From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 19729 invoked by alias); 26 Sep 2014 18:13:28 -0000 Mailing-List: contact gdb-patches-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-patches-owner@sourceware.org Received: (qmail 19720 invoked by uid 89); 26 Sep 2014 18:13:28 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-2.3 required=5.0 tests=AWL,BAYES_00,RP_MATCHES_RCVD,SPF_HELO_PASS,SPF_PASS autolearn=ham version=3.3.2 X-HELO: mx1.redhat.com Received: from mx1.redhat.com (HELO mx1.redhat.com) (209.132.183.28) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with (AES256-GCM-SHA384 encrypted) ESMTPS; Fri, 26 Sep 2014 18:13:24 +0000 Received: from int-mx10.intmail.prod.int.phx2.redhat.com (int-mx10.intmail.prod.int.phx2.redhat.com [10.5.11.23]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id s8QIDLE8015093 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Fri, 26 Sep 2014 14:13:21 -0400 Received: from [127.0.0.1] (ovpn01.gateway.prod.ext.ams2.redhat.com [10.39.146.11]) by int-mx10.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id s8QIDJ4n006180; Fri, 26 Sep 2014 14:13:20 -0400 Message-ID: <5425ACBF.7080800@redhat.com> Date: Fri, 26 Sep 2014 18:13:00 -0000 From: Pedro Alves User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.1.0 MIME-Version: 1.0 To: "Breazeal, Don" , gdb-patches@sourceware.org Subject: Re: [PATCH 01/16 v2] Refactor native follow-fork References: <1407434395-19089-1-git-send-email-donb@codesourcery.com> <1408580964-27916-2-git-send-email-donb@codesourcery.com> <5409C69F.8030906@redhat.com> <540E41C5.2000600@codesourcery.com> <540EDFFE.4090703@redhat.com> <54132443.5060602@codesourcery.com> In-Reply-To: <54132443.5060602@codesourcery.com> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit X-SW-Source: 2014-09/txt/msg00796.txt.bz2 On 09/12/2014 05:50 PM, Breazeal, Don wrote: > On 9/9/2014 4:09 AM, Pedro Alves wrote: >> On 09/09/2014 12:54 AM, Breazeal, Don wrote: >> I'd rather not. That'll just add more technical debt. :-) E.g., >> if we can't model this on the few native targets we have, then that'd >> indicate that remote debugging against one of those targets (when >> we get to gdb/gdbserver parity), wouldn't be correctly modelled, as >> you'd be installing those methods in remote.c too. Plus, if we have >> target_follow_fork_inferior as an extra method in addition >> to target_follow_fork_inferior, and both are always called in >> succession, then we might as well _not_ introduce a new target hook, >> and just call infrun_follow_fork_inferior from the >> top of linux-nat.c:linux_child_follow_fork, and the top of whatever >> other target's to_follow_fork method that wants to use it. > > I've made modifications to inf_ttrace_follow_fork, inf_ttrace_wait, > and inf_ptrace_follow_fork in the included patch that I think should > allow them to work with follow_fork_inferior. Some other adjustments > were necessary in inf-ttrace.c. Some of the changes weren't strictly > necessary to get things working with follow_fork_inferior, but it > seemed appropriate to make all the implementations more consistent. Thanks. >>> The changes to inf_ptrace_follow_fork to get it to work with >>> follow_fork_inferior are straightforward. Making those changes to >>> inf_ttrace_follow_fork is problematic, primarily because it handles the >>> moral equivalent of the vfork-done event differently. >> >> Can you summarize the differences ? > > HP-UX apparently delivers a TTEVT_VFORK event for the parent inferior > where Linux would report PTRACE_EVENT_VFORK_DONE -- when the child > process has either execd or exited. inf_ttrace_follow_fork was handling > the parent VFORK event in-line, where the Linux implementation expects > a TARGET_WAITKIND_VFORK_DONE event to be reported so it can be handled > in the generic event code. > Right. Linux also used to handle that in-line, before 6c95b8df. > I've included annotated versions of the original implementations of > inf_ttrace_follow_fork and inf-ptrace_follow_fork below for reference, > to explain how I made decisions on the changes. Each annotation is > a comment beginning with "BLOCK n". If you want to skip past all of > that you can just search for "Don". :-) Excellent. That sure made it easier. >> > > My assumptions about how HP-UX ttrace events work: > - FORK: > - TTEVT_FORK is reported for both the parent and child processes. > The event can be reported for the parent or child in any order. > > - VFORK: > - TTEVT_VFORK is reported for both the parent and child > processes. > - TTEVT_VFORK is reported for the child first. It is reported > for the parent when the vfork is "done" as with the Linux > PTRACE_EVENT_VFORK_DONE event, meaning that the parent has > called exec or exited. See this comment in inf_ttrace_follow_fork: > > /* Wait till we get the TTEVT_VFORK event in the parent. > This indicates that the child has called exec(3) or has > exited and that the parent is ready to be traced again. */ > > The online HP-UX ttrace documentation doesn't really make this > ordering explicit, but it doesn't contradict the implementation. Yeah, I can't imagine any way a TTEVT_VFORK could ever be reported to the parent first. When the parent vforks, it blocks until the child execs or exits. And the child won't do that until GDB resumes the child after handling the TTEVT_VFORK that is reported for the child. So the kernel must always report the child's TTEVT_VFORK first. > if (follow_child) > { > struct thread_info *ti; > @@ -533,17 +423,22 @@ inf_ttrace_follow_fork (struct target_ops *ops, > int follow_child, > inf_ttrace_num_lwps = 1; > inf_ttrace_num_lwps_in_syscall = 0; > > - /* Delete parent. */ > - delete_thread_silent (ptid_build (pid, lwpid, 0)); > - detach_inferior (pid); > - > - /* Add child thread. inferior_ptid was already set above. */ > - ti = add_thread_silent (inferior_ptid); > + ti = find_thread_ptid (inferior_ptid); > + gdb_assert (ti != NULL); Replace these with: ti = inferior_thread (); > ti->private = > xmalloc (sizeof (struct inf_ttrace_private_thread_info)); > memset (ti->private, 0, > sizeof (struct inf_ttrace_private_thread_info)); > } > + else > + { > + pid_t child_pid; > + > + /* Following parent. Detach child now. */ > + child_pid = ptid_get_pid (tp->pending_follow.value.related_pid); > + if (ttrace (TT_PROC_DETACH, child_pid, 0, 0, 0, 0) == -1) > + perror_with_name (("ttrace")); > + } > > return 0; > } > @@ -661,7 +556,6 @@ inf_ttrace_create_inferior (struct target_ops *ops, > char *exec_file, > gdb_assert (inf_ttrace_num_lwps_in_syscall == 0); > gdb_assert (inf_ttrace_page_dict.count == 0); > gdb_assert (inf_ttrace_reenable_page_protections == 0); > - gdb_assert (inf_ttrace_vfork_ppid == -1); > > pid = fork_inferior (exec_file, allargs, env, inf_ttrace_me, NULL, > inf_ttrace_prepare, NULL, NULL); > @@ -772,7 +666,6 @@ inf_ttrace_attach (struct target_ops *ops, const > char *args, int from_tty) > > gdb_assert (inf_ttrace_num_lwps == 0); > gdb_assert (inf_ttrace_num_lwps_in_syscall == 0); > - gdb_assert (inf_ttrace_vfork_ppid == -1); > > if (ttrace (TT_PROC_ATTACH, pid, 0, TT_KILL_ON_EXIT, TT_VERSION, 0) > == -1) > perror_with_name (("ttrace")); > @@ -822,11 +715,12 @@ inf_ttrace_detach (struct target_ops *ops, const > char *args, int from_tty) > if (ttrace (TT_PROC_DETACH, pid, 0, 0, sig, 0) == -1) > perror_with_name (("ttrace")); > > - if (inf_ttrace_vfork_ppid != -1) > + if (current_inferior ()->vfork_parent != NULL) > { > - if (ttrace (TT_PROC_DETACH, inf_ttrace_vfork_ppid, 0, 0, 0, 0) == -1) > + pid_t ppid = current_inferior ()->vfork_parent->pid; > + if (ttrace (TT_PROC_DETACH, ppid, 0, 0, 0, 0) == -1) > perror_with_name (("ttrace")); > - inf_ttrace_vfork_ppid = -1; > + detach_inferior (ppid); > } I think we should just delete this block instead. We shouldn't be blindly detaching from the parent here. The user may well still want to debug it. The case of the user doing "detach" on the child when the parent is waiting for the the vfork-done should be handled by common code. (and we should be going through the whole target_detach). > > inf_ttrace_num_lwps = 0; > @@ -850,11 +744,12 @@ inf_ttrace_kill (struct target_ops *ops) > perror_with_name (("ttrace")); > /* ??? Is it necessary to call ttrace_wait() here? */ > > - if (inf_ttrace_vfork_ppid != -1) > + if (current_inferior ()->vfork_parent != NULL) > { > - if (ttrace (TT_PROC_DETACH, inf_ttrace_vfork_ppid, 0, 0, 0, 0) == -1) > + pid_t ppid = current_inferior ()->vfork_parent->pid; > + if (ttrace (TT_PROC_DETACH, ppid, 0, 0, 0, 0) == -1) > perror_with_name (("ttrace")); > - inf_ttrace_vfork_ppid = -1; > + detach_inferior (ppid); > } This too. > > target_mourn_inferior (); > @@ -967,20 +862,6 @@ inf_ttrace_wait (struct target_ops *ops, > if (ttrace_wait (pid, lwpid, TTRACE_WAITOK, &tts, sizeof tts) == -1) > perror_with_name (("ttrace_wait")); > > - if (tts.tts_event == TTEVT_VFORK && tts.tts_u.tts_fork.tts_isparent) > - { > - if (inf_ttrace_vfork_ppid != -1) > - { > - gdb_assert (inf_ttrace_vfork_ppid == tts.tts_pid); > - > - if (ttrace (TT_PROC_DETACH, tts.tts_pid, 0, 0, 0, 0) == -1) > - perror_with_name (("ttrace")); > - inf_ttrace_vfork_ppid = -1; > - } > - > - tts.tts_event = TTEVT_NONE; > - } > - > clear_sigint_trap (); > } > while (tts.tts_event == TTEVT_NONE); > @@ -1075,17 +956,23 @@ inf_ttrace_wait (struct target_ops *ops, > break; > > case TTEVT_VFORK: > - gdb_assert (!tts.tts_u.tts_fork.tts_isparent); > - > - related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid, > - tts.tts_u.tts_fork.tts_flwpid, 0); > + if (tts.tts_u.tts_fork.tts_isparent) > + { > + if (current_inferior ()->waiting_fork_vfork_done) I don't think we should have this waiting_fork_vfork_done check here. This should always be a TARGET_WAITKIND_VFORK_DONE? > + ourstatus->kind = TARGET_WAITKIND_VFORK_DONE; > + } > + else > + { > + related_ptid = ptid_build (tts.tts_u.tts_fork.tts_fpid, > + tts.tts_u.tts_fork.tts_flwpid, 0); > > - ourstatus->kind = TARGET_WAITKIND_VFORKED; > - ourstatus->value.related_pid = related_ptid; > + ourstatus->kind = TARGET_WAITKIND_VFORKED; > + ourstatus->value.related_pid = related_ptid; > > - /* HACK: To avoid touching the parent during the vfork, switch > - away from it. */ > - inferior_ptid = ptid; > + /* HACK: To avoid touching the parent during the vfork, switch > + away from it. */ > + inferior_ptid = ptid; The core is now aware of the vfork parent inferior. Just delete this hack. > + } > break; > > case TTEVT_LWP_CREATE: > diff --git a/gdb/infrun.c b/gdb/infrun.c > index c18267f..af9cbf8 100644 > --- a/gdb/infrun.c > +++ b/gdb/infrun.c > @@ -60,6 +60,7 @@ > #include "completer.h" > #include "target-descriptions.h" > #include "target-dcache.h" > +#include "terminal.h" > > /* Prototypes for local functions */ > > @@ -79,6 +80,10 @@ static int restore_selected_frame (void *); > > static int follow_fork (void); > > +static int follow_fork_inferior (int follow_child, int detach_fork); > + > +static void follow_inferior_reset_breakpoints (void); > + > static void set_schedlock_func (char *args, int from_tty, > struct cmd_list_element *c); > > @@ -486,9 +491,11 @@ follow_fork (void) > parent = inferior_ptid; > child = tp->pending_follow.value.related_pid; > > - /* Tell the target to do whatever is necessary to follow > - either parent or child. */ > - if (target_follow_fork (follow_child, detach_fork)) > + /* Set up inferior(s) as specified by the caller, and tell the > + target to do whatever is necessary to follow either parent > + or child. */ > + if (follow_fork_inferior (follow_child, detach_fork) > + || target_follow_fork (follow_child, detach_fork)) I don't think we should ever call follow_fork_inferior without calling target_follow_fork, right? I think it'd be clearer if we tail called target_follow_fork inside follow_fork_inferior. > { > /* Target refused to follow, or there's some other reason > we shouldn't resume. */ > @@ -560,7 +567,242 @@ follow_fork (void) > return should_resume; > } > > -void > +/* Handle changes to the inferior list based on the type of fork, > + which process is being followed, and whether the other process > + should be detached. On entry inferior_ptid must be the ptid of > + the fork parent. At return inferior_ptid is the ptid of the > + followed inferior. */ > + > +int > +follow_fork_inferior (int follow_child, int detach_fork) > +{ > + int has_vforked; > + int parent_pid, child_pid; > + > + has_vforked = (inferior_thread ()->pending_follow.kind > + == TARGET_WAITKIND_VFORKED); > + parent_pid = ptid_get_lwp (inferior_ptid); > + if (parent_pid == 0) > + parent_pid = ptid_get_pid (inferior_ptid); > + child_pid > + = ptid_get_pid (inferior_thread ()->pending_follow.value.related_pid); > + > + if (has_vforked > + && !non_stop /* Non-stop always resumes both branches. */ > + && (!target_is_async_p () || sync_execution) > + && !(follow_child || detach_fork || sched_multi)) > + { > + /* The parent stays blocked inside the vfork syscall until the > + child execs or exits. If we don't let the child run, then > + the parent stays blocked. If we're telling the parent to run > + in the foreground, the user will not be able to ctrl-c to get > + back the terminal, effectively hanging the debug session. */ > + fprintf_filtered (gdb_stderr, _("\ > +Can not resume the parent process over vfork in the foreground while\n\ > +holding the child stopped. Try \"set detach-on-fork\" or \ > +\"set schedule-multiple\".\n")); > + /* FIXME output string > 80 columns. */ > + return 1; > + } > + Moving this to common code isn't strictly correct, as we'd probably be able to interrupt the vfork parent in this case when remote debugging, or not sharing the terminal with the inferior. But let's put this here for now. > + else > + { > + child_inf->aspace = new_address_space (); > + child_inf->pspace = add_program_space (child_inf->aspace); > + child_inf->removable = 1; > + set_current_program_space (child_inf->pspace); > + clone_program_space (child_inf->pspace, parent_inf->pspace); > + > + /* Let the shared library layer (solib-svr4) learn about It's not always solib-svr4, so make that e.g., "e.g., solib-svr4" now. > + else > + { > + child_inf->aspace = new_address_space (); > + child_inf->pspace = add_program_space (child_inf->aspace); > + child_inf->removable = 1; > + child_inf->symfile_flags = SYMFILE_NO_READ; > + set_current_program_space (child_inf->pspace); > + clone_program_space (child_inf->pspace, parent_pspace); > + > + /* Let the shared library layer (solib-svr4) learn about Likewise. Otherwise this looks good to me. Thanks, Pedro Alves