]> Git Repo - binutils.git/blame - gdb/inf-ttrace.c
* inf-ttrace.c: Include <signal.h>
[binutils.git] / gdb / inf-ttrace.c
CommitLineData
eee22bf8
MK
1/* Low-level child interface to ttrace.
2
9b254dd1 3 Copyright (C) 2004, 2005, 2006, 2007, 2008 Free Software Foundation, Inc.
eee22bf8
MK
4
5 This file is part of GDB.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
eee22bf8
MK
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
eee22bf8
MK
19
20#include "defs.h"
21
22/* The ttrace(2) system call didn't exist before HP-UX 10.30. Don't
23 try to compile this code unless we have it. */
24#ifdef HAVE_TTRACE
25
26#include "command.h"
27#include "gdbcore.h"
a7be7fa8 28#include "gdbthread.h"
eee22bf8 29#include "inferior.h"
eee22bf8
MK
30#include "target.h"
31
32#include "gdb_assert.h"
33#include "gdb_string.h"
932936f0 34#include <sys/mman.h>
eee22bf8 35#include <sys/ttrace.h>
438ac09b 36#include <signal.h>
eee22bf8
MK
37
38#include "inf-child.h"
39#include "inf-ttrace.h"
40
41/* HACK: Save the ttrace ops returned by inf_ttrace_target. */
42static struct target_ops *ttrace_ops_hack;
932936f0
MK
43\f
44
a7be7fa8
MK
45/* HP-UX uses a threading model where each user-space thread
46 corresponds to a kernel thread. These kernel threads are called
47 lwps. The ttrace(2) interface gives us almost full control over
48 the threads, which makes it very easy to support them in GDB. We
49 identify the threads by process ID and lwp ID. The ttrace(2) also
50 provides us with a thread's user ID (in the `tts_user_tid' member
51 of `ttstate_t') but we don't use that (yet) as it isn't necessary
52 to uniquely label the thread. */
53
54/* Number of active lwps. */
55static int inf_ttrace_num_lwps;
56\f
57
932936f0
MK
58/* On HP-UX versions that have the ttrace(2) system call, we can
59 implement "hardware" watchpoints by fiddling with the protection of
60 pages in the address space that contain the variable being watched.
61 In order to implement this, we keep a dictionary of pages for which
62 we have changed the protection. */
63
64struct inf_ttrace_page
65{
66 CORE_ADDR addr; /* Page address. */
67 int prot; /* Protection. */
68 int refcount; /* Reference count. */
69 struct inf_ttrace_page *next;
70 struct inf_ttrace_page *prev;
71};
72
73struct inf_ttrace_page_dict
74{
75 struct inf_ttrace_page buckets[128];
76 int pagesize; /* Page size. */
77 int count; /* Number of pages in this dictionary. */
78} inf_ttrace_page_dict;
79
60e2c248
JG
80struct inf_ttrace_private_thread_info
81{
82 int dying;
83};
84
a7be7fa8
MK
85/* Number of lwps that are currently in a system call. */
86static int inf_ttrace_num_lwps_in_syscall;
932936f0
MK
87
88/* Flag to indicate whether we should re-enable page protections after
89 the next wait. */
90static int inf_ttrace_reenable_page_protections;
91
92/* Enable system call events for process PID. */
93
94static void
95inf_ttrace_enable_syscall_events (pid_t pid)
96{
97 ttevent_t tte;
98 ttstate_t tts;
99
a7be7fa8 100 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
932936f0
MK
101
102 if (ttrace (TT_PROC_GET_EVENT_MASK, pid, 0,
103 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 104 perror_with_name (("ttrace"));
932936f0
MK
105
106 tte.tte_events |= (TTEVT_SYSCALL_ENTRY | TTEVT_SYSCALL_RETURN);
107
108 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
109 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 110 perror_with_name (("ttrace"));
932936f0
MK
111
112 if (ttrace (TT_PROC_GET_FIRST_LWP_STATE, pid, 0,
113 (uintptr_t)&tts, sizeof tts, 0) == -1)
e2e0b3e5 114 perror_with_name (("ttrace"));
932936f0
MK
115
116 if (tts.tts_flags & TTS_INSYSCALL)
a7be7fa8 117 inf_ttrace_num_lwps_in_syscall++;
932936f0
MK
118
119 /* FIXME: Handle multiple threads. */
120}
121
122/* Disable system call events for process PID. */
123
124static void
125inf_ttrace_disable_syscall_events (pid_t pid)
126{
127 ttevent_t tte;
128
129 gdb_assert (inf_ttrace_page_dict.count == 0);
130
131 if (ttrace (TT_PROC_GET_EVENT_MASK, pid, 0,
132 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 133 perror_with_name (("ttrace"));
932936f0
MK
134
135 tte.tte_events &= ~(TTEVT_SYSCALL_ENTRY | TTEVT_SYSCALL_RETURN);
136
137 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
138 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 139 perror_with_name (("ttrace"));
932936f0 140
a7be7fa8 141 inf_ttrace_num_lwps_in_syscall = 0;
932936f0
MK
142}
143
144/* Get information about the page at address ADDR for process PID from
145 the dictionary. */
146
147static struct inf_ttrace_page *
148inf_ttrace_get_page (pid_t pid, CORE_ADDR addr)
149{
150 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
151 const int pagesize = inf_ttrace_page_dict.pagesize;
152 int bucket;
153 struct inf_ttrace_page *page;
154
155 bucket = (addr / pagesize) % num_buckets;
156 page = &inf_ttrace_page_dict.buckets[bucket];
157 while (page)
158 {
159 if (page->addr == addr)
160 break;
161
162 page = page->next;
163 }
164
165 return page;
166}
167
168/* Add the page at address ADDR for process PID to the dictionary. */
169
170static struct inf_ttrace_page *
171inf_ttrace_add_page (pid_t pid, CORE_ADDR addr)
172{
173 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
174 const int pagesize = inf_ttrace_page_dict.pagesize;
175 int bucket;
176 struct inf_ttrace_page *page;
177 struct inf_ttrace_page *prev = NULL;
178
179 bucket = (addr / pagesize) % num_buckets;
180 page = &inf_ttrace_page_dict.buckets[bucket];
181 while (page)
182 {
183 if (page->addr == addr)
184 break;
185
186 prev = page;
187 page = page->next;
188 }
189
190 if (!page)
191 {
192 int prot;
193
194 if (ttrace (TT_PROC_GET_MPROTECT, pid, 0,
195 addr, 0, (uintptr_t)&prot) == -1)
e2e0b3e5 196 perror_with_name (("ttrace"));
932936f0
MK
197
198 page = XMALLOC (struct inf_ttrace_page);
199 page->addr = addr;
200 page->prot = prot;
201 page->refcount = 0;
202 page->next = NULL;
203
204 page->prev = prev;
205 prev->next = page;
206
207 inf_ttrace_page_dict.count++;
208 if (inf_ttrace_page_dict.count == 1)
209 inf_ttrace_enable_syscall_events (pid);
210
a7be7fa8 211 if (inf_ttrace_num_lwps_in_syscall == 0)
932936f0
MK
212 {
213 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
214 addr, pagesize, prot & ~PROT_WRITE) == -1)
e2e0b3e5 215 perror_with_name (("ttrace"));
932936f0
MK
216 }
217 }
218
219 return page;
220}
221
222/* Insert the page at address ADDR of process PID to the dictionary. */
223
224static void
225inf_ttrace_insert_page (pid_t pid, CORE_ADDR addr)
226{
227 struct inf_ttrace_page *page;
228
229 page = inf_ttrace_get_page (pid, addr);
230 if (!page)
231 page = inf_ttrace_add_page (pid, addr);
232
233 page->refcount++;
234}
235
236/* Remove the page at address ADDR of process PID from the dictionary. */
237
238static void
239inf_ttrace_remove_page (pid_t pid, CORE_ADDR addr)
240{
241 const int pagesize = inf_ttrace_page_dict.pagesize;
242 struct inf_ttrace_page *page;
243
244 page = inf_ttrace_get_page (pid, addr);
245 page->refcount--;
246
247 gdb_assert (page->refcount >= 0);
248
249 if (page->refcount == 0)
250 {
a7be7fa8 251 if (inf_ttrace_num_lwps_in_syscall == 0)
932936f0
MK
252 {
253 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
254 addr, pagesize, page->prot) == -1)
e2e0b3e5 255 perror_with_name (("ttrace"));
932936f0
MK
256 }
257
258 inf_ttrace_page_dict.count--;
259 if (inf_ttrace_page_dict.count == 0)
260 inf_ttrace_disable_syscall_events (pid);
261
262 page->prev->next = page->next;
263 if (page->next)
264 page->next->prev = page->prev;
265
266 xfree (page);
267 }
268}
269
270/* Mask the bits in PROT from the page protections that are currently
271 in the dictionary for process PID. */
272
273static void
274inf_ttrace_mask_page_protections (pid_t pid, int prot)
275{
276 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
277 const int pagesize = inf_ttrace_page_dict.pagesize;
278 int bucket;
279
280 for (bucket = 0; bucket < num_buckets; bucket++)
281 {
282 struct inf_ttrace_page *page;
283
284 page = inf_ttrace_page_dict.buckets[bucket].next;
285 while (page)
286 {
287 if (ttrace (TT_PROC_SET_MPROTECT, pid, 0,
288 page->addr, pagesize, page->prot & ~prot) == -1)
e2e0b3e5 289 perror_with_name (("ttrace"));
932936f0
MK
290
291 page = page->next;
292 }
293 }
294}
295
296/* Write-protect the pages in the dictionary for process PID. */
297
298static void
299inf_ttrace_enable_page_protections (pid_t pid)
300{
301 inf_ttrace_mask_page_protections (pid, PROT_WRITE);
302}
303
304/* Restore the protection of the pages in the dictionary for process
305 PID. */
306
307static void
308inf_ttrace_disable_page_protections (pid_t pid)
309{
310 inf_ttrace_mask_page_protections (pid, 0);
311}
312
313/* Insert a "hardware" watchpoint for LEN bytes at address ADDR of
314 type TYPE. */
315
316static int
317inf_ttrace_insert_watchpoint (CORE_ADDR addr, int len, int type)
318{
319 const int pagesize = inf_ttrace_page_dict.pagesize;
320 pid_t pid = ptid_get_pid (inferior_ptid);
321 CORE_ADDR page_addr;
322 int num_pages;
323 int page;
324
325 gdb_assert (type == hw_write);
326
327 page_addr = (addr / pagesize) * pagesize;
328 num_pages = (len + pagesize - 1) / pagesize;
329
330 for (page = 0; page < num_pages; page++, page_addr += pagesize)
331 inf_ttrace_insert_page (pid, page_addr);
332
333 return 1;
334}
335
336/* Remove a "hardware" watchpoint for LEN bytes at address ADDR of
337 type TYPE. */
338
339static int
340inf_ttrace_remove_watchpoint (CORE_ADDR addr, int len, int type)
341{
342 const int pagesize = inf_ttrace_page_dict.pagesize;
343 pid_t pid = ptid_get_pid (inferior_ptid);
344 CORE_ADDR page_addr;
345 int num_pages;
346 int page;
347
348 gdb_assert (type == hw_write);
349
350 page_addr = (addr / pagesize) * pagesize;
351 num_pages = (len + pagesize - 1) / pagesize;
352
353 for (page = 0; page < num_pages; page++, page_addr += pagesize)
354 inf_ttrace_remove_page (pid, page_addr);
355
356 return 1;
357}
358
359static int
360inf_ttrace_can_use_hw_breakpoint (int type, int len, int ot)
361{
362 return (type == bp_hardware_watchpoint);
363}
364
365static int
2a3cdf79 366inf_ttrace_region_ok_for_hw_watchpoint (CORE_ADDR addr, int len)
932936f0
MK
367{
368 return 1;
369}
370
371/* Return non-zero if the current inferior was (potentially) stopped
372 by hitting a "hardware" watchpoint. */
373
374static int
375inf_ttrace_stopped_by_watchpoint (void)
376{
377 pid_t pid = ptid_get_pid (inferior_ptid);
378 lwpid_t lwpid = ptid_get_lwp (inferior_ptid);
379 ttstate_t tts;
380
381 if (inf_ttrace_page_dict.count > 0)
382 {
383 if (ttrace (TT_LWP_GET_STATE, pid, lwpid,
384 (uintptr_t)&tts, sizeof tts, 0) == -1)
e2e0b3e5 385 perror_with_name (("ttrace"));
932936f0
MK
386
387 if (tts.tts_event == TTEVT_SIGNAL
388 && tts.tts_u.tts_signal.tts_signo == SIGBUS)
389 {
390 const int pagesize = inf_ttrace_page_dict.pagesize;
391 void *addr = tts.tts_u.tts_signal.tts_siginfo.si_addr;
392 CORE_ADDR page_addr = ((uintptr_t)addr / pagesize) * pagesize;
393
394 if (inf_ttrace_get_page (pid, page_addr))
395 return 1;
396 }
397 }
398
399 return 0;
400}
401\f
eee22bf8 402
b2a4db28
MK
403/* When tracking a vfork(2), we cannot detach from the parent until
404 after the child has called exec(3) or has exited. If we are still
405 attached to the parent, this variable will be set to the process ID
406 of the parent. Otherwise it will be set to zero. */
407static pid_t inf_ttrace_vfork_ppid = -1;
408
409static int
ee057212 410inf_ttrace_follow_fork (struct target_ops *ops, int follow_child)
b2a4db28
MK
411{
412 pid_t pid, fpid;
413 lwpid_t lwpid, flwpid;
414 ttstate_t tts;
415
416 /* FIXME: kettenis/20050720: This stuff should really be passed as
417 an argument by our caller. */
418 {
419 ptid_t ptid;
420 struct target_waitstatus status;
421
422 get_last_target_status (&ptid, &status);
423 gdb_assert (status.kind == TARGET_WAITKIND_FORKED
424 || status.kind == TARGET_WAITKIND_VFORKED);
425
426 pid = ptid_get_pid (ptid);
427 lwpid = ptid_get_lwp (ptid);
428 }
429
430 /* Get all important details that core GDB doesn't (and shouldn't)
431 know about. */
432 if (ttrace (TT_LWP_GET_STATE, pid, lwpid,
433 (uintptr_t)&tts, sizeof tts, 0) == -1)
434 perror_with_name (("ttrace"));
435
436 gdb_assert (tts.tts_event == TTEVT_FORK || tts.tts_event == TTEVT_VFORK);
437
438 if (tts.tts_u.tts_fork.tts_isparent)
439 {
440 pid = tts.tts_pid;
441 lwpid = tts.tts_lwpid;
442 fpid = tts.tts_u.tts_fork.tts_fpid;
443 flwpid = tts.tts_u.tts_fork.tts_flwpid;
444 }
445 else
446 {
447 pid = tts.tts_u.tts_fork.tts_fpid;
448 lwpid = tts.tts_u.tts_fork.tts_flwpid;
449 fpid = tts.tts_pid;
450 flwpid = tts.tts_lwpid;
451 }
452
453 if (follow_child)
454 {
455 inferior_ptid = ptid_build (fpid, flwpid, 0);
456 detach_breakpoints (pid);
457
458 target_terminal_ours ();
459 fprintf_unfiltered (gdb_stdlog, _("\
460Attaching after fork to child process %ld.\n"), (long)fpid);
461 }
462 else
463 {
464 inferior_ptid = ptid_build (pid, lwpid, 0);
465 detach_breakpoints (fpid);
466
467 target_terminal_ours ();
468 fprintf_unfiltered (gdb_stdlog, _("\
469Detaching after fork from child process %ld.\n"), (long)fpid);
470 }
471
472 if (tts.tts_event == TTEVT_VFORK)
473 {
474 gdb_assert (!tts.tts_u.tts_fork.tts_isparent);
475
476 if (follow_child)
477 {
478 /* We can't detach from the parent yet. */
479 inf_ttrace_vfork_ppid = pid;
480
481 reattach_breakpoints (fpid);
482 }
483 else
484 {
485 if (ttrace (TT_PROC_DETACH, fpid, 0, 0, 0, 0) == -1)
486 perror_with_name (("ttrace"));
487
488 /* Wait till we get the TTEVT_VFORK event in the parent.
489 This indicates that the child has called exec(3) or has
490 exited and that the parent is ready to be traced again. */
491 if (ttrace_wait (pid, lwpid, TTRACE_WAITOK, &tts, sizeof tts) == -1)
492 perror_with_name (("ttrace_wait"));
493 gdb_assert (tts.tts_event == TTEVT_VFORK);
494 gdb_assert (tts.tts_u.tts_fork.tts_isparent);
495
496 reattach_breakpoints (pid);
497 }
498 }
499 else
500 {
501 gdb_assert (tts.tts_u.tts_fork.tts_isparent);
502
503 if (follow_child)
504 {
505 if (ttrace (TT_PROC_DETACH, pid, 0, 0, 0, 0) == -1)
506 perror_with_name (("ttrace"));
507 }
508 else
509 {
510 if (ttrace (TT_PROC_DETACH, fpid, 0, 0, 0, 0) == -1)
511 perror_with_name (("ttrace"));
512 }
513 }
514
515 if (follow_child)
516 {
2935f27f
PA
517 struct thread_info *ti;
518
b2a4db28 519 /* The child will start out single-threaded. */
2935f27f 520 inf_ttrace_num_lwps = 1;
b2a4db28
MK
521 inf_ttrace_num_lwps_in_syscall = 0;
522
2935f27f
PA
523 /* Delete parent. */
524 delete_thread_silent (ptid_build (pid, lwpid, 0));
525
526 /* Add child. inferior_ptid was already set above. */
527 ti = add_thread_silent (inferior_ptid);
528 ti->private =
529 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
530 memset (ti->private, 0,
531 sizeof (struct inf_ttrace_private_thread_info));
532
b2a4db28
MK
533 /* Reset breakpoints in the child as appropriate. */
534 follow_inferior_reset_breakpoints ();
535 }
536
537 return 0;
538}
539\f
540
eee22bf8
MK
541/* File descriptors for pipes used as semaphores during initial
542 startup of an inferior. */
543static int inf_ttrace_pfd1[2];
544static int inf_ttrace_pfd2[2];
545
546static void
547do_cleanup_pfds (void *dummy)
548{
549 close (inf_ttrace_pfd1[0]);
550 close (inf_ttrace_pfd1[1]);
551 close (inf_ttrace_pfd2[0]);
552 close (inf_ttrace_pfd2[1]);
553}
554
555static void
556inf_ttrace_prepare (void)
557{
558 if (pipe (inf_ttrace_pfd1) == -1)
a3f17187 559 perror_with_name (("pipe"));
eee22bf8
MK
560
561 if (pipe (inf_ttrace_pfd2) == -1)
562 {
563 close (inf_ttrace_pfd1[0]);
564 close (inf_ttrace_pfd2[0]);
a3f17187 565 perror_with_name (("pipe"));
eee22bf8
MK
566 }
567}
568
569/* Prepare to be traced. */
570
571static void
572inf_ttrace_me (void)
573{
574 struct cleanup *old_chain = make_cleanup (do_cleanup_pfds, 0);
575 char c;
576
577 /* "Trace me, Dr. Memory!" */
578 if (ttrace (TT_PROC_SETTRC, 0, 0, 0, TT_VERSION, 0) == -1)
e2e0b3e5 579 perror_with_name (("ttrace"));
eee22bf8
MK
580
581 /* Tell our parent that we are ready to be traced. */
582 if (write (inf_ttrace_pfd1[1], &c, sizeof c) != sizeof c)
e2e0b3e5 583 perror_with_name (("write"));
eee22bf8
MK
584
585 /* Wait until our parent has set the initial event mask. */
586 if (read (inf_ttrace_pfd2[0], &c, sizeof c) != sizeof c)
e2e0b3e5 587 perror_with_name (("read"));
eee22bf8
MK
588
589 do_cleanups (old_chain);
590}
591
592/* Start tracing PID. */
593
594static void
595inf_ttrace_him (int pid)
596{
597 struct cleanup *old_chain = make_cleanup (do_cleanup_pfds, 0);
598 ttevent_t tte;
eee22bf8
MK
599 char c;
600
601 /* Wait until our child is ready to be traced. */
602 if (read (inf_ttrace_pfd1[0], &c, sizeof c) != sizeof c)
e2e0b3e5 603 perror_with_name (("read"));
eee22bf8
MK
604
605 /* Set the initial event mask. */
606 memset (&tte, 0, sizeof (tte));
b2a4db28 607 tte.tte_events |= TTEVT_EXEC | TTEVT_EXIT | TTEVT_FORK | TTEVT_VFORK;
a7be7fa8 608 tte.tte_events |= TTEVT_LWP_CREATE | TTEVT_LWP_EXIT | TTEVT_LWP_TERMINATE;
7ba0e0c2
MK
609#ifdef TTEVT_BPT_SSTEP
610 tte.tte_events |= TTEVT_BPT_SSTEP;
611#endif
b2a4db28 612 tte.tte_opts |= TTEO_PROC_INHERIT;
eee22bf8
MK
613 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
614 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 615 perror_with_name (("ttrace"));
eee22bf8
MK
616
617 /* Tell our child that we have set the initial event mask. */
618 if (write (inf_ttrace_pfd2[1], &c, sizeof c) != sizeof c)
e2e0b3e5 619 perror_with_name (("write"));
eee22bf8
MK
620
621 do_cleanups (old_chain);
622
623 push_target (ttrace_ops_hack);
624
625 /* On some targets, there must be some explicit synchronization
626 between the parent and child processes after the debugger forks,
627 and before the child execs the debuggee program. This call
628 basically gives permission for the child to exec. */
629
630 target_acknowledge_created_inferior (pid);
631
632 /* START_INFERIOR_TRAPS_EXPECTED is defined in inferior.h, and will
633 be 1 or 2 depending on whether we're starting without or with a
634 shell. */
635 startup_inferior (START_INFERIOR_TRAPS_EXPECTED);
636
637 /* On some targets, there must be some explicit actions taken after
638 the inferior has been started up. */
639 target_post_startup_inferior (pid_to_ptid (pid));
640}
641
642static void
643inf_ttrace_create_inferior (char *exec_file, char *allargs, char **env,
644 int from_tty)
645{
a7be7fa8
MK
646 gdb_assert (inf_ttrace_num_lwps == 0);
647 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
932936f0 648 gdb_assert (inf_ttrace_page_dict.count == 0);
932936f0 649 gdb_assert (inf_ttrace_reenable_page_protections == 0);
b2a4db28 650 gdb_assert (inf_ttrace_vfork_ppid == -1);
932936f0 651
eee22bf8
MK
652 fork_inferior (exec_file, allargs, env, inf_ttrace_me, inf_ttrace_him,
653 inf_ttrace_prepare, NULL);
eee22bf8
MK
654}
655
eee22bf8
MK
656static void
657inf_ttrace_mourn_inferior (void)
658{
932936f0
MK
659 const int num_buckets = ARRAY_SIZE (inf_ttrace_page_dict.buckets);
660 int bucket;
661
a7be7fa8
MK
662 inf_ttrace_num_lwps = 0;
663 inf_ttrace_num_lwps_in_syscall = 0;
932936f0
MK
664
665 for (bucket = 0; bucket < num_buckets; bucket++)
666 {
667 struct inf_ttrace_page *page;
668 struct inf_ttrace_page *next;
669
670 page = inf_ttrace_page_dict.buckets[bucket].next;
671 while (page)
672 {
673 next = page->next;
674 xfree (page);
675 page = next;
676 }
677 }
678 inf_ttrace_page_dict.count = 0;
679
eee22bf8
MK
680 unpush_target (ttrace_ops_hack);
681 generic_mourn_inferior ();
682}
683
684static void
685inf_ttrace_attach (char *args, int from_tty)
686{
687 char *exec_file;
688 pid_t pid;
689 char *dummy;
932936f0 690 ttevent_t tte;
eee22bf8
MK
691
692 if (!args)
a3f17187 693 error_no_arg (_("process-id to attach"));
eee22bf8
MK
694
695 dummy = args;
696 pid = strtol (args, &dummy, 0);
697 if (pid == 0 && args == dummy)
8a3fe4f8 698 error (_("Illegal process-id: %s."), args);
eee22bf8
MK
699
700 if (pid == getpid ()) /* Trying to masturbate? */
8a3fe4f8 701 error (_("I refuse to debug myself!"));
eee22bf8
MK
702
703 if (from_tty)
704 {
346e281c 705 exec_file = get_exec_file (0);
eee22bf8
MK
706
707 if (exec_file)
a3f17187 708 printf_unfiltered (_("Attaching to program: %s, %s\n"), exec_file,
eee22bf8
MK
709 target_pid_to_str (pid_to_ptid (pid)));
710 else
a3f17187 711 printf_unfiltered (_("Attaching to %s\n"),
eee22bf8
MK
712 target_pid_to_str (pid_to_ptid (pid)));
713
714 gdb_flush (gdb_stdout);
715 }
716
a7be7fa8
MK
717 gdb_assert (inf_ttrace_num_lwps == 0);
718 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
b2a4db28 719 gdb_assert (inf_ttrace_vfork_ppid == -1);
a7be7fa8 720
eee22bf8 721 if (ttrace (TT_PROC_ATTACH, pid, 0, TT_KILL_ON_EXIT, TT_VERSION, 0) == -1)
e2e0b3e5 722 perror_with_name (("ttrace"));
eee22bf8
MK
723 attach_flag = 1;
724
932936f0 725 /* Set the initial event mask. */
932936f0 726 memset (&tte, 0, sizeof (tte));
b2a4db28 727 tte.tte_events |= TTEVT_EXEC | TTEVT_EXIT | TTEVT_FORK | TTEVT_VFORK;
a7be7fa8 728 tte.tte_events |= TTEVT_LWP_CREATE | TTEVT_LWP_EXIT | TTEVT_LWP_TERMINATE;
7ba0e0c2
MK
729#ifdef TTEVT_BPT_SSTEP
730 tte.tte_events |= TTEVT_BPT_SSTEP;
731#endif
b2a4db28 732 tte.tte_opts |= TTEO_PROC_INHERIT;
932936f0
MK
733 if (ttrace (TT_PROC_SET_EVENT_MASK, pid, 0,
734 (uintptr_t)&tte, sizeof tte, 0) == -1)
e2e0b3e5 735 perror_with_name (("ttrace"));
932936f0 736
eee22bf8 737 push_target (ttrace_ops_hack);
2935f27f
PA
738
739 /* We'll bump inf_ttrace_num_lwps up and add the private data to the
740 thread as soon as we get to inf_ttrace_wait. At this point, we
741 don't have lwpid info yet. */
742 inferior_ptid = pid_to_ptid (pid);
743 add_thread_silent (inferior_ptid);
eee22bf8
MK
744}
745
746static void
747inf_ttrace_detach (char *args, int from_tty)
748{
eee22bf8 749 pid_t pid = ptid_get_pid (inferior_ptid);
5d426ff1 750 int sig = 0;
eee22bf8
MK
751
752 if (from_tty)
753 {
754 char *exec_file = get_exec_file (0);
755 if (exec_file == 0)
756 exec_file = "";
a3f17187 757 printf_unfiltered (_("Detaching from program: %s, %s\n"), exec_file,
eee22bf8
MK
758 target_pid_to_str (pid_to_ptid (pid)));
759 gdb_flush (gdb_stdout);
760 }
761 if (args)
762 sig = atoi (args);
763
764 /* ??? The HP-UX 11.0 ttrace(2) manual page doesn't mention that we
765 can pass a signal number here. Does this really work? */
766 if (ttrace (TT_PROC_DETACH, pid, 0, 0, sig, 0) == -1)
e2e0b3e5 767 perror_with_name (("ttrace"));
eee22bf8 768
b2a4db28
MK
769 if (inf_ttrace_vfork_ppid != -1)
770 {
771 if (ttrace (TT_PROC_DETACH, inf_ttrace_vfork_ppid, 0, 0, 0, 0) == -1)
772 perror_with_name (("ttrace"));
773 inf_ttrace_vfork_ppid = -1;
774 }
775
a7be7fa8
MK
776 inf_ttrace_num_lwps = 0;
777 inf_ttrace_num_lwps_in_syscall = 0;
932936f0 778
eee22bf8 779 unpush_target (ttrace_ops_hack);
932936f0 780 inferior_ptid = null_ptid;
eee22bf8
MK
781}
782
346e281c
MK
783static void
784inf_ttrace_kill (void)
785{
786 pid_t pid = ptid_get_pid (inferior_ptid);
787
788 if (pid == 0)
789 return;
790
791 if (ttrace (TT_PROC_EXIT, pid, 0, 0, 0, 0) == -1)
792 perror_with_name (("ttrace"));
793 /* ??? Is it necessary to call ttrace_wait() here? */
794
795 if (inf_ttrace_vfork_ppid != -1)
796 {
797 if (ttrace (TT_PROC_DETACH, inf_ttrace_vfork_ppid, 0, 0, 0, 0) == -1)
798 perror_with_name (("ttrace"));
799 inf_ttrace_vfork_ppid = -1;
800 }
801
802 target_mourn_inferior ();
803}
804
438ac09b
PA
805/* Check is a dying thread is dead by now, and delete it from GDBs
806 thread list if so. */
7ba0e0c2 807static int
438ac09b 808inf_ttrace_delete_dead_threads_callback (struct thread_info *info, void *arg)
7ba0e0c2 809{
438ac09b
PA
810 lwpid_t lwpid;
811 struct inf_ttrace_private_thread_info *p;
7ba0e0c2 812
438ac09b
PA
813 if (is_exited (info->ptid))
814 return 0;
815
816 lwpid = ptid_get_lwp (info->ptid);
817 p = (struct inf_ttrace_private_thread_info *) info->private;
818
819 /* Check if an lwp that was dying is still there or not. */
820 if (p->dying && (kill (lwpid, 0) == -1))
821 /* It's gone now. */
822 delete_thread (info->ptid);
7ba0e0c2
MK
823
824 return 0;
825}
826
438ac09b
PA
827/* Resume the lwp pointed to by INFO, with REQUEST, and pass it signal
828 SIG. */
829
830static void
831inf_ttrace_resume_lwp (struct thread_info *info, ttreq_t request, int sig)
832{
833 pid_t pid = ptid_get_pid (info->ptid);
834 lwpid_t lwpid = ptid_get_lwp (info->ptid);
835
836 if (ttrace (request, pid, lwpid, TT_NOPC, sig, 0) == -1)
837 {
838 struct inf_ttrace_private_thread_info *p
839 = (struct inf_ttrace_private_thread_info *) info->private;
840 if (p->dying && errno == EPROTO)
841 /* This is expected, it means the dying lwp is really gone
842 by now. If ttrace had an event to inform the debugger
843 the lwp is really gone, this wouldn't be needed. */
844 delete_thread (info->ptid);
845 else
846 /* This was really unexpected. */
847 perror_with_name (("ttrace"));
848 }
849}
850
851/* Callback for iterate_over_threads. */
852
60e2c248 853static int
438ac09b 854inf_ttrace_resume_callback (struct thread_info *info, void *arg)
60e2c248 855{
438ac09b
PA
856 if (!ptid_equal (info->ptid, inferior_ptid) && !is_exited (info->ptid))
857 inf_ttrace_resume_lwp (info, TT_LWP_CONTINUE, 0);
858
60e2c248
JG
859 return 0;
860}
861
eee22bf8
MK
862static void
863inf_ttrace_resume (ptid_t ptid, int step, enum target_signal signal)
864{
438ac09b 865 int resume_all;
eee22bf8
MK
866 ttreq_t request = step ? TT_LWP_SINGLE : TT_LWP_CONTINUE;
867 int sig = target_signal_to_host (signal);
438ac09b 868 struct thread_info *info;
eee22bf8 869
438ac09b
PA
870 /* A specific PTID means `step only this process id'. */
871 resume_all = (ptid_equal (ptid, minus_one_ptid));
eee22bf8 872
438ac09b
PA
873 /* If resuming all threads, it's the current thread that should be
874 handled specially. */
875 if (resume_all)
876 ptid = inferior_ptid;
eee22bf8 877
438ac09b
PA
878 info = thread_find_pid (ptid);
879 inf_ttrace_resume_lwp (info, request, sig);
880
881 if (resume_all)
882 /* Let all the other threads run too. */
883 iterate_over_threads (inf_ttrace_resume_callback, NULL);
eee22bf8
MK
884}
885
886static ptid_t
887inf_ttrace_wait (ptid_t ptid, struct target_waitstatus *ourstatus)
888{
889 pid_t pid = ptid_get_pid (ptid);
890 lwpid_t lwpid = ptid_get_lwp (ptid);
891 ttstate_t tts;
60e2c248 892 struct thread_info *ti;
3a3e9ee3 893 ptid_t related_ptid;
eee22bf8 894
932936f0 895 /* Until proven otherwise. */
a7be7fa8 896 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
eee22bf8
MK
897
898 if (pid == -1)
b2a4db28 899 pid = lwpid = 0;
eee22bf8 900
b2a4db28 901 gdb_assert (pid != 0 || lwpid == 0);
eee22bf8
MK
902
903 do
904 {
905 set_sigint_trap ();
906 set_sigio_trap ();
907
908 if (ttrace_wait (pid, lwpid, TTRACE_WAITOK, &tts, sizeof tts) == -1)
a3f17187 909 perror_with_name (("ttrace_wait"));
eee22bf8 910
b2a4db28
MK
911 if (tts.tts_event == TTEVT_VFORK && tts.tts_u.tts_fork.tts_isparent)
912 {
913 if (inf_ttrace_vfork_ppid != -1)
914 {
915 gdb_assert (inf_ttrace_vfork_ppid == tts.tts_pid);
916
917 if (ttrace (TT_PROC_DETACH, tts.tts_pid, 0, 0, 0, 0) == -1)
918 perror_with_name (("ttrace"));
919 inf_ttrace_vfork_ppid = -1;
920 }
921
922 tts.tts_event = TTEVT_NONE;
923 }
924
eee22bf8
MK
925 clear_sigio_trap ();
926 clear_sigint_trap ();
927 }
928 while (tts.tts_event == TTEVT_NONE);
929
932936f0
MK
930 /* Now that we've waited, we can re-enable the page protections. */
931 if (inf_ttrace_reenable_page_protections)
932 {
a7be7fa8 933 gdb_assert (inf_ttrace_num_lwps_in_syscall == 0);
932936f0
MK
934 inf_ttrace_enable_page_protections (tts.tts_pid);
935 inf_ttrace_reenable_page_protections = 0;
936 }
937
a7be7fa8
MK
938 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
939
2935f27f
PA
940 if (inf_ttrace_num_lwps == 0)
941 {
942 struct thread_info *ti;
943
944 inf_ttrace_num_lwps = 1;
945
946 /* This is the earliest we hear about the lwp member of
947 INFERIOR_PTID, after an attach or fork_inferior. */
948 gdb_assert (ptid_get_lwp (inferior_ptid) == 0);
949
950 /* We haven't set the private member on the main thread yet. Do
951 it now. */
952 ti = find_thread_pid (inferior_ptid);
953 gdb_assert (ti != NULL && ti->private == NULL);
954 ti->private =
955 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
956 memset (ti->private, 0,
957 sizeof (struct inf_ttrace_private_thread_info));
958
959 /* Notify the core that this ptid changed. This changes
960 inferior_ptid as well. */
961 thread_change_ptid (inferior_ptid, ptid);
962 }
963
eee22bf8
MK
964 switch (tts.tts_event)
965 {
7ba0e0c2
MK
966#ifdef TTEVT_BPT_SSTEP
967 case TTEVT_BPT_SSTEP:
968 /* Make it look like a breakpoint. */
969 ourstatus->kind = TARGET_WAITKIND_STOPPED;
970 ourstatus->value.sig = TARGET_SIGNAL_TRAP;
971 break;
972#endif
973
eee22bf8 974 case TTEVT_EXEC:
5d426ff1
MK
975 ourstatus->kind = TARGET_WAITKIND_EXECD;
976 ourstatus->value.execd_pathname =
977 xmalloc (tts.tts_u.tts_exec.tts_pathlen + 1);
978 if (ttrace (TT_PROC_GET_PATHNAME, tts.tts_pid, 0,
979 (uintptr_t)ourstatus->value.execd_pathname,
980 tts.tts_u.tts_exec.tts_pathlen, 0) == -1)
981 perror_with_name (("ttrace"));
982 ourstatus->value.execd_pathname[tts.tts_u.tts_exec.tts_pathlen] = 0;
25b22b0a
PA
983
984 /* At this point, all inserted breakpoints are gone. Doing this
985 as soon as we detect an exec prevents the badness of deleting
986 a breakpoint writing the current "shadow contents" to lift
987 the bp. That shadow is NOT valid after an exec. */
988 mark_breakpoints_out ();
eee22bf8 989 break;
932936f0 990
eee22bf8
MK
991 case TTEVT_EXIT:
992 store_waitstatus (ourstatus, tts.tts_u.tts_exit.tts_exitcode);
a7be7fa8
MK
993 inf_ttrace_num_lwps = 0;
994 break;
995
b2a4db28 996 case TTEVT_FORK:
3a3e9ee3
PA
997 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
998 tts.tts_u.tts_fork.tts_flwpid, 0);
999
b2a4db28 1000 ourstatus->kind = TARGET_WAITKIND_FORKED;
3a3e9ee3 1001 ourstatus->value.related_pid = related_ptid;
b2a4db28
MK
1002
1003 /* Make sure the other end of the fork is stopped too. */
1004 if (ttrace_wait (tts.tts_u.tts_fork.tts_fpid,
1005 tts.tts_u.tts_fork.tts_flwpid,
1006 TTRACE_WAITOK, &tts, sizeof tts) == -1)
1007 perror_with_name (("ttrace_wait"));
1008
1009 gdb_assert (tts.tts_event == TTEVT_FORK);
1010 if (tts.tts_u.tts_fork.tts_isparent)
1011 {
3a3e9ee3
PA
1012 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
1013 tts.tts_u.tts_fork.tts_flwpid, 0);
b2a4db28 1014 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
3a3e9ee3 1015 ourstatus->value.related_pid = related_ptid;
b2a4db28
MK
1016 }
1017 break;
1018
1019 case TTEVT_VFORK:
1020 gdb_assert (!tts.tts_u.tts_fork.tts_isparent);
1021
3a3e9ee3
PA
1022 related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid,
1023 tts.tts_u.tts_fork.tts_flwpid, 0);
1024
b2a4db28 1025 ourstatus->kind = TARGET_WAITKIND_VFORKED;
3a3e9ee3 1026 ourstatus->value.related_pid = related_ptid;
b2a4db28
MK
1027
1028 /* HACK: To avoid touching the parent during the vfork, switch
1029 away from it. */
1030 inferior_ptid = ptid;
1031 break;
1032
a7be7fa8
MK
1033 case TTEVT_LWP_CREATE:
1034 lwpid = tts.tts_u.tts_thread.tts_target_lwpid;
1035 ptid = ptid_build (tts.tts_pid, lwpid, 0);
60e2c248
JG
1036 ti = add_thread (ptid);
1037 ti->private =
1038 xmalloc (sizeof (struct inf_ttrace_private_thread_info));
1039 memset (ti->private, 0,
1040 sizeof (struct inf_ttrace_private_thread_info));
a7be7fa8
MK
1041 inf_ttrace_num_lwps++;
1042 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
1043 break;
1044
1045 case TTEVT_LWP_EXIT:
17faa917
DJ
1046 if (print_thread_events)
1047 printf_unfiltered (_("[%s exited]\n"), target_pid_to_str (ptid));
60e2c248
JG
1048 ti = find_thread_pid (ptid);
1049 gdb_assert (ti != NULL);
1050 ((struct inf_ttrace_private_thread_info *)ti->private)->dying = 1;
a7be7fa8 1051 inf_ttrace_num_lwps--;
60e2c248
JG
1052 ttrace (TT_LWP_CONTINUE, ptid_get_pid (ptid),
1053 ptid_get_lwp (ptid), TT_NOPC, 0, 0);
a7be7fa8
MK
1054 /* If we don't return -1 here, core GDB will re-add the thread. */
1055 ptid = minus_one_ptid;
1056 break;
1057
1058 case TTEVT_LWP_TERMINATE:
1059 lwpid = tts.tts_u.tts_thread.tts_target_lwpid;
1060 ptid = ptid_build (tts.tts_pid, lwpid, 0);
a3f17187 1061 printf_filtered(_("[%s has been terminated]\n"), target_pid_to_str (ptid));
60e2c248
JG
1062 ti = find_thread_pid (ptid);
1063 gdb_assert (ti != NULL);
1064 ((struct inf_ttrace_private_thread_info *)ti->private)->dying = 1;
a7be7fa8
MK
1065 inf_ttrace_num_lwps--;
1066 ptid = ptid_build (tts.tts_pid, tts.tts_lwpid, 0);
eee22bf8 1067 break;
932936f0 1068
eee22bf8
MK
1069 case TTEVT_SIGNAL:
1070 ourstatus->kind = TARGET_WAITKIND_STOPPED;
1071 ourstatus->value.sig =
1072 target_signal_from_host (tts.tts_u.tts_signal.tts_signo);
1073 break;
932936f0
MK
1074
1075 case TTEVT_SYSCALL_ENTRY:
1076 gdb_assert (inf_ttrace_reenable_page_protections == 0);
a7be7fa8
MK
1077 inf_ttrace_num_lwps_in_syscall++;
1078 if (inf_ttrace_num_lwps_in_syscall == 1)
932936f0
MK
1079 {
1080 /* A thread has just entered a system call. Disable any
1081 page protections as the kernel can't deal with them. */
1082 inf_ttrace_disable_page_protections (tts.tts_pid);
1083 }
1084 ourstatus->kind = TARGET_WAITKIND_SYSCALL_ENTRY;
1085 ourstatus->value.syscall_id = tts.tts_scno;
1086 break;
1087
1088 case TTEVT_SYSCALL_RETURN:
a7be7fa8 1089 if (inf_ttrace_num_lwps_in_syscall > 0)
932936f0
MK
1090 {
1091 /* If the last thread has just left the system call, this
1092 would be a logical place to re-enable the page
1093 protections, but that doesn't work. We can't re-enable
1094 them until we've done another wait. */
1095 inf_ttrace_reenable_page_protections =
a7be7fa8
MK
1096 (inf_ttrace_num_lwps_in_syscall == 1);
1097 inf_ttrace_num_lwps_in_syscall--;
932936f0
MK
1098 }
1099 ourstatus->kind = TARGET_WAITKIND_SYSCALL_RETURN;
1100 ourstatus->value.syscall_id = tts.tts_scno;
1101 break;
a7be7fa8
MK
1102
1103 default:
1104 gdb_assert (!"Unexpected ttrace event");
1105 break;
eee22bf8
MK
1106 }
1107
1108 /* Make sure all threads within the process are stopped. */
1109 if (ttrace (TT_PROC_STOP, tts.tts_pid, 0, 0, 0, 0) == -1)
e2e0b3e5 1110 perror_with_name (("ttrace"));
eee22bf8 1111
438ac09b
PA
1112 /* Now that the whole process is stopped, check if any dying thread
1113 is really dead by now. If a dying thread is still alive, it will
1114 be stopped too, and will still show up in `info threads', tagged
1115 with "(Exiting)". We could make `info threads' prune dead
1116 threads instead via inf_ttrace_thread_alive, but doing this here
1117 has the advantage that a frontend is notificed sooner of thread
1118 exits. Note that a dying lwp is still alive, it still has to be
1119 resumed, like any other lwp. */
1120 iterate_over_threads (inf_ttrace_delete_dead_threads_callback, NULL);
1121
a7be7fa8 1122 return ptid;
eee22bf8
MK
1123}
1124
1125/* Transfer LEN bytes from ADDR in the inferior's memory into READBUF,
1126 and transfer LEN bytes from WRITEBUF into the inferior's memory at
1127 ADDR. Either READBUF or WRITEBUF may be null, in which case the
1128 corresponding transfer doesn't happen. Return the number of bytes
1129 actually transferred (which may be zero if an error occurs). */
1130
1131static LONGEST
1132inf_ttrace_xfer_memory (CORE_ADDR addr, ULONGEST len,
1133 void *readbuf, const void *writebuf)
1134{
1135 pid_t pid = ptid_get_pid (inferior_ptid);
1136
1137 /* HP-UX treats text space and data space differently. GDB however,
1138 doesn't really know the difference. Therefore we try both. Try
1139 text space before data space though because when we're writing
1140 into text space the instruction cache might need to be flushed. */
1141
1142 if (readbuf
1143 && ttrace (TT_PROC_RDTEXT, pid, 0, addr, len, (uintptr_t)readbuf) == -1
1144 && ttrace (TT_PROC_RDDATA, pid, 0, addr, len, (uintptr_t)readbuf) == -1)
1145 return 0;
1146
1147 if (writebuf
1148 && ttrace (TT_PROC_WRTEXT, pid, 0, addr, len, (uintptr_t)writebuf) == -1
1149 && ttrace (TT_PROC_WRDATA, pid, 0, addr, len, (uintptr_t)writebuf) == -1)
1150 return 0;
1151
1152 return len;
1153}
1154
1155static LONGEST
1156inf_ttrace_xfer_partial (struct target_ops *ops, enum target_object object,
7a4609f7
MK
1157 const char *annex, gdb_byte *readbuf,
1158 const gdb_byte *writebuf, ULONGEST offset, LONGEST len)
eee22bf8
MK
1159{
1160 switch (object)
1161 {
1162 case TARGET_OBJECT_MEMORY:
1163 return inf_ttrace_xfer_memory (offset, len, readbuf, writebuf);
1164
1165 case TARGET_OBJECT_UNWIND_TABLE:
1166 return -1;
1167
1168 case TARGET_OBJECT_AUXV:
1169 return -1;
1170
1171 case TARGET_OBJECT_WCOOKIE:
1172 return -1;
1173
1174 default:
1175 return -1;
1176 }
1177}
1178
1179/* Print status information about what we're accessing. */
1180
1181static void
1182inf_ttrace_files_info (struct target_ops *ignore)
1183{
346e281c
MK
1184 printf_filtered (_("\tUsing the running image of %s %s.\n"),
1185 attach_flag ? "attached" : "child",
1186 target_pid_to_str (inferior_ptid));
eee22bf8 1187}
a7be7fa8
MK
1188
1189static int
1190inf_ttrace_thread_alive (ptid_t ptid)
1191{
438ac09b
PA
1192 return 1;
1193}
1194
1195/* Return a string describing the state of the thread specified by
1196 INFO. */
1197
1198static char *
1199inf_ttrace_extra_thread_info (struct thread_info *info)
1200{
1201 struct inf_ttrace_private_thread_info* private =
1202 (struct inf_ttrace_private_thread_info *) info->private;
1203
1204 if (private != NULL && private->dying)
1205 return "Exiting";
1206
1207 return NULL;
a7be7fa8
MK
1208}
1209
1210static char *
1211inf_ttrace_pid_to_str (ptid_t ptid)
1212{
2935f27f
PA
1213 pid_t pid = ptid_get_pid (ptid);
1214 lwpid_t lwpid = ptid_get_lwp (ptid);
1215 static char buf[128];
a7be7fa8 1216
2935f27f
PA
1217 if (lwpid == 0)
1218 xsnprintf (buf, sizeof buf, "process %ld",
1219 (long) pid);
1220 else
1221 xsnprintf (buf, sizeof buf, "process %ld, lwp %ld",
1222 (long) pid, (long) lwpid);
1223 return buf;
a7be7fa8 1224}
eee22bf8
MK
1225\f
1226
1227struct target_ops *
1228inf_ttrace_target (void)
1229{
1230 struct target_ops *t = inf_child_target ();
1231
eee22bf8
MK
1232 t->to_attach = inf_ttrace_attach;
1233 t->to_detach = inf_ttrace_detach;
1234 t->to_resume = inf_ttrace_resume;
1235 t->to_wait = inf_ttrace_wait;
eee22bf8 1236 t->to_files_info = inf_ttrace_files_info;
932936f0 1237 t->to_can_use_hw_breakpoint = inf_ttrace_can_use_hw_breakpoint;
932936f0
MK
1238 t->to_insert_watchpoint = inf_ttrace_insert_watchpoint;
1239 t->to_remove_watchpoint = inf_ttrace_remove_watchpoint;
1240 t->to_stopped_by_watchpoint = inf_ttrace_stopped_by_watchpoint;
2a3cdf79
WZ
1241 t->to_region_ok_for_hw_watchpoint =
1242 inf_ttrace_region_ok_for_hw_watchpoint;
346e281c
MK
1243 t->to_kill = inf_ttrace_kill;
1244 t->to_create_inferior = inf_ttrace_create_inferior;
1245 t->to_follow_fork = inf_ttrace_follow_fork;
1246 t->to_mourn_inferior = inf_ttrace_mourn_inferior;
1247 t->to_thread_alive = inf_ttrace_thread_alive;
438ac09b 1248 t->to_extra_thread_info = inf_ttrace_extra_thread_info;
346e281c
MK
1249 t->to_pid_to_str = inf_ttrace_pid_to_str;
1250 t->to_xfer_partial = inf_ttrace_xfer_partial;
eee22bf8
MK
1251
1252 ttrace_ops_hack = t;
1253 return t;
1254}
d3322e8a 1255#endif
932936f0
MK
1256\f
1257
1258/* Prevent warning from -Wmissing-prototypes. */
1259void _initialize_hppa_hpux_nat (void);
eee22bf8 1260
932936f0
MK
1261void
1262_initialize_inf_ttrace (void)
1263{
d3322e8a 1264#ifdef HAVE_TTRACE
932936f0 1265 inf_ttrace_page_dict.pagesize = getpagesize();
eee22bf8 1266#endif
d3322e8a 1267}
This page took 0.787147 seconds and 4 git commands to generate.