2009-10-19 Pedro Alves <pedro@codesourcery.com>
[deliverable/binutils-gdb.git] / gdb / inf-ttrace.c
CommitLineData
eee22bf8
MK
1/* Low-level child interface to ttrace.
2
0fb0cc75
JB
3 Copyright (C) 2004, 2005, 2006, 2007, 2008, 2009
4 Free Software Foundation, Inc.
eee22bf8
MK
5
6 This file is part of GDB.
7
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
a9762ec7 10 the Free Software Foundation; either version 3 of the License, or
eee22bf8
MK
11 (at your option) any later version.
12
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
a9762ec7 19 along with this program. If not, see <http://www.gnu.org/licenses/>. */
eee22bf8
MK
20
21#include "defs.h"
22
23/* The ttrace(2) system call didn't exist before HP-UX 10.30. Don't
24 try to compile this code unless we have it. */
25#ifdef HAVE_TTRACE
26
27#include "command.h"
28#include "gdbcore.h"
a7be7fa8 29#include "gdbthread.h"
eee22bf8 30#include "inferior.h"
191c4426 31#include "terminal.h"
eee22bf8
MK
32#include "target.h"
33
34#include "gdb_assert.h"
35#include "gdb_string.h"
932936f0 36#include <sys/mman.h>
eee22bf8 37#include <sys/ttrace.h>
438ac09b 38#include <signal.h>
eee22bf8
MK
39
40#include "inf-child.h"
41#include "inf-ttrace.h"
42
932936f0
MK
43\f
44
a7be7fa8
MK
45/* HP-UX uses a threading model where each user-space thread
46 corresponds to a kernel thread. These kernel threads are called
47 lwps. The ttrace(2) interface gives us almost full control over
48 the threads, which makes it very easy to support them in GDB. We
49 identify the threads by process ID and lwp ID. The ttrace(2) also
50 provides us with a thread's user ID (in the `tts_user_tid' member
51 of `ttstate_t') but we don't use that (yet) as it isn't necessary
52 to uniquely label the thread. */
53
54/* Number of active lwps. */
55static int inf_ttrace_num_lwps;
56\f
57
932936f0
MK
58/* On HP-UX versions that have the ttrace(2) system call, we can
59 implement "hardware" watchpoints by fiddling with the protection of
60 pages in the address space that contain the variable being watched.
61 In order to implement this, we keep a dictionary of pages for which
62 we have changed the protection. */
63
64struct inf_ttrace_page
65{
66 CORE_ADDR addr; /* Page address. */
67 int prot; /* Protection. */
68 int refcount; /* Reference count. */
69 struct inf_ttrace_page *next;
70 struct inf_ttrace_page *prev;
71};
72
73struct inf_ttrace_page_dict
74{
75 struct inf_ttrace_page buckets[128];
76 int pagesize; /* Page size. */
77 int count; /* Number of pages in this dictionary. */
78} inf_ttrace_page_dict;
79
60e2c248
JG
80struct inf_ttrace_private_thread_info
81{
82 int dying;
83};
84
a7be7fa8
MK
85/* Number of lwps that are currently in a system call. */
86static int inf_ttrace_num_lwps_in_syscall;
932936f0
MK
87
88/* Flag to indicate whether we should re-enable page protections after
89 the next wait. */
90static int inf_ttrace_reenable_page_protections;
91
92/* Enable system call events for process PID. */
93
94static void
95inf_ttrace_enable_syscall_events (pid_t pid)
96{
97 ttevent_t tte;
98 ttstate_t tts;
99
a7be7fa8 100 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
932936f0
MK
101
102 if (ttrace (TT_PROC_GET_EVENT_MASK, pid, 0,
103 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 104 perror_with_name (("ttrace"));
932936f0
MK
105
106 tte.tte_events |= (TTEVT_SYSCALL_ENTRY | TTEVT_SYSCALL_RETURN);
107
108 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
109 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 110 perror_with_name (("ttrace"));
932936f0
MK
111
112 if (ttrace (TT_PROC_GET_FIRST_LWP_STATE, pid, 0,
113 (uintptr_t)&tts, sizeof tts, 0) == -1)
e2e0b3e5 114 perror_with_name (("ttrace"));
932936f0
MK
115
116 if (tts.tts_flags & TTS_INSYSCALL)
a7be7fa8 117 inf_ttrace_num_lwps_in_syscall++;
932936f0
MK
118
119 /* FIXME: Handle multiple threads. */
120}
121
122/* Disable system call events for process PID. */
123
124static void
125inf_ttrace_disable_syscall_events (pid_t pid)
126{
127 ttevent_t tte;
128
129 gdb_assert (inf_ttrace_page_dict.count == 0);
130
131 if (ttrace (TT_PROC_GET_EVENT_MASK, pid, 0,
132 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 133 perror_with_name (("ttrace"));
932936f0
MK
134
135 tte.tte_events &= ~(TTEVT_SYSCALL_ENTRY | TTEVT_SYSCALL_RETURN);
136
137 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
138 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 139 perror_with_name (("ttrace"));
932936f0 140
a7be7fa8 141 inf_ttrace_num_lwps_in_syscall = 0;
932936f0
MK
142}
143
144/* Get information about the page at address ADDR for process PID from
145 the dictionary. */
146
147static struct inf_ttrace_page *
148inf_ttrace_get_page (pid_t pid, CORE_ADDR addr)
149{
150 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
151 const int pagesize = inf_ttrace_page_dict.pagesize;
152 int bucket;
153 struct inf_ttrace_page *page;
154
155 bucket = (addr / pagesize) % num_buckets;
156 page = &inf_ttrace_page_dict.buckets[bucket];
157 while (page)
158 {
159 if (page->addr == addr)
160 break;
161
162 page = page->next;
163 }
164
165 return page;
166}
167
168/* Add the page at address ADDR for process PID to the dictionary. */
169
170static struct inf_ttrace_page *
171inf_ttrace_add_page (pid_t pid, CORE_ADDR addr)
172{
173 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
174 const int pagesize = inf_ttrace_page_dict.pagesize;
175 int bucket;
176 struct inf_ttrace_page *page;
177 struct inf_ttrace_page *prev = NULL;
178
179 bucket = (addr / pagesize) % num_buckets;
180 page = &inf_ttrace_page_dict.buckets[bucket];
181 while (page)
182 {
183 if (page->addr == addr)
184 break;
185
186 prev = page;
187 page = page->next;
188 }
189
190 if (!page)
191 {
192 int prot;
193
194 if (ttrace (TT_PROC_GET_MPROTECT, pid, 0,
195 addr, 0, (uintptr_t)&prot) == -1)
e2e0b3e5 196 perror_with_name (("ttrace"));
932936f0
MK
197
198 page = XMALLOC (struct inf_ttrace_page);
199 page->addr = addr;
200 page->prot = prot;
201 page->refcount = 0;
202 page->next = NULL;
203
204 page->prev = prev;
205 prev->next = page;
206
207 inf_ttrace_page_dict.count++;
208 if (inf_ttrace_page_dict.count == 1)
209 inf_ttrace_enable_syscall_events (pid);
210
a7be7fa8 211 if (inf_ttrace_num_lwps_in_syscall == 0)
932936f0
MK
212 {
213 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
214 addr, pagesize, prot & ~PROT_WRITE) == -1)
e2e0b3e5 215 perror_with_name (("ttrace"));
932936f0
MK
216 }
217 }
218
219 return page;
220}
221
222/* Insert the page at address ADDR of process PID to the dictionary. */
223
224static void
225inf_ttrace_insert_page (pid_t pid, CORE_ADDR addr)
226{
227 struct inf_ttrace_page *page;
228
229 page = inf_ttrace_get_page (pid, addr);
230 if (!page)
231 page = inf_ttrace_add_page (pid, addr);
232
233 page->refcount++;
234}
235
236/* Remove the page at address ADDR of process PID from the dictionary. */
237
238static void
239inf_ttrace_remove_page (pid_t pid, CORE_ADDR addr)
240{
241 const int pagesize = inf_ttrace_page_dict.pagesize;
242 struct inf_ttrace_page *page;
243
244 page = inf_ttrace_get_page (pid, addr);
245 page->refcount--;
246
247 gdb_assert (page->refcount >= 0);
248
249 if (page->refcount == 0)
250 {
a7be7fa8 251 if (inf_ttrace_num_lwps_in_syscall == 0)
932936f0
MK
252 {
253 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
254 addr, pagesize, page->prot) == -1)
e2e0b3e5 255 perror_with_name (("ttrace"));
932936f0
MK
256 }
257
258 inf_ttrace_page_dict.count--;
259 if (inf_ttrace_page_dict.count == 0)
260 inf_ttrace_disable_syscall_events (pid);
261
262 page->prev->next = page->next;
263 if (page->next)
264 page->next->prev = page->prev;
265
266 xfree (page);
267 }
268}
269
270/* Mask the bits in PROT from the page protections that are currently
271 in the dictionary for process PID. */
272
273static void
274inf_ttrace_mask_page_protections (pid_t pid, int prot)
275{
276 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
277 const int pagesize = inf_ttrace_page_dict.pagesize;
278 int bucket;
279
280 for (bucket = 0; bucket < num_buckets; bucket++)
281 {
282 struct inf_ttrace_page *page;
283
284 page = inf_ttrace_page_dict.buckets[bucket].next;
285 while (page)
286 {
287 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
288 page->addr, pagesize, page->prot & ~prot) == -1)
e2e0b3e5 289 perror_with_name (("ttrace"));
932936f0
MK
290
291 page = page->next;
292 }
293 }
294}
295
296/* Write-protect the pages in the dictionary for process PID. */
297
298static void
299inf_ttrace_enable_page_protections (pid_t pid)
300{
301 inf_ttrace_mask_page_protections (pid, PROT_WRITE);
302}
303
304/* Restore the protection of the pages in the dictionary for process
305 PID. */
306
307static void
308inf_ttrace_disable_page_protections (pid_t pid)
309{
310 inf_ttrace_mask_page_protections (pid, 0);
311}
312
313/* Insert a "hardware" watchpoint for LEN bytes at address ADDR of
314 type TYPE. */
315
316static int
317inf_ttrace_insert_watchpoint (CORE_ADDR addr, int len, int type)
318{
319 const int pagesize = inf_ttrace_page_dict.pagesize;
320 pid_t pid = ptid_get_pid (inferior_ptid);
321 CORE_ADDR page_addr;
322 int num_pages;
323 int page;
324
325 gdb_assert (type == hw_write);
326
327 page_addr = (addr / pagesize) * pagesize;
328 num_pages = (len + pagesize - 1) / pagesize;
329
330 for (page = 0; page < num_pages; page++, page_addr += pagesize)
331 inf_ttrace_insert_page (pid, page_addr);
332
333 return 1;
334}
335
336/* Remove a "hardware" watchpoint for LEN bytes at address ADDR of
337 type TYPE. */
338
339static int
340inf_ttrace_remove_watchpoint (CORE_ADDR addr, int len, int type)
341{
342 const int pagesize = inf_ttrace_page_dict.pagesize;
343 pid_t pid = ptid_get_pid (inferior_ptid);
344 CORE_ADDR page_addr;
345 int num_pages;
346 int page;
347
348 gdb_assert (type == hw_write);
349
350 page_addr = (addr / pagesize) * pagesize;
351 num_pages = (len + pagesize - 1) / pagesize;
352
353 for (page = 0; page < num_pages; page++, page_addr += pagesize)
354 inf_ttrace_remove_page (pid, page_addr);
355
356 return 1;
357}
358
359static int
360inf_ttrace_can_use_hw_breakpoint (int type, int len, int ot)
361{
362 return (type == bp_hardware_watchpoint);
363}
364
365static int
2a3cdf79 366inf_ttrace_region_ok_for_hw_watchpoint (CORE_ADDR addr, int len)
932936f0
MK
367{
368 return 1;
369}
370
371/* Return non-zero if the current inferior was (potentially) stopped
372 by hitting a "hardware" watchpoint. */
373
374static int
375inf_ttrace_stopped_by_watchpoint (void)
376{
377 pid_t pid = ptid_get_pid (inferior_ptid);
378 lwpid_t lwpid = ptid_get_lwp (inferior_ptid);
379 ttstate_t tts;
380
381 if (inf_ttrace_page_dict.count > 0)
382 {
383 if (ttrace (TT_LWP_GET_STATE, pid, lwpid,
384 (uintptr_t)&tts, sizeof tts, 0) == -1)
e2e0b3e5 385 perror_with_name (("ttrace"));
932936f0
MK
386
387 if (tts.tts_event == TTEVT_SIGNAL
388 && tts.tts_u.tts_signal.tts_signo == SIGBUS)
389 {
390 const int pagesize = inf_ttrace_page_dict.pagesize;
391 void *addr = tts.tts_u.tts_signal.tts_siginfo.si_addr;
392 CORE_ADDR page_addr = ((uintptr_t)addr / pagesize) * pagesize;
393
394 if (inf_ttrace_get_page (pid, page_addr))
395 return 1;
396 }
397 }
398
399 return 0;
400}
401\f
eee22bf8 402
b2a4db28
MK
403/* When tracking a vfork(2), we cannot detach from the parent until
404 after the child has called exec(3) or has exited. If we are still
405 attached to the parent, this variable will be set to the process ID
406 of the parent. Otherwise it will be set to zero. */
407static pid_t inf_ttrace_vfork_ppid = -1;
408
409static int
ee057212 410inf_ttrace_follow_fork (struct target_ops *ops, int follow_child)
b2a4db28
MK
411{
412 pid_t pid, fpid;
413 lwpid_t lwpid, flwpid;
414 ttstate_t tts;
e58b0e63
PA
415 struct thread_info *tp = inferior_thread ();
416
417 gdb_assert (tp->pending_follow.kind == TARGET_WAITKIND_FORKED
418 || tp->pending_follow.kind == TARGET_WAITKIND_VFORKED);
419
420 pid = ptid_get_pid (inferior_ptid);
421 lwpid = ptid_get_lwp (inferior_ptid);
b2a4db28
MK
422
423 /* Get all important details that core GDB doesn't (and shouldn't)
424 know about. */
425 if (ttrace (TT_LWP_GET_STATE, pid, lwpid,
426 (uintptr_t)&tts, sizeof tts, 0) == -1)
427 perror_with_name (("ttrace"));
428
429 gdb_assert (tts.tts_event == TTEVT_FORK || tts.tts_event == TTEVT_VFORK);
430
431 if (tts.tts_u.tts_fork.tts_isparent)
432 {
433 pid = tts.tts_pid;
434 lwpid = tts.tts_lwpid;
435 fpid = tts.tts_u.tts_fork.tts_fpid;
436 flwpid = tts.tts_u.tts_fork.tts_flwpid;
437 }
438 else
439 {
440 pid = tts.tts_u.tts_fork.tts_fpid;
441 lwpid = tts.tts_u.tts_fork.tts_flwpid;
442 fpid = tts.tts_pid;
443 flwpid = tts.tts_lwpid;
444 }
445
446 if (follow_child)
447 {
77435e4c 448 struct inferior *inf;
191c4426
PA
449 struct inferior *parent_inf;
450
451 parent_inf = find_inferior_pid (pid);
77435e4c 452
b2a4db28 453 inferior_ptid = ptid_build (fpid, flwpid, 0);
77435e4c 454 inf = add_inferior (fpid);
191c4426 455 inf->attach_flag = parent_inf->attach_flag;
6c95b8df
PA
456 inf->pspace = parent_inf->pspace;
457 inf->aspace = parent_inf->aspace;
191c4426 458 copy_terminal_info (inf, parent_inf);
b2a4db28
MK
459 detach_breakpoints (pid);
460
461 target_terminal_ours ();
462 fprintf_unfiltered (gdb_stdlog, _("\
463Attaching after fork to child process %ld.\n"), (long)fpid);
464 }
465 else
466 {
467 inferior_ptid = ptid_build (pid, lwpid, 0);
468 detach_breakpoints (fpid);
469
470 target_terminal_ours ();
471 fprintf_unfiltered (gdb_stdlog, _("\
472Detaching after fork from child process %ld.\n"), (long)fpid);
473 }
474
475 if (tts.tts_event == TTEVT_VFORK)
476 {
477 gdb_assert (!tts.tts_u.tts_fork.tts_isparent);
478
479 if (follow_child)
480 {
481 /* We can't detach from the parent yet. */
482 inf_ttrace_vfork_ppid = pid;
483
484 reattach_breakpoints (fpid);
485 }
486 else
487 {
488 if (ttrace (TT_PROC_DETACH, fpid, 0, 0, 0, 0) == -1)
489 perror_with_name (("ttrace"));
490
491 /* Wait till we get the TTEVT_VFORK event in the parent.
492 This indicates that the child has called exec(3) or has
493 exited and that the parent is ready to be traced again. */
494 if (ttrace_wait (pid, lwpid, TTRACE_WAITOK, &tts, sizeof tts) == -1)
495 perror_with_name (("ttrace_wait"));
496 gdb_assert (tts.tts_event == TTEVT_VFORK);
497 gdb_assert (tts.tts_u.tts_fork.tts_isparent);
498
499 reattach_breakpoints (pid);
500 }
501 }
502 else
503 {
504 gdb_assert (tts.tts_u.tts_fork.tts_isparent);
505
506 if (follow_child)
507 {
508 if (ttrace (TT_PROC_DETACH, pid, 0, 0, 0, 0) == -1)
509 perror_with_name (("ttrace"));
510 }
511 else
512 {
513 if (ttrace (TT_PROC_DETACH, fpid, 0, 0, 0, 0) == -1)
514 perror_with_name (("ttrace"));
515 }
516 }
517
518 if (follow_child)
519 {
2935f27f
PA
520 struct thread_info *ti;
521
b2a4db28 522 /* The child will start out single-threaded. */
2935f27f 523 inf_ttrace_num_lwps = 1;
b2a4db28
MK
524 inf_ttrace_num_lwps_in_syscall = 0;
525
2935f27f
PA
526 /* Delete parent. */
527 delete_thread_silent (ptid_build (pid, lwpid, 0));
7f9f62ba 528 detach_inferior (pid);
2935f27f 529
7f9f62ba 530 /* Add child thread. inferior_ptid was already set above. */
2935f27f
PA
531 ti = add_thread_silent (inferior_ptid);
532 ti->private =
533 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
534 memset (ti->private, 0,
535 sizeof (struct inf_ttrace_private_thread_info));
b2a4db28
MK
536 }
537
538 return 0;
539}
540\f
541
eee22bf8
MK
542/* File descriptors for pipes used as semaphores during initial
543 startup of an inferior. */
544static int inf_ttrace_pfd1[2];
545static int inf_ttrace_pfd2[2];
546
547static void
548do_cleanup_pfds (void *dummy)
549{
550 close (inf_ttrace_pfd1[0]);
551 close (inf_ttrace_pfd1[1]);
552 close (inf_ttrace_pfd2[0]);
553 close (inf_ttrace_pfd2[1]);
554}
555
556static void
557inf_ttrace_prepare (void)
558{
559 if (pipe (inf_ttrace_pfd1) == -1)
a3f17187 560 perror_with_name (("pipe"));
eee22bf8
MK
561
562 if (pipe (inf_ttrace_pfd2) == -1)
563 {
564 close (inf_ttrace_pfd1[0]);
565 close (inf_ttrace_pfd2[0]);
a3f17187 566 perror_with_name (("pipe"));
eee22bf8
MK
567 }
568}
569
570/* Prepare to be traced. */
571
572static void
573inf_ttrace_me (void)
574{
575 struct cleanup *old_chain = make_cleanup (do_cleanup_pfds, 0);
576 char c;
577
578 /* "Trace me, Dr. Memory!" */
579 if (ttrace (TT_PROC_SETTRC, 0, 0, 0, TT_VERSION, 0) == -1)
e2e0b3e5 580 perror_with_name (("ttrace"));
eee22bf8
MK
581
582 /* Tell our parent that we are ready to be traced. */
583 if (write (inf_ttrace_pfd1[1], &c, sizeof c) != sizeof c)
e2e0b3e5 584 perror_with_name (("write"));
eee22bf8
MK
585
586 /* Wait until our parent has set the initial event mask. */
587 if (read (inf_ttrace_pfd2[0], &c, sizeof c) != sizeof c)
e2e0b3e5 588 perror_with_name (("read"));
eee22bf8
MK
589
590 do_cleanups (old_chain);
591}
592
593/* Start tracing PID. */
594
595static void
28439f5e 596inf_ttrace_him (struct target_ops *ops, int pid)
eee22bf8
MK
597{
598 struct cleanup *old_chain = make_cleanup (do_cleanup_pfds, 0);
599 ttevent_t tte;
eee22bf8
MK
600 char c;
601
602 /* Wait until our child is ready to be traced. */
603 if (read (inf_ttrace_pfd1[0], &c, sizeof c) != sizeof c)
e2e0b3e5 604 perror_with_name (("read"));
eee22bf8
MK
605
606 /* Set the initial event mask. */
607 memset (&tte, 0, sizeof (tte));
b2a4db28 608 tte.tte_events |= TTEVT_EXEC | TTEVT_EXIT | TTEVT_FORK | TTEVT_VFORK;
a7be7fa8 609 tte.tte_events |= TTEVT_LWP_CREATE | TTEVT_LWP_EXIT | TTEVT_LWP_TERMINATE;
7ba0e0c2
MK
610#ifdef TTEVT_BPT_SSTEP
611 tte.tte_events |= TTEVT_BPT_SSTEP;
612#endif
b2a4db28 613 tte.tte_opts |= TTEO_PROC_INHERIT;
eee22bf8
MK
614 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
615 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 616 perror_with_name (("ttrace"));
eee22bf8
MK
617
618 /* Tell our child that we have set the initial event mask. */
619 if (write (inf_ttrace_pfd2[1], &c, sizeof c) != sizeof c)
e2e0b3e5 620 perror_with_name (("write"));
eee22bf8
MK
621
622 do_cleanups (old_chain);
623
28439f5e 624 push_target (ops);
eee22bf8
MK
625
626 /* On some targets, there must be some explicit synchronization
627 between the parent and child processes after the debugger forks,
628 and before the child execs the debuggee program. This call
629 basically gives permission for the child to exec. */
630
631 target_acknowledge_created_inferior (pid);
632
633 /* START_INFERIOR_TRAPS_EXPECTED is defined in inferior.h, and will
634 be 1 or 2 depending on whether we're starting without or with a
635 shell. */
636 startup_inferior (START_INFERIOR_TRAPS_EXPECTED);
637
638 /* On some targets, there must be some explicit actions taken after
639 the inferior has been started up. */
640 target_post_startup_inferior (pid_to_ptid (pid));
641}
642
643static void
136d6dae
VP
644inf_ttrace_create_inferior (struct target_ops *ops, char *exec_file,
645 char *allargs, char **env, int from_tty)
eee22bf8 646{
28439f5e
PA
647 int pid;
648
a7be7fa8
MK
649 gdb_assert (inf_ttrace_num_lwps == 0);
650 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
932936f0 651 gdb_assert (inf_ttrace_page_dict.count == 0);
932936f0 652 gdb_assert (inf_ttrace_reenable_page_protections == 0);
b2a4db28 653 gdb_assert (inf_ttrace_vfork_ppid == -1);
932936f0 654
28439f5e
PA
655 pid = fork_inferior (exec_file, allargs, env, inf_ttrace_me, NULL,
656 inf_ttrace_prepare, NULL);
657
658 inf_ttrace_him (ops, pid);
eee22bf8
MK
659}
660
eee22bf8 661static void
136d6dae 662inf_ttrace_mourn_inferior (struct target_ops *ops)
eee22bf8 663{
932936f0
MK
664 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
665 int bucket;
666
a7be7fa8
MK
667 inf_ttrace_num_lwps = 0;
668 inf_ttrace_num_lwps_in_syscall = 0;
932936f0
MK
669
670 for (bucket = 0; bucket < num_buckets; bucket++)
671 {
672 struct inf_ttrace_page *page;
673 struct inf_ttrace_page *next;
674
675 page = inf_ttrace_page_dict.buckets[bucket].next;
676 while (page)
677 {
678 next = page->next;
679 xfree (page);
680 page = next;
681 }
682 }
683 inf_ttrace_page_dict.count = 0;
684
28439f5e 685 unpush_target (ops);
eee22bf8
MK
686 generic_mourn_inferior ();
687}
688
689static void
136d6dae 690inf_ttrace_attach (struct target_ops *ops, char *args, int from_tty)
eee22bf8
MK
691{
692 char *exec_file;
693 pid_t pid;
694 char *dummy;
932936f0 695 ttevent_t tte;
181e7f93 696 struct inferior *inf;
eee22bf8
MK
697
698 if (!args)
a3f17187 699 error_no_arg (_("process-id to attach"));
eee22bf8
MK
700
701 dummy = args;
702 pid = strtol (args, &dummy, 0);
703 if (pid == 0 && args == dummy)
8a3fe4f8 704 error (_("Illegal process-id: %s."), args);
eee22bf8
MK
705
706 if (pid == getpid ()) /* Trying to masturbate? */
8a3fe4f8 707 error (_("I refuse to debug myself!"));
eee22bf8
MK
708
709 if (from_tty)
710 {
346e281c 711 exec_file = get_exec_file (0);
eee22bf8
MK
712
713 if (exec_file)
a3f17187 714 printf_unfiltered (_("Attaching to program: %s, %s\n"), exec_file,
eee22bf8
MK
715 target_pid_to_str (pid_to_ptid (pid)));
716 else
a3f17187 717 printf_unfiltered (_("Attaching to %s\n"),
eee22bf8
MK
718 target_pid_to_str (pid_to_ptid (pid)));
719
720 gdb_flush (gdb_stdout);
721 }
722
a7be7fa8
MK
723 gdb_assert (inf_ttrace_num_lwps == 0);
724 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
b2a4db28 725 gdb_assert (inf_ttrace_vfork_ppid == -1);
a7be7fa8 726
eee22bf8 727 if (ttrace (TT_PROC_ATTACH, pid, 0, TT_KILL_ON_EXIT, TT_VERSION, 0) == -1)
e2e0b3e5 728 perror_with_name (("ttrace"));
eee22bf8 729
6c95b8df
PA
730 inf = current_inferior ();
731 inferior_appeared (inf, pid);
181e7f93 732 inf->attach_flag = 1;
7f9f62ba 733
932936f0 734 /* Set the initial event mask. */
932936f0 735 memset (&tte, 0, sizeof (tte));
b2a4db28 736 tte.tte_events |= TTEVT_EXEC | TTEVT_EXIT | TTEVT_FORK | TTEVT_VFORK;
a7be7fa8 737 tte.tte_events |= TTEVT_LWP_CREATE | TTEVT_LWP_EXIT | TTEVT_LWP_TERMINATE;
7ba0e0c2
MK
738#ifdef TTEVT_BPT_SSTEP
739 tte.tte_events |= TTEVT_BPT_SSTEP;
740#endif
b2a4db28 741 tte.tte_opts |= TTEO_PROC_INHERIT;
932936f0
MK
742 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
743 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 744 perror_with_name (("ttrace"));
932936f0 745
28439f5e 746 push_target (ops);
2935f27f
PA
747
748 /* We'll bump inf_ttrace_num_lwps up and add the private data to the
749 thread as soon as we get to inf_ttrace_wait. At this point, we
750 don't have lwpid info yet. */
751 inferior_ptid = pid_to_ptid (pid);
752 add_thread_silent (inferior_ptid);
eee22bf8
MK
753}
754
755static void
136d6dae 756inf_ttrace_detach (struct target_ops *ops, char *args, int from_tty)
eee22bf8 757{
eee22bf8 758 pid_t pid = ptid_get_pid (inferior_ptid);
5d426ff1 759 int sig = 0;
eee22bf8
MK
760
761 if (from_tty)
762 {
763 char *exec_file = get_exec_file (0);
764 if (exec_file == 0)
765 exec_file = "";
a3f17187 766 printf_unfiltered (_("Detaching from program: %s, %s\n"), exec_file,
eee22bf8
MK
767 target_pid_to_str (pid_to_ptid (pid)));
768 gdb_flush (gdb_stdout);
769 }
770 if (args)
771 sig = atoi (args);
772
773 /* ??? The HP-UX 11.0 ttrace(2) manual page doesn't mention that we
774 can pass a signal number here. Does this really work? */
775 if (ttrace (TT_PROC_DETACH, pid, 0, 0, sig, 0) == -1)
e2e0b3e5 776 perror_with_name (("ttrace"));
eee22bf8 777
b2a4db28
MK
778 if (inf_ttrace_vfork_ppid != -1)
779 {
780 if (ttrace (TT_PROC_DETACH, inf_ttrace_vfork_ppid, 0, 0, 0, 0) == -1)
781 perror_with_name (("ttrace"));
782 inf_ttrace_vfork_ppid = -1;
783 }
784
a7be7fa8
MK
785 inf_ttrace_num_lwps = 0;
786 inf_ttrace_num_lwps_in_syscall = 0;
932936f0 787
932936f0 788 inferior_ptid = null_ptid;
7f9f62ba
PA
789 detach_inferior (pid);
790
28439f5e 791 unpush_target (ops);
eee22bf8
MK
792}
793
346e281c 794static void
7d85a9c0 795inf_ttrace_kill (struct target_ops *ops)
346e281c
MK
796{
797 pid_t pid = ptid_get_pid (inferior_ptid);
798
799 if (pid == 0)
800 return;
801
802 if (ttrace (TT_PROC_EXIT, pid, 0, 0, 0, 0) == -1)
803 perror_with_name (("ttrace"));
804 /* ??? Is it necessary to call ttrace_wait() here? */
805
806 if (inf_ttrace_vfork_ppid != -1)
807 {
808 if (ttrace (TT_PROC_DETACH, inf_ttrace_vfork_ppid, 0, 0, 0, 0) == -1)
809 perror_with_name (("ttrace"));
810 inf_ttrace_vfork_ppid = -1;
811 }
812
813 target_mourn_inferior ();
814}
815
438ac09b
PA
816/* Check is a dying thread is dead by now, and delete it from GDBs
817 thread list if so. */
7ba0e0c2 818static int
438ac09b 819inf_ttrace_delete_dead_threads_callback (struct thread_info *info, void *arg)
7ba0e0c2 820{
438ac09b
PA
821 lwpid_t lwpid;
822 struct inf_ttrace_private_thread_info *p;
7ba0e0c2 823
438ac09b
PA
824 if (is_exited (info->ptid))
825 return 0;
826
827 lwpid = ptid_get_lwp (info->ptid);
828 p = (struct inf_ttrace_private_thread_info *) info->private;
829
830 /* Check if an lwp that was dying is still there or not. */
831 if (p->dying && (kill (lwpid, 0) == -1))
832 /* It's gone now. */
833 delete_thread (info->ptid);
7ba0e0c2
MK
834
835 return 0;
836}
837
438ac09b
PA
838/* Resume the lwp pointed to by INFO, with REQUEST, and pass it signal
839 SIG. */
840
841static void
842inf_ttrace_resume_lwp (struct thread_info *info, ttreq_t request, int sig)
843{
844 pid_t pid = ptid_get_pid (info->ptid);
845 lwpid_t lwpid = ptid_get_lwp (info->ptid);
846
847 if (ttrace (request, pid, lwpid, TT_NOPC, sig, 0) == -1)
848 {
849 struct inf_ttrace_private_thread_info *p
850 = (struct inf_ttrace_private_thread_info *) info->private;
851 if (p->dying && errno == EPROTO)
852 /* This is expected, it means the dying lwp is really gone
853 by now. If ttrace had an event to inform the debugger
854 the lwp is really gone, this wouldn't be needed. */
855 delete_thread (info->ptid);
856 else
857 /* This was really unexpected. */
858 perror_with_name (("ttrace"));
859 }
860}
861
862/* Callback for iterate_over_threads. */
863
60e2c248 864static int
438ac09b 865inf_ttrace_resume_callback (struct thread_info *info, void *arg)
60e2c248 866{
438ac09b
PA
867 if (!ptid_equal (info->ptid, inferior_ptid) && !is_exited (info->ptid))
868 inf_ttrace_resume_lwp (info, TT_LWP_CONTINUE, 0);
869
60e2c248
JG
870 return 0;
871}
872
eee22bf8 873static void
28439f5e
PA
874inf_ttrace_resume (struct target_ops *ops,
875 ptid_t ptid, int step, enum target_signal signal)
eee22bf8 876{
438ac09b 877 int resume_all;
eee22bf8
MK
878 ttreq_t request = step ? TT_LWP_SINGLE : TT_LWP_CONTINUE;
879 int sig = target_signal_to_host (signal);
438ac09b 880 struct thread_info *info;
eee22bf8 881
438ac09b
PA
882 /* A specific PTID means `step only this process id'. */
883 resume_all = (ptid_equal (ptid, minus_one_ptid));
eee22bf8 884
438ac09b
PA
885 /* If resuming all threads, it's the current thread that should be
886 handled specially. */
887 if (resume_all)
888 ptid = inferior_ptid;
eee22bf8 889
e09875d4 890 info = find_thread_ptid (ptid);
438ac09b
PA
891 inf_ttrace_resume_lwp (info, request, sig);
892
893 if (resume_all)
894 /* Let all the other threads run too. */
895 iterate_over_threads (inf_ttrace_resume_callback, NULL);
eee22bf8
MK
896}
897
898static ptid_t
117de6a9 899inf_ttrace_wait (struct target_ops *ops,
47608cb1 900 ptid_t ptid, struct target_waitstatus *ourstatus, int options)
eee22bf8
MK
901{
902 pid_t pid = ptid_get_pid (ptid);
903 lwpid_t lwpid = ptid_get_lwp (ptid);
904 ttstate_t tts;
60e2c248 905 struct thread_info *ti;
3a3e9ee3 906 ptid_t related_ptid;
eee22bf8 907
932936f0 908 /* Until proven otherwise. */
a7be7fa8 909 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
eee22bf8
MK
910
911 if (pid == -1)
b2a4db28 912 pid = lwpid = 0;
eee22bf8 913
b2a4db28 914 gdb_assert (pid != 0 || lwpid == 0);
eee22bf8
MK
915
916 do
917 {
918 set_sigint_trap ();
eee22bf8
MK
919
920 if (ttrace_wait (pid, lwpid, TTRACE_WAITOK, &tts, sizeof tts) == -1)
a3f17187 921 perror_with_name (("ttrace_wait"));
eee22bf8 922
b2a4db28
MK
923 if (tts.tts_event == TTEVT_VFORK && tts.tts_u.tts_fork.tts_isparent)
924 {
925 if (inf_ttrace_vfork_ppid != -1)
926 {
927 gdb_assert (inf_ttrace_vfork_ppid == tts.tts_pid);
928
929 if (ttrace (TT_PROC_DETACH, tts.tts_pid, 0, 0, 0, 0) == -1)
930 perror_with_name (("ttrace"));
931 inf_ttrace_vfork_ppid = -1;
932 }
933
934 tts.tts_event = TTEVT_NONE;
935 }
936
eee22bf8
MK
937 clear_sigint_trap ();
938 }
939 while (tts.tts_event == TTEVT_NONE);
940
932936f0
MK
941 /* Now that we've waited, we can re-enable the page protections. */
942 if (inf_ttrace_reenable_page_protections)
943 {
a7be7fa8 944 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
932936f0
MK
945 inf_ttrace_enable_page_protections (tts.tts_pid);
946 inf_ttrace_reenable_page_protections = 0;
947 }
948
a7be7fa8
MK
949 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
950
2935f27f
PA
951 if (inf_ttrace_num_lwps == 0)
952 {
953 struct thread_info *ti;
954
955 inf_ttrace_num_lwps = 1;
956
957 /* This is the earliest we hear about the lwp member of
958 INFERIOR_PTID, after an attach or fork_inferior. */
959 gdb_assert (ptid_get_lwp (inferior_ptid) == 0);
960
961 /* We haven't set the private member on the main thread yet. Do
962 it now. */
e09875d4 963 ti = find_thread_ptid (inferior_ptid);
2935f27f
PA
964 gdb_assert (ti != NULL && ti->private == NULL);
965 ti->private =
966 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
967 memset (ti->private, 0,
968 sizeof (struct inf_ttrace_private_thread_info));
969
970 /* Notify the core that this ptid changed. This changes
971 inferior_ptid as well. */
972 thread_change_ptid (inferior_ptid, ptid);
973 }
974
eee22bf8
MK
975 switch (tts.tts_event)
976 {
7ba0e0c2
MK
977#ifdef TTEVT_BPT_SSTEP
978 case TTEVT_BPT_SSTEP:
979 /* Make it look like a breakpoint. */
980 ourstatus->kind = TARGET_WAITKIND_STOPPED;
981 ourstatus->value.sig = TARGET_SIGNAL_TRAP;
982 break;
983#endif
984
eee22bf8 985 case TTEVT_EXEC:
5d426ff1
MK
986 ourstatus->kind = TARGET_WAITKIND_EXECD;
987 ourstatus->value.execd_pathname =
988 xmalloc (tts.tts_u.tts_exec.tts_pathlen + 1);
989 if (ttrace (TT_PROC_GET_PATHNAME, tts.tts_pid, 0,
990 (uintptr_t)ourstatus->value.execd_pathname,
991 tts.tts_u.tts_exec.tts_pathlen, 0) == -1)
992 perror_with_name (("ttrace"));
993 ourstatus->value.execd_pathname[tts.tts_u.tts_exec.tts_pathlen] = 0;
25b22b0a
PA
994
995 /* At this point, all inserted breakpoints are gone. Doing this
996 as soon as we detect an exec prevents the badness of deleting
997 a breakpoint writing the current "shadow contents" to lift
998 the bp. That shadow is NOT valid after an exec. */
999 mark_breakpoints_out ();
eee22bf8 1000 break;
932936f0 1001
eee22bf8
MK
1002 case TTEVT_EXIT:
1003 store_waitstatus (ourstatus, tts.tts_u.tts_exit.tts_exitcode);
a7be7fa8
MK
1004 inf_ttrace_num_lwps = 0;
1005 break;
1006
b2a4db28 1007 case TTEVT_FORK:
3a3e9ee3
PA
1008 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
1009 tts.tts_u.tts_fork.tts_flwpid, 0);
1010
b2a4db28 1011 ourstatus->kind = TARGET_WAITKIND_FORKED;
3a3e9ee3 1012 ourstatus->value.related_pid = related_ptid;
b2a4db28
MK
1013
1014 /* Make sure the other end of the fork is stopped too. */
1015 if (ttrace_wait (tts.tts_u.tts_fork.tts_fpid,
1016 tts.tts_u.tts_fork.tts_flwpid,
1017 TTRACE_WAITOK, &tts, sizeof tts) == -1)
1018 perror_with_name (("ttrace_wait"));
1019
1020 gdb_assert (tts.tts_event == TTEVT_FORK);
1021 if (tts.tts_u.tts_fork.tts_isparent)
1022 {
3a3e9ee3
PA
1023 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
1024 tts.tts_u.tts_fork.tts_flwpid, 0);
b2a4db28 1025 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
3a3e9ee3 1026 ourstatus->value.related_pid = related_ptid;
b2a4db28
MK
1027 }
1028 break;
1029
1030 case TTEVT_VFORK:
1031 gdb_assert (!tts.tts_u.tts_fork.tts_isparent);
1032
3a3e9ee3
PA
1033 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
1034 tts.tts_u.tts_fork.tts_flwpid, 0);
1035
b2a4db28 1036 ourstatus->kind = TARGET_WAITKIND_VFORKED;
3a3e9ee3 1037 ourstatus->value.related_pid = related_ptid;
b2a4db28
MK
1038
1039 /* HACK: To avoid touching the parent during the vfork, switch
1040 away from it. */
1041 inferior_ptid = ptid;
1042 break;
1043
a7be7fa8
MK
1044 case TTEVT_LWP_CREATE:
1045 lwpid = tts.tts_u.tts_thread.tts_target_lwpid;
1046 ptid = ptid_build (tts.tts_pid, lwpid, 0);
60e2c248
JG
1047 ti = add_thread (ptid);
1048 ti->private =
1049 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
1050 memset (ti->private, 0,
1051 sizeof (struct inf_ttrace_private_thread_info));
a7be7fa8
MK
1052 inf_ttrace_num_lwps++;
1053 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
62a93fa9
PA
1054 /* Let the lwp_create-caller thread continue. */
1055 ttrace (TT_LWP_CONTINUE, ptid_get_pid (ptid),
1056 ptid_get_lwp (ptid), TT_NOPC, 0, 0);
1057 /* Return without stopping the whole process. */
1058 ourstatus->kind = TARGET_WAITKIND_IGNORE;
1059 return ptid;
a7be7fa8
MK
1060
1061 case TTEVT_LWP_EXIT:
17faa917
DJ
1062 if (print_thread_events)
1063 printf_unfiltered (_("[%s exited]\n"), target_pid_to_str (ptid));
e09875d4 1064 ti = find_thread_ptid (ptid);
60e2c248
JG
1065 gdb_assert (ti != NULL);
1066 ((struct inf_ttrace_private_thread_info *)ti->private)->dying = 1;
a7be7fa8 1067 inf_ttrace_num_lwps--;
62a93fa9 1068 /* Let the thread really exit. */
60e2c248
JG
1069 ttrace (TT_LWP_CONTINUE, ptid_get_pid (ptid),
1070 ptid_get_lwp (ptid), TT_NOPC, 0, 0);
62a93fa9
PA
1071 /* Return without stopping the whole process. */
1072 ourstatus->kind = TARGET_WAITKIND_IGNORE;
1073 return ptid;
a7be7fa8
MK
1074
1075 case TTEVT_LWP_TERMINATE:
1076 lwpid = tts.tts_u.tts_thread.tts_target_lwpid;
1077 ptid = ptid_build (tts.tts_pid, lwpid, 0);
62a93fa9 1078 if (print_thread_events)
b861ac81 1079 printf_unfiltered(_("[%s has been terminated]\n"),
62a93fa9 1080 target_pid_to_str (ptid));
e09875d4 1081 ti = find_thread_ptid (ptid);
60e2c248
JG
1082 gdb_assert (ti != NULL);
1083 ((struct inf_ttrace_private_thread_info *)ti->private)->dying = 1;
a7be7fa8 1084 inf_ttrace_num_lwps--;
62a93fa9
PA
1085
1086 /* Resume the lwp_terminate-caller thread. */
a7be7fa8 1087 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
62a93fa9
PA
1088 ttrace (TT_LWP_CONTINUE, ptid_get_pid (ptid),
1089 ptid_get_lwp (ptid), TT_NOPC, 0, 0);
1090 /* Return without stopping the whole process. */
1091 ourstatus->kind = TARGET_WAITKIND_IGNORE;
1092 return ptid;
932936f0 1093
eee22bf8
MK
1094 case TTEVT_SIGNAL:
1095 ourstatus->kind = TARGET_WAITKIND_STOPPED;
1096 ourstatus->value.sig =
1097 target_signal_from_host (tts.tts_u.tts_signal.tts_signo);
1098 break;
932936f0
MK
1099
1100 case TTEVT_SYSCALL_ENTRY:
1101 gdb_assert (inf_ttrace_reenable_page_protections == 0);
a7be7fa8
MK
1102 inf_ttrace_num_lwps_in_syscall++;
1103 if (inf_ttrace_num_lwps_in_syscall == 1)
932936f0
MK
1104 {
1105 /* A thread has just entered a system call. Disable any
1106 page protections as the kernel can't deal with them. */
1107 inf_ttrace_disable_page_protections (tts.tts_pid);
1108 }
1109 ourstatus->kind = TARGET_WAITKIND_SYSCALL_ENTRY;
01dedca2 1110 ourstatus->value.syscall_number = tts.tts_scno;
932936f0
MK
1111 break;
1112
1113 case TTEVT_SYSCALL_RETURN:
a7be7fa8 1114 if (inf_ttrace_num_lwps_in_syscall > 0)
932936f0
MK
1115 {
1116 /* If the last thread has just left the system call, this
1117 would be a logical place to re-enable the page
1118 protections, but that doesn't work. We can't re-enable
1119 them until we've done another wait. */
1120 inf_ttrace_reenable_page_protections =
a7be7fa8
MK
1121 (inf_ttrace_num_lwps_in_syscall == 1);
1122 inf_ttrace_num_lwps_in_syscall--;
932936f0
MK
1123 }
1124 ourstatus->kind = TARGET_WAITKIND_SYSCALL_RETURN;
01dedca2 1125 ourstatus->value.syscall_number = tts.tts_scno;
932936f0 1126 break;
a7be7fa8
MK
1127
1128 default:
1129 gdb_assert (!"Unexpected ttrace event");
1130 break;
eee22bf8
MK
1131 }
1132
1133 /* Make sure all threads within the process are stopped. */
1134 if (ttrace (TT_PROC_STOP, tts.tts_pid, 0, 0, 0, 0) == -1)
e2e0b3e5 1135 perror_with_name (("ttrace"));
eee22bf8 1136
438ac09b
PA
1137 /* Now that the whole process is stopped, check if any dying thread
1138 is really dead by now. If a dying thread is still alive, it will
1139 be stopped too, and will still show up in `info threads', tagged
1140 with "(Exiting)". We could make `info threads' prune dead
1141 threads instead via inf_ttrace_thread_alive, but doing this here
1142 has the advantage that a frontend is notificed sooner of thread
1143 exits. Note that a dying lwp is still alive, it still has to be
1144 resumed, like any other lwp. */
1145 iterate_over_threads (inf_ttrace_delete_dead_threads_callback, NULL);
1146
a7be7fa8 1147 return ptid;
eee22bf8
MK
1148}
1149
1150/* Transfer LEN bytes from ADDR in the inferior's memory into READBUF,
1151 and transfer LEN bytes from WRITEBUF into the inferior's memory at
1152 ADDR. Either READBUF or WRITEBUF may be null, in which case the
1153 corresponding transfer doesn't happen. Return the number of bytes
1154 actually transferred (which may be zero if an error occurs). */
1155
1156static LONGEST
1157inf_ttrace_xfer_memory (CORE_ADDR addr, ULONGEST len,
1158 void *readbuf, const void *writebuf)
1159{
1160 pid_t pid = ptid_get_pid (inferior_ptid);
1161
1162 /* HP-UX treats text space and data space differently. GDB however,
1163 doesn't really know the difference. Therefore we try both. Try
1164 text space before data space though because when we're writing
1165 into text space the instruction cache might need to be flushed. */
1166
1167 if (readbuf
1168 && ttrace (TT_PROC_RDTEXT, pid, 0, addr, len, (uintptr_t)readbuf) == -1
1169 && ttrace (TT_PROC_RDDATA, pid, 0, addr, len, (uintptr_t)readbuf) == -1)
1170 return 0;
1171
1172 if (writebuf
1173 && ttrace (TT_PROC_WRTEXT, pid, 0, addr, len, (uintptr_t)writebuf) == -1
1174 && ttrace (TT_PROC_WRDATA, pid, 0, addr, len, (uintptr_t)writebuf) == -1)
1175 return 0;
1176
1177 return len;
1178}
1179
1180static LONGEST
1181inf_ttrace_xfer_partial (struct target_ops *ops, enum target_object object,
7a4609f7
MK
1182 const char *annex, gdb_byte *readbuf,
1183 const gdb_byte *writebuf, ULONGEST offset, LONGEST len)
eee22bf8
MK
1184{
1185 switch (object)
1186 {
1187 case TARGET_OBJECT_MEMORY:
1188 return inf_ttrace_xfer_memory (offset, len, readbuf, writebuf);
1189
1190 case TARGET_OBJECT_UNWIND_TABLE:
1191 return -1;
1192
1193 case TARGET_OBJECT_AUXV:
1194 return -1;
1195
1196 case TARGET_OBJECT_WCOOKIE:
1197 return -1;
1198
1199 default:
1200 return -1;
1201 }
1202}
1203
1204/* Print status information about what we're accessing. */
1205
1206static void
1207inf_ttrace_files_info (struct target_ops *ignore)
1208{
181e7f93 1209 struct inferior *inf = current_inferior ();
346e281c 1210 printf_filtered (_("\tUsing the running image of %s %s.\n"),
181e7f93 1211 inf->attach_flag ? "attached" : "child",
346e281c 1212 target_pid_to_str (inferior_ptid));
eee22bf8 1213}
a7be7fa8
MK
1214
1215static int
28439f5e 1216inf_ttrace_thread_alive (struct target_ops *ops, ptid_t ptid)
a7be7fa8 1217{
438ac09b
PA
1218 return 1;
1219}
1220
1221/* Return a string describing the state of the thread specified by
1222 INFO. */
1223
1224static char *
1225inf_ttrace_extra_thread_info (struct thread_info *info)
1226{
1227 struct inf_ttrace_private_thread_info* private =
1228 (struct inf_ttrace_private_thread_info *) info->private;
1229
1230 if (private != NULL && private->dying)
1231 return "Exiting";
1232
1233 return NULL;
a7be7fa8
MK
1234}
1235
1236static char *
117de6a9 1237inf_ttrace_pid_to_str (struct target_ops *ops, ptid_t ptid)
a7be7fa8 1238{
2935f27f
PA
1239 pid_t pid = ptid_get_pid (ptid);
1240 lwpid_t lwpid = ptid_get_lwp (ptid);
1241 static char buf[128];
a7be7fa8 1242
2935f27f
PA
1243 if (lwpid == 0)
1244 xsnprintf (buf, sizeof buf, "process %ld",
1245 (long) pid);
1246 else
1247 xsnprintf (buf, sizeof buf, "process %ld, lwp %ld",
1248 (long) pid, (long) lwpid);
1249 return buf;
a7be7fa8 1250}
eee22bf8
MK
1251\f
1252
1253struct target_ops *
1254inf_ttrace_target (void)
1255{
1256 struct target_ops *t = inf_child_target ();
1257
eee22bf8
MK
1258 t->to_attach = inf_ttrace_attach;
1259 t->to_detach = inf_ttrace_detach;
1260 t->to_resume = inf_ttrace_resume;
1261 t->to_wait = inf_ttrace_wait;
eee22bf8 1262 t->to_files_info = inf_ttrace_files_info;
932936f0 1263 t->to_can_use_hw_breakpoint = inf_ttrace_can_use_hw_breakpoint;
932936f0
MK
1264 t->to_insert_watchpoint = inf_ttrace_insert_watchpoint;
1265 t->to_remove_watchpoint = inf_ttrace_remove_watchpoint;
1266 t->to_stopped_by_watchpoint = inf_ttrace_stopped_by_watchpoint;
2a3cdf79
WZ
1267 t->to_region_ok_for_hw_watchpoint =
1268 inf_ttrace_region_ok_for_hw_watchpoint;
346e281c
MK
1269 t->to_kill = inf_ttrace_kill;
1270 t->to_create_inferior = inf_ttrace_create_inferior;
1271 t->to_follow_fork = inf_ttrace_follow_fork;
1272 t->to_mourn_inferior = inf_ttrace_mourn_inferior;
1273 t->to_thread_alive = inf_ttrace_thread_alive;
438ac09b 1274 t->to_extra_thread_info = inf_ttrace_extra_thread_info;
346e281c
MK
1275 t->to_pid_to_str = inf_ttrace_pid_to_str;
1276 t->to_xfer_partial = inf_ttrace_xfer_partial;
eee22bf8 1277
eee22bf8
MK
1278 return t;
1279}
d3322e8a 1280#endif
932936f0
MK
1281\f
1282
1283/* Prevent warning from -Wmissing-prototypes. */
1284void _initialize_hppa_hpux_nat (void);
eee22bf8 1285
932936f0
MK
1286void
1287_initialize_inf_ttrace (void)
1288{
d3322e8a 1289#ifdef HAVE_TTRACE
932936f0 1290 inf_ttrace_page_dict.pagesize = getpagesize();
eee22bf8 1291#endif
d3322e8a 1292}
This page took 0.424681 seconds and 4 git commands to generate.