mirror of
https://sourceware.org/git/binutils-gdb.git
synced 2024-12-21 04:42:53 +08:00
183be22290
I stumbled on a bug caused by the fact that a code path read target_waitstatus::value::sig (expecting it to contain a gdb_signal value) while target_waitstatus::kind was TARGET_WAITKIND_FORKED. This meant that the active union field was in fact target_waitstatus::value::related_pid, and contained a ptid. The read signal value was therefore garbage, and that caused GDB to crash soon after. Or, since that GDB was built with ubsan, this nice error message: /home/simark/src/binutils-gdb/gdb/linux-nat.c:1271:12: runtime error: load of value 2686365, which is not a valid value for type 'gdb_signal' Despite being a large-ish change, I think it would be nice to make target_waitstatus safe against that kind of bug. As already done elsewhere (e.g. dynamic_prop), validate that the type of value read from the union matches what is supposed to be the active field. - Make the kind and value of target_waitstatus private. - Make the kind initialized to TARGET_WAITKIND_IGNORE on target_waitstatus construction. This is what most users appear to do explicitly. - Add setters, one for each kind. Each setter takes as a parameter the data associated to that kind, if any. This makes it impossible to forget to attach the associated data. - Add getters, one for each associated data type. Each getter validates that the data type fetched by the user matches the wait status kind. - Change "integer" to "exit_status", "related_pid" to "child_ptid", just because that's more precise terminology. - Fix all users. That last point is semi-mechanical. There are a lot of obvious changes, but some less obvious ones. For example, it's not possible to set the kind at some point and the associated data later, as some users did. But in any case, the intent of the code should not change in this patch. This was tested on x86-64 Linux (unix, native-gdbserver and native-extended-gdbserver boards). It was built-tested on x86-64 FreeBSD, NetBSD, MinGW and macOS. The rest of the changes to native files was done as a best effort. If I forgot any place to update in these files, it should be easy to fix (unless the change happens to reveal an actual bug). Change-Id: I0ae967df1ff6e28de78abbe3ac9b4b2ff4ad03b7
814 lines
22 KiB
C
814 lines
22 KiB
C
/* Native-dependent code for NetBSD.
|
|
|
|
Copyright (C) 2006-2021 Free Software Foundation, Inc.
|
|
|
|
This file is part of GDB.
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>. */
|
|
|
|
#include "defs.h"
|
|
|
|
#include "netbsd-nat.h"
|
|
#include "nat/netbsd-nat.h"
|
|
#include "gdbthread.h"
|
|
#include "netbsd-tdep.h"
|
|
#include "inferior.h"
|
|
#include "gdbarch.h"
|
|
|
|
#include <sys/types.h>
|
|
#include <sys/ptrace.h>
|
|
#include <sys/sysctl.h>
|
|
#include <sys/wait.h>
|
|
|
|
/* Return the name of a file that can be opened to get the symbols for
|
|
the child process identified by PID. */
|
|
|
|
char *
|
|
nbsd_nat_target::pid_to_exec_file (int pid)
|
|
{
|
|
return const_cast<char *> (netbsd_nat::pid_to_exec_file (pid));
|
|
}
|
|
|
|
/* Return the current directory for the process identified by PID. */
|
|
|
|
static std::string
|
|
nbsd_pid_to_cwd (int pid)
|
|
{
|
|
char buf[PATH_MAX];
|
|
size_t buflen;
|
|
int mib[4] = {CTL_KERN, KERN_PROC_ARGS, pid, KERN_PROC_CWD};
|
|
buflen = sizeof (buf);
|
|
if (sysctl (mib, ARRAY_SIZE (mib), buf, &buflen, NULL, 0))
|
|
return "";
|
|
return buf;
|
|
}
|
|
|
|
/* Return the kinfo_proc2 structure for the process identified by PID. */
|
|
|
|
static bool
|
|
nbsd_pid_to_kinfo_proc2 (pid_t pid, struct kinfo_proc2 *kp)
|
|
{
|
|
gdb_assert (kp != nullptr);
|
|
|
|
size_t size = sizeof (*kp);
|
|
int mib[6] = {CTL_KERN, KERN_PROC2, KERN_PROC_PID, pid,
|
|
static_cast<int> (size), 1};
|
|
return !sysctl (mib, ARRAY_SIZE (mib), kp, &size, NULL, 0);
|
|
}
|
|
|
|
/* Return the command line for the process identified by PID. */
|
|
|
|
static gdb::unique_xmalloc_ptr<char[]>
|
|
nbsd_pid_to_cmdline (int pid)
|
|
{
|
|
int mib[4] = {CTL_KERN, KERN_PROC_ARGS, pid, KERN_PROC_ARGV};
|
|
|
|
size_t size = 0;
|
|
if (::sysctl (mib, ARRAY_SIZE (mib), NULL, &size, NULL, 0) == -1 || size == 0)
|
|
return nullptr;
|
|
|
|
gdb::unique_xmalloc_ptr<char[]> args (XNEWVAR (char, size));
|
|
|
|
if (::sysctl (mib, ARRAY_SIZE (mib), args.get (), &size, NULL, 0) == -1
|
|
|| size == 0)
|
|
return nullptr;
|
|
|
|
/* Arguments are returned as a flattened string with NUL separators.
|
|
Join the arguments with spaces to form a single string. */
|
|
for (size_t i = 0; i < size - 1; i++)
|
|
if (args[i] == '\0')
|
|
args[i] = ' ';
|
|
args[size - 1] = '\0';
|
|
|
|
return args;
|
|
}
|
|
|
|
/* Return true if PTID is still active in the inferior. */
|
|
|
|
bool
|
|
nbsd_nat_target::thread_alive (ptid_t ptid)
|
|
{
|
|
return netbsd_nat::thread_alive (ptid);
|
|
}
|
|
|
|
/* Return the name assigned to a thread by an application. Returns
|
|
the string in a static buffer. */
|
|
|
|
const char *
|
|
nbsd_nat_target::thread_name (struct thread_info *thr)
|
|
{
|
|
ptid_t ptid = thr->ptid;
|
|
return netbsd_nat::thread_name (ptid);
|
|
}
|
|
|
|
/* Implement the "post_attach" target_ops method. */
|
|
|
|
static void
|
|
nbsd_add_threads (nbsd_nat_target *target, pid_t pid)
|
|
{
|
|
auto fn
|
|
= [&target] (ptid_t ptid)
|
|
{
|
|
if (!in_thread_list (target, ptid))
|
|
{
|
|
if (inferior_ptid.lwp () == 0)
|
|
thread_change_ptid (target, inferior_ptid, ptid);
|
|
else
|
|
add_thread (target, ptid);
|
|
}
|
|
};
|
|
|
|
netbsd_nat::for_each_thread (pid, fn);
|
|
}
|
|
|
|
/* Implement the "post_startup_inferior" target_ops method. */
|
|
|
|
void
|
|
nbsd_nat_target::post_startup_inferior (ptid_t ptid)
|
|
{
|
|
netbsd_nat::enable_proc_events (ptid.pid ());
|
|
}
|
|
|
|
/* Implement the "post_attach" target_ops method. */
|
|
|
|
void
|
|
nbsd_nat_target::post_attach (int pid)
|
|
{
|
|
netbsd_nat::enable_proc_events (pid);
|
|
nbsd_add_threads (this, pid);
|
|
}
|
|
|
|
/* Implement the "update_thread_list" target_ops method. */
|
|
|
|
void
|
|
nbsd_nat_target::update_thread_list ()
|
|
{
|
|
delete_exited_threads ();
|
|
}
|
|
|
|
/* Convert PTID to a string. */
|
|
|
|
std::string
|
|
nbsd_nat_target::pid_to_str (ptid_t ptid)
|
|
{
|
|
int lwp = ptid.lwp ();
|
|
|
|
if (lwp != 0)
|
|
{
|
|
pid_t pid = ptid.pid ();
|
|
|
|
return string_printf ("LWP %d of process %d", lwp, pid);
|
|
}
|
|
|
|
return normal_pid_to_str (ptid);
|
|
}
|
|
|
|
/* Retrieve all the memory regions in the specified process. */
|
|
|
|
static gdb::unique_xmalloc_ptr<struct kinfo_vmentry[]>
|
|
nbsd_kinfo_get_vmmap (pid_t pid, size_t *size)
|
|
{
|
|
int mib[5] = {CTL_VM, VM_PROC, VM_PROC_MAP, pid,
|
|
sizeof (struct kinfo_vmentry)};
|
|
|
|
size_t length = 0;
|
|
if (sysctl (mib, ARRAY_SIZE (mib), NULL, &length, NULL, 0))
|
|
{
|
|
*size = 0;
|
|
return NULL;
|
|
}
|
|
|
|
/* Prereserve more space. The length argument is volatile and can change
|
|
between the sysctl(3) calls as this function can be called against a
|
|
running process. */
|
|
length = length * 5 / 3;
|
|
|
|
gdb::unique_xmalloc_ptr<struct kinfo_vmentry[]> kiv
|
|
(XNEWVAR (kinfo_vmentry, length));
|
|
|
|
if (sysctl (mib, ARRAY_SIZE (mib), kiv.get (), &length, NULL, 0))
|
|
{
|
|
*size = 0;
|
|
return NULL;
|
|
}
|
|
|
|
*size = length / sizeof (struct kinfo_vmentry);
|
|
return kiv;
|
|
}
|
|
|
|
/* Iterate over all the memory regions in the current inferior,
|
|
calling FUNC for each memory region. OBFD is passed as the last
|
|
argument to FUNC. */
|
|
|
|
int
|
|
nbsd_nat_target::find_memory_regions (find_memory_region_ftype func,
|
|
void *data)
|
|
{
|
|
pid_t pid = inferior_ptid.pid ();
|
|
|
|
size_t nitems;
|
|
gdb::unique_xmalloc_ptr<struct kinfo_vmentry[]> vmentl
|
|
= nbsd_kinfo_get_vmmap (pid, &nitems);
|
|
if (vmentl == NULL)
|
|
perror_with_name (_("Couldn't fetch VM map entries."));
|
|
|
|
for (size_t i = 0; i < nitems; i++)
|
|
{
|
|
struct kinfo_vmentry *kve = &vmentl[i];
|
|
|
|
/* Skip unreadable segments and those where MAP_NOCORE has been set. */
|
|
if (!(kve->kve_protection & KVME_PROT_READ)
|
|
|| kve->kve_flags & KVME_FLAG_NOCOREDUMP)
|
|
continue;
|
|
|
|
/* Skip segments with an invalid type. */
|
|
switch (kve->kve_type)
|
|
{
|
|
case KVME_TYPE_VNODE:
|
|
case KVME_TYPE_ANON:
|
|
case KVME_TYPE_SUBMAP:
|
|
case KVME_TYPE_OBJECT:
|
|
break;
|
|
default:
|
|
continue;
|
|
}
|
|
|
|
size_t size = kve->kve_end - kve->kve_start;
|
|
if (info_verbose)
|
|
{
|
|
fprintf_filtered (gdb_stdout,
|
|
"Save segment, %ld bytes at %s (%c%c%c)\n",
|
|
(long) size,
|
|
paddress (target_gdbarch (), kve->kve_start),
|
|
kve->kve_protection & KVME_PROT_READ ? 'r' : '-',
|
|
kve->kve_protection & KVME_PROT_WRITE ? 'w' : '-',
|
|
kve->kve_protection & KVME_PROT_EXEC ? 'x' : '-');
|
|
}
|
|
|
|
/* Invoke the callback function to create the corefile segment.
|
|
Pass MODIFIED as true, we do not know the real modification state. */
|
|
func (kve->kve_start, size, kve->kve_protection & KVME_PROT_READ,
|
|
kve->kve_protection & KVME_PROT_WRITE,
|
|
kve->kve_protection & KVME_PROT_EXEC, 1, data);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
/* Implement the "info_proc" target_ops method. */
|
|
|
|
bool
|
|
nbsd_nat_target::info_proc (const char *args, enum info_proc_what what)
|
|
{
|
|
pid_t pid;
|
|
bool do_cmdline = false;
|
|
bool do_cwd = false;
|
|
bool do_exe = false;
|
|
bool do_mappings = false;
|
|
bool do_status = false;
|
|
|
|
switch (what)
|
|
{
|
|
case IP_MINIMAL:
|
|
do_cmdline = true;
|
|
do_cwd = true;
|
|
do_exe = true;
|
|
break;
|
|
case IP_STAT:
|
|
case IP_STATUS:
|
|
do_status = true;
|
|
break;
|
|
case IP_MAPPINGS:
|
|
do_mappings = true;
|
|
break;
|
|
case IP_CMDLINE:
|
|
do_cmdline = true;
|
|
break;
|
|
case IP_EXE:
|
|
do_exe = true;
|
|
break;
|
|
case IP_CWD:
|
|
do_cwd = true;
|
|
break;
|
|
case IP_ALL:
|
|
do_cmdline = true;
|
|
do_cwd = true;
|
|
do_exe = true;
|
|
do_mappings = true;
|
|
do_status = true;
|
|
break;
|
|
default:
|
|
error (_("Not supported on this target."));
|
|
}
|
|
|
|
gdb_argv built_argv (args);
|
|
if (built_argv.count () == 0)
|
|
{
|
|
pid = inferior_ptid.pid ();
|
|
if (pid == 0)
|
|
error (_("No current process: you must name one."));
|
|
}
|
|
else if (built_argv.count () == 1 && isdigit (built_argv[0][0]))
|
|
pid = strtol (built_argv[0], NULL, 10);
|
|
else
|
|
error (_("Invalid arguments."));
|
|
|
|
printf_filtered (_("process %d\n"), pid);
|
|
|
|
if (do_cmdline)
|
|
{
|
|
gdb::unique_xmalloc_ptr<char[]> cmdline = nbsd_pid_to_cmdline (pid);
|
|
if (cmdline != nullptr)
|
|
printf_filtered ("cmdline = '%s'\n", cmdline.get ());
|
|
else
|
|
warning (_("unable to fetch command line"));
|
|
}
|
|
if (do_cwd)
|
|
{
|
|
std::string cwd = nbsd_pid_to_cwd (pid);
|
|
if (cwd != "")
|
|
printf_filtered ("cwd = '%s'\n", cwd.c_str ());
|
|
else
|
|
warning (_("unable to fetch current working directory"));
|
|
}
|
|
if (do_exe)
|
|
{
|
|
const char *exe = pid_to_exec_file (pid);
|
|
if (exe != nullptr)
|
|
printf_filtered ("exe = '%s'\n", exe);
|
|
else
|
|
warning (_("unable to fetch executable path name"));
|
|
}
|
|
if (do_mappings)
|
|
{
|
|
size_t nvment;
|
|
gdb::unique_xmalloc_ptr<struct kinfo_vmentry[]> vmentl
|
|
= nbsd_kinfo_get_vmmap (pid, &nvment);
|
|
|
|
if (vmentl != nullptr)
|
|
{
|
|
int addr_bit = TARGET_CHAR_BIT * sizeof (void *);
|
|
nbsd_info_proc_mappings_header (addr_bit);
|
|
|
|
struct kinfo_vmentry *kve = vmentl.get ();
|
|
for (int i = 0; i < nvment; i++, kve++)
|
|
nbsd_info_proc_mappings_entry (addr_bit, kve->kve_start,
|
|
kve->kve_end, kve->kve_offset,
|
|
kve->kve_flags, kve->kve_protection,
|
|
kve->kve_path);
|
|
}
|
|
else
|
|
warning (_("unable to fetch virtual memory map"));
|
|
}
|
|
if (do_status)
|
|
{
|
|
struct kinfo_proc2 kp;
|
|
if (!nbsd_pid_to_kinfo_proc2 (pid, &kp))
|
|
warning (_("Failed to fetch process information"));
|
|
else
|
|
{
|
|
auto process_status
|
|
= [] (int8_t stat)
|
|
{
|
|
switch (stat)
|
|
{
|
|
case SIDL:
|
|
return "IDL";
|
|
case SACTIVE:
|
|
return "ACTIVE";
|
|
case SDYING:
|
|
return "DYING";
|
|
case SSTOP:
|
|
return "STOP";
|
|
case SZOMB:
|
|
return "ZOMB";
|
|
case SDEAD:
|
|
return "DEAD";
|
|
default:
|
|
return "? (unknown)";
|
|
}
|
|
};
|
|
|
|
printf_filtered ("Name: %s\n", kp.p_comm);
|
|
printf_filtered ("State: %s\n", process_status(kp.p_realstat));
|
|
printf_filtered ("Parent process: %" PRId32 "\n", kp.p_ppid);
|
|
printf_filtered ("Process group: %" PRId32 "\n", kp.p__pgid);
|
|
printf_filtered ("Session id: %" PRId32 "\n", kp.p_sid);
|
|
printf_filtered ("TTY: %" PRId32 "\n", kp.p_tdev);
|
|
printf_filtered ("TTY owner process group: %" PRId32 "\n", kp.p_tpgid);
|
|
printf_filtered ("User IDs (real, effective, saved): "
|
|
"%" PRIu32 " %" PRIu32 " %" PRIu32 "\n",
|
|
kp.p_ruid, kp.p_uid, kp.p_svuid);
|
|
printf_filtered ("Group IDs (real, effective, saved): "
|
|
"%" PRIu32 " %" PRIu32 " %" PRIu32 "\n",
|
|
kp.p_rgid, kp.p_gid, kp.p_svgid);
|
|
|
|
printf_filtered ("Groups:");
|
|
for (int i = 0; i < kp.p_ngroups; i++)
|
|
printf_filtered (" %" PRIu32, kp.p_groups[i]);
|
|
printf_filtered ("\n");
|
|
printf_filtered ("Minor faults (no memory page): %" PRIu64 "\n",
|
|
kp.p_uru_minflt);
|
|
printf_filtered ("Major faults (memory page faults): %" PRIu64 "\n",
|
|
kp.p_uru_majflt);
|
|
printf_filtered ("utime: %" PRIu32 ".%06" PRIu32 "\n",
|
|
kp.p_uutime_sec, kp.p_uutime_usec);
|
|
printf_filtered ("stime: %" PRIu32 ".%06" PRIu32 "\n",
|
|
kp.p_ustime_sec, kp.p_ustime_usec);
|
|
printf_filtered ("utime+stime, children: %" PRIu32 ".%06" PRIu32 "\n",
|
|
kp.p_uctime_sec, kp.p_uctime_usec);
|
|
printf_filtered ("'nice' value: %" PRIu8 "\n", kp.p_nice);
|
|
printf_filtered ("Start time: %" PRIu32 ".%06" PRIu32 "\n",
|
|
kp.p_ustart_sec, kp.p_ustart_usec);
|
|
int pgtok = getpagesize () / 1024;
|
|
printf_filtered ("Data size: %" PRIuMAX " kB\n",
|
|
(uintmax_t) kp.p_vm_dsize * pgtok);
|
|
printf_filtered ("Stack size: %" PRIuMAX " kB\n",
|
|
(uintmax_t) kp.p_vm_ssize * pgtok);
|
|
printf_filtered ("Text size: %" PRIuMAX " kB\n",
|
|
(uintmax_t) kp.p_vm_tsize * pgtok);
|
|
printf_filtered ("Resident set size: %" PRIuMAX " kB\n",
|
|
(uintmax_t) kp.p_vm_rssize * pgtok);
|
|
printf_filtered ("Maximum RSS: %" PRIu64 " kB\n", kp.p_uru_maxrss);
|
|
printf_filtered ("Pending Signals:");
|
|
for (size_t i = 0; i < ARRAY_SIZE (kp.p_siglist.__bits); i++)
|
|
printf_filtered (" %08" PRIx32, kp.p_siglist.__bits[i]);
|
|
printf_filtered ("\n");
|
|
printf_filtered ("Ignored Signals:");
|
|
for (size_t i = 0; i < ARRAY_SIZE (kp.p_sigignore.__bits); i++)
|
|
printf_filtered (" %08" PRIx32, kp.p_sigignore.__bits[i]);
|
|
printf_filtered ("\n");
|
|
printf_filtered ("Caught Signals:");
|
|
for (size_t i = 0; i < ARRAY_SIZE (kp.p_sigcatch.__bits); i++)
|
|
printf_filtered (" %08" PRIx32, kp.p_sigcatch.__bits[i]);
|
|
printf_filtered ("\n");
|
|
}
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
/* Resume execution of a specified PTID, that points to a process or a thread
|
|
within a process. If one thread is specified, all other threads are
|
|
suspended. If STEP is nonzero, single-step it. If SIGNAL is nonzero,
|
|
give it that signal. */
|
|
|
|
static void
|
|
nbsd_resume(nbsd_nat_target *target, ptid_t ptid, int step,
|
|
enum gdb_signal signal)
|
|
{
|
|
int request;
|
|
|
|
gdb_assert (minus_one_ptid != ptid);
|
|
|
|
if (ptid.lwp_p ())
|
|
{
|
|
/* If ptid is a specific LWP, suspend all other LWPs in the process. */
|
|
inferior *inf = find_inferior_ptid (target, ptid);
|
|
|
|
for (thread_info *tp : inf->non_exited_threads ())
|
|
{
|
|
if (tp->ptid.lwp () == ptid.lwp ())
|
|
request = PT_RESUME;
|
|
else
|
|
request = PT_SUSPEND;
|
|
|
|
if (ptrace (request, tp->ptid.pid (), NULL, tp->ptid.lwp ()) == -1)
|
|
perror_with_name (("ptrace"));
|
|
}
|
|
}
|
|
else
|
|
{
|
|
/* If ptid is a wildcard, resume all matching threads (they won't run
|
|
until the process is continued however). */
|
|
for (thread_info *tp : all_non_exited_threads (target, ptid))
|
|
if (ptrace (PT_RESUME, tp->ptid.pid (), NULL, tp->ptid.lwp ()) == -1)
|
|
perror_with_name (("ptrace"));
|
|
}
|
|
|
|
if (step)
|
|
{
|
|
for (thread_info *tp : all_non_exited_threads (target, ptid))
|
|
if (ptrace (PT_SETSTEP, tp->ptid.pid (), NULL, tp->ptid.lwp ()) == -1)
|
|
perror_with_name (("ptrace"));
|
|
}
|
|
else
|
|
{
|
|
for (thread_info *tp : all_non_exited_threads (target, ptid))
|
|
if (ptrace (PT_CLEARSTEP, tp->ptid.pid (), NULL, tp->ptid.lwp ()) == -1)
|
|
perror_with_name (("ptrace"));
|
|
}
|
|
|
|
if (catch_syscall_enabled () > 0)
|
|
request = PT_SYSCALL;
|
|
else
|
|
request = PT_CONTINUE;
|
|
|
|
/* An address of (void *)1 tells ptrace to continue from
|
|
where it was. If GDB wanted it to start some other way, we have
|
|
already written a new program counter value to the child. */
|
|
if (ptrace (request, ptid.pid (), (void *)1, gdb_signal_to_host (signal)) == -1)
|
|
perror_with_name (("ptrace"));
|
|
}
|
|
|
|
/* Resume execution of thread PTID, or all threads of all inferiors
|
|
if PTID is -1. If STEP is nonzero, single-step it. If SIGNAL is nonzero,
|
|
give it that signal. */
|
|
|
|
void
|
|
nbsd_nat_target::resume (ptid_t ptid, int step, enum gdb_signal signal)
|
|
{
|
|
if (minus_one_ptid != ptid)
|
|
nbsd_resume (this, ptid, step, signal);
|
|
else
|
|
{
|
|
for (inferior *inf : all_non_exited_inferiors (this))
|
|
nbsd_resume (this, ptid_t (inf->pid, 0, 0), step, signal);
|
|
}
|
|
}
|
|
|
|
/* Implement a safe wrapper around waitpid(). */
|
|
|
|
static pid_t
|
|
nbsd_wait (ptid_t ptid, struct target_waitstatus *ourstatus,
|
|
target_wait_flags options)
|
|
{
|
|
pid_t pid;
|
|
int status;
|
|
|
|
set_sigint_trap ();
|
|
|
|
do
|
|
{
|
|
/* The common code passes WNOHANG that leads to crashes, overwrite it. */
|
|
pid = waitpid (ptid.pid (), &status, 0);
|
|
}
|
|
while (pid == -1 && errno == EINTR);
|
|
|
|
clear_sigint_trap ();
|
|
|
|
if (pid == -1)
|
|
perror_with_name (_("Child process unexpectedly missing"));
|
|
|
|
store_waitstatus (ourstatus, status);
|
|
return pid;
|
|
}
|
|
|
|
/* Wait for the child specified by PTID to do something. Return the
|
|
process ID of the child, or MINUS_ONE_PTID in case of error; store
|
|
the status in *OURSTATUS. */
|
|
|
|
ptid_t
|
|
nbsd_nat_target::wait (ptid_t ptid, struct target_waitstatus *ourstatus,
|
|
target_wait_flags target_options)
|
|
{
|
|
pid_t pid = nbsd_wait (ptid, ourstatus, target_options);
|
|
ptid_t wptid = ptid_t (pid);
|
|
|
|
/* If the child stopped, keep investigating its status. */
|
|
if (ourstatus->kind () != TARGET_WAITKIND_STOPPED)
|
|
return wptid;
|
|
|
|
/* Extract the event and thread that received a signal. */
|
|
ptrace_siginfo_t psi;
|
|
if (ptrace (PT_GET_SIGINFO, pid, &psi, sizeof (psi)) == -1)
|
|
perror_with_name (("ptrace"));
|
|
|
|
/* Pick child's siginfo_t. */
|
|
siginfo_t *si = &psi.psi_siginfo;
|
|
|
|
int lwp = psi.psi_lwpid;
|
|
|
|
int signo = si->si_signo;
|
|
const int code = si->si_code;
|
|
|
|
/* Construct PTID with a specified thread that received the event.
|
|
If a signal was targeted to the whole process, lwp is 0. */
|
|
wptid = ptid_t (pid, lwp, 0);
|
|
|
|
/* Bail out on non-debugger oriented signals.. */
|
|
if (signo != SIGTRAP)
|
|
return wptid;
|
|
|
|
/* Stop examining non-debugger oriented SIGTRAP codes. */
|
|
if (code <= SI_USER || code == SI_NOINFO)
|
|
return wptid;
|
|
|
|
/* Process state for threading events */
|
|
ptrace_state_t pst = {};
|
|
if (code == TRAP_LWP)
|
|
{
|
|
if (ptrace (PT_GET_PROCESS_STATE, pid, &pst, sizeof (pst)) == -1)
|
|
perror_with_name (("ptrace"));
|
|
}
|
|
|
|
if (code == TRAP_LWP && pst.pe_report_event == PTRACE_LWP_EXIT)
|
|
{
|
|
/* If GDB attaches to a multi-threaded process, exiting
|
|
threads might be skipped during post_attach that
|
|
have not yet reported their PTRACE_LWP_EXIT event.
|
|
Ignore exited events for an unknown LWP. */
|
|
thread_info *thr = find_thread_ptid (this, wptid);
|
|
if (thr == nullptr)
|
|
ourstatus->set_spurious ();
|
|
else
|
|
{
|
|
/* NetBSD does not store an LWP exit status. */
|
|
ourstatus->set_thread_exited (0);
|
|
|
|
if (print_thread_events)
|
|
printf_unfiltered (_("[%s exited]\n"),
|
|
target_pid_to_str (wptid).c_str ());
|
|
delete_thread (thr);
|
|
}
|
|
|
|
/* The GDB core expects that the rest of the threads are running. */
|
|
if (ptrace (PT_CONTINUE, pid, (void *) 1, 0) == -1)
|
|
perror_with_name (("ptrace"));
|
|
|
|
return wptid;
|
|
}
|
|
|
|
if (in_thread_list (this, ptid_t (pid)))
|
|
thread_change_ptid (this, ptid_t (pid), wptid);
|
|
|
|
if (code == TRAP_LWP && pst.pe_report_event == PTRACE_LWP_CREATE)
|
|
{
|
|
/* If GDB attaches to a multi-threaded process, newborn
|
|
threads might be added by nbsd_add_threads that have
|
|
not yet reported their PTRACE_LWP_CREATE event. Ignore
|
|
born events for an already-known LWP. */
|
|
if (in_thread_list (this, wptid))
|
|
ourstatus->set_spurious ();
|
|
else
|
|
{
|
|
add_thread (this, wptid);
|
|
ourstatus->set_thread_created ();
|
|
}
|
|
return wptid;
|
|
}
|
|
|
|
if (code == TRAP_EXEC)
|
|
{
|
|
ourstatus->set_execd (make_unique_xstrdup (pid_to_exec_file (pid)));
|
|
return wptid;
|
|
}
|
|
|
|
if (code == TRAP_TRACE)
|
|
{
|
|
/* Unhandled at this level. */
|
|
return wptid;
|
|
}
|
|
|
|
if (code == TRAP_SCE || code == TRAP_SCX)
|
|
{
|
|
int sysnum = si->si_sysnum;
|
|
|
|
if (!catch_syscall_enabled () || !catching_syscall_number (sysnum))
|
|
{
|
|
/* If the core isn't interested in this event, ignore it. */
|
|
ourstatus->set_spurious ();
|
|
return wptid;
|
|
}
|
|
|
|
if (code == TRAP_SCE)
|
|
ourstatus->set_syscall_entry (sysnum);
|
|
else
|
|
ourstatus->set_syscall_return (sysnum);
|
|
return wptid;
|
|
}
|
|
|
|
if (code == TRAP_BRKPT)
|
|
{
|
|
/* Unhandled at this level. */
|
|
return wptid;
|
|
}
|
|
|
|
/* Unclassified SIGTRAP event. */
|
|
ourstatus->set_spurious ();
|
|
return wptid;
|
|
}
|
|
|
|
/* Implement the "insert_exec_catchpoint" target_ops method. */
|
|
|
|
int
|
|
nbsd_nat_target::insert_exec_catchpoint (int pid)
|
|
{
|
|
/* Nothing to do. */
|
|
return 0;
|
|
}
|
|
|
|
/* Implement the "remove_exec_catchpoint" target_ops method. */
|
|
|
|
int
|
|
nbsd_nat_target::remove_exec_catchpoint (int pid)
|
|
{
|
|
/* Nothing to do. */
|
|
return 0;
|
|
}
|
|
|
|
/* Implement the "set_syscall_catchpoint" target_ops method. */
|
|
|
|
int
|
|
nbsd_nat_target::set_syscall_catchpoint (int pid, bool needed,
|
|
int any_count,
|
|
gdb::array_view<const int> syscall_counts)
|
|
{
|
|
/* Ignore the arguments. inf-ptrace.c will use PT_SYSCALL which
|
|
will catch all system call entries and exits. The system calls
|
|
are filtered by GDB rather than the kernel. */
|
|
return 0;
|
|
}
|
|
|
|
/* Implement the "supports_multi_process" target_ops method. */
|
|
|
|
bool
|
|
nbsd_nat_target::supports_multi_process ()
|
|
{
|
|
return true;
|
|
}
|
|
|
|
/* Implement the "xfer_partial" target_ops method. */
|
|
|
|
enum target_xfer_status
|
|
nbsd_nat_target::xfer_partial (enum target_object object,
|
|
const char *annex, gdb_byte *readbuf,
|
|
const gdb_byte *writebuf,
|
|
ULONGEST offset, ULONGEST len,
|
|
ULONGEST *xfered_len)
|
|
{
|
|
pid_t pid = inferior_ptid.pid ();
|
|
|
|
switch (object)
|
|
{
|
|
case TARGET_OBJECT_SIGNAL_INFO:
|
|
{
|
|
len = netbsd_nat::qxfer_siginfo(pid, annex, readbuf, writebuf, offset,
|
|
len);
|
|
|
|
if (len == -1)
|
|
return TARGET_XFER_E_IO;
|
|
|
|
*xfered_len = len;
|
|
return TARGET_XFER_OK;
|
|
}
|
|
case TARGET_OBJECT_MEMORY:
|
|
{
|
|
size_t xfered;
|
|
int res;
|
|
if (writebuf != nullptr)
|
|
res = netbsd_nat::write_memory (pid, writebuf, offset, len, &xfered);
|
|
else
|
|
res = netbsd_nat::read_memory (pid, readbuf, offset, len, &xfered);
|
|
if (res != 0)
|
|
{
|
|
if (res == EACCES)
|
|
fprintf_unfiltered (gdb_stderr, "Cannot %s process at %s (%s). "
|
|
"Is PaX MPROTECT active? See security(7), "
|
|
"sysctl(7), paxctl(8)\n",
|
|
(writebuf ? "write to" : "read from"),
|
|
pulongest (offset), safe_strerror (errno));
|
|
return TARGET_XFER_E_IO;
|
|
}
|
|
if (xfered == 0)
|
|
return TARGET_XFER_EOF;
|
|
*xfered_len = (ULONGEST) xfered;
|
|
return TARGET_XFER_OK;
|
|
}
|
|
default:
|
|
return inf_ptrace_target::xfer_partial (object, annex,
|
|
readbuf, writebuf, offset,
|
|
len, xfered_len);
|
|
}
|
|
}
|
|
|
|
/* Implement the "supports_dumpcore" target_ops method. */
|
|
|
|
bool
|
|
nbsd_nat_target::supports_dumpcore ()
|
|
{
|
|
return true;
|
|
}
|
|
|
|
/* Implement the "dumpcore" target_ops method. */
|
|
|
|
void
|
|
nbsd_nat_target::dumpcore (const char *filename)
|
|
{
|
|
pid_t pid = inferior_ptid.pid ();
|
|
|
|
if (ptrace (PT_DUMPCORE, pid, const_cast<char *>(filename),
|
|
strlen (filename)) == -1)
|
|
perror_with_name (("ptrace"));
|
|
}
|