]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blob - gdb/inf-ttrace.c
dd1c4bad5b2a16330532558371f00a8d8d0766ee
[thirdparty/binutils-gdb.git] / gdb / inf-ttrace.c
1 /* Low-level child interface to ttrace.
2
3 Copyright (C) 2004, 2005, 2006, 2007, 2008, 2009, 2010
4 Free Software Foundation, Inc.
5
6 This file is part of GDB.
7
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
12
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>. */
20
21 #include "defs.h"
22
23 /* The ttrace(2) system call didn't exist before HP-UX 10.30. Don't
24 try to compile this code unless we have it. */
25 #ifdef HAVE_TTRACE
26
27 #include "command.h"
28 #include "gdbcore.h"
29 #include "gdbthread.h"
30 #include "inferior.h"
31 #include "terminal.h"
32 #include "target.h"
33
34 #include "gdb_assert.h"
35 #include "gdb_string.h"
36 #include <sys/mman.h>
37 #include <sys/ttrace.h>
38 #include <signal.h>
39
40 #include "inf-child.h"
41 #include "inf-ttrace.h"
42
43 \f
44
45 /* HP-UX uses a threading model where each user-space thread
46 corresponds to a kernel thread. These kernel threads are called
47 lwps. The ttrace(2) interface gives us almost full control over
48 the threads, which makes it very easy to support them in GDB. We
49 identify the threads by process ID and lwp ID. The ttrace(2) also
50 provides us with a thread's user ID (in the `tts_user_tid' member
51 of `ttstate_t') but we don't use that (yet) as it isn't necessary
52 to uniquely label the thread. */
53
54 /* Number of active lwps. */
55 static int inf_ttrace_num_lwps;
56 \f
57
58 /* On HP-UX versions that have the ttrace(2) system call, we can
59 implement "hardware" watchpoints by fiddling with the protection of
60 pages in the address space that contain the variable being watched.
61 In order to implement this, we keep a dictionary of pages for which
62 we have changed the protection. */
63
64 struct inf_ttrace_page
65 {
66 CORE_ADDR addr; /* Page address. */
67 int prot; /* Protection. */
68 int refcount; /* Reference count. */
69 struct inf_ttrace_page *next;
70 struct inf_ttrace_page *prev;
71 };
72
73 struct inf_ttrace_page_dict
74 {
75 struct inf_ttrace_page buckets[128];
76 int pagesize; /* Page size. */
77 int count; /* Number of pages in this dictionary. */
78 } inf_ttrace_page_dict;
79
80 struct inf_ttrace_private_thread_info
81 {
82 int dying;
83 };
84
85 /* Number of lwps that are currently in a system call. */
86 static int inf_ttrace_num_lwps_in_syscall;
87
88 /* Flag to indicate whether we should re-enable page protections after
89 the next wait. */
90 static int inf_ttrace_reenable_page_protections;
91
92 /* Enable system call events for process PID. */
93
94 static void
95 inf_ttrace_enable_syscall_events (pid_t pid)
96 {
97 ttevent_t tte;
98 ttstate_t tts;
99
100 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
101
102 if (ttrace (TT_PROC_GET_EVENT_MASK, pid, 0,
103 (uintptr_t)&tte, sizeof tte, 0) == -1)
104 perror_with_name (("ttrace"));
105
106 tte.tte_events |= (TTEVT_SYSCALL_ENTRY | TTEVT_SYSCALL_RETURN);
107
108 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
109 (uintptr_t)&tte, sizeof tte, 0) == -1)
110 perror_with_name (("ttrace"));
111
112 if (ttrace (TT_PROC_GET_FIRST_LWP_STATE, pid, 0,
113 (uintptr_t)&tts, sizeof tts, 0) == -1)
114 perror_with_name (("ttrace"));
115
116 if (tts.tts_flags & TTS_INSYSCALL)
117 inf_ttrace_num_lwps_in_syscall++;
118
119 /* FIXME: Handle multiple threads. */
120 }
121
122 /* Disable system call events for process PID. */
123
124 static void
125 inf_ttrace_disable_syscall_events (pid_t pid)
126 {
127 ttevent_t tte;
128
129 gdb_assert (inf_ttrace_page_dict.count == 0);
130
131 if (ttrace (TT_PROC_GET_EVENT_MASK, pid, 0,
132 (uintptr_t)&tte, sizeof tte, 0) == -1)
133 perror_with_name (("ttrace"));
134
135 tte.tte_events &= ~(TTEVT_SYSCALL_ENTRY | TTEVT_SYSCALL_RETURN);
136
137 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
138 (uintptr_t)&tte, sizeof tte, 0) == -1)
139 perror_with_name (("ttrace"));
140
141 inf_ttrace_num_lwps_in_syscall = 0;
142 }
143
144 /* Get information about the page at address ADDR for process PID from
145 the dictionary. */
146
147 static struct inf_ttrace_page *
148 inf_ttrace_get_page (pid_t pid, CORE_ADDR addr)
149 {
150 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
151 const int pagesize = inf_ttrace_page_dict.pagesize;
152 int bucket;
153 struct inf_ttrace_page *page;
154
155 bucket = (addr / pagesize) % num_buckets;
156 page = &inf_ttrace_page_dict.buckets[bucket];
157 while (page)
158 {
159 if (page->addr == addr)
160 break;
161
162 page = page->next;
163 }
164
165 return page;
166 }
167
168 /* Add the page at address ADDR for process PID to the dictionary. */
169
170 static struct inf_ttrace_page *
171 inf_ttrace_add_page (pid_t pid, CORE_ADDR addr)
172 {
173 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
174 const int pagesize = inf_ttrace_page_dict.pagesize;
175 int bucket;
176 struct inf_ttrace_page *page;
177 struct inf_ttrace_page *prev = NULL;
178
179 bucket = (addr / pagesize) % num_buckets;
180 page = &inf_ttrace_page_dict.buckets[bucket];
181 while (page)
182 {
183 if (page->addr == addr)
184 break;
185
186 prev = page;
187 page = page->next;
188 }
189
190 if (!page)
191 {
192 int prot;
193
194 if (ttrace (TT_PROC_GET_MPROTECT, pid, 0,
195 addr, 0, (uintptr_t)&prot) == -1)
196 perror_with_name (("ttrace"));
197
198 page = XMALLOC (struct inf_ttrace_page);
199 page->addr = addr;
200 page->prot = prot;
201 page->refcount = 0;
202 page->next = NULL;
203
204 page->prev = prev;
205 prev->next = page;
206
207 inf_ttrace_page_dict.count++;
208 if (inf_ttrace_page_dict.count == 1)
209 inf_ttrace_enable_syscall_events (pid);
210
211 if (inf_ttrace_num_lwps_in_syscall == 0)
212 {
213 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
214 addr, pagesize, prot & ~PROT_WRITE) == -1)
215 perror_with_name (("ttrace"));
216 }
217 }
218
219 return page;
220 }
221
222 /* Insert the page at address ADDR of process PID to the dictionary. */
223
224 static void
225 inf_ttrace_insert_page (pid_t pid, CORE_ADDR addr)
226 {
227 struct inf_ttrace_page *page;
228
229 page = inf_ttrace_get_page (pid, addr);
230 if (!page)
231 page = inf_ttrace_add_page (pid, addr);
232
233 page->refcount++;
234 }
235
236 /* Remove the page at address ADDR of process PID from the dictionary. */
237
238 static void
239 inf_ttrace_remove_page (pid_t pid, CORE_ADDR addr)
240 {
241 const int pagesize = inf_ttrace_page_dict.pagesize;
242 struct inf_ttrace_page *page;
243
244 page = inf_ttrace_get_page (pid, addr);
245 page->refcount--;
246
247 gdb_assert (page->refcount >= 0);
248
249 if (page->refcount == 0)
250 {
251 if (inf_ttrace_num_lwps_in_syscall == 0)
252 {
253 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
254 addr, pagesize, page->prot) == -1)
255 perror_with_name (("ttrace"));
256 }
257
258 inf_ttrace_page_dict.count--;
259 if (inf_ttrace_page_dict.count == 0)
260 inf_ttrace_disable_syscall_events (pid);
261
262 page->prev->next = page->next;
263 if (page->next)
264 page->next->prev = page->prev;
265
266 xfree (page);
267 }
268 }
269
270 /* Mask the bits in PROT from the page protections that are currently
271 in the dictionary for process PID. */
272
273 static void
274 inf_ttrace_mask_page_protections (pid_t pid, int prot)
275 {
276 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
277 const int pagesize = inf_ttrace_page_dict.pagesize;
278 int bucket;
279
280 for (bucket = 0; bucket < num_buckets; bucket++)
281 {
282 struct inf_ttrace_page *page;
283
284 page = inf_ttrace_page_dict.buckets[bucket].next;
285 while (page)
286 {
287 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
288 page->addr, pagesize, page->prot & ~prot) == -1)
289 perror_with_name (("ttrace"));
290
291 page = page->next;
292 }
293 }
294 }
295
296 /* Write-protect the pages in the dictionary for process PID. */
297
298 static void
299 inf_ttrace_enable_page_protections (pid_t pid)
300 {
301 inf_ttrace_mask_page_protections (pid, PROT_WRITE);
302 }
303
304 /* Restore the protection of the pages in the dictionary for process
305 PID. */
306
307 static void
308 inf_ttrace_disable_page_protections (pid_t pid)
309 {
310 inf_ttrace_mask_page_protections (pid, 0);
311 }
312
313 /* Insert a "hardware" watchpoint for LEN bytes at address ADDR of
314 type TYPE. */
315
316 static int
317 inf_ttrace_insert_watchpoint (CORE_ADDR addr, int len, int type,
318 struct expression *cond)
319 {
320 const int pagesize = inf_ttrace_page_dict.pagesize;
321 pid_t pid = ptid_get_pid (inferior_ptid);
322 CORE_ADDR page_addr;
323 int num_pages;
324 int page;
325
326 gdb_assert (type == hw_write);
327
328 page_addr = (addr / pagesize) * pagesize;
329 num_pages = (len + pagesize - 1) / pagesize;
330
331 for (page = 0; page < num_pages; page++, page_addr += pagesize)
332 inf_ttrace_insert_page (pid, page_addr);
333
334 return 1;
335 }
336
337 /* Remove a "hardware" watchpoint for LEN bytes at address ADDR of
338 type TYPE. */
339
340 static int
341 inf_ttrace_remove_watchpoint (CORE_ADDR addr, int len, int type,
342 struct expression *cond)
343 {
344 const int pagesize = inf_ttrace_page_dict.pagesize;
345 pid_t pid = ptid_get_pid (inferior_ptid);
346 CORE_ADDR page_addr;
347 int num_pages;
348 int page;
349
350 gdb_assert (type == hw_write);
351
352 page_addr = (addr / pagesize) * pagesize;
353 num_pages = (len + pagesize - 1) / pagesize;
354
355 for (page = 0; page < num_pages; page++, page_addr += pagesize)
356 inf_ttrace_remove_page (pid, page_addr);
357
358 return 1;
359 }
360
361 static int
362 inf_ttrace_can_use_hw_breakpoint (int type, int len, int ot)
363 {
364 return (type == bp_hardware_watchpoint);
365 }
366
367 static int
368 inf_ttrace_region_ok_for_hw_watchpoint (CORE_ADDR addr, int len)
369 {
370 return 1;
371 }
372
373 /* Return non-zero if the current inferior was (potentially) stopped
374 by hitting a "hardware" watchpoint. */
375
376 static int
377 inf_ttrace_stopped_by_watchpoint (void)
378 {
379 pid_t pid = ptid_get_pid (inferior_ptid);
380 lwpid_t lwpid = ptid_get_lwp (inferior_ptid);
381 ttstate_t tts;
382
383 if (inf_ttrace_page_dict.count > 0)
384 {
385 if (ttrace (TT_LWP_GET_STATE, pid, lwpid,
386 (uintptr_t)&tts, sizeof tts, 0) == -1)
387 perror_with_name (("ttrace"));
388
389 if (tts.tts_event == TTEVT_SIGNAL
390 && tts.tts_u.tts_signal.tts_signo == SIGBUS)
391 {
392 const int pagesize = inf_ttrace_page_dict.pagesize;
393 void *addr = tts.tts_u.tts_signal.tts_siginfo.si_addr;
394 CORE_ADDR page_addr = ((uintptr_t)addr / pagesize) * pagesize;
395
396 if (inf_ttrace_get_page (pid, page_addr))
397 return 1;
398 }
399 }
400
401 return 0;
402 }
403 \f
404
405 /* When tracking a vfork(2), we cannot detach from the parent until
406 after the child has called exec(3) or has exited. If we are still
407 attached to the parent, this variable will be set to the process ID
408 of the parent. Otherwise it will be set to zero. */
409 static pid_t inf_ttrace_vfork_ppid = -1;
410
411 static int
412 inf_ttrace_follow_fork (struct target_ops *ops, int follow_child)
413 {
414 pid_t pid, fpid;
415 lwpid_t lwpid, flwpid;
416 ttstate_t tts;
417 struct thread_info *tp = inferior_thread ();
418
419 gdb_assert (tp->pending_follow.kind == TARGET_WAITKIND_FORKED
420 || tp->pending_follow.kind == TARGET_WAITKIND_VFORKED);
421
422 pid = ptid_get_pid (inferior_ptid);
423 lwpid = ptid_get_lwp (inferior_ptid);
424
425 /* Get all important details that core GDB doesn't (and shouldn't)
426 know about. */
427 if (ttrace (TT_LWP_GET_STATE, pid, lwpid,
428 (uintptr_t)&tts, sizeof tts, 0) == -1)
429 perror_with_name (("ttrace"));
430
431 gdb_assert (tts.tts_event == TTEVT_FORK || tts.tts_event == TTEVT_VFORK);
432
433 if (tts.tts_u.tts_fork.tts_isparent)
434 {
435 pid = tts.tts_pid;
436 lwpid = tts.tts_lwpid;
437 fpid = tts.tts_u.tts_fork.tts_fpid;
438 flwpid = tts.tts_u.tts_fork.tts_flwpid;
439 }
440 else
441 {
442 pid = tts.tts_u.tts_fork.tts_fpid;
443 lwpid = tts.tts_u.tts_fork.tts_flwpid;
444 fpid = tts.tts_pid;
445 flwpid = tts.tts_lwpid;
446 }
447
448 if (follow_child)
449 {
450 struct inferior *inf;
451 struct inferior *parent_inf;
452
453 parent_inf = find_inferior_pid (pid);
454
455 inferior_ptid = ptid_build (fpid, flwpid, 0);
456 inf = add_inferior (fpid);
457 inf->attach_flag = parent_inf->attach_flag;
458 inf->pspace = parent_inf->pspace;
459 inf->aspace = parent_inf->aspace;
460 copy_terminal_info (inf, parent_inf);
461 detach_breakpoints (pid);
462
463 target_terminal_ours ();
464 fprintf_unfiltered (gdb_stdlog, _("\
465 Attaching after fork to child process %ld.\n"), (long)fpid);
466 }
467 else
468 {
469 inferior_ptid = ptid_build (pid, lwpid, 0);
470 detach_breakpoints (fpid);
471
472 target_terminal_ours ();
473 fprintf_unfiltered (gdb_stdlog, _("\
474 Detaching after fork from child process %ld.\n"), (long)fpid);
475 }
476
477 if (tts.tts_event == TTEVT_VFORK)
478 {
479 gdb_assert (!tts.tts_u.tts_fork.tts_isparent);
480
481 if (follow_child)
482 {
483 /* We can't detach from the parent yet. */
484 inf_ttrace_vfork_ppid = pid;
485
486 reattach_breakpoints (fpid);
487 }
488 else
489 {
490 if (ttrace (TT_PROC_DETACH, fpid, 0, 0, 0, 0) == -1)
491 perror_with_name (("ttrace"));
492
493 /* Wait till we get the TTEVT_VFORK event in the parent.
494 This indicates that the child has called exec(3) or has
495 exited and that the parent is ready to be traced again. */
496 if (ttrace_wait (pid, lwpid, TTRACE_WAITOK, &tts, sizeof tts) == -1)
497 perror_with_name (("ttrace_wait"));
498 gdb_assert (tts.tts_event == TTEVT_VFORK);
499 gdb_assert (tts.tts_u.tts_fork.tts_isparent);
500
501 reattach_breakpoints (pid);
502 }
503 }
504 else
505 {
506 gdb_assert (tts.tts_u.tts_fork.tts_isparent);
507
508 if (follow_child)
509 {
510 if (ttrace (TT_PROC_DETACH, pid, 0, 0, 0, 0) == -1)
511 perror_with_name (("ttrace"));
512 }
513 else
514 {
515 if (ttrace (TT_PROC_DETACH, fpid, 0, 0, 0, 0) == -1)
516 perror_with_name (("ttrace"));
517 }
518 }
519
520 if (follow_child)
521 {
522 struct thread_info *ti;
523
524 /* The child will start out single-threaded. */
525 inf_ttrace_num_lwps = 1;
526 inf_ttrace_num_lwps_in_syscall = 0;
527
528 /* Delete parent. */
529 delete_thread_silent (ptid_build (pid, lwpid, 0));
530 detach_inferior (pid);
531
532 /* Add child thread. inferior_ptid was already set above. */
533 ti = add_thread_silent (inferior_ptid);
534 ti->private =
535 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
536 memset (ti->private, 0,
537 sizeof (struct inf_ttrace_private_thread_info));
538 }
539
540 return 0;
541 }
542 \f
543
544 /* File descriptors for pipes used as semaphores during initial
545 startup of an inferior. */
546 static int inf_ttrace_pfd1[2];
547 static int inf_ttrace_pfd2[2];
548
549 static void
550 do_cleanup_pfds (void *dummy)
551 {
552 close (inf_ttrace_pfd1[0]);
553 close (inf_ttrace_pfd1[1]);
554 close (inf_ttrace_pfd2[0]);
555 close (inf_ttrace_pfd2[1]);
556 }
557
558 static void
559 inf_ttrace_prepare (void)
560 {
561 if (pipe (inf_ttrace_pfd1) == -1)
562 perror_with_name (("pipe"));
563
564 if (pipe (inf_ttrace_pfd2) == -1)
565 {
566 close (inf_ttrace_pfd1[0]);
567 close (inf_ttrace_pfd2[0]);
568 perror_with_name (("pipe"));
569 }
570 }
571
572 /* Prepare to be traced. */
573
574 static void
575 inf_ttrace_me (void)
576 {
577 struct cleanup *old_chain = make_cleanup (do_cleanup_pfds, 0);
578 char c;
579
580 /* "Trace me, Dr. Memory!" */
581 if (ttrace (TT_PROC_SETTRC, 0, 0, 0, TT_VERSION, 0) == -1)
582 perror_with_name (("ttrace"));
583
584 /* Tell our parent that we are ready to be traced. */
585 if (write (inf_ttrace_pfd1[1], &c, sizeof c) != sizeof c)
586 perror_with_name (("write"));
587
588 /* Wait until our parent has set the initial event mask. */
589 if (read (inf_ttrace_pfd2[0], &c, sizeof c) != sizeof c)
590 perror_with_name (("read"));
591
592 do_cleanups (old_chain);
593 }
594
595 /* Start tracing PID. */
596
597 static void
598 inf_ttrace_him (struct target_ops *ops, int pid)
599 {
600 struct cleanup *old_chain = make_cleanup (do_cleanup_pfds, 0);
601 ttevent_t tte;
602 char c;
603
604 /* Wait until our child is ready to be traced. */
605 if (read (inf_ttrace_pfd1[0], &c, sizeof c) != sizeof c)
606 perror_with_name (("read"));
607
608 /* Set the initial event mask. */
609 memset (&tte, 0, sizeof (tte));
610 tte.tte_events |= TTEVT_EXEC | TTEVT_EXIT | TTEVT_FORK | TTEVT_VFORK;
611 tte.tte_events |= TTEVT_LWP_CREATE | TTEVT_LWP_EXIT | TTEVT_LWP_TERMINATE;
612 #ifdef TTEVT_BPT_SSTEP
613 tte.tte_events |= TTEVT_BPT_SSTEP;
614 #endif
615 tte.tte_opts |= TTEO_PROC_INHERIT;
616 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
617 (uintptr_t)&tte, sizeof tte, 0) == -1)
618 perror_with_name (("ttrace"));
619
620 /* Tell our child that we have set the initial event mask. */
621 if (write (inf_ttrace_pfd2[1], &c, sizeof c) != sizeof c)
622 perror_with_name (("write"));
623
624 do_cleanups (old_chain);
625
626 push_target (ops);
627
628 /* START_INFERIOR_TRAPS_EXPECTED is defined in inferior.h, and will
629 be 1 or 2 depending on whether we're starting without or with a
630 shell. */
631 startup_inferior (START_INFERIOR_TRAPS_EXPECTED);
632
633 /* On some targets, there must be some explicit actions taken after
634 the inferior has been started up. */
635 target_post_startup_inferior (pid_to_ptid (pid));
636 }
637
638 static void
639 inf_ttrace_create_inferior (struct target_ops *ops, char *exec_file,
640 char *allargs, char **env, int from_tty)
641 {
642 int pid;
643
644 gdb_assert (inf_ttrace_num_lwps == 0);
645 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
646 gdb_assert (inf_ttrace_page_dict.count == 0);
647 gdb_assert (inf_ttrace_reenable_page_protections == 0);
648 gdb_assert (inf_ttrace_vfork_ppid == -1);
649
650 pid = fork_inferior (exec_file, allargs, env, inf_ttrace_me, NULL,
651 inf_ttrace_prepare, NULL);
652
653 inf_ttrace_him (ops, pid);
654 }
655
656 static void
657 inf_ttrace_mourn_inferior (struct target_ops *ops)
658 {
659 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
660 int bucket;
661
662 inf_ttrace_num_lwps = 0;
663 inf_ttrace_num_lwps_in_syscall = 0;
664
665 for (bucket = 0; bucket < num_buckets; bucket++)
666 {
667 struct inf_ttrace_page *page;
668 struct inf_ttrace_page *next;
669
670 page = inf_ttrace_page_dict.buckets[bucket].next;
671 while (page)
672 {
673 next = page->next;
674 xfree (page);
675 page = next;
676 }
677 }
678 inf_ttrace_page_dict.count = 0;
679
680 unpush_target (ops);
681 generic_mourn_inferior ();
682 }
683
684 static void
685 inf_ttrace_attach (struct target_ops *ops, char *args, int from_tty)
686 {
687 char *exec_file;
688 pid_t pid;
689 ttevent_t tte;
690 struct inferior *inf;
691
692 pid = parse_pid_to_attach (args);
693
694 if (pid == getpid ()) /* Trying to masturbate? */
695 error (_("I refuse to debug myself!"));
696
697 if (from_tty)
698 {
699 exec_file = get_exec_file (0);
700
701 if (exec_file)
702 printf_unfiltered (_("Attaching to program: %s, %s\n"), exec_file,
703 target_pid_to_str (pid_to_ptid (pid)));
704 else
705 printf_unfiltered (_("Attaching to %s\n"),
706 target_pid_to_str (pid_to_ptid (pid)));
707
708 gdb_flush (gdb_stdout);
709 }
710
711 gdb_assert (inf_ttrace_num_lwps == 0);
712 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
713 gdb_assert (inf_ttrace_vfork_ppid == -1);
714
715 if (ttrace (TT_PROC_ATTACH, pid, 0, TT_KILL_ON_EXIT, TT_VERSION, 0) == -1)
716 perror_with_name (("ttrace"));
717
718 inf = current_inferior ();
719 inferior_appeared (inf, pid);
720 inf->attach_flag = 1;
721
722 /* Set the initial event mask. */
723 memset (&tte, 0, sizeof (tte));
724 tte.tte_events |= TTEVT_EXEC | TTEVT_EXIT | TTEVT_FORK | TTEVT_VFORK;
725 tte.tte_events |= TTEVT_LWP_CREATE | TTEVT_LWP_EXIT | TTEVT_LWP_TERMINATE;
726 #ifdef TTEVT_BPT_SSTEP
727 tte.tte_events |= TTEVT_BPT_SSTEP;
728 #endif
729 tte.tte_opts |= TTEO_PROC_INHERIT;
730 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
731 (uintptr_t)&tte, sizeof tte, 0) == -1)
732 perror_with_name (("ttrace"));
733
734 push_target (ops);
735
736 /* We'll bump inf_ttrace_num_lwps up and add the private data to the
737 thread as soon as we get to inf_ttrace_wait. At this point, we
738 don't have lwpid info yet. */
739 inferior_ptid = pid_to_ptid (pid);
740 add_thread_silent (inferior_ptid);
741 }
742
743 static void
744 inf_ttrace_detach (struct target_ops *ops, char *args, int from_tty)
745 {
746 pid_t pid = ptid_get_pid (inferior_ptid);
747 int sig = 0;
748
749 if (from_tty)
750 {
751 char *exec_file = get_exec_file (0);
752 if (exec_file == 0)
753 exec_file = "";
754 printf_unfiltered (_("Detaching from program: %s, %s\n"), exec_file,
755 target_pid_to_str (pid_to_ptid (pid)));
756 gdb_flush (gdb_stdout);
757 }
758 if (args)
759 sig = atoi (args);
760
761 /* ??? The HP-UX 11.0 ttrace(2) manual page doesn't mention that we
762 can pass a signal number here. Does this really work? */
763 if (ttrace (TT_PROC_DETACH, pid, 0, 0, sig, 0) == -1)
764 perror_with_name (("ttrace"));
765
766 if (inf_ttrace_vfork_ppid != -1)
767 {
768 if (ttrace (TT_PROC_DETACH, inf_ttrace_vfork_ppid, 0, 0, 0, 0) == -1)
769 perror_with_name (("ttrace"));
770 inf_ttrace_vfork_ppid = -1;
771 }
772
773 inf_ttrace_num_lwps = 0;
774 inf_ttrace_num_lwps_in_syscall = 0;
775
776 inferior_ptid = null_ptid;
777 detach_inferior (pid);
778
779 unpush_target (ops);
780 }
781
782 static void
783 inf_ttrace_kill (struct target_ops *ops)
784 {
785 pid_t pid = ptid_get_pid (inferior_ptid);
786
787 if (pid == 0)
788 return;
789
790 if (ttrace (TT_PROC_EXIT, pid, 0, 0, 0, 0) == -1)
791 perror_with_name (("ttrace"));
792 /* ??? Is it necessary to call ttrace_wait() here? */
793
794 if (inf_ttrace_vfork_ppid != -1)
795 {
796 if (ttrace (TT_PROC_DETACH, inf_ttrace_vfork_ppid, 0, 0, 0, 0) == -1)
797 perror_with_name (("ttrace"));
798 inf_ttrace_vfork_ppid = -1;
799 }
800
801 target_mourn_inferior ();
802 }
803
804 /* Check is a dying thread is dead by now, and delete it from GDBs
805 thread list if so. */
806 static int
807 inf_ttrace_delete_dead_threads_callback (struct thread_info *info, void *arg)
808 {
809 lwpid_t lwpid;
810 struct inf_ttrace_private_thread_info *p;
811
812 if (is_exited (info->ptid))
813 return 0;
814
815 lwpid = ptid_get_lwp (info->ptid);
816 p = (struct inf_ttrace_private_thread_info *) info->private;
817
818 /* Check if an lwp that was dying is still there or not. */
819 if (p->dying && (kill (lwpid, 0) == -1))
820 /* It's gone now. */
821 delete_thread (info->ptid);
822
823 return 0;
824 }
825
826 /* Resume the lwp pointed to by INFO, with REQUEST, and pass it signal
827 SIG. */
828
829 static void
830 inf_ttrace_resume_lwp (struct thread_info *info, ttreq_t request, int sig)
831 {
832 pid_t pid = ptid_get_pid (info->ptid);
833 lwpid_t lwpid = ptid_get_lwp (info->ptid);
834
835 if (ttrace (request, pid, lwpid, TT_NOPC, sig, 0) == -1)
836 {
837 struct inf_ttrace_private_thread_info *p
838 = (struct inf_ttrace_private_thread_info *) info->private;
839 if (p->dying && errno == EPROTO)
840 /* This is expected, it means the dying lwp is really gone
841 by now. If ttrace had an event to inform the debugger
842 the lwp is really gone, this wouldn't be needed. */
843 delete_thread (info->ptid);
844 else
845 /* This was really unexpected. */
846 perror_with_name (("ttrace"));
847 }
848 }
849
850 /* Callback for iterate_over_threads. */
851
852 static int
853 inf_ttrace_resume_callback (struct thread_info *info, void *arg)
854 {
855 if (!ptid_equal (info->ptid, inferior_ptid) && !is_exited (info->ptid))
856 inf_ttrace_resume_lwp (info, TT_LWP_CONTINUE, 0);
857
858 return 0;
859 }
860
861 static void
862 inf_ttrace_resume (struct target_ops *ops,
863 ptid_t ptid, int step, enum target_signal signal)
864 {
865 int resume_all;
866 ttreq_t request = step ? TT_LWP_SINGLE : TT_LWP_CONTINUE;
867 int sig = target_signal_to_host (signal);
868 struct thread_info *info;
869
870 /* A specific PTID means `step only this process id'. */
871 resume_all = (ptid_equal (ptid, minus_one_ptid));
872
873 /* If resuming all threads, it's the current thread that should be
874 handled specially. */
875 if (resume_all)
876 ptid = inferior_ptid;
877
878 info = find_thread_ptid (ptid);
879 inf_ttrace_resume_lwp (info, request, sig);
880
881 if (resume_all)
882 /* Let all the other threads run too. */
883 iterate_over_threads (inf_ttrace_resume_callback, NULL);
884 }
885
886 static ptid_t
887 inf_ttrace_wait (struct target_ops *ops,
888 ptid_t ptid, struct target_waitstatus *ourstatus, int options)
889 {
890 pid_t pid = ptid_get_pid (ptid);
891 lwpid_t lwpid = ptid_get_lwp (ptid);
892 ttstate_t tts;
893 struct thread_info *ti;
894 ptid_t related_ptid;
895
896 /* Until proven otherwise. */
897 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
898
899 if (pid == -1)
900 pid = lwpid = 0;
901
902 gdb_assert (pid != 0 || lwpid == 0);
903
904 do
905 {
906 set_sigint_trap ();
907
908 if (ttrace_wait (pid, lwpid, TTRACE_WAITOK, &tts, sizeof tts) == -1)
909 perror_with_name (("ttrace_wait"));
910
911 if (tts.tts_event == TTEVT_VFORK && tts.tts_u.tts_fork.tts_isparent)
912 {
913 if (inf_ttrace_vfork_ppid != -1)
914 {
915 gdb_assert (inf_ttrace_vfork_ppid == tts.tts_pid);
916
917 if (ttrace (TT_PROC_DETACH, tts.tts_pid, 0, 0, 0, 0) == -1)
918 perror_with_name (("ttrace"));
919 inf_ttrace_vfork_ppid = -1;
920 }
921
922 tts.tts_event = TTEVT_NONE;
923 }
924
925 clear_sigint_trap ();
926 }
927 while (tts.tts_event == TTEVT_NONE);
928
929 /* Now that we've waited, we can re-enable the page protections. */
930 if (inf_ttrace_reenable_page_protections)
931 {
932 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
933 inf_ttrace_enable_page_protections (tts.tts_pid);
934 inf_ttrace_reenable_page_protections = 0;
935 }
936
937 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
938
939 if (inf_ttrace_num_lwps == 0)
940 {
941 struct thread_info *ti;
942
943 inf_ttrace_num_lwps = 1;
944
945 /* This is the earliest we hear about the lwp member of
946 INFERIOR_PTID, after an attach or fork_inferior. */
947 gdb_assert (ptid_get_lwp (inferior_ptid) == 0);
948
949 /* We haven't set the private member on the main thread yet. Do
950 it now. */
951 ti = find_thread_ptid (inferior_ptid);
952 gdb_assert (ti != NULL && ti->private == NULL);
953 ti->private =
954 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
955 memset (ti->private, 0,
956 sizeof (struct inf_ttrace_private_thread_info));
957
958 /* Notify the core that this ptid changed. This changes
959 inferior_ptid as well. */
960 thread_change_ptid (inferior_ptid, ptid);
961 }
962
963 switch (tts.tts_event)
964 {
965 #ifdef TTEVT_BPT_SSTEP
966 case TTEVT_BPT_SSTEP:
967 /* Make it look like a breakpoint. */
968 ourstatus->kind = TARGET_WAITKIND_STOPPED;
969 ourstatus->value.sig = TARGET_SIGNAL_TRAP;
970 break;
971 #endif
972
973 case TTEVT_EXEC:
974 ourstatus->kind = TARGET_WAITKIND_EXECD;
975 ourstatus->value.execd_pathname =
976 xmalloc (tts.tts_u.tts_exec.tts_pathlen + 1);
977 if (ttrace (TT_PROC_GET_PATHNAME, tts.tts_pid, 0,
978 (uintptr_t)ourstatus->value.execd_pathname,
979 tts.tts_u.tts_exec.tts_pathlen, 0) == -1)
980 perror_with_name (("ttrace"));
981 ourstatus->value.execd_pathname[tts.tts_u.tts_exec.tts_pathlen] = 0;
982
983 /* At this point, all inserted breakpoints are gone. Doing this
984 as soon as we detect an exec prevents the badness of deleting
985 a breakpoint writing the current "shadow contents" to lift
986 the bp. That shadow is NOT valid after an exec. */
987 mark_breakpoints_out ();
988 break;
989
990 case TTEVT_EXIT:
991 store_waitstatus (ourstatus, tts.tts_u.tts_exit.tts_exitcode);
992 inf_ttrace_num_lwps = 0;
993 break;
994
995 case TTEVT_FORK:
996 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
997 tts.tts_u.tts_fork.tts_flwpid, 0);
998
999 ourstatus->kind = TARGET_WAITKIND_FORKED;
1000 ourstatus->value.related_pid = related_ptid;
1001
1002 /* Make sure the other end of the fork is stopped too. */
1003 if (ttrace_wait (tts.tts_u.tts_fork.tts_fpid,
1004 tts.tts_u.tts_fork.tts_flwpid,
1005 TTRACE_WAITOK, &tts, sizeof tts) == -1)
1006 perror_with_name (("ttrace_wait"));
1007
1008 gdb_assert (tts.tts_event == TTEVT_FORK);
1009 if (tts.tts_u.tts_fork.tts_isparent)
1010 {
1011 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
1012 tts.tts_u.tts_fork.tts_flwpid, 0);
1013 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
1014 ourstatus->value.related_pid = related_ptid;
1015 }
1016 break;
1017
1018 case TTEVT_VFORK:
1019 gdb_assert (!tts.tts_u.tts_fork.tts_isparent);
1020
1021 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
1022 tts.tts_u.tts_fork.tts_flwpid, 0);
1023
1024 ourstatus->kind = TARGET_WAITKIND_VFORKED;
1025 ourstatus->value.related_pid = related_ptid;
1026
1027 /* HACK: To avoid touching the parent during the vfork, switch
1028 away from it. */
1029 inferior_ptid = ptid;
1030 break;
1031
1032 case TTEVT_LWP_CREATE:
1033 lwpid = tts.tts_u.tts_thread.tts_target_lwpid;
1034 ptid = ptid_build (tts.tts_pid, lwpid, 0);
1035 ti = add_thread (ptid);
1036 ti->private =
1037 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
1038 memset (ti->private, 0,
1039 sizeof (struct inf_ttrace_private_thread_info));
1040 inf_ttrace_num_lwps++;
1041 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
1042 /* Let the lwp_create-caller thread continue. */
1043 ttrace (TT_LWP_CONTINUE, ptid_get_pid (ptid),
1044 ptid_get_lwp (ptid), TT_NOPC, 0, 0);
1045 /* Return without stopping the whole process. */
1046 ourstatus->kind = TARGET_WAITKIND_IGNORE;
1047 return ptid;
1048
1049 case TTEVT_LWP_EXIT:
1050 if (print_thread_events)
1051 printf_unfiltered (_("[%s exited]\n"), target_pid_to_str (ptid));
1052 ti = find_thread_ptid (ptid);
1053 gdb_assert (ti != NULL);
1054 ((struct inf_ttrace_private_thread_info *)ti->private)->dying = 1;
1055 inf_ttrace_num_lwps--;
1056 /* Let the thread really exit. */
1057 ttrace (TT_LWP_CONTINUE, ptid_get_pid (ptid),
1058 ptid_get_lwp (ptid), TT_NOPC, 0, 0);
1059 /* Return without stopping the whole process. */
1060 ourstatus->kind = TARGET_WAITKIND_IGNORE;
1061 return ptid;
1062
1063 case TTEVT_LWP_TERMINATE:
1064 lwpid = tts.tts_u.tts_thread.tts_target_lwpid;
1065 ptid = ptid_build (tts.tts_pid, lwpid, 0);
1066 if (print_thread_events)
1067 printf_unfiltered(_("[%s has been terminated]\n"),
1068 target_pid_to_str (ptid));
1069 ti = find_thread_ptid (ptid);
1070 gdb_assert (ti != NULL);
1071 ((struct inf_ttrace_private_thread_info *)ti->private)->dying = 1;
1072 inf_ttrace_num_lwps--;
1073
1074 /* Resume the lwp_terminate-caller thread. */
1075 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
1076 ttrace (TT_LWP_CONTINUE, ptid_get_pid (ptid),
1077 ptid_get_lwp (ptid), TT_NOPC, 0, 0);
1078 /* Return without stopping the whole process. */
1079 ourstatus->kind = TARGET_WAITKIND_IGNORE;
1080 return ptid;
1081
1082 case TTEVT_SIGNAL:
1083 ourstatus->kind = TARGET_WAITKIND_STOPPED;
1084 ourstatus->value.sig =
1085 target_signal_from_host (tts.tts_u.tts_signal.tts_signo);
1086 break;
1087
1088 case TTEVT_SYSCALL_ENTRY:
1089 gdb_assert (inf_ttrace_reenable_page_protections == 0);
1090 inf_ttrace_num_lwps_in_syscall++;
1091 if (inf_ttrace_num_lwps_in_syscall == 1)
1092 {
1093 /* A thread has just entered a system call. Disable any
1094 page protections as the kernel can't deal with them. */
1095 inf_ttrace_disable_page_protections (tts.tts_pid);
1096 }
1097 ourstatus->kind = TARGET_WAITKIND_SYSCALL_ENTRY;
1098 ourstatus->value.syscall_number = tts.tts_scno;
1099 break;
1100
1101 case TTEVT_SYSCALL_RETURN:
1102 if (inf_ttrace_num_lwps_in_syscall > 0)
1103 {
1104 /* If the last thread has just left the system call, this
1105 would be a logical place to re-enable the page
1106 protections, but that doesn't work. We can't re-enable
1107 them until we've done another wait. */
1108 inf_ttrace_reenable_page_protections =
1109 (inf_ttrace_num_lwps_in_syscall == 1);
1110 inf_ttrace_num_lwps_in_syscall--;
1111 }
1112 ourstatus->kind = TARGET_WAITKIND_SYSCALL_RETURN;
1113 ourstatus->value.syscall_number = tts.tts_scno;
1114 break;
1115
1116 default:
1117 gdb_assert (!"Unexpected ttrace event");
1118 break;
1119 }
1120
1121 /* Make sure all threads within the process are stopped. */
1122 if (ttrace (TT_PROC_STOP, tts.tts_pid, 0, 0, 0, 0) == -1)
1123 perror_with_name (("ttrace"));
1124
1125 /* Now that the whole process is stopped, check if any dying thread
1126 is really dead by now. If a dying thread is still alive, it will
1127 be stopped too, and will still show up in `info threads', tagged
1128 with "(Exiting)". We could make `info threads' prune dead
1129 threads instead via inf_ttrace_thread_alive, but doing this here
1130 has the advantage that a frontend is notificed sooner of thread
1131 exits. Note that a dying lwp is still alive, it still has to be
1132 resumed, like any other lwp. */
1133 iterate_over_threads (inf_ttrace_delete_dead_threads_callback, NULL);
1134
1135 return ptid;
1136 }
1137
1138 /* Transfer LEN bytes from ADDR in the inferior's memory into READBUF,
1139 and transfer LEN bytes from WRITEBUF into the inferior's memory at
1140 ADDR. Either READBUF or WRITEBUF may be null, in which case the
1141 corresponding transfer doesn't happen. Return the number of bytes
1142 actually transferred (which may be zero if an error occurs). */
1143
1144 static LONGEST
1145 inf_ttrace_xfer_memory (CORE_ADDR addr, ULONGEST len,
1146 void *readbuf, const void *writebuf)
1147 {
1148 pid_t pid = ptid_get_pid (inferior_ptid);
1149
1150 /* HP-UX treats text space and data space differently. GDB however,
1151 doesn't really know the difference. Therefore we try both. Try
1152 text space before data space though because when we're writing
1153 into text space the instruction cache might need to be flushed. */
1154
1155 if (readbuf
1156 && ttrace (TT_PROC_RDTEXT, pid, 0, addr, len, (uintptr_t)readbuf) == -1
1157 && ttrace (TT_PROC_RDDATA, pid, 0, addr, len, (uintptr_t)readbuf) == -1)
1158 return 0;
1159
1160 if (writebuf
1161 && ttrace (TT_PROC_WRTEXT, pid, 0, addr, len, (uintptr_t)writebuf) == -1
1162 && ttrace (TT_PROC_WRDATA, pid, 0, addr, len, (uintptr_t)writebuf) == -1)
1163 return 0;
1164
1165 return len;
1166 }
1167
1168 static LONGEST
1169 inf_ttrace_xfer_partial (struct target_ops *ops, enum target_object object,
1170 const char *annex, gdb_byte *readbuf,
1171 const gdb_byte *writebuf, ULONGEST offset, LONGEST len)
1172 {
1173 switch (object)
1174 {
1175 case TARGET_OBJECT_MEMORY:
1176 return inf_ttrace_xfer_memory (offset, len, readbuf, writebuf);
1177
1178 case TARGET_OBJECT_UNWIND_TABLE:
1179 return -1;
1180
1181 case TARGET_OBJECT_AUXV:
1182 return -1;
1183
1184 case TARGET_OBJECT_WCOOKIE:
1185 return -1;
1186
1187 default:
1188 return -1;
1189 }
1190 }
1191
1192 /* Print status information about what we're accessing. */
1193
1194 static void
1195 inf_ttrace_files_info (struct target_ops *ignore)
1196 {
1197 struct inferior *inf = current_inferior ();
1198 printf_filtered (_("\tUsing the running image of %s %s.\n"),
1199 inf->attach_flag ? "attached" : "child",
1200 target_pid_to_str (inferior_ptid));
1201 }
1202
1203 static int
1204 inf_ttrace_thread_alive (struct target_ops *ops, ptid_t ptid)
1205 {
1206 return 1;
1207 }
1208
1209 /* Return a string describing the state of the thread specified by
1210 INFO. */
1211
1212 static char *
1213 inf_ttrace_extra_thread_info (struct thread_info *info)
1214 {
1215 struct inf_ttrace_private_thread_info* private =
1216 (struct inf_ttrace_private_thread_info *) info->private;
1217
1218 if (private != NULL && private->dying)
1219 return "Exiting";
1220
1221 return NULL;
1222 }
1223
1224 static char *
1225 inf_ttrace_pid_to_str (struct target_ops *ops, ptid_t ptid)
1226 {
1227 pid_t pid = ptid_get_pid (ptid);
1228 lwpid_t lwpid = ptid_get_lwp (ptid);
1229 static char buf[128];
1230
1231 if (lwpid == 0)
1232 xsnprintf (buf, sizeof buf, "process %ld",
1233 (long) pid);
1234 else
1235 xsnprintf (buf, sizeof buf, "process %ld, lwp %ld",
1236 (long) pid, (long) lwpid);
1237 return buf;
1238 }
1239 \f
1240
1241 /* Implement the get_ada_task_ptid target_ops method. */
1242
1243 static ptid_t
1244 inf_ttrace_get_ada_task_ptid (long lwp, long thread)
1245 {
1246 return ptid_build (ptid_get_pid (inferior_ptid), lwp, 0);
1247 }
1248
1249 \f
1250 struct target_ops *
1251 inf_ttrace_target (void)
1252 {
1253 struct target_ops *t = inf_child_target ();
1254
1255 t->to_attach = inf_ttrace_attach;
1256 t->to_detach = inf_ttrace_detach;
1257 t->to_resume = inf_ttrace_resume;
1258 t->to_wait = inf_ttrace_wait;
1259 t->to_files_info = inf_ttrace_files_info;
1260 t->to_can_use_hw_breakpoint = inf_ttrace_can_use_hw_breakpoint;
1261 t->to_insert_watchpoint = inf_ttrace_insert_watchpoint;
1262 t->to_remove_watchpoint = inf_ttrace_remove_watchpoint;
1263 t->to_stopped_by_watchpoint = inf_ttrace_stopped_by_watchpoint;
1264 t->to_region_ok_for_hw_watchpoint =
1265 inf_ttrace_region_ok_for_hw_watchpoint;
1266 t->to_kill = inf_ttrace_kill;
1267 t->to_create_inferior = inf_ttrace_create_inferior;
1268 t->to_follow_fork = inf_ttrace_follow_fork;
1269 t->to_mourn_inferior = inf_ttrace_mourn_inferior;
1270 t->to_thread_alive = inf_ttrace_thread_alive;
1271 t->to_extra_thread_info = inf_ttrace_extra_thread_info;
1272 t->to_pid_to_str = inf_ttrace_pid_to_str;
1273 t->to_xfer_partial = inf_ttrace_xfer_partial;
1274 t->to_get_ada_task_ptid = inf_ttrace_get_ada_task_ptid;
1275
1276 return t;
1277 }
1278 #endif
1279 \f
1280
1281 /* Prevent warning from -Wmissing-prototypes. */
1282 void _initialize_hppa_hpux_nat (void);
1283
1284 void
1285 _initialize_inf_ttrace (void)
1286 {
1287 #ifdef HAVE_TTRACE
1288 inf_ttrace_page_dict.pagesize = getpagesize();
1289 #endif
1290 }