2011-01-05 Michael Snyder <msnyder@vmware.com>
[deliverable/binutils-gdb.git] / gdb / inf-ttrace.c
1 /* Low-level child interface to ttrace.
2
3 Copyright (C) 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011
4 Free Software Foundation, Inc.
5
6 This file is part of GDB.
7
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
12
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>. */
20
21 #include "defs.h"
22
23 /* The ttrace(2) system call didn't exist before HP-UX 10.30. Don't
24 try to compile this code unless we have it. */
25 #ifdef HAVE_TTRACE
26
27 #include "command.h"
28 #include "gdbcore.h"
29 #include "gdbthread.h"
30 #include "inferior.h"
31 #include "terminal.h"
32 #include "target.h"
33
34 #include "gdb_assert.h"
35 #include "gdb_string.h"
36 #include <sys/mman.h>
37 #include <sys/ttrace.h>
38 #include <signal.h>
39
40 #include "inf-child.h"
41 #include "inf-ttrace.h"
42
43 \f
44
45 /* HP-UX uses a threading model where each user-space thread
46 corresponds to a kernel thread. These kernel threads are called
47 lwps. The ttrace(2) interface gives us almost full control over
48 the threads, which makes it very easy to support them in GDB. We
49 identify the threads by process ID and lwp ID. The ttrace(2) also
50 provides us with a thread's user ID (in the `tts_user_tid' member
51 of `ttstate_t') but we don't use that (yet) as it isn't necessary
52 to uniquely label the thread. */
53
54 /* Number of active lwps. */
55 static int inf_ttrace_num_lwps;
56 \f
57
58 /* On HP-UX versions that have the ttrace(2) system call, we can
59 implement "hardware" watchpoints by fiddling with the protection of
60 pages in the address space that contain the variable being watched.
61 In order to implement this, we keep a dictionary of pages for which
62 we have changed the protection. */
63
64 struct inf_ttrace_page
65 {
66 CORE_ADDR addr; /* Page address. */
67 int prot; /* Protection. */
68 int refcount; /* Reference count. */
69 struct inf_ttrace_page *next;
70 struct inf_ttrace_page *prev;
71 };
72
73 struct inf_ttrace_page_dict
74 {
75 struct inf_ttrace_page buckets[128];
76 int pagesize; /* Page size. */
77 int count; /* Number of pages in this dictionary. */
78 } inf_ttrace_page_dict;
79
80 struct inf_ttrace_private_thread_info
81 {
82 int dying;
83 };
84
85 /* Number of lwps that are currently in a system call. */
86 static int inf_ttrace_num_lwps_in_syscall;
87
88 /* Flag to indicate whether we should re-enable page protections after
89 the next wait. */
90 static int inf_ttrace_reenable_page_protections;
91
92 /* Enable system call events for process PID. */
93
94 static void
95 inf_ttrace_enable_syscall_events (pid_t pid)
96 {
97 ttevent_t tte;
98 ttstate_t tts;
99
100 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
101
102 if (ttrace (TT_PROC_GET_EVENT_MASK, pid, 0,
103 (uintptr_t)&tte, sizeof tte, 0) == -1)
104 perror_with_name (("ttrace"));
105
106 tte.tte_events |= (TTEVT_SYSCALL_ENTRY | TTEVT_SYSCALL_RETURN);
107
108 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
109 (uintptr_t)&tte, sizeof tte, 0) == -1)
110 perror_with_name (("ttrace"));
111
112 if (ttrace (TT_PROC_GET_FIRST_LWP_STATE, pid, 0,
113 (uintptr_t)&tts, sizeof tts, 0) == -1)
114 perror_with_name (("ttrace"));
115
116 if (tts.tts_flags & TTS_INSYSCALL)
117 inf_ttrace_num_lwps_in_syscall++;
118
119 /* FIXME: Handle multiple threads. */
120 }
121
122 /* Disable system call events for process PID. */
123
124 static void
125 inf_ttrace_disable_syscall_events (pid_t pid)
126 {
127 ttevent_t tte;
128
129 gdb_assert (inf_ttrace_page_dict.count == 0);
130
131 if (ttrace (TT_PROC_GET_EVENT_MASK, pid, 0,
132 (uintptr_t)&tte, sizeof tte, 0) == -1)
133 perror_with_name (("ttrace"));
134
135 tte.tte_events &= ~(TTEVT_SYSCALL_ENTRY | TTEVT_SYSCALL_RETURN);
136
137 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
138 (uintptr_t)&tte, sizeof tte, 0) == -1)
139 perror_with_name (("ttrace"));
140
141 inf_ttrace_num_lwps_in_syscall = 0;
142 }
143
144 /* Get information about the page at address ADDR for process PID from
145 the dictionary. */
146
147 static struct inf_ttrace_page *
148 inf_ttrace_get_page (pid_t pid, CORE_ADDR addr)
149 {
150 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
151 const int pagesize = inf_ttrace_page_dict.pagesize;
152 int bucket;
153 struct inf_ttrace_page *page;
154
155 bucket = (addr / pagesize) % num_buckets;
156 page = &inf_ttrace_page_dict.buckets[bucket];
157 while (page)
158 {
159 if (page->addr == addr)
160 break;
161
162 page = page->next;
163 }
164
165 return page;
166 }
167
168 /* Add the page at address ADDR for process PID to the dictionary. */
169
170 static struct inf_ttrace_page *
171 inf_ttrace_add_page (pid_t pid, CORE_ADDR addr)
172 {
173 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
174 const int pagesize = inf_ttrace_page_dict.pagesize;
175 int bucket;
176 struct inf_ttrace_page *page;
177 struct inf_ttrace_page *prev = NULL;
178
179 bucket = (addr / pagesize) % num_buckets;
180 page = &inf_ttrace_page_dict.buckets[bucket];
181 while (page)
182 {
183 if (page->addr == addr)
184 break;
185
186 prev = page;
187 page = page->next;
188 }
189
190 if (!page)
191 {
192 int prot;
193
194 if (ttrace (TT_PROC_GET_MPROTECT, pid, 0,
195 addr, 0, (uintptr_t)&prot) == -1)
196 perror_with_name (("ttrace"));
197
198 page = XMALLOC (struct inf_ttrace_page);
199 page->addr = addr;
200 page->prot = prot;
201 page->refcount = 0;
202 page->next = NULL;
203
204 page->prev = prev;
205 prev->next = page;
206
207 inf_ttrace_page_dict.count++;
208 if (inf_ttrace_page_dict.count == 1)
209 inf_ttrace_enable_syscall_events (pid);
210
211 if (inf_ttrace_num_lwps_in_syscall == 0)
212 {
213 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
214 addr, pagesize, prot & ~PROT_WRITE) == -1)
215 perror_with_name (("ttrace"));
216 }
217 }
218
219 return page;
220 }
221
222 /* Insert the page at address ADDR of process PID to the dictionary. */
223
224 static void
225 inf_ttrace_insert_page (pid_t pid, CORE_ADDR addr)
226 {
227 struct inf_ttrace_page *page;
228
229 page = inf_ttrace_get_page (pid, addr);
230 if (!page)
231 page = inf_ttrace_add_page (pid, addr);
232
233 page->refcount++;
234 }
235
236 /* Remove the page at address ADDR of process PID from the dictionary. */
237
238 static void
239 inf_ttrace_remove_page (pid_t pid, CORE_ADDR addr)
240 {
241 const int pagesize = inf_ttrace_page_dict.pagesize;
242 struct inf_ttrace_page *page;
243
244 page = inf_ttrace_get_page (pid, addr);
245 page->refcount--;
246
247 gdb_assert (page->refcount >= 0);
248
249 if (page->refcount == 0)
250 {
251 if (inf_ttrace_num_lwps_in_syscall == 0)
252 {
253 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
254 addr, pagesize, page->prot) == -1)
255 perror_with_name (("ttrace"));
256 }
257
258 inf_ttrace_page_dict.count--;
259 if (inf_ttrace_page_dict.count == 0)
260 inf_ttrace_disable_syscall_events (pid);
261
262 page->prev->next = page->next;
263 if (page->next)
264 page->next->prev = page->prev;
265
266 xfree (page);
267 }
268 }
269
270 /* Mask the bits in PROT from the page protections that are currently
271 in the dictionary for process PID. */
272
273 static void
274 inf_ttrace_mask_page_protections (pid_t pid, int prot)
275 {
276 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
277 const int pagesize = inf_ttrace_page_dict.pagesize;
278 int bucket;
279
280 for (bucket = 0; bucket < num_buckets; bucket++)
281 {
282 struct inf_ttrace_page *page;
283
284 page = inf_ttrace_page_dict.buckets[bucket].next;
285 while (page)
286 {
287 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
288 page->addr, pagesize, page->prot & ~prot) == -1)
289 perror_with_name (("ttrace"));
290
291 page = page->next;
292 }
293 }
294 }
295
296 /* Write-protect the pages in the dictionary for process PID. */
297
298 static void
299 inf_ttrace_enable_page_protections (pid_t pid)
300 {
301 inf_ttrace_mask_page_protections (pid, PROT_WRITE);
302 }
303
304 /* Restore the protection of the pages in the dictionary for process
305 PID. */
306
307 static void
308 inf_ttrace_disable_page_protections (pid_t pid)
309 {
310 inf_ttrace_mask_page_protections (pid, 0);
311 }
312
313 /* Insert a "hardware" watchpoint for LEN bytes at address ADDR of
314 type TYPE. */
315
316 static int
317 inf_ttrace_insert_watchpoint (CORE_ADDR addr, int len, int type,
318 struct expression *cond)
319 {
320 const int pagesize = inf_ttrace_page_dict.pagesize;
321 pid_t pid = ptid_get_pid (inferior_ptid);
322 CORE_ADDR page_addr;
323 int num_pages;
324 int page;
325
326 gdb_assert (type == hw_write);
327
328 page_addr = (addr / pagesize) * pagesize;
329 num_pages = (len + pagesize - 1) / pagesize;
330
331 for (page = 0; page < num_pages; page++, page_addr += pagesize)
332 inf_ttrace_insert_page (pid, page_addr);
333
334 return 1;
335 }
336
337 /* Remove a "hardware" watchpoint for LEN bytes at address ADDR of
338 type TYPE. */
339
340 static int
341 inf_ttrace_remove_watchpoint (CORE_ADDR addr, int len, int type,
342 struct expression *cond)
343 {
344 const int pagesize = inf_ttrace_page_dict.pagesize;
345 pid_t pid = ptid_get_pid (inferior_ptid);
346 CORE_ADDR page_addr;
347 int num_pages;
348 int page;
349
350 gdb_assert (type == hw_write);
351
352 page_addr = (addr / pagesize) * pagesize;
353 num_pages = (len + pagesize - 1) / pagesize;
354
355 for (page = 0; page < num_pages; page++, page_addr += pagesize)
356 inf_ttrace_remove_page (pid, page_addr);
357
358 return 1;
359 }
360
361 static int
362 inf_ttrace_can_use_hw_breakpoint (int type, int len, int ot)
363 {
364 return (type == bp_hardware_watchpoint);
365 }
366
367 static int
368 inf_ttrace_region_ok_for_hw_watchpoint (CORE_ADDR addr, int len)
369 {
370 return 1;
371 }
372
373 /* Return non-zero if the current inferior was (potentially) stopped
374 by hitting a "hardware" watchpoint. */
375
376 static int
377 inf_ttrace_stopped_by_watchpoint (void)
378 {
379 pid_t pid = ptid_get_pid (inferior_ptid);
380 lwpid_t lwpid = ptid_get_lwp (inferior_ptid);
381 ttstate_t tts;
382
383 if (inf_ttrace_page_dict.count > 0)
384 {
385 if (ttrace (TT_LWP_GET_STATE, pid, lwpid,
386 (uintptr_t)&tts, sizeof tts, 0) == -1)
387 perror_with_name (("ttrace"));
388
389 if (tts.tts_event == TTEVT_SIGNAL
390 && tts.tts_u.tts_signal.tts_signo == SIGBUS)
391 {
392 const int pagesize = inf_ttrace_page_dict.pagesize;
393 void *addr = tts.tts_u.tts_signal.tts_siginfo.si_addr;
394 CORE_ADDR page_addr = ((uintptr_t)addr / pagesize) * pagesize;
395
396 if (inf_ttrace_get_page (pid, page_addr))
397 return 1;
398 }
399 }
400
401 return 0;
402 }
403 \f
404
405 /* When tracking a vfork(2), we cannot detach from the parent until
406 after the child has called exec(3) or has exited. If we are still
407 attached to the parent, this variable will be set to the process ID
408 of the parent. Otherwise it will be set to zero. */
409 static pid_t inf_ttrace_vfork_ppid = -1;
410
411 static int
412 inf_ttrace_follow_fork (struct target_ops *ops, int follow_child)
413 {
414 pid_t pid, fpid;
415 lwpid_t lwpid, flwpid;
416 ttstate_t tts;
417 struct thread_info *tp = inferior_thread ();
418
419 gdb_assert (tp->pending_follow.kind == TARGET_WAITKIND_FORKED
420 || tp->pending_follow.kind == TARGET_WAITKIND_VFORKED);
421
422 pid = ptid_get_pid (inferior_ptid);
423 lwpid = ptid_get_lwp (inferior_ptid);
424
425 /* Get all important details that core GDB doesn't (and shouldn't)
426 know about. */
427 if (ttrace (TT_LWP_GET_STATE, pid, lwpid,
428 (uintptr_t)&tts, sizeof tts, 0) == -1)
429 perror_with_name (("ttrace"));
430
431 gdb_assert (tts.tts_event == TTEVT_FORK || tts.tts_event == TTEVT_VFORK);
432
433 if (tts.tts_u.tts_fork.tts_isparent)
434 {
435 pid = tts.tts_pid;
436 lwpid = tts.tts_lwpid;
437 fpid = tts.tts_u.tts_fork.tts_fpid;
438 flwpid = tts.tts_u.tts_fork.tts_flwpid;
439 }
440 else
441 {
442 pid = tts.tts_u.tts_fork.tts_fpid;
443 lwpid = tts.tts_u.tts_fork.tts_flwpid;
444 fpid = tts.tts_pid;
445 flwpid = tts.tts_lwpid;
446 }
447
448 if (follow_child)
449 {
450 struct inferior *inf;
451 struct inferior *parent_inf;
452
453 parent_inf = find_inferior_pid (pid);
454
455 inferior_ptid = ptid_build (fpid, flwpid, 0);
456 inf = add_inferior (fpid);
457 inf->attach_flag = parent_inf->attach_flag;
458 inf->pspace = parent_inf->pspace;
459 inf->aspace = parent_inf->aspace;
460 copy_terminal_info (inf, parent_inf);
461 detach_breakpoints (pid);
462
463 target_terminal_ours ();
464 fprintf_unfiltered (gdb_stdlog,
465 _("Attaching after fork to child process %ld.\n"),
466 (long)fpid);
467 }
468 else
469 {
470 inferior_ptid = ptid_build (pid, lwpid, 0);
471 detach_breakpoints (fpid);
472
473 target_terminal_ours ();
474 fprintf_unfiltered (gdb_stdlog,
475 _("Detaching after fork from child process %ld.\n"),
476 (long)fpid);
477 }
478
479 if (tts.tts_event == TTEVT_VFORK)
480 {
481 gdb_assert (!tts.tts_u.tts_fork.tts_isparent);
482
483 if (follow_child)
484 {
485 /* We can't detach from the parent yet. */
486 inf_ttrace_vfork_ppid = pid;
487
488 reattach_breakpoints (fpid);
489 }
490 else
491 {
492 if (ttrace (TT_PROC_DETACH, fpid, 0, 0, 0, 0) == -1)
493 perror_with_name (("ttrace"));
494
495 /* Wait till we get the TTEVT_VFORK event in the parent.
496 This indicates that the child has called exec(3) or has
497 exited and that the parent is ready to be traced again. */
498 if (ttrace_wait (pid, lwpid, TTRACE_WAITOK, &tts, sizeof tts) == -1)
499 perror_with_name (("ttrace_wait"));
500 gdb_assert (tts.tts_event == TTEVT_VFORK);
501 gdb_assert (tts.tts_u.tts_fork.tts_isparent);
502
503 reattach_breakpoints (pid);
504 }
505 }
506 else
507 {
508 gdb_assert (tts.tts_u.tts_fork.tts_isparent);
509
510 if (follow_child)
511 {
512 if (ttrace (TT_PROC_DETACH, pid, 0, 0, 0, 0) == -1)
513 perror_with_name (("ttrace"));
514 }
515 else
516 {
517 if (ttrace (TT_PROC_DETACH, fpid, 0, 0, 0, 0) == -1)
518 perror_with_name (("ttrace"));
519 }
520 }
521
522 if (follow_child)
523 {
524 struct thread_info *ti;
525
526 /* The child will start out single-threaded. */
527 inf_ttrace_num_lwps = 1;
528 inf_ttrace_num_lwps_in_syscall = 0;
529
530 /* Delete parent. */
531 delete_thread_silent (ptid_build (pid, lwpid, 0));
532 detach_inferior (pid);
533
534 /* Add child thread. inferior_ptid was already set above. */
535 ti = add_thread_silent (inferior_ptid);
536 ti->private =
537 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
538 memset (ti->private, 0,
539 sizeof (struct inf_ttrace_private_thread_info));
540 }
541
542 return 0;
543 }
544 \f
545
546 /* File descriptors for pipes used as semaphores during initial
547 startup of an inferior. */
548 static int inf_ttrace_pfd1[2];
549 static int inf_ttrace_pfd2[2];
550
551 static void
552 do_cleanup_pfds (void *dummy)
553 {
554 close (inf_ttrace_pfd1[0]);
555 close (inf_ttrace_pfd1[1]);
556 close (inf_ttrace_pfd2[0]);
557 close (inf_ttrace_pfd2[1]);
558 }
559
560 static void
561 inf_ttrace_prepare (void)
562 {
563 if (pipe (inf_ttrace_pfd1) == -1)
564 perror_with_name (("pipe"));
565
566 if (pipe (inf_ttrace_pfd2) == -1)
567 {
568 close (inf_ttrace_pfd1[0]);
569 close (inf_ttrace_pfd2[0]);
570 perror_with_name (("pipe"));
571 }
572 }
573
574 /* Prepare to be traced. */
575
576 static void
577 inf_ttrace_me (void)
578 {
579 struct cleanup *old_chain = make_cleanup (do_cleanup_pfds, 0);
580 char c;
581
582 /* "Trace me, Dr. Memory!" */
583 if (ttrace (TT_PROC_SETTRC, 0, 0, 0, TT_VERSION, 0) == -1)
584 perror_with_name (("ttrace"));
585
586 /* Tell our parent that we are ready to be traced. */
587 if (write (inf_ttrace_pfd1[1], &c, sizeof c) != sizeof c)
588 perror_with_name (("write"));
589
590 /* Wait until our parent has set the initial event mask. */
591 if (read (inf_ttrace_pfd2[0], &c, sizeof c) != sizeof c)
592 perror_with_name (("read"));
593
594 do_cleanups (old_chain);
595 }
596
597 /* Start tracing PID. */
598
599 static void
600 inf_ttrace_him (struct target_ops *ops, int pid)
601 {
602 struct cleanup *old_chain = make_cleanup (do_cleanup_pfds, 0);
603 ttevent_t tte;
604 char c;
605
606 /* Wait until our child is ready to be traced. */
607 if (read (inf_ttrace_pfd1[0], &c, sizeof c) != sizeof c)
608 perror_with_name (("read"));
609
610 /* Set the initial event mask. */
611 memset (&tte, 0, sizeof (tte));
612 tte.tte_events |= TTEVT_EXEC | TTEVT_EXIT | TTEVT_FORK | TTEVT_VFORK;
613 tte.tte_events |= TTEVT_LWP_CREATE | TTEVT_LWP_EXIT | TTEVT_LWP_TERMINATE;
614 #ifdef TTEVT_BPT_SSTEP
615 tte.tte_events |= TTEVT_BPT_SSTEP;
616 #endif
617 tte.tte_opts |= TTEO_PROC_INHERIT;
618 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
619 (uintptr_t)&tte, sizeof tte, 0) == -1)
620 perror_with_name (("ttrace"));
621
622 /* Tell our child that we have set the initial event mask. */
623 if (write (inf_ttrace_pfd2[1], &c, sizeof c) != sizeof c)
624 perror_with_name (("write"));
625
626 do_cleanups (old_chain);
627
628 push_target (ops);
629
630 /* START_INFERIOR_TRAPS_EXPECTED is defined in inferior.h, and will
631 be 1 or 2 depending on whether we're starting without or with a
632 shell. */
633 startup_inferior (START_INFERIOR_TRAPS_EXPECTED);
634
635 /* On some targets, there must be some explicit actions taken after
636 the inferior has been started up. */
637 target_post_startup_inferior (pid_to_ptid (pid));
638 }
639
640 static void
641 inf_ttrace_create_inferior (struct target_ops *ops, char *exec_file,
642 char *allargs, char **env, int from_tty)
643 {
644 int pid;
645
646 gdb_assert (inf_ttrace_num_lwps == 0);
647 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
648 gdb_assert (inf_ttrace_page_dict.count == 0);
649 gdb_assert (inf_ttrace_reenable_page_protections == 0);
650 gdb_assert (inf_ttrace_vfork_ppid == -1);
651
652 pid = fork_inferior (exec_file, allargs, env, inf_ttrace_me, NULL,
653 inf_ttrace_prepare, NULL);
654
655 inf_ttrace_him (ops, pid);
656 }
657
658 static void
659 inf_ttrace_mourn_inferior (struct target_ops *ops)
660 {
661 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
662 int bucket;
663
664 inf_ttrace_num_lwps = 0;
665 inf_ttrace_num_lwps_in_syscall = 0;
666
667 for (bucket = 0; bucket < num_buckets; bucket++)
668 {
669 struct inf_ttrace_page *page;
670 struct inf_ttrace_page *next;
671
672 page = inf_ttrace_page_dict.buckets[bucket].next;
673 while (page)
674 {
675 next = page->next;
676 xfree (page);
677 page = next;
678 }
679 }
680 inf_ttrace_page_dict.count = 0;
681
682 unpush_target (ops);
683 generic_mourn_inferior ();
684 }
685
686 static void
687 inf_ttrace_attach (struct target_ops *ops, char *args, int from_tty)
688 {
689 char *exec_file;
690 pid_t pid;
691 ttevent_t tte;
692 struct inferior *inf;
693
694 pid = parse_pid_to_attach (args);
695
696 if (pid == getpid ()) /* Trying to masturbate? */
697 error (_("I refuse to debug myself!"));
698
699 if (from_tty)
700 {
701 exec_file = get_exec_file (0);
702
703 if (exec_file)
704 printf_unfiltered (_("Attaching to program: %s, %s\n"), exec_file,
705 target_pid_to_str (pid_to_ptid (pid)));
706 else
707 printf_unfiltered (_("Attaching to %s\n"),
708 target_pid_to_str (pid_to_ptid (pid)));
709
710 gdb_flush (gdb_stdout);
711 }
712
713 gdb_assert (inf_ttrace_num_lwps == 0);
714 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
715 gdb_assert (inf_ttrace_vfork_ppid == -1);
716
717 if (ttrace (TT_PROC_ATTACH, pid, 0, TT_KILL_ON_EXIT, TT_VERSION, 0) == -1)
718 perror_with_name (("ttrace"));
719
720 inf = current_inferior ();
721 inferior_appeared (inf, pid);
722 inf->attach_flag = 1;
723
724 /* Set the initial event mask. */
725 memset (&tte, 0, sizeof (tte));
726 tte.tte_events |= TTEVT_EXEC | TTEVT_EXIT | TTEVT_FORK | TTEVT_VFORK;
727 tte.tte_events |= TTEVT_LWP_CREATE | TTEVT_LWP_EXIT | TTEVT_LWP_TERMINATE;
728 #ifdef TTEVT_BPT_SSTEP
729 tte.tte_events |= TTEVT_BPT_SSTEP;
730 #endif
731 tte.tte_opts |= TTEO_PROC_INHERIT;
732 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
733 (uintptr_t)&tte, sizeof tte, 0) == -1)
734 perror_with_name (("ttrace"));
735
736 push_target (ops);
737
738 /* We'll bump inf_ttrace_num_lwps up and add the private data to the
739 thread as soon as we get to inf_ttrace_wait. At this point, we
740 don't have lwpid info yet. */
741 inferior_ptid = pid_to_ptid (pid);
742 add_thread_silent (inferior_ptid);
743 }
744
745 static void
746 inf_ttrace_detach (struct target_ops *ops, char *args, int from_tty)
747 {
748 pid_t pid = ptid_get_pid (inferior_ptid);
749 int sig = 0;
750
751 if (from_tty)
752 {
753 char *exec_file = get_exec_file (0);
754 if (exec_file == 0)
755 exec_file = "";
756 printf_unfiltered (_("Detaching from program: %s, %s\n"), exec_file,
757 target_pid_to_str (pid_to_ptid (pid)));
758 gdb_flush (gdb_stdout);
759 }
760 if (args)
761 sig = atoi (args);
762
763 /* ??? The HP-UX 11.0 ttrace(2) manual page doesn't mention that we
764 can pass a signal number here. Does this really work? */
765 if (ttrace (TT_PROC_DETACH, pid, 0, 0, sig, 0) == -1)
766 perror_with_name (("ttrace"));
767
768 if (inf_ttrace_vfork_ppid != -1)
769 {
770 if (ttrace (TT_PROC_DETACH, inf_ttrace_vfork_ppid, 0, 0, 0, 0) == -1)
771 perror_with_name (("ttrace"));
772 inf_ttrace_vfork_ppid = -1;
773 }
774
775 inf_ttrace_num_lwps = 0;
776 inf_ttrace_num_lwps_in_syscall = 0;
777
778 inferior_ptid = null_ptid;
779 detach_inferior (pid);
780
781 unpush_target (ops);
782 }
783
784 static void
785 inf_ttrace_kill (struct target_ops *ops)
786 {
787 pid_t pid = ptid_get_pid (inferior_ptid);
788
789 if (pid == 0)
790 return;
791
792 if (ttrace (TT_PROC_EXIT, pid, 0, 0, 0, 0) == -1)
793 perror_with_name (("ttrace"));
794 /* ??? Is it necessary to call ttrace_wait() here? */
795
796 if (inf_ttrace_vfork_ppid != -1)
797 {
798 if (ttrace (TT_PROC_DETACH, inf_ttrace_vfork_ppid, 0, 0, 0, 0) == -1)
799 perror_with_name (("ttrace"));
800 inf_ttrace_vfork_ppid = -1;
801 }
802
803 target_mourn_inferior ();
804 }
805
806 /* Check is a dying thread is dead by now, and delete it from GDBs
807 thread list if so. */
808 static int
809 inf_ttrace_delete_dead_threads_callback (struct thread_info *info, void *arg)
810 {
811 lwpid_t lwpid;
812 struct inf_ttrace_private_thread_info *p;
813
814 if (is_exited (info->ptid))
815 return 0;
816
817 lwpid = ptid_get_lwp (info->ptid);
818 p = (struct inf_ttrace_private_thread_info *) info->private;
819
820 /* Check if an lwp that was dying is still there or not. */
821 if (p->dying && (kill (lwpid, 0) == -1))
822 /* It's gone now. */
823 delete_thread (info->ptid);
824
825 return 0;
826 }
827
828 /* Resume the lwp pointed to by INFO, with REQUEST, and pass it signal
829 SIG. */
830
831 static void
832 inf_ttrace_resume_lwp (struct thread_info *info, ttreq_t request, int sig)
833 {
834 pid_t pid = ptid_get_pid (info->ptid);
835 lwpid_t lwpid = ptid_get_lwp (info->ptid);
836
837 if (ttrace (request, pid, lwpid, TT_NOPC, sig, 0) == -1)
838 {
839 struct inf_ttrace_private_thread_info *p
840 = (struct inf_ttrace_private_thread_info *) info->private;
841 if (p->dying && errno == EPROTO)
842 /* This is expected, it means the dying lwp is really gone
843 by now. If ttrace had an event to inform the debugger
844 the lwp is really gone, this wouldn't be needed. */
845 delete_thread (info->ptid);
846 else
847 /* This was really unexpected. */
848 perror_with_name (("ttrace"));
849 }
850 }
851
852 /* Callback for iterate_over_threads. */
853
854 static int
855 inf_ttrace_resume_callback (struct thread_info *info, void *arg)
856 {
857 if (!ptid_equal (info->ptid, inferior_ptid) && !is_exited (info->ptid))
858 inf_ttrace_resume_lwp (info, TT_LWP_CONTINUE, 0);
859
860 return 0;
861 }
862
863 static void
864 inf_ttrace_resume (struct target_ops *ops,
865 ptid_t ptid, int step, enum target_signal signal)
866 {
867 int resume_all;
868 ttreq_t request = step ? TT_LWP_SINGLE : TT_LWP_CONTINUE;
869 int sig = target_signal_to_host (signal);
870 struct thread_info *info;
871
872 /* A specific PTID means `step only this process id'. */
873 resume_all = (ptid_equal (ptid, minus_one_ptid));
874
875 /* If resuming all threads, it's the current thread that should be
876 handled specially. */
877 if (resume_all)
878 ptid = inferior_ptid;
879
880 info = find_thread_ptid (ptid);
881 inf_ttrace_resume_lwp (info, request, sig);
882
883 if (resume_all)
884 /* Let all the other threads run too. */
885 iterate_over_threads (inf_ttrace_resume_callback, NULL);
886 }
887
888 static ptid_t
889 inf_ttrace_wait (struct target_ops *ops,
890 ptid_t ptid, struct target_waitstatus *ourstatus, int options)
891 {
892 pid_t pid = ptid_get_pid (ptid);
893 lwpid_t lwpid = ptid_get_lwp (ptid);
894 ttstate_t tts;
895 struct thread_info *ti;
896 ptid_t related_ptid;
897
898 /* Until proven otherwise. */
899 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
900
901 if (pid == -1)
902 pid = lwpid = 0;
903
904 gdb_assert (pid != 0 || lwpid == 0);
905
906 do
907 {
908 set_sigint_trap ();
909
910 if (ttrace_wait (pid, lwpid, TTRACE_WAITOK, &tts, sizeof tts) == -1)
911 perror_with_name (("ttrace_wait"));
912
913 if (tts.tts_event == TTEVT_VFORK && tts.tts_u.tts_fork.tts_isparent)
914 {
915 if (inf_ttrace_vfork_ppid != -1)
916 {
917 gdb_assert (inf_ttrace_vfork_ppid == tts.tts_pid);
918
919 if (ttrace (TT_PROC_DETACH, tts.tts_pid, 0, 0, 0, 0) == -1)
920 perror_with_name (("ttrace"));
921 inf_ttrace_vfork_ppid = -1;
922 }
923
924 tts.tts_event = TTEVT_NONE;
925 }
926
927 clear_sigint_trap ();
928 }
929 while (tts.tts_event == TTEVT_NONE);
930
931 /* Now that we've waited, we can re-enable the page protections. */
932 if (inf_ttrace_reenable_page_protections)
933 {
934 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
935 inf_ttrace_enable_page_protections (tts.tts_pid);
936 inf_ttrace_reenable_page_protections = 0;
937 }
938
939 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
940
941 if (inf_ttrace_num_lwps == 0)
942 {
943 struct thread_info *ti;
944
945 inf_ttrace_num_lwps = 1;
946
947 /* This is the earliest we hear about the lwp member of
948 INFERIOR_PTID, after an attach or fork_inferior. */
949 gdb_assert (ptid_get_lwp (inferior_ptid) == 0);
950
951 /* We haven't set the private member on the main thread yet. Do
952 it now. */
953 ti = find_thread_ptid (inferior_ptid);
954 gdb_assert (ti != NULL && ti->private == NULL);
955 ti->private =
956 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
957 memset (ti->private, 0,
958 sizeof (struct inf_ttrace_private_thread_info));
959
960 /* Notify the core that this ptid changed. This changes
961 inferior_ptid as well. */
962 thread_change_ptid (inferior_ptid, ptid);
963 }
964
965 switch (tts.tts_event)
966 {
967 #ifdef TTEVT_BPT_SSTEP
968 case TTEVT_BPT_SSTEP:
969 /* Make it look like a breakpoint. */
970 ourstatus->kind = TARGET_WAITKIND_STOPPED;
971 ourstatus->value.sig = TARGET_SIGNAL_TRAP;
972 break;
973 #endif
974
975 case TTEVT_EXEC:
976 ourstatus->kind = TARGET_WAITKIND_EXECD;
977 ourstatus->value.execd_pathname =
978 xmalloc (tts.tts_u.tts_exec.tts_pathlen + 1);
979 if (ttrace (TT_PROC_GET_PATHNAME, tts.tts_pid, 0,
980 (uintptr_t)ourstatus->value.execd_pathname,
981 tts.tts_u.tts_exec.tts_pathlen, 0) == -1)
982 perror_with_name (("ttrace"));
983 ourstatus->value.execd_pathname[tts.tts_u.tts_exec.tts_pathlen] = 0;
984
985 /* At this point, all inserted breakpoints are gone. Doing this
986 as soon as we detect an exec prevents the badness of deleting
987 a breakpoint writing the current "shadow contents" to lift
988 the bp. That shadow is NOT valid after an exec. */
989 mark_breakpoints_out ();
990 break;
991
992 case TTEVT_EXIT:
993 store_waitstatus (ourstatus, tts.tts_u.tts_exit.tts_exitcode);
994 inf_ttrace_num_lwps = 0;
995 break;
996
997 case TTEVT_FORK:
998 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
999 tts.tts_u.tts_fork.tts_flwpid, 0);
1000
1001 ourstatus->kind = TARGET_WAITKIND_FORKED;
1002 ourstatus->value.related_pid = related_ptid;
1003
1004 /* Make sure the other end of the fork is stopped too. */
1005 if (ttrace_wait (tts.tts_u.tts_fork.tts_fpid,
1006 tts.tts_u.tts_fork.tts_flwpid,
1007 TTRACE_WAITOK, &tts, sizeof tts) == -1)
1008 perror_with_name (("ttrace_wait"));
1009
1010 gdb_assert (tts.tts_event == TTEVT_FORK);
1011 if (tts.tts_u.tts_fork.tts_isparent)
1012 {
1013 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
1014 tts.tts_u.tts_fork.tts_flwpid, 0);
1015 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
1016 ourstatus->value.related_pid = related_ptid;
1017 }
1018 break;
1019
1020 case TTEVT_VFORK:
1021 gdb_assert (!tts.tts_u.tts_fork.tts_isparent);
1022
1023 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
1024 tts.tts_u.tts_fork.tts_flwpid, 0);
1025
1026 ourstatus->kind = TARGET_WAITKIND_VFORKED;
1027 ourstatus->value.related_pid = related_ptid;
1028
1029 /* HACK: To avoid touching the parent during the vfork, switch
1030 away from it. */
1031 inferior_ptid = ptid;
1032 break;
1033
1034 case TTEVT_LWP_CREATE:
1035 lwpid = tts.tts_u.tts_thread.tts_target_lwpid;
1036 ptid = ptid_build (tts.tts_pid, lwpid, 0);
1037 ti = add_thread (ptid);
1038 ti->private =
1039 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
1040 memset (ti->private, 0,
1041 sizeof (struct inf_ttrace_private_thread_info));
1042 inf_ttrace_num_lwps++;
1043 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
1044 /* Let the lwp_create-caller thread continue. */
1045 ttrace (TT_LWP_CONTINUE, ptid_get_pid (ptid),
1046 ptid_get_lwp (ptid), TT_NOPC, 0, 0);
1047 /* Return without stopping the whole process. */
1048 ourstatus->kind = TARGET_WAITKIND_IGNORE;
1049 return ptid;
1050
1051 case TTEVT_LWP_EXIT:
1052 if (print_thread_events)
1053 printf_unfiltered (_("[%s exited]\n"), target_pid_to_str (ptid));
1054 ti = find_thread_ptid (ptid);
1055 gdb_assert (ti != NULL);
1056 ((struct inf_ttrace_private_thread_info *)ti->private)->dying = 1;
1057 inf_ttrace_num_lwps--;
1058 /* Let the thread really exit. */
1059 ttrace (TT_LWP_CONTINUE, ptid_get_pid (ptid),
1060 ptid_get_lwp (ptid), TT_NOPC, 0, 0);
1061 /* Return without stopping the whole process. */
1062 ourstatus->kind = TARGET_WAITKIND_IGNORE;
1063 return ptid;
1064
1065 case TTEVT_LWP_TERMINATE:
1066 lwpid = tts.tts_u.tts_thread.tts_target_lwpid;
1067 ptid = ptid_build (tts.tts_pid, lwpid, 0);
1068 if (print_thread_events)
1069 printf_unfiltered(_("[%s has been terminated]\n"),
1070 target_pid_to_str (ptid));
1071 ti = find_thread_ptid (ptid);
1072 gdb_assert (ti != NULL);
1073 ((struct inf_ttrace_private_thread_info *)ti->private)->dying = 1;
1074 inf_ttrace_num_lwps--;
1075
1076 /* Resume the lwp_terminate-caller thread. */
1077 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
1078 ttrace (TT_LWP_CONTINUE, ptid_get_pid (ptid),
1079 ptid_get_lwp (ptid), TT_NOPC, 0, 0);
1080 /* Return without stopping the whole process. */
1081 ourstatus->kind = TARGET_WAITKIND_IGNORE;
1082 return ptid;
1083
1084 case TTEVT_SIGNAL:
1085 ourstatus->kind = TARGET_WAITKIND_STOPPED;
1086 ourstatus->value.sig =
1087 target_signal_from_host (tts.tts_u.tts_signal.tts_signo);
1088 break;
1089
1090 case TTEVT_SYSCALL_ENTRY:
1091 gdb_assert (inf_ttrace_reenable_page_protections == 0);
1092 inf_ttrace_num_lwps_in_syscall++;
1093 if (inf_ttrace_num_lwps_in_syscall == 1)
1094 {
1095 /* A thread has just entered a system call. Disable any
1096 page protections as the kernel can't deal with them. */
1097 inf_ttrace_disable_page_protections (tts.tts_pid);
1098 }
1099 ourstatus->kind = TARGET_WAITKIND_SYSCALL_ENTRY;
1100 ourstatus->value.syscall_number = tts.tts_scno;
1101 break;
1102
1103 case TTEVT_SYSCALL_RETURN:
1104 if (inf_ttrace_num_lwps_in_syscall > 0)
1105 {
1106 /* If the last thread has just left the system call, this
1107 would be a logical place to re-enable the page
1108 protections, but that doesn't work. We can't re-enable
1109 them until we've done another wait. */
1110 inf_ttrace_reenable_page_protections =
1111 (inf_ttrace_num_lwps_in_syscall == 1);
1112 inf_ttrace_num_lwps_in_syscall--;
1113 }
1114 ourstatus->kind = TARGET_WAITKIND_SYSCALL_RETURN;
1115 ourstatus->value.syscall_number = tts.tts_scno;
1116 break;
1117
1118 default:
1119 gdb_assert (!"Unexpected ttrace event");
1120 break;
1121 }
1122
1123 /* Make sure all threads within the process are stopped. */
1124 if (ttrace (TT_PROC_STOP, tts.tts_pid, 0, 0, 0, 0) == -1)
1125 perror_with_name (("ttrace"));
1126
1127 /* Now that the whole process is stopped, check if any dying thread
1128 is really dead by now. If a dying thread is still alive, it will
1129 be stopped too, and will still show up in `info threads', tagged
1130 with "(Exiting)". We could make `info threads' prune dead
1131 threads instead via inf_ttrace_thread_alive, but doing this here
1132 has the advantage that a frontend is notificed sooner of thread
1133 exits. Note that a dying lwp is still alive, it still has to be
1134 resumed, like any other lwp. */
1135 iterate_over_threads (inf_ttrace_delete_dead_threads_callback, NULL);
1136
1137 return ptid;
1138 }
1139
1140 /* Transfer LEN bytes from ADDR in the inferior's memory into READBUF,
1141 and transfer LEN bytes from WRITEBUF into the inferior's memory at
1142 ADDR. Either READBUF or WRITEBUF may be null, in which case the
1143 corresponding transfer doesn't happen. Return the number of bytes
1144 actually transferred (which may be zero if an error occurs). */
1145
1146 static LONGEST
1147 inf_ttrace_xfer_memory (CORE_ADDR addr, ULONGEST len,
1148 void *readbuf, const void *writebuf)
1149 {
1150 pid_t pid = ptid_get_pid (inferior_ptid);
1151
1152 /* HP-UX treats text space and data space differently. GDB however,
1153 doesn't really know the difference. Therefore we try both. Try
1154 text space before data space though because when we're writing
1155 into text space the instruction cache might need to be flushed. */
1156
1157 if (readbuf
1158 && ttrace (TT_PROC_RDTEXT, pid, 0, addr, len, (uintptr_t)readbuf) == -1
1159 && ttrace (TT_PROC_RDDATA, pid, 0, addr, len, (uintptr_t)readbuf) == -1)
1160 return 0;
1161
1162 if (writebuf
1163 && ttrace (TT_PROC_WRTEXT, pid, 0, addr, len, (uintptr_t)writebuf) == -1
1164 && ttrace (TT_PROC_WRDATA, pid, 0, addr, len, (uintptr_t)writebuf) == -1)
1165 return 0;
1166
1167 return len;
1168 }
1169
1170 static LONGEST
1171 inf_ttrace_xfer_partial (struct target_ops *ops, enum target_object object,
1172 const char *annex, gdb_byte *readbuf,
1173 const gdb_byte *writebuf,
1174 ULONGEST offset, LONGEST len)
1175 {
1176 switch (object)
1177 {
1178 case TARGET_OBJECT_MEMORY:
1179 return inf_ttrace_xfer_memory (offset, len, readbuf, writebuf);
1180
1181 case TARGET_OBJECT_UNWIND_TABLE:
1182 return -1;
1183
1184 case TARGET_OBJECT_AUXV:
1185 return -1;
1186
1187 case TARGET_OBJECT_WCOOKIE:
1188 return -1;
1189
1190 default:
1191 return -1;
1192 }
1193 }
1194
1195 /* Print status information about what we're accessing. */
1196
1197 static void
1198 inf_ttrace_files_info (struct target_ops *ignore)
1199 {
1200 struct inferior *inf = current_inferior ();
1201 printf_filtered (_("\tUsing the running image of %s %s.\n"),
1202 inf->attach_flag ? "attached" : "child",
1203 target_pid_to_str (inferior_ptid));
1204 }
1205
1206 static int
1207 inf_ttrace_thread_alive (struct target_ops *ops, ptid_t ptid)
1208 {
1209 return 1;
1210 }
1211
1212 /* Return a string describing the state of the thread specified by
1213 INFO. */
1214
1215 static char *
1216 inf_ttrace_extra_thread_info (struct thread_info *info)
1217 {
1218 struct inf_ttrace_private_thread_info* private =
1219 (struct inf_ttrace_private_thread_info *) info->private;
1220
1221 if (private != NULL && private->dying)
1222 return "Exiting";
1223
1224 return NULL;
1225 }
1226
1227 static char *
1228 inf_ttrace_pid_to_str (struct target_ops *ops, ptid_t ptid)
1229 {
1230 pid_t pid = ptid_get_pid (ptid);
1231 lwpid_t lwpid = ptid_get_lwp (ptid);
1232 static char buf[128];
1233
1234 if (lwpid == 0)
1235 xsnprintf (buf, sizeof buf, "process %ld",
1236 (long) pid);
1237 else
1238 xsnprintf (buf, sizeof buf, "process %ld, lwp %ld",
1239 (long) pid, (long) lwpid);
1240 return buf;
1241 }
1242 \f
1243
1244 /* Implement the get_ada_task_ptid target_ops method. */
1245
1246 static ptid_t
1247 inf_ttrace_get_ada_task_ptid (long lwp, long thread)
1248 {
1249 return ptid_build (ptid_get_pid (inferior_ptid), lwp, 0);
1250 }
1251
1252 \f
1253 struct target_ops *
1254 inf_ttrace_target (void)
1255 {
1256 struct target_ops *t = inf_child_target ();
1257
1258 t->to_attach = inf_ttrace_attach;
1259 t->to_detach = inf_ttrace_detach;
1260 t->to_resume = inf_ttrace_resume;
1261 t->to_wait = inf_ttrace_wait;
1262 t->to_files_info = inf_ttrace_files_info;
1263 t->to_can_use_hw_breakpoint = inf_ttrace_can_use_hw_breakpoint;
1264 t->to_insert_watchpoint = inf_ttrace_insert_watchpoint;
1265 t->to_remove_watchpoint = inf_ttrace_remove_watchpoint;
1266 t->to_stopped_by_watchpoint = inf_ttrace_stopped_by_watchpoint;
1267 t->to_region_ok_for_hw_watchpoint =
1268 inf_ttrace_region_ok_for_hw_watchpoint;
1269 t->to_kill = inf_ttrace_kill;
1270 t->to_create_inferior = inf_ttrace_create_inferior;
1271 t->to_follow_fork = inf_ttrace_follow_fork;
1272 t->to_mourn_inferior = inf_ttrace_mourn_inferior;
1273 t->to_thread_alive = inf_ttrace_thread_alive;
1274 t->to_extra_thread_info = inf_ttrace_extra_thread_info;
1275 t->to_pid_to_str = inf_ttrace_pid_to_str;
1276 t->to_xfer_partial = inf_ttrace_xfer_partial;
1277 t->to_get_ada_task_ptid = inf_ttrace_get_ada_task_ptid;
1278
1279 return t;
1280 }
1281 #endif
1282 \f
1283
1284 /* Prevent warning from -Wmissing-prototypes. */
1285 void _initialize_hppa_hpux_nat (void);
1286
1287 void
1288 _initialize_inf_ttrace (void)
1289 {
1290 #ifdef HAVE_TTRACE
1291 inf_ttrace_page_dict.pagesize = getpagesize();
1292 #endif
1293 }
This page took 0.104147 seconds and 4 git commands to generate.