1 /* Native-dependent code for NetBSD.
3 Copyright (C) 2006-2020 Free Software Foundation, Inc.
5 This file is part of GDB.
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
23 #include "gdbthread.h"
24 #include "nbsd-tdep.h"
28 #include <sys/types.h>
29 #include <sys/ptrace.h>
30 #include <sys/sysctl.h>
33 /* Return the name of a file that can be opened to get the symbols for
34 the child process identified by PID. */
37 nbsd_nat_target::pid_to_exec_file (int pid
)
39 static char buf
[PATH_MAX
];
41 int mib
[4] = {CTL_KERN
, KERN_PROC_ARGS
, pid
, KERN_PROC_PATHNAME
};
42 buflen
= sizeof (buf
);
43 if (sysctl (mib
, ARRAY_SIZE (mib
), buf
, &buflen
, NULL
, 0))
48 /* Return the current directory for the process identified by PID. */
51 nbsd_pid_to_cwd (int pid
)
55 int mib
[4] = {CTL_KERN
, KERN_PROC_ARGS
, pid
, KERN_PROC_CWD
};
56 buflen
= sizeof (buf
);
57 if (sysctl (mib
, ARRAY_SIZE (mib
), buf
, &buflen
, NULL
, 0))
62 /* Return the kinfo_proc2 structure for the process identified by PID. */
65 nbsd_pid_to_kinfo_proc2 (pid_t pid
, struct kinfo_proc2
*kp
)
67 gdb_assert (kp
!= nullptr);
69 size_t size
= sizeof (*kp
);
70 int mib
[6] = {CTL_KERN
, KERN_PROC2
, KERN_PROC_PID
, pid
,
71 static_cast<int> (size
), 1};
72 return !sysctl (mib
, ARRAY_SIZE (mib
), kp
, &size
, NULL
, 0);
75 /* Return the command line for the process identified by PID. */
77 static gdb::unique_xmalloc_ptr
<char[]>
78 nbsd_pid_to_cmdline (int pid
)
80 int mib
[4] = {CTL_KERN
, KERN_PROC_ARGS
, pid
, KERN_PROC_ARGV
};
83 if (sysctl (mib
, ARRAY_SIZE (mib
), NULL
, &size
, NULL
, 0) == -1 || size
== 0)
86 gdb::unique_xmalloc_ptr
<char[]> args (XNEWVAR (char, size
));
88 if (sysctl (mib
, ARRAY_SIZE (mib
), args
.get (), &size
, NULL
, 0) == -1
92 /* Arguments are returned as a flattened string with NUL separators.
93 Join the arguments with spaces to form a single string. */
94 for (size_t i
= 0; i
< size
- 1; i
++)
97 args
[size
- 1] = '\0';
102 /* Generic thread (LWP) lister within a specified process. The callback
103 parameters is a C++ function that is called for each detected thread. */
106 nbsd_thread_lister (const pid_t pid
,
107 gdb::function_view
<bool (const struct kinfo_lwp
*)>
110 int mib
[5] = {CTL_KERN
, KERN_LWP
, pid
, sizeof (struct kinfo_lwp
), 0};
113 if (sysctl (mib
, ARRAY_SIZE (mib
), NULL
, &size
, NULL
, 0) == -1 || size
== 0)
114 perror_with_name (("sysctl"));
116 mib
[4] = size
/ sizeof (size_t);
118 gdb::unique_xmalloc_ptr
<struct kinfo_lwp
[]> kl
119 ((struct kinfo_lwp
*) xcalloc (size
, 1));
121 if (sysctl (mib
, ARRAY_SIZE (mib
), kl
.get (), &size
, NULL
, 0) == -1
123 perror_with_name (("sysctl"));
125 for (size_t i
= 0; i
< size
/ sizeof (struct kinfo_lwp
); i
++)
127 struct kinfo_lwp
*l
= &kl
[i
];
129 /* Return true if the specified thread is alive. */
131 = [] (struct kinfo_lwp
*lwp
)
146 /* Ignore embryonic or demised threads. */
157 /* Return true if PTID is still active in the inferior. */
160 nbsd_nat_target::thread_alive (ptid_t ptid
)
162 pid_t pid
= ptid
.pid ();
163 int lwp
= ptid
.lwp ();
166 = [&lwp
] (const struct kinfo_lwp
*kl
)
168 return kl
->l_lid
== lwp
;
171 return nbsd_thread_lister (pid
, fn
);
174 /* Return the name assigned to a thread by an application. Returns
175 the string in a static buffer. */
178 nbsd_nat_target::thread_name (struct thread_info
*thr
)
180 ptid_t ptid
= thr
->ptid
;
181 pid_t pid
= ptid
.pid ();
182 int lwp
= ptid
.lwp ();
184 static char buf
[KI_LNAMELEN
] = {};
187 = [&lwp
] (const struct kinfo_lwp
*kl
)
189 if (kl
->l_lid
== lwp
)
191 xsnprintf (buf
, sizeof buf
, "%s", kl
->l_name
);
197 if (nbsd_thread_lister (pid
, fn
))
203 /* Implement the "post_attach" target_ops method. */
206 nbsd_add_threads (nbsd_nat_target
*target
, pid_t pid
)
209 = [&target
, &pid
] (const struct kinfo_lwp
*kl
)
211 ptid_t ptid
= ptid_t (pid
, kl
->l_lid
, 0);
212 if (!in_thread_list (target
, ptid
))
214 if (inferior_ptid
.lwp () == 0)
215 thread_change_ptid (target
, inferior_ptid
, ptid
);
217 add_thread (target
, ptid
);
222 nbsd_thread_lister (pid
, fn
);
225 /* Implement the "post_attach" target_ops method. */
228 nbsd_nat_target::post_attach (int pid
)
230 nbsd_add_threads (this, pid
);
233 /* Implement the "update_thread_list" target_ops method. */
236 nbsd_nat_target::update_thread_list ()
240 nbsd_add_threads (this, inferior_ptid
.pid ());
243 /* Convert PTID to a string. */
246 nbsd_nat_target::pid_to_str (ptid_t ptid
)
248 int lwp
= ptid
.lwp ();
252 pid_t pid
= ptid
.pid ();
254 return string_printf ("LWP %d of process %d", lwp
, pid
);
257 return normal_pid_to_str (ptid
);
260 /* Retrieve all the memory regions in the specified process. */
262 static gdb::unique_xmalloc_ptr
<struct kinfo_vmentry
[]>
263 nbsd_kinfo_get_vmmap (pid_t pid
, size_t *size
)
265 int mib
[5] = {CTL_VM
, VM_PROC
, VM_PROC_MAP
, pid
,
266 sizeof (struct kinfo_vmentry
)};
269 if (sysctl (mib
, ARRAY_SIZE (mib
), NULL
, &length
, NULL
, 0))
275 /* Prereserve more space. The length argument is volatile and can change
276 between the sysctl(3) calls as this function can be called against a
278 length
= length
* 5 / 3;
280 gdb::unique_xmalloc_ptr
<struct kinfo_vmentry
[]> kiv
281 (XNEWVAR (kinfo_vmentry
, length
));
283 if (sysctl (mib
, ARRAY_SIZE (mib
), kiv
.get (), &length
, NULL
, 0))
289 *size
= length
/ sizeof (struct kinfo_vmentry
);
293 /* Iterate over all the memory regions in the current inferior,
294 calling FUNC for each memory region. OBFD is passed as the last
298 nbsd_nat_target::find_memory_regions (find_memory_region_ftype func
,
301 pid_t pid
= inferior_ptid
.pid ();
304 gdb::unique_xmalloc_ptr
<struct kinfo_vmentry
[]> vmentl
305 = nbsd_kinfo_get_vmmap (pid
, &nitems
);
307 perror_with_name (_("Couldn't fetch VM map entries."));
309 for (size_t i
= 0; i
< nitems
; i
++)
311 struct kinfo_vmentry
*kve
= &vmentl
[i
];
313 /* Skip unreadable segments and those where MAP_NOCORE has been set. */
314 if (!(kve
->kve_protection
& KVME_PROT_READ
)
315 || kve
->kve_flags
& KVME_FLAG_NOCOREDUMP
)
318 /* Skip segments with an invalid type. */
319 switch (kve
->kve_type
)
321 case KVME_TYPE_VNODE
:
323 case KVME_TYPE_SUBMAP
:
324 case KVME_TYPE_OBJECT
:
330 size_t size
= kve
->kve_end
- kve
->kve_start
;
333 fprintf_filtered (gdb_stdout
,
334 "Save segment, %ld bytes at %s (%c%c%c)\n",
336 paddress (target_gdbarch (), kve
->kve_start
),
337 kve
->kve_protection
& KVME_PROT_READ
? 'r' : '-',
338 kve
->kve_protection
& KVME_PROT_WRITE
? 'w' : '-',
339 kve
->kve_protection
& KVME_PROT_EXEC
? 'x' : '-');
342 /* Invoke the callback function to create the corefile segment.
343 Pass MODIFIED as true, we do not know the real modification state. */
344 func (kve
->kve_start
, size
, kve
->kve_protection
& KVME_PROT_READ
,
345 kve
->kve_protection
& KVME_PROT_WRITE
,
346 kve
->kve_protection
& KVME_PROT_EXEC
, 1, data
);
351 /* Implement the "info_proc" target_ops method. */
354 nbsd_nat_target::info_proc (const char *args
, enum info_proc_what what
)
357 bool do_cmdline
= false;
360 bool do_mappings
= false;
361 bool do_status
= false;
394 error (_("Not supported on this target."));
397 gdb_argv
built_argv (args
);
398 if (built_argv
.count () == 0)
400 pid
= inferior_ptid
.pid ();
402 error (_("No current process: you must name one."));
404 else if (built_argv
.count () == 1 && isdigit (built_argv
[0][0]))
405 pid
= strtol (built_argv
[0], NULL
, 10);
407 error (_("Invalid arguments."));
409 printf_filtered (_("process %d\n"), pid
);
413 gdb::unique_xmalloc_ptr
<char[]> cmdline
= nbsd_pid_to_cmdline (pid
);
414 if (cmdline
!= nullptr)
415 printf_filtered ("cmdline = '%s'\n", cmdline
.get ());
417 warning (_("unable to fetch command line"));
421 std::string cwd
= nbsd_pid_to_cwd (pid
);
423 printf_filtered ("cwd = '%s'\n", cwd
.c_str ());
425 warning (_("unable to fetch current working directory"));
429 const char *exe
= pid_to_exec_file (pid
);
431 printf_filtered ("exe = '%s'\n", exe
);
433 warning (_("unable to fetch executable path name"));
438 gdb::unique_xmalloc_ptr
<struct kinfo_vmentry
[]> vmentl
439 = nbsd_kinfo_get_vmmap (pid
, &nvment
);
441 if (vmentl
!= nullptr)
443 int addr_bit
= TARGET_CHAR_BIT
* sizeof (void *);
444 nbsd_info_proc_mappings_header (addr_bit
);
446 struct kinfo_vmentry
*kve
= vmentl
.get ();
447 for (int i
= 0; i
< nvment
; i
++, kve
++)
448 nbsd_info_proc_mappings_entry (addr_bit
, kve
->kve_start
,
449 kve
->kve_end
, kve
->kve_offset
,
450 kve
->kve_flags
, kve
->kve_protection
,
454 warning (_("unable to fetch virtual memory map"));
458 struct kinfo_proc2 kp
;
459 if (!nbsd_pid_to_kinfo_proc2 (pid
, &kp
))
460 warning (_("Failed to fetch process information"));
481 return "? (unknown)";
485 printf_filtered ("Name: %s\n", kp
.p_comm
);
486 printf_filtered ("State: %s\n", process_status(kp
.p_realstat
));
487 printf_filtered ("Parent process: %" PRId32
"\n", kp
.p_ppid
);
488 printf_filtered ("Process group: %" PRId32
"\n", kp
.p__pgid
);
489 printf_filtered ("Session id: %" PRId32
"\n", kp
.p_sid
);
490 printf_filtered ("TTY: %" PRId32
"\n", kp
.p_tdev
);
491 printf_filtered ("TTY owner process group: %" PRId32
"\n", kp
.p_tpgid
);
492 printf_filtered ("User IDs (real, effective, saved): "
493 "%" PRIu32
" %" PRIu32
" %" PRIu32
"\n",
494 kp
.p_ruid
, kp
.p_uid
, kp
.p_svuid
);
495 printf_filtered ("Group IDs (real, effective, saved): "
496 "%" PRIu32
" %" PRIu32
" %" PRIu32
"\n",
497 kp
.p_rgid
, kp
.p_gid
, kp
.p_svgid
);
499 printf_filtered ("Groups:");
500 for (int i
= 0; i
< kp
.p_ngroups
; i
++)
501 printf_filtered (" %" PRIu32
, kp
.p_groups
[i
]);
502 printf_filtered ("\n");
503 printf_filtered ("Minor faults (no memory page): %" PRIu64
"\n",
505 printf_filtered ("Major faults (memory page faults): %" PRIu64
"\n",
507 printf_filtered ("utime: %" PRIu32
".%06" PRIu32
"\n",
508 kp
.p_uutime_sec
, kp
.p_uutime_usec
);
509 printf_filtered ("stime: %" PRIu32
".%06" PRIu32
"\n",
510 kp
.p_ustime_sec
, kp
.p_ustime_usec
);
511 printf_filtered ("utime+stime, children: %" PRIu32
".%06" PRIu32
"\n",
512 kp
.p_uctime_sec
, kp
.p_uctime_usec
);
513 printf_filtered ("'nice' value: %" PRIu8
"\n", kp
.p_nice
);
514 printf_filtered ("Start time: %" PRIu32
".%06" PRIu32
"\n",
515 kp
.p_ustart_sec
, kp
.p_ustart_usec
);
516 int pgtok
= getpagesize () / 1024;
517 printf_filtered ("Data size: %" PRIuMAX
" kB\n",
518 (uintmax_t) kp
.p_vm_dsize
* pgtok
);
519 printf_filtered ("Stack size: %" PRIuMAX
" kB\n",
520 (uintmax_t) kp
.p_vm_ssize
* pgtok
);
521 printf_filtered ("Text size: %" PRIuMAX
" kB\n",
522 (uintmax_t) kp
.p_vm_tsize
* pgtok
);
523 printf_filtered ("Resident set size: %" PRIuMAX
" kB\n",
524 (uintmax_t) kp
.p_vm_rssize
* pgtok
);
525 printf_filtered ("Maximum RSS: %" PRIu64
" kB\n", kp
.p_uru_maxrss
);
526 printf_filtered ("Pending Signals:");
527 for (size_t i
= 0; i
< ARRAY_SIZE (kp
.p_siglist
.__bits
); i
++)
528 printf_filtered (" %08" PRIx32
, kp
.p_siglist
.__bits
[i
]);
529 printf_filtered ("\n");
530 printf_filtered ("Ignored Signals:");
531 for (size_t i
= 0; i
< ARRAY_SIZE (kp
.p_sigignore
.__bits
); i
++)
532 printf_filtered (" %08" PRIx32
, kp
.p_sigignore
.__bits
[i
]);
533 printf_filtered ("\n");
534 printf_filtered ("Caught Signals:");
535 for (size_t i
= 0; i
< ARRAY_SIZE (kp
.p_sigcatch
.__bits
); i
++)
536 printf_filtered (" %08" PRIx32
, kp
.p_sigcatch
.__bits
[i
]);
537 printf_filtered ("\n");
544 /* Resume execution of a specified PTID, that points to a process or a thread
545 within a process. If one thread is specified, all other threads are
546 suspended. If STEP is nonzero, single-step it. If SIGNAL is nonzero,
547 give it that signal. */
550 nbsd_resume(nbsd_nat_target
*target
, ptid_t ptid
, int step
,
551 enum gdb_signal signal
)
555 gdb_assert (minus_one_ptid
!= ptid
);
559 /* If ptid is a specific LWP, suspend all other LWPs in the process. */
560 inferior
*inf
= find_inferior_ptid (target
, ptid
);
562 for (thread_info
*tp
: inf
->non_exited_threads ())
564 if (tp
->ptid
.lwp () == ptid
.lwp ())
567 request
= PT_SUSPEND
;
569 if (ptrace (request
, tp
->ptid
.pid (), NULL
, tp
->ptid
.lwp ()) == -1)
570 perror_with_name (("ptrace"));
575 /* If ptid is a wildcard, resume all matching threads (they won't run
576 until the process is continued however). */
577 for (thread_info
*tp
: all_non_exited_threads (target
, ptid
))
578 if (ptrace (PT_RESUME
, tp
->ptid
.pid (), NULL
, tp
->ptid
.lwp ()) == -1)
579 perror_with_name (("ptrace"));
584 for (thread_info
*tp
: all_non_exited_threads (target
, ptid
))
585 if (ptrace (PT_SETSTEP
, tp
->ptid
.pid (), NULL
, tp
->ptid
.lwp ()) == -1)
586 perror_with_name (("ptrace"));
590 for (thread_info
*tp
: all_non_exited_threads (target
, ptid
))
591 if (ptrace (PT_CLEARSTEP
, tp
->ptid
.pid (), NULL
, tp
->ptid
.lwp ()) == -1)
592 perror_with_name (("ptrace"));
595 if (catch_syscall_enabled () > 0)
596 request
= PT_SYSCALL
;
598 request
= PT_CONTINUE
;
600 /* An address of (void *)1 tells ptrace to continue from
601 where it was. If GDB wanted it to start some other way, we have
602 already written a new program counter value to the child. */
603 if (ptrace (request
, ptid
.pid (), (void *)1, gdb_signal_to_host (signal
)) == -1)
604 perror_with_name (("ptrace"));
607 /* Resume execution of thread PTID, or all threads of all inferiors
608 if PTID is -1. If STEP is nonzero, single-step it. If SIGNAL is nonzero,
609 give it that signal. */
612 nbsd_nat_target::resume (ptid_t ptid
, int step
, enum gdb_signal signal
)
614 if (minus_one_ptid
!= ptid
)
615 nbsd_resume (this, ptid
, step
, signal
);
618 for (inferior
*inf
: all_non_exited_inferiors (this))
619 nbsd_resume (this, ptid_t (inf
->pid
, 0, 0), step
, signal
);
623 /* Implement a safe wrapper around waitpid(). */
626 nbsd_wait (ptid_t ptid
, struct target_waitstatus
*ourstatus
, int options
)
635 /* The common code passes WNOHANG that leads to crashes, overwrite it. */
636 pid
= waitpid (ptid
.pid (), &status
, 0);
638 while (pid
== -1 && errno
== EINTR
);
640 clear_sigint_trap ();
643 perror_with_name (_("Child process unexpectedly missing"));
645 store_waitstatus (ourstatus
, status
);
649 /* Wait for the child specified by PTID to do something. Return the
650 process ID of the child, or MINUS_ONE_PTID in case of error; store
651 the status in *OURSTATUS. */
654 nbsd_nat_target::wait (ptid_t ptid
, struct target_waitstatus
*ourstatus
,
657 pid_t pid
= nbsd_wait (ptid
, ourstatus
, target_options
);
658 ptid_t wptid
= ptid_t (pid
);
660 /* If the child stopped, keep investigating its status. */
661 if (ourstatus
->kind
!= TARGET_WAITKIND_STOPPED
)
664 /* Extract the event and thread that received a signal. */
665 ptrace_siginfo_t psi
;
666 if (ptrace (PT_GET_SIGINFO
, pid
, &psi
, sizeof (psi
)) == -1)
667 perror_with_name (("ptrace"));
669 /* Pick child's siginfo_t. */
670 siginfo_t
*si
= &psi
.psi_siginfo
;
672 int lwp
= psi
.psi_lwpid
;
674 int signo
= si
->si_signo
;
675 const int code
= si
->si_code
;
677 /* Construct PTID with a specified thread that received the event.
678 If a signal was targeted to the whole process, lwp is 0. */
679 wptid
= ptid_t (pid
, lwp
, 0);
681 /* Bail out on non-debugger oriented signals.. */
682 if (signo
!= SIGTRAP
)
685 /* Stop examining non-debugger oriented SIGTRAP codes. */
686 if (code
<= SI_USER
|| code
== SI_NOINFO
)
689 if (in_thread_list (this, ptid_t (pid
)))
690 thread_change_ptid (this, ptid_t (pid
), wptid
);
692 if (code
== TRAP_EXEC
)
694 ourstatus
->kind
= TARGET_WAITKIND_EXECD
;
695 ourstatus
->value
.execd_pathname
= xstrdup (pid_to_exec_file (pid
));
699 if (code
== TRAP_TRACE
)
701 /* Unhandled at this level. */
705 if (code
== TRAP_SCE
|| code
== TRAP_SCX
)
707 int sysnum
= si
->si_sysnum
;
709 if (!catch_syscall_enabled () || !catching_syscall_number (sysnum
))
711 /* If the core isn't interested in this event, ignore it. */
712 ourstatus
->kind
= TARGET_WAITKIND_SPURIOUS
;
717 (code
== TRAP_SCE
) ? TARGET_WAITKIND_SYSCALL_ENTRY
:
718 TARGET_WAITKIND_SYSCALL_RETURN
;
719 ourstatus
->value
.syscall_number
= sysnum
;
723 if (code
== TRAP_BRKPT
)
725 /* Unhandled at this level. */
729 /* Unclassified SIGTRAP event. */
730 ourstatus
->kind
= TARGET_WAITKIND_SPURIOUS
;
734 /* Implement the "insert_exec_catchpoint" target_ops method. */
737 nbsd_nat_target::insert_exec_catchpoint (int pid
)
743 /* Implement the "remove_exec_catchpoint" target_ops method. */
746 nbsd_nat_target::remove_exec_catchpoint (int pid
)
752 /* Implement the "set_syscall_catchpoint" target_ops method. */
755 nbsd_nat_target::set_syscall_catchpoint (int pid
, bool needed
,
757 gdb::array_view
<const int> syscall_counts
)
759 /* Ignore the arguments. inf-ptrace.c will use PT_SYSCALL which
760 will catch all system call entries and exits. The system calls
761 are filtered by GDB rather than the kernel. */