/* Low-level child interface to ttrace.
- Copyright 2004 Free Software Foundation, Inc.
+ Copyright (C) 2004, 2005, 2006, 2007 Free Software Foundation, Inc.
This file is part of GDB.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
- Foundation, Inc., 59 Temple Place - Suite 330,
- Boston, MA 02111-1307, USA. */
+ Foundation, Inc., 51 Franklin Street, Fifth Floor,
+ Boston, MA 02110-1301, USA. */
#include "defs.h"
#include "command.h"
#include "gdbcore.h"
+#include "gdbthread.h"
#include "inferior.h"
-#include "observer.h"
#include "target.h"
#include "gdb_assert.h"
#include "gdb_string.h"
+#include <sys/mman.h>
#include <sys/ttrace.h>
#include "inf-child.h"
/* HACK: Save the ttrace ops returned by inf_ttrace_target. */
static struct target_ops *ttrace_ops_hack;
+\f
+
+/* HP-UX uses a threading model where each user-space thread
+ corresponds to a kernel thread. These kernel threads are called
+ lwps. The ttrace(2) interface gives us almost full control over
+ the threads, which makes it very easy to support them in GDB. We
+ identify the threads by process ID and lwp ID. The ttrace(2) also
+ provides us with a thread's user ID (in the `tts_user_tid' member
+ of `ttstate_t') but we don't use that (yet) as it isn't necessary
+ to uniquely label the thread. */
+
+/* Number of active lwps. */
+static int inf_ttrace_num_lwps;
+\f
+
+/* On HP-UX versions that have the ttrace(2) system call, we can
+ implement "hardware" watchpoints by fiddling with the protection of
+ pages in the address space that contain the variable being watched.
+ In order to implement this, we keep a dictionary of pages for which
+ we have changed the protection. */
+
+struct inf_ttrace_page
+{
+ CORE_ADDR addr; /* Page address. */
+ int prot; /* Protection. */
+ int refcount; /* Reference count. */
+ struct inf_ttrace_page *next;
+ struct inf_ttrace_page *prev;
+};
+
+struct inf_ttrace_page_dict
+{
+ struct inf_ttrace_page buckets[128];
+ int pagesize; /* Page size. */
+ int count; /* Number of pages in this dictionary. */
+} inf_ttrace_page_dict;
+
+/* Number of lwps that are currently in a system call. */
+static int inf_ttrace_num_lwps_in_syscall;
+
+/* Flag to indicate whether we should re-enable page protections after
+ the next wait. */
+static int inf_ttrace_reenable_page_protections;
+
+/* Enable system call events for process PID. */
+
+static void
+inf_ttrace_enable_syscall_events (pid_t pid)
+{
+ ttevent_t tte;
+ ttstate_t tts;
+
+ gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
+
+ if (ttrace (TT_PROC_GET_EVENT_MASK, pid, 0,
+ (uintptr_t)&tte, sizeof tte, 0) == -1)
+ perror_with_name (("ttrace"));
+
+ tte.tte_events |= (TTEVT_SYSCALL_ENTRY | TTEVT_SYSCALL_RETURN);
+
+ if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
+ (uintptr_t)&tte, sizeof tte, 0) == -1)
+ perror_with_name (("ttrace"));
+
+ if (ttrace (TT_PROC_GET_FIRST_LWP_STATE, pid, 0,
+ (uintptr_t)&tts, sizeof tts, 0) == -1)
+ perror_with_name (("ttrace"));
+
+ if (tts.tts_flags & TTS_INSYSCALL)
+ inf_ttrace_num_lwps_in_syscall++;
+
+ /* FIXME: Handle multiple threads. */
+}
+
+/* Disable system call events for process PID. */
+
+static void
+inf_ttrace_disable_syscall_events (pid_t pid)
+{
+ ttevent_t tte;
+
+ gdb_assert (inf_ttrace_page_dict.count == 0);
+
+ if (ttrace (TT_PROC_GET_EVENT_MASK, pid, 0,
+ (uintptr_t)&tte, sizeof tte, 0) == -1)
+ perror_with_name (("ttrace"));
+
+ tte.tte_events &= ~(TTEVT_SYSCALL_ENTRY | TTEVT_SYSCALL_RETURN);
+
+ if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
+ (uintptr_t)&tte, sizeof tte, 0) == -1)
+ perror_with_name (("ttrace"));
+
+ inf_ttrace_num_lwps_in_syscall = 0;
+}
+
+/* Get information about the page at address ADDR for process PID from
+ the dictionary. */
+
+static struct inf_ttrace_page *
+inf_ttrace_get_page (pid_t pid, CORE_ADDR addr)
+{
+ const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
+ const int pagesize = inf_ttrace_page_dict.pagesize;
+ int bucket;
+ struct inf_ttrace_page *page;
+
+ bucket = (addr / pagesize) % num_buckets;
+ page = &inf_ttrace_page_dict.buckets[bucket];
+ while (page)
+ {
+ if (page->addr == addr)
+ break;
+
+ page = page->next;
+ }
+
+ return page;
+}
+
+/* Add the page at address ADDR for process PID to the dictionary. */
+
+static struct inf_ttrace_page *
+inf_ttrace_add_page (pid_t pid, CORE_ADDR addr)
+{
+ const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
+ const int pagesize = inf_ttrace_page_dict.pagesize;
+ int bucket;
+ struct inf_ttrace_page *page;
+ struct inf_ttrace_page *prev = NULL;
+
+ bucket = (addr / pagesize) % num_buckets;
+ page = &inf_ttrace_page_dict.buckets[bucket];
+ while (page)
+ {
+ if (page->addr == addr)
+ break;
+
+ prev = page;
+ page = page->next;
+ }
+
+ if (!page)
+ {
+ int prot;
+
+ if (ttrace (TT_PROC_GET_MPROTECT, pid, 0,
+ addr, 0, (uintptr_t)&prot) == -1)
+ perror_with_name (("ttrace"));
+
+ page = XMALLOC (struct inf_ttrace_page);
+ page->addr = addr;
+ page->prot = prot;
+ page->refcount = 0;
+ page->next = NULL;
+
+ page->prev = prev;
+ prev->next = page;
+
+ inf_ttrace_page_dict.count++;
+ if (inf_ttrace_page_dict.count == 1)
+ inf_ttrace_enable_syscall_events (pid);
+
+ if (inf_ttrace_num_lwps_in_syscall == 0)
+ {
+ if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
+ addr, pagesize, prot & ~PROT_WRITE) == -1)
+ perror_with_name (("ttrace"));
+ }
+ }
+
+ return page;
+}
+
+/* Insert the page at address ADDR of process PID to the dictionary. */
+
+static void
+inf_ttrace_insert_page (pid_t pid, CORE_ADDR addr)
+{
+ struct inf_ttrace_page *page;
+
+ page = inf_ttrace_get_page (pid, addr);
+ if (!page)
+ page = inf_ttrace_add_page (pid, addr);
+
+ page->refcount++;
+}
+
+/* Remove the page at address ADDR of process PID from the dictionary. */
+
+static void
+inf_ttrace_remove_page (pid_t pid, CORE_ADDR addr)
+{
+ const int pagesize = inf_ttrace_page_dict.pagesize;
+ struct inf_ttrace_page *page;
+
+ page = inf_ttrace_get_page (pid, addr);
+ page->refcount--;
+
+ gdb_assert (page->refcount >= 0);
+
+ if (page->refcount == 0)
+ {
+ if (inf_ttrace_num_lwps_in_syscall == 0)
+ {
+ if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
+ addr, pagesize, page->prot) == -1)
+ perror_with_name (("ttrace"));
+ }
+
+ inf_ttrace_page_dict.count--;
+ if (inf_ttrace_page_dict.count == 0)
+ inf_ttrace_disable_syscall_events (pid);
+
+ page->prev->next = page->next;
+ if (page->next)
+ page->next->prev = page->prev;
+
+ xfree (page);
+ }
+}
+
+/* Mask the bits in PROT from the page protections that are currently
+ in the dictionary for process PID. */
+
+static void
+inf_ttrace_mask_page_protections (pid_t pid, int prot)
+{
+ const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
+ const int pagesize = inf_ttrace_page_dict.pagesize;
+ int bucket;
+
+ for (bucket = 0; bucket < num_buckets; bucket++)
+ {
+ struct inf_ttrace_page *page;
+
+ page = inf_ttrace_page_dict.buckets[bucket].next;
+ while (page)
+ {
+ if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
+ page->addr, pagesize, page->prot & ~prot) == -1)
+ perror_with_name (("ttrace"));
+
+ page = page->next;
+ }
+ }
+}
+
+/* Write-protect the pages in the dictionary for process PID. */
+
+static void
+inf_ttrace_enable_page_protections (pid_t pid)
+{
+ inf_ttrace_mask_page_protections (pid, PROT_WRITE);
+}
+
+/* Restore the protection of the pages in the dictionary for process
+ PID. */
+
+static void
+inf_ttrace_disable_page_protections (pid_t pid)
+{
+ inf_ttrace_mask_page_protections (pid, 0);
+}
+
+/* Insert a "hardware" watchpoint for LEN bytes at address ADDR of
+ type TYPE. */
+
+static int
+inf_ttrace_insert_watchpoint (CORE_ADDR addr, int len, int type)
+{
+ const int pagesize = inf_ttrace_page_dict.pagesize;
+ pid_t pid = ptid_get_pid (inferior_ptid);
+ CORE_ADDR page_addr;
+ int num_pages;
+ int page;
+
+ gdb_assert (type == hw_write);
+
+ page_addr = (addr / pagesize) * pagesize;
+ num_pages = (len + pagesize - 1) / pagesize;
+
+ for (page = 0; page < num_pages; page++, page_addr += pagesize)
+ inf_ttrace_insert_page (pid, page_addr);
+
+ return 1;
+}
+
+/* Remove a "hardware" watchpoint for LEN bytes at address ADDR of
+ type TYPE. */
+
+static int
+inf_ttrace_remove_watchpoint (CORE_ADDR addr, int len, int type)
+{
+ const int pagesize = inf_ttrace_page_dict.pagesize;
+ pid_t pid = ptid_get_pid (inferior_ptid);
+ CORE_ADDR page_addr;
+ int num_pages;
+ int page;
+
+ gdb_assert (type == hw_write);
+
+ page_addr = (addr / pagesize) * pagesize;
+ num_pages = (len + pagesize - 1) / pagesize;
+
+ for (page = 0; page < num_pages; page++, page_addr += pagesize)
+ inf_ttrace_remove_page (pid, page_addr);
+
+ return 1;
+}
+
+static int
+inf_ttrace_can_use_hw_breakpoint (int type, int len, int ot)
+{
+ return (type == bp_hardware_watchpoint);
+}
+
+static int
+inf_ttrace_region_ok_for_hw_watchpoint (CORE_ADDR addr, int len)
+{
+ return 1;
+}
+
+/* Return non-zero if the current inferior was (potentially) stopped
+ by hitting a "hardware" watchpoint. */
+
+static int
+inf_ttrace_stopped_by_watchpoint (void)
+{
+ pid_t pid = ptid_get_pid (inferior_ptid);
+ lwpid_t lwpid = ptid_get_lwp (inferior_ptid);
+ ttstate_t tts;
+
+ if (inf_ttrace_page_dict.count > 0)
+ {
+ if (ttrace (TT_LWP_GET_STATE, pid, lwpid,
+ (uintptr_t)&tts, sizeof tts, 0) == -1)
+ perror_with_name (("ttrace"));
+
+ if (tts.tts_event == TTEVT_SIGNAL
+ && tts.tts_u.tts_signal.tts_signo == SIGBUS)
+ {
+ const int pagesize = inf_ttrace_page_dict.pagesize;
+ void *addr = tts.tts_u.tts_signal.tts_siginfo.si_addr;
+ CORE_ADDR page_addr = ((uintptr_t)addr / pagesize) * pagesize;
+
+ if (inf_ttrace_get_page (pid, page_addr))
+ return 1;
+ }
+ }
+
+ return 0;
+}
+\f
+
+/* When tracking a vfork(2), we cannot detach from the parent until
+ after the child has called exec(3) or has exited. If we are still
+ attached to the parent, this variable will be set to the process ID
+ of the parent. Otherwise it will be set to zero. */
+static pid_t inf_ttrace_vfork_ppid = -1;
+
+static int
+inf_ttrace_follow_fork (struct target_ops *ops, int follow_child)
+{
+ pid_t pid, fpid;
+ lwpid_t lwpid, flwpid;
+ ttstate_t tts;
+
+ /* FIXME: kettenis/20050720: This stuff should really be passed as
+ an argument by our caller. */
+ {
+ ptid_t ptid;
+ struct target_waitstatus status;
+
+ get_last_target_status (&ptid, &status);
+ gdb_assert (status.kind == TARGET_WAITKIND_FORKED
+ || status.kind == TARGET_WAITKIND_VFORKED);
+
+ pid = ptid_get_pid (ptid);
+ lwpid = ptid_get_lwp (ptid);
+ }
+
+ /* Get all important details that core GDB doesn't (and shouldn't)
+ know about. */
+ if (ttrace (TT_LWP_GET_STATE, pid, lwpid,
+ (uintptr_t)&tts, sizeof tts, 0) == -1)
+ perror_with_name (("ttrace"));
+
+ gdb_assert (tts.tts_event == TTEVT_FORK || tts.tts_event == TTEVT_VFORK);
+
+ if (tts.tts_u.tts_fork.tts_isparent)
+ {
+ pid = tts.tts_pid;
+ lwpid = tts.tts_lwpid;
+ fpid = tts.tts_u.tts_fork.tts_fpid;
+ flwpid = tts.tts_u.tts_fork.tts_flwpid;
+ }
+ else
+ {
+ pid = tts.tts_u.tts_fork.tts_fpid;
+ lwpid = tts.tts_u.tts_fork.tts_flwpid;
+ fpid = tts.tts_pid;
+ flwpid = tts.tts_lwpid;
+ }
+
+ if (follow_child)
+ {
+ inferior_ptid = ptid_build (fpid, flwpid, 0);
+ detach_breakpoints (pid);
+
+ target_terminal_ours ();
+ fprintf_unfiltered (gdb_stdlog, _("\
+Attaching after fork to child process %ld.\n"), (long)fpid);
+ }
+ else
+ {
+ inferior_ptid = ptid_build (pid, lwpid, 0);
+ detach_breakpoints (fpid);
+
+ target_terminal_ours ();
+ fprintf_unfiltered (gdb_stdlog, _("\
+Detaching after fork from child process %ld.\n"), (long)fpid);
+ }
+
+ if (tts.tts_event == TTEVT_VFORK)
+ {
+ gdb_assert (!tts.tts_u.tts_fork.tts_isparent);
+
+ if (follow_child)
+ {
+ /* We can't detach from the parent yet. */
+ inf_ttrace_vfork_ppid = pid;
+
+ reattach_breakpoints (fpid);
+ }
+ else
+ {
+ if (ttrace (TT_PROC_DETACH, fpid, 0, 0, 0, 0) == -1)
+ perror_with_name (("ttrace"));
+
+ /* Wait till we get the TTEVT_VFORK event in the parent.
+ This indicates that the child has called exec(3) or has
+ exited and that the parent is ready to be traced again. */
+ if (ttrace_wait (pid, lwpid, TTRACE_WAITOK, &tts, sizeof tts) == -1)
+ perror_with_name (("ttrace_wait"));
+ gdb_assert (tts.tts_event == TTEVT_VFORK);
+ gdb_assert (tts.tts_u.tts_fork.tts_isparent);
+
+ reattach_breakpoints (pid);
+ }
+ }
+ else
+ {
+ gdb_assert (tts.tts_u.tts_fork.tts_isparent);
+
+ if (follow_child)
+ {
+ if (ttrace (TT_PROC_DETACH, pid, 0, 0, 0, 0) == -1)
+ perror_with_name (("ttrace"));
+ }
+ else
+ {
+ if (ttrace (TT_PROC_DETACH, fpid, 0, 0, 0, 0) == -1)
+ perror_with_name (("ttrace"));
+ }
+ }
+
+ if (follow_child)
+ {
+ /* The child will start out single-threaded. */
+ inf_ttrace_num_lwps = 0;
+ inf_ttrace_num_lwps_in_syscall = 0;
+
+ /* Reset breakpoints in the child as appropriate. */
+ follow_inferior_reset_breakpoints ();
+ }
+
+ return 0;
+}
+\f
/* File descriptors for pipes used as semaphores during initial
startup of an inferior. */
inf_ttrace_prepare (void)
{
if (pipe (inf_ttrace_pfd1) == -1)
- perror_with_name ("pipe");
+ perror_with_name (("pipe"));
if (pipe (inf_ttrace_pfd2) == -1)
{
close (inf_ttrace_pfd1[0]);
close (inf_ttrace_pfd2[0]);
- perror_with_name ("pipe");
+ perror_with_name (("pipe"));
}
}
/* "Trace me, Dr. Memory!" */
if (ttrace (TT_PROC_SETTRC, 0, 0, 0, TT_VERSION, 0) == -1)
- perror_with_name ("ttrace");
+ perror_with_name (("ttrace"));
/* Tell our parent that we are ready to be traced. */
if (write (inf_ttrace_pfd1[1], &c, sizeof c) != sizeof c)
- perror_with_name ("write");
+ perror_with_name (("write"));
/* Wait until our parent has set the initial event mask. */
if (read (inf_ttrace_pfd2[0], &c, sizeof c) != sizeof c)
- perror_with_name ("read");
+ perror_with_name (("read"));
do_cleanups (old_chain);
}
{
struct cleanup *old_chain = make_cleanup (do_cleanup_pfds, 0);
ttevent_t tte;
- ttstate_t tts;
char c;
/* Wait until our child is ready to be traced. */
if (read (inf_ttrace_pfd1[0], &c, sizeof c) != sizeof c)
- perror_with_name ("read");
+ perror_with_name (("read"));
/* Set the initial event mask. */
memset (&tte, 0, sizeof (tte));
- tte.tte_events = TTEVT_EXEC | TTEVT_EXIT;
- tte.tte_opts = TTEO_NOSTRCCHLD;
+ tte.tte_events |= TTEVT_EXEC | TTEVT_EXIT | TTEVT_FORK | TTEVT_VFORK;
+ tte.tte_events |= TTEVT_LWP_CREATE | TTEVT_LWP_EXIT | TTEVT_LWP_TERMINATE;
+#ifdef TTEVT_BPT_SSTEP
+ tte.tte_events |= TTEVT_BPT_SSTEP;
+#endif
+ tte.tte_opts |= TTEO_PROC_INHERIT;
if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
(uintptr_t)&tte, sizeof tte, 0) == -1)
- perror_with_name ("ttrace");
+ perror_with_name (("ttrace"));
/* Tell our child that we have set the initial event mask. */
if (write (inf_ttrace_pfd2[1], &c, sizeof c) != sizeof c)
- perror_with_name ("write");
+ perror_with_name (("write"));
do_cleanups (old_chain);
inf_ttrace_create_inferior (char *exec_file, char *allargs, char **env,
int from_tty)
{
+ gdb_assert (inf_ttrace_num_lwps == 0);
+ gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
+ gdb_assert (inf_ttrace_page_dict.count == 0);
+ gdb_assert (inf_ttrace_reenable_page_protections == 0);
+ gdb_assert (inf_ttrace_vfork_ppid == -1);
+
fork_inferior (exec_file, allargs, env, inf_ttrace_me, inf_ttrace_him,
inf_ttrace_prepare, NULL);
-
- /* We are at the first instruction we care about. */
- observer_notify_inferior_created (¤t_target, from_tty);
-
- /* Pedal to the metal... */
- proceed ((CORE_ADDR) -1, TARGET_SIGNAL_0, 0);
}
static void
-inf_ttrace_kill_inferior (void)
+inf_ttrace_mourn_inferior (void)
{
- pid_t pid = ptid_get_pid (inferior_ptid);
+ const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
+ int bucket;
- if (pid == 0)
- return;
+ inf_ttrace_num_lwps = 0;
+ inf_ttrace_num_lwps_in_syscall = 0;
- if (ttrace (TT_PROC_EXIT, pid, 0, 0, 0, 0) == -1)
- perror_with_name ("ttrace");
- /* ??? Is it necessary to call ttrace_wait() here? */
- target_mourn_inferior ();
-}
+ for (bucket = 0; bucket < num_buckets; bucket++)
+ {
+ struct inf_ttrace_page *page;
+ struct inf_ttrace_page *next;
+
+ page = inf_ttrace_page_dict.buckets[bucket].next;
+ while (page)
+ {
+ next = page->next;
+ xfree (page);
+ page = next;
+ }
+ }
+ inf_ttrace_page_dict.count = 0;
-static void
-inf_ttrace_mourn_inferior (void)
-{
unpush_target (ttrace_ops_hack);
generic_mourn_inferior ();
}
char *exec_file;
pid_t pid;
char *dummy;
+ ttevent_t tte;
if (!args)
- error_no_arg ("process-id to attach");
+ error_no_arg (_("process-id to attach"));
dummy = args;
pid = strtol (args, &dummy, 0);
if (pid == 0 && args == dummy)
- error ("Illegal process-id: %s\n", args);
+ error (_("Illegal process-id: %s."), args);
if (pid == getpid ()) /* Trying to masturbate? */
- error ("I refuse to debug myself!");
+ error (_("I refuse to debug myself!"));
if (from_tty)
{
- exec_file = (char *) get_exec_file (0);
+ exec_file = get_exec_file (0);
if (exec_file)
- printf_unfiltered ("Attaching to program: %s, %s\n", exec_file,
+ printf_unfiltered (_("Attaching to program: %s, %s\n"), exec_file,
target_pid_to_str (pid_to_ptid (pid)));
else
- printf_unfiltered ("Attaching to %s\n",
+ printf_unfiltered (_("Attaching to %s\n"),
target_pid_to_str (pid_to_ptid (pid)));
gdb_flush (gdb_stdout);
}
+ gdb_assert (inf_ttrace_num_lwps == 0);
+ gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
+ gdb_assert (inf_ttrace_vfork_ppid == -1);
+
if (ttrace (TT_PROC_ATTACH, pid, 0, TT_KILL_ON_EXIT, TT_VERSION, 0) == -1)
- perror_with_name ("ttrace");
+ perror_with_name (("ttrace"));
attach_flag = 1;
+ /* Set the initial event mask. */
+ memset (&tte, 0, sizeof (tte));
+ tte.tte_events |= TTEVT_EXEC | TTEVT_EXIT | TTEVT_FORK | TTEVT_VFORK;
+ tte.tte_events |= TTEVT_LWP_CREATE | TTEVT_LWP_EXIT | TTEVT_LWP_TERMINATE;
+#ifdef TTEVT_BPT_SSTEP
+ tte.tte_events |= TTEVT_BPT_SSTEP;
+#endif
+ tte.tte_opts |= TTEO_PROC_INHERIT;
+ if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
+ (uintptr_t)&tte, sizeof tte, 0) == -1)
+ perror_with_name (("ttrace"));
+
inferior_ptid = pid_to_ptid (pid);
push_target (ttrace_ops_hack);
-
- /* Do this first, before anything has had a chance to query the
- inferior's symbol table or similar. */
- observer_notify_inferior_created (¤t_target, from_tty);
}
static void
inf_ttrace_detach (char *args, int from_tty)
{
- int sig = 0;
pid_t pid = ptid_get_pid (inferior_ptid);
+ int sig = 0;
if (from_tty)
{
char *exec_file = get_exec_file (0);
if (exec_file == 0)
exec_file = "";
- printf_unfiltered ("Detaching from program: %s, %s\n", exec_file,
+ printf_unfiltered (_("Detaching from program: %s, %s\n"), exec_file,
target_pid_to_str (pid_to_ptid (pid)));
gdb_flush (gdb_stdout);
}
/* ??? The HP-UX 11.0 ttrace(2) manual page doesn't mention that we
can pass a signal number here. Does this really work? */
if (ttrace (TT_PROC_DETACH, pid, 0, 0, sig, 0) == -1)
- perror_with_name ("ttrace");
+ perror_with_name (("ttrace"));
+
+ if (inf_ttrace_vfork_ppid != -1)
+ {
+ if (ttrace (TT_PROC_DETACH, inf_ttrace_vfork_ppid, 0, 0, 0, 0) == -1)
+ perror_with_name (("ttrace"));
+ inf_ttrace_vfork_ppid = -1;
+ }
+
+ inf_ttrace_num_lwps = 0;
+ inf_ttrace_num_lwps_in_syscall = 0;
- inferior_ptid = null_ptid;
unpush_target (ttrace_ops_hack);
+ inferior_ptid = null_ptid;
+}
+
+static void
+inf_ttrace_kill (void)
+{
+ pid_t pid = ptid_get_pid (inferior_ptid);
+
+ if (pid == 0)
+ return;
+
+ if (ttrace (TT_PROC_EXIT, pid, 0, 0, 0, 0) == -1)
+ perror_with_name (("ttrace"));
+ /* ??? Is it necessary to call ttrace_wait() here? */
+
+ if (inf_ttrace_vfork_ppid != -1)
+ {
+ if (ttrace (TT_PROC_DETACH, inf_ttrace_vfork_ppid, 0, 0, 0, 0) == -1)
+ perror_with_name (("ttrace"));
+ inf_ttrace_vfork_ppid = -1;
+ }
+
+ target_mourn_inferior ();
+}
+
+static int
+inf_ttrace_resume_callback (struct thread_info *info, void *arg)
+{
+ if (!ptid_equal (info->ptid, inferior_ptid))
+ {
+ pid_t pid = ptid_get_pid (info->ptid);
+ lwpid_t lwpid = ptid_get_lwp (info->ptid);
+
+ if (ttrace (TT_LWP_CONTINUE, pid, lwpid, TT_NOPC, 0, 0) == -1)
+ perror_with_name (("ttrace"));
+ }
+
+ return 0;
}
static void
}
if (ttrace (request, pid, lwpid, TT_NOPC, sig, 0) == -1)
- perror_with_name ("ttrace");
+ perror_with_name (("ttrace"));
- if (ptid_equal (ptid, minus_one_ptid))
+ if (ptid_equal (ptid, minus_one_ptid) && inf_ttrace_num_lwps > 0)
{
/* Let all the other threads run too. */
- if (ttrace (TT_PROC_CONTINUE, pid, 0, 0, 0, 0) == -1)
- perror_with_name ("ttrace");
+ iterate_over_threads (inf_ttrace_resume_callback, NULL);
}
}
lwpid_t lwpid = ptid_get_lwp (ptid);
ttstate_t tts;
- ourstatus->kind = TARGET_WAITKIND_IGNORE;
+ /* Until proven otherwise. */
+ ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
if (pid == -1)
- pid = 0;
+ pid = lwpid = 0;
- gdb_assert (lwpid == 0 || pid != 0);
+ gdb_assert (pid != 0 || lwpid == 0);
do
{
set_sigio_trap ();
if (ttrace_wait (pid, lwpid, TTRACE_WAITOK, &tts, sizeof tts) == -1)
- perror_with_name ("ttrace_wait");
+ perror_with_name (("ttrace_wait"));
+
+ if (tts.tts_event == TTEVT_VFORK && tts.tts_u.tts_fork.tts_isparent)
+ {
+ if (inf_ttrace_vfork_ppid != -1)
+ {
+ gdb_assert (inf_ttrace_vfork_ppid == tts.tts_pid);
+
+ if (ttrace (TT_PROC_DETACH, tts.tts_pid, 0, 0, 0, 0) == -1)
+ perror_with_name (("ttrace"));
+ inf_ttrace_vfork_ppid = -1;
+ }
+
+ tts.tts_event = TTEVT_NONE;
+ }
clear_sigio_trap ();
clear_sigint_trap ();
}
while (tts.tts_event == TTEVT_NONE);
+ /* Now that we've waited, we can re-enable the page protections. */
+ if (inf_ttrace_reenable_page_protections)
+ {
+ gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
+ inf_ttrace_enable_page_protections (tts.tts_pid);
+ inf_ttrace_reenable_page_protections = 0;
+ }
+
+ ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
+
switch (tts.tts_event)
{
- case TTEVT_EXEC:
+#ifdef TTEVT_BPT_SSTEP
+ case TTEVT_BPT_SSTEP:
/* Make it look like a breakpoint. */
ourstatus->kind = TARGET_WAITKIND_STOPPED;
ourstatus->value.sig = TARGET_SIGNAL_TRAP;
break;
+#endif
+
+ case TTEVT_EXEC:
+ /* FIXME: kettenis/20051029: GDB doesn't really know how to deal
+ with TARGET_WAITKIND_EXECD events yet. So we make it look
+ like a SIGTRAP instead. */
+#if 0
+ ourstatus->kind = TARGET_WAITKIND_EXECD;
+ ourstatus->value.execd_pathname =
+ xmalloc (tts.tts_u.tts_exec.tts_pathlen + 1);
+ if (ttrace (TT_PROC_GET_PATHNAME, tts.tts_pid, 0,
+ (uintptr_t)ourstatus->value.execd_pathname,
+ tts.tts_u.tts_exec.tts_pathlen, 0) == -1)
+ perror_with_name (("ttrace"));
+ ourstatus->value.execd_pathname[tts.tts_u.tts_exec.tts_pathlen] = 0;
+#else
+ ourstatus->kind = TARGET_WAITKIND_STOPPED;
+ ourstatus->value.sig = TARGET_SIGNAL_TRAP;
+#endif
+ break;
+
case TTEVT_EXIT:
store_waitstatus (ourstatus, tts.tts_u.tts_exit.tts_exitcode);
+ inf_ttrace_num_lwps = 0;
break;
+
+ case TTEVT_FORK:
+ ourstatus->kind = TARGET_WAITKIND_FORKED;
+ ourstatus->value.related_pid = tts.tts_u.tts_fork.tts_fpid;
+
+ /* Make sure the other end of the fork is stopped too. */
+ if (ttrace_wait (tts.tts_u.tts_fork.tts_fpid,
+ tts.tts_u.tts_fork.tts_flwpid,
+ TTRACE_WAITOK, &tts, sizeof tts) == -1)
+ perror_with_name (("ttrace_wait"));
+
+ gdb_assert (tts.tts_event == TTEVT_FORK);
+ if (tts.tts_u.tts_fork.tts_isparent)
+ {
+ ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
+ ourstatus->value.related_pid = tts.tts_u.tts_fork.tts_fpid;
+ }
+ break;
+
+ case TTEVT_VFORK:
+ gdb_assert (!tts.tts_u.tts_fork.tts_isparent);
+
+ ourstatus->kind = TARGET_WAITKIND_VFORKED;
+ ourstatus->value.related_pid = tts.tts_u.tts_fork.tts_fpid;
+
+ /* HACK: To avoid touching the parent during the vfork, switch
+ away from it. */
+ inferior_ptid = ptid;
+ break;
+
+ case TTEVT_LWP_CREATE:
+ lwpid = tts.tts_u.tts_thread.tts_target_lwpid;
+ ptid = ptid_build (tts.tts_pid, lwpid, 0);
+ if (inf_ttrace_num_lwps == 0)
+ {
+ /* Now that we're going to be multi-threaded, add the
+ original thread to the list first. */
+ add_thread (ptid_build (tts.tts_pid, tts.tts_lwpid, 0));
+ inf_ttrace_num_lwps++;
+ }
+ printf_filtered (_("[New %s]\n"), target_pid_to_str (ptid));
+ add_thread (ptid);
+ inf_ttrace_num_lwps++;
+ ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
+ break;
+
+ case TTEVT_LWP_EXIT:
+ printf_filtered(_("[%s exited]\n"), target_pid_to_str (ptid));
+ delete_thread (ptid);
+ inf_ttrace_num_lwps--;
+ /* If we don't return -1 here, core GDB will re-add the thread. */
+ ptid = minus_one_ptid;
+ break;
+
+ case TTEVT_LWP_TERMINATE:
+ lwpid = tts.tts_u.tts_thread.tts_target_lwpid;
+ ptid = ptid_build (tts.tts_pid, lwpid, 0);
+ printf_filtered(_("[%s has been terminated]\n"), target_pid_to_str (ptid));
+ delete_thread (ptid);
+ inf_ttrace_num_lwps--;
+ ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
+ break;
+
case TTEVT_SIGNAL:
ourstatus->kind = TARGET_WAITKIND_STOPPED;
ourstatus->value.sig =
target_signal_from_host (tts.tts_u.tts_signal.tts_signo);
break;
+
+ case TTEVT_SYSCALL_ENTRY:
+ gdb_assert (inf_ttrace_reenable_page_protections == 0);
+ inf_ttrace_num_lwps_in_syscall++;
+ if (inf_ttrace_num_lwps_in_syscall == 1)
+ {
+ /* A thread has just entered a system call. Disable any
+ page protections as the kernel can't deal with them. */
+ inf_ttrace_disable_page_protections (tts.tts_pid);
+ }
+ ourstatus->kind = TARGET_WAITKIND_SYSCALL_ENTRY;
+ ourstatus->value.syscall_id = tts.tts_scno;
+ break;
+
+ case TTEVT_SYSCALL_RETURN:
+ if (inf_ttrace_num_lwps_in_syscall > 0)
+ {
+ /* If the last thread has just left the system call, this
+ would be a logical place to re-enable the page
+ protections, but that doesn't work. We can't re-enable
+ them until we've done another wait. */
+ inf_ttrace_reenable_page_protections =
+ (inf_ttrace_num_lwps_in_syscall == 1);
+ inf_ttrace_num_lwps_in_syscall--;
+ }
+ ourstatus->kind = TARGET_WAITKIND_SYSCALL_RETURN;
+ ourstatus->value.syscall_id = tts.tts_scno;
+ break;
+
+ default:
+ gdb_assert (!"Unexpected ttrace event");
+ break;
}
/* Make sure all threads within the process are stopped. */
if (ttrace (TT_PROC_STOP, tts.tts_pid, 0, 0, 0, 0) == -1)
- perror_with_name ("ttrace");
+ perror_with_name (("ttrace"));
/* HACK: Twiddle INFERIOR_PTID such that the initial thread of a
process isn't recognized as a new thread. */
if (ptid_get_lwp (inferior_ptid) == 0)
- inferior_ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, tts.tts_user_tid);
+ inferior_ptid = ptid;
- return ptid_build (tts.tts_pid, tts.tts_lwpid, tts.tts_user_tid);
+ return ptid;
}
/* Transfer LEN bytes from ADDR in the inferior's memory into READBUF,
static LONGEST
inf_ttrace_xfer_partial (struct target_ops *ops, enum target_object object,
- const char *annex, void *readbuf,
- const void *writebuf, ULONGEST offset, LONGEST len)
+ const char *annex, gdb_byte *readbuf,
+ const gdb_byte *writebuf, ULONGEST offset, LONGEST len)
{
switch (object)
{
static void
inf_ttrace_files_info (struct target_ops *ignore)
{
- printf_unfiltered ("\tUsing the running image of %s %s.\n",
- attach_flag ? "attached" : "child",
- target_pid_to_str (inferior_ptid));
+ printf_filtered (_("\tUsing the running image of %s %s.\n"),
+ attach_flag ? "attached" : "child",
+ target_pid_to_str (inferior_ptid));
+}
+
+static int
+inf_ttrace_thread_alive (ptid_t ptid)
+{
+ return 1;
+}
+
+static char *
+inf_ttrace_pid_to_str (ptid_t ptid)
+{
+ if (inf_ttrace_num_lwps > 0)
+ {
+ pid_t pid = ptid_get_pid (ptid);
+ lwpid_t lwpid = ptid_get_lwp (ptid);
+ static char buf[128];
+
+ xsnprintf (buf, sizeof buf, "process %ld, lwp %ld",
+ (long)pid, (long)lwpid);
+ return buf;
+ }
+
+ return normal_pid_to_str (ptid);
}
\f
{
struct target_ops *t = inf_child_target ();
- t->to_create_inferior = inf_ttrace_create_inferior;
- t->to_kill = inf_ttrace_kill_inferior;
- t->to_mourn_inferior = inf_ttrace_mourn_inferior;
t->to_attach = inf_ttrace_attach;
t->to_detach = inf_ttrace_detach;
t->to_resume = inf_ttrace_resume;
t->to_wait = inf_ttrace_wait;
- t->to_xfer_partial = inf_ttrace_xfer_partial;
t->to_files_info = inf_ttrace_files_info;
+ t->to_can_use_hw_breakpoint = inf_ttrace_can_use_hw_breakpoint;
+ t->to_insert_watchpoint = inf_ttrace_insert_watchpoint;
+ t->to_remove_watchpoint = inf_ttrace_remove_watchpoint;
+ t->to_stopped_by_watchpoint = inf_ttrace_stopped_by_watchpoint;
+ t->to_region_ok_for_hw_watchpoint =
+ inf_ttrace_region_ok_for_hw_watchpoint;
+ t->to_kill = inf_ttrace_kill;
+ t->to_create_inferior = inf_ttrace_create_inferior;
+ t->to_follow_fork = inf_ttrace_follow_fork;
+ t->to_mourn_inferior = inf_ttrace_mourn_inferior;
+ t->to_thread_alive = inf_ttrace_thread_alive;
+ t->to_pid_to_str = inf_ttrace_pid_to_str;
+ t->to_xfer_partial = inf_ttrace_xfer_partial;
ttrace_ops_hack = t;
return t;
}
+#endif
+\f
+/* Prevent warning from -Wmissing-prototypes. */
+void _initialize_hppa_hpux_nat (void);
+
+void
+_initialize_inf_ttrace (void)
+{
+#ifdef HAVE_TTRACE
+ inf_ttrace_page_dict.pagesize = getpagesize();
#endif
+}