gdb/testsuite: Bump up `match_max'
[deliverable/binutils-gdb.git] / gdb / inf-ttrace.c
CommitLineData
eee22bf8
MK
1/* Low-level child interface to ttrace.
2
ecd75fc8 3 Copyright (C) 2004-2014 Free Software Foundation, Inc.
eee22bf8
MK
4
5 This file is part of GDB.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
eee22bf8
MK
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
eee22bf8
MK
19
20#include "defs.h"
21
22/* The ttrace(2) system call didn't exist before HP-UX 10.30. Don't
23 try to compile this code unless we have it. */
24#ifdef HAVE_TTRACE
25
26#include "command.h"
27#include "gdbcore.h"
a7be7fa8 28#include "gdbthread.h"
eee22bf8 29#include "inferior.h"
191c4426 30#include "terminal.h"
eee22bf8
MK
31#include "target.h"
32
33#include "gdb_assert.h"
0e9f083f 34#include <string.h>
932936f0 35#include <sys/mman.h>
eee22bf8 36#include <sys/ttrace.h>
438ac09b 37#include <signal.h>
eee22bf8
MK
38
39#include "inf-child.h"
40#include "inf-ttrace.h"
21ff4686 41#include "common/filestuff.h"
eee22bf8 42
932936f0
MK
43\f
44
a7be7fa8
MK
45/* HP-UX uses a threading model where each user-space thread
46 corresponds to a kernel thread. These kernel threads are called
47 lwps. The ttrace(2) interface gives us almost full control over
48 the threads, which makes it very easy to support them in GDB. We
49 identify the threads by process ID and lwp ID. The ttrace(2) also
50 provides us with a thread's user ID (in the `tts_user_tid' member
51 of `ttstate_t') but we don't use that (yet) as it isn't necessary
52 to uniquely label the thread. */
53
54/* Number of active lwps. */
55static int inf_ttrace_num_lwps;
56\f
57
932936f0
MK
58/* On HP-UX versions that have the ttrace(2) system call, we can
59 implement "hardware" watchpoints by fiddling with the protection of
60 pages in the address space that contain the variable being watched.
61 In order to implement this, we keep a dictionary of pages for which
62 we have changed the protection. */
63
64struct inf_ttrace_page
65{
66 CORE_ADDR addr; /* Page address. */
67 int prot; /* Protection. */
68 int refcount; /* Reference count. */
69 struct inf_ttrace_page *next;
70 struct inf_ttrace_page *prev;
71};
72
73struct inf_ttrace_page_dict
74{
75 struct inf_ttrace_page buckets[128];
76 int pagesize; /* Page size. */
77 int count; /* Number of pages in this dictionary. */
78} inf_ttrace_page_dict;
79
60e2c248
JG
80struct inf_ttrace_private_thread_info
81{
82 int dying;
83};
84
a7be7fa8
MK
85/* Number of lwps that are currently in a system call. */
86static int inf_ttrace_num_lwps_in_syscall;
932936f0
MK
87
88/* Flag to indicate whether we should re-enable page protections after
89 the next wait. */
90static int inf_ttrace_reenable_page_protections;
91
92/* Enable system call events for process PID. */
93
94static void
95inf_ttrace_enable_syscall_events (pid_t pid)
96{
97 ttevent_t tte;
98 ttstate_t tts;
99
a7be7fa8 100 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
932936f0
MK
101
102 if (ttrace (TT_PROC_GET_EVENT_MASK, pid, 0,
103 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 104 perror_with_name (("ttrace"));
932936f0
MK
105
106 tte.tte_events |= (TTEVT_SYSCALL_ENTRY | TTEVT_SYSCALL_RETURN);
107
108 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
109 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 110 perror_with_name (("ttrace"));
932936f0
MK
111
112 if (ttrace (TT_PROC_GET_FIRST_LWP_STATE, pid, 0,
113 (uintptr_t)&tts, sizeof tts, 0) == -1)
e2e0b3e5 114 perror_with_name (("ttrace"));
932936f0
MK
115
116 if (tts.tts_flags & TTS_INSYSCALL)
a7be7fa8 117 inf_ttrace_num_lwps_in_syscall++;
932936f0
MK
118
119 /* FIXME: Handle multiple threads. */
120}
121
122/* Disable system call events for process PID. */
123
124static void
125inf_ttrace_disable_syscall_events (pid_t pid)
126{
127 ttevent_t tte;
128
129 gdb_assert (inf_ttrace_page_dict.count == 0);
130
131 if (ttrace (TT_PROC_GET_EVENT_MASK, pid, 0,
132 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 133 perror_with_name (("ttrace"));
932936f0
MK
134
135 tte.tte_events &= ~(TTEVT_SYSCALL_ENTRY | TTEVT_SYSCALL_RETURN);
136
137 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
138 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 139 perror_with_name (("ttrace"));
932936f0 140
a7be7fa8 141 inf_ttrace_num_lwps_in_syscall = 0;
932936f0
MK
142}
143
144/* Get information about the page at address ADDR for process PID from
145 the dictionary. */
146
147static struct inf_ttrace_page *
148inf_ttrace_get_page (pid_t pid, CORE_ADDR addr)
149{
150 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
151 const int pagesize = inf_ttrace_page_dict.pagesize;
152 int bucket;
153 struct inf_ttrace_page *page;
154
155 bucket = (addr / pagesize) % num_buckets;
156 page = &inf_ttrace_page_dict.buckets[bucket];
157 while (page)
158 {
159 if (page->addr == addr)
160 break;
161
162 page = page->next;
163 }
164
165 return page;
166}
167
168/* Add the page at address ADDR for process PID to the dictionary. */
169
170static struct inf_ttrace_page *
171inf_ttrace_add_page (pid_t pid, CORE_ADDR addr)
172{
173 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
174 const int pagesize = inf_ttrace_page_dict.pagesize;
175 int bucket;
176 struct inf_ttrace_page *page;
177 struct inf_ttrace_page *prev = NULL;
178
179 bucket = (addr / pagesize) % num_buckets;
180 page = &inf_ttrace_page_dict.buckets[bucket];
181 while (page)
182 {
183 if (page->addr == addr)
184 break;
185
186 prev = page;
187 page = page->next;
188 }
189
190 if (!page)
191 {
192 int prot;
193
194 if (ttrace (TT_PROC_GET_MPROTECT, pid, 0,
195 addr, 0, (uintptr_t)&prot) == -1)
e2e0b3e5 196 perror_with_name (("ttrace"));
932936f0 197
70ba0933 198 page = XNEW (struct inf_ttrace_page);
932936f0
MK
199 page->addr = addr;
200 page->prot = prot;
201 page->refcount = 0;
202 page->next = NULL;
203
204 page->prev = prev;
205 prev->next = page;
206
207 inf_ttrace_page_dict.count++;
208 if (inf_ttrace_page_dict.count == 1)
209 inf_ttrace_enable_syscall_events (pid);
210
a7be7fa8 211 if (inf_ttrace_num_lwps_in_syscall == 0)
932936f0
MK
212 {
213 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
214 addr, pagesize, prot & ~PROT_WRITE) == -1)
e2e0b3e5 215 perror_with_name (("ttrace"));
932936f0
MK
216 }
217 }
218
219 return page;
220}
221
222/* Insert the page at address ADDR of process PID to the dictionary. */
223
224static void
225inf_ttrace_insert_page (pid_t pid, CORE_ADDR addr)
226{
227 struct inf_ttrace_page *page;
228
229 page = inf_ttrace_get_page (pid, addr);
230 if (!page)
231 page = inf_ttrace_add_page (pid, addr);
232
233 page->refcount++;
234}
235
236/* Remove the page at address ADDR of process PID from the dictionary. */
237
238static void
239inf_ttrace_remove_page (pid_t pid, CORE_ADDR addr)
240{
241 const int pagesize = inf_ttrace_page_dict.pagesize;
242 struct inf_ttrace_page *page;
243
244 page = inf_ttrace_get_page (pid, addr);
245 page->refcount--;
246
247 gdb_assert (page->refcount >= 0);
248
249 if (page->refcount == 0)
250 {
a7be7fa8 251 if (inf_ttrace_num_lwps_in_syscall == 0)
932936f0
MK
252 {
253 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
254 addr, pagesize, page->prot) == -1)
e2e0b3e5 255 perror_with_name (("ttrace"));
932936f0
MK
256 }
257
258 inf_ttrace_page_dict.count--;
259 if (inf_ttrace_page_dict.count == 0)
260 inf_ttrace_disable_syscall_events (pid);
261
262 page->prev->next = page->next;
263 if (page->next)
264 page->next->prev = page->prev;
265
266 xfree (page);
267 }
268}
269
270/* Mask the bits in PROT from the page protections that are currently
271 in the dictionary for process PID. */
272
273static void
274inf_ttrace_mask_page_protections (pid_t pid, int prot)
275{
276 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
277 const int pagesize = inf_ttrace_page_dict.pagesize;
278 int bucket;
279
280 for (bucket = 0; bucket < num_buckets; bucket++)
281 {
282 struct inf_ttrace_page *page;
283
284 page = inf_ttrace_page_dict.buckets[bucket].next;
285 while (page)
286 {
287 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
288 page->addr, pagesize, page->prot & ~prot) == -1)
e2e0b3e5 289 perror_with_name (("ttrace"));
932936f0
MK
290
291 page = page->next;
292 }
293 }
294}
295
296/* Write-protect the pages in the dictionary for process PID. */
297
298static void
299inf_ttrace_enable_page_protections (pid_t pid)
300{
301 inf_ttrace_mask_page_protections (pid, PROT_WRITE);
302}
303
304/* Restore the protection of the pages in the dictionary for process
305 PID. */
306
307static void
308inf_ttrace_disable_page_protections (pid_t pid)
309{
310 inf_ttrace_mask_page_protections (pid, 0);
311}
312
313/* Insert a "hardware" watchpoint for LEN bytes at address ADDR of
314 type TYPE. */
315
316static int
7bb99c53
TT
317inf_ttrace_insert_watchpoint (struct target_ops *self,
318 CORE_ADDR addr, int len, int type,
0cf6dd15 319 struct expression *cond)
932936f0
MK
320{
321 const int pagesize = inf_ttrace_page_dict.pagesize;
322 pid_t pid = ptid_get_pid (inferior_ptid);
323 CORE_ADDR page_addr;
324 int num_pages;
325 int page;
326
327 gdb_assert (type == hw_write);
328
329 page_addr = (addr / pagesize) * pagesize;
330 num_pages = (len + pagesize - 1) / pagesize;
331
332 for (page = 0; page < num_pages; page++, page_addr += pagesize)
333 inf_ttrace_insert_page (pid, page_addr);
334
335 return 1;
336}
337
338/* Remove a "hardware" watchpoint for LEN bytes at address ADDR of
339 type TYPE. */
340
341static int
11b5219a
TT
342inf_ttrace_remove_watchpoint (struct target_ops *self,
343 CORE_ADDR addr, int len, int type,
0cf6dd15 344 struct expression *cond)
932936f0
MK
345{
346 const int pagesize = inf_ttrace_page_dict.pagesize;
347 pid_t pid = ptid_get_pid (inferior_ptid);
348 CORE_ADDR page_addr;
349 int num_pages;
350 int page;
351
352 gdb_assert (type == hw_write);
353
354 page_addr = (addr / pagesize) * pagesize;
355 num_pages = (len + pagesize - 1) / pagesize;
356
357 for (page = 0; page < num_pages; page++, page_addr += pagesize)
358 inf_ttrace_remove_page (pid, page_addr);
359
360 return 1;
361}
362
363static int
5461485a
TT
364inf_ttrace_can_use_hw_breakpoint (struct target_ops *self,
365 int type, int len, int ot)
932936f0
MK
366{
367 return (type == bp_hardware_watchpoint);
368}
369
370static int
31568a15
TT
371inf_ttrace_region_ok_for_hw_watchpoint (struct target_ops *self,
372 CORE_ADDR addr, int len)
932936f0
MK
373{
374 return 1;
375}
376
377/* Return non-zero if the current inferior was (potentially) stopped
378 by hitting a "hardware" watchpoint. */
379
380static int
6a109b6b 381inf_ttrace_stopped_by_watchpoint (struct target_ops *ops)
932936f0
MK
382{
383 pid_t pid = ptid_get_pid (inferior_ptid);
384 lwpid_t lwpid = ptid_get_lwp (inferior_ptid);
385 ttstate_t tts;
386
387 if (inf_ttrace_page_dict.count > 0)
388 {
389 if (ttrace (TT_LWP_GET_STATE, pid, lwpid,
390 (uintptr_t)&tts, sizeof tts, 0) == -1)
e2e0b3e5 391 perror_with_name (("ttrace"));
932936f0
MK
392
393 if (tts.tts_event == TTEVT_SIGNAL
394 && tts.tts_u.tts_signal.tts_signo == SIGBUS)
395 {
396 const int pagesize = inf_ttrace_page_dict.pagesize;
397 void *addr = tts.tts_u.tts_signal.tts_siginfo.si_addr;
398 CORE_ADDR page_addr = ((uintptr_t)addr / pagesize) * pagesize;
399
400 if (inf_ttrace_get_page (pid, page_addr))
401 return 1;
402 }
403 }
404
405 return 0;
406}
407\f
eee22bf8 408
b2a4db28
MK
409/* When tracking a vfork(2), we cannot detach from the parent until
410 after the child has called exec(3) or has exited. If we are still
411 attached to the parent, this variable will be set to the process ID
412 of the parent. Otherwise it will be set to zero. */
413static pid_t inf_ttrace_vfork_ppid = -1;
414
415static int
07107ca6
LM
416inf_ttrace_follow_fork (struct target_ops *ops, int follow_child,
417 int detach_fork)
b2a4db28
MK
418{
419 pid_t pid, fpid;
420 lwpid_t lwpid, flwpid;
421 ttstate_t tts;
e58b0e63
PA
422 struct thread_info *tp = inferior_thread ();
423
424 gdb_assert (tp->pending_follow.kind == TARGET_WAITKIND_FORKED
425 || tp->pending_follow.kind == TARGET_WAITKIND_VFORKED);
426
427 pid = ptid_get_pid (inferior_ptid);
428 lwpid = ptid_get_lwp (inferior_ptid);
b2a4db28
MK
429
430 /* Get all important details that core GDB doesn't (and shouldn't)
431 know about. */
432 if (ttrace (TT_LWP_GET_STATE, pid, lwpid,
433 (uintptr_t)&tts, sizeof tts, 0) == -1)
434 perror_with_name (("ttrace"));
435
436 gdb_assert (tts.tts_event == TTEVT_FORK || tts.tts_event == TTEVT_VFORK);
437
438 if (tts.tts_u.tts_fork.tts_isparent)
439 {
440 pid = tts.tts_pid;
441 lwpid = tts.tts_lwpid;
442 fpid = tts.tts_u.tts_fork.tts_fpid;
443 flwpid = tts.tts_u.tts_fork.tts_flwpid;
444 }
445 else
446 {
447 pid = tts.tts_u.tts_fork.tts_fpid;
448 lwpid = tts.tts_u.tts_fork.tts_flwpid;
449 fpid = tts.tts_pid;
450 flwpid = tts.tts_lwpid;
451 }
452
453 if (follow_child)
454 {
77435e4c 455 struct inferior *inf;
191c4426
PA
456 struct inferior *parent_inf;
457
458 parent_inf = find_inferior_pid (pid);
77435e4c 459
b2a4db28 460 inferior_ptid = ptid_build (fpid, flwpid, 0);
77435e4c 461 inf = add_inferior (fpid);
191c4426 462 inf->attach_flag = parent_inf->attach_flag;
6c95b8df
PA
463 inf->pspace = parent_inf->pspace;
464 inf->aspace = parent_inf->aspace;
191c4426 465 copy_terminal_info (inf, parent_inf);
d80ee84f 466 detach_breakpoints (ptid_build (pid, lwpid, 0));
b2a4db28
MK
467
468 target_terminal_ours ();
3e43a32a
MS
469 fprintf_unfiltered (gdb_stdlog,
470 _("Attaching after fork to child process %ld.\n"),
471 (long)fpid);
b2a4db28
MK
472 }
473 else
474 {
475 inferior_ptid = ptid_build (pid, lwpid, 0);
2dcc6086
JB
476 /* Detach any remaining breakpoints in the child. In the case
477 of fork events, we do not need to do this, because breakpoints
478 should have already been removed earlier. */
479 if (tts.tts_event == TTEVT_VFORK)
d80ee84f 480 detach_breakpoints (ptid_build (fpid, flwpid, 0));
b2a4db28
MK
481
482 target_terminal_ours ();
3e43a32a
MS
483 fprintf_unfiltered (gdb_stdlog,
484 _("Detaching after fork from child process %ld.\n"),
485 (long)fpid);
b2a4db28
MK
486 }
487
488 if (tts.tts_event == TTEVT_VFORK)
489 {
490 gdb_assert (!tts.tts_u.tts_fork.tts_isparent);
491
492 if (follow_child)
493 {
494 /* We can't detach from the parent yet. */
495 inf_ttrace_vfork_ppid = pid;
496
497 reattach_breakpoints (fpid);
498 }
499 else
500 {
501 if (ttrace (TT_PROC_DETACH, fpid, 0, 0, 0, 0) == -1)
502 perror_with_name (("ttrace"));
503
504 /* Wait till we get the TTEVT_VFORK event in the parent.
505 This indicates that the child has called exec(3) or has
506 exited and that the parent is ready to be traced again. */
507 if (ttrace_wait (pid, lwpid, TTRACE_WAITOK, &tts, sizeof tts) == -1)
508 perror_with_name (("ttrace_wait"));
509 gdb_assert (tts.tts_event == TTEVT_VFORK);
510 gdb_assert (tts.tts_u.tts_fork.tts_isparent);
511
512 reattach_breakpoints (pid);
513 }
514 }
515 else
516 {
517 gdb_assert (tts.tts_u.tts_fork.tts_isparent);
518
519 if (follow_child)
520 {
521 if (ttrace (TT_PROC_DETACH, pid, 0, 0, 0, 0) == -1)
522 perror_with_name (("ttrace"));
523 }
524 else
525 {
526 if (ttrace (TT_PROC_DETACH, fpid, 0, 0, 0, 0) == -1)
527 perror_with_name (("ttrace"));
528 }
529 }
530
531 if (follow_child)
532 {
2935f27f
PA
533 struct thread_info *ti;
534
b2a4db28 535 /* The child will start out single-threaded. */
2935f27f 536 inf_ttrace_num_lwps = 1;
b2a4db28
MK
537 inf_ttrace_num_lwps_in_syscall = 0;
538
2935f27f
PA
539 /* Delete parent. */
540 delete_thread_silent (ptid_build (pid, lwpid, 0));
7f9f62ba 541 detach_inferior (pid);
2935f27f 542
7f9f62ba 543 /* Add child thread. inferior_ptid was already set above. */
2935f27f
PA
544 ti = add_thread_silent (inferior_ptid);
545 ti->private =
546 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
547 memset (ti->private, 0,
548 sizeof (struct inf_ttrace_private_thread_info));
b2a4db28
MK
549 }
550
551 return 0;
552}
553\f
554
eee22bf8
MK
555/* File descriptors for pipes used as semaphores during initial
556 startup of an inferior. */
557static int inf_ttrace_pfd1[2];
558static int inf_ttrace_pfd2[2];
559
560static void
561do_cleanup_pfds (void *dummy)
562{
563 close (inf_ttrace_pfd1[0]);
564 close (inf_ttrace_pfd1[1]);
565 close (inf_ttrace_pfd2[0]);
566 close (inf_ttrace_pfd2[1]);
21ff4686
TT
567
568 unmark_fd_no_cloexec (inf_ttrace_pfd1[0]);
569 unmark_fd_no_cloexec (inf_ttrace_pfd1[1]);
570 unmark_fd_no_cloexec (inf_ttrace_pfd2[0]);
571 unmark_fd_no_cloexec (inf_ttrace_pfd2[1]);
eee22bf8
MK
572}
573
574static void
575inf_ttrace_prepare (void)
576{
577 if (pipe (inf_ttrace_pfd1) == -1)
a3f17187 578 perror_with_name (("pipe"));
eee22bf8
MK
579
580 if (pipe (inf_ttrace_pfd2) == -1)
581 {
582 close (inf_ttrace_pfd1[0]);
583 close (inf_ttrace_pfd2[0]);
a3f17187 584 perror_with_name (("pipe"));
eee22bf8 585 }
21ff4686
TT
586
587 mark_fd_no_cloexec (inf_ttrace_pfd1[0]);
588 mark_fd_no_cloexec (inf_ttrace_pfd1[1]);
589 mark_fd_no_cloexec (inf_ttrace_pfd2[0]);
590 mark_fd_no_cloexec (inf_ttrace_pfd2[1]);
eee22bf8
MK
591}
592
593/* Prepare to be traced. */
594
595static void
596inf_ttrace_me (void)
597{
598 struct cleanup *old_chain = make_cleanup (do_cleanup_pfds, 0);
599 char c;
600
601 /* "Trace me, Dr. Memory!" */
602 if (ttrace (TT_PROC_SETTRC, 0, 0, 0, TT_VERSION, 0) == -1)
e2e0b3e5 603 perror_with_name (("ttrace"));
eee22bf8
MK
604
605 /* Tell our parent that we are ready to be traced. */
606 if (write (inf_ttrace_pfd1[1], &c, sizeof c) != sizeof c)
e2e0b3e5 607 perror_with_name (("write"));
eee22bf8
MK
608
609 /* Wait until our parent has set the initial event mask. */
610 if (read (inf_ttrace_pfd2[0], &c, sizeof c) != sizeof c)
e2e0b3e5 611 perror_with_name (("read"));
eee22bf8
MK
612
613 do_cleanups (old_chain);
614}
615
616/* Start tracing PID. */
617
618static void
28439f5e 619inf_ttrace_him (struct target_ops *ops, int pid)
eee22bf8
MK
620{
621 struct cleanup *old_chain = make_cleanup (do_cleanup_pfds, 0);
622 ttevent_t tte;
eee22bf8
MK
623 char c;
624
625 /* Wait until our child is ready to be traced. */
626 if (read (inf_ttrace_pfd1[0], &c, sizeof c) != sizeof c)
e2e0b3e5 627 perror_with_name (("read"));
eee22bf8
MK
628
629 /* Set the initial event mask. */
630 memset (&tte, 0, sizeof (tte));
b2a4db28 631 tte.tte_events |= TTEVT_EXEC | TTEVT_EXIT | TTEVT_FORK | TTEVT_VFORK;
a7be7fa8 632 tte.tte_events |= TTEVT_LWP_CREATE | TTEVT_LWP_EXIT | TTEVT_LWP_TERMINATE;
7ba0e0c2
MK
633#ifdef TTEVT_BPT_SSTEP
634 tte.tte_events |= TTEVT_BPT_SSTEP;
635#endif
b2a4db28 636 tte.tte_opts |= TTEO_PROC_INHERIT;
eee22bf8
MK
637 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
638 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 639 perror_with_name (("ttrace"));
eee22bf8
MK
640
641 /* Tell our child that we have set the initial event mask. */
642 if (write (inf_ttrace_pfd2[1], &c, sizeof c) != sizeof c)
e2e0b3e5 643 perror_with_name (("write"));
eee22bf8
MK
644
645 do_cleanups (old_chain);
646
6a3cb8e8
PA
647 if (!target_is_pushed (ops))
648 push_target (ops);
eee22bf8 649
eee22bf8
MK
650 startup_inferior (START_INFERIOR_TRAPS_EXPECTED);
651
652 /* On some targets, there must be some explicit actions taken after
653 the inferior has been started up. */
654 target_post_startup_inferior (pid_to_ptid (pid));
655}
656
657static void
136d6dae
VP
658inf_ttrace_create_inferior (struct target_ops *ops, char *exec_file,
659 char *allargs, char **env, int from_tty)
eee22bf8 660{
28439f5e
PA
661 int pid;
662
a7be7fa8
MK
663 gdb_assert (inf_ttrace_num_lwps == 0);
664 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
932936f0 665 gdb_assert (inf_ttrace_page_dict.count == 0);
932936f0 666 gdb_assert (inf_ttrace_reenable_page_protections == 0);
b2a4db28 667 gdb_assert (inf_ttrace_vfork_ppid == -1);
932936f0 668
28439f5e 669 pid = fork_inferior (exec_file, allargs, env, inf_ttrace_me, NULL,
e69860f1 670 inf_ttrace_prepare, NULL, NULL);
28439f5e
PA
671
672 inf_ttrace_him (ops, pid);
eee22bf8
MK
673}
674
eee22bf8 675static void
136d6dae 676inf_ttrace_mourn_inferior (struct target_ops *ops)
eee22bf8 677{
932936f0
MK
678 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
679 int bucket;
680
a7be7fa8
MK
681 inf_ttrace_num_lwps = 0;
682 inf_ttrace_num_lwps_in_syscall = 0;
932936f0
MK
683
684 for (bucket = 0; bucket < num_buckets; bucket++)
685 {
686 struct inf_ttrace_page *page;
687 struct inf_ttrace_page *next;
688
689 page = inf_ttrace_page_dict.buckets[bucket].next;
690 while (page)
691 {
692 next = page->next;
693 xfree (page);
694 page = next;
695 }
696 }
697 inf_ttrace_page_dict.count = 0;
698
eee22bf8 699 generic_mourn_inferior ();
6a3cb8e8 700 inf_child_maybe_unpush_target (ops);
eee22bf8
MK
701}
702
f688d93f
JB
703/* Assuming we just attached the debugger to a new inferior, create
704 a new thread_info structure for each thread, and add it to our
705 list of threads. */
706
707static void
708inf_ttrace_create_threads_after_attach (int pid)
709{
710 int status;
711 ptid_t ptid;
712 ttstate_t tts;
713 struct thread_info *ti;
714
715 status = ttrace (TT_PROC_GET_FIRST_LWP_STATE, pid, 0,
716 (uintptr_t) &tts, sizeof (ttstate_t), 0);
717 if (status < 0)
718 perror_with_name (_("TT_PROC_GET_FIRST_LWP_STATE ttrace call failed"));
719 gdb_assert (tts.tts_pid == pid);
720
721 /* Add the stopped thread. */
722 ptid = ptid_build (pid, tts.tts_lwpid, 0);
723 ti = add_thread (ptid);
724 ti->private = xzalloc (sizeof (struct inf_ttrace_private_thread_info));
725 inf_ttrace_num_lwps++;
726
727 /* We use the "first stopped thread" as the currently active thread. */
728 inferior_ptid = ptid;
729
730 /* Iterative over all the remaining threads. */
731
732 for (;;)
733 {
734 ptid_t ptid;
735
736 status = ttrace (TT_PROC_GET_NEXT_LWP_STATE, pid, 0,
737 (uintptr_t) &tts, sizeof (ttstate_t), 0);
738 if (status < 0)
739 perror_with_name (_("TT_PROC_GET_NEXT_LWP_STATE ttrace call failed"));
740 if (status == 0)
741 break; /* End of list. */
742
743 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
744 ti = add_thread (ptid);
745 ti->private = xzalloc (sizeof (struct inf_ttrace_private_thread_info));
746 inf_ttrace_num_lwps++;
747 }
748}
749
eee22bf8 750static void
136d6dae 751inf_ttrace_attach (struct target_ops *ops, char *args, int from_tty)
eee22bf8
MK
752{
753 char *exec_file;
754 pid_t pid;
932936f0 755 ttevent_t tte;
181e7f93 756 struct inferior *inf;
eee22bf8 757
74164c56 758 pid = parse_pid_to_attach (args);
eee22bf8
MK
759
760 if (pid == getpid ()) /* Trying to masturbate? */
8a3fe4f8 761 error (_("I refuse to debug myself!"));
eee22bf8
MK
762
763 if (from_tty)
764 {
346e281c 765 exec_file = get_exec_file (0);
eee22bf8
MK
766
767 if (exec_file)
a3f17187 768 printf_unfiltered (_("Attaching to program: %s, %s\n"), exec_file,
eee22bf8
MK
769 target_pid_to_str (pid_to_ptid (pid)));
770 else
a3f17187 771 printf_unfiltered (_("Attaching to %s\n"),
eee22bf8
MK
772 target_pid_to_str (pid_to_ptid (pid)));
773
774 gdb_flush (gdb_stdout);
775 }
776
a7be7fa8
MK
777 gdb_assert (inf_ttrace_num_lwps == 0);
778 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
b2a4db28 779 gdb_assert (inf_ttrace_vfork_ppid == -1);
a7be7fa8 780
eee22bf8 781 if (ttrace (TT_PROC_ATTACH, pid, 0, TT_KILL_ON_EXIT, TT_VERSION, 0) == -1)
e2e0b3e5 782 perror_with_name (("ttrace"));
eee22bf8 783
6c95b8df
PA
784 inf = current_inferior ();
785 inferior_appeared (inf, pid);
181e7f93 786 inf->attach_flag = 1;
7f9f62ba 787
932936f0 788 /* Set the initial event mask. */
932936f0 789 memset (&tte, 0, sizeof (tte));
b2a4db28 790 tte.tte_events |= TTEVT_EXEC | TTEVT_EXIT | TTEVT_FORK | TTEVT_VFORK;
a7be7fa8 791 tte.tte_events |= TTEVT_LWP_CREATE | TTEVT_LWP_EXIT | TTEVT_LWP_TERMINATE;
7ba0e0c2
MK
792#ifdef TTEVT_BPT_SSTEP
793 tte.tte_events |= TTEVT_BPT_SSTEP;
794#endif
b2a4db28 795 tte.tte_opts |= TTEO_PROC_INHERIT;
932936f0
MK
796 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
797 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 798 perror_with_name (("ttrace"));
932936f0 799
6a3cb8e8
PA
800 if (!target_is_pushed (ops))
801 push_target (ops);
2935f27f 802
f688d93f 803 inf_ttrace_create_threads_after_attach (pid);
eee22bf8
MK
804}
805
806static void
52554a0e 807inf_ttrace_detach (struct target_ops *ops, const char *args, int from_tty)
eee22bf8 808{
eee22bf8 809 pid_t pid = ptid_get_pid (inferior_ptid);
5d426ff1 810 int sig = 0;
eee22bf8
MK
811
812 if (from_tty)
813 {
814 char *exec_file = get_exec_file (0);
815 if (exec_file == 0)
816 exec_file = "";
a3f17187 817 printf_unfiltered (_("Detaching from program: %s, %s\n"), exec_file,
eee22bf8
MK
818 target_pid_to_str (pid_to_ptid (pid)));
819 gdb_flush (gdb_stdout);
820 }
821 if (args)
822 sig = atoi (args);
823
824 /* ??? The HP-UX 11.0 ttrace(2) manual page doesn't mention that we
825 can pass a signal number here. Does this really work? */
826 if (ttrace (TT_PROC_DETACH, pid, 0, 0, sig, 0) == -1)
e2e0b3e5 827 perror_with_name (("ttrace"));
eee22bf8 828
b2a4db28
MK
829 if (inf_ttrace_vfork_ppid != -1)
830 {
831 if (ttrace (TT_PROC_DETACH, inf_ttrace_vfork_ppid, 0, 0, 0, 0) == -1)
832 perror_with_name (("ttrace"));
833 inf_ttrace_vfork_ppid = -1;
834 }
835
a7be7fa8
MK
836 inf_ttrace_num_lwps = 0;
837 inf_ttrace_num_lwps_in_syscall = 0;
932936f0 838
932936f0 839 inferior_ptid = null_ptid;
7f9f62ba
PA
840 detach_inferior (pid);
841
6a3cb8e8 842 inf_child_maybe_unpush_target (ops);
eee22bf8
MK
843}
844
346e281c 845static void
7d85a9c0 846inf_ttrace_kill (struct target_ops *ops)
346e281c
MK
847{
848 pid_t pid = ptid_get_pid (inferior_ptid);
849
850 if (pid == 0)
851 return;
852
853 if (ttrace (TT_PROC_EXIT, pid, 0, 0, 0, 0) == -1)
854 perror_with_name (("ttrace"));
855 /* ??? Is it necessary to call ttrace_wait() here? */
856
857 if (inf_ttrace_vfork_ppid != -1)
858 {
859 if (ttrace (TT_PROC_DETACH, inf_ttrace_vfork_ppid, 0, 0, 0, 0) == -1)
860 perror_with_name (("ttrace"));
861 inf_ttrace_vfork_ppid = -1;
862 }
863
864 target_mourn_inferior ();
865}
866
438ac09b
PA
867/* Check is a dying thread is dead by now, and delete it from GDBs
868 thread list if so. */
7ba0e0c2 869static int
438ac09b 870inf_ttrace_delete_dead_threads_callback (struct thread_info *info, void *arg)
7ba0e0c2 871{
438ac09b
PA
872 lwpid_t lwpid;
873 struct inf_ttrace_private_thread_info *p;
7ba0e0c2 874
438ac09b
PA
875 if (is_exited (info->ptid))
876 return 0;
877
878 lwpid = ptid_get_lwp (info->ptid);
879 p = (struct inf_ttrace_private_thread_info *) info->private;
880
881 /* Check if an lwp that was dying is still there or not. */
882 if (p->dying && (kill (lwpid, 0) == -1))
883 /* It's gone now. */
884 delete_thread (info->ptid);
7ba0e0c2
MK
885
886 return 0;
887}
888
438ac09b
PA
889/* Resume the lwp pointed to by INFO, with REQUEST, and pass it signal
890 SIG. */
891
892static void
893inf_ttrace_resume_lwp (struct thread_info *info, ttreq_t request, int sig)
894{
895 pid_t pid = ptid_get_pid (info->ptid);
896 lwpid_t lwpid = ptid_get_lwp (info->ptid);
897
898 if (ttrace (request, pid, lwpid, TT_NOPC, sig, 0) == -1)
899 {
900 struct inf_ttrace_private_thread_info *p
901 = (struct inf_ttrace_private_thread_info *) info->private;
902 if (p->dying && errno == EPROTO)
903 /* This is expected, it means the dying lwp is really gone
904 by now. If ttrace had an event to inform the debugger
905 the lwp is really gone, this wouldn't be needed. */
906 delete_thread (info->ptid);
907 else
908 /* This was really unexpected. */
909 perror_with_name (("ttrace"));
910 }
911}
912
913/* Callback for iterate_over_threads. */
914
60e2c248 915static int
438ac09b 916inf_ttrace_resume_callback (struct thread_info *info, void *arg)
60e2c248 917{
438ac09b
PA
918 if (!ptid_equal (info->ptid, inferior_ptid) && !is_exited (info->ptid))
919 inf_ttrace_resume_lwp (info, TT_LWP_CONTINUE, 0);
920
60e2c248
JG
921 return 0;
922}
923
eee22bf8 924static void
28439f5e 925inf_ttrace_resume (struct target_ops *ops,
2ea28649 926 ptid_t ptid, int step, enum gdb_signal signal)
eee22bf8 927{
438ac09b 928 int resume_all;
eee22bf8 929 ttreq_t request = step ? TT_LWP_SINGLE : TT_LWP_CONTINUE;
2ea28649 930 int sig = gdb_signal_to_host (signal);
438ac09b 931 struct thread_info *info;
eee22bf8 932
438ac09b
PA
933 /* A specific PTID means `step only this process id'. */
934 resume_all = (ptid_equal (ptid, minus_one_ptid));
eee22bf8 935
438ac09b
PA
936 /* If resuming all threads, it's the current thread that should be
937 handled specially. */
938 if (resume_all)
939 ptid = inferior_ptid;
eee22bf8 940
e09875d4 941 info = find_thread_ptid (ptid);
438ac09b
PA
942 inf_ttrace_resume_lwp (info, request, sig);
943
944 if (resume_all)
945 /* Let all the other threads run too. */
946 iterate_over_threads (inf_ttrace_resume_callback, NULL);
eee22bf8
MK
947}
948
949static ptid_t
117de6a9 950inf_ttrace_wait (struct target_ops *ops,
47608cb1 951 ptid_t ptid, struct target_waitstatus *ourstatus, int options)
eee22bf8
MK
952{
953 pid_t pid = ptid_get_pid (ptid);
954 lwpid_t lwpid = ptid_get_lwp (ptid);
955 ttstate_t tts;
60e2c248 956 struct thread_info *ti;
3a3e9ee3 957 ptid_t related_ptid;
eee22bf8 958
932936f0 959 /* Until proven otherwise. */
a7be7fa8 960 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
eee22bf8
MK
961
962 if (pid == -1)
b2a4db28 963 pid = lwpid = 0;
eee22bf8 964
b2a4db28 965 gdb_assert (pid != 0 || lwpid == 0);
eee22bf8
MK
966
967 do
968 {
969 set_sigint_trap ();
eee22bf8
MK
970
971 if (ttrace_wait (pid, lwpid, TTRACE_WAITOK, &tts, sizeof tts) == -1)
a3f17187 972 perror_with_name (("ttrace_wait"));
eee22bf8 973
b2a4db28
MK
974 if (tts.tts_event == TTEVT_VFORK && tts.tts_u.tts_fork.tts_isparent)
975 {
976 if (inf_ttrace_vfork_ppid != -1)
977 {
978 gdb_assert (inf_ttrace_vfork_ppid == tts.tts_pid);
979
980 if (ttrace (TT_PROC_DETACH, tts.tts_pid, 0, 0, 0, 0) == -1)
981 perror_with_name (("ttrace"));
982 inf_ttrace_vfork_ppid = -1;
983 }
984
985 tts.tts_event = TTEVT_NONE;
986 }
987
eee22bf8
MK
988 clear_sigint_trap ();
989 }
990 while (tts.tts_event == TTEVT_NONE);
991
932936f0
MK
992 /* Now that we've waited, we can re-enable the page protections. */
993 if (inf_ttrace_reenable_page_protections)
994 {
a7be7fa8 995 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
932936f0
MK
996 inf_ttrace_enable_page_protections (tts.tts_pid);
997 inf_ttrace_reenable_page_protections = 0;
998 }
999
a7be7fa8
MK
1000 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
1001
2935f27f
PA
1002 if (inf_ttrace_num_lwps == 0)
1003 {
1004 struct thread_info *ti;
1005
1006 inf_ttrace_num_lwps = 1;
1007
1008 /* This is the earliest we hear about the lwp member of
1009 INFERIOR_PTID, after an attach or fork_inferior. */
1010 gdb_assert (ptid_get_lwp (inferior_ptid) == 0);
1011
1012 /* We haven't set the private member on the main thread yet. Do
1013 it now. */
e09875d4 1014 ti = find_thread_ptid (inferior_ptid);
2935f27f
PA
1015 gdb_assert (ti != NULL && ti->private == NULL);
1016 ti->private =
1017 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
1018 memset (ti->private, 0,
1019 sizeof (struct inf_ttrace_private_thread_info));
1020
1021 /* Notify the core that this ptid changed. This changes
1022 inferior_ptid as well. */
1023 thread_change_ptid (inferior_ptid, ptid);
1024 }
1025
eee22bf8
MK
1026 switch (tts.tts_event)
1027 {
7ba0e0c2
MK
1028#ifdef TTEVT_BPT_SSTEP
1029 case TTEVT_BPT_SSTEP:
1030 /* Make it look like a breakpoint. */
1031 ourstatus->kind = TARGET_WAITKIND_STOPPED;
a493e3e2 1032 ourstatus->value.sig = GDB_SIGNAL_TRAP;
7ba0e0c2
MK
1033 break;
1034#endif
1035
eee22bf8 1036 case TTEVT_EXEC:
5d426ff1
MK
1037 ourstatus->kind = TARGET_WAITKIND_EXECD;
1038 ourstatus->value.execd_pathname =
1039 xmalloc (tts.tts_u.tts_exec.tts_pathlen + 1);
1040 if (ttrace (TT_PROC_GET_PATHNAME, tts.tts_pid, 0,
1041 (uintptr_t)ourstatus->value.execd_pathname,
1042 tts.tts_u.tts_exec.tts_pathlen, 0) == -1)
1043 perror_with_name (("ttrace"));
1044 ourstatus->value.execd_pathname[tts.tts_u.tts_exec.tts_pathlen] = 0;
25b22b0a
PA
1045
1046 /* At this point, all inserted breakpoints are gone. Doing this
1047 as soon as we detect an exec prevents the badness of deleting
1048 a breakpoint writing the current "shadow contents" to lift
1049 the bp. That shadow is NOT valid after an exec. */
1050 mark_breakpoints_out ();
eee22bf8 1051 break;
932936f0 1052
eee22bf8
MK
1053 case TTEVT_EXIT:
1054 store_waitstatus (ourstatus, tts.tts_u.tts_exit.tts_exitcode);
a7be7fa8
MK
1055 inf_ttrace_num_lwps = 0;
1056 break;
1057
b2a4db28 1058 case TTEVT_FORK:
3a3e9ee3
PA
1059 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
1060 tts.tts_u.tts_fork.tts_flwpid, 0);
1061
b2a4db28 1062 ourstatus->kind = TARGET_WAITKIND_FORKED;
3a3e9ee3 1063 ourstatus->value.related_pid = related_ptid;
b2a4db28
MK
1064
1065 /* Make sure the other end of the fork is stopped too. */
1066 if (ttrace_wait (tts.tts_u.tts_fork.tts_fpid,
1067 tts.tts_u.tts_fork.tts_flwpid,
1068 TTRACE_WAITOK, &tts, sizeof tts) == -1)
1069 perror_with_name (("ttrace_wait"));
1070
1071 gdb_assert (tts.tts_event == TTEVT_FORK);
1072 if (tts.tts_u.tts_fork.tts_isparent)
1073 {
3a3e9ee3
PA
1074 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
1075 tts.tts_u.tts_fork.tts_flwpid, 0);
b2a4db28 1076 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
3a3e9ee3 1077 ourstatus->value.related_pid = related_ptid;
b2a4db28
MK
1078 }
1079 break;
1080
1081 case TTEVT_VFORK:
1082 gdb_assert (!tts.tts_u.tts_fork.tts_isparent);
1083
3a3e9ee3
PA
1084 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
1085 tts.tts_u.tts_fork.tts_flwpid, 0);
1086
b2a4db28 1087 ourstatus->kind = TARGET_WAITKIND_VFORKED;
3a3e9ee3 1088 ourstatus->value.related_pid = related_ptid;
b2a4db28
MK
1089
1090 /* HACK: To avoid touching the parent during the vfork, switch
1091 away from it. */
1092 inferior_ptid = ptid;
1093 break;
1094
a7be7fa8
MK
1095 case TTEVT_LWP_CREATE:
1096 lwpid = tts.tts_u.tts_thread.tts_target_lwpid;
1097 ptid = ptid_build (tts.tts_pid, lwpid, 0);
60e2c248
JG
1098 ti = add_thread (ptid);
1099 ti->private =
1100 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
1101 memset (ti->private, 0,
1102 sizeof (struct inf_ttrace_private_thread_info));
a7be7fa8
MK
1103 inf_ttrace_num_lwps++;
1104 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
62a93fa9
PA
1105 /* Let the lwp_create-caller thread continue. */
1106 ttrace (TT_LWP_CONTINUE, ptid_get_pid (ptid),
1107 ptid_get_lwp (ptid), TT_NOPC, 0, 0);
1108 /* Return without stopping the whole process. */
1109 ourstatus->kind = TARGET_WAITKIND_IGNORE;
1110 return ptid;
a7be7fa8
MK
1111
1112 case TTEVT_LWP_EXIT:
17faa917
DJ
1113 if (print_thread_events)
1114 printf_unfiltered (_("[%s exited]\n"), target_pid_to_str (ptid));
e09875d4 1115 ti = find_thread_ptid (ptid);
60e2c248
JG
1116 gdb_assert (ti != NULL);
1117 ((struct inf_ttrace_private_thread_info *)ti->private)->dying = 1;
a7be7fa8 1118 inf_ttrace_num_lwps--;
62a93fa9 1119 /* Let the thread really exit. */
60e2c248
JG
1120 ttrace (TT_LWP_CONTINUE, ptid_get_pid (ptid),
1121 ptid_get_lwp (ptid), TT_NOPC, 0, 0);
62a93fa9
PA
1122 /* Return without stopping the whole process. */
1123 ourstatus->kind = TARGET_WAITKIND_IGNORE;
1124 return ptid;
a7be7fa8
MK
1125
1126 case TTEVT_LWP_TERMINATE:
1127 lwpid = tts.tts_u.tts_thread.tts_target_lwpid;
1128 ptid = ptid_build (tts.tts_pid, lwpid, 0);
62a93fa9 1129 if (print_thread_events)
b861ac81 1130 printf_unfiltered(_("[%s has been terminated]\n"),
62a93fa9 1131 target_pid_to_str (ptid));
e09875d4 1132 ti = find_thread_ptid (ptid);
60e2c248
JG
1133 gdb_assert (ti != NULL);
1134 ((struct inf_ttrace_private_thread_info *)ti->private)->dying = 1;
a7be7fa8 1135 inf_ttrace_num_lwps--;
62a93fa9
PA
1136
1137 /* Resume the lwp_terminate-caller thread. */
a7be7fa8 1138 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
62a93fa9
PA
1139 ttrace (TT_LWP_CONTINUE, ptid_get_pid (ptid),
1140 ptid_get_lwp (ptid), TT_NOPC, 0, 0);
1141 /* Return without stopping the whole process. */
1142 ourstatus->kind = TARGET_WAITKIND_IGNORE;
1143 return ptid;
932936f0 1144
eee22bf8
MK
1145 case TTEVT_SIGNAL:
1146 ourstatus->kind = TARGET_WAITKIND_STOPPED;
1147 ourstatus->value.sig =
2ea28649 1148 gdb_signal_from_host (tts.tts_u.tts_signal.tts_signo);
eee22bf8 1149 break;
932936f0
MK
1150
1151 case TTEVT_SYSCALL_ENTRY:
1152 gdb_assert (inf_ttrace_reenable_page_protections == 0);
a7be7fa8
MK
1153 inf_ttrace_num_lwps_in_syscall++;
1154 if (inf_ttrace_num_lwps_in_syscall == 1)
932936f0
MK
1155 {
1156 /* A thread has just entered a system call. Disable any
1157 page protections as the kernel can't deal with them. */
1158 inf_ttrace_disable_page_protections (tts.tts_pid);
1159 }
1160 ourstatus->kind = TARGET_WAITKIND_SYSCALL_ENTRY;
01dedca2 1161 ourstatus->value.syscall_number = tts.tts_scno;
932936f0
MK
1162 break;
1163
1164 case TTEVT_SYSCALL_RETURN:
a7be7fa8 1165 if (inf_ttrace_num_lwps_in_syscall > 0)
932936f0
MK
1166 {
1167 /* If the last thread has just left the system call, this
1168 would be a logical place to re-enable the page
1169 protections, but that doesn't work. We can't re-enable
1170 them until we've done another wait. */
1171 inf_ttrace_reenable_page_protections =
a7be7fa8
MK
1172 (inf_ttrace_num_lwps_in_syscall == 1);
1173 inf_ttrace_num_lwps_in_syscall--;
932936f0
MK
1174 }
1175 ourstatus->kind = TARGET_WAITKIND_SYSCALL_RETURN;
01dedca2 1176 ourstatus->value.syscall_number = tts.tts_scno;
932936f0 1177 break;
a7be7fa8
MK
1178
1179 default:
1180 gdb_assert (!"Unexpected ttrace event");
1181 break;
eee22bf8
MK
1182 }
1183
1184 /* Make sure all threads within the process are stopped. */
1185 if (ttrace (TT_PROC_STOP, tts.tts_pid, 0, 0, 0, 0) == -1)
e2e0b3e5 1186 perror_with_name (("ttrace"));
eee22bf8 1187
438ac09b
PA
1188 /* Now that the whole process is stopped, check if any dying thread
1189 is really dead by now. If a dying thread is still alive, it will
1190 be stopped too, and will still show up in `info threads', tagged
1191 with "(Exiting)". We could make `info threads' prune dead
1192 threads instead via inf_ttrace_thread_alive, but doing this here
1193 has the advantage that a frontend is notificed sooner of thread
1194 exits. Note that a dying lwp is still alive, it still has to be
1195 resumed, like any other lwp. */
1196 iterate_over_threads (inf_ttrace_delete_dead_threads_callback, NULL);
1197
a7be7fa8 1198 return ptid;
eee22bf8
MK
1199}
1200
1201/* Transfer LEN bytes from ADDR in the inferior's memory into READBUF,
1202 and transfer LEN bytes from WRITEBUF into the inferior's memory at
1203 ADDR. Either READBUF or WRITEBUF may be null, in which case the
1204 corresponding transfer doesn't happen. Return the number of bytes
1205 actually transferred (which may be zero if an error occurs). */
1206
1207static LONGEST
1208inf_ttrace_xfer_memory (CORE_ADDR addr, ULONGEST len,
1209 void *readbuf, const void *writebuf)
1210{
1211 pid_t pid = ptid_get_pid (inferior_ptid);
1212
1213 /* HP-UX treats text space and data space differently. GDB however,
1214 doesn't really know the difference. Therefore we try both. Try
1215 text space before data space though because when we're writing
1216 into text space the instruction cache might need to be flushed. */
1217
1218 if (readbuf
1219 && ttrace (TT_PROC_RDTEXT, pid, 0, addr, len, (uintptr_t)readbuf) == -1
1220 && ttrace (TT_PROC_RDDATA, pid, 0, addr, len, (uintptr_t)readbuf) == -1)
1221 return 0;
1222
1223 if (writebuf
1224 && ttrace (TT_PROC_WRTEXT, pid, 0, addr, len, (uintptr_t)writebuf) == -1
1225 && ttrace (TT_PROC_WRDATA, pid, 0, addr, len, (uintptr_t)writebuf) == -1)
1226 return 0;
1227
1228 return len;
1229}
1230
9b409511 1231static enum target_xfer_status
eee22bf8 1232inf_ttrace_xfer_partial (struct target_ops *ops, enum target_object object,
7a4609f7 1233 const char *annex, gdb_byte *readbuf,
3e43a32a 1234 const gdb_byte *writebuf,
9b409511 1235 ULONGEST offset, ULONGEST len, ULONGEST *xfered_len)
eee22bf8
MK
1236{
1237 switch (object)
1238 {
1239 case TARGET_OBJECT_MEMORY:
9b409511
YQ
1240 {
1241 LONGEST val = inf_ttrace_xfer_memory (offset, len, readbuf, writebuf);
1242
1243 if (val == 0)
1244 return TARGET_XFER_EOF;
1245 else
1246 {
1247 *xfered_len = (ULONGEST) val;
1248 return TARGET_XFER_OK;
1249 }
1250 }
eee22bf8
MK
1251
1252 case TARGET_OBJECT_UNWIND_TABLE:
2ed4b548 1253 return TARGET_XFER_E_IO;
eee22bf8
MK
1254
1255 case TARGET_OBJECT_AUXV:
2ed4b548 1256 return TARGET_XFER_E_IO;
eee22bf8
MK
1257
1258 case TARGET_OBJECT_WCOOKIE:
2ed4b548 1259 return TARGET_XFER_E_IO;
eee22bf8
MK
1260
1261 default:
2ed4b548 1262 return TARGET_XFER_E_IO;
eee22bf8
MK
1263 }
1264}
1265
1266/* Print status information about what we're accessing. */
1267
1268static void
1269inf_ttrace_files_info (struct target_ops *ignore)
1270{
181e7f93 1271 struct inferior *inf = current_inferior ();
346e281c 1272 printf_filtered (_("\tUsing the running image of %s %s.\n"),
181e7f93 1273 inf->attach_flag ? "attached" : "child",
346e281c 1274 target_pid_to_str (inferior_ptid));
eee22bf8 1275}
a7be7fa8
MK
1276
1277static int
28439f5e 1278inf_ttrace_thread_alive (struct target_ops *ops, ptid_t ptid)
a7be7fa8 1279{
438ac09b
PA
1280 return 1;
1281}
1282
1283/* Return a string describing the state of the thread specified by
1284 INFO. */
1285
1286static char *
c15906d8
TT
1287inf_ttrace_extra_thread_info (struct target_ops *self,
1288 struct thread_info *info)
438ac09b
PA
1289{
1290 struct inf_ttrace_private_thread_info* private =
1291 (struct inf_ttrace_private_thread_info *) info->private;
1292
1293 if (private != NULL && private->dying)
1294 return "Exiting";
1295
1296 return NULL;
a7be7fa8
MK
1297}
1298
1299static char *
117de6a9 1300inf_ttrace_pid_to_str (struct target_ops *ops, ptid_t ptid)
a7be7fa8 1301{
2935f27f
PA
1302 pid_t pid = ptid_get_pid (ptid);
1303 lwpid_t lwpid = ptid_get_lwp (ptid);
1304 static char buf[128];
a7be7fa8 1305
2935f27f
PA
1306 if (lwpid == 0)
1307 xsnprintf (buf, sizeof buf, "process %ld",
1308 (long) pid);
1309 else
1310 xsnprintf (buf, sizeof buf, "process %ld, lwp %ld",
1311 (long) pid, (long) lwpid);
1312 return buf;
a7be7fa8 1313}
eee22bf8
MK
1314\f
1315
fa07e785
JB
1316/* Implement the get_ada_task_ptid target_ops method. */
1317
1318static ptid_t
1e6b91a4 1319inf_ttrace_get_ada_task_ptid (struct target_ops *self, long lwp, long thread)
fa07e785
JB
1320{
1321 return ptid_build (ptid_get_pid (inferior_ptid), lwp, 0);
1322}
1323
1324\f
eee22bf8
MK
1325struct target_ops *
1326inf_ttrace_target (void)
1327{
1328 struct target_ops *t = inf_child_target ();
1329
eee22bf8
MK
1330 t->to_attach = inf_ttrace_attach;
1331 t->to_detach = inf_ttrace_detach;
1332 t->to_resume = inf_ttrace_resume;
1333 t->to_wait = inf_ttrace_wait;
eee22bf8 1334 t->to_files_info = inf_ttrace_files_info;
932936f0 1335 t->to_can_use_hw_breakpoint = inf_ttrace_can_use_hw_breakpoint;
932936f0
MK
1336 t->to_insert_watchpoint = inf_ttrace_insert_watchpoint;
1337 t->to_remove_watchpoint = inf_ttrace_remove_watchpoint;
1338 t->to_stopped_by_watchpoint = inf_ttrace_stopped_by_watchpoint;
2a3cdf79
WZ
1339 t->to_region_ok_for_hw_watchpoint =
1340 inf_ttrace_region_ok_for_hw_watchpoint;
346e281c
MK
1341 t->to_kill = inf_ttrace_kill;
1342 t->to_create_inferior = inf_ttrace_create_inferior;
1343 t->to_follow_fork = inf_ttrace_follow_fork;
1344 t->to_mourn_inferior = inf_ttrace_mourn_inferior;
1345 t->to_thread_alive = inf_ttrace_thread_alive;
438ac09b 1346 t->to_extra_thread_info = inf_ttrace_extra_thread_info;
346e281c
MK
1347 t->to_pid_to_str = inf_ttrace_pid_to_str;
1348 t->to_xfer_partial = inf_ttrace_xfer_partial;
fa07e785 1349 t->to_get_ada_task_ptid = inf_ttrace_get_ada_task_ptid;
eee22bf8 1350
eee22bf8
MK
1351 return t;
1352}
d3322e8a 1353#endif
932936f0
MK
1354\f
1355
1356/* Prevent warning from -Wmissing-prototypes. */
0b155465 1357void _initialize_inf_ttrace (void);
eee22bf8 1358
932936f0
MK
1359void
1360_initialize_inf_ttrace (void)
1361{
d3322e8a 1362#ifdef HAVE_TTRACE
932936f0 1363 inf_ttrace_page_dict.pagesize = getpagesize();
eee22bf8 1364#endif
d3322e8a 1365}
This page took 0.870165 seconds and 4 git commands to generate.