* cris.h (R_CRIS_32_IE): New relocation.
[deliverable/binutils-gdb.git] / gdb / inf-ttrace.c
CommitLineData
eee22bf8
MK
1/* Low-level child interface to ttrace.
2
9b254dd1 3 Copyright (C) 2004, 2005, 2006, 2007, 2008 Free Software Foundation, Inc.
eee22bf8
MK
4
5 This file is part of GDB.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
eee22bf8
MK
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
eee22bf8
MK
19
20#include "defs.h"
21
22/* The ttrace(2) system call didn't exist before HP-UX 10.30. Don't
23 try to compile this code unless we have it. */
24#ifdef HAVE_TTRACE
25
26#include "command.h"
27#include "gdbcore.h"
a7be7fa8 28#include "gdbthread.h"
eee22bf8 29#include "inferior.h"
eee22bf8
MK
30#include "target.h"
31
32#include "gdb_assert.h"
33#include "gdb_string.h"
932936f0 34#include <sys/mman.h>
eee22bf8 35#include <sys/ttrace.h>
438ac09b 36#include <signal.h>
eee22bf8
MK
37
38#include "inf-child.h"
39#include "inf-ttrace.h"
40
41/* HACK: Save the ttrace ops returned by inf_ttrace_target. */
42static struct target_ops *ttrace_ops_hack;
932936f0
MK
43\f
44
a7be7fa8
MK
45/* HP-UX uses a threading model where each user-space thread
46 corresponds to a kernel thread. These kernel threads are called
47 lwps. The ttrace(2) interface gives us almost full control over
48 the threads, which makes it very easy to support them in GDB. We
49 identify the threads by process ID and lwp ID. The ttrace(2) also
50 provides us with a thread's user ID (in the `tts_user_tid' member
51 of `ttstate_t') but we don't use that (yet) as it isn't necessary
52 to uniquely label the thread. */
53
54/* Number of active lwps. */
55static int inf_ttrace_num_lwps;
56\f
57
932936f0
MK
58/* On HP-UX versions that have the ttrace(2) system call, we can
59 implement "hardware" watchpoints by fiddling with the protection of
60 pages in the address space that contain the variable being watched.
61 In order to implement this, we keep a dictionary of pages for which
62 we have changed the protection. */
63
64struct inf_ttrace_page
65{
66 CORE_ADDR addr; /* Page address. */
67 int prot; /* Protection. */
68 int refcount; /* Reference count. */
69 struct inf_ttrace_page *next;
70 struct inf_ttrace_page *prev;
71};
72
73struct inf_ttrace_page_dict
74{
75 struct inf_ttrace_page buckets[128];
76 int pagesize; /* Page size. */
77 int count; /* Number of pages in this dictionary. */
78} inf_ttrace_page_dict;
79
60e2c248
JG
80struct inf_ttrace_private_thread_info
81{
82 int dying;
83};
84
a7be7fa8
MK
85/* Number of lwps that are currently in a system call. */
86static int inf_ttrace_num_lwps_in_syscall;
932936f0
MK
87
88/* Flag to indicate whether we should re-enable page protections after
89 the next wait. */
90static int inf_ttrace_reenable_page_protections;
91
92/* Enable system call events for process PID. */
93
94static void
95inf_ttrace_enable_syscall_events (pid_t pid)
96{
97 ttevent_t tte;
98 ttstate_t tts;
99
a7be7fa8 100 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
932936f0
MK
101
102 if (ttrace (TT_PROC_GET_EVENT_MASK, pid, 0,
103 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 104 perror_with_name (("ttrace"));
932936f0
MK
105
106 tte.tte_events |= (TTEVT_SYSCALL_ENTRY | TTEVT_SYSCALL_RETURN);
107
108 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
109 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 110 perror_with_name (("ttrace"));
932936f0
MK
111
112 if (ttrace (TT_PROC_GET_FIRST_LWP_STATE, pid, 0,
113 (uintptr_t)&tts, sizeof tts, 0) == -1)
e2e0b3e5 114 perror_with_name (("ttrace"));
932936f0
MK
115
116 if (tts.tts_flags & TTS_INSYSCALL)
a7be7fa8 117 inf_ttrace_num_lwps_in_syscall++;
932936f0
MK
118
119 /* FIXME: Handle multiple threads. */
120}
121
122/* Disable system call events for process PID. */
123
124static void
125inf_ttrace_disable_syscall_events (pid_t pid)
126{
127 ttevent_t tte;
128
129 gdb_assert (inf_ttrace_page_dict.count == 0);
130
131 if (ttrace (TT_PROC_GET_EVENT_MASK, pid, 0,
132 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 133 perror_with_name (("ttrace"));
932936f0
MK
134
135 tte.tte_events &= ~(TTEVT_SYSCALL_ENTRY | TTEVT_SYSCALL_RETURN);
136
137 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
138 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 139 perror_with_name (("ttrace"));
932936f0 140
a7be7fa8 141 inf_ttrace_num_lwps_in_syscall = 0;
932936f0
MK
142}
143
144/* Get information about the page at address ADDR for process PID from
145 the dictionary. */
146
147static struct inf_ttrace_page *
148inf_ttrace_get_page (pid_t pid, CORE_ADDR addr)
149{
150 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
151 const int pagesize = inf_ttrace_page_dict.pagesize;
152 int bucket;
153 struct inf_ttrace_page *page;
154
155 bucket = (addr / pagesize) % num_buckets;
156 page = &inf_ttrace_page_dict.buckets[bucket];
157 while (page)
158 {
159 if (page->addr == addr)
160 break;
161
162 page = page->next;
163 }
164
165 return page;
166}
167
168/* Add the page at address ADDR for process PID to the dictionary. */
169
170static struct inf_ttrace_page *
171inf_ttrace_add_page (pid_t pid, CORE_ADDR addr)
172{
173 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
174 const int pagesize = inf_ttrace_page_dict.pagesize;
175 int bucket;
176 struct inf_ttrace_page *page;
177 struct inf_ttrace_page *prev = NULL;
178
179 bucket = (addr / pagesize) % num_buckets;
180 page = &inf_ttrace_page_dict.buckets[bucket];
181 while (page)
182 {
183 if (page->addr == addr)
184 break;
185
186 prev = page;
187 page = page->next;
188 }
189
190 if (!page)
191 {
192 int prot;
193
194 if (ttrace (TT_PROC_GET_MPROTECT, pid, 0,
195 addr, 0, (uintptr_t)&prot) == -1)
e2e0b3e5 196 perror_with_name (("ttrace"));
932936f0
MK
197
198 page = XMALLOC (struct inf_ttrace_page);
199 page->addr = addr;
200 page->prot = prot;
201 page->refcount = 0;
202 page->next = NULL;
203
204 page->prev = prev;
205 prev->next = page;
206
207 inf_ttrace_page_dict.count++;
208 if (inf_ttrace_page_dict.count == 1)
209 inf_ttrace_enable_syscall_events (pid);
210
a7be7fa8 211 if (inf_ttrace_num_lwps_in_syscall == 0)
932936f0
MK
212 {
213 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
214 addr, pagesize, prot & ~PROT_WRITE) == -1)
e2e0b3e5 215 perror_with_name (("ttrace"));
932936f0
MK
216 }
217 }
218
219 return page;
220}
221
222/* Insert the page at address ADDR of process PID to the dictionary. */
223
224static void
225inf_ttrace_insert_page (pid_t pid, CORE_ADDR addr)
226{
227 struct inf_ttrace_page *page;
228
229 page = inf_ttrace_get_page (pid, addr);
230 if (!page)
231 page = inf_ttrace_add_page (pid, addr);
232
233 page->refcount++;
234}
235
236/* Remove the page at address ADDR of process PID from the dictionary. */
237
238static void
239inf_ttrace_remove_page (pid_t pid, CORE_ADDR addr)
240{
241 const int pagesize = inf_ttrace_page_dict.pagesize;
242 struct inf_ttrace_page *page;
243
244 page = inf_ttrace_get_page (pid, addr);
245 page->refcount--;
246
247 gdb_assert (page->refcount >= 0);
248
249 if (page->refcount == 0)
250 {
a7be7fa8 251 if (inf_ttrace_num_lwps_in_syscall == 0)
932936f0
MK
252 {
253 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
254 addr, pagesize, page->prot) == -1)
e2e0b3e5 255 perror_with_name (("ttrace"));
932936f0
MK
256 }
257
258 inf_ttrace_page_dict.count--;
259 if (inf_ttrace_page_dict.count == 0)
260 inf_ttrace_disable_syscall_events (pid);
261
262 page->prev->next = page->next;
263 if (page->next)
264 page->next->prev = page->prev;
265
266 xfree (page);
267 }
268}
269
270/* Mask the bits in PROT from the page protections that are currently
271 in the dictionary for process PID. */
272
273static void
274inf_ttrace_mask_page_protections (pid_t pid, int prot)
275{
276 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
277 const int pagesize = inf_ttrace_page_dict.pagesize;
278 int bucket;
279
280 for (bucket = 0; bucket < num_buckets; bucket++)
281 {
282 struct inf_ttrace_page *page;
283
284 page = inf_ttrace_page_dict.buckets[bucket].next;
285 while (page)
286 {
287 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
288 page->addr, pagesize, page->prot & ~prot) == -1)
e2e0b3e5 289 perror_with_name (("ttrace"));
932936f0
MK
290
291 page = page->next;
292 }
293 }
294}
295
296/* Write-protect the pages in the dictionary for process PID. */
297
298static void
299inf_ttrace_enable_page_protections (pid_t pid)
300{
301 inf_ttrace_mask_page_protections (pid, PROT_WRITE);
302}
303
304/* Restore the protection of the pages in the dictionary for process
305 PID. */
306
307static void
308inf_ttrace_disable_page_protections (pid_t pid)
309{
310 inf_ttrace_mask_page_protections (pid, 0);
311}
312
313/* Insert a "hardware" watchpoint for LEN bytes at address ADDR of
314 type TYPE. */
315
316static int
317inf_ttrace_insert_watchpoint (CORE_ADDR addr, int len, int type)
318{
319 const int pagesize = inf_ttrace_page_dict.pagesize;
320 pid_t pid = ptid_get_pid (inferior_ptid);
321 CORE_ADDR page_addr;
322 int num_pages;
323 int page;
324
325 gdb_assert (type == hw_write);
326
327 page_addr = (addr / pagesize) * pagesize;
328 num_pages = (len + pagesize - 1) / pagesize;
329
330 for (page = 0; page < num_pages; page++, page_addr += pagesize)
331 inf_ttrace_insert_page (pid, page_addr);
332
333 return 1;
334}
335
336/* Remove a "hardware" watchpoint for LEN bytes at address ADDR of
337 type TYPE. */
338
339static int
340inf_ttrace_remove_watchpoint (CORE_ADDR addr, int len, int type)
341{
342 const int pagesize = inf_ttrace_page_dict.pagesize;
343 pid_t pid = ptid_get_pid (inferior_ptid);
344 CORE_ADDR page_addr;
345 int num_pages;
346 int page;
347
348 gdb_assert (type == hw_write);
349
350 page_addr = (addr / pagesize) * pagesize;
351 num_pages = (len + pagesize - 1) / pagesize;
352
353 for (page = 0; page < num_pages; page++, page_addr += pagesize)
354 inf_ttrace_remove_page (pid, page_addr);
355
356 return 1;
357}
358
359static int
360inf_ttrace_can_use_hw_breakpoint (int type, int len, int ot)
361{
362 return (type == bp_hardware_watchpoint);
363}
364
365static int
2a3cdf79 366inf_ttrace_region_ok_for_hw_watchpoint (CORE_ADDR addr, int len)
932936f0
MK
367{
368 return 1;
369}
370
371/* Return non-zero if the current inferior was (potentially) stopped
372 by hitting a "hardware" watchpoint. */
373
374static int
375inf_ttrace_stopped_by_watchpoint (void)
376{
377 pid_t pid = ptid_get_pid (inferior_ptid);
378 lwpid_t lwpid = ptid_get_lwp (inferior_ptid);
379 ttstate_t tts;
380
381 if (inf_ttrace_page_dict.count > 0)
382 {
383 if (ttrace (TT_LWP_GET_STATE, pid, lwpid,
384 (uintptr_t)&tts, sizeof tts, 0) == -1)
e2e0b3e5 385 perror_with_name (("ttrace"));
932936f0
MK
386
387 if (tts.tts_event == TTEVT_SIGNAL
388 && tts.tts_u.tts_signal.tts_signo == SIGBUS)
389 {
390 const int pagesize = inf_ttrace_page_dict.pagesize;
391 void *addr = tts.tts_u.tts_signal.tts_siginfo.si_addr;
392 CORE_ADDR page_addr = ((uintptr_t)addr / pagesize) * pagesize;
393
394 if (inf_ttrace_get_page (pid, page_addr))
395 return 1;
396 }
397 }
398
399 return 0;
400}
401\f
eee22bf8 402
b2a4db28
MK
403/* When tracking a vfork(2), we cannot detach from the parent until
404 after the child has called exec(3) or has exited. If we are still
405 attached to the parent, this variable will be set to the process ID
406 of the parent. Otherwise it will be set to zero. */
407static pid_t inf_ttrace_vfork_ppid = -1;
408
409static int
ee057212 410inf_ttrace_follow_fork (struct target_ops *ops, int follow_child)
b2a4db28
MK
411{
412 pid_t pid, fpid;
413 lwpid_t lwpid, flwpid;
414 ttstate_t tts;
4e1c45ea 415 struct thread_info *last_tp = NULL;
b861ac81
PA
416 struct breakpoint *step_resume_breakpoint = NULL;
417 CORE_ADDR step_range_start = 0, step_range_end = 0;
418 struct frame_id step_frame_id = null_frame_id;
b2a4db28
MK
419
420 /* FIXME: kettenis/20050720: This stuff should really be passed as
421 an argument by our caller. */
422 {
423 ptid_t ptid;
424 struct target_waitstatus status;
425
426 get_last_target_status (&ptid, &status);
427 gdb_assert (status.kind == TARGET_WAITKIND_FORKED
428 || status.kind == TARGET_WAITKIND_VFORKED);
429
430 pid = ptid_get_pid (ptid);
431 lwpid = ptid_get_lwp (ptid);
4e1c45ea 432 last_tp = find_thread_pid (ptid);
b2a4db28
MK
433 }
434
435 /* Get all important details that core GDB doesn't (and shouldn't)
436 know about. */
437 if (ttrace (TT_LWP_GET_STATE, pid, lwpid,
438 (uintptr_t)&tts, sizeof tts, 0) == -1)
439 perror_with_name (("ttrace"));
440
441 gdb_assert (tts.tts_event == TTEVT_FORK || tts.tts_event == TTEVT_VFORK);
442
443 if (tts.tts_u.tts_fork.tts_isparent)
444 {
445 pid = tts.tts_pid;
446 lwpid = tts.tts_lwpid;
447 fpid = tts.tts_u.tts_fork.tts_fpid;
448 flwpid = tts.tts_u.tts_fork.tts_flwpid;
449 }
450 else
451 {
452 pid = tts.tts_u.tts_fork.tts_fpid;
453 lwpid = tts.tts_u.tts_fork.tts_flwpid;
454 fpid = tts.tts_pid;
455 flwpid = tts.tts_lwpid;
456 }
457
458 if (follow_child)
459 {
4e1c45ea 460 /* Copy user stepping state to the new inferior thread. */
b861ac81
PA
461 step_resume_breakpoint = last_tp->step_resume_breakpoint;
462 step_range_start = last_tp->step_range_start;
463 step_range_end = last_tp->step_range_end;
464 step_frame_id = last_tp->step_frame_id;
4e1c45ea
PA
465
466 /* Otherwise, deleting the parent would get rid of this
467 breakpoint. */
468 last_tp->step_resume_breakpoint = NULL;
469
b2a4db28 470 inferior_ptid = ptid_build (fpid, flwpid, 0);
7f9f62ba 471 add_inferior (fpid);
b2a4db28
MK
472 detach_breakpoints (pid);
473
474 target_terminal_ours ();
475 fprintf_unfiltered (gdb_stdlog, _("\
476Attaching after fork to child process %ld.\n"), (long)fpid);
477 }
478 else
479 {
480 inferior_ptid = ptid_build (pid, lwpid, 0);
481 detach_breakpoints (fpid);
482
483 target_terminal_ours ();
484 fprintf_unfiltered (gdb_stdlog, _("\
485Detaching after fork from child process %ld.\n"), (long)fpid);
486 }
487
488 if (tts.tts_event == TTEVT_VFORK)
489 {
490 gdb_assert (!tts.tts_u.tts_fork.tts_isparent);
491
492 if (follow_child)
493 {
494 /* We can't detach from the parent yet. */
495 inf_ttrace_vfork_ppid = pid;
496
497 reattach_breakpoints (fpid);
498 }
499 else
500 {
501 if (ttrace (TT_PROC_DETACH, fpid, 0, 0, 0, 0) == -1)
502 perror_with_name (("ttrace"));
503
504 /* Wait till we get the TTEVT_VFORK event in the parent.
505 This indicates that the child has called exec(3) or has
506 exited and that the parent is ready to be traced again. */
507 if (ttrace_wait (pid, lwpid, TTRACE_WAITOK, &tts, sizeof tts) == -1)
508 perror_with_name (("ttrace_wait"));
509 gdb_assert (tts.tts_event == TTEVT_VFORK);
510 gdb_assert (tts.tts_u.tts_fork.tts_isparent);
511
512 reattach_breakpoints (pid);
513 }
514 }
515 else
516 {
517 gdb_assert (tts.tts_u.tts_fork.tts_isparent);
518
519 if (follow_child)
520 {
521 if (ttrace (TT_PROC_DETACH, pid, 0, 0, 0, 0) == -1)
522 perror_with_name (("ttrace"));
523 }
524 else
525 {
526 if (ttrace (TT_PROC_DETACH, fpid, 0, 0, 0, 0) == -1)
527 perror_with_name (("ttrace"));
528 }
529 }
530
531 if (follow_child)
532 {
2935f27f
PA
533 struct thread_info *ti;
534
b2a4db28 535 /* The child will start out single-threaded. */
2935f27f 536 inf_ttrace_num_lwps = 1;
b2a4db28
MK
537 inf_ttrace_num_lwps_in_syscall = 0;
538
2935f27f
PA
539 /* Delete parent. */
540 delete_thread_silent (ptid_build (pid, lwpid, 0));
7f9f62ba 541 detach_inferior (pid);
2935f27f 542
7f9f62ba 543 /* Add child thread. inferior_ptid was already set above. */
2935f27f
PA
544 ti = add_thread_silent (inferior_ptid);
545 ti->private =
546 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
547 memset (ti->private, 0,
548 sizeof (struct inf_ttrace_private_thread_info));
549
4e1c45ea
PA
550 ti->step_resume_breakpoint = step_resume_breakpoint;
551 ti->step_range_start = step_range_start;
552 ti->step_range_end = step_range_end;
553 ti->step_frame_id = step_frame_id;
554
b2a4db28
MK
555 /* Reset breakpoints in the child as appropriate. */
556 follow_inferior_reset_breakpoints ();
557 }
558
559 return 0;
560}
561\f
562
eee22bf8
MK
563/* File descriptors for pipes used as semaphores during initial
564 startup of an inferior. */
565static int inf_ttrace_pfd1[2];
566static int inf_ttrace_pfd2[2];
567
568static void
569do_cleanup_pfds (void *dummy)
570{
571 close (inf_ttrace_pfd1[0]);
572 close (inf_ttrace_pfd1[1]);
573 close (inf_ttrace_pfd2[0]);
574 close (inf_ttrace_pfd2[1]);
575}
576
577static void
578inf_ttrace_prepare (void)
579{
580 if (pipe (inf_ttrace_pfd1) == -1)
a3f17187 581 perror_with_name (("pipe"));
eee22bf8
MK
582
583 if (pipe (inf_ttrace_pfd2) == -1)
584 {
585 close (inf_ttrace_pfd1[0]);
586 close (inf_ttrace_pfd2[0]);
a3f17187 587 perror_with_name (("pipe"));
eee22bf8
MK
588 }
589}
590
591/* Prepare to be traced. */
592
593static void
594inf_ttrace_me (void)
595{
596 struct cleanup *old_chain = make_cleanup (do_cleanup_pfds, 0);
597 char c;
598
599 /* "Trace me, Dr. Memory!" */
600 if (ttrace (TT_PROC_SETTRC, 0, 0, 0, TT_VERSION, 0) == -1)
e2e0b3e5 601 perror_with_name (("ttrace"));
eee22bf8
MK
602
603 /* Tell our parent that we are ready to be traced. */
604 if (write (inf_ttrace_pfd1[1], &c, sizeof c) != sizeof c)
e2e0b3e5 605 perror_with_name (("write"));
eee22bf8
MK
606
607 /* Wait until our parent has set the initial event mask. */
608 if (read (inf_ttrace_pfd2[0], &c, sizeof c) != sizeof c)
e2e0b3e5 609 perror_with_name (("read"));
eee22bf8
MK
610
611 do_cleanups (old_chain);
612}
613
614/* Start tracing PID. */
615
616static void
617inf_ttrace_him (int pid)
618{
619 struct cleanup *old_chain = make_cleanup (do_cleanup_pfds, 0);
620 ttevent_t tte;
eee22bf8
MK
621 char c;
622
623 /* Wait until our child is ready to be traced. */
624 if (read (inf_ttrace_pfd1[0], &c, sizeof c) != sizeof c)
e2e0b3e5 625 perror_with_name (("read"));
eee22bf8
MK
626
627 /* Set the initial event mask. */
628 memset (&tte, 0, sizeof (tte));
b2a4db28 629 tte.tte_events |= TTEVT_EXEC | TTEVT_EXIT | TTEVT_FORK | TTEVT_VFORK;
a7be7fa8 630 tte.tte_events |= TTEVT_LWP_CREATE | TTEVT_LWP_EXIT | TTEVT_LWP_TERMINATE;
7ba0e0c2
MK
631#ifdef TTEVT_BPT_SSTEP
632 tte.tte_events |= TTEVT_BPT_SSTEP;
633#endif
b2a4db28 634 tte.tte_opts |= TTEO_PROC_INHERIT;
eee22bf8
MK
635 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
636 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 637 perror_with_name (("ttrace"));
eee22bf8
MK
638
639 /* Tell our child that we have set the initial event mask. */
640 if (write (inf_ttrace_pfd2[1], &c, sizeof c) != sizeof c)
e2e0b3e5 641 perror_with_name (("write"));
eee22bf8
MK
642
643 do_cleanups (old_chain);
644
645 push_target (ttrace_ops_hack);
646
647 /* On some targets, there must be some explicit synchronization
648 between the parent and child processes after the debugger forks,
649 and before the child execs the debuggee program. This call
650 basically gives permission for the child to exec. */
651
652 target_acknowledge_created_inferior (pid);
653
654 /* START_INFERIOR_TRAPS_EXPECTED is defined in inferior.h, and will
655 be 1 or 2 depending on whether we're starting without or with a
656 shell. */
657 startup_inferior (START_INFERIOR_TRAPS_EXPECTED);
658
659 /* On some targets, there must be some explicit actions taken after
660 the inferior has been started up. */
661 target_post_startup_inferior (pid_to_ptid (pid));
662}
663
664static void
136d6dae
VP
665inf_ttrace_create_inferior (struct target_ops *ops, char *exec_file,
666 char *allargs, char **env, int from_tty)
eee22bf8 667{
a7be7fa8
MK
668 gdb_assert (inf_ttrace_num_lwps == 0);
669 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
932936f0 670 gdb_assert (inf_ttrace_page_dict.count == 0);
932936f0 671 gdb_assert (inf_ttrace_reenable_page_protections == 0);
b2a4db28 672 gdb_assert (inf_ttrace_vfork_ppid == -1);
932936f0 673
eee22bf8
MK
674 fork_inferior (exec_file, allargs, env, inf_ttrace_me, inf_ttrace_him,
675 inf_ttrace_prepare, NULL);
eee22bf8
MK
676}
677
eee22bf8 678static void
136d6dae 679inf_ttrace_mourn_inferior (struct target_ops *ops)
eee22bf8 680{
932936f0
MK
681 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
682 int bucket;
683
a7be7fa8
MK
684 inf_ttrace_num_lwps = 0;
685 inf_ttrace_num_lwps_in_syscall = 0;
932936f0
MK
686
687 for (bucket = 0; bucket < num_buckets; bucket++)
688 {
689 struct inf_ttrace_page *page;
690 struct inf_ttrace_page *next;
691
692 page = inf_ttrace_page_dict.buckets[bucket].next;
693 while (page)
694 {
695 next = page->next;
696 xfree (page);
697 page = next;
698 }
699 }
700 inf_ttrace_page_dict.count = 0;
701
eee22bf8
MK
702 unpush_target (ttrace_ops_hack);
703 generic_mourn_inferior ();
704}
705
706static void
136d6dae 707inf_ttrace_attach (struct target_ops *ops, char *args, int from_tty)
eee22bf8
MK
708{
709 char *exec_file;
710 pid_t pid;
711 char *dummy;
932936f0 712 ttevent_t tte;
181e7f93 713 struct inferior *inf;
eee22bf8
MK
714
715 if (!args)
a3f17187 716 error_no_arg (_("process-id to attach"));
eee22bf8
MK
717
718 dummy = args;
719 pid = strtol (args, &dummy, 0);
720 if (pid == 0 && args == dummy)
8a3fe4f8 721 error (_("Illegal process-id: %s."), args);
eee22bf8
MK
722
723 if (pid == getpid ()) /* Trying to masturbate? */
8a3fe4f8 724 error (_("I refuse to debug myself!"));
eee22bf8
MK
725
726 if (from_tty)
727 {
346e281c 728 exec_file = get_exec_file (0);
eee22bf8
MK
729
730 if (exec_file)
a3f17187 731 printf_unfiltered (_("Attaching to program: %s, %s\n"), exec_file,
eee22bf8
MK
732 target_pid_to_str (pid_to_ptid (pid)));
733 else
a3f17187 734 printf_unfiltered (_("Attaching to %s\n"),
eee22bf8
MK
735 target_pid_to_str (pid_to_ptid (pid)));
736
737 gdb_flush (gdb_stdout);
738 }
739
a7be7fa8
MK
740 gdb_assert (inf_ttrace_num_lwps == 0);
741 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
b2a4db28 742 gdb_assert (inf_ttrace_vfork_ppid == -1);
a7be7fa8 743
eee22bf8 744 if (ttrace (TT_PROC_ATTACH, pid, 0, TT_KILL_ON_EXIT, TT_VERSION, 0) == -1)
e2e0b3e5 745 perror_with_name (("ttrace"));
eee22bf8 746
181e7f93
PA
747 inf = add_inferior (pid);
748 inf->attach_flag = 1;
7f9f62ba 749
932936f0 750 /* Set the initial event mask. */
932936f0 751 memset (&tte, 0, sizeof (tte));
b2a4db28 752 tte.tte_events |= TTEVT_EXEC | TTEVT_EXIT | TTEVT_FORK | TTEVT_VFORK;
a7be7fa8 753 tte.tte_events |= TTEVT_LWP_CREATE | TTEVT_LWP_EXIT | TTEVT_LWP_TERMINATE;
7ba0e0c2
MK
754#ifdef TTEVT_BPT_SSTEP
755 tte.tte_events |= TTEVT_BPT_SSTEP;
756#endif
b2a4db28 757 tte.tte_opts |= TTEO_PROC_INHERIT;
932936f0
MK
758 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
759 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 760 perror_with_name (("ttrace"));
932936f0 761
eee22bf8 762 push_target (ttrace_ops_hack);
2935f27f
PA
763
764 /* We'll bump inf_ttrace_num_lwps up and add the private data to the
765 thread as soon as we get to inf_ttrace_wait. At this point, we
766 don't have lwpid info yet. */
767 inferior_ptid = pid_to_ptid (pid);
768 add_thread_silent (inferior_ptid);
eee22bf8
MK
769}
770
771static void
136d6dae 772inf_ttrace_detach (struct target_ops *ops, char *args, int from_tty)
eee22bf8 773{
eee22bf8 774 pid_t pid = ptid_get_pid (inferior_ptid);
5d426ff1 775 int sig = 0;
eee22bf8
MK
776
777 if (from_tty)
778 {
779 char *exec_file = get_exec_file (0);
780 if (exec_file == 0)
781 exec_file = "";
a3f17187 782 printf_unfiltered (_("Detaching from program: %s, %s\n"), exec_file,
eee22bf8
MK
783 target_pid_to_str (pid_to_ptid (pid)));
784 gdb_flush (gdb_stdout);
785 }
786 if (args)
787 sig = atoi (args);
788
789 /* ??? The HP-UX 11.0 ttrace(2) manual page doesn't mention that we
790 can pass a signal number here. Does this really work? */
791 if (ttrace (TT_PROC_DETACH, pid, 0, 0, sig, 0) == -1)
e2e0b3e5 792 perror_with_name (("ttrace"));
eee22bf8 793
b2a4db28
MK
794 if (inf_ttrace_vfork_ppid != -1)
795 {
796 if (ttrace (TT_PROC_DETACH, inf_ttrace_vfork_ppid, 0, 0, 0, 0) == -1)
797 perror_with_name (("ttrace"));
798 inf_ttrace_vfork_ppid = -1;
799 }
800
a7be7fa8
MK
801 inf_ttrace_num_lwps = 0;
802 inf_ttrace_num_lwps_in_syscall = 0;
932936f0 803
932936f0 804 inferior_ptid = null_ptid;
7f9f62ba
PA
805 detach_inferior (pid);
806
807 unpush_target (ttrace_ops_hack);
eee22bf8
MK
808}
809
346e281c
MK
810static void
811inf_ttrace_kill (void)
812{
813 pid_t pid = ptid_get_pid (inferior_ptid);
814
815 if (pid == 0)
816 return;
817
818 if (ttrace (TT_PROC_EXIT, pid, 0, 0, 0, 0) == -1)
819 perror_with_name (("ttrace"));
820 /* ??? Is it necessary to call ttrace_wait() here? */
821
822 if (inf_ttrace_vfork_ppid != -1)
823 {
824 if (ttrace (TT_PROC_DETACH, inf_ttrace_vfork_ppid, 0, 0, 0, 0) == -1)
825 perror_with_name (("ttrace"));
826 inf_ttrace_vfork_ppid = -1;
827 }
828
829 target_mourn_inferior ();
830}
831
438ac09b
PA
832/* Check is a dying thread is dead by now, and delete it from GDBs
833 thread list if so. */
7ba0e0c2 834static int
438ac09b 835inf_ttrace_delete_dead_threads_callback (struct thread_info *info, void *arg)
7ba0e0c2 836{
438ac09b
PA
837 lwpid_t lwpid;
838 struct inf_ttrace_private_thread_info *p;
7ba0e0c2 839
438ac09b
PA
840 if (is_exited (info->ptid))
841 return 0;
842
843 lwpid = ptid_get_lwp (info->ptid);
844 p = (struct inf_ttrace_private_thread_info *) info->private;
845
846 /* Check if an lwp that was dying is still there or not. */
847 if (p->dying && (kill (lwpid, 0) == -1))
848 /* It's gone now. */
849 delete_thread (info->ptid);
7ba0e0c2
MK
850
851 return 0;
852}
853
438ac09b
PA
854/* Resume the lwp pointed to by INFO, with REQUEST, and pass it signal
855 SIG. */
856
857static void
858inf_ttrace_resume_lwp (struct thread_info *info, ttreq_t request, int sig)
859{
860 pid_t pid = ptid_get_pid (info->ptid);
861 lwpid_t lwpid = ptid_get_lwp (info->ptid);
862
863 if (ttrace (request, pid, lwpid, TT_NOPC, sig, 0) == -1)
864 {
865 struct inf_ttrace_private_thread_info *p
866 = (struct inf_ttrace_private_thread_info *) info->private;
867 if (p->dying && errno == EPROTO)
868 /* This is expected, it means the dying lwp is really gone
869 by now. If ttrace had an event to inform the debugger
870 the lwp is really gone, this wouldn't be needed. */
871 delete_thread (info->ptid);
872 else
873 /* This was really unexpected. */
874 perror_with_name (("ttrace"));
875 }
876}
877
878/* Callback for iterate_over_threads. */
879
60e2c248 880static int
438ac09b 881inf_ttrace_resume_callback (struct thread_info *info, void *arg)
60e2c248 882{
438ac09b
PA
883 if (!ptid_equal (info->ptid, inferior_ptid) && !is_exited (info->ptid))
884 inf_ttrace_resume_lwp (info, TT_LWP_CONTINUE, 0);
885
60e2c248
JG
886 return 0;
887}
888
eee22bf8
MK
889static void
890inf_ttrace_resume (ptid_t ptid, int step, enum target_signal signal)
891{
438ac09b 892 int resume_all;
eee22bf8
MK
893 ttreq_t request = step ? TT_LWP_SINGLE : TT_LWP_CONTINUE;
894 int sig = target_signal_to_host (signal);
438ac09b 895 struct thread_info *info;
eee22bf8 896
438ac09b
PA
897 /* A specific PTID means `step only this process id'. */
898 resume_all = (ptid_equal (ptid, minus_one_ptid));
eee22bf8 899
438ac09b
PA
900 /* If resuming all threads, it's the current thread that should be
901 handled specially. */
902 if (resume_all)
903 ptid = inferior_ptid;
eee22bf8 904
b861ac81 905 info = find_thread_pid (ptid);
438ac09b
PA
906 inf_ttrace_resume_lwp (info, request, sig);
907
908 if (resume_all)
909 /* Let all the other threads run too. */
910 iterate_over_threads (inf_ttrace_resume_callback, NULL);
eee22bf8
MK
911}
912
913static ptid_t
914inf_ttrace_wait (ptid_t ptid, struct target_waitstatus *ourstatus)
915{
916 pid_t pid = ptid_get_pid (ptid);
917 lwpid_t lwpid = ptid_get_lwp (ptid);
918 ttstate_t tts;
60e2c248 919 struct thread_info *ti;
3a3e9ee3 920 ptid_t related_ptid;
eee22bf8 921
932936f0 922 /* Until proven otherwise. */
a7be7fa8 923 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
eee22bf8
MK
924
925 if (pid == -1)
b2a4db28 926 pid = lwpid = 0;
eee22bf8 927
b2a4db28 928 gdb_assert (pid != 0 || lwpid == 0);
eee22bf8
MK
929
930 do
931 {
932 set_sigint_trap ();
eee22bf8
MK
933
934 if (ttrace_wait (pid, lwpid, TTRACE_WAITOK, &tts, sizeof tts) == -1)
a3f17187 935 perror_with_name (("ttrace_wait"));
eee22bf8 936
b2a4db28
MK
937 if (tts.tts_event == TTEVT_VFORK && tts.tts_u.tts_fork.tts_isparent)
938 {
939 if (inf_ttrace_vfork_ppid != -1)
940 {
941 gdb_assert (inf_ttrace_vfork_ppid == tts.tts_pid);
942
943 if (ttrace (TT_PROC_DETACH, tts.tts_pid, 0, 0, 0, 0) == -1)
944 perror_with_name (("ttrace"));
945 inf_ttrace_vfork_ppid = -1;
946 }
947
948 tts.tts_event = TTEVT_NONE;
949 }
950
eee22bf8
MK
951 clear_sigint_trap ();
952 }
953 while (tts.tts_event == TTEVT_NONE);
954
932936f0
MK
955 /* Now that we've waited, we can re-enable the page protections. */
956 if (inf_ttrace_reenable_page_protections)
957 {
a7be7fa8 958 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
932936f0
MK
959 inf_ttrace_enable_page_protections (tts.tts_pid);
960 inf_ttrace_reenable_page_protections = 0;
961 }
962
a7be7fa8
MK
963 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
964
2935f27f
PA
965 if (inf_ttrace_num_lwps == 0)
966 {
967 struct thread_info *ti;
968
969 inf_ttrace_num_lwps = 1;
970
971 /* This is the earliest we hear about the lwp member of
972 INFERIOR_PTID, after an attach or fork_inferior. */
973 gdb_assert (ptid_get_lwp (inferior_ptid) == 0);
974
975 /* We haven't set the private member on the main thread yet. Do
976 it now. */
977 ti = find_thread_pid (inferior_ptid);
978 gdb_assert (ti != NULL && ti->private == NULL);
979 ti->private =
980 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
981 memset (ti->private, 0,
982 sizeof (struct inf_ttrace_private_thread_info));
983
984 /* Notify the core that this ptid changed. This changes
985 inferior_ptid as well. */
986 thread_change_ptid (inferior_ptid, ptid);
987 }
988
eee22bf8
MK
989 switch (tts.tts_event)
990 {
7ba0e0c2
MK
991#ifdef TTEVT_BPT_SSTEP
992 case TTEVT_BPT_SSTEP:
993 /* Make it look like a breakpoint. */
994 ourstatus->kind = TARGET_WAITKIND_STOPPED;
995 ourstatus->value.sig = TARGET_SIGNAL_TRAP;
996 break;
997#endif
998
eee22bf8 999 case TTEVT_EXEC:
5d426ff1
MK
1000 ourstatus->kind = TARGET_WAITKIND_EXECD;
1001 ourstatus->value.execd_pathname =
1002 xmalloc (tts.tts_u.tts_exec.tts_pathlen + 1);
1003 if (ttrace (TT_PROC_GET_PATHNAME, tts.tts_pid, 0,
1004 (uintptr_t)ourstatus->value.execd_pathname,
1005 tts.tts_u.tts_exec.tts_pathlen, 0) == -1)
1006 perror_with_name (("ttrace"));
1007 ourstatus->value.execd_pathname[tts.tts_u.tts_exec.tts_pathlen] = 0;
25b22b0a
PA
1008
1009 /* At this point, all inserted breakpoints are gone. Doing this
1010 as soon as we detect an exec prevents the badness of deleting
1011 a breakpoint writing the current "shadow contents" to lift
1012 the bp. That shadow is NOT valid after an exec. */
1013 mark_breakpoints_out ();
eee22bf8 1014 break;
932936f0 1015
eee22bf8
MK
1016 case TTEVT_EXIT:
1017 store_waitstatus (ourstatus, tts.tts_u.tts_exit.tts_exitcode);
a7be7fa8
MK
1018 inf_ttrace_num_lwps = 0;
1019 break;
1020
b2a4db28 1021 case TTEVT_FORK:
3a3e9ee3
PA
1022 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
1023 tts.tts_u.tts_fork.tts_flwpid, 0);
1024
b2a4db28 1025 ourstatus->kind = TARGET_WAITKIND_FORKED;
3a3e9ee3 1026 ourstatus->value.related_pid = related_ptid;
b2a4db28
MK
1027
1028 /* Make sure the other end of the fork is stopped too. */
1029 if (ttrace_wait (tts.tts_u.tts_fork.tts_fpid,
1030 tts.tts_u.tts_fork.tts_flwpid,
1031 TTRACE_WAITOK, &tts, sizeof tts) == -1)
1032 perror_with_name (("ttrace_wait"));
1033
1034 gdb_assert (tts.tts_event == TTEVT_FORK);
1035 if (tts.tts_u.tts_fork.tts_isparent)
1036 {
3a3e9ee3
PA
1037 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
1038 tts.tts_u.tts_fork.tts_flwpid, 0);
b2a4db28 1039 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
3a3e9ee3 1040 ourstatus->value.related_pid = related_ptid;
b2a4db28
MK
1041 }
1042 break;
1043
1044 case TTEVT_VFORK:
1045 gdb_assert (!tts.tts_u.tts_fork.tts_isparent);
1046
3a3e9ee3
PA
1047 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
1048 tts.tts_u.tts_fork.tts_flwpid, 0);
1049
b2a4db28 1050 ourstatus->kind = TARGET_WAITKIND_VFORKED;
3a3e9ee3 1051 ourstatus->value.related_pid = related_ptid;
b2a4db28
MK
1052
1053 /* HACK: To avoid touching the parent during the vfork, switch
1054 away from it. */
1055 inferior_ptid = ptid;
1056 break;
1057
a7be7fa8
MK
1058 case TTEVT_LWP_CREATE:
1059 lwpid = tts.tts_u.tts_thread.tts_target_lwpid;
1060 ptid = ptid_build (tts.tts_pid, lwpid, 0);
60e2c248
JG
1061 ti = add_thread (ptid);
1062 ti->private =
1063 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
1064 memset (ti->private, 0,
1065 sizeof (struct inf_ttrace_private_thread_info));
a7be7fa8
MK
1066 inf_ttrace_num_lwps++;
1067 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
62a93fa9
PA
1068 /* Let the lwp_create-caller thread continue. */
1069 ttrace (TT_LWP_CONTINUE, ptid_get_pid (ptid),
1070 ptid_get_lwp (ptid), TT_NOPC, 0, 0);
1071 /* Return without stopping the whole process. */
1072 ourstatus->kind = TARGET_WAITKIND_IGNORE;
1073 return ptid;
a7be7fa8
MK
1074
1075 case TTEVT_LWP_EXIT:
17faa917
DJ
1076 if (print_thread_events)
1077 printf_unfiltered (_("[%s exited]\n"), target_pid_to_str (ptid));
60e2c248
JG
1078 ti = find_thread_pid (ptid);
1079 gdb_assert (ti != NULL);
1080 ((struct inf_ttrace_private_thread_info *)ti->private)->dying = 1;
a7be7fa8 1081 inf_ttrace_num_lwps--;
62a93fa9 1082 /* Let the thread really exit. */
60e2c248
JG
1083 ttrace (TT_LWP_CONTINUE, ptid_get_pid (ptid),
1084 ptid_get_lwp (ptid), TT_NOPC, 0, 0);
62a93fa9
PA
1085 /* Return without stopping the whole process. */
1086 ourstatus->kind = TARGET_WAITKIND_IGNORE;
1087 return ptid;
a7be7fa8
MK
1088
1089 case TTEVT_LWP_TERMINATE:
1090 lwpid = tts.tts_u.tts_thread.tts_target_lwpid;
1091 ptid = ptid_build (tts.tts_pid, lwpid, 0);
62a93fa9 1092 if (print_thread_events)
b861ac81 1093 printf_unfiltered(_("[%s has been terminated]\n"),
62a93fa9 1094 target_pid_to_str (ptid));
60e2c248
JG
1095 ti = find_thread_pid (ptid);
1096 gdb_assert (ti != NULL);
1097 ((struct inf_ttrace_private_thread_info *)ti->private)->dying = 1;
a7be7fa8 1098 inf_ttrace_num_lwps--;
62a93fa9
PA
1099
1100 /* Resume the lwp_terminate-caller thread. */
a7be7fa8 1101 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
62a93fa9
PA
1102 ttrace (TT_LWP_CONTINUE, ptid_get_pid (ptid),
1103 ptid_get_lwp (ptid), TT_NOPC, 0, 0);
1104 /* Return without stopping the whole process. */
1105 ourstatus->kind = TARGET_WAITKIND_IGNORE;
1106 return ptid;
932936f0 1107
eee22bf8
MK
1108 case TTEVT_SIGNAL:
1109 ourstatus->kind = TARGET_WAITKIND_STOPPED;
1110 ourstatus->value.sig =
1111 target_signal_from_host (tts.tts_u.tts_signal.tts_signo);
1112 break;
932936f0
MK
1113
1114 case TTEVT_SYSCALL_ENTRY:
1115 gdb_assert (inf_ttrace_reenable_page_protections == 0);
a7be7fa8
MK
1116 inf_ttrace_num_lwps_in_syscall++;
1117 if (inf_ttrace_num_lwps_in_syscall == 1)
932936f0
MK
1118 {
1119 /* A thread has just entered a system call. Disable any
1120 page protections as the kernel can't deal with them. */
1121 inf_ttrace_disable_page_protections (tts.tts_pid);
1122 }
1123 ourstatus->kind = TARGET_WAITKIND_SYSCALL_ENTRY;
1124 ourstatus->value.syscall_id = tts.tts_scno;
1125 break;
1126
1127 case TTEVT_SYSCALL_RETURN:
a7be7fa8 1128 if (inf_ttrace_num_lwps_in_syscall > 0)
932936f0
MK
1129 {
1130 /* If the last thread has just left the system call, this
1131 would be a logical place to re-enable the page
1132 protections, but that doesn't work. We can't re-enable
1133 them until we've done another wait. */
1134 inf_ttrace_reenable_page_protections =
a7be7fa8
MK
1135 (inf_ttrace_num_lwps_in_syscall == 1);
1136 inf_ttrace_num_lwps_in_syscall--;
932936f0
MK
1137 }
1138 ourstatus->kind = TARGET_WAITKIND_SYSCALL_RETURN;
1139 ourstatus->value.syscall_id = tts.tts_scno;
1140 break;
a7be7fa8
MK
1141
1142 default:
1143 gdb_assert (!"Unexpected ttrace event");
1144 break;
eee22bf8
MK
1145 }
1146
1147 /* Make sure all threads within the process are stopped. */
1148 if (ttrace (TT_PROC_STOP, tts.tts_pid, 0, 0, 0, 0) == -1)
e2e0b3e5 1149 perror_with_name (("ttrace"));
eee22bf8 1150
438ac09b
PA
1151 /* Now that the whole process is stopped, check if any dying thread
1152 is really dead by now. If a dying thread is still alive, it will
1153 be stopped too, and will still show up in `info threads', tagged
1154 with "(Exiting)". We could make `info threads' prune dead
1155 threads instead via inf_ttrace_thread_alive, but doing this here
1156 has the advantage that a frontend is notificed sooner of thread
1157 exits. Note that a dying lwp is still alive, it still has to be
1158 resumed, like any other lwp. */
1159 iterate_over_threads (inf_ttrace_delete_dead_threads_callback, NULL);
1160
a7be7fa8 1161 return ptid;
eee22bf8
MK
1162}
1163
1164/* Transfer LEN bytes from ADDR in the inferior's memory into READBUF,
1165 and transfer LEN bytes from WRITEBUF into the inferior's memory at
1166 ADDR. Either READBUF or WRITEBUF may be null, in which case the
1167 corresponding transfer doesn't happen. Return the number of bytes
1168 actually transferred (which may be zero if an error occurs). */
1169
1170static LONGEST
1171inf_ttrace_xfer_memory (CORE_ADDR addr, ULONGEST len,
1172 void *readbuf, const void *writebuf)
1173{
1174 pid_t pid = ptid_get_pid (inferior_ptid);
1175
1176 /* HP-UX treats text space and data space differently. GDB however,
1177 doesn't really know the difference. Therefore we try both. Try
1178 text space before data space though because when we're writing
1179 into text space the instruction cache might need to be flushed. */
1180
1181 if (readbuf
1182 && ttrace (TT_PROC_RDTEXT, pid, 0, addr, len, (uintptr_t)readbuf) == -1
1183 && ttrace (TT_PROC_RDDATA, pid, 0, addr, len, (uintptr_t)readbuf) == -1)
1184 return 0;
1185
1186 if (writebuf
1187 && ttrace (TT_PROC_WRTEXT, pid, 0, addr, len, (uintptr_t)writebuf) == -1
1188 && ttrace (TT_PROC_WRDATA, pid, 0, addr, len, (uintptr_t)writebuf) == -1)
1189 return 0;
1190
1191 return len;
1192}
1193
1194static LONGEST
1195inf_ttrace_xfer_partial (struct target_ops *ops, enum target_object object,
7a4609f7
MK
1196 const char *annex, gdb_byte *readbuf,
1197 const gdb_byte *writebuf, ULONGEST offset, LONGEST len)
eee22bf8
MK
1198{
1199 switch (object)
1200 {
1201 case TARGET_OBJECT_MEMORY:
1202 return inf_ttrace_xfer_memory (offset, len, readbuf, writebuf);
1203
1204 case TARGET_OBJECT_UNWIND_TABLE:
1205 return -1;
1206
1207 case TARGET_OBJECT_AUXV:
1208 return -1;
1209
1210 case TARGET_OBJECT_WCOOKIE:
1211 return -1;
1212
1213 default:
1214 return -1;
1215 }
1216}
1217
1218/* Print status information about what we're accessing. */
1219
1220static void
1221inf_ttrace_files_info (struct target_ops *ignore)
1222{
181e7f93 1223 struct inferior *inf = current_inferior ();
346e281c 1224 printf_filtered (_("\tUsing the running image of %s %s.\n"),
181e7f93 1225 inf->attach_flag ? "attached" : "child",
346e281c 1226 target_pid_to_str (inferior_ptid));
eee22bf8 1227}
a7be7fa8
MK
1228
1229static int
1230inf_ttrace_thread_alive (ptid_t ptid)
1231{
438ac09b
PA
1232 return 1;
1233}
1234
1235/* Return a string describing the state of the thread specified by
1236 INFO. */
1237
1238static char *
1239inf_ttrace_extra_thread_info (struct thread_info *info)
1240{
1241 struct inf_ttrace_private_thread_info* private =
1242 (struct inf_ttrace_private_thread_info *) info->private;
1243
1244 if (private != NULL && private->dying)
1245 return "Exiting";
1246
1247 return NULL;
a7be7fa8
MK
1248}
1249
1250static char *
1251inf_ttrace_pid_to_str (ptid_t ptid)
1252{
2935f27f
PA
1253 pid_t pid = ptid_get_pid (ptid);
1254 lwpid_t lwpid = ptid_get_lwp (ptid);
1255 static char buf[128];
a7be7fa8 1256
2935f27f
PA
1257 if (lwpid == 0)
1258 xsnprintf (buf, sizeof buf, "process %ld",
1259 (long) pid);
1260 else
1261 xsnprintf (buf, sizeof buf, "process %ld, lwp %ld",
1262 (long) pid, (long) lwpid);
1263 return buf;
a7be7fa8 1264}
eee22bf8
MK
1265\f
1266
1267struct target_ops *
1268inf_ttrace_target (void)
1269{
1270 struct target_ops *t = inf_child_target ();
1271
eee22bf8
MK
1272 t->to_attach = inf_ttrace_attach;
1273 t->to_detach = inf_ttrace_detach;
1274 t->to_resume = inf_ttrace_resume;
1275 t->to_wait = inf_ttrace_wait;
eee22bf8 1276 t->to_files_info = inf_ttrace_files_info;
932936f0 1277 t->to_can_use_hw_breakpoint = inf_ttrace_can_use_hw_breakpoint;
932936f0
MK
1278 t->to_insert_watchpoint = inf_ttrace_insert_watchpoint;
1279 t->to_remove_watchpoint = inf_ttrace_remove_watchpoint;
1280 t->to_stopped_by_watchpoint = inf_ttrace_stopped_by_watchpoint;
2a3cdf79
WZ
1281 t->to_region_ok_for_hw_watchpoint =
1282 inf_ttrace_region_ok_for_hw_watchpoint;
346e281c
MK
1283 t->to_kill = inf_ttrace_kill;
1284 t->to_create_inferior = inf_ttrace_create_inferior;
1285 t->to_follow_fork = inf_ttrace_follow_fork;
1286 t->to_mourn_inferior = inf_ttrace_mourn_inferior;
1287 t->to_thread_alive = inf_ttrace_thread_alive;
438ac09b 1288 t->to_extra_thread_info = inf_ttrace_extra_thread_info;
346e281c
MK
1289 t->to_pid_to_str = inf_ttrace_pid_to_str;
1290 t->to_xfer_partial = inf_ttrace_xfer_partial;
eee22bf8
MK
1291
1292 ttrace_ops_hack = t;
1293 return t;
1294}
d3322e8a 1295#endif
932936f0
MK
1296\f
1297
1298/* Prevent warning from -Wmissing-prototypes. */
1299void _initialize_hppa_hpux_nat (void);
eee22bf8 1300
932936f0
MK
1301void
1302_initialize_inf_ttrace (void)
1303{
d3322e8a 1304#ifdef HAVE_TTRACE
932936f0 1305 inf_ttrace_page_dict.pagesize = getpagesize();
eee22bf8 1306#endif
d3322e8a 1307}
This page took 0.34794 seconds and 4 git commands to generate.