]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/fbsd-nat.c
Support 'info proc' for native FreeBSD processes.
[thirdparty/binutils-gdb.git] / gdb / fbsd-nat.c
CommitLineData
578c1c03
MK
1/* Native-dependent code for FreeBSD.
2
e2882c85 3 Copyright (C) 2002-2018 Free Software Foundation, Inc.
578c1c03
MK
4
5 This file is part of GDB.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
578c1c03
MK
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
578c1c03
MK
19
20#include "defs.h"
e4a26669 21#include "byte-vector.h"
578c1c03
MK
22#include "gdbcore.h"
23#include "inferior.h"
24#include "regcache.h"
25#include "regset.h"
6e9567fe 26#include "gdbcmd.h"
2020b7ab 27#include "gdbthread.h"
cea6e4f1 28#include "gdb_wait.h"
578c1c03 29#include <sys/types.h>
68b9939a 30#include <sys/procfs.h>
e58e05d6 31#include <sys/ptrace.h>
929edea9 32#include <sys/signal.h>
68b9939a 33#include <sys/sysctl.h>
25268153 34#include <sys/user.h>
92fce24d 35#if defined(HAVE_KINFO_GETFILE) || defined(HAVE_KINFO_GETVMMAP)
25268153 36#include <libutil.h>
92fce24d
JB
37#endif
38#if !defined(HAVE_KINFO_GETVMMAP)
142311d3 39#include "filestuff.h"
25268153 40#endif
578c1c03
MK
41
42#include "elf-bfd.h"
43#include "fbsd-nat.h"
92fce24d 44#include "fbsd-tdep.h"
578c1c03 45
e8c6b620
JB
46#include <list>
47
766062f6 48/* Return the name of a file that can be opened to get the symbols for
578c1c03
MK
49 the child process identified by PID. */
50
8f60fe01 51static char *
8dd27370 52fbsd_pid_to_exec_file (struct target_ops *self, int pid)
578c1c03 53{
f2feec98 54 ssize_t len;
b4ab256d
HZ
55 static char buf[PATH_MAX];
56 char name[PATH_MAX];
578c1c03 57
68b9939a 58#ifdef KERN_PROC_PATHNAME
f2feec98 59 size_t buflen;
68b9939a 60 int mib[4];
578c1c03 61
68b9939a
MK
62 mib[0] = CTL_KERN;
63 mib[1] = KERN_PROC;
64 mib[2] = KERN_PROC_PATHNAME;
65 mib[3] = pid;
f2feec98
JB
66 buflen = sizeof buf;
67 if (sysctl (mib, 4, buf, &buflen, NULL, 0) == 0)
b999e203
JB
68 /* The kern.proc.pathname.<pid> sysctl returns a length of zero
69 for processes without an associated executable such as kernel
70 processes. */
71 return buflen == 0 ? NULL : buf;
68b9939a 72#endif
578c1c03 73
b4ab256d
HZ
74 xsnprintf (name, PATH_MAX, "/proc/%d/exe", pid);
75 len = readlink (name, buf, PATH_MAX - 1);
76 if (len != -1)
68b9939a 77 {
b4ab256d
HZ
78 buf[len] = '\0';
79 return buf;
68b9939a
MK
80 }
81
b4ab256d 82 return NULL;
578c1c03
MK
83}
84
25268153
JB
85#ifdef HAVE_KINFO_GETVMMAP
86/* Iterate over all the memory regions in the current inferior,
87 calling FUNC for each memory region. OBFD is passed as the last
88 argument to FUNC. */
89
8f60fe01 90static int
25268153
JB
91fbsd_find_memory_regions (struct target_ops *self,
92 find_memory_region_ftype func, void *obfd)
93{
94 pid_t pid = ptid_get_pid (inferior_ptid);
e4a26669 95 struct kinfo_vmentry *kve;
25268153 96 uint64_t size;
25268153
JB
97 int i, nitems;
98
262f62f5 99 gdb::unique_xmalloc_ptr<struct kinfo_vmentry>
e4a26669 100 vmentl (kinfo_getvmmap (pid, &nitems));
25268153
JB
101 if (vmentl == NULL)
102 perror_with_name (_("Couldn't fetch VM map entries."));
25268153 103
e4a26669 104 for (i = 0, kve = vmentl.get (); i < nitems; i++, kve++)
25268153 105 {
25268153
JB
106 /* Skip unreadable segments and those where MAP_NOCORE has been set. */
107 if (!(kve->kve_protection & KVME_PROT_READ)
108 || kve->kve_flags & KVME_FLAG_NOCOREDUMP)
109 continue;
110
111 /* Skip segments with an invalid type. */
112 if (kve->kve_type != KVME_TYPE_DEFAULT
113 && kve->kve_type != KVME_TYPE_VNODE
114 && kve->kve_type != KVME_TYPE_SWAP
115 && kve->kve_type != KVME_TYPE_PHYS)
116 continue;
117
118 size = kve->kve_end - kve->kve_start;
119 if (info_verbose)
120 {
121 fprintf_filtered (gdb_stdout,
122 "Save segment, %ld bytes at %s (%c%c%c)\n",
123 (long) size,
124 paddress (target_gdbarch (), kve->kve_start),
125 kve->kve_protection & KVME_PROT_READ ? 'r' : '-',
126 kve->kve_protection & KVME_PROT_WRITE ? 'w' : '-',
127 kve->kve_protection & KVME_PROT_EXEC ? 'x' : '-');
128 }
129
130 /* Invoke the callback function to create the corefile segment.
131 Pass MODIFIED as true, we do not know the real modification state. */
132 func (kve->kve_start, size, kve->kve_protection & KVME_PROT_READ,
133 kve->kve_protection & KVME_PROT_WRITE,
134 kve->kve_protection & KVME_PROT_EXEC, 1, obfd);
135 }
25268153
JB
136 return 0;
137}
138#else
578c1c03
MK
139static int
140fbsd_read_mapping (FILE *mapfile, unsigned long *start, unsigned long *end,
141 char *protection)
142{
143 /* FreeBSD 5.1-RELEASE uses a 256-byte buffer. */
144 char buf[256];
145 int resident, privateresident;
146 unsigned long obj;
147 int ret = EOF;
148
149 /* As of FreeBSD 5.0-RELEASE, the layout is described in
150 /usr/src/sys/fs/procfs/procfs_map.c. Somewhere in 5.1-CURRENT a
151 new column was added to the procfs map. Therefore we can't use
152 fscanf since we need to support older releases too. */
153 if (fgets (buf, sizeof buf, mapfile) != NULL)
154 ret = sscanf (buf, "%lx %lx %d %d %lx %s", start, end,
155 &resident, &privateresident, &obj, protection);
156
157 return (ret != 0 && ret != EOF);
158}
159
160/* Iterate over all the memory regions in the current inferior,
161 calling FUNC for each memory region. OBFD is passed as the last
162 argument to FUNC. */
163
8f60fe01 164static int
2e73927c
TT
165fbsd_find_memory_regions (struct target_ops *self,
166 find_memory_region_ftype func, void *obfd)
578c1c03
MK
167{
168 pid_t pid = ptid_get_pid (inferior_ptid);
578c1c03
MK
169 unsigned long start, end, size;
170 char protection[4];
171 int read, write, exec;
172
e4a26669
JB
173 std::string mapfilename = string_printf ("/proc/%ld/map", (long) pid);
174 gdb_file_up mapfile (fopen (mapfilename.c_str (), "r"));
578c1c03 175 if (mapfile == NULL)
e4a26669 176 error (_("Couldn't open %s."), mapfilename.c_str ());
578c1c03
MK
177
178 if (info_verbose)
179 fprintf_filtered (gdb_stdout,
e4a26669 180 "Reading memory regions from %s\n", mapfilename.c_str ());
578c1c03
MK
181
182 /* Now iterate until end-of-file. */
7cd06d6e 183 while (fbsd_read_mapping (mapfile.get (), &start, &end, &protection[0]))
578c1c03
MK
184 {
185 size = end - start;
186
187 read = (strchr (protection, 'r') != 0);
188 write = (strchr (protection, 'w') != 0);
189 exec = (strchr (protection, 'x') != 0);
190
191 if (info_verbose)
192 {
193 fprintf_filtered (gdb_stdout,
5af949e3 194 "Save segment, %ld bytes at %s (%c%c%c)\n",
f5656ead 195 size, paddress (target_gdbarch (), start),
578c1c03
MK
196 read ? 'r' : '-',
197 write ? 'w' : '-',
198 exec ? 'x' : '-');
199 }
200
4f69f4c2
JK
201 /* Invoke the callback function to create the corefile segment.
202 Pass MODIFIED as true, we do not know the real modification state. */
203 func (start, size, read, write, exec, 1, obfd);
578c1c03
MK
204 }
205
578c1c03
MK
206 return 0;
207}
25268153 208#endif
8f60fe01 209
92fce24d
JB
210/* Fetch the command line for a running process. */
211
212static gdb::unique_xmalloc_ptr<char>
213fbsd_fetch_cmdline (pid_t pid)
214{
215 size_t len;
216 int mib[4];
217
218 len = 0;
219 mib[0] = CTL_KERN;
220 mib[1] = KERN_PROC;
221 mib[2] = KERN_PROC_ARGS;
222 mib[3] = pid;
223 if (sysctl (mib, 4, NULL, &len, NULL, 0) == -1)
224 return nullptr;
225
226 if (len == 0)
227 return nullptr;
228
229 gdb::unique_xmalloc_ptr<char> cmdline ((char *) xmalloc (len));
230 if (sysctl (mib, 4, cmdline.get (), &len, NULL, 0) == -1)
231 return nullptr;
232
233 return cmdline;
234}
235
236/* Fetch the external variant of the kernel's internal process
237 structure for the process PID into KP. */
238
239static bool
240fbsd_fetch_kinfo_proc (pid_t pid, struct kinfo_proc *kp)
241{
242 size_t len;
243 int mib[4];
244
245 len = sizeof *kp;
246 mib[0] = CTL_KERN;
247 mib[1] = KERN_PROC;
248 mib[2] = KERN_PROC_PID;
249 mib[3] = pid;
250 return (sysctl (mib, 4, kp, &len, NULL, 0) == 0);
251}
252
253/* Implement the "to_info_proc target_ops" method. */
254
255static void
256fbsd_info_proc (struct target_ops *ops, const char *args,
257 enum info_proc_what what)
258{
259#ifdef HAVE_KINFO_GETFILE
260 gdb::unique_xmalloc_ptr<struct kinfo_file> fdtbl;
261 int nfd = 0;
262#endif
263 struct kinfo_proc kp;
264 char *tmp;
265 pid_t pid;
266 bool do_cmdline = false;
267 bool do_cwd = false;
268 bool do_exe = false;
269#ifdef HAVE_KINFO_GETVMMAP
270 bool do_mappings = false;
271#endif
272 bool do_status = false;
273
274 switch (what)
275 {
276 case IP_MINIMAL:
277 do_cmdline = true;
278 do_cwd = true;
279 do_exe = true;
280 break;
281#ifdef HAVE_KINFO_GETVMMAP
282 case IP_MAPPINGS:
283 do_mappings = true;
284 break;
285#endif
286 case IP_STATUS:
287 case IP_STAT:
288 do_status = true;
289 break;
290 case IP_CMDLINE:
291 do_cmdline = true;
292 break;
293 case IP_EXE:
294 do_exe = true;
295 break;
296 case IP_CWD:
297 do_cwd = true;
298 break;
299 case IP_ALL:
300 do_cmdline = true;
301 do_cwd = true;
302 do_exe = true;
303#ifdef HAVE_KINFO_GETVMMAP
304 do_mappings = true;
305#endif
306 do_status = true;
307 break;
308 default:
309 error (_("Not supported on this target."));
310 }
311
312 gdb_argv built_argv (args);
313 if (built_argv.count () == 0)
314 {
315 pid = ptid_get_pid (inferior_ptid);
316 if (pid == 0)
317 error (_("No current process: you must name one."));
318 }
319 else if (built_argv.count () == 1 && isdigit (built_argv[0][0]))
320 pid = strtol (built_argv[0], NULL, 10);
321 else
322 error (_("Invalid arguments."));
323
324 printf_filtered (_("process %d\n"), pid);
325#ifdef HAVE_KINFO_GETFILE
326 if (do_cwd || do_exe)
327 fdtbl.reset (kinfo_getfile (pid, &nfd));
328#endif
329
330 if (do_cmdline)
331 {
332 gdb::unique_xmalloc_ptr<char> cmdline = fbsd_fetch_cmdline (pid);
333 if (cmdline != nullptr)
334 printf_filtered ("cmdline = '%s'\n", cmdline.get ());
335 else
336 warning (_("unable to fetch command line"));
337 }
338 if (do_cwd)
339 {
340 const char *cwd = NULL;
341#ifdef HAVE_KINFO_GETFILE
342 struct kinfo_file *kf = fdtbl.get ();
343 for (int i = 0; i < nfd; i++, kf++)
344 {
345 if (kf->kf_type == KF_TYPE_VNODE && kf->kf_fd == KF_FD_TYPE_CWD)
346 {
347 cwd = kf->kf_path;
348 break;
349 }
350 }
351#endif
352 if (cwd != NULL)
353 printf_filtered ("cwd = '%s'\n", cwd);
354 else
355 warning (_("unable to fetch current working directory"));
356 }
357 if (do_exe)
358 {
359 const char *exe = NULL;
360#ifdef HAVE_KINFO_GETFILE
361 struct kinfo_file *kf = fdtbl.get ();
362 for (int i = 0; i < nfd; i++, kf++)
363 {
364 if (kf->kf_type == KF_TYPE_VNODE && kf->kf_fd == KF_FD_TYPE_TEXT)
365 {
366 exe = kf->kf_path;
367 break;
368 }
369 }
370#endif
371 if (exe == NULL)
372 exe = fbsd_pid_to_exec_file (ops, pid);
373 if (exe != NULL)
374 printf_filtered ("exe = '%s'\n", exe);
375 else
376 warning (_("unable to fetch executable path name"));
377 }
378#ifdef HAVE_KINFO_GETVMMAP
379 if (do_mappings)
380 {
381 int nvment;
382 gdb::unique_xmalloc_ptr<struct kinfo_vmentry>
383 vmentl (kinfo_getvmmap (pid, &nvment));
384
385 if (vmentl != nullptr)
386 {
387 printf_filtered (_("Mapped address spaces:\n\n"));
388#ifdef __LP64__
389 printf_filtered (" %18s %18s %10s %10s %9s %s\n",
390 "Start Addr",
391 " End Addr",
392 " Size", " Offset", "Flags ", "File");
393#else
394 printf_filtered ("\t%10s %10s %10s %10s %9s %s\n",
395 "Start Addr",
396 " End Addr",
397 " Size", " Offset", "Flags ", "File");
398#endif
399
400 struct kinfo_vmentry *kve = vmentl.get ();
401 for (int i = 0; i < nvment; i++, kve++)
402 {
403 ULONGEST start, end;
404
405 start = kve->kve_start;
406 end = kve->kve_end;
407#ifdef __LP64__
408 printf_filtered (" %18s %18s %10s %10s %9s %s\n",
409 hex_string (start),
410 hex_string (end),
411 hex_string (end - start),
412 hex_string (kve->kve_offset),
413 fbsd_vm_map_entry_flags (kve->kve_flags,
414 kve->kve_protection),
415 kve->kve_path);
416#else
417 printf_filtered ("\t%10s %10s %10s %10s %9s %s\n",
418 hex_string (start),
419 hex_string (end),
420 hex_string (end - start),
421 hex_string (kve->kve_offset),
422 fbsd_vm_map_entry_flags (kve->kve_flags,
423 kve->kve_protection),
424 kve->kve_path);
425#endif
426 }
427 }
428 else
429 warning (_("unable to fetch virtual memory map"));
430 }
431#endif
432 if (do_status)
433 {
434 if (!fbsd_fetch_kinfo_proc (pid, &kp))
435 warning (_("Failed to fetch process information"));
436 else
437 {
438 const char *state;
439 int pgtok;
440
441 printf_filtered ("Name: %s\n", kp.ki_comm);
442 switch (kp.ki_stat)
443 {
444 case SIDL:
445 state = "I (idle)";
446 break;
447 case SRUN:
448 state = "R (running)";
449 break;
450 case SSTOP:
451 state = "T (stopped)";
452 break;
453 case SZOMB:
454 state = "Z (zombie)";
455 break;
456 case SSLEEP:
457 state = "S (sleeping)";
458 break;
459 case SWAIT:
460 state = "W (interrupt wait)";
461 break;
462 case SLOCK:
463 state = "L (blocked on lock)";
464 break;
465 default:
466 state = "? (unknown)";
467 break;
468 }
469 printf_filtered ("State: %s\n", state);
470 printf_filtered ("Parent process: %d\n", kp.ki_ppid);
471 printf_filtered ("Process group: %d\n", kp.ki_pgid);
472 printf_filtered ("Session id: %d\n", kp.ki_sid);
473 printf_filtered ("TTY: %ju\n", (uintmax_t) kp.ki_tdev);
474 printf_filtered ("TTY owner process group: %d\n", kp.ki_tpgid);
475 printf_filtered ("User IDs (real, effective, saved): %d %d %d\n",
476 kp.ki_ruid, kp.ki_uid, kp.ki_svuid);
477 printf_filtered ("Group IDs (real, effective, saved): %d %d %d\n",
478 kp.ki_rgid, kp.ki_groups[0], kp.ki_svgid);
479 printf_filtered ("Groups: ");
480 for (int i = 0; i < kp.ki_ngroups; i++)
481 printf_filtered ("%d ", kp.ki_groups[i]);
482 printf_filtered ("\n");
483 printf_filtered ("Minor faults (no memory page): %ld\n",
484 kp.ki_rusage.ru_minflt);
485 printf_filtered ("Minor faults, children: %ld\n",
486 kp.ki_rusage_ch.ru_minflt);
487 printf_filtered ("Major faults (memory page faults): %ld\n",
488 kp.ki_rusage.ru_majflt);
489 printf_filtered ("Major faults, children: %ld\n",
490 kp.ki_rusage_ch.ru_majflt);
491 printf_filtered ("utime: %jd.%06ld\n",
492 (intmax_t) kp.ki_rusage.ru_utime.tv_sec,
493 kp.ki_rusage.ru_utime.tv_usec);
494 printf_filtered ("stime: %jd.%06ld\n",
495 (intmax_t) kp.ki_rusage.ru_stime.tv_sec,
496 kp.ki_rusage.ru_stime.tv_usec);
497 printf_filtered ("utime, children: %jd.%06ld\n",
498 (intmax_t) kp.ki_rusage_ch.ru_utime.tv_sec,
499 kp.ki_rusage_ch.ru_utime.tv_usec);
500 printf_filtered ("stime, children: %jd.%06ld\n",
501 (intmax_t) kp.ki_rusage_ch.ru_stime.tv_sec,
502 kp.ki_rusage_ch.ru_stime.tv_usec);
503 printf_filtered ("'nice' value: %d\n", kp.ki_nice);
504 printf_filtered ("Start time: %jd.%06ld\n", kp.ki_start.tv_sec,
505 kp.ki_start.tv_usec);
506 pgtok = getpagesize () / 1024;
507 printf_filtered ("Virtual memory size: %ju kB\n",
508 (uintmax_t) kp.ki_size / 1024);
509 printf_filtered ("Data size: %ju kB\n",
510 (uintmax_t) kp.ki_dsize * pgtok);
511 printf_filtered ("Stack size: %ju kB\n",
512 (uintmax_t) kp.ki_ssize * pgtok);
513 printf_filtered ("Text size: %ju kB\n",
514 (uintmax_t) kp.ki_tsize * pgtok);
515 printf_filtered ("Resident set size: %ju kB\n",
516 (uintmax_t) kp.ki_rssize * pgtok);
517 printf_filtered ("Maximum RSS: %ju kB\n",
518 (uintmax_t) kp.ki_rusage.ru_maxrss);
519 printf_filtered ("Pending Signals: ");
520 for (int i = 0; i < _SIG_WORDS; i++)
521 printf_filtered ("%08x ", kp.ki_siglist.__bits[i]);
522 printf_filtered ("\n");
523 printf_filtered ("Ignored Signals: ");
524 for (int i = 0; i < _SIG_WORDS; i++)
525 printf_filtered ("%08x ", kp.ki_sigignore.__bits[i]);
526 printf_filtered ("\n");
527 printf_filtered ("Caught Signals: ");
528 for (int i = 0; i < _SIG_WORDS; i++)
529 printf_filtered ("%08x ", kp.ki_sigcatch.__bits[i]);
530 printf_filtered ("\n");
531 }
532 }
533}
534
7697fc9e
JB
535#ifdef KERN_PROC_AUXV
536static enum target_xfer_status (*super_xfer_partial) (struct target_ops *ops,
537 enum target_object object,
538 const char *annex,
539 gdb_byte *readbuf,
540 const gdb_byte *writebuf,
541 ULONGEST offset,
542 ULONGEST len,
543 ULONGEST *xfered_len);
544
929edea9
JB
545#ifdef PT_LWPINFO
546/* Return the size of siginfo for the current inferior. */
547
548#ifdef __LP64__
549union sigval32 {
550 int sival_int;
551 uint32_t sival_ptr;
552};
553
554/* This structure matches the naming and layout of `siginfo_t' in
555 <sys/signal.h>. In particular, the `si_foo' macros defined in that
556 header can be used with both types to copy fields in the `_reason'
557 union. */
558
559struct siginfo32
560{
561 int si_signo;
562 int si_errno;
563 int si_code;
564 __pid_t si_pid;
565 __uid_t si_uid;
566 int si_status;
567 uint32_t si_addr;
568 union sigval32 si_value;
569 union
570 {
571 struct
572 {
573 int _trapno;
574 } _fault;
575 struct
576 {
577 int _timerid;
578 int _overrun;
579 } _timer;
580 struct
581 {
582 int _mqd;
583 } _mesgq;
584 struct
585 {
586 int32_t _band;
587 } _poll;
588 struct
589 {
590 int32_t __spare1__;
591 int __spare2__[7];
592 } __spare__;
593 } _reason;
594};
595#endif
596
597static size_t
598fbsd_siginfo_size ()
599{
600#ifdef __LP64__
601 struct gdbarch *gdbarch = get_frame_arch (get_current_frame ());
602
603 /* Is the inferior 32-bit? If so, use the 32-bit siginfo size. */
a181c0bf 604 if (gdbarch_long_bit (gdbarch) == 32)
929edea9
JB
605 return sizeof (struct siginfo32);
606#endif
607 return sizeof (siginfo_t);
608}
609
610/* Convert a native 64-bit siginfo object to a 32-bit object. Note
611 that FreeBSD doesn't support writing to $_siginfo, so this only
612 needs to convert one way. */
613
614static void
615fbsd_convert_siginfo (siginfo_t *si)
616{
617#ifdef __LP64__
618 struct gdbarch *gdbarch = get_frame_arch (get_current_frame ());
619
620 /* Is the inferior 32-bit? If not, nothing to do. */
a181c0bf 621 if (gdbarch_long_bit (gdbarch) != 32)
929edea9
JB
622 return;
623
624 struct siginfo32 si32;
625
626 si32.si_signo = si->si_signo;
627 si32.si_errno = si->si_errno;
628 si32.si_code = si->si_code;
629 si32.si_pid = si->si_pid;
630 si32.si_uid = si->si_uid;
631 si32.si_status = si->si_status;
632 si32.si_addr = (uintptr_t) si->si_addr;
633
634 /* If sival_ptr is being used instead of sival_int on a big-endian
635 platform, then sival_int will be zero since it holds the upper
636 32-bits of the pointer value. */
637#if _BYTE_ORDER == _BIG_ENDIAN
638 if (si->si_value.sival_int == 0)
0335ac6d 639 si32.si_value.sival_ptr = (uintptr_t) si->si_value.sival_ptr;
929edea9
JB
640 else
641 si32.si_value.sival_int = si->si_value.sival_int;
642#else
643 si32.si_value.sival_int = si->si_value.sival_int;
644#endif
645
646 /* Always copy the spare fields and then possibly overwrite them for
647 signal-specific or code-specific fields. */
648 si32._reason.__spare__.__spare1__ = si->_reason.__spare__.__spare1__;
649 for (int i = 0; i < 7; i++)
650 si32._reason.__spare__.__spare2__[i] = si->_reason.__spare__.__spare2__[i];
651 switch (si->si_signo) {
652 case SIGILL:
653 case SIGFPE:
654 case SIGSEGV:
655 case SIGBUS:
656 si32.si_trapno = si->si_trapno;
657 break;
658 }
659 switch (si->si_code) {
660 case SI_TIMER:
661 si32.si_timerid = si->si_timerid;
662 si32.si_overrun = si->si_overrun;
663 break;
664 case SI_MESGQ:
665 si32.si_mqd = si->si_mqd;
666 break;
667 }
668
669 memcpy(si, &si32, sizeof (si32));
670#endif
671}
672#endif
673
7697fc9e
JB
674/* Implement the "to_xfer_partial target_ops" method. */
675
676static enum target_xfer_status
677fbsd_xfer_partial (struct target_ops *ops, enum target_object object,
678 const char *annex, gdb_byte *readbuf,
679 const gdb_byte *writebuf,
680 ULONGEST offset, ULONGEST len, ULONGEST *xfered_len)
681{
682 pid_t pid = ptid_get_pid (inferior_ptid);
683
684 switch (object)
685 {
929edea9
JB
686#ifdef PT_LWPINFO
687 case TARGET_OBJECT_SIGNAL_INFO:
688 {
689 struct ptrace_lwpinfo pl;
690 size_t siginfo_size;
691
692 /* FreeBSD doesn't support writing to $_siginfo. */
693 if (writebuf != NULL)
694 return TARGET_XFER_E_IO;
695
696 if (inferior_ptid.lwp_p ())
697 pid = inferior_ptid.lwp ();
698
699 siginfo_size = fbsd_siginfo_size ();
700 if (offset > siginfo_size)
701 return TARGET_XFER_E_IO;
702
703 if (ptrace (PT_LWPINFO, pid, (PTRACE_TYPE_ARG3) &pl, sizeof (pl)) == -1)
704 return TARGET_XFER_E_IO;
705
706 if (!(pl.pl_flags & PL_FLAG_SI))
707 return TARGET_XFER_E_IO;
708
709 fbsd_convert_siginfo (&pl.pl_siginfo);
710 if (offset + len > siginfo_size)
711 len = siginfo_size - offset;
712
713 memcpy (readbuf, ((gdb_byte *) &pl.pl_siginfo) + offset, len);
714 *xfered_len = len;
715 return TARGET_XFER_OK;
716 }
717#endif
7697fc9e
JB
718 case TARGET_OBJECT_AUXV:
719 {
e4a26669
JB
720 gdb::byte_vector buf_storage;
721 gdb_byte *buf;
7697fc9e
JB
722 size_t buflen;
723 int mib[4];
724
725 if (writebuf != NULL)
726 return TARGET_XFER_E_IO;
727 mib[0] = CTL_KERN;
728 mib[1] = KERN_PROC;
729 mib[2] = KERN_PROC_AUXV;
730 mib[3] = pid;
731 if (offset == 0)
732 {
733 buf = readbuf;
734 buflen = len;
735 }
736 else
737 {
738 buflen = offset + len;
e4a26669
JB
739 buf_storage.resize (buflen);
740 buf = buf_storage.data ();
7697fc9e
JB
741 }
742 if (sysctl (mib, 4, buf, &buflen, NULL, 0) == 0)
743 {
744 if (offset != 0)
745 {
746 if (buflen > offset)
747 {
748 buflen -= offset;
749 memcpy (readbuf, buf + offset, buflen);
750 }
751 else
752 buflen = 0;
753 }
7697fc9e
JB
754 *xfered_len = buflen;
755 return (buflen == 0) ? TARGET_XFER_EOF : TARGET_XFER_OK;
756 }
7697fc9e
JB
757 return TARGET_XFER_E_IO;
758 }
759 default:
760 return super_xfer_partial (ops, object, annex, readbuf, writebuf, offset,
761 len, xfered_len);
762 }
763}
764#endif
765
e58e05d6 766#ifdef PT_LWPINFO
6e9567fe
JB
767static int debug_fbsd_lwp;
768
8607ea63
JB
769static void (*super_resume) (struct target_ops *,
770 ptid_t,
771 int,
772 enum gdb_signal);
e58e05d6
JB
773static ptid_t (*super_wait) (struct target_ops *,
774 ptid_t,
775 struct target_waitstatus *,
776 int);
777
6e9567fe
JB
778static void
779show_fbsd_lwp_debug (struct ui_file *file, int from_tty,
780 struct cmd_list_element *c, const char *value)
781{
782 fprintf_filtered (file, _("Debugging of FreeBSD lwp module is %s.\n"), value);
783}
784
6e9567fe
JB
785/*
786 FreeBSD's first thread support was via a "reentrant" version of libc
787 (libc_r) that first shipped in 2.2.7. This library multiplexed all
788 of the threads in a process onto a single kernel thread. This
4c7bf4f9 789 library was supported via the bsd-uthread target.
6e9567fe
JB
790
791 FreeBSD 5.1 introduced two new threading libraries that made use of
792 multiple kernel threads. The first (libkse) scheduled M user
793 threads onto N (<= M) kernel threads (LWPs). The second (libthr)
794 bound each user thread to a dedicated kernel thread. libkse shipped
795 as the default threading library (libpthread).
796
797 FreeBSD 5.3 added a libthread_db to abstract the interface across
798 the various thread libraries (libc_r, libkse, and libthr).
799
800 FreeBSD 7.0 switched the default threading library from from libkse
801 to libpthread and removed libc_r.
802
803 FreeBSD 8.0 removed libkse and the in-kernel support for it. The
804 only threading library supported by 8.0 and later is libthr which
805 ties each user thread directly to an LWP. To simplify the
806 implementation, this target only supports LWP-backed threads using
807 ptrace directly rather than libthread_db.
808
809 FreeBSD 11.0 introduced LWP event reporting via PT_LWP_EVENTS.
810*/
811
812/* Return true if PTID is still active in the inferior. */
813
814static int
815fbsd_thread_alive (struct target_ops *ops, ptid_t ptid)
816{
817 if (ptid_lwp_p (ptid))
818 {
819 struct ptrace_lwpinfo pl;
820
821 if (ptrace (PT_LWPINFO, ptid_get_lwp (ptid), (caddr_t) &pl, sizeof pl)
822 == -1)
823 return 0;
824#ifdef PL_FLAG_EXITED
825 if (pl.pl_flags & PL_FLAG_EXITED)
826 return 0;
827#endif
828 }
829
830 return 1;
831}
832
833/* Convert PTID to a string. Returns the string in a static
834 buffer. */
835
7a114964 836static const char *
6e9567fe
JB
837fbsd_pid_to_str (struct target_ops *ops, ptid_t ptid)
838{
839 lwpid_t lwp;
840
841 lwp = ptid_get_lwp (ptid);
842 if (lwp != 0)
843 {
844 static char buf[64];
845 int pid = ptid_get_pid (ptid);
846
b2bae2f7 847 xsnprintf (buf, sizeof buf, "LWP %d of process %d", lwp, pid);
6e9567fe
JB
848 return buf;
849 }
850
851 return normal_pid_to_str (ptid);
852}
853
854#ifdef HAVE_STRUCT_PTRACE_LWPINFO_PL_TDNAME
855/* Return the name assigned to a thread by an application. Returns
856 the string in a static buffer. */
857
858static const char *
859fbsd_thread_name (struct target_ops *self, struct thread_info *thr)
860{
861 struct ptrace_lwpinfo pl;
862 struct kinfo_proc kp;
863 int pid = ptid_get_pid (thr->ptid);
864 long lwp = ptid_get_lwp (thr->ptid);
865 static char buf[sizeof pl.pl_tdname + 1];
866
867 /* Note that ptrace_lwpinfo returns the process command in pl_tdname
868 if a name has not been set explicitly. Return a NULL name in
869 that case. */
92fce24d
JB
870 if (!fbsd_fetch_kinfo_proc (pid, &kp))
871 perror_with_name (_("Failed to fetch process information"));
6e9567fe
JB
872 if (ptrace (PT_LWPINFO, lwp, (caddr_t) &pl, sizeof pl) == -1)
873 perror_with_name (("ptrace"));
874 if (strcmp (kp.ki_comm, pl.pl_tdname) == 0)
875 return NULL;
876 xsnprintf (buf, sizeof buf, "%s", pl.pl_tdname);
877 return buf;
878}
879#endif
880
da95a26c 881/* Enable additional event reporting on new processes.
6e9567fe 882
da95a26c
JB
883 To catch fork events, PTRACE_FORK is set on every traced process
884 to enable stops on returns from fork or vfork. Note that both the
885 parent and child will always stop, even if system call stops are
886 not enabled.
887
888 To catch LWP events, PTRACE_EVENTS is set on every traced process.
6e9567fe
JB
889 This enables stops on the birth for new LWPs (excluding the "main" LWP)
890 and the death of LWPs (excluding the last LWP in a process). Note
891 that unlike fork events, the LWP that creates a new LWP does not
892 report an event. */
893
894static void
da95a26c 895fbsd_enable_proc_events (pid_t pid)
6e9567fe 896{
da95a26c
JB
897#ifdef PT_GET_EVENT_MASK
898 int events;
899
900 if (ptrace (PT_GET_EVENT_MASK, pid, (PTRACE_TYPE_ARG3)&events,
901 sizeof (events)) == -1)
902 perror_with_name (("ptrace"));
903 events |= PTRACE_FORK | PTRACE_LWP;
dbaed385
JB
904#ifdef PTRACE_VFORK
905 events |= PTRACE_VFORK;
906#endif
da95a26c
JB
907 if (ptrace (PT_SET_EVENT_MASK, pid, (PTRACE_TYPE_ARG3)&events,
908 sizeof (events)) == -1)
909 perror_with_name (("ptrace"));
910#else
911#ifdef TDP_RFPPWAIT
912 if (ptrace (PT_FOLLOW_FORK, pid, (PTRACE_TYPE_ARG3)0, 1) == -1)
913 perror_with_name (("ptrace"));
914#endif
915#ifdef PT_LWP_EVENTS
6e9567fe
JB
916 if (ptrace (PT_LWP_EVENTS, pid, (PTRACE_TYPE_ARG3)0, 1) == -1)
917 perror_with_name (("ptrace"));
6e9567fe 918#endif
da95a26c
JB
919#endif
920}
6e9567fe
JB
921
922/* Add threads for any new LWPs in a process.
923
924 When LWP events are used, this function is only used to detect existing
925 threads when attaching to a process. On older systems, this function is
926 called to discover new threads each time the thread list is updated. */
927
928static void
929fbsd_add_threads (pid_t pid)
930{
6e9567fe
JB
931 int i, nlwps;
932
933 gdb_assert (!in_thread_list (pid_to_ptid (pid)));
934 nlwps = ptrace (PT_GETNUMLWPS, pid, NULL, 0);
935 if (nlwps == -1)
936 perror_with_name (("ptrace"));
937
329d5e7e 938 gdb::unique_xmalloc_ptr<lwpid_t[]> lwps (XCNEWVEC (lwpid_t, nlwps));
6e9567fe 939
e4a26669 940 nlwps = ptrace (PT_GETLWPLIST, pid, (caddr_t) lwps.get (), nlwps);
6e9567fe
JB
941 if (nlwps == -1)
942 perror_with_name (("ptrace"));
943
944 for (i = 0; i < nlwps; i++)
945 {
329d5e7e 946 ptid_t ptid = ptid_build (pid, lwps[i], 0);
6e9567fe
JB
947
948 if (!in_thread_list (ptid))
949 {
950#ifdef PT_LWP_EVENTS
951 struct ptrace_lwpinfo pl;
952
953 /* Don't add exited threads. Note that this is only called
954 when attaching to a multi-threaded process. */
329d5e7e 955 if (ptrace (PT_LWPINFO, lwps[i], (caddr_t) &pl, sizeof pl) == -1)
6e9567fe
JB
956 perror_with_name (("ptrace"));
957 if (pl.pl_flags & PL_FLAG_EXITED)
958 continue;
959#endif
960 if (debug_fbsd_lwp)
961 fprintf_unfiltered (gdb_stdlog,
962 "FLWP: adding thread for LWP %u\n",
329d5e7e 963 lwps[i]);
6e9567fe
JB
964 add_thread (ptid);
965 }
966 }
6e9567fe
JB
967}
968
969/* Implement the "to_update_thread_list" target_ops method. */
970
971static void
972fbsd_update_thread_list (struct target_ops *ops)
973{
974#ifdef PT_LWP_EVENTS
975 /* With support for thread events, threads are added/deleted from the
976 list as events are reported, so just try deleting exited threads. */
977 delete_exited_threads ();
978#else
979 prune_threads ();
980
981 fbsd_add_threads (ptid_get_pid (inferior_ptid));
982#endif
983}
984
e58e05d6
JB
985#ifdef TDP_RFPPWAIT
986/*
987 To catch fork events, PT_FOLLOW_FORK is set on every traced process
988 to enable stops on returns from fork or vfork. Note that both the
989 parent and child will always stop, even if system call stops are not
990 enabled.
991
992 After a fork, both the child and parent process will stop and report
993 an event. However, there is no guarantee of order. If the parent
994 reports its stop first, then fbsd_wait explicitly waits for the new
995 child before returning. If the child reports its stop first, then
996 the event is saved on a list and ignored until the parent's stop is
997 reported. fbsd_wait could have been changed to fetch the parent PID
998 of the new child and used that to wait for the parent explicitly.
999 However, if two threads in the parent fork at the same time, then
1000 the wait on the parent might return the "wrong" fork event.
1001
1002 The initial version of PT_FOLLOW_FORK did not set PL_FLAG_CHILD for
1003 the new child process. This flag could be inferred by treating any
1004 events for an unknown pid as a new child.
1005
1006 In addition, the initial version of PT_FOLLOW_FORK did not report a
1007 stop event for the parent process of a vfork until after the child
1008 process executed a new program or exited. The kernel was changed to
1009 defer the wait for exit or exec of the child until after posting the
1010 stop event shortly after the change to introduce PL_FLAG_CHILD.
1011 This could be worked around by reporting a vfork event when the
1012 child event posted and ignoring the subsequent event from the
1013 parent.
1014
1015 This implementation requires both of these fixes for simplicity's
1016 sake. FreeBSD versions newer than 9.1 contain both fixes.
1017*/
1018
e8c6b620 1019static std::list<ptid_t> fbsd_pending_children;
e58e05d6
JB
1020
1021/* Record a new child process event that is reported before the
1022 corresponding fork event in the parent. */
1023
1024static void
6e9567fe 1025fbsd_remember_child (ptid_t pid)
e58e05d6 1026{
e8c6b620 1027 fbsd_pending_children.push_front (pid);
e58e05d6
JB
1028}
1029
1030/* Check for a previously-recorded new child process event for PID.
6e9567fe 1031 If one is found, remove it from the list and return the PTID. */
e58e05d6 1032
6e9567fe 1033static ptid_t
e58e05d6
JB
1034fbsd_is_child_pending (pid_t pid)
1035{
e8c6b620
JB
1036 for (auto it = fbsd_pending_children.begin ();
1037 it != fbsd_pending_children.end (); it++)
1038 if (it->pid () == pid)
1039 {
1040 ptid_t ptid = *it;
1041 fbsd_pending_children.erase (it);
1042 return ptid;
1043 }
6e9567fe 1044 return null_ptid;
e58e05d6 1045}
2c5c2a33 1046
dbaed385 1047#ifndef PTRACE_VFORK
e8c6b620 1048static std::forward_list<ptid_t> fbsd_pending_vfork_done;
2c5c2a33
JB
1049
1050/* Record a pending vfork done event. */
1051
1052static void
1053fbsd_add_vfork_done (ptid_t pid)
1054{
e8c6b620 1055 fbsd_pending_vfork_done.push_front (pid);
2c5c2a33
JB
1056}
1057
1058/* Check for a pending vfork done event for a specific PID. */
1059
1060static int
1061fbsd_is_vfork_done_pending (pid_t pid)
1062{
e8c6b620
JB
1063 for (auto it = fbsd_pending_vfork_done.begin ();
1064 it != fbsd_pending_vfork_done.end (); it++)
1065 if (it->pid () == pid)
1066 return 1;
2c5c2a33
JB
1067 return 0;
1068}
1069
1070/* Check for a pending vfork done event. If one is found, remove it
1071 from the list and return the PTID. */
1072
ee950322 1073static ptid_t
2c5c2a33
JB
1074fbsd_next_vfork_done (void)
1075{
e8c6b620 1076 if (!fbsd_pending_vfork_done.empty ())
2c5c2a33 1077 {
e8c6b620
JB
1078 ptid_t ptid = fbsd_pending_vfork_done.front ();
1079 fbsd_pending_vfork_done.pop_front ();
2c5c2a33
JB
1080 return ptid;
1081 }
1082 return null_ptid;
1083}
e58e05d6 1084#endif
dbaed385 1085#endif
e58e05d6 1086
8607ea63
JB
1087/* Implement the "to_resume" target_ops method. */
1088
1089static void
1090fbsd_resume (struct target_ops *ops,
1091 ptid_t ptid, int step, enum gdb_signal signo)
1092{
dbaed385 1093#if defined(TDP_RFPPWAIT) && !defined(PTRACE_VFORK)
2c5c2a33
JB
1094 pid_t pid;
1095
1096 /* Don't PT_CONTINUE a process which has a pending vfork done event. */
1097 if (ptid_equal (minus_one_ptid, ptid))
1098 pid = ptid_get_pid (inferior_ptid);
1099 else
1100 pid = ptid_get_pid (ptid);
1101 if (fbsd_is_vfork_done_pending (pid))
1102 return;
1103#endif
8607ea63
JB
1104
1105 if (debug_fbsd_lwp)
1106 fprintf_unfiltered (gdb_stdlog,
1107 "FLWP: fbsd_resume for ptid (%d, %ld, %ld)\n",
1108 ptid_get_pid (ptid), ptid_get_lwp (ptid),
1109 ptid_get_tid (ptid));
1110 if (ptid_lwp_p (ptid))
1111 {
1112 /* If ptid is a specific LWP, suspend all other LWPs in the process. */
d56060f0
JB
1113 struct thread_info *tp;
1114 int request;
1115
1116 ALL_NON_EXITED_THREADS (tp)
1117 {
1118 if (ptid_get_pid (tp->ptid) != ptid_get_pid (ptid))
1119 continue;
1120
1121 if (ptid_get_lwp (tp->ptid) == ptid_get_lwp (ptid))
1122 request = PT_RESUME;
1123 else
1124 request = PT_SUSPEND;
1125
1126 if (ptrace (request, ptid_get_lwp (tp->ptid), NULL, 0) == -1)
1127 perror_with_name (("ptrace"));
1128 }
8607ea63
JB
1129 }
1130 else
1131 {
1132 /* If ptid is a wildcard, resume all matching threads (they won't run
1133 until the process is continued however). */
d56060f0
JB
1134 struct thread_info *tp;
1135
1136 ALL_NON_EXITED_THREADS (tp)
1137 {
1138 if (!ptid_match (tp->ptid, ptid))
1139 continue;
1140
1141 if (ptrace (PT_RESUME, ptid_get_lwp (tp->ptid), NULL, 0) == -1)
1142 perror_with_name (("ptrace"));
1143 }
8607ea63
JB
1144 ptid = inferior_ptid;
1145 }
1146 super_resume (ops, ptid, step, signo);
1147}
1148
e58e05d6
JB
1149/* Wait for the child specified by PTID to do something. Return the
1150 process ID of the child, or MINUS_ONE_PTID in case of error; store
1151 the status in *OURSTATUS. */
1152
1153static ptid_t
1154fbsd_wait (struct target_ops *ops,
1155 ptid_t ptid, struct target_waitstatus *ourstatus,
1156 int target_options)
1157{
1158 ptid_t wptid;
1159
1160 while (1)
1161 {
dbaed385 1162#ifndef PTRACE_VFORK
2c5c2a33
JB
1163 wptid = fbsd_next_vfork_done ();
1164 if (!ptid_equal (wptid, null_ptid))
1165 {
1166 ourstatus->kind = TARGET_WAITKIND_VFORK_DONE;
1167 return wptid;
1168 }
dbaed385 1169#endif
e58e05d6
JB
1170 wptid = super_wait (ops, ptid, ourstatus, target_options);
1171 if (ourstatus->kind == TARGET_WAITKIND_STOPPED)
1172 {
1173 struct ptrace_lwpinfo pl;
1174 pid_t pid;
1175 int status;
1176
1177 pid = ptid_get_pid (wptid);
6e9567fe 1178 if (ptrace (PT_LWPINFO, pid, (caddr_t) &pl, sizeof pl) == -1)
e58e05d6
JB
1179 perror_with_name (("ptrace"));
1180
6e9567fe
JB
1181 wptid = ptid_build (pid, pl.pl_lwpid, 0);
1182
1183#ifdef PT_LWP_EVENTS
1184 if (pl.pl_flags & PL_FLAG_EXITED)
1185 {
1186 /* If GDB attaches to a multi-threaded process, exiting
1187 threads might be skipped during fbsd_post_attach that
1188 have not yet reported their PL_FLAG_EXITED event.
1189 Ignore EXITED events for an unknown LWP. */
1190 if (in_thread_list (wptid))
1191 {
1192 if (debug_fbsd_lwp)
1193 fprintf_unfiltered (gdb_stdlog,
1194 "FLWP: deleting thread for LWP %u\n",
1195 pl.pl_lwpid);
1196 if (print_thread_events)
1197 printf_unfiltered (_("[%s exited]\n"), target_pid_to_str
1198 (wptid));
1199 delete_thread (wptid);
1200 }
1201 if (ptrace (PT_CONTINUE, pid, (caddr_t) 1, 0) == -1)
1202 perror_with_name (("ptrace"));
1203 continue;
1204 }
1205#endif
1206
1207 /* Switch to an LWP PTID on the first stop in a new process.
1208 This is done after handling PL_FLAG_EXITED to avoid
1209 switching to an exited LWP. It is done before checking
1210 PL_FLAG_BORN in case the first stop reported after
1211 attaching to an existing process is a PL_FLAG_BORN
1212 event. */
1213 if (in_thread_list (pid_to_ptid (pid)))
1214 {
1215 if (debug_fbsd_lwp)
1216 fprintf_unfiltered (gdb_stdlog,
1217 "FLWP: using LWP %u for first thread\n",
1218 pl.pl_lwpid);
1219 thread_change_ptid (pid_to_ptid (pid), wptid);
1220 }
1221
1222#ifdef PT_LWP_EVENTS
1223 if (pl.pl_flags & PL_FLAG_BORN)
1224 {
1225 /* If GDB attaches to a multi-threaded process, newborn
1226 threads might be added by fbsd_add_threads that have
1227 not yet reported their PL_FLAG_BORN event. Ignore
1228 BORN events for an already-known LWP. */
1229 if (!in_thread_list (wptid))
1230 {
1231 if (debug_fbsd_lwp)
1232 fprintf_unfiltered (gdb_stdlog,
1233 "FLWP: adding thread for LWP %u\n",
1234 pl.pl_lwpid);
1235 add_thread (wptid);
1236 }
1237 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
1238 return wptid;
1239 }
1240#endif
1241
e58e05d6
JB
1242#ifdef TDP_RFPPWAIT
1243 if (pl.pl_flags & PL_FLAG_FORKED)
1244 {
dbaed385 1245#ifndef PTRACE_VFORK
e58e05d6 1246 struct kinfo_proc kp;
dbaed385 1247#endif
6e9567fe 1248 ptid_t child_ptid;
e58e05d6
JB
1249 pid_t child;
1250
1251 child = pl.pl_child_pid;
1252 ourstatus->kind = TARGET_WAITKIND_FORKED;
dbaed385
JB
1253#ifdef PTRACE_VFORK
1254 if (pl.pl_flags & PL_FLAG_VFORKED)
1255 ourstatus->kind = TARGET_WAITKIND_VFORKED;
1256#endif
e58e05d6
JB
1257
1258 /* Make sure the other end of the fork is stopped too. */
6e9567fe
JB
1259 child_ptid = fbsd_is_child_pending (child);
1260 if (ptid_equal (child_ptid, null_ptid))
e58e05d6
JB
1261 {
1262 pid = waitpid (child, &status, 0);
1263 if (pid == -1)
1264 perror_with_name (("waitpid"));
1265
1266 gdb_assert (pid == child);
1267
1268 if (ptrace (PT_LWPINFO, child, (caddr_t)&pl, sizeof pl) == -1)
1269 perror_with_name (("ptrace"));
1270
1271 gdb_assert (pl.pl_flags & PL_FLAG_CHILD);
6e9567fe 1272 child_ptid = ptid_build (child, pl.pl_lwpid, 0);
e58e05d6
JB
1273 }
1274
5fa14c6b
JB
1275 /* Enable additional events on the child process. */
1276 fbsd_enable_proc_events (ptid_get_pid (child_ptid));
1277
dbaed385 1278#ifndef PTRACE_VFORK
e58e05d6
JB
1279 /* For vfork, the child process will have the P_PPWAIT
1280 flag set. */
92fce24d
JB
1281 if (fbsd_fetch_kinfo_proc (child, &kp))
1282 {
1283 if (kp.ki_flag & P_PPWAIT)
1284 ourstatus->kind = TARGET_WAITKIND_VFORKED;
1285 }
1286 else
1287 warning (_("Failed to fetch process information"));
dbaed385 1288#endif
6e9567fe 1289 ourstatus->value.related_pid = child_ptid;
e58e05d6
JB
1290
1291 return wptid;
1292 }
1293
1294 if (pl.pl_flags & PL_FLAG_CHILD)
1295 {
1296 /* Remember that this child forked, but do not report it
1297 until the parent reports its corresponding fork
1298 event. */
6e9567fe 1299 fbsd_remember_child (wptid);
e58e05d6
JB
1300 continue;
1301 }
dbaed385
JB
1302
1303#ifdef PTRACE_VFORK
1304 if (pl.pl_flags & PL_FLAG_VFORK_DONE)
1305 {
1306 ourstatus->kind = TARGET_WAITKIND_VFORK_DONE;
1307 return wptid;
1308 }
1309#endif
e58e05d6 1310#endif
d2b41ca0
JB
1311
1312#ifdef PL_FLAG_EXEC
1313 if (pl.pl_flags & PL_FLAG_EXEC)
1314 {
1315 ourstatus->kind = TARGET_WAITKIND_EXECD;
1316 ourstatus->value.execd_pathname
1317 = xstrdup (fbsd_pid_to_exec_file (NULL, pid));
1318 return wptid;
1319 }
1320#endif
e6cdd38e
JB
1321
1322 /* Note that PL_FLAG_SCE is set for any event reported while
1323 a thread is executing a system call in the kernel. In
1324 particular, signals that interrupt a sleep in a system
1325 call will report this flag as part of their event. Stops
1326 explicitly for system call entry and exit always use
1327 SIGTRAP, so only treat SIGTRAP events as system call
1328 entry/exit events. */
1329 if (pl.pl_flags & (PL_FLAG_SCE | PL_FLAG_SCX)
1330 && ourstatus->value.sig == SIGTRAP)
1331 {
1332#ifdef HAVE_STRUCT_PTRACE_LWPINFO_PL_SYSCALL_CODE
1333 if (catch_syscall_enabled ())
1334 {
1335 if (catching_syscall_number (pl.pl_syscall_code))
1336 {
1337 if (pl.pl_flags & PL_FLAG_SCE)
1338 ourstatus->kind = TARGET_WAITKIND_SYSCALL_ENTRY;
1339 else
1340 ourstatus->kind = TARGET_WAITKIND_SYSCALL_RETURN;
1341 ourstatus->value.syscall_number = pl.pl_syscall_code;
1342 return wptid;
1343 }
1344 }
1345#endif
1346 /* If the core isn't interested in this event, just
1347 continue the process explicitly and wait for another
1348 event. Note that PT_SYSCALL is "sticky" on FreeBSD
1349 and once system call stops are enabled on a process
1350 it stops for all system call entries and exits. */
1351 if (ptrace (PT_CONTINUE, pid, (caddr_t) 1, 0) == -1)
1352 perror_with_name (("ptrace"));
1353 continue;
1354 }
e58e05d6
JB
1355 }
1356 return wptid;
1357 }
1358}
1359
1360#ifdef TDP_RFPPWAIT
1361/* Target hook for follow_fork. On entry and at return inferior_ptid is
1362 the ptid of the followed inferior. */
1363
1364static int
1365fbsd_follow_fork (struct target_ops *ops, int follow_child,
1366 int detach_fork)
1367{
bb2a62e6 1368 if (!follow_child && detach_fork)
e58e05d6
JB
1369 {
1370 struct thread_info *tp = inferior_thread ();
1371 pid_t child_pid = ptid_get_pid (tp->pending_follow.value.related_pid);
1372
1373 /* Breakpoints have already been detached from the child by
1374 infrun.c. */
1375
1376 if (ptrace (PT_DETACH, child_pid, (PTRACE_TYPE_ARG3)1, 0) == -1)
1377 perror_with_name (("ptrace"));
2c5c2a33 1378
dbaed385
JB
1379#ifndef PTRACE_VFORK
1380 if (tp->pending_follow.kind == TARGET_WAITKIND_VFORKED)
2c5c2a33
JB
1381 {
1382 /* We can't insert breakpoints until the child process has
1383 finished with the shared memory region. The parent
1384 process doesn't wait for the child process to exit or
1385 exec until after it has been resumed from the ptrace stop
1386 to report the fork. Once it has been resumed it doesn't
1387 stop again before returning to userland, so there is no
1388 reliable way to wait on the parent.
1389
1390 We can't stay attached to the child to wait for an exec
1391 or exit because it may invoke ptrace(PT_TRACE_ME)
1392 (e.g. if the parent process is a debugger forking a new
1393 child process).
1394
1395 In the end, the best we can do is to make sure it runs
1396 for a little while. Hopefully it will be out of range of
1397 any breakpoints we reinsert. Usually this is only the
1398 single-step breakpoint at vfork's return point. */
1399
1400 usleep (10000);
1401
1402 /* Schedule a fake VFORK_DONE event to report on the next
1403 wait. */
1404 fbsd_add_vfork_done (inferior_ptid);
1405 }
dbaed385 1406#endif
e58e05d6
JB
1407 }
1408
1409 return 0;
1410}
1411
1412static int
1413fbsd_insert_fork_catchpoint (struct target_ops *self, int pid)
1414{
1415 return 0;
1416}
1417
1418static int
1419fbsd_remove_fork_catchpoint (struct target_ops *self, int pid)
1420{
1421 return 0;
1422}
1423
1424static int
1425fbsd_insert_vfork_catchpoint (struct target_ops *self, int pid)
1426{
1427 return 0;
1428}
1429
1430static int
1431fbsd_remove_vfork_catchpoint (struct target_ops *self, int pid)
1432{
1433 return 0;
1434}
6e9567fe 1435#endif
e58e05d6
JB
1436
1437/* Implement the "to_post_startup_inferior" target_ops method. */
1438
1439static void
1440fbsd_post_startup_inferior (struct target_ops *self, ptid_t pid)
1441{
da95a26c 1442 fbsd_enable_proc_events (ptid_get_pid (pid));
e58e05d6
JB
1443}
1444
1445/* Implement the "to_post_attach" target_ops method. */
1446
1447static void
1448fbsd_post_attach (struct target_ops *self, int pid)
1449{
da95a26c 1450 fbsd_enable_proc_events (pid);
6e9567fe
JB
1451 fbsd_add_threads (pid);
1452}
d2b41ca0
JB
1453
1454#ifdef PL_FLAG_EXEC
1455/* If the FreeBSD kernel supports PL_FLAG_EXEC, then traced processes
1456 will always stop after exec. */
1457
1458static int
1459fbsd_insert_exec_catchpoint (struct target_ops *self, int pid)
1460{
1461 return 0;
1462}
1463
1464static int
1465fbsd_remove_exec_catchpoint (struct target_ops *self, int pid)
1466{
1467 return 0;
1468}
1469#endif
e6cdd38e
JB
1470
1471#ifdef HAVE_STRUCT_PTRACE_LWPINFO_PL_SYSCALL_CODE
1472static int
649a140c
PA
1473fbsd_set_syscall_catchpoint (struct target_ops *self, int pid, bool needed,
1474 int any_count,
1475 gdb::array_view<const int> syscall_counts)
e6cdd38e
JB
1476{
1477
1478 /* Ignore the arguments. inf-ptrace.c will use PT_SYSCALL which
1479 will catch all system call entries and exits. The system calls
1480 are filtered by GDB rather than the kernel. */
1481 return 0;
1482}
1483#endif
e58e05d6
JB
1484#endif
1485
8f60fe01
JB
1486void
1487fbsd_nat_add_target (struct target_ops *t)
1488{
1489 t->to_pid_to_exec_file = fbsd_pid_to_exec_file;
1490 t->to_find_memory_regions = fbsd_find_memory_regions;
92fce24d 1491 t->to_info_proc = fbsd_info_proc;
7697fc9e
JB
1492#ifdef KERN_PROC_AUXV
1493 super_xfer_partial = t->to_xfer_partial;
1494 t->to_xfer_partial = fbsd_xfer_partial;
1495#endif
e58e05d6 1496#ifdef PT_LWPINFO
6e9567fe
JB
1497 t->to_thread_alive = fbsd_thread_alive;
1498 t->to_pid_to_str = fbsd_pid_to_str;
1499#ifdef HAVE_STRUCT_PTRACE_LWPINFO_PL_TDNAME
1500 t->to_thread_name = fbsd_thread_name;
1501#endif
1502 t->to_update_thread_list = fbsd_update_thread_list;
1503 t->to_has_thread_control = tc_schedlock;
1504 super_resume = t->to_resume;
1505 t->to_resume = fbsd_resume;
e58e05d6
JB
1506 super_wait = t->to_wait;
1507 t->to_wait = fbsd_wait;
6e9567fe
JB
1508 t->to_post_startup_inferior = fbsd_post_startup_inferior;
1509 t->to_post_attach = fbsd_post_attach;
e58e05d6
JB
1510#ifdef TDP_RFPPWAIT
1511 t->to_follow_fork = fbsd_follow_fork;
1512 t->to_insert_fork_catchpoint = fbsd_insert_fork_catchpoint;
1513 t->to_remove_fork_catchpoint = fbsd_remove_fork_catchpoint;
1514 t->to_insert_vfork_catchpoint = fbsd_insert_vfork_catchpoint;
1515 t->to_remove_vfork_catchpoint = fbsd_remove_vfork_catchpoint;
e58e05d6 1516#endif
d2b41ca0
JB
1517#ifdef PL_FLAG_EXEC
1518 t->to_insert_exec_catchpoint = fbsd_insert_exec_catchpoint;
1519 t->to_remove_exec_catchpoint = fbsd_remove_exec_catchpoint;
1520#endif
e6cdd38e
JB
1521#ifdef HAVE_STRUCT_PTRACE_LWPINFO_PL_SYSCALL_CODE
1522 t->to_set_syscall_catchpoint = fbsd_set_syscall_catchpoint;
1523#endif
e58e05d6 1524#endif
8f60fe01
JB
1525 add_target (t);
1526}
6e9567fe 1527
6e9567fe
JB
1528void
1529_initialize_fbsd_nat (void)
1530{
1531#ifdef PT_LWPINFO
1532 add_setshow_boolean_cmd ("fbsd-lwp", class_maintenance,
1533 &debug_fbsd_lwp, _("\
1534Set debugging of FreeBSD lwp module."), _("\
1535Show debugging of FreeBSD lwp module."), _("\
1536Enables printf debugging output."),
1537 NULL,
1538 &show_fbsd_lwp_debug,
1539 &setdebuglist, &showdebuglist);
1540#endif
1541}