2005-02-11 Andrew Cagney <cagney@gnu.org>
[deliverable/binutils-gdb.git] / gdb / inf-ttrace.c
CommitLineData
eee22bf8
MK
1/* Low-level child interface to ttrace.
2
3 Copyright 2004 Free Software Foundation, Inc.
4
5 This file is part of GDB.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place - Suite 330,
20 Boston, MA 02111-1307, USA. */
21
22#include "defs.h"
23
24/* The ttrace(2) system call didn't exist before HP-UX 10.30. Don't
25 try to compile this code unless we have it. */
26#ifdef HAVE_TTRACE
27
28#include "command.h"
29#include "gdbcore.h"
a7be7fa8 30#include "gdbthread.h"
eee22bf8
MK
31#include "inferior.h"
32#include "observer.h"
33#include "target.h"
34
35#include "gdb_assert.h"
36#include "gdb_string.h"
932936f0 37#include <sys/mman.h>
eee22bf8
MK
38#include <sys/ttrace.h>
39
40#include "inf-child.h"
41#include "inf-ttrace.h"
42
43/* HACK: Save the ttrace ops returned by inf_ttrace_target. */
44static struct target_ops *ttrace_ops_hack;
932936f0
MK
45\f
46
a7be7fa8
MK
47/* HP-UX uses a threading model where each user-space thread
48 corresponds to a kernel thread. These kernel threads are called
49 lwps. The ttrace(2) interface gives us almost full control over
50 the threads, which makes it very easy to support them in GDB. We
51 identify the threads by process ID and lwp ID. The ttrace(2) also
52 provides us with a thread's user ID (in the `tts_user_tid' member
53 of `ttstate_t') but we don't use that (yet) as it isn't necessary
54 to uniquely label the thread. */
55
56/* Number of active lwps. */
57static int inf_ttrace_num_lwps;
58\f
59
932936f0
MK
60/* On HP-UX versions that have the ttrace(2) system call, we can
61 implement "hardware" watchpoints by fiddling with the protection of
62 pages in the address space that contain the variable being watched.
63 In order to implement this, we keep a dictionary of pages for which
64 we have changed the protection. */
65
66struct inf_ttrace_page
67{
68 CORE_ADDR addr; /* Page address. */
69 int prot; /* Protection. */
70 int refcount; /* Reference count. */
71 struct inf_ttrace_page *next;
72 struct inf_ttrace_page *prev;
73};
74
75struct inf_ttrace_page_dict
76{
77 struct inf_ttrace_page buckets[128];
78 int pagesize; /* Page size. */
79 int count; /* Number of pages in this dictionary. */
80} inf_ttrace_page_dict;
81
a7be7fa8
MK
82/* Number of lwps that are currently in a system call. */
83static int inf_ttrace_num_lwps_in_syscall;
932936f0
MK
84
85/* Flag to indicate whether we should re-enable page protections after
86 the next wait. */
87static int inf_ttrace_reenable_page_protections;
88
89/* Enable system call events for process PID. */
90
91static void
92inf_ttrace_enable_syscall_events (pid_t pid)
93{
94 ttevent_t tte;
95 ttstate_t tts;
96
a7be7fa8 97 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
932936f0
MK
98
99 if (ttrace (TT_PROC_GET_EVENT_MASK, pid, 0,
100 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 101 perror_with_name (("ttrace"));
932936f0
MK
102
103 tte.tte_events |= (TTEVT_SYSCALL_ENTRY | TTEVT_SYSCALL_RETURN);
104
105 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
106 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 107 perror_with_name (("ttrace"));
932936f0
MK
108
109 if (ttrace (TT_PROC_GET_FIRST_LWP_STATE, pid, 0,
110 (uintptr_t)&tts, sizeof tts, 0) == -1)
e2e0b3e5 111 perror_with_name (("ttrace"));
932936f0
MK
112
113 if (tts.tts_flags & TTS_INSYSCALL)
a7be7fa8 114 inf_ttrace_num_lwps_in_syscall++;
932936f0
MK
115
116 /* FIXME: Handle multiple threads. */
117}
118
119/* Disable system call events for process PID. */
120
121static void
122inf_ttrace_disable_syscall_events (pid_t pid)
123{
124 ttevent_t tte;
125
126 gdb_assert (inf_ttrace_page_dict.count == 0);
127
128 if (ttrace (TT_PROC_GET_EVENT_MASK, pid, 0,
129 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 130 perror_with_name (("ttrace"));
932936f0
MK
131
132 tte.tte_events &= ~(TTEVT_SYSCALL_ENTRY | TTEVT_SYSCALL_RETURN);
133
134 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
135 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 136 perror_with_name (("ttrace"));
932936f0 137
a7be7fa8 138 inf_ttrace_num_lwps_in_syscall = 0;
932936f0
MK
139}
140
141/* Get information about the page at address ADDR for process PID from
142 the dictionary. */
143
144static struct inf_ttrace_page *
145inf_ttrace_get_page (pid_t pid, CORE_ADDR addr)
146{
147 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
148 const int pagesize = inf_ttrace_page_dict.pagesize;
149 int bucket;
150 struct inf_ttrace_page *page;
151
152 bucket = (addr / pagesize) % num_buckets;
153 page = &inf_ttrace_page_dict.buckets[bucket];
154 while (page)
155 {
156 if (page->addr == addr)
157 break;
158
159 page = page->next;
160 }
161
162 return page;
163}
164
165/* Add the page at address ADDR for process PID to the dictionary. */
166
167static struct inf_ttrace_page *
168inf_ttrace_add_page (pid_t pid, CORE_ADDR addr)
169{
170 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
171 const int pagesize = inf_ttrace_page_dict.pagesize;
172 int bucket;
173 struct inf_ttrace_page *page;
174 struct inf_ttrace_page *prev = NULL;
175
176 bucket = (addr / pagesize) % num_buckets;
177 page = &inf_ttrace_page_dict.buckets[bucket];
178 while (page)
179 {
180 if (page->addr == addr)
181 break;
182
183 prev = page;
184 page = page->next;
185 }
186
187 if (!page)
188 {
189 int prot;
190
191 if (ttrace (TT_PROC_GET_MPROTECT, pid, 0,
192 addr, 0, (uintptr_t)&prot) == -1)
e2e0b3e5 193 perror_with_name (("ttrace"));
932936f0
MK
194
195 page = XMALLOC (struct inf_ttrace_page);
196 page->addr = addr;
197 page->prot = prot;
198 page->refcount = 0;
199 page->next = NULL;
200
201 page->prev = prev;
202 prev->next = page;
203
204 inf_ttrace_page_dict.count++;
205 if (inf_ttrace_page_dict.count == 1)
206 inf_ttrace_enable_syscall_events (pid);
207
a7be7fa8 208 if (inf_ttrace_num_lwps_in_syscall == 0)
932936f0
MK
209 {
210 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
211 addr, pagesize, prot & ~PROT_WRITE) == -1)
e2e0b3e5 212 perror_with_name (("ttrace"));
932936f0
MK
213 }
214 }
215
216 return page;
217}
218
219/* Insert the page at address ADDR of process PID to the dictionary. */
220
221static void
222inf_ttrace_insert_page (pid_t pid, CORE_ADDR addr)
223{
224 struct inf_ttrace_page *page;
225
226 page = inf_ttrace_get_page (pid, addr);
227 if (!page)
228 page = inf_ttrace_add_page (pid, addr);
229
230 page->refcount++;
231}
232
233/* Remove the page at address ADDR of process PID from the dictionary. */
234
235static void
236inf_ttrace_remove_page (pid_t pid, CORE_ADDR addr)
237{
238 const int pagesize = inf_ttrace_page_dict.pagesize;
239 struct inf_ttrace_page *page;
240
241 page = inf_ttrace_get_page (pid, addr);
242 page->refcount--;
243
244 gdb_assert (page->refcount >= 0);
245
246 if (page->refcount == 0)
247 {
a7be7fa8 248 if (inf_ttrace_num_lwps_in_syscall == 0)
932936f0
MK
249 {
250 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
251 addr, pagesize, page->prot) == -1)
e2e0b3e5 252 perror_with_name (("ttrace"));
932936f0
MK
253 }
254
255 inf_ttrace_page_dict.count--;
256 if (inf_ttrace_page_dict.count == 0)
257 inf_ttrace_disable_syscall_events (pid);
258
259 page->prev->next = page->next;
260 if (page->next)
261 page->next->prev = page->prev;
262
263 xfree (page);
264 }
265}
266
267/* Mask the bits in PROT from the page protections that are currently
268 in the dictionary for process PID. */
269
270static void
271inf_ttrace_mask_page_protections (pid_t pid, int prot)
272{
273 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
274 const int pagesize = inf_ttrace_page_dict.pagesize;
275 int bucket;
276
277 for (bucket = 0; bucket < num_buckets; bucket++)
278 {
279 struct inf_ttrace_page *page;
280
281 page = inf_ttrace_page_dict.buckets[bucket].next;
282 while (page)
283 {
284 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
285 page->addr, pagesize, page->prot & ~prot) == -1)
e2e0b3e5 286 perror_with_name (("ttrace"));
932936f0
MK
287
288 page = page->next;
289 }
290 }
291}
292
293/* Write-protect the pages in the dictionary for process PID. */
294
295static void
296inf_ttrace_enable_page_protections (pid_t pid)
297{
298 inf_ttrace_mask_page_protections (pid, PROT_WRITE);
299}
300
301/* Restore the protection of the pages in the dictionary for process
302 PID. */
303
304static void
305inf_ttrace_disable_page_protections (pid_t pid)
306{
307 inf_ttrace_mask_page_protections (pid, 0);
308}
309
310/* Insert a "hardware" watchpoint for LEN bytes at address ADDR of
311 type TYPE. */
312
313static int
314inf_ttrace_insert_watchpoint (CORE_ADDR addr, int len, int type)
315{
316 const int pagesize = inf_ttrace_page_dict.pagesize;
317 pid_t pid = ptid_get_pid (inferior_ptid);
318 CORE_ADDR page_addr;
319 int num_pages;
320 int page;
321
322 gdb_assert (type == hw_write);
323
324 page_addr = (addr / pagesize) * pagesize;
325 num_pages = (len + pagesize - 1) / pagesize;
326
327 for (page = 0; page < num_pages; page++, page_addr += pagesize)
328 inf_ttrace_insert_page (pid, page_addr);
329
330 return 1;
331}
332
333/* Remove a "hardware" watchpoint for LEN bytes at address ADDR of
334 type TYPE. */
335
336static int
337inf_ttrace_remove_watchpoint (CORE_ADDR addr, int len, int type)
338{
339 const int pagesize = inf_ttrace_page_dict.pagesize;
340 pid_t pid = ptid_get_pid (inferior_ptid);
341 CORE_ADDR page_addr;
342 int num_pages;
343 int page;
344
345 gdb_assert (type == hw_write);
346
347 page_addr = (addr / pagesize) * pagesize;
348 num_pages = (len + pagesize - 1) / pagesize;
349
350 for (page = 0; page < num_pages; page++, page_addr += pagesize)
351 inf_ttrace_remove_page (pid, page_addr);
352
353 return 1;
354}
355
356static int
357inf_ttrace_can_use_hw_breakpoint (int type, int len, int ot)
358{
359 return (type == bp_hardware_watchpoint);
360}
361
362static int
363inf_ttrace_region_size_ok_for_hw_watchpoint (int len)
364{
365 return 1;
366}
367
368/* Return non-zero if the current inferior was (potentially) stopped
369 by hitting a "hardware" watchpoint. */
370
371static int
372inf_ttrace_stopped_by_watchpoint (void)
373{
374 pid_t pid = ptid_get_pid (inferior_ptid);
375 lwpid_t lwpid = ptid_get_lwp (inferior_ptid);
376 ttstate_t tts;
377
378 if (inf_ttrace_page_dict.count > 0)
379 {
380 if (ttrace (TT_LWP_GET_STATE, pid, lwpid,
381 (uintptr_t)&tts, sizeof tts, 0) == -1)
e2e0b3e5 382 perror_with_name (("ttrace"));
932936f0
MK
383
384 if (tts.tts_event == TTEVT_SIGNAL
385 && tts.tts_u.tts_signal.tts_signo == SIGBUS)
386 {
387 const int pagesize = inf_ttrace_page_dict.pagesize;
388 void *addr = tts.tts_u.tts_signal.tts_siginfo.si_addr;
389 CORE_ADDR page_addr = ((uintptr_t)addr / pagesize) * pagesize;
390
391 if (inf_ttrace_get_page (pid, page_addr))
392 return 1;
393 }
394 }
395
396 return 0;
397}
398\f
eee22bf8
MK
399
400/* File descriptors for pipes used as semaphores during initial
401 startup of an inferior. */
402static int inf_ttrace_pfd1[2];
403static int inf_ttrace_pfd2[2];
404
405static void
406do_cleanup_pfds (void *dummy)
407{
408 close (inf_ttrace_pfd1[0]);
409 close (inf_ttrace_pfd1[1]);
410 close (inf_ttrace_pfd2[0]);
411 close (inf_ttrace_pfd2[1]);
412}
413
414static void
415inf_ttrace_prepare (void)
416{
417 if (pipe (inf_ttrace_pfd1) == -1)
418 perror_with_name ("pipe");
419
420 if (pipe (inf_ttrace_pfd2) == -1)
421 {
422 close (inf_ttrace_pfd1[0]);
423 close (inf_ttrace_pfd2[0]);
424 perror_with_name ("pipe");
425 }
426}
427
428/* Prepare to be traced. */
429
430static void
431inf_ttrace_me (void)
432{
433 struct cleanup *old_chain = make_cleanup (do_cleanup_pfds, 0);
434 char c;
435
436 /* "Trace me, Dr. Memory!" */
437 if (ttrace (TT_PROC_SETTRC, 0, 0, 0, TT_VERSION, 0) == -1)
e2e0b3e5 438 perror_with_name (("ttrace"));
eee22bf8
MK
439
440 /* Tell our parent that we are ready to be traced. */
441 if (write (inf_ttrace_pfd1[1], &c, sizeof c) != sizeof c)
e2e0b3e5 442 perror_with_name (("write"));
eee22bf8
MK
443
444 /* Wait until our parent has set the initial event mask. */
445 if (read (inf_ttrace_pfd2[0], &c, sizeof c) != sizeof c)
e2e0b3e5 446 perror_with_name (("read"));
eee22bf8
MK
447
448 do_cleanups (old_chain);
449}
450
451/* Start tracing PID. */
452
453static void
454inf_ttrace_him (int pid)
455{
456 struct cleanup *old_chain = make_cleanup (do_cleanup_pfds, 0);
457 ttevent_t tte;
eee22bf8
MK
458 char c;
459
460 /* Wait until our child is ready to be traced. */
461 if (read (inf_ttrace_pfd1[0], &c, sizeof c) != sizeof c)
e2e0b3e5 462 perror_with_name (("read"));
eee22bf8
MK
463
464 /* Set the initial event mask. */
465 memset (&tte, 0, sizeof (tte));
a7be7fa8
MK
466 tte.tte_events |= TTEVT_EXEC | TTEVT_EXIT;
467 tte.tte_events |= TTEVT_LWP_CREATE | TTEVT_LWP_EXIT | TTEVT_LWP_TERMINATE;
7ba0e0c2
MK
468#ifdef TTEVT_BPT_SSTEP
469 tte.tte_events |= TTEVT_BPT_SSTEP;
470#endif
eee22bf8
MK
471 tte.tte_opts = TTEO_NOSTRCCHLD;
472 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
473 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 474 perror_with_name (("ttrace"));
eee22bf8
MK
475
476 /* Tell our child that we have set the initial event mask. */
477 if (write (inf_ttrace_pfd2[1], &c, sizeof c) != sizeof c)
e2e0b3e5 478 perror_with_name (("write"));
eee22bf8
MK
479
480 do_cleanups (old_chain);
481
482 push_target (ttrace_ops_hack);
483
484 /* On some targets, there must be some explicit synchronization
485 between the parent and child processes after the debugger forks,
486 and before the child execs the debuggee program. This call
487 basically gives permission for the child to exec. */
488
489 target_acknowledge_created_inferior (pid);
490
491 /* START_INFERIOR_TRAPS_EXPECTED is defined in inferior.h, and will
492 be 1 or 2 depending on whether we're starting without or with a
493 shell. */
494 startup_inferior (START_INFERIOR_TRAPS_EXPECTED);
495
496 /* On some targets, there must be some explicit actions taken after
497 the inferior has been started up. */
498 target_post_startup_inferior (pid_to_ptid (pid));
499}
500
501static void
502inf_ttrace_create_inferior (char *exec_file, char *allargs, char **env,
503 int from_tty)
504{
a7be7fa8
MK
505 gdb_assert (inf_ttrace_num_lwps == 0);
506 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
932936f0 507 gdb_assert (inf_ttrace_page_dict.count == 0);
932936f0
MK
508 gdb_assert (inf_ttrace_reenable_page_protections == 0);
509
eee22bf8
MK
510 fork_inferior (exec_file, allargs, env, inf_ttrace_me, inf_ttrace_him,
511 inf_ttrace_prepare, NULL);
512
513 /* We are at the first instruction we care about. */
514 observer_notify_inferior_created (&current_target, from_tty);
515
516 /* Pedal to the metal... */
517 proceed ((CORE_ADDR) -1, TARGET_SIGNAL_0, 0);
518}
519
520static void
521inf_ttrace_kill_inferior (void)
522{
523 pid_t pid = ptid_get_pid (inferior_ptid);
524
525 if (pid == 0)
526 return;
527
528 if (ttrace (TT_PROC_EXIT, pid, 0, 0, 0, 0) == -1)
e2e0b3e5 529 perror_with_name (("ttrace"));
eee22bf8
MK
530 /* ??? Is it necessary to call ttrace_wait() here? */
531 target_mourn_inferior ();
532}
533
534static void
535inf_ttrace_mourn_inferior (void)
536{
932936f0
MK
537 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
538 int bucket;
539
a7be7fa8
MK
540 inf_ttrace_num_lwps = 0;
541 inf_ttrace_num_lwps_in_syscall = 0;
932936f0
MK
542
543 for (bucket = 0; bucket < num_buckets; bucket++)
544 {
545 struct inf_ttrace_page *page;
546 struct inf_ttrace_page *next;
547
548 page = inf_ttrace_page_dict.buckets[bucket].next;
549 while (page)
550 {
551 next = page->next;
552 xfree (page);
553 page = next;
554 }
555 }
556 inf_ttrace_page_dict.count = 0;
557
eee22bf8
MK
558 unpush_target (ttrace_ops_hack);
559 generic_mourn_inferior ();
560}
561
562static void
563inf_ttrace_attach (char *args, int from_tty)
564{
565 char *exec_file;
566 pid_t pid;
567 char *dummy;
932936f0 568 ttevent_t tte;
eee22bf8
MK
569
570 if (!args)
571 error_no_arg ("process-id to attach");
572
573 dummy = args;
574 pid = strtol (args, &dummy, 0);
575 if (pid == 0 && args == dummy)
8a3fe4f8 576 error (_("Illegal process-id: %s."), args);
eee22bf8
MK
577
578 if (pid == getpid ()) /* Trying to masturbate? */
8a3fe4f8 579 error (_("I refuse to debug myself!"));
eee22bf8
MK
580
581 if (from_tty)
582 {
583 exec_file = (char *) get_exec_file (0);
584
585 if (exec_file)
586 printf_unfiltered ("Attaching to program: %s, %s\n", exec_file,
587 target_pid_to_str (pid_to_ptid (pid)));
588 else
589 printf_unfiltered ("Attaching to %s\n",
590 target_pid_to_str (pid_to_ptid (pid)));
591
592 gdb_flush (gdb_stdout);
593 }
594
a7be7fa8
MK
595 gdb_assert (inf_ttrace_num_lwps == 0);
596 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
597
eee22bf8 598 if (ttrace (TT_PROC_ATTACH, pid, 0, TT_KILL_ON_EXIT, TT_VERSION, 0) == -1)
e2e0b3e5 599 perror_with_name (("ttrace"));
eee22bf8
MK
600 attach_flag = 1;
601
932936f0 602 /* Set the initial event mask. */
932936f0 603 memset (&tte, 0, sizeof (tte));
a7be7fa8
MK
604 tte.tte_events |= TTEVT_EXEC | TTEVT_EXIT;
605 tte.tte_events |= TTEVT_LWP_CREATE | TTEVT_LWP_EXIT | TTEVT_LWP_TERMINATE;
7ba0e0c2
MK
606#ifdef TTEVT_BPT_SSTEP
607 tte.tte_events |= TTEVT_BPT_SSTEP;
608#endif
932936f0
MK
609 tte.tte_opts = TTEO_NOSTRCCHLD;
610 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
611 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 612 perror_with_name (("ttrace"));
932936f0 613
eee22bf8
MK
614 inferior_ptid = pid_to_ptid (pid);
615 push_target (ttrace_ops_hack);
616
617 /* Do this first, before anything has had a chance to query the
618 inferior's symbol table or similar. */
619 observer_notify_inferior_created (&current_target, from_tty);
620}
621
622static void
623inf_ttrace_detach (char *args, int from_tty)
624{
625 int sig = 0;
626 pid_t pid = ptid_get_pid (inferior_ptid);
627
628 if (from_tty)
629 {
630 char *exec_file = get_exec_file (0);
631 if (exec_file == 0)
632 exec_file = "";
633 printf_unfiltered ("Detaching from program: %s, %s\n", exec_file,
634 target_pid_to_str (pid_to_ptid (pid)));
635 gdb_flush (gdb_stdout);
636 }
637 if (args)
638 sig = atoi (args);
639
640 /* ??? The HP-UX 11.0 ttrace(2) manual page doesn't mention that we
641 can pass a signal number here. Does this really work? */
642 if (ttrace (TT_PROC_DETACH, pid, 0, 0, sig, 0) == -1)
e2e0b3e5 643 perror_with_name (("ttrace"));
eee22bf8 644
a7be7fa8
MK
645 inf_ttrace_num_lwps = 0;
646 inf_ttrace_num_lwps_in_syscall = 0;
932936f0 647
eee22bf8 648 unpush_target (ttrace_ops_hack);
932936f0 649 inferior_ptid = null_ptid;
eee22bf8
MK
650}
651
7ba0e0c2
MK
652static int
653inf_ttrace_resume_callback (struct thread_info *info, void *arg)
654{
655 if (!ptid_equal (info->ptid, inferior_ptid))
656 {
657 pid_t pid = ptid_get_pid (info->ptid);
658 lwpid_t lwpid = ptid_get_lwp (info->ptid);
659
660 if (ttrace (TT_LWP_CONTINUE, pid, lwpid, TT_NOPC, 0, 0) == -1)
e2e0b3e5 661 perror_with_name (("ttrace"));
7ba0e0c2
MK
662 }
663
664 return 0;
665}
666
eee22bf8
MK
667static void
668inf_ttrace_resume (ptid_t ptid, int step, enum target_signal signal)
669{
670 pid_t pid = ptid_get_pid (ptid);
671 lwpid_t lwpid = ptid_get_lwp (ptid);
672 ttreq_t request = step ? TT_LWP_SINGLE : TT_LWP_CONTINUE;
673 int sig = target_signal_to_host (signal);
674
675 if (pid == -1)
676 {
677 pid = ptid_get_pid (inferior_ptid);
678 lwpid = ptid_get_lwp (inferior_ptid);
679 }
680
681 if (ttrace (request, pid, lwpid, TT_NOPC, sig, 0) == -1)
e2e0b3e5 682 perror_with_name (("ttrace"));
eee22bf8 683
7ba0e0c2 684 if (ptid_equal (ptid, minus_one_ptid) && inf_ttrace_num_lwps > 0)
eee22bf8
MK
685 {
686 /* Let all the other threads run too. */
7ba0e0c2 687 iterate_over_threads (inf_ttrace_resume_callback, NULL);
eee22bf8
MK
688 }
689}
690
691static ptid_t
692inf_ttrace_wait (ptid_t ptid, struct target_waitstatus *ourstatus)
693{
694 pid_t pid = ptid_get_pid (ptid);
695 lwpid_t lwpid = ptid_get_lwp (ptid);
696 ttstate_t tts;
697
932936f0 698 /* Until proven otherwise. */
a7be7fa8 699 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
eee22bf8
MK
700
701 if (pid == -1)
702 pid = 0;
703
704 gdb_assert (lwpid == 0 || pid != 0);
705
706 do
707 {
708 set_sigint_trap ();
709 set_sigio_trap ();
710
711 if (ttrace_wait (pid, lwpid, TTRACE_WAITOK, &tts, sizeof tts) == -1)
712 perror_with_name ("ttrace_wait");
713
714 clear_sigio_trap ();
715 clear_sigint_trap ();
716 }
717 while (tts.tts_event == TTEVT_NONE);
718
932936f0
MK
719 /* Now that we've waited, we can re-enable the page protections. */
720 if (inf_ttrace_reenable_page_protections)
721 {
a7be7fa8 722 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
932936f0
MK
723 inf_ttrace_enable_page_protections (tts.tts_pid);
724 inf_ttrace_reenable_page_protections = 0;
725 }
726
a7be7fa8
MK
727 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
728
eee22bf8
MK
729 switch (tts.tts_event)
730 {
7ba0e0c2
MK
731#ifdef TTEVT_BPT_SSTEP
732 case TTEVT_BPT_SSTEP:
733 /* Make it look like a breakpoint. */
734 ourstatus->kind = TARGET_WAITKIND_STOPPED;
735 ourstatus->value.sig = TARGET_SIGNAL_TRAP;
736 break;
737#endif
738
eee22bf8
MK
739 case TTEVT_EXEC:
740 /* Make it look like a breakpoint. */
741 ourstatus->kind = TARGET_WAITKIND_STOPPED;
742 ourstatus->value.sig = TARGET_SIGNAL_TRAP;
743 break;
932936f0 744
eee22bf8
MK
745 case TTEVT_EXIT:
746 store_waitstatus (ourstatus, tts.tts_u.tts_exit.tts_exitcode);
a7be7fa8
MK
747 inf_ttrace_num_lwps = 0;
748 break;
749
750 case TTEVT_LWP_CREATE:
751 lwpid = tts.tts_u.tts_thread.tts_target_lwpid;
752 ptid = ptid_build (tts.tts_pid, lwpid, 0);
753 if (inf_ttrace_num_lwps == 0)
754 {
755 /* Now that we're going to be multi-threaded, add the
756 origional thread to the list first. */
757 add_thread (ptid_build (tts.tts_pid, tts.tts_lwpid, 0));
758 inf_ttrace_num_lwps++;
759 }
760 printf_filtered ("[New %s]\n", target_pid_to_str (ptid));
761 add_thread (ptid);
762 inf_ttrace_num_lwps++;
763 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
764 break;
765
766 case TTEVT_LWP_EXIT:
767 printf_filtered("[%s exited]\n", target_pid_to_str (ptid));
768 delete_thread (ptid);
769 inf_ttrace_num_lwps--;
770 /* If we don't return -1 here, core GDB will re-add the thread. */
771 ptid = minus_one_ptid;
772 break;
773
774 case TTEVT_LWP_TERMINATE:
775 lwpid = tts.tts_u.tts_thread.tts_target_lwpid;
776 ptid = ptid_build (tts.tts_pid, lwpid, 0);
777 printf_filtered("[%s has been terminated]\n", target_pid_to_str (ptid));
778 delete_thread (ptid);
779 inf_ttrace_num_lwps--;
780 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
eee22bf8 781 break;
932936f0 782
eee22bf8
MK
783 case TTEVT_SIGNAL:
784 ourstatus->kind = TARGET_WAITKIND_STOPPED;
785 ourstatus->value.sig =
786 target_signal_from_host (tts.tts_u.tts_signal.tts_signo);
787 break;
932936f0
MK
788
789 case TTEVT_SYSCALL_ENTRY:
790 gdb_assert (inf_ttrace_reenable_page_protections == 0);
a7be7fa8
MK
791 inf_ttrace_num_lwps_in_syscall++;
792 if (inf_ttrace_num_lwps_in_syscall == 1)
932936f0
MK
793 {
794 /* A thread has just entered a system call. Disable any
795 page protections as the kernel can't deal with them. */
796 inf_ttrace_disable_page_protections (tts.tts_pid);
797 }
798 ourstatus->kind = TARGET_WAITKIND_SYSCALL_ENTRY;
799 ourstatus->value.syscall_id = tts.tts_scno;
800 break;
801
802 case TTEVT_SYSCALL_RETURN:
a7be7fa8 803 if (inf_ttrace_num_lwps_in_syscall > 0)
932936f0
MK
804 {
805 /* If the last thread has just left the system call, this
806 would be a logical place to re-enable the page
807 protections, but that doesn't work. We can't re-enable
808 them until we've done another wait. */
809 inf_ttrace_reenable_page_protections =
a7be7fa8
MK
810 (inf_ttrace_num_lwps_in_syscall == 1);
811 inf_ttrace_num_lwps_in_syscall--;
932936f0
MK
812 }
813 ourstatus->kind = TARGET_WAITKIND_SYSCALL_RETURN;
814 ourstatus->value.syscall_id = tts.tts_scno;
815 break;
a7be7fa8
MK
816
817 default:
818 gdb_assert (!"Unexpected ttrace event");
819 break;
eee22bf8
MK
820 }
821
822 /* Make sure all threads within the process are stopped. */
823 if (ttrace (TT_PROC_STOP, tts.tts_pid, 0, 0, 0, 0) == -1)
e2e0b3e5 824 perror_with_name (("ttrace"));
eee22bf8
MK
825
826 /* HACK: Twiddle INFERIOR_PTID such that the initial thread of a
827 process isn't recognized as a new thread. */
828 if (ptid_get_lwp (inferior_ptid) == 0)
a7be7fa8 829 inferior_ptid = ptid;
eee22bf8 830
a7be7fa8 831 return ptid;
eee22bf8
MK
832}
833
834/* Transfer LEN bytes from ADDR in the inferior's memory into READBUF,
835 and transfer LEN bytes from WRITEBUF into the inferior's memory at
836 ADDR. Either READBUF or WRITEBUF may be null, in which case the
837 corresponding transfer doesn't happen. Return the number of bytes
838 actually transferred (which may be zero if an error occurs). */
839
840static LONGEST
841inf_ttrace_xfer_memory (CORE_ADDR addr, ULONGEST len,
842 void *readbuf, const void *writebuf)
843{
844 pid_t pid = ptid_get_pid (inferior_ptid);
845
846 /* HP-UX treats text space and data space differently. GDB however,
847 doesn't really know the difference. Therefore we try both. Try
848 text space before data space though because when we're writing
849 into text space the instruction cache might need to be flushed. */
850
851 if (readbuf
852 && ttrace (TT_PROC_RDTEXT, pid, 0, addr, len, (uintptr_t)readbuf) == -1
853 && ttrace (TT_PROC_RDDATA, pid, 0, addr, len, (uintptr_t)readbuf) == -1)
854 return 0;
855
856 if (writebuf
857 && ttrace (TT_PROC_WRTEXT, pid, 0, addr, len, (uintptr_t)writebuf) == -1
858 && ttrace (TT_PROC_WRDATA, pid, 0, addr, len, (uintptr_t)writebuf) == -1)
859 return 0;
860
861 return len;
862}
863
864static LONGEST
865inf_ttrace_xfer_partial (struct target_ops *ops, enum target_object object,
866 const char *annex, void *readbuf,
867 const void *writebuf, ULONGEST offset, LONGEST len)
868{
869 switch (object)
870 {
871 case TARGET_OBJECT_MEMORY:
872 return inf_ttrace_xfer_memory (offset, len, readbuf, writebuf);
873
874 case TARGET_OBJECT_UNWIND_TABLE:
875 return -1;
876
877 case TARGET_OBJECT_AUXV:
878 return -1;
879
880 case TARGET_OBJECT_WCOOKIE:
881 return -1;
882
883 default:
884 return -1;
885 }
886}
887
888/* Print status information about what we're accessing. */
889
890static void
891inf_ttrace_files_info (struct target_ops *ignore)
892{
893 printf_unfiltered ("\tUsing the running image of %s %s.\n",
894 attach_flag ? "attached" : "child",
895 target_pid_to_str (inferior_ptid));
896}
a7be7fa8
MK
897
898static int
899inf_ttrace_thread_alive (ptid_t ptid)
900{
901 return 1;
902}
903
904static char *
905inf_ttrace_pid_to_str (ptid_t ptid)
906{
907 if (inf_ttrace_num_lwps > 0)
908 {
909 pid_t pid = ptid_get_pid (ptid);
910 lwpid_t lwpid = ptid_get_lwp (ptid);
911 static char buf[80];
912
913 sprintf (buf, "process %ld, lwp %ld", (long)pid, (long)lwpid);
914 return buf;
915 }
916
917 return normal_pid_to_str (ptid);
918}
eee22bf8
MK
919\f
920
921struct target_ops *
922inf_ttrace_target (void)
923{
924 struct target_ops *t = inf_child_target ();
925
926 t->to_create_inferior = inf_ttrace_create_inferior;
927 t->to_kill = inf_ttrace_kill_inferior;
928 t->to_mourn_inferior = inf_ttrace_mourn_inferior;
929 t->to_attach = inf_ttrace_attach;
930 t->to_detach = inf_ttrace_detach;
931 t->to_resume = inf_ttrace_resume;
932 t->to_wait = inf_ttrace_wait;
933 t->to_xfer_partial = inf_ttrace_xfer_partial;
934 t->to_files_info = inf_ttrace_files_info;
a7be7fa8
MK
935 t->to_thread_alive = inf_ttrace_thread_alive;
936 t->to_pid_to_str = inf_ttrace_pid_to_str;
932936f0
MK
937 t->to_can_use_hw_breakpoint = inf_ttrace_can_use_hw_breakpoint;
938 t->to_region_size_ok_for_hw_watchpoint =
939 inf_ttrace_region_size_ok_for_hw_watchpoint;
940 t->to_insert_watchpoint = inf_ttrace_insert_watchpoint;
941 t->to_remove_watchpoint = inf_ttrace_remove_watchpoint;
942 t->to_stopped_by_watchpoint = inf_ttrace_stopped_by_watchpoint;
eee22bf8
MK
943
944 ttrace_ops_hack = t;
945 return t;
946}
d3322e8a 947#endif
932936f0
MK
948\f
949
950/* Prevent warning from -Wmissing-prototypes. */
951void _initialize_hppa_hpux_nat (void);
eee22bf8 952
932936f0
MK
953void
954_initialize_inf_ttrace (void)
955{
d3322e8a 956#ifdef HAVE_TTRACE
932936f0 957 inf_ttrace_page_dict.pagesize = getpagesize();
eee22bf8 958#endif
d3322e8a 959}
This page took 0.087249 seconds and 4 git commands to generate.