FRV Linux: Fill 'collect_regset' in regset structures.
[deliverable/binutils-gdb.git] / gdb / inf-ttrace.c
CommitLineData
eee22bf8
MK
1/* Low-level child interface to ttrace.
2
ecd75fc8 3 Copyright (C) 2004-2014 Free Software Foundation, Inc.
eee22bf8
MK
4
5 This file is part of GDB.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
eee22bf8
MK
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
eee22bf8
MK
19
20#include "defs.h"
21
22/* The ttrace(2) system call didn't exist before HP-UX 10.30. Don't
23 try to compile this code unless we have it. */
24#ifdef HAVE_TTRACE
25
26#include "command.h"
27#include "gdbcore.h"
a7be7fa8 28#include "gdbthread.h"
eee22bf8 29#include "inferior.h"
191c4426 30#include "terminal.h"
eee22bf8 31#include "target.h"
932936f0 32#include <sys/mman.h>
eee22bf8 33#include <sys/ttrace.h>
438ac09b 34#include <signal.h>
eee22bf8
MK
35
36#include "inf-child.h"
37#include "inf-ttrace.h"
21ff4686 38#include "common/filestuff.h"
eee22bf8 39
932936f0
MK
40\f
41
a7be7fa8
MK
42/* HP-UX uses a threading model where each user-space thread
43 corresponds to a kernel thread. These kernel threads are called
44 lwps. The ttrace(2) interface gives us almost full control over
45 the threads, which makes it very easy to support them in GDB. We
46 identify the threads by process ID and lwp ID. The ttrace(2) also
47 provides us with a thread's user ID (in the `tts_user_tid' member
48 of `ttstate_t') but we don't use that (yet) as it isn't necessary
49 to uniquely label the thread. */
50
51/* Number of active lwps. */
52static int inf_ttrace_num_lwps;
53\f
54
932936f0
MK
55/* On HP-UX versions that have the ttrace(2) system call, we can
56 implement "hardware" watchpoints by fiddling with the protection of
57 pages in the address space that contain the variable being watched.
58 In order to implement this, we keep a dictionary of pages for which
59 we have changed the protection. */
60
61struct inf_ttrace_page
62{
63 CORE_ADDR addr; /* Page address. */
64 int prot; /* Protection. */
65 int refcount; /* Reference count. */
66 struct inf_ttrace_page *next;
67 struct inf_ttrace_page *prev;
68};
69
70struct inf_ttrace_page_dict
71{
72 struct inf_ttrace_page buckets[128];
73 int pagesize; /* Page size. */
74 int count; /* Number of pages in this dictionary. */
75} inf_ttrace_page_dict;
76
60e2c248
JG
77struct inf_ttrace_private_thread_info
78{
79 int dying;
80};
81
a7be7fa8
MK
82/* Number of lwps that are currently in a system call. */
83static int inf_ttrace_num_lwps_in_syscall;
932936f0
MK
84
85/* Flag to indicate whether we should re-enable page protections after
86 the next wait. */
87static int inf_ttrace_reenable_page_protections;
88
89/* Enable system call events for process PID. */
90
91static void
92inf_ttrace_enable_syscall_events (pid_t pid)
93{
94 ttevent_t tte;
95 ttstate_t tts;
96
a7be7fa8 97 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
932936f0
MK
98
99 if (ttrace (TT_PROC_GET_EVENT_MASK, pid, 0,
100 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 101 perror_with_name (("ttrace"));
932936f0
MK
102
103 tte.tte_events |= (TTEVT_SYSCALL_ENTRY | TTEVT_SYSCALL_RETURN);
104
105 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
106 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 107 perror_with_name (("ttrace"));
932936f0
MK
108
109 if (ttrace (TT_PROC_GET_FIRST_LWP_STATE, pid, 0,
110 (uintptr_t)&tts, sizeof tts, 0) == -1)
e2e0b3e5 111 perror_with_name (("ttrace"));
932936f0
MK
112
113 if (tts.tts_flags & TTS_INSYSCALL)
a7be7fa8 114 inf_ttrace_num_lwps_in_syscall++;
932936f0
MK
115
116 /* FIXME: Handle multiple threads. */
117}
118
119/* Disable system call events for process PID. */
120
121static void
122inf_ttrace_disable_syscall_events (pid_t pid)
123{
124 ttevent_t tte;
125
126 gdb_assert (inf_ttrace_page_dict.count == 0);
127
128 if (ttrace (TT_PROC_GET_EVENT_MASK, pid, 0,
129 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 130 perror_with_name (("ttrace"));
932936f0
MK
131
132 tte.tte_events &= ~(TTEVT_SYSCALL_ENTRY | TTEVT_SYSCALL_RETURN);
133
134 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
135 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 136 perror_with_name (("ttrace"));
932936f0 137
a7be7fa8 138 inf_ttrace_num_lwps_in_syscall = 0;
932936f0
MK
139}
140
141/* Get information about the page at address ADDR for process PID from
142 the dictionary. */
143
144static struct inf_ttrace_page *
145inf_ttrace_get_page (pid_t pid, CORE_ADDR addr)
146{
147 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
148 const int pagesize = inf_ttrace_page_dict.pagesize;
149 int bucket;
150 struct inf_ttrace_page *page;
151
152 bucket = (addr / pagesize) % num_buckets;
153 page = &inf_ttrace_page_dict.buckets[bucket];
154 while (page)
155 {
156 if (page->addr == addr)
157 break;
158
159 page = page->next;
160 }
161
162 return page;
163}
164
165/* Add the page at address ADDR for process PID to the dictionary. */
166
167static struct inf_ttrace_page *
168inf_ttrace_add_page (pid_t pid, CORE_ADDR addr)
169{
170 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
171 const int pagesize = inf_ttrace_page_dict.pagesize;
172 int bucket;
173 struct inf_ttrace_page *page;
174 struct inf_ttrace_page *prev = NULL;
175
176 bucket = (addr / pagesize) % num_buckets;
177 page = &inf_ttrace_page_dict.buckets[bucket];
178 while (page)
179 {
180 if (page->addr == addr)
181 break;
182
183 prev = page;
184 page = page->next;
185 }
186
187 if (!page)
188 {
189 int prot;
190
191 if (ttrace (TT_PROC_GET_MPROTECT, pid, 0,
192 addr, 0, (uintptr_t)&prot) == -1)
e2e0b3e5 193 perror_with_name (("ttrace"));
932936f0 194
70ba0933 195 page = XNEW (struct inf_ttrace_page);
932936f0
MK
196 page->addr = addr;
197 page->prot = prot;
198 page->refcount = 0;
199 page->next = NULL;
200
201 page->prev = prev;
202 prev->next = page;
203
204 inf_ttrace_page_dict.count++;
205 if (inf_ttrace_page_dict.count == 1)
206 inf_ttrace_enable_syscall_events (pid);
207
a7be7fa8 208 if (inf_ttrace_num_lwps_in_syscall == 0)
932936f0
MK
209 {
210 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
211 addr, pagesize, prot & ~PROT_WRITE) == -1)
e2e0b3e5 212 perror_with_name (("ttrace"));
932936f0
MK
213 }
214 }
215
216 return page;
217}
218
219/* Insert the page at address ADDR of process PID to the dictionary. */
220
221static void
222inf_ttrace_insert_page (pid_t pid, CORE_ADDR addr)
223{
224 struct inf_ttrace_page *page;
225
226 page = inf_ttrace_get_page (pid, addr);
227 if (!page)
228 page = inf_ttrace_add_page (pid, addr);
229
230 page->refcount++;
231}
232
233/* Remove the page at address ADDR of process PID from the dictionary. */
234
235static void
236inf_ttrace_remove_page (pid_t pid, CORE_ADDR addr)
237{
238 const int pagesize = inf_ttrace_page_dict.pagesize;
239 struct inf_ttrace_page *page;
240
241 page = inf_ttrace_get_page (pid, addr);
242 page->refcount--;
243
244 gdb_assert (page->refcount >= 0);
245
246 if (page->refcount == 0)
247 {
a7be7fa8 248 if (inf_ttrace_num_lwps_in_syscall == 0)
932936f0
MK
249 {
250 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
251 addr, pagesize, page->prot) == -1)
e2e0b3e5 252 perror_with_name (("ttrace"));
932936f0
MK
253 }
254
255 inf_ttrace_page_dict.count--;
256 if (inf_ttrace_page_dict.count == 0)
257 inf_ttrace_disable_syscall_events (pid);
258
259 page->prev->next = page->next;
260 if (page->next)
261 page->next->prev = page->prev;
262
263 xfree (page);
264 }
265}
266
267/* Mask the bits in PROT from the page protections that are currently
268 in the dictionary for process PID. */
269
270static void
271inf_ttrace_mask_page_protections (pid_t pid, int prot)
272{
273 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
274 const int pagesize = inf_ttrace_page_dict.pagesize;
275 int bucket;
276
277 for (bucket = 0; bucket < num_buckets; bucket++)
278 {
279 struct inf_ttrace_page *page;
280
281 page = inf_ttrace_page_dict.buckets[bucket].next;
282 while (page)
283 {
284 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
285 page->addr, pagesize, page->prot & ~prot) == -1)
e2e0b3e5 286 perror_with_name (("ttrace"));
932936f0
MK
287
288 page = page->next;
289 }
290 }
291}
292
293/* Write-protect the pages in the dictionary for process PID. */
294
295static void
296inf_ttrace_enable_page_protections (pid_t pid)
297{
298 inf_ttrace_mask_page_protections (pid, PROT_WRITE);
299}
300
301/* Restore the protection of the pages in the dictionary for process
302 PID. */
303
304static void
305inf_ttrace_disable_page_protections (pid_t pid)
306{
307 inf_ttrace_mask_page_protections (pid, 0);
308}
309
310/* Insert a "hardware" watchpoint for LEN bytes at address ADDR of
311 type TYPE. */
312
313static int
7bb99c53
TT
314inf_ttrace_insert_watchpoint (struct target_ops *self,
315 CORE_ADDR addr, int len, int type,
0cf6dd15 316 struct expression *cond)
932936f0
MK
317{
318 const int pagesize = inf_ttrace_page_dict.pagesize;
319 pid_t pid = ptid_get_pid (inferior_ptid);
320 CORE_ADDR page_addr;
321 int num_pages;
322 int page;
323
324 gdb_assert (type == hw_write);
325
326 page_addr = (addr / pagesize) * pagesize;
327 num_pages = (len + pagesize - 1) / pagesize;
328
329 for (page = 0; page < num_pages; page++, page_addr += pagesize)
330 inf_ttrace_insert_page (pid, page_addr);
331
332 return 1;
333}
334
335/* Remove a "hardware" watchpoint for LEN bytes at address ADDR of
336 type TYPE. */
337
338static int
11b5219a
TT
339inf_ttrace_remove_watchpoint (struct target_ops *self,
340 CORE_ADDR addr, int len, int type,
0cf6dd15 341 struct expression *cond)
932936f0
MK
342{
343 const int pagesize = inf_ttrace_page_dict.pagesize;
344 pid_t pid = ptid_get_pid (inferior_ptid);
345 CORE_ADDR page_addr;
346 int num_pages;
347 int page;
348
349 gdb_assert (type == hw_write);
350
351 page_addr = (addr / pagesize) * pagesize;
352 num_pages = (len + pagesize - 1) / pagesize;
353
354 for (page = 0; page < num_pages; page++, page_addr += pagesize)
355 inf_ttrace_remove_page (pid, page_addr);
356
357 return 1;
358}
359
360static int
5461485a
TT
361inf_ttrace_can_use_hw_breakpoint (struct target_ops *self,
362 int type, int len, int ot)
932936f0
MK
363{
364 return (type == bp_hardware_watchpoint);
365}
366
367static int
31568a15
TT
368inf_ttrace_region_ok_for_hw_watchpoint (struct target_ops *self,
369 CORE_ADDR addr, int len)
932936f0
MK
370{
371 return 1;
372}
373
374/* Return non-zero if the current inferior was (potentially) stopped
375 by hitting a "hardware" watchpoint. */
376
377static int
6a109b6b 378inf_ttrace_stopped_by_watchpoint (struct target_ops *ops)
932936f0
MK
379{
380 pid_t pid = ptid_get_pid (inferior_ptid);
381 lwpid_t lwpid = ptid_get_lwp (inferior_ptid);
382 ttstate_t tts;
383
384 if (inf_ttrace_page_dict.count > 0)
385 {
386 if (ttrace (TT_LWP_GET_STATE, pid, lwpid,
387 (uintptr_t)&tts, sizeof tts, 0) == -1)
e2e0b3e5 388 perror_with_name (("ttrace"));
932936f0
MK
389
390 if (tts.tts_event == TTEVT_SIGNAL
391 && tts.tts_u.tts_signal.tts_signo == SIGBUS)
392 {
393 const int pagesize = inf_ttrace_page_dict.pagesize;
394 void *addr = tts.tts_u.tts_signal.tts_siginfo.si_addr;
395 CORE_ADDR page_addr = ((uintptr_t)addr / pagesize) * pagesize;
396
397 if (inf_ttrace_get_page (pid, page_addr))
398 return 1;
399 }
400 }
401
402 return 0;
403}
404\f
eee22bf8 405
b2a4db28
MK
406/* When tracking a vfork(2), we cannot detach from the parent until
407 after the child has called exec(3) or has exited. If we are still
408 attached to the parent, this variable will be set to the process ID
409 of the parent. Otherwise it will be set to zero. */
410static pid_t inf_ttrace_vfork_ppid = -1;
411
412static int
07107ca6
LM
413inf_ttrace_follow_fork (struct target_ops *ops, int follow_child,
414 int detach_fork)
b2a4db28
MK
415{
416 pid_t pid, fpid;
417 lwpid_t lwpid, flwpid;
418 ttstate_t tts;
e58b0e63
PA
419 struct thread_info *tp = inferior_thread ();
420
421 gdb_assert (tp->pending_follow.kind == TARGET_WAITKIND_FORKED
422 || tp->pending_follow.kind == TARGET_WAITKIND_VFORKED);
423
424 pid = ptid_get_pid (inferior_ptid);
425 lwpid = ptid_get_lwp (inferior_ptid);
b2a4db28
MK
426
427 /* Get all important details that core GDB doesn't (and shouldn't)
428 know about. */
429 if (ttrace (TT_LWP_GET_STATE, pid, lwpid,
430 (uintptr_t)&tts, sizeof tts, 0) == -1)
431 perror_with_name (("ttrace"));
432
433 gdb_assert (tts.tts_event == TTEVT_FORK || tts.tts_event == TTEVT_VFORK);
434
435 if (tts.tts_u.tts_fork.tts_isparent)
436 {
437 pid = tts.tts_pid;
438 lwpid = tts.tts_lwpid;
439 fpid = tts.tts_u.tts_fork.tts_fpid;
440 flwpid = tts.tts_u.tts_fork.tts_flwpid;
441 }
442 else
443 {
444 pid = tts.tts_u.tts_fork.tts_fpid;
445 lwpid = tts.tts_u.tts_fork.tts_flwpid;
446 fpid = tts.tts_pid;
447 flwpid = tts.tts_lwpid;
448 }
449
450 if (follow_child)
451 {
77435e4c 452 struct inferior *inf;
191c4426
PA
453 struct inferior *parent_inf;
454
455 parent_inf = find_inferior_pid (pid);
77435e4c 456
b2a4db28 457 inferior_ptid = ptid_build (fpid, flwpid, 0);
77435e4c 458 inf = add_inferior (fpid);
191c4426 459 inf->attach_flag = parent_inf->attach_flag;
6c95b8df
PA
460 inf->pspace = parent_inf->pspace;
461 inf->aspace = parent_inf->aspace;
191c4426 462 copy_terminal_info (inf, parent_inf);
d80ee84f 463 detach_breakpoints (ptid_build (pid, lwpid, 0));
b2a4db28
MK
464
465 target_terminal_ours ();
3e43a32a
MS
466 fprintf_unfiltered (gdb_stdlog,
467 _("Attaching after fork to child process %ld.\n"),
468 (long)fpid);
b2a4db28
MK
469 }
470 else
471 {
472 inferior_ptid = ptid_build (pid, lwpid, 0);
2dcc6086
JB
473 /* Detach any remaining breakpoints in the child. In the case
474 of fork events, we do not need to do this, because breakpoints
475 should have already been removed earlier. */
476 if (tts.tts_event == TTEVT_VFORK)
d80ee84f 477 detach_breakpoints (ptid_build (fpid, flwpid, 0));
b2a4db28
MK
478
479 target_terminal_ours ();
3e43a32a
MS
480 fprintf_unfiltered (gdb_stdlog,
481 _("Detaching after fork from child process %ld.\n"),
482 (long)fpid);
b2a4db28
MK
483 }
484
485 if (tts.tts_event == TTEVT_VFORK)
486 {
487 gdb_assert (!tts.tts_u.tts_fork.tts_isparent);
488
489 if (follow_child)
490 {
491 /* We can't detach from the parent yet. */
492 inf_ttrace_vfork_ppid = pid;
493
494 reattach_breakpoints (fpid);
495 }
496 else
497 {
498 if (ttrace (TT_PROC_DETACH, fpid, 0, 0, 0, 0) == -1)
499 perror_with_name (("ttrace"));
500
501 /* Wait till we get the TTEVT_VFORK event in the parent.
502 This indicates that the child has called exec(3) or has
503 exited and that the parent is ready to be traced again. */
504 if (ttrace_wait (pid, lwpid, TTRACE_WAITOK, &tts, sizeof tts) == -1)
505 perror_with_name (("ttrace_wait"));
506 gdb_assert (tts.tts_event == TTEVT_VFORK);
507 gdb_assert (tts.tts_u.tts_fork.tts_isparent);
508
509 reattach_breakpoints (pid);
510 }
511 }
512 else
513 {
514 gdb_assert (tts.tts_u.tts_fork.tts_isparent);
515
516 if (follow_child)
517 {
518 if (ttrace (TT_PROC_DETACH, pid, 0, 0, 0, 0) == -1)
519 perror_with_name (("ttrace"));
520 }
521 else
522 {
523 if (ttrace (TT_PROC_DETACH, fpid, 0, 0, 0, 0) == -1)
524 perror_with_name (("ttrace"));
525 }
526 }
527
528 if (follow_child)
529 {
2935f27f
PA
530 struct thread_info *ti;
531
b2a4db28 532 /* The child will start out single-threaded. */
2935f27f 533 inf_ttrace_num_lwps = 1;
b2a4db28
MK
534 inf_ttrace_num_lwps_in_syscall = 0;
535
2935f27f
PA
536 /* Delete parent. */
537 delete_thread_silent (ptid_build (pid, lwpid, 0));
7f9f62ba 538 detach_inferior (pid);
2935f27f 539
7f9f62ba 540 /* Add child thread. inferior_ptid was already set above. */
2935f27f
PA
541 ti = add_thread_silent (inferior_ptid);
542 ti->private =
543 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
544 memset (ti->private, 0,
545 sizeof (struct inf_ttrace_private_thread_info));
b2a4db28
MK
546 }
547
548 return 0;
549}
550\f
551
eee22bf8
MK
552/* File descriptors for pipes used as semaphores during initial
553 startup of an inferior. */
554static int inf_ttrace_pfd1[2];
555static int inf_ttrace_pfd2[2];
556
557static void
558do_cleanup_pfds (void *dummy)
559{
560 close (inf_ttrace_pfd1[0]);
561 close (inf_ttrace_pfd1[1]);
562 close (inf_ttrace_pfd2[0]);
563 close (inf_ttrace_pfd2[1]);
21ff4686
TT
564
565 unmark_fd_no_cloexec (inf_ttrace_pfd1[0]);
566 unmark_fd_no_cloexec (inf_ttrace_pfd1[1]);
567 unmark_fd_no_cloexec (inf_ttrace_pfd2[0]);
568 unmark_fd_no_cloexec (inf_ttrace_pfd2[1]);
eee22bf8
MK
569}
570
571static void
572inf_ttrace_prepare (void)
573{
574 if (pipe (inf_ttrace_pfd1) == -1)
a3f17187 575 perror_with_name (("pipe"));
eee22bf8
MK
576
577 if (pipe (inf_ttrace_pfd2) == -1)
578 {
579 close (inf_ttrace_pfd1[0]);
580 close (inf_ttrace_pfd2[0]);
a3f17187 581 perror_with_name (("pipe"));
eee22bf8 582 }
21ff4686
TT
583
584 mark_fd_no_cloexec (inf_ttrace_pfd1[0]);
585 mark_fd_no_cloexec (inf_ttrace_pfd1[1]);
586 mark_fd_no_cloexec (inf_ttrace_pfd2[0]);
587 mark_fd_no_cloexec (inf_ttrace_pfd2[1]);
eee22bf8
MK
588}
589
590/* Prepare to be traced. */
591
592static void
593inf_ttrace_me (void)
594{
595 struct cleanup *old_chain = make_cleanup (do_cleanup_pfds, 0);
596 char c;
597
598 /* "Trace me, Dr. Memory!" */
599 if (ttrace (TT_PROC_SETTRC, 0, 0, 0, TT_VERSION, 0) == -1)
e2e0b3e5 600 perror_with_name (("ttrace"));
eee22bf8
MK
601
602 /* Tell our parent that we are ready to be traced. */
603 if (write (inf_ttrace_pfd1[1], &c, sizeof c) != sizeof c)
e2e0b3e5 604 perror_with_name (("write"));
eee22bf8
MK
605
606 /* Wait until our parent has set the initial event mask. */
607 if (read (inf_ttrace_pfd2[0], &c, sizeof c) != sizeof c)
e2e0b3e5 608 perror_with_name (("read"));
eee22bf8
MK
609
610 do_cleanups (old_chain);
611}
612
613/* Start tracing PID. */
614
615static void
28439f5e 616inf_ttrace_him (struct target_ops *ops, int pid)
eee22bf8
MK
617{
618 struct cleanup *old_chain = make_cleanup (do_cleanup_pfds, 0);
619 ttevent_t tte;
eee22bf8
MK
620 char c;
621
622 /* Wait until our child is ready to be traced. */
623 if (read (inf_ttrace_pfd1[0], &c, sizeof c) != sizeof c)
e2e0b3e5 624 perror_with_name (("read"));
eee22bf8
MK
625
626 /* Set the initial event mask. */
627 memset (&tte, 0, sizeof (tte));
b2a4db28 628 tte.tte_events |= TTEVT_EXEC | TTEVT_EXIT | TTEVT_FORK | TTEVT_VFORK;
a7be7fa8 629 tte.tte_events |= TTEVT_LWP_CREATE | TTEVT_LWP_EXIT | TTEVT_LWP_TERMINATE;
7ba0e0c2
MK
630#ifdef TTEVT_BPT_SSTEP
631 tte.tte_events |= TTEVT_BPT_SSTEP;
632#endif
b2a4db28 633 tte.tte_opts |= TTEO_PROC_INHERIT;
eee22bf8
MK
634 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
635 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 636 perror_with_name (("ttrace"));
eee22bf8
MK
637
638 /* Tell our child that we have set the initial event mask. */
639 if (write (inf_ttrace_pfd2[1], &c, sizeof c) != sizeof c)
e2e0b3e5 640 perror_with_name (("write"));
eee22bf8
MK
641
642 do_cleanups (old_chain);
643
6a3cb8e8
PA
644 if (!target_is_pushed (ops))
645 push_target (ops);
eee22bf8 646
eee22bf8
MK
647 startup_inferior (START_INFERIOR_TRAPS_EXPECTED);
648
649 /* On some targets, there must be some explicit actions taken after
650 the inferior has been started up. */
651 target_post_startup_inferior (pid_to_ptid (pid));
652}
653
654static void
136d6dae
VP
655inf_ttrace_create_inferior (struct target_ops *ops, char *exec_file,
656 char *allargs, char **env, int from_tty)
eee22bf8 657{
28439f5e
PA
658 int pid;
659
a7be7fa8
MK
660 gdb_assert (inf_ttrace_num_lwps == 0);
661 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
932936f0 662 gdb_assert (inf_ttrace_page_dict.count == 0);
932936f0 663 gdb_assert (inf_ttrace_reenable_page_protections == 0);
b2a4db28 664 gdb_assert (inf_ttrace_vfork_ppid == -1);
932936f0 665
28439f5e 666 pid = fork_inferior (exec_file, allargs, env, inf_ttrace_me, NULL,
e69860f1 667 inf_ttrace_prepare, NULL, NULL);
28439f5e
PA
668
669 inf_ttrace_him (ops, pid);
eee22bf8
MK
670}
671
eee22bf8 672static void
136d6dae 673inf_ttrace_mourn_inferior (struct target_ops *ops)
eee22bf8 674{
932936f0
MK
675 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
676 int bucket;
677
a7be7fa8
MK
678 inf_ttrace_num_lwps = 0;
679 inf_ttrace_num_lwps_in_syscall = 0;
932936f0
MK
680
681 for (bucket = 0; bucket < num_buckets; bucket++)
682 {
683 struct inf_ttrace_page *page;
684 struct inf_ttrace_page *next;
685
686 page = inf_ttrace_page_dict.buckets[bucket].next;
687 while (page)
688 {
689 next = page->next;
690 xfree (page);
691 page = next;
692 }
693 }
694 inf_ttrace_page_dict.count = 0;
695
c1ee2fb3 696 inf_child_mourn_inferior (ops);
eee22bf8
MK
697}
698
f688d93f
JB
699/* Assuming we just attached the debugger to a new inferior, create
700 a new thread_info structure for each thread, and add it to our
701 list of threads. */
702
703static void
704inf_ttrace_create_threads_after_attach (int pid)
705{
706 int status;
707 ptid_t ptid;
708 ttstate_t tts;
709 struct thread_info *ti;
710
711 status = ttrace (TT_PROC_GET_FIRST_LWP_STATE, pid, 0,
712 (uintptr_t) &tts, sizeof (ttstate_t), 0);
713 if (status < 0)
714 perror_with_name (_("TT_PROC_GET_FIRST_LWP_STATE ttrace call failed"));
715 gdb_assert (tts.tts_pid == pid);
716
717 /* Add the stopped thread. */
718 ptid = ptid_build (pid, tts.tts_lwpid, 0);
719 ti = add_thread (ptid);
720 ti->private = xzalloc (sizeof (struct inf_ttrace_private_thread_info));
721 inf_ttrace_num_lwps++;
722
723 /* We use the "first stopped thread" as the currently active thread. */
724 inferior_ptid = ptid;
725
726 /* Iterative over all the remaining threads. */
727
728 for (;;)
729 {
730 ptid_t ptid;
731
732 status = ttrace (TT_PROC_GET_NEXT_LWP_STATE, pid, 0,
733 (uintptr_t) &tts, sizeof (ttstate_t), 0);
734 if (status < 0)
735 perror_with_name (_("TT_PROC_GET_NEXT_LWP_STATE ttrace call failed"));
736 if (status == 0)
737 break; /* End of list. */
738
739 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
740 ti = add_thread (ptid);
741 ti->private = xzalloc (sizeof (struct inf_ttrace_private_thread_info));
742 inf_ttrace_num_lwps++;
743 }
744}
745
eee22bf8 746static void
c0939df1 747inf_ttrace_attach (struct target_ops *ops, const char *args, int from_tty)
eee22bf8
MK
748{
749 char *exec_file;
750 pid_t pid;
932936f0 751 ttevent_t tte;
181e7f93 752 struct inferior *inf;
eee22bf8 753
74164c56 754 pid = parse_pid_to_attach (args);
eee22bf8
MK
755
756 if (pid == getpid ()) /* Trying to masturbate? */
8a3fe4f8 757 error (_("I refuse to debug myself!"));
eee22bf8
MK
758
759 if (from_tty)
760 {
346e281c 761 exec_file = get_exec_file (0);
eee22bf8
MK
762
763 if (exec_file)
a3f17187 764 printf_unfiltered (_("Attaching to program: %s, %s\n"), exec_file,
eee22bf8
MK
765 target_pid_to_str (pid_to_ptid (pid)));
766 else
a3f17187 767 printf_unfiltered (_("Attaching to %s\n"),
eee22bf8
MK
768 target_pid_to_str (pid_to_ptid (pid)));
769
770 gdb_flush (gdb_stdout);
771 }
772
a7be7fa8
MK
773 gdb_assert (inf_ttrace_num_lwps == 0);
774 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
b2a4db28 775 gdb_assert (inf_ttrace_vfork_ppid == -1);
a7be7fa8 776
eee22bf8 777 if (ttrace (TT_PROC_ATTACH, pid, 0, TT_KILL_ON_EXIT, TT_VERSION, 0) == -1)
e2e0b3e5 778 perror_with_name (("ttrace"));
eee22bf8 779
6c95b8df
PA
780 inf = current_inferior ();
781 inferior_appeared (inf, pid);
181e7f93 782 inf->attach_flag = 1;
7f9f62ba 783
932936f0 784 /* Set the initial event mask. */
932936f0 785 memset (&tte, 0, sizeof (tte));
b2a4db28 786 tte.tte_events |= TTEVT_EXEC | TTEVT_EXIT | TTEVT_FORK | TTEVT_VFORK;
a7be7fa8 787 tte.tte_events |= TTEVT_LWP_CREATE | TTEVT_LWP_EXIT | TTEVT_LWP_TERMINATE;
7ba0e0c2
MK
788#ifdef TTEVT_BPT_SSTEP
789 tte.tte_events |= TTEVT_BPT_SSTEP;
790#endif
b2a4db28 791 tte.tte_opts |= TTEO_PROC_INHERIT;
932936f0
MK
792 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
793 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 794 perror_with_name (("ttrace"));
932936f0 795
6a3cb8e8
PA
796 if (!target_is_pushed (ops))
797 push_target (ops);
2935f27f 798
f688d93f 799 inf_ttrace_create_threads_after_attach (pid);
eee22bf8
MK
800}
801
802static void
52554a0e 803inf_ttrace_detach (struct target_ops *ops, const char *args, int from_tty)
eee22bf8 804{
eee22bf8 805 pid_t pid = ptid_get_pid (inferior_ptid);
5d426ff1 806 int sig = 0;
eee22bf8
MK
807
808 if (from_tty)
809 {
810 char *exec_file = get_exec_file (0);
811 if (exec_file == 0)
812 exec_file = "";
a3f17187 813 printf_unfiltered (_("Detaching from program: %s, %s\n"), exec_file,
eee22bf8
MK
814 target_pid_to_str (pid_to_ptid (pid)));
815 gdb_flush (gdb_stdout);
816 }
817 if (args)
818 sig = atoi (args);
819
820 /* ??? The HP-UX 11.0 ttrace(2) manual page doesn't mention that we
821 can pass a signal number here. Does this really work? */
822 if (ttrace (TT_PROC_DETACH, pid, 0, 0, sig, 0) == -1)
e2e0b3e5 823 perror_with_name (("ttrace"));
eee22bf8 824
b2a4db28
MK
825 if (inf_ttrace_vfork_ppid != -1)
826 {
827 if (ttrace (TT_PROC_DETACH, inf_ttrace_vfork_ppid, 0, 0, 0, 0) == -1)
828 perror_with_name (("ttrace"));
829 inf_ttrace_vfork_ppid = -1;
830 }
831
a7be7fa8
MK
832 inf_ttrace_num_lwps = 0;
833 inf_ttrace_num_lwps_in_syscall = 0;
932936f0 834
932936f0 835 inferior_ptid = null_ptid;
7f9f62ba
PA
836 detach_inferior (pid);
837
6a3cb8e8 838 inf_child_maybe_unpush_target (ops);
eee22bf8
MK
839}
840
346e281c 841static void
7d85a9c0 842inf_ttrace_kill (struct target_ops *ops)
346e281c
MK
843{
844 pid_t pid = ptid_get_pid (inferior_ptid);
845
846 if (pid == 0)
847 return;
848
849 if (ttrace (TT_PROC_EXIT, pid, 0, 0, 0, 0) == -1)
850 perror_with_name (("ttrace"));
851 /* ??? Is it necessary to call ttrace_wait() here? */
852
853 if (inf_ttrace_vfork_ppid != -1)
854 {
855 if (ttrace (TT_PROC_DETACH, inf_ttrace_vfork_ppid, 0, 0, 0, 0) == -1)
856 perror_with_name (("ttrace"));
857 inf_ttrace_vfork_ppid = -1;
858 }
859
860 target_mourn_inferior ();
861}
862
438ac09b
PA
863/* Check is a dying thread is dead by now, and delete it from GDBs
864 thread list if so. */
7ba0e0c2 865static int
438ac09b 866inf_ttrace_delete_dead_threads_callback (struct thread_info *info, void *arg)
7ba0e0c2 867{
438ac09b
PA
868 lwpid_t lwpid;
869 struct inf_ttrace_private_thread_info *p;
7ba0e0c2 870
438ac09b
PA
871 if (is_exited (info->ptid))
872 return 0;
873
874 lwpid = ptid_get_lwp (info->ptid);
875 p = (struct inf_ttrace_private_thread_info *) info->private;
876
877 /* Check if an lwp that was dying is still there or not. */
878 if (p->dying && (kill (lwpid, 0) == -1))
879 /* It's gone now. */
880 delete_thread (info->ptid);
7ba0e0c2
MK
881
882 return 0;
883}
884
438ac09b
PA
885/* Resume the lwp pointed to by INFO, with REQUEST, and pass it signal
886 SIG. */
887
888static void
889inf_ttrace_resume_lwp (struct thread_info *info, ttreq_t request, int sig)
890{
891 pid_t pid = ptid_get_pid (info->ptid);
892 lwpid_t lwpid = ptid_get_lwp (info->ptid);
893
894 if (ttrace (request, pid, lwpid, TT_NOPC, sig, 0) == -1)
895 {
896 struct inf_ttrace_private_thread_info *p
897 = (struct inf_ttrace_private_thread_info *) info->private;
898 if (p->dying && errno == EPROTO)
899 /* This is expected, it means the dying lwp is really gone
900 by now. If ttrace had an event to inform the debugger
901 the lwp is really gone, this wouldn't be needed. */
902 delete_thread (info->ptid);
903 else
904 /* This was really unexpected. */
905 perror_with_name (("ttrace"));
906 }
907}
908
909/* Callback for iterate_over_threads. */
910
60e2c248 911static int
438ac09b 912inf_ttrace_resume_callback (struct thread_info *info, void *arg)
60e2c248 913{
438ac09b
PA
914 if (!ptid_equal (info->ptid, inferior_ptid) && !is_exited (info->ptid))
915 inf_ttrace_resume_lwp (info, TT_LWP_CONTINUE, 0);
916
60e2c248
JG
917 return 0;
918}
919
eee22bf8 920static void
28439f5e 921inf_ttrace_resume (struct target_ops *ops,
2ea28649 922 ptid_t ptid, int step, enum gdb_signal signal)
eee22bf8 923{
438ac09b 924 int resume_all;
eee22bf8 925 ttreq_t request = step ? TT_LWP_SINGLE : TT_LWP_CONTINUE;
2ea28649 926 int sig = gdb_signal_to_host (signal);
438ac09b 927 struct thread_info *info;
eee22bf8 928
438ac09b
PA
929 /* A specific PTID means `step only this process id'. */
930 resume_all = (ptid_equal (ptid, minus_one_ptid));
eee22bf8 931
438ac09b
PA
932 /* If resuming all threads, it's the current thread that should be
933 handled specially. */
934 if (resume_all)
935 ptid = inferior_ptid;
eee22bf8 936
e09875d4 937 info = find_thread_ptid (ptid);
438ac09b
PA
938 inf_ttrace_resume_lwp (info, request, sig);
939
940 if (resume_all)
941 /* Let all the other threads run too. */
942 iterate_over_threads (inf_ttrace_resume_callback, NULL);
eee22bf8
MK
943}
944
945static ptid_t
117de6a9 946inf_ttrace_wait (struct target_ops *ops,
47608cb1 947 ptid_t ptid, struct target_waitstatus *ourstatus, int options)
eee22bf8
MK
948{
949 pid_t pid = ptid_get_pid (ptid);
950 lwpid_t lwpid = ptid_get_lwp (ptid);
951 ttstate_t tts;
60e2c248 952 struct thread_info *ti;
3a3e9ee3 953 ptid_t related_ptid;
eee22bf8 954
932936f0 955 /* Until proven otherwise. */
a7be7fa8 956 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
eee22bf8
MK
957
958 if (pid == -1)
b2a4db28 959 pid = lwpid = 0;
eee22bf8 960
b2a4db28 961 gdb_assert (pid != 0 || lwpid == 0);
eee22bf8
MK
962
963 do
964 {
965 set_sigint_trap ();
eee22bf8
MK
966
967 if (ttrace_wait (pid, lwpid, TTRACE_WAITOK, &tts, sizeof tts) == -1)
a3f17187 968 perror_with_name (("ttrace_wait"));
eee22bf8 969
b2a4db28
MK
970 if (tts.tts_event == TTEVT_VFORK && tts.tts_u.tts_fork.tts_isparent)
971 {
972 if (inf_ttrace_vfork_ppid != -1)
973 {
974 gdb_assert (inf_ttrace_vfork_ppid == tts.tts_pid);
975
976 if (ttrace (TT_PROC_DETACH, tts.tts_pid, 0, 0, 0, 0) == -1)
977 perror_with_name (("ttrace"));
978 inf_ttrace_vfork_ppid = -1;
979 }
980
981 tts.tts_event = TTEVT_NONE;
982 }
983
eee22bf8
MK
984 clear_sigint_trap ();
985 }
986 while (tts.tts_event == TTEVT_NONE);
987
932936f0
MK
988 /* Now that we've waited, we can re-enable the page protections. */
989 if (inf_ttrace_reenable_page_protections)
990 {
a7be7fa8 991 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
932936f0
MK
992 inf_ttrace_enable_page_protections (tts.tts_pid);
993 inf_ttrace_reenable_page_protections = 0;
994 }
995
a7be7fa8
MK
996 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
997
2935f27f
PA
998 if (inf_ttrace_num_lwps == 0)
999 {
1000 struct thread_info *ti;
1001
1002 inf_ttrace_num_lwps = 1;
1003
1004 /* This is the earliest we hear about the lwp member of
1005 INFERIOR_PTID, after an attach or fork_inferior. */
1006 gdb_assert (ptid_get_lwp (inferior_ptid) == 0);
1007
1008 /* We haven't set the private member on the main thread yet. Do
1009 it now. */
e09875d4 1010 ti = find_thread_ptid (inferior_ptid);
2935f27f
PA
1011 gdb_assert (ti != NULL && ti->private == NULL);
1012 ti->private =
1013 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
1014 memset (ti->private, 0,
1015 sizeof (struct inf_ttrace_private_thread_info));
1016
1017 /* Notify the core that this ptid changed. This changes
1018 inferior_ptid as well. */
1019 thread_change_ptid (inferior_ptid, ptid);
1020 }
1021
eee22bf8
MK
1022 switch (tts.tts_event)
1023 {
7ba0e0c2
MK
1024#ifdef TTEVT_BPT_SSTEP
1025 case TTEVT_BPT_SSTEP:
1026 /* Make it look like a breakpoint. */
1027 ourstatus->kind = TARGET_WAITKIND_STOPPED;
a493e3e2 1028 ourstatus->value.sig = GDB_SIGNAL_TRAP;
7ba0e0c2
MK
1029 break;
1030#endif
1031
eee22bf8 1032 case TTEVT_EXEC:
5d426ff1
MK
1033 ourstatus->kind = TARGET_WAITKIND_EXECD;
1034 ourstatus->value.execd_pathname =
1035 xmalloc (tts.tts_u.tts_exec.tts_pathlen + 1);
1036 if (ttrace (TT_PROC_GET_PATHNAME, tts.tts_pid, 0,
1037 (uintptr_t)ourstatus->value.execd_pathname,
1038 tts.tts_u.tts_exec.tts_pathlen, 0) == -1)
1039 perror_with_name (("ttrace"));
1040 ourstatus->value.execd_pathname[tts.tts_u.tts_exec.tts_pathlen] = 0;
25b22b0a
PA
1041
1042 /* At this point, all inserted breakpoints are gone. Doing this
1043 as soon as we detect an exec prevents the badness of deleting
1044 a breakpoint writing the current "shadow contents" to lift
1045 the bp. That shadow is NOT valid after an exec. */
1046 mark_breakpoints_out ();
eee22bf8 1047 break;
932936f0 1048
eee22bf8
MK
1049 case TTEVT_EXIT:
1050 store_waitstatus (ourstatus, tts.tts_u.tts_exit.tts_exitcode);
a7be7fa8
MK
1051 inf_ttrace_num_lwps = 0;
1052 break;
1053
b2a4db28 1054 case TTEVT_FORK:
3a3e9ee3
PA
1055 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
1056 tts.tts_u.tts_fork.tts_flwpid, 0);
1057
b2a4db28 1058 ourstatus->kind = TARGET_WAITKIND_FORKED;
3a3e9ee3 1059 ourstatus->value.related_pid = related_ptid;
b2a4db28
MK
1060
1061 /* Make sure the other end of the fork is stopped too. */
1062 if (ttrace_wait (tts.tts_u.tts_fork.tts_fpid,
1063 tts.tts_u.tts_fork.tts_flwpid,
1064 TTRACE_WAITOK, &tts, sizeof tts) == -1)
1065 perror_with_name (("ttrace_wait"));
1066
1067 gdb_assert (tts.tts_event == TTEVT_FORK);
1068 if (tts.tts_u.tts_fork.tts_isparent)
1069 {
3a3e9ee3
PA
1070 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
1071 tts.tts_u.tts_fork.tts_flwpid, 0);
b2a4db28 1072 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
3a3e9ee3 1073 ourstatus->value.related_pid = related_ptid;
b2a4db28
MK
1074 }
1075 break;
1076
1077 case TTEVT_VFORK:
1078 gdb_assert (!tts.tts_u.tts_fork.tts_isparent);
1079
3a3e9ee3
PA
1080 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
1081 tts.tts_u.tts_fork.tts_flwpid, 0);
1082
b2a4db28 1083 ourstatus->kind = TARGET_WAITKIND_VFORKED;
3a3e9ee3 1084 ourstatus->value.related_pid = related_ptid;
b2a4db28
MK
1085
1086 /* HACK: To avoid touching the parent during the vfork, switch
1087 away from it. */
1088 inferior_ptid = ptid;
1089 break;
1090
a7be7fa8
MK
1091 case TTEVT_LWP_CREATE:
1092 lwpid = tts.tts_u.tts_thread.tts_target_lwpid;
1093 ptid = ptid_build (tts.tts_pid, lwpid, 0);
60e2c248
JG
1094 ti = add_thread (ptid);
1095 ti->private =
1096 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
1097 memset (ti->private, 0,
1098 sizeof (struct inf_ttrace_private_thread_info));
a7be7fa8
MK
1099 inf_ttrace_num_lwps++;
1100 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
62a93fa9
PA
1101 /* Let the lwp_create-caller thread continue. */
1102 ttrace (TT_LWP_CONTINUE, ptid_get_pid (ptid),
1103 ptid_get_lwp (ptid), TT_NOPC, 0, 0);
1104 /* Return without stopping the whole process. */
1105 ourstatus->kind = TARGET_WAITKIND_IGNORE;
1106 return ptid;
a7be7fa8
MK
1107
1108 case TTEVT_LWP_EXIT:
17faa917
DJ
1109 if (print_thread_events)
1110 printf_unfiltered (_("[%s exited]\n"), target_pid_to_str (ptid));
e09875d4 1111 ti = find_thread_ptid (ptid);
60e2c248
JG
1112 gdb_assert (ti != NULL);
1113 ((struct inf_ttrace_private_thread_info *)ti->private)->dying = 1;
a7be7fa8 1114 inf_ttrace_num_lwps--;
62a93fa9 1115 /* Let the thread really exit. */
60e2c248
JG
1116 ttrace (TT_LWP_CONTINUE, ptid_get_pid (ptid),
1117 ptid_get_lwp (ptid), TT_NOPC, 0, 0);
62a93fa9
PA
1118 /* Return without stopping the whole process. */
1119 ourstatus->kind = TARGET_WAITKIND_IGNORE;
1120 return ptid;
a7be7fa8
MK
1121
1122 case TTEVT_LWP_TERMINATE:
1123 lwpid = tts.tts_u.tts_thread.tts_target_lwpid;
1124 ptid = ptid_build (tts.tts_pid, lwpid, 0);
62a93fa9 1125 if (print_thread_events)
b861ac81 1126 printf_unfiltered(_("[%s has been terminated]\n"),
62a93fa9 1127 target_pid_to_str (ptid));
e09875d4 1128 ti = find_thread_ptid (ptid);
60e2c248
JG
1129 gdb_assert (ti != NULL);
1130 ((struct inf_ttrace_private_thread_info *)ti->private)->dying = 1;
a7be7fa8 1131 inf_ttrace_num_lwps--;
62a93fa9
PA
1132
1133 /* Resume the lwp_terminate-caller thread. */
a7be7fa8 1134 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
62a93fa9
PA
1135 ttrace (TT_LWP_CONTINUE, ptid_get_pid (ptid),
1136 ptid_get_lwp (ptid), TT_NOPC, 0, 0);
1137 /* Return without stopping the whole process. */
1138 ourstatus->kind = TARGET_WAITKIND_IGNORE;
1139 return ptid;
932936f0 1140
eee22bf8
MK
1141 case TTEVT_SIGNAL:
1142 ourstatus->kind = TARGET_WAITKIND_STOPPED;
1143 ourstatus->value.sig =
2ea28649 1144 gdb_signal_from_host (tts.tts_u.tts_signal.tts_signo);
eee22bf8 1145 break;
932936f0
MK
1146
1147 case TTEVT_SYSCALL_ENTRY:
1148 gdb_assert (inf_ttrace_reenable_page_protections == 0);
a7be7fa8
MK
1149 inf_ttrace_num_lwps_in_syscall++;
1150 if (inf_ttrace_num_lwps_in_syscall == 1)
932936f0
MK
1151 {
1152 /* A thread has just entered a system call. Disable any
1153 page protections as the kernel can't deal with them. */
1154 inf_ttrace_disable_page_protections (tts.tts_pid);
1155 }
1156 ourstatus->kind = TARGET_WAITKIND_SYSCALL_ENTRY;
01dedca2 1157 ourstatus->value.syscall_number = tts.tts_scno;
932936f0
MK
1158 break;
1159
1160 case TTEVT_SYSCALL_RETURN:
a7be7fa8 1161 if (inf_ttrace_num_lwps_in_syscall > 0)
932936f0
MK
1162 {
1163 /* If the last thread has just left the system call, this
1164 would be a logical place to re-enable the page
1165 protections, but that doesn't work. We can't re-enable
1166 them until we've done another wait. */
1167 inf_ttrace_reenable_page_protections =
a7be7fa8
MK
1168 (inf_ttrace_num_lwps_in_syscall == 1);
1169 inf_ttrace_num_lwps_in_syscall--;
932936f0
MK
1170 }
1171 ourstatus->kind = TARGET_WAITKIND_SYSCALL_RETURN;
01dedca2 1172 ourstatus->value.syscall_number = tts.tts_scno;
932936f0 1173 break;
a7be7fa8
MK
1174
1175 default:
1176 gdb_assert (!"Unexpected ttrace event");
1177 break;
eee22bf8
MK
1178 }
1179
1180 /* Make sure all threads within the process are stopped. */
1181 if (ttrace (TT_PROC_STOP, tts.tts_pid, 0, 0, 0, 0) == -1)
e2e0b3e5 1182 perror_with_name (("ttrace"));
eee22bf8 1183
438ac09b
PA
1184 /* Now that the whole process is stopped, check if any dying thread
1185 is really dead by now. If a dying thread is still alive, it will
1186 be stopped too, and will still show up in `info threads', tagged
1187 with "(Exiting)". We could make `info threads' prune dead
1188 threads instead via inf_ttrace_thread_alive, but doing this here
1189 has the advantage that a frontend is notificed sooner of thread
1190 exits. Note that a dying lwp is still alive, it still has to be
1191 resumed, like any other lwp. */
1192 iterate_over_threads (inf_ttrace_delete_dead_threads_callback, NULL);
1193
a7be7fa8 1194 return ptid;
eee22bf8
MK
1195}
1196
1197/* Transfer LEN bytes from ADDR in the inferior's memory into READBUF,
1198 and transfer LEN bytes from WRITEBUF into the inferior's memory at
1199 ADDR. Either READBUF or WRITEBUF may be null, in which case the
1200 corresponding transfer doesn't happen. Return the number of bytes
1201 actually transferred (which may be zero if an error occurs). */
1202
1203static LONGEST
1204inf_ttrace_xfer_memory (CORE_ADDR addr, ULONGEST len,
1205 void *readbuf, const void *writebuf)
1206{
1207 pid_t pid = ptid_get_pid (inferior_ptid);
1208
1209 /* HP-UX treats text space and data space differently. GDB however,
1210 doesn't really know the difference. Therefore we try both. Try
1211 text space before data space though because when we're writing
1212 into text space the instruction cache might need to be flushed. */
1213
1214 if (readbuf
1215 && ttrace (TT_PROC_RDTEXT, pid, 0, addr, len, (uintptr_t)readbuf) == -1
1216 && ttrace (TT_PROC_RDDATA, pid, 0, addr, len, (uintptr_t)readbuf) == -1)
1217 return 0;
1218
1219 if (writebuf
1220 && ttrace (TT_PROC_WRTEXT, pid, 0, addr, len, (uintptr_t)writebuf) == -1
1221 && ttrace (TT_PROC_WRDATA, pid, 0, addr, len, (uintptr_t)writebuf) == -1)
1222 return 0;
1223
1224 return len;
1225}
1226
9b409511 1227static enum target_xfer_status
eee22bf8 1228inf_ttrace_xfer_partial (struct target_ops *ops, enum target_object object,
7a4609f7 1229 const char *annex, gdb_byte *readbuf,
3e43a32a 1230 const gdb_byte *writebuf,
9b409511 1231 ULONGEST offset, ULONGEST len, ULONGEST *xfered_len)
eee22bf8
MK
1232{
1233 switch (object)
1234 {
1235 case TARGET_OBJECT_MEMORY:
9b409511
YQ
1236 {
1237 LONGEST val = inf_ttrace_xfer_memory (offset, len, readbuf, writebuf);
1238
1239 if (val == 0)
1240 return TARGET_XFER_EOF;
1241 else
1242 {
1243 *xfered_len = (ULONGEST) val;
1244 return TARGET_XFER_OK;
1245 }
1246 }
eee22bf8
MK
1247
1248 case TARGET_OBJECT_UNWIND_TABLE:
2ed4b548 1249 return TARGET_XFER_E_IO;
eee22bf8
MK
1250
1251 case TARGET_OBJECT_AUXV:
2ed4b548 1252 return TARGET_XFER_E_IO;
eee22bf8
MK
1253
1254 case TARGET_OBJECT_WCOOKIE:
2ed4b548 1255 return TARGET_XFER_E_IO;
eee22bf8
MK
1256
1257 default:
2ed4b548 1258 return TARGET_XFER_E_IO;
eee22bf8
MK
1259 }
1260}
1261
1262/* Print status information about what we're accessing. */
1263
1264static void
1265inf_ttrace_files_info (struct target_ops *ignore)
1266{
181e7f93 1267 struct inferior *inf = current_inferior ();
346e281c 1268 printf_filtered (_("\tUsing the running image of %s %s.\n"),
181e7f93 1269 inf->attach_flag ? "attached" : "child",
346e281c 1270 target_pid_to_str (inferior_ptid));
eee22bf8 1271}
a7be7fa8
MK
1272
1273static int
28439f5e 1274inf_ttrace_thread_alive (struct target_ops *ops, ptid_t ptid)
a7be7fa8 1275{
438ac09b
PA
1276 return 1;
1277}
1278
1279/* Return a string describing the state of the thread specified by
1280 INFO. */
1281
1282static char *
c15906d8
TT
1283inf_ttrace_extra_thread_info (struct target_ops *self,
1284 struct thread_info *info)
438ac09b
PA
1285{
1286 struct inf_ttrace_private_thread_info* private =
1287 (struct inf_ttrace_private_thread_info *) info->private;
1288
1289 if (private != NULL && private->dying)
1290 return "Exiting";
1291
1292 return NULL;
a7be7fa8
MK
1293}
1294
1295static char *
117de6a9 1296inf_ttrace_pid_to_str (struct target_ops *ops, ptid_t ptid)
a7be7fa8 1297{
2935f27f
PA
1298 pid_t pid = ptid_get_pid (ptid);
1299 lwpid_t lwpid = ptid_get_lwp (ptid);
1300 static char buf[128];
a7be7fa8 1301
2935f27f
PA
1302 if (lwpid == 0)
1303 xsnprintf (buf, sizeof buf, "process %ld",
1304 (long) pid);
1305 else
1306 xsnprintf (buf, sizeof buf, "process %ld, lwp %ld",
1307 (long) pid, (long) lwpid);
1308 return buf;
a7be7fa8 1309}
eee22bf8
MK
1310\f
1311
fa07e785
JB
1312/* Implement the get_ada_task_ptid target_ops method. */
1313
1314static ptid_t
1e6b91a4 1315inf_ttrace_get_ada_task_ptid (struct target_ops *self, long lwp, long thread)
fa07e785
JB
1316{
1317 return ptid_build (ptid_get_pid (inferior_ptid), lwp, 0);
1318}
1319
1320\f
eee22bf8
MK
1321struct target_ops *
1322inf_ttrace_target (void)
1323{
1324 struct target_ops *t = inf_child_target ();
1325
eee22bf8
MK
1326 t->to_attach = inf_ttrace_attach;
1327 t->to_detach = inf_ttrace_detach;
1328 t->to_resume = inf_ttrace_resume;
1329 t->to_wait = inf_ttrace_wait;
eee22bf8 1330 t->to_files_info = inf_ttrace_files_info;
932936f0 1331 t->to_can_use_hw_breakpoint = inf_ttrace_can_use_hw_breakpoint;
932936f0
MK
1332 t->to_insert_watchpoint = inf_ttrace_insert_watchpoint;
1333 t->to_remove_watchpoint = inf_ttrace_remove_watchpoint;
1334 t->to_stopped_by_watchpoint = inf_ttrace_stopped_by_watchpoint;
2a3cdf79
WZ
1335 t->to_region_ok_for_hw_watchpoint =
1336 inf_ttrace_region_ok_for_hw_watchpoint;
346e281c
MK
1337 t->to_kill = inf_ttrace_kill;
1338 t->to_create_inferior = inf_ttrace_create_inferior;
1339 t->to_follow_fork = inf_ttrace_follow_fork;
1340 t->to_mourn_inferior = inf_ttrace_mourn_inferior;
1341 t->to_thread_alive = inf_ttrace_thread_alive;
438ac09b 1342 t->to_extra_thread_info = inf_ttrace_extra_thread_info;
346e281c
MK
1343 t->to_pid_to_str = inf_ttrace_pid_to_str;
1344 t->to_xfer_partial = inf_ttrace_xfer_partial;
fa07e785 1345 t->to_get_ada_task_ptid = inf_ttrace_get_ada_task_ptid;
eee22bf8 1346
eee22bf8
MK
1347 return t;
1348}
d3322e8a 1349#endif
932936f0
MK
1350\f
1351
1352/* Prevent warning from -Wmissing-prototypes. */
0b155465 1353void _initialize_inf_ttrace (void);
eee22bf8 1354
932936f0
MK
1355void
1356_initialize_inf_ttrace (void)
1357{
d3322e8a 1358#ifdef HAVE_TTRACE
932936f0 1359 inf_ttrace_page_dict.pagesize = getpagesize();
eee22bf8 1360#endif
d3322e8a 1361}
This page took 0.861364 seconds and 4 git commands to generate.