|  | /* Native-dependent code for NetBSD. | 
|  |  | 
|  | Copyright (C) 2006-2021 Free Software Foundation, Inc. | 
|  |  | 
|  | This file is part of GDB. | 
|  |  | 
|  | This program is free software; you can redistribute it and/or modify | 
|  | it under the terms of the GNU General Public License as published by | 
|  | the Free Software Foundation; either version 3 of the License, or | 
|  | (at your option) any later version. | 
|  |  | 
|  | This program is distributed in the hope that it will be useful, | 
|  | but WITHOUT ANY WARRANTY; without even the implied warranty of | 
|  | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | 
|  | GNU General Public License for more details. | 
|  |  | 
|  | You should have received a copy of the GNU General Public License | 
|  | along with this program.  If not, see <http://www.gnu.org/licenses/>.  */ | 
|  |  | 
|  | #include "defs.h" | 
|  |  | 
|  | #include "netbsd-nat.h" | 
|  | #include "nat/netbsd-nat.h" | 
|  | #include "gdbthread.h" | 
|  | #include "netbsd-tdep.h" | 
|  | #include "inferior.h" | 
|  | #include "gdbarch.h" | 
|  |  | 
|  | #include <sys/types.h> | 
|  | #include <sys/ptrace.h> | 
|  | #include <sys/sysctl.h> | 
|  | #include <sys/wait.h> | 
|  |  | 
|  | /* Return the name of a file that can be opened to get the symbols for | 
|  | the child process identified by PID.  */ | 
|  |  | 
|  | char * | 
|  | nbsd_nat_target::pid_to_exec_file (int pid) | 
|  | { | 
|  | return const_cast<char *> (netbsd_nat::pid_to_exec_file (pid)); | 
|  | } | 
|  |  | 
|  | /* Return the current directory for the process identified by PID.  */ | 
|  |  | 
|  | static std::string | 
|  | nbsd_pid_to_cwd (int pid) | 
|  | { | 
|  | char buf[PATH_MAX]; | 
|  | size_t buflen; | 
|  | int mib[4] = {CTL_KERN, KERN_PROC_ARGS, pid, KERN_PROC_CWD}; | 
|  | buflen = sizeof (buf); | 
|  | if (sysctl (mib, ARRAY_SIZE (mib), buf, &buflen, NULL, 0)) | 
|  | return ""; | 
|  | return buf; | 
|  | } | 
|  |  | 
|  | /* Return the kinfo_proc2 structure for the process identified by PID.  */ | 
|  |  | 
|  | static bool | 
|  | nbsd_pid_to_kinfo_proc2 (pid_t pid, struct kinfo_proc2 *kp) | 
|  | { | 
|  | gdb_assert (kp != nullptr); | 
|  |  | 
|  | size_t size = sizeof (*kp); | 
|  | int mib[6] = {CTL_KERN, KERN_PROC2, KERN_PROC_PID, pid, | 
|  | static_cast<int> (size), 1}; | 
|  | return !sysctl (mib, ARRAY_SIZE (mib), kp, &size, NULL, 0); | 
|  | } | 
|  |  | 
|  | /* Return the command line for the process identified by PID.  */ | 
|  |  | 
|  | static gdb::unique_xmalloc_ptr<char[]> | 
|  | nbsd_pid_to_cmdline (int pid) | 
|  | { | 
|  | int mib[4] = {CTL_KERN, KERN_PROC_ARGS, pid, KERN_PROC_ARGV}; | 
|  |  | 
|  | size_t size = 0; | 
|  | if (::sysctl (mib, ARRAY_SIZE (mib), NULL, &size, NULL, 0) == -1 || size == 0) | 
|  | return nullptr; | 
|  |  | 
|  | gdb::unique_xmalloc_ptr<char[]> args (XNEWVAR (char, size)); | 
|  |  | 
|  | if (::sysctl (mib, ARRAY_SIZE (mib), args.get (), &size, NULL, 0) == -1 | 
|  | || size == 0) | 
|  | return nullptr; | 
|  |  | 
|  | /* Arguments are returned as a flattened string with NUL separators. | 
|  | Join the arguments with spaces to form a single string.  */ | 
|  | for (size_t i = 0; i < size - 1; i++) | 
|  | if (args[i] == '\0') | 
|  | args[i] = ' '; | 
|  | args[size - 1] = '\0'; | 
|  |  | 
|  | return args; | 
|  | } | 
|  |  | 
|  | /* Return true if PTID is still active in the inferior.  */ | 
|  |  | 
|  | bool | 
|  | nbsd_nat_target::thread_alive (ptid_t ptid) | 
|  | { | 
|  | return netbsd_nat::thread_alive (ptid); | 
|  | } | 
|  |  | 
|  | /* Return the name assigned to a thread by an application.  Returns | 
|  | the string in a static buffer.  */ | 
|  |  | 
|  | const char * | 
|  | nbsd_nat_target::thread_name (struct thread_info *thr) | 
|  | { | 
|  | ptid_t ptid = thr->ptid; | 
|  | return netbsd_nat::thread_name (ptid); | 
|  | } | 
|  |  | 
|  | /* Implement the "post_attach" target_ops method.  */ | 
|  |  | 
|  | static void | 
|  | nbsd_add_threads (nbsd_nat_target *target, pid_t pid) | 
|  | { | 
|  | auto fn | 
|  | = [&target] (ptid_t ptid) | 
|  | { | 
|  | if (!in_thread_list (target, ptid)) | 
|  | { | 
|  | if (inferior_ptid.lwp () == 0) | 
|  | thread_change_ptid (target, inferior_ptid, ptid); | 
|  | else | 
|  | add_thread (target, ptid); | 
|  | } | 
|  | }; | 
|  |  | 
|  | netbsd_nat::for_each_thread (pid, fn); | 
|  | } | 
|  |  | 
|  | /* Implement the "post_startup_inferior" target_ops method.  */ | 
|  |  | 
|  | void | 
|  | nbsd_nat_target::post_startup_inferior (ptid_t ptid) | 
|  | { | 
|  | netbsd_nat::enable_proc_events (ptid.pid ()); | 
|  | } | 
|  |  | 
|  | /* Implement the "post_attach" target_ops method.  */ | 
|  |  | 
|  | void | 
|  | nbsd_nat_target::post_attach (int pid) | 
|  | { | 
|  | netbsd_nat::enable_proc_events (pid); | 
|  | nbsd_add_threads (this, pid); | 
|  | } | 
|  |  | 
|  | /* Implement the "update_thread_list" target_ops method.  */ | 
|  |  | 
|  | void | 
|  | nbsd_nat_target::update_thread_list () | 
|  | { | 
|  | delete_exited_threads (); | 
|  | } | 
|  |  | 
|  | /* Convert PTID to a string.  */ | 
|  |  | 
|  | std::string | 
|  | nbsd_nat_target::pid_to_str (ptid_t ptid) | 
|  | { | 
|  | int lwp = ptid.lwp (); | 
|  |  | 
|  | if (lwp != 0) | 
|  | { | 
|  | pid_t pid = ptid.pid (); | 
|  |  | 
|  | return string_printf ("LWP %d of process %d", lwp, pid); | 
|  | } | 
|  |  | 
|  | return normal_pid_to_str (ptid); | 
|  | } | 
|  |  | 
|  | /* Retrieve all the memory regions in the specified process.  */ | 
|  |  | 
|  | static gdb::unique_xmalloc_ptr<struct kinfo_vmentry[]> | 
|  | nbsd_kinfo_get_vmmap (pid_t pid, size_t *size) | 
|  | { | 
|  | int mib[5] = {CTL_VM, VM_PROC, VM_PROC_MAP, pid, | 
|  | sizeof (struct kinfo_vmentry)}; | 
|  |  | 
|  | size_t length = 0; | 
|  | if (sysctl (mib, ARRAY_SIZE (mib), NULL, &length, NULL, 0)) | 
|  | { | 
|  | *size = 0; | 
|  | return NULL; | 
|  | } | 
|  |  | 
|  | /* Prereserve more space.  The length argument is volatile and can change | 
|  | between the sysctl(3) calls as this function can be called against a | 
|  | running process.  */ | 
|  | length = length * 5 / 3; | 
|  |  | 
|  | gdb::unique_xmalloc_ptr<struct kinfo_vmentry[]> kiv | 
|  | (XNEWVAR (kinfo_vmentry, length)); | 
|  |  | 
|  | if (sysctl (mib, ARRAY_SIZE (mib), kiv.get (), &length, NULL, 0)) | 
|  | { | 
|  | *size = 0; | 
|  | return NULL; | 
|  | } | 
|  |  | 
|  | *size = length / sizeof (struct kinfo_vmentry); | 
|  | return kiv; | 
|  | } | 
|  |  | 
|  | /* Iterate over all the memory regions in the current inferior, | 
|  | calling FUNC for each memory region.  OBFD is passed as the last | 
|  | argument to FUNC.  */ | 
|  |  | 
|  | int | 
|  | nbsd_nat_target::find_memory_regions (find_memory_region_ftype func, | 
|  | void *data) | 
|  | { | 
|  | pid_t pid = inferior_ptid.pid (); | 
|  |  | 
|  | size_t nitems; | 
|  | gdb::unique_xmalloc_ptr<struct kinfo_vmentry[]> vmentl | 
|  | = nbsd_kinfo_get_vmmap (pid, &nitems); | 
|  | if (vmentl == NULL) | 
|  | perror_with_name (_("Couldn't fetch VM map entries.")); | 
|  |  | 
|  | for (size_t i = 0; i < nitems; i++) | 
|  | { | 
|  | struct kinfo_vmentry *kve = &vmentl[i]; | 
|  |  | 
|  | /* Skip unreadable segments and those where MAP_NOCORE has been set.  */ | 
|  | if (!(kve->kve_protection & KVME_PROT_READ) | 
|  | || kve->kve_flags & KVME_FLAG_NOCOREDUMP) | 
|  | continue; | 
|  |  | 
|  | /* Skip segments with an invalid type.  */ | 
|  | switch (kve->kve_type) | 
|  | { | 
|  | case KVME_TYPE_VNODE: | 
|  | case KVME_TYPE_ANON: | 
|  | case KVME_TYPE_SUBMAP: | 
|  | case KVME_TYPE_OBJECT: | 
|  | break; | 
|  | default: | 
|  | continue; | 
|  | } | 
|  |  | 
|  | size_t size = kve->kve_end - kve->kve_start; | 
|  | if (info_verbose) | 
|  | { | 
|  | fprintf_filtered (gdb_stdout, | 
|  | "Save segment, %ld bytes at %s (%c%c%c)\n", | 
|  | (long) size, | 
|  | paddress (target_gdbarch (), kve->kve_start), | 
|  | kve->kve_protection & KVME_PROT_READ ? 'r' : '-', | 
|  | kve->kve_protection & KVME_PROT_WRITE ? 'w' : '-', | 
|  | kve->kve_protection & KVME_PROT_EXEC ? 'x' : '-'); | 
|  | } | 
|  |  | 
|  | /* Invoke the callback function to create the corefile segment. | 
|  | Pass MODIFIED as true, we do not know the real modification state.  */ | 
|  | func (kve->kve_start, size, kve->kve_protection & KVME_PROT_READ, | 
|  | kve->kve_protection & KVME_PROT_WRITE, | 
|  | kve->kve_protection & KVME_PROT_EXEC, 1, data); | 
|  | } | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /* Implement the "info_proc" target_ops method.  */ | 
|  |  | 
|  | bool | 
|  | nbsd_nat_target::info_proc (const char *args, enum info_proc_what what) | 
|  | { | 
|  | pid_t pid; | 
|  | bool do_cmdline = false; | 
|  | bool do_cwd = false; | 
|  | bool do_exe = false; | 
|  | bool do_mappings = false; | 
|  | bool do_status = false; | 
|  |  | 
|  | switch (what) | 
|  | { | 
|  | case IP_MINIMAL: | 
|  | do_cmdline = true; | 
|  | do_cwd = true; | 
|  | do_exe = true; | 
|  | break; | 
|  | case IP_STAT: | 
|  | case IP_STATUS: | 
|  | do_status = true; | 
|  | break; | 
|  | case IP_MAPPINGS: | 
|  | do_mappings = true; | 
|  | break; | 
|  | case IP_CMDLINE: | 
|  | do_cmdline = true; | 
|  | break; | 
|  | case IP_EXE: | 
|  | do_exe = true; | 
|  | break; | 
|  | case IP_CWD: | 
|  | do_cwd = true; | 
|  | break; | 
|  | case IP_ALL: | 
|  | do_cmdline = true; | 
|  | do_cwd = true; | 
|  | do_exe = true; | 
|  | do_mappings = true; | 
|  | do_status = true; | 
|  | break; | 
|  | default: | 
|  | error (_("Not supported on this target.")); | 
|  | } | 
|  |  | 
|  | gdb_argv built_argv (args); | 
|  | if (built_argv.count () == 0) | 
|  | { | 
|  | pid = inferior_ptid.pid (); | 
|  | if (pid == 0) | 
|  | error (_("No current process: you must name one.")); | 
|  | } | 
|  | else if (built_argv.count () == 1 && isdigit (built_argv[0][0])) | 
|  | pid = strtol (built_argv[0], NULL, 10); | 
|  | else | 
|  | error (_("Invalid arguments.")); | 
|  |  | 
|  | printf_filtered (_("process %d\n"), pid); | 
|  |  | 
|  | if (do_cmdline) | 
|  | { | 
|  | gdb::unique_xmalloc_ptr<char[]> cmdline = nbsd_pid_to_cmdline (pid); | 
|  | if (cmdline != nullptr) | 
|  | printf_filtered ("cmdline = '%s'\n", cmdline.get ()); | 
|  | else | 
|  | warning (_("unable to fetch command line")); | 
|  | } | 
|  | if (do_cwd) | 
|  | { | 
|  | std::string cwd = nbsd_pid_to_cwd (pid); | 
|  | if (cwd != "") | 
|  | printf_filtered ("cwd = '%s'\n", cwd.c_str ()); | 
|  | else | 
|  | warning (_("unable to fetch current working directory")); | 
|  | } | 
|  | if (do_exe) | 
|  | { | 
|  | const char *exe = pid_to_exec_file (pid); | 
|  | if (exe != nullptr) | 
|  | printf_filtered ("exe = '%s'\n", exe); | 
|  | else | 
|  | warning (_("unable to fetch executable path name")); | 
|  | } | 
|  | if (do_mappings) | 
|  | { | 
|  | size_t nvment; | 
|  | gdb::unique_xmalloc_ptr<struct kinfo_vmentry[]> vmentl | 
|  | = nbsd_kinfo_get_vmmap (pid, &nvment); | 
|  |  | 
|  | if (vmentl != nullptr) | 
|  | { | 
|  | int addr_bit = TARGET_CHAR_BIT * sizeof (void *); | 
|  | nbsd_info_proc_mappings_header (addr_bit); | 
|  |  | 
|  | struct kinfo_vmentry *kve = vmentl.get (); | 
|  | for (int i = 0; i < nvment; i++, kve++) | 
|  | nbsd_info_proc_mappings_entry (addr_bit, kve->kve_start, | 
|  | kve->kve_end, kve->kve_offset, | 
|  | kve->kve_flags, kve->kve_protection, | 
|  | kve->kve_path); | 
|  | } | 
|  | else | 
|  | warning (_("unable to fetch virtual memory map")); | 
|  | } | 
|  | if (do_status) | 
|  | { | 
|  | struct kinfo_proc2 kp; | 
|  | if (!nbsd_pid_to_kinfo_proc2 (pid, &kp)) | 
|  | warning (_("Failed to fetch process information")); | 
|  | else | 
|  | { | 
|  | auto process_status | 
|  | = [] (int8_t stat) | 
|  | { | 
|  | switch (stat) | 
|  | { | 
|  | case SIDL: | 
|  | return "IDL"; | 
|  | case SACTIVE: | 
|  | return "ACTIVE"; | 
|  | case SDYING: | 
|  | return "DYING"; | 
|  | case SSTOP: | 
|  | return "STOP"; | 
|  | case SZOMB: | 
|  | return "ZOMB"; | 
|  | case SDEAD: | 
|  | return "DEAD"; | 
|  | default: | 
|  | return "? (unknown)"; | 
|  | } | 
|  | }; | 
|  |  | 
|  | printf_filtered ("Name: %s\n", kp.p_comm); | 
|  | printf_filtered ("State: %s\n", process_status(kp.p_realstat)); | 
|  | printf_filtered ("Parent process: %" PRId32 "\n", kp.p_ppid); | 
|  | printf_filtered ("Process group: %" PRId32 "\n", kp.p__pgid); | 
|  | printf_filtered ("Session id: %" PRId32 "\n", kp.p_sid); | 
|  | printf_filtered ("TTY: %" PRId32 "\n", kp.p_tdev); | 
|  | printf_filtered ("TTY owner process group: %" PRId32 "\n", kp.p_tpgid); | 
|  | printf_filtered ("User IDs (real, effective, saved): " | 
|  | "%" PRIu32 " %" PRIu32 " %" PRIu32 "\n", | 
|  | kp.p_ruid, kp.p_uid, kp.p_svuid); | 
|  | printf_filtered ("Group IDs (real, effective, saved): " | 
|  | "%" PRIu32 " %" PRIu32 " %" PRIu32 "\n", | 
|  | kp.p_rgid, kp.p_gid, kp.p_svgid); | 
|  |  | 
|  | printf_filtered ("Groups:"); | 
|  | for (int i = 0; i < kp.p_ngroups; i++) | 
|  | printf_filtered (" %" PRIu32, kp.p_groups[i]); | 
|  | printf_filtered ("\n"); | 
|  | printf_filtered ("Minor faults (no memory page): %" PRIu64 "\n", | 
|  | kp.p_uru_minflt); | 
|  | printf_filtered ("Major faults (memory page faults): %" PRIu64 "\n", | 
|  | kp.p_uru_majflt); | 
|  | printf_filtered ("utime: %" PRIu32 ".%06" PRIu32 "\n", | 
|  | kp.p_uutime_sec, kp.p_uutime_usec); | 
|  | printf_filtered ("stime: %" PRIu32 ".%06" PRIu32 "\n", | 
|  | kp.p_ustime_sec, kp.p_ustime_usec); | 
|  | printf_filtered ("utime+stime, children: %" PRIu32 ".%06" PRIu32 "\n", | 
|  | kp.p_uctime_sec, kp.p_uctime_usec); | 
|  | printf_filtered ("'nice' value: %" PRIu8 "\n", kp.p_nice); | 
|  | printf_filtered ("Start time: %" PRIu32 ".%06" PRIu32 "\n", | 
|  | kp.p_ustart_sec, kp.p_ustart_usec); | 
|  | int pgtok = getpagesize () / 1024; | 
|  | printf_filtered ("Data size: %" PRIuMAX " kB\n", | 
|  | (uintmax_t) kp.p_vm_dsize * pgtok); | 
|  | printf_filtered ("Stack size: %" PRIuMAX " kB\n", | 
|  | (uintmax_t) kp.p_vm_ssize * pgtok); | 
|  | printf_filtered ("Text size: %" PRIuMAX " kB\n", | 
|  | (uintmax_t) kp.p_vm_tsize * pgtok); | 
|  | printf_filtered ("Resident set size: %" PRIuMAX " kB\n", | 
|  | (uintmax_t) kp.p_vm_rssize * pgtok); | 
|  | printf_filtered ("Maximum RSS: %" PRIu64 " kB\n", kp.p_uru_maxrss); | 
|  | printf_filtered ("Pending Signals:"); | 
|  | for (size_t i = 0; i < ARRAY_SIZE (kp.p_siglist.__bits); i++) | 
|  | printf_filtered (" %08" PRIx32, kp.p_siglist.__bits[i]); | 
|  | printf_filtered ("\n"); | 
|  | printf_filtered ("Ignored Signals:"); | 
|  | for (size_t i = 0; i < ARRAY_SIZE (kp.p_sigignore.__bits); i++) | 
|  | printf_filtered (" %08" PRIx32, kp.p_sigignore.__bits[i]); | 
|  | printf_filtered ("\n"); | 
|  | printf_filtered ("Caught Signals:"); | 
|  | for (size_t i = 0; i < ARRAY_SIZE (kp.p_sigcatch.__bits); i++) | 
|  | printf_filtered (" %08" PRIx32, kp.p_sigcatch.__bits[i]); | 
|  | printf_filtered ("\n"); | 
|  | } | 
|  | } | 
|  |  | 
|  | return true; | 
|  | } | 
|  |  | 
|  | /* Resume execution of a specified PTID, that points to a process or a thread | 
|  | within a process.  If one thread is specified, all other threads are | 
|  | suspended.  If STEP is nonzero, single-step it.  If SIGNAL is nonzero, | 
|  | give it that signal.  */ | 
|  |  | 
|  | static void | 
|  | nbsd_resume(nbsd_nat_target *target, ptid_t ptid, int step, | 
|  | enum gdb_signal signal) | 
|  | { | 
|  | int request; | 
|  |  | 
|  | gdb_assert (minus_one_ptid != ptid); | 
|  |  | 
|  | if (ptid.lwp_p ()) | 
|  | { | 
|  | /* If ptid is a specific LWP, suspend all other LWPs in the process.  */ | 
|  | inferior *inf = find_inferior_ptid (target, ptid); | 
|  |  | 
|  | for (thread_info *tp : inf->non_exited_threads ()) | 
|  | { | 
|  | if (tp->ptid.lwp () == ptid.lwp ()) | 
|  | request = PT_RESUME; | 
|  | else | 
|  | request = PT_SUSPEND; | 
|  |  | 
|  | if (ptrace (request, tp->ptid.pid (), NULL, tp->ptid.lwp ()) == -1) | 
|  | perror_with_name (("ptrace")); | 
|  | } | 
|  | } | 
|  | else | 
|  | { | 
|  | /* If ptid is a wildcard, resume all matching threads (they won't run | 
|  | until the process is continued however).  */ | 
|  | for (thread_info *tp : all_non_exited_threads (target, ptid)) | 
|  | if (ptrace (PT_RESUME, tp->ptid.pid (), NULL, tp->ptid.lwp ()) == -1) | 
|  | perror_with_name (("ptrace")); | 
|  | } | 
|  |  | 
|  | if (step) | 
|  | { | 
|  | for (thread_info *tp : all_non_exited_threads (target, ptid)) | 
|  | if (ptrace (PT_SETSTEP, tp->ptid.pid (), NULL, tp->ptid.lwp ()) == -1) | 
|  | perror_with_name (("ptrace")); | 
|  | } | 
|  | else | 
|  | { | 
|  | for (thread_info *tp : all_non_exited_threads (target, ptid)) | 
|  | if (ptrace (PT_CLEARSTEP, tp->ptid.pid (), NULL, tp->ptid.lwp ()) == -1) | 
|  | perror_with_name (("ptrace")); | 
|  | } | 
|  |  | 
|  | if (catch_syscall_enabled () > 0) | 
|  | request = PT_SYSCALL; | 
|  | else | 
|  | request = PT_CONTINUE; | 
|  |  | 
|  | /* An address of (void *)1 tells ptrace to continue from | 
|  | where it was.  If GDB wanted it to start some other way, we have | 
|  | already written a new program counter value to the child.  */ | 
|  | if (ptrace (request, ptid.pid (), (void *)1, gdb_signal_to_host (signal)) == -1) | 
|  | perror_with_name (("ptrace")); | 
|  | } | 
|  |  | 
|  | /* Resume execution of thread PTID, or all threads of all inferiors | 
|  | if PTID is -1.  If STEP is nonzero, single-step it.  If SIGNAL is nonzero, | 
|  | give it that signal.  */ | 
|  |  | 
|  | void | 
|  | nbsd_nat_target::resume (ptid_t ptid, int step, enum gdb_signal signal) | 
|  | { | 
|  | if (minus_one_ptid != ptid) | 
|  | nbsd_resume (this, ptid, step, signal); | 
|  | else | 
|  | { | 
|  | for (inferior *inf : all_non_exited_inferiors (this)) | 
|  | nbsd_resume (this, ptid_t (inf->pid, 0, 0), step, signal); | 
|  | } | 
|  | } | 
|  |  | 
|  | /* Implement a safe wrapper around waitpid().  */ | 
|  |  | 
|  | static pid_t | 
|  | nbsd_wait (ptid_t ptid, struct target_waitstatus *ourstatus, | 
|  | target_wait_flags options) | 
|  | { | 
|  | pid_t pid; | 
|  | int status; | 
|  |  | 
|  | set_sigint_trap (); | 
|  |  | 
|  | do | 
|  | { | 
|  | /* The common code passes WNOHANG that leads to crashes, overwrite it.  */ | 
|  | pid = waitpid (ptid.pid (), &status, 0); | 
|  | } | 
|  | while (pid == -1 && errno == EINTR); | 
|  |  | 
|  | clear_sigint_trap (); | 
|  |  | 
|  | if (pid == -1) | 
|  | perror_with_name (_("Child process unexpectedly missing")); | 
|  |  | 
|  | store_waitstatus (ourstatus, status); | 
|  | return pid; | 
|  | } | 
|  |  | 
|  | /* Wait for the child specified by PTID to do something.  Return the | 
|  | process ID of the child, or MINUS_ONE_PTID in case of error; store | 
|  | the status in *OURSTATUS.  */ | 
|  |  | 
|  | ptid_t | 
|  | nbsd_nat_target::wait (ptid_t ptid, struct target_waitstatus *ourstatus, | 
|  | target_wait_flags target_options) | 
|  | { | 
|  | pid_t pid = nbsd_wait (ptid, ourstatus, target_options); | 
|  | ptid_t wptid = ptid_t (pid); | 
|  |  | 
|  | /* If the child stopped, keep investigating its status.  */ | 
|  | if (ourstatus->kind () != TARGET_WAITKIND_STOPPED) | 
|  | return wptid; | 
|  |  | 
|  | /* Extract the event and thread that received a signal.  */ | 
|  | ptrace_siginfo_t psi; | 
|  | if (ptrace (PT_GET_SIGINFO, pid, &psi, sizeof (psi)) == -1) | 
|  | perror_with_name (("ptrace")); | 
|  |  | 
|  | /* Pick child's siginfo_t.  */ | 
|  | siginfo_t *si = &psi.psi_siginfo; | 
|  |  | 
|  | int lwp = psi.psi_lwpid; | 
|  |  | 
|  | int signo = si->si_signo; | 
|  | const int code = si->si_code; | 
|  |  | 
|  | /* Construct PTID with a specified thread that received the event. | 
|  | If a signal was targeted to the whole process, lwp is 0.  */ | 
|  | wptid = ptid_t (pid, lwp, 0); | 
|  |  | 
|  | /* Bail out on non-debugger oriented signals..  */ | 
|  | if (signo != SIGTRAP) | 
|  | return wptid; | 
|  |  | 
|  | /* Stop examining non-debugger oriented SIGTRAP codes.  */ | 
|  | if (code <= SI_USER || code == SI_NOINFO) | 
|  | return wptid; | 
|  |  | 
|  | /* Process state for threading events */ | 
|  | ptrace_state_t pst = {}; | 
|  | if (code == TRAP_LWP) | 
|  | { | 
|  | if (ptrace (PT_GET_PROCESS_STATE, pid, &pst, sizeof (pst)) == -1) | 
|  | perror_with_name (("ptrace")); | 
|  | } | 
|  |  | 
|  | if (code == TRAP_LWP && pst.pe_report_event == PTRACE_LWP_EXIT) | 
|  | { | 
|  | /* If GDB attaches to a multi-threaded process, exiting | 
|  | threads might be skipped during post_attach that | 
|  | have not yet reported their PTRACE_LWP_EXIT event. | 
|  | Ignore exited events for an unknown LWP.  */ | 
|  | thread_info *thr = find_thread_ptid (this, wptid); | 
|  | if (thr == nullptr) | 
|  | ourstatus->set_spurious (); | 
|  | else | 
|  | { | 
|  | /* NetBSD does not store an LWP exit status.  */ | 
|  | ourstatus->set_thread_exited (0); | 
|  |  | 
|  | if (print_thread_events) | 
|  | printf_unfiltered (_("[%s exited]\n"), | 
|  | target_pid_to_str (wptid).c_str ()); | 
|  | delete_thread (thr); | 
|  | } | 
|  |  | 
|  | /* The GDB core expects that the rest of the threads are running.  */ | 
|  | if (ptrace (PT_CONTINUE, pid, (void *) 1, 0) == -1) | 
|  | perror_with_name (("ptrace")); | 
|  |  | 
|  | return wptid; | 
|  | } | 
|  |  | 
|  | if (in_thread_list (this, ptid_t (pid))) | 
|  | thread_change_ptid (this, ptid_t (pid), wptid); | 
|  |  | 
|  | if (code == TRAP_LWP && pst.pe_report_event == PTRACE_LWP_CREATE) | 
|  | { | 
|  | /* If GDB attaches to a multi-threaded process, newborn | 
|  | threads might be added by nbsd_add_threads that have | 
|  | not yet reported their PTRACE_LWP_CREATE event.  Ignore | 
|  | born events for an already-known LWP.  */ | 
|  | if (in_thread_list (this, wptid)) | 
|  | ourstatus->set_spurious (); | 
|  | else | 
|  | { | 
|  | add_thread (this, wptid); | 
|  | ourstatus->set_thread_created (); | 
|  | } | 
|  | return wptid; | 
|  | } | 
|  |  | 
|  | if (code == TRAP_EXEC) | 
|  | { | 
|  | ourstatus->set_execd (make_unique_xstrdup (pid_to_exec_file (pid))); | 
|  | return wptid; | 
|  | } | 
|  |  | 
|  | if (code == TRAP_TRACE) | 
|  | { | 
|  | /* Unhandled at this level.  */ | 
|  | return wptid; | 
|  | } | 
|  |  | 
|  | if (code == TRAP_SCE || code == TRAP_SCX) | 
|  | { | 
|  | int sysnum = si->si_sysnum; | 
|  |  | 
|  | if (!catch_syscall_enabled () || !catching_syscall_number (sysnum)) | 
|  | { | 
|  | /* If the core isn't interested in this event, ignore it.  */ | 
|  | ourstatus->set_spurious (); | 
|  | return wptid; | 
|  | } | 
|  |  | 
|  | if (code == TRAP_SCE) | 
|  | ourstatus->set_syscall_entry (sysnum); | 
|  | else | 
|  | ourstatus->set_syscall_return (sysnum); | 
|  | return wptid; | 
|  | } | 
|  |  | 
|  | if (code == TRAP_BRKPT) | 
|  | { | 
|  | /* Unhandled at this level.  */ | 
|  | return wptid; | 
|  | } | 
|  |  | 
|  | /* Unclassified SIGTRAP event.  */ | 
|  | ourstatus->set_spurious (); | 
|  | return wptid; | 
|  | } | 
|  |  | 
|  | /* Implement the "insert_exec_catchpoint" target_ops method.  */ | 
|  |  | 
|  | int | 
|  | nbsd_nat_target::insert_exec_catchpoint (int pid) | 
|  | { | 
|  | /* Nothing to do.  */ | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /* Implement the "remove_exec_catchpoint" target_ops method.  */ | 
|  |  | 
|  | int | 
|  | nbsd_nat_target::remove_exec_catchpoint (int pid) | 
|  | { | 
|  | /* Nothing to do.  */ | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /* Implement the "set_syscall_catchpoint" target_ops method.  */ | 
|  |  | 
|  | int | 
|  | nbsd_nat_target::set_syscall_catchpoint (int pid, bool needed, | 
|  | int any_count, | 
|  | gdb::array_view<const int> syscall_counts) | 
|  | { | 
|  | /* Ignore the arguments.  inf-ptrace.c will use PT_SYSCALL which | 
|  | will catch all system call entries and exits.  The system calls | 
|  | are filtered by GDB rather than the kernel.  */ | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /* Implement the "supports_multi_process" target_ops method. */ | 
|  |  | 
|  | bool | 
|  | nbsd_nat_target::supports_multi_process () | 
|  | { | 
|  | return true; | 
|  | } | 
|  |  | 
|  | /* Implement the "xfer_partial" target_ops method.  */ | 
|  |  | 
|  | enum target_xfer_status | 
|  | nbsd_nat_target::xfer_partial (enum target_object object, | 
|  | const char *annex, gdb_byte *readbuf, | 
|  | const gdb_byte *writebuf, | 
|  | ULONGEST offset, ULONGEST len, | 
|  | ULONGEST *xfered_len) | 
|  | { | 
|  | pid_t pid = inferior_ptid.pid (); | 
|  |  | 
|  | switch (object) | 
|  | { | 
|  | case TARGET_OBJECT_SIGNAL_INFO: | 
|  | { | 
|  | len = netbsd_nat::qxfer_siginfo(pid, annex, readbuf, writebuf, offset, | 
|  | len); | 
|  |  | 
|  | if (len == -1) | 
|  | return TARGET_XFER_E_IO; | 
|  |  | 
|  | *xfered_len = len; | 
|  | return TARGET_XFER_OK; | 
|  | } | 
|  | case TARGET_OBJECT_MEMORY: | 
|  | { | 
|  | size_t xfered; | 
|  | int res; | 
|  | if (writebuf != nullptr) | 
|  | res = netbsd_nat::write_memory (pid, writebuf, offset, len, &xfered); | 
|  | else | 
|  | res = netbsd_nat::read_memory (pid, readbuf, offset, len, &xfered); | 
|  | if (res != 0) | 
|  | { | 
|  | if (res == EACCES) | 
|  | fprintf_unfiltered (gdb_stderr, "Cannot %s process at %s (%s). " | 
|  | "Is PaX MPROTECT active? See security(7), " | 
|  | "sysctl(7), paxctl(8)\n", | 
|  | (writebuf ? "write to" : "read from"), | 
|  | pulongest (offset), safe_strerror (errno)); | 
|  | return TARGET_XFER_E_IO; | 
|  | } | 
|  | if (xfered == 0) | 
|  | return TARGET_XFER_EOF; | 
|  | *xfered_len = (ULONGEST) xfered; | 
|  | return TARGET_XFER_OK; | 
|  | } | 
|  | default: | 
|  | return inf_ptrace_target::xfer_partial (object, annex, | 
|  | readbuf, writebuf, offset, | 
|  | len, xfered_len); | 
|  | } | 
|  | } | 
|  |  | 
|  | /* Implement the "supports_dumpcore" target_ops method.  */ | 
|  |  | 
|  | bool | 
|  | nbsd_nat_target::supports_dumpcore () | 
|  | { | 
|  | return true; | 
|  | } | 
|  |  | 
|  | /* Implement the "dumpcore" target_ops method.  */ | 
|  |  | 
|  | void | 
|  | nbsd_nat_target::dumpcore (const char *filename) | 
|  | { | 
|  | pid_t pid = inferior_ptid.pid (); | 
|  |  | 
|  | if (ptrace (PT_DUMPCORE, pid, const_cast<char *>(filename), | 
|  | strlen (filename)) == -1) | 
|  | perror_with_name (("ptrace")); | 
|  | } |