handle VLA in a struct or union
[deliverable/binutils-gdb.git] / gdb / gdbserver / mem-break.c
CommitLineData
611cb4a5 1/* Memory breakpoint operations for the remote server for GDB.
ecd75fc8 2 Copyright (C) 2002-2014 Free Software Foundation, Inc.
611cb4a5
DJ
3
4 Contributed by MontaVista Software.
5
6 This file is part of GDB.
7
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
a9762ec7 10 the Free Software Foundation; either version 3 of the License, or
611cb4a5
DJ
11 (at your option) any later version.
12
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
a9762ec7 19 along with this program. If not, see <http://www.gnu.org/licenses/>. */
611cb4a5
DJ
20
21#include "server.h"
9f3a5c85
LM
22#include "regcache.h"
23#include "ax.h"
7f216e7c 24#include <stdint.h>
611cb4a5 25
f450004a 26const unsigned char *breakpoint_data;
611cb4a5
DJ
27int breakpoint_len;
28
29#define MAX_BREAKPOINT_LEN 8
30
8b07ae33 31/* GDB will never try to install multiple breakpoints at the same
802e8e6d
PA
32 address. However, we can see GDB requesting to insert a breakpoint
33 at an address is had already inserted one previously in a few
34 situations.
35
36 - The RSP documentation on Z packets says that to avoid potential
37 problems with duplicate packets, the operations should be
38 implemented in an idempotent way.
39
40 - A breakpoint is set at ADDR, an address in a shared library.
41 Then the shared library is unloaded. And then another, unrelated,
42 breakpoint at ADDR is set. There is not breakpoint removal request
43 between the first and the second breakpoint.
44
45 - When GDB wants to update the target-side breakpoint conditions or
46 commands, it re-inserts the breakpoint, with updated
47 conditions/commands associated.
48
49 Also, we need to keep track of internal breakpoints too, so we do
50 need to be able to install multiple breakpoints at the same address
51 transparently.
52
53 We keep track of two different, and closely related structures. A
54 raw breakpoint, which manages the low level, close to the metal
55 aspect of a breakpoint. It holds the breakpoint address, and for
56 software breakpoints, a buffer holding a copy of the instructions
8b07ae33
PA
57 that would be in memory had not been a breakpoint there (we call
58 that the shadow memory of the breakpoint). We occasionally need to
59 temporarilly uninsert a breakpoint without the client knowing about
60 it (e.g., to step over an internal breakpoint), so we keep an
61 `inserted' state associated with this low level breakpoint
62 structure. There can only be one such object for a given address.
63 Then, we have (a bit higher level) breakpoints. This structure
64 holds a callback to be called whenever a breakpoint is hit, a
65 high-level type, and a link to a low level raw breakpoint. There
66 can be many high-level breakpoints at the same address, and all of
67 them will point to the same raw breakpoint, which is reference
68 counted. */
69
70/* The low level, physical, raw breakpoint. */
71struct raw_breakpoint
72{
73 struct raw_breakpoint *next;
74
802e8e6d
PA
75 /* The low level type of the breakpoint (software breakpoint,
76 watchpoint, etc.) */
77 enum raw_bkpt_type raw_type;
78
8b07ae33
PA
79 /* A reference count. Each high level breakpoint referencing this
80 raw breakpoint accounts for one reference. */
81 int refcount;
82
83 /* The breakpoint's insertion address. There can only be one raw
84 breakpoint for a given PC. */
85 CORE_ADDR pc;
86
802e8e6d
PA
87 /* The breakpoint's size. */
88 int size;
89
8b07ae33
PA
90 /* The breakpoint's shadow memory. */
91 unsigned char old_data[MAX_BREAKPOINT_LEN];
92
802e8e6d
PA
93 /* Positive if this breakpoint is currently inserted in the
94 inferior. Negative if it was, but we've detected that it's now
95 gone. Zero if not inserted. */
8b07ae33
PA
96 int inserted;
97};
98
414a389f
PA
99/* The type of a breakpoint. */
100enum bkpt_type
101 {
8b07ae33 102 /* A GDB breakpoint, requested with a Z0 packet. */
802e8e6d
PA
103 gdb_breakpoint_Z0,
104
105 /* A GDB hardware breakpoint, requested with a Z1 packet. */
106 gdb_breakpoint_Z1,
107
108 /* A GDB write watchpoint, requested with a Z2 packet. */
109 gdb_breakpoint_Z2,
110
111 /* A GDB read watchpoint, requested with a Z3 packet. */
112 gdb_breakpoint_Z3,
113
114 /* A GDB access watchpoint, requested with a Z4 packet. */
115 gdb_breakpoint_Z4,
8b07ae33 116
414a389f
PA
117 /* A basic-software-single-step breakpoint. */
118 reinsert_breakpoint,
119
120 /* Any other breakpoint type that doesn't require specific
121 treatment goes here. E.g., an event breakpoint. */
122 other_breakpoint,
123 };
124
9f3a5c85
LM
125struct point_cond_list
126{
127 /* Pointer to the agent expression that is the breakpoint's
128 conditional. */
129 struct agent_expr *cond;
130
131 /* Pointer to the next condition. */
132 struct point_cond_list *next;
133};
134
d3ce09f5
SS
135struct point_command_list
136{
137 /* Pointer to the agent expression that is the breakpoint's
138 commands. */
139 struct agent_expr *cmd;
140
141 /* Flag that is true if this command should run even while GDB is
142 disconnected. */
143 int persistence;
144
145 /* Pointer to the next command. */
146 struct point_command_list *next;
147};
148
8b07ae33 149/* A high level (in gdbserver's perspective) breakpoint. */
611cb4a5
DJ
150struct breakpoint
151{
152 struct breakpoint *next;
611cb4a5 153
414a389f
PA
154 /* The breakpoint's type. */
155 enum bkpt_type type;
156
9f3a5c85
LM
157 /* Pointer to the condition list that should be evaluated on
158 the target or NULL if the breakpoint is unconditional or
159 if GDB doesn't want us to evaluate the conditionals on the
160 target's side. */
161 struct point_cond_list *cond_list;
162
d3ce09f5
SS
163 /* Point to the list of commands to run when this is hit. */
164 struct point_command_list *command_list;
165
8b07ae33
PA
166 /* Link to this breakpoint's raw breakpoint. This is always
167 non-NULL. */
168 struct raw_breakpoint *raw;
169
b65d95c5 170 /* Function to call when we hit this breakpoint. If it returns 1,
8b07ae33
PA
171 the breakpoint shall be deleted; 0 or if this callback is NULL,
172 it will be left inserted. */
b65d95c5 173 int (*handler) (CORE_ADDR);
611cb4a5
DJ
174};
175
802e8e6d
PA
176/* See mem-break.h. */
177
932539e3 178enum target_hw_bp_type
802e8e6d 179raw_bkpt_type_to_target_hw_bp_type (enum raw_bkpt_type raw_type)
932539e3 180{
802e8e6d 181 switch (raw_type)
932539e3 182 {
802e8e6d 183 case raw_bkpt_type_hw:
932539e3 184 return hw_execute;
802e8e6d 185 case raw_bkpt_type_write_wp:
932539e3 186 return hw_write;
802e8e6d 187 case raw_bkpt_type_read_wp:
932539e3 188 return hw_read;
802e8e6d 189 case raw_bkpt_type_access_wp:
932539e3
PA
190 return hw_access;
191 default:
802e8e6d
PA
192 fatal ("bad raw breakpoing type %d", (int) raw_type);
193 }
194}
195
196/* See mem-break.h. */
197
198static enum bkpt_type
199Z_packet_to_bkpt_type (char z_type)
200{
201 gdb_assert ('0' <= z_type && z_type <= '4');
202
203 return gdb_breakpoint_Z0 + (z_type - '0');
204}
205
206/* See mem-break.h. */
207
208enum raw_bkpt_type
209Z_packet_to_raw_bkpt_type (char z_type)
210{
211 switch (z_type)
212 {
213 case Z_PACKET_SW_BP:
214 return raw_bkpt_type_sw;
215 case Z_PACKET_HW_BP:
216 return raw_bkpt_type_hw;
217 case Z_PACKET_WRITE_WP:
218 return raw_bkpt_type_write_wp;
219 case Z_PACKET_READ_WP:
220 return raw_bkpt_type_read_wp;
221 case Z_PACKET_ACCESS_WP:
222 return raw_bkpt_type_access_wp;
223 default:
224 gdb_assert_not_reached ("unhandled Z packet type.");
932539e3
PA
225 }
226}
227
d3ce09f5
SS
228int
229any_persistent_commands ()
230{
231 struct process_info *proc = current_process ();
232 struct breakpoint *bp;
233 struct point_command_list *cl;
234
235 for (bp = proc->breakpoints; bp != NULL; bp = bp->next)
236 {
237 for (cl = bp->command_list; cl != NULL; cl = cl->next)
238 if (cl->persistence)
239 return 1;
240 }
241
242 return 0;
243}
244
802e8e6d
PA
245/* Find low-level breakpoint of type TYPE at address ADDR that is not
246 insert-disabled. Returns NULL if not found. */
247
8b07ae33 248static struct raw_breakpoint *
802e8e6d 249find_enabled_raw_code_breakpoint_at (CORE_ADDR addr, enum raw_bkpt_type type)
8b07ae33
PA
250{
251 struct process_info *proc = current_process ();
252 struct raw_breakpoint *bp;
414a389f 253
8b07ae33 254 for (bp = proc->raw_breakpoints; bp != NULL; bp = bp->next)
802e8e6d
PA
255 if (bp->pc == addr
256 && bp->raw_type == type
257 && bp->inserted >= 0)
8b07ae33
PA
258 return bp;
259
260 return NULL;
261}
262
802e8e6d
PA
263/* Find low-level breakpoint of type TYPE at address ADDR. Returns
264 NULL if not found. */
265
8b07ae33 266static struct raw_breakpoint *
802e8e6d 267find_raw_breakpoint_at (CORE_ADDR addr, enum raw_bkpt_type type, int size)
611cb4a5 268{
95954743 269 struct process_info *proc = current_process ();
8b07ae33 270 struct raw_breakpoint *bp;
802e8e6d
PA
271
272 for (bp = proc->raw_breakpoints; bp != NULL; bp = bp->next)
273 if (bp->pc == addr && bp->raw_type == type && bp->size == size)
274 return bp;
275
276 return NULL;
277}
278
279/* See mem-break.h. */
280
281int
282insert_memory_breakpoint (struct raw_breakpoint *bp)
283{
6bf36717 284 unsigned char buf[MAX_BREAKPOINT_LEN];
802e8e6d 285 int err;
611cb4a5
DJ
286
287 if (breakpoint_data == NULL)
802e8e6d 288 return 1;
611cb4a5 289
802e8e6d
PA
290 /* If the architecture treats the size field of Z packets as a
291 'kind' field, then we'll need to be able to know which is the
292 breakpoint instruction too. */
293 if (bp->size != breakpoint_len)
8b07ae33 294 {
802e8e6d
PA
295 if (debug_threads)
296 debug_printf ("Don't know how to insert breakpoints of size %d.\n",
297 bp->size);
298 return -1;
8b07ae33
PA
299 }
300
fa593d66
PA
301 /* Note that there can be fast tracepoint jumps installed in the
302 same memory range, so to get at the original memory, we need to
303 use read_inferior_memory, which masks those out. */
802e8e6d 304 err = read_inferior_memory (bp->pc, buf, breakpoint_len);
d50171e4
PA
305 if (err != 0)
306 {
307 if (debug_threads)
87ce2a04
DE
308 debug_printf ("Failed to read shadow memory of"
309 " breakpoint at 0x%s (%s).\n",
802e8e6d 310 paddress (bp->pc), strerror (err));
d50171e4 311 }
802e8e6d
PA
312 else
313 {
314 memcpy (bp->old_data, buf, breakpoint_len);
611cb4a5 315
802e8e6d
PA
316 err = (*the_target->write_memory) (bp->pc, breakpoint_data,
317 breakpoint_len);
318 if (err != 0)
319 {
320 if (debug_threads)
321 debug_printf ("Failed to insert breakpoint at 0x%s (%s).\n",
322 paddress (bp->pc), strerror (err));
323 }
324 }
325 return err != 0 ? -1 : 0;
326}
327
328/* See mem-break.h */
329
330int
331remove_memory_breakpoint (struct raw_breakpoint *bp)
332{
333 unsigned char buf[MAX_BREAKPOINT_LEN];
334 int err;
335
336 /* Since there can be trap breakpoints inserted in the same address
337 range, we use `write_inferior_memory', which takes care of
338 layering breakpoints on top of fast tracepoints, and on top of
339 the buffer we pass it. This works because the caller has already
340 either unlinked the breakpoint or marked it uninserted. Also
341 note that we need to pass the current shadow contents, because
342 write_inferior_memory updates any shadow memory with what we pass
343 here, and we want that to be a nop. */
344 memcpy (buf, bp->old_data, breakpoint_len);
345 err = write_inferior_memory (bp->pc, buf, breakpoint_len);
d50171e4
PA
346 if (err != 0)
347 {
348 if (debug_threads)
802e8e6d
PA
349 debug_printf ("Failed to uninsert raw breakpoint "
350 "at 0x%s (%s) while deleting it.\n",
351 paddress (bp->pc), strerror (err));
352 }
353 return err != 0 ? -1 : 0;
354}
355
356/* Set a RAW breakpoint of type TYPE and size SIZE at WHERE. On
357 success, a pointer to the new breakpoint is returned. On failure,
358 returns NULL and writes the error code to *ERR. */
359
360static struct raw_breakpoint *
361set_raw_breakpoint_at (enum raw_bkpt_type type, CORE_ADDR where, int size,
362 int *err)
363{
364 struct process_info *proc = current_process ();
365 struct raw_breakpoint *bp;
366
367 if (type == raw_bkpt_type_sw || type == raw_bkpt_type_hw)
368 {
369 bp = find_enabled_raw_code_breakpoint_at (where, type);
370 if (bp != NULL && bp->size != size)
371 {
372 /* A different size than previously seen. The previous
373 breakpoint must be gone then. */
374 if (debug_threads)
375 debug_printf ("Inconsistent breakpoint size? Was %d, now %d.\n",
376 bp->size, size);
377 bp->inserted = -1;
378 bp = NULL;
379 }
380 }
381 else
382 bp = find_raw_breakpoint_at (where, type, size);
383
384 if (bp != NULL)
385 {
386 bp->refcount++;
387 return bp;
388 }
389
390 bp = xcalloc (1, sizeof (*bp));
391 bp->pc = where;
392 bp->size = size;
393 bp->refcount = 1;
394 bp->raw_type = type;
395
396 *err = the_target->insert_point (bp->raw_type, bp->pc, bp->size, bp);
397 if (*err != 0)
398 {
399 if (debug_threads)
400 debug_printf ("Failed to insert breakpoint at 0x%s (%d).\n",
401 paddress (where), *err);
d50171e4
PA
402 free (bp);
403 return NULL;
404 }
405
d50171e4 406 bp->inserted = 1;
802e8e6d 407 /* Link the breakpoint in. */
8b07ae33
PA
408 bp->next = proc->raw_breakpoints;
409 proc->raw_breakpoints = bp;
d50171e4
PA
410 return bp;
411}
412
fa593d66
PA
413/* Notice that breakpoint traps are always installed on top of fast
414 tracepoint jumps. This is even if the fast tracepoint is installed
415 at a later time compared to when the breakpoint was installed.
416 This means that a stopping breakpoint or tracepoint has higher
417 "priority". In turn, this allows having fast and slow tracepoints
418 (and breakpoints) at the same address behave correctly. */
419
420
421/* A fast tracepoint jump. */
422
423struct fast_tracepoint_jump
424{
425 struct fast_tracepoint_jump *next;
426
427 /* A reference count. GDB can install more than one fast tracepoint
428 at the same address (each with its own action list, for
429 example). */
430 int refcount;
431
432 /* The fast tracepoint's insertion address. There can only be one
433 of these for a given PC. */
434 CORE_ADDR pc;
435
436 /* Non-zero if this fast tracepoint jump is currently inserted in
437 the inferior. */
438 int inserted;
439
440 /* The length of the jump instruction. */
441 int length;
442
443 /* A poor-man's flexible array member, holding both the jump
444 instruction to insert, and a copy of the instruction that would
445 be in memory had not been a jump there (the shadow memory of the
446 tracepoint jump). */
447 unsigned char insn_and_shadow[0];
448};
449
450/* Fast tracepoint FP's jump instruction to insert. */
451#define fast_tracepoint_jump_insn(fp) \
452 ((fp)->insn_and_shadow + 0)
453
454/* The shadow memory of fast tracepoint jump FP. */
455#define fast_tracepoint_jump_shadow(fp) \
456 ((fp)->insn_and_shadow + (fp)->length)
457
458
459/* Return the fast tracepoint jump set at WHERE. */
460
461static struct fast_tracepoint_jump *
462find_fast_tracepoint_jump_at (CORE_ADDR where)
463{
464 struct process_info *proc = current_process ();
465 struct fast_tracepoint_jump *jp;
466
467 for (jp = proc->fast_tracepoint_jumps; jp != NULL; jp = jp->next)
468 if (jp->pc == where)
469 return jp;
470
471 return NULL;
472}
473
474int
475fast_tracepoint_jump_here (CORE_ADDR where)
476{
477 struct fast_tracepoint_jump *jp = find_fast_tracepoint_jump_at (where);
478
479 return (jp != NULL);
480}
481
482int
483delete_fast_tracepoint_jump (struct fast_tracepoint_jump *todel)
484{
485 struct fast_tracepoint_jump *bp, **bp_link;
486 int ret;
487 struct process_info *proc = current_process ();
488
489 bp = proc->fast_tracepoint_jumps;
490 bp_link = &proc->fast_tracepoint_jumps;
491
492 while (bp)
493 {
494 if (bp == todel)
495 {
496 if (--bp->refcount == 0)
497 {
498 struct fast_tracepoint_jump *prev_bp_link = *bp_link;
6bf36717 499 unsigned char *buf;
fa593d66
PA
500
501 /* Unlink it. */
502 *bp_link = bp->next;
503
504 /* Since there can be breakpoints inserted in the same
505 address range, we use `write_inferior_memory', which
506 takes care of layering breakpoints on top of fast
507 tracepoints, and on top of the buffer we pass it.
508 This works because we've already unlinked the fast
509 tracepoint jump above. Also note that we need to
510 pass the current shadow contents, because
511 write_inferior_memory updates any shadow memory with
512 what we pass here, and we want that to be a nop. */
6bf36717
JK
513 buf = alloca (bp->length);
514 memcpy (buf, fast_tracepoint_jump_shadow (bp), bp->length);
515 ret = write_inferior_memory (bp->pc, buf, bp->length);
fa593d66
PA
516 if (ret != 0)
517 {
518 /* Something went wrong, relink the jump. */
519 *bp_link = prev_bp_link;
520
521 if (debug_threads)
87ce2a04
DE
522 debug_printf ("Failed to uninsert fast tracepoint jump "
523 "at 0x%s (%s) while deleting it.\n",
524 paddress (bp->pc), strerror (ret));
fa593d66
PA
525 return ret;
526 }
527
528 free (bp);
529 }
530
531 return 0;
532 }
533 else
534 {
535 bp_link = &bp->next;
536 bp = *bp_link;
537 }
538 }
539
540 warning ("Could not find fast tracepoint jump in list.");
541 return ENOENT;
542}
543
5c73ff4e
YQ
544void
545inc_ref_fast_tracepoint_jump (struct fast_tracepoint_jump *jp)
546{
547 jp->refcount++;
548}
549
fa593d66
PA
550struct fast_tracepoint_jump *
551set_fast_tracepoint_jump (CORE_ADDR where,
552 unsigned char *insn, ULONGEST length)
553{
554 struct process_info *proc = current_process ();
555 struct fast_tracepoint_jump *jp;
556 int err;
6bf36717 557 unsigned char *buf;
fa593d66
PA
558
559 /* We refcount fast tracepoint jumps. Check if we already know
560 about a jump at this address. */
561 jp = find_fast_tracepoint_jump_at (where);
562 if (jp != NULL)
563 {
564 jp->refcount++;
565 return jp;
566 }
567
568 /* We don't, so create a new object. Double the length, because the
569 flexible array member holds both the jump insn, and the
570 shadow. */
571 jp = xcalloc (1, sizeof (*jp) + (length * 2));
572 jp->pc = where;
573 jp->length = length;
574 memcpy (fast_tracepoint_jump_insn (jp), insn, length);
575 jp->refcount = 1;
6bf36717 576 buf = alloca (length);
fa593d66
PA
577
578 /* Note that there can be trap breakpoints inserted in the same
579 address range. To access the original memory contents, we use
580 `read_inferior_memory', which masks out breakpoints. */
6bf36717 581 err = read_inferior_memory (where, buf, length);
fa593d66
PA
582 if (err != 0)
583 {
584 if (debug_threads)
87ce2a04
DE
585 debug_printf ("Failed to read shadow memory of"
586 " fast tracepoint at 0x%s (%s).\n",
587 paddress (where), strerror (err));
fa593d66
PA
588 free (jp);
589 return NULL;
590 }
6bf36717 591 memcpy (fast_tracepoint_jump_shadow (jp), buf, length);
fa593d66
PA
592
593 /* Link the jump in. */
594 jp->inserted = 1;
595 jp->next = proc->fast_tracepoint_jumps;
596 proc->fast_tracepoint_jumps = jp;
597
598 /* Since there can be trap breakpoints inserted in the same address
599 range, we use use `write_inferior_memory', which takes care of
600 layering breakpoints on top of fast tracepoints, on top of the
601 buffer we pass it. This works because we've already linked in
602 the fast tracepoint jump above. Also note that we need to pass
603 the current shadow contents, because write_inferior_memory
604 updates any shadow memory with what we pass here, and we want
605 that to be a nop. */
6bf36717 606 err = write_inferior_memory (where, buf, length);
fa593d66
PA
607 if (err != 0)
608 {
609 if (debug_threads)
87ce2a04
DE
610 debug_printf ("Failed to insert fast tracepoint jump at 0x%s (%s).\n",
611 paddress (where), strerror (err));
fa593d66
PA
612
613 /* Unlink it. */
614 proc->fast_tracepoint_jumps = jp->next;
615 free (jp);
616
617 return NULL;
618 }
619
620 return jp;
621}
622
623void
624uninsert_fast_tracepoint_jumps_at (CORE_ADDR pc)
625{
626 struct fast_tracepoint_jump *jp;
627 int err;
628
629 jp = find_fast_tracepoint_jump_at (pc);
630 if (jp == NULL)
631 {
632 /* This can happen when we remove all breakpoints while handling
633 a step-over. */
634 if (debug_threads)
87ce2a04
DE
635 debug_printf ("Could not find fast tracepoint jump at 0x%s "
636 "in list (uninserting).\n",
637 paddress (pc));
fa593d66
PA
638 return;
639 }
640
641 if (jp->inserted)
642 {
6bf36717
JK
643 unsigned char *buf;
644
fa593d66
PA
645 jp->inserted = 0;
646
647 /* Since there can be trap breakpoints inserted in the same
648 address range, we use use `write_inferior_memory', which
649 takes care of layering breakpoints on top of fast
650 tracepoints, and on top of the buffer we pass it. This works
651 because we've already marked the fast tracepoint fast
652 tracepoint jump uninserted above. Also note that we need to
653 pass the current shadow contents, because
654 write_inferior_memory updates any shadow memory with what we
655 pass here, and we want that to be a nop. */
6bf36717
JK
656 buf = alloca (jp->length);
657 memcpy (buf, fast_tracepoint_jump_shadow (jp), jp->length);
658 err = write_inferior_memory (jp->pc, buf, jp->length);
fa593d66
PA
659 if (err != 0)
660 {
661 jp->inserted = 1;
662
663 if (debug_threads)
87ce2a04
DE
664 debug_printf ("Failed to uninsert fast tracepoint jump at"
665 " 0x%s (%s).\n",
666 paddress (pc), strerror (err));
fa593d66
PA
667 }
668 }
669}
670
671void
672reinsert_fast_tracepoint_jumps_at (CORE_ADDR where)
673{
674 struct fast_tracepoint_jump *jp;
675 int err;
6bf36717 676 unsigned char *buf;
fa593d66
PA
677
678 jp = find_fast_tracepoint_jump_at (where);
679 if (jp == NULL)
680 {
681 /* This can happen when we remove breakpoints when a tracepoint
682 hit causes a tracing stop, while handling a step-over. */
683 if (debug_threads)
87ce2a04
DE
684 debug_printf ("Could not find fast tracepoint jump at 0x%s "
685 "in list (reinserting).\n",
686 paddress (where));
fa593d66
PA
687 return;
688 }
689
690 if (jp->inserted)
691 error ("Jump already inserted at reinsert time.");
692
693 jp->inserted = 1;
694
695 /* Since there can be trap breakpoints inserted in the same address
696 range, we use `write_inferior_memory', which takes care of
697 layering breakpoints on top of fast tracepoints, and on top of
698 the buffer we pass it. This works because we've already marked
699 the fast tracepoint jump inserted above. Also note that we need
700 to pass the current shadow contents, because
701 write_inferior_memory updates any shadow memory with what we pass
702 here, and we want that to be a nop. */
6bf36717
JK
703 buf = alloca (jp->length);
704 memcpy (buf, fast_tracepoint_jump_shadow (jp), jp->length);
705 err = write_inferior_memory (where, buf, jp->length);
fa593d66
PA
706 if (err != 0)
707 {
708 jp->inserted = 0;
709
710 if (debug_threads)
87ce2a04
DE
711 debug_printf ("Failed to reinsert fast tracepoint jump at"
712 " 0x%s (%s).\n",
713 paddress (where), strerror (err));
fa593d66
PA
714 }
715}
716
802e8e6d
PA
717/* Set a high-level breakpoint of type TYPE, with low level type
718 RAW_TYPE and size SIZE, at WHERE. On success, a pointer to the new
719 breakpoint is returned. On failure, returns NULL and writes the
720 error code to *ERR. HANDLER is called when the breakpoint is hit.
721 HANDLER should return 1 if the breakpoint should be deleted, 0
722 otherwise. */
723
724static struct breakpoint *
725set_breakpoint (enum bkpt_type type, enum raw_bkpt_type raw_type,
726 CORE_ADDR where, int size,
727 int (*handler) (CORE_ADDR), int *err)
d50171e4
PA
728{
729 struct process_info *proc = current_process ();
730 struct breakpoint *bp;
8b07ae33 731 struct raw_breakpoint *raw;
d50171e4 732
802e8e6d 733 raw = set_raw_breakpoint_at (raw_type, where, size, err);
d50171e4 734
8b07ae33 735 if (raw == NULL)
d50171e4
PA
736 {
737 /* warn? */
414a389f 738 return NULL;
d50171e4
PA
739 }
740
741 bp = xcalloc (1, sizeof (struct breakpoint));
802e8e6d 742 bp->type = type;
8b07ae33
PA
743
744 bp->raw = raw;
611cb4a5
DJ
745 bp->handler = handler;
746
95954743
PA
747 bp->next = proc->breakpoints;
748 proc->breakpoints = bp;
414a389f
PA
749
750 return bp;
611cb4a5
DJ
751}
752
802e8e6d
PA
753/* See mem-break.h */
754
755struct breakpoint *
756set_breakpoint_at (CORE_ADDR where, int (*handler) (CORE_ADDR))
757{
758 int err_ignored;
759
760 return set_breakpoint (other_breakpoint, raw_bkpt_type_sw,
761 where, breakpoint_len, handler,
762 &err_ignored);
763}
764
765
8b07ae33
PA
766static int
767delete_raw_breakpoint (struct process_info *proc, struct raw_breakpoint *todel)
768{
769 struct raw_breakpoint *bp, **bp_link;
770 int ret;
771
772 bp = proc->raw_breakpoints;
773 bp_link = &proc->raw_breakpoints;
774
775 while (bp)
776 {
777 if (bp == todel)
778 {
802e8e6d 779 if (bp->inserted > 0)
8b07ae33
PA
780 {
781 struct raw_breakpoint *prev_bp_link = *bp_link;
782
783 *bp_link = bp->next;
784
802e8e6d
PA
785 ret = the_target->remove_point (bp->raw_type, bp->pc, bp->size,
786 bp);
8b07ae33
PA
787 if (ret != 0)
788 {
789 /* Something went wrong, relink the breakpoint. */
790 *bp_link = prev_bp_link;
791
792 if (debug_threads)
87ce2a04 793 debug_printf ("Failed to uninsert raw breakpoint "
802e8e6d
PA
794 "at 0x%s while deleting it.\n",
795 paddress (bp->pc));
8b07ae33
PA
796 return ret;
797 }
8b07ae33
PA
798 }
799 else
800 *bp_link = bp->next;
801
802 free (bp);
803 return 0;
804 }
805 else
806 {
807 bp_link = &bp->next;
808 bp = *bp_link;
809 }
810 }
811
812 warning ("Could not find raw breakpoint in list.");
813 return ENOENT;
814}
815
816static int
817release_breakpoint (struct process_info *proc, struct breakpoint *bp)
818{
819 int newrefcount;
820 int ret;
821
822 newrefcount = bp->raw->refcount - 1;
823 if (newrefcount == 0)
824 {
825 ret = delete_raw_breakpoint (proc, bp->raw);
826 if (ret != 0)
827 return ret;
828 }
829 else
830 bp->raw->refcount = newrefcount;
831
832 free (bp);
833
834 return 0;
835}
836
837static int
838delete_breakpoint_1 (struct process_info *proc, struct breakpoint *todel)
611cb4a5 839{
414a389f 840 struct breakpoint *bp, **bp_link;
8b07ae33 841 int err;
611cb4a5 842
414a389f
PA
843 bp = proc->breakpoints;
844 bp_link = &proc->breakpoints;
845
846 while (bp)
611cb4a5 847 {
414a389f 848 if (bp == todel)
611cb4a5 849 {
414a389f
PA
850 *bp_link = bp->next;
851
8b07ae33
PA
852 err = release_breakpoint (proc, bp);
853 if (err != 0)
854 return err;
855
856 bp = *bp_link;
857 return 0;
611cb4a5 858 }
414a389f
PA
859 else
860 {
861 bp_link = &bp->next;
862 bp = *bp_link;
863 }
611cb4a5 864 }
414a389f 865
611cb4a5 866 warning ("Could not find breakpoint in list.");
8b07ae33
PA
867 return ENOENT;
868}
869
219f2f23 870int
8b07ae33
PA
871delete_breakpoint (struct breakpoint *todel)
872{
873 struct process_info *proc = current_process ();
874 return delete_breakpoint_1 (proc, todel);
611cb4a5
DJ
875}
876
802e8e6d
PA
877/* Locate a GDB breakpoint of type Z_TYPE and size SIZE placed at
878 address ADDR and return a pointer to its structure. If SIZE is -1,
879 the breakpoints' sizes are ignored. */
51aa91f9
PA
880
881static struct breakpoint *
802e8e6d 882find_gdb_breakpoint (char z_type, CORE_ADDR addr, int size)
611cb4a5 883{
95954743 884 struct process_info *proc = current_process ();
8b07ae33 885 struct breakpoint *bp;
802e8e6d 886 enum bkpt_type type = Z_packet_to_bkpt_type (z_type);
611cb4a5 887
8b07ae33 888 for (bp = proc->breakpoints; bp != NULL; bp = bp->next)
802e8e6d
PA
889 if (bp->type == type && bp->raw->pc == addr
890 && (size == -1 || bp->raw->size == size))
8b07ae33 891 return bp;
611cb4a5
DJ
892
893 return NULL;
894}
895
802e8e6d
PA
896static int
897z_type_supported (char z_type)
898{
899 return (z_type >= '0' && z_type <= '4'
900 && the_target->supports_z_point_type (z_type));
901}
902
903/* Create a new GDB breakpoint of type Z_TYPE at ADDR with size SIZE.
904 Returns a pointer to the newly created breakpoint on success. On
905 failure returns NULL and sets *ERR to either -1 for error, or 1 if
906 Z_TYPE breakpoints are not supported on this target. */
907
908static struct breakpoint *
909set_gdb_breakpoint_1 (char z_type, CORE_ADDR addr, int size, int *err)
68070c10 910{
8b07ae33 911 struct breakpoint *bp;
802e8e6d
PA
912 enum bkpt_type type;
913 enum raw_bkpt_type raw_type;
914
915 /* If we see GDB inserting a second code breakpoint at the same
916 address, then either: GDB is updating the breakpoint's conditions
917 or commands; or, the first breakpoint must have disappeared due
918 to a shared library unload. On targets where the shared
919 libraries are handled by userspace, like SVR4, for example,
920 GDBserver can't tell if a library was loaded or unloaded. Since
921 we refcount raw breakpoints, we must be careful to make sure GDB
922 breakpoints never contribute more than one reference. if we
923 didn't do this, in case the previous breakpoint is gone due to a
924 shared library unload, we'd just increase the refcount of the
925 previous breakpoint at this address, but the trap was not planted
926 in the inferior anymore, thus the breakpoint would never be hit.
927 Note this must be careful to not create a window where
928 breakpoints are removed from the target, for non-stop, in case
929 the target can poke at memory while the program is running. */
930 if (z_type == Z_PACKET_SW_BP
931 || z_type == Z_PACKET_HW_BP)
932 {
933 bp = find_gdb_breakpoint (z_type, addr, -1);
8b07ae33 934
802e8e6d
PA
935 if (bp != NULL)
936 {
937 if (bp->raw->size != size)
938 {
939 /* A different size than previously seen. The previous
940 breakpoint must be gone then. */
941 bp->raw->inserted = -1;
942 delete_breakpoint (bp);
943 bp = NULL;
944 }
945 else if (z_type == Z_PACKET_SW_BP)
946 {
947 /* Check if the breakpoint is actually gone from the
948 target, due to an solib unload, for example. Might
949 as well validate _all_ breakpoints. */
950 validate_breakpoints ();
951
952 /* Breakpoints that don't pass validation are
953 deleted. */
954 bp = find_gdb_breakpoint (z_type, addr, -1);
955 }
956 }
957 }
958 else
959 {
960 /* Data breakpoints for the same address but different size are
961 expected. GDB doesn't merge these. The backend gets to do
962 that if it wants/can. */
963 bp = find_gdb_breakpoint (z_type, addr, size);
964 }
8b07ae33 965
d3bbe7a0
PA
966 if (bp != NULL)
967 {
802e8e6d
PA
968 /* We already know about this breakpoint, there's nothing else
969 to do - GDB's reference is already accounted for. Note that
970 whether the breakpoint inserted is left as is - we may be
971 stepping over it, for example, in which case we don't want to
972 force-reinsert it. */
973 return bp;
974 }
975
976 raw_type = Z_packet_to_raw_bkpt_type (z_type);
977 type = Z_packet_to_bkpt_type (z_type);
978 return set_breakpoint (type, raw_type, addr, size, NULL, err);
979}
980
981static int
982check_gdb_bp_preconditions (char z_type, int *err)
983{
984 /* As software/memory breakpoints work by poking at memory, we need
985 to prepare to access memory. If that operation fails, we need to
986 return error. Seeing an error, if this is the first breakpoint
987 of that type that GDB tries to insert, GDB would then assume the
988 breakpoint type is supported, but it may actually not be. So we
989 need to check whether the type is supported at all before
990 preparing to access memory. */
991 if (!z_type_supported (z_type))
992 {
993 *err = 1;
994 return 0;
995 }
996 else if (current_inferior == NULL)
997 {
998 *err = -1;
999 return 0;
1000 }
1001 else
1002 return 1;
1003}
1004
1005/* See mem-break.h. This is a wrapper for set_gdb_breakpoint_1 that
1006 knows to prepare to access memory for Z0 breakpoints. */
d3bbe7a0 1007
802e8e6d
PA
1008struct breakpoint *
1009set_gdb_breakpoint (char z_type, CORE_ADDR addr, int size, int *err)
1010{
1011 struct breakpoint *bp;
1012
1013 if (!check_gdb_bp_preconditions (z_type, err))
1014 return NULL;
1015
1016 /* If inserting a software/memory breakpoint, need to prepare to
1017 access memory. */
1018 if (z_type == Z_PACKET_SW_BP)
1019 {
1020 *err = prepare_to_access_memory ();
1021 if (*err != 0)
1022 return NULL;
d3bbe7a0
PA
1023 }
1024
802e8e6d 1025 bp = set_gdb_breakpoint_1 (z_type, addr, size, err);
8b07ae33 1026
802e8e6d
PA
1027 if (z_type == Z_PACKET_SW_BP)
1028 done_accessing_memory ();
1029
1030 return bp;
8b07ae33
PA
1031}
1032
802e8e6d
PA
1033/* Delete a GDB breakpoint of type Z_TYPE and size SIZE previously
1034 inserted at ADDR with set_gdb_breakpoint_at. Returns 0 on success,
1035 -1 on error, and 1 if Z_TYPE breakpoints are not supported on this
1036 target. */
1037
1038static int
1039delete_gdb_breakpoint_1 (char z_type, CORE_ADDR addr, int size)
8b07ae33
PA
1040{
1041 struct breakpoint *bp;
1042 int err;
1043
802e8e6d 1044 bp = find_gdb_breakpoint (z_type, addr, size);
8b07ae33
PA
1045 if (bp == NULL)
1046 return -1;
1047
0a261ed8
PA
1048 /* Before deleting the breakpoint, make sure to free its condition
1049 and command lists. */
1050 clear_breakpoint_conditions_and_commands (bp);
8b07ae33 1051 err = delete_breakpoint (bp);
802e8e6d 1052 if (err != 0)
8b07ae33
PA
1053 return -1;
1054
1055 return 0;
1056}
1057
802e8e6d
PA
1058/* See mem-break.h. This is a wrapper for delete_gdb_breakpoint that
1059 knows to prepare to access memory for Z0 breakpoints. */
1060
1061int
1062delete_gdb_breakpoint (char z_type, CORE_ADDR addr, int size)
1063{
1064 int ret;
1065
1066 if (!check_gdb_bp_preconditions (z_type, &ret))
1067 return ret;
1068
1069 /* If inserting a software/memory breakpoint, need to prepare to
1070 access memory. */
1071 if (z_type == Z_PACKET_SW_BP)
1072 {
1073 int err;
1074
1075 err = prepare_to_access_memory ();
1076 if (err != 0)
1077 return -1;
1078 }
1079
1080 ret = delete_gdb_breakpoint_1 (z_type, addr, size);
1081
1082 if (z_type == Z_PACKET_SW_BP)
1083 done_accessing_memory ();
1084
1085 return ret;
1086}
1087
1088/* Clear all conditions associated with a breakpoint. */
9f3a5c85 1089
0a261ed8 1090static void
802e8e6d 1091clear_breakpoint_conditions (struct breakpoint *bp)
9f3a5c85 1092{
412c89dd 1093 struct point_cond_list *cond;
9f3a5c85 1094
802e8e6d 1095 if (bp->cond_list == NULL)
9f3a5c85
LM
1096 return;
1097
1098 cond = bp->cond_list;
9f3a5c85
LM
1099
1100 while (cond != NULL)
1101 {
412c89dd
LM
1102 struct point_cond_list *cond_next;
1103
1104 cond_next = cond->next;
0a261ed8 1105 gdb_free_agent_expr (cond->cond);
9f3a5c85 1106 free (cond);
412c89dd 1107 cond = cond_next;
9f3a5c85
LM
1108 }
1109
1110 bp->cond_list = NULL;
1111}
1112
0a261ed8
PA
1113/* Clear all commands associated with a breakpoint. */
1114
1115static void
1116clear_breakpoint_commands (struct breakpoint *bp)
1117{
1118 struct point_command_list *cmd;
1119
1120 if (bp->command_list == NULL)
1121 return;
1122
1123 cmd = bp->command_list;
1124
1125 while (cmd != NULL)
1126 {
1127 struct point_command_list *cmd_next;
1128
1129 cmd_next = cmd->next;
1130 gdb_free_agent_expr (cmd->cmd);
1131 free (cmd);
1132 cmd = cmd_next;
1133 }
1134
1135 bp->command_list = NULL;
1136}
1137
1138void
1139clear_breakpoint_conditions_and_commands (struct breakpoint *bp)
1140{
1141 clear_breakpoint_conditions (bp);
1142 clear_breakpoint_commands (bp);
1143}
1144
9f3a5c85
LM
1145/* Add condition CONDITION to GDBserver's breakpoint BP. */
1146
802e8e6d 1147static void
9f3a5c85
LM
1148add_condition_to_breakpoint (struct breakpoint *bp,
1149 struct agent_expr *condition)
1150{
1151 struct point_cond_list *new_cond;
1152
1153 /* Create new condition. */
1154 new_cond = xcalloc (1, sizeof (*new_cond));
1155 new_cond->cond = condition;
1156
1157 /* Add condition to the list. */
1158 new_cond->next = bp->cond_list;
1159 bp->cond_list = new_cond;
1160}
1161
802e8e6d 1162/* Add a target-side condition CONDITION to a breakpoint. */
9f3a5c85 1163
8b07ae33 1164int
802e8e6d 1165add_breakpoint_condition (struct breakpoint *bp, char **condition)
9f3a5c85 1166{
9f3a5c85
LM
1167 char *actparm = *condition;
1168 struct agent_expr *cond;
1169
9f3a5c85
LM
1170 if (condition == NULL)
1171 return 1;
1172
d708bcd1
PA
1173 if (bp == NULL)
1174 return 0;
1175
9f3a5c85
LM
1176 cond = gdb_parse_agent_expr (&actparm);
1177
1178 if (cond == NULL)
1179 {
1180 fprintf (stderr, "Condition evaluation failed. "
1181 "Assuming unconditional.\n");
1182 return 0;
1183 }
1184
1185 add_condition_to_breakpoint (bp, cond);
1186
1187 *condition = actparm;
1188
d708bcd1 1189 return 1;
9f3a5c85
LM
1190}
1191
1192/* Evaluate condition (if any) at breakpoint BP. Return 1 if
1193 true and 0 otherwise. */
1194
802e8e6d
PA
1195static int
1196gdb_condition_true_at_breakpoint_z_type (char z_type, CORE_ADDR addr)
8b07ae33 1197{
9f3a5c85 1198 /* Fetch registers for the current inferior. */
802e8e6d 1199 struct breakpoint *bp = find_gdb_breakpoint (z_type, addr, -1);
9f3a5c85
LM
1200 ULONGEST value = 0;
1201 struct point_cond_list *cl;
1202 int err = 0;
5ae4861a 1203 struct eval_agent_expr_context ctx;
9f3a5c85
LM
1204
1205 if (bp == NULL)
1206 return 0;
8b07ae33 1207
9f3a5c85
LM
1208 /* Check if the breakpoint is unconditional. If it is,
1209 the condition always evaluates to TRUE. */
1210 if (bp->cond_list == NULL)
1211 return 1;
1212
5ae4861a
YQ
1213 ctx.regcache = get_thread_regcache (current_inferior, 1);
1214 ctx.tframe = NULL;
1215 ctx.tpoint = NULL;
1216
9f3a5c85
LM
1217 /* Evaluate each condition in the breakpoint's list of conditions.
1218 Return true if any of the conditions evaluates to TRUE.
1219
1220 If we failed to evaluate the expression, TRUE is returned. This
1221 forces GDB to reevaluate the conditions. */
1222 for (cl = bp->cond_list;
1223 cl && !value && !err; cl = cl->next)
1224 {
1225 /* Evaluate the condition. */
5ae4861a 1226 err = gdb_eval_agent_expr (&ctx, cl->cond, &value);
9f3a5c85
LM
1227 }
1228
1229 if (err)
1230 return 1;
1231
1232 return (value != 0);
1233}
1234
802e8e6d
PA
1235int
1236gdb_condition_true_at_breakpoint (CORE_ADDR where)
1237{
1238 /* Only check code (software or hardware) breakpoints. */
1239 return (gdb_condition_true_at_breakpoint_z_type (Z_PACKET_SW_BP, where)
1240 || gdb_condition_true_at_breakpoint_z_type (Z_PACKET_HW_BP, where));
1241}
1242
d3ce09f5
SS
1243/* Add commands COMMANDS to GDBserver's breakpoint BP. */
1244
1245void
1246add_commands_to_breakpoint (struct breakpoint *bp,
1247 struct agent_expr *commands, int persist)
1248{
1249 struct point_command_list *new_cmd;
1250
1251 /* Create new command. */
1252 new_cmd = xcalloc (1, sizeof (*new_cmd));
1253 new_cmd->cmd = commands;
1254 new_cmd->persistence = persist;
1255
1256 /* Add commands to the list. */
1257 new_cmd->next = bp->command_list;
1258 bp->command_list = new_cmd;
1259}
1260
1261/* Add a target-side command COMMAND to the breakpoint at ADDR. */
1262
1263int
802e8e6d
PA
1264add_breakpoint_commands (struct breakpoint *bp, char **command,
1265 int persist)
d3ce09f5 1266{
d3ce09f5
SS
1267 char *actparm = *command;
1268 struct agent_expr *cmd;
1269
d3ce09f5
SS
1270 if (command == NULL)
1271 return 1;
1272
d708bcd1
PA
1273 if (bp == NULL)
1274 return 0;
1275
d3ce09f5
SS
1276 cmd = gdb_parse_agent_expr (&actparm);
1277
1278 if (cmd == NULL)
1279 {
1280 fprintf (stderr, "Command evaluation failed. "
1281 "Disabling.\n");
1282 return 0;
1283 }
1284
1285 add_commands_to_breakpoint (bp, cmd, persist);
1286
1287 *command = actparm;
1288
d708bcd1 1289 return 1;
d3ce09f5
SS
1290}
1291
1292/* Return true if there are no commands to run at this location,
1293 which likely means we want to report back to GDB. */
802e8e6d
PA
1294
1295static int
1296gdb_no_commands_at_breakpoint_z_type (char z_type, CORE_ADDR addr)
d3ce09f5 1297{
802e8e6d 1298 struct breakpoint *bp = find_gdb_breakpoint (z_type, addr, -1);
d3ce09f5
SS
1299
1300 if (bp == NULL)
802e8e6d 1301 return 1;
d3ce09f5
SS
1302
1303 if (debug_threads)
802e8e6d
PA
1304 debug_printf ("at 0x%s, type Z%c, bp command_list is 0x%s\n",
1305 paddress (addr), z_type,
87ce2a04 1306 phex_nz ((uintptr_t) bp->command_list, 0));
d3ce09f5
SS
1307 return (bp->command_list == NULL);
1308}
1309
802e8e6d
PA
1310/* Return true if there are no commands to run at this location,
1311 which likely means we want to report back to GDB. */
1312
1313int
1314gdb_no_commands_at_breakpoint (CORE_ADDR where)
1315{
1316 /* Only check code (software or hardware) breakpoints. */
1317 return (gdb_no_commands_at_breakpoint_z_type (Z_PACKET_SW_BP, where)
1318 && gdb_no_commands_at_breakpoint_z_type (Z_PACKET_HW_BP, where));
1319}
1320
1321/* Run a breakpoint's commands. Returns 0 if there was a problem
1322 running any command, 1 otherwise. */
1323
1324static int
1325run_breakpoint_commands_z_type (char z_type, CORE_ADDR addr)
d3ce09f5
SS
1326{
1327 /* Fetch registers for the current inferior. */
802e8e6d 1328 struct breakpoint *bp = find_gdb_breakpoint (z_type, addr, -1);
d3ce09f5
SS
1329 ULONGEST value = 0;
1330 struct point_command_list *cl;
1331 int err = 0;
5ae4861a 1332 struct eval_agent_expr_context ctx;
d3ce09f5
SS
1333
1334 if (bp == NULL)
802e8e6d 1335 return 1;
d3ce09f5 1336
5ae4861a
YQ
1337 ctx.regcache = get_thread_regcache (current_inferior, 1);
1338 ctx.tframe = NULL;
1339 ctx.tpoint = NULL;
1340
d3ce09f5
SS
1341 for (cl = bp->command_list;
1342 cl && !value && !err; cl = cl->next)
1343 {
1344 /* Run the command. */
5ae4861a 1345 err = gdb_eval_agent_expr (&ctx, cl->cmd, &value);
d3ce09f5
SS
1346
1347 /* If one command has a problem, stop digging the hole deeper. */
1348 if (err)
802e8e6d 1349 return 0;
d3ce09f5 1350 }
802e8e6d
PA
1351
1352 return 1;
d3ce09f5
SS
1353}
1354
802e8e6d
PA
1355void
1356run_breakpoint_commands (CORE_ADDR where)
1357{
1358 /* Only check code (software or hardware) breakpoints. If one
1359 command has a problem, stop digging the hole deeper. */
1360 if (run_breakpoint_commands_z_type (Z_PACKET_SW_BP, where))
1361 run_breakpoint_commands_z_type (Z_PACKET_HW_BP, where);
1362}
1363
1364/* See mem-break.h. */
9f3a5c85
LM
1365
1366int
1367gdb_breakpoint_here (CORE_ADDR where)
1368{
802e8e6d
PA
1369 /* Only check code (software or hardware) breakpoints. */
1370 return (find_gdb_breakpoint (Z_PACKET_SW_BP, where, -1) != NULL
1371 || find_gdb_breakpoint (Z_PACKET_HW_BP, where, -1) != NULL);
68070c10
PA
1372}
1373
d50171e4
PA
1374void
1375set_reinsert_breakpoint (CORE_ADDR stop_at)
611cb4a5 1376{
414a389f
PA
1377 struct breakpoint *bp;
1378
1379 bp = set_breakpoint_at (stop_at, NULL);
414a389f 1380 bp->type = reinsert_breakpoint;
611cb4a5
DJ
1381}
1382
1383void
d50171e4 1384delete_reinsert_breakpoints (void)
611cb4a5 1385{
d50171e4
PA
1386 struct process_info *proc = current_process ();
1387 struct breakpoint *bp, **bp_link;
611cb4a5 1388
d50171e4
PA
1389 bp = proc->breakpoints;
1390 bp_link = &proc->breakpoints;
611cb4a5 1391
d50171e4
PA
1392 while (bp)
1393 {
414a389f
PA
1394 if (bp->type == reinsert_breakpoint)
1395 {
1396 *bp_link = bp->next;
8b07ae33 1397 release_breakpoint (proc, bp);
414a389f
PA
1398 bp = *bp_link;
1399 }
1400 else
1401 {
1402 bp_link = &bp->next;
1403 bp = *bp_link;
1404 }
d50171e4
PA
1405 }
1406}
b65d95c5 1407
d50171e4 1408static void
8b07ae33 1409uninsert_raw_breakpoint (struct raw_breakpoint *bp)
d50171e4 1410{
802e8e6d
PA
1411 if (bp->inserted < 0)
1412 {
1413 if (debug_threads)
1414 debug_printf ("Breakpoint at %s is marked insert-disabled.\n",
1415 paddress (bp->pc));
1416 }
1417 else if (bp->inserted > 0)
d50171e4
PA
1418 {
1419 int err;
1420
1421 bp->inserted = 0;
802e8e6d
PA
1422
1423 err = the_target->remove_point (bp->raw_type, bp->pc, bp->size, bp);
d50171e4
PA
1424 if (err != 0)
1425 {
1426 bp->inserted = 1;
611cb4a5 1427
d50171e4 1428 if (debug_threads)
802e8e6d
PA
1429 debug_printf ("Failed to uninsert raw breakpoint at 0x%s.\n",
1430 paddress (bp->pc));
d50171e4
PA
1431 }
1432 }
611cb4a5
DJ
1433}
1434
1435void
d50171e4 1436uninsert_breakpoints_at (CORE_ADDR pc)
611cb4a5 1437{
802e8e6d 1438 struct process_info *proc = current_process ();
8b07ae33 1439 struct raw_breakpoint *bp;
802e8e6d 1440 int found = 0;
611cb4a5 1441
802e8e6d
PA
1442 for (bp = proc->raw_breakpoints; bp != NULL; bp = bp->next)
1443 if ((bp->raw_type == raw_bkpt_type_sw
1444 || bp->raw_type == raw_bkpt_type_hw)
1445 && bp->pc == pc)
1446 {
1447 found = 1;
1448
1449 if (bp->inserted)
1450 uninsert_raw_breakpoint (bp);
1451 }
1452
1453 if (!found)
d50171e4
PA
1454 {
1455 /* This can happen when we remove all breakpoints while handling
1456 a step-over. */
1457 if (debug_threads)
87ce2a04
DE
1458 debug_printf ("Could not find breakpoint at 0x%s "
1459 "in list (uninserting).\n",
1460 paddress (pc));
d50171e4 1461 }
611cb4a5
DJ
1462}
1463
0fb4aa4b
PA
1464void
1465uninsert_all_breakpoints (void)
1466{
1467 struct process_info *proc = current_process ();
1468 struct raw_breakpoint *bp;
1469
1470 for (bp = proc->raw_breakpoints; bp != NULL; bp = bp->next)
802e8e6d
PA
1471 if ((bp->raw_type == raw_bkpt_type_sw
1472 || bp->raw_type == raw_bkpt_type_hw)
1473 && bp->inserted)
0fb4aa4b
PA
1474 uninsert_raw_breakpoint (bp);
1475}
1476
d50171e4 1477static void
8b07ae33 1478reinsert_raw_breakpoint (struct raw_breakpoint *bp)
611cb4a5 1479{
d50171e4 1480 int err;
611cb4a5 1481
d50171e4 1482 if (bp->inserted)
611cb4a5
DJ
1483 error ("Breakpoint already inserted at reinsert time.");
1484
802e8e6d 1485 err = the_target->insert_point (bp->raw_type, bp->pc, bp->size, bp);
d50171e4
PA
1486 if (err == 0)
1487 bp->inserted = 1;
1488 else if (debug_threads)
802e8e6d
PA
1489 debug_printf ("Failed to reinsert breakpoint at 0x%s (%d).\n",
1490 paddress (bp->pc), err);
611cb4a5
DJ
1491}
1492
d50171e4
PA
1493void
1494reinsert_breakpoints_at (CORE_ADDR pc)
611cb4a5 1495{
802e8e6d 1496 struct process_info *proc = current_process ();
8b07ae33 1497 struct raw_breakpoint *bp;
802e8e6d 1498 int found = 0;
611cb4a5 1499
802e8e6d
PA
1500 for (bp = proc->raw_breakpoints; bp != NULL; bp = bp->next)
1501 if ((bp->raw_type == raw_bkpt_type_sw
1502 || bp->raw_type == raw_bkpt_type_hw)
1503 && bp->pc == pc)
1504 {
1505 found = 1;
1506
1507 reinsert_raw_breakpoint (bp);
1508 }
1509
1510 if (!found)
611cb4a5 1511 {
d50171e4
PA
1512 /* This can happen when we remove all breakpoints while handling
1513 a step-over. */
1514 if (debug_threads)
87ce2a04
DE
1515 debug_printf ("Could not find raw breakpoint at 0x%s "
1516 "in list (reinserting).\n",
1517 paddress (pc));
611cb4a5 1518 }
d50171e4
PA
1519}
1520
0fb4aa4b
PA
1521void
1522reinsert_all_breakpoints (void)
1523{
1524 struct process_info *proc = current_process ();
1525 struct raw_breakpoint *bp;
1526
1527 for (bp = proc->raw_breakpoints; bp != NULL; bp = bp->next)
802e8e6d
PA
1528 if ((bp->raw_type == raw_bkpt_type_sw
1529 || bp->raw_type == raw_bkpt_type_hw)
1530 && !bp->inserted)
0fb4aa4b
PA
1531 reinsert_raw_breakpoint (bp);
1532}
1533
d50171e4
PA
1534void
1535check_breakpoints (CORE_ADDR stop_pc)
1536{
1537 struct process_info *proc = current_process ();
1538 struct breakpoint *bp, **bp_link;
1539
1540 bp = proc->breakpoints;
1541 bp_link = &proc->breakpoints;
1542
1543 while (bp)
b65d95c5 1544 {
802e8e6d
PA
1545 struct raw_breakpoint *raw = bp->raw;
1546
1547 if ((raw->raw_type == raw_bkpt_type_sw
1548 || raw->raw_type == raw_bkpt_type_hw)
1549 && raw->pc == stop_pc)
d50171e4 1550 {
802e8e6d 1551 if (!raw->inserted)
d50171e4
PA
1552 {
1553 warning ("Hit a removed breakpoint?");
1554 return;
1555 }
1556
1557 if (bp->handler != NULL && (*bp->handler) (stop_pc))
1558 {
1559 *bp_link = bp->next;
1560
8b07ae33 1561 release_breakpoint (proc, bp);
d50171e4
PA
1562
1563 bp = *bp_link;
1564 continue;
1565 }
1566 }
1567
1568 bp_link = &bp->next;
1569 bp = *bp_link;
b65d95c5 1570 }
611cb4a5
DJ
1571}
1572
1573void
f450004a 1574set_breakpoint_data (const unsigned char *bp_data, int bp_len)
611cb4a5
DJ
1575{
1576 breakpoint_data = bp_data;
1577 breakpoint_len = bp_len;
1578}
1579
d50171e4
PA
1580int
1581breakpoint_here (CORE_ADDR addr)
1582{
802e8e6d
PA
1583 struct process_info *proc = current_process ();
1584 struct raw_breakpoint *bp;
1585
1586 for (bp = proc->raw_breakpoints; bp != NULL; bp = bp->next)
1587 if ((bp->raw_type == raw_bkpt_type_sw
1588 || bp->raw_type == raw_bkpt_type_hw)
1589 && bp->pc == addr)
1590 return 1;
1591
1592 return 0;
d50171e4
PA
1593}
1594
1595int
1596breakpoint_inserted_here (CORE_ADDR addr)
1597{
802e8e6d 1598 struct process_info *proc = current_process ();
8b07ae33 1599 struct raw_breakpoint *bp;
d50171e4 1600
802e8e6d
PA
1601 for (bp = proc->raw_breakpoints; bp != NULL; bp = bp->next)
1602 if ((bp->raw_type == raw_bkpt_type_sw
1603 || bp->raw_type == raw_bkpt_type_hw)
1604 && bp->pc == addr
1605 && bp->inserted)
1606 return 1;
d50171e4 1607
802e8e6d 1608 return 0;
d50171e4
PA
1609}
1610
d3bbe7a0
PA
1611static int
1612validate_inserted_breakpoint (struct raw_breakpoint *bp)
1613{
1614 unsigned char *buf;
1615 int err;
1616
1617 gdb_assert (bp->inserted);
802e8e6d 1618 gdb_assert (bp->raw_type == raw_bkpt_type_sw);
d3bbe7a0
PA
1619
1620 buf = alloca (breakpoint_len);
1621 err = (*the_target->read_memory) (bp->pc, buf, breakpoint_len);
1622 if (err || memcmp (buf, breakpoint_data, breakpoint_len) != 0)
1623 {
1624 /* Tag it as gone. */
802e8e6d 1625 bp->inserted = -1;
d3bbe7a0
PA
1626 return 0;
1627 }
1628
1629 return 1;
1630}
1631
1632static void
1633delete_disabled_breakpoints (void)
1634{
1635 struct process_info *proc = current_process ();
1636 struct breakpoint *bp, *next;
1637
1638 for (bp = proc->breakpoints; bp != NULL; bp = next)
1639 {
1640 next = bp->next;
802e8e6d 1641 if (bp->raw->inserted < 0)
d3bbe7a0
PA
1642 delete_breakpoint_1 (proc, bp);
1643 }
1644}
1645
1646/* Check if breakpoints we inserted still appear to be inserted. They
1647 may disappear due to a shared library unload, and worse, a new
1648 shared library may be reloaded at the same address as the
1649 previously unloaded one. If that happens, we should make sure that
1650 the shadow memory of the old breakpoints isn't used when reading or
1651 writing memory. */
1652
1653void
1654validate_breakpoints (void)
1655{
1656 struct process_info *proc = current_process ();
1657 struct breakpoint *bp;
1658
1659 for (bp = proc->breakpoints; bp != NULL; bp = bp->next)
1660 {
802e8e6d
PA
1661 struct raw_breakpoint *raw = bp->raw;
1662
1663 if (raw->raw_type == raw_bkpt_type_sw && raw->inserted > 0)
1664 validate_inserted_breakpoint (raw);
d3bbe7a0
PA
1665 }
1666
1667 delete_disabled_breakpoints ();
1668}
1669
611cb4a5 1670void
f450004a 1671check_mem_read (CORE_ADDR mem_addr, unsigned char *buf, int mem_len)
611cb4a5 1672{
95954743 1673 struct process_info *proc = current_process ();
8b07ae33 1674 struct raw_breakpoint *bp = proc->raw_breakpoints;
fa593d66 1675 struct fast_tracepoint_jump *jp = proc->fast_tracepoint_jumps;
611cb4a5 1676 CORE_ADDR mem_end = mem_addr + mem_len;
d3bbe7a0 1677 int disabled_one = 0;
611cb4a5 1678
fa593d66
PA
1679 for (; jp != NULL; jp = jp->next)
1680 {
1681 CORE_ADDR bp_end = jp->pc + jp->length;
1682 CORE_ADDR start, end;
1683 int copy_offset, copy_len, buf_offset;
1684
6bf36717
JK
1685 gdb_assert (fast_tracepoint_jump_shadow (jp) >= buf + mem_len
1686 || buf >= fast_tracepoint_jump_shadow (jp) + (jp)->length);
1687
fa593d66
PA
1688 if (mem_addr >= bp_end)
1689 continue;
1690 if (jp->pc >= mem_end)
1691 continue;
1692
1693 start = jp->pc;
1694 if (mem_addr > start)
1695 start = mem_addr;
1696
1697 end = bp_end;
1698 if (end > mem_end)
1699 end = mem_end;
1700
1701 copy_len = end - start;
1702 copy_offset = start - jp->pc;
1703 buf_offset = start - mem_addr;
1704
1705 if (jp->inserted)
1706 memcpy (buf + buf_offset,
1707 fast_tracepoint_jump_shadow (jp) + copy_offset,
1708 copy_len);
1709 }
1710
611cb4a5
DJ
1711 for (; bp != NULL; bp = bp->next)
1712 {
1713 CORE_ADDR bp_end = bp->pc + breakpoint_len;
1714 CORE_ADDR start, end;
1715 int copy_offset, copy_len, buf_offset;
1716
802e8e6d
PA
1717 if (bp->raw_type != raw_bkpt_type_sw)
1718 continue;
1719
6bf36717
JK
1720 gdb_assert (bp->old_data >= buf + mem_len
1721 || buf >= &bp->old_data[sizeof (bp->old_data)]);
1722
611cb4a5
DJ
1723 if (mem_addr >= bp_end)
1724 continue;
1725 if (bp->pc >= mem_end)
1726 continue;
1727
1728 start = bp->pc;
1729 if (mem_addr > start)
1730 start = mem_addr;
1731
1732 end = bp_end;
1733 if (end > mem_end)
1734 end = mem_end;
1735
1736 copy_len = end - start;
1737 copy_offset = start - bp->pc;
1738 buf_offset = start - mem_addr;
1739
802e8e6d 1740 if (bp->inserted > 0)
d3bbe7a0
PA
1741 {
1742 if (validate_inserted_breakpoint (bp))
1743 memcpy (buf + buf_offset, bp->old_data + copy_offset, copy_len);
1744 else
1745 disabled_one = 1;
1746 }
611cb4a5 1747 }
d3bbe7a0
PA
1748
1749 if (disabled_one)
1750 delete_disabled_breakpoints ();
611cb4a5
DJ
1751}
1752
1753void
b9fd1791
PA
1754check_mem_write (CORE_ADDR mem_addr, unsigned char *buf,
1755 const unsigned char *myaddr, int mem_len)
611cb4a5 1756{
95954743 1757 struct process_info *proc = current_process ();
8b07ae33 1758 struct raw_breakpoint *bp = proc->raw_breakpoints;
fa593d66 1759 struct fast_tracepoint_jump *jp = proc->fast_tracepoint_jumps;
611cb4a5 1760 CORE_ADDR mem_end = mem_addr + mem_len;
d3bbe7a0 1761 int disabled_one = 0;
611cb4a5 1762
fa593d66
PA
1763 /* First fast tracepoint jumps, then breakpoint traps on top. */
1764
1765 for (; jp != NULL; jp = jp->next)
1766 {
1767 CORE_ADDR jp_end = jp->pc + jp->length;
1768 CORE_ADDR start, end;
1769 int copy_offset, copy_len, buf_offset;
1770
6bf36717
JK
1771 gdb_assert (fast_tracepoint_jump_shadow (jp) >= myaddr + mem_len
1772 || myaddr >= fast_tracepoint_jump_shadow (jp) + (jp)->length);
1773 gdb_assert (fast_tracepoint_jump_insn (jp) >= buf + mem_len
1774 || buf >= fast_tracepoint_jump_insn (jp) + (jp)->length);
1775
fa593d66
PA
1776 if (mem_addr >= jp_end)
1777 continue;
1778 if (jp->pc >= mem_end)
1779 continue;
1780
1781 start = jp->pc;
1782 if (mem_addr > start)
1783 start = mem_addr;
1784
1785 end = jp_end;
1786 if (end > mem_end)
1787 end = mem_end;
1788
1789 copy_len = end - start;
1790 copy_offset = start - jp->pc;
1791 buf_offset = start - mem_addr;
1792
1793 memcpy (fast_tracepoint_jump_shadow (jp) + copy_offset,
b9fd1791 1794 myaddr + buf_offset, copy_len);
fa593d66
PA
1795 if (jp->inserted)
1796 memcpy (buf + buf_offset,
1797 fast_tracepoint_jump_insn (jp) + copy_offset, copy_len);
1798 }
1799
611cb4a5
DJ
1800 for (; bp != NULL; bp = bp->next)
1801 {
1802 CORE_ADDR bp_end = bp->pc + breakpoint_len;
1803 CORE_ADDR start, end;
1804 int copy_offset, copy_len, buf_offset;
1805
802e8e6d
PA
1806 if (bp->raw_type != raw_bkpt_type_sw)
1807 continue;
1808
6bf36717
JK
1809 gdb_assert (bp->old_data >= myaddr + mem_len
1810 || myaddr >= &bp->old_data[sizeof (bp->old_data)]);
1811
611cb4a5
DJ
1812 if (mem_addr >= bp_end)
1813 continue;
1814 if (bp->pc >= mem_end)
1815 continue;
1816
1817 start = bp->pc;
1818 if (mem_addr > start)
1819 start = mem_addr;
1820
1821 end = bp_end;
1822 if (end > mem_end)
1823 end = mem_end;
1824
1825 copy_len = end - start;
1826 copy_offset = start - bp->pc;
1827 buf_offset = start - mem_addr;
1828
b9fd1791 1829 memcpy (bp->old_data + copy_offset, myaddr + buf_offset, copy_len);
802e8e6d 1830 if (bp->inserted > 0)
d3bbe7a0
PA
1831 {
1832 if (validate_inserted_breakpoint (bp))
1833 memcpy (buf + buf_offset, breakpoint_data + copy_offset, copy_len);
1834 else
1835 disabled_one = 1;
1836 }
611cb4a5 1837 }
d3bbe7a0
PA
1838
1839 if (disabled_one)
1840 delete_disabled_breakpoints ();
611cb4a5 1841}
ae13219e 1842
95954743 1843/* Delete all breakpoints, and un-insert them from the inferior. */
ae13219e
DJ
1844
1845void
1846delete_all_breakpoints (void)
1847{
95954743
PA
1848 struct process_info *proc = current_process ();
1849
1850 while (proc->breakpoints)
8b07ae33 1851 delete_breakpoint_1 (proc, proc->breakpoints);
95954743
PA
1852}
1853
f9e39928 1854/* Clear the "inserted" flag in all breakpoints. */
95954743
PA
1855
1856void
f9e39928 1857mark_breakpoints_out (struct process_info *proc)
95954743 1858{
8b07ae33 1859 struct raw_breakpoint *raw_bp;
95954743 1860
8b07ae33
PA
1861 for (raw_bp = proc->raw_breakpoints; raw_bp != NULL; raw_bp = raw_bp->next)
1862 raw_bp->inserted = 0;
f9e39928
PA
1863}
1864
1865/* Release all breakpoints, but do not try to un-insert them from the
1866 inferior. */
1867
1868void
1869free_all_breakpoints (struct process_info *proc)
1870{
1871 mark_breakpoints_out (proc);
8b07ae33
PA
1872
1873 /* Note: use PROC explicitly instead of deferring to
1874 delete_all_breakpoints --- CURRENT_INFERIOR may already have been
1875 released when we get here. There should be no call to
1876 current_process from here on. */
95954743 1877 while (proc->breakpoints)
8b07ae33 1878 delete_breakpoint_1 (proc, proc->breakpoints);
ae13219e 1879}
This page took 1.15152 seconds and 4 git commands to generate.