gdb: add target_ops::supports_displaced_step
[deliverable/binutils-gdb.git] / gdb / mem-break.c
CommitLineData
c906108c 1/* Simulate breakpoints by patching locations in the target system, for GDB.
f4f9705a 2
b811d2c2 3 Copyright (C) 1990-2020 Free Software Foundation, Inc.
f4f9705a 4
c906108c
SS
5 Contributed by Cygnus Support. Written by John Gilmore.
6
c5aa993b 7 This file is part of GDB.
c906108c 8
c5aa993b
JM
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
a9762ec7 11 the Free Software Foundation; either version 3 of the License, or
c5aa993b 12 (at your option) any later version.
c906108c 13
c5aa993b
JM
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
c906108c 18
c5aa993b 19 You should have received a copy of the GNU General Public License
a9762ec7 20 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
21
22#include "defs.h"
c906108c
SS
23#include "symtab.h"
24#include "breakpoint.h"
25#include "inferior.h"
26#include "target.h"
0d12e84c
TT
27#include "gdbarch.h"
28
8181d85f
DJ
29/* Insert a breakpoint on targets that don't have any better
30 breakpoint support. We read the contents of the target location
31 and stash it, then overwrite it with a breakpoint instruction.
32 BP_TGT->placed_address is the target location in the target
33 machine. BP_TGT->shadow_contents is some memory allocated for
34 saving the target contents. It is guaranteed by the caller to be
35 long enough to save BREAKPOINT_LEN bytes (this is accomplished via
36 BREAKPOINT_MAX). */
c906108c
SS
37
38int
ae4b2284
MD
39default_memory_insert_breakpoint (struct gdbarch *gdbarch,
40 struct bp_target_info *bp_tgt)
c906108c 41{
ba7b109b 42 CORE_ADDR addr = bp_tgt->placed_address;
f4f9705a 43 const unsigned char *bp;
35c63cd8 44 gdb_byte *readbuf;
0d5ed153
MR
45 int bplen;
46 int val;
c906108c
SS
47
48 /* Determine appropriate breakpoint contents and size for this address. */
579c6ad9 49 bp = gdbarch_sw_breakpoint_from_kind (gdbarch, bp_tgt->kind, &bplen);
0d5ed153 50
35c63cd8
JB
51 /* Save the memory contents in the shadow_contents buffer and then
52 write the breakpoint instruction. */
224c3ddb 53 readbuf = (gdb_byte *) alloca (bplen);
0d5ed153 54 val = target_read_memory (addr, readbuf, bplen);
c906108c 55 if (val == 0)
35c63cd8 56 {
68901c4d
PA
57 /* These must be set together, either before or after the shadow
58 read, so that if we're "reinserting" a breakpoint that
59 doesn't have a shadow yet, the breakpoint masking code inside
60 target_read_memory doesn't mask out this breakpoint using an
61 unfilled shadow buffer. The core may be trying to reinsert a
62 permanent breakpoint, for targets that support breakpoint
63 conditions/commands on the target side for some types of
64 breakpoints, such as target remote. */
65 bp_tgt->shadow_len = bplen;
0d5ed153 66 memcpy (bp_tgt->shadow_contents, readbuf, bplen);
68901c4d 67
0d5ed153 68 val = target_write_raw_memory (addr, bp, bplen);
35c63cd8 69 }
c906108c
SS
70
71 return val;
72}
73
74
75int
ae4b2284
MD
76default_memory_remove_breakpoint (struct gdbarch *gdbarch,
77 struct bp_target_info *bp_tgt)
c906108c 78{
cd6c3b4f
YQ
79 int bplen;
80
579c6ad9 81 gdbarch_sw_breakpoint_from_kind (gdbarch, bp_tgt->kind, &bplen);
cd6c3b4f 82
f0ba3972 83 return target_write_raw_memory (bp_tgt->placed_address, bp_tgt->shadow_contents,
cd6c3b4f 84 bplen);
c906108c 85}
917317f4
JM
86
87
917317f4 88int
3db08215 89memory_insert_breakpoint (struct target_ops *ops, struct gdbarch *gdbarch,
a6d9a66e 90 struct bp_target_info *bp_tgt)
917317f4 91{
a6d9a66e 92 return gdbarch_memory_insert_breakpoint (gdbarch, bp_tgt);
917317f4
JM
93}
94
917317f4 95int
3db08215 96memory_remove_breakpoint (struct target_ops *ops, struct gdbarch *gdbarch,
73971819
PA
97 struct bp_target_info *bp_tgt,
98 enum remove_bp_reason reason)
917317f4 99{
a6d9a66e 100 return gdbarch_memory_remove_breakpoint (gdbarch, bp_tgt);
917317f4 101}
08351840
PA
102
103int
104memory_validate_breakpoint (struct gdbarch *gdbarch,
105 struct bp_target_info *bp_tgt)
106{
107 CORE_ADDR addr = bp_tgt->placed_address;
108 const gdb_byte *bp;
109 int val;
110 int bplen;
111 gdb_byte cur_contents[BREAKPOINT_MAX];
08351840
PA
112
113 /* Determine appropriate breakpoint contents and size for this
114 address. */
115 bp = gdbarch_breakpoint_from_pc (gdbarch, &addr, &bplen);
116
cd6c3b4f 117 if (bp == NULL)
08351840
PA
118 return 0;
119
120 /* Make sure we see the memory breakpoints. */
cb85b21b
TT
121 scoped_restore restore_memory
122 = make_scoped_restore_show_memory_breakpoints (1);
08351840
PA
123 val = target_read_memory (addr, cur_contents, bplen);
124
125 /* If our breakpoint is no longer at the address, this means that
126 the program modified the code on us, so it is wrong to put back
127 the old value. */
cb85b21b 128 return (val == 0 && memcmp (bp, cur_contents, bplen) == 0);
08351840 129}
This page took 1.779559 seconds and 4 git commands to generate.