdd536
JG
2985/* Attach to process PID, then initialize for debugging it
2986 and wait for the trace-trap that results from attaching. */
2987
2988static void
2989procfs_attach (args, from_tty)
2990 char *args;
2991 int from_tty;
2992{
2993 char *exec_file;
2994 int pid;
2995
2996 if (!args)
2997 error_no_arg ("process-id to attach");
2998
2999 pid = atoi (args);
3000
3001 if (pid == getpid()) /* Trying to masturbate? */
3002 error ("I refuse to debug myself!");
3003
3004 if (from_tty)
3005 {
3006 exec_file = (char *) get_exec_file (0);
3007
3008 if (exec_file)
199b2450 3009 printf_unfiltered ("Attaching to program `%s', %s\n", exec_file, target_pid_to_str (pid));
3fbdd536 3010 else
199b2450 3011 printf_unfiltered ("Attaching to %s\n", target_pid_to_str (pid));
3fbdd536 3012
199b2450 3013 gdb_flush (gdb_stdout);
3fbdd536
JG
3014 }
3015
8fc2b417 3016 inferior_pid = pid = do_attach (pid);
3fbdd536
JG
3017 push_target (&procfs_ops);
3018}
3019
3020
3021/* Take a program previously attached to and detaches it.
3022 The program resumes execution and will no longer stop
3023 on signals, etc. We'd better not have left any breakpoints
3024 in the program or it'll die when it hits one. For this
3025 to work, it may be necessary for the process to have been
3026 previously attached. It *might* work if the program was
3027 started via the normal ptrace (PTRACE_TRACEME). */
3028
3029static void
3030procfs_detach (args, from_tty)
3031 char *args;
3032 int from_tty;
3033{
3034 int siggnal = 0;
3035
3036 if (from_tty)
3037 {
3038 char *exec_file = get_exec_file (0);
3039 if (exec_file == 0)
3040 exec_file = "";
199b2450 3041 printf_unfiltered ("Detaching from program: %s %s\n",
25286543 3042 exec_file, target_pid_to_str (inferior_pid));
199b2450 3043 gdb_flush (gdb_stdout);
3fbdd536
JG
3044 }
3045 if (args)
3046 siggnal = atoi (args);
3047
3048 do_detach (siggnal);
3049 inferior_pid = 0;
3050 unpush_target (&procfs_ops); /* Pop out of handling an inferior */
3051}
3052
3053/* Get ready to modify the registers array. On machines which store
3054 individual registers, this doesn't need to do anything. On machines
3055 which store all the registers in one fell swoop, this makes sure
3056 that registers contains all the registers from the program being
3057 debugged. */
3058
3059static void
3060procfs_prepare_to_store ()
3061{
3062#ifdef CHILD_PREPARE_TO_STORE
3063 CHILD_PREPARE_TO_STORE ();
3064#endif
3065}
3066
3067/* Print status information about what we're accessing. */
3068
3069static void
3070procfs_files_info (ignore)
3071 struct target_ops *ignore;
3072{
199b2450 3073 printf_unfiltered ("\tUsing the running image of %s %s via /proc.\n",
25286543 3074 attach_flag? "attached": "child", target_pid_to_str (inferior_pid));
3fbdd536
JG
3075}
3076
3077/* ARGSUSED */
3078static void
3079procfs_open (arg, from_tty)
3080 char *arg;
3081 int from_tty;
3082{
3083 error ("Use the \"run\" command to start a Unix child process.");
3084}
35f5886e
FF
3085
3086/*
3087
3fbdd536 3088LOCAL FUNCTION
35f5886e 3089
3fbdd536 3090 do_attach -- attach to an already existing process
35f5886e
FF
3091
3092SYNOPSIS
3093
3fbdd536 3094 int do_attach (int pid)
35f5886e
FF
3095
3096DESCRIPTION
3097
3098 Attach to an already existing process with the specified process
3099 id. If the process is not already stopped, query whether to
3100 stop it or not.
3101
3102NOTES
3103
3104 The option of stopping at attach time is specific to the /proc
3105 versions of gdb. Versions using ptrace force the attachee
ec8ceca3
JG
3106 to stop. (I have changed this version to do so, too. All you
3107 have to do is "continue" to make it go on. -- gnu@cygnus.com)
35f5886e
FF
3108
3109*/
3110
3fbdd536
JG
3111static int
3112do_attach (pid)
1ab3bf1b 3113 int pid;
35f5886e 3114{
de43d7d0 3115 struct procinfo *pi;
234a732d
GN
3116 struct sig_ctl sctl;
3117 struct flt_ctl fctl;
3780c337 3118 int nlwp, *lwps;
de43d7d0 3119
3780c337 3120 pi = init_procinfo (pid, 0);
de43d7d0 3121
3780c337
MS
3122#ifdef PIOCLWPIDS
3123 nlwp = pi->prstatus.pr_nlwp;
3124 lwps = alloca ((2 * nlwp + 2) * sizeof (id_t));
de43d7d0 3125
3780c337 3126 if (ioctl (pi->ctl_fd, PIOCLWPIDS, lwps))
35f5886e 3127 {
3780c337
MS
3128 print_sys_errmsg (pi -> pathname, errno);
3129 error ("PIOCLWPIDS failed");
35f5886e 3130 }
3780c337
MS
3131#else /* PIOCLWPIDS */
3132 nlwp = 1;
3133 lwps = alloca ((2 * nlwp + 2) * sizeof *lwps);
3134 lwps[0] = 0;
3135#endif
3136 for (; nlwp > 0; nlwp--, lwps++)
3137 {
3138 /* First one has already been created above. */
3139 if ((pi = find_procinfo ((*lwps << 16) | pid, 1)) == 0)
3140 pi = init_procinfo ((*lwps << 16) | pid, 0);
3141
234a732d 3142#ifdef UNIXWARE
3780c337 3143 if (pi->prstatus.pr_lwp.pr_flags & (PR_STOPPED | PR_ISTOP))
234a732d 3144#else
3780c337 3145 if (pi->prstatus.pr_flags & (PR_STOPPED | PR_ISTOP))
234a732d 3146#endif
35f5886e 3147 {
3780c337
MS
3148 pi->was_stopped = 1;
3149 }
3150 else
3151 {
3152 pi->was_stopped = 0;
3153 if (1 || query ("Process is currently running, stop it? "))
3154 {
3155 long cmd;
3156 /* Make it run again when we close it. */
3157 modify_run_on_last_close_flag (pi->ctl_fd, 1);
234a732d 3158#ifdef PROCFS_USE_READ_WRITE
3780c337
MS
3159 cmd = PCSTOP;
3160 if (write (pi->ctl_fd, (char *) &cmd, sizeof (long)) < 0)
234a732d 3161#else
3780c337 3162 if (ioctl (pi->ctl_fd, PIOCSTOP, &pi->prstatus) < 0)
234a732d 3163#endif
3780c337
MS
3164 {
3165 print_sys_errmsg (pi->pathname, errno);
3166 close_proc_file (pi);
3167 error ("PIOCSTOP failed");
3168 }
234a732d 3169#ifdef UNIXWARE
3780c337
MS
3170 if (!procfs_read_status (pi))
3171 {
3172 print_sys_errmsg (pi->pathname, errno);
3173 close_proc_file (pi);
3174 error ("procfs_read_status failed");
3175 }
234a732d 3176#endif
3780c337
MS
3177 pi->nopass_next_sigstop = 1;
3178 }
3179 else
3180 {
3181 printf_unfiltered ("Ok, gdb will wait for %s to stop.\n",
3182 target_pid_to_str (pi->pid));
3183 }
35f5886e 3184 }
ec8ceca3 3185
234a732d 3186#ifdef PROCFS_USE_READ_WRITE
3780c337
MS
3187 fctl.cmd = PCSFAULT;
3188 if (write (pi->ctl_fd, (char *) &fctl, sizeof (struct flt_ctl)) < 0)
3189 print_sys_errmsg ("PCSFAULT failed", errno);
234a732d 3190#else /* PROCFS_USE_READ_WRITE */
3780c337
MS
3191 if (ioctl (pi->ctl_fd, PIOCSFAULT, &pi->prrun.pr_fault))
3192 {
3193 print_sys_errmsg ("PIOCSFAULT failed", errno);
3194 }
3195 if (ioctl (pi->ctl_fd, PIOCSTRACE, &pi->prrun.pr_trace))
3196 {
3197 print_sys_errmsg ("PIOCSTRACE failed", errno);
3198 }
3199 add_thread (pi->pid);
3200 procfs_set_inferior_syscall_traps (pi);
234a732d 3201#endif /* PROCFS_USE_READ_WRITE */
1e50f1b4 3202 }
35f5886e 3203 attach_flag = 1;
3780c337 3204 return (pi->pid);
35f5886e
FF
3205}
3206
3207/*
3208
3fbdd536 3209LOCAL FUNCTION
35f5886e 3210
3fbdd536 3211 do_detach -- detach from an attached-to process
35f5886e
FF
3212
3213SYNOPSIS
3214
3fbdd536 3215 void do_detach (int signal)
35f5886e
FF
3216
3217DESCRIPTION
3218
3219 Detach from the current attachee.
3220
3221 If signal is non-zero, the attachee is started running again and sent
3222 the specified signal.
3223
3224 If signal is zero and the attachee was not already stopped when we
3225 attached to it, then we make it runnable again when we detach.
3226
3227 Otherwise, we query whether or not to make the attachee runnable
3228 again, since we may simply want to leave it in the state it was in
3229 when we attached.
3230
3231 We report any problems, but do not consider them errors, since we
3232 MUST detach even if some things don't seem to go right. This may not
3233 be the ideal situation. (FIXME).
3234 */
3235
3fbdd536
JG
3236static void
3237do_detach (signal)
1ab3bf1b 3238 int signal;
35f5886e 3239{
de43d7d0
SG
3240 struct procinfo *pi;
3241
3780c337 3242 for (pi = procinfo_list; pi; pi = pi->next)
35f5886e 3243 {
3780c337
MS
3244 if (signal)
3245 {
3246 set_proc_siginfo (pi, signal);
3247 }
234a732d 3248#ifdef PROCFS_USE_READ_WRITE
3780c337
MS
3249 pi->saved_exitset.cmd = PCSEXIT;
3250 if (write (pi->ctl_fd, (char *) &pi->saved_exitset,
3251 sizeof (struct sys_ctl)) < 0)
234a732d 3252#else
3780c337 3253 if (ioctl (pi->ctl_fd, PIOCSEXIT, &pi->saved_exitset.sysset) < 0)
234a732d 3254#endif
3780c337
MS
3255 {
3256 print_sys_errmsg (pi->pathname, errno);
3257 printf_unfiltered ("PIOCSEXIT failed.\n");
3258 }
234a732d 3259#ifdef PROCFS_USE_READ_WRITE
3780c337
MS
3260 pi->saved_entryset.cmd = PCSENTRY;
3261 if (write (pi->ctl_fd, (char *) &pi->saved_entryset,
3262 sizeof (struct sys_ctl)) < 0)
234a732d 3263#else
3780c337 3264 if (ioctl (pi->ctl_fd, PIOCSENTRY, &pi->saved_entryset.sysset) < 0)
234a732d 3265#endif
3780c337
MS
3266 {
3267 print_sys_errmsg (pi->pathname, errno);
3268 printf_unfiltered ("PIOCSENTRY failed.\n");
3269 }
234a732d 3270#ifdef PROCFS_USE_READ_WRITE
3780c337
MS
3271 pi->saved_trace.cmd = PCSTRACE;
3272 if (write (pi->ctl_fd, (char *) &pi->saved_trace,
3273 sizeof (struct sig_ctl)) < 0)
234a732d 3274#else
3780c337 3275 if (ioctl (pi->ctl_fd, PIOCSTRACE, &pi->saved_trace.sigset) < 0)
234a732d 3276#endif
3780c337
MS
3277 {
3278 print_sys_errmsg (pi->pathname, errno);
3279 printf_unfiltered ("PIOCSTRACE failed.\n");
3280 }
234a732d 3281#ifndef UNIXWARE
3780c337
MS
3282 if (ioctl (pi->ctl_fd, PIOCSHOLD, &pi->saved_sighold.sigset) < 0)
3283 {
3284 print_sys_errmsg (pi->pathname, errno);
3285 printf_unfiltered ("PIOSCHOLD failed.\n");
3286 }
234a732d
GN
3287#endif
3288#ifdef PROCFS_USE_READ_WRITE
3780c337
MS
3289 pi->saved_fltset.cmd = PCSFAULT;
3290 if (write (pi->ctl_fd, (char *) &pi->saved_fltset,
3291 sizeof (struct flt_ctl)) < 0)
234a732d 3292#else
3780c337 3293 if (ioctl (pi->ctl_fd, PIOCSFAULT, &pi->saved_fltset.fltset) < 0)
234a732d 3294#endif
3780c337
MS
3295 {
3296 print_sys_errmsg (pi->pathname, errno);
3297 printf_unfiltered ("PIOCSFAULT failed.\n");
3298 }
3299 if (!procfs_read_status (pi))
3300 {
3301 print_sys_errmsg (pi->pathname, errno);
3302 printf_unfiltered ("procfs_read_status failed.\n");
3303 }
3304 else
3305 {
234a732d 3306#ifdef UNIXWARE
3780c337 3307 if (signal || (pi->prstatus.pr_lwp.pr_flags & (PR_STOPPED | PR_ISTOP)))
234a732d 3308#else
3780c337 3309 if (signal || (pi->prstatus.pr_flags & (PR_STOPPED | PR_ISTOP)))
234a732d 3310#endif
35f5886e 3311 {
3780c337
MS
3312 long cmd;
3313 struct proc_ctl pctl;
2592eef8 3314
3780c337
MS
3315 if (signal || !pi->was_stopped ||
3316 query ("Was stopped when attached, make it runnable again? "))
3317 {
3318 /* Clear any pending signal if we want to detach without
3319 a signal. */
3320 if (signal == 0)
3321 set_proc_siginfo (pi, signal);
3322
3323 /* Clear any fault that might have stopped it. */
234a732d 3324#ifdef PROCFS_USE_READ_WRITE
3780c337
MS
3325 cmd = PCCFAULT;
3326 if (write (pi->ctl_fd, (char *) &cmd, sizeof (long)) < 0)
234a732d 3327#else
3780c337 3328 if (ioctl (pi->ctl_fd, PIOCCFAULT, 0))
234a732d 3329#endif
3780c337
MS
3330 {
3331 print_sys_errmsg (pi->pathname, errno);
3332 printf_unfiltered ("PIOCCFAULT failed.\n");
3333 }
ec8ceca3 3334
3780c337 3335 /* Make it run again when we close it. */
8fc2b417 3336
3780c337
MS
3337 modify_run_on_last_close_flag (pi->ctl_fd, 1);
3338 }
35f5886e
FF
3339 }
3340 }
3780c337 3341 close_proc_file (pi);
35f5886e 3342 }
35f5886e
FF
3343 attach_flag = 0;
3344}
3345
45dc9be3
JK
3346/* emulate wait() as much as possible.
3347 Wait for child to do something. Return pid of child, or -1 in case
3348 of error; store status in *OURSTATUS.
3349
3350 Not sure why we can't
3351 just use wait(), but it seems to have problems when applied to a
3352 process being controlled with the /proc interface.
3353
3354 We have a race problem here with no obvious solution. We need to let
3355 the inferior run until it stops on an event of interest, which means
3356 that we need to use the PIOCWSTOP ioctl. However, we cannot use this
3357 ioctl if the process is already stopped on something that is not an
3358 event of interest, or the call will hang indefinitely. Thus we first
3359 use PIOCSTATUS to see if the process is not stopped. If not, then we
3360 use PIOCWSTOP. But during the window between the two, if the process
3361 stops for any reason that is not an event of interest (such as a job
3362 control signal) then gdb will hang. One possible workaround is to set
3363 an alarm to wake up every minute of so and check to see if the process
3364 is still running, and if so, then reissue the PIOCWSTOP. But this is
3365 a real kludge, so has not been implemented. FIXME: investigate
3366 alternatives.
3367
3368 FIXME: Investigate why wait() seems to have problems with programs
3369 being control by /proc routines. */
3fbdd536 3370static int
45dc9be3 3371procfs_wait (pid, ourstatus)
de43d7d0 3372 int pid;
67ac9759 3373 struct target_waitstatus *ourstatus;
35f5886e
FF
3374{
3375 short what;
3376 short why;
3377 int statval = 0;
3378 int checkerr = 0;
3379 int rtnval = -1;
de43d7d0 3380 struct procinfo *pi;
234a732d 3381 struct proc_ctl pctl;
de43d7d0 3382
15af627c 3383scan_again:
de43d7d0 3384
15af627c
FL
3385 /* handle all syscall events first, otherwise we might not
3386 notice a thread was created until too late. */
3387
3388 for (pi = procinfo_list; pi; pi = pi->next)
eca4a350 3389 {
15af627c
FL
3390 if (!pi->had_event)
3391 continue;
eca4a350 3392
15af627c
FL
3393#ifdef UNIXWARE
3394 if (! (pi->prstatus.pr_lwp.pr_flags & (PR_STOPPED | PR_ISTOP)) )
3395 continue;
8fc2b417 3396
15af627c
FL
3397 why = pi->prstatus.pr_lwp.pr_why;
3398 what = pi->prstatus.pr_lwp.pr_what;
3399#else
3400 if (! (pi->prstatus.pr_flags & (PR_STOPPED | PR_ISTOP)) )
3401 continue;
3402
3403 why = pi->prstatus.pr_why;
3404 what = pi->prstatus.pr_what;
3405#endif
3406 if (why == PR_SYSENTRY || why == PR_SYSEXIT)
3407 {
3408 int i;
3409 int found_handler = 0;
3410
3411 for (i = 0; i < pi->num_syscall_handlers; i++)
3412 if (pi->syscall_handlers[i].syscall_num == what)
3413 {
3414 found_handler = 1;
3415 pi->saved_rtnval = pi->pid;
3416 pi->saved_statval = 0;
3417 if (!pi->syscall_handlers[i].func
3418 (pi, what, why, &pi->saved_rtnval, &pi->saved_statval))
3419 pi->had_event = 0;
3420 break;
3421 }
3422
3423 if (!found_handler)
3424 {
3425 if (why == PR_SYSENTRY)
3426 error ("PR_SYSENTRY, unhandled system call %d", what);
3427 else
3428 error ("PR_SYSEXIT, unhandled system call %d", what);
3429 }
3430 }
eca4a350 3431 }
de43d7d0 3432
15af627c
FL
3433 /* find a relevant process with an event */
3434
3435 for (pi = procinfo_list; pi; pi = pi->next)
3436 if (pi->had_event && (pid == -1 || pi->pid == pid))
3437 break;
de43d7d0 3438
15af627c
FL
3439 if (!pi)
3440 {
3441 wait_fd ();
3442 goto scan_again;
3443 }
de43d7d0 3444
234a732d
GN
3445#ifdef UNIXWARE
3446 if (!checkerr && !(pi->prstatus.pr_lwp.pr_flags & (PR_STOPPED | PR_ISTOP)))
3447#else
de43d7d0 3448 if (!checkerr && !(pi->prstatus.pr_flags & (PR_STOPPED | PR_ISTOP)))
234a732d 3449#endif
de43d7d0 3450 {
234a732d 3451 if (!procfs_write_pcwstop (pi))
de43d7d0
SG
3452 {
3453 checkerr++;
3454 }
3780c337 3455 }
35f5886e
FF
3456 if (checkerr)
3457 {
3458 if (errno == ENOENT)
3459 {
3780c337 3460 /* XXX Fixme -- what to do if attached? Can't call wait... */
35f5886e 3461 rtnval = wait (&statval);
1e50f1b4 3462 if ((rtnval) != (PIDGET (inferior_pid)))
35f5886e 3463 {
de43d7d0 3464 print_sys_errmsg (pi->pathname, errno);
3780c337 3465 error ("procfs_wait: wait failed, returned %d", rtnval);
35f5886e
FF
3466 /* NOTREACHED */
3467 }
3468 }
3469 else
3470 {
de43d7d0 3471 print_sys_errmsg (pi->pathname, errno);
35f5886e
FF
3472 error ("PIOCSTATUS or PIOCWSTOP failed.");
3473 /* NOTREACHED */
3474 }
3475 }
1e50f1b4
JM
3476#ifdef UNIXWARE
3477 else if (pi->prstatus.pr_lwp.pr_flags & (PR_STOPPED | PR_ISTOP))
3478#else
de43d7d0 3479 else if (pi->prstatus.pr_flags & (PR_STOPPED | PR_ISTOP))
1e50f1b4 3480#endif
35f5886e 3481 {
234a732d
GN
3482#ifdef UNIXWARE
3483 rtnval = pi->prstatus.pr_pid;
3484 why = pi->prstatus.pr_lwp.pr_why;
3485 what = pi->prstatus.pr_lwp.pr_what;
3486#else
8fc2b417 3487 rtnval = pi->pid;
de43d7d0
SG
3488 why = pi->prstatus.pr_why;
3489 what = pi->prstatus.pr_what;
234a732d 3490#endif
de43d7d0
SG
3491
3492 switch (why)
35f5886e 3493 {
de43d7d0 3494 case PR_SIGNALLED:
35f5886e 3495 statval = (what << 8) | 0177;
fb63d460
SG
3496 break;
3497 case PR_SYSENTRY:
de43d7d0 3498 case PR_SYSEXIT:
15af627c
FL
3499 rtnval = pi->saved_rtnval;
3500 statval = pi->saved_statval;
de43d7d0
SG
3501 break;
3502 case PR_REQUESTED:
35f5886e 3503 statval = (SIGSTOP << 8) | 0177;
de43d7d0
SG
3504 break;
3505 case PR_JOBCONTROL:
35f5886e 3506 statval = (what << 8) | 0177;
de43d7d0
SG
3507 break;
3508 case PR_FAULTED:
35f5886e
FF
3509 switch (what)
3510 {
e6b8a171 3511#ifdef FLTWATCH
999dd04b 3512 case FLTWATCH:
e6b8a171
JL
3513 statval = (SIGTRAP << 8) | 0177;
3514 break;
3515#endif
3516#ifdef FLTKWATCH
999dd04b 3517 case FLTKWATCH:
35f5886e
FF
3518 statval = (SIGTRAP << 8) | 0177;
3519 break;
e6b8a171 3520#endif
3f5e2fb5
JK
3521#ifndef FAULTED_USE_SIGINFO
3522 /* Irix, contrary to the documentation, fills in 0 for si_signo.
3523 Solaris fills in si_signo. I'm not sure about others. */
3524 case FLTPRIV:
3525 case FLTILL:
3526 statval = (SIGILL << 8) | 0177;
3527 break;
3528 case FLTBPT:
3529 case FLTTRACE:
3530 statval = (SIGTRAP << 8) | 0177;
3780c337 3531 break;
3f5e2fb5
JK
3532 case FLTSTACK:
3533 case FLTACCESS:
3534 case FLTBOUNDS:
3535 statval = (SIGSEGV << 8) | 0177;
3536 break;
3537 case FLTIOVF:
3538 case FLTIZDIV:
3539 case FLTFPE:
3540 statval = (SIGFPE << 8) | 0177;
3541 break;
3542 case FLTPAGE: /* Recoverable page fault */
3543#endif /* not FAULTED_USE_SIGINFO */
35f5886e 3544 default:
890634ed
JK
3545 /* Use the signal which the kernel assigns. This is better than
3546 trying to second-guess it from the fault. In fact, I suspect
3547 that FLTACCESS can be either SIGSEGV or SIGBUS. */
234a732d
GN
3548#ifdef UNIXWARE
3549 statval = ((pi->prstatus.pr_lwp.pr_info.si_signo) << 8) | 0177;
3550#else
890634ed 3551 statval = ((pi->prstatus.pr_info.si_signo) << 8) | 0177;
234a732d 3552#endif
890634ed 3553 break;
35f5886e 3554 }
de43d7d0
SG
3555 break;
3556 default:
35f5886e 3557 error ("PIOCWSTOP, unknown why %d, what %d", why, what);
35f5886e 3558 }
f14465c3 3559 /* Stop all the other threads when any of them stops. */
de43d7d0
SG
3560
3561 {
3780c337 3562 struct procinfo *procinfo, *next_pi;
de43d7d0 3563
3780c337 3564 for (procinfo = procinfo_list; procinfo; procinfo = next_pi)
de43d7d0 3565 {
3780c337 3566 next_pi = procinfo->next;
de43d7d0 3567 if (!procinfo->had_event)
8fc2b417 3568 {
234a732d 3569#ifdef PROCFS_USE_READ_WRITE
1e50f1b4 3570 long cmd = PCSTOP;
234a732d
GN
3571 if (write (pi->ctl_fd, (char *) &cmd, sizeof (long)) < 0)
3572 {
3573 print_sys_errmsg (procinfo->pathname, errno);
3574 error ("PCSTOP failed");
3575 }
3576#else
8fc2b417
SG
3577 /* A bug in Solaris (2.5) causes us to hang when trying to
3578 stop a stopped process. So, we have to check first in
3579 order to avoid the hang. */
234a732d 3580 if (!procfs_read_status (procinfo))
8fc2b417 3581 {
3780c337
MS
3582 /* The LWP has apparently terminated. */
3583 if (info_verbose)
3584 printf_filtered ("LWP %d doesn't respond.\n",
3585 (procinfo->pid >> 16) & 0xffff);
3586 close_proc_file (procinfo);
3587 continue;
8fc2b417 3588 }
234a732d 3589
8fc2b417 3590 if (!(procinfo->prstatus.pr_flags & PR_STOPPED))
3780c337
MS
3591 if (ioctl (procinfo->ctl_fd, PIOCSTOP, &procinfo->prstatus)
3592 < 0)
8fc2b417
SG
3593 {
3594 print_sys_errmsg (procinfo->pathname, errno);
3780c337 3595 warning ("PIOCSTOP failed");
8fc2b417 3596 }
234a732d 3597#endif
8fc2b417 3598 }
de43d7d0
SG
3599 }
3600 }
35f5886e
FF
3601 }
3602 else
3603 {
1e50f1b4
JM
3604 error ("PIOCWSTOP, stopped for unknown/unhandled reason, flags %#x",
3605#ifdef UNIXWARE
3606 pi->prstatus.pr_lwp.pr_flags);
3607#else
de43d7d0 3608 pi->prstatus.pr_flags);
1e50f1b4 3609#endif
35f5886e 3610 }
3fbdd536 3611
67ac9759 3612 store_waitstatus (ourstatus, statval);
3fbdd536
JG
3613
3614 if (rtnval == -1) /* No more children to wait for */
3615 {
3780c337 3616 warning ("Child process unexpectedly missing");
67ac9759
JK
3617 /* Claim it exited with unknown signal. */
3618 ourstatus->kind = TARGET_WAITKIND_SIGNALLED;
3619 ourstatus->value.sig = TARGET_SIGNAL_UNKNOWN;
3fbdd536
JG
3620 return rtnval;
3621 }
3622
de43d7d0 3623 pi->had_event = 0; /* Indicate that we've seen this one */
35f5886e
FF
3624 return (rtnval);
3625}
3626
3627/*
3628
6b801388
FF
3629LOCAL FUNCTION
3630
3631 set_proc_siginfo - set a process's current signal info
3632
3633SYNOPSIS
3634
3635 void set_proc_siginfo (struct procinfo *pip, int signo);
3636
3637DESCRIPTION
3638
3639 Given a pointer to a process info struct in PIP and a signal number
3640 in SIGNO, set the process's current signal and its associated signal
3641 information. The signal will be delivered to the process immediately
3642 after execution is resumed, even if it is being held. In addition,
3643 this particular delivery will not cause another PR_SIGNALLED stop
3644 even if the signal is being traced.
3645
3646 If we are not delivering the same signal that the prstatus siginfo
3647 struct contains information about, then synthesize a siginfo struct
3648 to match the signal we are doing to deliver, make it of the type
3649 "generated by a user process", and send this synthesized copy. When
3650 used to set the inferior's signal state, this will be required if we
3651 are not currently stopped because of a traced signal, or if we decide
3652 to continue with a different signal.
3653
3654 Note that when continuing the inferior from a stop due to receipt
3655 of a traced signal, we either have set PRCSIG to clear the existing
3656 signal, or we have to call this function to do a PIOCSSIG with either
3657 the existing siginfo struct from pr_info, or one we have synthesized
3658 appropriately for the signal we want to deliver. Otherwise if the
3659 signal is still being traced, the inferior will immediately stop
3660 again.
3661
3662 See siginfo(5) for more details.
3663*/
3664
3665static void
3666set_proc_siginfo (pip, signo)
cc221e76
FF
3667 struct procinfo *pip;
3668 int signo;
6b801388
FF
3669{
3670 struct siginfo newsiginfo;
3671 struct siginfo *sip;
234a732d 3672 struct sigi_ctl sictl;
6b801388 3673
2592eef8
PS
3674#ifdef PROCFS_DONT_PIOCSSIG_CURSIG
3675 /* With Alpha OSF/1 procfs, the kernel gets really confused if it
a1a0d974 3676 receives a PIOCSSIG with a signal identical to the current signal,
2592eef8 3677 it messes up the current signal. Work around the kernel bug. */
234a732d
GN
3678#ifdef UNIXWARE
3679 if (signo == pip -> prstatus.pr_lwp.pr_cursig)
3680#else
2592eef8 3681 if (signo == pip -> prstatus.pr_cursig)
234a732d 3682#endif
2592eef8
PS
3683 return;
3684#endif
3685
234a732d
GN
3686#ifdef UNIXWARE
3687 if (signo == pip->prstatus.pr_lwp.pr_info.si_signo)
3688 {
3689 memcpy ((char *) &sictl.siginfo, (char *) &pip->prstatus.pr_lwp.pr_info,
3690 sizeof (siginfo_t));
3691 }
3692#else
de43d7d0 3693 if (signo == pip -> prstatus.pr_info.si_signo)
6b801388 3694 {
de43d7d0
SG
3695 sip = &pip -> prstatus.pr_info;
3696 }
234a732d 3697#endif
de43d7d0
SG
3698 else
3699 {
234a732d
GN
3700#ifdef UNIXWARE
3701 siginfo_t *sip = &sictl.siginfo;
3702 memset ((char *) sip, 0, sizeof (siginfo_t));
3703#else
de43d7d0
SG
3704 memset ((char *) &newsiginfo, 0, sizeof (newsiginfo));
3705 sip = &newsiginfo;
234a732d 3706#endif
de43d7d0
SG
3707 sip -> si_signo = signo;
3708 sip -> si_code = 0;
3709 sip -> si_errno = 0;
3710 sip -> si_pid = getpid ();
3711 sip -> si_uid = getuid ();
3712 }
234a732d
GN
3713#ifdef PROCFS_USE_READ_WRITE
3714 sictl.cmd = PCSSIG;
3715 if (write (pip->ctl_fd, (char *) &sictl, sizeof (struct sigi_ctl)) < 0)
3716#else
3717 if (ioctl (pip->ctl_fd, PIOCSSIG, sip) < 0)
3718#endif
de43d7d0
SG
3719 {
3720 print_sys_errmsg (pip -> pathname, errno);
3721 warning ("PIOCSSIG failed");
6b801388
FF
3722 }
3723}
3724
25286543 3725/* Resume execution of process PID. If STEP is nozero, then
59ba57da
JK
3726 just single step it. If SIGNAL is nonzero, restart it with that
3727 signal activated. */
35f5886e 3728
3fbdd536 3729static void
25286543
SG
3730procfs_resume (pid, step, signo)
3731 int pid;
1ab3bf1b 3732 int step;
67ac9759 3733 enum target_signal signo;
35f5886e 3734{
59ba57da 3735 int signal_to_pass;
3780c337 3736 struct procinfo *pi, *procinfo, *next_pi;
234a732d 3737 struct proc_ctl pctl;
de43d7d0
SG
3738
3739 pi = find_procinfo (pid == -1 ? inferior_pid : pid, 0);
59ba57da 3740
35f5886e 3741 errno = 0;
234a732d
GN
3742#ifdef UNIXWARE
3743 pctl.cmd = PCRUN;
3744 pctl.data = PRCFAULT;
3745#else
de43d7d0 3746 pi->prrun.pr_flags = PRSTRACE | PRSFAULT | PRCFAULT;
234a732d 3747#endif
99fd9e3e 3748
59ba57da
JK
3749#if 0
3750 /* It should not be necessary. If the user explicitly changes the value,
3751 value_assign calls write_register_bytes, which writes it. */
3752/* It may not be absolutely necessary to specify the PC value for
3753 restarting, but to be safe we use the value that gdb considers
3754 to be current. One case where this might be necessary is if the
3755 user explicitly changes the PC value that gdb considers to be
3756 current. FIXME: Investigate if this is necessary or not. */
3757
c3192172 3758#ifdef PRSVADDR_BROKEN
99fd9e3e
SG
3759/* Can't do this under Solaris running on a Sparc, as there seems to be no
3760 place to put nPC. In fact, if you use this, nPC seems to be set to some
3761 random garbage. We have to rely on the fact that PC and nPC have been
3762 written previously via PIOCSREG during a register flush. */
3763
de43d7d0
SG
3764 pi->prrun.pr_vaddr = (caddr_t) *(int *) &registers[REGISTER_BYTE (PC_REGNUM)];
3765 pi->prrun.pr_flags != PRSVADDR;
99fd9e3e 3766#endif
59ba57da
JK
3767#endif
3768
67ac9759 3769 if (signo == TARGET_SIGNAL_STOP && pi->nopass_next_sigstop)
59ba57da
JK
3770 /* When attaching to a child process, if we forced it to stop with
3771 a PIOCSTOP, then we will have set the nopass_next_sigstop flag.
3772 Upon resuming the first time after such a stop, we explicitly
3773 inhibit sending it another SIGSTOP, which would be the normal
3774 result of default signal handling. One potential drawback to
3775 this is that we will also ignore any attempt to by the user
3776 to explicitly continue after the attach with a SIGSTOP. Ultimately
3777 this problem should be dealt with by making the routines that
3778 deal with the inferior a little smarter, and possibly even allow
3779 an inferior to continue running at the same time as gdb. (FIXME?) */
3780 signal_to_pass = 0;
67ac9759 3781 else if (signo == TARGET_SIGNAL_TSTP
234a732d
GN
3782#ifdef UNIXWARE
3783 && pi->prstatus.pr_lwp.pr_cursig == SIGTSTP
3780c337 3784 && pi->prstatus.pr_lwp.pr_action.sa_handler == SIG_DFL
234a732d 3785#else
de43d7d0 3786 && pi->prstatus.pr_cursig == SIGTSTP
3780c337 3787 && pi->prstatus.pr_action.sa_handler == SIG_DFL
234a732d 3788#endif
3780c337 3789 )
59ba57da
JK
3790
3791 /* We are about to pass the inferior a SIGTSTP whose action is
3792 SIG_DFL. The SIG_DFL action for a SIGTSTP is to stop
3793 (notifying the parent via wait()), and then keep going from the
3794 same place when the parent is ready for you to keep going. So
3795 under the debugger, it should do nothing (as if the program had
3796 been stopped and then later resumed. Under ptrace, this
3797 happens for us, but under /proc, the system obligingly stops
3798 the process, and wait_for_inferior would have no way of
3799 distinguishing that type of stop (which indicates that we
3800 should just start it again), with a stop due to the pr_trace
3801 field of the prrun_t struct.
3802
3803 Note that if the SIGTSTP is being caught, we *do* need to pass it,
3804 because the handler needs to get executed. */
3805 signal_to_pass = 0;
3806 else
67ac9759 3807 signal_to_pass = target_signal_to_host (signo);
99fd9e3e 3808
59ba57da 3809 if (signal_to_pass)
35f5886e 3810 {
de43d7d0 3811 set_proc_siginfo (pi, signal_to_pass);
35f5886e
FF
3812 }
3813 else
3814 {
234a732d
GN
3815#ifdef UNIXWARE
3816 pctl.data |= PRCSIG;
3817#else
de43d7d0 3818 pi->prrun.pr_flags |= PRCSIG;
234a732d 3819#endif
35f5886e 3820 }
de43d7d0 3821 pi->nopass_next_sigstop = 0;
35f5886e
FF
3822 if (step)
3823 {
234a732d
GN
3824#ifdef UNIXWARE
3825 pctl.data |= PRSTEP;
3826#else
de43d7d0 3827 pi->prrun.pr_flags |= PRSTEP;
234a732d 3828#endif
35f5886e 3829 }
3780c337 3830 pi->had_event = 0;
8fc2b417
SG
3831 /* Don't try to start a process unless it's stopped on an
3832 `event of interest'. Doing so will cause errors. */
3833
3780c337
MS
3834 if (!procfs_read_status (pi))
3835 {
3836 /* The LWP has apparently terminated. */
3837 if (info_verbose)
3838 printf_filtered ("LWP %d doesn't respond.\n",
3839 (pi->pid >> 16) & 0xffff);
3840 close_proc_file (pi);
3841 }
3842 else
3843 {
234a732d 3844#ifdef PROCFS_USE_READ_WRITE
3780c337 3845 if (write (pi->ctl_fd, (char *) &pctl, sizeof (struct proc_ctl)) < 0)
234a732d 3846#else
3780c337
MS
3847 if ((pi->prstatus.pr_flags & PR_ISTOP)
3848 && ioctl (pi->ctl_fd, PIOCRUN, &pi->prrun) != 0)
234a732d 3849#endif
3780c337
MS
3850 {
3851 /* The LWP has apparently terminated. */
3852 if (info_verbose)
3853 printf_filtered ("LWP %d doesn't respond.\n",
3854 (pi->pid >> 16) & 0xffff);
3855 close_proc_file (pi);
3856 }
35f5886e 3857 }
de43d7d0 3858
3780c337
MS
3859 /* Continue all the other threads that haven't had an event of interest.
3860 Also continue them if they have NOPASS_NEXT_SIGSTOP set; this is only
3861 set by do_attach, and means this is the first resume after an attach.
3862 All threads were CSTOP'd by do_attach, and should be resumed now. */
de43d7d0
SG
3863
3864 if (pid == -1)
3780c337 3865 for (procinfo = procinfo_list; procinfo; procinfo = next_pi)
de43d7d0 3866 {
3780c337
MS
3867 next_pi = procinfo->next;
3868 if (pi != procinfo)
3869 if (!procinfo->had_event ||
3870 (procinfo->nopass_next_sigstop && signo == TARGET_SIGNAL_STOP))
3871 {
3872 procinfo->had_event = procinfo->nopass_next_sigstop = 0;
234a732d 3873#ifdef PROCFS_USE_READ_WRITE
3780c337
MS
3874 pctl.data = PRCFAULT | PRCSIG;
3875 if (write (procinfo->ctl_fd, (char *) &pctl,
3876 sizeof (struct proc_ctl)) < 0)
3877 {
3878 if (!procfs_read_status (procinfo))
3879 fprintf_unfiltered(gdb_stderr,
3880 "procfs_read_status failed, errno=%d\n",
3881 errno);
3882 print_sys_errmsg (procinfo->pathname, errno);
3883 error ("PCRUN failed");
3884 }
234a732d 3885#else
3780c337
MS
3886 procinfo->prrun.pr_flags &= PRSTEP;
3887 procinfo->prrun.pr_flags |= PRCFAULT | PRCSIG;
3888 if (!procfs_read_status (procinfo))
3889 {
3890 /* The LWP has apparently terminated. */
3891 if (info_verbose)
3892 printf_filtered ("LWP %d doesn't respond.\n",
3893 (procinfo->pid >> 16) & 0xffff);
3894 close_proc_file (procinfo);
3895 continue;
3896 }
8fc2b417 3897
3780c337
MS
3898 /* Don't try to start a process unless it's stopped on an
3899 `event of interest'. Doing so will cause errors. */
8fc2b417 3900
3780c337
MS
3901 if ((procinfo->prstatus.pr_flags & PR_ISTOP)
3902 && ioctl (procinfo->ctl_fd, PIOCRUN, &procinfo->prrun) < 0)
3903 {
3904 if (!procfs_read_status (procinfo))
3905 fprintf_unfiltered(gdb_stderr,
3906 "procfs_read_status failed, errno=%d\n",
3907 errno);
3908 print_sys_errmsg (procinfo->pathname, errno);
3909 warning ("PIOCRUN failed");
3910 }
1e50f1b4 3911#endif
3780c337
MS
3912 }
3913 procfs_read_status (procinfo);
de43d7d0 3914 }
35f5886e
FF
3915}
3916
3917/*
3918
3fbdd536 3919LOCAL FUNCTION
35f5886e 3920
3fbdd536 3921 procfs_fetch_registers -- fetch current registers from inferior
35f5886e
FF
3922
3923SYNOPSIS
3924
3fbdd536 3925 void procfs_fetch_registers (int regno)
35f5886e
FF
3926
3927DESCRIPTION
3928
3929 Read the current values of the inferior's registers, both the
3930 general register set and floating point registers (if supported)
3931 and update gdb's idea of their current values.
3932
3933*/
3934
3fbdd536
JG
3935static void
3936procfs_fetch_registers (regno)
1ab3bf1b 3937 int regno;
35f5886e 3938{
de43d7d0
SG
3939 struct procinfo *pi;
3940
3941 pi = current_procinfo;
3942
234a732d
GN
3943#ifdef UNIXWARE
3944 if (procfs_read_status (pi))
3945 {
3946 supply_gregset (&pi->prstatus.pr_lwp.pr_context.uc_mcontext.gregs);
3947#if defined (FP0_REGNUM)
3948 supply_fpregset (&pi->prstatus.pr_lwp.pr_context.uc_mcontext.fpregs);
3949#endif
3950 }
3951#else /* UNIXWARE */
3952 if (ioctl (pi->ctl_fd, PIOCGREG, &pi->gregset.gregset) != -1)
35f5886e 3953 {
234a732d 3954 supply_gregset (&pi->gregset.gregset);
35f5886e
FF
3955 }
3956#if defined (FP0_REGNUM)
234a732d 3957 if (ioctl (pi->ctl_fd, PIOCGFPREG, &pi->fpregset.fpregset) != -1)
35f5886e 3958 {
234a732d 3959 supply_fpregset (&pi->fpregset.fpregset);
35f5886e
FF
3960 }
3961#endif
234a732d 3962#endif /* UNIXWARE */
35f5886e
FF
3963}
3964
fb182850
FF
3965/*
3966
35f5886e
FF
3967LOCAL FUNCTION
3968
3780c337 3969 proc_init_failed - called when /proc access initialization fails
de43d7d0 3970fails
35f5886e
FF
3971
3972SYNOPSIS
3973
3780c337
MS
3974 static void proc_init_failed (struct procinfo *pi,
3975 char *why, int kill_p)
35f5886e
FF
3976
3977DESCRIPTION
3978
3979 This function is called whenever initialization of access to a /proc
3980 entry fails. It prints a suitable error message, does some cleanup,
3981 and then invokes the standard error processing routine which dumps
3780c337 3982 us back into the command loop. If KILL_P is true, sends SIGKILL.
35f5886e
FF
3983 */
3984
3985static void
3780c337 3986proc_init_failed (pi, why, kill_p)
de43d7d0 3987 struct procinfo *pi;
1ab3bf1b 3988 char *why;
3780c337 3989 int kill_p;
35f5886e 3990{
de43d7d0 3991 print_sys_errmsg (pi->pathname, errno);
3780c337
MS
3992 if (kill_p)
3993 kill (pi->pid, SIGKILL);
de43d7d0 3994 close_proc_file (pi);
35f5886e
FF
3995 error (why);
3996 /* NOTREACHED */
3997}
3998
3999/*
4000
4001LOCAL FUNCTION
4002
4003 close_proc_file - close any currently open /proc entry
4004
4005SYNOPSIS
4006
a39ad5ce 4007 static void close_proc_file (struct procinfo *pip)
35f5886e
FF
4008
4009DESCRIPTION
4010
4011 Close any currently open /proc entry and mark the process information
4012 entry as invalid. In order to ensure that we don't try to reuse any
4013 stale information, the pid, fd, and pathnames are explicitly
4014 invalidated, which may be overkill.
4015
4016 */
4017
4018static void
1ab3bf1b
JG
4019close_proc_file (pip)
4020 struct procinfo *pip;
35f5886e 4021{
de43d7d0
SG
4022 struct procinfo *procinfo;
4023
3780c337 4024 delete_thread (pip->pid); /* remove thread from GDB's thread list */
de43d7d0
SG
4025 remove_fd (pip); /* Remove fd from poll/select list */
4026
234a732d
GN
4027 close (pip->ctl_fd);
4028#ifdef HAVE_MULTIPLE_PROC_FDS
4029 close (pip->as_fd);
4030 close (pip->status_fd);
4031 close (pip->map_fd);
4032#endif
de43d7d0
SG
4033
4034 free (pip -> pathname);
4035
4036 /* Unlink pip from the procinfo chain. Note pip might not be on the list. */
4037
4038 if (procinfo_list == pip)
4039 procinfo_list = pip->next;
4040 else
234a732d
GN
4041 {
4042 for (procinfo = procinfo_list; procinfo; procinfo = procinfo->next)
4043 {
4044 if (procinfo->next == pip)
4045 {
4046 procinfo->next = pip->next;
4047 break;
4048 }
4049 }
4050 free (pip);
4051 }
35f5886e
FF
4052}
4053
4054/*
4055
4056LOCAL FUNCTION
4057
4058 open_proc_file - open a /proc entry for a given process id
4059
4060SYNOPSIS
4061
ec8ceca3 4062 static int open_proc_file (int pid, struct procinfo *pip, int mode)
35f5886e
FF
4063
4064DESCRIPTION
4065
ec8ceca3
JG
4066 Given a process id and a mode, close the existing open /proc
4067 entry (if any) and open one for the new process id, in the
4068 specified mode. Once it is open, then mark the local process
4069 information structure as valid, which guarantees that the pid,
4070 fd, and pathname fields match an open /proc entry. Returns
4071 zero if the open fails, nonzero otherwise.
35f5886e
FF
4072
4073 Note that the pathname is left intact, even when the open fails,
4074 so that callers can use it to construct meaningful error messages
4075 rather than just "file open failed".
8fc2b417
SG
4076
4077 Note that for Solaris, the process-id also includes an LWP-id, so we
4078 actually attempt to open that. If we are handed a pid with a 0 LWP-id,
4079 then we will ask the kernel what it is and add it to the pid. Hence,
4080 the pid can be changed by us.
35f5886e
FF
4081 */
4082
4083static int
234a732d 4084open_proc_file (pid, pip, mode, control)
1ab3bf1b
JG
4085 int pid;
4086 struct procinfo *pip;
ec8ceca3 4087 int mode;
234a732d 4088 int control;
35f5886e 4089{
8fc2b417
SG
4090 int tmp, tmpfd;
4091
de43d7d0
SG
4092 pip -> next = NULL;
4093 pip -> had_event = 0;
234a732d 4094 pip -> pathname = xmalloc (MAX_PROC_NAME_SIZE);
de43d7d0
SG
4095 pip -> pid = pid;
4096
8fc2b417
SG
4097#ifndef PIOCOPENLWP
4098 tmp = pid;
4099#else
4100 tmp = pid & 0xffff;
4101#endif
4102
234a732d
GN
4103#ifdef HAVE_MULTIPLE_PROC_FDS
4104 sprintf (pip->pathname, STATUS_PROC_NAME_FMT, tmp);
4105 if ((pip->status_fd = open (pip->pathname, O_RDONLY)) < 0)
4106 {
4107 return 0;
4108 }
4109
4110 sprintf (pip->pathname, AS_PROC_NAME_FMT, tmp);
4111 if ((pip->as_fd = open (pip->pathname, O_RDWR)) < 0)
4112 {
4113 close (pip->status_fd);
4114 return 0;
4115 }
4116
4117 sprintf (pip->pathname, MAP_PROC_NAME_FMT, tmp);
4118 if ((pip->map_fd = open (pip->pathname, O_RDONLY)) < 0)
4119 {
4120 close (pip->status_fd);
4121 close (pip->as_fd);
4122 return 0;
4123 }
4124
4125 sprintf (pip->pathname, MAP_PROC_NAME_FMT, tmp);
4126 if ((pip->map_fd = open (pip->pathname, O_RDONLY)) < 0)
4127 {
4128 close (pip->status_fd);
4129 close (pip->as_fd);
4130 return 0;
4131 }
4132
4133 if (control)
4134 {
4135 sprintf (pip->pathname, CTL_PROC_NAME_FMT, tmp);
4136 if ((pip->ctl_fd = open (pip->pathname, O_WRONLY)) < 0)
4137 {
4138 close (pip->status_fd);
4139 close (pip->as_fd);
4140 close (pip->map_fd);
4141 return 0;
3780c337 4142 }
234a732d
GN
4143 }
4144
4145#else /* HAVE_MULTIPLE_PROC_FDS */
4146 sprintf (pip -> pathname, CTL_PROC_NAME_FMT, tmp);
4147
8fc2b417 4148 if ((tmpfd = open (pip -> pathname, mode)) < 0)
de43d7d0
SG
4149 return 0;
4150
8fc2b417 4151#ifndef PIOCOPENLWP
234a732d
GN
4152 pip -> ctl_fd = tmpfd;
4153 pip -> as_fd = tmpfd;
4154 pip -> map_fd = tmpfd;
4155 pip -> status_fd = tmpfd;
8fc2b417
SG
4156#else
4157 tmp = (pid >> 16) & 0xffff; /* Extract thread id */
4158
4159 if (tmp == 0)
4160 { /* Don't know thread id yet */
4161 if (ioctl (tmpfd, PIOCSTATUS, &pip -> prstatus) < 0)
4162 {
4163 print_sys_errmsg (pip -> pathname, errno);
4164 close (tmpfd);
4165 error ("open_proc_file: PIOCSTATUS failed");
4166 }
4167
4168 tmp = pip -> prstatus.pr_who; /* Get thread id from prstatus_t */
4169 pip -> pid = (tmp << 16) | pid; /* Update pip */
4170 }
4171
234a732d 4172 if ((pip -> ctl_fd = ioctl (tmpfd, PIOCOPENLWP, &tmp)) < 0)
8fc2b417
SG
4173 {
4174 close (tmpfd);
4175 return 0;
4176 }
4177
4178#ifdef PIOCSET /* New method */
4179 {
4180 long pr_flags;
4181 pr_flags = PR_ASYNC;
234a732d 4182 ioctl (pip -> ctl_fd, PIOCSET, &pr_flags);
8fc2b417
SG
4183 }
4184#endif
4185
234a732d
GN
4186 /* keep extra fds in sync */
4187 pip->as_fd = pip->ctl_fd;
4188 pip->map_fd = pip->ctl_fd;
4189 pip->status_fd = pip->ctl_fd;
4190
8fc2b417
SG
4191 close (tmpfd); /* All done with main pid */
4192#endif /* PIOCOPENLWP */
4193
234a732d
GN
4194#endif /* HAVE_MULTIPLE_PROC_FDS */
4195
de43d7d0 4196 return 1;
a39ad5ce
FF
4197}
4198
f66f459f 4199static char *
1ab3bf1b
JG
4200mappingflags (flags)
4201 long flags;
a39ad5ce 4202{
5c1c5e67 4203 static char asciiflags[8];
a39ad5ce 4204
5c1c5e67
FF
4205 strcpy (asciiflags, "-------");
4206#if defined (MA_PHYS)
4207 if (flags & MA_PHYS) asciiflags[0] = 'd';
4208#endif
4209 if (flags & MA_STACK) asciiflags[1] = 's';
4210 if (flags & MA_BREAK) asciiflags[2] = 'b';
4211 if (flags & MA_SHARED) asciiflags[3] = 's';
4212 if (flags & MA_READ) asciiflags[4] = 'r';
4213 if (flags & MA_WRITE) asciiflags[5] = 'w';
4214 if (flags & MA_EXEC) asciiflags[6] = 'x';
a39ad5ce
FF
4215 return (asciiflags);
4216}
4217
4218static void
cc221e76
FF
4219info_proc_flags (pip, summary)
4220 struct procinfo *pip;
4221 int summary;
4222{
4223 struct trans *transp;
234a732d
GN
4224#ifdef UNIXWARE
4225 long flags = pip->prstatus.pr_flags | pip->prstatus.pr_lwp.pr_flags;
4226#else
4227 long flags = pip->prstatus.pr_flags;
4228#endif
cc221e76
FF
4229
4230 printf_filtered ("%-32s", "Process status flags:");
4231 if (!summary)
4232 {
4233 printf_filtered ("\n\n");
4234 }
4235 for (transp = pr_flag_table; transp -> name != NULL; transp++)
4236 {
234a732d 4237 if (flags & transp -> value)
cc221e76
FF
4238 {
4239 if (summary)
4240 {
4241 printf_filtered ("%s ", transp -> name);
4242 }
4243 else
4244 {
4245 printf_filtered ("\t%-16s %s.\n", transp -> name, transp -> desc);
4246 }
4247 }
4248 }
4249 printf_filtered ("\n");
4250}
4251
4252static void
4253info_proc_stop (pip, summary)
4254 struct procinfo *pip;
4255 int summary;
4256{
4257 struct trans *transp;
4258 int why;
4259 int what;
4260
234a732d
GN
4261#ifdef UNIXWARE
4262 why = pip -> prstatus.pr_lwp.pr_why;
4263 what = pip -> prstatus.pr_lwp.pr_what;
4264#else
cc221e76
FF
4265 why = pip -> prstatus.pr_why;
4266 what = pip -> prstatus.pr_what;
234a732d 4267#endif
cc221e76 4268
234a732d
GN
4269#ifdef UNIXWARE
4270 if (pip -> prstatus.pr_lwp.pr_flags & PR_STOPPED)
4271#else
cc221e76 4272 if (pip -> prstatus.pr_flags & PR_STOPPED)
234a732d 4273#endif
cc221e76
FF
4274 {
4275 printf_filtered ("%-32s", "Reason for stopping:");
4276 if (!summary)
4277 {
4278 printf_filtered ("\n\n");
4279 }
4280 for (transp = pr_why_table; transp -> name != NULL; transp++)
4281 {
4282 if (why == transp -> value)
4283 {
4284 if (summary)
4285 {
4286 printf_filtered ("%s ", transp -> name);
4287 }
4288 else
4289 {
4290 printf_filtered ("\t%-16s %s.\n",
4291 transp -> name, transp -> desc);
4292 }
4293 break;
4294 }
4295 }
4296
4297 /* Use the pr_why field to determine what the pr_what field means, and
4298 print more information. */
4299
4300 switch (why)
4301 {
4302 case PR_REQUESTED:
4303 /* pr_what is unused for this case */
4304 break;
4305 case PR_JOBCONTROL:
4306 case PR_SIGNALLED:
4307 if (summary)
4308 {
4309 printf_filtered ("%s ", signalname (what));
4310 }
4311 else
4312 {
4313 printf_filtered ("\t%-16s %s.\n", signalname (what),
4ace50a5 4314 safe_strsignal (what));
cc221e76
FF
4315 }
4316 break;
4317 case PR_SYSENTRY:
4318 if (summary)
4319 {
4320 printf_filtered ("%s ", syscallname (what));
4321 }
4322 else
4323 {
4324 printf_filtered ("\t%-16s %s.\n", syscallname (what),
4325 "Entered this system call");
4326 }
4327 break;
4328 case PR_SYSEXIT:
4329 if (summary)
4330 {
4331 printf_filtered ("%s ", syscallname (what));
4332 }
4333 else
4334 {
4335 printf_filtered ("\t%-16s %s.\n", syscallname (what),
4336 "Returned from this system call");
4337 }
4338 break;
4339 case PR_FAULTED:
4340 if (summary)
4341 {
4342 printf_filtered ("%s ",
4343 lookupname (faults_table, what, "fault"));
4344 }
4345 else
4346 {
4347 printf_filtered ("\t%-16s %s.\n",
4348 lookupname (faults_table, what, "fault"),
4349 lookupdesc (faults_table, what));
4350 }
4351 break;
4352 }
4353 printf_filtered ("\n");
4354 }
4355}
4356
4357static void
4358info_proc_siginfo (pip, summary)
4359 struct procinfo *pip;
4360 int summary;
4361{
4362 struct siginfo *sip;
4363
234a732d
GN
4364#ifdef UNIXWARE
4365 if ((pip -> prstatus.pr_lwp.pr_flags & PR_STOPPED) &&
4366 (pip -> prstatus.pr_lwp.pr_why == PR_SIGNALLED ||
4367 pip -> prstatus.pr_lwp.pr_why == PR_FAULTED))
4368#else
cc221e76
FF
4369 if ((pip -> prstatus.pr_flags & PR_STOPPED) &&
4370 (pip -> prstatus.pr_why == PR_SIGNALLED ||
4371 pip -> prstatus.pr_why == PR_FAULTED))
234a732d 4372#endif
cc221e76
FF
4373 {
4374 printf_filtered ("%-32s", "Additional signal/fault info:");
234a732d
GN
4375#ifdef UNIXWARE
4376 sip = &pip -> prstatus.pr_lwp.pr_info;
4377#else
cc221e76 4378 sip = &pip -> prstatus.pr_info;
234a732d 4379#endif
cc221e76
FF
4380 if (summary)
4381 {
4382 printf_filtered ("%s ", signalname (sip -> si_signo));
4383 if (sip -> si_errno > 0)
4384 {
4ace50a5 4385 printf_filtered ("%s ", errnoname (sip -> si_errno));
cc221e76
FF
4386 }
4387 if (sip -> si_code <= 0)
4388 {
25286543
SG
4389 printf_filtered ("sent by %s, uid %d ",
4390 target_pid_to_str (sip -> si_pid),
cc221e76
FF
4391 sip -> si_uid);
4392 }
4393 else
4394 {
4395 printf_filtered ("%s ", sigcodename (sip));
4396 if ((sip -> si_signo == SIGILL) ||
4397 (sip -> si_signo == SIGFPE) ||
4398 (sip -> si_signo == SIGSEGV) ||
4399 (sip -> si_signo == SIGBUS))
4400 {
b9e58503
PS
4401 printf_filtered ("addr=%#lx ",
4402 (unsigned long) sip -> si_addr);
cc221e76
FF
4403 }
4404 else if ((sip -> si_signo == SIGCHLD))
4405 {
25286543
SG
4406 printf_filtered ("child %s, status %u ",
4407 target_pid_to_str (sip -> si_pid),
cc221e76
FF
4408 sip -> si_status);
4409 }
4410 else if ((sip -> si_signo == SIGPOLL))
4411 {
4412 printf_filtered ("band %u ", sip -> si_band);
4413 }
4414 }
4415 }
4416 else
4417 {
4418 printf_filtered ("\n\n");
4419 printf_filtered ("\t%-16s %s.\n", signalname (sip -> si_signo),
4ace50a5 4420 safe_strsignal (sip -> si_signo));
cc221e76
FF
4421 if (sip -> si_errno > 0)
4422 {
4423 printf_filtered ("\t%-16s %s.\n",
4ace50a5
FF
4424 errnoname (sip -> si_errno),
4425 safe_strerror (sip -> si_errno));
cc221e76
FF
4426 }
4427 if (sip -> si_code <= 0)
4428 {
25286543 4429 printf_filtered ("\t%-16u %s\n", sip -> si_pid, /* XXX need target_pid_to_str() */
cc221e76
FF
4430 "PID of process sending signal");
4431 printf_filtered ("\t%-16u %s\n", sip -> si_uid,
4432 "UID of process sending signal");
4433 }
4434 else
4435 {
4436 printf_filtered ("\t%-16s %s.\n", sigcodename (sip),
4437 sigcodedesc (sip));
4438 if ((sip -> si_signo == SIGILL) ||
4439 (sip -> si_signo == SIGFPE))
4440 {
b9e58503
PS
4441 printf_filtered ("\t%#-16lx %s.\n",
4442 (unsigned long) sip -> si_addr,
cc221e76
FF
4443 "Address of faulting instruction");
4444 }
4445 else if ((sip -> si_signo == SIGSEGV) ||
4446 (sip -> si_signo == SIGBUS))
4447 {
b9e58503
PS
4448 printf_filtered ("\t%#-16lx %s.\n",
4449 (unsigned long) sip -> si_addr,
cc221e76
FF
4450 "Address of faulting memory reference");
4451 }
4452 else if ((sip -> si_signo == SIGCHLD))
4453 {
25286543 4454 printf_filtered ("\t%-16u %s.\n", sip -> si_pid, /* XXX need target_pid_to_str() */
cc221e76
FF
4455 "Child process ID");
4456 printf_filtered ("\t%-16u %s.\n", sip -> si_status,
4457 "Child process exit value or signal");
4458 }
4459 else if ((sip -> si_signo == SIGPOLL))
4460 {
4461 printf_filtered ("\t%-16u %s.\n", sip -> si_band,
4462 "Band event for POLL_{IN,OUT,MSG}");
4463 }
4464 }
4465 }
4466 printf_filtered ("\n");
4467 }
4468}
4469
4470static void
4471info_proc_syscalls (pip, summary)
4472 struct procinfo *pip;
4473 int summary;
4474{
4475 int syscallnum;
4476
4477 if (!summary)
4478 {
4479
4480#if 0 /* FIXME: Needs to use gdb-wide configured info about system calls. */
4481 if (pip -> prstatus.pr_flags & PR_ASLEEP)
4482 {
4483 int syscallnum = pip -> prstatus.pr_reg[R_D0];
4484 if (summary)
4485 {
4486 printf_filtered ("%-32s", "Sleeping in system call:");
4487 printf_filtered ("%s", syscallname (syscallnum));
4488 }
4489 else
4490 {
4491 printf_filtered ("Sleeping in system call '%s'.\n",
4492 syscallname (syscallnum));
4493 }
4494 }
4495#endif
4496
234a732d
GN
4497#ifndef UNIXWARE
4498 if (ioctl (pip -> ctl_fd, PIOCGENTRY, &pip -> entryset) < 0)
cc221e76
FF
4499 {
4500 print_sys_errmsg (pip -> pathname, errno);
4501 error ("PIOCGENTRY failed");
4502 }
4503
234a732d 4504 if (ioctl (pip -> ctl_fd, PIOCGEXIT, &pip -> exitset) < 0)
cc221e76
FF
4505 {
4506 print_sys_errmsg (pip -> pathname, errno);
4507 error ("PIOCGEXIT failed");
4508 }
234a732d 4509#endif
cc221e76
FF
4510
4511 printf_filtered ("System call tracing information:\n\n");
4512
4513 printf_filtered ("\t%-12s %-8s %-8s\n",
4514 "System call",
4515 "Entry",
4516 "Exit");
4517 for (syscallnum = 0; syscallnum < MAX_SYSCALLS; syscallnum++)
4518 {
4519 QUIT;
4520 if (syscall_table[syscallnum] != NULL)
8fc2b417
SG
4521 printf_filtered ("\t%-12s ", syscall_table[syscallnum]);
4522 else
4523 printf_filtered ("\t%-12d ", syscallnum);
4524
234a732d
GN
4525#ifdef UNIXWARE
4526 printf_filtered ("%-8s ",
4527 prismember (&pip->prstatus.pr_sysentry, syscallnum)
4528 ? "on" : "off");
4529 printf_filtered ("%-8s ",
4530 prismember (&pip->prstatus.pr_sysexit, syscallnum)
4531 ? "on" : "off");
4532#else
8fc2b417
SG
4533 printf_filtered ("%-8s ",
4534 prismember (&pip -> entryset, syscallnum)
4535 ? "on" : "off");
4536 printf_filtered ("%-8s ",
4537 prismember (&pip -> exitset, syscallnum)
4538 ? "on" : "off");
234a732d 4539#endif
8fc2b417
SG
4540 printf_filtered ("\n");
4541 }
cc221e76
FF
4542 printf_filtered ("\n");
4543 }
4544}
4545
4546static char *
4547signalname (signo)
4548 int signo;
4549{
26a859ec 4550 const char *name;
4ace50a5
FF
4551 static char locbuf[32];
4552
4553 name = strsigno (signo);
4554 if (name == NULL)
4555 {
4556 sprintf (locbuf, "Signal %d", signo);
4557 }
4558 else
4559 {
4560 sprintf (locbuf, "%s (%d)", name, signo);
4561 }
4562 return (locbuf);
4563}
4564
4565static char *
4566errnoname (errnum)
4567 int errnum;
4568{
26a859ec 4569 const char *name;
cc221e76
FF
4570 static char locbuf[32];
4571
4ace50a5
FF
4572 name = strerrno (errnum);
4573 if (name == NULL)
cc221e76 4574 {
4ace50a5 4575 sprintf (locbuf, "Errno %d", errnum);
cc221e76
FF
4576 }
4577 else
4578 {
4ace50a5 4579 sprintf (locbuf, "%s (%d)", name, errnum);
cc221e76
FF
4580 }
4581 return (locbuf);
4582}
4583
4584static void
4585info_proc_signals (pip, summary)
4586 struct procinfo *pip;
4587 int summary;
4588{
4589 int signo;
4590
4591 if (!summary)
4592 {
234a732d
GN
4593#ifndef PROCFS_USE_READ_WRITE
4594 if (ioctl (pip -> ctl_fd, PIOCGTRACE, &pip -> trace) < 0)
cc221e76
FF
4595 {
4596 print_sys_errmsg (pip -> pathname, errno);
4597 error ("PIOCGTRACE failed");
4598 }
234a732d 4599#endif
cc221e76
FF
4600
4601 printf_filtered ("Disposition of signals:\n\n");
4602 printf_filtered ("\t%-15s %-8s %-8s %-8s %s\n\n",
4603 "Signal", "Trace", "Hold", "Pending", "Description");
4604 for (signo = 0; signo < NSIG; signo++)
4605 {
4606 QUIT;
4607 printf_filtered ("\t%-15s ", signalname (signo));
234a732d
GN
4608#ifdef UNIXWARE
4609 printf_filtered ("%-8s ",
4610 prismember (&pip -> prstatus.pr_sigtrace, signo)
4611 ? "on" : "off");
4612 printf_filtered ("%-8s ",
4613 prismember (&pip -> prstatus.pr_lwp.pr_context.uc_sigmask, signo)
4614 ? "on" : "off");
4615#else
cc221e76
FF
4616 printf_filtered ("%-8s ",
4617 prismember (&pip -> trace, signo)
4618 ? "on" : "off");
4619 printf_filtered ("%-8s ",
4620 prismember (&pip -> prstatus.pr_sighold, signo)
4621 ? "on" : "off");
234a732d 4622#endif
2592eef8 4623
234a732d
GN
4624#ifdef UNIXWARE
4625 if (prismember (&pip->prstatus.pr_sigpend, signo) ||
4626 prismember (&pip->prstatus.pr_lwp.pr_lwppend, signo))
4627 printf_filtered("%-8s ", "yes");
4628 else
4629 printf_filtered("%-8s ", "no");
4630#else /* UNIXWARE */
2592eef8
PS
4631#ifdef PROCFS_SIGPEND_OFFSET
4632 /* Alpha OSF/1 numbers the pending signals from 1. */
4633 printf_filtered ("%-8s ",
4634 (signo ? prismember (&pip -> prstatus.pr_sigpend,
4635 signo - 1)
4636 : 0)
4637 ? "yes" : "no");
4638#else
cc221e76
FF
4639 printf_filtered ("%-8s ",
4640 prismember (&pip -> prstatus.pr_sigpend, signo)
4641 ? "yes" : "no");
2592eef8 4642#endif
234a732d 4643#endif /* UNIXWARE */
4ace50a5 4644 printf_filtered (" %s\n", safe_strsignal (signo));
cc221e76
FF
4645 }
4646 printf_filtered ("\n");
4647 }
4648}
4649
4650static void
4651info_proc_faults (pip, summary)
4652 struct procinfo *pip;
4653 int summary;
4654{
4655 struct trans *transp;
4656
4657 if (!summary)
4658 {
234a732d
GN
4659#ifndef UNIXWARE
4660 if (ioctl (pip -> ctl_fd, PIOCGFAULT, &pip->fltset.fltset) < 0)
cc221e76
FF
4661 {
4662 print_sys_errmsg (pip -> pathname, errno);
4663 error ("PIOCGFAULT failed");
4664 }
234a732d 4665#endif
cc221e76
FF
4666
4667 printf_filtered ("Current traced hardware fault set:\n\n");
4668 printf_filtered ("\t%-12s %-8s\n", "Fault", "Trace");
4669
4670 for (transp = faults_table; transp -> name != NULL; transp++)
4671 {
4672 QUIT;
4673 printf_filtered ("\t%-12s ", transp -> name);
234a732d
GN
4674#ifdef UNIXWARE
4675 printf_filtered ("%-8s", prismember (&pip->prstatus.pr_flttrace, transp -> value)
4676 ? "on" : "off");
4677#else
4678 printf_filtered ("%-8s", prismember (&pip->fltset.fltset, transp -> value)
cc221e76 4679 ? "on" : "off");
234a732d 4680#endif
cc221e76
FF
4681 printf_filtered ("\n");
4682 }
4683 printf_filtered ("\n");
4684 }
4685}
4686
4687static void
4688info_proc_mappings (pip, summary)
1ab3bf1b 4689 struct procinfo *pip;
cc221e76 4690 int summary;
a39ad5ce
FF
4691{
4692 int nmap;
4693 struct prmap *prmaps;
4694 struct prmap *prmap;
234a732d 4695 struct stat sbuf;
a39ad5ce 4696
cc221e76 4697 if (!summary)
a39ad5ce 4698 {
cc221e76 4699 printf_filtered ("Mapped address spaces:\n\n");
2592eef8
PS
4700#ifdef BFD_HOST_64_BIT
4701 printf_filtered (" %18s %18s %10s %10s %7s\n",
4702#else
5c1c5e67 4703 printf_filtered ("\t%10s %10s %10s %10s %7s\n",
2592eef8 4704#endif
cc221e76
FF
4705 "Start Addr",
4706 " End Addr",
4707 " Size",
4708 " Offset",
4709 "Flags");
234a732d
GN
4710#ifdef PROCFS_USE_READ_WRITE
4711 if (fstat (pip->map_fd, &sbuf) == 0)
4712 {
4713 nmap = sbuf.st_size / sizeof (prmap_t);
4714 prmaps = (struct prmap *) alloca ((nmap + 1) * sizeof (*prmaps));
4715 if ((lseek (pip->map_fd, 0, SEEK_SET) == 0) &&
4716 (read (pip->map_fd, (char *) prmaps,
4717 nmap * sizeof (*prmaps)) == (nmap * sizeof (*prmaps))))
4718 {
4719 int i = 0;
4720 for (prmap = prmaps; i < nmap; ++prmap, ++i)
4721#else
4722 if (ioctl (pip -> ctl_fd, PIOCNMAP, &nmap) == 0)
a39ad5ce 4723 {
cc221e76 4724 prmaps = (struct prmap *) alloca ((nmap + 1) * sizeof (*prmaps));
234a732d 4725 if (ioctl (pip -> ctl_fd, PIOCMAP, prmaps) == 0)
a39ad5ce 4726 {
cc221e76 4727 for (prmap = prmaps; prmap -> pr_size; ++prmap)
234a732d 4728#endif /* PROCFS_USE_READ_WRITE */
cc221e76 4729 {
2592eef8
PS
4730#ifdef BFD_HOST_64_BIT
4731 printf_filtered (" %#18lx %#18lx %#10x %#10x %7s\n",
4732#else
4733 printf_filtered ("\t%#10lx %#10lx %#10x %#10x %7s\n",
4734#endif
4735 (unsigned long)prmap -> pr_vaddr,
4736 (unsigned long)prmap -> pr_vaddr
4737 + prmap -> pr_size - 1,
cc221e76
FF
4738 prmap -> pr_size,
4739 prmap -> pr_off,
4740 mappingflags (prmap -> pr_mflags));
4741 }
a39ad5ce
FF
4742 }
4743 }
cc221e76 4744 printf_filtered ("\n");
a39ad5ce 4745 }
a39ad5ce
FF
4746}
4747
4748/*
4749
4750LOCAL FUNCTION
4751
cc221e76 4752 info_proc -- implement the "info proc" command
a39ad5ce
FF
4753
4754SYNOPSIS
4755
cc221e76 4756 void info_proc (char *args, int from_tty)
a39ad5ce
FF
4757
4758DESCRIPTION
4759
4760 Implement gdb's "info proc" command by using the /proc interface
4761 to print status information about any currently running process.
4762
4763 Examples of the use of "info proc" are:
4764
cc221e76
FF
4765 info proc (prints summary info for current inferior)
4766 info proc 123 (prints summary info for process with pid 123)
4767 info proc mappings (prints address mappings)
4768 info proc times (prints process/children times)
4769 info proc id (prints pid, ppid, gid, sid, etc)
3fbdd536 4770 FIXME: i proc id not implemented.
cc221e76 4771 info proc status (prints general process state info)
3fbdd536 4772 FIXME: i proc status not implemented.
cc221e76
FF
4773 info proc signals (prints info about signal handling)
4774 info proc all (prints all info)
a39ad5ce
FF
4775
4776 */
4777
4778static void
cc221e76 4779info_proc (args, from_tty)
1ab3bf1b
JG
4780 char *args;
4781 int from_tty;
a39ad5ce 4782{
3780c337 4783 int pid;
a39ad5ce
FF
4784 struct procinfo *pip;
4785 struct cleanup *old_chain;
cc221e76
FF
4786 char **argv;
4787 int argsize;
4788 int summary = 1;
4789 int flags = 0;
4790 int syscalls = 0;
4791 int signals = 0;
4792 int faults = 0;
4793 int mappings = 0;
4794 int times = 0;
4795 int id = 0;
4796 int status = 0;
4797 int all = 0;
8fc2b417 4798 int nlwp;
47ef0da5 4799 int *lwps;
a39ad5ce
FF
4800
4801 old_chain = make_cleanup (null_cleanup, 0);
4802
de43d7d0
SG
4803 /* Default to using the current inferior if no pid specified. Note
4804 that inferior_pid may be 0, hence we set okerr. */
a39ad5ce 4805
3780c337
MS
4806 pid = inferior_pid & 0x7fffffff; /* strip off sol-thread bit */
4807 if (!(pip = find_procinfo (pid, 1))) /* inferior_pid no good? */
4808 pip = procinfo_list; /* take first available */
4809 pid = pid & 0xffff; /* extract "real" pid */
a39ad5ce 4810
a39ad5ce 4811 if (args != NULL)
35f5886e 4812 {
cc221e76 4813 if ((argv = buildargv (args)) == NULL)
a39ad5ce 4814 {
cc221e76
FF
4815 nomem (0);
4816 }
4817 make_cleanup (freeargv, (char *) argv);
4818
4819 while (*argv != NULL)
4820 {
4821 argsize = strlen (*argv);
4822 if (argsize >= 1 && strncmp (*argv, "all", argsize) == 0)
4823 {
4824 summary = 0;
4825 all = 1;
4826 }
4827 else if (argsize >= 2 && strncmp (*argv, "faults", argsize) == 0)
4828 {
4829 summary = 0;
4830 faults = 1;
4831 }
4832 else if (argsize >= 2 && strncmp (*argv, "flags", argsize) == 0)
4833 {
4834 summary = 0;
4835 flags = 1;
4836 }
4837 else if (argsize >= 1 && strncmp (*argv, "id", argsize) == 0)
4838 {
4839 summary = 0;
4840 id = 1;
4841 }
4842 else if (argsize >= 1 && strncmp (*argv, "mappings", argsize) == 0)
4843 {
4844 summary = 0;
4845 mappings = 1;
4846 }
4847 else if (argsize >= 2 && strncmp (*argv, "signals", argsize) == 0)
4848 {
4849 summary = 0;
4850 signals = 1;
4851 }
4852 else if (argsize >= 2 && strncmp (*argv, "status", argsize) == 0)
4853 {
4854 summary = 0;
4855 status = 1;
4856 }
4857 else if (argsize >= 2 && strncmp (*argv, "syscalls", argsize) == 0)
4858 {
4859 summary = 0;
4860 syscalls = 1;
4861 }
4862 else if (argsize >= 1 && strncmp (*argv, "times", argsize) == 0)
a39ad5ce 4863 {
cc221e76
FF
4864 summary = 0;
4865 times = 1;
a39ad5ce 4866 }
de43d7d0 4867 else if ((pid = atoi (*argv)) > 0)
a39ad5ce 4868 {
de43d7d0
SG
4869 pip = (struct procinfo *) xmalloc (sizeof (struct procinfo));
4870 memset (pip, 0, sizeof (*pip));
4871
4872 pip->pid = pid;
234a732d 4873 if (!open_proc_file (pid, pip, O_RDONLY, 0))
a39ad5ce
FF
4874 {
4875 perror_with_name (pip -> pathname);
4876 /* NOTREACHED */
4877 }
8fc2b417 4878 pid = pip->pid;
a39ad5ce
FF
4879 make_cleanup (close_proc_file, pip);
4880 }
cc221e76
FF
4881 else if (**argv != '\000')
4882 {
4883 error ("Unrecognized or ambiguous keyword `%s'.", *argv);
4884 }
4885 argv++;
a39ad5ce 4886 }
35f5886e 4887 }
a39ad5ce
FF
4888
4889 /* If we don't have a valid open process at this point, then we have no
4890 inferior or didn't specify a specific pid. */
4891
de43d7d0 4892 if (!pip)
35f5886e 4893 {
6fe90fc8
JK
4894 error ("\
4895No process. Start debugging a program or specify an explicit process ID.");
35f5886e 4896 }
234a732d
GN
4897
4898 if (!procfs_read_status (pip))
35f5886e 4899 {
a39ad5ce 4900 print_sys_errmsg (pip -> pathname, errno);
234a732d 4901 error ("procfs_read_status failed");
35f5886e 4902 }
a39ad5ce 4903
234a732d 4904#ifndef PROCFS_USE_READ_WRITE
8fc2b417
SG
4905#ifdef PIOCLWPIDS
4906 nlwp = pip->prstatus.pr_nlwp;
3780c337 4907 lwps = alloca ((2 * nlwp + 2) * sizeof (*lwps));
cc221e76 4908
234a732d 4909 if (ioctl (pip->ctl_fd, PIOCLWPIDS, lwps))
cc221e76 4910 {
8fc2b417 4911 print_sys_errmsg (pip -> pathname, errno);
3780c337 4912 error ("PIOCLWPIDS failed");
cc221e76 4913 }
8fc2b417
SG
4914#else /* PIOCLWPIDS */
4915 nlwp = 1;
47ef0da5 4916 lwps = alloca ((2 * nlwp + 2) * sizeof *lwps);
8fc2b417
SG
4917 lwps[0] = 0;
4918#endif /* PIOCLWPIDS */
4919
4920 for (; nlwp > 0; nlwp--, lwps++)
cc221e76 4921 {
8fc2b417
SG
4922 pip = find_procinfo ((*lwps << 16) | pid, 1);
4923
4924 if (!pip)
4925 {
4926 pip = (struct procinfo *) xmalloc (sizeof (struct procinfo));
4927 memset (pip, 0, sizeof (*pip));
234a732d 4928 if (!open_proc_file ((*lwps << 16) | pid, pip, O_RDONLY, 0))
8fc2b417
SG
4929 continue;
4930
4931 make_cleanup (close_proc_file, pip);
4932
234a732d 4933 if (!procfs_read_status (pip))
8fc2b417
SG
4934 {
4935 print_sys_errmsg (pip -> pathname, errno);
234a732d 4936 error ("procfs_read_status failed");
8fc2b417
SG
4937 }
4938 }
4939
234a732d
GN
4940#endif /* PROCFS_USE_READ_WRITE */
4941
8fc2b417
SG
4942 /* Print verbose information of the requested type(s), or just a summary
4943 of the information for all types. */
4944
4945 printf_filtered ("\nInformation for %s.%d:\n\n", pip -> pathname, *lwps);
4946 if (summary || all || flags)
4947 {
4948 info_proc_flags (pip, summary);
4949 }
4950 if (summary || all)
4951 {
4952 info_proc_stop (pip, summary);
1e50f1b4
JM
4953#ifdef UNIXWARE
4954 supply_gregset (&pip->prstatus.pr_lwp.pr_context.uc_mcontext.gregs);
4955#else
3780c337 4956 supply_gregset (&pip->prstatus.pr_reg);
1e50f1b4 4957#endif
3780c337
MS
4958 printf_filtered ("PC: ");
4959 print_address (read_pc (), gdb_stdout);
4960 printf_filtered ("\n");
8fc2b417
SG
4961 }
4962 if (summary || all || signals || faults)
4963 {
4964 info_proc_siginfo (pip, summary);
4965 }
4966 if (summary || all || syscalls)
4967 {
4968 info_proc_syscalls (pip, summary);
4969 }
4970 if (summary || all || mappings)
4971 {
4972 info_proc_mappings (pip, summary);
4973 }
4974 if (summary || all || signals)
4975 {
4976 info_proc_signals (pip, summary);
4977 }
4978 if (summary || all || faults)
4979 {
4980 info_proc_faults (pip, summary);
4981 }
4982 printf_filtered ("\n");
4983
4984 /* All done, deal with closing any temporary process info structure,
4985 freeing temporary memory , etc. */
4986
4987 do_cleanups (old_chain);
234a732d 4988#ifndef PROCFS_USE_READ_WRITE
cc221e76 4989 }
234a732d 4990#endif
8fc2b417
SG
4991}
4992
4993/*
4994
4995LOCAL FUNCTION
4996
4997 modify_inherit_on_fork_flag - Change the inherit-on-fork flag
4998
4999SYNOPSIS
5000
5001 void modify_inherit_on_fork_flag (fd, flag)
5002
5003DESCRIPTION
5004
5005 Call this routine to modify the inherit-on-fork flag. This routine is
5006 just a nice wrapper to hide the #ifdefs needed by various systems to
5007 control this flag.
5008
5009 */
5010
5011static void
5012modify_inherit_on_fork_flag (fd, flag)
5013 int fd;
5014 int flag;
5015{
234a732d 5016#if defined (PIOCSET) || defined (PCSET)
8fc2b417 5017 long pr_flags;
b607efe7 5018#endif
234a732d
GN
5019 int retval = 0;
5020 struct proc_ctl pctl;
8fc2b417 5021
234a732d 5022#if defined (PIOCSET) || defined (PCSET) /* New method */
8fc2b417
SG
5023 pr_flags = PR_FORK;
5024 if (flag)
234a732d
GN
5025 {
5026#ifdef PROCFS_USE_READ_WRITE
5027 pctl.cmd = PCSET;
5028 pctl.data = PR_FORK;
5029 if (write (fd, (char *) &pctl, sizeof (struct proc_ctl)) < 0)
5030 retval = -1;
5031#else
5032 retval = ioctl (fd, PIOCSET, &pr_flags);
5033#endif
5034 }
8fc2b417 5035 else
234a732d
GN
5036 {
5037#ifdef PROCFS_USE_READ_WRITE
5038 pctl.cmd = PCRESET;
5039 pctl.data = PR_FORK;
5040 if (write (fd, (char *) &pctl, sizeof (struct proc_ctl)) < 0)
5041 retval = -1;
5042#else
5043 retval = ioctl (fd, PIOCRESET, &pr_flags);
5044#endif
5045 }
8fc2b417
SG
5046
5047#else
5048#ifdef PIOCSFORK /* Original method */
5049 if (flag)
234a732d
GN
5050 {
5051 retval = ioctl (fd, PIOCSFORK, NULL);
5052 }
8fc2b417 5053 else
234a732d
GN
5054 {
5055 retval = ioctl (fd, PIOCRFORK, NULL);
5056 }
8fc2b417
SG
5057#else
5058 Neither PR_FORK nor PIOCSFORK exist!!!
5059#endif
5060#endif
5061
5062 if (!retval)
5063 return;
5064
5065 print_sys_errmsg ("modify_inherit_on_fork_flag", errno);
5066 error ("PIOCSFORK or PR_FORK modification failed");
5067}
5068
5069/*
5070
5071LOCAL FUNCTION
5072
5073 modify_run_on_last_close_flag - Change the run-on-last-close flag
5074
5075SYNOPSIS
5076
5077 void modify_run_on_last_close_flag (fd, flag)
5078
5079DESCRIPTION
5080
5081 Call this routine to modify the run-on-last-close flag. This routine
5082 is just a nice wrapper to hide the #ifdefs needed by various systems to
5083 control this flag.
5084
5085 */
5086
5087static void
5088modify_run_on_last_close_flag (fd, flag)
5089 int fd;
5090 int flag;
5091{
234a732d 5092#if defined (PIOCSET) || defined (PCSET)
8fc2b417 5093 long pr_flags;
b607efe7 5094#endif
234a732d
GN
5095 int retval = 0;
5096 struct proc_ctl pctl;
8fc2b417 5097
234a732d 5098#if defined (PIOCSET) || defined (PCSET) /* New method */
8fc2b417
SG
5099 pr_flags = PR_RLC;
5100 if (flag)
234a732d
GN
5101 {
5102#ifdef PROCFS_USE_READ_WRITE
5103 pctl.cmd = PCSET;
5104 pctl.data = PR_RLC;
5105 if (write (fd, (char *) &pctl, sizeof (struct proc_ctl)) < 0)
5106 retval = -1;
5107#else
5108 retval = ioctl (fd, PIOCSET, &pr_flags);
5109#endif
5110 }
8fc2b417 5111 else
234a732d
GN
5112 {
5113#ifdef PROCFS_USE_READ_WRITE
5114 pctl.cmd = PCRESET;
5115 pctl.data = PR_RLC;
5116 if (write (fd, (char *) &pctl, sizeof (struct proc_ctl)) < 0)
5117 retval = -1;
5118#else
5119 retval = ioctl (fd, PIOCRESET, &pr_flags);
5120#endif
5121 }
8fc2b417
SG
5122
5123#else
5124#ifdef PIOCSRLC /* Original method */
5125 if (flag)
5126 retval = ioctl (fd, PIOCSRLC, NULL);
5127 else
5128 retval = ioctl (fd, PIOCRRLC, NULL);
5129#else
5130 Neither PR_RLC nor PIOCSRLC exist!!!
5131#endif
5132#endif
5133
5134 if (!retval)
5135 return;
5136
5137 print_sys_errmsg ("modify_run_on_last_close_flag", errno);
5138 error ("PIOCSRLC or PR_RLC modification failed");
5139}
5140
5141/*
5142
5143LOCAL FUNCTION
5144
5145 procfs_clear_syscall_trap -- Deletes the trap for the specified system call.
5146
5147SYNOPSIS
5148
5149 void procfs_clear_syscall_trap (struct procinfo *, int syscall_num, int errok)
5150
5151DESCRIPTION
5152
5153 This function function disables traps for the specified system call.
5154 errok is non-zero if errors should be ignored.
5155 */
5156
5157static void
5158procfs_clear_syscall_trap (pi, syscall_num, errok)
5159 struct procinfo *pi;
5160 int syscall_num;
5161 int errok;
5162{
5163 sysset_t sysset;
5164 int goterr, i;
1e50f1b4
JM
5165
5166#ifndef UNIXWARE
234a732d 5167 goterr = ioctl (pi->ctl_fd, PIOCGENTRY, &sysset) < 0;
8fc2b417
SG
5168
5169 if (goterr && !errok)
cc221e76 5170 {
8fc2b417
SG
5171 print_sys_errmsg (pi->pathname, errno);
5172 error ("PIOCGENTRY failed");
cc221e76 5173 }
8fc2b417
SG
5174
5175 if (!goterr)
cc221e76 5176 {
8fc2b417
SG
5177 prdelset (&sysset, syscall_num);
5178
234a732d 5179 if ((ioctl (pi->ctl_fd, PIOCSENTRY, &sysset) < 0) && !errok)
8fc2b417
SG
5180 {
5181 print_sys_errmsg (pi->pathname, errno);
5182 error ("PIOCSENTRY failed");
5183 }
cc221e76 5184 }
8fc2b417 5185
234a732d 5186 goterr = ioctl (pi->ctl_fd, PIOCGEXIT, &sysset) < 0;
8fc2b417
SG
5187
5188 if (goterr && !errok)
cc221e76 5189 {
8fc2b417
SG
5190 procfs_clear_syscall_trap (pi, syscall_num, 1);
5191 print_sys_errmsg (pi->pathname, errno);
5192 error ("PIOCGEXIT failed");
cc221e76 5193 }
8fc2b417
SG
5194
5195 if (!goterr)
cc221e76 5196 {
8fc2b417
SG
5197 praddset (&sysset, syscall_num);
5198
234a732d 5199 if ((ioctl (pi->ctl_fd, PIOCSEXIT, &sysset) < 0) && !errok)
8fc2b417
SG
5200 {
5201 procfs_clear_syscall_trap (pi, syscall_num, 1);
5202 print_sys_errmsg (pi->pathname, errno);
5203 error ("PIOCSEXIT failed");
5204 }
cc221e76 5205 }
1e50f1b4 5206#endif
8fc2b417
SG
5207
5208 if (!pi->syscall_handlers)
cc221e76 5209 {
8fc2b417
SG
5210 if (!errok)
5211 error ("procfs_clear_syscall_trap: syscall_handlers is empty");
5212 return;
cc221e76 5213 }
a39ad5ce 5214
8fc2b417 5215 /* Remove handler func from the handler list */
a39ad5ce 5216
8fc2b417
SG
5217 for (i = 0; i < pi->num_syscall_handlers; i++)
5218 if (pi->syscall_handlers[i].syscall_num == syscall_num)
5219 {
5220 if (i + 1 != pi->num_syscall_handlers)
5221 { /* Not the last entry.
5222 Move subsequent entries fwd. */
5223 memcpy (&pi->syscall_handlers[i], &pi->syscall_handlers[i + 1],
5224 (pi->num_syscall_handlers - i - 1)
5225 * sizeof (struct procfs_syscall_handler));
5226 }
5227
5228 pi->syscall_handlers = xrealloc (pi->syscall_handlers,
5229 (pi->num_syscall_handlers - 1)
5230 * sizeof (struct procfs_syscall_handler));
5231 pi->num_syscall_handlers--;
5232 return;
5233 }
5234
5235 if (!errok)
5236 error ("procfs_clear_syscall_trap: Couldn't find handler for sys call %d",
5237 syscall_num);
a39ad5ce
FF
5238}
5239
de43d7d0
SG
5240/*
5241
5242LOCAL FUNCTION
5243
8fc2b417
SG
5244 procfs_set_syscall_trap -- arrange for a function to be called when the
5245 child executes the specified system call.
de43d7d0
SG
5246
5247SYNOPSIS
5248
8fc2b417
SG
5249 void procfs_set_syscall_trap (struct procinfo *, int syscall_num, int flags,
5250 syscall_func_t *function)
de43d7d0
SG
5251
5252DESCRIPTION
5253
8fc2b417
SG
5254 This function sets up an entry and/or exit trap for the specified system
5255 call. When the child executes the specified system call, your function
5256 will be called with the call #, a flag that indicates entry or exit, and
5257 pointers to rtnval and statval (which are used by procfs_wait). The
5258 function should return non-zero if something interesting happened, zero
5259 otherwise.
de43d7d0
SG
5260 */
5261
5262static void
8fc2b417 5263procfs_set_syscall_trap (pi, syscall_num, flags, func)
de43d7d0 5264 struct procinfo *pi;
8fc2b417
SG
5265 int syscall_num;
5266 int flags;
5267 syscall_func_t *func;
de43d7d0 5268{
8fc2b417 5269 sysset_t sysset;
3780c337 5270
1e50f1b4 5271#ifndef UNIXWARE
8fc2b417 5272 if (flags & PROCFS_SYSCALL_ENTRY)
de43d7d0 5273 {
234a732d 5274 if (ioctl (pi->ctl_fd, PIOCGENTRY, &sysset) < 0)
8fc2b417
SG
5275 {
5276 print_sys_errmsg (pi->pathname, errno);
5277 error ("PIOCGENTRY failed");
5278 }
5279
5280 praddset (&sysset, syscall_num);
5281
234a732d 5282 if (ioctl (pi->ctl_fd, PIOCSENTRY, &sysset) < 0)
8fc2b417
SG
5283 {
5284 print_sys_errmsg (pi->pathname, errno);
5285 error ("PIOCSENTRY failed");
5286 }
de43d7d0
SG
5287 }
5288
8fc2b417
SG
5289 if (flags & PROCFS_SYSCALL_EXIT)
5290 {
234a732d 5291 if (ioctl (pi->ctl_fd, PIOCGEXIT, &sysset) < 0)
8fc2b417
SG
5292 {
5293 procfs_clear_syscall_trap (pi, syscall_num, 1);
5294 print_sys_errmsg (pi->pathname, errno);
5295 error ("PIOCGEXIT failed");
5296 }
de43d7d0 5297
8fc2b417 5298 praddset (&sysset, syscall_num);
eca4a350 5299
234a732d 5300 if (ioctl (pi->ctl_fd, PIOCSEXIT, &sysset) < 0)
8fc2b417
SG
5301 {
5302 procfs_clear_syscall_trap (pi, syscall_num, 1);
5303 print_sys_errmsg (pi->pathname, errno);
5304 error ("PIOCSEXIT failed");
5305 }
5306 }
1e50f1b4 5307#endif
eca4a350 5308
8fc2b417 5309 if (!pi->syscall_handlers)
de43d7d0 5310 {
8fc2b417
SG
5311 pi->syscall_handlers = xmalloc (sizeof (struct procfs_syscall_handler));
5312 pi->syscall_handlers[0].syscall_num = syscall_num;
5313 pi->syscall_handlers[0].func = func;
5314 pi->num_syscall_handlers = 1;
de43d7d0 5315 }
8fc2b417
SG
5316 else
5317 {
5318 int i;
de43d7d0 5319
8fc2b417
SG
5320 for (i = 0; i < pi->num_syscall_handlers; i++)
5321 if (pi->syscall_handlers[i].syscall_num == syscall_num)
5322 {
5323 pi->syscall_handlers[i].func = func;
5324 return;
5325 }
de43d7d0 5326
8fc2b417
SG
5327 pi->syscall_handlers = xrealloc (pi->syscall_handlers, (i + 1)
5328 * sizeof (struct procfs_syscall_handler));
5329 pi->syscall_handlers[i].syscall_num = syscall_num;
5330 pi->syscall_handlers[i].func = func;
5331 pi->num_syscall_handlers++;
5332 }
de43d7d0 5333}
8fc2b417
SG
5334
5335#ifdef SYS_lwp_create
5336
5337/*
5338
5339LOCAL FUNCTION
5340
5341 procfs_lwp_creation_handler - handle exit from the _lwp_create syscall
5342
5343SYNOPSIS
5344
5345 int procfs_lwp_creation_handler (pi, syscall_num, why, rtnvalp, statvalp)
5346
5347DESCRIPTION
5348
5349 This routine is called both when an inferior process and it's new lwp
5350 are about to finish a _lwp_create() system call. This is the system
5351 call that Solaris uses to create a lightweight process. When the
5352 target process gets this event, we can look at sysarg[2] to find the
5353 new childs lwp ID, and create a procinfo struct from that. After that,
5354 we pretend that we got a SIGTRAP, and return non-zero to tell
5355 procfs_wait to wake up. Subsequently, wait_for_inferior gets woken up,
5356 sees the new process and continues it.
5357
5358 When we see the child exiting from lwp_create, we just contine it,
5359 since everything was handled when the parent trapped.
5360
5361NOTES
5362 In effect, we are only paying attention to the parent's completion of
5363 the lwp_create syscall. If we only paid attention to the child
5364 instead, then we wouldn't detect the creation of a suspended thread.
5365 */
5366
5367static int
5368procfs_lwp_creation_handler (pi, syscall_num, why, rtnvalp, statvalp)
5369 struct procinfo *pi;
5370 int syscall_num;
5371 int why;
5372 int *rtnvalp;
5373 int *statvalp;
5374{
5375 int lwp_id;
5376 struct procinfo *childpi;
1e50f1b4 5377 struct proc_ctl pctl;
8fc2b417
SG
5378
5379 /* We've just detected the completion of an lwp_create system call. Now we
5380 need to setup a procinfo struct for this thread, and notify the thread
5381 system of the new arrival. */
5382
5383 /* If lwp_create failed, then nothing interesting happened. Continue the
5384 process and go back to sleep. */
5385
1e50f1b4
JM
5386#ifdef UNIXWARE
5387 /* Joel ... can you check this logic out please? JKJ */
5388 if (pi->prstatus.pr_lwp.pr_context.uc_mcontext.gregs[R_EFL] & 1)
5389 { /* _lwp_create failed */
5390 pctl.cmd = PCRUN;
5391 pctl.data = PRCFAULT;
5392
5393 if (write (pi->ctl_fd, (char *) &pctl, sizeof (struct proc_ctl)) < 0)
5394 perror_with_name (pi->pathname);
5395
5396 return 0;
5397 }
5398#else /* UNIXWARE */
f0fce3b8 5399 if (PROCFS_GET_CARRY (pi->prstatus.pr_reg))
8fc2b417
SG
5400 { /* _lwp_create failed */
5401 pi->prrun.pr_flags &= PRSTEP;
5402 pi->prrun.pr_flags |= PRCFAULT;
5403
234a732d 5404 if (ioctl (pi->ctl_fd, PIOCRUN, &pi->prrun) != 0)
8fc2b417
SG
5405 perror_with_name (pi->pathname);
5406
5407 return 0;
5408 }
1e50f1b4 5409#endif
8fc2b417
SG
5410
5411 /* At this point, the new thread is stopped at it's first instruction, and
5412 the parent is stopped at the exit from lwp_create. */
5413
5414 if (pi->new_child) /* Child? */
5415 { /* Yes, just continue it */
1e50f1b4
JM
5416#ifdef UNIXWARE
5417 pctl.cmd = PCRUN;
5418 pctl.data = PRCFAULT;
5419
5420 if (write(pi->ctl_fd, (char *)&pctl, sizeof (struct proc_ctl)) < 0)
5421#else /* !UNIXWARE */
8fc2b417
SG
5422 pi->prrun.pr_flags &= PRSTEP;
5423 pi->prrun.pr_flags |= PRCFAULT;
5424
5425 if ((pi->prstatus.pr_flags & PR_ISTOP)
234a732d 5426 && ioctl (pi->ctl_fd, PIOCRUN, &pi->prrun) != 0)
1e50f1b4 5427#endif /* !UNIXWARE */
8fc2b417
SG
5428 perror_with_name (pi->pathname);
5429
5430 pi->new_child = 0; /* No longer new */
5431
5432 return 0;
5433 }
5434
5435 /* We're the proud parent of a new thread. Setup an exit trap for lwp_create
5436 in the child and continue the parent. */
3780c337 5437
8fc2b417 5438 /* Third arg is pointer to new thread id. */
1e50f1b4
JM
5439#ifdef UNIXWARE
5440 lwp_id = read_memory_integer (pi->prstatus.pr_lwp.pr_sysarg[2], sizeof (int));
5441#else
8fc2b417 5442 lwp_id = read_memory_integer (pi->prstatus.pr_sysarg[2], sizeof (int));
1e50f1b4 5443#endif
8fc2b417
SG
5444
5445 lwp_id = (lwp_id << 16) | PIDGET (pi->pid);
5446
5447 childpi = create_procinfo (lwp_id);
5448
5449 /* The new process has actually inherited the lwp_create syscall trap from
3780c337 5450 it's parent, but we still have to call this to register handlers for
8fc2b417
SG
5451 that child. */
5452
3780c337
MS
5453 procfs_set_inferior_syscall_traps (childpi);
5454 add_thread (lwp_id);
5455 printf_filtered ("[New %s]\n", target_pid_to_str (lwp_id));
8fc2b417 5456
3780c337 5457 /* Continue the parent */
1e50f1b4
JM
5458#ifdef UNIXWARE
5459 pctl.cmd = PCRUN;
5460 pctl.data = PRCFAULT;
8fc2b417 5461
1e50f1b4
JM
5462 if (write(pi->ctl_fd, (char *)&pctl, sizeof (struct proc_ctl)) < 0)
5463#else
3780c337
MS
5464 pi->prrun.pr_flags &= PRSTEP;
5465 pi->prrun.pr_flags |= PRCFAULT;
5466 if (ioctl (pi->ctl_fd, PIOCRUN, &pi->prrun) != 0)
1e50f1b4 5467#endif
3780c337 5468 perror_with_name (pi->pathname);
8fc2b417 5469
3780c337
MS
5470 /* The new child may have been created in one of two states:
5471 SUSPENDED or RUNNABLE. If runnable, we will simply signal it to run.
5472 If suspended, we flag it to be continued later, when it has an event. */
5473
1e50f1b4
JM
5474#ifdef UNIXWARE
5475 if (childpi->prstatus.pr_lwp.pr_why == PR_SUSPENDED)
5476#else
3780c337 5477 if (childpi->prstatus.pr_why == PR_SUSPENDED)
1e50f1b4 5478#endif
3780c337
MS
5479 childpi->new_child = 1; /* Flag this as an unseen child process */
5480 else
5481 {
5482 /* Continue the child */
1e50f1b4
JM
5483#ifdef UNIXWARE
5484 pctl.cmd = PCRUN;
5485 pctl.data = PRCFAULT;
5486
5487 if (write(pi->ctl_fd, (char *)&pctl, sizeof (struct proc_ctl)) < 0)
5488#else
3780c337
MS
5489 childpi->prrun.pr_flags &= PRSTEP;
5490 childpi->prrun.pr_flags |= PRCFAULT;
5491
5492 if (ioctl (childpi->ctl_fd, PIOCRUN, &childpi->prrun) != 0)
1e50f1b4 5493#endif
3780c337
MS
5494 perror_with_name (childpi->pathname);
5495 }
5496 return 0;
8fc2b417
SG
5497}
5498#endif /* SYS_lwp_create */
de43d7d0 5499
3fbdd536
JG
5500/* Fork an inferior process, and start debugging it with /proc. */
5501
5502static void
5503procfs_create_inferior (exec_file, allargs, env)
5504 char *exec_file;
5505 char *allargs;
5506 char **env;
5507{
08f74b92
JK
5508 char *shell_file = getenv ("SHELL");
5509 char *tryname;
5510 if (shell_file != NULL && strchr (shell_file, '/') == NULL)
5511 {
5512
5513 /* We will be looking down the PATH to find shell_file. If we
5514 just do this the normal way (via execlp, which operates by
5515 attempting an exec for each element of the PATH until it
5516 finds one which succeeds), then there will be an exec for
5517 each failed attempt, each of which will cause a PR_SYSEXIT
5518 stop, and we won't know how to distinguish the PR_SYSEXIT's
5519 for these failed execs with the ones for successful execs
5520 (whether the exec has succeeded is stored at that time in the
5521 carry bit or some such architecture-specific and
5522 non-ABI-specified place).
5523
5524 So I can't think of anything better than to search the PATH
5525 now. This has several disadvantages: (1) There is a race
5526 condition; if we find a file now and it is deleted before we
5527 exec it, we lose, even if the deletion leaves a valid file
5528 further down in the PATH, (2) there is no way to know exactly
5529 what an executable (in the sense of "capable of being
5530 exec'd") file is. Using access() loses because it may lose
5531 if the caller is the superuser; failing to use it loses if
5532 there are ACLs or some such. */
5533
5534 char *p;
5535 char *p1;
f93b941b
JK
5536 /* FIXME-maybe: might want "set path" command so user can change what
5537 path is used from within GDB. */
08f74b92
JK
5538 char *path = getenv ("PATH");
5539 int len;
5540 struct stat statbuf;
5541
5542 if (path == NULL)
5543 path = "/bin:/usr/bin";
5544
5545 tryname = alloca (strlen (path) + strlen (shell_file) + 2);
5546 for (p = path; p != NULL; p = p1 ? p1 + 1: NULL)
5547 {
5548 p1 = strchr (p, ':');
5549 if (p1 != NULL)
5550 len = p1 - p;
5551 else
5552 len = strlen (p);
5553 strncpy (tryname, p, len);
5554 tryname[len] = '\0';
5555 strcat (tryname, "/");
5556 strcat (tryname, shell_file);
5557 if (access (tryname, X_OK) < 0)
5558 continue;
5559 if (stat (tryname, &statbuf) < 0)
5560 continue;
5561 if (!S_ISREG (statbuf.st_mode))
5562 /* We certainly need to reject directories. I'm not quite
5563 as sure about FIFOs, sockets, etc., but I kind of doubt
5564 that people want to exec() these things. */
5565 continue;
5566 break;
5567 }
5568 if (p == NULL)
5569 /* Not found. This must be an error rather than merely passing
5570 the file to execlp(), because execlp() would try all the
5571 exec()s, causing GDB to get confused. */
5572 error ("Can't find shell %s in PATH", shell_file);
5573
5574 shell_file = tryname;
5575 }
5576
3fbdd536 5577 fork_inferior (exec_file, allargs, env,
08f74b92
JK
5578 proc_set_exec_trap, procfs_init_inferior, shell_file);
5579
3fbdd536
JG
5580 /* We are at the first instruction we care about. */
5581 /* Pedal to the metal... */
de43d7d0 5582
67ac9759 5583 proceed ((CORE_ADDR) -1, TARGET_SIGNAL_0, 0);
3fbdd536
JG
5584}
5585
5586/* Clean up after the inferior dies. */
5587
5588static void
5589procfs_mourn_inferior ()
5590{
fb63d460 5591 struct procinfo *pi;
cd4104e0 5592 struct procinfo *next_pi;
fb63d460 5593
cd4104e0
TL
5594 for (pi = procinfo_list; pi; pi = next_pi)
5595 {
5596 next_pi = pi->next;
5597 unconditionally_kill_inferior (pi);
5598 }
fb63d460 5599
3fbdd536
JG
5600 unpush_target (&procfs_ops);
5601 generic_mourn_inferior ();
5602}
5603
cd4104e0 5604
3fbdd536
JG
5605/* Mark our target-struct as eligible for stray "run" and "attach" commands. */
5606static int
5607procfs_can_run ()
5608{
8fc2b417
SG
5609 /* This variable is controlled by modules that sit atop procfs that may layer
5610 their own process structure atop that provided here. sol-thread.c does
5611 this because of the Solaris two-level thread model. */
5612
5613 return !procfs_suppress_run;
3fbdd536 5614}
f5a8f1a6 5615#ifdef TARGET_HAS_HARDWARE_WATCHPOINTS
1e50f1b4 5616#ifndef UNIXWARE
999dd04b
JL
5617\f
5618/* Insert a watchpoint */
5619int
5620procfs_set_watchpoint(pid, addr, len, rw)
5621 int pid;
5622 CORE_ADDR addr;
5623 int len;
5624 int rw;
5625{
5626 struct procinfo *pi;
5627 prwatch_t wpt;
5628
5629 pi = find_procinfo (pid == -1 ? inferior_pid : pid, 0);
5630 wpt.pr_vaddr = (caddr_t)addr;
5631 wpt.pr_size = len;
5632 wpt.pr_wflags = ((rw & 1) ? MA_READ : 0) | ((rw & 2) ? MA_WRITE : 0);
234a732d 5633 if (ioctl (pi->ctl_fd, PIOCSWATCH, &wpt) < 0)
999dd04b
JL
5634 {
5635 if (errno == E2BIG)
5636 return -1;
5637 /* Currently it sometimes happens that the same watchpoint gets
5638 deleted twice - don't die in this case (FIXME please) */
5639 if (errno == ESRCH && len == 0)
5640 return 0;
5641 print_sys_errmsg (pi->pathname, errno);
5642 error ("PIOCSWATCH failed");
5643 }
5644 return 0;
5645}
5646
5647int
5648procfs_stopped_by_watchpoint(pid)
5649 int pid;
5650{
5651 struct procinfo *pi;
5652 short what;
5653 short why;
5654
5655 pi = find_procinfo (pid == -1 ? inferior_pid : pid, 0);
5656 if (pi->prstatus.pr_flags & (PR_STOPPED | PR_ISTOP))
5657 {
5658 why = pi->prstatus.pr_why;
5659 what = pi->prstatus.pr_what;
5660 if (why == PR_FAULTED
6bc194d2 5661#if defined (FLTWATCH) && defined (FLTKWATCH)
255181a9 5662 && (what == FLTWATCH || what == FLTKWATCH)
6bc194d2
JL
5663#else
5664#ifdef FLTWATCH
5665 && (what == FLTWATCH)
5666#endif
5667#ifdef FLTKWATCH
5668 && (what == FLTKWATCH)
5669#endif
72b8ca51 5670#endif
6bc194d2 5671 )
999dd04b
JL
5672 return what;
5673 }
5674 return 0;
5675}
1e50f1b4 5676#endif /* !UNIXWARE */
234a732d 5677#endif /* TARGET_HAS_HARDWARE_WATCHPOINTS */
999dd04b 5678
8fc2b417
SG
5679/* Why is this necessary? Shouldn't dead threads just be removed from the
5680 thread database? */
5681
9b33e492 5682static int
8fc2b417
SG
5683procfs_thread_alive (pid)
5684 int pid;
5685{
3780c337
MS
5686 struct procinfo *pi, *next_pi;
5687
5688 for (pi = procinfo_list; pi; pi = next_pi)
5689 {
5690 next_pi = pi->next;
5691 if (pi -> pid == pid)
5692 if (procfs_read_status (pi)) /* alive */
5693 return 1;
5694 else /* defunct (exited) */
5695 {
5696 close_proc_file (pi);
5697 return 0;
5698 }
5699 }
5700 return 0;
5701}
5702
5703int
5704procfs_first_available ()
5705{
5706 struct procinfo *pi;
5707
5708 for (pi = procinfo_list; pi; pi = pi->next)
5709 {
5710 if (procfs_read_status (pi))
5711 return pi->pid;
5712 }
5713 return -1;
8fc2b417
SG
5714}
5715
f0fce3b8
JM
5716int
5717procfs_get_pid_fd (pid)
5718 int pid;
5719{
5720 struct procinfo *pi = find_procinfo (pid, 1);
5721
5722 if (pi == NULL)
5723 return -1;
5724
5725 return pi->ctl_fd;
5726}
5727
78b459a7
SG
5728/* Send a SIGINT to the process group. This acts just like the user typed a
5729 ^C on the controlling terminal.
5730
5731 XXX - This may not be correct for all systems. Some may want to use
5732 killpg() instead of kill (-pgrp). */
5733
9b33e492 5734static void
2592eef8 5735procfs_stop ()
78b459a7
SG
5736{
5737 extern pid_t inferior_process_group;
5738
5739 kill (-inferior_process_group, SIGINT);
5740}
9b33e492
SG
5741\f
5742/* Convert a pid to printable form. */
78b459a7 5743
9b33e492
SG
5744#ifdef TIDGET
5745char *
5746procfs_pid_to_str (pid)
5747 int pid;
5748{
5749 static char buf[100];
5750
5751 sprintf (buf, "Kernel thread %d", TIDGET (pid));
5752
5753 return buf;
5754}
5755#endif /* TIDGET */
3fbdd536
JG
5756\f
5757struct target_ops procfs_ops = {
5758 "procfs", /* to_shortname */
5759 "Unix /proc child process", /* to_longname */
5760 "Unix /proc child process (started by the \"run\" command).", /* to_doc */
5761 procfs_open, /* to_open */
5762 0, /* to_close */
5763 procfs_attach, /* to_attach */
5764 procfs_detach, /* to_detach */
5765 procfs_resume, /* to_resume */
5766 procfs_wait, /* to_wait */
5767 procfs_fetch_registers, /* to_fetch_registers */
5768 procfs_store_registers, /* to_store_registers */
5769 procfs_prepare_to_store, /* to_prepare_to_store */
5770 procfs_xfer_memory, /* to_xfer_memory */
5771 procfs_files_info, /* to_files_info */
5772 memory_insert_breakpoint, /* to_insert_breakpoint */
5773 memory_remove_breakpoint, /* to_remove_breakpoint */
5774 terminal_init_inferior, /* to_terminal_init */
5775 terminal_inferior, /* to_terminal_inferior */
5776 terminal_ours_for_output, /* to_terminal_ours_for_output */
5777 terminal_ours, /* to_terminal_ours */
5778 child_terminal_info, /* to_terminal_info */
5779 procfs_kill_inferior, /* to_kill */
5780 0, /* to_load */
5781 0, /* to_lookup_symbol */
5782 procfs_create_inferior, /* to_create_inferior */
5783 procfs_mourn_inferior, /* to_mourn_inferior */
5784 procfs_can_run, /* to_can_run */
3950a34e 5785 procfs_notice_signals, /* to_notice_signals */
8fc2b417 5786 procfs_thread_alive, /* to_thread_alive */
2592eef8 5787 procfs_stop, /* to_stop */
3fbdd536
JG
5788 process_stratum, /* to_stratum */
5789 0, /* to_next */
5790 1, /* to_has_all_memory */
5791 1, /* to_has_memory */
5792 1, /* to_has_stack */
5793 1, /* to_has_registers */
5794 1, /* to_has_execution */
5795 0, /* sections */
5796 0, /* sections_end */
5797 OPS_MAGIC /* to_magic */
5798};
5799
3fbdd536
JG
5800void
5801_initialize_procfs ()
5802{
2592eef8 5803#ifdef HAVE_OPTIONAL_PROC_FS
234a732d 5804 char procname[MAX_PROC_NAME_SIZE];
2592eef8
PS
5805 int fd;
5806
5807 /* If we have an optional /proc filesystem (e.g. under OSF/1),
5808 don't add procfs support if we cannot access the running
5809 GDB via /proc. */
234a732d 5810 sprintf (procname, STATUS_PROC_NAME_FMT, getpid ());
2592eef8
PS
5811 if ((fd = open (procname, O_RDONLY)) < 0)
5812 return;
5813 close (fd);
5814#endif
5815
3fbdd536
JG
5816 add_target (&procfs_ops);
5817
3780c337 5818 add_info ("processes", info_proc,
cc221e76
FF
5819"Show process status information using /proc entry.\n\
5820Specify process id or use current inferior by default.\n\
5821Specify keywords for detailed information; default is summary.\n\
5822Keywords are: `all', `faults', `flags', `id', `mappings', `signals',\n\
5823`status', `syscalls', and `times'.\n\
3fbdd536 5824Unambiguous abbreviations may be used.");
a39ad5ce 5825
cc221e76 5826 init_syscall_table ();
35f5886e 5827}
This page took 0.625229 seconds and 4 git commands to generate.