Automatic date update in version.in
[binutils-gdb.git] / gdb / fbsd-nat.c
blob8e5107c26f8ed8af5a839ae744a24192b5264033
1 /* Native-dependent code for FreeBSD.
3 Copyright (C) 2002-2022 Free Software Foundation, Inc.
5 This file is part of GDB.
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
20 #include "defs.h"
21 #include "gdbsupport/block-signals.h"
22 #include "gdbsupport/byte-vector.h"
23 #include "gdbsupport/event-loop.h"
24 #include "gdbcore.h"
25 #include "inferior.h"
26 #include "regcache.h"
27 #include "regset.h"
28 #include "gdbarch.h"
29 #include "gdbcmd.h"
30 #include "gdbthread.h"
31 #include "gdbsupport/buildargv.h"
32 #include "gdbsupport/gdb_wait.h"
33 #include "inf-loop.h"
34 #include "inf-ptrace.h"
35 #include <sys/types.h>
36 #ifdef HAVE_SYS_PROCCTL_H
37 #include <sys/procctl.h>
38 #endif
39 #include <sys/procfs.h>
40 #include <sys/ptrace.h>
41 #include <sys/signal.h>
42 #include <sys/sysctl.h>
43 #include <sys/user.h>
44 #include <libutil.h>
46 #include "elf-bfd.h"
47 #include "fbsd-nat.h"
48 #include "fbsd-tdep.h"
50 #include <list>
52 /* Return the name of a file that can be opened to get the symbols for
53 the child process identified by PID. */
55 char *
56 fbsd_nat_target::pid_to_exec_file (int pid)
58 static char buf[PATH_MAX];
59 size_t buflen;
60 int mib[4];
62 mib[0] = CTL_KERN;
63 mib[1] = KERN_PROC;
64 mib[2] = KERN_PROC_PATHNAME;
65 mib[3] = pid;
66 buflen = sizeof buf;
67 if (sysctl (mib, 4, buf, &buflen, NULL, 0) == 0)
68 /* The kern.proc.pathname.<pid> sysctl returns a length of zero
69 for processes without an associated executable such as kernel
70 processes. */
71 return buflen == 0 ? NULL : buf;
73 return NULL;
76 /* Iterate over all the memory regions in the current inferior,
77 calling FUNC for each memory region. DATA is passed as the last
78 argument to FUNC. */
80 int
81 fbsd_nat_target::find_memory_regions (find_memory_region_ftype func,
82 void *data)
84 pid_t pid = inferior_ptid.pid ();
85 struct kinfo_vmentry *kve;
86 uint64_t size;
87 int i, nitems;
89 gdb::unique_xmalloc_ptr<struct kinfo_vmentry>
90 vmentl (kinfo_getvmmap (pid, &nitems));
91 if (vmentl == NULL)
92 perror_with_name (_("Couldn't fetch VM map entries."));
94 for (i = 0, kve = vmentl.get (); i < nitems; i++, kve++)
96 /* Skip unreadable segments and those where MAP_NOCORE has been set. */
97 if (!(kve->kve_protection & KVME_PROT_READ)
98 || kve->kve_flags & KVME_FLAG_NOCOREDUMP)
99 continue;
101 /* Skip segments with an invalid type. */
102 if (kve->kve_type != KVME_TYPE_DEFAULT
103 && kve->kve_type != KVME_TYPE_VNODE
104 && kve->kve_type != KVME_TYPE_SWAP
105 && kve->kve_type != KVME_TYPE_PHYS)
106 continue;
108 size = kve->kve_end - kve->kve_start;
109 if (info_verbose)
111 gdb_printf ("Save segment, %ld bytes at %s (%c%c%c)\n",
112 (long) size,
113 paddress (target_gdbarch (), kve->kve_start),
114 kve->kve_protection & KVME_PROT_READ ? 'r' : '-',
115 kve->kve_protection & KVME_PROT_WRITE ? 'w' : '-',
116 kve->kve_protection & KVME_PROT_EXEC ? 'x' : '-');
119 /* Invoke the callback function to create the corefile segment.
120 Pass MODIFIED as true, we do not know the real modification state. */
121 func (kve->kve_start, size, kve->kve_protection & KVME_PROT_READ,
122 kve->kve_protection & KVME_PROT_WRITE,
123 kve->kve_protection & KVME_PROT_EXEC, 1, data);
125 return 0;
128 /* Fetch the command line for a running process. */
130 static gdb::unique_xmalloc_ptr<char>
131 fbsd_fetch_cmdline (pid_t pid)
133 size_t len;
134 int mib[4];
136 len = 0;
137 mib[0] = CTL_KERN;
138 mib[1] = KERN_PROC;
139 mib[2] = KERN_PROC_ARGS;
140 mib[3] = pid;
141 if (sysctl (mib, 4, NULL, &len, NULL, 0) == -1)
142 return nullptr;
144 if (len == 0)
145 return nullptr;
147 gdb::unique_xmalloc_ptr<char> cmdline ((char *) xmalloc (len));
148 if (sysctl (mib, 4, cmdline.get (), &len, NULL, 0) == -1)
149 return nullptr;
151 /* Join the arguments with spaces to form a single string. */
152 char *cp = cmdline.get ();
153 for (size_t i = 0; i < len - 1; i++)
154 if (cp[i] == '\0')
155 cp[i] = ' ';
156 cp[len - 1] = '\0';
158 return cmdline;
161 /* Fetch the external variant of the kernel's internal process
162 structure for the process PID into KP. */
164 static bool
165 fbsd_fetch_kinfo_proc (pid_t pid, struct kinfo_proc *kp)
167 size_t len;
168 int mib[4];
170 len = sizeof *kp;
171 mib[0] = CTL_KERN;
172 mib[1] = KERN_PROC;
173 mib[2] = KERN_PROC_PID;
174 mib[3] = pid;
175 return (sysctl (mib, 4, kp, &len, NULL, 0) == 0);
178 /* Implement the "info_proc" target_ops method. */
180 bool
181 fbsd_nat_target::info_proc (const char *args, enum info_proc_what what)
183 gdb::unique_xmalloc_ptr<struct kinfo_file> fdtbl;
184 int nfd = 0;
185 struct kinfo_proc kp;
186 pid_t pid;
187 bool do_cmdline = false;
188 bool do_cwd = false;
189 bool do_exe = false;
190 bool do_files = false;
191 bool do_mappings = false;
192 bool do_status = false;
194 switch (what)
196 case IP_MINIMAL:
197 do_cmdline = true;
198 do_cwd = true;
199 do_exe = true;
200 break;
201 case IP_MAPPINGS:
202 do_mappings = true;
203 break;
204 case IP_STATUS:
205 case IP_STAT:
206 do_status = true;
207 break;
208 case IP_CMDLINE:
209 do_cmdline = true;
210 break;
211 case IP_EXE:
212 do_exe = true;
213 break;
214 case IP_CWD:
215 do_cwd = true;
216 break;
217 case IP_FILES:
218 do_files = true;
219 break;
220 case IP_ALL:
221 do_cmdline = true;
222 do_cwd = true;
223 do_exe = true;
224 do_files = true;
225 do_mappings = true;
226 do_status = true;
227 break;
228 default:
229 error (_("Not supported on this target."));
232 gdb_argv built_argv (args);
233 if (built_argv.count () == 0)
235 pid = inferior_ptid.pid ();
236 if (pid == 0)
237 error (_("No current process: you must name one."));
239 else if (built_argv.count () == 1 && isdigit (built_argv[0][0]))
240 pid = strtol (built_argv[0], NULL, 10);
241 else
242 error (_("Invalid arguments."));
244 gdb_printf (_("process %d\n"), pid);
245 if (do_cwd || do_exe || do_files)
246 fdtbl.reset (kinfo_getfile (pid, &nfd));
248 if (do_cmdline)
250 gdb::unique_xmalloc_ptr<char> cmdline = fbsd_fetch_cmdline (pid);
251 if (cmdline != nullptr)
252 gdb_printf ("cmdline = '%s'\n", cmdline.get ());
253 else
254 warning (_("unable to fetch command line"));
256 if (do_cwd)
258 const char *cwd = NULL;
259 struct kinfo_file *kf = fdtbl.get ();
260 for (int i = 0; i < nfd; i++, kf++)
262 if (kf->kf_type == KF_TYPE_VNODE && kf->kf_fd == KF_FD_TYPE_CWD)
264 cwd = kf->kf_path;
265 break;
268 if (cwd != NULL)
269 gdb_printf ("cwd = '%s'\n", cwd);
270 else
271 warning (_("unable to fetch current working directory"));
273 if (do_exe)
275 const char *exe = NULL;
276 struct kinfo_file *kf = fdtbl.get ();
277 for (int i = 0; i < nfd; i++, kf++)
279 if (kf->kf_type == KF_TYPE_VNODE && kf->kf_fd == KF_FD_TYPE_TEXT)
281 exe = kf->kf_path;
282 break;
285 if (exe == NULL)
286 exe = pid_to_exec_file (pid);
287 if (exe != NULL)
288 gdb_printf ("exe = '%s'\n", exe);
289 else
290 warning (_("unable to fetch executable path name"));
292 if (do_files)
294 struct kinfo_file *kf = fdtbl.get ();
296 if (nfd > 0)
298 fbsd_info_proc_files_header ();
299 for (int i = 0; i < nfd; i++, kf++)
300 fbsd_info_proc_files_entry (kf->kf_type, kf->kf_fd, kf->kf_flags,
301 kf->kf_offset, kf->kf_vnode_type,
302 kf->kf_sock_domain, kf->kf_sock_type,
303 kf->kf_sock_protocol, &kf->kf_sa_local,
304 &kf->kf_sa_peer, kf->kf_path);
306 else
307 warning (_("unable to fetch list of open files"));
309 if (do_mappings)
311 int nvment;
312 gdb::unique_xmalloc_ptr<struct kinfo_vmentry>
313 vmentl (kinfo_getvmmap (pid, &nvment));
315 if (vmentl != nullptr)
317 int addr_bit = TARGET_CHAR_BIT * sizeof (void *);
318 fbsd_info_proc_mappings_header (addr_bit);
320 struct kinfo_vmentry *kve = vmentl.get ();
321 for (int i = 0; i < nvment; i++, kve++)
322 fbsd_info_proc_mappings_entry (addr_bit, kve->kve_start,
323 kve->kve_end, kve->kve_offset,
324 kve->kve_flags, kve->kve_protection,
325 kve->kve_path);
327 else
328 warning (_("unable to fetch virtual memory map"));
330 if (do_status)
332 if (!fbsd_fetch_kinfo_proc (pid, &kp))
333 warning (_("Failed to fetch process information"));
334 else
336 const char *state;
337 int pgtok;
339 gdb_printf ("Name: %s\n", kp.ki_comm);
340 switch (kp.ki_stat)
342 case SIDL:
343 state = "I (idle)";
344 break;
345 case SRUN:
346 state = "R (running)";
347 break;
348 case SSTOP:
349 state = "T (stopped)";
350 break;
351 case SZOMB:
352 state = "Z (zombie)";
353 break;
354 case SSLEEP:
355 state = "S (sleeping)";
356 break;
357 case SWAIT:
358 state = "W (interrupt wait)";
359 break;
360 case SLOCK:
361 state = "L (blocked on lock)";
362 break;
363 default:
364 state = "? (unknown)";
365 break;
367 gdb_printf ("State: %s\n", state);
368 gdb_printf ("Parent process: %d\n", kp.ki_ppid);
369 gdb_printf ("Process group: %d\n", kp.ki_pgid);
370 gdb_printf ("Session id: %d\n", kp.ki_sid);
371 gdb_printf ("TTY: %s\n", pulongest (kp.ki_tdev));
372 gdb_printf ("TTY owner process group: %d\n", kp.ki_tpgid);
373 gdb_printf ("User IDs (real, effective, saved): %d %d %d\n",
374 kp.ki_ruid, kp.ki_uid, kp.ki_svuid);
375 gdb_printf ("Group IDs (real, effective, saved): %d %d %d\n",
376 kp.ki_rgid, kp.ki_groups[0], kp.ki_svgid);
377 gdb_printf ("Groups: ");
378 for (int i = 0; i < kp.ki_ngroups; i++)
379 gdb_printf ("%d ", kp.ki_groups[i]);
380 gdb_printf ("\n");
381 gdb_printf ("Minor faults (no memory page): %ld\n",
382 kp.ki_rusage.ru_minflt);
383 gdb_printf ("Minor faults, children: %ld\n",
384 kp.ki_rusage_ch.ru_minflt);
385 gdb_printf ("Major faults (memory page faults): %ld\n",
386 kp.ki_rusage.ru_majflt);
387 gdb_printf ("Major faults, children: %ld\n",
388 kp.ki_rusage_ch.ru_majflt);
389 gdb_printf ("utime: %s.%06ld\n",
390 plongest (kp.ki_rusage.ru_utime.tv_sec),
391 kp.ki_rusage.ru_utime.tv_usec);
392 gdb_printf ("stime: %s.%06ld\n",
393 plongest (kp.ki_rusage.ru_stime.tv_sec),
394 kp.ki_rusage.ru_stime.tv_usec);
395 gdb_printf ("utime, children: %s.%06ld\n",
396 plongest (kp.ki_rusage_ch.ru_utime.tv_sec),
397 kp.ki_rusage_ch.ru_utime.tv_usec);
398 gdb_printf ("stime, children: %s.%06ld\n",
399 plongest (kp.ki_rusage_ch.ru_stime.tv_sec),
400 kp.ki_rusage_ch.ru_stime.tv_usec);
401 gdb_printf ("'nice' value: %d\n", kp.ki_nice);
402 gdb_printf ("Start time: %s.%06ld\n",
403 plongest (kp.ki_start.tv_sec),
404 kp.ki_start.tv_usec);
405 pgtok = getpagesize () / 1024;
406 gdb_printf ("Virtual memory size: %s kB\n",
407 pulongest (kp.ki_size / 1024));
408 gdb_printf ("Data size: %s kB\n",
409 pulongest (kp.ki_dsize * pgtok));
410 gdb_printf ("Stack size: %s kB\n",
411 pulongest (kp.ki_ssize * pgtok));
412 gdb_printf ("Text size: %s kB\n",
413 pulongest (kp.ki_tsize * pgtok));
414 gdb_printf ("Resident set size: %s kB\n",
415 pulongest (kp.ki_rssize * pgtok));
416 gdb_printf ("Maximum RSS: %s kB\n",
417 pulongest (kp.ki_rusage.ru_maxrss));
418 gdb_printf ("Pending Signals: ");
419 for (int i = 0; i < _SIG_WORDS; i++)
420 gdb_printf ("%08x ", kp.ki_siglist.__bits[i]);
421 gdb_printf ("\n");
422 gdb_printf ("Ignored Signals: ");
423 for (int i = 0; i < _SIG_WORDS; i++)
424 gdb_printf ("%08x ", kp.ki_sigignore.__bits[i]);
425 gdb_printf ("\n");
426 gdb_printf ("Caught Signals: ");
427 for (int i = 0; i < _SIG_WORDS; i++)
428 gdb_printf ("%08x ", kp.ki_sigcatch.__bits[i]);
429 gdb_printf ("\n");
433 return true;
436 /* Return the size of siginfo for the current inferior. */
438 #ifdef __LP64__
439 union sigval32 {
440 int sival_int;
441 uint32_t sival_ptr;
444 /* This structure matches the naming and layout of `siginfo_t' in
445 <sys/signal.h>. In particular, the `si_foo' macros defined in that
446 header can be used with both types to copy fields in the `_reason'
447 union. */
449 struct siginfo32
451 int si_signo;
452 int si_errno;
453 int si_code;
454 __pid_t si_pid;
455 __uid_t si_uid;
456 int si_status;
457 uint32_t si_addr;
458 union sigval32 si_value;
459 union
461 struct
463 int _trapno;
464 } _fault;
465 struct
467 int _timerid;
468 int _overrun;
469 } _timer;
470 struct
472 int _mqd;
473 } _mesgq;
474 struct
476 int32_t _band;
477 } _poll;
478 struct
480 int32_t __spare1__;
481 int __spare2__[7];
482 } __spare__;
483 } _reason;
485 #endif
487 static size_t
488 fbsd_siginfo_size ()
490 #ifdef __LP64__
491 struct gdbarch *gdbarch = get_frame_arch (get_current_frame ());
493 /* Is the inferior 32-bit? If so, use the 32-bit siginfo size. */
494 if (gdbarch_long_bit (gdbarch) == 32)
495 return sizeof (struct siginfo32);
496 #endif
497 return sizeof (siginfo_t);
500 /* Convert a native 64-bit siginfo object to a 32-bit object. Note
501 that FreeBSD doesn't support writing to $_siginfo, so this only
502 needs to convert one way. */
504 static void
505 fbsd_convert_siginfo (siginfo_t *si)
507 #ifdef __LP64__
508 struct gdbarch *gdbarch = get_frame_arch (get_current_frame ());
510 /* Is the inferior 32-bit? If not, nothing to do. */
511 if (gdbarch_long_bit (gdbarch) != 32)
512 return;
514 struct siginfo32 si32;
516 si32.si_signo = si->si_signo;
517 si32.si_errno = si->si_errno;
518 si32.si_code = si->si_code;
519 si32.si_pid = si->si_pid;
520 si32.si_uid = si->si_uid;
521 si32.si_status = si->si_status;
522 si32.si_addr = (uintptr_t) si->si_addr;
524 /* If sival_ptr is being used instead of sival_int on a big-endian
525 platform, then sival_int will be zero since it holds the upper
526 32-bits of the pointer value. */
527 #if _BYTE_ORDER == _BIG_ENDIAN
528 if (si->si_value.sival_int == 0)
529 si32.si_value.sival_ptr = (uintptr_t) si->si_value.sival_ptr;
530 else
531 si32.si_value.sival_int = si->si_value.sival_int;
532 #else
533 si32.si_value.sival_int = si->si_value.sival_int;
534 #endif
536 /* Always copy the spare fields and then possibly overwrite them for
537 signal-specific or code-specific fields. */
538 si32._reason.__spare__.__spare1__ = si->_reason.__spare__.__spare1__;
539 for (int i = 0; i < 7; i++)
540 si32._reason.__spare__.__spare2__[i] = si->_reason.__spare__.__spare2__[i];
541 switch (si->si_signo) {
542 case SIGILL:
543 case SIGFPE:
544 case SIGSEGV:
545 case SIGBUS:
546 si32.si_trapno = si->si_trapno;
547 break;
549 switch (si->si_code) {
550 case SI_TIMER:
551 si32.si_timerid = si->si_timerid;
552 si32.si_overrun = si->si_overrun;
553 break;
554 case SI_MESGQ:
555 si32.si_mqd = si->si_mqd;
556 break;
559 memcpy(si, &si32, sizeof (si32));
560 #endif
563 /* Implement the "xfer_partial" target_ops method. */
565 enum target_xfer_status
566 fbsd_nat_target::xfer_partial (enum target_object object,
567 const char *annex, gdb_byte *readbuf,
568 const gdb_byte *writebuf,
569 ULONGEST offset, ULONGEST len,
570 ULONGEST *xfered_len)
572 pid_t pid = inferior_ptid.pid ();
574 switch (object)
576 case TARGET_OBJECT_SIGNAL_INFO:
578 struct ptrace_lwpinfo pl;
579 size_t siginfo_size;
581 /* FreeBSD doesn't support writing to $_siginfo. */
582 if (writebuf != NULL)
583 return TARGET_XFER_E_IO;
585 if (inferior_ptid.lwp_p ())
586 pid = inferior_ptid.lwp ();
588 siginfo_size = fbsd_siginfo_size ();
589 if (offset > siginfo_size)
590 return TARGET_XFER_E_IO;
592 if (ptrace (PT_LWPINFO, pid, (PTRACE_TYPE_ARG3) &pl, sizeof (pl)) == -1)
593 return TARGET_XFER_E_IO;
595 if (!(pl.pl_flags & PL_FLAG_SI))
596 return TARGET_XFER_E_IO;
598 fbsd_convert_siginfo (&pl.pl_siginfo);
599 if (offset + len > siginfo_size)
600 len = siginfo_size - offset;
602 memcpy (readbuf, ((gdb_byte *) &pl.pl_siginfo) + offset, len);
603 *xfered_len = len;
604 return TARGET_XFER_OK;
606 #ifdef KERN_PROC_AUXV
607 case TARGET_OBJECT_AUXV:
609 gdb::byte_vector buf_storage;
610 gdb_byte *buf;
611 size_t buflen;
612 int mib[4];
614 if (writebuf != NULL)
615 return TARGET_XFER_E_IO;
616 mib[0] = CTL_KERN;
617 mib[1] = KERN_PROC;
618 mib[2] = KERN_PROC_AUXV;
619 mib[3] = pid;
620 if (offset == 0)
622 buf = readbuf;
623 buflen = len;
625 else
627 buflen = offset + len;
628 buf_storage.resize (buflen);
629 buf = buf_storage.data ();
631 if (sysctl (mib, 4, buf, &buflen, NULL, 0) == 0)
633 if (offset != 0)
635 if (buflen > offset)
637 buflen -= offset;
638 memcpy (readbuf, buf + offset, buflen);
640 else
641 buflen = 0;
643 *xfered_len = buflen;
644 return (buflen == 0) ? TARGET_XFER_EOF : TARGET_XFER_OK;
646 return TARGET_XFER_E_IO;
648 #endif
649 #if defined(KERN_PROC_VMMAP) && defined(KERN_PROC_PS_STRINGS)
650 case TARGET_OBJECT_FREEBSD_VMMAP:
651 case TARGET_OBJECT_FREEBSD_PS_STRINGS:
653 gdb::byte_vector buf_storage;
654 gdb_byte *buf;
655 size_t buflen;
656 int mib[4];
658 int proc_target;
659 uint32_t struct_size;
660 switch (object)
662 case TARGET_OBJECT_FREEBSD_VMMAP:
663 proc_target = KERN_PROC_VMMAP;
664 struct_size = sizeof (struct kinfo_vmentry);
665 break;
666 case TARGET_OBJECT_FREEBSD_PS_STRINGS:
667 proc_target = KERN_PROC_PS_STRINGS;
668 struct_size = sizeof (void *);
669 break;
672 if (writebuf != NULL)
673 return TARGET_XFER_E_IO;
675 mib[0] = CTL_KERN;
676 mib[1] = KERN_PROC;
677 mib[2] = proc_target;
678 mib[3] = pid;
680 if (sysctl (mib, 4, NULL, &buflen, NULL, 0) != 0)
681 return TARGET_XFER_E_IO;
682 buflen += sizeof (struct_size);
684 if (offset >= buflen)
686 *xfered_len = 0;
687 return TARGET_XFER_EOF;
690 buf_storage.resize (buflen);
691 buf = buf_storage.data ();
693 memcpy (buf, &struct_size, sizeof (struct_size));
694 buflen -= sizeof (struct_size);
695 if (sysctl (mib, 4, buf + sizeof (struct_size), &buflen, NULL, 0) != 0)
696 return TARGET_XFER_E_IO;
697 buflen += sizeof (struct_size);
699 if (buflen - offset < len)
700 len = buflen - offset;
701 memcpy (readbuf, buf + offset, len);
702 *xfered_len = len;
703 return TARGET_XFER_OK;
705 #endif
706 default:
707 return inf_ptrace_target::xfer_partial (object, annex,
708 readbuf, writebuf, offset,
709 len, xfered_len);
713 static bool debug_fbsd_lwp;
714 static bool debug_fbsd_nat;
716 static void
717 show_fbsd_lwp_debug (struct ui_file *file, int from_tty,
718 struct cmd_list_element *c, const char *value)
720 gdb_printf (file, _("Debugging of FreeBSD lwp module is %s.\n"), value);
723 static void
724 show_fbsd_nat_debug (struct ui_file *file, int from_tty,
725 struct cmd_list_element *c, const char *value)
727 gdb_printf (file, _("Debugging of FreeBSD native target is %s.\n"),
728 value);
731 #define fbsd_lwp_debug_printf(fmt, ...) \
732 debug_prefixed_printf_cond (debug_fbsd_lwp, "fbsd-lwp", fmt, ##__VA_ARGS__)
734 #define fbsd_nat_debug_printf(fmt, ...) \
735 debug_prefixed_printf_cond (debug_fbsd_nat, "fbsd-nat", fmt, ##__VA_ARGS__)
739 FreeBSD's first thread support was via a "reentrant" version of libc
740 (libc_r) that first shipped in 2.2.7. This library multiplexed all
741 of the threads in a process onto a single kernel thread. This
742 library was supported via the bsd-uthread target.
744 FreeBSD 5.1 introduced two new threading libraries that made use of
745 multiple kernel threads. The first (libkse) scheduled M user
746 threads onto N (<= M) kernel threads (LWPs). The second (libthr)
747 bound each user thread to a dedicated kernel thread. libkse shipped
748 as the default threading library (libpthread).
750 FreeBSD 5.3 added a libthread_db to abstract the interface across
751 the various thread libraries (libc_r, libkse, and libthr).
753 FreeBSD 7.0 switched the default threading library from from libkse
754 to libpthread and removed libc_r.
756 FreeBSD 8.0 removed libkse and the in-kernel support for it. The
757 only threading library supported by 8.0 and later is libthr which
758 ties each user thread directly to an LWP. To simplify the
759 implementation, this target only supports LWP-backed threads using
760 ptrace directly rather than libthread_db.
762 FreeBSD 11.0 introduced LWP event reporting via PT_LWP_EVENTS.
765 /* Return true if PTID is still active in the inferior. */
767 bool
768 fbsd_nat_target::thread_alive (ptid_t ptid)
770 if (ptid.lwp_p ())
772 struct ptrace_lwpinfo pl;
774 if (ptrace (PT_LWPINFO, ptid.lwp (), (caddr_t) &pl, sizeof pl)
775 == -1)
776 return false;
777 #ifdef PL_FLAG_EXITED
778 if (pl.pl_flags & PL_FLAG_EXITED)
779 return false;
780 #endif
783 return true;
786 /* Convert PTID to a string. */
788 std::string
789 fbsd_nat_target::pid_to_str (ptid_t ptid)
791 lwpid_t lwp;
793 lwp = ptid.lwp ();
794 if (lwp != 0)
796 int pid = ptid.pid ();
798 return string_printf ("LWP %d of process %d", lwp, pid);
801 return normal_pid_to_str (ptid);
804 #ifdef HAVE_STRUCT_PTRACE_LWPINFO_PL_TDNAME
805 /* Return the name assigned to a thread by an application. Returns
806 the string in a static buffer. */
808 const char *
809 fbsd_nat_target::thread_name (struct thread_info *thr)
811 struct ptrace_lwpinfo pl;
812 struct kinfo_proc kp;
813 int pid = thr->ptid.pid ();
814 long lwp = thr->ptid.lwp ();
815 static char buf[sizeof pl.pl_tdname + 1];
817 /* Note that ptrace_lwpinfo returns the process command in pl_tdname
818 if a name has not been set explicitly. Return a NULL name in
819 that case. */
820 if (!fbsd_fetch_kinfo_proc (pid, &kp))
821 return nullptr;
822 if (ptrace (PT_LWPINFO, lwp, (caddr_t) &pl, sizeof pl) == -1)
823 return nullptr;
824 if (strcmp (kp.ki_comm, pl.pl_tdname) == 0)
825 return NULL;
826 xsnprintf (buf, sizeof buf, "%s", pl.pl_tdname);
827 return buf;
829 #endif
831 /* Enable additional event reporting on new processes.
833 To catch fork events, PTRACE_FORK is set on every traced process
834 to enable stops on returns from fork or vfork. Note that both the
835 parent and child will always stop, even if system call stops are
836 not enabled.
838 To catch LWP events, PTRACE_EVENTS is set on every traced process.
839 This enables stops on the birth for new LWPs (excluding the "main" LWP)
840 and the death of LWPs (excluding the last LWP in a process). Note
841 that unlike fork events, the LWP that creates a new LWP does not
842 report an event. */
844 static void
845 fbsd_enable_proc_events (pid_t pid)
847 #ifdef PT_GET_EVENT_MASK
848 int events;
850 if (ptrace (PT_GET_EVENT_MASK, pid, (PTRACE_TYPE_ARG3)&events,
851 sizeof (events)) == -1)
852 perror_with_name (("ptrace (PT_GET_EVENT_MASK)"));
853 events |= PTRACE_FORK | PTRACE_LWP;
854 #ifdef PTRACE_VFORK
855 events |= PTRACE_VFORK;
856 #endif
857 if (ptrace (PT_SET_EVENT_MASK, pid, (PTRACE_TYPE_ARG3)&events,
858 sizeof (events)) == -1)
859 perror_with_name (("ptrace (PT_SET_EVENT_MASK)"));
860 #else
861 #ifdef TDP_RFPPWAIT
862 if (ptrace (PT_FOLLOW_FORK, pid, (PTRACE_TYPE_ARG3)0, 1) == -1)
863 perror_with_name (("ptrace (PT_FOLLOW_FORK)"));
864 #endif
865 #ifdef PT_LWP_EVENTS
866 if (ptrace (PT_LWP_EVENTS, pid, (PTRACE_TYPE_ARG3)0, 1) == -1)
867 perror_with_name (("ptrace (PT_LWP_EVENTS)"));
868 #endif
869 #endif
872 /* Add threads for any new LWPs in a process.
874 When LWP events are used, this function is only used to detect existing
875 threads when attaching to a process. On older systems, this function is
876 called to discover new threads each time the thread list is updated. */
878 static void
879 fbsd_add_threads (fbsd_nat_target *target, pid_t pid)
881 int i, nlwps;
883 gdb_assert (!in_thread_list (target, ptid_t (pid)));
884 nlwps = ptrace (PT_GETNUMLWPS, pid, NULL, 0);
885 if (nlwps == -1)
886 perror_with_name (("ptrace (PT_GETNUMLWPS)"));
888 gdb::unique_xmalloc_ptr<lwpid_t[]> lwps (XCNEWVEC (lwpid_t, nlwps));
890 nlwps = ptrace (PT_GETLWPLIST, pid, (caddr_t) lwps.get (), nlwps);
891 if (nlwps == -1)
892 perror_with_name (("ptrace (PT_GETLWPLIST)"));
894 for (i = 0; i < nlwps; i++)
896 ptid_t ptid = ptid_t (pid, lwps[i]);
898 if (!in_thread_list (target, ptid))
900 #ifdef PT_LWP_EVENTS
901 struct ptrace_lwpinfo pl;
903 /* Don't add exited threads. Note that this is only called
904 when attaching to a multi-threaded process. */
905 if (ptrace (PT_LWPINFO, lwps[i], (caddr_t) &pl, sizeof pl) == -1)
906 perror_with_name (("ptrace (PT_LWPINFO)"));
907 if (pl.pl_flags & PL_FLAG_EXITED)
908 continue;
909 #endif
910 fbsd_lwp_debug_printf ("adding thread for LWP %u", lwps[i]);
911 add_thread (target, ptid);
916 /* Implement the "update_thread_list" target_ops method. */
918 void
919 fbsd_nat_target::update_thread_list ()
921 #ifdef PT_LWP_EVENTS
922 /* With support for thread events, threads are added/deleted from the
923 list as events are reported, so just try deleting exited threads. */
924 delete_exited_threads ();
925 #else
926 prune_threads ();
928 fbsd_add_threads (this, inferior_ptid.pid ());
929 #endif
932 /* Async mode support. */
934 /* Implement the "can_async_p" target method. */
936 bool
937 fbsd_nat_target::can_async_p ()
939 /* This flag should be checked in the common target.c code. */
940 gdb_assert (target_async_permitted);
942 /* Otherwise, this targets is always able to support async mode. */
943 return true;
946 /* SIGCHLD handler notifies the event-loop in async mode. */
948 static void
949 sigchld_handler (int signo)
951 int old_errno = errno;
953 fbsd_nat_target::async_file_mark_if_open ();
955 errno = old_errno;
958 /* Callback registered with the target events file descriptor. */
960 static void
961 handle_target_event (int error, gdb_client_data client_data)
963 inferior_event_handler (INF_REG_EVENT);
966 /* Implement the "async" target method. */
968 void
969 fbsd_nat_target::async (int enable)
971 if ((enable != 0) == is_async_p ())
972 return;
974 /* Block SIGCHILD while we create/destroy the pipe, as the handler
975 writes to it. */
976 gdb::block_signals blocker;
978 if (enable)
980 if (!async_file_open ())
981 internal_error (__FILE__, __LINE__, "failed to create event pipe.");
983 add_file_handler (async_wait_fd (), handle_target_event, NULL, "fbsd-nat");
985 /* Trigger a poll in case there are pending events to
986 handle. */
987 async_file_mark ();
989 else
991 delete_file_handler (async_wait_fd ());
992 async_file_close ();
996 #ifdef TDP_RFPPWAIT
998 To catch fork events, PT_FOLLOW_FORK is set on every traced process
999 to enable stops on returns from fork or vfork. Note that both the
1000 parent and child will always stop, even if system call stops are not
1001 enabled.
1003 After a fork, both the child and parent process will stop and report
1004 an event. However, there is no guarantee of order. If the parent
1005 reports its stop first, then fbsd_wait explicitly waits for the new
1006 child before returning. If the child reports its stop first, then
1007 the event is saved on a list and ignored until the parent's stop is
1008 reported. fbsd_wait could have been changed to fetch the parent PID
1009 of the new child and used that to wait for the parent explicitly.
1010 However, if two threads in the parent fork at the same time, then
1011 the wait on the parent might return the "wrong" fork event.
1013 The initial version of PT_FOLLOW_FORK did not set PL_FLAG_CHILD for
1014 the new child process. This flag could be inferred by treating any
1015 events for an unknown pid as a new child.
1017 In addition, the initial version of PT_FOLLOW_FORK did not report a
1018 stop event for the parent process of a vfork until after the child
1019 process executed a new program or exited. The kernel was changed to
1020 defer the wait for exit or exec of the child until after posting the
1021 stop event shortly after the change to introduce PL_FLAG_CHILD.
1022 This could be worked around by reporting a vfork event when the
1023 child event posted and ignoring the subsequent event from the
1024 parent.
1026 This implementation requires both of these fixes for simplicity's
1027 sake. FreeBSD versions newer than 9.1 contain both fixes.
1030 static std::list<ptid_t> fbsd_pending_children;
1032 /* Record a new child process event that is reported before the
1033 corresponding fork event in the parent. */
1035 static void
1036 fbsd_remember_child (ptid_t pid)
1038 fbsd_pending_children.push_front (pid);
1041 /* Check for a previously-recorded new child process event for PID.
1042 If one is found, remove it from the list and return the PTID. */
1044 static ptid_t
1045 fbsd_is_child_pending (pid_t pid)
1047 for (auto it = fbsd_pending_children.begin ();
1048 it != fbsd_pending_children.end (); it++)
1049 if (it->pid () == pid)
1051 ptid_t ptid = *it;
1052 fbsd_pending_children.erase (it);
1053 return ptid;
1055 return null_ptid;
1058 #ifndef PTRACE_VFORK
1059 static std::forward_list<ptid_t> fbsd_pending_vfork_done;
1061 /* Record a pending vfork done event. */
1063 static void
1064 fbsd_add_vfork_done (ptid_t pid)
1066 fbsd_pending_vfork_done.push_front (pid);
1068 /* If we're in async mode, need to tell the event loop there's
1069 something here to process. */
1070 if (target_is_async_p ())
1071 async_file_mark ();
1074 /* Check for a pending vfork done event for a specific PID. */
1076 static int
1077 fbsd_is_vfork_done_pending (pid_t pid)
1079 for (auto it = fbsd_pending_vfork_done.begin ();
1080 it != fbsd_pending_vfork_done.end (); it++)
1081 if (it->pid () == pid)
1082 return 1;
1083 return 0;
1086 /* Check for a pending vfork done event. If one is found, remove it
1087 from the list and return the PTID. */
1089 static ptid_t
1090 fbsd_next_vfork_done (void)
1092 if (!fbsd_pending_vfork_done.empty ())
1094 ptid_t ptid = fbsd_pending_vfork_done.front ();
1095 fbsd_pending_vfork_done.pop_front ();
1096 return ptid;
1098 return null_ptid;
1100 #endif
1101 #endif
1103 /* Implement the "resume" target_ops method. */
1105 void
1106 fbsd_nat_target::resume (ptid_t ptid, int step, enum gdb_signal signo)
1108 #if defined(TDP_RFPPWAIT) && !defined(PTRACE_VFORK)
1109 pid_t pid;
1111 /* Don't PT_CONTINUE a process which has a pending vfork done event. */
1112 if (minus_one_ptid == ptid)
1113 pid = inferior_ptid.pid ();
1114 else
1115 pid = ptid.pid ();
1116 if (fbsd_is_vfork_done_pending (pid))
1117 return;
1118 #endif
1120 fbsd_nat_debug_printf ("[%s], step %d, signo %d (%s)",
1121 target_pid_to_str (ptid).c_str (), step, signo,
1122 gdb_signal_to_name (signo));
1123 if (ptid.lwp_p ())
1125 /* If ptid is a specific LWP, suspend all other LWPs in the process. */
1126 inferior *inf = find_inferior_ptid (this, ptid);
1128 for (thread_info *tp : inf->non_exited_threads ())
1130 int request;
1132 if (tp->ptid.lwp () == ptid.lwp ())
1133 request = PT_RESUME;
1134 else
1135 request = PT_SUSPEND;
1137 if (ptrace (request, tp->ptid.lwp (), NULL, 0) == -1)
1138 perror_with_name (request == PT_RESUME ?
1139 ("ptrace (PT_RESUME)") :
1140 ("ptrace (PT_SUSPEND)"));
1141 if (request == PT_RESUME)
1142 low_prepare_to_resume (tp);
1145 else
1147 /* If ptid is a wildcard, resume all matching threads (they won't run
1148 until the process is continued however). */
1149 for (thread_info *tp : all_non_exited_threads (this, ptid))
1151 if (ptrace (PT_RESUME, tp->ptid.lwp (), NULL, 0) == -1)
1152 perror_with_name (("ptrace (PT_RESUME)"));
1153 low_prepare_to_resume (tp);
1155 ptid = inferior_ptid;
1158 #if __FreeBSD_version < 1200052
1159 /* When multiple threads within a process wish to report STOPPED
1160 events from wait(), the kernel picks one thread event as the
1161 thread event to report. The chosen thread event is retrieved via
1162 PT_LWPINFO by passing the process ID as the request pid. If
1163 multiple events are pending, then the subsequent wait() after
1164 resuming a process will report another STOPPED event after
1165 resuming the process to handle the next thread event and so on.
1167 A single thread event is cleared as a side effect of resuming the
1168 process with PT_CONTINUE, PT_STEP, etc. In older kernels,
1169 however, the request pid was used to select which thread's event
1170 was cleared rather than always clearing the event that was just
1171 reported. To avoid clearing the event of the wrong LWP, always
1172 pass the process ID instead of an LWP ID to PT_CONTINUE or
1173 PT_SYSCALL.
1175 In the case of stepping, the process ID cannot be used with
1176 PT_STEP since it would step the thread that reported an event
1177 which may not be the thread indicated by PTID. For stepping, use
1178 PT_SETSTEP to enable stepping on the desired thread before
1179 resuming the process via PT_CONTINUE instead of using
1180 PT_STEP. */
1181 if (step)
1183 if (ptrace (PT_SETSTEP, get_ptrace_pid (ptid), NULL, 0) == -1)
1184 perror_with_name (("ptrace (PT_SETSTEP)"));
1185 step = 0;
1187 ptid = ptid_t (ptid.pid ());
1188 #endif
1189 inf_ptrace_target::resume (ptid, step, signo);
1192 #ifdef USE_SIGTRAP_SIGINFO
1193 /* Handle breakpoint and trace traps reported via SIGTRAP. If the
1194 trap was a breakpoint or trace trap that should be reported to the
1195 core, return true. */
1197 static bool
1198 fbsd_handle_debug_trap (fbsd_nat_target *target, ptid_t ptid,
1199 const struct ptrace_lwpinfo &pl)
1202 /* Ignore traps without valid siginfo or for signals other than
1203 SIGTRAP.
1205 FreeBSD kernels prior to r341800 can return stale siginfo for at
1206 least some events, but those events can be identified by
1207 additional flags set in pl_flags. True breakpoint and
1208 single-step traps should not have other flags set in
1209 pl_flags. */
1210 if (pl.pl_flags != PL_FLAG_SI || pl.pl_siginfo.si_signo != SIGTRAP)
1211 return false;
1213 /* Trace traps are either a single step or a hardware watchpoint or
1214 breakpoint. */
1215 if (pl.pl_siginfo.si_code == TRAP_TRACE)
1217 fbsd_nat_debug_printf ("trace trap for LWP %ld", ptid.lwp ());
1218 return true;
1221 if (pl.pl_siginfo.si_code == TRAP_BRKPT)
1223 /* Fixup PC for the software breakpoint. */
1224 struct regcache *regcache = get_thread_regcache (target, ptid);
1225 struct gdbarch *gdbarch = regcache->arch ();
1226 int decr_pc = gdbarch_decr_pc_after_break (gdbarch);
1228 fbsd_nat_debug_printf ("sw breakpoint trap for LWP %ld", ptid.lwp ());
1229 if (decr_pc != 0)
1231 CORE_ADDR pc;
1233 pc = regcache_read_pc (regcache);
1234 regcache_write_pc (regcache, pc - decr_pc);
1236 return true;
1239 return false;
1241 #endif
1243 /* Wait for the child specified by PTID to do something. Return the
1244 process ID of the child, or MINUS_ONE_PTID in case of error; store
1245 the status in *OURSTATUS. */
1247 ptid_t
1248 fbsd_nat_target::wait_1 (ptid_t ptid, struct target_waitstatus *ourstatus,
1249 target_wait_flags target_options)
1251 ptid_t wptid;
1253 while (1)
1255 #ifndef PTRACE_VFORK
1256 wptid = fbsd_next_vfork_done ();
1257 if (wptid != null_ptid)
1259 ourstatus->kind = TARGET_WAITKIND_VFORK_DONE;
1260 return wptid;
1262 #endif
1263 wptid = inf_ptrace_target::wait (ptid, ourstatus, target_options);
1264 if (ourstatus->kind () == TARGET_WAITKIND_STOPPED)
1266 struct ptrace_lwpinfo pl;
1267 pid_t pid;
1268 int status;
1270 pid = wptid.pid ();
1271 if (ptrace (PT_LWPINFO, pid, (caddr_t) &pl, sizeof pl) == -1)
1272 perror_with_name (("ptrace (PT_LWPINFO)"));
1274 wptid = ptid_t (pid, pl.pl_lwpid);
1276 if (debug_fbsd_nat)
1278 fbsd_nat_debug_printf ("stop for LWP %u event %d flags %#x",
1279 pl.pl_lwpid, pl.pl_event, pl.pl_flags);
1280 if (pl.pl_flags & PL_FLAG_SI)
1281 fbsd_nat_debug_printf ("si_signo %u si_code %u",
1282 pl.pl_siginfo.si_signo,
1283 pl.pl_siginfo.si_code);
1286 #ifdef PT_LWP_EVENTS
1287 if (pl.pl_flags & PL_FLAG_EXITED)
1289 /* If GDB attaches to a multi-threaded process, exiting
1290 threads might be skipped during post_attach that
1291 have not yet reported their PL_FLAG_EXITED event.
1292 Ignore EXITED events for an unknown LWP. */
1293 thread_info *thr = find_thread_ptid (this, wptid);
1294 if (thr != nullptr)
1296 fbsd_lwp_debug_printf ("deleting thread for LWP %u",
1297 pl.pl_lwpid);
1298 if (print_thread_events)
1299 gdb_printf (_("[%s exited]\n"),
1300 target_pid_to_str (wptid).c_str ());
1301 low_delete_thread (thr);
1302 delete_thread (thr);
1304 if (ptrace (PT_CONTINUE, pid, (caddr_t) 1, 0) == -1)
1305 perror_with_name (("ptrace (PT_CONTINUE)"));
1306 continue;
1308 #endif
1310 /* Switch to an LWP PTID on the first stop in a new process.
1311 This is done after handling PL_FLAG_EXITED to avoid
1312 switching to an exited LWP. It is done before checking
1313 PL_FLAG_BORN in case the first stop reported after
1314 attaching to an existing process is a PL_FLAG_BORN
1315 event. */
1316 if (in_thread_list (this, ptid_t (pid)))
1318 fbsd_lwp_debug_printf ("using LWP %u for first thread",
1319 pl.pl_lwpid);
1320 thread_change_ptid (this, ptid_t (pid), wptid);
1323 #ifdef PT_LWP_EVENTS
1324 if (pl.pl_flags & PL_FLAG_BORN)
1326 /* If GDB attaches to a multi-threaded process, newborn
1327 threads might be added by fbsd_add_threads that have
1328 not yet reported their PL_FLAG_BORN event. Ignore
1329 BORN events for an already-known LWP. */
1330 if (!in_thread_list (this, wptid))
1332 fbsd_lwp_debug_printf ("adding thread for LWP %u",
1333 pl.pl_lwpid);
1334 add_thread (this, wptid);
1336 ourstatus->set_spurious ();
1337 return wptid;
1339 #endif
1341 #ifdef TDP_RFPPWAIT
1342 if (pl.pl_flags & PL_FLAG_FORKED)
1344 #ifndef PTRACE_VFORK
1345 struct kinfo_proc kp;
1346 #endif
1347 bool is_vfork = false;
1348 ptid_t child_ptid;
1349 pid_t child;
1351 child = pl.pl_child_pid;
1352 #ifdef PTRACE_VFORK
1353 if (pl.pl_flags & PL_FLAG_VFORKED)
1354 is_vfork = true;
1355 #endif
1357 /* Make sure the other end of the fork is stopped too. */
1358 child_ptid = fbsd_is_child_pending (child);
1359 if (child_ptid == null_ptid)
1361 pid = waitpid (child, &status, 0);
1362 if (pid == -1)
1363 perror_with_name (("waitpid"));
1365 gdb_assert (pid == child);
1367 if (ptrace (PT_LWPINFO, child, (caddr_t)&pl, sizeof pl) == -1)
1368 perror_with_name (("ptrace (PT_LWPINFO)"));
1370 gdb_assert (pl.pl_flags & PL_FLAG_CHILD);
1371 child_ptid = ptid_t (child, pl.pl_lwpid);
1374 /* Enable additional events on the child process. */
1375 fbsd_enable_proc_events (child_ptid.pid ());
1377 #ifndef PTRACE_VFORK
1378 /* For vfork, the child process will have the P_PPWAIT
1379 flag set. */
1380 if (fbsd_fetch_kinfo_proc (child, &kp))
1382 if (kp.ki_flag & P_PPWAIT)
1383 is_vfork = true;
1385 else
1386 warning (_("Failed to fetch process information"));
1387 #endif
1389 low_new_fork (wptid, child);
1391 if (is_vfork)
1392 ourstatus->set_vforked (child_ptid);
1393 else
1394 ourstatus->set_forked (child_ptid);
1396 return wptid;
1399 if (pl.pl_flags & PL_FLAG_CHILD)
1401 /* Remember that this child forked, but do not report it
1402 until the parent reports its corresponding fork
1403 event. */
1404 fbsd_remember_child (wptid);
1405 continue;
1408 #ifdef PTRACE_VFORK
1409 if (pl.pl_flags & PL_FLAG_VFORK_DONE)
1411 ourstatus->set_vfork_done ();
1412 return wptid;
1414 #endif
1415 #endif
1417 if (pl.pl_flags & PL_FLAG_EXEC)
1419 ourstatus->set_execd
1420 (make_unique_xstrdup (pid_to_exec_file (pid)));
1421 return wptid;
1424 #ifdef USE_SIGTRAP_SIGINFO
1425 if (fbsd_handle_debug_trap (this, wptid, pl))
1426 return wptid;
1427 #endif
1429 /* Note that PL_FLAG_SCE is set for any event reported while
1430 a thread is executing a system call in the kernel. In
1431 particular, signals that interrupt a sleep in a system
1432 call will report this flag as part of their event. Stops
1433 explicitly for system call entry and exit always use
1434 SIGTRAP, so only treat SIGTRAP events as system call
1435 entry/exit events. */
1436 if (pl.pl_flags & (PL_FLAG_SCE | PL_FLAG_SCX)
1437 && ourstatus->sig () == SIGTRAP)
1439 #ifdef HAVE_STRUCT_PTRACE_LWPINFO_PL_SYSCALL_CODE
1440 if (catch_syscall_enabled ())
1442 if (catching_syscall_number (pl.pl_syscall_code))
1444 if (pl.pl_flags & PL_FLAG_SCE)
1445 ourstatus->set_syscall_entry (pl.pl_syscall_code);
1446 else
1447 ourstatus->set_syscall_return (pl.pl_syscall_code);
1449 return wptid;
1452 #endif
1453 /* If the core isn't interested in this event, just
1454 continue the process explicitly and wait for another
1455 event. Note that PT_SYSCALL is "sticky" on FreeBSD
1456 and once system call stops are enabled on a process
1457 it stops for all system call entries and exits. */
1458 if (ptrace (PT_CONTINUE, pid, (caddr_t) 1, 0) == -1)
1459 perror_with_name (("ptrace (PT_CONTINUE)"));
1460 continue;
1463 return wptid;
1467 ptid_t
1468 fbsd_nat_target::wait (ptid_t ptid, struct target_waitstatus *ourstatus,
1469 target_wait_flags target_options)
1471 ptid_t wptid;
1473 fbsd_nat_debug_printf ("[%s], [%s]", target_pid_to_str (ptid).c_str (),
1474 target_options_to_string (target_options).c_str ());
1476 /* Ensure any subsequent events trigger a new event in the loop. */
1477 if (is_async_p ())
1478 async_file_flush ();
1480 wptid = wait_1 (ptid, ourstatus, target_options);
1482 /* If we are in async mode and found an event, there may still be
1483 another event pending. Trigger the event pipe so that that the
1484 event loop keeps polling until no event is returned. */
1485 if (is_async_p ()
1486 && ((ourstatus->kind () != TARGET_WAITKIND_IGNORE
1487 && ourstatus->kind() != TARGET_WAITKIND_NO_RESUMED)
1488 || ptid != minus_one_ptid))
1489 async_file_mark ();
1491 fbsd_nat_debug_printf ("returning [%s], [%s]",
1492 target_pid_to_str (wptid).c_str (),
1493 ourstatus->to_string ().c_str ());
1494 return wptid;
1497 #ifdef USE_SIGTRAP_SIGINFO
1498 /* Implement the "stopped_by_sw_breakpoint" target_ops method. */
1500 bool
1501 fbsd_nat_target::stopped_by_sw_breakpoint ()
1503 struct ptrace_lwpinfo pl;
1505 if (ptrace (PT_LWPINFO, get_ptrace_pid (inferior_ptid), (caddr_t) &pl,
1506 sizeof pl) == -1)
1507 return false;
1509 return (pl.pl_flags == PL_FLAG_SI
1510 && pl.pl_siginfo.si_signo == SIGTRAP
1511 && pl.pl_siginfo.si_code == TRAP_BRKPT);
1514 /* Implement the "supports_stopped_by_sw_breakpoint" target_ops
1515 method. */
1517 bool
1518 fbsd_nat_target::supports_stopped_by_sw_breakpoint ()
1520 return true;
1522 #endif
1524 #ifdef PROC_ASLR_CTL
1525 class maybe_disable_address_space_randomization
1527 public:
1528 explicit maybe_disable_address_space_randomization (bool disable_randomization)
1530 if (disable_randomization)
1532 if (procctl (P_PID, getpid (), PROC_ASLR_STATUS, &m_aslr_ctl) == -1)
1534 warning (_("Failed to fetch current address space randomization "
1535 "status: %s"), safe_strerror (errno));
1536 return;
1539 m_aslr_ctl &= ~PROC_ASLR_ACTIVE;
1540 if (m_aslr_ctl == PROC_ASLR_FORCE_DISABLE)
1541 return;
1543 int ctl = PROC_ASLR_FORCE_DISABLE;
1544 if (procctl (P_PID, getpid (), PROC_ASLR_CTL, &ctl) == -1)
1546 warning (_("Error disabling address space randomization: %s"),
1547 safe_strerror (errno));
1548 return;
1551 m_aslr_ctl_set = true;
1555 ~maybe_disable_address_space_randomization ()
1557 if (m_aslr_ctl_set)
1559 if (procctl (P_PID, getpid (), PROC_ASLR_CTL, &m_aslr_ctl) == -1)
1560 warning (_("Error restoring address space randomization: %s"),
1561 safe_strerror (errno));
1565 DISABLE_COPY_AND_ASSIGN (maybe_disable_address_space_randomization);
1567 private:
1568 bool m_aslr_ctl_set = false;
1569 int m_aslr_ctl = 0;
1571 #endif
1573 void
1574 fbsd_nat_target::create_inferior (const char *exec_file,
1575 const std::string &allargs,
1576 char **env, int from_tty)
1578 #ifdef PROC_ASLR_CTL
1579 maybe_disable_address_space_randomization restore_aslr_ctl
1580 (disable_randomization);
1581 #endif
1583 inf_ptrace_target::create_inferior (exec_file, allargs, env, from_tty);
1586 #ifdef TDP_RFPPWAIT
1587 /* Target hook for follow_fork. On entry and at return inferior_ptid is
1588 the ptid of the followed inferior. */
1590 void
1591 fbsd_nat_target::follow_fork (inferior *child_inf, ptid_t child_ptid,
1592 target_waitkind fork_kind, bool follow_child,
1593 bool detach_fork)
1595 inf_ptrace_target::follow_fork (child_inf, child_ptid, fork_kind,
1596 follow_child, detach_fork);
1598 if (!follow_child && detach_fork)
1600 pid_t child_pid = child_ptid.pid ();
1602 /* Breakpoints have already been detached from the child by
1603 infrun.c. */
1605 if (ptrace (PT_DETACH, child_pid, (PTRACE_TYPE_ARG3)1, 0) == -1)
1606 perror_with_name (("ptrace (PT_DETACH)"));
1608 #ifndef PTRACE_VFORK
1609 if (fork_kind () == TARGET_WAITKIND_VFORKED)
1611 /* We can't insert breakpoints until the child process has
1612 finished with the shared memory region. The parent
1613 process doesn't wait for the child process to exit or
1614 exec until after it has been resumed from the ptrace stop
1615 to report the fork. Once it has been resumed it doesn't
1616 stop again before returning to userland, so there is no
1617 reliable way to wait on the parent.
1619 We can't stay attached to the child to wait for an exec
1620 or exit because it may invoke ptrace(PT_TRACE_ME)
1621 (e.g. if the parent process is a debugger forking a new
1622 child process).
1624 In the end, the best we can do is to make sure it runs
1625 for a little while. Hopefully it will be out of range of
1626 any breakpoints we reinsert. Usually this is only the
1627 single-step breakpoint at vfork's return point. */
1629 usleep (10000);
1631 /* Schedule a fake VFORK_DONE event to report on the next
1632 wait. */
1633 fbsd_add_vfork_done (inferior_ptid);
1635 #endif
1640 fbsd_nat_target::insert_fork_catchpoint (int pid)
1642 return 0;
1646 fbsd_nat_target::remove_fork_catchpoint (int pid)
1648 return 0;
1652 fbsd_nat_target::insert_vfork_catchpoint (int pid)
1654 return 0;
1658 fbsd_nat_target::remove_vfork_catchpoint (int pid)
1660 return 0;
1662 #endif
1664 /* Implement the virtual inf_ptrace_target::post_startup_inferior method. */
1666 void
1667 fbsd_nat_target::post_startup_inferior (ptid_t pid)
1669 fbsd_enable_proc_events (pid.pid ());
1672 /* Implement the "post_attach" target_ops method. */
1674 void
1675 fbsd_nat_target::post_attach (int pid)
1677 fbsd_enable_proc_events (pid);
1678 fbsd_add_threads (this, pid);
1681 /* Traced processes always stop after exec. */
1684 fbsd_nat_target::insert_exec_catchpoint (int pid)
1686 return 0;
1690 fbsd_nat_target::remove_exec_catchpoint (int pid)
1692 return 0;
1695 #ifdef HAVE_STRUCT_PTRACE_LWPINFO_PL_SYSCALL_CODE
1697 fbsd_nat_target::set_syscall_catchpoint (int pid, bool needed,
1698 int any_count,
1699 gdb::array_view<const int> syscall_counts)
1702 /* Ignore the arguments. inf-ptrace.c will use PT_SYSCALL which
1703 will catch all system call entries and exits. The system calls
1704 are filtered by GDB rather than the kernel. */
1705 return 0;
1707 #endif
1709 bool
1710 fbsd_nat_target::supports_multi_process ()
1712 return true;
1715 bool
1716 fbsd_nat_target::supports_disable_randomization ()
1718 #ifdef PROC_ASLR_CTL
1719 return true;
1720 #else
1721 return false;
1722 #endif
1725 /* See fbsd-nat.h. */
1727 bool
1728 fbsd_nat_target::fetch_register_set (struct regcache *regcache, int regnum,
1729 int fetch_op, const struct regset *regset,
1730 void *regs, size_t size)
1732 const struct regcache_map_entry *map
1733 = (const struct regcache_map_entry *) regset->regmap;
1734 pid_t pid = get_ptrace_pid (regcache->ptid ());
1736 if (regnum == -1 || regcache_map_supplies (map, regnum, regcache->arch(),
1737 size))
1739 if (ptrace (fetch_op, pid, (PTRACE_TYPE_ARG3) regs, 0) == -1)
1740 perror_with_name (_("Couldn't get registers"));
1742 regcache->supply_regset (regset, regnum, regs, size);
1743 return true;
1745 return false;
1748 /* See fbsd-nat.h. */
1750 bool
1751 fbsd_nat_target::store_register_set (struct regcache *regcache, int regnum,
1752 int fetch_op, int store_op,
1753 const struct regset *regset, void *regs,
1754 size_t size)
1756 const struct regcache_map_entry *map
1757 = (const struct regcache_map_entry *) regset->regmap;
1758 pid_t pid = get_ptrace_pid (regcache->ptid ());
1760 if (regnum == -1 || regcache_map_supplies (map, regnum, regcache->arch(),
1761 size))
1763 if (ptrace (fetch_op, pid, (PTRACE_TYPE_ARG3) regs, 0) == -1)
1764 perror_with_name (_("Couldn't get registers"));
1766 regcache->collect_regset (regset, regnum, regs, size);
1768 if (ptrace (store_op, pid, (PTRACE_TYPE_ARG3) regs, 0) == -1)
1769 perror_with_name (_("Couldn't write registers"));
1770 return true;
1772 return false;
1775 /* See fbsd-nat.h. */
1777 bool
1778 fbsd_nat_get_siginfo (ptid_t ptid, siginfo_t *siginfo)
1780 struct ptrace_lwpinfo pl;
1781 pid_t pid = get_ptrace_pid (ptid);
1783 if (ptrace (PT_LWPINFO, pid, (caddr_t) &pl, sizeof pl) == -1)
1784 return false;
1785 if (!(pl.pl_flags & PL_FLAG_SI))
1786 return false;;
1787 *siginfo = pl.pl_siginfo;
1788 return (true);
1791 void _initialize_fbsd_nat ();
1792 void
1793 _initialize_fbsd_nat ()
1795 add_setshow_boolean_cmd ("fbsd-lwp", class_maintenance,
1796 &debug_fbsd_lwp, _("\
1797 Set debugging of FreeBSD lwp module."), _("\
1798 Show debugging of FreeBSD lwp module."), _("\
1799 Enables printf debugging output."),
1800 NULL,
1801 &show_fbsd_lwp_debug,
1802 &setdebuglist, &showdebuglist);
1803 add_setshow_boolean_cmd ("fbsd-nat", class_maintenance,
1804 &debug_fbsd_nat, _("\
1805 Set debugging of FreeBSD native target."), _("\
1806 Show debugging of FreeBSD native target."), _("\
1807 Enables printf debugging output."),
1808 NULL,
1809 &show_fbsd_nat_debug,
1810 &setdebuglist, &showdebuglist);
1812 /* Install a SIGCHLD handler. */
1813 signal (SIGCHLD, sigchld_handler);