* dwarf2read.c (die_reader_specs): Tweak comment.
[deliverable/binutils-gdb.git] / gdb / inf-ttrace.c
CommitLineData
eee22bf8
MK
1/* Low-level child interface to ttrace.
2
28e7fd62 3 Copyright (C) 2004-2013 Free Software Foundation, Inc.
eee22bf8
MK
4
5 This file is part of GDB.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
eee22bf8
MK
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
eee22bf8
MK
19
20#include "defs.h"
21
22/* The ttrace(2) system call didn't exist before HP-UX 10.30. Don't
23 try to compile this code unless we have it. */
24#ifdef HAVE_TTRACE
25
26#include "command.h"
27#include "gdbcore.h"
a7be7fa8 28#include "gdbthread.h"
eee22bf8 29#include "inferior.h"
191c4426 30#include "terminal.h"
eee22bf8
MK
31#include "target.h"
32
33#include "gdb_assert.h"
34#include "gdb_string.h"
932936f0 35#include <sys/mman.h>
eee22bf8 36#include <sys/ttrace.h>
438ac09b 37#include <signal.h>
eee22bf8
MK
38
39#include "inf-child.h"
40#include "inf-ttrace.h"
21ff4686 41#include "common/filestuff.h"
eee22bf8 42
932936f0
MK
43\f
44
a7be7fa8
MK
45/* HP-UX uses a threading model where each user-space thread
46 corresponds to a kernel thread. These kernel threads are called
47 lwps. The ttrace(2) interface gives us almost full control over
48 the threads, which makes it very easy to support them in GDB. We
49 identify the threads by process ID and lwp ID. The ttrace(2) also
50 provides us with a thread's user ID (in the `tts_user_tid' member
51 of `ttstate_t') but we don't use that (yet) as it isn't necessary
52 to uniquely label the thread. */
53
54/* Number of active lwps. */
55static int inf_ttrace_num_lwps;
56\f
57
932936f0
MK
58/* On HP-UX versions that have the ttrace(2) system call, we can
59 implement "hardware" watchpoints by fiddling with the protection of
60 pages in the address space that contain the variable being watched.
61 In order to implement this, we keep a dictionary of pages for which
62 we have changed the protection. */
63
64struct inf_ttrace_page
65{
66 CORE_ADDR addr; /* Page address. */
67 int prot; /* Protection. */
68 int refcount; /* Reference count. */
69 struct inf_ttrace_page *next;
70 struct inf_ttrace_page *prev;
71};
72
73struct inf_ttrace_page_dict
74{
75 struct inf_ttrace_page buckets[128];
76 int pagesize; /* Page size. */
77 int count; /* Number of pages in this dictionary. */
78} inf_ttrace_page_dict;
79
60e2c248
JG
80struct inf_ttrace_private_thread_info
81{
82 int dying;
83};
84
a7be7fa8
MK
85/* Number of lwps that are currently in a system call. */
86static int inf_ttrace_num_lwps_in_syscall;
932936f0
MK
87
88/* Flag to indicate whether we should re-enable page protections after
89 the next wait. */
90static int inf_ttrace_reenable_page_protections;
91
92/* Enable system call events for process PID. */
93
94static void
95inf_ttrace_enable_syscall_events (pid_t pid)
96{
97 ttevent_t tte;
98 ttstate_t tts;
99
a7be7fa8 100 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
932936f0
MK
101
102 if (ttrace (TT_PROC_GET_EVENT_MASK, pid, 0,
103 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 104 perror_with_name (("ttrace"));
932936f0
MK
105
106 tte.tte_events |= (TTEVT_SYSCALL_ENTRY | TTEVT_SYSCALL_RETURN);
107
108 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
109 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 110 perror_with_name (("ttrace"));
932936f0
MK
111
112 if (ttrace (TT_PROC_GET_FIRST_LWP_STATE, pid, 0,
113 (uintptr_t)&tts, sizeof tts, 0) == -1)
e2e0b3e5 114 perror_with_name (("ttrace"));
932936f0
MK
115
116 if (tts.tts_flags & TTS_INSYSCALL)
a7be7fa8 117 inf_ttrace_num_lwps_in_syscall++;
932936f0
MK
118
119 /* FIXME: Handle multiple threads. */
120}
121
122/* Disable system call events for process PID. */
123
124static void
125inf_ttrace_disable_syscall_events (pid_t pid)
126{
127 ttevent_t tte;
128
129 gdb_assert (inf_ttrace_page_dict.count == 0);
130
131 if (ttrace (TT_PROC_GET_EVENT_MASK, pid, 0,
132 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 133 perror_with_name (("ttrace"));
932936f0
MK
134
135 tte.tte_events &= ~(TTEVT_SYSCALL_ENTRY | TTEVT_SYSCALL_RETURN);
136
137 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
138 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 139 perror_with_name (("ttrace"));
932936f0 140
a7be7fa8 141 inf_ttrace_num_lwps_in_syscall = 0;
932936f0
MK
142}
143
144/* Get information about the page at address ADDR for process PID from
145 the dictionary. */
146
147static struct inf_ttrace_page *
148inf_ttrace_get_page (pid_t pid, CORE_ADDR addr)
149{
150 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
151 const int pagesize = inf_ttrace_page_dict.pagesize;
152 int bucket;
153 struct inf_ttrace_page *page;
154
155 bucket = (addr / pagesize) % num_buckets;
156 page = &inf_ttrace_page_dict.buckets[bucket];
157 while (page)
158 {
159 if (page->addr == addr)
160 break;
161
162 page = page->next;
163 }
164
165 return page;
166}
167
168/* Add the page at address ADDR for process PID to the dictionary. */
169
170static struct inf_ttrace_page *
171inf_ttrace_add_page (pid_t pid, CORE_ADDR addr)
172{
173 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
174 const int pagesize = inf_ttrace_page_dict.pagesize;
175 int bucket;
176 struct inf_ttrace_page *page;
177 struct inf_ttrace_page *prev = NULL;
178
179 bucket = (addr / pagesize) % num_buckets;
180 page = &inf_ttrace_page_dict.buckets[bucket];
181 while (page)
182 {
183 if (page->addr == addr)
184 break;
185
186 prev = page;
187 page = page->next;
188 }
189
190 if (!page)
191 {
192 int prot;
193
194 if (ttrace (TT_PROC_GET_MPROTECT, pid, 0,
195 addr, 0, (uintptr_t)&prot) == -1)
e2e0b3e5 196 perror_with_name (("ttrace"));
932936f0
MK
197
198 page = XMALLOC (struct inf_ttrace_page);
199 page->addr = addr;
200 page->prot = prot;
201 page->refcount = 0;
202 page->next = NULL;
203
204 page->prev = prev;
205 prev->next = page;
206
207 inf_ttrace_page_dict.count++;
208 if (inf_ttrace_page_dict.count == 1)
209 inf_ttrace_enable_syscall_events (pid);
210
a7be7fa8 211 if (inf_ttrace_num_lwps_in_syscall == 0)
932936f0
MK
212 {
213 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
214 addr, pagesize, prot & ~PROT_WRITE) == -1)
e2e0b3e5 215 perror_with_name (("ttrace"));
932936f0
MK
216 }
217 }
218
219 return page;
220}
221
222/* Insert the page at address ADDR of process PID to the dictionary. */
223
224static void
225inf_ttrace_insert_page (pid_t pid, CORE_ADDR addr)
226{
227 struct inf_ttrace_page *page;
228
229 page = inf_ttrace_get_page (pid, addr);
230 if (!page)
231 page = inf_ttrace_add_page (pid, addr);
232
233 page->refcount++;
234}
235
236/* Remove the page at address ADDR of process PID from the dictionary. */
237
238static void
239inf_ttrace_remove_page (pid_t pid, CORE_ADDR addr)
240{
241 const int pagesize = inf_ttrace_page_dict.pagesize;
242 struct inf_ttrace_page *page;
243
244 page = inf_ttrace_get_page (pid, addr);
245 page->refcount--;
246
247 gdb_assert (page->refcount >= 0);
248
249 if (page->refcount == 0)
250 {
a7be7fa8 251 if (inf_ttrace_num_lwps_in_syscall == 0)
932936f0
MK
252 {
253 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
254 addr, pagesize, page->prot) == -1)
e2e0b3e5 255 perror_with_name (("ttrace"));
932936f0
MK
256 }
257
258 inf_ttrace_page_dict.count--;
259 if (inf_ttrace_page_dict.count == 0)
260 inf_ttrace_disable_syscall_events (pid);
261
262 page->prev->next = page->next;
263 if (page->next)
264 page->next->prev = page->prev;
265
266 xfree (page);
267 }
268}
269
270/* Mask the bits in PROT from the page protections that are currently
271 in the dictionary for process PID. */
272
273static void
274inf_ttrace_mask_page_protections (pid_t pid, int prot)
275{
276 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
277 const int pagesize = inf_ttrace_page_dict.pagesize;
278 int bucket;
279
280 for (bucket = 0; bucket < num_buckets; bucket++)
281 {
282 struct inf_ttrace_page *page;
283
284 page = inf_ttrace_page_dict.buckets[bucket].next;
285 while (page)
286 {
287 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
288 page->addr, pagesize, page->prot & ~prot) == -1)
e2e0b3e5 289 perror_with_name (("ttrace"));
932936f0
MK
290
291 page = page->next;
292 }
293 }
294}
295
296/* Write-protect the pages in the dictionary for process PID. */
297
298static void
299inf_ttrace_enable_page_protections (pid_t pid)
300{
301 inf_ttrace_mask_page_protections (pid, PROT_WRITE);
302}
303
304/* Restore the protection of the pages in the dictionary for process
305 PID. */
306
307static void
308inf_ttrace_disable_page_protections (pid_t pid)
309{
310 inf_ttrace_mask_page_protections (pid, 0);
311}
312
313/* Insert a "hardware" watchpoint for LEN bytes at address ADDR of
314 type TYPE. */
315
316static int
0cf6dd15
TJB
317inf_ttrace_insert_watchpoint (CORE_ADDR addr, int len, int type,
318 struct expression *cond)
932936f0
MK
319{
320 const int pagesize = inf_ttrace_page_dict.pagesize;
321 pid_t pid = ptid_get_pid (inferior_ptid);
322 CORE_ADDR page_addr;
323 int num_pages;
324 int page;
325
326 gdb_assert (type == hw_write);
327
328 page_addr = (addr / pagesize) * pagesize;
329 num_pages = (len + pagesize - 1) / pagesize;
330
331 for (page = 0; page < num_pages; page++, page_addr += pagesize)
332 inf_ttrace_insert_page (pid, page_addr);
333
334 return 1;
335}
336
337/* Remove a "hardware" watchpoint for LEN bytes at address ADDR of
338 type TYPE. */
339
340static int
0cf6dd15
TJB
341inf_ttrace_remove_watchpoint (CORE_ADDR addr, int len, int type,
342 struct expression *cond)
932936f0
MK
343{
344 const int pagesize = inf_ttrace_page_dict.pagesize;
345 pid_t pid = ptid_get_pid (inferior_ptid);
346 CORE_ADDR page_addr;
347 int num_pages;
348 int page;
349
350 gdb_assert (type == hw_write);
351
352 page_addr = (addr / pagesize) * pagesize;
353 num_pages = (len + pagesize - 1) / pagesize;
354
355 for (page = 0; page < num_pages; page++, page_addr += pagesize)
356 inf_ttrace_remove_page (pid, page_addr);
357
358 return 1;
359}
360
361static int
362inf_ttrace_can_use_hw_breakpoint (int type, int len, int ot)
363{
364 return (type == bp_hardware_watchpoint);
365}
366
367static int
2a3cdf79 368inf_ttrace_region_ok_for_hw_watchpoint (CORE_ADDR addr, int len)
932936f0
MK
369{
370 return 1;
371}
372
373/* Return non-zero if the current inferior was (potentially) stopped
374 by hitting a "hardware" watchpoint. */
375
376static int
377inf_ttrace_stopped_by_watchpoint (void)
378{
379 pid_t pid = ptid_get_pid (inferior_ptid);
380 lwpid_t lwpid = ptid_get_lwp (inferior_ptid);
381 ttstate_t tts;
382
383 if (inf_ttrace_page_dict.count > 0)
384 {
385 if (ttrace (TT_LWP_GET_STATE, pid, lwpid,
386 (uintptr_t)&tts, sizeof tts, 0) == -1)
e2e0b3e5 387 perror_with_name (("ttrace"));
932936f0
MK
388
389 if (tts.tts_event == TTEVT_SIGNAL
390 && tts.tts_u.tts_signal.tts_signo == SIGBUS)
391 {
392 const int pagesize = inf_ttrace_page_dict.pagesize;
393 void *addr = tts.tts_u.tts_signal.tts_siginfo.si_addr;
394 CORE_ADDR page_addr = ((uintptr_t)addr / pagesize) * pagesize;
395
396 if (inf_ttrace_get_page (pid, page_addr))
397 return 1;
398 }
399 }
400
401 return 0;
402}
403\f
eee22bf8 404
b2a4db28
MK
405/* When tracking a vfork(2), we cannot detach from the parent until
406 after the child has called exec(3) or has exited. If we are still
407 attached to the parent, this variable will be set to the process ID
408 of the parent. Otherwise it will be set to zero. */
409static pid_t inf_ttrace_vfork_ppid = -1;
410
411static int
07107ca6
LM
412inf_ttrace_follow_fork (struct target_ops *ops, int follow_child,
413 int detach_fork)
b2a4db28
MK
414{
415 pid_t pid, fpid;
416 lwpid_t lwpid, flwpid;
417 ttstate_t tts;
e58b0e63
PA
418 struct thread_info *tp = inferior_thread ();
419
420 gdb_assert (tp->pending_follow.kind == TARGET_WAITKIND_FORKED
421 || tp->pending_follow.kind == TARGET_WAITKIND_VFORKED);
422
423 pid = ptid_get_pid (inferior_ptid);
424 lwpid = ptid_get_lwp (inferior_ptid);
b2a4db28
MK
425
426 /* Get all important details that core GDB doesn't (and shouldn't)
427 know about. */
428 if (ttrace (TT_LWP_GET_STATE, pid, lwpid,
429 (uintptr_t)&tts, sizeof tts, 0) == -1)
430 perror_with_name (("ttrace"));
431
432 gdb_assert (tts.tts_event == TTEVT_FORK || tts.tts_event == TTEVT_VFORK);
433
434 if (tts.tts_u.tts_fork.tts_isparent)
435 {
436 pid = tts.tts_pid;
437 lwpid = tts.tts_lwpid;
438 fpid = tts.tts_u.tts_fork.tts_fpid;
439 flwpid = tts.tts_u.tts_fork.tts_flwpid;
440 }
441 else
442 {
443 pid = tts.tts_u.tts_fork.tts_fpid;
444 lwpid = tts.tts_u.tts_fork.tts_flwpid;
445 fpid = tts.tts_pid;
446 flwpid = tts.tts_lwpid;
447 }
448
449 if (follow_child)
450 {
77435e4c 451 struct inferior *inf;
191c4426
PA
452 struct inferior *parent_inf;
453
454 parent_inf = find_inferior_pid (pid);
77435e4c 455
b2a4db28 456 inferior_ptid = ptid_build (fpid, flwpid, 0);
77435e4c 457 inf = add_inferior (fpid);
191c4426 458 inf->attach_flag = parent_inf->attach_flag;
6c95b8df
PA
459 inf->pspace = parent_inf->pspace;
460 inf->aspace = parent_inf->aspace;
191c4426 461 copy_terminal_info (inf, parent_inf);
d80ee84f 462 detach_breakpoints (ptid_build (pid, lwpid, 0));
b2a4db28
MK
463
464 target_terminal_ours ();
3e43a32a
MS
465 fprintf_unfiltered (gdb_stdlog,
466 _("Attaching after fork to child process %ld.\n"),
467 (long)fpid);
b2a4db28
MK
468 }
469 else
470 {
471 inferior_ptid = ptid_build (pid, lwpid, 0);
2dcc6086
JB
472 /* Detach any remaining breakpoints in the child. In the case
473 of fork events, we do not need to do this, because breakpoints
474 should have already been removed earlier. */
475 if (tts.tts_event == TTEVT_VFORK)
d80ee84f 476 detach_breakpoints (ptid_build (fpid, flwpid, 0));
b2a4db28
MK
477
478 target_terminal_ours ();
3e43a32a
MS
479 fprintf_unfiltered (gdb_stdlog,
480 _("Detaching after fork from child process %ld.\n"),
481 (long)fpid);
b2a4db28
MK
482 }
483
484 if (tts.tts_event == TTEVT_VFORK)
485 {
486 gdb_assert (!tts.tts_u.tts_fork.tts_isparent);
487
488 if (follow_child)
489 {
490 /* We can't detach from the parent yet. */
491 inf_ttrace_vfork_ppid = pid;
492
493 reattach_breakpoints (fpid);
494 }
495 else
496 {
497 if (ttrace (TT_PROC_DETACH, fpid, 0, 0, 0, 0) == -1)
498 perror_with_name (("ttrace"));
499
500 /* Wait till we get the TTEVT_VFORK event in the parent.
501 This indicates that the child has called exec(3) or has
502 exited and that the parent is ready to be traced again. */
503 if (ttrace_wait (pid, lwpid, TTRACE_WAITOK, &tts, sizeof tts) == -1)
504 perror_with_name (("ttrace_wait"));
505 gdb_assert (tts.tts_event == TTEVT_VFORK);
506 gdb_assert (tts.tts_u.tts_fork.tts_isparent);
507
508 reattach_breakpoints (pid);
509 }
510 }
511 else
512 {
513 gdb_assert (tts.tts_u.tts_fork.tts_isparent);
514
515 if (follow_child)
516 {
517 if (ttrace (TT_PROC_DETACH, pid, 0, 0, 0, 0) == -1)
518 perror_with_name (("ttrace"));
519 }
520 else
521 {
522 if (ttrace (TT_PROC_DETACH, fpid, 0, 0, 0, 0) == -1)
523 perror_with_name (("ttrace"));
524 }
525 }
526
527 if (follow_child)
528 {
2935f27f
PA
529 struct thread_info *ti;
530
b2a4db28 531 /* The child will start out single-threaded. */
2935f27f 532 inf_ttrace_num_lwps = 1;
b2a4db28
MK
533 inf_ttrace_num_lwps_in_syscall = 0;
534
2935f27f
PA
535 /* Delete parent. */
536 delete_thread_silent (ptid_build (pid, lwpid, 0));
7f9f62ba 537 detach_inferior (pid);
2935f27f 538
7f9f62ba 539 /* Add child thread. inferior_ptid was already set above. */
2935f27f
PA
540 ti = add_thread_silent (inferior_ptid);
541 ti->private =
542 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
543 memset (ti->private, 0,
544 sizeof (struct inf_ttrace_private_thread_info));
b2a4db28
MK
545 }
546
547 return 0;
548}
549\f
550
eee22bf8
MK
551/* File descriptors for pipes used as semaphores during initial
552 startup of an inferior. */
553static int inf_ttrace_pfd1[2];
554static int inf_ttrace_pfd2[2];
555
556static void
557do_cleanup_pfds (void *dummy)
558{
559 close (inf_ttrace_pfd1[0]);
560 close (inf_ttrace_pfd1[1]);
561 close (inf_ttrace_pfd2[0]);
562 close (inf_ttrace_pfd2[1]);
21ff4686
TT
563
564 unmark_fd_no_cloexec (inf_ttrace_pfd1[0]);
565 unmark_fd_no_cloexec (inf_ttrace_pfd1[1]);
566 unmark_fd_no_cloexec (inf_ttrace_pfd2[0]);
567 unmark_fd_no_cloexec (inf_ttrace_pfd2[1]);
eee22bf8
MK
568}
569
570static void
571inf_ttrace_prepare (void)
572{
573 if (pipe (inf_ttrace_pfd1) == -1)
a3f17187 574 perror_with_name (("pipe"));
eee22bf8
MK
575
576 if (pipe (inf_ttrace_pfd2) == -1)
577 {
578 close (inf_ttrace_pfd1[0]);
579 close (inf_ttrace_pfd2[0]);
a3f17187 580 perror_with_name (("pipe"));
eee22bf8 581 }
21ff4686
TT
582
583 mark_fd_no_cloexec (inf_ttrace_pfd1[0]);
584 mark_fd_no_cloexec (inf_ttrace_pfd1[1]);
585 mark_fd_no_cloexec (inf_ttrace_pfd2[0]);
586 mark_fd_no_cloexec (inf_ttrace_pfd2[1]);
eee22bf8
MK
587}
588
589/* Prepare to be traced. */
590
591static void
592inf_ttrace_me (void)
593{
594 struct cleanup *old_chain = make_cleanup (do_cleanup_pfds, 0);
595 char c;
596
597 /* "Trace me, Dr. Memory!" */
598 if (ttrace (TT_PROC_SETTRC, 0, 0, 0, TT_VERSION, 0) == -1)
e2e0b3e5 599 perror_with_name (("ttrace"));
eee22bf8
MK
600
601 /* Tell our parent that we are ready to be traced. */
602 if (write (inf_ttrace_pfd1[1], &c, sizeof c) != sizeof c)
e2e0b3e5 603 perror_with_name (("write"));
eee22bf8
MK
604
605 /* Wait until our parent has set the initial event mask. */
606 if (read (inf_ttrace_pfd2[0], &c, sizeof c) != sizeof c)
e2e0b3e5 607 perror_with_name (("read"));
eee22bf8
MK
608
609 do_cleanups (old_chain);
610}
611
612/* Start tracing PID. */
613
614static void
28439f5e 615inf_ttrace_him (struct target_ops *ops, int pid)
eee22bf8
MK
616{
617 struct cleanup *old_chain = make_cleanup (do_cleanup_pfds, 0);
618 ttevent_t tte;
eee22bf8
MK
619 char c;
620
621 /* Wait until our child is ready to be traced. */
622 if (read (inf_ttrace_pfd1[0], &c, sizeof c) != sizeof c)
e2e0b3e5 623 perror_with_name (("read"));
eee22bf8
MK
624
625 /* Set the initial event mask. */
626 memset (&tte, 0, sizeof (tte));
b2a4db28 627 tte.tte_events |= TTEVT_EXEC | TTEVT_EXIT | TTEVT_FORK | TTEVT_VFORK;
a7be7fa8 628 tte.tte_events |= TTEVT_LWP_CREATE | TTEVT_LWP_EXIT | TTEVT_LWP_TERMINATE;
7ba0e0c2
MK
629#ifdef TTEVT_BPT_SSTEP
630 tte.tte_events |= TTEVT_BPT_SSTEP;
631#endif
b2a4db28 632 tte.tte_opts |= TTEO_PROC_INHERIT;
eee22bf8
MK
633 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
634 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 635 perror_with_name (("ttrace"));
eee22bf8
MK
636
637 /* Tell our child that we have set the initial event mask. */
638 if (write (inf_ttrace_pfd2[1], &c, sizeof c) != sizeof c)
e2e0b3e5 639 perror_with_name (("write"));
eee22bf8
MK
640
641 do_cleanups (old_chain);
642
28439f5e 643 push_target (ops);
eee22bf8 644
eee22bf8
MK
645 /* START_INFERIOR_TRAPS_EXPECTED is defined in inferior.h, and will
646 be 1 or 2 depending on whether we're starting without or with a
647 shell. */
648 startup_inferior (START_INFERIOR_TRAPS_EXPECTED);
649
650 /* On some targets, there must be some explicit actions taken after
651 the inferior has been started up. */
652 target_post_startup_inferior (pid_to_ptid (pid));
653}
654
655static void
136d6dae
VP
656inf_ttrace_create_inferior (struct target_ops *ops, char *exec_file,
657 char *allargs, char **env, int from_tty)
eee22bf8 658{
28439f5e
PA
659 int pid;
660
a7be7fa8
MK
661 gdb_assert (inf_ttrace_num_lwps == 0);
662 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
932936f0 663 gdb_assert (inf_ttrace_page_dict.count == 0);
932936f0 664 gdb_assert (inf_ttrace_reenable_page_protections == 0);
b2a4db28 665 gdb_assert (inf_ttrace_vfork_ppid == -1);
932936f0 666
28439f5e 667 pid = fork_inferior (exec_file, allargs, env, inf_ttrace_me, NULL,
e69860f1 668 inf_ttrace_prepare, NULL, NULL);
28439f5e
PA
669
670 inf_ttrace_him (ops, pid);
eee22bf8
MK
671}
672
eee22bf8 673static void
136d6dae 674inf_ttrace_mourn_inferior (struct target_ops *ops)
eee22bf8 675{
932936f0
MK
676 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
677 int bucket;
678
a7be7fa8
MK
679 inf_ttrace_num_lwps = 0;
680 inf_ttrace_num_lwps_in_syscall = 0;
932936f0
MK
681
682 for (bucket = 0; bucket < num_buckets; bucket++)
683 {
684 struct inf_ttrace_page *page;
685 struct inf_ttrace_page *next;
686
687 page = inf_ttrace_page_dict.buckets[bucket].next;
688 while (page)
689 {
690 next = page->next;
691 xfree (page);
692 page = next;
693 }
694 }
695 inf_ttrace_page_dict.count = 0;
696
28439f5e 697 unpush_target (ops);
eee22bf8
MK
698 generic_mourn_inferior ();
699}
700
f688d93f
JB
701/* Assuming we just attached the debugger to a new inferior, create
702 a new thread_info structure for each thread, and add it to our
703 list of threads. */
704
705static void
706inf_ttrace_create_threads_after_attach (int pid)
707{
708 int status;
709 ptid_t ptid;
710 ttstate_t tts;
711 struct thread_info *ti;
712
713 status = ttrace (TT_PROC_GET_FIRST_LWP_STATE, pid, 0,
714 (uintptr_t) &tts, sizeof (ttstate_t), 0);
715 if (status < 0)
716 perror_with_name (_("TT_PROC_GET_FIRST_LWP_STATE ttrace call failed"));
717 gdb_assert (tts.tts_pid == pid);
718
719 /* Add the stopped thread. */
720 ptid = ptid_build (pid, tts.tts_lwpid, 0);
721 ti = add_thread (ptid);
722 ti->private = xzalloc (sizeof (struct inf_ttrace_private_thread_info));
723 inf_ttrace_num_lwps++;
724
725 /* We use the "first stopped thread" as the currently active thread. */
726 inferior_ptid = ptid;
727
728 /* Iterative over all the remaining threads. */
729
730 for (;;)
731 {
732 ptid_t ptid;
733
734 status = ttrace (TT_PROC_GET_NEXT_LWP_STATE, pid, 0,
735 (uintptr_t) &tts, sizeof (ttstate_t), 0);
736 if (status < 0)
737 perror_with_name (_("TT_PROC_GET_NEXT_LWP_STATE ttrace call failed"));
738 if (status == 0)
739 break; /* End of list. */
740
741 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
742 ti = add_thread (ptid);
743 ti->private = xzalloc (sizeof (struct inf_ttrace_private_thread_info));
744 inf_ttrace_num_lwps++;
745 }
746}
747
eee22bf8 748static void
136d6dae 749inf_ttrace_attach (struct target_ops *ops, char *args, int from_tty)
eee22bf8
MK
750{
751 char *exec_file;
752 pid_t pid;
932936f0 753 ttevent_t tte;
181e7f93 754 struct inferior *inf;
eee22bf8 755
74164c56 756 pid = parse_pid_to_attach (args);
eee22bf8
MK
757
758 if (pid == getpid ()) /* Trying to masturbate? */
8a3fe4f8 759 error (_("I refuse to debug myself!"));
eee22bf8
MK
760
761 if (from_tty)
762 {
346e281c 763 exec_file = get_exec_file (0);
eee22bf8
MK
764
765 if (exec_file)
a3f17187 766 printf_unfiltered (_("Attaching to program: %s, %s\n"), exec_file,
eee22bf8
MK
767 target_pid_to_str (pid_to_ptid (pid)));
768 else
a3f17187 769 printf_unfiltered (_("Attaching to %s\n"),
eee22bf8
MK
770 target_pid_to_str (pid_to_ptid (pid)));
771
772 gdb_flush (gdb_stdout);
773 }
774
a7be7fa8
MK
775 gdb_assert (inf_ttrace_num_lwps == 0);
776 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
b2a4db28 777 gdb_assert (inf_ttrace_vfork_ppid == -1);
a7be7fa8 778
eee22bf8 779 if (ttrace (TT_PROC_ATTACH, pid, 0, TT_KILL_ON_EXIT, TT_VERSION, 0) == -1)
e2e0b3e5 780 perror_with_name (("ttrace"));
eee22bf8 781
6c95b8df
PA
782 inf = current_inferior ();
783 inferior_appeared (inf, pid);
181e7f93 784 inf->attach_flag = 1;
7f9f62ba 785
932936f0 786 /* Set the initial event mask. */
932936f0 787 memset (&tte, 0, sizeof (tte));
b2a4db28 788 tte.tte_events |= TTEVT_EXEC | TTEVT_EXIT | TTEVT_FORK | TTEVT_VFORK;
a7be7fa8 789 tte.tte_events |= TTEVT_LWP_CREATE | TTEVT_LWP_EXIT | TTEVT_LWP_TERMINATE;
7ba0e0c2
MK
790#ifdef TTEVT_BPT_SSTEP
791 tte.tte_events |= TTEVT_BPT_SSTEP;
792#endif
b2a4db28 793 tte.tte_opts |= TTEO_PROC_INHERIT;
932936f0
MK
794 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
795 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 796 perror_with_name (("ttrace"));
932936f0 797
28439f5e 798 push_target (ops);
2935f27f 799
f688d93f 800 inf_ttrace_create_threads_after_attach (pid);
eee22bf8
MK
801}
802
803static void
136d6dae 804inf_ttrace_detach (struct target_ops *ops, char *args, int from_tty)
eee22bf8 805{
eee22bf8 806 pid_t pid = ptid_get_pid (inferior_ptid);
5d426ff1 807 int sig = 0;
eee22bf8
MK
808
809 if (from_tty)
810 {
811 char *exec_file = get_exec_file (0);
812 if (exec_file == 0)
813 exec_file = "";
a3f17187 814 printf_unfiltered (_("Detaching from program: %s, %s\n"), exec_file,
eee22bf8
MK
815 target_pid_to_str (pid_to_ptid (pid)));
816 gdb_flush (gdb_stdout);
817 }
818 if (args)
819 sig = atoi (args);
820
821 /* ??? The HP-UX 11.0 ttrace(2) manual page doesn't mention that we
822 can pass a signal number here. Does this really work? */
823 if (ttrace (TT_PROC_DETACH, pid, 0, 0, sig, 0) == -1)
e2e0b3e5 824 perror_with_name (("ttrace"));
eee22bf8 825
b2a4db28
MK
826 if (inf_ttrace_vfork_ppid != -1)
827 {
828 if (ttrace (TT_PROC_DETACH, inf_ttrace_vfork_ppid, 0, 0, 0, 0) == -1)
829 perror_with_name (("ttrace"));
830 inf_ttrace_vfork_ppid = -1;
831 }
832
a7be7fa8
MK
833 inf_ttrace_num_lwps = 0;
834 inf_ttrace_num_lwps_in_syscall = 0;
932936f0 835
932936f0 836 inferior_ptid = null_ptid;
7f9f62ba
PA
837 detach_inferior (pid);
838
28439f5e 839 unpush_target (ops);
eee22bf8
MK
840}
841
346e281c 842static void
7d85a9c0 843inf_ttrace_kill (struct target_ops *ops)
346e281c
MK
844{
845 pid_t pid = ptid_get_pid (inferior_ptid);
846
847 if (pid == 0)
848 return;
849
850 if (ttrace (TT_PROC_EXIT, pid, 0, 0, 0, 0) == -1)
851 perror_with_name (("ttrace"));
852 /* ??? Is it necessary to call ttrace_wait() here? */
853
854 if (inf_ttrace_vfork_ppid != -1)
855 {
856 if (ttrace (TT_PROC_DETACH, inf_ttrace_vfork_ppid, 0, 0, 0, 0) == -1)
857 perror_with_name (("ttrace"));
858 inf_ttrace_vfork_ppid = -1;
859 }
860
861 target_mourn_inferior ();
862}
863
438ac09b
PA
864/* Check is a dying thread is dead by now, and delete it from GDBs
865 thread list if so. */
7ba0e0c2 866static int
438ac09b 867inf_ttrace_delete_dead_threads_callback (struct thread_info *info, void *arg)
7ba0e0c2 868{
438ac09b
PA
869 lwpid_t lwpid;
870 struct inf_ttrace_private_thread_info *p;
7ba0e0c2 871
438ac09b
PA
872 if (is_exited (info->ptid))
873 return 0;
874
875 lwpid = ptid_get_lwp (info->ptid);
876 p = (struct inf_ttrace_private_thread_info *) info->private;
877
878 /* Check if an lwp that was dying is still there or not. */
879 if (p->dying && (kill (lwpid, 0) == -1))
880 /* It's gone now. */
881 delete_thread (info->ptid);
7ba0e0c2
MK
882
883 return 0;
884}
885
438ac09b
PA
886/* Resume the lwp pointed to by INFO, with REQUEST, and pass it signal
887 SIG. */
888
889static void
890inf_ttrace_resume_lwp (struct thread_info *info, ttreq_t request, int sig)
891{
892 pid_t pid = ptid_get_pid (info->ptid);
893 lwpid_t lwpid = ptid_get_lwp (info->ptid);
894
895 if (ttrace (request, pid, lwpid, TT_NOPC, sig, 0) == -1)
896 {
897 struct inf_ttrace_private_thread_info *p
898 = (struct inf_ttrace_private_thread_info *) info->private;
899 if (p->dying && errno == EPROTO)
900 /* This is expected, it means the dying lwp is really gone
901 by now. If ttrace had an event to inform the debugger
902 the lwp is really gone, this wouldn't be needed. */
903 delete_thread (info->ptid);
904 else
905 /* This was really unexpected. */
906 perror_with_name (("ttrace"));
907 }
908}
909
910/* Callback for iterate_over_threads. */
911
60e2c248 912static int
438ac09b 913inf_ttrace_resume_callback (struct thread_info *info, void *arg)
60e2c248 914{
438ac09b
PA
915 if (!ptid_equal (info->ptid, inferior_ptid) && !is_exited (info->ptid))
916 inf_ttrace_resume_lwp (info, TT_LWP_CONTINUE, 0);
917
60e2c248
JG
918 return 0;
919}
920
eee22bf8 921static void
28439f5e 922inf_ttrace_resume (struct target_ops *ops,
2ea28649 923 ptid_t ptid, int step, enum gdb_signal signal)
eee22bf8 924{
438ac09b 925 int resume_all;
eee22bf8 926 ttreq_t request = step ? TT_LWP_SINGLE : TT_LWP_CONTINUE;
2ea28649 927 int sig = gdb_signal_to_host (signal);
438ac09b 928 struct thread_info *info;
eee22bf8 929
438ac09b
PA
930 /* A specific PTID means `step only this process id'. */
931 resume_all = (ptid_equal (ptid, minus_one_ptid));
eee22bf8 932
438ac09b
PA
933 /* If resuming all threads, it's the current thread that should be
934 handled specially. */
935 if (resume_all)
936 ptid = inferior_ptid;
eee22bf8 937
e09875d4 938 info = find_thread_ptid (ptid);
438ac09b
PA
939 inf_ttrace_resume_lwp (info, request, sig);
940
941 if (resume_all)
942 /* Let all the other threads run too. */
943 iterate_over_threads (inf_ttrace_resume_callback, NULL);
eee22bf8
MK
944}
945
946static ptid_t
117de6a9 947inf_ttrace_wait (struct target_ops *ops,
47608cb1 948 ptid_t ptid, struct target_waitstatus *ourstatus, int options)
eee22bf8
MK
949{
950 pid_t pid = ptid_get_pid (ptid);
951 lwpid_t lwpid = ptid_get_lwp (ptid);
952 ttstate_t tts;
60e2c248 953 struct thread_info *ti;
3a3e9ee3 954 ptid_t related_ptid;
eee22bf8 955
932936f0 956 /* Until proven otherwise. */
a7be7fa8 957 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
eee22bf8
MK
958
959 if (pid == -1)
b2a4db28 960 pid = lwpid = 0;
eee22bf8 961
b2a4db28 962 gdb_assert (pid != 0 || lwpid == 0);
eee22bf8
MK
963
964 do
965 {
966 set_sigint_trap ();
eee22bf8
MK
967
968 if (ttrace_wait (pid, lwpid, TTRACE_WAITOK, &tts, sizeof tts) == -1)
a3f17187 969 perror_with_name (("ttrace_wait"));
eee22bf8 970
b2a4db28
MK
971 if (tts.tts_event == TTEVT_VFORK && tts.tts_u.tts_fork.tts_isparent)
972 {
973 if (inf_ttrace_vfork_ppid != -1)
974 {
975 gdb_assert (inf_ttrace_vfork_ppid == tts.tts_pid);
976
977 if (ttrace (TT_PROC_DETACH, tts.tts_pid, 0, 0, 0, 0) == -1)
978 perror_with_name (("ttrace"));
979 inf_ttrace_vfork_ppid = -1;
980 }
981
982 tts.tts_event = TTEVT_NONE;
983 }
984
eee22bf8
MK
985 clear_sigint_trap ();
986 }
987 while (tts.tts_event == TTEVT_NONE);
988
932936f0
MK
989 /* Now that we've waited, we can re-enable the page protections. */
990 if (inf_ttrace_reenable_page_protections)
991 {
a7be7fa8 992 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
932936f0
MK
993 inf_ttrace_enable_page_protections (tts.tts_pid);
994 inf_ttrace_reenable_page_protections = 0;
995 }
996
a7be7fa8
MK
997 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
998
2935f27f
PA
999 if (inf_ttrace_num_lwps == 0)
1000 {
1001 struct thread_info *ti;
1002
1003 inf_ttrace_num_lwps = 1;
1004
1005 /* This is the earliest we hear about the lwp member of
1006 INFERIOR_PTID, after an attach or fork_inferior. */
1007 gdb_assert (ptid_get_lwp (inferior_ptid) == 0);
1008
1009 /* We haven't set the private member on the main thread yet. Do
1010 it now. */
e09875d4 1011 ti = find_thread_ptid (inferior_ptid);
2935f27f
PA
1012 gdb_assert (ti != NULL && ti->private == NULL);
1013 ti->private =
1014 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
1015 memset (ti->private, 0,
1016 sizeof (struct inf_ttrace_private_thread_info));
1017
1018 /* Notify the core that this ptid changed. This changes
1019 inferior_ptid as well. */
1020 thread_change_ptid (inferior_ptid, ptid);
1021 }
1022
eee22bf8
MK
1023 switch (tts.tts_event)
1024 {
7ba0e0c2
MK
1025#ifdef TTEVT_BPT_SSTEP
1026 case TTEVT_BPT_SSTEP:
1027 /* Make it look like a breakpoint. */
1028 ourstatus->kind = TARGET_WAITKIND_STOPPED;
a493e3e2 1029 ourstatus->value.sig = GDB_SIGNAL_TRAP;
7ba0e0c2
MK
1030 break;
1031#endif
1032
eee22bf8 1033 case TTEVT_EXEC:
5d426ff1
MK
1034 ourstatus->kind = TARGET_WAITKIND_EXECD;
1035 ourstatus->value.execd_pathname =
1036 xmalloc (tts.tts_u.tts_exec.tts_pathlen + 1);
1037 if (ttrace (TT_PROC_GET_PATHNAME, tts.tts_pid, 0,
1038 (uintptr_t)ourstatus->value.execd_pathname,
1039 tts.tts_u.tts_exec.tts_pathlen, 0) == -1)
1040 perror_with_name (("ttrace"));
1041 ourstatus->value.execd_pathname[tts.tts_u.tts_exec.tts_pathlen] = 0;
25b22b0a
PA
1042
1043 /* At this point, all inserted breakpoints are gone. Doing this
1044 as soon as we detect an exec prevents the badness of deleting
1045 a breakpoint writing the current "shadow contents" to lift
1046 the bp. That shadow is NOT valid after an exec. */
1047 mark_breakpoints_out ();
eee22bf8 1048 break;
932936f0 1049
eee22bf8
MK
1050 case TTEVT_EXIT:
1051 store_waitstatus (ourstatus, tts.tts_u.tts_exit.tts_exitcode);
a7be7fa8
MK
1052 inf_ttrace_num_lwps = 0;
1053 break;
1054
b2a4db28 1055 case TTEVT_FORK:
3a3e9ee3
PA
1056 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
1057 tts.tts_u.tts_fork.tts_flwpid, 0);
1058
b2a4db28 1059 ourstatus->kind = TARGET_WAITKIND_FORKED;
3a3e9ee3 1060 ourstatus->value.related_pid = related_ptid;
b2a4db28
MK
1061
1062 /* Make sure the other end of the fork is stopped too. */
1063 if (ttrace_wait (tts.tts_u.tts_fork.tts_fpid,
1064 tts.tts_u.tts_fork.tts_flwpid,
1065 TTRACE_WAITOK, &tts, sizeof tts) == -1)
1066 perror_with_name (("ttrace_wait"));
1067
1068 gdb_assert (tts.tts_event == TTEVT_FORK);
1069 if (tts.tts_u.tts_fork.tts_isparent)
1070 {
3a3e9ee3
PA
1071 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
1072 tts.tts_u.tts_fork.tts_flwpid, 0);
b2a4db28 1073 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
3a3e9ee3 1074 ourstatus->value.related_pid = related_ptid;
b2a4db28
MK
1075 }
1076 break;
1077
1078 case TTEVT_VFORK:
1079 gdb_assert (!tts.tts_u.tts_fork.tts_isparent);
1080
3a3e9ee3
PA
1081 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
1082 tts.tts_u.tts_fork.tts_flwpid, 0);
1083
b2a4db28 1084 ourstatus->kind = TARGET_WAITKIND_VFORKED;
3a3e9ee3 1085 ourstatus->value.related_pid = related_ptid;
b2a4db28
MK
1086
1087 /* HACK: To avoid touching the parent during the vfork, switch
1088 away from it. */
1089 inferior_ptid = ptid;
1090 break;
1091
a7be7fa8
MK
1092 case TTEVT_LWP_CREATE:
1093 lwpid = tts.tts_u.tts_thread.tts_target_lwpid;
1094 ptid = ptid_build (tts.tts_pid, lwpid, 0);
60e2c248
JG
1095 ti = add_thread (ptid);
1096 ti->private =
1097 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
1098 memset (ti->private, 0,
1099 sizeof (struct inf_ttrace_private_thread_info));
a7be7fa8
MK
1100 inf_ttrace_num_lwps++;
1101 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
62a93fa9
PA
1102 /* Let the lwp_create-caller thread continue. */
1103 ttrace (TT_LWP_CONTINUE, ptid_get_pid (ptid),
1104 ptid_get_lwp (ptid), TT_NOPC, 0, 0);
1105 /* Return without stopping the whole process. */
1106 ourstatus->kind = TARGET_WAITKIND_IGNORE;
1107 return ptid;
a7be7fa8
MK
1108
1109 case TTEVT_LWP_EXIT:
17faa917
DJ
1110 if (print_thread_events)
1111 printf_unfiltered (_("[%s exited]\n"), target_pid_to_str (ptid));
e09875d4 1112 ti = find_thread_ptid (ptid);
60e2c248
JG
1113 gdb_assert (ti != NULL);
1114 ((struct inf_ttrace_private_thread_info *)ti->private)->dying = 1;
a7be7fa8 1115 inf_ttrace_num_lwps--;
62a93fa9 1116 /* Let the thread really exit. */
60e2c248
JG
1117 ttrace (TT_LWP_CONTINUE, ptid_get_pid (ptid),
1118 ptid_get_lwp (ptid), TT_NOPC, 0, 0);
62a93fa9
PA
1119 /* Return without stopping the whole process. */
1120 ourstatus->kind = TARGET_WAITKIND_IGNORE;
1121 return ptid;
a7be7fa8
MK
1122
1123 case TTEVT_LWP_TERMINATE:
1124 lwpid = tts.tts_u.tts_thread.tts_target_lwpid;
1125 ptid = ptid_build (tts.tts_pid, lwpid, 0);
62a93fa9 1126 if (print_thread_events)
b861ac81 1127 printf_unfiltered(_("[%s has been terminated]\n"),
62a93fa9 1128 target_pid_to_str (ptid));
e09875d4 1129 ti = find_thread_ptid (ptid);
60e2c248
JG
1130 gdb_assert (ti != NULL);
1131 ((struct inf_ttrace_private_thread_info *)ti->private)->dying = 1;
a7be7fa8 1132 inf_ttrace_num_lwps--;
62a93fa9
PA
1133
1134 /* Resume the lwp_terminate-caller thread. */
a7be7fa8 1135 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
62a93fa9
PA
1136 ttrace (TT_LWP_CONTINUE, ptid_get_pid (ptid),
1137 ptid_get_lwp (ptid), TT_NOPC, 0, 0);
1138 /* Return without stopping the whole process. */
1139 ourstatus->kind = TARGET_WAITKIND_IGNORE;
1140 return ptid;
932936f0 1141
eee22bf8
MK
1142 case TTEVT_SIGNAL:
1143 ourstatus->kind = TARGET_WAITKIND_STOPPED;
1144 ourstatus->value.sig =
2ea28649 1145 gdb_signal_from_host (tts.tts_u.tts_signal.tts_signo);
eee22bf8 1146 break;
932936f0
MK
1147
1148 case TTEVT_SYSCALL_ENTRY:
1149 gdb_assert (inf_ttrace_reenable_page_protections == 0);
a7be7fa8
MK
1150 inf_ttrace_num_lwps_in_syscall++;
1151 if (inf_ttrace_num_lwps_in_syscall == 1)
932936f0
MK
1152 {
1153 /* A thread has just entered a system call. Disable any
1154 page protections as the kernel can't deal with them. */
1155 inf_ttrace_disable_page_protections (tts.tts_pid);
1156 }
1157 ourstatus->kind = TARGET_WAITKIND_SYSCALL_ENTRY;
01dedca2 1158 ourstatus->value.syscall_number = tts.tts_scno;
932936f0
MK
1159 break;
1160
1161 case TTEVT_SYSCALL_RETURN:
a7be7fa8 1162 if (inf_ttrace_num_lwps_in_syscall > 0)
932936f0
MK
1163 {
1164 /* If the last thread has just left the system call, this
1165 would be a logical place to re-enable the page
1166 protections, but that doesn't work. We can't re-enable
1167 them until we've done another wait. */
1168 inf_ttrace_reenable_page_protections =
a7be7fa8
MK
1169 (inf_ttrace_num_lwps_in_syscall == 1);
1170 inf_ttrace_num_lwps_in_syscall--;
932936f0
MK
1171 }
1172 ourstatus->kind = TARGET_WAITKIND_SYSCALL_RETURN;
01dedca2 1173 ourstatus->value.syscall_number = tts.tts_scno;
932936f0 1174 break;
a7be7fa8
MK
1175
1176 default:
1177 gdb_assert (!"Unexpected ttrace event");
1178 break;
eee22bf8
MK
1179 }
1180
1181 /* Make sure all threads within the process are stopped. */
1182 if (ttrace (TT_PROC_STOP, tts.tts_pid, 0, 0, 0, 0) == -1)
e2e0b3e5 1183 perror_with_name (("ttrace"));
eee22bf8 1184
438ac09b
PA
1185 /* Now that the whole process is stopped, check if any dying thread
1186 is really dead by now. If a dying thread is still alive, it will
1187 be stopped too, and will still show up in `info threads', tagged
1188 with "(Exiting)". We could make `info threads' prune dead
1189 threads instead via inf_ttrace_thread_alive, but doing this here
1190 has the advantage that a frontend is notificed sooner of thread
1191 exits. Note that a dying lwp is still alive, it still has to be
1192 resumed, like any other lwp. */
1193 iterate_over_threads (inf_ttrace_delete_dead_threads_callback, NULL);
1194
a7be7fa8 1195 return ptid;
eee22bf8
MK
1196}
1197
1198/* Transfer LEN bytes from ADDR in the inferior's memory into READBUF,
1199 and transfer LEN bytes from WRITEBUF into the inferior's memory at
1200 ADDR. Either READBUF or WRITEBUF may be null, in which case the
1201 corresponding transfer doesn't happen. Return the number of bytes
1202 actually transferred (which may be zero if an error occurs). */
1203
1204static LONGEST
1205inf_ttrace_xfer_memory (CORE_ADDR addr, ULONGEST len,
1206 void *readbuf, const void *writebuf)
1207{
1208 pid_t pid = ptid_get_pid (inferior_ptid);
1209
1210 /* HP-UX treats text space and data space differently. GDB however,
1211 doesn't really know the difference. Therefore we try both. Try
1212 text space before data space though because when we're writing
1213 into text space the instruction cache might need to be flushed. */
1214
1215 if (readbuf
1216 && ttrace (TT_PROC_RDTEXT, pid, 0, addr, len, (uintptr_t)readbuf) == -1
1217 && ttrace (TT_PROC_RDDATA, pid, 0, addr, len, (uintptr_t)readbuf) == -1)
1218 return 0;
1219
1220 if (writebuf
1221 && ttrace (TT_PROC_WRTEXT, pid, 0, addr, len, (uintptr_t)writebuf) == -1
1222 && ttrace (TT_PROC_WRDATA, pid, 0, addr, len, (uintptr_t)writebuf) == -1)
1223 return 0;
1224
1225 return len;
1226}
1227
1228static LONGEST
1229inf_ttrace_xfer_partial (struct target_ops *ops, enum target_object object,
7a4609f7 1230 const char *annex, gdb_byte *readbuf,
3e43a32a
MS
1231 const gdb_byte *writebuf,
1232 ULONGEST offset, LONGEST len)
eee22bf8
MK
1233{
1234 switch (object)
1235 {
1236 case TARGET_OBJECT_MEMORY:
1237 return inf_ttrace_xfer_memory (offset, len, readbuf, writebuf);
1238
1239 case TARGET_OBJECT_UNWIND_TABLE:
1240 return -1;
1241
1242 case TARGET_OBJECT_AUXV:
1243 return -1;
1244
1245 case TARGET_OBJECT_WCOOKIE:
1246 return -1;
1247
1248 default:
1249 return -1;
1250 }
1251}
1252
1253/* Print status information about what we're accessing. */
1254
1255static void
1256inf_ttrace_files_info (struct target_ops *ignore)
1257{
181e7f93 1258 struct inferior *inf = current_inferior ();
346e281c 1259 printf_filtered (_("\tUsing the running image of %s %s.\n"),
181e7f93 1260 inf->attach_flag ? "attached" : "child",
346e281c 1261 target_pid_to_str (inferior_ptid));
eee22bf8 1262}
a7be7fa8
MK
1263
1264static int
28439f5e 1265inf_ttrace_thread_alive (struct target_ops *ops, ptid_t ptid)
a7be7fa8 1266{
438ac09b
PA
1267 return 1;
1268}
1269
1270/* Return a string describing the state of the thread specified by
1271 INFO. */
1272
1273static char *
1274inf_ttrace_extra_thread_info (struct thread_info *info)
1275{
1276 struct inf_ttrace_private_thread_info* private =
1277 (struct inf_ttrace_private_thread_info *) info->private;
1278
1279 if (private != NULL && private->dying)
1280 return "Exiting";
1281
1282 return NULL;
a7be7fa8
MK
1283}
1284
1285static char *
117de6a9 1286inf_ttrace_pid_to_str (struct target_ops *ops, ptid_t ptid)
a7be7fa8 1287{
2935f27f
PA
1288 pid_t pid = ptid_get_pid (ptid);
1289 lwpid_t lwpid = ptid_get_lwp (ptid);
1290 static char buf[128];
a7be7fa8 1291
2935f27f
PA
1292 if (lwpid == 0)
1293 xsnprintf (buf, sizeof buf, "process %ld",
1294 (long) pid);
1295 else
1296 xsnprintf (buf, sizeof buf, "process %ld, lwp %ld",
1297 (long) pid, (long) lwpid);
1298 return buf;
a7be7fa8 1299}
eee22bf8
MK
1300\f
1301
fa07e785
JB
1302/* Implement the get_ada_task_ptid target_ops method. */
1303
1304static ptid_t
1305inf_ttrace_get_ada_task_ptid (long lwp, long thread)
1306{
1307 return ptid_build (ptid_get_pid (inferior_ptid), lwp, 0);
1308}
1309
1310\f
eee22bf8
MK
1311struct target_ops *
1312inf_ttrace_target (void)
1313{
1314 struct target_ops *t = inf_child_target ();
1315
eee22bf8
MK
1316 t->to_attach = inf_ttrace_attach;
1317 t->to_detach = inf_ttrace_detach;
1318 t->to_resume = inf_ttrace_resume;
1319 t->to_wait = inf_ttrace_wait;
eee22bf8 1320 t->to_files_info = inf_ttrace_files_info;
932936f0 1321 t->to_can_use_hw_breakpoint = inf_ttrace_can_use_hw_breakpoint;
932936f0
MK
1322 t->to_insert_watchpoint = inf_ttrace_insert_watchpoint;
1323 t->to_remove_watchpoint = inf_ttrace_remove_watchpoint;
1324 t->to_stopped_by_watchpoint = inf_ttrace_stopped_by_watchpoint;
2a3cdf79
WZ
1325 t->to_region_ok_for_hw_watchpoint =
1326 inf_ttrace_region_ok_for_hw_watchpoint;
346e281c
MK
1327 t->to_kill = inf_ttrace_kill;
1328 t->to_create_inferior = inf_ttrace_create_inferior;
1329 t->to_follow_fork = inf_ttrace_follow_fork;
1330 t->to_mourn_inferior = inf_ttrace_mourn_inferior;
1331 t->to_thread_alive = inf_ttrace_thread_alive;
438ac09b 1332 t->to_extra_thread_info = inf_ttrace_extra_thread_info;
346e281c
MK
1333 t->to_pid_to_str = inf_ttrace_pid_to_str;
1334 t->to_xfer_partial = inf_ttrace_xfer_partial;
fa07e785 1335 t->to_get_ada_task_ptid = inf_ttrace_get_ada_task_ptid;
eee22bf8 1336
eee22bf8
MK
1337 return t;
1338}
d3322e8a 1339#endif
932936f0
MK
1340\f
1341
1342/* Prevent warning from -Wmissing-prototypes. */
0b155465 1343void _initialize_inf_ttrace (void);
eee22bf8 1344
932936f0
MK
1345void
1346_initialize_inf_ttrace (void)
1347{
d3322e8a 1348#ifdef HAVE_TTRACE
932936f0 1349 inf_ttrace_page_dict.pagesize = getpagesize();
eee22bf8 1350#endif
d3322e8a 1351}
This page took 1.305684 seconds and 4 git commands to generate.