]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blob - gdb/netbsd-nat.c
Add --section-ordering command line option to the bfd linker.
[thirdparty/binutils-gdb.git] / gdb / netbsd-nat.c
1 /* Native-dependent code for NetBSD.
2
3 Copyright (C) 2006-2024 Free Software Foundation, Inc.
4
5 This file is part of GDB.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
19
20
21 #include "netbsd-nat.h"
22 #include "nat/netbsd-nat.h"
23 #include "gdbthread.h"
24 #include "netbsd-tdep.h"
25 #include "inferior.h"
26 #include "gdbarch.h"
27 #include "gdbsupport/buildargv.h"
28
29 #include <sys/types.h>
30 #include <sys/ptrace.h>
31 #include <sys/sysctl.h>
32 #include <sys/wait.h>
33
34 /* Return the name of a file that can be opened to get the symbols for
35 the child process identified by PID. */
36
37 const char *
38 nbsd_nat_target::pid_to_exec_file (int pid)
39 {
40 return netbsd_nat::pid_to_exec_file (pid);
41 }
42
43 /* Return the current directory for the process identified by PID. */
44
45 static std::string
46 nbsd_pid_to_cwd (int pid)
47 {
48 char buf[PATH_MAX];
49 size_t buflen;
50 int mib[4] = {CTL_KERN, KERN_PROC_ARGS, pid, KERN_PROC_CWD};
51 buflen = sizeof (buf);
52 if (sysctl (mib, ARRAY_SIZE (mib), buf, &buflen, NULL, 0))
53 return "";
54 return buf;
55 }
56
57 /* Return the kinfo_proc2 structure for the process identified by PID. */
58
59 static bool
60 nbsd_pid_to_kinfo_proc2 (pid_t pid, struct kinfo_proc2 *kp)
61 {
62 gdb_assert (kp != nullptr);
63
64 size_t size = sizeof (*kp);
65 int mib[6] = {CTL_KERN, KERN_PROC2, KERN_PROC_PID, pid,
66 static_cast<int> (size), 1};
67 return !sysctl (mib, ARRAY_SIZE (mib), kp, &size, NULL, 0);
68 }
69
70 /* Return the command line for the process identified by PID. */
71
72 static gdb::unique_xmalloc_ptr<char[]>
73 nbsd_pid_to_cmdline (int pid)
74 {
75 int mib[4] = {CTL_KERN, KERN_PROC_ARGS, pid, KERN_PROC_ARGV};
76
77 size_t size = 0;
78 if (::sysctl (mib, ARRAY_SIZE (mib), NULL, &size, NULL, 0) == -1 || size == 0)
79 return nullptr;
80
81 gdb::unique_xmalloc_ptr<char[]> args (XNEWVAR (char, size));
82
83 if (::sysctl (mib, ARRAY_SIZE (mib), args.get (), &size, NULL, 0) == -1
84 || size == 0)
85 return nullptr;
86
87 /* Arguments are returned as a flattened string with NUL separators.
88 Join the arguments with spaces to form a single string. */
89 for (size_t i = 0; i < size - 1; i++)
90 if (args[i] == '\0')
91 args[i] = ' ';
92 args[size - 1] = '\0';
93
94 return args;
95 }
96
97 /* Return true if PTID is still active in the inferior. */
98
99 bool
100 nbsd_nat_target::thread_alive (ptid_t ptid)
101 {
102 return netbsd_nat::thread_alive (ptid);
103 }
104
105 /* Return the name assigned to a thread by an application. Returns
106 the string in a static buffer. */
107
108 const char *
109 nbsd_nat_target::thread_name (struct thread_info *thr)
110 {
111 ptid_t ptid = thr->ptid;
112 return netbsd_nat::thread_name (ptid);
113 }
114
115 /* Implement the "post_attach" target_ops method. */
116
117 static void
118 nbsd_add_threads (nbsd_nat_target *target, pid_t pid)
119 {
120 auto fn
121 = [&target] (ptid_t ptid)
122 {
123 if (!in_thread_list (target, ptid))
124 {
125 if (inferior_ptid.lwp () == 0)
126 thread_change_ptid (target, inferior_ptid, ptid);
127 else
128 add_thread (target, ptid);
129 }
130 };
131
132 netbsd_nat::for_each_thread (pid, fn);
133 }
134
135 /* Implement the virtual inf_ptrace_target::post_startup_inferior method. */
136
137 void
138 nbsd_nat_target::post_startup_inferior (ptid_t ptid)
139 {
140 netbsd_nat::enable_proc_events (ptid.pid ());
141 }
142
143 /* Implement the "post_attach" target_ops method. */
144
145 void
146 nbsd_nat_target::post_attach (int pid)
147 {
148 netbsd_nat::enable_proc_events (pid);
149 nbsd_add_threads (this, pid);
150 }
151
152 /* Implement the "update_thread_list" target_ops method. */
153
154 void
155 nbsd_nat_target::update_thread_list ()
156 {
157 delete_exited_threads ();
158 }
159
160 /* Convert PTID to a string. */
161
162 std::string
163 nbsd_nat_target::pid_to_str (ptid_t ptid)
164 {
165 int lwp = ptid.lwp ();
166
167 if (lwp != 0)
168 {
169 pid_t pid = ptid.pid ();
170
171 return string_printf ("LWP %d of process %d", lwp, pid);
172 }
173
174 return normal_pid_to_str (ptid);
175 }
176
177 /* Retrieve all the memory regions in the specified process. */
178
179 static gdb::unique_xmalloc_ptr<struct kinfo_vmentry[]>
180 nbsd_kinfo_get_vmmap (pid_t pid, size_t *size)
181 {
182 int mib[5] = {CTL_VM, VM_PROC, VM_PROC_MAP, pid,
183 sizeof (struct kinfo_vmentry)};
184
185 size_t length = 0;
186 if (sysctl (mib, ARRAY_SIZE (mib), NULL, &length, NULL, 0))
187 {
188 *size = 0;
189 return NULL;
190 }
191
192 /* Prereserve more space. The length argument is volatile and can change
193 between the sysctl(3) calls as this function can be called against a
194 running process. */
195 length = length * 5 / 3;
196
197 gdb::unique_xmalloc_ptr<struct kinfo_vmentry[]> kiv
198 (XNEWVAR (kinfo_vmentry, length));
199
200 if (sysctl (mib, ARRAY_SIZE (mib), kiv.get (), &length, NULL, 0))
201 {
202 *size = 0;
203 return NULL;
204 }
205
206 *size = length / sizeof (struct kinfo_vmentry);
207 return kiv;
208 }
209
210 /* Iterate over all the memory regions in the current inferior,
211 calling FUNC for each memory region. OBFD is passed as the last
212 argument to FUNC. */
213
214 int
215 nbsd_nat_target::find_memory_regions (find_memory_region_ftype func,
216 void *data)
217 {
218 pid_t pid = inferior_ptid.pid ();
219
220 size_t nitems;
221 gdb::unique_xmalloc_ptr<struct kinfo_vmentry[]> vmentl
222 = nbsd_kinfo_get_vmmap (pid, &nitems);
223 if (vmentl == NULL)
224 perror_with_name (_("Couldn't fetch VM map entries"));
225
226 for (size_t i = 0; i < nitems; i++)
227 {
228 struct kinfo_vmentry *kve = &vmentl[i];
229
230 /* Skip unreadable segments and those where MAP_NOCORE has been set. */
231 if (!(kve->kve_protection & KVME_PROT_READ)
232 || kve->kve_flags & KVME_FLAG_NOCOREDUMP)
233 continue;
234
235 /* Skip segments with an invalid type. */
236 switch (kve->kve_type)
237 {
238 case KVME_TYPE_VNODE:
239 case KVME_TYPE_ANON:
240 case KVME_TYPE_SUBMAP:
241 case KVME_TYPE_OBJECT:
242 break;
243 default:
244 continue;
245 }
246
247 size_t size = kve->kve_end - kve->kve_start;
248 if (info_verbose)
249 {
250 gdb_printf ("Save segment, %ld bytes at %s (%c%c%c)\n",
251 (long) size,
252 paddress (current_inferior ()->arch (), kve->kve_start),
253 kve->kve_protection & KVME_PROT_READ ? 'r' : '-',
254 kve->kve_protection & KVME_PROT_WRITE ? 'w' : '-',
255 kve->kve_protection & KVME_PROT_EXEC ? 'x' : '-');
256 }
257
258 /* Invoke the callback function to create the corefile segment.
259 Pass MODIFIED as true, we do not know the real modification state. */
260 func (kve->kve_start, size, kve->kve_protection & KVME_PROT_READ,
261 kve->kve_protection & KVME_PROT_WRITE,
262 kve->kve_protection & KVME_PROT_EXEC, 1, false, data);
263 }
264 return 0;
265 }
266
267 /* Implement the "info_proc" target_ops method. */
268
269 bool
270 nbsd_nat_target::info_proc (const char *args, enum info_proc_what what)
271 {
272 pid_t pid;
273 bool do_cmdline = false;
274 bool do_cwd = false;
275 bool do_exe = false;
276 bool do_mappings = false;
277 bool do_status = false;
278
279 switch (what)
280 {
281 case IP_MINIMAL:
282 do_cmdline = true;
283 do_cwd = true;
284 do_exe = true;
285 break;
286 case IP_STAT:
287 case IP_STATUS:
288 do_status = true;
289 break;
290 case IP_MAPPINGS:
291 do_mappings = true;
292 break;
293 case IP_CMDLINE:
294 do_cmdline = true;
295 break;
296 case IP_EXE:
297 do_exe = true;
298 break;
299 case IP_CWD:
300 do_cwd = true;
301 break;
302 case IP_ALL:
303 do_cmdline = true;
304 do_cwd = true;
305 do_exe = true;
306 do_mappings = true;
307 do_status = true;
308 break;
309 default:
310 error (_("Not supported on this target."));
311 }
312
313 gdb_argv built_argv (args);
314 if (built_argv.count () == 0)
315 {
316 pid = inferior_ptid.pid ();
317 if (pid == 0)
318 error (_("No current process: you must name one."));
319 }
320 else if (built_argv.count () == 1 && isdigit (built_argv[0][0]))
321 pid = strtol (built_argv[0], NULL, 10);
322 else
323 error (_("Invalid arguments."));
324
325 gdb_printf (_("process %d\n"), pid);
326
327 if (do_cmdline)
328 {
329 gdb::unique_xmalloc_ptr<char[]> cmdline = nbsd_pid_to_cmdline (pid);
330 if (cmdline != nullptr)
331 gdb_printf ("cmdline = '%s'\n", cmdline.get ());
332 else
333 warning (_("unable to fetch command line"));
334 }
335 if (do_cwd)
336 {
337 std::string cwd = nbsd_pid_to_cwd (pid);
338 if (cwd != "")
339 gdb_printf ("cwd = '%s'\n", cwd.c_str ());
340 else
341 warning (_("unable to fetch current working directory"));
342 }
343 if (do_exe)
344 {
345 const char *exe = pid_to_exec_file (pid);
346 if (exe != nullptr)
347 gdb_printf ("exe = '%s'\n", exe);
348 else
349 warning (_("unable to fetch executable path name"));
350 }
351 if (do_mappings)
352 {
353 size_t nvment;
354 gdb::unique_xmalloc_ptr<struct kinfo_vmentry[]> vmentl
355 = nbsd_kinfo_get_vmmap (pid, &nvment);
356
357 if (vmentl != nullptr)
358 {
359 int addr_bit = TARGET_CHAR_BIT * sizeof (void *);
360 nbsd_info_proc_mappings_header (addr_bit);
361
362 struct kinfo_vmentry *kve = vmentl.get ();
363 for (int i = 0; i < nvment; i++, kve++)
364 nbsd_info_proc_mappings_entry (addr_bit, kve->kve_start,
365 kve->kve_end, kve->kve_offset,
366 kve->kve_flags, kve->kve_protection,
367 kve->kve_path);
368 }
369 else
370 warning (_("unable to fetch virtual memory map"));
371 }
372 if (do_status)
373 {
374 struct kinfo_proc2 kp;
375 if (!nbsd_pid_to_kinfo_proc2 (pid, &kp))
376 warning (_("Failed to fetch process information"));
377 else
378 {
379 auto process_status
380 = [] (int8_t stat)
381 {
382 switch (stat)
383 {
384 case SIDL:
385 return "IDL";
386 case SACTIVE:
387 return "ACTIVE";
388 case SDYING:
389 return "DYING";
390 case SSTOP:
391 return "STOP";
392 case SZOMB:
393 return "ZOMB";
394 case SDEAD:
395 return "DEAD";
396 default:
397 return "? (unknown)";
398 }
399 };
400
401 gdb_printf ("Name: %s\n", kp.p_comm);
402 gdb_printf ("State: %s\n", process_status(kp.p_realstat));
403 gdb_printf ("Parent process: %" PRId32 "\n", kp.p_ppid);
404 gdb_printf ("Process group: %" PRId32 "\n", kp.p__pgid);
405 gdb_printf ("Session id: %" PRId32 "\n", kp.p_sid);
406 gdb_printf ("TTY: %" PRId32 "\n", kp.p_tdev);
407 gdb_printf ("TTY owner process group: %" PRId32 "\n", kp.p_tpgid);
408 gdb_printf ("User IDs (real, effective, saved): "
409 "%" PRIu32 " %" PRIu32 " %" PRIu32 "\n",
410 kp.p_ruid, kp.p_uid, kp.p_svuid);
411 gdb_printf ("Group IDs (real, effective, saved): "
412 "%" PRIu32 " %" PRIu32 " %" PRIu32 "\n",
413 kp.p_rgid, kp.p_gid, kp.p_svgid);
414
415 gdb_printf ("Groups:");
416 for (int i = 0; i < kp.p_ngroups; i++)
417 gdb_printf (" %" PRIu32, kp.p_groups[i]);
418 gdb_printf ("\n");
419 gdb_printf ("Minor faults (no memory page): %" PRIu64 "\n",
420 kp.p_uru_minflt);
421 gdb_printf ("Major faults (memory page faults): %" PRIu64 "\n",
422 kp.p_uru_majflt);
423 gdb_printf ("utime: %" PRIu32 ".%06" PRIu32 "\n",
424 kp.p_uutime_sec, kp.p_uutime_usec);
425 gdb_printf ("stime: %" PRIu32 ".%06" PRIu32 "\n",
426 kp.p_ustime_sec, kp.p_ustime_usec);
427 gdb_printf ("utime+stime, children: %" PRIu32 ".%06" PRIu32 "\n",
428 kp.p_uctime_sec, kp.p_uctime_usec);
429 gdb_printf ("'nice' value: %" PRIu8 "\n", kp.p_nice);
430 gdb_printf ("Start time: %" PRIu32 ".%06" PRIu32 "\n",
431 kp.p_ustart_sec, kp.p_ustart_usec);
432 int pgtok = getpagesize () / 1024;
433 gdb_printf ("Data size: %" PRIuMAX " kB\n",
434 (uintmax_t) kp.p_vm_dsize * pgtok);
435 gdb_printf ("Stack size: %" PRIuMAX " kB\n",
436 (uintmax_t) kp.p_vm_ssize * pgtok);
437 gdb_printf ("Text size: %" PRIuMAX " kB\n",
438 (uintmax_t) kp.p_vm_tsize * pgtok);
439 gdb_printf ("Resident set size: %" PRIuMAX " kB\n",
440 (uintmax_t) kp.p_vm_rssize * pgtok);
441 gdb_printf ("Maximum RSS: %" PRIu64 " kB\n", kp.p_uru_maxrss);
442 gdb_printf ("Pending Signals:");
443 for (size_t i = 0; i < ARRAY_SIZE (kp.p_siglist.__bits); i++)
444 gdb_printf (" %08" PRIx32, kp.p_siglist.__bits[i]);
445 gdb_printf ("\n");
446 gdb_printf ("Ignored Signals:");
447 for (size_t i = 0; i < ARRAY_SIZE (kp.p_sigignore.__bits); i++)
448 gdb_printf (" %08" PRIx32, kp.p_sigignore.__bits[i]);
449 gdb_printf ("\n");
450 gdb_printf ("Caught Signals:");
451 for (size_t i = 0; i < ARRAY_SIZE (kp.p_sigcatch.__bits); i++)
452 gdb_printf (" %08" PRIx32, kp.p_sigcatch.__bits[i]);
453 gdb_printf ("\n");
454 }
455 }
456
457 return true;
458 }
459
460 /* Resume execution of a specified PTID, that points to a process or a thread
461 within a process. If one thread is specified, all other threads are
462 suspended. If STEP is nonzero, single-step it. If SIGNAL is nonzero,
463 give it that signal. */
464
465 static void
466 nbsd_resume(nbsd_nat_target *target, ptid_t ptid, int step,
467 enum gdb_signal signal)
468 {
469 int request;
470
471 gdb_assert (minus_one_ptid != ptid);
472
473 if (ptid.lwp_p ())
474 {
475 /* If ptid is a specific LWP, suspend all other LWPs in the process. */
476 inferior *inf = find_inferior_ptid (target, ptid);
477
478 for (thread_info *tp : inf->non_exited_threads ())
479 {
480 if (tp->ptid.lwp () == ptid.lwp ())
481 request = PT_RESUME;
482 else
483 request = PT_SUSPEND;
484
485 if (ptrace (request, tp->ptid.pid (), NULL, tp->ptid.lwp ()) == -1)
486 perror_with_name (("ptrace"));
487 }
488 }
489 else
490 {
491 /* If ptid is a wildcard, resume all matching threads (they won't run
492 until the process is continued however). */
493 for (thread_info *tp : all_non_exited_threads (target, ptid))
494 if (ptrace (PT_RESUME, tp->ptid.pid (), NULL, tp->ptid.lwp ()) == -1)
495 perror_with_name (("ptrace"));
496 }
497
498 if (step)
499 {
500 for (thread_info *tp : all_non_exited_threads (target, ptid))
501 if (ptrace (PT_SETSTEP, tp->ptid.pid (), NULL, tp->ptid.lwp ()) == -1)
502 perror_with_name (("ptrace"));
503 }
504 else
505 {
506 for (thread_info *tp : all_non_exited_threads (target, ptid))
507 if (ptrace (PT_CLEARSTEP, tp->ptid.pid (), NULL, tp->ptid.lwp ()) == -1)
508 perror_with_name (("ptrace"));
509 }
510
511 if (catch_syscall_enabled ())
512 request = PT_SYSCALL;
513 else
514 request = PT_CONTINUE;
515
516 /* An address of (void *)1 tells ptrace to continue from
517 where it was. If GDB wanted it to start some other way, we have
518 already written a new program counter value to the child. */
519 if (ptrace (request, ptid.pid (), (void *)1, gdb_signal_to_host (signal)) == -1)
520 perror_with_name (("ptrace"));
521 }
522
523 /* Resume execution of thread PTID, or all threads of all inferiors
524 if PTID is -1. If STEP is nonzero, single-step it. If SIGNAL is nonzero,
525 give it that signal. */
526
527 void
528 nbsd_nat_target::resume (ptid_t ptid, int step, enum gdb_signal signal)
529 {
530 if (minus_one_ptid != ptid)
531 nbsd_resume (this, ptid, step, signal);
532 else
533 {
534 for (inferior *inf : all_non_exited_inferiors (this))
535 nbsd_resume (this, ptid_t (inf->pid, 0, 0), step, signal);
536 }
537 }
538
539 /* Implement a safe wrapper around waitpid(). */
540
541 static pid_t
542 nbsd_wait (ptid_t ptid, struct target_waitstatus *ourstatus,
543 target_wait_flags options)
544 {
545 pid_t pid;
546 int status;
547
548 set_sigint_trap ();
549
550 do
551 {
552 /* The common code passes WNOHANG that leads to crashes, overwrite it. */
553 pid = waitpid (ptid.pid (), &status, 0);
554 }
555 while (pid == -1 && errno == EINTR);
556
557 clear_sigint_trap ();
558
559 if (pid == -1)
560 perror_with_name (_("Child process unexpectedly missing"));
561
562 *ourstatus = host_status_to_waitstatus (status);
563 return pid;
564 }
565
566 /* Wait for the child specified by PTID to do something. Return the
567 process ID of the child, or MINUS_ONE_PTID in case of error; store
568 the status in *OURSTATUS. */
569
570 ptid_t
571 nbsd_nat_target::wait (ptid_t ptid, struct target_waitstatus *ourstatus,
572 target_wait_flags target_options)
573 {
574 pid_t pid = nbsd_wait (ptid, ourstatus, target_options);
575 ptid_t wptid = ptid_t (pid);
576
577 /* If the child stopped, keep investigating its status. */
578 if (ourstatus->kind () != TARGET_WAITKIND_STOPPED)
579 return wptid;
580
581 /* Extract the event and thread that received a signal. */
582 ptrace_siginfo_t psi;
583 if (ptrace (PT_GET_SIGINFO, pid, &psi, sizeof (psi)) == -1)
584 perror_with_name (("ptrace"));
585
586 /* Pick child's siginfo_t. */
587 siginfo_t *si = &psi.psi_siginfo;
588
589 int lwp = psi.psi_lwpid;
590
591 int signo = si->si_signo;
592 const int code = si->si_code;
593
594 /* Construct PTID with a specified thread that received the event.
595 If a signal was targeted to the whole process, lwp is 0. */
596 wptid = ptid_t (pid, lwp, 0);
597
598 /* Bail out on non-debugger oriented signals.. */
599 if (signo != SIGTRAP)
600 return wptid;
601
602 /* Stop examining non-debugger oriented SIGTRAP codes. */
603 if (code <= SI_USER || code == SI_NOINFO)
604 return wptid;
605
606 /* Process state for threading events */
607 ptrace_state_t pst = {};
608 if (code == TRAP_LWP)
609 {
610 if (ptrace (PT_GET_PROCESS_STATE, pid, &pst, sizeof (pst)) == -1)
611 perror_with_name (("ptrace"));
612 }
613
614 if (code == TRAP_LWP && pst.pe_report_event == PTRACE_LWP_EXIT)
615 {
616 /* If GDB attaches to a multi-threaded process, exiting
617 threads might be skipped during post_attach that
618 have not yet reported their PTRACE_LWP_EXIT event.
619 Ignore exited events for an unknown LWP. */
620 thread_info *thr = this->find_thread (wptid);
621 if (thr == nullptr)
622 ourstatus->set_spurious ();
623 else
624 {
625 /* NetBSD does not store an LWP exit status. */
626 ourstatus->set_thread_exited (0);
627
628 delete_thread (thr);
629 }
630
631 /* The GDB core expects that the rest of the threads are running. */
632 if (ptrace (PT_CONTINUE, pid, (void *) 1, 0) == -1)
633 perror_with_name (("ptrace"));
634
635 return wptid;
636 }
637
638 if (in_thread_list (this, ptid_t (pid)))
639 thread_change_ptid (this, ptid_t (pid), wptid);
640
641 if (code == TRAP_LWP && pst.pe_report_event == PTRACE_LWP_CREATE)
642 {
643 /* If GDB attaches to a multi-threaded process, newborn
644 threads might be added by nbsd_add_threads that have
645 not yet reported their PTRACE_LWP_CREATE event. Ignore
646 born events for an already-known LWP. */
647 if (in_thread_list (this, wptid))
648 ourstatus->set_spurious ();
649 else
650 {
651 add_thread (this, wptid);
652 ourstatus->set_thread_created ();
653 }
654 return wptid;
655 }
656
657 if (code == TRAP_EXEC)
658 {
659 ourstatus->set_execd (make_unique_xstrdup (pid_to_exec_file (pid)));
660 return wptid;
661 }
662
663 if (code == TRAP_TRACE)
664 {
665 /* Unhandled at this level. */
666 return wptid;
667 }
668
669 if (code == TRAP_SCE || code == TRAP_SCX)
670 {
671 int sysnum = si->si_sysnum;
672
673 if (!catch_syscall_enabled () || !catching_syscall_number (sysnum))
674 {
675 /* If the core isn't interested in this event, ignore it. */
676 ourstatus->set_spurious ();
677 return wptid;
678 }
679
680 if (code == TRAP_SCE)
681 ourstatus->set_syscall_entry (sysnum);
682 else
683 ourstatus->set_syscall_return (sysnum);
684 return wptid;
685 }
686
687 if (code == TRAP_BRKPT)
688 {
689 /* Unhandled at this level. */
690 return wptid;
691 }
692
693 /* Unclassified SIGTRAP event. */
694 ourstatus->set_spurious ();
695 return wptid;
696 }
697
698 /* Implement the "insert_exec_catchpoint" target_ops method. */
699
700 int
701 nbsd_nat_target::insert_exec_catchpoint (int pid)
702 {
703 /* Nothing to do. */
704 return 0;
705 }
706
707 /* Implement the "remove_exec_catchpoint" target_ops method. */
708
709 int
710 nbsd_nat_target::remove_exec_catchpoint (int pid)
711 {
712 /* Nothing to do. */
713 return 0;
714 }
715
716 /* Implement the "set_syscall_catchpoint" target_ops method. */
717
718 int
719 nbsd_nat_target::set_syscall_catchpoint (int pid, bool needed,
720 int any_count,
721 gdb::array_view<const int> syscall_counts)
722 {
723 /* Ignore the arguments. inf-ptrace.c will use PT_SYSCALL which
724 will catch all system call entries and exits. The system calls
725 are filtered by GDB rather than the kernel. */
726 return 0;
727 }
728
729 /* Implement the "supports_multi_process" target_ops method. */
730
731 bool
732 nbsd_nat_target::supports_multi_process ()
733 {
734 return true;
735 }
736
737 /* Implement the "xfer_partial" target_ops method. */
738
739 enum target_xfer_status
740 nbsd_nat_target::xfer_partial (enum target_object object,
741 const char *annex, gdb_byte *readbuf,
742 const gdb_byte *writebuf,
743 ULONGEST offset, ULONGEST len,
744 ULONGEST *xfered_len)
745 {
746 pid_t pid = inferior_ptid.pid ();
747
748 switch (object)
749 {
750 case TARGET_OBJECT_SIGNAL_INFO:
751 {
752 len = netbsd_nat::qxfer_siginfo(pid, annex, readbuf, writebuf, offset,
753 len);
754
755 if (len == -1)
756 return TARGET_XFER_E_IO;
757
758 *xfered_len = len;
759 return TARGET_XFER_OK;
760 }
761 case TARGET_OBJECT_MEMORY:
762 {
763 size_t xfered;
764 int res;
765 if (writebuf != nullptr)
766 res = netbsd_nat::write_memory (pid, writebuf, offset, len, &xfered);
767 else
768 res = netbsd_nat::read_memory (pid, readbuf, offset, len, &xfered);
769 if (res != 0)
770 {
771 if (res == EACCES)
772 gdb_printf (gdb_stderr, "Cannot %s process at %s (%s). "
773 "Is PaX MPROTECT active? See security(7), "
774 "sysctl(7), paxctl(8)\n",
775 (writebuf ? "write to" : "read from"),
776 pulongest (offset), safe_strerror (errno));
777 return TARGET_XFER_E_IO;
778 }
779 if (xfered == 0)
780 return TARGET_XFER_EOF;
781 *xfered_len = (ULONGEST) xfered;
782 return TARGET_XFER_OK;
783 }
784 default:
785 return inf_ptrace_target::xfer_partial (object, annex,
786 readbuf, writebuf, offset,
787 len, xfered_len);
788 }
789 }
790
791 /* Implement the "supports_dumpcore" target_ops method. */
792
793 bool
794 nbsd_nat_target::supports_dumpcore ()
795 {
796 return true;
797 }
798
799 /* Implement the "dumpcore" target_ops method. */
800
801 void
802 nbsd_nat_target::dumpcore (const char *filename)
803 {
804 pid_t pid = inferior_ptid.pid ();
805
806 if (ptrace (PT_DUMPCORE, pid, const_cast<char *>(filename),
807 strlen (filename)) == -1)
808 perror_with_name (("ptrace"));
809 }