11a3d19ddSKamil Rytarowski //===-- NativeProcessNetBSD.cpp ------------------------------- -*- C++ -*-===// 21a3d19ddSKamil Rytarowski // 31a3d19ddSKamil Rytarowski // The LLVM Compiler Infrastructure 41a3d19ddSKamil Rytarowski // 51a3d19ddSKamil Rytarowski // This file is distributed under the University of Illinois Open Source 61a3d19ddSKamil Rytarowski // License. See LICENSE.TXT for details. 71a3d19ddSKamil Rytarowski // 81a3d19ddSKamil Rytarowski //===----------------------------------------------------------------------===// 91a3d19ddSKamil Rytarowski 101a3d19ddSKamil Rytarowski #include "NativeProcessNetBSD.h" 111a3d19ddSKamil Rytarowski 121a3d19ddSKamil Rytarowski // C Includes 131a3d19ddSKamil Rytarowski 141a3d19ddSKamil Rytarowski // C++ Includes 151a3d19ddSKamil Rytarowski 161a3d19ddSKamil Rytarowski // Other libraries and framework includes 171a3d19ddSKamil Rytarowski #include "Plugins/Process/POSIX/ProcessPOSIXLog.h" 18f07a9995SKamil Rytarowski #include "lldb/Core/State.h" 19f07a9995SKamil Rytarowski #include "lldb/Host/HostProcess.h" 20f07a9995SKamil Rytarowski #include "lldb/Host/common/NativeBreakpoint.h" 21f07a9995SKamil Rytarowski #include "lldb/Host/common/NativeRegisterContext.h" 22f07a9995SKamil Rytarowski #include "lldb/Host/posix/ProcessLauncherPosixFork.h" 23f07a9995SKamil Rytarowski #include "lldb/Target/Process.h" 241a3d19ddSKamil Rytarowski 251a3d19ddSKamil Rytarowski // System includes - They have to be included after framework includes because 261a3d19ddSKamil Rytarowski // they define some 271a3d19ddSKamil Rytarowski // macros which collide with variable names in other modules 28f07a9995SKamil Rytarowski // clang-format off 29f07a9995SKamil Rytarowski #include <sys/types.h> 30f07a9995SKamil Rytarowski #include <sys/ptrace.h> 31f07a9995SKamil Rytarowski #include <sys/sysctl.h> 32f07a9995SKamil Rytarowski #include <sys/wait.h> 33f07a9995SKamil Rytarowski #include <uvm/uvm_prot.h> 34f07a9995SKamil Rytarowski #include <elf.h> 35f07a9995SKamil Rytarowski #include <util.h> 36f07a9995SKamil Rytarowski // clang-format on 371a3d19ddSKamil Rytarowski 381a3d19ddSKamil Rytarowski using namespace lldb; 391a3d19ddSKamil Rytarowski using namespace lldb_private; 401a3d19ddSKamil Rytarowski using namespace lldb_private::process_netbsd; 411a3d19ddSKamil Rytarowski using namespace llvm; 421a3d19ddSKamil Rytarowski 43f07a9995SKamil Rytarowski static ExitType convert_pid_status_to_exit_type(int status) { 44f07a9995SKamil Rytarowski if (WIFEXITED(status)) 45f07a9995SKamil Rytarowski return ExitType::eExitTypeExit; 46f07a9995SKamil Rytarowski else if (WIFSIGNALED(status)) 47f07a9995SKamil Rytarowski return ExitType::eExitTypeSignal; 48f07a9995SKamil Rytarowski else if (WIFSTOPPED(status)) 49f07a9995SKamil Rytarowski return ExitType::eExitTypeStop; 50f07a9995SKamil Rytarowski else { 51f07a9995SKamil Rytarowski // We don't know what this is. 52f07a9995SKamil Rytarowski return ExitType::eExitTypeInvalid; 53f07a9995SKamil Rytarowski } 54f07a9995SKamil Rytarowski } 55f07a9995SKamil Rytarowski 56f07a9995SKamil Rytarowski static int convert_pid_status_to_return_code(int status) { 57f07a9995SKamil Rytarowski if (WIFEXITED(status)) 58f07a9995SKamil Rytarowski return WEXITSTATUS(status); 59f07a9995SKamil Rytarowski else if (WIFSIGNALED(status)) 60f07a9995SKamil Rytarowski return WTERMSIG(status); 61f07a9995SKamil Rytarowski else if (WIFSTOPPED(status)) 62f07a9995SKamil Rytarowski return WSTOPSIG(status); 63f07a9995SKamil Rytarowski else { 64f07a9995SKamil Rytarowski // We don't know what this is. 65f07a9995SKamil Rytarowski return ExitType::eExitTypeInvalid; 66f07a9995SKamil Rytarowski } 67f07a9995SKamil Rytarowski } 68f07a9995SKamil Rytarowski 69f07a9995SKamil Rytarowski // Simple helper function to ensure flags are enabled on the given file 70f07a9995SKamil Rytarowski // descriptor. 71f07a9995SKamil Rytarowski static Error EnsureFDFlags(int fd, int flags) { 72f07a9995SKamil Rytarowski Error error; 73f07a9995SKamil Rytarowski 74f07a9995SKamil Rytarowski int status = fcntl(fd, F_GETFL); 75f07a9995SKamil Rytarowski if (status == -1) { 76f07a9995SKamil Rytarowski error.SetErrorToErrno(); 77f07a9995SKamil Rytarowski return error; 78f07a9995SKamil Rytarowski } 79f07a9995SKamil Rytarowski 80f07a9995SKamil Rytarowski if (fcntl(fd, F_SETFL, status | flags) == -1) { 81f07a9995SKamil Rytarowski error.SetErrorToErrno(); 82f07a9995SKamil Rytarowski return error; 83f07a9995SKamil Rytarowski } 84f07a9995SKamil Rytarowski 85f07a9995SKamil Rytarowski return error; 86f07a9995SKamil Rytarowski } 87f07a9995SKamil Rytarowski 881a3d19ddSKamil Rytarowski // ----------------------------------------------------------------------------- 891a3d19ddSKamil Rytarowski // Public Static Methods 901a3d19ddSKamil Rytarowski // ----------------------------------------------------------------------------- 911a3d19ddSKamil Rytarowski 921a3d19ddSKamil Rytarowski Error NativeProcessProtocol::Launch( 931a3d19ddSKamil Rytarowski ProcessLaunchInfo &launch_info, 941a3d19ddSKamil Rytarowski NativeProcessProtocol::NativeDelegate &native_delegate, MainLoop &mainloop, 951a3d19ddSKamil Rytarowski NativeProcessProtocolSP &native_process_sp) { 96f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 97f07a9995SKamil Rytarowski 98f07a9995SKamil Rytarowski Error error; 99f07a9995SKamil Rytarowski 100f07a9995SKamil Rytarowski // Verify the working directory is valid if one was specified. 101f07a9995SKamil Rytarowski FileSpec working_dir{launch_info.GetWorkingDirectory()}; 102f07a9995SKamil Rytarowski if (working_dir && (!working_dir.ResolvePath() || 103f07a9995SKamil Rytarowski !llvm::sys::fs::is_directory(working_dir.GetPath()))) { 104f07a9995SKamil Rytarowski error.SetErrorStringWithFormat("No such file or directory: %s", 105f07a9995SKamil Rytarowski working_dir.GetCString()); 106f07a9995SKamil Rytarowski return error; 107f07a9995SKamil Rytarowski } 108f07a9995SKamil Rytarowski 109f07a9995SKamil Rytarowski // Create the NativeProcessNetBSD in launch mode. 110f07a9995SKamil Rytarowski native_process_sp.reset(new NativeProcessNetBSD()); 111f07a9995SKamil Rytarowski 112f07a9995SKamil Rytarowski if (!native_process_sp->RegisterNativeDelegate(native_delegate)) { 113f07a9995SKamil Rytarowski native_process_sp.reset(); 114f07a9995SKamil Rytarowski error.SetErrorStringWithFormat("failed to register the native delegate"); 115f07a9995SKamil Rytarowski return error; 116f07a9995SKamil Rytarowski } 117f07a9995SKamil Rytarowski 118f07a9995SKamil Rytarowski error = std::static_pointer_cast<NativeProcessNetBSD>(native_process_sp) 119f07a9995SKamil Rytarowski ->LaunchInferior(mainloop, launch_info); 120f07a9995SKamil Rytarowski 121f07a9995SKamil Rytarowski if (error.Fail()) { 122f07a9995SKamil Rytarowski native_process_sp.reset(); 123f07a9995SKamil Rytarowski LLDB_LOG(log, "failed to launch process: {0}", error); 124f07a9995SKamil Rytarowski return error; 125f07a9995SKamil Rytarowski } 126f07a9995SKamil Rytarowski 127f07a9995SKamil Rytarowski launch_info.SetProcessID(native_process_sp->GetID()); 128f07a9995SKamil Rytarowski 129f07a9995SKamil Rytarowski return error; 1301a3d19ddSKamil Rytarowski } 1311a3d19ddSKamil Rytarowski 1321a3d19ddSKamil Rytarowski Error NativeProcessProtocol::Attach( 1331a3d19ddSKamil Rytarowski lldb::pid_t pid, NativeProcessProtocol::NativeDelegate &native_delegate, 1341a3d19ddSKamil Rytarowski MainLoop &mainloop, NativeProcessProtocolSP &native_process_sp) { 135f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 136f07a9995SKamil Rytarowski LLDB_LOG(log, "pid = {0:x}", pid); 137f07a9995SKamil Rytarowski 138f07a9995SKamil Rytarowski // Retrieve the architecture for the running process. 139f07a9995SKamil Rytarowski ArchSpec process_arch; 140f07a9995SKamil Rytarowski Error error = ResolveProcessArchitecture(pid, process_arch); 141f07a9995SKamil Rytarowski if (!error.Success()) 142f07a9995SKamil Rytarowski return error; 143f07a9995SKamil Rytarowski 144f07a9995SKamil Rytarowski std::shared_ptr<NativeProcessNetBSD> native_process_netbsd_sp( 145f07a9995SKamil Rytarowski new NativeProcessNetBSD()); 146f07a9995SKamil Rytarowski 147f07a9995SKamil Rytarowski if (!native_process_netbsd_sp->RegisterNativeDelegate(native_delegate)) { 148f07a9995SKamil Rytarowski error.SetErrorStringWithFormat("failed to register the native delegate"); 149f07a9995SKamil Rytarowski return error; 150f07a9995SKamil Rytarowski } 151f07a9995SKamil Rytarowski 152f07a9995SKamil Rytarowski native_process_netbsd_sp->AttachToInferior(mainloop, pid, error); 153f07a9995SKamil Rytarowski if (!error.Success()) 154f07a9995SKamil Rytarowski return error; 155f07a9995SKamil Rytarowski 156f07a9995SKamil Rytarowski native_process_sp = native_process_netbsd_sp; 157f07a9995SKamil Rytarowski return error; 1581a3d19ddSKamil Rytarowski } 1591a3d19ddSKamil Rytarowski 1601a3d19ddSKamil Rytarowski // ----------------------------------------------------------------------------- 1611a3d19ddSKamil Rytarowski // Public Instance Methods 1621a3d19ddSKamil Rytarowski // ----------------------------------------------------------------------------- 1631a3d19ddSKamil Rytarowski 1641a3d19ddSKamil Rytarowski NativeProcessNetBSD::NativeProcessNetBSD() 165f07a9995SKamil Rytarowski : NativeProcessProtocol(LLDB_INVALID_PROCESS_ID), m_arch(), 166f07a9995SKamil Rytarowski m_supports_mem_region(eLazyBoolCalculate), m_mem_region_cache() {} 167f07a9995SKamil Rytarowski 168f07a9995SKamil Rytarowski // Handles all waitpid events from the inferior process. 169f07a9995SKamil Rytarowski void NativeProcessNetBSD::MonitorCallback(lldb::pid_t pid, int signal) { 170f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 171f07a9995SKamil Rytarowski 172f07a9995SKamil Rytarowski switch (signal) { 173f07a9995SKamil Rytarowski case SIGTRAP: 174f07a9995SKamil Rytarowski return MonitorSIGTRAP(pid); 175f07a9995SKamil Rytarowski case SIGSTOP: 176f07a9995SKamil Rytarowski return MonitorSIGSTOP(pid); 177f07a9995SKamil Rytarowski default: 178f07a9995SKamil Rytarowski return MonitorSignal(pid, signal); 179f07a9995SKamil Rytarowski } 180f07a9995SKamil Rytarowski } 181f07a9995SKamil Rytarowski 182f07a9995SKamil Rytarowski void NativeProcessNetBSD::MonitorExited(lldb::pid_t pid, int signal, 183f07a9995SKamil Rytarowski int status) { 184f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 185f07a9995SKamil Rytarowski 186f07a9995SKamil Rytarowski LLDB_LOG(log, "got exit signal({0}) , pid = {1}", signal, pid); 187f07a9995SKamil Rytarowski 188f07a9995SKamil Rytarowski /* Stop Tracking All Threads attached to Process */ 189f07a9995SKamil Rytarowski m_threads.clear(); 190f07a9995SKamil Rytarowski 191f07a9995SKamil Rytarowski SetExitStatus(convert_pid_status_to_exit_type(status), 192f07a9995SKamil Rytarowski convert_pid_status_to_return_code(status), nullptr, true); 193f07a9995SKamil Rytarowski 194f07a9995SKamil Rytarowski // Notify delegate that our process has exited. 195f07a9995SKamil Rytarowski SetState(StateType::eStateExited, true); 196f07a9995SKamil Rytarowski } 197f07a9995SKamil Rytarowski 198f07a9995SKamil Rytarowski void NativeProcessNetBSD::MonitorSIGSTOP(lldb::pid_t pid) { 199f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 200f07a9995SKamil Rytarowski ptrace_siginfo_t info; 201f07a9995SKamil Rytarowski 202f07a9995SKamil Rytarowski const auto siginfo_err = 203f07a9995SKamil Rytarowski PtraceWrapper(PT_GET_SIGINFO, pid, &info, sizeof(info)); 204f07a9995SKamil Rytarowski 205f07a9995SKamil Rytarowski // Get details on the signal raised. 206f07a9995SKamil Rytarowski if (siginfo_err.Success()) { 207f07a9995SKamil Rytarowski // Handle SIGSTOP from LLGS (LLDB GDB Server) 208f07a9995SKamil Rytarowski if (info.psi_siginfo.si_code == SI_USER && 209f07a9995SKamil Rytarowski info.psi_siginfo.si_pid == ::getpid()) { 210f07a9995SKamil Rytarowski /* Stop Tracking All Threads attached to Process */ 211f07a9995SKamil Rytarowski for (const auto &thread_sp : m_threads) { 212f07a9995SKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp)->SetStoppedBySignal( 213f07a9995SKamil Rytarowski SIGSTOP, &info.psi_siginfo); 214f07a9995SKamil Rytarowski } 215f07a9995SKamil Rytarowski } 216f07a9995SKamil Rytarowski } 217f07a9995SKamil Rytarowski } 218f07a9995SKamil Rytarowski 219f07a9995SKamil Rytarowski void NativeProcessNetBSD::MonitorSIGTRAP(lldb::pid_t pid) { 220f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 221f07a9995SKamil Rytarowski ptrace_siginfo_t info; 222f07a9995SKamil Rytarowski 223f07a9995SKamil Rytarowski const auto siginfo_err = 224f07a9995SKamil Rytarowski PtraceWrapper(PT_GET_SIGINFO, pid, &info, sizeof(info)); 225f07a9995SKamil Rytarowski 226f07a9995SKamil Rytarowski // Get details on the signal raised. 227f07a9995SKamil Rytarowski if (siginfo_err.Success()) { 228f07a9995SKamil Rytarowski switch (info.psi_siginfo.si_code) { 229f07a9995SKamil Rytarowski case TRAP_BRKPT: 230f07a9995SKamil Rytarowski for (const auto &thread_sp : m_threads) { 231f07a9995SKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp) 232f07a9995SKamil Rytarowski ->SetStoppedByBreakpoint(); 233f07a9995SKamil Rytarowski FixupBreakpointPCAsNeeded( 234f07a9995SKamil Rytarowski *static_pointer_cast<NativeThreadNetBSD>(thread_sp)); 235f07a9995SKamil Rytarowski } 236f07a9995SKamil Rytarowski SetState(StateType::eStateStopped, true); 237f07a9995SKamil Rytarowski break; 238*3eef2b5eSKamil Rytarowski case TRAP_TRACE: 239*3eef2b5eSKamil Rytarowski for (const auto &thread_sp : m_threads) { 240*3eef2b5eSKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp)->SetStoppedByTrace(); 241*3eef2b5eSKamil Rytarowski } 242*3eef2b5eSKamil Rytarowski SetState(StateType::eStateStopped, true); 243*3eef2b5eSKamil Rytarowski break; 244*3eef2b5eSKamil Rytarowski case TRAP_EXEC: { 245*3eef2b5eSKamil Rytarowski Error error = ReinitializeThreads(); 246*3eef2b5eSKamil Rytarowski if (error.Fail()) { 247*3eef2b5eSKamil Rytarowski SetState(StateType::eStateInvalid); 248*3eef2b5eSKamil Rytarowski return; 249*3eef2b5eSKamil Rytarowski } 250*3eef2b5eSKamil Rytarowski 251*3eef2b5eSKamil Rytarowski // Let our delegate know we have just exec'd. 252*3eef2b5eSKamil Rytarowski NotifyDidExec(); 253*3eef2b5eSKamil Rytarowski 254*3eef2b5eSKamil Rytarowski SetState(StateType::eStateStopped, true); 255*3eef2b5eSKamil Rytarowski } break; 256f07a9995SKamil Rytarowski } 257f07a9995SKamil Rytarowski } 258f07a9995SKamil Rytarowski } 259f07a9995SKamil Rytarowski 260f07a9995SKamil Rytarowski void NativeProcessNetBSD::MonitorSignal(lldb::pid_t pid, int signal) { 261f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 262f07a9995SKamil Rytarowski 263f07a9995SKamil Rytarowski ptrace_siginfo_t info; 264f07a9995SKamil Rytarowski const auto siginfo_err = 265f07a9995SKamil Rytarowski PtraceWrapper(PT_GET_SIGINFO, pid, &info, sizeof(info)); 266f07a9995SKamil Rytarowski 267f07a9995SKamil Rytarowski for (const auto &thread_sp : m_threads) { 268f07a9995SKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp)->SetStoppedBySignal( 269f07a9995SKamil Rytarowski info.psi_siginfo.si_signo, &info.psi_siginfo); 270f07a9995SKamil Rytarowski } 271f07a9995SKamil Rytarowski SetState(StateType::eStateStopped, true); 272f07a9995SKamil Rytarowski } 273f07a9995SKamil Rytarowski 274f07a9995SKamil Rytarowski Error NativeProcessNetBSD::PtraceWrapper(int req, lldb::pid_t pid, void *addr, 275f07a9995SKamil Rytarowski int data, int *result) { 276f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PTRACE)); 277f07a9995SKamil Rytarowski Error error; 278f07a9995SKamil Rytarowski int ret; 279f07a9995SKamil Rytarowski 280f07a9995SKamil Rytarowski errno = 0; 281f07a9995SKamil Rytarowski ret = ptrace(req, static_cast<::pid_t>(pid), addr, data); 282f07a9995SKamil Rytarowski 283f07a9995SKamil Rytarowski if (ret == -1) 284f07a9995SKamil Rytarowski error.SetErrorToErrno(); 285f07a9995SKamil Rytarowski 286f07a9995SKamil Rytarowski if (result) 287f07a9995SKamil Rytarowski *result = ret; 288f07a9995SKamil Rytarowski 289f07a9995SKamil Rytarowski LLDB_LOG(log, "ptrace({0}, {1}, {2}, {3})={4:x}", req, pid, addr, data, ret); 290f07a9995SKamil Rytarowski 291f07a9995SKamil Rytarowski if (error.Fail()) 292f07a9995SKamil Rytarowski LLDB_LOG(log, "ptrace() failed: {0}", error); 293f07a9995SKamil Rytarowski 294f07a9995SKamil Rytarowski return error; 295f07a9995SKamil Rytarowski } 296f07a9995SKamil Rytarowski 297f07a9995SKamil Rytarowski Error NativeProcessNetBSD::GetSoftwareBreakpointPCOffset( 298f07a9995SKamil Rytarowski uint32_t &actual_opcode_size) { 299f07a9995SKamil Rytarowski // FIXME put this behind a breakpoint protocol class that can be 300f07a9995SKamil Rytarowski // set per architecture. Need ARM, MIPS support here. 301f07a9995SKamil Rytarowski static const uint8_t g_i386_opcode[] = {0xCC}; 302f07a9995SKamil Rytarowski switch (m_arch.GetMachine()) { 303f07a9995SKamil Rytarowski case llvm::Triple::x86_64: 304f07a9995SKamil Rytarowski actual_opcode_size = static_cast<uint32_t>(sizeof(g_i386_opcode)); 305f07a9995SKamil Rytarowski return Error(); 306f07a9995SKamil Rytarowski default: 307f07a9995SKamil Rytarowski assert(false && "CPU type not supported!"); 308f07a9995SKamil Rytarowski return Error("CPU type not supported"); 309f07a9995SKamil Rytarowski } 310f07a9995SKamil Rytarowski } 311f07a9995SKamil Rytarowski 312f07a9995SKamil Rytarowski Error NativeProcessNetBSD::FixupBreakpointPCAsNeeded( 313f07a9995SKamil Rytarowski NativeThreadNetBSD &thread) { 314f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_BREAKPOINTS)); 315f07a9995SKamil Rytarowski Error error; 316f07a9995SKamil Rytarowski // Find out the size of a breakpoint (might depend on where we are in the 317f07a9995SKamil Rytarowski // code). 318f07a9995SKamil Rytarowski NativeRegisterContextSP context_sp = thread.GetRegisterContext(); 319f07a9995SKamil Rytarowski if (!context_sp) { 320f07a9995SKamil Rytarowski error.SetErrorString("cannot get a NativeRegisterContext for the thread"); 321f07a9995SKamil Rytarowski LLDB_LOG(log, "failed: {0}", error); 322f07a9995SKamil Rytarowski return error; 323f07a9995SKamil Rytarowski } 324f07a9995SKamil Rytarowski uint32_t breakpoint_size = 0; 325f07a9995SKamil Rytarowski error = GetSoftwareBreakpointPCOffset(breakpoint_size); 326f07a9995SKamil Rytarowski if (error.Fail()) { 327f07a9995SKamil Rytarowski LLDB_LOG(log, "GetBreakpointSize() failed: {0}", error); 328f07a9995SKamil Rytarowski return error; 329f07a9995SKamil Rytarowski } else 330f07a9995SKamil Rytarowski LLDB_LOG(log, "breakpoint size: {0}", breakpoint_size); 331f07a9995SKamil Rytarowski // First try probing for a breakpoint at a software breakpoint location: PC - 332f07a9995SKamil Rytarowski // breakpoint size. 333f07a9995SKamil Rytarowski const lldb::addr_t initial_pc_addr = 334f07a9995SKamil Rytarowski context_sp->GetPCfromBreakpointLocation(); 335f07a9995SKamil Rytarowski lldb::addr_t breakpoint_addr = initial_pc_addr; 336f07a9995SKamil Rytarowski if (breakpoint_size > 0) { 337f07a9995SKamil Rytarowski // Do not allow breakpoint probe to wrap around. 338f07a9995SKamil Rytarowski if (breakpoint_addr >= breakpoint_size) 339f07a9995SKamil Rytarowski breakpoint_addr -= breakpoint_size; 340f07a9995SKamil Rytarowski } 341f07a9995SKamil Rytarowski // Check if we stopped because of a breakpoint. 342f07a9995SKamil Rytarowski NativeBreakpointSP breakpoint_sp; 343f07a9995SKamil Rytarowski error = m_breakpoint_list.GetBreakpoint(breakpoint_addr, breakpoint_sp); 344f07a9995SKamil Rytarowski if (!error.Success() || !breakpoint_sp) { 345f07a9995SKamil Rytarowski // We didn't find one at a software probe location. Nothing to do. 346f07a9995SKamil Rytarowski LLDB_LOG(log, 347f07a9995SKamil Rytarowski "pid {0} no lldb breakpoint found at current pc with " 348f07a9995SKamil Rytarowski "adjustment: {1}", 349f07a9995SKamil Rytarowski GetID(), breakpoint_addr); 350f07a9995SKamil Rytarowski return Error(); 351f07a9995SKamil Rytarowski } 352f07a9995SKamil Rytarowski // If the breakpoint is not a software breakpoint, nothing to do. 353f07a9995SKamil Rytarowski if (!breakpoint_sp->IsSoftwareBreakpoint()) { 354f07a9995SKamil Rytarowski LLDB_LOG( 355f07a9995SKamil Rytarowski log, 356f07a9995SKamil Rytarowski "pid {0} breakpoint found at {1:x}, not software, nothing to adjust", 357f07a9995SKamil Rytarowski GetID(), breakpoint_addr); 358f07a9995SKamil Rytarowski return Error(); 359f07a9995SKamil Rytarowski } 360f07a9995SKamil Rytarowski // 361f07a9995SKamil Rytarowski // We have a software breakpoint and need to adjust the PC. 362f07a9995SKamil Rytarowski // 363f07a9995SKamil Rytarowski // Sanity check. 364f07a9995SKamil Rytarowski if (breakpoint_size == 0) { 365f07a9995SKamil Rytarowski // Nothing to do! How did we get here? 366f07a9995SKamil Rytarowski LLDB_LOG(log, 367f07a9995SKamil Rytarowski "pid {0} breakpoint found at {1:x}, it is software, but the " 368f07a9995SKamil Rytarowski "size is zero, nothing to do (unexpected)", 369f07a9995SKamil Rytarowski GetID(), breakpoint_addr); 370f07a9995SKamil Rytarowski return Error(); 371f07a9995SKamil Rytarowski } 372f07a9995SKamil Rytarowski // 373f07a9995SKamil Rytarowski // We have a software breakpoint and need to adjust the PC. 374f07a9995SKamil Rytarowski // 375f07a9995SKamil Rytarowski // Sanity check. 376f07a9995SKamil Rytarowski if (breakpoint_size == 0) { 377f07a9995SKamil Rytarowski // Nothing to do! How did we get here? 378f07a9995SKamil Rytarowski LLDB_LOG(log, 379f07a9995SKamil Rytarowski "pid {0} breakpoint found at {1:x}, it is software, but the " 380f07a9995SKamil Rytarowski "size is zero, nothing to do (unexpected)", 381f07a9995SKamil Rytarowski GetID(), breakpoint_addr); 382f07a9995SKamil Rytarowski return Error(); 383f07a9995SKamil Rytarowski } 384f07a9995SKamil Rytarowski // Change the program counter. 385f07a9995SKamil Rytarowski LLDB_LOG(log, "pid {0} tid {1}: changing PC from {2:x} to {3:x}", GetID(), 386f07a9995SKamil Rytarowski thread.GetID(), initial_pc_addr, breakpoint_addr); 387f07a9995SKamil Rytarowski error = context_sp->SetPC(breakpoint_addr); 388f07a9995SKamil Rytarowski if (error.Fail()) { 389f07a9995SKamil Rytarowski LLDB_LOG(log, "pid {0} tid {1}: failed to set PC: {2}", GetID(), 390f07a9995SKamil Rytarowski thread.GetID(), error); 391f07a9995SKamil Rytarowski return error; 392f07a9995SKamil Rytarowski } 393f07a9995SKamil Rytarowski return error; 394f07a9995SKamil Rytarowski } 395f07a9995SKamil Rytarowski 396f07a9995SKamil Rytarowski Error NativeProcessNetBSD::Resume(const ResumeActionList &resume_actions) { 397f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 398f07a9995SKamil Rytarowski LLDB_LOG(log, "pid {0}", GetID()); 399f07a9995SKamil Rytarowski 400f07a9995SKamil Rytarowski const auto &thread_sp = m_threads[0]; 401f07a9995SKamil Rytarowski const ResumeAction *const action = 402f07a9995SKamil Rytarowski resume_actions.GetActionForThread(thread_sp->GetID(), true); 403f07a9995SKamil Rytarowski 404f07a9995SKamil Rytarowski if (action == nullptr) { 405f07a9995SKamil Rytarowski LLDB_LOG(log, "no action specified for pid {0} tid {1}", GetID(), 406f07a9995SKamil Rytarowski thread_sp->GetID()); 407f07a9995SKamil Rytarowski return Error(); 408f07a9995SKamil Rytarowski } 409f07a9995SKamil Rytarowski 410*3eef2b5eSKamil Rytarowski Error error; 411*3eef2b5eSKamil Rytarowski 412f07a9995SKamil Rytarowski switch (action->state) { 413f07a9995SKamil Rytarowski case eStateRunning: { 414f07a9995SKamil Rytarowski // Run the thread, possibly feeding it the signal. 415*3eef2b5eSKamil Rytarowski error = NativeProcessNetBSD::PtraceWrapper(PT_CONTINUE, GetID(), (void *)1, 416*3eef2b5eSKamil Rytarowski action->signal); 417f07a9995SKamil Rytarowski if (!error.Success()) 418f07a9995SKamil Rytarowski return error; 419f07a9995SKamil Rytarowski for (const auto &thread_sp : m_threads) { 420f07a9995SKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp)->SetRunning(); 421f07a9995SKamil Rytarowski } 422f07a9995SKamil Rytarowski SetState(eStateRunning, true); 423f07a9995SKamil Rytarowski break; 424f07a9995SKamil Rytarowski } 425f07a9995SKamil Rytarowski case eStateStepping: 426*3eef2b5eSKamil Rytarowski // Run the thread, possibly feeding it the signal. 427*3eef2b5eSKamil Rytarowski error = NativeProcessNetBSD::PtraceWrapper(PT_STEP, GetID(), (void *)1, 428*3eef2b5eSKamil Rytarowski action->signal); 429*3eef2b5eSKamil Rytarowski if (!error.Success()) 430*3eef2b5eSKamil Rytarowski return error; 431*3eef2b5eSKamil Rytarowski for (const auto &thread_sp : m_threads) { 432*3eef2b5eSKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp)->SetStepping(); 433*3eef2b5eSKamil Rytarowski } 434*3eef2b5eSKamil Rytarowski SetState(eStateStepping, true); 435f07a9995SKamil Rytarowski break; 436f07a9995SKamil Rytarowski 437f07a9995SKamil Rytarowski case eStateSuspended: 438f07a9995SKamil Rytarowski case eStateStopped: 439f07a9995SKamil Rytarowski llvm_unreachable("Unexpected state"); 440f07a9995SKamil Rytarowski 441f07a9995SKamil Rytarowski default: 442f07a9995SKamil Rytarowski return Error("NativeProcessLinux::%s (): unexpected state %s specified " 443f07a9995SKamil Rytarowski "for pid %" PRIu64 ", tid %" PRIu64, 444f07a9995SKamil Rytarowski __FUNCTION__, StateAsCString(action->state), GetID(), 445f07a9995SKamil Rytarowski thread_sp->GetID()); 446f07a9995SKamil Rytarowski } 447f07a9995SKamil Rytarowski 448f07a9995SKamil Rytarowski return Error(); 449f07a9995SKamil Rytarowski } 450f07a9995SKamil Rytarowski 451f07a9995SKamil Rytarowski Error NativeProcessNetBSD::Halt() { 452f07a9995SKamil Rytarowski Error error; 453f07a9995SKamil Rytarowski 454f07a9995SKamil Rytarowski if (kill(GetID(), SIGSTOP) != 0) 455f07a9995SKamil Rytarowski error.SetErrorToErrno(); 456f07a9995SKamil Rytarowski 457f07a9995SKamil Rytarowski return error; 458f07a9995SKamil Rytarowski } 459f07a9995SKamil Rytarowski 460f07a9995SKamil Rytarowski Error NativeProcessNetBSD::Detach() { 461f07a9995SKamil Rytarowski Error error; 462f07a9995SKamil Rytarowski 463f07a9995SKamil Rytarowski // Stop monitoring the inferior. 464f07a9995SKamil Rytarowski m_sigchld_handle.reset(); 465f07a9995SKamil Rytarowski 466f07a9995SKamil Rytarowski // Tell ptrace to detach from the process. 467f07a9995SKamil Rytarowski if (GetID() == LLDB_INVALID_PROCESS_ID) 468f07a9995SKamil Rytarowski return error; 469f07a9995SKamil Rytarowski 470f07a9995SKamil Rytarowski return PtraceWrapper(PT_DETACH, GetID()); 471f07a9995SKamil Rytarowski } 472f07a9995SKamil Rytarowski 473f07a9995SKamil Rytarowski Error NativeProcessNetBSD::Signal(int signo) { 474f07a9995SKamil Rytarowski Error error; 475f07a9995SKamil Rytarowski 476f07a9995SKamil Rytarowski if (kill(GetID(), signo)) 477f07a9995SKamil Rytarowski error.SetErrorToErrno(); 478f07a9995SKamil Rytarowski 479f07a9995SKamil Rytarowski return error; 480f07a9995SKamil Rytarowski } 481f07a9995SKamil Rytarowski 482f07a9995SKamil Rytarowski Error NativeProcessNetBSD::Kill() { 483f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 484f07a9995SKamil Rytarowski LLDB_LOG(log, "pid {0}", GetID()); 485f07a9995SKamil Rytarowski 486f07a9995SKamil Rytarowski Error error; 487f07a9995SKamil Rytarowski 488f07a9995SKamil Rytarowski switch (m_state) { 489f07a9995SKamil Rytarowski case StateType::eStateInvalid: 490f07a9995SKamil Rytarowski case StateType::eStateExited: 491f07a9995SKamil Rytarowski case StateType::eStateCrashed: 492f07a9995SKamil Rytarowski case StateType::eStateDetached: 493f07a9995SKamil Rytarowski case StateType::eStateUnloaded: 494f07a9995SKamil Rytarowski // Nothing to do - the process is already dead. 495f07a9995SKamil Rytarowski LLDB_LOG(log, "ignored for PID {0} due to current state: {1}", GetID(), 496f07a9995SKamil Rytarowski StateAsCString(m_state)); 497f07a9995SKamil Rytarowski return error; 498f07a9995SKamil Rytarowski 499f07a9995SKamil Rytarowski case StateType::eStateConnected: 500f07a9995SKamil Rytarowski case StateType::eStateAttaching: 501f07a9995SKamil Rytarowski case StateType::eStateLaunching: 502f07a9995SKamil Rytarowski case StateType::eStateStopped: 503f07a9995SKamil Rytarowski case StateType::eStateRunning: 504f07a9995SKamil Rytarowski case StateType::eStateStepping: 505f07a9995SKamil Rytarowski case StateType::eStateSuspended: 506f07a9995SKamil Rytarowski // We can try to kill a process in these states. 507f07a9995SKamil Rytarowski break; 508f07a9995SKamil Rytarowski } 509f07a9995SKamil Rytarowski 510f07a9995SKamil Rytarowski if (kill(GetID(), SIGKILL) != 0) { 511f07a9995SKamil Rytarowski error.SetErrorToErrno(); 512f07a9995SKamil Rytarowski return error; 513f07a9995SKamil Rytarowski } 514f07a9995SKamil Rytarowski 515f07a9995SKamil Rytarowski return error; 516f07a9995SKamil Rytarowski } 517f07a9995SKamil Rytarowski 518f07a9995SKamil Rytarowski Error NativeProcessNetBSD::GetMemoryRegionInfo(lldb::addr_t load_addr, 519f07a9995SKamil Rytarowski MemoryRegionInfo &range_info) { 520f07a9995SKamil Rytarowski 521f07a9995SKamil Rytarowski if (m_supports_mem_region == LazyBool::eLazyBoolNo) { 522f07a9995SKamil Rytarowski // We're done. 523f07a9995SKamil Rytarowski return Error("unsupported"); 524f07a9995SKamil Rytarowski } 525f07a9995SKamil Rytarowski 526f07a9995SKamil Rytarowski Error error = PopulateMemoryRegionCache(); 527f07a9995SKamil Rytarowski if (error.Fail()) { 528f07a9995SKamil Rytarowski return error; 529f07a9995SKamil Rytarowski } 530f07a9995SKamil Rytarowski 531f07a9995SKamil Rytarowski lldb::addr_t prev_base_address = 0; 532f07a9995SKamil Rytarowski // FIXME start by finding the last region that is <= target address using 533f07a9995SKamil Rytarowski // binary search. Data is sorted. 534f07a9995SKamil Rytarowski // There can be a ton of regions on pthreads apps with lots of threads. 535f07a9995SKamil Rytarowski for (auto it = m_mem_region_cache.begin(); it != m_mem_region_cache.end(); 536f07a9995SKamil Rytarowski ++it) { 537f07a9995SKamil Rytarowski MemoryRegionInfo &proc_entry_info = it->first; 538f07a9995SKamil Rytarowski // Sanity check assumption that memory map entries are ascending. 539f07a9995SKamil Rytarowski assert((proc_entry_info.GetRange().GetRangeBase() >= prev_base_address) && 540f07a9995SKamil Rytarowski "descending memory map entries detected, unexpected"); 541f07a9995SKamil Rytarowski prev_base_address = proc_entry_info.GetRange().GetRangeBase(); 542f07a9995SKamil Rytarowski UNUSED_IF_ASSERT_DISABLED(prev_base_address); 543f07a9995SKamil Rytarowski // If the target address comes before this entry, indicate distance to next 544f07a9995SKamil Rytarowski // region. 545f07a9995SKamil Rytarowski if (load_addr < proc_entry_info.GetRange().GetRangeBase()) { 546f07a9995SKamil Rytarowski range_info.GetRange().SetRangeBase(load_addr); 547f07a9995SKamil Rytarowski range_info.GetRange().SetByteSize( 548f07a9995SKamil Rytarowski proc_entry_info.GetRange().GetRangeBase() - load_addr); 549f07a9995SKamil Rytarowski range_info.SetReadable(MemoryRegionInfo::OptionalBool::eNo); 550f07a9995SKamil Rytarowski range_info.SetWritable(MemoryRegionInfo::OptionalBool::eNo); 551f07a9995SKamil Rytarowski range_info.SetExecutable(MemoryRegionInfo::OptionalBool::eNo); 552f07a9995SKamil Rytarowski range_info.SetMapped(MemoryRegionInfo::OptionalBool::eNo); 553f07a9995SKamil Rytarowski return error; 554f07a9995SKamil Rytarowski } else if (proc_entry_info.GetRange().Contains(load_addr)) { 555f07a9995SKamil Rytarowski // The target address is within the memory region we're processing here. 556f07a9995SKamil Rytarowski range_info = proc_entry_info; 557f07a9995SKamil Rytarowski return error; 558f07a9995SKamil Rytarowski } 559f07a9995SKamil Rytarowski // The target memory address comes somewhere after the region we just 560f07a9995SKamil Rytarowski // parsed. 561f07a9995SKamil Rytarowski } 562f07a9995SKamil Rytarowski // If we made it here, we didn't find an entry that contained the given 563f07a9995SKamil Rytarowski // address. Return the 564f07a9995SKamil Rytarowski // load_addr as start and the amount of bytes betwwen load address and the end 565f07a9995SKamil Rytarowski // of the memory as 566f07a9995SKamil Rytarowski // size. 567f07a9995SKamil Rytarowski range_info.GetRange().SetRangeBase(load_addr); 568f07a9995SKamil Rytarowski range_info.GetRange().SetRangeEnd(LLDB_INVALID_ADDRESS); 569f07a9995SKamil Rytarowski range_info.SetReadable(MemoryRegionInfo::OptionalBool::eNo); 570f07a9995SKamil Rytarowski range_info.SetWritable(MemoryRegionInfo::OptionalBool::eNo); 571f07a9995SKamil Rytarowski range_info.SetExecutable(MemoryRegionInfo::OptionalBool::eNo); 572f07a9995SKamil Rytarowski range_info.SetMapped(MemoryRegionInfo::OptionalBool::eNo); 573f07a9995SKamil Rytarowski return error; 574f07a9995SKamil Rytarowski } 575f07a9995SKamil Rytarowski 576f07a9995SKamil Rytarowski Error NativeProcessNetBSD::PopulateMemoryRegionCache() { 577f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 578f07a9995SKamil Rytarowski // If our cache is empty, pull the latest. There should always be at least 579f07a9995SKamil Rytarowski // one memory region if memory region handling is supported. 580f07a9995SKamil Rytarowski if (!m_mem_region_cache.empty()) { 581f07a9995SKamil Rytarowski LLDB_LOG(log, "reusing {0} cached memory region entries", 582f07a9995SKamil Rytarowski m_mem_region_cache.size()); 583f07a9995SKamil Rytarowski return Error(); 584f07a9995SKamil Rytarowski } 585f07a9995SKamil Rytarowski 586f07a9995SKamil Rytarowski struct kinfo_vmentry *vm; 587f07a9995SKamil Rytarowski size_t count, i; 588f07a9995SKamil Rytarowski vm = kinfo_getvmmap(GetID(), &count); 589f07a9995SKamil Rytarowski if (vm == NULL) { 590f07a9995SKamil Rytarowski m_supports_mem_region = LazyBool::eLazyBoolNo; 591f07a9995SKamil Rytarowski Error error; 592f07a9995SKamil Rytarowski error.SetErrorString("not supported"); 593f07a9995SKamil Rytarowski return error; 594f07a9995SKamil Rytarowski } 595f07a9995SKamil Rytarowski for (i = 0; i < count; i++) { 596f07a9995SKamil Rytarowski MemoryRegionInfo info; 597f07a9995SKamil Rytarowski info.Clear(); 598f07a9995SKamil Rytarowski info.GetRange().SetRangeBase(vm[i].kve_start); 599f07a9995SKamil Rytarowski info.GetRange().SetRangeEnd(vm[i].kve_end); 600f07a9995SKamil Rytarowski info.SetMapped(MemoryRegionInfo::OptionalBool::eYes); 601f07a9995SKamil Rytarowski 602f07a9995SKamil Rytarowski if (vm[i].kve_protection & VM_PROT_READ) 603f07a9995SKamil Rytarowski info.SetReadable(MemoryRegionInfo::OptionalBool::eYes); 604f07a9995SKamil Rytarowski else 605f07a9995SKamil Rytarowski info.SetReadable(MemoryRegionInfo::OptionalBool::eNo); 606f07a9995SKamil Rytarowski 607f07a9995SKamil Rytarowski if (vm[i].kve_protection & VM_PROT_WRITE) 608f07a9995SKamil Rytarowski info.SetWritable(MemoryRegionInfo::OptionalBool::eYes); 609f07a9995SKamil Rytarowski else 610f07a9995SKamil Rytarowski info.SetWritable(MemoryRegionInfo::OptionalBool::eNo); 611f07a9995SKamil Rytarowski 612f07a9995SKamil Rytarowski if (vm[i].kve_protection & VM_PROT_EXECUTE) 613f07a9995SKamil Rytarowski info.SetExecutable(MemoryRegionInfo::OptionalBool::eYes); 614f07a9995SKamil Rytarowski else 615f07a9995SKamil Rytarowski info.SetExecutable(MemoryRegionInfo::OptionalBool::eNo); 616f07a9995SKamil Rytarowski 617f07a9995SKamil Rytarowski if (vm[i].kve_path[0]) 618f07a9995SKamil Rytarowski info.SetName(vm[i].kve_path); 619f07a9995SKamil Rytarowski 620f07a9995SKamil Rytarowski m_mem_region_cache.emplace_back( 621f07a9995SKamil Rytarowski info, FileSpec(info.GetName().GetCString(), true)); 622f07a9995SKamil Rytarowski } 623f07a9995SKamil Rytarowski free(vm); 624f07a9995SKamil Rytarowski 625f07a9995SKamil Rytarowski if (m_mem_region_cache.empty()) { 626f07a9995SKamil Rytarowski // No entries after attempting to read them. This shouldn't happen. 627f07a9995SKamil Rytarowski // Assume we don't support map entries. 628f07a9995SKamil Rytarowski LLDB_LOG(log, "failed to find any vmmap entries, assuming no support " 629f07a9995SKamil Rytarowski "for memory region metadata retrieval"); 630f07a9995SKamil Rytarowski m_supports_mem_region = LazyBool::eLazyBoolNo; 631f07a9995SKamil Rytarowski Error error; 632f07a9995SKamil Rytarowski error.SetErrorString("not supported"); 633f07a9995SKamil Rytarowski return error; 634f07a9995SKamil Rytarowski } 635f07a9995SKamil Rytarowski LLDB_LOG(log, "read {0} memory region entries from process {1}", 636f07a9995SKamil Rytarowski m_mem_region_cache.size(), GetID()); 637f07a9995SKamil Rytarowski // We support memory retrieval, remember that. 638f07a9995SKamil Rytarowski m_supports_mem_region = LazyBool::eLazyBoolYes; 639f07a9995SKamil Rytarowski return Error(); 640f07a9995SKamil Rytarowski } 641f07a9995SKamil Rytarowski 642f07a9995SKamil Rytarowski Error NativeProcessNetBSD::AllocateMemory(size_t size, uint32_t permissions, 643f07a9995SKamil Rytarowski lldb::addr_t &addr) { 644f07a9995SKamil Rytarowski return Error("Unimplemented"); 645f07a9995SKamil Rytarowski } 646f07a9995SKamil Rytarowski 647f07a9995SKamil Rytarowski Error NativeProcessNetBSD::DeallocateMemory(lldb::addr_t addr) { 648f07a9995SKamil Rytarowski return Error("Unimplemented"); 649f07a9995SKamil Rytarowski } 650f07a9995SKamil Rytarowski 651f07a9995SKamil Rytarowski lldb::addr_t NativeProcessNetBSD::GetSharedLibraryInfoAddress() { 652f07a9995SKamil Rytarowski // punt on this for now 653f07a9995SKamil Rytarowski return LLDB_INVALID_ADDRESS; 654f07a9995SKamil Rytarowski } 655f07a9995SKamil Rytarowski 656f07a9995SKamil Rytarowski size_t NativeProcessNetBSD::UpdateThreads() { return m_threads.size(); } 657f07a9995SKamil Rytarowski 658f07a9995SKamil Rytarowski bool NativeProcessNetBSD::GetArchitecture(ArchSpec &arch) const { 659f07a9995SKamil Rytarowski arch = m_arch; 660f07a9995SKamil Rytarowski return true; 661f07a9995SKamil Rytarowski } 662f07a9995SKamil Rytarowski 663f07a9995SKamil Rytarowski Error NativeProcessNetBSD::SetBreakpoint(lldb::addr_t addr, uint32_t size, 664f07a9995SKamil Rytarowski bool hardware) { 665f07a9995SKamil Rytarowski if (hardware) 666f07a9995SKamil Rytarowski return Error("NativeProcessNetBSD does not support hardware breakpoints"); 667f07a9995SKamil Rytarowski else 668f07a9995SKamil Rytarowski return SetSoftwareBreakpoint(addr, size); 669f07a9995SKamil Rytarowski } 670f07a9995SKamil Rytarowski 671f07a9995SKamil Rytarowski Error NativeProcessNetBSD::GetSoftwareBreakpointTrapOpcode( 672f07a9995SKamil Rytarowski size_t trap_opcode_size_hint, size_t &actual_opcode_size, 673f07a9995SKamil Rytarowski const uint8_t *&trap_opcode_bytes) { 674f07a9995SKamil Rytarowski static const uint8_t g_i386_opcode[] = {0xCC}; 675f07a9995SKamil Rytarowski 676f07a9995SKamil Rytarowski switch (m_arch.GetMachine()) { 677f07a9995SKamil Rytarowski case llvm::Triple::x86: 678f07a9995SKamil Rytarowski case llvm::Triple::x86_64: 679f07a9995SKamil Rytarowski trap_opcode_bytes = g_i386_opcode; 680f07a9995SKamil Rytarowski actual_opcode_size = sizeof(g_i386_opcode); 681f07a9995SKamil Rytarowski return Error(); 682f07a9995SKamil Rytarowski default: 683f07a9995SKamil Rytarowski assert(false && "CPU type not supported!"); 684f07a9995SKamil Rytarowski return Error("CPU type not supported"); 685f07a9995SKamil Rytarowski } 686f07a9995SKamil Rytarowski } 687f07a9995SKamil Rytarowski 688f07a9995SKamil Rytarowski Error NativeProcessNetBSD::GetLoadedModuleFileSpec(const char *module_path, 689f07a9995SKamil Rytarowski FileSpec &file_spec) { 690f07a9995SKamil Rytarowski return Error("Unimplemented"); 691f07a9995SKamil Rytarowski } 692f07a9995SKamil Rytarowski 693f07a9995SKamil Rytarowski Error NativeProcessNetBSD::GetFileLoadAddress(const llvm::StringRef &file_name, 694f07a9995SKamil Rytarowski lldb::addr_t &load_addr) { 695f07a9995SKamil Rytarowski load_addr = LLDB_INVALID_ADDRESS; 696f07a9995SKamil Rytarowski return Error(); 697f07a9995SKamil Rytarowski } 698f07a9995SKamil Rytarowski 699f07a9995SKamil Rytarowski Error NativeProcessNetBSD::LaunchInferior(MainLoop &mainloop, 700f07a9995SKamil Rytarowski ProcessLaunchInfo &launch_info) { 701f07a9995SKamil Rytarowski Error error; 702f07a9995SKamil Rytarowski m_sigchld_handle = mainloop.RegisterSignal( 703f07a9995SKamil Rytarowski SIGCHLD, [this](MainLoopBase &) { SigchldHandler(); }, error); 704f07a9995SKamil Rytarowski if (!m_sigchld_handle) 705f07a9995SKamil Rytarowski return error; 706f07a9995SKamil Rytarowski 707f07a9995SKamil Rytarowski SetState(eStateLaunching); 708f07a9995SKamil Rytarowski 709f07a9995SKamil Rytarowski ::pid_t pid = ProcessLauncherPosixFork() 710f07a9995SKamil Rytarowski .LaunchProcess(launch_info, error) 711f07a9995SKamil Rytarowski .GetProcessId(); 712f07a9995SKamil Rytarowski if (error.Fail()) 713f07a9995SKamil Rytarowski return error; 714f07a9995SKamil Rytarowski 715f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 716f07a9995SKamil Rytarowski 717f07a9995SKamil Rytarowski // Wait for the child process to trap on its call to execve. 718f07a9995SKamil Rytarowski ::pid_t wpid; 719f07a9995SKamil Rytarowski int status; 720f07a9995SKamil Rytarowski if ((wpid = waitpid(pid, &status, 0)) < 0) { 721f07a9995SKamil Rytarowski error.SetErrorToErrno(); 722f07a9995SKamil Rytarowski LLDB_LOG(log, "waitpid for inferior failed with %s", error); 723f07a9995SKamil Rytarowski 724f07a9995SKamil Rytarowski // Mark the inferior as invalid. 725f07a9995SKamil Rytarowski // FIXME this could really use a new state - eStateLaunchFailure. For now, 726f07a9995SKamil Rytarowski // using eStateInvalid. 727f07a9995SKamil Rytarowski SetState(StateType::eStateInvalid); 728f07a9995SKamil Rytarowski 729f07a9995SKamil Rytarowski return error; 730f07a9995SKamil Rytarowski } 731f07a9995SKamil Rytarowski assert(WIFSTOPPED(status) && (wpid == static_cast<::pid_t>(pid)) && 732f07a9995SKamil Rytarowski "Could not sync with inferior process."); 733f07a9995SKamil Rytarowski 734f07a9995SKamil Rytarowski LLDB_LOG(log, "inferior started, now in stopped state"); 735f07a9995SKamil Rytarowski 736f07a9995SKamil Rytarowski // Release the master terminal descriptor and pass it off to the 737f07a9995SKamil Rytarowski // NativeProcessNetBSD instance. Similarly stash the inferior pid. 738f07a9995SKamil Rytarowski m_terminal_fd = launch_info.GetPTY().ReleaseMasterFileDescriptor(); 739f07a9995SKamil Rytarowski m_pid = pid; 740f07a9995SKamil Rytarowski launch_info.SetProcessID(pid); 741f07a9995SKamil Rytarowski 742f07a9995SKamil Rytarowski if (m_terminal_fd != -1) { 743f07a9995SKamil Rytarowski error = EnsureFDFlags(m_terminal_fd, O_NONBLOCK); 744f07a9995SKamil Rytarowski if (error.Fail()) { 745f07a9995SKamil Rytarowski LLDB_LOG(log, 746f07a9995SKamil Rytarowski "inferior EnsureFDFlags failed for ensuring terminal " 747f07a9995SKamil Rytarowski "O_NONBLOCK setting: {0}", 748f07a9995SKamil Rytarowski error); 749f07a9995SKamil Rytarowski 750f07a9995SKamil Rytarowski // Mark the inferior as invalid. 751f07a9995SKamil Rytarowski // FIXME this could really use a new state - eStateLaunchFailure. For 752f07a9995SKamil Rytarowski // now, using eStateInvalid. 753f07a9995SKamil Rytarowski SetState(StateType::eStateInvalid); 754f07a9995SKamil Rytarowski 755f07a9995SKamil Rytarowski return error; 756f07a9995SKamil Rytarowski } 757f07a9995SKamil Rytarowski } 758f07a9995SKamil Rytarowski 759f07a9995SKamil Rytarowski LLDB_LOG(log, "adding pid = {0}", pid); 760f07a9995SKamil Rytarowski 761f07a9995SKamil Rytarowski ResolveProcessArchitecture(m_pid, m_arch); 762f07a9995SKamil Rytarowski 763*3eef2b5eSKamil Rytarowski error = ReinitializeThreads(); 764f07a9995SKamil Rytarowski if (error.Fail()) { 765f07a9995SKamil Rytarowski SetState(StateType::eStateInvalid); 766f07a9995SKamil Rytarowski return error; 767f07a9995SKamil Rytarowski } 768f07a9995SKamil Rytarowski 769f07a9995SKamil Rytarowski /* Set process stopped */ 770f07a9995SKamil Rytarowski SetState(StateType::eStateStopped); 771f07a9995SKamil Rytarowski 772f07a9995SKamil Rytarowski if (error.Fail()) 773f07a9995SKamil Rytarowski LLDB_LOG(log, "inferior launching failed {0}", error); 774f07a9995SKamil Rytarowski return error; 775f07a9995SKamil Rytarowski } 776f07a9995SKamil Rytarowski 777f07a9995SKamil Rytarowski void NativeProcessNetBSD::AttachToInferior(MainLoop &mainloop, lldb::pid_t pid, 778f07a9995SKamil Rytarowski Error &error) { 779f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 780f07a9995SKamil Rytarowski LLDB_LOG(log, "pid = {0:x}", pid); 781f07a9995SKamil Rytarowski 782f07a9995SKamil Rytarowski m_sigchld_handle = mainloop.RegisterSignal( 783f07a9995SKamil Rytarowski SIGCHLD, [this](MainLoopBase &) { SigchldHandler(); }, error); 784f07a9995SKamil Rytarowski if (!m_sigchld_handle) 785f07a9995SKamil Rytarowski return; 786f07a9995SKamil Rytarowski 787f07a9995SKamil Rytarowski error = ResolveProcessArchitecture(pid, m_arch); 788f07a9995SKamil Rytarowski if (!error.Success()) 789f07a9995SKamil Rytarowski return; 790f07a9995SKamil Rytarowski 791f07a9995SKamil Rytarowski // Set the architecture to the exe architecture. 792f07a9995SKamil Rytarowski LLDB_LOG(log, "pid = {0:x}, detected architecture {1}", pid, 793f07a9995SKamil Rytarowski m_arch.GetArchitectureName()); 794f07a9995SKamil Rytarowski 795f07a9995SKamil Rytarowski m_pid = pid; 796f07a9995SKamil Rytarowski SetState(eStateAttaching); 797f07a9995SKamil Rytarowski 798f07a9995SKamil Rytarowski Attach(pid, error); 799f07a9995SKamil Rytarowski } 800f07a9995SKamil Rytarowski 801f07a9995SKamil Rytarowski void NativeProcessNetBSD::SigchldHandler() { 802f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 803f07a9995SKamil Rytarowski // Process all pending waitpid notifications. 804f07a9995SKamil Rytarowski int status; 805f07a9995SKamil Rytarowski ::pid_t wait_pid = waitpid(GetID(), &status, WALLSIG | WNOHANG); 806f07a9995SKamil Rytarowski 807f07a9995SKamil Rytarowski if (wait_pid == 0) 808f07a9995SKamil Rytarowski return; // We are done. 809f07a9995SKamil Rytarowski 810f07a9995SKamil Rytarowski if (wait_pid == -1) { 811f07a9995SKamil Rytarowski if (errno == EINTR) 812f07a9995SKamil Rytarowski return; 813f07a9995SKamil Rytarowski 814f07a9995SKamil Rytarowski Error error(errno, eErrorTypePOSIX); 815f07a9995SKamil Rytarowski LLDB_LOG(log, "waitpid ({0}, &status, _) failed: {1}", GetID(), error); 816f07a9995SKamil Rytarowski } 817f07a9995SKamil Rytarowski 818f07a9995SKamil Rytarowski bool exited = false; 819f07a9995SKamil Rytarowski int signal = 0; 820f07a9995SKamil Rytarowski int exit_status = 0; 821f07a9995SKamil Rytarowski const char *status_cstr = nullptr; 822f07a9995SKamil Rytarowski if (WIFSTOPPED(status)) { 823f07a9995SKamil Rytarowski signal = WSTOPSIG(status); 824f07a9995SKamil Rytarowski status_cstr = "STOPPED"; 825f07a9995SKamil Rytarowski } else if (WIFEXITED(status)) { 826f07a9995SKamil Rytarowski exit_status = WEXITSTATUS(status); 827f07a9995SKamil Rytarowski status_cstr = "EXITED"; 828f07a9995SKamil Rytarowski exited = true; 829f07a9995SKamil Rytarowski } else if (WIFSIGNALED(status)) { 830f07a9995SKamil Rytarowski signal = WTERMSIG(status); 831f07a9995SKamil Rytarowski status_cstr = "SIGNALED"; 832f07a9995SKamil Rytarowski if (wait_pid == static_cast<::pid_t>(GetID())) { 833f07a9995SKamil Rytarowski exited = true; 834f07a9995SKamil Rytarowski exit_status = -1; 835f07a9995SKamil Rytarowski } 836f07a9995SKamil Rytarowski } else 837f07a9995SKamil Rytarowski status_cstr = "(\?\?\?)"; 838f07a9995SKamil Rytarowski 839f07a9995SKamil Rytarowski LLDB_LOG(log, 840f07a9995SKamil Rytarowski "waitpid ({0}, &status, _) => pid = {1}, status = {2:x} " 841f07a9995SKamil Rytarowski "({3}), signal = {4}, exit_state = {5}", 842f07a9995SKamil Rytarowski GetID(), wait_pid, status, status_cstr, signal, exit_status); 843f07a9995SKamil Rytarowski 844f07a9995SKamil Rytarowski if (exited) 845f07a9995SKamil Rytarowski MonitorExited(wait_pid, signal, exit_status); 846f07a9995SKamil Rytarowski else 847f07a9995SKamil Rytarowski MonitorCallback(wait_pid, signal); 848f07a9995SKamil Rytarowski } 849f07a9995SKamil Rytarowski 850f07a9995SKamil Rytarowski NativeThreadNetBSDSP NativeProcessNetBSD::AddThread(lldb::tid_t thread_id) { 851f07a9995SKamil Rytarowski 852f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_THREAD)); 853f07a9995SKamil Rytarowski LLDB_LOG(log, "pid {0} adding thread with tid {1}", GetID(), thread_id); 854f07a9995SKamil Rytarowski 855f07a9995SKamil Rytarowski assert(!HasThreadNoLock(thread_id) && 856f07a9995SKamil Rytarowski "attempted to add a thread by id that already exists"); 857f07a9995SKamil Rytarowski 858f07a9995SKamil Rytarowski // If this is the first thread, save it as the current thread 859f07a9995SKamil Rytarowski if (m_threads.empty()) 860f07a9995SKamil Rytarowski SetCurrentThreadID(thread_id); 861f07a9995SKamil Rytarowski 862f07a9995SKamil Rytarowski auto thread_sp = std::make_shared<NativeThreadNetBSD>(this, thread_id); 863f07a9995SKamil Rytarowski m_threads.push_back(thread_sp); 864f07a9995SKamil Rytarowski return thread_sp; 865f07a9995SKamil Rytarowski } 866f07a9995SKamil Rytarowski 867f07a9995SKamil Rytarowski ::pid_t NativeProcessNetBSD::Attach(lldb::pid_t pid, Error &error) { 868f07a9995SKamil Rytarowski Log *log(GetLogIfAllCategoriesSet(LIBLLDB_LOG_PROCESS)); 869f07a9995SKamil Rytarowski 870f07a9995SKamil Rytarowski if (pid <= 1) { 871f07a9995SKamil Rytarowski error.SetErrorToGenericError(); 872f07a9995SKamil Rytarowski error.SetErrorString("Attaching to process 1 is not allowed."); 873f07a9995SKamil Rytarowski return -1; 874f07a9995SKamil Rytarowski } 875f07a9995SKamil Rytarowski 876f07a9995SKamil Rytarowski // Attach to the requested process. 877f07a9995SKamil Rytarowski // An attach will cause the thread to stop with a SIGSTOP. 878f07a9995SKamil Rytarowski error = PtraceWrapper(PT_ATTACH, pid); 879f07a9995SKamil Rytarowski if (error.Fail()) 880f07a9995SKamil Rytarowski return -1; 881f07a9995SKamil Rytarowski 882f07a9995SKamil Rytarowski int status; 883f07a9995SKamil Rytarowski // Need to use WALLSIG otherwise we receive an error with errno=ECHLD 884f07a9995SKamil Rytarowski // At this point we should have a thread stopped if waitpid succeeds. 885f07a9995SKamil Rytarowski if ((status = waitpid(pid, NULL, WALLSIG)) < 0) 886f07a9995SKamil Rytarowski return -1; 887f07a9995SKamil Rytarowski 888f07a9995SKamil Rytarowski m_pid = pid; 889f07a9995SKamil Rytarowski 890f07a9995SKamil Rytarowski /* Initialize threads */ 891*3eef2b5eSKamil Rytarowski error = ReinitializeThreads(); 892f07a9995SKamil Rytarowski if (error.Fail()) { 893f07a9995SKamil Rytarowski SetState(StateType::eStateInvalid); 894f07a9995SKamil Rytarowski return -1; 895f07a9995SKamil Rytarowski } 896f07a9995SKamil Rytarowski 897f07a9995SKamil Rytarowski // Let our process instance know the thread has stopped. 898f07a9995SKamil Rytarowski SetState(StateType::eStateStopped); 899f07a9995SKamil Rytarowski 900f07a9995SKamil Rytarowski return pid; 901f07a9995SKamil Rytarowski } 902f07a9995SKamil Rytarowski 903f07a9995SKamil Rytarowski Error NativeProcessNetBSD::ReadMemory(lldb::addr_t addr, void *buf, size_t size, 904f07a9995SKamil Rytarowski size_t &bytes_read) { 905f07a9995SKamil Rytarowski unsigned char *dst = static_cast<unsigned char *>(buf); 906f07a9995SKamil Rytarowski struct ptrace_io_desc io; 907f07a9995SKamil Rytarowski 908f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_MEMORY)); 909f07a9995SKamil Rytarowski LLDB_LOG(log, "addr = {0}, buf = {1}, size = {2}", addr, buf, size); 910f07a9995SKamil Rytarowski 911f07a9995SKamil Rytarowski bytes_read = 0; 912f07a9995SKamil Rytarowski io.piod_op = PIOD_READ_D; 913f07a9995SKamil Rytarowski io.piod_len = size; 914f07a9995SKamil Rytarowski 915f07a9995SKamil Rytarowski do { 916f07a9995SKamil Rytarowski io.piod_offs = (void *)(addr + bytes_read); 917f07a9995SKamil Rytarowski io.piod_addr = dst + bytes_read; 918f07a9995SKamil Rytarowski 919f07a9995SKamil Rytarowski Error error = NativeProcessNetBSD::PtraceWrapper(PT_IO, GetID(), &io); 920f07a9995SKamil Rytarowski if (error.Fail()) 921f07a9995SKamil Rytarowski return error; 922f07a9995SKamil Rytarowski 923f07a9995SKamil Rytarowski bytes_read = io.piod_len; 924f07a9995SKamil Rytarowski io.piod_len = size - bytes_read; 925f07a9995SKamil Rytarowski } while (bytes_read < size); 926f07a9995SKamil Rytarowski 927f07a9995SKamil Rytarowski return Error(); 928f07a9995SKamil Rytarowski } 929f07a9995SKamil Rytarowski 930f07a9995SKamil Rytarowski Error NativeProcessNetBSD::ReadMemoryWithoutTrap(lldb::addr_t addr, void *buf, 931f07a9995SKamil Rytarowski size_t size, 932f07a9995SKamil Rytarowski size_t &bytes_read) { 933f07a9995SKamil Rytarowski Error error = ReadMemory(addr, buf, size, bytes_read); 934f07a9995SKamil Rytarowski if (error.Fail()) 935f07a9995SKamil Rytarowski return error; 936f07a9995SKamil Rytarowski return m_breakpoint_list.RemoveTrapsFromBuffer(addr, buf, size); 937f07a9995SKamil Rytarowski } 938f07a9995SKamil Rytarowski 939f07a9995SKamil Rytarowski Error NativeProcessNetBSD::WriteMemory(lldb::addr_t addr, const void *buf, 940f07a9995SKamil Rytarowski size_t size, size_t &bytes_written) { 941f07a9995SKamil Rytarowski const unsigned char *src = static_cast<const unsigned char *>(buf); 942f07a9995SKamil Rytarowski Error error; 943f07a9995SKamil Rytarowski struct ptrace_io_desc io; 944f07a9995SKamil Rytarowski 945f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_MEMORY)); 946f07a9995SKamil Rytarowski LLDB_LOG(log, "addr = {0}, buf = {1}, size = {2}", addr, buf, size); 947f07a9995SKamil Rytarowski 948f07a9995SKamil Rytarowski bytes_written = 0; 949f07a9995SKamil Rytarowski io.piod_op = PIOD_WRITE_D; 950f07a9995SKamil Rytarowski io.piod_len = size; 951f07a9995SKamil Rytarowski 952f07a9995SKamil Rytarowski do { 953f07a9995SKamil Rytarowski io.piod_addr = (void *)(src + bytes_written); 954f07a9995SKamil Rytarowski io.piod_offs = (void *)(addr + bytes_written); 955f07a9995SKamil Rytarowski 956f07a9995SKamil Rytarowski Error error = NativeProcessNetBSD::PtraceWrapper(PT_IO, GetID(), &io); 957f07a9995SKamil Rytarowski if (error.Fail()) 958f07a9995SKamil Rytarowski return error; 959f07a9995SKamil Rytarowski 960f07a9995SKamil Rytarowski bytes_written = io.piod_len; 961f07a9995SKamil Rytarowski io.piod_len = size - bytes_written; 962f07a9995SKamil Rytarowski } while (bytes_written < size); 963f07a9995SKamil Rytarowski 964f07a9995SKamil Rytarowski return error; 965f07a9995SKamil Rytarowski } 966f07a9995SKamil Rytarowski 967f07a9995SKamil Rytarowski llvm::ErrorOr<std::unique_ptr<llvm::MemoryBuffer>> 968f07a9995SKamil Rytarowski NativeProcessNetBSD::GetAuxvData() const { 969f07a9995SKamil Rytarowski /* 970f07a9995SKamil Rytarowski * ELF_AUX_ENTRIES is currently restricted to kernel 971f07a9995SKamil Rytarowski * (<sys/exec_elf.h> r. 1.155 specifies 15) 972f07a9995SKamil Rytarowski * 973f07a9995SKamil Rytarowski * ptrace(2) returns the whole AUXV including extra fiels after AT_NULL this 974f07a9995SKamil Rytarowski * information isn't needed. 975f07a9995SKamil Rytarowski */ 976f07a9995SKamil Rytarowski size_t auxv_size = 100 * sizeof(AuxInfo); 977f07a9995SKamil Rytarowski 978f07a9995SKamil Rytarowski ErrorOr<std::unique_ptr<MemoryBuffer>> buf = 979f07a9995SKamil Rytarowski llvm::MemoryBuffer::getNewMemBuffer(auxv_size); 980f07a9995SKamil Rytarowski 981f07a9995SKamil Rytarowski struct ptrace_io_desc io = {.piod_op = PIOD_READ_AUXV, 982f07a9995SKamil Rytarowski .piod_offs = 0, 983f07a9995SKamil Rytarowski .piod_addr = (void *)buf.get()->getBufferStart(), 984f07a9995SKamil Rytarowski .piod_len = auxv_size}; 985f07a9995SKamil Rytarowski 986f07a9995SKamil Rytarowski Error error = NativeProcessNetBSD::PtraceWrapper(PT_IO, GetID(), &io); 987f07a9995SKamil Rytarowski 988f07a9995SKamil Rytarowski if (error.Fail()) 989f07a9995SKamil Rytarowski return std::error_code(error.GetError(), std::generic_category()); 990f07a9995SKamil Rytarowski 991f07a9995SKamil Rytarowski if (io.piod_len < 1) 992f07a9995SKamil Rytarowski return std::error_code(ECANCELED, std::generic_category()); 993f07a9995SKamil Rytarowski 994f07a9995SKamil Rytarowski return buf; 995f07a9995SKamil Rytarowski } 996*3eef2b5eSKamil Rytarowski 997*3eef2b5eSKamil Rytarowski Error NativeProcessNetBSD::ReinitializeThreads() { 998*3eef2b5eSKamil Rytarowski // Clear old threads 999*3eef2b5eSKamil Rytarowski m_threads.clear(); 1000*3eef2b5eSKamil Rytarowski 1001*3eef2b5eSKamil Rytarowski // Initialize new thread 1002*3eef2b5eSKamil Rytarowski struct ptrace_lwpinfo info = {}; 1003*3eef2b5eSKamil Rytarowski Error error = PtraceWrapper(PT_LWPINFO, GetID(), &info, sizeof(info)); 1004*3eef2b5eSKamil Rytarowski if (error.Fail()) { 1005*3eef2b5eSKamil Rytarowski return error; 1006*3eef2b5eSKamil Rytarowski } 1007*3eef2b5eSKamil Rytarowski // Reinitialize from scratch threads and register them in process 1008*3eef2b5eSKamil Rytarowski while (info.pl_lwpid != 0) { 1009*3eef2b5eSKamil Rytarowski NativeThreadNetBSDSP thread_sp = AddThread(info.pl_lwpid); 1010*3eef2b5eSKamil Rytarowski thread_sp->SetStoppedByExec(); 1011*3eef2b5eSKamil Rytarowski error = PtraceWrapper(PT_LWPINFO, GetID(), &info, sizeof(info)); 1012*3eef2b5eSKamil Rytarowski if (error.Fail()) { 1013*3eef2b5eSKamil Rytarowski return error; 1014*3eef2b5eSKamil Rytarowski } 1015*3eef2b5eSKamil Rytarowski } 1016*3eef2b5eSKamil Rytarowski 1017*3eef2b5eSKamil Rytarowski return error; 1018*3eef2b5eSKamil Rytarowski } 1019