1 /* Native-dependent code for NetBSD.
3 Copyright (C) 2006-2020 Free Software Foundation, Inc.
5 This file is part of GDB.
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
23 #include "gdbthread.h"
24 #include "nbsd-tdep.h"
28 #include <sys/types.h>
29 #include <sys/ptrace.h>
30 #include <sys/sysctl.h>
32 /* Return the name of a file that can be opened to get the symbols for
33 the child process identified by PID. */
36 nbsd_nat_target::pid_to_exec_file (int pid
)
38 static char buf
[PATH_MAX
];
40 int mib
[4] = {CTL_KERN
, KERN_PROC_ARGS
, pid
, KERN_PROC_PATHNAME
};
41 buflen
= sizeof (buf
);
42 if (sysctl (mib
, ARRAY_SIZE (mib
), buf
, &buflen
, NULL
, 0))
47 /* Generic thread (LWP) lister within a specified process. The callback
48 parameters is a C++ function that is called for each detected thread. */
51 nbsd_thread_lister (const pid_t pid
,
52 gdb::function_view
<bool (const struct kinfo_lwp
*)>
55 int mib
[5] = {CTL_KERN
, KERN_LWP
, pid
, sizeof (struct kinfo_lwp
), 0};
58 if (sysctl (mib
, ARRAY_SIZE (mib
), NULL
, &size
, NULL
, 0) == -1 || size
== 0)
59 perror_with_name (("sysctl"));
61 mib
[4] = size
/ sizeof (size_t);
63 gdb::unique_xmalloc_ptr
<struct kinfo_lwp
[]> kl
64 ((struct kinfo_lwp
*) xcalloc (size
, 1));
66 if (sysctl (mib
, ARRAY_SIZE (mib
), kl
.get (), &size
, NULL
, 0) == -1
68 perror_with_name (("sysctl"));
70 for (size_t i
= 0; i
< size
/ sizeof (struct kinfo_lwp
); i
++)
72 struct kinfo_lwp
*l
= &kl
[i
];
74 /* Return true if the specified thread is alive. */
76 = [] (struct kinfo_lwp
*lwp
)
91 /* Ignore embryonic or demised threads. */
102 /* Return true if PTID is still active in the inferior. */
105 nbsd_nat_target::thread_alive (ptid_t ptid
)
107 pid_t pid
= ptid
.pid ();
108 int lwp
= ptid
.lwp ();
111 = [&lwp
] (const struct kinfo_lwp
*kl
)
113 return kl
->l_lid
== lwp
;
116 return nbsd_thread_lister (pid
, fn
);
119 /* Return the name assigned to a thread by an application. Returns
120 the string in a static buffer. */
123 nbsd_nat_target::thread_name (struct thread_info
*thr
)
125 ptid_t ptid
= thr
->ptid
;
126 pid_t pid
= ptid
.pid ();
127 int lwp
= ptid
.lwp ();
129 static char buf
[KI_LNAMELEN
] = {};
132 = [&lwp
] (const struct kinfo_lwp
*kl
)
134 if (kl
->l_lid
== lwp
)
136 xsnprintf (buf
, sizeof buf
, "%s", kl
->l_name
);
142 if (nbsd_thread_lister (pid
, fn
))
148 /* Implement the "post_attach" target_ops method. */
151 nbsd_add_threads (nbsd_nat_target
*target
, pid_t pid
)
154 = [&target
, &pid
] (const struct kinfo_lwp
*kl
)
156 ptid_t ptid
= ptid_t (pid
, kl
->l_lid
, 0);
157 if (!in_thread_list (target
, ptid
))
159 if (inferior_ptid
.lwp () == 0)
160 thread_change_ptid (target
, inferior_ptid
, ptid
);
162 add_thread (target
, ptid
);
167 nbsd_thread_lister (pid
, fn
);
170 /* Implement the "post_attach" target_ops method. */
173 nbsd_nat_target::post_attach (int pid
)
175 nbsd_add_threads (this, pid
);
178 /* Implement the "update_thread_list" target_ops method. */
181 nbsd_nat_target::update_thread_list ()
185 nbsd_add_threads (this, inferior_ptid
.pid ());
188 /* Convert PTID to a string. */
191 nbsd_nat_target::pid_to_str (ptid_t ptid
)
193 int lwp
= ptid
.lwp ();
197 pid_t pid
= ptid
.pid ();
199 return string_printf ("LWP %d of process %d", lwp
, pid
);
202 return normal_pid_to_str (ptid
);
205 /* Retrieve all the memory regions in the specified process. */
207 static gdb::unique_xmalloc_ptr
<struct kinfo_vmentry
[]>
208 nbsd_kinfo_get_vmmap (pid_t pid
, size_t *size
)
210 int mib
[5] = {CTL_VM
, VM_PROC
, VM_PROC_MAP
, pid
,
211 sizeof (struct kinfo_vmentry
)};
214 if (sysctl (mib
, ARRAY_SIZE (mib
), NULL
, &length
, NULL
, 0))
220 /* Prereserve more space. The length argument is volatile and can change
221 between the sysctl(3) calls as this function can be called against a
223 length
= length
* 5 / 3;
225 gdb::unique_xmalloc_ptr
<struct kinfo_vmentry
[]> kiv
226 (XNEWVAR (kinfo_vmentry
, length
));
228 if (sysctl (mib
, ARRAY_SIZE (mib
), kiv
.get (), &length
, NULL
, 0))
234 *size
= length
/ sizeof (struct kinfo_vmentry
);
238 /* Iterate over all the memory regions in the current inferior,
239 calling FUNC for each memory region. OBFD is passed as the last
243 nbsd_nat_target::find_memory_regions (find_memory_region_ftype func
,
246 pid_t pid
= inferior_ptid
.pid ();
249 gdb::unique_xmalloc_ptr
<struct kinfo_vmentry
[]> vmentl
250 = nbsd_kinfo_get_vmmap (pid
, &nitems
);
252 perror_with_name (_("Couldn't fetch VM map entries."));
254 for (size_t i
= 0; i
< nitems
; i
++)
256 struct kinfo_vmentry
*kve
= &vmentl
[i
];
258 /* Skip unreadable segments and those where MAP_NOCORE has been set. */
259 if (!(kve
->kve_protection
& KVME_PROT_READ
)
260 || kve
->kve_flags
& KVME_FLAG_NOCOREDUMP
)
263 /* Skip segments with an invalid type. */
264 switch (kve
->kve_type
)
266 case KVME_TYPE_VNODE
:
268 case KVME_TYPE_SUBMAP
:
269 case KVME_TYPE_OBJECT
:
275 size_t size
= kve
->kve_end
- kve
->kve_start
;
278 fprintf_filtered (gdb_stdout
,
279 "Save segment, %ld bytes at %s (%c%c%c)\n",
281 paddress (target_gdbarch (), kve
->kve_start
),
282 kve
->kve_protection
& KVME_PROT_READ
? 'r' : '-',
283 kve
->kve_protection
& KVME_PROT_WRITE
? 'w' : '-',
284 kve
->kve_protection
& KVME_PROT_EXEC
? 'x' : '-');
287 /* Invoke the callback function to create the corefile segment.
288 Pass MODIFIED as true, we do not know the real modification state. */
289 func (kve
->kve_start
, size
, kve
->kve_protection
& KVME_PROT_READ
,
290 kve
->kve_protection
& KVME_PROT_WRITE
,
291 kve
->kve_protection
& KVME_PROT_EXEC
, 1, data
);
296 /* Implement the "info_proc" target_ops method. */
299 nbsd_nat_target::info_proc (const char *args
, enum info_proc_what what
)
303 bool do_mappings
= false;
314 error (_("Not supported on this target."));
317 gdb_argv
built_argv (args
);
318 if (built_argv
.count () == 0)
320 pid
= inferior_ptid
.pid ();
322 error (_("No current process: you must name one."));
324 else if (built_argv
.count () == 1 && isdigit (built_argv
[0][0]))
325 pid
= strtol (built_argv
[0], NULL
, 10);
327 error (_("Invalid arguments."));
329 printf_filtered (_("process %d\n"), pid
);
333 const char *exe
= pid_to_exec_file (pid
);
335 printf_filtered ("exe = '%s'\n", exe
);
337 warning (_("unable to fetch executable path name"));
342 gdb::unique_xmalloc_ptr
<struct kinfo_vmentry
[]> vmentl
343 = nbsd_kinfo_get_vmmap (pid
, &nvment
);
345 if (vmentl
!= nullptr)
347 int addr_bit
= TARGET_CHAR_BIT
* sizeof (void *);
348 nbsd_info_proc_mappings_header (addr_bit
);
350 struct kinfo_vmentry
*kve
= vmentl
.get ();
351 for (int i
= 0; i
< nvment
; i
++, kve
++)
352 nbsd_info_proc_mappings_entry (addr_bit
, kve
->kve_start
,
353 kve
->kve_end
, kve
->kve_offset
,
354 kve
->kve_flags
, kve
->kve_protection
,
358 warning (_("unable to fetch virtual memory map"));