2004-09-29 Andrew Cagney <cagney@gnu.org>
[deliverable/binutils-gdb.git] / gdb / infttrace.c
CommitLineData
c906108c 1/* Low level Unix child interface to ttrace, for GDB when running under HP-UX.
f83f82bc
AC
2
3 Copyright 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996,
4 1998, 1999, 2000, 2001, 2003, 2004 Free Software Foundation, Inc.
c906108c 5
c5aa993b 6 This file is part of GDB.
c906108c 7
c5aa993b
JM
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
c906108c 12
c5aa993b
JM
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
c906108c 17
c5aa993b
JM
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 59 Temple Place - Suite 330,
21 Boston, MA 02111-1307, USA. */
c906108c
SS
22
23#include "defs.h"
24#include "frame.h"
25#include "inferior.h"
26#include "target.h"
27#include "gdb_string.h"
03f2053f 28#include "gdb_wait.h"
c906108c 29#include "command.h"
f7dd6af2 30#include "gdbthread.h"
6339dc9e 31#include "infttrace.h"
c906108c 32
6aaea291
AC
33/* We need pstat functionality so that we can get the exec file
34 for a process we attach to.
35
36 According to HP, we should use the 64bit interfaces, so we
37 define _PSTAT64 to achieve this. */
38#define _PSTAT64
39#include <sys/pstat.h>
40
c906108c
SS
41/* Some hackery to work around a use of the #define name NO_FLAGS
42 * in both gdb and HPUX (bfd.h and /usr/include/machine/vmparam.h).
43 */
44#ifdef NO_FLAGS
45#define INFTTRACE_TEMP_HACK NO_FLAGS
46#undef NO_FLAGS
47#endif
48
c906108c
SS
49#include <sys/param.h>
50#include <sys/dir.h>
51#include <signal.h>
52#include <sys/ioctl.h>
53
54#include <sys/ttrace.h>
c906108c
SS
55#include <sys/mman.h>
56
57#ifndef NO_PTRACE_H
58#ifdef PTRACE_IN_WRONG_PLACE
59#include <ptrace.h>
60#else
61#include <sys/ptrace.h>
62#endif
63#endif /* NO_PTRACE_H */
64
65/* Second half of the hackery above. Non-ANSI C, so
66 * we can't use "#error", alas.
67 */
68#ifdef NO_FLAGS
69#if (NO_FLAGS != INFTTRACE_TEMP_HACK )
70 /* #error "Hackery to remove warning didn't work right" */
71#else
72 /* Ok, new def'n of NO_FLAGS is same as old one; no action needed. */
73#endif
74#else
75 /* #error "Didn't get expected re-definition of NO_FLAGS" */
76#define NO_FLAGS INFTTRACE_TEMP_HACK
77#endif
78
79#if !defined (PT_SETTRC)
80#define PT_SETTRC 0 /* Make process traceable by parent */
81#endif
82#if !defined (PT_READ_I)
83#define PT_READ_I 1 /* Read word from text space */
84#endif
85#if !defined (PT_READ_D)
86#define PT_READ_D 2 /* Read word from data space */
87#endif
88#if !defined (PT_READ_U)
89#define PT_READ_U 3 /* Read word from kernel user struct */
90#endif
91#if !defined (PT_WRITE_I)
92#define PT_WRITE_I 4 /* Write word to text space */
93#endif
94#if !defined (PT_WRITE_D)
95#define PT_WRITE_D 5 /* Write word to data space */
96#endif
97#if !defined (PT_WRITE_U)
98#define PT_WRITE_U 6 /* Write word to kernel user struct */
99#endif
100#if !defined (PT_CONTINUE)
101#define PT_CONTINUE 7 /* Continue after signal */
102#endif
103#if !defined (PT_STEP)
104#define PT_STEP 9 /* Set flag for single stepping */
105#endif
106#if !defined (PT_KILL)
107#define PT_KILL 8 /* Send child a SIGKILL signal */
108#endif
109
110#ifndef PT_ATTACH
111#define PT_ATTACH PTRACE_ATTACH
112#endif
113#ifndef PT_DETACH
114#define PT_DETACH PTRACE_DETACH
115#endif
116
117#include "gdbcore.h"
c0ccb908 118#ifdef HAVE_SYS_FILE_H
c906108c
SS
119#include <sys/file.h>
120#endif
121
122/* This semaphore is used to coordinate the child and parent processes
123 after a fork(), and before an exec() by the child. See parent_attach_all
124 for details.
c5aa993b
JM
125 */
126typedef struct
127 {
128 int parent_channel[2]; /* Parent "talks" to [1], child "listens" to [0] */
129 int child_channel[2]; /* Child "talks" to [1], parent "listens" to [0] */
130 }
131startup_semaphore_t;
c906108c
SS
132
133#define SEM_TALK (1)
134#define SEM_LISTEN (0)
135
c5aa993b 136static startup_semaphore_t startup_semaphore;
c906108c
SS
137
138/* See can_touch_threads_of_process for details. */
c5aa993b
JM
139static int vforking_child_pid = 0;
140static int vfork_in_flight = 0;
c906108c 141
c906108c
SS
142/* 1 if ok as results of a ttrace or ttrace_wait call, 0 otherwise.
143 */
144#define TT_OK( _status, _errno ) \
145 (((_status) == 1) && ((_errno) == 0))
146
147#define TTRACE_ARG_TYPE uint64_t
148
149/* When supplied as the "addr" operand, ttrace interprets this
150 to mean, "from the current address".
c5aa993b 151 */
c906108c
SS
152#define TT_USE_CURRENT_PC ((TTRACE_ARG_TYPE) TT_NOPC)
153
154/* When supplied as the "addr", "data" or "addr2" operand for most
155 requests, ttrace interprets this to mean, "pay no heed to this
156 argument".
c5aa993b 157 */
c906108c
SS
158#define TT_NIL ((TTRACE_ARG_TYPE) TT_NULLARG)
159
160/* This is capable of holding the value of a 32-bit register. The
161 value is always left-aligned in the buffer; i.e., [0] contains
162 the most-significant byte of the register's value, and [sizeof(reg)]
163 contains the least-significant value.
164
165 ??rehrauer: Yes, this assumes that an int is 32-bits on HP-UX, and
166 that registers are 32-bits on HP-UX. The latter assumption changes
167 with PA2.0.
c5aa993b
JM
168 */
169typedef int register_value_t;
c906108c
SS
170
171/********************************************************************
172
173 How this works:
174
175 1. Thread numbers
176
177 The rest of GDB sees threads as being things with different
178 "pid" (process id) values. See "thread.c" for details. The
179 separate threads will be seen and reacted to if infttrace passes
180 back different pid values (for _events_). See wait_for_inferior
181 in inftarg.c.
182
183 So infttrace is going to use thread ids externally, pretending
184 they are process ids, and keep track internally so that it can
185 use the real process id (and thread id) when calling ttrace.
186
187 The data structure that supports this is a linked list of the
188 current threads. Since at some date infttrace will have to
189 deal with multiple processes, each list element records its
190 corresponding pid, rather than having a single global.
191
192 Note that the list is only approximately current; that's ok, as
193 it's up to date when we need it (we hope!). Also, it can contain
194 dead threads, as there's no harm if it does.
195
196 The approach taken here is to bury the translation from external
197 to internal inside "call_ttrace" and a few other places.
198
199 There are some wrinkles:
200
201 o When GDB forks itself to create the debug target process,
202 there's only a pid of 0 around in the child, so the
203 TT_PROC_SETTRC operation uses a more direct call to ttrace;
204 Similiarly, the initial setting of the event mask happens
205 early as well, and so is also special-cased, and an attach
206 uses a real pid;
207
208 o We define an unthreaded application as having a "pseudo"
209 thread;
210
211 o To keep from confusing the rest of GDB, we don't switch
212 the PID for the pseudo thread to a TID. A table will help:
213
214 Rest of GDB sees these PIDs: pid tid1 tid2 tid3 ...
215
216 Our thread list stores: pid pid pid pid ...
217 tid0 tid1 tid2 tid3
218
219 Ttrace sees these TIDS: tid0 tid1 tid2 tid3 ...
220
221 Both pid and tid0 will map to tid0, as there are infttrace.c-internal
222 calls to ttrace using tid0.
223
224 2. Step and Continue
225
226 Since we're implementing the "stop the world" model, sub-model
227 "other threads run during step", we have some stuff to do:
228
229 o User steps require continuing all threads other than the
230 one the user is stepping;
231
232 o Internal debugger steps (such as over a breakpoint or watchpoint,
233 but not out of a library load thunk) require stepping only
234 the selected thread; this means that we have to report the
235 step finish on that thread, which can lead to complications;
236
237 o When a thread is created, it is created running, rather
238 than stopped--so we have to stop it.
239
240 The OS doesn't guarantee the stopped thread list will be stable,
241 no does it guarantee where on the stopped thread list a thread
242 that is single-stepped will wind up: it's possible that it will
243 be off the list for a while, it's possible the step will complete
244 and it will be re-posted to the end...
245
246 This means we have to scan the stopped thread list, build up
247 a work-list, and then run down the work list; we can't do the
248 step/continue during the scan.
249
250 3. Buffering events
251
252 Then there's the issue of waiting for an event. We do this by
253 noticing how many events are reported at the end of each wait.
254 From then on, we "fake" all resumes and steps, returning instantly,
255 and don't do another wait. Once all pending events are reported,
256 we can really resume again.
257
258 To keep this hidden, all the routines which know about tids and
259 pids or real events and simulated ones are static (file-local).
260
261 This code can make lots of calls to ttrace, in particular it
262 can spin down the list of thread states more than once. If this
263 becomes a performance hit, the spin could be done once and the
264 various "tsp" blocks saved, keeping all later spins in this
265 process.
266
267 The O/S doesn't promise to keep the list straight, and so we must
268 re-scan a lot. By observation, it looks like a single-step/wait
269 puts the stepped thread at the end of the list but doesn't change
270 it otherwise.
271
272****************************************************************
273*/
274
275/* Uncomment these to turn on various debugging output */
276/* #define THREAD_DEBUG */
277/* #define WAIT_BUFFER_DEBUG */
278/* #define PARANOIA */
279
280
281#define INFTTRACE_ALL_THREADS (-1)
282#define INFTTRACE_STEP (1)
283#define INFTTRACE_CONTINUE (0)
284
285/* FIX: this is used in inftarg.c/child_wait, in a hack.
286 */
287extern int not_same_real_pid;
288
289/* This is used to count buffered events.
290 */
291static unsigned int more_events_left = 0;
292
293/* Process state.
294 */
c5aa993b
JM
295typedef enum process_state_enum
296 {
c906108c
SS
297 STOPPED,
298 FAKE_STEPPING,
c5aa993b 299 FAKE_CONTINUE, /* For later use */
c906108c
SS
300 RUNNING,
301 FORKING,
302 VFORKING
c5aa993b
JM
303 }
304process_state_t;
c906108c
SS
305
306static process_state_t process_state = STOPPED;
307
308/* User-specified stepping modality.
309 */
c5aa993b
JM
310typedef enum stepping_mode_enum
311 {
312 DO_DEFAULT, /* ...which is a continue! */
c906108c
SS
313 DO_STEP,
314 DO_CONTINUE
c5aa993b
JM
315 }
316stepping_mode_t;
317
c906108c
SS
318/* Action to take on an attach, depends on
319 * what kind (user command, fork, vfork).
320 *
321 * At the moment, this is either:
322 *
323 * o continue with a SIGTRAP signal, or
324 *
325 * o leave stopped.
326 */
c5aa993b
JM
327typedef enum attach_continue_enum
328 {
329 DO_ATTACH_CONTINUE,
330 DONT_ATTACH_CONTINUE
331 }
332attach_continue_t;
c906108c
SS
333
334/* This flag is true if we are doing a step-over-bpt
335 * with buffered events. We will have to be sure to
336 * report the right thread, as otherwise the spaghetti
337 * code in "infrun.c/wait_for_inferior" will get
338 * confused.
339 */
c5aa993b
JM
340static int doing_fake_step = 0;
341static lwpid_t fake_step_tid = 0;
c906108c 342\f
c5aa993b 343
c906108c
SS
344/****************************************************
345 * Thread information structure routines and types. *
346 ****************************************************
347 */
c5aa993b 348typedef
c906108c 349struct thread_info_struct
c5aa993b
JM
350 {
351 int am_pseudo; /* This is a pseudo-thread for the process. */
352 int pid; /* Process ID */
353 lwpid_t tid; /* Thread ID */
354 int handled; /* 1 if a buffered event was handled. */
355 int seen; /* 1 if this thread was seen on a traverse. */
356 int terminated; /* 1 if thread has terminated. */
357 int have_signal; /* 1 if signal to be sent */
358 enum target_signal signal_value; /* Signal to send */
359 int have_start; /* 1 if alternate starting address */
360 stepping_mode_t stepping_mode; /* Whether to step or continue */
361 CORE_ADDR start; /* Where to start */
362 int have_state; /* 1 if the event state has been set */
363 ttstate_t last_stop_state; /* The most recently-waited event for this thread. */
c906108c 364 struct thread_info_struct
c5aa993b 365 *next; /* All threads are linked via this field. */
c906108c 366 struct thread_info_struct
c5aa993b
JM
367 *next_pseudo; /* All pseudo-threads are linked via this field. */
368 }
369thread_info;
c906108c
SS
370
371typedef
372struct thread_info_header_struct
c5aa993b
JM
373 {
374 int count;
c906108c
SS
375 thread_info *head;
376 thread_info *head_pseudo;
c906108c 377
c5aa993b
JM
378 }
379thread_info_header;
c906108c 380
c5aa993b
JM
381static thread_info_header thread_head =
382{0, NULL, NULL};
383static thread_info_header deleted_threads =
384{0, NULL, NULL};
c906108c 385
39f77062 386static ptid_t saved_real_ptid;
c906108c 387\f
c5aa993b 388
c906108c
SS
389/*************************************************
390 * Debugging support functions *
391 *************************************************
392 */
393CORE_ADDR
fba45db2 394get_raw_pc (lwpid_t ttid)
c906108c 395{
c5aa993b
JM
396 unsigned long pc_val;
397 int offset;
398 int res;
399
400 offset = register_addr (PC_REGNUM, U_REGS_OFFSET);
401 res = read_from_register_save_state (
402 ttid,
403 (TTRACE_ARG_TYPE) offset,
404 (char *) &pc_val,
405 sizeof (pc_val));
406 if (res <= 0)
407 {
408 return (CORE_ADDR) pc_val;
409 }
410 else
411 {
412 return (CORE_ADDR) 0;
413 }
414}
c906108c
SS
415
416static char *
fba45db2 417get_printable_name_of_stepping_mode (stepping_mode_t mode)
c906108c 418{
c5aa993b
JM
419 switch (mode)
420 {
421 case DO_DEFAULT:
422 return "DO_DEFAULT";
423 case DO_STEP:
424 return "DO_STEP";
425 case DO_CONTINUE:
426 return "DO_CONTINUE";
427 default:
428 return "?unknown mode?";
429 }
c906108c
SS
430}
431
432/* This function returns a pointer to a string describing the
433 * ttrace event being reported.
434 */
435char *
fba45db2 436get_printable_name_of_ttrace_event (ttevents_t event)
c906108c
SS
437{
438 /* This enumeration is "gappy", so don't use a table. */
c5aa993b
JM
439 switch (event)
440 {
c906108c
SS
441
442 case TTEVT_NONE:
c5aa993b 443 return "TTEVT_NONE";
c906108c 444 case TTEVT_SIGNAL:
c5aa993b 445 return "TTEVT_SIGNAL";
c906108c 446 case TTEVT_FORK:
c5aa993b 447 return "TTEVT_FORK";
c906108c 448 case TTEVT_EXEC:
c5aa993b 449 return "TTEVT_EXEC";
c906108c 450 case TTEVT_EXIT:
c5aa993b 451 return "TTEVT_EXIT";
c906108c 452 case TTEVT_VFORK:
c5aa993b 453 return "TTEVT_VFORK";
c906108c 454 case TTEVT_SYSCALL_RETURN:
c5aa993b 455 return "TTEVT_SYSCALL_RETURN";
c906108c 456 case TTEVT_LWP_CREATE:
c5aa993b 457 return "TTEVT_LWP_CREATE";
c906108c 458 case TTEVT_LWP_TERMINATE:
c5aa993b 459 return "TTEVT_LWP_TERMINATE";
c906108c 460 case TTEVT_LWP_EXIT:
c5aa993b 461 return "TTEVT_LWP_EXIT";
c906108c 462 case TTEVT_LWP_ABORT_SYSCALL:
c5aa993b 463 return "TTEVT_LWP_ABORT_SYSCALL";
c906108c 464 case TTEVT_SYSCALL_ENTRY:
c5aa993b
JM
465 return "TTEVT_SYSCALL_ENTRY";
466 case TTEVT_SYSCALL_RESTART:
467 return "TTEVT_SYSCALL_RESTART";
468 default:
c906108c 469 return "?new event?";
c5aa993b 470 }
c906108c 471}
c906108c 472\f
c5aa993b 473
c906108c
SS
474/* This function translates the ttrace request enumeration into
475 * a character string that is its printable (aka "human readable")
476 * name.
477 */
478char *
fba45db2 479get_printable_name_of_ttrace_request (ttreq_t request)
c906108c
SS
480{
481 if (!IS_TTRACE_REQ (request))
482 return "?bad req?";
483
484 /* This enumeration is "gappy", so don't use a table. */
c5aa993b
JM
485 switch (request)
486 {
487 case TT_PROC_SETTRC:
c906108c 488 return "TT_PROC_SETTRC";
c5aa993b 489 case TT_PROC_ATTACH:
c906108c 490 return "TT_PROC_ATTACH";
c5aa993b 491 case TT_PROC_DETACH:
c906108c 492 return "TT_PROC_DETACH";
c5aa993b 493 case TT_PROC_RDTEXT:
c906108c 494 return "TT_PROC_RDTEXT";
c5aa993b 495 case TT_PROC_WRTEXT:
c906108c 496 return "TT_PROC_WRTEXT";
c5aa993b 497 case TT_PROC_RDDATA:
c906108c 498 return "TT_PROC_RDDATA";
c5aa993b 499 case TT_PROC_WRDATA:
c906108c 500 return "TT_PROC_WRDATA";
c5aa993b 501 case TT_PROC_STOP:
c906108c 502 return "TT_PROC_STOP";
c5aa993b 503 case TT_PROC_CONTINUE:
c906108c 504 return "TT_PROC_CONTINUE";
c5aa993b 505 case TT_PROC_GET_PATHNAME:
c906108c 506 return "TT_PROC_GET_PATHNAME";
c5aa993b 507 case TT_PROC_GET_EVENT_MASK:
c906108c 508 return "TT_PROC_GET_EVENT_MASK";
c5aa993b 509 case TT_PROC_SET_EVENT_MASK:
c906108c 510 return "TT_PROC_SET_EVENT_MASK";
c5aa993b 511 case TT_PROC_GET_FIRST_LWP_STATE:
c906108c 512 return "TT_PROC_GET_FIRST_LWP_STATE";
c5aa993b 513 case TT_PROC_GET_NEXT_LWP_STATE:
c906108c 514 return "TT_PROC_GET_NEXT_LWP_STATE";
c5aa993b 515 case TT_PROC_EXIT:
c906108c 516 return "TT_PROC_EXIT";
c5aa993b 517 case TT_PROC_GET_MPROTECT:
c906108c 518 return "TT_PROC_GET_MPROTECT";
c5aa993b 519 case TT_PROC_SET_MPROTECT:
c906108c 520 return "TT_PROC_SET_MPROTECT";
c5aa993b 521 case TT_PROC_SET_SCBM:
c906108c 522 return "TT_PROC_SET_SCBM";
c5aa993b 523 case TT_LWP_STOP:
c906108c 524 return "TT_LWP_STOP";
c5aa993b 525 case TT_LWP_CONTINUE:
c906108c 526 return "TT_LWP_CONTINUE";
c5aa993b 527 case TT_LWP_SINGLE:
c906108c 528 return "TT_LWP_SINGLE";
c5aa993b 529 case TT_LWP_RUREGS:
c906108c 530 return "TT_LWP_RUREGS";
c5aa993b 531 case TT_LWP_WUREGS:
c906108c 532 return "TT_LWP_WUREGS";
c5aa993b 533 case TT_LWP_GET_EVENT_MASK:
c906108c 534 return "TT_LWP_GET_EVENT_MASK";
c5aa993b 535 case TT_LWP_SET_EVENT_MASK:
c906108c 536 return "TT_LWP_SET_EVENT_MASK";
c5aa993b 537 case TT_LWP_GET_STATE:
c906108c 538 return "TT_LWP_GET_STATE";
c5aa993b 539 default:
c906108c 540 return "?new req?";
c5aa993b 541 }
c906108c 542}
c906108c 543\f
c5aa993b 544
c906108c
SS
545/* This function translates the process state enumeration into
546 * a character string that is its printable (aka "human readable")
547 * name.
548 */
549static char *
fba45db2 550get_printable_name_of_process_state (process_state_t process_state)
c906108c 551{
c5aa993b
JM
552 switch (process_state)
553 {
c906108c
SS
554 case STOPPED:
555 return "STOPPED";
556 case FAKE_STEPPING:
557 return "FAKE_STEPPING";
558 case RUNNING:
559 return "RUNNING";
560 case FORKING:
561 return "FORKING";
562 case VFORKING:
563 return "VFORKING";
564 default:
565 return "?some unknown state?";
c5aa993b 566 }
c906108c
SS
567}
568
569/* Set a ttrace thread state to a safe, initial state.
570 */
571static void
fba45db2 572clear_ttstate_t (ttstate_t *tts)
c906108c 573{
c5aa993b
JM
574 tts->tts_pid = 0;
575 tts->tts_lwpid = 0;
576 tts->tts_user_tid = 0;
577 tts->tts_event = TTEVT_NONE;
c906108c
SS
578}
579
580/* Copy ttrace thread state TTS_FROM into TTS_TO.
581 */
582static void
fba45db2 583copy_ttstate_t (ttstate_t *tts_to, ttstate_t *tts_from)
c906108c 584{
c5aa993b 585 memcpy ((char *) tts_to, (char *) tts_from, sizeof (*tts_to));
c906108c
SS
586}
587
588/* Are there any live threads we know about?
589 */
c5aa993b 590static int
fba45db2 591any_thread_records (void)
c906108c 592{
c5aa993b 593 return (thread_head.count > 0);
c906108c
SS
594}
595
596/* Create, fill in and link in a thread descriptor.
597 */
598static thread_info *
fba45db2 599create_thread_info (int pid, lwpid_t tid)
c906108c 600{
c5aa993b
JM
601 thread_info *new_p;
602 thread_info *p;
603 int thread_count_of_pid;
604
3c37485b 605 new_p = xmalloc (sizeof (thread_info));
c5aa993b
JM
606 new_p->pid = pid;
607 new_p->tid = tid;
608 new_p->have_signal = 0;
609 new_p->have_start = 0;
610 new_p->have_state = 0;
611 clear_ttstate_t (&new_p->last_stop_state);
612 new_p->am_pseudo = 0;
613 new_p->handled = 0;
614 new_p->seen = 0;
615 new_p->terminated = 0;
616 new_p->next = NULL;
617 new_p->next_pseudo = NULL;
618 new_p->stepping_mode = DO_DEFAULT;
619
620 if (0 == thread_head.count)
621 {
c906108c 622#ifdef THREAD_DEBUG
c5aa993b
JM
623 if (debug_on)
624 printf ("First thread, pid %d tid %d!\n", pid, tid);
c906108c 625#endif
39f77062 626 saved_real_ptid = inferior_ptid;
c906108c 627 }
c5aa993b
JM
628 else
629 {
c906108c 630#ifdef THREAD_DEBUG
c5aa993b
JM
631 if (debug_on)
632 printf ("Subsequent thread, pid %d tid %d\n", pid, tid);
c906108c
SS
633#endif
634 }
635
c5aa993b
JM
636 /* Another day, another thread...
637 */
638 thread_head.count++;
c906108c 639
c5aa993b
JM
640 /* The new thread always goes at the head of the list.
641 */
642 new_p->next = thread_head.head;
643 thread_head.head = new_p;
c906108c 644
c5aa993b
JM
645 /* Is this the "pseudo" thread of a process? It is if there's
646 * no other thread for this process on the list. (Note that this
647 * accomodates multiple processes, such as we see even for simple
648 * cases like forking "non-threaded" programs.)
649 */
650 p = thread_head.head;
651 thread_count_of_pid = 0;
652 while (p)
653 {
654 if (p->pid == new_p->pid)
655 thread_count_of_pid++;
656 p = p->next;
657 }
658
659 /* Did we see any other threads for this pid? (Recall that we just
660 * added this thread to the list...)
661 */
662 if (thread_count_of_pid == 1)
663 {
664 new_p->am_pseudo = 1;
665 new_p->next_pseudo = thread_head.head_pseudo;
666 thread_head.head_pseudo = new_p;
667 }
668
669 return new_p;
c906108c
SS
670}
671
672/* Get rid of our thread info.
673 */
674static void
fba45db2 675clear_thread_info (void)
c906108c 676{
c5aa993b
JM
677 thread_info *p;
678 thread_info *q;
c906108c
SS
679
680#ifdef THREAD_DEBUG
c5aa993b
JM
681 if (debug_on)
682 printf ("Clearing all thread info\n");
c906108c
SS
683#endif
684
c5aa993b
JM
685 p = thread_head.head;
686 while (p)
687 {
688 q = p;
689 p = p->next;
b8c9b27d 690 xfree (q);
c906108c
SS
691 }
692
c5aa993b
JM
693 thread_head.head = NULL;
694 thread_head.head_pseudo = NULL;
695 thread_head.count = 0;
c906108c 696
c5aa993b
JM
697 p = deleted_threads.head;
698 while (p)
699 {
700 q = p;
701 p = p->next;
b8c9b27d 702 xfree (q);
c906108c
SS
703 }
704
c5aa993b
JM
705 deleted_threads.head = NULL;
706 deleted_threads.head_pseudo = NULL;
707 deleted_threads.count = 0;
c906108c 708
c5aa993b
JM
709 /* No threads, so can't have pending events.
710 */
711 more_events_left = 0;
c906108c
SS
712}
713
714/* Given a tid, find the thread block for it.
715 */
716static thread_info *
fba45db2 717find_thread_info (lwpid_t tid)
c906108c 718{
c5aa993b 719 thread_info *p;
c906108c 720
c5aa993b
JM
721 for (p = thread_head.head; p; p = p->next)
722 {
723 if (p->tid == tid)
724 {
725 return p;
726 }
c906108c
SS
727 }
728
c5aa993b
JM
729 for (p = deleted_threads.head; p; p = p->next)
730 {
731 if (p->tid == tid)
732 {
733 return p;
734 }
c906108c 735 }
c5aa993b
JM
736
737 return NULL;
c906108c
SS
738}
739
740/* For any but the pseudo thread, this maps to the
741 * thread ID. For the pseudo thread, if you pass either
742 * the thread id or the PID, you get the pseudo thread ID.
743 *
744 * We have to be prepared for core gdb to ask about
745 * deleted threads. We do the map, but we don't like it.
746 */
747static lwpid_t
fba45db2 748map_from_gdb_tid (lwpid_t gdb_tid)
c906108c 749{
c5aa993b 750 thread_info *p;
c906108c 751
c5aa993b
JM
752 /* First assume gdb_tid really is a tid, and try to find a
753 * matching entry on the threads list.
754 */
755 for (p = thread_head.head; p; p = p->next)
756 {
757 if (p->tid == gdb_tid)
758 return gdb_tid;
c906108c
SS
759 }
760
c5aa993b
JM
761 /* It doesn't appear to be a tid; perhaps it's really a pid?
762 * Try to find a "pseudo" thread entry on the threads list.
763 */
764 for (p = thread_head.head_pseudo; p != NULL; p = p->next_pseudo)
765 {
766 if (p->pid == gdb_tid)
767 return p->tid;
c906108c
SS
768 }
769
c5aa993b
JM
770 /* Perhaps it's the tid of a deleted thread we may still
771 * have some knowledge of?
772 */
773 for (p = deleted_threads.head; p; p = p->next)
774 {
775 if (p->tid == gdb_tid)
776 return gdb_tid;
777 }
c906108c 778
c5aa993b
JM
779 /* Or perhaps it's the pid of a deleted process we may still
780 * have knowledge of?
781 */
782 for (p = deleted_threads.head_pseudo; p != NULL; p = p->next_pseudo)
783 {
784 if (p->pid == gdb_tid)
785 return p->tid;
786 }
787
788 return 0; /* Error? */
c906108c
SS
789}
790
791/* Map the other way: from a real tid to the
792 * "pid" known by core gdb. This tid may be
793 * for a thread that just got deleted, so we
794 * also need to consider deleted threads.
795 */
796static lwpid_t
fba45db2 797map_to_gdb_tid (lwpid_t real_tid)
c906108c 798{
c5aa993b 799 thread_info *p;
c906108c 800
c5aa993b
JM
801 for (p = thread_head.head; p; p = p->next)
802 {
803 if (p->tid == real_tid)
804 {
805 if (p->am_pseudo)
806 return p->pid;
807 else
808 return real_tid;
809 }
c906108c
SS
810 }
811
c5aa993b
JM
812 for (p = deleted_threads.head; p; p = p->next)
813 {
814 if (p->tid == real_tid)
815 if (p->am_pseudo)
816 return p->pid; /* Error? */
817 else
818 return real_tid;
c906108c
SS
819 }
820
c5aa993b 821 return 0; /* Error? Never heard of this thread! */
c906108c
SS
822}
823
824/* Do any threads have saved signals?
825 */
c5aa993b 826static int
fba45db2 827saved_signals_exist (void)
c906108c 828{
c5aa993b
JM
829 thread_info *p;
830
831 for (p = thread_head.head; p; p = p->next)
832 {
833 if (p->have_signal)
834 {
835 return 1;
836 }
c906108c
SS
837 }
838
c5aa993b 839 return 0;
c906108c
SS
840}
841
842/* Is this the tid for the zero-th thread?
843 */
c5aa993b 844static int
fba45db2 845is_pseudo_thread (lwpid_t tid)
c906108c 846{
c5aa993b
JM
847 thread_info *p = find_thread_info (tid);
848 if (NULL == p || p->terminated)
849 return 0;
850 else
851 return p->am_pseudo;
c906108c
SS
852}
853
854/* Is this thread terminated?
855 */
c5aa993b 856static int
fba45db2 857is_terminated (lwpid_t tid)
c906108c 858{
c5aa993b 859 thread_info *p = find_thread_info (tid);
c906108c 860
c5aa993b
JM
861 if (NULL != p)
862 return p->terminated;
c906108c 863
c5aa993b 864 return 0;
c906108c
SS
865}
866
867/* Is this pid a real PID or a TID?
868 */
c5aa993b 869static int
fba45db2 870is_process_id (int pid)
c906108c 871{
c5aa993b
JM
872 lwpid_t tid;
873 thread_info *tinfo;
874 pid_t this_pid;
875 int this_pid_count;
c906108c
SS
876
877 /* What does PID really represent?
878 */
879 tid = map_from_gdb_tid (pid);
880 if (tid <= 0)
c5aa993b 881 return 0; /* Actually, is probably an error... */
c906108c
SS
882
883 tinfo = find_thread_info (tid);
884
885 /* Does it appear to be a true thread?
886 */
c5aa993b 887 if (!tinfo->am_pseudo)
c906108c
SS
888 return 0;
889
890 /* Else, it looks like it may be a process. See if there's any other
891 * threads with the same process ID, though. If there are, then TID
892 * just happens to be the first thread of several for this process.
893 */
894 this_pid = tinfo->pid;
895 this_pid_count = 0;
896 for (tinfo = thread_head.head; tinfo; tinfo = tinfo->next)
897 {
898 if (tinfo->pid == this_pid)
c5aa993b 899 this_pid_count++;
c906108c
SS
900 }
901
902 return (this_pid_count == 1);
903}
904
905
906/* Add a thread to our info. Prevent duplicate entries.
907 */
908static thread_info *
fba45db2 909add_tthread (int pid, lwpid_t tid)
c906108c 910{
c5aa993b 911 thread_info *p;
c906108c 912
c5aa993b
JM
913 p = find_thread_info (tid);
914 if (NULL == p)
915 p = create_thread_info (pid, tid);
c906108c 916
c5aa993b 917 return p;
c906108c
SS
918}
919
920/* Notice that a thread was deleted.
921 */
922static void
fba45db2 923del_tthread (lwpid_t tid)
c906108c 924{
c5aa993b
JM
925 thread_info *p;
926 thread_info *chase;
c906108c 927
c5aa993b
JM
928 if (thread_head.count <= 0)
929 {
930 error ("Internal error in thread database.");
931 return;
c906108c
SS
932 }
933
c5aa993b
JM
934 chase = NULL;
935 for (p = thread_head.head; p; p = p->next)
936 {
937 if (p->tid == tid)
938 {
c906108c
SS
939
940#ifdef THREAD_DEBUG
c5aa993b
JM
941 if (debug_on)
942 printf ("Delete here: %d \n", tid);
c906108c
SS
943#endif
944
c5aa993b
JM
945 if (p->am_pseudo)
946 {
947 /*
948 * Deleting a main thread is ok if we're doing
949 * a parent-follow on a child; this is odd but
950 * not wrong. It apparently _doesn't_ happen
951 * on the child-follow, as we don't just delete
952 * the pseudo while keeping the rest of the
953 * threads around--instead, we clear out the whole
954 * thread list at once.
955 */
956 thread_info *q;
957 thread_info *q_chase;
958
959 q_chase = NULL;
960 for (q = thread_head.head_pseudo; q; q = q->next)
961 {
962 if (q == p)
963 {
964 /* Remove from pseudo list.
965 */
966 if (q_chase == NULL)
967 thread_head.head_pseudo = p->next_pseudo;
968 else
969 q_chase->next = p->next_pseudo;
970 }
971 else
972 q_chase = q;
973 }
974 }
975
976 /* Remove from live list.
977 */
978 thread_head.count--;
979
980 if (NULL == chase)
981 thread_head.head = p->next;
982 else
983 chase->next = p->next;
984
985 /* Add to deleted thread list.
986 */
987 p->next = deleted_threads.head;
988 deleted_threads.head = p;
989 deleted_threads.count++;
990 if (p->am_pseudo)
991 {
992 p->next_pseudo = deleted_threads.head_pseudo;
993 deleted_threads.head_pseudo = p;
994 }
995 p->terminated = 1;
996
997 return;
998 }
999
1000 else
1001 chase = p;
c906108c
SS
1002 }
1003}
1004
1005/* Get the pid for this tid. (Has to be a real TID!).
1006 */
1007static int
fba45db2 1008get_pid_for (lwpid_t tid)
c906108c 1009{
c5aa993b 1010 thread_info *p;
c906108c 1011
c5aa993b
JM
1012 for (p = thread_head.head; p; p = p->next)
1013 {
1014 if (p->tid == tid)
1015 {
1016 return p->pid;
1017 }
c906108c
SS
1018 }
1019
c5aa993b
JM
1020 for (p = deleted_threads.head; p; p = p->next)
1021 {
1022 if (p->tid == tid)
1023 {
1024 return p->pid;
1025 }
c906108c 1026 }
c5aa993b
JM
1027
1028 return 0;
c906108c
SS
1029}
1030
1031/* Note that this thread's current event has been handled.
1032 */
1033static void
fba45db2 1034set_handled (int pid, lwpid_t tid)
c906108c 1035{
c5aa993b
JM
1036 thread_info *p;
1037
1038 p = find_thread_info (tid);
1039 if (NULL == p)
1040 p = add_tthread (pid, tid);
c906108c 1041
c5aa993b 1042 p->handled = 1;
c906108c
SS
1043}
1044
1045/* Was this thread's current event handled?
1046 */
c5aa993b 1047static int
fba45db2 1048was_handled (lwpid_t tid)
c906108c 1049{
c5aa993b
JM
1050 thread_info *p;
1051
1052 p = find_thread_info (tid);
1053 if (NULL != p)
1054 return p->handled;
c906108c 1055
c5aa993b 1056 return 0; /* New threads have not been handled */
c906108c
SS
1057}
1058
1059/* Set this thread to unhandled.
1060 */
1061static void
fba45db2 1062clear_handled (lwpid_t tid)
c906108c 1063{
c5aa993b
JM
1064 thread_info *p;
1065
c906108c 1066#ifdef WAIT_BUFFER_DEBUG
c5aa993b
JM
1067 if (debug_on)
1068 printf ("clear_handled %d\n", (int) tid);
c906108c
SS
1069#endif
1070
1071 p = find_thread_info (tid);
1072 if (p == NULL)
1073 error ("Internal error: No thread state to clear?");
1074
1075 p->handled = 0;
1076}
1077
1078/* Set all threads to unhandled.
1079 */
1080static void
fba45db2 1081clear_all_handled (void)
c906108c 1082{
c5aa993b 1083 thread_info *p;
c906108c
SS
1084
1085#ifdef WAIT_BUFFER_DEBUG
c5aa993b
JM
1086 if (debug_on)
1087 printf ("clear_all_handled\n");
c906108c
SS
1088#endif
1089
c5aa993b
JM
1090 for (p = thread_head.head; p; p = p->next)
1091 {
1092 p->handled = 0;
c906108c
SS
1093 }
1094
c5aa993b
JM
1095 for (p = deleted_threads.head; p; p = p->next)
1096 {
1097 p->handled = 0;
c906108c
SS
1098 }
1099}
1100
1101/* Set this thread to default stepping mode.
1102 */
1103static void
fba45db2 1104clear_stepping_mode (lwpid_t tid)
c906108c 1105{
c5aa993b
JM
1106 thread_info *p;
1107
c906108c 1108#ifdef WAIT_BUFFER_DEBUG
c5aa993b
JM
1109 if (debug_on)
1110 printf ("clear_stepping_mode %d\n", (int) tid);
c906108c
SS
1111#endif
1112
1113 p = find_thread_info (tid);
1114 if (p == NULL)
1115 error ("Internal error: No thread state to clear?");
1116
1117 p->stepping_mode = DO_DEFAULT;
1118}
1119
1120/* Set all threads to do default continue on resume.
1121 */
1122static void
fba45db2 1123clear_all_stepping_mode (void)
c906108c 1124{
c5aa993b 1125 thread_info *p;
c906108c
SS
1126
1127#ifdef WAIT_BUFFER_DEBUG
c5aa993b
JM
1128 if (debug_on)
1129 printf ("clear_all_stepping_mode\n");
c906108c
SS
1130#endif
1131
c5aa993b
JM
1132 for (p = thread_head.head; p; p = p->next)
1133 {
1134 p->stepping_mode = DO_DEFAULT;
c906108c
SS
1135 }
1136
c5aa993b
JM
1137 for (p = deleted_threads.head; p; p = p->next)
1138 {
1139 p->stepping_mode = DO_DEFAULT;
c906108c
SS
1140 }
1141}
1142
1143/* Set all threads to unseen on this pass.
c5aa993b 1144 */
c906108c 1145static void
fba45db2 1146set_all_unseen (void)
c906108c 1147{
c5aa993b 1148 thread_info *p;
c906108c 1149
c5aa993b
JM
1150 for (p = thread_head.head; p; p = p->next)
1151 {
1152 p->seen = 0;
c906108c
SS
1153 }
1154}
1155
1156#if (defined( THREAD_DEBUG ) || defined( PARANOIA ))
1157/* debugging routine.
1158 */
1159static void
fba45db2 1160print_tthread (thread_info *p)
c906108c 1161{
c5aa993b
JM
1162 printf (" Thread pid %d, tid %d", p->pid, p->tid);
1163 if (p->have_state)
1164 printf (", event is %s",
1165 get_printable_name_of_ttrace_event (p->last_stop_state.tts_event));
1166
1167 if (p->am_pseudo)
1168 printf (", pseudo thread");
1169
1170 if (p->have_signal)
1171 printf (", have signal 0x%x", p->signal_value);
1172
1173 if (p->have_start)
1174 printf (", have start at 0x%x", p->start);
1175
1176 printf (", step is %s", get_printable_name_of_stepping_mode (p->stepping_mode));
1177
1178 if (p->handled)
1179 printf (", handled");
1180 else
1181 printf (", not handled");
1182
1183 if (p->seen)
1184 printf (", seen");
1185 else
1186 printf (", not seen");
1187
1188 printf ("\n");
c906108c
SS
1189}
1190
1191static void
fba45db2 1192print_tthreads (void)
c906108c 1193{
c5aa993b
JM
1194 thread_info *p;
1195
1196 if (thread_head.count == 0)
1197 printf ("Thread list is empty\n");
1198 else
1199 {
1200 printf ("Thread list has ");
1201 if (thread_head.count == 1)
1202 printf ("1 entry:\n");
1203 else
1204 printf ("%d entries:\n", thread_head.count);
1205 for (p = thread_head.head; p; p = p->next)
1206 {
1207 print_tthread (p);
1208 }
1209 }
1210
1211 if (deleted_threads.count == 0)
1212 printf ("Deleted thread list is empty\n");
1213 else
1214 {
1215 printf ("Deleted thread list has ");
1216 if (deleted_threads.count == 1)
1217 printf ("1 entry:\n");
1218 else
1219 printf ("%d entries:\n", deleted_threads.count);
1220
1221 for (p = deleted_threads.head; p; p = p->next)
1222 {
1223 print_tthread (p);
1224 }
c906108c
SS
1225 }
1226}
1227#endif
1228
1229/* Update the thread list based on the "seen" bits.
1230 */
1231static void
fba45db2 1232update_thread_list (void)
c906108c 1233{
c5aa993b
JM
1234 thread_info *p;
1235 thread_info *chase;
c906108c 1236
c5aa993b
JM
1237 chase = NULL;
1238 for (p = thread_head.head; p; p = p->next)
1239 {
c906108c 1240 /* Is this an "unseen" thread which really happens to be a process?
39f77062 1241 If so, is it inferior_ptid and is a vfork in flight? If yes to
c906108c
SS
1242 all, then DON'T REMOVE IT! We're in the midst of moving a vfork
1243 operation, which is a multiple step thing, to the point where we
1244 can touch the parent again. We've most likely stopped to examine
1245 the child at a late stage in the vfork, and if we're not following
1246 the child, we'd best not treat the parent as a dead "thread"...
c5aa993b
JM
1247 */
1248 if ((!p->seen) && p->am_pseudo && vfork_in_flight
1249 && (p->pid != vforking_child_pid))
1250 p->seen = 1;
c906108c 1251
c5aa993b
JM
1252 if (!p->seen)
1253 {
1254 /* Remove this one
1255 */
c906108c
SS
1256
1257#ifdef THREAD_DEBUG
c5aa993b
JM
1258 if (debug_on)
1259 printf ("Delete unseen thread: %d \n", p->tid);
c906108c 1260#endif
c5aa993b
JM
1261 del_tthread (p->tid);
1262 }
c906108c
SS
1263 }
1264}
c906108c 1265\f
c5aa993b
JM
1266
1267
c906108c
SS
1268/************************************************
1269 * O/S call wrappers *
1270 ************************************************
1271 */
1272
1273/* This function simply calls ttrace with the given arguments.
1274 * It exists so that all calls to ttrace are isolated. All
1275 * parameters should be as specified by "man 2 ttrace".
1276 *
1277 * No other "raw" calls to ttrace should exist in this module.
1278 */
1279static int
fba45db2
KB
1280call_real_ttrace (ttreq_t request, pid_t pid, lwpid_t tid, TTRACE_ARG_TYPE addr,
1281 TTRACE_ARG_TYPE data, TTRACE_ARG_TYPE addr2)
c906108c 1282{
c5aa993b 1283 int tt_status;
c906108c
SS
1284
1285 errno = 0;
c5aa993b 1286 tt_status = ttrace (request, pid, tid, addr, data, addr2);
c906108c
SS
1287
1288#ifdef THREAD_DEBUG
c5aa993b
JM
1289 if (errno)
1290 {
1291 /* Don't bother for a known benign error: if you ask for the
1292 * first thread state, but there is only one thread and it's
1293 * not stopped, ttrace complains.
1294 *
1295 * We have this inside the #ifdef because our caller will do
1296 * this check for real.
1297 */
1298 if (request != TT_PROC_GET_FIRST_LWP_STATE
1299 || errno != EPROTO)
1300 {
1301 if (debug_on)
1302 printf ("TT fail for %s, with pid %d, tid %d, status %d \n",
1303 get_printable_name_of_ttrace_request (request),
1304 pid, tid, tt_status);
1305 }
c906108c 1306 }
c906108c
SS
1307#endif
1308
1309#if 0
1310 /* ??rehrauer: It would probably be most robust to catch and report
1311 * failed requests here. However, some clients of this interface
1312 * seem to expect to catch & deal with them, so we'd best not.
1313 */
c5aa993b
JM
1314 if (errno)
1315 {
1316 strcpy (reason_for_failure, "ttrace (");
1317 strcat (reason_for_failure, get_printable_name_of_ttrace_request (request));
1318 strcat (reason_for_failure, ")");
1319 printf ("ttrace error, errno = %d\n", errno);
1320 perror_with_name (reason_for_failure);
1321 }
c906108c
SS
1322#endif
1323
1324 return tt_status;
1325}
c906108c 1326\f
c5aa993b 1327
c906108c
SS
1328/* This function simply calls ttrace_wait with the given arguments.
1329 * It exists so that all calls to ttrace_wait are isolated.
1330 *
1331 * No "raw" calls to ttrace_wait should exist elsewhere.
1332 */
1333static int
fba45db2
KB
1334call_real_ttrace_wait (int pid, lwpid_t tid, ttwopt_t option, ttstate_t *tsp,
1335 size_t tsp_size)
c906108c 1336{
c5aa993b
JM
1337 int ttw_status;
1338 thread_info *tinfo = NULL;
c906108c
SS
1339
1340 errno = 0;
1341 ttw_status = ttrace_wait (pid, tid, option, tsp, tsp_size);
c5aa993b
JM
1342
1343 if (errno)
1344 {
c906108c 1345#ifdef THREAD_DEBUG
c5aa993b
JM
1346 if (debug_on)
1347 printf ("TW fail with pid %d, tid %d \n", pid, tid);
c906108c
SS
1348#endif
1349
1350 perror_with_name ("ttrace wait");
c5aa993b 1351 }
c906108c
SS
1352
1353 return ttw_status;
1354}
c906108c 1355\f
c5aa993b 1356
c906108c
SS
1357/* A process may have one or more kernel threads, of which all or
1358 none may be stopped. This function returns the ID of the first
1359 kernel thread in a stopped state, or 0 if none are stopped.
1360
1361 This function can be used with get_process_next_stopped_thread_id
1362 to iterate over the IDs of all stopped threads of this process.
1363 */
1364static lwpid_t
fba45db2 1365get_process_first_stopped_thread_id (int pid, ttstate_t *thread_state)
c906108c 1366{
c5aa993b 1367 int tt_status;
c906108c 1368
a0b3c4fd
JM
1369 tt_status = call_real_ttrace (TT_PROC_GET_FIRST_LWP_STATE,
1370 (pid_t) pid,
1371 (lwpid_t) TT_NIL,
1372 (TTRACE_ARG_TYPE) thread_state,
1373 (TTRACE_ARG_TYPE) sizeof (*thread_state),
1374 TT_NIL);
c5aa993b
JM
1375
1376 if (errno)
1377 {
1378 if (errno == EPROTO)
1379 {
1380 /* This is an error we can handle: there isn't any stopped
1381 * thread. This happens when we're re-starting the application
1382 * and it has only one thread. GET_NEXT handles the case of
1383 * no more stopped threads well; GET_FIRST doesn't. (A ttrace
1384 * "feature".)
1385 */
1386 tt_status = 1;
1387 errno = 0;
1388 return 0;
1389 }
1390 else
1391 perror_with_name ("ttrace");
1392 }
1393
1394 if (tt_status < 0)
c906108c
SS
1395 /* Failed somehow.
1396 */
1397 return 0;
1398
1399 return thread_state->tts_lwpid;
1400}
c906108c 1401\f
c5aa993b 1402
c906108c
SS
1403/* This function returns the ID of the "next" kernel thread in a
1404 stopped state, or 0 if there are none. "Next" refers to the
1405 thread following that of the last successful call to this
1406 function or to get_process_first_stopped_thread_id, using
1407 the value of thread_state returned by that call.
1408
1409 This function can be used with get_process_first_stopped_thread_id
1410 to iterate over the IDs of all stopped threads of this process.
1411 */
1412static lwpid_t
fba45db2 1413get_process_next_stopped_thread_id (int pid, ttstate_t *thread_state)
c906108c 1414{
c5aa993b 1415 int tt_status;
c906108c
SS
1416
1417 tt_status = call_real_ttrace (
c5aa993b
JM
1418 TT_PROC_GET_NEXT_LWP_STATE,
1419 (pid_t) pid,
1420 (lwpid_t) TT_NIL,
1421 (TTRACE_ARG_TYPE) thread_state,
1422 (TTRACE_ARG_TYPE) sizeof (*thread_state),
1423 TT_NIL);
c906108c
SS
1424 if (errno)
1425 perror_with_name ("ttrace");
1426
1427 if (tt_status < 0)
1428 /* Failed
1429 */
1430 return 0;
1431
c5aa993b
JM
1432 else if (tt_status == 0)
1433 {
1434 /* End of list, no next state. Don't return the
1435 * tts_lwpid, as it's a meaningless "240".
1436 *
1437 * This is an HPUX "feature".
1438 */
1439 return 0;
1440 }
1441
c906108c
SS
1442 return thread_state->tts_lwpid;
1443}
1444
1445/* ??rehrauer: Eventually this function perhaps should be calling
1446 pid_to_thread_id. However, that function currently does nothing
1447 for HP-UX. Even then, I'm not clear whether that function
1448 will return a "kernel" thread ID, or a "user" thread ID. If
1449 the former, we can just call it here. If the latter, we must
1450 map from the "user" tid to a "kernel" tid.
1451
1452 NOTE: currently not called.
1453 */
1454static lwpid_t
fba45db2 1455get_active_tid_of_pid (int pid)
c906108c 1456{
c5aa993b 1457 ttstate_t thread_state;
c906108c
SS
1458
1459 return get_process_first_stopped_thread_id (pid, &thread_state);
1460}
1461
1462/* This function returns 1 if tt_request is a ttrace request that
1463 * operates upon all threads of a (i.e., the entire) process.
1464 */
1465int
fba45db2 1466is_process_ttrace_request (ttreq_t tt_request)
c906108c
SS
1467{
1468 return IS_TTRACE_PROCREQ (tt_request);
1469}
c906108c 1470\f
c5aa993b 1471
c906108c
SS
1472/* This function translates a thread ttrace request into
1473 * the equivalent process request for a one-thread process.
1474 */
1475static ttreq_t
fba45db2 1476make_process_version (ttreq_t request)
c906108c 1477{
c5aa993b
JM
1478 if (!IS_TTRACE_REQ (request))
1479 {
1480 error ("Internal error, bad ttrace request made\n");
1481 return -1;
1482 }
c906108c 1483
c5aa993b
JM
1484 switch (request)
1485 {
1486 case TT_LWP_STOP:
c906108c
SS
1487 return TT_PROC_STOP;
1488
c5aa993b 1489 case TT_LWP_CONTINUE:
c906108c
SS
1490 return TT_PROC_CONTINUE;
1491
c5aa993b 1492 case TT_LWP_GET_EVENT_MASK:
c906108c
SS
1493 return TT_PROC_GET_EVENT_MASK;
1494
c5aa993b 1495 case TT_LWP_SET_EVENT_MASK:
c906108c
SS
1496 return TT_PROC_SET_EVENT_MASK;
1497
c5aa993b
JM
1498 case TT_LWP_SINGLE:
1499 case TT_LWP_RUREGS:
1500 case TT_LWP_WUREGS:
1501 case TT_LWP_GET_STATE:
1502 return -1; /* No equivalent */
c906108c 1503
c5aa993b 1504 default:
c906108c 1505 return request;
c5aa993b 1506 }
c906108c 1507}
c906108c 1508\f
c5aa993b 1509
c906108c
SS
1510/* This function translates the "pid" used by the rest of
1511 * gdb to a real pid and a tid. It then calls "call_real_ttrace"
1512 * with the given arguments.
1513 *
1514 * In general, other parts of this module should call this
1515 * function when they are dealing with external users, who only
1516 * have tids to pass (but they call it "pid" for historical
1517 * reasons).
1518 */
1519static int
fba45db2
KB
1520call_ttrace (ttreq_t request, int gdb_tid, TTRACE_ARG_TYPE addr,
1521 TTRACE_ARG_TYPE data, TTRACE_ARG_TYPE addr2)
c906108c 1522{
c5aa993b
JM
1523 lwpid_t real_tid;
1524 int real_pid;
1525 ttreq_t new_request;
1526 int tt_status;
1527 char reason_for_failure[100]; /* Arbitrary size, should be big enough. */
1528
c906108c 1529#ifdef THREAD_DEBUG
c5aa993b 1530 int is_interesting = 0;
c906108c 1531
c5aa993b
JM
1532 if (TT_LWP_RUREGS == request)
1533 {
1534 is_interesting = 1; /* Adjust code here as desired */
1535 }
1536
1537 if (is_interesting && 0 && debug_on)
1538 {
1539 if (!is_process_ttrace_request (request))
1540 {
1541 printf ("TT: Thread request, tid is %d", gdb_tid);
1542 printf ("== SINGLE at %x", addr);
1543 }
1544 else
1545 {
1546 printf ("TT: Process request, tid is %d\n", gdb_tid);
1547 printf ("==! SINGLE at %x", addr);
1548 }
1549 }
c906108c
SS
1550#endif
1551
1552 /* The initial SETTRC and SET_EVENT_MASK calls (and all others
1553 * which happen before any threads get set up) should go
1554 * directly to "call_real_ttrace", so they don't happen here.
1555 *
1556 * But hardware watchpoints do a SET_EVENT_MASK, so we can't
1557 * rule them out....
1558 */
1559#ifdef THREAD_DEBUG
c5aa993b
JM
1560 if (request == TT_PROC_SETTRC && debug_on)
1561 printf ("Unexpected call for TT_PROC_SETTRC\n");
c906108c
SS
1562#endif
1563
1564 /* Sometimes we get called with a bogus tid (e.g., if a
1565 * thread has terminated, we return 0; inftarg later asks
1566 * whether the thread has exited/forked/vforked).
1567 */
c5aa993b 1568 if (gdb_tid == 0)
c906108c 1569 {
c5aa993b 1570 errno = ESRCH; /* ttrace's response would probably be "No such process". */
c906108c
SS
1571 return -1;
1572 }
1573
1574 /* All other cases should be able to expect that there are
1575 * thread records.
1576 */
c5aa993b
JM
1577 if (!any_thread_records ())
1578 {
c906108c 1579#ifdef THREAD_DEBUG
c5aa993b
JM
1580 if (debug_on)
1581 warning ("No thread records for ttrace call");
c906108c 1582#endif
c5aa993b 1583 errno = ESRCH; /* ttrace's response would be "No such process". */
c906108c 1584 return -1;
c5aa993b 1585 }
c906108c
SS
1586
1587 /* OK, now the task is to translate the incoming tid into
1588 * a pid/tid pair.
1589 */
c5aa993b
JM
1590 real_tid = map_from_gdb_tid (gdb_tid);
1591 real_pid = get_pid_for (real_tid);
c906108c
SS
1592
1593 /* Now check the result. "Real_pid" is NULL if our list
1594 * didn't find it. We have some tricks we can play to fix
1595 * this, however.
1596 */
c5aa993b
JM
1597 if (0 == real_pid)
1598 {
1599 ttstate_t thread_state;
c906108c
SS
1600
1601#ifdef THREAD_DEBUG
c5aa993b
JM
1602 if (debug_on)
1603 printf ("No saved pid for tid %d\n", gdb_tid);
c906108c
SS
1604#endif
1605
c5aa993b
JM
1606 if (is_process_ttrace_request (request))
1607 {
1608
1609 /* Ok, we couldn't get a tid. Try to translate to
1610 * the equivalent process operation. We expect this
1611 * NOT to happen, so this is a desparation-type
1612 * move. It can happen if there is an internal
1613 * error and so no "wait()" call is ever done.
1614 */
1615 new_request = make_process_version (request);
1616 if (new_request == -1)
1617 {
1618
c906108c 1619#ifdef THREAD_DEBUG
c5aa993b
JM
1620 if (debug_on)
1621 printf ("...and couldn't make process version of thread operation\n");
c906108c
SS
1622#endif
1623
c5aa993b
JM
1624 /* Use hacky saved pid, which won't always be correct
1625 * in the multi-process future. Use tid as thread,
1626 * probably dooming this to failure. FIX!
1627 */
39f77062 1628 if (! ptid_equal (saved_real_ptid, null_ptid))
c5aa993b 1629 {
c906108c 1630#ifdef THREAD_DEBUG
c5aa993b 1631 if (debug_on)
39f77062
KB
1632 printf ("...using saved pid %d\n",
1633 PIDGET (saved_real_ptid));
c906108c
SS
1634#endif
1635
39f77062 1636 real_pid = PIDGET (saved_real_ptid);
c5aa993b
JM
1637 real_tid = gdb_tid;
1638 }
c906108c 1639
c5aa993b
JM
1640 else
1641 error ("Unable to perform thread operation");
1642 }
c906108c 1643
c5aa993b
JM
1644 else
1645 {
1646 /* Sucessfully translated this to a process request,
1647 * which needs no thread value.
1648 */
1649 real_pid = gdb_tid;
1650 real_tid = 0;
1651 request = new_request;
c906108c
SS
1652
1653#ifdef THREAD_DEBUG
c5aa993b
JM
1654 if (debug_on)
1655 {
1656 printf ("Translated thread request to process request\n");
39f77062 1657 if (ptid_equal (saved_real_ptid, null_ptid))
c5aa993b
JM
1658 printf ("...but there's no saved pid\n");
1659
1660 else
1661 {
39f77062 1662 if (gdb_tid != PIDGET (saved_real_ptid))
c5aa993b 1663 printf ("...but have the wrong pid (%d rather than %d)\n",
39f77062 1664 gdb_tid, PIDGET (saved_real_ptid));
c5aa993b
JM
1665 }
1666 }
c906108c 1667#endif
c5aa993b
JM
1668 } /* Translated to a process request */
1669 } /* Is a process request */
c906108c 1670
c5aa993b
JM
1671 else
1672 {
1673 /* We have to have a thread. Ooops.
1674 */
1675 error ("Thread request with no threads (%s)",
1676 get_printable_name_of_ttrace_request (request));
1677 }
c906108c 1678 }
c906108c
SS
1679
1680 /* Ttrace doesn't like to see tid values on process requests,
1681 * even if we have the right one.
1682 */
c5aa993b
JM
1683 if (is_process_ttrace_request (request))
1684 {
c906108c 1685 real_tid = 0;
c5aa993b
JM
1686 }
1687
c906108c 1688#ifdef THREAD_DEBUG
c5aa993b
JM
1689 if (is_interesting && 0 && debug_on)
1690 {
1691 printf (" now tid %d, pid %d\n", real_tid, real_pid);
1692 printf (" request is %s\n", get_printable_name_of_ttrace_request (request));
1693 }
c906108c
SS
1694#endif
1695
1696 /* Finally, the (almost) real call.
1697 */
1698 tt_status = call_real_ttrace (request, real_pid, real_tid, addr, data, addr2);
1699
1700#ifdef THREAD_DEBUG
c5aa993b
JM
1701 if (is_interesting && debug_on)
1702 {
1703 if (!TT_OK (tt_status, errno)
1704 && !(tt_status == 0 & errno == 0))
1705 printf (" got error (errno==%d, status==%d)\n", errno, tt_status);
1706 }
c906108c
SS
1707#endif
1708
1709 return tt_status;
1710}
1711
1712
1713/* Stop all the threads of a process.
c5aa993b 1714
c906108c
SS
1715 * NOTE: use of TT_PROC_STOP can cause a thread with a real event
1716 * to get a TTEVT_NONE event, discarding the old event. Be
1717 * very careful, and only call TT_PROC_STOP when you mean it!
1718 */
1719static void
fba45db2 1720stop_all_threads_of_process (pid_t real_pid)
c906108c 1721{
c5aa993b 1722 int ttw_status;
c906108c
SS
1723
1724 ttw_status = call_real_ttrace (TT_PROC_STOP,
c5aa993b
JM
1725 (pid_t) real_pid,
1726 (lwpid_t) TT_NIL,
1727 (TTRACE_ARG_TYPE) TT_NIL,
1728 (TTRACE_ARG_TYPE) TT_NIL,
1729 TT_NIL);
c906108c
SS
1730 if (errno)
1731 perror_with_name ("ttrace stop of other threads");
1732}
1733
1734
1735/* Under some circumstances, it's unsafe to attempt to stop, or even
1736 query the state of, a process' threads.
1737
1738 In ttrace-based HP-UX, an example is a vforking child process. The
1739 vforking parent and child are somewhat fragile, w/r/t what we can do
1740 what we can do to them with ttrace, until after the child exits or
1741 execs, or until the parent's vfork event is delivered. Until that
1742 time, we must not try to stop the process' threads, or inquire how
1743 many there are, or even alter its data segments, or it typically dies
1744 with a SIGILL. Sigh.
1745
1746 This function returns 1 if this stopped process, and the event that
1747 we're told was responsible for its current stopped state, cannot safely
1748 have its threads examined.
c5aa993b 1749 */
c906108c 1750#define CHILD_VFORKED(evt,pid) \
39f77062 1751 (((evt) == TTEVT_VFORK) && ((pid) != PIDGET (inferior_ptid)))
c906108c
SS
1752#define CHILD_URPED(evt,pid) \
1753 ((((evt) == TTEVT_EXEC) || ((evt) == TTEVT_EXIT)) && ((pid) != vforking_child_pid))
1754#define PARENT_VFORKED(evt,pid) \
39f77062 1755 (((evt) == TTEVT_VFORK) && ((pid) == PIDGET (inferior_ptid)))
c906108c
SS
1756
1757static int
fba45db2 1758can_touch_threads_of_process (int pid, ttevents_t stopping_event)
c906108c
SS
1759{
1760 if (CHILD_VFORKED (stopping_event, pid))
1761 {
1762 vforking_child_pid = pid;
1763 vfork_in_flight = 1;
1764 }
1765
1766 else if (vfork_in_flight &&
c5aa993b
JM
1767 (PARENT_VFORKED (stopping_event, pid) ||
1768 CHILD_URPED (stopping_event, pid)))
c906108c
SS
1769 {
1770 vfork_in_flight = 0;
1771 vforking_child_pid = 0;
1772 }
1773
c5aa993b 1774 return !vfork_in_flight;
c906108c
SS
1775}
1776
1777
1778/* If we can find an as-yet-unhandled thread state of a
1779 * stopped thread of this process return 1 and set "tsp".
1780 * Return 0 if we can't.
1781 *
1782 * If this function is used when the threads of PIS haven't
1783 * been stopped, undefined behaviour is guaranteed!
1784 */
c5aa993b 1785static int
fba45db2 1786select_stopped_thread_of_process (int pid, ttstate_t *tsp)
c906108c 1787{
c5aa993b
JM
1788 lwpid_t candidate_tid, tid;
1789 ttstate_t candidate_tstate, tstate;
c906108c
SS
1790
1791 /* If we're not allowed to touch the process now, then just
1792 * return the current value of *TSP.
1793 *
1794 * This supports "vfork". It's ok, really, to double the
1795 * current event (the child EXEC, we hope!).
1796 */
c5aa993b 1797 if (!can_touch_threads_of_process (pid, tsp->tts_event))
c906108c
SS
1798 return 1;
1799
1800 /* Decide which of (possibly more than one) events to
1801 * return as the first one. We scan them all so that
1802 * we always return the result of a fake-step first.
1803 */
1804 candidate_tid = 0;
1805 for (tid = get_process_first_stopped_thread_id (pid, &tstate);
1806 tid != 0;
1807 tid = get_process_next_stopped_thread_id (pid, &tstate))
1808 {
1809 /* TTEVT_NONE events are uninteresting to our clients. They're
1810 * an artifact of our "stop the world" model--the thread is
1811 * stopped because we stopped it.
1812 */
c5aa993b
JM
1813 if (tstate.tts_event == TTEVT_NONE)
1814 {
1815 set_handled (pid, tstate.tts_lwpid);
1816 }
c906108c
SS
1817
1818 /* Did we just single-step a single thread, without letting any
1819 * of the others run? Is this an event for that thread?
1820 *
1821 * If so, we believe our client would prefer to see this event
1822 * over any others. (Typically the client wants to just push
1823 * one thread a little farther forward, and then go around
1824 * checking for what all threads are doing.)
1825 */
1826 else if (doing_fake_step && (tstate.tts_lwpid == fake_step_tid))
c5aa993b 1827 {
c906108c 1828#ifdef WAIT_BUFFER_DEBUG
c5aa993b
JM
1829 /* It's possible here to see either a SIGTRAP (due to
1830 * successful completion of a step) or a SYSCALL_ENTRY
1831 * (due to a step completion with active hardware
1832 * watchpoints).
1833 */
1834 if (debug_on)
1835 printf ("Ending fake step with tid %d, state %s\n",
1836 tstate.tts_lwpid,
1837 get_printable_name_of_ttrace_event (tstate.tts_event));
1838#endif
1839
1840 /* Remember this one, and throw away any previous
1841 * candidate.
1842 */
1843 candidate_tid = tstate.tts_lwpid;
1844 candidate_tstate = tstate;
1845 }
c906108c
SS
1846
1847#ifdef FORGET_DELETED_BPTS
1848
1849 /* We can't just do this, as if we do, and then wind
1850 * up the loop with no unhandled events, we need to
1851 * handle that case--the appropriate reaction is to
1852 * just continue, but there's no easy way to do that.
1853 *
1854 * Better to put this in the ttrace_wait call--if, when
1855 * we fake a wait, we update our events based on the
1856 * breakpoint_here_pc call and find there are no more events,
1857 * then we better continue and so on.
1858 *
1859 * Or we could put it in the next/continue fake.
1860 * But it has to go in the buffering code, not in the
1861 * real go/wait code.
1862 */
c5aa993b
JM
1863 else if ((TTEVT_SIGNAL == tstate.tts_event)
1864 && (5 == tstate.tts_u.tts_signal.tts_signo)
1865 && (0 != get_raw_pc (tstate.tts_lwpid))
1866 && !breakpoint_here_p (get_raw_pc (tstate.tts_lwpid)))
1867 {
1868 /*
1869 * If the user deleted a breakpoint while this
1870 * breakpoint-hit event was buffered, we can forget
1871 * it now.
1872 */
c906108c 1873#ifdef WAIT_BUFFER_DEBUG
c5aa993b
JM
1874 if (debug_on)
1875 printf ("Forgetting deleted bp hit for thread %d\n",
1876 tstate.tts_lwpid);
1877#endif
c906108c 1878
c5aa993b
JM
1879 set_handled (pid, tstate.tts_lwpid);
1880 }
c906108c
SS
1881#endif
1882
1883 /* Else, is this the first "unhandled" event? If so,
1884 * we believe our client wants to see it (if we don't
1885 * see a fake-step later on in the scan).
1886 */
c5aa993b
JM
1887 else if (!was_handled (tstate.tts_lwpid) && candidate_tid == 0)
1888 {
1889 candidate_tid = tstate.tts_lwpid;
1890 candidate_tstate = tstate;
1891 }
c906108c
SS
1892
1893 /* This is either an event that has already been "handled",
1894 * and thus we believe is uninteresting to our client, or we
1895 * already have a candidate event. Ignore it...
1896 */
1897 }
1898
1899 /* What do we report?
1900 */
c5aa993b
JM
1901 if (doing_fake_step)
1902 {
1903 if (candidate_tid == fake_step_tid)
1904 {
1905 /* Fake step.
1906 */
1907 tstate = candidate_tstate;
1908 }
1909 else
1910 {
1911 warning ("Internal error: fake-step failed to complete.");
1912 return 0;
1913 }
1914 }
1915 else if (candidate_tid != 0)
1916 {
c906108c
SS
1917 /* Found a candidate unhandled event.
1918 */
1919 tstate = candidate_tstate;
c5aa993b
JM
1920 }
1921 else if (tid != 0)
1922 {
1923 warning ("Internal error in call of ttrace_wait.");
c906108c 1924 return 0;
c5aa993b
JM
1925 }
1926 else
1927 {
c906108c
SS
1928 warning ("Internal error: no unhandled thread event to select");
1929 return 0;
c5aa993b 1930 }
c906108c
SS
1931
1932 copy_ttstate_t (tsp, &tstate);
1933 return 1;
c5aa993b 1934} /* End of select_stopped_thread_of_process */
c906108c
SS
1935
1936#ifdef PARANOIA
1937/* Check our internal thread data against the real thing.
1938 */
1939static void
fba45db2 1940check_thread_consistency (pid_t real_pid)
c906108c 1941{
c5aa993b
JM
1942 int tid; /* really lwpid_t */
1943 ttstate_t tstate;
1944 thread_info *p;
c906108c 1945
c5aa993b
JM
1946 /* Spin down the O/S list of threads, checking that they
1947 * match what we've got.
1948 */
1949 for (tid = get_process_first_stopped_thread_id (real_pid, &tstate);
1950 tid != 0;
1951 tid = get_process_next_stopped_thread_id (real_pid, &tstate))
1952 {
c906108c 1953
c5aa993b 1954 p = find_thread_info (tid);
c906108c 1955
c5aa993b
JM
1956 if (NULL == p)
1957 {
1958 warning ("No internal thread data for thread %d.", tid);
1959 continue;
1960 }
1961
1962 if (!p->seen)
1963 {
1964 warning ("Inconsistent internal thread data for thread %d.", tid);
1965 }
1966
1967 if (p->terminated)
1968 {
1969 warning ("Thread %d is not terminated, internal error.", tid);
1970 continue;
1971 }
c906108c
SS
1972
1973
1974#define TT_COMPARE( fld ) \
1975 tstate.fld != p->last_stop_state.fld
c5aa993b
JM
1976
1977 if (p->have_state)
1978 {
1979 if (TT_COMPARE (tts_pid)
1980 || TT_COMPARE (tts_lwpid)
1981 || TT_COMPARE (tts_user_tid)
1982 || TT_COMPARE (tts_event)
1983 || TT_COMPARE (tts_flags)
1984 || TT_COMPARE (tts_scno)
1985 || TT_COMPARE (tts_scnargs))
1986 {
1987 warning ("Internal thread data for thread %d is wrong.", tid);
1988 continue;
1989 }
1990 }
c906108c
SS
1991 }
1992}
c5aa993b 1993#endif /* PARANOIA */
c906108c 1994\f
c5aa993b 1995
c906108c
SS
1996/* This function wraps calls to "call_real_ttrace_wait" so
1997 * that a actual wait is only done when all pending events
1998 * have been reported.
1999 *
2000 * Note that typically it is called with a pid of "0", i.e.
2001 * the "don't care" value.
2002 *
2003 * Return value is the status of the pseudo wait.
2004 */
2005static int
fba45db2 2006call_ttrace_wait (int pid, ttwopt_t option, ttstate_t *tsp, size_t tsp_size)
c906108c
SS
2007{
2008 /* This holds the actual, for-real, true process ID.
2009 */
2010 static int real_pid;
2011
2012 /* As an argument to ttrace_wait, zero pid
2013 * means "Any process", and zero tid means
2014 * "Any thread of the specified process".
2015 */
c5aa993b
JM
2016 int wait_pid = 0;
2017 lwpid_t wait_tid = 0;
2018 lwpid_t real_tid;
c906108c 2019
c5aa993b 2020 int ttw_status = 0; /* To be returned */
c906108c 2021
c5aa993b 2022 thread_info *tinfo = NULL;
c906108c 2023
c5aa993b
JM
2024 if (pid != 0)
2025 {
c906108c
SS
2026 /* Unexpected case.
2027 */
2028#ifdef THREAD_DEBUG
c5aa993b
JM
2029 if (debug_on)
2030 printf ("TW: Pid to wait on is %d\n", pid);
c906108c
SS
2031#endif
2032
c5aa993b
JM
2033 if (!any_thread_records ())
2034 error ("No thread records for ttrace call w. specific pid");
c906108c
SS
2035
2036 /* OK, now the task is to translate the incoming tid into
2037 * a pid/tid pair.
2038 */
c5aa993b
JM
2039 real_tid = map_from_gdb_tid (pid);
2040 real_pid = get_pid_for (real_tid);
c906108c 2041#ifdef THREAD_DEBUG
c5aa993b
JM
2042 if (debug_on)
2043 printf ("==TW: real pid %d, real tid %d\n", real_pid, real_tid);
c906108c 2044#endif
c5aa993b 2045 }
c906108c
SS
2046
2047
2048 /* Sanity checks and set-up.
2049 * Process State
2050 *
2051 * Stopped Running Fake-step (v)Fork
2052 * \________________________________________
2053 * |
2054 * No buffered events | error wait wait wait
2055 * |
2056 * Buffered events | debuffer error wait debuffer (?)
2057 *
2058 */
c5aa993b
JM
2059 if (more_events_left == 0)
2060 {
2061
2062 if (process_state == RUNNING)
2063 {
2064 /* OK--normal call of ttrace_wait with no buffered events.
2065 */
2066 ;
2067 }
2068 else if (process_state == FAKE_STEPPING)
2069 {
2070 /* Ok--call of ttrace_wait to support
2071 * fake stepping with no buffered events.
2072 *
2073 * But we better be fake-stepping!
2074 */
2075 if (!doing_fake_step)
2076 {
2077 warning ("Inconsistent thread state.");
2078 }
2079 }
2080 else if ((process_state == FORKING)
2081 || (process_state == VFORKING))
2082 {
2083 /* Ok--there are two processes, so waiting
2084 * for the second while the first is stopped
2085 * is ok. Handled bits stay as they were.
2086 */
2087 ;
2088 }
2089 else if (process_state == STOPPED)
2090 {
2091 warning ("Process not running at wait call.");
2092 }
c906108c 2093 else
c5aa993b
JM
2094 /* No known state.
2095 */
2096 warning ("Inconsistent process state.");
2097 }
2098
2099 else
2100 {
c906108c
SS
2101 /* More events left
2102 */
c5aa993b
JM
2103 if (process_state == STOPPED)
2104 {
2105 /* OK--buffered events being unbuffered.
2106 */
2107 ;
2108 }
2109 else if (process_state == RUNNING)
2110 {
2111 /* An error--shouldn't have buffered events
2112 * when running.
2113 */
2114 warning ("Trying to continue with buffered events:");
2115 }
2116 else if (process_state == FAKE_STEPPING)
2117 {
2118 /*
2119 * Better be fake-stepping!
2120 */
2121 if (!doing_fake_step)
2122 {
2123 warning ("Losing buffered thread events!\n");
2124 }
2125 }
2126 else if ((process_state == FORKING)
2127 || (process_state == VFORKING))
2128 {
2129 /* Ok--there are two processes, so waiting
2130 * for the second while the first is stopped
2131 * is ok. Handled bits stay as they were.
2132 */
2133 ;
2134 }
c906108c 2135 else
c5aa993b
JM
2136 warning ("Process in unknown state with buffered events.");
2137 }
c906108c
SS
2138
2139 /* Sometimes we have to wait for a particular thread
2140 * (if we're stepping over a bpt). In that case, we
2141 * _know_ it's going to complete the single-step we
2142 * asked for (because we're only doing the step under
2143 * certain very well-understood circumstances), so it
2144 * can't block.
2145 */
c5aa993b
JM
2146 if (doing_fake_step)
2147 {
c906108c 2148 wait_tid = fake_step_tid;
c5aa993b 2149 wait_pid = get_pid_for (fake_step_tid);
c906108c
SS
2150
2151#ifdef WAIT_BUFFER_DEBUG
c5aa993b
JM
2152 if (debug_on)
2153 printf ("Doing a wait after a fake-step for %d, pid %d\n",
2154 wait_tid, wait_pid);
c906108c 2155#endif
c5aa993b 2156 }
c906108c 2157
c5aa993b
JM
2158 if (more_events_left == 0 /* No buffered events, need real ones. */
2159 || process_state != STOPPED)
2160 {
c906108c
SS
2161 /* If there are no buffered events, and so we need
2162 * real ones, or if we are FORKING, VFORKING,
2163 * FAKE_STEPPING or RUNNING, and thus have to do
2164 * a real wait, then do a real wait.
2165 */
2166
2167#ifdef WAIT_BUFFER_DEBUG
2168 /* Normal case... */
c5aa993b
JM
2169 if (debug_on)
2170 printf ("TW: do it for real; pid %d, tid %d\n", wait_pid, wait_tid);
c906108c
SS
2171#endif
2172
2173 /* The actual wait call.
2174 */
c5aa993b 2175 ttw_status = call_real_ttrace_wait (wait_pid, wait_tid, option, tsp, tsp_size);
c906108c
SS
2176
2177 /* Note that the routines we'll call will be using "call_real_ttrace",
2178 * not "call_ttrace", and thus need the real pid rather than the pseudo-tid
2179 * the rest of the world uses (which is actually the tid).
2180 */
2181 real_pid = tsp->tts_pid;
2182
2183 /* For most events: Stop the world!
c5aa993b 2184
c906108c
SS
2185 * It's sometimes not safe to stop all threads of a process.
2186 * Sometimes it's not even safe to ask for the thread state
2187 * of a process!
2188 */
2189 if (can_touch_threads_of_process (real_pid, tsp->tts_event))
c5aa993b
JM
2190 {
2191 /* If we're really only stepping a single thread, then don't
2192 * try to stop all the others -- we only do this single-stepping
2193 * business when all others were already stopped...and the stop
2194 * would mess up other threads' events.
2195 *
2196 * Similiarly, if there are other threads with events,
2197 * don't do the stop.
2198 */
2199 if (!doing_fake_step)
2200 {
2201 if (more_events_left > 0)
2202 warning ("Internal error in stopping process");
2203
2204 stop_all_threads_of_process (real_pid);
2205
2206 /* At this point, we could scan and update_thread_list(),
2207 * and only use the local list for the rest of the
2208 * module! We'd get rid of the scans in the various
2209 * continue routines (adding one in attach). It'd
2210 * be great--UPGRADE ME!
2211 */
2212 }
2213 }
2214
c906108c 2215#ifdef PARANOIA
c5aa993b
JM
2216 else if (debug_on)
2217 {
2218 if (more_events_left > 0)
2219 printf ("== Can't stop process; more events!\n");
2220 else
2221 printf ("== Can't stop process!\n");
2222 }
c906108c
SS
2223#endif
2224
c5aa993b 2225 process_state = STOPPED;
c906108c
SS
2226
2227#ifdef WAIT_BUFFER_DEBUG
c5aa993b
JM
2228 if (debug_on)
2229 printf ("Process set to STOPPED\n");
c906108c 2230#endif
c5aa993b
JM
2231 }
2232
2233 else
2234 {
c906108c
SS
2235 /* Fake a call to ttrace_wait. The process must be
2236 * STOPPED, as we aren't going to do any wait.
2237 */
2238#ifdef WAIT_BUFFER_DEBUG
c5aa993b
JM
2239 if (debug_on)
2240 printf ("TW: fake it\n");
c906108c
SS
2241#endif
2242
c5aa993b
JM
2243 if (process_state != STOPPED)
2244 {
2245 warning ("Process not stopped at wait call, in state '%s'.\n",
2246 get_printable_name_of_process_state (process_state));
2247 }
2248
2249 if (doing_fake_step)
2250 error ("Internal error in stepping over breakpoint");
c906108c 2251
c5aa993b
JM
2252 ttw_status = 0; /* Faking it is always successful! */
2253 } /* End of fake or not? if */
c906108c
SS
2254
2255 /* Pick an event to pass to our caller. Be paranoid.
2256 */
c5aa993b
JM
2257 if (!select_stopped_thread_of_process (real_pid, tsp))
2258 warning ("Can't find event, using previous event.");
2259
2260 else if (tsp->tts_event == TTEVT_NONE)
2261 warning ("Internal error: no thread has a real event.");
c906108c 2262
c5aa993b
JM
2263 else if (doing_fake_step)
2264 {
2265 if (fake_step_tid != tsp->tts_lwpid)
2266 warning ("Internal error in stepping over breakpoint.");
c906108c 2267
c906108c
SS
2268 /* This wait clears the (current) fake-step if there was one.
2269 */
2270 doing_fake_step = 0;
c5aa993b
JM
2271 fake_step_tid = 0;
2272 }
c906108c
SS
2273
2274 /* We now have a correct tsp and ttw_status for the thread
2275 * which we want to report. So it's "handled"! This call
2276 * will add it to our list if it's not there already.
2277 */
c5aa993b 2278 set_handled (real_pid, tsp->tts_lwpid);
c906108c
SS
2279
2280 /* Save a copy of the ttrace state of this thread, in our local
2281 thread descriptor.
2282
2283 This caches the state. The implementation of queries like
47932f85 2284 hpux_has_execd can then use this cached state, rather than
c906108c
SS
2285 be forced to make an explicit ttrace call to get it.
2286
2287 (Guard against the condition that this is the first time we've
2288 waited on, i.e., seen this thread, and so haven't yet entered
2289 it into our list of threads.)
2290 */
2291 tinfo = find_thread_info (tsp->tts_lwpid);
c5aa993b
JM
2292 if (tinfo != NULL)
2293 {
2294 copy_ttstate_t (&tinfo->last_stop_state, tsp);
2295 tinfo->have_state = 1;
2296 }
2297
c906108c 2298 return ttw_status;
c5aa993b 2299} /* call_ttrace_wait */
c906108c
SS
2300
2301#if defined(CHILD_REPORTED_EXEC_EVENTS_PER_EXEC_CALL)
2302int
fba45db2 2303child_reported_exec_events_per_exec_call (void)
c906108c 2304{
c5aa993b 2305 return 1; /* ttrace reports the event once per call. */
c906108c
SS
2306}
2307#endif
c5aa993b 2308\f
c906108c
SS
2309
2310
c906108c
SS
2311/* Our implementation of hardware watchpoints involves making memory
2312 pages write-protected. We must remember a page's original permissions,
2313 and we must also know when it is appropriate to restore a page's
2314 permissions to its original state.
2315
2316 We use a "dictionary" of hardware-watched pages to do this. Each
2317 hardware-watched page is recorded in the dictionary. Each page's
2318 dictionary entry contains the original permissions and a reference
2319 count. Pages are hashed into the dictionary by their start address.
2320
2321 When hardware watchpoint is set on page X for the first time, page X
2322 is added to the dictionary with a reference count of 1. If other
2323 hardware watchpoints are subsequently set on page X, its reference
2324 count is incremented. When hardware watchpoints are removed from
2325 page X, its reference count is decremented. If a page's reference
2326 count drops to 0, it's permissions are restored and the page's entry
2327 is thrown out of the dictionary.
c5aa993b
JM
2328 */
2329typedef struct memory_page
2330{
2331 CORE_ADDR page_start;
2332 int reference_count;
2333 int original_permissions;
2334 struct memory_page *next;
2335 struct memory_page *previous;
2336}
2337memory_page_t;
c906108c
SS
2338
2339#define MEMORY_PAGE_DICTIONARY_BUCKET_COUNT 128
2340
c5aa993b
JM
2341static struct
2342 {
2343 LONGEST page_count;
2344 int page_size;
2345 int page_protections_allowed;
2346 /* These are just the heads of chains of actual page descriptors. */
2347 memory_page_t buckets[MEMORY_PAGE_DICTIONARY_BUCKET_COUNT];
2348 }
2349memory_page_dictionary;
c906108c
SS
2350
2351
2352static void
fba45db2 2353require_memory_page_dictionary (void)
c906108c 2354{
c5aa993b 2355 int i;
c906108c
SS
2356
2357 /* Is the memory page dictionary ready for use? If so, we're done. */
2358 if (memory_page_dictionary.page_count >= (LONGEST) 0)
2359 return;
2360
2361 /* Else, initialize it. */
2362 memory_page_dictionary.page_count = (LONGEST) 0;
2363
c5aa993b 2364 for (i = 0; i < MEMORY_PAGE_DICTIONARY_BUCKET_COUNT; i++)
c906108c
SS
2365 {
2366 memory_page_dictionary.buckets[i].page_start = (CORE_ADDR) 0;
2367 memory_page_dictionary.buckets[i].reference_count = 0;
2368 memory_page_dictionary.buckets[i].next = NULL;
2369 memory_page_dictionary.buckets[i].previous = NULL;
2370 }
2371}
2372
2373
2374static void
fba45db2 2375retire_memory_page_dictionary (void)
c906108c 2376{
c5aa993b 2377 memory_page_dictionary.page_count = (LONGEST) - 1;
c906108c
SS
2378}
2379
2380
2381/* Write-protect the memory page that starts at this address.
2382
2383 Returns the original permissions of the page.
2384 */
2385static int
fba45db2 2386write_protect_page (int pid, CORE_ADDR page_start)
c906108c 2387{
c5aa993b
JM
2388 int tt_status;
2389 int original_permissions;
2390 int new_permissions;
c906108c
SS
2391
2392 tt_status = call_ttrace (TT_PROC_GET_MPROTECT,
c5aa993b
JM
2393 pid,
2394 (TTRACE_ARG_TYPE) page_start,
2395 TT_NIL,
2396 (TTRACE_ARG_TYPE) & original_permissions);
c906108c
SS
2397 if (errno || (tt_status < 0))
2398 {
c5aa993b 2399 return 0; /* What else can we do? */
c906108c
SS
2400 }
2401
2402 /* We'll also write-protect the page now, if that's allowed. */
2403 if (memory_page_dictionary.page_protections_allowed)
2404 {
2405 new_permissions = original_permissions & ~PROT_WRITE;
2406 tt_status = call_ttrace (TT_PROC_SET_MPROTECT,
c5aa993b
JM
2407 pid,
2408 (TTRACE_ARG_TYPE) page_start,
2409 (TTRACE_ARG_TYPE) memory_page_dictionary.page_size,
2410 (TTRACE_ARG_TYPE) new_permissions);
c906108c 2411 if (errno || (tt_status < 0))
c5aa993b
JM
2412 {
2413 return 0; /* What else can we do? */
2414 }
c906108c
SS
2415 }
2416
2417 return original_permissions;
2418}
2419
2420
2421/* Unwrite-protect the memory page that starts at this address, restoring
2422 (what we must assume are) its original permissions.
c5aa993b 2423 */
c906108c 2424static void
fba45db2 2425unwrite_protect_page (int pid, CORE_ADDR page_start, int original_permissions)
c906108c 2426{
c5aa993b 2427 int tt_status;
c906108c
SS
2428
2429 tt_status = call_ttrace (TT_PROC_SET_MPROTECT,
c5aa993b
JM
2430 pid,
2431 (TTRACE_ARG_TYPE) page_start,
2432 (TTRACE_ARG_TYPE) memory_page_dictionary.page_size,
2433 (TTRACE_ARG_TYPE) original_permissions);
c906108c
SS
2434 if (errno || (tt_status < 0))
2435 {
c5aa993b 2436 return; /* What else can we do? */
c906108c
SS
2437 }
2438}
2439
2440
2441/* Memory page-protections are used to implement "hardware" watchpoints
2442 on HP-UX.
2443
2444 For every memory page that is currently being watched (i.e., that
2445 presently should be write-protected), write-protect it.
c5aa993b 2446 */
c906108c 2447void
fba45db2 2448hppa_enable_page_protection_events (int pid)
c906108c 2449{
c5aa993b 2450 int bucket;
c906108c
SS
2451
2452 memory_page_dictionary.page_protections_allowed = 1;
2453
c5aa993b 2454 for (bucket = 0; bucket < MEMORY_PAGE_DICTIONARY_BUCKET_COUNT; bucket++)
c906108c 2455 {
c5aa993b 2456 memory_page_t *page;
c906108c
SS
2457
2458 page = memory_page_dictionary.buckets[bucket].next;
2459 while (page != NULL)
c5aa993b
JM
2460 {
2461 page->original_permissions = write_protect_page (pid, page->page_start);
2462 page = page->next;
2463 }
c906108c
SS
2464 }
2465}
2466
2467
2468/* Memory page-protections are used to implement "hardware" watchpoints
2469 on HP-UX.
2470
2471 For every memory page that is currently being watched (i.e., that
2472 presently is or should be write-protected), un-write-protect it.
c5aa993b 2473 */
c906108c 2474void
fba45db2 2475hppa_disable_page_protection_events (int pid)
c906108c 2476{
c5aa993b 2477 int bucket;
c906108c 2478
c5aa993b 2479 for (bucket = 0; bucket < MEMORY_PAGE_DICTIONARY_BUCKET_COUNT; bucket++)
c906108c 2480 {
c5aa993b 2481 memory_page_t *page;
c906108c
SS
2482
2483 page = memory_page_dictionary.buckets[bucket].next;
2484 while (page != NULL)
c5aa993b
JM
2485 {
2486 unwrite_protect_page (pid, page->page_start, page->original_permissions);
2487 page = page->next;
2488 }
c906108c
SS
2489 }
2490
2491 memory_page_dictionary.page_protections_allowed = 0;
2492}
2493
2494/* Count the number of outstanding events. At this
2495 * point, we have selected one thread and its event
2496 * as the one to be "reported" upwards to core gdb.
2497 * That thread is already marked as "handled".
2498 *
2499 * Note: we could just scan our own thread list. FIXME!
2500 */
2501static int
fba45db2 2502count_unhandled_events (int real_pid, lwpid_t real_tid)
c906108c 2503{
c5aa993b
JM
2504 ttstate_t tstate;
2505 lwpid_t ttid;
2506 int events_left;
2507
c906108c
SS
2508 /* Ok, find out how many threads have real events to report.
2509 */
2510 events_left = 0;
c5aa993b 2511 ttid = get_process_first_stopped_thread_id (real_pid, &tstate);
c906108c
SS
2512
2513#ifdef THREAD_DEBUG
c5aa993b
JM
2514 if (debug_on)
2515 {
2516 if (ttid == 0)
2517 printf ("Process %d has no threads\n", real_pid);
c906108c 2518 else
c5aa993b
JM
2519 printf ("Process %d has these threads:\n", real_pid);
2520 }
c906108c
SS
2521#endif
2522
c5aa993b
JM
2523 while (ttid > 0)
2524 {
2525 if (tstate.tts_event != TTEVT_NONE
2526 && !was_handled (ttid))
2527 {
2528 /* TTEVT_NONE implies we just stopped it ourselves
2529 * because we're the stop-the-world guys, so it's
2530 * not an event from our point of view.
2531 *
2532 * If "was_handled" is true, this is an event we
2533 * already handled, so don't count it.
2534 *
2535 * Note that we don't count the thread with the
2536 * currently-reported event, as it's already marked
2537 * as handled.
2538 */
2539 events_left++;
2540 }
2541
c906108c 2542#if defined( THREAD_DEBUG ) || defined( WAIT_BUFFER_DEBUG )
c5aa993b
JM
2543 if (debug_on)
2544 {
2545 if (ttid == real_tid)
2546 printf ("*"); /* Thread we're reporting */
2547 else
2548 printf (" ");
2549
2550 if (tstate.tts_event != TTEVT_NONE)
2551 printf ("+"); /* Thread with a real event */
2552 else
2553 printf (" ");
2554
2555 if (was_handled (ttid))
2556 printf ("h"); /* Thread has been handled */
2557 else
2558 printf (" ");
2559
2560 printf (" %d, with event %s", ttid,
2561 get_printable_name_of_ttrace_event (tstate.tts_event));
2562
2563 if (tstate.tts_event == TTEVT_SIGNAL
2564 && 5 == tstate.tts_u.tts_signal.tts_signo)
2565 {
2566 CORE_ADDR pc_val;
c906108c 2567
c5aa993b
JM
2568 pc_val = get_raw_pc (ttid);
2569
2570 if (pc_val > 0)
2571 printf (" breakpoint at 0x%x\n", pc_val);
2572 else
2573 printf (" bpt, can't fetch pc.\n");
2574 }
2575 else
2576 printf ("\n");
2577 }
c906108c
SS
2578#endif
2579
2580 ttid = get_process_next_stopped_thread_id (real_pid, &tstate);
c5aa993b 2581 }
c906108c
SS
2582
2583#if defined( THREAD_DEBUG ) || defined( WAIT_BUFFER_DEBUG )
c5aa993b
JM
2584 if (debug_on)
2585 if (events_left > 0)
2586 printf ("There are thus %d pending events\n", events_left);
c906108c
SS
2587#endif
2588
2589 return events_left;
2590}
2591
2592/* This function is provided as a sop to clients that are calling
2593 * ptrace_wait to wait for a process to stop. (see the
2594 * implementation of child_wait.) Return value is the pid for
2595 * the event that ended the wait.
2596 *
2597 * Note: used by core gdb and so uses the pseudo-pid (really tid).
2598 */
de6ee558 2599int
39f77062 2600ptrace_wait (ptid_t ptid, int *status)
c906108c 2601{
c5aa993b
JM
2602 ttstate_t tsp;
2603 int ttwait_return;
2604 int real_pid;
2605 ttstate_t state;
2606 lwpid_t real_tid;
2607 int return_pid;
c906108c
SS
2608
2609 /* The ptrace implementation of this also ignores pid.
2610 */
2611 *status = 0;
2612
c5aa993b 2613 ttwait_return = call_ttrace_wait (0, TTRACE_WAITOK, &tsp, sizeof (tsp));
c906108c
SS
2614 if (ttwait_return < 0)
2615 {
2616 /* ??rehrauer: It appears that if our inferior exits and we
2617 haven't asked for exit events, that we're not getting any
2618 indication save a negative return from ttrace_wait and an
2619 errno set to ESRCH?
c5aa993b 2620 */
c906108c 2621 if (errno == ESRCH)
c5aa993b
JM
2622 {
2623 *status = 0; /* WIFEXITED */
de6ee558 2624 return PIDGET (inferior_ptid);
c5aa993b 2625 }
c906108c 2626
c5aa993b
JM
2627 warning ("Call of ttrace_wait returned with errno %d.",
2628 errno);
c906108c 2629 *status = ttwait_return;
de6ee558 2630 return PIDGET (inferior_ptid);
c906108c
SS
2631 }
2632
2633 real_pid = tsp.tts_pid;
2634 real_tid = tsp.tts_lwpid;
2635
2636 /* One complication is that the "tts_event" structure has
2637 * a set of flags, and more than one can be set. So we
2638 * either have to force an order (as we do here), or handle
2639 * more than one flag at a time.
2640 */
c5aa993b
JM
2641 if (tsp.tts_event & TTEVT_LWP_CREATE)
2642 {
2643
2644 /* Unlike what you might expect, this event is reported in
2645 * the _creating_ thread, and the _created_ thread (whose tid
2646 * we have) is still running. So we have to stop it. This
2647 * has already been done in "call_ttrace_wait", but should we
2648 * ever abandon the "stop-the-world" model, here's the command
2649 * to use:
2650 *
2651 * call_ttrace( TT_LWP_STOP, real_tid, TT_NIL, TT_NIL, TT_NIL );
2652 *
2653 * Note that this would depend on being called _after_ "add_tthread"
2654 * below for the tid-to-pid translation to be done in "call_ttrace".
2655 */
c906108c
SS
2656
2657#ifdef THREAD_DEBUG
c5aa993b
JM
2658 if (debug_on)
2659 printf ("New thread: pid %d, tid %d, creator tid %d\n",
2660 real_pid, tsp.tts_u.tts_thread.tts_target_lwpid,
2661 real_tid);
c906108c
SS
2662#endif
2663
c5aa993b
JM
2664 /* Now we have to return the tid of the created thread, not
2665 * the creating thread, or "wait_for_inferior" won't know we
2666 * have a new "process" (thread). Plus we should record it
2667 * right, too.
2668 */
c906108c
SS
2669 real_tid = tsp.tts_u.tts_thread.tts_target_lwpid;
2670
c5aa993b
JM
2671 add_tthread (real_pid, real_tid);
2672 }
c906108c 2673
c5aa993b
JM
2674 else if ((tsp.tts_event & TTEVT_LWP_TERMINATE)
2675 || (tsp.tts_event & TTEVT_LWP_EXIT))
2676 {
c906108c
SS
2677
2678#ifdef THREAD_DEBUG
c5aa993b
JM
2679 if (debug_on)
2680 printf ("Thread dies: %d\n", real_tid);
c906108c
SS
2681#endif
2682
c5aa993b
JM
2683 del_tthread (real_tid);
2684 }
c906108c 2685
c5aa993b
JM
2686 else if (tsp.tts_event & TTEVT_EXEC)
2687 {
c906108c 2688
c5aa993b
JM
2689#ifdef THREAD_DEBUG
2690 if (debug_on)
2691 printf ("Pid %d has zero'th thread %d; inferior pid is %d\n",
39f77062 2692 real_pid, real_tid, PIDGET (inferior_ptid));
c906108c
SS
2693#endif
2694
c5aa993b
JM
2695 add_tthread (real_pid, real_tid);
2696 }
c906108c
SS
2697
2698#ifdef THREAD_DEBUG
c5aa993b
JM
2699 else if (debug_on)
2700 {
2701 printf ("Process-level event %s, using tid %d\n",
2702 get_printable_name_of_ttrace_event (tsp.tts_event),
2703 real_tid);
2704
2705 /* OK to do this, as "add_tthread" won't add
2706 * duplicate entries. Also OK not to do it,
2707 * as this event isn't one which can change the
2708 * thread state.
2709 */
2710 add_tthread (real_pid, real_tid);
2711 }
c906108c
SS
2712#endif
2713
2714
2715 /* How many events are left to report later?
2716 * In a non-stop-the-world model, this isn't needed.
2717 *
2718 * Note that it's not always safe to query the thread state of a process,
2719 * which is what count_unhandled_events does. (If unsafe, we're left with
2720 * no other resort than to assume that no more events remain...)
2721 */
2722 if (can_touch_threads_of_process (real_pid, tsp.tts_event))
c5aa993b
JM
2723 more_events_left = count_unhandled_events (real_pid, real_tid);
2724
2725 else
2726 {
2727 if (more_events_left > 0)
2728 warning ("Vfork or fork causing loss of %d buffered events.",
2729 more_events_left);
2730
c906108c 2731 more_events_left = 0;
c5aa993b 2732 }
c906108c
SS
2733
2734 /* Attempt to translate the ttrace_wait-returned status into the
2735 ptrace equivalent.
2736
2737 ??rehrauer: This is somewhat fragile. We really ought to rewrite
2738 clients that expect to pick apart a ptrace wait status, to use
2739 something a little more abstract.
c5aa993b
JM
2740 */
2741 if ((tsp.tts_event & TTEVT_EXEC)
c906108c
SS
2742 || (tsp.tts_event & TTEVT_FORK)
2743 || (tsp.tts_event & TTEVT_VFORK))
2744 {
2745 /* Forks come in pairs (parent and child), so core gdb
2746 * will do two waits. Be ready to notice this.
2747 */
2748 if (tsp.tts_event & TTEVT_FORK)
c5aa993b
JM
2749 {
2750 process_state = FORKING;
2751
c906108c 2752#ifdef WAIT_BUFFER_DEBUG
c5aa993b
JM
2753 if (debug_on)
2754 printf ("Process set to FORKING\n");
c906108c 2755#endif
c5aa993b 2756 }
c906108c 2757 else if (tsp.tts_event & TTEVT_VFORK)
c5aa993b
JM
2758 {
2759 process_state = VFORKING;
2760
c906108c 2761#ifdef WAIT_BUFFER_DEBUG
c5aa993b
JM
2762 if (debug_on)
2763 printf ("Process set to VFORKING\n");
c906108c 2764#endif
c5aa993b 2765 }
c906108c
SS
2766
2767 /* Make an exec or fork look like a breakpoint. Definitely a hack,
2768 but I don't think non HP-UX-specific clients really carefully
2769 inspect the first events they get after inferior startup, so
2770 it probably almost doesn't matter what we claim this is.
c5aa993b 2771 */
c906108c
SS
2772
2773#ifdef THREAD_DEBUG
c5aa993b
JM
2774 if (debug_on)
2775 printf ("..a process 'event'\n");
c906108c
SS
2776#endif
2777
2778 /* Also make fork and exec events look like bpts, so they can be caught.
c5aa993b 2779 */
c906108c
SS
2780 *status = 0177 | (_SIGTRAP << 8);
2781 }
2782
2783 /* Special-cases: We ask for syscall entry and exit events to implement
2784 "fast" (aka "hardware") watchpoints.
2785
2786 When we get a syscall entry, we want to disable page-protections,
2787 and resume the inferior; this isn't an event we wish for
2788 wait_for_inferior to see. Note that we must resume ONLY the
2789 thread that reported the syscall entry; we don't want to allow
2790 other threads to run with the page protections off, as they might
2791 then be able to write to watch memory without it being caught.
2792
2793 When we get a syscall exit, we want to reenable page-protections,
2794 but we don't want to resume the inferior; this is an event we wish
2795 wait_for_inferior to see. Make it look like the signal we normally
2796 get for a single-step completion. This should cause wait_for_inferior
2797 to evaluate whether any watchpoint triggered.
2798
2799 Or rather, that's what we'd LIKE to do for syscall exit; we can't,
2800 due to some HP-UX "features". Some syscalls have problems with
2801 write-protections on some pages, and some syscalls seem to have
2802 pending writes to those pages at the time we're getting the return
2803 event. So, we'll single-step the inferior to get out of the syscall,
2804 and then reenable protections.
2805
2806 Note that we're intentionally allowing the syscall exit case to
2807 fall through into the succeeding cases, as sometimes we single-
2808 step out of one syscall only to immediately enter another...
2809 */
2810 else if ((tsp.tts_event & TTEVT_SYSCALL_ENTRY)
c5aa993b 2811 || (tsp.tts_event & TTEVT_SYSCALL_RETURN))
c906108c
SS
2812 {
2813 /* Make a syscall event look like a breakpoint. Same comments
2814 as for exec & fork events.
c5aa993b 2815 */
c906108c 2816#ifdef THREAD_DEBUG
c5aa993b
JM
2817 if (debug_on)
2818 printf ("..a syscall 'event'\n");
c906108c
SS
2819#endif
2820
2821 /* Also make syscall events look like bpts, so they can be caught.
c5aa993b 2822 */
c906108c
SS
2823 *status = 0177 | (_SIGTRAP << 8);
2824 }
2825
2826 else if ((tsp.tts_event & TTEVT_LWP_CREATE)
c5aa993b
JM
2827 || (tsp.tts_event & TTEVT_LWP_TERMINATE)
2828 || (tsp.tts_event & TTEVT_LWP_EXIT))
c906108c
SS
2829 {
2830 /* Make a thread event look like a breakpoint. Same comments
2831 * as for exec & fork events.
2832 */
2833#ifdef THREAD_DEBUG
c5aa993b
JM
2834 if (debug_on)
2835 printf ("..a thread 'event'\n");
c906108c
SS
2836#endif
2837
2838 /* Also make thread events look like bpts, so they can be caught.
c5aa993b 2839 */
c906108c
SS
2840 *status = 0177 | (_SIGTRAP << 8);
2841 }
c5aa993b 2842
c906108c 2843 else if ((tsp.tts_event & TTEVT_EXIT))
c5aa993b
JM
2844 { /* WIFEXITED */
2845
c906108c 2846#ifdef THREAD_DEBUG
c5aa993b
JM
2847 if (debug_on)
2848 printf ("..an exit\n");
c906108c
SS
2849#endif
2850
2851 /* Prevent rest of gdb from thinking this is
2852 * a new thread if for some reason it's never
2853 * seen the main thread before.
2854 */
39f77062 2855 inferior_ptid = pid_to_ptid (map_to_gdb_tid (real_tid)); /* HACK, FIX */
c5aa993b 2856
c906108c
SS
2857 *status = 0 | (tsp.tts_u.tts_exit.tts_exitcode);
2858 }
c5aa993b 2859
c906108c 2860 else if (tsp.tts_event & TTEVT_SIGNAL)
c5aa993b 2861 { /* WIFSTOPPED */
c906108c 2862#ifdef THREAD_DEBUG
c5aa993b
JM
2863 if (debug_on)
2864 printf ("..a signal, %d\n", tsp.tts_u.tts_signal.tts_signo);
c906108c
SS
2865#endif
2866
2867 *status = 0177 | (tsp.tts_u.tts_signal.tts_signo << 8);
2868 }
2869
2870 else
c5aa993b 2871 { /* !WIFSTOPPED */
c906108c
SS
2872
2873 /* This means the process or thread terminated. But we should've
2874 caught an explicit exit/termination above. So warn (this is
2875 really an internal error) and claim the process or thread
2876 terminated with a SIGTRAP.
2877 */
2878
2879 warning ("process_wait: unknown process state");
2880
2881#ifdef THREAD_DEBUG
c5aa993b
JM
2882 if (debug_on)
2883 printf ("Process-level event %s, using tid %d\n",
2884 get_printable_name_of_ttrace_event (tsp.tts_event),
2885 real_tid);
c906108c
SS
2886#endif
2887
2888 *status = _SIGTRAP;
2889 }
2890
c906108c 2891#ifdef THREAD_DEBUG
c5aa993b
JM
2892 if (debug_on)
2893 printf ("Done waiting, pid is %d, tid %d\n", real_pid, real_tid);
c906108c
SS
2894#endif
2895
2896 /* All code external to this module uses the tid, but calls
2897 * it "pid". There's some tweaking so that the outside sees
2898 * the first thread as having the same number as the starting
2899 * pid.
2900 */
c5aa993b 2901 return_pid = map_to_gdb_tid (real_tid);
c906108c 2902
c5aa993b
JM
2903 if (real_tid == 0 || return_pid == 0)
2904 {
2905 warning ("Internal error: process-wait failed.");
2906 }
2907
de6ee558 2908 return return_pid;
c906108c 2909}
c906108c 2910\f
c5aa993b 2911
c906108c
SS
2912/* This function causes the caller's process to be traced by its
2913 parent. This is intended to be called after GDB forks itself,
2914 and before the child execs the target. Despite the name, it
2915 is called by the child.
2916
2917 Note that HP-UX ttrace is rather funky in how this is done.
2918 If the parent wants to get the initial exec event of a child,
2919 it must set the ttrace event mask of the child to include execs.
2920 (The child cannot do this itself.) This must be done after the
2921 child is forked, but before it execs.
2922
2923 To coordinate the parent and child, we implement a semaphore using
2924 pipes. After SETTRC'ing itself, the child tells the parent that
2925 it is now traceable by the parent, and waits for the parent's
2926 acknowledgement. The parent can then set the child's event mask,
2927 and notify the child that it can now exec.
2928
2929 (The acknowledgement by parent happens as a result of a call to
2930 child_acknowledge_created_inferior.)
2931 */
2932int
f7dd6af2 2933parent_attach_all (int p1, PTRACE_ARG3_TYPE p2, int p3)
c906108c 2934{
c5aa993b 2935 int tt_status;
c906108c
SS
2936
2937 /* We need a memory home for a constant, to pass it to ttrace.
2938 The value of the constant is arbitrary, so long as both
2939 parent and child use the same value. Might as well use the
2940 "magic" constant provided by ttrace...
2941 */
c5aa993b
JM
2942 uint64_t tc_magic_child = TT_VERSION;
2943 uint64_t tc_magic_parent = 0;
c906108c
SS
2944
2945 tt_status = call_real_ttrace (
c5aa993b
JM
2946 TT_PROC_SETTRC,
2947 (int) TT_NIL,
2948 (lwpid_t) TT_NIL,
2949 TT_NIL,
2950 (TTRACE_ARG_TYPE) TT_VERSION,
2951 TT_NIL);
c906108c
SS
2952
2953 if (tt_status < 0)
2954 return tt_status;
2955
2956 /* Notify the parent that we're potentially ready to exec(). */
2957 write (startup_semaphore.child_channel[SEM_TALK],
c5aa993b
JM
2958 &tc_magic_child,
2959 sizeof (tc_magic_child));
c906108c
SS
2960
2961 /* Wait for acknowledgement from the parent. */
2962 read (startup_semaphore.parent_channel[SEM_LISTEN],
c5aa993b
JM
2963 &tc_magic_parent,
2964 sizeof (tc_magic_parent));
2965
c906108c
SS
2966 if (tc_magic_child != tc_magic_parent)
2967 warning ("mismatched semaphore magic");
2968
2969 /* Discard our copy of the semaphore. */
2970 (void) close (startup_semaphore.parent_channel[SEM_LISTEN]);
2971 (void) close (startup_semaphore.parent_channel[SEM_TALK]);
2972 (void) close (startup_semaphore.child_channel[SEM_LISTEN]);
2973 (void) close (startup_semaphore.child_channel[SEM_TALK]);
c5aa993b 2974
c906108c
SS
2975 return tt_status;
2976}
2977
2978/* Despite being file-local, this routine is dealing with
2979 * actual process IDs, not thread ids. That's because it's
2980 * called before the first "wait" call, and there's no map
2981 * yet from tids to pids.
2982 *
2983 * When it is called, a forked child is running, but waiting on
2984 * the semaphore. If you stop the child and re-start it,
2985 * things get confused, so don't do that! An attached child is
2986 * stopped.
2987 *
2988 * Since this is called after either attach or run, we
2989 * have to be the common part of both.
2990 */
2991static void
fba45db2 2992require_notification_of_events (int real_pid)
c906108c 2993{
c5aa993b
JM
2994 int tt_status;
2995 ttevent_t notifiable_events;
c906108c 2996
c5aa993b
JM
2997 lwpid_t tid;
2998 ttstate_t thread_state;
c906108c
SS
2999
3000#ifdef THREAD_DEBUG
c5aa993b
JM
3001 if (debug_on)
3002 printf ("Require notif, pid is %d\n", real_pid);
c906108c
SS
3003#endif
3004
3005 /* Temporary HACK: tell inftarg.c/child_wait to not
3006 * loop until pids are the same.
3007 */
3008 not_same_real_pid = 0;
3009
3010 sigemptyset (&notifiable_events.tte_signals);
3011 notifiable_events.tte_opts = TTEO_NONE;
3012
3013 /* This ensures that forked children inherit their parent's
3014 * event mask, which we're setting here.
3015 *
3016 * NOTE: if you debug gdb with itself, then the ultimate
3017 * debuggee gets flags set by the outermost gdb, as
3018 * a child of a child will still inherit.
3019 */
3020 notifiable_events.tte_opts |= TTEO_PROC_INHERIT;
3021
c5aa993b 3022 notifiable_events.tte_events = TTEVT_DEFAULT;
c906108c
SS
3023 notifiable_events.tte_events |= TTEVT_SIGNAL;
3024 notifiable_events.tte_events |= TTEVT_EXEC;
3025 notifiable_events.tte_events |= TTEVT_EXIT;
3026 notifiable_events.tte_events |= TTEVT_FORK;
3027 notifiable_events.tte_events |= TTEVT_VFORK;
3028 notifiable_events.tte_events |= TTEVT_LWP_CREATE;
3029 notifiable_events.tte_events |= TTEVT_LWP_EXIT;
3030 notifiable_events.tte_events |= TTEVT_LWP_TERMINATE;
3031
3032 tt_status = call_real_ttrace (
c5aa993b
JM
3033 TT_PROC_SET_EVENT_MASK,
3034 real_pid,
3035 (lwpid_t) TT_NIL,
3036 (TTRACE_ARG_TYPE) & notifiable_events,
3037 (TTRACE_ARG_TYPE) sizeof (notifiable_events),
3038 TT_NIL);
c906108c
SS
3039}
3040
3041static void
fba45db2 3042require_notification_of_exec_events (int real_pid)
c906108c 3043{
c5aa993b
JM
3044 int tt_status;
3045 ttevent_t notifiable_events;
c906108c 3046
c5aa993b
JM
3047 lwpid_t tid;
3048 ttstate_t thread_state;
c906108c
SS
3049
3050#ifdef THREAD_DEBUG
c5aa993b
JM
3051 if (debug_on)
3052 printf ("Require notif, pid is %d\n", real_pid);
c906108c
SS
3053#endif
3054
3055 /* Temporary HACK: tell inftarg.c/child_wait to not
3056 * loop until pids are the same.
3057 */
3058 not_same_real_pid = 0;
3059
3060 sigemptyset (&notifiable_events.tte_signals);
3061 notifiable_events.tte_opts = TTEO_NOSTRCCHLD;
3062
3063 /* This ensures that forked children don't inherit their parent's
3064 * event mask, which we're setting here.
3065 */
3066 notifiable_events.tte_opts &= ~TTEO_PROC_INHERIT;
3067
c5aa993b 3068 notifiable_events.tte_events = TTEVT_DEFAULT;
c906108c
SS
3069 notifiable_events.tte_events |= TTEVT_EXEC;
3070 notifiable_events.tte_events |= TTEVT_EXIT;
3071
3072 tt_status = call_real_ttrace (
c5aa993b
JM
3073 TT_PROC_SET_EVENT_MASK,
3074 real_pid,
3075 (lwpid_t) TT_NIL,
3076 (TTRACE_ARG_TYPE) & notifiable_events,
3077 (TTRACE_ARG_TYPE) sizeof (notifiable_events),
3078 TT_NIL);
c906108c 3079}
c906108c 3080\f
c5aa993b 3081
c906108c
SS
3082/* This function is called by the parent process, with pid being the
3083 * ID of the child process, after the debugger has forked.
3084 */
3085void
fba45db2 3086child_acknowledge_created_inferior (int pid)
c906108c
SS
3087{
3088 /* We need a memory home for a constant, to pass it to ttrace.
3089 The value of the constant is arbitrary, so long as both
3090 parent and child use the same value. Might as well use the
3091 "magic" constant provided by ttrace...
c5aa993b
JM
3092 */
3093 uint64_t tc_magic_parent = TT_VERSION;
3094 uint64_t tc_magic_child = 0;
c906108c
SS
3095
3096 /* Wait for the child to tell us that it has forked. */
3097 read (startup_semaphore.child_channel[SEM_LISTEN],
c5aa993b
JM
3098 &tc_magic_child,
3099 sizeof (tc_magic_child));
c906108c
SS
3100
3101 /* Clear thread info now. We'd like to do this in
3102 * "require...", but that messes up attach.
3103 */
c5aa993b 3104 clear_thread_info ();
c906108c
SS
3105
3106 /* Tell the "rest of gdb" that the initial thread exists.
3107 * This isn't really a hack. Other thread-based versions
3108 * of gdb (e.g. gnu-nat.c) seem to do the same thing.
3109 *
3110 * Q: Why don't we also add this thread to the local
3111 * list via "add_tthread"?
3112 *
3113 * A: Because we don't know the tid, and can't stop the
3114 * the process safely to ask what it is. Anyway, we'll
3115 * add it when it gets the EXEC event.
3116 */
6c482b87 3117 add_thread (pid_to_ptid (pid)); /* in thread.c */
c906108c
SS
3118
3119 /* We can now set the child's ttrace event mask.
3120 */
3121 require_notification_of_exec_events (pid);
3122
3123 /* Tell ourselves that the process is running.
3124 */
3125 process_state = RUNNING;
3126
3127 /* Notify the child that it can exec. */
3128 write (startup_semaphore.parent_channel[SEM_TALK],
c5aa993b
JM
3129 &tc_magic_parent,
3130 sizeof (tc_magic_parent));
c906108c
SS
3131
3132 /* Discard our copy of the semaphore. */
3133 (void) close (startup_semaphore.parent_channel[SEM_LISTEN]);
3134 (void) close (startup_semaphore.parent_channel[SEM_TALK]);
3135 (void) close (startup_semaphore.child_channel[SEM_LISTEN]);
3136 (void) close (startup_semaphore.child_channel[SEM_TALK]);
3137}
3138
3139
3140/*
3141 * arrange for notification of all events by
3142 * calling require_notification_of_events.
3143 */
3144void
39f77062 3145child_post_startup_inferior (ptid_t ptid)
c906108c 3146{
39f77062 3147 require_notification_of_events (PIDGET (ptid));
c906108c
SS
3148}
3149
3150/* From here on, we should expect tids rather than pids.
3151 */
3152static void
fba45db2 3153hppa_enable_catch_fork (int tid)
c906108c 3154{
c5aa993b
JM
3155 int tt_status;
3156 ttevent_t ttrace_events;
c906108c
SS
3157
3158 /* Get the set of events that are currently enabled.
3159 */
3160 tt_status = call_ttrace (TT_PROC_GET_EVENT_MASK,
c5aa993b
JM
3161 tid,
3162 (TTRACE_ARG_TYPE) & ttrace_events,
3163 (TTRACE_ARG_TYPE) sizeof (ttrace_events),
3164 TT_NIL);
c906108c
SS
3165 if (errno)
3166 perror_with_name ("ttrace");
3167
3168 /* Add forks to that set. */
3169 ttrace_events.tte_events |= TTEVT_FORK;
3170
3171#ifdef THREAD_DEBUG
c5aa993b
JM
3172 if (debug_on)
3173 printf ("enable fork, tid is %d\n", tid);
c906108c
SS
3174#endif
3175
3176 tt_status = call_ttrace (TT_PROC_SET_EVENT_MASK,
c5aa993b
JM
3177 tid,
3178 (TTRACE_ARG_TYPE) & ttrace_events,
3179 (TTRACE_ARG_TYPE) sizeof (ttrace_events),
3180 TT_NIL);
c906108c
SS
3181 if (errno)
3182 perror_with_name ("ttrace");
3183}
3184
3185
3186static void
fba45db2 3187hppa_disable_catch_fork (int tid)
c906108c 3188{
c5aa993b
JM
3189 int tt_status;
3190 ttevent_t ttrace_events;
c906108c
SS
3191
3192 /* Get the set of events that are currently enabled.
3193 */
3194 tt_status = call_ttrace (TT_PROC_GET_EVENT_MASK,
c5aa993b
JM
3195 tid,
3196 (TTRACE_ARG_TYPE) & ttrace_events,
3197 (TTRACE_ARG_TYPE) sizeof (ttrace_events),
3198 TT_NIL);
c906108c
SS
3199
3200 if (errno)
3201 perror_with_name ("ttrace");
3202
3203 /* Remove forks from that set. */
3204 ttrace_events.tte_events &= ~TTEVT_FORK;
3205
3206#ifdef THREAD_DEBUG
c5aa993b
JM
3207 if (debug_on)
3208 printf ("disable fork, tid is %d\n", tid);
c906108c
SS
3209#endif
3210
3211 tt_status = call_ttrace (TT_PROC_SET_EVENT_MASK,
c5aa993b
JM
3212 tid,
3213 (TTRACE_ARG_TYPE) & ttrace_events,
3214 (TTRACE_ARG_TYPE) sizeof (ttrace_events),
3215 TT_NIL);
c906108c
SS
3216
3217 if (errno)
3218 perror_with_name ("ttrace");
3219}
3220
3221
3222#if defined(CHILD_INSERT_FORK_CATCHPOINT)
3223int
fba45db2 3224child_insert_fork_catchpoint (int tid)
c906108c
SS
3225{
3226 /* Enable reporting of fork events from the kernel. */
3227 /* ??rehrauer: For the moment, we're always enabling these events,
3228 and just ignoring them if there's no catchpoint to catch them.
c5aa993b 3229 */
c906108c
SS
3230 return 0;
3231}
3232#endif
3233
3234
3235#if defined(CHILD_REMOVE_FORK_CATCHPOINT)
3236int
fba45db2 3237child_remove_fork_catchpoint (int tid)
c906108c
SS
3238{
3239 /* Disable reporting of fork events from the kernel. */
3240 /* ??rehrauer: For the moment, we're always enabling these events,
3241 and just ignoring them if there's no catchpoint to catch them.
c5aa993b 3242 */
c906108c
SS
3243 return 0;
3244}
3245#endif
3246
3247
3248static void
fba45db2 3249hppa_enable_catch_vfork (int tid)
c906108c 3250{
c5aa993b
JM
3251 int tt_status;
3252 ttevent_t ttrace_events;
c906108c
SS
3253
3254 /* Get the set of events that are currently enabled.
3255 */
3256 tt_status = call_ttrace (TT_PROC_GET_EVENT_MASK,
c5aa993b
JM
3257 tid,
3258 (TTRACE_ARG_TYPE) & ttrace_events,
3259 (TTRACE_ARG_TYPE) sizeof (ttrace_events),
3260 TT_NIL);
c906108c
SS
3261
3262 if (errno)
3263 perror_with_name ("ttrace");
3264
3265 /* Add vforks to that set. */
3266 ttrace_events.tte_events |= TTEVT_VFORK;
3267
3268#ifdef THREAD_DEBUG
c5aa993b
JM
3269 if (debug_on)
3270 printf ("enable vfork, tid is %d\n", tid);
c906108c
SS
3271#endif
3272
3273 tt_status = call_ttrace (TT_PROC_SET_EVENT_MASK,
c5aa993b
JM
3274 tid,
3275 (TTRACE_ARG_TYPE) & ttrace_events,
3276 (TTRACE_ARG_TYPE) sizeof (ttrace_events),
3277 TT_NIL);
c906108c
SS
3278
3279 if (errno)
3280 perror_with_name ("ttrace");
3281}
3282
3283
3284static void
fba45db2 3285hppa_disable_catch_vfork (int tid)
c906108c 3286{
c5aa993b
JM
3287 int tt_status;
3288 ttevent_t ttrace_events;
c906108c
SS
3289
3290 /* Get the set of events that are currently enabled. */
3291 tt_status = call_ttrace (TT_PROC_GET_EVENT_MASK,
c5aa993b
JM
3292 tid,
3293 (TTRACE_ARG_TYPE) & ttrace_events,
3294 (TTRACE_ARG_TYPE) sizeof (ttrace_events),
3295 TT_NIL);
c906108c
SS
3296
3297 if (errno)
3298 perror_with_name ("ttrace");
3299
3300 /* Remove vforks from that set. */
3301 ttrace_events.tte_events &= ~TTEVT_VFORK;
3302
3303#ifdef THREAD_DEBUG
c5aa993b
JM
3304 if (debug_on)
3305 printf ("disable vfork, tid is %d\n", tid);
c906108c
SS
3306#endif
3307 tt_status = call_ttrace (TT_PROC_SET_EVENT_MASK,
c5aa993b
JM
3308 tid,
3309 (TTRACE_ARG_TYPE) & ttrace_events,
3310 (TTRACE_ARG_TYPE) sizeof (ttrace_events),
3311 TT_NIL);
c906108c
SS
3312
3313 if (errno)
3314 perror_with_name ("ttrace");
3315}
3316
3317
3318#if defined(CHILD_INSERT_VFORK_CATCHPOINT)
3319int
fba45db2 3320child_insert_vfork_catchpoint (int tid)
c906108c
SS
3321{
3322 /* Enable reporting of vfork events from the kernel. */
3323 /* ??rehrauer: For the moment, we're always enabling these events,
3324 and just ignoring them if there's no catchpoint to catch them.
c5aa993b 3325 */
c906108c
SS
3326 return 0;
3327}
3328#endif
3329
3330
3331#if defined(CHILD_REMOVE_VFORK_CATCHPOINT)
3332int
fba45db2 3333child_remove_vfork_catchpoint (int tid)
c906108c
SS
3334{
3335 /* Disable reporting of vfork events from the kernel. */
3336 /* ??rehrauer: For the moment, we're always enabling these events,
3337 and just ignoring them if there's no catchpoint to catch them.
c5aa993b 3338 */
c906108c
SS
3339 return 0;
3340}
3341#endif
3342
c906108c 3343/* Q: Do we need to map the returned process ID to a thread ID?
c5aa993b 3344
c906108c
SS
3345 * A: I don't think so--here we want a _real_ pid. Any later
3346 * operations will call "require_notification_of_events" and
3347 * start the mapping.
3348 */
3349int
47932f85 3350hpux_has_forked (int tid, int *childpid)
c906108c 3351{
c5aa993b
JM
3352 int tt_status;
3353 ttstate_t ttrace_state;
3354 thread_info *tinfo;
c906108c
SS
3355
3356 /* Do we have cached thread state that we can consult? If so, use it. */
3357 tinfo = find_thread_info (map_from_gdb_tid (tid));
c5aa993b
JM
3358 if (tinfo != NULL)
3359 {
3360 copy_ttstate_t (&ttrace_state, &tinfo->last_stop_state);
3361 }
c906108c
SS
3362
3363 /* Nope, must read the thread's current state */
3364 else
3365 {
3366 tt_status = call_ttrace (TT_LWP_GET_STATE,
c5aa993b
JM
3367 tid,
3368 (TTRACE_ARG_TYPE) & ttrace_state,
3369 (TTRACE_ARG_TYPE) sizeof (ttrace_state),
3370 TT_NIL);
c906108c
SS
3371
3372 if (errno)
c5aa993b
JM
3373 perror_with_name ("ttrace");
3374
c906108c 3375 if (tt_status < 0)
c5aa993b 3376 return 0;
c906108c
SS
3377 }
3378
3379 if (ttrace_state.tts_event & TTEVT_FORK)
3380 {
3381 *childpid = ttrace_state.tts_u.tts_fork.tts_fpid;
3382 return 1;
3383 }
3384
3385 return 0;
3386}
c906108c 3387
47932f85 3388/* See hpux_has_forked for pid discussion.
c906108c
SS
3389 */
3390int
47932f85 3391hpux_has_vforked (int tid, int *childpid)
c906108c 3392{
c5aa993b
JM
3393 int tt_status;
3394 ttstate_t ttrace_state;
3395 thread_info *tinfo;
c906108c
SS
3396
3397 /* Do we have cached thread state that we can consult? If so, use it. */
3398 tinfo = find_thread_info (map_from_gdb_tid (tid));
3399 if (tinfo != NULL)
3400 copy_ttstate_t (&ttrace_state, &tinfo->last_stop_state);
3401
3402 /* Nope, must read the thread's current state */
3403 else
3404 {
3405 tt_status = call_ttrace (TT_LWP_GET_STATE,
c5aa993b
JM
3406 tid,
3407 (TTRACE_ARG_TYPE) & ttrace_state,
3408 (TTRACE_ARG_TYPE) sizeof (ttrace_state),
3409 TT_NIL);
c906108c
SS
3410
3411 if (errno)
c5aa993b
JM
3412 perror_with_name ("ttrace");
3413
c906108c 3414 if (tt_status < 0)
c5aa993b 3415 return 0;
c906108c
SS
3416 }
3417
3418 if (ttrace_state.tts_event & TTEVT_VFORK)
3419 {
3420 *childpid = ttrace_state.tts_u.tts_fork.tts_fpid;
3421 return 1;
3422 }
3423
3424 return 0;
3425}
c906108c
SS
3426
3427
c906108c
SS
3428#if defined(CHILD_INSERT_EXEC_CATCHPOINT)
3429int
fba45db2 3430child_insert_exec_catchpoint (int tid)
c906108c
SS
3431{
3432 /* Enable reporting of exec events from the kernel. */
3433 /* ??rehrauer: For the moment, we're always enabling these events,
3434 and just ignoring them if there's no catchpoint to catch them.
c5aa993b 3435 */
c906108c
SS
3436 return 0;
3437}
3438#endif
3439
3440
3441#if defined(CHILD_REMOVE_EXEC_CATCHPOINT)
3442int
fba45db2 3443child_remove_exec_catchpoint (int tid)
c906108c
SS
3444{
3445 /* Disable reporting of execevents from the kernel. */
3446 /* ??rehrauer: For the moment, we're always enabling these events,
3447 and just ignoring them if there's no catchpoint to catch them.
c5aa993b 3448 */
c906108c
SS
3449 return 0;
3450}
3451#endif
3452
3453
c906108c 3454int
47932f85 3455hpux_has_execd (int tid, char **execd_pathname)
c906108c 3456{
c5aa993b
JM
3457 int tt_status;
3458 ttstate_t ttrace_state;
3459 thread_info *tinfo;
c906108c
SS
3460
3461 /* Do we have cached thread state that we can consult? If so, use it. */
3462 tinfo = find_thread_info (map_from_gdb_tid (tid));
3463 if (tinfo != NULL)
3464 copy_ttstate_t (&ttrace_state, &tinfo->last_stop_state);
3465
3466 /* Nope, must read the thread's current state */
3467 else
3468 {
3469 tt_status = call_ttrace (TT_LWP_GET_STATE,
c5aa993b
JM
3470 tid,
3471 (TTRACE_ARG_TYPE) & ttrace_state,
3472 (TTRACE_ARG_TYPE) sizeof (ttrace_state),
3473 TT_NIL);
c906108c
SS
3474
3475 if (errno)
c5aa993b
JM
3476 perror_with_name ("ttrace");
3477
c906108c 3478 if (tt_status < 0)
c5aa993b 3479 return 0;
c906108c
SS
3480 }
3481
3482 if (ttrace_state.tts_event & TTEVT_EXEC)
3483 {
3484 /* See child_pid_to_exec_file in this file: this is a macro.
3485 */
c5aa993b
JM
3486 char *exec_file = target_pid_to_exec_file (tid);
3487
c906108c
SS
3488 *execd_pathname = savestring (exec_file, strlen (exec_file));
3489 return 1;
3490 }
3491
3492 return 0;
3493}
c906108c
SS
3494
3495
c906108c 3496int
47932f85 3497hpux_has_syscall_event (int pid, enum target_waitkind *kind, int *syscall_id)
c906108c 3498{
c5aa993b
JM
3499 int tt_status;
3500 ttstate_t ttrace_state;
3501 thread_info *tinfo;
c906108c
SS
3502
3503 /* Do we have cached thread state that we can consult? If so, use it. */
3504 tinfo = find_thread_info (map_from_gdb_tid (pid));
3505 if (tinfo != NULL)
3506 copy_ttstate_t (&ttrace_state, &tinfo->last_stop_state);
3507
3508 /* Nope, must read the thread's current state */
3509 else
3510 {
c5aa993b
JM
3511 tt_status = call_ttrace (TT_LWP_GET_STATE,
3512 pid,
3513 (TTRACE_ARG_TYPE) & ttrace_state,
3514 (TTRACE_ARG_TYPE) sizeof (ttrace_state),
3515 TT_NIL);
c906108c
SS
3516
3517 if (errno)
c5aa993b
JM
3518 perror_with_name ("ttrace");
3519
c906108c 3520 if (tt_status < 0)
c5aa993b 3521 return 0;
c906108c
SS
3522 }
3523
c5aa993b 3524 *kind = TARGET_WAITKIND_SPURIOUS; /* Until proven otherwise... */
c906108c
SS
3525 *syscall_id = -1;
3526
3527 if (ttrace_state.tts_event & TTEVT_SYSCALL_ENTRY)
3528 *kind = TARGET_WAITKIND_SYSCALL_ENTRY;
3529 else if (ttrace_state.tts_event & TTEVT_SYSCALL_RETURN)
3530 *kind = TARGET_WAITKIND_SYSCALL_RETURN;
3531 else
3532 return 0;
3533
3534 *syscall_id = ttrace_state.tts_scno;
3535 return 1;
3536}
c5aa993b 3537\f
c906108c
SS
3538
3539
c906108c
SS
3540#if defined(CHILD_THREAD_ALIVE)
3541
3542/* Check to see if the given thread is alive.
c5aa993b 3543
c906108c
SS
3544 * We'll trust the thread list, as the more correct
3545 * approach of stopping the process and spinning down
3546 * the OS's thread list is _very_ expensive.
3547 *
3548 * May need a FIXME for that reason.
3549 */
3550int
39f77062 3551child_thread_alive (ptid_t ptid)
c906108c 3552{
4b048bc0 3553 lwpid_t gdb_tid = PIDGET (ptid);
c5aa993b 3554 lwpid_t tid;
c906108c 3555
c5aa993b
JM
3556 /* This spins down the lists twice.
3557 * Possible peformance improvement here!
3558 */
3559 tid = map_from_gdb_tid (gdb_tid);
3560 return !is_terminated (tid);
c906108c
SS
3561}
3562
3563#endif
c5aa993b 3564\f
c906108c
SS
3565
3566
c906108c
SS
3567/* This function attempts to read the specified number of bytes from the
3568 save_state_t that is our view into the hardware registers, starting at
3569 ss_offset, and ending at ss_offset + sizeof_buf - 1
3570
3571 If this function succeeds, it deposits the fetched bytes into buf,
3572 and returns 0.
3573
3574 If it fails, it returns a negative result. The contents of buf are
3575 undefined it this function fails.
c5aa993b 3576 */
c906108c 3577int
fba45db2
KB
3578read_from_register_save_state (int tid, TTRACE_ARG_TYPE ss_offset, char *buf,
3579 int sizeof_buf)
c906108c 3580{
c5aa993b
JM
3581 int tt_status;
3582 register_value_t register_value = 0;
c906108c
SS
3583
3584 tt_status = call_ttrace (TT_LWP_RUREGS,
c5aa993b
JM
3585 tid,
3586 ss_offset,
3587 (TTRACE_ARG_TYPE) sizeof_buf,
3588 (TTRACE_ARG_TYPE) buf);
3589
3590 if (tt_status == 1)
3591 /* Map ttrace's version of success to our version.
3592 * Sometime ttrace returns 0, but that's ok here.
3593 */
3594 return 0;
3595
c906108c
SS
3596 return tt_status;
3597}
c906108c 3598\f
c5aa993b 3599
c906108c
SS
3600/* This function attempts to write the specified number of bytes to the
3601 save_state_t that is our view into the hardware registers, starting at
3602 ss_offset, and ending at ss_offset + sizeof_buf - 1
3603
3604 If this function succeeds, it deposits the bytes in buf, and returns 0.
3605
3606 If it fails, it returns a negative result. The contents of the save_state_t
3607 are undefined it this function fails.
c5aa993b 3608 */
c906108c 3609int
fba45db2
KB
3610write_to_register_save_state (int tid, TTRACE_ARG_TYPE ss_offset, char *buf,
3611 int sizeof_buf)
c906108c 3612{
c5aa993b
JM
3613 int tt_status;
3614 register_value_t register_value = 0;
c906108c
SS
3615
3616 tt_status = call_ttrace (TT_LWP_WUREGS,
c5aa993b
JM
3617 tid,
3618 ss_offset,
3619 (TTRACE_ARG_TYPE) sizeof_buf,
3620 (TTRACE_ARG_TYPE) buf);
c906108c
SS
3621 return tt_status;
3622}
c906108c 3623\f
c5aa993b 3624
c906108c
SS
3625/* This function is a sop to the largeish number of direct calls
3626 to call_ptrace that exist in other files. Rather than create
3627 functions whose name abstracts away from ptrace, and change all
3628 the present callers of call_ptrace, we'll do the expedient (and
3629 perhaps only practical) thing.
3630
3631 Note HP-UX explicitly disallows a mix of ptrace & ttrace on a traced
3632 process. Thus, we must translate all ptrace requests into their
3633 process-specific, ttrace equivalents.
c5aa993b 3634 */
c906108c 3635int
fba45db2 3636call_ptrace (int pt_request, int gdb_tid, PTRACE_ARG3_TYPE addr, int data)
c906108c 3637{
c5aa993b
JM
3638 ttreq_t tt_request;
3639 TTRACE_ARG_TYPE tt_addr = (TTRACE_ARG_TYPE) addr;
3640 TTRACE_ARG_TYPE tt_data = (TTRACE_ARG_TYPE) data;
3641 TTRACE_ARG_TYPE tt_addr2 = TT_NIL;
3642 int tt_status;
3643 register_value_t register_value;
3644 int read_buf;
c906108c
SS
3645
3646 /* Perform the necessary argument translation. Note that some
3647 cases are funky enough in the ttrace realm that we handle them
3648 very specially.
3649 */
c5aa993b
JM
3650 switch (pt_request)
3651 {
c906108c
SS
3652 /* The following cases cannot conveniently be handled conveniently
3653 by merely adjusting the ptrace arguments and feeding into the
3654 generic call to ttrace at the bottom of this function.
3655
3656 Note that because all branches of this switch end in "return",
3657 there's no need for any "break" statements.
c5aa993b
JM
3658 */
3659 case PT_SETTRC:
f7dd6af2 3660 return parent_attach_all (0, 0, 0);
c5aa993b
JM
3661
3662 case PT_RUREGS:
3663 tt_status = read_from_register_save_state (gdb_tid,
3664 tt_addr,
3665 &register_value,
3666 sizeof (register_value));
3667 if (tt_status < 0)
3668 return tt_status;
3669 return register_value;
3670
3671 case PT_WUREGS:
3672 register_value = (int) tt_data;
3673 tt_status = write_to_register_save_state (gdb_tid,
3674 tt_addr,
3675 &register_value,
3676 sizeof (register_value));
3677 return tt_status;
3678 break;
3679
3680 case PT_READ_I:
3681 tt_status = call_ttrace (TT_PROC_RDTEXT, /* Implicit 4-byte xfer becomes block-xfer. */
3682 gdb_tid,
3683 tt_addr,
3684 (TTRACE_ARG_TYPE) 4,
3685 (TTRACE_ARG_TYPE) & read_buf);
3686 if (tt_status < 0)
3687 return tt_status;
3688 return read_buf;
3689
3690 case PT_READ_D:
3691 tt_status = call_ttrace (TT_PROC_RDDATA, /* Implicit 4-byte xfer becomes block-xfer. */
3692 gdb_tid,
3693 tt_addr,
3694 (TTRACE_ARG_TYPE) 4,
3695 (TTRACE_ARG_TYPE) & read_buf);
3696 if (tt_status < 0)
3697 return tt_status;
3698 return read_buf;
3699
3700 case PT_ATTACH:
3701 tt_status = call_real_ttrace (TT_PROC_ATTACH,
3702 map_from_gdb_tid (gdb_tid),
3703 (lwpid_t) TT_NIL,
3704 tt_addr,
3705 (TTRACE_ARG_TYPE) TT_VERSION,
3706 tt_addr2);
3707 if (tt_status < 0)
3708 return tt_status;
3709 return tt_status;
c906108c
SS
3710
3711 /* The following cases are handled by merely adjusting the ptrace
3712 arguments and feeding into the generic call to ttrace.
c5aa993b
JM
3713 */
3714 case PT_DETACH:
3715 tt_request = TT_PROC_DETACH;
3716 break;
3717
3718 case PT_WRITE_I:
3719 tt_request = TT_PROC_WRTEXT; /* Translates 4-byte xfer to block-xfer. */
3720 tt_data = 4; /* This many bytes. */
3721 tt_addr2 = (TTRACE_ARG_TYPE) & data; /* Address of xfer source. */
3722 break;
3723
3724 case PT_WRITE_D:
3725 tt_request = TT_PROC_WRDATA; /* Translates 4-byte xfer to block-xfer. */
3726 tt_data = 4; /* This many bytes. */
3727 tt_addr2 = (TTRACE_ARG_TYPE) & data; /* Address of xfer source. */
3728 break;
3729
3730 case PT_RDTEXT:
3731 tt_request = TT_PROC_RDTEXT;
3732 break;
3733
3734 case PT_RDDATA:
3735 tt_request = TT_PROC_RDDATA;
3736 break;
3737
3738 case PT_WRTEXT:
3739 tt_request = TT_PROC_WRTEXT;
3740 break;
3741
3742 case PT_WRDATA:
3743 tt_request = TT_PROC_WRDATA;
3744 break;
3745
3746 case PT_CONTINUE:
3747 tt_request = TT_PROC_CONTINUE;
3748 break;
3749
3750 case PT_STEP:
3751 tt_request = TT_LWP_SINGLE; /* Should not be making this request? */
3752 break;
3753
3754 case PT_KILL:
3755 tt_request = TT_PROC_EXIT;
3756 break;
3757
3758 case PT_GET_PROCESS_PATHNAME:
3759 tt_request = TT_PROC_GET_PATHNAME;
3760 break;
3761
3762 default:
3763 tt_request = pt_request; /* Let ttrace be the one to complain. */
3764 break;
3765 }
c906108c
SS
3766
3767 return call_ttrace (tt_request,
c5aa993b
JM
3768 gdb_tid,
3769 tt_addr,
3770 tt_data,
3771 tt_addr2);
c906108c
SS
3772}
3773
3774/* Kill that pesky process!
3775 */
3776void
fba45db2 3777kill_inferior (void)
c906108c 3778{
c5aa993b
JM
3779 int tid;
3780 int wait_status;
3781 thread_info *t;
c906108c 3782 thread_info **paranoia;
c5aa993b 3783 int para_count, i;
c906108c 3784
39f77062 3785 if (PIDGET (inferior_ptid) == 0)
c906108c
SS
3786 return;
3787
3788 /* Walk the list of "threads", some of which are "pseudo threads",
39f77062 3789 aka "processes". For each that is NOT inferior_ptid, stop it,
c906108c
SS
3790 and detach it.
3791
3792 You see, we may not have just a single process to kill. If we're
3793 restarting or quitting or detaching just after the inferior has
3794 forked, then we've actually two processes to clean up.
3795
3796 But we can't just call target_mourn_inferior() for each, since that
3797 zaps the target vector.
c5aa993b 3798 */
c906108c 3799
3c37485b
AC
3800 paranoia = (thread_info **) xmalloc (thread_head.count *
3801 sizeof (thread_info *));
c906108c 3802 para_count = 0;
c5aa993b 3803
c906108c 3804 t = thread_head.head;
c5aa993b
JM
3805 while (t)
3806 {
3807
3808 paranoia[para_count] = t;
3809 for (i = 0; i < para_count; i++)
3810 {
3811 if (t->next == paranoia[i])
3812 {
3813 warning ("Bad data in gdb's thread data; repairing.");
3814 t->next = 0;
3815 }
3816 }
3817 para_count++;
3818
39f77062 3819 if (t->am_pseudo && (t->pid != PIDGET (inferior_ptid)))
c5aa993b 3820 {
d3340a53 3821 call_ttrace (TT_PROC_EXIT,
c5aa993b
JM
3822 t->pid,
3823 TT_NIL,
3824 TT_NIL,
3825 TT_NIL);
c5aa993b
JM
3826 }
3827 t = t->next;
3828 }
3829
b8c9b27d 3830 xfree (paranoia);
c906108c 3831
d3340a53 3832 call_ttrace (TT_PROC_EXIT,
39f77062 3833 PIDGET (inferior_ptid),
c5aa993b
JM
3834 TT_NIL,
3835 TT_NIL,
3836 TT_NIL);
c906108c 3837 target_mourn_inferior ();
c5aa993b 3838 clear_thread_info ();
c906108c
SS
3839}
3840
3841
adbef1f0 3842#ifndef DEPRECATED_CHILD_RESUME
c906108c
SS
3843
3844/* Sanity check a thread about to be continued.
3845 */
3846static void
fba45db2 3847thread_dropping_event_check (thread_info *p)
c906108c 3848{
c5aa993b
JM
3849 if (!p->handled)
3850 {
3851 /*
3852 * This seems to happen when we "next" over a
3853 * "fork()" while following the parent. If it's
3854 * the FORK event, that's ok. If it's a SIGNAL
3855 * in the unfollowed child, that's ok to--but
3856 * how can we know that's what's going on?
3857 *
3858 * FIXME!
3859 */
3860 if (p->have_state)
3861 {
3862 if (p->last_stop_state.tts_event == TTEVT_FORK)
3863 {
3864 /* Ok */
3865 ;
3866 }
3867 else if (p->last_stop_state.tts_event == TTEVT_SIGNAL)
3868 {
3869 /* Ok, close eyes and let it happen.
3870 */
3871 ;
3872 }
3873 else
3874 {
3875 /* This shouldn't happen--we're dropping a
3876 * real event.
3877 */
3878 warning ("About to continue process %d, thread %d with unhandled event %s.",
3879 p->pid, p->tid,
3880 get_printable_name_of_ttrace_event (
3881 p->last_stop_state.tts_event));
c906108c
SS
3882
3883#ifdef PARANOIA
c5aa993b
JM
3884 if (debug_on)
3885 print_tthread (p);
c906108c 3886#endif
c5aa993b
JM
3887 }
3888 }
3889 else
3890 {
3891 /* No saved state, have to assume it failed.
3892 */
3893 warning ("About to continue process %d, thread %d with unhandled event.",
3894 p->pid, p->tid);
c906108c 3895#ifdef PARANOIA
c5aa993b
JM
3896 if (debug_on)
3897 print_tthread (p);
c906108c 3898#endif
c5aa993b 3899 }
c906108c 3900 }
c5aa993b
JM
3901
3902} /* thread_dropping_event_check */
c906108c
SS
3903
3904/* Use a loop over the threads to continue all the threads but
3905 * the one specified, which is to be stepped.
3906 */
3907static void
fba45db2 3908threads_continue_all_but_one (lwpid_t gdb_tid, int signal)
c906108c 3909{
c5aa993b
JM
3910 thread_info *p;
3911 int thread_signal;
3912 lwpid_t real_tid;
3913 lwpid_t scan_tid;
3914 ttstate_t state;
3915 int real_pid;
3916
c906108c 3917#ifdef THREAD_DEBUG
c5aa993b
JM
3918 if (debug_on)
3919 printf ("Using loop over threads to step/resume with signals\n");
c906108c
SS
3920#endif
3921
c5aa993b
JM
3922 /* First update the thread list.
3923 */
3924 set_all_unseen ();
3925 real_tid = map_from_gdb_tid (gdb_tid);
3926 real_pid = get_pid_for (real_tid);
3927
3928 scan_tid = get_process_first_stopped_thread_id (real_pid, &state);
3929 while (0 != scan_tid)
3930 {
3931
c906108c 3932#ifdef THREAD_DEBUG
c5aa993b
JM
3933 /* FIX: later should check state is stopped;
3934 * state.tts_flags & TTS_STATEMASK == TTS_WASSUSPENDED
3935 */
3936 if (debug_on)
b871e4ec 3937 if ((state.tts_flags & TTS_STATEMASK) != TTS_WASSUSPENDED)
c5aa993b 3938 printf ("About to continue non-stopped thread %d\n", scan_tid);
c906108c
SS
3939#endif
3940
c5aa993b
JM
3941 p = find_thread_info (scan_tid);
3942 if (NULL == p)
3943 {
3944 add_tthread (real_pid, scan_tid);
3945 p = find_thread_info (scan_tid);
3946
3947 /* This is either a newly-created thread or the
3948 * result of a fork; in either case there's no
3949 * actual event to worry about.
3950 */
3951 p->handled = 1;
3952
3953 if (state.tts_event != TTEVT_NONE)
3954 {
3955 /* Oops, do need to worry!
3956 */
3957 warning ("Unexpected thread with \"%s\" event.",
3958 get_printable_name_of_ttrace_event (state.tts_event));
3959 }
3960 }
3961 else if (scan_tid != p->tid)
3962 error ("Bad data in thread database.");
c906108c
SS
3963
3964#ifdef THREAD_DEBUG
c5aa993b
JM
3965 if (debug_on)
3966 if (p->terminated)
3967 printf ("Why are we continuing a dead thread?\n");
c906108c
SS
3968#endif
3969
c5aa993b
JM
3970 p->seen = 1;
3971
3972 scan_tid = get_process_next_stopped_thread_id (real_pid, &state);
c906108c
SS
3973 }
3974
c5aa993b
JM
3975 /* Remove unseen threads.
3976 */
3977 update_thread_list ();
c906108c 3978
c5aa993b
JM
3979 /* Now run down the thread list and continue or step.
3980 */
3981 for (p = thread_head.head; p; p = p->next)
3982 {
3983
3984 /* Sanity check.
3985 */
3986 thread_dropping_event_check (p);
3987
3988 /* Pass the correct signals along.
3989 */
3990 if (p->have_signal)
3991 {
3992 thread_signal = p->signal_value;
3993 p->have_signal = 0;
3994 }
3995 else
3996 thread_signal = 0;
3997
3998 if (p->tid != real_tid)
3999 {
4000 /*
4001 * Not the thread of interest, so continue it
4002 * as the user expects.
4003 */
4004 if (p->stepping_mode == DO_STEP)
4005 {
4006 /* Just step this thread.
4007 */
4008 call_ttrace (
4009 TT_LWP_SINGLE,
4010 p->tid,
4011 TT_USE_CURRENT_PC,
4012 (TTRACE_ARG_TYPE) target_signal_to_host (signal),
4013 TT_NIL);
4014 }
4015 else
4016 {
4017 /* Regular continue (default case).
4018 */
4019 call_ttrace (
4020 TT_LWP_CONTINUE,
4021 p->tid,
4022 TT_USE_CURRENT_PC,
4023 (TTRACE_ARG_TYPE) target_signal_to_host (thread_signal),
4024 TT_NIL);
4025 }
4026 }
4027 else
4028 {
4029 /* Step the thread of interest.
4030 */
4031 call_ttrace (
4032 TT_LWP_SINGLE,
4033 real_tid,
4034 TT_USE_CURRENT_PC,
4035 (TTRACE_ARG_TYPE) target_signal_to_host (signal),
4036 TT_NIL);
4037 }
4038 } /* Loop over threads */
4039} /* End threads_continue_all_but_one */
c906108c
SS
4040
4041/* Use a loop over the threads to continue all the threads.
4042 * This is done when a signal must be sent to any of the threads.
4043 */
4044static void
fba45db2 4045threads_continue_all_with_signals (lwpid_t gdb_tid, int signal)
c906108c 4046{
c5aa993b
JM
4047 thread_info *p;
4048 int thread_signal;
4049 lwpid_t real_tid;
4050 lwpid_t scan_tid;
4051 ttstate_t state;
4052 int real_pid;
c906108c
SS
4053
4054#ifdef THREAD_DEBUG
c5aa993b
JM
4055 if (debug_on)
4056 printf ("Using loop over threads to resume with signals\n");
c906108c
SS
4057#endif
4058
c5aa993b
JM
4059 /* Scan and update thread list.
4060 */
4061 set_all_unseen ();
4062 real_tid = map_from_gdb_tid (gdb_tid);
4063 real_pid = get_pid_for (real_tid);
4064
4065 scan_tid = get_process_first_stopped_thread_id (real_pid, &state);
4066 while (0 != scan_tid)
4067 {
4068
4069#ifdef THREAD_DEBUG
4070 if (debug_on)
b871e4ec 4071 if ((state.tts_flags & TTS_STATEMASK) != TTS_WASSUSPENDED)
c5aa993b
JM
4072 warning ("About to continue non-stopped thread %d\n", scan_tid);
4073#endif
4074
4075 p = find_thread_info (scan_tid);
4076 if (NULL == p)
4077 {
4078 add_tthread (real_pid, scan_tid);
4079 p = find_thread_info (scan_tid);
4080
4081 /* This is either a newly-created thread or the
4082 * result of a fork; in either case there's no
4083 * actual event to worry about.
4084 */
4085 p->handled = 1;
4086
4087 if (state.tts_event != TTEVT_NONE)
4088 {
4089 /* Oops, do need to worry!
4090 */
4091 warning ("Unexpected thread with \"%s\" event.",
4092 get_printable_name_of_ttrace_event (state.tts_event));
4093 }
4094 }
c906108c 4095
c906108c 4096#ifdef THREAD_DEBUG
c5aa993b
JM
4097 if (debug_on)
4098 if (p->terminated)
4099 printf ("Why are we continuing a dead thread? (1)\n");
c906108c
SS
4100#endif
4101
c5aa993b 4102 p->seen = 1;
c906108c 4103
c5aa993b
JM
4104 scan_tid = get_process_next_stopped_thread_id (real_pid, &state);
4105 }
c906108c 4106
c5aa993b
JM
4107 /* Remove unseen threads from our list.
4108 */
4109 update_thread_list ();
c906108c 4110
c5aa993b
JM
4111 /* Continue the threads.
4112 */
4113 for (p = thread_head.head; p; p = p->next)
4114 {
c906108c 4115
c5aa993b
JM
4116 /* Sanity check.
4117 */
4118 thread_dropping_event_check (p);
c906108c 4119
c5aa993b
JM
4120 /* Pass the correct signals along.
4121 */
4122 if (p->tid == real_tid)
4123 {
4124 thread_signal = signal;
4125 p->have_signal = 0;
4126 }
4127 else if (p->have_signal)
4128 {
4129 thread_signal = p->signal_value;
4130 p->have_signal = 0;
4131 }
4132 else
4133 thread_signal = 0;
4134
4135 if (p->stepping_mode == DO_STEP)
4136 {
4137 call_ttrace (
4138 TT_LWP_SINGLE,
4139 p->tid,
4140 TT_USE_CURRENT_PC,
4141 (TTRACE_ARG_TYPE) target_signal_to_host (signal),
4142 TT_NIL);
4143 }
4144 else
4145 {
4146 /* Continue this thread (default case).
4147 */
4148 call_ttrace (
4149 TT_LWP_CONTINUE,
4150 p->tid,
4151 TT_USE_CURRENT_PC,
4152 (TTRACE_ARG_TYPE) target_signal_to_host (thread_signal),
4153 TT_NIL);
4154 }
4155 }
4156} /* End threads_continue_all_with_signals */
c906108c
SS
4157
4158/* Step one thread only.
4159 */
4160static void
fba45db2 4161thread_fake_step (lwpid_t tid, enum target_signal signal)
c906108c 4162{
c5aa993b 4163 thread_info *p;
c906108c
SS
4164
4165#ifdef THREAD_DEBUG
c5aa993b
JM
4166 if (debug_on)
4167 {
4168 printf ("Doing a fake-step over a bpt, etc. for %d\n", tid);
c906108c 4169
c5aa993b
JM
4170 if (is_terminated (tid))
4171 printf ("Why are we continuing a dead thread? (4)\n");
c906108c
SS
4172 }
4173#endif
c906108c 4174
c5aa993b
JM
4175 if (doing_fake_step)
4176 warning ("Step while step already in progress.");
4177
4178 /* See if there's a saved signal value for this
4179 * thread to be passed on, but no current signal.
4180 */
4181 p = find_thread_info (tid);
4182 if (p != NULL)
4183 {
a0b3c4fd 4184 if (p->have_signal && signal == TARGET_SIGNAL_0)
c5aa993b
JM
4185 {
4186 /* Pass on a saved signal.
4187 */
4188 signal = p->signal_value;
4189 }
4190
4191 p->have_signal = 0;
4192 }
4193
4194 if (!p->handled)
4195 warning ("Internal error: continuing unhandled thread.");
c906108c 4196
c5aa993b
JM
4197 call_ttrace (TT_LWP_SINGLE,
4198 tid,
4199 TT_USE_CURRENT_PC,
4200 (TTRACE_ARG_TYPE) target_signal_to_host (signal),
4201 TT_NIL);
4202
4203 /* Do bookkeeping so "call_ttrace_wait" knows it has to wait
4204 * for this thread only, and clear any saved signal info.
4205 */
4206 doing_fake_step = 1;
4207 fake_step_tid = tid;
4208
4209} /* End thread_fake_step */
c906108c
SS
4210
4211/* Continue one thread when a signal must be sent to it.
4212 */
4213static void
fba45db2 4214threads_continue_one_with_signal (lwpid_t gdb_tid, int signal)
c906108c 4215{
c5aa993b
JM
4216 thread_info *p;
4217 lwpid_t real_tid;
4218 int real_pid;
4219
c906108c 4220#ifdef THREAD_DEBUG
c5aa993b
JM
4221 if (debug_on)
4222 printf ("Continuing one thread with a signal\n");
c906108c
SS
4223#endif
4224
c5aa993b
JM
4225 real_tid = map_from_gdb_tid (gdb_tid);
4226 real_pid = get_pid_for (real_tid);
c906108c 4227
c5aa993b
JM
4228 p = find_thread_info (real_tid);
4229 if (NULL == p)
4230 {
4231 add_tthread (real_pid, real_tid);
c906108c
SS
4232 }
4233
4234#ifdef THREAD_DEBUG
c5aa993b
JM
4235 if (debug_on)
4236 if (p->terminated)
4237 printf ("Why are we continuing a dead thread? (2)\n");
c906108c
SS
4238#endif
4239
c5aa993b
JM
4240 if (!p->handled)
4241 warning ("Internal error: continuing unhandled thread.");
4242
4243 p->have_signal = 0;
4244
4245 call_ttrace (TT_LWP_CONTINUE,
4246 gdb_tid,
4247 TT_USE_CURRENT_PC,
4248 (TTRACE_ARG_TYPE) target_signal_to_host (signal),
4249 TT_NIL);
c906108c
SS
4250}
4251#endif
4252
adbef1f0 4253#ifndef DEPRECATED_CHILD_RESUME
c906108c
SS
4254
4255/* Resume execution of the inferior process.
c5aa993b 4256
c906108c
SS
4257 * This routine is in charge of setting the "handled" bits.
4258 *
4259 * If STEP is zero, continue it.
4260 * If STEP is nonzero, single-step it.
4261 *
4262 * If SIGNAL is nonzero, give it that signal.
4263 *
4264 * If TID is -1, apply to all threads.
4265 * If TID is not -1, apply to specified thread.
4266 *
4267 * STEP
4268 * \ !0 0
4269 * TID \________________________________________________
4270 * |
4271 * -1 | Step current Continue all threads
4272 * | thread and (but which gets any
4273 * | continue others signal?--We look at
39f77062 4274 * | "inferior_ptid")
c906108c
SS
4275 * |
4276 * N | Step _this_ thread Continue _this_ thread
4277 * | and leave others and leave others
4278 * | stopped; internally stopped; used only for
4279 * | used by gdb, never hardware watchpoints
4280 * | a user command. and attach, never a
4281 * | user command.
4282 */
4283void
39f77062 4284child_resume (ptid_t ptid, int step, enum target_signal signal)
c906108c 4285{
c5aa993b 4286 int resume_all_threads;
c906108c 4287 lwpid_t tid;
c5aa993b 4288 process_state_t new_process_state;
39f77062 4289 lwpid_t gdb_tid = PIDGET (ptid);
c906108c
SS
4290
4291 resume_all_threads =
4292 (gdb_tid == INFTTRACE_ALL_THREADS) ||
4293 (vfork_in_flight);
4294
c5aa993b
JM
4295 if (resume_all_threads)
4296 {
4297 /* Resume all threads, but first pick a tid value
4298 * so we can get the pid when in call_ttrace doing
4299 * the map.
4300 */
4301 if (vfork_in_flight)
4302 tid = vforking_child_pid;
4303 else
39f77062 4304 tid = map_from_gdb_tid (PIDGET (inferior_ptid));
c5aa993b 4305 }
c906108c 4306 else
c5aa993b 4307 tid = map_from_gdb_tid (gdb_tid);
c906108c
SS
4308
4309#ifdef THREAD_DEBUG
c5aa993b
JM
4310 if (debug_on)
4311 {
4312 if (more_events_left)
4313 printf ("More events; ");
c906108c 4314
c5aa993b
JM
4315 if (signal != 0)
4316 printf ("Sending signal %d; ", signal);
4317
4318 if (resume_all_threads)
4319 {
4320 if (step == 0)
4321 printf ("Continue process %d\n", tid);
4322 else
4323 printf ("Step/continue thread %d\n", tid);
4324 }
4325 else
4326 {
4327 if (step == 0)
4328 printf ("Continue thread %d\n", tid);
4329 else
4330 printf ("Step just thread %d\n", tid);
4331 }
4332
4333 if (vfork_in_flight)
4334 printf ("Vfork in flight\n");
4335 }
c906108c
SS
4336#endif
4337
c5aa993b
JM
4338 if (process_state == RUNNING)
4339 warning ("Internal error in resume logic; doing resume or step anyway.");
4340
4341 if (!step /* Asked to continue... */
4342 && resume_all_threads /* whole process.. */
4343 && signal != 0 /* with a signal... */
4344 && more_events_left > 0)
4345 { /* but we can't yet--save it! */
c906108c
SS
4346
4347 /* Continue with signal means we have to set the pending
4348 * signal value for this thread.
4349 */
4350 thread_info *k;
c5aa993b 4351
c906108c 4352#ifdef THREAD_DEBUG
c5aa993b
JM
4353 if (debug_on)
4354 printf ("Saving signal %d for thread %d\n", signal, tid);
c906108c
SS
4355#endif
4356
c5aa993b
JM
4357 k = find_thread_info (tid);
4358 if (k != NULL)
4359 {
4360 k->have_signal = 1;
4361 k->signal_value = signal;
c906108c
SS
4362
4363#ifdef THREAD_DEBUG
c5aa993b
JM
4364 if (debug_on)
4365 if (k->terminated)
4366 printf ("Why are we continuing a dead thread? (3)\n");
c906108c
SS
4367#endif
4368
c5aa993b 4369 }
c906108c
SS
4370
4371#ifdef THREAD_DEBUG
c5aa993b
JM
4372 else if (debug_on)
4373 {
4374 printf ("No thread info for tid %d\n", tid);
4375 }
c906108c 4376#endif
c5aa993b 4377 }
c906108c
SS
4378
4379 /* Are we faking this "continue" or "step"?
c5aa993b 4380
c906108c
SS
4381 * We used to do steps by continuing all the threads for
4382 * which the events had been handled already. While
4383 * conceptually nicer (hides it all in a lower level), this
4384 * can lead to starvation and a hang (e.g. all but one thread
4385 * are unhandled at a breakpoint just before a "join" operation,
4386 * and one thread is in the join, and the user wants to step that
4387 * thread).
4388 */
c5aa993b
JM
4389 if (resume_all_threads /* Whole process, therefore user command */
4390 && more_events_left > 0)
4391 { /* But we can't do this yet--fake it! */
c906108c 4392 thread_info *p;
c5aa993b
JM
4393
4394 if (!step)
4395 {
4396 /* No need to do any notes on a per-thread
4397 * basis--we're done!
4398 */
c906108c 4399#ifdef WAIT_BUFFER_DEBUG
c5aa993b
JM
4400 if (debug_on)
4401 printf ("Faking a process resume.\n");
c906108c
SS
4402#endif
4403
c5aa993b
JM
4404 return;
4405 }
4406 else
4407 {
c906108c
SS
4408
4409#ifdef WAIT_BUFFER_DEBUG
c5aa993b
JM
4410 if (debug_on)
4411 printf ("Faking a process step.\n");
c906108c
SS
4412#endif
4413
c5aa993b
JM
4414 }
4415
4416 p = find_thread_info (tid);
4417 if (p == NULL)
4418 {
4419 warning ("No thread information for tid %d, 'next' command ignored.\n", tid);
4420 return;
4421 }
4422 else
4423 {
c906108c
SS
4424
4425#ifdef THREAD_DEBUG
c5aa993b
JM
4426 if (debug_on)
4427 if (p->terminated)
4428 printf ("Why are we continuing a dead thread? (3.5)\n");
c906108c
SS
4429#endif
4430
c5aa993b
JM
4431 if (p->stepping_mode != DO_DEFAULT)
4432 {
4433 warning ("Step or continue command applied to thread which is already stepping or continuing; command ignored.");
c906108c 4434
c5aa993b
JM
4435 return;
4436 }
c906108c 4437
c5aa993b
JM
4438 if (step)
4439 p->stepping_mode = DO_STEP;
4440 else
4441 p->stepping_mode = DO_CONTINUE;
c906108c 4442
c5aa993b
JM
4443 return;
4444 } /* Have thread info */
4445 } /* Must fake step or go */
c906108c
SS
4446
4447 /* Execept for fake-steps, from here on we know we are
4448 * going to wind up with a running process which will
4449 * need a real wait.
4450 */
4451 new_process_state = RUNNING;
4452
4453 /* An address of TT_USE_CURRENT_PC tells ttrace to continue from where
4454 * it was. (If GDB wanted it to start some other way, we have already
4455 * written a new PC value to the child.)
4456 *
4457 * If this system does not support PT_STEP, a higher level function will
4458 * have called single_step() to transmute the step request into a
4459 * continue request (by setting breakpoints on all possible successor
4460 * instructions), so we don't have to worry about that here.
4461 */
c5aa993b
JM
4462 if (step)
4463 {
4464 if (resume_all_threads)
4465 {
4466 /*
4467 * Regular user step: other threads get a "continue".
4468 */
4469 threads_continue_all_but_one (tid, signal);
4470 clear_all_handled ();
4471 clear_all_stepping_mode ();
4472 }
4473
4474 else
4475 {
4476 /* "Fake step": gdb is stepping one thread over a
4477 * breakpoint, watchpoint, or out of a library load
4478 * event, etc. The rest just stay where they are.
4479 *
4480 * Also used when there are pending events: we really
4481 * step the current thread, but leave the rest stopped.
4482 * Users can't request this, but "wait_for_inferior"
4483 * does--a lot!
4484 */
4485 thread_fake_step (tid, signal);
4486
4487 /* Clear the "handled" state of this thread, because
4488 * we'll soon get a new event for it. Other events
4489 * stay as they were.
4490 */
4491 clear_handled (tid);
4492 clear_stepping_mode (tid);
4493 new_process_state = FAKE_STEPPING;
4494 }
4495 }
4496
4497 else
4498 {
da12f4d8
JL
4499 /* TT_LWP_CONTINUE can pass signals to threads, TT_PROC_CONTINUE can't.
4500 Therefore, we really can't use TT_PROC_CONTINUE here.
4501
4502 Consider a process which stopped due to signal which gdb decides
4503 to handle and not pass on to the inferior. In that case we must
4504 clear the pending signal by restarting the inferior using
4505 TT_LWP_CONTINUE and pass zero as the signal number. Else the
4506 pending signal will be passed to the inferior. interrupt.exp
4507 in the testsuite does this precise thing and fails due to the
4508 unwanted signal delivery to the inferior. */
7d2830a3
DJ
4509 /* drow/2002-12-05: However, note that we must use TT_PROC_CONTINUE
4510 if we are tracing a vfork. */
4511 if (vfork_in_flight)
4512 {
4513 call_ttrace (TT_PROC_CONTINUE, tid, TT_NIL, TT_NIL, TT_NIL);
4514 clear_all_handled ();
4515 clear_all_stepping_mode ();
4516 }
4517 else if (resume_all_threads)
c5aa993b 4518 {
c906108c 4519#ifdef THREAD_DEBUG
da12f4d8
JL
4520 if (debug_on)
4521 printf ("Doing a continue by loop of all threads\n");
c906108c
SS
4522#endif
4523
da12f4d8 4524 threads_continue_all_with_signals (tid, signal);
c5aa993b 4525
da12f4d8
JL
4526 clear_all_handled ();
4527 clear_all_stepping_mode ();
c5aa993b 4528 }
c5aa993b
JM
4529 else
4530 {
c906108c 4531#ifdef THREAD_DEBUG
da12f4d8 4532 printf ("Doing a continue w/signal of just thread %d\n", tid);
c906108c
SS
4533#endif
4534
da12f4d8 4535 threads_continue_one_with_signal (tid, signal);
c5aa993b 4536
da12f4d8
JL
4537 /* Clear the "handled" state of this thread, because we
4538 will soon get a new event for it. Other events can
4539 stay as they were. */
4540 clear_handled (tid);
4541 clear_stepping_mode (tid);
c5aa993b
JM
4542 }
4543 }
c906108c
SS
4544
4545 process_state = new_process_state;
4546
4547#ifdef WAIT_BUFFER_DEBUG
c5aa993b
JM
4548 if (debug_on)
4549 printf ("Process set to %s\n",
4550 get_printable_name_of_process_state (process_state));
c906108c
SS
4551#endif
4552
4553}
adbef1f0 4554#endif /* DEPRECATED_CHILD_RESUME */
c906108c 4555\f
c906108c
SS
4556/*
4557 * Like it says.
4558 *
39f77062 4559 * One worry is that we may not be attaching to "inferior_ptid"
c906108c
SS
4560 * and thus may not want to clear out our data. FIXME?
4561 *
4562 */
4563static void
fba45db2 4564update_thread_state_after_attach (int pid, attach_continue_t kind_of_go)
c906108c 4565{
c5aa993b
JM
4566 int tt_status;
4567 ttstate_t thread_state;
4568 lwpid_t a_thread;
4569 lwpid_t tid;
c906108c
SS
4570
4571 /* The process better be stopped.
4572 */
c5aa993b
JM
4573 if (process_state != STOPPED
4574 && process_state != VFORKING)
4575 warning ("Internal error attaching.");
c906108c
SS
4576
4577 /* Clear out old tthread info and start over. This has the
4578 * side effect of ensuring that the TRAP is reported as being
4579 * in the right thread (re-mapped from tid to pid).
4580 *
4581 * It's because we need to add the tthread _now_ that we
4582 * need to call "clear_thread_info" _now_, and that's why
4583 * "require_notification_of_events" doesn't clear the thread
4584 * info (it's called later than this routine).
4585 */
c5aa993b 4586 clear_thread_info ();
c906108c
SS
4587 a_thread = 0;
4588
4589 for (tid = get_process_first_stopped_thread_id (pid, &thread_state);
4590 tid != 0;
4591 tid = get_process_next_stopped_thread_id (pid, &thread_state))
4592 {
4593 thread_info *p;
c5aa993b 4594
c906108c 4595 if (a_thread == 0)
c5aa993b
JM
4596 {
4597 a_thread = tid;
c906108c 4598#ifdef THREAD_DEBUG
c5aa993b
JM
4599 if (debug_on)
4600 printf ("Attaching to process %d, thread %d\n",
4601 pid, a_thread);
c906108c 4602#endif
c5aa993b 4603 }
c906108c
SS
4604
4605 /* Tell ourselves and the "rest of gdb" that this thread
4606 * exists.
4607 *
4608 * This isn't really a hack. Other thread-based versions
4609 * of gdb (e.g. gnu-nat.c) seem to do the same thing.
4610 *
4611 * We don't need to do mapping here, as we know this
4612 * is the first thread and thus gets the real pid
39f77062 4613 * (and is "inferior_ptid").
c906108c
SS
4614 *
4615 * NOTE: it probably isn't the originating thread,
4616 * but that doesn't matter (we hope!).
4617 */
c5aa993b
JM
4618 add_tthread (pid, tid);
4619 p = find_thread_info (tid);
4620 if (NULL == p) /* ?We just added it! */
4621 error ("Internal error adding a thread on attach.");
4622
8c6b089e 4623 copy_ttstate_t (&p->last_stop_state, &thread_state);
c906108c 4624 p->have_state = 1;
c5aa993b
JM
4625
4626 if (DO_ATTACH_CONTINUE == kind_of_go)
4627 {
4628 /*
4629 * If we are going to CONTINUE afterwards,
4630 * raising a SIGTRAP, don't bother trying to
4631 * handle this event. But check first!
4632 */
4633 switch (p->last_stop_state.tts_event)
4634 {
4635
4636 case TTEVT_NONE:
4637 /* Ok to set this handled.
4638 */
4639 break;
4640
4641 default:
4642 warning ("Internal error; skipping event %s on process %d, thread %d.",
4643 get_printable_name_of_ttrace_event (
4644 p->last_stop_state.tts_event),
4645 p->pid, p->tid);
4646 }
4647
4648 set_handled (pid, tid);
4649
4650 }
4651 else
4652 {
4653 /* There will be no "continue" opertion, so the
4654 * process remains stopped. Don't set any events
4655 * handled except the "gimmies".
4656 */
4657 switch (p->last_stop_state.tts_event)
4658 {
4659
4660 case TTEVT_NONE:
4661 /* Ok to ignore this.
4662 */
4663 set_handled (pid, tid);
4664 break;
4665
4666 case TTEVT_EXEC:
4667 case TTEVT_FORK:
4668 /* Expected "other" FORK or EXEC event from a
4669 * fork or vfork.
4670 */
4671 break;
4672
4673 default:
4674 printf ("Internal error: failed to handle event %s on process %d, thread %d.",
4675 get_printable_name_of_ttrace_event (
4676 p->last_stop_state.tts_event),
4677 p->pid, p->tid);
4678 }
4679 }
4680
6c482b87 4681 add_thread (pid_to_ptid (pid)); /* in thread.c */
c906108c 4682 }
c5aa993b 4683
c906108c 4684#ifdef PARANOIA
c5aa993b
JM
4685 if (debug_on)
4686 print_tthreads ();
c906108c
SS
4687#endif
4688
4689 /* One mustn't call ttrace_wait() after attaching via ttrace,
4690 'cause the process is stopped already.
c5aa993b 4691
c906108c
SS
4692 However, the upper layers of gdb's execution control will
4693 want to wait after attaching (but not after forks, in
4694 which case they will be doing a "target_resume", anticipating
4695 a later TTEVT_EXEC or TTEVT_FORK event).
4696
4697 To make this attach() implementation more compatible with
4698 others, we'll make the attached-to process raise a SIGTRAP.
4699
4700 Issue: this continues only one thread. That could be
4701 dangerous if the thread is blocked--the process won't run
4702 and no trap will be raised. FIX! (check state.tts_flags?
4703 need one that's either TTS_WASRUNNING--but we've stopped
4704 it and made it TTS_WASSUSPENDED. Hum...FIXME!)
4705 */
c5aa993b
JM
4706 if (DO_ATTACH_CONTINUE == kind_of_go)
4707 {
4708 tt_status = call_real_ttrace (
4709 TT_LWP_CONTINUE,
4710 pid,
4711 a_thread,
4712 TT_USE_CURRENT_PC,
4713 (TTRACE_ARG_TYPE) target_signal_to_host (TARGET_SIGNAL_TRAP),
4714 TT_NIL);
c906108c 4715 if (errno)
c5aa993b 4716 perror_with_name ("ttrace");
c906108c 4717
c5aa993b 4718 clear_handled (a_thread); /* So TRAP will be reported. */
c906108c
SS
4719
4720 /* Now running.
4721 */
4722 process_state = RUNNING;
c5aa993b 4723 }
c906108c
SS
4724
4725 attach_flag = 1;
4726}
c906108c 4727\f
c5aa993b 4728
c906108c
SS
4729/* Start debugging the process whose number is PID.
4730 * (A _real_ pid).
4731 */
4732int
fba45db2 4733attach (int pid)
c906108c 4734{
c5aa993b
JM
4735 int tt_status;
4736
c906108c 4737 tt_status = call_real_ttrace (
c5aa993b
JM
4738 TT_PROC_ATTACH,
4739 pid,
4740 (lwpid_t) TT_NIL,
4741 TT_NIL,
4742 (TTRACE_ARG_TYPE) TT_VERSION,
4743 TT_NIL);
c906108c
SS
4744 if (errno)
4745 perror_with_name ("ttrace attach");
4746
4747 /* If successful, the process is now stopped.
4748 */
4749 process_state = STOPPED;
4750
4751 /* Our caller ("attach_command" in "infcmd.c")
4752 * expects to do a "wait_for_inferior" after
4753 * the attach, so make sure the inferior is
4754 * running when we're done.
4755 */
c5aa993b 4756 update_thread_state_after_attach (pid, DO_ATTACH_CONTINUE);
c906108c
SS
4757
4758 return pid;
4759}
4760
4761
4762#if defined(CHILD_POST_ATTACH)
4763void
fba45db2 4764child_post_attach (int pid)
c906108c
SS
4765{
4766#ifdef THREAD_DEBUG
c5aa993b
JM
4767 if (debug_on)
4768 printf ("child-post-attach call\n");
c906108c
SS
4769#endif
4770
4771 require_notification_of_events (pid);
4772}
4773#endif
4774
4775
4776/* Stop debugging the process whose number is PID
4777 and continue it with signal number SIGNAL.
4778 SIGNAL = 0 means just continue it.
4779 */
4780void
fba45db2 4781detach (int signal)
c906108c
SS
4782{
4783 errno = 0;
4784 call_ttrace (TT_PROC_DETACH,
39f77062 4785 PIDGET (inferior_ptid),
c5aa993b
JM
4786 TT_NIL,
4787 (TTRACE_ARG_TYPE) signal,
4788 TT_NIL);
c906108c
SS
4789 attach_flag = 0;
4790
c5aa993b 4791 clear_thread_info ();
c906108c
SS
4792
4793 /* Process-state? */
4794}
c906108c 4795\f
c5aa993b 4796
c906108c
SS
4797/* Default the type of the ttrace transfer to int. */
4798#ifndef TTRACE_XFER_TYPE
4799#define TTRACE_XFER_TYPE int
4800#endif
4801
4802void
fba45db2 4803_initialize_kernel_u_addr (void)
c906108c
SS
4804{
4805}
4806
4807#if !defined (CHILD_XFER_MEMORY)
4808/* NOTE! I tried using TTRACE_READDATA, etc., to read and write memory
4809 in the NEW_SUN_TTRACE case.
4810 It ought to be straightforward. But it appears that writing did
4811 not write the data that I specified. I cannot understand where
4812 it got the data that it actually did write. */
4813
4814/* Copy LEN bytes to or from inferior's memory starting at MEMADDR
4815 to debugger memory starting at MYADDR. Copy to inferior if
73186089 4816 WRITE is nonzero. TARGET is ignored.
c5aa993b 4817
c906108c
SS
4818 Returns the length copied, which is either the LEN argument or zero.
4819 This xfer function does not do partial moves, since child_ops
4820 doesn't allow memory operations to cross below us in the target stack
4821 anyway. */
4822
4823int
73186089 4824child_xfer_memory (CORE_ADDR memaddr, char *myaddr, int len, int write,
043780a1 4825 struct mem_attrib *attrib,
73186089 4826 struct target_ops *target)
c906108c 4827{
52f0bd74 4828 int i;
c906108c 4829 /* Round starting address down to longword boundary. */
52f0bd74 4830 CORE_ADDR addr = memaddr & -(CORE_ADDR) sizeof (TTRACE_XFER_TYPE);
c906108c 4831 /* Round ending address up; get number of longwords that makes. */
52f0bd74 4832 int count
c5aa993b
JM
4833 = (((memaddr + len) - addr) + sizeof (TTRACE_XFER_TYPE) - 1)
4834 / sizeof (TTRACE_XFER_TYPE);
c906108c 4835 /* Allocate buffer of that many longwords. */
94cd915f
MS
4836 /* FIXME (alloca): This code, cloned from infptrace.c, is unsafe
4837 because it uses alloca to allocate a buffer of arbitrary size.
4838 For very large xfers, this could crash GDB's stack. */
52f0bd74 4839 TTRACE_XFER_TYPE *buffer
94cd915f 4840 = (TTRACE_XFER_TYPE *) alloca (count * sizeof (TTRACE_XFER_TYPE));
c906108c
SS
4841
4842 if (write)
4843 {
4844 /* Fill start and end extra bytes of buffer with existing memory data. */
4845
c5aa993b
JM
4846 if (addr != memaddr || len < (int) sizeof (TTRACE_XFER_TYPE))
4847 {
4848 /* Need part of initial word -- fetch it. */
4849 buffer[0] = call_ttrace (TT_LWP_RDTEXT,
39f77062 4850 PIDGET (inferior_ptid),
c5aa993b
JM
4851 (TTRACE_ARG_TYPE) addr,
4852 TT_NIL,
4853 TT_NIL);
4854 }
c906108c
SS
4855
4856 if (count > 1) /* FIXME, avoid if even boundary */
4857 {
4858 buffer[count - 1] = call_ttrace (TT_LWP_RDTEXT,
39f77062 4859 PIDGET (inferior_ptid),
c5aa993b
JM
4860 ((TTRACE_ARG_TYPE)
4861 (addr + (count - 1) * sizeof (TTRACE_XFER_TYPE))),
4862 TT_NIL,
4863 TT_NIL);
c906108c
SS
4864 }
4865
4866 /* Copy data to be written over corresponding part of buffer */
4867
4868 memcpy ((char *) buffer + (memaddr & (sizeof (TTRACE_XFER_TYPE) - 1)),
4869 myaddr,
4870 len);
4871
4872 /* Write the entire buffer. */
4873
4874 for (i = 0; i < count; i++, addr += sizeof (TTRACE_XFER_TYPE))
4875 {
4876 errno = 0;
4877 call_ttrace (TT_LWP_WRDATA,
39f77062 4878 PIDGET (inferior_ptid),
c5aa993b
JM
4879 (TTRACE_ARG_TYPE) addr,
4880 (TTRACE_ARG_TYPE) buffer[i],
4881 TT_NIL);
c906108c
SS
4882 if (errno)
4883 {
4884 /* Using the appropriate one (I or D) is necessary for
c5aa993b 4885 Gould NP1, at least. */
c906108c
SS
4886 errno = 0;
4887 call_ttrace (TT_LWP_WRTEXT,
39f77062 4888 PIDGET (inferior_ptid),
c5aa993b
JM
4889 (TTRACE_ARG_TYPE) addr,
4890 (TTRACE_ARG_TYPE) buffer[i],
4891 TT_NIL);
c906108c
SS
4892 }
4893 if (errno)
4894 return 0;
4895 }
4896 }
4897 else
4898 {
4899 /* Read all the longwords */
4900 for (i = 0; i < count; i++, addr += sizeof (TTRACE_XFER_TYPE))
4901 {
4902 errno = 0;
4903 buffer[i] = call_ttrace (TT_LWP_RDTEXT,
39f77062 4904 PIDGET (inferior_ptid),
c5aa993b
JM
4905 (TTRACE_ARG_TYPE) addr,
4906 TT_NIL,
4907 TT_NIL);
c906108c
SS
4908 if (errno)
4909 return 0;
4910 QUIT;
4911 }
4912
4913 /* Copy appropriate bytes out of the buffer. */
4914 memcpy (myaddr,
4915 (char *) buffer + (memaddr & (sizeof (TTRACE_XFER_TYPE) - 1)),
4916 len);
4917 }
4918 return len;
4919}
c906108c 4920\f
c5aa993b 4921
c906108c 4922static void
fba45db2 4923udot_info (void)
c906108c 4924{
c5aa993b
JM
4925 int udot_off; /* Offset into user struct */
4926 int udot_val; /* Value from user struct at udot_off */
4927 char mess[128]; /* For messages */
c906108c 4928
c5aa993b
JM
4929 if (!target_has_execution)
4930 {
4931 error ("The program is not being run.");
4932 }
c906108c
SS
4933
4934#if !defined (KERNEL_U_SIZE)
4935
4936 /* Adding support for this command is easy. Typically you just add a
4937 routine, called "kernel_u_size" that returns the size of the user
4938 struct, to the appropriate *-nat.c file and then add to the native
4939 config file "#define KERNEL_U_SIZE kernel_u_size()" */
4940 error ("Don't know how large ``struct user'' is in this version of gdb.");
4941
4942#else
4943
4944 for (udot_off = 0; udot_off < KERNEL_U_SIZE; udot_off += sizeof (udot_val))
4945 {
4946 if ((udot_off % 24) == 0)
4947 {
4948 if (udot_off > 0)
4949 {
4950 printf_filtered ("\n");
4951 }
4952 printf_filtered ("%04x:", udot_off);
4953 }
4954 udot_val = call_ttrace (TT_LWP_RUREGS,
39f77062 4955 PIDGET (inferior_ptid),
c5aa993b
JM
4956 (TTRACE_ARG_TYPE) udot_off,
4957 TT_NIL,
4958 TT_NIL);
c906108c
SS
4959 if (errno != 0)
4960 {
4961 sprintf (mess, "\nreading user struct at offset 0x%x", udot_off);
4962 perror_with_name (mess);
4963 }
4964 /* Avoid using nonportable (?) "*" in print specs */
4965 printf_filtered (sizeof (int) == 4 ? " 0x%08x" : " 0x%16x", udot_val);
4966 }
4967 printf_filtered ("\n");
4968
4969#endif
4970}
4971#endif /* !defined (CHILD_XFER_MEMORY). */
4972
6aaea291 4973
c906108c
SS
4974/* TTrace version of "target_pid_to_exec_file"
4975 */
4976char *
fba45db2 4977child_pid_to_exec_file (int tid)
c906108c 4978{
c5aa993b 4979 int tt_status;
6aaea291
AC
4980 static char exec_file_buffer[1024];
4981 pid_t pid;
4982 static struct pst_status buf;
c5aa993b 4983
6aaea291
AC
4984 /* On various versions of hpux11, this may fail due to a supposed
4985 kernel bug. We have alternate methods to get this information
4986 (ie pstat). */
c906108c 4987 tt_status = call_ttrace (TT_PROC_GET_PATHNAME,
c5aa993b 4988 tid,
6aaea291
AC
4989 (uint64_t) exec_file_buffer,
4990 sizeof (exec_file_buffer) - 1,
4991 0);
c906108c
SS
4992 if (tt_status >= 0)
4993 return exec_file_buffer;
4994
6aaea291
AC
4995 /* Try to get process information via pstat and extract the filename
4996 from the pst_cmd field within the pst_status structure. */
4997 if (pstat_getproc (&buf, sizeof (struct pst_status), 0, tid) != -1)
c5aa993b 4998 {
6aaea291 4999 char *p = buf.pst_cmd;
c906108c 5000
6aaea291
AC
5001 while (*p && *p != ' ')
5002 p++;
5003 *p = 0;
5004
5005 return (buf.pst_cmd);
c906108c
SS
5006 }
5007
6aaea291 5008 return (NULL);
c906108c
SS
5009}
5010
c906108c 5011void
fba45db2 5012pre_fork_inferior (void)
c906108c 5013{
c5aa993b 5014 int status;
c906108c
SS
5015
5016 status = pipe (startup_semaphore.parent_channel);
c5aa993b
JM
5017 if (status < 0)
5018 {
c906108c
SS
5019 warning ("error getting parent pipe for startup semaphore");
5020 return;
c5aa993b 5021 }
c906108c
SS
5022
5023 status = pipe (startup_semaphore.child_channel);
c5aa993b
JM
5024 if (status < 0)
5025 {
c906108c
SS
5026 warning ("error getting child pipe for startup semaphore");
5027 return;
c5aa993b 5028 }
c906108c
SS
5029}
5030
4c9ba7e0 5031/* Called from child_follow_fork in hppah-nat.c.
c906108c
SS
5032 *
5033 * This seems to be intended to attach after a fork or
5034 * vfork, while "attach" is used to attach to a pid
5035 * given by the user. The check for an existing attach
5036 * seems odd--it always fails in our test system.
5037 */
5038int
fba45db2 5039hppa_require_attach (int pid)
c906108c 5040{
c5aa993b
JM
5041 int tt_status;
5042 CORE_ADDR pc;
5043 CORE_ADDR pc_addr;
5044 unsigned int regs_offset;
c906108c 5045 process_state_t old_process_state = process_state;
c5aa993b 5046
c906108c
SS
5047 /* Are we already attached? There appears to be no explicit
5048 * way to answer this via ttrace, so we try something which
5049 * should be innocuous if we are attached. If that fails,
5050 * then we assume we're not attached, and so attempt to make
5051 * it so.
5052 */
5053 errno = 0;
5054 tt_status = call_real_ttrace (TT_PROC_STOP,
c5aa993b
JM
5055 pid,
5056 (lwpid_t) TT_NIL,
5057 (TTRACE_ARG_TYPE) TT_NIL,
5058 (TTRACE_ARG_TYPE) TT_NIL,
5059 TT_NIL);
5060
c906108c
SS
5061 if (errno)
5062 {
5063 /* No change to process-state!
5064 */
5065 errno = 0;
c5aa993b 5066 pid = attach (pid);
c906108c
SS
5067 }
5068 else
5069 {
c5aa993b
JM
5070 /* If successful, the process is now stopped. But if
5071 * we're VFORKING, the parent is still running, so don't
5072 * change the process state.
5073 */
5074 if (process_state != VFORKING)
5075 process_state = STOPPED;
5076
5077 /* If we were already attached, you'd think that we
5078 * would need to start going again--but you'd be wrong,
5079 * as the fork-following code is actually in the middle
5080 * of the "resume" routine in in "infrun.c" and so
5081 * will (almost) immediately do a resume.
5082 *
5083 * On the other hand, if we are VFORKING, which means
5084 * that the child and the parent share a process for a
5085 * while, we know that "resume" won't be resuming
5086 * until the child EXEC event is seen. But we still
5087 * don't want to continue, as the event is already
5088 * there waiting.
5089 */
5090 update_thread_state_after_attach (pid, DONT_ATTACH_CONTINUE);
5091 } /* STOP succeeded */
5092
c906108c
SS
5093 return pid;
5094}
5095
5096int
fba45db2 5097hppa_require_detach (int pid, int signal)
c906108c 5098{
c5aa993b 5099 int tt_status;
c906108c
SS
5100
5101 /* If signal is non-zero, we must pass the signal on to the active
5102 thread prior to detaching. We do this by continuing the threads
5103 with the signal.
5104 */
5105 if (signal != 0)
5106 {
5107 errno = 0;
c5aa993b 5108 threads_continue_all_with_signals (pid, signal);
c906108c
SS
5109 }
5110
5111 errno = 0;
5112 tt_status = call_ttrace (TT_PROC_DETACH,
c5aa993b
JM
5113 pid,
5114 TT_NIL,
5115 TT_NIL,
5116 TT_NIL);
c906108c 5117
c5aa993b 5118 errno = 0; /* Ignore any errors. */
c906108c
SS
5119
5120 /* process_state? */
c5aa993b 5121
c906108c
SS
5122 return pid;
5123}
5124
5125/* Given the starting address of a memory page, hash it to a bucket in
5126 the memory page dictionary.
c5aa993b 5127 */
c906108c 5128static int
fba45db2 5129get_dictionary_bucket_of_page (CORE_ADDR page_start)
c906108c 5130{
c5aa993b 5131 int hash;
c906108c
SS
5132
5133 hash = (page_start / memory_page_dictionary.page_size);
5134 hash = hash % MEMORY_PAGE_DICTIONARY_BUCKET_COUNT;
5135
5136 return hash;
5137}
5138
5139
5140/* Given a memory page's starting address, get (i.e., find an existing
5141 or create a new) dictionary entry for the page. The page will be
5142 write-protected when this function returns, but may have a reference
5143 count of 0 (if the page was newly-added to the dictionary).
c5aa993b 5144 */
c906108c 5145static memory_page_t *
fba45db2 5146get_dictionary_entry_of_page (int pid, CORE_ADDR page_start)
c906108c 5147{
c5aa993b
JM
5148 int bucket;
5149 memory_page_t *page = NULL;
5150 memory_page_t *previous_page = NULL;
c906108c
SS
5151
5152 /* We're going to be using the dictionary now, than-kew. */
3731b38a 5153 require_memory_page_dictionary ();
c906108c
SS
5154
5155 /* Try to find an existing dictionary entry for this page. Hash
5156 on the page's starting address.
c5aa993b 5157 */
c906108c
SS
5158 bucket = get_dictionary_bucket_of_page (page_start);
5159 page = &memory_page_dictionary.buckets[bucket];
5160 while (page != NULL)
5161 {
5162 if (page->page_start == page_start)
c5aa993b 5163 break;
c906108c
SS
5164 previous_page = page;
5165 page = page->next;
5166 }
5167
5168 /* Did we find a dictionary entry for this page? If not, then
5169 add it to the dictionary now.
c5aa993b 5170 */
c906108c
SS
5171 if (page == NULL)
5172 {
5173 /* Create a new entry. */
5174 page = (memory_page_t *) xmalloc (sizeof (memory_page_t));
5175 page->page_start = page_start;
5176 page->reference_count = 0;
5177 page->next = NULL;
5178 page->previous = NULL;
5179
5180 /* We'll write-protect the page now, if that's allowed. */
5181 page->original_permissions = write_protect_page (pid, page_start);
5182
5183 /* Add the new entry to the dictionary. */
5184 page->previous = previous_page;
5185 previous_page->next = page;
5186
5187 memory_page_dictionary.page_count++;
5188 }
5189
5190 return page;
5191}
5192
5193
5194static void
fba45db2 5195remove_dictionary_entry_of_page (int pid, memory_page_t *page)
c906108c
SS
5196{
5197 /* Restore the page's original permissions. */
5198 unwrite_protect_page (pid, page->page_start, page->original_permissions);
5199
5200 /* Kick the page out of the dictionary. */
5201 if (page->previous != NULL)
5202 page->previous->next = page->next;
5203 if (page->next != NULL)
5204 page->next->previous = page->previous;
5205
5206 /* Just in case someone retains a handle to this after it's freed. */
5207 page->page_start = (CORE_ADDR) 0;
5208
5209 memory_page_dictionary.page_count--;
5210
b8c9b27d 5211 xfree (page);
c906108c
SS
5212}
5213
5214
5215static void
fba45db2 5216hppa_enable_syscall_events (int pid)
c906108c 5217{
c5aa993b
JM
5218 int tt_status;
5219 ttevent_t ttrace_events;
c906108c
SS
5220
5221 /* Get the set of events that are currently enabled. */
5222 tt_status = call_ttrace (TT_PROC_GET_EVENT_MASK,
c5aa993b
JM
5223 pid,
5224 (TTRACE_ARG_TYPE) & ttrace_events,
5225 (TTRACE_ARG_TYPE) sizeof (ttrace_events),
5226 TT_NIL);
c906108c
SS
5227 if (errno)
5228 perror_with_name ("ttrace");
5229
5230 /* Add syscall events to that set. */
5231 ttrace_events.tte_events |= TTEVT_SYSCALL_ENTRY;
5232 ttrace_events.tte_events |= TTEVT_SYSCALL_RETURN;
5233
5234 tt_status = call_ttrace (TT_PROC_SET_EVENT_MASK,
c5aa993b
JM
5235 pid,
5236 (TTRACE_ARG_TYPE) & ttrace_events,
5237 (TTRACE_ARG_TYPE) sizeof (ttrace_events),
5238 TT_NIL);
c906108c
SS
5239 if (errno)
5240 perror_with_name ("ttrace");
5241}
5242
5243
5244static void
fba45db2 5245hppa_disable_syscall_events (int pid)
c906108c 5246{
c5aa993b
JM
5247 int tt_status;
5248 ttevent_t ttrace_events;
c906108c
SS
5249
5250 /* Get the set of events that are currently enabled. */
5251 tt_status = call_ttrace (TT_PROC_GET_EVENT_MASK,
c5aa993b
JM
5252 pid,
5253 (TTRACE_ARG_TYPE) & ttrace_events,
5254 (TTRACE_ARG_TYPE) sizeof (ttrace_events),
5255 TT_NIL);
c906108c
SS
5256 if (errno)
5257 perror_with_name ("ttrace");
5258
5259 /* Remove syscall events from that set. */
5260 ttrace_events.tte_events &= ~TTEVT_SYSCALL_ENTRY;
5261 ttrace_events.tte_events &= ~TTEVT_SYSCALL_RETURN;
5262
5263 tt_status = call_ttrace (TT_PROC_SET_EVENT_MASK,
c5aa993b
JM
5264 pid,
5265 (TTRACE_ARG_TYPE) & ttrace_events,
5266 (TTRACE_ARG_TYPE) sizeof (ttrace_events),
5267 TT_NIL);
c906108c
SS
5268 if (errno)
5269 perror_with_name ("ttrace");
5270}
5271
5272
5273/* The address range beginning with START and ending with START+LEN-1
5274 (inclusive) is to be watched via page-protection by a new watchpoint.
5275 Set protection for all pages that overlap that range.
5276
5277 Note that our caller sets TYPE to:
c5aa993b
JM
5278 0 for a bp_hardware_watchpoint,
5279 1 for a bp_read_watchpoint,
5280 2 for a bp_access_watchpoint
c906108c
SS
5281
5282 (Yes, this is intentionally (though lord only knows why) different
5283 from the TYPE that is passed to hppa_remove_hw_watchpoint.)
c5aa993b 5284 */
c906108c 5285int
fba45db2 5286hppa_insert_hw_watchpoint (int pid, CORE_ADDR start, LONGEST len, int type)
c906108c 5287{
c5aa993b
JM
5288 CORE_ADDR page_start;
5289 int dictionary_was_empty;
5290 int page_size;
5291 int page_id;
5292 LONGEST range_size_in_pages;
c906108c
SS
5293
5294 if (type != 0)
5295 error ("read or access hardware watchpoints not supported on HP-UX");
5296
5297 /* Examine all pages in the address range. */
5298 require_memory_page_dictionary ();
5299
5300 dictionary_was_empty = (memory_page_dictionary.page_count == (LONGEST) 0);
5301
5302 page_size = memory_page_dictionary.page_size;
5303 page_start = (start / page_size) * page_size;
5304 range_size_in_pages = ((LONGEST) len + (LONGEST) page_size - 1) / (LONGEST) page_size;
5305
c5aa993b 5306 for (page_id = 0; page_id < range_size_in_pages; page_id++, page_start += page_size)
c906108c 5307 {
c5aa993b 5308 memory_page_t *page;
c906108c
SS
5309
5310 /* This gets the page entered into the dictionary if it was
5311 not already entered.
c5aa993b 5312 */
c906108c
SS
5313 page = get_dictionary_entry_of_page (pid, page_start);
5314 page->reference_count++;
5315 }
5316
5317 /* Our implementation depends on seeing calls to kernel code, for the
5318 following reason. Here we ask to be notified of syscalls.
5319
5320 When a protected page is accessed by user code, HP-UX raises a SIGBUS.
5321 Fine.
5322
5323 But when kernel code accesses the page, it doesn't give a SIGBUS.
5324 Rather, the system call that touched the page fails, with errno=EFAULT.
5325 Not good for us.
5326
5327 We could accomodate this "feature" by asking to be notified of syscall
5328 entries & exits; upon getting an entry event, disabling page-protections;
5329 upon getting an exit event, reenabling page-protections and then checking
5330 if any watchpoints triggered.
5331
5332 However, this turns out to be a real performance loser. syscalls are
5333 usually a frequent occurrence. Having to unprotect-reprotect all watched
5334 pages, and also to then read all watched memory locations and compare for
5335 triggers, can be quite expensive.
5336
5337 Instead, we'll only ask to be notified of syscall exits. When we get
5338 one, we'll check whether errno is set. If not, or if it's not EFAULT,
5339 we can just continue the inferior.
5340
5341 If errno is set upon syscall exit to EFAULT, we must perform some fairly
5342 hackish stuff to determine whether the failure really was due to a
5343 page-protect trap on a watched location.
c5aa993b 5344 */
c906108c
SS
5345 if (dictionary_was_empty)
5346 hppa_enable_syscall_events (pid);
5347
5348 return 1;
5349}
5350
5351
5352/* The address range beginning with START and ending with START+LEN-1
5353 (inclusive) was being watched via page-protection by a watchpoint
5354 which has been removed. Remove protection for all pages that
5355 overlap that range, which are not also being watched by other
5356 watchpoints.
c5aa993b 5357 */
c906108c 5358int
65e82032 5359hppa_remove_hw_watchpoint (int pid, CORE_ADDR start, LONGEST len, int type)
c906108c 5360{
c5aa993b
JM
5361 CORE_ADDR page_start;
5362 int dictionary_is_empty;
5363 int page_size;
5364 int page_id;
5365 LONGEST range_size_in_pages;
c906108c
SS
5366
5367 if (type != 0)
5368 error ("read or access hardware watchpoints not supported on HP-UX");
5369
5370 /* Examine all pages in the address range. */
5371 require_memory_page_dictionary ();
5372
5373 page_size = memory_page_dictionary.page_size;
5374 page_start = (start / page_size) * page_size;
5375 range_size_in_pages = ((LONGEST) len + (LONGEST) page_size - 1) / (LONGEST) page_size;
5376
c5aa993b 5377 for (page_id = 0; page_id < range_size_in_pages; page_id++, page_start += page_size)
c906108c 5378 {
c5aa993b 5379 memory_page_t *page;
c906108c
SS
5380
5381 page = get_dictionary_entry_of_page (pid, page_start);
5382 page->reference_count--;
5383
5384 /* Was this the last reference of this page? If so, then we
5385 must scrub the entry from the dictionary, and also restore
5386 the page's original permissions.
c5aa993b 5387 */
c906108c 5388 if (page->reference_count == 0)
c5aa993b 5389 remove_dictionary_entry_of_page (pid, page);
c906108c
SS
5390 }
5391
5392 dictionary_is_empty = (memory_page_dictionary.page_count == (LONGEST) 0);
5393
5394 /* If write protections are currently disallowed, then that implies that
5395 wait_for_inferior believes that the inferior is within a system call.
5396 Since we want to see both syscall entry and return, it's clearly not
5397 good to disable syscall events in this state!
5398
5399 ??rehrauer: Yeah, it'd be better if we had a specific flag that said,
5400 "inferior is between syscall events now". Oh well.
c5aa993b 5401 */
c906108c
SS
5402 if (dictionary_is_empty && memory_page_dictionary.page_protections_allowed)
5403 hppa_disable_syscall_events (pid);
5404
5405 return 1;
5406}
5407
5408
5409/* Could we implement a watchpoint of this type via our available
5410 hardware support?
5411
5412 This query does not consider whether a particular address range
5413 could be so watched, but just whether support is generally available
5414 for such things. See hppa_range_profitable_for_hw_watchpoint for a
5415 query that answers whether a particular range should be watched via
5416 hardware support.
c5aa993b 5417 */
c906108c 5418int
65e82032 5419hppa_can_use_hw_watchpoint (int type, int cnt, int ot)
c906108c
SS
5420{
5421 return (type == bp_hardware_watchpoint);
5422}
5423
5424
5425/* Assuming we could set a hardware watchpoint on this address, do
5426 we think it would be profitable ("a good idea") to do so? If not,
5427 we can always set a regular (aka single-step & test) watchpoint
5428 on the address...
c5aa993b 5429 */
c906108c 5430int
fba45db2 5431hppa_range_profitable_for_hw_watchpoint (int pid, CORE_ADDR start, LONGEST len)
c906108c 5432{
c5aa993b
JM
5433 int range_is_stack_based;
5434 int range_is_accessible;
5435 CORE_ADDR page_start;
5436 int page_size;
5437 int page;
5438 LONGEST range_size_in_pages;
c906108c
SS
5439
5440 /* ??rehrauer: For now, say that all addresses are potentially
5441 profitable. Possibly later we'll want to test the address
5442 for "stackness"?
c5aa993b 5443 */
c906108c
SS
5444 range_is_stack_based = 0;
5445
5446 /* If any page in the range is inaccessible, then we cannot
5447 really use hardware watchpointing, even though our client
5448 thinks we can. In that case, it's actually an error to
5449 attempt to use hw watchpoints, so we'll tell our client
5450 that the range is "unprofitable", and hope that they listen...
c5aa993b
JM
5451 */
5452 range_is_accessible = 1; /* Until proven otherwise. */
c906108c
SS
5453
5454 /* Examine all pages in the address range. */
5455 errno = 0;
5456 page_size = sysconf (_SC_PAGE_SIZE);
5457
5458 /* If we can't determine page size, we're hosed. Tell our
5459 client it's unprofitable to use hw watchpoints for this
5460 range.
c5aa993b 5461 */
c906108c
SS
5462 if (errno || (page_size <= 0))
5463 {
5464 errno = 0;
5465 return 0;
5466 }
5467
5468 page_start = (start / page_size) * page_size;
c5aa993b 5469 range_size_in_pages = len / (LONGEST) page_size;
c906108c 5470
c5aa993b 5471 for (page = 0; page < range_size_in_pages; page++, page_start += page_size)
c906108c 5472 {
c5aa993b
JM
5473 int tt_status;
5474 int page_permissions;
c906108c
SS
5475
5476 /* Is this page accessible? */
5477 errno = 0;
5478 tt_status = call_ttrace (TT_PROC_GET_MPROTECT,
c5aa993b
JM
5479 pid,
5480 (TTRACE_ARG_TYPE) page_start,
5481 TT_NIL,
5482 (TTRACE_ARG_TYPE) & page_permissions);
c906108c 5483 if (errno || (tt_status < 0))
c5aa993b
JM
5484 {
5485 errno = 0;
5486 range_is_accessible = 0;
5487 break;
5488 }
c906108c
SS
5489
5490 /* Yes, go for another... */
5491 }
5492
c5aa993b 5493 return (!range_is_stack_based && range_is_accessible);
c906108c
SS
5494}
5495
5496
5497char *
39f77062 5498hppa_pid_or_tid_to_str (ptid_t ptid)
c906108c 5499{
c5aa993b 5500 static char buf[100]; /* Static because address returned. */
39f77062 5501 pid_t id = PIDGET (ptid);
c906108c
SS
5502
5503 /* Does this appear to be a process? If so, print it that way. */
5504 if (is_process_id (id))
39f77062 5505 return child_pid_to_str (ptid);
c906108c
SS
5506
5507 /* Else, print both the GDB thread number and the system thread id. */
39f77062
KB
5508 sprintf (buf, "thread %d (", pid_to_thread_id (ptid));
5509 strcat (buf, hppa_tid_to_str (ptid));
c906108c
SS
5510 strcat (buf, ")\0");
5511
5512 return buf;
5513}
c906108c 5514\f
c5aa993b 5515
c906108c 5516void
fba45db2 5517hppa_ensure_vforking_parent_remains_stopped (int pid)
c906108c
SS
5518{
5519 /* Nothing to do when using ttrace. Only the ptrace-based implementation
5520 must do real work.
5521 */
5522}
5523
5524
5525int
fba45db2 5526hppa_resume_execd_vforking_child_to_get_parent_vfork (void)
c906108c 5527{
c5aa993b 5528 return 0; /* No, the parent vfork is available now. */
c906108c 5529}
c5aa993b 5530\f
c906108c 5531
7be570e7
JM
5532/* Write a register as a 64bit value. This may be necessary if the
5533 native OS is too braindamaged to allow some (or all) registers to
5534 be written in 32bit hunks such as hpux11 and the PC queue registers.
5535
5536 This is horribly gross and disgusting. */
5537
5538int
fba45db2 5539ttrace_write_reg_64 (int gdb_tid, CORE_ADDR dest_addr, CORE_ADDR src_addr)
7be570e7
JM
5540{
5541 pid_t pid;
5542 lwpid_t tid;
5543 int tt_status;
5544
5545 tid = map_from_gdb_tid (gdb_tid);
5546 pid = get_pid_for (tid);
5547
5548 errno = 0;
5549 tt_status = ttrace (TT_LWP_WUREGS,
5550 pid,
5551 tid,
5552 (TTRACE_ARG_TYPE) dest_addr,
5553 8,
5554 (TTRACE_ARG_TYPE) src_addr );
5555
5556#ifdef THREAD_DEBUG
5557 if (errno)
5558 {
5559 /* Don't bother for a known benign error: if you ask for the
5560 first thread state, but there is only one thread and it's
5561 not stopped, ttrace complains.
5562
5563 We have this inside the #ifdef because our caller will do
5564 this check for real. */
5565 if( request != TT_PROC_GET_FIRST_LWP_STATE
5566 || errno != EPROTO )
5567 {
5568 if( debug_on )
5569 printf( "TT fail for %s, with pid %d, tid %d, status %d \n",
5570 get_printable_name_of_ttrace_request (TT_LWP_WUREGS),
5571 pid, tid, tt_status );
5572 }
5573 }
5574#endif
5575
5576 return tt_status;
5577}
c906108c 5578
c906108c 5579void
fba45db2 5580_initialize_infttrace (void)
c906108c
SS
5581{
5582 /* Initialize the ttrace-based hardware watchpoint implementation. */
c5aa993b 5583 memory_page_dictionary.page_count = (LONGEST) - 1;
c906108c
SS
5584 memory_page_dictionary.page_protections_allowed = 1;
5585
5586 errno = 0;
5587 memory_page_dictionary.page_size = sysconf (_SC_PAGE_SIZE);
5588
a0b3c4fd
JM
5589 /* We do a lot of casts from pointers to TTRACE_ARG_TYPE; make sure
5590 this is okay. */
5591 if (sizeof (TTRACE_ARG_TYPE) < sizeof (void *))
e1e9e218 5592 internal_error (__FILE__, __LINE__, "failed internal consistency check");
a0b3c4fd 5593
c906108c
SS
5594 if (errno || (memory_page_dictionary.page_size <= 0))
5595 perror_with_name ("sysconf");
5596}
This page took 0.643742 seconds and 4 git commands to generate.