* dec-thread.c (dec_thread_wait): Add options parameter. Use it
[deliverable/binutils-gdb.git] / gdb / inf-ttrace.c
CommitLineData
eee22bf8
MK
1/* Low-level child interface to ttrace.
2
0fb0cc75
JB
3 Copyright (C) 2004, 2005, 2006, 2007, 2008, 2009
4 Free Software Foundation, Inc.
eee22bf8
MK
5
6 This file is part of GDB.
7
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
a9762ec7 10 the Free Software Foundation; either version 3 of the License, or
eee22bf8
MK
11 (at your option) any later version.
12
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
a9762ec7 19 along with this program. If not, see <http://www.gnu.org/licenses/>. */
eee22bf8
MK
20
21#include "defs.h"
22
23/* The ttrace(2) system call didn't exist before HP-UX 10.30. Don't
24 try to compile this code unless we have it. */
25#ifdef HAVE_TTRACE
26
27#include "command.h"
28#include "gdbcore.h"
a7be7fa8 29#include "gdbthread.h"
eee22bf8 30#include "inferior.h"
191c4426 31#include "terminal.h"
eee22bf8
MK
32#include "target.h"
33
34#include "gdb_assert.h"
35#include "gdb_string.h"
932936f0 36#include <sys/mman.h>
eee22bf8 37#include <sys/ttrace.h>
438ac09b 38#include <signal.h>
eee22bf8
MK
39
40#include "inf-child.h"
41#include "inf-ttrace.h"
42
932936f0
MK
43\f
44
a7be7fa8
MK
45/* HP-UX uses a threading model where each user-space thread
46 corresponds to a kernel thread. These kernel threads are called
47 lwps. The ttrace(2) interface gives us almost full control over
48 the threads, which makes it very easy to support them in GDB. We
49 identify the threads by process ID and lwp ID. The ttrace(2) also
50 provides us with a thread's user ID (in the `tts_user_tid' member
51 of `ttstate_t') but we don't use that (yet) as it isn't necessary
52 to uniquely label the thread. */
53
54/* Number of active lwps. */
55static int inf_ttrace_num_lwps;
56\f
57
932936f0
MK
58/* On HP-UX versions that have the ttrace(2) system call, we can
59 implement "hardware" watchpoints by fiddling with the protection of
60 pages in the address space that contain the variable being watched.
61 In order to implement this, we keep a dictionary of pages for which
62 we have changed the protection. */
63
64struct inf_ttrace_page
65{
66 CORE_ADDR addr; /* Page address. */
67 int prot; /* Protection. */
68 int refcount; /* Reference count. */
69 struct inf_ttrace_page *next;
70 struct inf_ttrace_page *prev;
71};
72
73struct inf_ttrace_page_dict
74{
75 struct inf_ttrace_page buckets[128];
76 int pagesize; /* Page size. */
77 int count; /* Number of pages in this dictionary. */
78} inf_ttrace_page_dict;
79
60e2c248
JG
80struct inf_ttrace_private_thread_info
81{
82 int dying;
83};
84
a7be7fa8
MK
85/* Number of lwps that are currently in a system call. */
86static int inf_ttrace_num_lwps_in_syscall;
932936f0
MK
87
88/* Flag to indicate whether we should re-enable page protections after
89 the next wait. */
90static int inf_ttrace_reenable_page_protections;
91
92/* Enable system call events for process PID. */
93
94static void
95inf_ttrace_enable_syscall_events (pid_t pid)
96{
97 ttevent_t tte;
98 ttstate_t tts;
99
a7be7fa8 100 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
932936f0
MK
101
102 if (ttrace (TT_PROC_GET_EVENT_MASK, pid, 0,
103 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 104 perror_with_name (("ttrace"));
932936f0
MK
105
106 tte.tte_events |= (TTEVT_SYSCALL_ENTRY | TTEVT_SYSCALL_RETURN);
107
108 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
109 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 110 perror_with_name (("ttrace"));
932936f0
MK
111
112 if (ttrace (TT_PROC_GET_FIRST_LWP_STATE, pid, 0,
113 (uintptr_t)&tts, sizeof tts, 0) == -1)
e2e0b3e5 114 perror_with_name (("ttrace"));
932936f0
MK
115
116 if (tts.tts_flags & TTS_INSYSCALL)
a7be7fa8 117 inf_ttrace_num_lwps_in_syscall++;
932936f0
MK
118
119 /* FIXME: Handle multiple threads. */
120}
121
122/* Disable system call events for process PID. */
123
124static void
125inf_ttrace_disable_syscall_events (pid_t pid)
126{
127 ttevent_t tte;
128
129 gdb_assert (inf_ttrace_page_dict.count == 0);
130
131 if (ttrace (TT_PROC_GET_EVENT_MASK, pid, 0,
132 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 133 perror_with_name (("ttrace"));
932936f0
MK
134
135 tte.tte_events &= ~(TTEVT_SYSCALL_ENTRY | TTEVT_SYSCALL_RETURN);
136
137 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
138 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 139 perror_with_name (("ttrace"));
932936f0 140
a7be7fa8 141 inf_ttrace_num_lwps_in_syscall = 0;
932936f0
MK
142}
143
144/* Get information about the page at address ADDR for process PID from
145 the dictionary. */
146
147static struct inf_ttrace_page *
148inf_ttrace_get_page (pid_t pid, CORE_ADDR addr)
149{
150 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
151 const int pagesize = inf_ttrace_page_dict.pagesize;
152 int bucket;
153 struct inf_ttrace_page *page;
154
155 bucket = (addr / pagesize) % num_buckets;
156 page = &inf_ttrace_page_dict.buckets[bucket];
157 while (page)
158 {
159 if (page->addr == addr)
160 break;
161
162 page = page->next;
163 }
164
165 return page;
166}
167
168/* Add the page at address ADDR for process PID to the dictionary. */
169
170static struct inf_ttrace_page *
171inf_ttrace_add_page (pid_t pid, CORE_ADDR addr)
172{
173 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
174 const int pagesize = inf_ttrace_page_dict.pagesize;
175 int bucket;
176 struct inf_ttrace_page *page;
177 struct inf_ttrace_page *prev = NULL;
178
179 bucket = (addr / pagesize) % num_buckets;
180 page = &inf_ttrace_page_dict.buckets[bucket];
181 while (page)
182 {
183 if (page->addr == addr)
184 break;
185
186 prev = page;
187 page = page->next;
188 }
189
190 if (!page)
191 {
192 int prot;
193
194 if (ttrace (TT_PROC_GET_MPROTECT, pid, 0,
195 addr, 0, (uintptr_t)&prot) == -1)
e2e0b3e5 196 perror_with_name (("ttrace"));
932936f0
MK
197
198 page = XMALLOC (struct inf_ttrace_page);
199 page->addr = addr;
200 page->prot = prot;
201 page->refcount = 0;
202 page->next = NULL;
203
204 page->prev = prev;
205 prev->next = page;
206
207 inf_ttrace_page_dict.count++;
208 if (inf_ttrace_page_dict.count == 1)
209 inf_ttrace_enable_syscall_events (pid);
210
a7be7fa8 211 if (inf_ttrace_num_lwps_in_syscall == 0)
932936f0
MK
212 {
213 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
214 addr, pagesize, prot & ~PROT_WRITE) == -1)
e2e0b3e5 215 perror_with_name (("ttrace"));
932936f0
MK
216 }
217 }
218
219 return page;
220}
221
222/* Insert the page at address ADDR of process PID to the dictionary. */
223
224static void
225inf_ttrace_insert_page (pid_t pid, CORE_ADDR addr)
226{
227 struct inf_ttrace_page *page;
228
229 page = inf_ttrace_get_page (pid, addr);
230 if (!page)
231 page = inf_ttrace_add_page (pid, addr);
232
233 page->refcount++;
234}
235
236/* Remove the page at address ADDR of process PID from the dictionary. */
237
238static void
239inf_ttrace_remove_page (pid_t pid, CORE_ADDR addr)
240{
241 const int pagesize = inf_ttrace_page_dict.pagesize;
242 struct inf_ttrace_page *page;
243
244 page = inf_ttrace_get_page (pid, addr);
245 page->refcount--;
246
247 gdb_assert (page->refcount >= 0);
248
249 if (page->refcount == 0)
250 {
a7be7fa8 251 if (inf_ttrace_num_lwps_in_syscall == 0)
932936f0
MK
252 {
253 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
254 addr, pagesize, page->prot) == -1)
e2e0b3e5 255 perror_with_name (("ttrace"));
932936f0
MK
256 }
257
258 inf_ttrace_page_dict.count--;
259 if (inf_ttrace_page_dict.count == 0)
260 inf_ttrace_disable_syscall_events (pid);
261
262 page->prev->next = page->next;
263 if (page->next)
264 page->next->prev = page->prev;
265
266 xfree (page);
267 }
268}
269
270/* Mask the bits in PROT from the page protections that are currently
271 in the dictionary for process PID. */
272
273static void
274inf_ttrace_mask_page_protections (pid_t pid, int prot)
275{
276 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
277 const int pagesize = inf_ttrace_page_dict.pagesize;
278 int bucket;
279
280 for (bucket = 0; bucket < num_buckets; bucket++)
281 {
282 struct inf_ttrace_page *page;
283
284 page = inf_ttrace_page_dict.buckets[bucket].next;
285 while (page)
286 {
287 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
288 page->addr, pagesize, page->prot & ~prot) == -1)
e2e0b3e5 289 perror_with_name (("ttrace"));
932936f0
MK
290
291 page = page->next;
292 }
293 }
294}
295
296/* Write-protect the pages in the dictionary for process PID. */
297
298static void
299inf_ttrace_enable_page_protections (pid_t pid)
300{
301 inf_ttrace_mask_page_protections (pid, PROT_WRITE);
302}
303
304/* Restore the protection of the pages in the dictionary for process
305 PID. */
306
307static void
308inf_ttrace_disable_page_protections (pid_t pid)
309{
310 inf_ttrace_mask_page_protections (pid, 0);
311}
312
313/* Insert a "hardware" watchpoint for LEN bytes at address ADDR of
314 type TYPE. */
315
316static int
317inf_ttrace_insert_watchpoint (CORE_ADDR addr, int len, int type)
318{
319 const int pagesize = inf_ttrace_page_dict.pagesize;
320 pid_t pid = ptid_get_pid (inferior_ptid);
321 CORE_ADDR page_addr;
322 int num_pages;
323 int page;
324
325 gdb_assert (type == hw_write);
326
327 page_addr = (addr / pagesize) * pagesize;
328 num_pages = (len + pagesize - 1) / pagesize;
329
330 for (page = 0; page < num_pages; page++, page_addr += pagesize)
331 inf_ttrace_insert_page (pid, page_addr);
332
333 return 1;
334}
335
336/* Remove a "hardware" watchpoint for LEN bytes at address ADDR of
337 type TYPE. */
338
339static int
340inf_ttrace_remove_watchpoint (CORE_ADDR addr, int len, int type)
341{
342 const int pagesize = inf_ttrace_page_dict.pagesize;
343 pid_t pid = ptid_get_pid (inferior_ptid);
344 CORE_ADDR page_addr;
345 int num_pages;
346 int page;
347
348 gdb_assert (type == hw_write);
349
350 page_addr = (addr / pagesize) * pagesize;
351 num_pages = (len + pagesize - 1) / pagesize;
352
353 for (page = 0; page < num_pages; page++, page_addr += pagesize)
354 inf_ttrace_remove_page (pid, page_addr);
355
356 return 1;
357}
358
359static int
360inf_ttrace_can_use_hw_breakpoint (int type, int len, int ot)
361{
362 return (type == bp_hardware_watchpoint);
363}
364
365static int
2a3cdf79 366inf_ttrace_region_ok_for_hw_watchpoint (CORE_ADDR addr, int len)
932936f0
MK
367{
368 return 1;
369}
370
371/* Return non-zero if the current inferior was (potentially) stopped
372 by hitting a "hardware" watchpoint. */
373
374static int
375inf_ttrace_stopped_by_watchpoint (void)
376{
377 pid_t pid = ptid_get_pid (inferior_ptid);
378 lwpid_t lwpid = ptid_get_lwp (inferior_ptid);
379 ttstate_t tts;
380
381 if (inf_ttrace_page_dict.count > 0)
382 {
383 if (ttrace (TT_LWP_GET_STATE, pid, lwpid,
384 (uintptr_t)&tts, sizeof tts, 0) == -1)
e2e0b3e5 385 perror_with_name (("ttrace"));
932936f0
MK
386
387 if (tts.tts_event == TTEVT_SIGNAL
388 && tts.tts_u.tts_signal.tts_signo == SIGBUS)
389 {
390 const int pagesize = inf_ttrace_page_dict.pagesize;
391 void *addr = tts.tts_u.tts_signal.tts_siginfo.si_addr;
392 CORE_ADDR page_addr = ((uintptr_t)addr / pagesize) * pagesize;
393
394 if (inf_ttrace_get_page (pid, page_addr))
395 return 1;
396 }
397 }
398
399 return 0;
400}
401\f
eee22bf8 402
b2a4db28
MK
403/* When tracking a vfork(2), we cannot detach from the parent until
404 after the child has called exec(3) or has exited. If we are still
405 attached to the parent, this variable will be set to the process ID
406 of the parent. Otherwise it will be set to zero. */
407static pid_t inf_ttrace_vfork_ppid = -1;
408
409static int
ee057212 410inf_ttrace_follow_fork (struct target_ops *ops, int follow_child)
b2a4db28
MK
411{
412 pid_t pid, fpid;
413 lwpid_t lwpid, flwpid;
414 ttstate_t tts;
4e1c45ea 415 struct thread_info *last_tp = NULL;
b861ac81
PA
416 struct breakpoint *step_resume_breakpoint = NULL;
417 CORE_ADDR step_range_start = 0, step_range_end = 0;
418 struct frame_id step_frame_id = null_frame_id;
b2a4db28
MK
419
420 /* FIXME: kettenis/20050720: This stuff should really be passed as
421 an argument by our caller. */
422 {
423 ptid_t ptid;
424 struct target_waitstatus status;
425
426 get_last_target_status (&ptid, &status);
427 gdb_assert (status.kind == TARGET_WAITKIND_FORKED
428 || status.kind == TARGET_WAITKIND_VFORKED);
429
430 pid = ptid_get_pid (ptid);
431 lwpid = ptid_get_lwp (ptid);
4e1c45ea 432 last_tp = find_thread_pid (ptid);
b2a4db28
MK
433 }
434
435 /* Get all important details that core GDB doesn't (and shouldn't)
436 know about. */
437 if (ttrace (TT_LWP_GET_STATE, pid, lwpid,
438 (uintptr_t)&tts, sizeof tts, 0) == -1)
439 perror_with_name (("ttrace"));
440
441 gdb_assert (tts.tts_event == TTEVT_FORK || tts.tts_event == TTEVT_VFORK);
442
443 if (tts.tts_u.tts_fork.tts_isparent)
444 {
445 pid = tts.tts_pid;
446 lwpid = tts.tts_lwpid;
447 fpid = tts.tts_u.tts_fork.tts_fpid;
448 flwpid = tts.tts_u.tts_fork.tts_flwpid;
449 }
450 else
451 {
452 pid = tts.tts_u.tts_fork.tts_fpid;
453 lwpid = tts.tts_u.tts_fork.tts_flwpid;
454 fpid = tts.tts_pid;
455 flwpid = tts.tts_lwpid;
456 }
457
458 if (follow_child)
459 {
77435e4c 460 struct inferior *inf;
191c4426
PA
461 struct inferior *parent_inf;
462
463 parent_inf = find_inferior_pid (pid);
77435e4c 464
4e1c45ea 465 /* Copy user stepping state to the new inferior thread. */
b861ac81
PA
466 step_resume_breakpoint = last_tp->step_resume_breakpoint;
467 step_range_start = last_tp->step_range_start;
468 step_range_end = last_tp->step_range_end;
469 step_frame_id = last_tp->step_frame_id;
4e1c45ea
PA
470
471 /* Otherwise, deleting the parent would get rid of this
472 breakpoint. */
473 last_tp->step_resume_breakpoint = NULL;
474
b2a4db28 475 inferior_ptid = ptid_build (fpid, flwpid, 0);
77435e4c 476 inf = add_inferior (fpid);
191c4426
PA
477 inf->attach_flag = parent_inf->attach_flag;
478 copy_terminal_info (inf, parent_inf);
b2a4db28
MK
479 detach_breakpoints (pid);
480
481 target_terminal_ours ();
482 fprintf_unfiltered (gdb_stdlog, _("\
483Attaching after fork to child process %ld.\n"), (long)fpid);
484 }
485 else
486 {
487 inferior_ptid = ptid_build (pid, lwpid, 0);
488 detach_breakpoints (fpid);
489
490 target_terminal_ours ();
491 fprintf_unfiltered (gdb_stdlog, _("\
492Detaching after fork from child process %ld.\n"), (long)fpid);
493 }
494
495 if (tts.tts_event == TTEVT_VFORK)
496 {
497 gdb_assert (!tts.tts_u.tts_fork.tts_isparent);
498
499 if (follow_child)
500 {
501 /* We can't detach from the parent yet. */
502 inf_ttrace_vfork_ppid = pid;
503
504 reattach_breakpoints (fpid);
505 }
506 else
507 {
508 if (ttrace (TT_PROC_DETACH, fpid, 0, 0, 0, 0) == -1)
509 perror_with_name (("ttrace"));
510
511 /* Wait till we get the TTEVT_VFORK event in the parent.
512 This indicates that the child has called exec(3) or has
513 exited and that the parent is ready to be traced again. */
514 if (ttrace_wait (pid, lwpid, TTRACE_WAITOK, &tts, sizeof tts) == -1)
515 perror_with_name (("ttrace_wait"));
516 gdb_assert (tts.tts_event == TTEVT_VFORK);
517 gdb_assert (tts.tts_u.tts_fork.tts_isparent);
518
519 reattach_breakpoints (pid);
520 }
521 }
522 else
523 {
524 gdb_assert (tts.tts_u.tts_fork.tts_isparent);
525
526 if (follow_child)
527 {
528 if (ttrace (TT_PROC_DETACH, pid, 0, 0, 0, 0) == -1)
529 perror_with_name (("ttrace"));
530 }
531 else
532 {
533 if (ttrace (TT_PROC_DETACH, fpid, 0, 0, 0, 0) == -1)
534 perror_with_name (("ttrace"));
535 }
536 }
537
538 if (follow_child)
539 {
2935f27f
PA
540 struct thread_info *ti;
541
b2a4db28 542 /* The child will start out single-threaded. */
2935f27f 543 inf_ttrace_num_lwps = 1;
b2a4db28
MK
544 inf_ttrace_num_lwps_in_syscall = 0;
545
2935f27f
PA
546 /* Delete parent. */
547 delete_thread_silent (ptid_build (pid, lwpid, 0));
7f9f62ba 548 detach_inferior (pid);
2935f27f 549
7f9f62ba 550 /* Add child thread. inferior_ptid was already set above. */
2935f27f
PA
551 ti = add_thread_silent (inferior_ptid);
552 ti->private =
553 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
554 memset (ti->private, 0,
555 sizeof (struct inf_ttrace_private_thread_info));
556
4e1c45ea
PA
557 ti->step_resume_breakpoint = step_resume_breakpoint;
558 ti->step_range_start = step_range_start;
559 ti->step_range_end = step_range_end;
560 ti->step_frame_id = step_frame_id;
561
b2a4db28
MK
562 /* Reset breakpoints in the child as appropriate. */
563 follow_inferior_reset_breakpoints ();
564 }
565
566 return 0;
567}
568\f
569
eee22bf8
MK
570/* File descriptors for pipes used as semaphores during initial
571 startup of an inferior. */
572static int inf_ttrace_pfd1[2];
573static int inf_ttrace_pfd2[2];
574
575static void
576do_cleanup_pfds (void *dummy)
577{
578 close (inf_ttrace_pfd1[0]);
579 close (inf_ttrace_pfd1[1]);
580 close (inf_ttrace_pfd2[0]);
581 close (inf_ttrace_pfd2[1]);
582}
583
584static void
585inf_ttrace_prepare (void)
586{
587 if (pipe (inf_ttrace_pfd1) == -1)
a3f17187 588 perror_with_name (("pipe"));
eee22bf8
MK
589
590 if (pipe (inf_ttrace_pfd2) == -1)
591 {
592 close (inf_ttrace_pfd1[0]);
593 close (inf_ttrace_pfd2[0]);
a3f17187 594 perror_with_name (("pipe"));
eee22bf8
MK
595 }
596}
597
598/* Prepare to be traced. */
599
600static void
601inf_ttrace_me (void)
602{
603 struct cleanup *old_chain = make_cleanup (do_cleanup_pfds, 0);
604 char c;
605
606 /* "Trace me, Dr. Memory!" */
607 if (ttrace (TT_PROC_SETTRC, 0, 0, 0, TT_VERSION, 0) == -1)
e2e0b3e5 608 perror_with_name (("ttrace"));
eee22bf8
MK
609
610 /* Tell our parent that we are ready to be traced. */
611 if (write (inf_ttrace_pfd1[1], &c, sizeof c) != sizeof c)
e2e0b3e5 612 perror_with_name (("write"));
eee22bf8
MK
613
614 /* Wait until our parent has set the initial event mask. */
615 if (read (inf_ttrace_pfd2[0], &c, sizeof c) != sizeof c)
e2e0b3e5 616 perror_with_name (("read"));
eee22bf8
MK
617
618 do_cleanups (old_chain);
619}
620
621/* Start tracing PID. */
622
623static void
28439f5e 624inf_ttrace_him (struct target_ops *ops, int pid)
eee22bf8
MK
625{
626 struct cleanup *old_chain = make_cleanup (do_cleanup_pfds, 0);
627 ttevent_t tte;
eee22bf8
MK
628 char c;
629
630 /* Wait until our child is ready to be traced. */
631 if (read (inf_ttrace_pfd1[0], &c, sizeof c) != sizeof c)
e2e0b3e5 632 perror_with_name (("read"));
eee22bf8
MK
633
634 /* Set the initial event mask. */
635 memset (&tte, 0, sizeof (tte));
b2a4db28 636 tte.tte_events |= TTEVT_EXEC | TTEVT_EXIT | TTEVT_FORK | TTEVT_VFORK;
a7be7fa8 637 tte.tte_events |= TTEVT_LWP_CREATE | TTEVT_LWP_EXIT | TTEVT_LWP_TERMINATE;
7ba0e0c2
MK
638#ifdef TTEVT_BPT_SSTEP
639 tte.tte_events |= TTEVT_BPT_SSTEP;
640#endif
b2a4db28 641 tte.tte_opts |= TTEO_PROC_INHERIT;
eee22bf8
MK
642 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
643 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 644 perror_with_name (("ttrace"));
eee22bf8
MK
645
646 /* Tell our child that we have set the initial event mask. */
647 if (write (inf_ttrace_pfd2[1], &c, sizeof c) != sizeof c)
e2e0b3e5 648 perror_with_name (("write"));
eee22bf8
MK
649
650 do_cleanups (old_chain);
651
28439f5e 652 push_target (ops);
eee22bf8
MK
653
654 /* On some targets, there must be some explicit synchronization
655 between the parent and child processes after the debugger forks,
656 and before the child execs the debuggee program. This call
657 basically gives permission for the child to exec. */
658
659 target_acknowledge_created_inferior (pid);
660
661 /* START_INFERIOR_TRAPS_EXPECTED is defined in inferior.h, and will
662 be 1 or 2 depending on whether we're starting without or with a
663 shell. */
664 startup_inferior (START_INFERIOR_TRAPS_EXPECTED);
665
666 /* On some targets, there must be some explicit actions taken after
667 the inferior has been started up. */
668 target_post_startup_inferior (pid_to_ptid (pid));
669}
670
671static void
136d6dae
VP
672inf_ttrace_create_inferior (struct target_ops *ops, char *exec_file,
673 char *allargs, char **env, int from_tty)
eee22bf8 674{
28439f5e
PA
675 int pid;
676
a7be7fa8
MK
677 gdb_assert (inf_ttrace_num_lwps == 0);
678 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
932936f0 679 gdb_assert (inf_ttrace_page_dict.count == 0);
932936f0 680 gdb_assert (inf_ttrace_reenable_page_protections == 0);
b2a4db28 681 gdb_assert (inf_ttrace_vfork_ppid == -1);
932936f0 682
28439f5e
PA
683 pid = fork_inferior (exec_file, allargs, env, inf_ttrace_me, NULL,
684 inf_ttrace_prepare, NULL);
685
686 inf_ttrace_him (ops, pid);
eee22bf8
MK
687}
688
eee22bf8 689static void
136d6dae 690inf_ttrace_mourn_inferior (struct target_ops *ops)
eee22bf8 691{
932936f0
MK
692 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
693 int bucket;
694
a7be7fa8
MK
695 inf_ttrace_num_lwps = 0;
696 inf_ttrace_num_lwps_in_syscall = 0;
932936f0
MK
697
698 for (bucket = 0; bucket < num_buckets; bucket++)
699 {
700 struct inf_ttrace_page *page;
701 struct inf_ttrace_page *next;
702
703 page = inf_ttrace_page_dict.buckets[bucket].next;
704 while (page)
705 {
706 next = page->next;
707 xfree (page);
708 page = next;
709 }
710 }
711 inf_ttrace_page_dict.count = 0;
712
28439f5e 713 unpush_target (ops);
eee22bf8
MK
714 generic_mourn_inferior ();
715}
716
717static void
136d6dae 718inf_ttrace_attach (struct target_ops *ops, char *args, int from_tty)
eee22bf8
MK
719{
720 char *exec_file;
721 pid_t pid;
722 char *dummy;
932936f0 723 ttevent_t tte;
181e7f93 724 struct inferior *inf;
eee22bf8
MK
725
726 if (!args)
a3f17187 727 error_no_arg (_("process-id to attach"));
eee22bf8
MK
728
729 dummy = args;
730 pid = strtol (args, &dummy, 0);
731 if (pid == 0 && args == dummy)
8a3fe4f8 732 error (_("Illegal process-id: %s."), args);
eee22bf8
MK
733
734 if (pid == getpid ()) /* Trying to masturbate? */
8a3fe4f8 735 error (_("I refuse to debug myself!"));
eee22bf8
MK
736
737 if (from_tty)
738 {
346e281c 739 exec_file = get_exec_file (0);
eee22bf8
MK
740
741 if (exec_file)
a3f17187 742 printf_unfiltered (_("Attaching to program: %s, %s\n"), exec_file,
eee22bf8
MK
743 target_pid_to_str (pid_to_ptid (pid)));
744 else
a3f17187 745 printf_unfiltered (_("Attaching to %s\n"),
eee22bf8
MK
746 target_pid_to_str (pid_to_ptid (pid)));
747
748 gdb_flush (gdb_stdout);
749 }
750
a7be7fa8
MK
751 gdb_assert (inf_ttrace_num_lwps == 0);
752 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
b2a4db28 753 gdb_assert (inf_ttrace_vfork_ppid == -1);
a7be7fa8 754
eee22bf8 755 if (ttrace (TT_PROC_ATTACH, pid, 0, TT_KILL_ON_EXIT, TT_VERSION, 0) == -1)
e2e0b3e5 756 perror_with_name (("ttrace"));
eee22bf8 757
181e7f93
PA
758 inf = add_inferior (pid);
759 inf->attach_flag = 1;
7f9f62ba 760
932936f0 761 /* Set the initial event mask. */
932936f0 762 memset (&tte, 0, sizeof (tte));
b2a4db28 763 tte.tte_events |= TTEVT_EXEC | TTEVT_EXIT | TTEVT_FORK | TTEVT_VFORK;
a7be7fa8 764 tte.tte_events |= TTEVT_LWP_CREATE | TTEVT_LWP_EXIT | TTEVT_LWP_TERMINATE;
7ba0e0c2
MK
765#ifdef TTEVT_BPT_SSTEP
766 tte.tte_events |= TTEVT_BPT_SSTEP;
767#endif
b2a4db28 768 tte.tte_opts |= TTEO_PROC_INHERIT;
932936f0
MK
769 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
770 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 771 perror_with_name (("ttrace"));
932936f0 772
28439f5e 773 push_target (ops);
2935f27f
PA
774
775 /* We'll bump inf_ttrace_num_lwps up and add the private data to the
776 thread as soon as we get to inf_ttrace_wait. At this point, we
777 don't have lwpid info yet. */
778 inferior_ptid = pid_to_ptid (pid);
779 add_thread_silent (inferior_ptid);
eee22bf8
MK
780}
781
782static void
136d6dae 783inf_ttrace_detach (struct target_ops *ops, char *args, int from_tty)
eee22bf8 784{
eee22bf8 785 pid_t pid = ptid_get_pid (inferior_ptid);
5d426ff1 786 int sig = 0;
eee22bf8
MK
787
788 if (from_tty)
789 {
790 char *exec_file = get_exec_file (0);
791 if (exec_file == 0)
792 exec_file = "";
a3f17187 793 printf_unfiltered (_("Detaching from program: %s, %s\n"), exec_file,
eee22bf8
MK
794 target_pid_to_str (pid_to_ptid (pid)));
795 gdb_flush (gdb_stdout);
796 }
797 if (args)
798 sig = atoi (args);
799
800 /* ??? The HP-UX 11.0 ttrace(2) manual page doesn't mention that we
801 can pass a signal number here. Does this really work? */
802 if (ttrace (TT_PROC_DETACH, pid, 0, 0, sig, 0) == -1)
e2e0b3e5 803 perror_with_name (("ttrace"));
eee22bf8 804
b2a4db28
MK
805 if (inf_ttrace_vfork_ppid != -1)
806 {
807 if (ttrace (TT_PROC_DETACH, inf_ttrace_vfork_ppid, 0, 0, 0, 0) == -1)
808 perror_with_name (("ttrace"));
809 inf_ttrace_vfork_ppid = -1;
810 }
811
a7be7fa8
MK
812 inf_ttrace_num_lwps = 0;
813 inf_ttrace_num_lwps_in_syscall = 0;
932936f0 814
932936f0 815 inferior_ptid = null_ptid;
7f9f62ba
PA
816 detach_inferior (pid);
817
28439f5e 818 unpush_target (ops);
eee22bf8
MK
819}
820
346e281c 821static void
7d85a9c0 822inf_ttrace_kill (struct target_ops *ops)
346e281c
MK
823{
824 pid_t pid = ptid_get_pid (inferior_ptid);
825
826 if (pid == 0)
827 return;
828
829 if (ttrace (TT_PROC_EXIT, pid, 0, 0, 0, 0) == -1)
830 perror_with_name (("ttrace"));
831 /* ??? Is it necessary to call ttrace_wait() here? */
832
833 if (inf_ttrace_vfork_ppid != -1)
834 {
835 if (ttrace (TT_PROC_DETACH, inf_ttrace_vfork_ppid, 0, 0, 0, 0) == -1)
836 perror_with_name (("ttrace"));
837 inf_ttrace_vfork_ppid = -1;
838 }
839
840 target_mourn_inferior ();
841}
842
438ac09b
PA
843/* Check is a dying thread is dead by now, and delete it from GDBs
844 thread list if so. */
7ba0e0c2 845static int
438ac09b 846inf_ttrace_delete_dead_threads_callback (struct thread_info *info, void *arg)
7ba0e0c2 847{
438ac09b
PA
848 lwpid_t lwpid;
849 struct inf_ttrace_private_thread_info *p;
7ba0e0c2 850
438ac09b
PA
851 if (is_exited (info->ptid))
852 return 0;
853
854 lwpid = ptid_get_lwp (info->ptid);
855 p = (struct inf_ttrace_private_thread_info *) info->private;
856
857 /* Check if an lwp that was dying is still there or not. */
858 if (p->dying && (kill (lwpid, 0) == -1))
859 /* It's gone now. */
860 delete_thread (info->ptid);
7ba0e0c2
MK
861
862 return 0;
863}
864
438ac09b
PA
865/* Resume the lwp pointed to by INFO, with REQUEST, and pass it signal
866 SIG. */
867
868static void
869inf_ttrace_resume_lwp (struct thread_info *info, ttreq_t request, int sig)
870{
871 pid_t pid = ptid_get_pid (info->ptid);
872 lwpid_t lwpid = ptid_get_lwp (info->ptid);
873
874 if (ttrace (request, pid, lwpid, TT_NOPC, sig, 0) == -1)
875 {
876 struct inf_ttrace_private_thread_info *p
877 = (struct inf_ttrace_private_thread_info *) info->private;
878 if (p->dying && errno == EPROTO)
879 /* This is expected, it means the dying lwp is really gone
880 by now. If ttrace had an event to inform the debugger
881 the lwp is really gone, this wouldn't be needed. */
882 delete_thread (info->ptid);
883 else
884 /* This was really unexpected. */
885 perror_with_name (("ttrace"));
886 }
887}
888
889/* Callback for iterate_over_threads. */
890
60e2c248 891static int
438ac09b 892inf_ttrace_resume_callback (struct thread_info *info, void *arg)
60e2c248 893{
438ac09b
PA
894 if (!ptid_equal (info->ptid, inferior_ptid) && !is_exited (info->ptid))
895 inf_ttrace_resume_lwp (info, TT_LWP_CONTINUE, 0);
896
60e2c248
JG
897 return 0;
898}
899
eee22bf8 900static void
28439f5e
PA
901inf_ttrace_resume (struct target_ops *ops,
902 ptid_t ptid, int step, enum target_signal signal)
eee22bf8 903{
438ac09b 904 int resume_all;
eee22bf8
MK
905 ttreq_t request = step ? TT_LWP_SINGLE : TT_LWP_CONTINUE;
906 int sig = target_signal_to_host (signal);
438ac09b 907 struct thread_info *info;
eee22bf8 908
438ac09b
PA
909 /* A specific PTID means `step only this process id'. */
910 resume_all = (ptid_equal (ptid, minus_one_ptid));
eee22bf8 911
438ac09b
PA
912 /* If resuming all threads, it's the current thread that should be
913 handled specially. */
914 if (resume_all)
915 ptid = inferior_ptid;
eee22bf8 916
b861ac81 917 info = find_thread_pid (ptid);
438ac09b
PA
918 inf_ttrace_resume_lwp (info, request, sig);
919
920 if (resume_all)
921 /* Let all the other threads run too. */
922 iterate_over_threads (inf_ttrace_resume_callback, NULL);
eee22bf8
MK
923}
924
925static ptid_t
117de6a9 926inf_ttrace_wait (struct target_ops *ops,
47608cb1 927 ptid_t ptid, struct target_waitstatus *ourstatus, int options)
eee22bf8
MK
928{
929 pid_t pid = ptid_get_pid (ptid);
930 lwpid_t lwpid = ptid_get_lwp (ptid);
931 ttstate_t tts;
60e2c248 932 struct thread_info *ti;
3a3e9ee3 933 ptid_t related_ptid;
eee22bf8 934
932936f0 935 /* Until proven otherwise. */
a7be7fa8 936 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
eee22bf8
MK
937
938 if (pid == -1)
b2a4db28 939 pid = lwpid = 0;
eee22bf8 940
b2a4db28 941 gdb_assert (pid != 0 || lwpid == 0);
eee22bf8
MK
942
943 do
944 {
945 set_sigint_trap ();
eee22bf8
MK
946
947 if (ttrace_wait (pid, lwpid, TTRACE_WAITOK, &tts, sizeof tts) == -1)
a3f17187 948 perror_with_name (("ttrace_wait"));
eee22bf8 949
b2a4db28
MK
950 if (tts.tts_event == TTEVT_VFORK && tts.tts_u.tts_fork.tts_isparent)
951 {
952 if (inf_ttrace_vfork_ppid != -1)
953 {
954 gdb_assert (inf_ttrace_vfork_ppid == tts.tts_pid);
955
956 if (ttrace (TT_PROC_DETACH, tts.tts_pid, 0, 0, 0, 0) == -1)
957 perror_with_name (("ttrace"));
958 inf_ttrace_vfork_ppid = -1;
959 }
960
961 tts.tts_event = TTEVT_NONE;
962 }
963
eee22bf8
MK
964 clear_sigint_trap ();
965 }
966 while (tts.tts_event == TTEVT_NONE);
967
932936f0
MK
968 /* Now that we've waited, we can re-enable the page protections. */
969 if (inf_ttrace_reenable_page_protections)
970 {
a7be7fa8 971 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
932936f0
MK
972 inf_ttrace_enable_page_protections (tts.tts_pid);
973 inf_ttrace_reenable_page_protections = 0;
974 }
975
a7be7fa8
MK
976 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
977
2935f27f
PA
978 if (inf_ttrace_num_lwps == 0)
979 {
980 struct thread_info *ti;
981
982 inf_ttrace_num_lwps = 1;
983
984 /* This is the earliest we hear about the lwp member of
985 INFERIOR_PTID, after an attach or fork_inferior. */
986 gdb_assert (ptid_get_lwp (inferior_ptid) == 0);
987
988 /* We haven't set the private member on the main thread yet. Do
989 it now. */
990 ti = find_thread_pid (inferior_ptid);
991 gdb_assert (ti != NULL && ti->private == NULL);
992 ti->private =
993 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
994 memset (ti->private, 0,
995 sizeof (struct inf_ttrace_private_thread_info));
996
997 /* Notify the core that this ptid changed. This changes
998 inferior_ptid as well. */
999 thread_change_ptid (inferior_ptid, ptid);
1000 }
1001
eee22bf8
MK
1002 switch (tts.tts_event)
1003 {
7ba0e0c2
MK
1004#ifdef TTEVT_BPT_SSTEP
1005 case TTEVT_BPT_SSTEP:
1006 /* Make it look like a breakpoint. */
1007 ourstatus->kind = TARGET_WAITKIND_STOPPED;
1008 ourstatus->value.sig = TARGET_SIGNAL_TRAP;
1009 break;
1010#endif
1011
eee22bf8 1012 case TTEVT_EXEC:
5d426ff1
MK
1013 ourstatus->kind = TARGET_WAITKIND_EXECD;
1014 ourstatus->value.execd_pathname =
1015 xmalloc (tts.tts_u.tts_exec.tts_pathlen + 1);
1016 if (ttrace (TT_PROC_GET_PATHNAME, tts.tts_pid, 0,
1017 (uintptr_t)ourstatus->value.execd_pathname,
1018 tts.tts_u.tts_exec.tts_pathlen, 0) == -1)
1019 perror_with_name (("ttrace"));
1020 ourstatus->value.execd_pathname[tts.tts_u.tts_exec.tts_pathlen] = 0;
25b22b0a
PA
1021
1022 /* At this point, all inserted breakpoints are gone. Doing this
1023 as soon as we detect an exec prevents the badness of deleting
1024 a breakpoint writing the current "shadow contents" to lift
1025 the bp. That shadow is NOT valid after an exec. */
1026 mark_breakpoints_out ();
eee22bf8 1027 break;
932936f0 1028
eee22bf8
MK
1029 case TTEVT_EXIT:
1030 store_waitstatus (ourstatus, tts.tts_u.tts_exit.tts_exitcode);
a7be7fa8
MK
1031 inf_ttrace_num_lwps = 0;
1032 break;
1033
b2a4db28 1034 case TTEVT_FORK:
3a3e9ee3
PA
1035 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
1036 tts.tts_u.tts_fork.tts_flwpid, 0);
1037
b2a4db28 1038 ourstatus->kind = TARGET_WAITKIND_FORKED;
3a3e9ee3 1039 ourstatus->value.related_pid = related_ptid;
b2a4db28
MK
1040
1041 /* Make sure the other end of the fork is stopped too. */
1042 if (ttrace_wait (tts.tts_u.tts_fork.tts_fpid,
1043 tts.tts_u.tts_fork.tts_flwpid,
1044 TTRACE_WAITOK, &tts, sizeof tts) == -1)
1045 perror_with_name (("ttrace_wait"));
1046
1047 gdb_assert (tts.tts_event == TTEVT_FORK);
1048 if (tts.tts_u.tts_fork.tts_isparent)
1049 {
3a3e9ee3
PA
1050 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
1051 tts.tts_u.tts_fork.tts_flwpid, 0);
b2a4db28 1052 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
3a3e9ee3 1053 ourstatus->value.related_pid = related_ptid;
b2a4db28
MK
1054 }
1055 break;
1056
1057 case TTEVT_VFORK:
1058 gdb_assert (!tts.tts_u.tts_fork.tts_isparent);
1059
3a3e9ee3
PA
1060 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
1061 tts.tts_u.tts_fork.tts_flwpid, 0);
1062
b2a4db28 1063 ourstatus->kind = TARGET_WAITKIND_VFORKED;
3a3e9ee3 1064 ourstatus->value.related_pid = related_ptid;
b2a4db28
MK
1065
1066 /* HACK: To avoid touching the parent during the vfork, switch
1067 away from it. */
1068 inferior_ptid = ptid;
1069 break;
1070
a7be7fa8
MK
1071 case TTEVT_LWP_CREATE:
1072 lwpid = tts.tts_u.tts_thread.tts_target_lwpid;
1073 ptid = ptid_build (tts.tts_pid, lwpid, 0);
60e2c248
JG
1074 ti = add_thread (ptid);
1075 ti->private =
1076 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
1077 memset (ti->private, 0,
1078 sizeof (struct inf_ttrace_private_thread_info));
a7be7fa8
MK
1079 inf_ttrace_num_lwps++;
1080 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
62a93fa9
PA
1081 /* Let the lwp_create-caller thread continue. */
1082 ttrace (TT_LWP_CONTINUE, ptid_get_pid (ptid),
1083 ptid_get_lwp (ptid), TT_NOPC, 0, 0);
1084 /* Return without stopping the whole process. */
1085 ourstatus->kind = TARGET_WAITKIND_IGNORE;
1086 return ptid;
a7be7fa8
MK
1087
1088 case TTEVT_LWP_EXIT:
17faa917
DJ
1089 if (print_thread_events)
1090 printf_unfiltered (_("[%s exited]\n"), target_pid_to_str (ptid));
60e2c248
JG
1091 ti = find_thread_pid (ptid);
1092 gdb_assert (ti != NULL);
1093 ((struct inf_ttrace_private_thread_info *)ti->private)->dying = 1;
a7be7fa8 1094 inf_ttrace_num_lwps--;
62a93fa9 1095 /* Let the thread really exit. */
60e2c248
JG
1096 ttrace (TT_LWP_CONTINUE, ptid_get_pid (ptid),
1097 ptid_get_lwp (ptid), TT_NOPC, 0, 0);
62a93fa9
PA
1098 /* Return without stopping the whole process. */
1099 ourstatus->kind = TARGET_WAITKIND_IGNORE;
1100 return ptid;
a7be7fa8
MK
1101
1102 case TTEVT_LWP_TERMINATE:
1103 lwpid = tts.tts_u.tts_thread.tts_target_lwpid;
1104 ptid = ptid_build (tts.tts_pid, lwpid, 0);
62a93fa9 1105 if (print_thread_events)
b861ac81 1106 printf_unfiltered(_("[%s has been terminated]\n"),
62a93fa9 1107 target_pid_to_str (ptid));
60e2c248
JG
1108 ti = find_thread_pid (ptid);
1109 gdb_assert (ti != NULL);
1110 ((struct inf_ttrace_private_thread_info *)ti->private)->dying = 1;
a7be7fa8 1111 inf_ttrace_num_lwps--;
62a93fa9
PA
1112
1113 /* Resume the lwp_terminate-caller thread. */
a7be7fa8 1114 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
62a93fa9
PA
1115 ttrace (TT_LWP_CONTINUE, ptid_get_pid (ptid),
1116 ptid_get_lwp (ptid), TT_NOPC, 0, 0);
1117 /* Return without stopping the whole process. */
1118 ourstatus->kind = TARGET_WAITKIND_IGNORE;
1119 return ptid;
932936f0 1120
eee22bf8
MK
1121 case TTEVT_SIGNAL:
1122 ourstatus->kind = TARGET_WAITKIND_STOPPED;
1123 ourstatus->value.sig =
1124 target_signal_from_host (tts.tts_u.tts_signal.tts_signo);
1125 break;
932936f0
MK
1126
1127 case TTEVT_SYSCALL_ENTRY:
1128 gdb_assert (inf_ttrace_reenable_page_protections == 0);
a7be7fa8
MK
1129 inf_ttrace_num_lwps_in_syscall++;
1130 if (inf_ttrace_num_lwps_in_syscall == 1)
932936f0
MK
1131 {
1132 /* A thread has just entered a system call. Disable any
1133 page protections as the kernel can't deal with them. */
1134 inf_ttrace_disable_page_protections (tts.tts_pid);
1135 }
1136 ourstatus->kind = TARGET_WAITKIND_SYSCALL_ENTRY;
1137 ourstatus->value.syscall_id = tts.tts_scno;
1138 break;
1139
1140 case TTEVT_SYSCALL_RETURN:
a7be7fa8 1141 if (inf_ttrace_num_lwps_in_syscall > 0)
932936f0
MK
1142 {
1143 /* If the last thread has just left the system call, this
1144 would be a logical place to re-enable the page
1145 protections, but that doesn't work. We can't re-enable
1146 them until we've done another wait. */
1147 inf_ttrace_reenable_page_protections =
a7be7fa8
MK
1148 (inf_ttrace_num_lwps_in_syscall == 1);
1149 inf_ttrace_num_lwps_in_syscall--;
932936f0
MK
1150 }
1151 ourstatus->kind = TARGET_WAITKIND_SYSCALL_RETURN;
1152 ourstatus->value.syscall_id = tts.tts_scno;
1153 break;
a7be7fa8
MK
1154
1155 default:
1156 gdb_assert (!"Unexpected ttrace event");
1157 break;
eee22bf8
MK
1158 }
1159
1160 /* Make sure all threads within the process are stopped. */
1161 if (ttrace (TT_PROC_STOP, tts.tts_pid, 0, 0, 0, 0) == -1)
e2e0b3e5 1162 perror_with_name (("ttrace"));
eee22bf8 1163
438ac09b
PA
1164 /* Now that the whole process is stopped, check if any dying thread
1165 is really dead by now. If a dying thread is still alive, it will
1166 be stopped too, and will still show up in `info threads', tagged
1167 with "(Exiting)". We could make `info threads' prune dead
1168 threads instead via inf_ttrace_thread_alive, but doing this here
1169 has the advantage that a frontend is notificed sooner of thread
1170 exits. Note that a dying lwp is still alive, it still has to be
1171 resumed, like any other lwp. */
1172 iterate_over_threads (inf_ttrace_delete_dead_threads_callback, NULL);
1173
a7be7fa8 1174 return ptid;
eee22bf8
MK
1175}
1176
1177/* Transfer LEN bytes from ADDR in the inferior's memory into READBUF,
1178 and transfer LEN bytes from WRITEBUF into the inferior's memory at
1179 ADDR. Either READBUF or WRITEBUF may be null, in which case the
1180 corresponding transfer doesn't happen. Return the number of bytes
1181 actually transferred (which may be zero if an error occurs). */
1182
1183static LONGEST
1184inf_ttrace_xfer_memory (CORE_ADDR addr, ULONGEST len,
1185 void *readbuf, const void *writebuf)
1186{
1187 pid_t pid = ptid_get_pid (inferior_ptid);
1188
1189 /* HP-UX treats text space and data space differently. GDB however,
1190 doesn't really know the difference. Therefore we try both. Try
1191 text space before data space though because when we're writing
1192 into text space the instruction cache might need to be flushed. */
1193
1194 if (readbuf
1195 && ttrace (TT_PROC_RDTEXT, pid, 0, addr, len, (uintptr_t)readbuf) == -1
1196 && ttrace (TT_PROC_RDDATA, pid, 0, addr, len, (uintptr_t)readbuf) == -1)
1197 return 0;
1198
1199 if (writebuf
1200 && ttrace (TT_PROC_WRTEXT, pid, 0, addr, len, (uintptr_t)writebuf) == -1
1201 && ttrace (TT_PROC_WRDATA, pid, 0, addr, len, (uintptr_t)writebuf) == -1)
1202 return 0;
1203
1204 return len;
1205}
1206
1207static LONGEST
1208inf_ttrace_xfer_partial (struct target_ops *ops, enum target_object object,
7a4609f7
MK
1209 const char *annex, gdb_byte *readbuf,
1210 const gdb_byte *writebuf, ULONGEST offset, LONGEST len)
eee22bf8
MK
1211{
1212 switch (object)
1213 {
1214 case TARGET_OBJECT_MEMORY:
1215 return inf_ttrace_xfer_memory (offset, len, readbuf, writebuf);
1216
1217 case TARGET_OBJECT_UNWIND_TABLE:
1218 return -1;
1219
1220 case TARGET_OBJECT_AUXV:
1221 return -1;
1222
1223 case TARGET_OBJECT_WCOOKIE:
1224 return -1;
1225
1226 default:
1227 return -1;
1228 }
1229}
1230
1231/* Print status information about what we're accessing. */
1232
1233static void
1234inf_ttrace_files_info (struct target_ops *ignore)
1235{
181e7f93 1236 struct inferior *inf = current_inferior ();
346e281c 1237 printf_filtered (_("\tUsing the running image of %s %s.\n"),
181e7f93 1238 inf->attach_flag ? "attached" : "child",
346e281c 1239 target_pid_to_str (inferior_ptid));
eee22bf8 1240}
a7be7fa8
MK
1241
1242static int
28439f5e 1243inf_ttrace_thread_alive (struct target_ops *ops, ptid_t ptid)
a7be7fa8 1244{
438ac09b
PA
1245 return 1;
1246}
1247
1248/* Return a string describing the state of the thread specified by
1249 INFO. */
1250
1251static char *
1252inf_ttrace_extra_thread_info (struct thread_info *info)
1253{
1254 struct inf_ttrace_private_thread_info* private =
1255 (struct inf_ttrace_private_thread_info *) info->private;
1256
1257 if (private != NULL && private->dying)
1258 return "Exiting";
1259
1260 return NULL;
a7be7fa8
MK
1261}
1262
1263static char *
117de6a9 1264inf_ttrace_pid_to_str (struct target_ops *ops, ptid_t ptid)
a7be7fa8 1265{
2935f27f
PA
1266 pid_t pid = ptid_get_pid (ptid);
1267 lwpid_t lwpid = ptid_get_lwp (ptid);
1268 static char buf[128];
a7be7fa8 1269
2935f27f
PA
1270 if (lwpid == 0)
1271 xsnprintf (buf, sizeof buf, "process %ld",
1272 (long) pid);
1273 else
1274 xsnprintf (buf, sizeof buf, "process %ld, lwp %ld",
1275 (long) pid, (long) lwpid);
1276 return buf;
a7be7fa8 1277}
eee22bf8
MK
1278\f
1279
1280struct target_ops *
1281inf_ttrace_target (void)
1282{
1283 struct target_ops *t = inf_child_target ();
1284
eee22bf8
MK
1285 t->to_attach = inf_ttrace_attach;
1286 t->to_detach = inf_ttrace_detach;
1287 t->to_resume = inf_ttrace_resume;
1288 t->to_wait = inf_ttrace_wait;
eee22bf8 1289 t->to_files_info = inf_ttrace_files_info;
932936f0 1290 t->to_can_use_hw_breakpoint = inf_ttrace_can_use_hw_breakpoint;
932936f0
MK
1291 t->to_insert_watchpoint = inf_ttrace_insert_watchpoint;
1292 t->to_remove_watchpoint = inf_ttrace_remove_watchpoint;
1293 t->to_stopped_by_watchpoint = inf_ttrace_stopped_by_watchpoint;
2a3cdf79
WZ
1294 t->to_region_ok_for_hw_watchpoint =
1295 inf_ttrace_region_ok_for_hw_watchpoint;
346e281c
MK
1296 t->to_kill = inf_ttrace_kill;
1297 t->to_create_inferior = inf_ttrace_create_inferior;
1298 t->to_follow_fork = inf_ttrace_follow_fork;
1299 t->to_mourn_inferior = inf_ttrace_mourn_inferior;
1300 t->to_thread_alive = inf_ttrace_thread_alive;
438ac09b 1301 t->to_extra_thread_info = inf_ttrace_extra_thread_info;
346e281c
MK
1302 t->to_pid_to_str = inf_ttrace_pid_to_str;
1303 t->to_xfer_partial = inf_ttrace_xfer_partial;
eee22bf8 1304
eee22bf8
MK
1305 return t;
1306}
d3322e8a 1307#endif
932936f0
MK
1308\f
1309
1310/* Prevent warning from -Wmissing-prototypes. */
1311void _initialize_hppa_hpux_nat (void);
eee22bf8 1312
932936f0
MK
1313void
1314_initialize_inf_ttrace (void)
1315{
d3322e8a 1316#ifdef HAVE_TTRACE
932936f0 1317 inf_ttrace_page_dict.pagesize = getpagesize();
eee22bf8 1318#endif
d3322e8a 1319}
This page took 0.372768 seconds and 4 git commands to generate.