11a3d19ddSKamil Rytarowski //===-- NativeProcessNetBSD.cpp ------------------------------- -*- C++ -*-===// 21a3d19ddSKamil Rytarowski // 31a3d19ddSKamil Rytarowski // The LLVM Compiler Infrastructure 41a3d19ddSKamil Rytarowski // 51a3d19ddSKamil Rytarowski // This file is distributed under the University of Illinois Open Source 61a3d19ddSKamil Rytarowski // License. See LICENSE.TXT for details. 71a3d19ddSKamil Rytarowski // 81a3d19ddSKamil Rytarowski //===----------------------------------------------------------------------===// 91a3d19ddSKamil Rytarowski 101a3d19ddSKamil Rytarowski #include "NativeProcessNetBSD.h" 111a3d19ddSKamil Rytarowski 121a3d19ddSKamil Rytarowski // C Includes 131a3d19ddSKamil Rytarowski 141a3d19ddSKamil Rytarowski // C++ Includes 151a3d19ddSKamil Rytarowski 161a3d19ddSKamil Rytarowski // Other libraries and framework includes 171a3d19ddSKamil Rytarowski #include "Plugins/Process/POSIX/ProcessPOSIXLog.h" 18f07a9995SKamil Rytarowski #include "lldb/Core/State.h" 19f07a9995SKamil Rytarowski #include "lldb/Host/HostProcess.h" 20f07a9995SKamil Rytarowski #include "lldb/Host/common/NativeBreakpoint.h" 21f07a9995SKamil Rytarowski #include "lldb/Host/common/NativeRegisterContext.h" 22f07a9995SKamil Rytarowski #include "lldb/Host/posix/ProcessLauncherPosixFork.h" 23f07a9995SKamil Rytarowski #include "lldb/Target/Process.h" 241a3d19ddSKamil Rytarowski 251a3d19ddSKamil Rytarowski // System includes - They have to be included after framework includes because 261a3d19ddSKamil Rytarowski // they define some 271a3d19ddSKamil Rytarowski // macros which collide with variable names in other modules 28f07a9995SKamil Rytarowski // clang-format off 29f07a9995SKamil Rytarowski #include <sys/types.h> 30f07a9995SKamil Rytarowski #include <sys/ptrace.h> 31f07a9995SKamil Rytarowski #include <sys/sysctl.h> 32f07a9995SKamil Rytarowski #include <sys/wait.h> 33f07a9995SKamil Rytarowski #include <uvm/uvm_prot.h> 34f07a9995SKamil Rytarowski #include <elf.h> 35f07a9995SKamil Rytarowski #include <util.h> 36f07a9995SKamil Rytarowski // clang-format on 371a3d19ddSKamil Rytarowski 381a3d19ddSKamil Rytarowski using namespace lldb; 391a3d19ddSKamil Rytarowski using namespace lldb_private; 401a3d19ddSKamil Rytarowski using namespace lldb_private::process_netbsd; 411a3d19ddSKamil Rytarowski using namespace llvm; 421a3d19ddSKamil Rytarowski 43f07a9995SKamil Rytarowski // Simple helper function to ensure flags are enabled on the given file 44f07a9995SKamil Rytarowski // descriptor. 4597206d57SZachary Turner static Status EnsureFDFlags(int fd, int flags) { 4697206d57SZachary Turner Status error; 47f07a9995SKamil Rytarowski 48f07a9995SKamil Rytarowski int status = fcntl(fd, F_GETFL); 49f07a9995SKamil Rytarowski if (status == -1) { 50f07a9995SKamil Rytarowski error.SetErrorToErrno(); 51f07a9995SKamil Rytarowski return error; 52f07a9995SKamil Rytarowski } 53f07a9995SKamil Rytarowski 54f07a9995SKamil Rytarowski if (fcntl(fd, F_SETFL, status | flags) == -1) { 55f07a9995SKamil Rytarowski error.SetErrorToErrno(); 56f07a9995SKamil Rytarowski return error; 57f07a9995SKamil Rytarowski } 58f07a9995SKamil Rytarowski 59f07a9995SKamil Rytarowski return error; 60f07a9995SKamil Rytarowski } 61f07a9995SKamil Rytarowski 621a3d19ddSKamil Rytarowski // ----------------------------------------------------------------------------- 631a3d19ddSKamil Rytarowski // Public Static Methods 641a3d19ddSKamil Rytarowski // ----------------------------------------------------------------------------- 651a3d19ddSKamil Rytarowski 6697206d57SZachary Turner Status NativeProcessProtocol::Launch( 671a3d19ddSKamil Rytarowski ProcessLaunchInfo &launch_info, 681a3d19ddSKamil Rytarowski NativeProcessProtocol::NativeDelegate &native_delegate, MainLoop &mainloop, 691a3d19ddSKamil Rytarowski NativeProcessProtocolSP &native_process_sp) { 70f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 71f07a9995SKamil Rytarowski 7297206d57SZachary Turner Status error; 73f07a9995SKamil Rytarowski 74f07a9995SKamil Rytarowski // Verify the working directory is valid if one was specified. 75f07a9995SKamil Rytarowski FileSpec working_dir{launch_info.GetWorkingDirectory()}; 76f07a9995SKamil Rytarowski if (working_dir && (!working_dir.ResolvePath() || 77f07a9995SKamil Rytarowski !llvm::sys::fs::is_directory(working_dir.GetPath()))) { 78f07a9995SKamil Rytarowski error.SetErrorStringWithFormat("No such file or directory: %s", 79f07a9995SKamil Rytarowski working_dir.GetCString()); 80f07a9995SKamil Rytarowski return error; 81f07a9995SKamil Rytarowski } 82f07a9995SKamil Rytarowski 83f07a9995SKamil Rytarowski // Create the NativeProcessNetBSD in launch mode. 84f07a9995SKamil Rytarowski native_process_sp.reset(new NativeProcessNetBSD()); 85f07a9995SKamil Rytarowski 86f07a9995SKamil Rytarowski if (!native_process_sp->RegisterNativeDelegate(native_delegate)) { 87f07a9995SKamil Rytarowski native_process_sp.reset(); 88f07a9995SKamil Rytarowski error.SetErrorStringWithFormat("failed to register the native delegate"); 89f07a9995SKamil Rytarowski return error; 90f07a9995SKamil Rytarowski } 91f07a9995SKamil Rytarowski 92f07a9995SKamil Rytarowski error = std::static_pointer_cast<NativeProcessNetBSD>(native_process_sp) 93f07a9995SKamil Rytarowski ->LaunchInferior(mainloop, launch_info); 94f07a9995SKamil Rytarowski 95f07a9995SKamil Rytarowski if (error.Fail()) { 96f07a9995SKamil Rytarowski native_process_sp.reset(); 97f07a9995SKamil Rytarowski LLDB_LOG(log, "failed to launch process: {0}", error); 98f07a9995SKamil Rytarowski return error; 99f07a9995SKamil Rytarowski } 100f07a9995SKamil Rytarowski 101f07a9995SKamil Rytarowski launch_info.SetProcessID(native_process_sp->GetID()); 102f07a9995SKamil Rytarowski 103f07a9995SKamil Rytarowski return error; 1041a3d19ddSKamil Rytarowski } 1051a3d19ddSKamil Rytarowski 10697206d57SZachary Turner Status NativeProcessProtocol::Attach( 1071a3d19ddSKamil Rytarowski lldb::pid_t pid, NativeProcessProtocol::NativeDelegate &native_delegate, 1081a3d19ddSKamil Rytarowski MainLoop &mainloop, NativeProcessProtocolSP &native_process_sp) { 109f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 110f07a9995SKamil Rytarowski LLDB_LOG(log, "pid = {0:x}", pid); 111f07a9995SKamil Rytarowski 112f07a9995SKamil Rytarowski // Retrieve the architecture for the running process. 113f07a9995SKamil Rytarowski ArchSpec process_arch; 11497206d57SZachary Turner Status error = ResolveProcessArchitecture(pid, process_arch); 115f07a9995SKamil Rytarowski if (!error.Success()) 116f07a9995SKamil Rytarowski return error; 117f07a9995SKamil Rytarowski 118f07a9995SKamil Rytarowski std::shared_ptr<NativeProcessNetBSD> native_process_netbsd_sp( 119f07a9995SKamil Rytarowski new NativeProcessNetBSD()); 120f07a9995SKamil Rytarowski 121f07a9995SKamil Rytarowski if (!native_process_netbsd_sp->RegisterNativeDelegate(native_delegate)) { 122f07a9995SKamil Rytarowski error.SetErrorStringWithFormat("failed to register the native delegate"); 123f07a9995SKamil Rytarowski return error; 124f07a9995SKamil Rytarowski } 125f07a9995SKamil Rytarowski 126f07a9995SKamil Rytarowski native_process_netbsd_sp->AttachToInferior(mainloop, pid, error); 127f07a9995SKamil Rytarowski if (!error.Success()) 128f07a9995SKamil Rytarowski return error; 129f07a9995SKamil Rytarowski 130f07a9995SKamil Rytarowski native_process_sp = native_process_netbsd_sp; 131f07a9995SKamil Rytarowski return error; 1321a3d19ddSKamil Rytarowski } 1331a3d19ddSKamil Rytarowski 1341a3d19ddSKamil Rytarowski // ----------------------------------------------------------------------------- 1351a3d19ddSKamil Rytarowski // Public Instance Methods 1361a3d19ddSKamil Rytarowski // ----------------------------------------------------------------------------- 1371a3d19ddSKamil Rytarowski 1381a3d19ddSKamil Rytarowski NativeProcessNetBSD::NativeProcessNetBSD() 139f07a9995SKamil Rytarowski : NativeProcessProtocol(LLDB_INVALID_PROCESS_ID), m_arch(), 140f07a9995SKamil Rytarowski m_supports_mem_region(eLazyBoolCalculate), m_mem_region_cache() {} 141f07a9995SKamil Rytarowski 142f07a9995SKamil Rytarowski // Handles all waitpid events from the inferior process. 143f07a9995SKamil Rytarowski void NativeProcessNetBSD::MonitorCallback(lldb::pid_t pid, int signal) { 144f07a9995SKamil Rytarowski switch (signal) { 145f07a9995SKamil Rytarowski case SIGTRAP: 146f07a9995SKamil Rytarowski return MonitorSIGTRAP(pid); 147f07a9995SKamil Rytarowski case SIGSTOP: 148f07a9995SKamil Rytarowski return MonitorSIGSTOP(pid); 149f07a9995SKamil Rytarowski default: 150f07a9995SKamil Rytarowski return MonitorSignal(pid, signal); 151f07a9995SKamil Rytarowski } 152f07a9995SKamil Rytarowski } 153f07a9995SKamil Rytarowski 1543508fc8cSPavel Labath void NativeProcessNetBSD::MonitorExited(lldb::pid_t pid, WaitStatus status) { 155f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 156f07a9995SKamil Rytarowski 1573508fc8cSPavel Labath LLDB_LOG(log, "got exit signal({0}) , pid = {1}", status, pid); 158f07a9995SKamil Rytarowski 159f07a9995SKamil Rytarowski /* Stop Tracking All Threads attached to Process */ 160f07a9995SKamil Rytarowski m_threads.clear(); 161f07a9995SKamil Rytarowski 1623508fc8cSPavel Labath SetExitStatus(status, true); 163f07a9995SKamil Rytarowski 164f07a9995SKamil Rytarowski // Notify delegate that our process has exited. 165f07a9995SKamil Rytarowski SetState(StateType::eStateExited, true); 166f07a9995SKamil Rytarowski } 167f07a9995SKamil Rytarowski 168f07a9995SKamil Rytarowski void NativeProcessNetBSD::MonitorSIGSTOP(lldb::pid_t pid) { 169f07a9995SKamil Rytarowski ptrace_siginfo_t info; 170f07a9995SKamil Rytarowski 171f07a9995SKamil Rytarowski const auto siginfo_err = 172f07a9995SKamil Rytarowski PtraceWrapper(PT_GET_SIGINFO, pid, &info, sizeof(info)); 173f07a9995SKamil Rytarowski 174f07a9995SKamil Rytarowski // Get details on the signal raised. 175f07a9995SKamil Rytarowski if (siginfo_err.Success()) { 176f07a9995SKamil Rytarowski // Handle SIGSTOP from LLGS (LLDB GDB Server) 177f07a9995SKamil Rytarowski if (info.psi_siginfo.si_code == SI_USER && 178f07a9995SKamil Rytarowski info.psi_siginfo.si_pid == ::getpid()) { 179f07a9995SKamil Rytarowski /* Stop Tracking All Threads attached to Process */ 180f07a9995SKamil Rytarowski for (const auto &thread_sp : m_threads) { 181f07a9995SKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp)->SetStoppedBySignal( 182f07a9995SKamil Rytarowski SIGSTOP, &info.psi_siginfo); 183f07a9995SKamil Rytarowski } 184f07a9995SKamil Rytarowski } 185f07a9995SKamil Rytarowski } 186f07a9995SKamil Rytarowski } 187f07a9995SKamil Rytarowski 188f07a9995SKamil Rytarowski void NativeProcessNetBSD::MonitorSIGTRAP(lldb::pid_t pid) { 189f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 190f07a9995SKamil Rytarowski ptrace_siginfo_t info; 191f07a9995SKamil Rytarowski 192f07a9995SKamil Rytarowski const auto siginfo_err = 193f07a9995SKamil Rytarowski PtraceWrapper(PT_GET_SIGINFO, pid, &info, sizeof(info)); 194f07a9995SKamil Rytarowski 195f07a9995SKamil Rytarowski // Get details on the signal raised. 19636e23ecaSKamil Rytarowski if (siginfo_err.Fail()) { 19736e23ecaSKamil Rytarowski return; 19836e23ecaSKamil Rytarowski } 19936e23ecaSKamil Rytarowski 200f07a9995SKamil Rytarowski switch (info.psi_siginfo.si_code) { 201f07a9995SKamil Rytarowski case TRAP_BRKPT: 202f07a9995SKamil Rytarowski for (const auto &thread_sp : m_threads) { 203f07a9995SKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp) 204f07a9995SKamil Rytarowski ->SetStoppedByBreakpoint(); 205f07a9995SKamil Rytarowski FixupBreakpointPCAsNeeded( 206f07a9995SKamil Rytarowski *static_pointer_cast<NativeThreadNetBSD>(thread_sp)); 207f07a9995SKamil Rytarowski } 208f07a9995SKamil Rytarowski SetState(StateType::eStateStopped, true); 209f07a9995SKamil Rytarowski break; 2103eef2b5eSKamil Rytarowski case TRAP_TRACE: 2113eef2b5eSKamil Rytarowski for (const auto &thread_sp : m_threads) { 2123eef2b5eSKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp)->SetStoppedByTrace(); 2133eef2b5eSKamil Rytarowski } 2143eef2b5eSKamil Rytarowski SetState(StateType::eStateStopped, true); 2153eef2b5eSKamil Rytarowski break; 2163eef2b5eSKamil Rytarowski case TRAP_EXEC: { 21797206d57SZachary Turner Status error = ReinitializeThreads(); 2183eef2b5eSKamil Rytarowski if (error.Fail()) { 2193eef2b5eSKamil Rytarowski SetState(StateType::eStateInvalid); 2203eef2b5eSKamil Rytarowski return; 2213eef2b5eSKamil Rytarowski } 2223eef2b5eSKamil Rytarowski 2233eef2b5eSKamil Rytarowski // Let our delegate know we have just exec'd. 2243eef2b5eSKamil Rytarowski NotifyDidExec(); 2253eef2b5eSKamil Rytarowski 22636e23ecaSKamil Rytarowski for (const auto &thread_sp : m_threads) { 22736e23ecaSKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp)->SetStoppedByExec(); 22836e23ecaSKamil Rytarowski } 2293eef2b5eSKamil Rytarowski SetState(StateType::eStateStopped, true); 2303eef2b5eSKamil Rytarowski } break; 23136e23ecaSKamil Rytarowski case TRAP_DBREG: { 23236e23ecaSKamil Rytarowski // If a watchpoint was hit, report it 23336e23ecaSKamil Rytarowski uint32_t wp_index; 23497206d57SZachary Turner Status error = 23536e23ecaSKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(m_threads[info.psi_lwpid]) 23636e23ecaSKamil Rytarowski ->GetRegisterContext() 23736e23ecaSKamil Rytarowski ->GetWatchpointHitIndex(wp_index, 23836e23ecaSKamil Rytarowski (uintptr_t)info.psi_siginfo.si_addr); 23936e23ecaSKamil Rytarowski if (error.Fail()) 24036e23ecaSKamil Rytarowski LLDB_LOG(log, 24136e23ecaSKamil Rytarowski "received error while checking for watchpoint hits, pid = " 24236e23ecaSKamil Rytarowski "{0}, LWP = {1}, error = {2}", 24336e23ecaSKamil Rytarowski GetID(), info.psi_lwpid, error); 24436e23ecaSKamil Rytarowski if (wp_index != LLDB_INVALID_INDEX32) { 24536e23ecaSKamil Rytarowski for (const auto &thread_sp : m_threads) { 24636e23ecaSKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp) 24736e23ecaSKamil Rytarowski ->SetStoppedByWatchpoint(wp_index); 248f07a9995SKamil Rytarowski } 24936e23ecaSKamil Rytarowski SetState(StateType::eStateStopped, true); 25036e23ecaSKamil Rytarowski break; 25136e23ecaSKamil Rytarowski } 25236e23ecaSKamil Rytarowski 25336e23ecaSKamil Rytarowski // If a breakpoint was hit, report it 25436e23ecaSKamil Rytarowski uint32_t bp_index; 25536e23ecaSKamil Rytarowski error = static_pointer_cast<NativeThreadNetBSD>(m_threads[info.psi_lwpid]) 25636e23ecaSKamil Rytarowski ->GetRegisterContext() 25736e23ecaSKamil Rytarowski ->GetHardwareBreakHitIndex(bp_index, 25836e23ecaSKamil Rytarowski (uintptr_t)info.psi_siginfo.si_addr); 25936e23ecaSKamil Rytarowski if (error.Fail()) 26036e23ecaSKamil Rytarowski LLDB_LOG(log, 26136e23ecaSKamil Rytarowski "received error while checking for hardware " 26236e23ecaSKamil Rytarowski "breakpoint hits, pid = {0}, LWP = {1}, error = {2}", 26336e23ecaSKamil Rytarowski GetID(), info.psi_lwpid, error); 26436e23ecaSKamil Rytarowski if (bp_index != LLDB_INVALID_INDEX32) { 26536e23ecaSKamil Rytarowski for (const auto &thread_sp : m_threads) { 26636e23ecaSKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp) 26736e23ecaSKamil Rytarowski ->SetStoppedByBreakpoint(); 26836e23ecaSKamil Rytarowski } 26936e23ecaSKamil Rytarowski SetState(StateType::eStateStopped, true); 27036e23ecaSKamil Rytarowski break; 27136e23ecaSKamil Rytarowski } 27236e23ecaSKamil Rytarowski } break; 273f07a9995SKamil Rytarowski } 274f07a9995SKamil Rytarowski } 275f07a9995SKamil Rytarowski 276f07a9995SKamil Rytarowski void NativeProcessNetBSD::MonitorSignal(lldb::pid_t pid, int signal) { 277f07a9995SKamil Rytarowski ptrace_siginfo_t info; 278f07a9995SKamil Rytarowski const auto siginfo_err = 279f07a9995SKamil Rytarowski PtraceWrapper(PT_GET_SIGINFO, pid, &info, sizeof(info)); 280f07a9995SKamil Rytarowski 281f07a9995SKamil Rytarowski for (const auto &thread_sp : m_threads) { 282f07a9995SKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp)->SetStoppedBySignal( 283f07a9995SKamil Rytarowski info.psi_siginfo.si_signo, &info.psi_siginfo); 284f07a9995SKamil Rytarowski } 285f07a9995SKamil Rytarowski SetState(StateType::eStateStopped, true); 286f07a9995SKamil Rytarowski } 287f07a9995SKamil Rytarowski 28897206d57SZachary Turner Status NativeProcessNetBSD::PtraceWrapper(int req, lldb::pid_t pid, void *addr, 289f07a9995SKamil Rytarowski int data, int *result) { 290f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PTRACE)); 29197206d57SZachary Turner Status error; 292f07a9995SKamil Rytarowski int ret; 293f07a9995SKamil Rytarowski 294f07a9995SKamil Rytarowski errno = 0; 295f07a9995SKamil Rytarowski ret = ptrace(req, static_cast<::pid_t>(pid), addr, data); 296f07a9995SKamil Rytarowski 297f07a9995SKamil Rytarowski if (ret == -1) 298f07a9995SKamil Rytarowski error.SetErrorToErrno(); 299f07a9995SKamil Rytarowski 300f07a9995SKamil Rytarowski if (result) 301f07a9995SKamil Rytarowski *result = ret; 302f07a9995SKamil Rytarowski 303f07a9995SKamil Rytarowski LLDB_LOG(log, "ptrace({0}, {1}, {2}, {3})={4:x}", req, pid, addr, data, ret); 304f07a9995SKamil Rytarowski 305f07a9995SKamil Rytarowski if (error.Fail()) 306f07a9995SKamil Rytarowski LLDB_LOG(log, "ptrace() failed: {0}", error); 307f07a9995SKamil Rytarowski 308f07a9995SKamil Rytarowski return error; 309f07a9995SKamil Rytarowski } 310f07a9995SKamil Rytarowski 31197206d57SZachary Turner Status NativeProcessNetBSD::GetSoftwareBreakpointPCOffset( 312f07a9995SKamil Rytarowski uint32_t &actual_opcode_size) { 313f07a9995SKamil Rytarowski // FIXME put this behind a breakpoint protocol class that can be 314f07a9995SKamil Rytarowski // set per architecture. Need ARM, MIPS support here. 315f07a9995SKamil Rytarowski static const uint8_t g_i386_opcode[] = {0xCC}; 316f07a9995SKamil Rytarowski switch (m_arch.GetMachine()) { 317f07a9995SKamil Rytarowski case llvm::Triple::x86_64: 318f07a9995SKamil Rytarowski actual_opcode_size = static_cast<uint32_t>(sizeof(g_i386_opcode)); 31997206d57SZachary Turner return Status(); 320f07a9995SKamil Rytarowski default: 321f07a9995SKamil Rytarowski assert(false && "CPU type not supported!"); 32297206d57SZachary Turner return Status("CPU type not supported"); 323f07a9995SKamil Rytarowski } 324f07a9995SKamil Rytarowski } 325f07a9995SKamil Rytarowski 32697206d57SZachary Turner Status 32797206d57SZachary Turner NativeProcessNetBSD::FixupBreakpointPCAsNeeded(NativeThreadNetBSD &thread) { 328f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_BREAKPOINTS)); 32997206d57SZachary Turner Status error; 330f07a9995SKamil Rytarowski // Find out the size of a breakpoint (might depend on where we are in the 331f07a9995SKamil Rytarowski // code). 332f07a9995SKamil Rytarowski NativeRegisterContextSP context_sp = thread.GetRegisterContext(); 333f07a9995SKamil Rytarowski if (!context_sp) { 334f07a9995SKamil Rytarowski error.SetErrorString("cannot get a NativeRegisterContext for the thread"); 335f07a9995SKamil Rytarowski LLDB_LOG(log, "failed: {0}", error); 336f07a9995SKamil Rytarowski return error; 337f07a9995SKamil Rytarowski } 338f07a9995SKamil Rytarowski uint32_t breakpoint_size = 0; 339f07a9995SKamil Rytarowski error = GetSoftwareBreakpointPCOffset(breakpoint_size); 340f07a9995SKamil Rytarowski if (error.Fail()) { 341f07a9995SKamil Rytarowski LLDB_LOG(log, "GetBreakpointSize() failed: {0}", error); 342f07a9995SKamil Rytarowski return error; 343f07a9995SKamil Rytarowski } else 344f07a9995SKamil Rytarowski LLDB_LOG(log, "breakpoint size: {0}", breakpoint_size); 34536e23ecaSKamil Rytarowski // First try probing for a breakpoint at a software breakpoint location: PC 34636e23ecaSKamil Rytarowski // - breakpoint size. 347f07a9995SKamil Rytarowski const lldb::addr_t initial_pc_addr = 348f07a9995SKamil Rytarowski context_sp->GetPCfromBreakpointLocation(); 349f07a9995SKamil Rytarowski lldb::addr_t breakpoint_addr = initial_pc_addr; 350f07a9995SKamil Rytarowski if (breakpoint_size > 0) { 351f07a9995SKamil Rytarowski // Do not allow breakpoint probe to wrap around. 352f07a9995SKamil Rytarowski if (breakpoint_addr >= breakpoint_size) 353f07a9995SKamil Rytarowski breakpoint_addr -= breakpoint_size; 354f07a9995SKamil Rytarowski } 355f07a9995SKamil Rytarowski // Check if we stopped because of a breakpoint. 356f07a9995SKamil Rytarowski NativeBreakpointSP breakpoint_sp; 357f07a9995SKamil Rytarowski error = m_breakpoint_list.GetBreakpoint(breakpoint_addr, breakpoint_sp); 358f07a9995SKamil Rytarowski if (!error.Success() || !breakpoint_sp) { 359f07a9995SKamil Rytarowski // We didn't find one at a software probe location. Nothing to do. 360f07a9995SKamil Rytarowski LLDB_LOG(log, 361f07a9995SKamil Rytarowski "pid {0} no lldb breakpoint found at current pc with " 362f07a9995SKamil Rytarowski "adjustment: {1}", 363f07a9995SKamil Rytarowski GetID(), breakpoint_addr); 36497206d57SZachary Turner return Status(); 365f07a9995SKamil Rytarowski } 366f07a9995SKamil Rytarowski // If the breakpoint is not a software breakpoint, nothing to do. 367f07a9995SKamil Rytarowski if (!breakpoint_sp->IsSoftwareBreakpoint()) { 368f07a9995SKamil Rytarowski LLDB_LOG( 369f07a9995SKamil Rytarowski log, 370f07a9995SKamil Rytarowski "pid {0} breakpoint found at {1:x}, not software, nothing to adjust", 371f07a9995SKamil Rytarowski GetID(), breakpoint_addr); 37297206d57SZachary Turner return Status(); 373f07a9995SKamil Rytarowski } 374f07a9995SKamil Rytarowski // 375f07a9995SKamil Rytarowski // We have a software breakpoint and need to adjust the PC. 376f07a9995SKamil Rytarowski // 377f07a9995SKamil Rytarowski // Sanity check. 378f07a9995SKamil Rytarowski if (breakpoint_size == 0) { 379f07a9995SKamil Rytarowski // Nothing to do! How did we get here? 380f07a9995SKamil Rytarowski LLDB_LOG(log, 381f07a9995SKamil Rytarowski "pid {0} breakpoint found at {1:x}, it is software, but the " 382f07a9995SKamil Rytarowski "size is zero, nothing to do (unexpected)", 383f07a9995SKamil Rytarowski GetID(), breakpoint_addr); 38497206d57SZachary Turner return Status(); 385f07a9995SKamil Rytarowski } 386f07a9995SKamil Rytarowski // 387f07a9995SKamil Rytarowski // We have a software breakpoint and need to adjust the PC. 388f07a9995SKamil Rytarowski // 389f07a9995SKamil Rytarowski // Sanity check. 390f07a9995SKamil Rytarowski if (breakpoint_size == 0) { 391f07a9995SKamil Rytarowski // Nothing to do! How did we get here? 392f07a9995SKamil Rytarowski LLDB_LOG(log, 393f07a9995SKamil Rytarowski "pid {0} breakpoint found at {1:x}, it is software, but the " 394f07a9995SKamil Rytarowski "size is zero, nothing to do (unexpected)", 395f07a9995SKamil Rytarowski GetID(), breakpoint_addr); 39697206d57SZachary Turner return Status(); 397f07a9995SKamil Rytarowski } 398f07a9995SKamil Rytarowski // Change the program counter. 399f07a9995SKamil Rytarowski LLDB_LOG(log, "pid {0} tid {1}: changing PC from {2:x} to {3:x}", GetID(), 400f07a9995SKamil Rytarowski thread.GetID(), initial_pc_addr, breakpoint_addr); 401f07a9995SKamil Rytarowski error = context_sp->SetPC(breakpoint_addr); 402f07a9995SKamil Rytarowski if (error.Fail()) { 403f07a9995SKamil Rytarowski LLDB_LOG(log, "pid {0} tid {1}: failed to set PC: {2}", GetID(), 404f07a9995SKamil Rytarowski thread.GetID(), error); 405f07a9995SKamil Rytarowski return error; 406f07a9995SKamil Rytarowski } 407f07a9995SKamil Rytarowski return error; 408f07a9995SKamil Rytarowski } 409f07a9995SKamil Rytarowski 41097206d57SZachary Turner Status NativeProcessNetBSD::Resume(const ResumeActionList &resume_actions) { 411f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 412f07a9995SKamil Rytarowski LLDB_LOG(log, "pid {0}", GetID()); 413f07a9995SKamil Rytarowski 414f07a9995SKamil Rytarowski const auto &thread_sp = m_threads[0]; 415f07a9995SKamil Rytarowski const ResumeAction *const action = 416f07a9995SKamil Rytarowski resume_actions.GetActionForThread(thread_sp->GetID(), true); 417f07a9995SKamil Rytarowski 418f07a9995SKamil Rytarowski if (action == nullptr) { 419f07a9995SKamil Rytarowski LLDB_LOG(log, "no action specified for pid {0} tid {1}", GetID(), 420f07a9995SKamil Rytarowski thread_sp->GetID()); 42197206d57SZachary Turner return Status(); 422f07a9995SKamil Rytarowski } 423f07a9995SKamil Rytarowski 42497206d57SZachary Turner Status error; 4253eef2b5eSKamil Rytarowski 426f07a9995SKamil Rytarowski switch (action->state) { 427f07a9995SKamil Rytarowski case eStateRunning: { 428f07a9995SKamil Rytarowski // Run the thread, possibly feeding it the signal. 4293eef2b5eSKamil Rytarowski error = NativeProcessNetBSD::PtraceWrapper(PT_CONTINUE, GetID(), (void *)1, 4303eef2b5eSKamil Rytarowski action->signal); 431f07a9995SKamil Rytarowski if (!error.Success()) 432f07a9995SKamil Rytarowski return error; 433f07a9995SKamil Rytarowski for (const auto &thread_sp : m_threads) { 434f07a9995SKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp)->SetRunning(); 435f07a9995SKamil Rytarowski } 436f07a9995SKamil Rytarowski SetState(eStateRunning, true); 437f07a9995SKamil Rytarowski break; 438f07a9995SKamil Rytarowski } 439f07a9995SKamil Rytarowski case eStateStepping: 4403eef2b5eSKamil Rytarowski // Run the thread, possibly feeding it the signal. 4413eef2b5eSKamil Rytarowski error = NativeProcessNetBSD::PtraceWrapper(PT_STEP, GetID(), (void *)1, 4423eef2b5eSKamil Rytarowski action->signal); 4433eef2b5eSKamil Rytarowski if (!error.Success()) 4443eef2b5eSKamil Rytarowski return error; 4453eef2b5eSKamil Rytarowski for (const auto &thread_sp : m_threads) { 4463eef2b5eSKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp)->SetStepping(); 4473eef2b5eSKamil Rytarowski } 4483eef2b5eSKamil Rytarowski SetState(eStateStepping, true); 449f07a9995SKamil Rytarowski break; 450f07a9995SKamil Rytarowski 451f07a9995SKamil Rytarowski case eStateSuspended: 452f07a9995SKamil Rytarowski case eStateStopped: 453f07a9995SKamil Rytarowski llvm_unreachable("Unexpected state"); 454f07a9995SKamil Rytarowski 455f07a9995SKamil Rytarowski default: 45697206d57SZachary Turner return Status("NativeProcessNetBSD::%s (): unexpected state %s specified " 457f07a9995SKamil Rytarowski "for pid %" PRIu64 ", tid %" PRIu64, 458f07a9995SKamil Rytarowski __FUNCTION__, StateAsCString(action->state), GetID(), 459f07a9995SKamil Rytarowski thread_sp->GetID()); 460f07a9995SKamil Rytarowski } 461f07a9995SKamil Rytarowski 46297206d57SZachary Turner return Status(); 463f07a9995SKamil Rytarowski } 464f07a9995SKamil Rytarowski 46597206d57SZachary Turner Status NativeProcessNetBSD::Halt() { 46697206d57SZachary Turner Status error; 467f07a9995SKamil Rytarowski 468f07a9995SKamil Rytarowski if (kill(GetID(), SIGSTOP) != 0) 469f07a9995SKamil Rytarowski error.SetErrorToErrno(); 470f07a9995SKamil Rytarowski 471f07a9995SKamil Rytarowski return error; 472f07a9995SKamil Rytarowski } 473f07a9995SKamil Rytarowski 47497206d57SZachary Turner Status NativeProcessNetBSD::Detach() { 47597206d57SZachary Turner Status error; 476f07a9995SKamil Rytarowski 477f07a9995SKamil Rytarowski // Stop monitoring the inferior. 478f07a9995SKamil Rytarowski m_sigchld_handle.reset(); 479f07a9995SKamil Rytarowski 480f07a9995SKamil Rytarowski // Tell ptrace to detach from the process. 481f07a9995SKamil Rytarowski if (GetID() == LLDB_INVALID_PROCESS_ID) 482f07a9995SKamil Rytarowski return error; 483f07a9995SKamil Rytarowski 484f07a9995SKamil Rytarowski return PtraceWrapper(PT_DETACH, GetID()); 485f07a9995SKamil Rytarowski } 486f07a9995SKamil Rytarowski 48797206d57SZachary Turner Status NativeProcessNetBSD::Signal(int signo) { 48897206d57SZachary Turner Status error; 489f07a9995SKamil Rytarowski 490f07a9995SKamil Rytarowski if (kill(GetID(), signo)) 491f07a9995SKamil Rytarowski error.SetErrorToErrno(); 492f07a9995SKamil Rytarowski 493f07a9995SKamil Rytarowski return error; 494f07a9995SKamil Rytarowski } 495f07a9995SKamil Rytarowski 49697206d57SZachary Turner Status NativeProcessNetBSD::Kill() { 497f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 498f07a9995SKamil Rytarowski LLDB_LOG(log, "pid {0}", GetID()); 499f07a9995SKamil Rytarowski 50097206d57SZachary Turner Status error; 501f07a9995SKamil Rytarowski 502f07a9995SKamil Rytarowski switch (m_state) { 503f07a9995SKamil Rytarowski case StateType::eStateInvalid: 504f07a9995SKamil Rytarowski case StateType::eStateExited: 505f07a9995SKamil Rytarowski case StateType::eStateCrashed: 506f07a9995SKamil Rytarowski case StateType::eStateDetached: 507f07a9995SKamil Rytarowski case StateType::eStateUnloaded: 508f07a9995SKamil Rytarowski // Nothing to do - the process is already dead. 509f07a9995SKamil Rytarowski LLDB_LOG(log, "ignored for PID {0} due to current state: {1}", GetID(), 510f07a9995SKamil Rytarowski StateAsCString(m_state)); 511f07a9995SKamil Rytarowski return error; 512f07a9995SKamil Rytarowski 513f07a9995SKamil Rytarowski case StateType::eStateConnected: 514f07a9995SKamil Rytarowski case StateType::eStateAttaching: 515f07a9995SKamil Rytarowski case StateType::eStateLaunching: 516f07a9995SKamil Rytarowski case StateType::eStateStopped: 517f07a9995SKamil Rytarowski case StateType::eStateRunning: 518f07a9995SKamil Rytarowski case StateType::eStateStepping: 519f07a9995SKamil Rytarowski case StateType::eStateSuspended: 520f07a9995SKamil Rytarowski // We can try to kill a process in these states. 521f07a9995SKamil Rytarowski break; 522f07a9995SKamil Rytarowski } 523f07a9995SKamil Rytarowski 524f07a9995SKamil Rytarowski if (kill(GetID(), SIGKILL) != 0) { 525f07a9995SKamil Rytarowski error.SetErrorToErrno(); 526f07a9995SKamil Rytarowski return error; 527f07a9995SKamil Rytarowski } 528f07a9995SKamil Rytarowski 529f07a9995SKamil Rytarowski return error; 530f07a9995SKamil Rytarowski } 531f07a9995SKamil Rytarowski 53297206d57SZachary Turner Status NativeProcessNetBSD::GetMemoryRegionInfo(lldb::addr_t load_addr, 533f07a9995SKamil Rytarowski MemoryRegionInfo &range_info) { 534f07a9995SKamil Rytarowski 535f07a9995SKamil Rytarowski if (m_supports_mem_region == LazyBool::eLazyBoolNo) { 536f07a9995SKamil Rytarowski // We're done. 53797206d57SZachary Turner return Status("unsupported"); 538f07a9995SKamil Rytarowski } 539f07a9995SKamil Rytarowski 54097206d57SZachary Turner Status error = PopulateMemoryRegionCache(); 541f07a9995SKamil Rytarowski if (error.Fail()) { 542f07a9995SKamil Rytarowski return error; 543f07a9995SKamil Rytarowski } 544f07a9995SKamil Rytarowski 545f07a9995SKamil Rytarowski lldb::addr_t prev_base_address = 0; 546f07a9995SKamil Rytarowski // FIXME start by finding the last region that is <= target address using 547f07a9995SKamil Rytarowski // binary search. Data is sorted. 548f07a9995SKamil Rytarowski // There can be a ton of regions on pthreads apps with lots of threads. 549f07a9995SKamil Rytarowski for (auto it = m_mem_region_cache.begin(); it != m_mem_region_cache.end(); 550f07a9995SKamil Rytarowski ++it) { 551f07a9995SKamil Rytarowski MemoryRegionInfo &proc_entry_info = it->first; 552f07a9995SKamil Rytarowski // Sanity check assumption that memory map entries are ascending. 553f07a9995SKamil Rytarowski assert((proc_entry_info.GetRange().GetRangeBase() >= prev_base_address) && 554f07a9995SKamil Rytarowski "descending memory map entries detected, unexpected"); 555f07a9995SKamil Rytarowski prev_base_address = proc_entry_info.GetRange().GetRangeBase(); 556f07a9995SKamil Rytarowski UNUSED_IF_ASSERT_DISABLED(prev_base_address); 55736e23ecaSKamil Rytarowski // If the target address comes before this entry, indicate distance to 55836e23ecaSKamil Rytarowski // next region. 559f07a9995SKamil Rytarowski if (load_addr < proc_entry_info.GetRange().GetRangeBase()) { 560f07a9995SKamil Rytarowski range_info.GetRange().SetRangeBase(load_addr); 561f07a9995SKamil Rytarowski range_info.GetRange().SetByteSize( 562f07a9995SKamil Rytarowski proc_entry_info.GetRange().GetRangeBase() - load_addr); 563f07a9995SKamil Rytarowski range_info.SetReadable(MemoryRegionInfo::OptionalBool::eNo); 564f07a9995SKamil Rytarowski range_info.SetWritable(MemoryRegionInfo::OptionalBool::eNo); 565f07a9995SKamil Rytarowski range_info.SetExecutable(MemoryRegionInfo::OptionalBool::eNo); 566f07a9995SKamil Rytarowski range_info.SetMapped(MemoryRegionInfo::OptionalBool::eNo); 567f07a9995SKamil Rytarowski return error; 568f07a9995SKamil Rytarowski } else if (proc_entry_info.GetRange().Contains(load_addr)) { 569f07a9995SKamil Rytarowski // The target address is within the memory region we're processing here. 570f07a9995SKamil Rytarowski range_info = proc_entry_info; 571f07a9995SKamil Rytarowski return error; 572f07a9995SKamil Rytarowski } 573f07a9995SKamil Rytarowski // The target memory address comes somewhere after the region we just 574f07a9995SKamil Rytarowski // parsed. 575f07a9995SKamil Rytarowski } 576f07a9995SKamil Rytarowski // If we made it here, we didn't find an entry that contained the given 577f07a9995SKamil Rytarowski // address. Return the 57836e23ecaSKamil Rytarowski // load_addr as start and the amount of bytes betwwen load address and the 57936e23ecaSKamil Rytarowski // end of the memory as size. 580f07a9995SKamil Rytarowski range_info.GetRange().SetRangeBase(load_addr); 581f07a9995SKamil Rytarowski range_info.GetRange().SetRangeEnd(LLDB_INVALID_ADDRESS); 582f07a9995SKamil Rytarowski range_info.SetReadable(MemoryRegionInfo::OptionalBool::eNo); 583f07a9995SKamil Rytarowski range_info.SetWritable(MemoryRegionInfo::OptionalBool::eNo); 584f07a9995SKamil Rytarowski range_info.SetExecutable(MemoryRegionInfo::OptionalBool::eNo); 585f07a9995SKamil Rytarowski range_info.SetMapped(MemoryRegionInfo::OptionalBool::eNo); 586f07a9995SKamil Rytarowski return error; 587f07a9995SKamil Rytarowski } 588f07a9995SKamil Rytarowski 58997206d57SZachary Turner Status NativeProcessNetBSD::PopulateMemoryRegionCache() { 590f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 591f07a9995SKamil Rytarowski // If our cache is empty, pull the latest. There should always be at least 592f07a9995SKamil Rytarowski // one memory region if memory region handling is supported. 593f07a9995SKamil Rytarowski if (!m_mem_region_cache.empty()) { 594f07a9995SKamil Rytarowski LLDB_LOG(log, "reusing {0} cached memory region entries", 595f07a9995SKamil Rytarowski m_mem_region_cache.size()); 59697206d57SZachary Turner return Status(); 597f07a9995SKamil Rytarowski } 598f07a9995SKamil Rytarowski 599f07a9995SKamil Rytarowski struct kinfo_vmentry *vm; 600f07a9995SKamil Rytarowski size_t count, i; 601f07a9995SKamil Rytarowski vm = kinfo_getvmmap(GetID(), &count); 602f07a9995SKamil Rytarowski if (vm == NULL) { 603f07a9995SKamil Rytarowski m_supports_mem_region = LazyBool::eLazyBoolNo; 60497206d57SZachary Turner Status error; 605f07a9995SKamil Rytarowski error.SetErrorString("not supported"); 606f07a9995SKamil Rytarowski return error; 607f07a9995SKamil Rytarowski } 608f07a9995SKamil Rytarowski for (i = 0; i < count; i++) { 609f07a9995SKamil Rytarowski MemoryRegionInfo info; 610f07a9995SKamil Rytarowski info.Clear(); 611f07a9995SKamil Rytarowski info.GetRange().SetRangeBase(vm[i].kve_start); 612f07a9995SKamil Rytarowski info.GetRange().SetRangeEnd(vm[i].kve_end); 613f07a9995SKamil Rytarowski info.SetMapped(MemoryRegionInfo::OptionalBool::eYes); 614f07a9995SKamil Rytarowski 615f07a9995SKamil Rytarowski if (vm[i].kve_protection & VM_PROT_READ) 616f07a9995SKamil Rytarowski info.SetReadable(MemoryRegionInfo::OptionalBool::eYes); 617f07a9995SKamil Rytarowski else 618f07a9995SKamil Rytarowski info.SetReadable(MemoryRegionInfo::OptionalBool::eNo); 619f07a9995SKamil Rytarowski 620f07a9995SKamil Rytarowski if (vm[i].kve_protection & VM_PROT_WRITE) 621f07a9995SKamil Rytarowski info.SetWritable(MemoryRegionInfo::OptionalBool::eYes); 622f07a9995SKamil Rytarowski else 623f07a9995SKamil Rytarowski info.SetWritable(MemoryRegionInfo::OptionalBool::eNo); 624f07a9995SKamil Rytarowski 625f07a9995SKamil Rytarowski if (vm[i].kve_protection & VM_PROT_EXECUTE) 626f07a9995SKamil Rytarowski info.SetExecutable(MemoryRegionInfo::OptionalBool::eYes); 627f07a9995SKamil Rytarowski else 628f07a9995SKamil Rytarowski info.SetExecutable(MemoryRegionInfo::OptionalBool::eNo); 629f07a9995SKamil Rytarowski 630f07a9995SKamil Rytarowski if (vm[i].kve_path[0]) 631f07a9995SKamil Rytarowski info.SetName(vm[i].kve_path); 632f07a9995SKamil Rytarowski 633f07a9995SKamil Rytarowski m_mem_region_cache.emplace_back( 634f07a9995SKamil Rytarowski info, FileSpec(info.GetName().GetCString(), true)); 635f07a9995SKamil Rytarowski } 636f07a9995SKamil Rytarowski free(vm); 637f07a9995SKamil Rytarowski 638f07a9995SKamil Rytarowski if (m_mem_region_cache.empty()) { 639f07a9995SKamil Rytarowski // No entries after attempting to read them. This shouldn't happen. 640f07a9995SKamil Rytarowski // Assume we don't support map entries. 641f07a9995SKamil Rytarowski LLDB_LOG(log, "failed to find any vmmap entries, assuming no support " 642f07a9995SKamil Rytarowski "for memory region metadata retrieval"); 643f07a9995SKamil Rytarowski m_supports_mem_region = LazyBool::eLazyBoolNo; 64497206d57SZachary Turner Status error; 645f07a9995SKamil Rytarowski error.SetErrorString("not supported"); 646f07a9995SKamil Rytarowski return error; 647f07a9995SKamil Rytarowski } 648f07a9995SKamil Rytarowski LLDB_LOG(log, "read {0} memory region entries from process {1}", 649f07a9995SKamil Rytarowski m_mem_region_cache.size(), GetID()); 650f07a9995SKamil Rytarowski // We support memory retrieval, remember that. 651f07a9995SKamil Rytarowski m_supports_mem_region = LazyBool::eLazyBoolYes; 65297206d57SZachary Turner return Status(); 653f07a9995SKamil Rytarowski } 654f07a9995SKamil Rytarowski 65597206d57SZachary Turner Status NativeProcessNetBSD::AllocateMemory(size_t size, uint32_t permissions, 656f07a9995SKamil Rytarowski lldb::addr_t &addr) { 65797206d57SZachary Turner return Status("Unimplemented"); 658f07a9995SKamil Rytarowski } 659f07a9995SKamil Rytarowski 66097206d57SZachary Turner Status NativeProcessNetBSD::DeallocateMemory(lldb::addr_t addr) { 66197206d57SZachary Turner return Status("Unimplemented"); 662f07a9995SKamil Rytarowski } 663f07a9995SKamil Rytarowski 664f07a9995SKamil Rytarowski lldb::addr_t NativeProcessNetBSD::GetSharedLibraryInfoAddress() { 665f07a9995SKamil Rytarowski // punt on this for now 666f07a9995SKamil Rytarowski return LLDB_INVALID_ADDRESS; 667f07a9995SKamil Rytarowski } 668f07a9995SKamil Rytarowski 669f07a9995SKamil Rytarowski size_t NativeProcessNetBSD::UpdateThreads() { return m_threads.size(); } 670f07a9995SKamil Rytarowski 671f07a9995SKamil Rytarowski bool NativeProcessNetBSD::GetArchitecture(ArchSpec &arch) const { 672f07a9995SKamil Rytarowski arch = m_arch; 673f07a9995SKamil Rytarowski return true; 674f07a9995SKamil Rytarowski } 675f07a9995SKamil Rytarowski 67697206d57SZachary Turner Status NativeProcessNetBSD::SetBreakpoint(lldb::addr_t addr, uint32_t size, 677f07a9995SKamil Rytarowski bool hardware) { 678f07a9995SKamil Rytarowski if (hardware) 67997206d57SZachary Turner return Status("NativeProcessNetBSD does not support hardware breakpoints"); 680f07a9995SKamil Rytarowski else 681f07a9995SKamil Rytarowski return SetSoftwareBreakpoint(addr, size); 682f07a9995SKamil Rytarowski } 683f07a9995SKamil Rytarowski 68497206d57SZachary Turner Status NativeProcessNetBSD::GetSoftwareBreakpointTrapOpcode( 685f07a9995SKamil Rytarowski size_t trap_opcode_size_hint, size_t &actual_opcode_size, 686f07a9995SKamil Rytarowski const uint8_t *&trap_opcode_bytes) { 687f07a9995SKamil Rytarowski static const uint8_t g_i386_opcode[] = {0xCC}; 688f07a9995SKamil Rytarowski 689f07a9995SKamil Rytarowski switch (m_arch.GetMachine()) { 690f07a9995SKamil Rytarowski case llvm::Triple::x86: 691f07a9995SKamil Rytarowski case llvm::Triple::x86_64: 692f07a9995SKamil Rytarowski trap_opcode_bytes = g_i386_opcode; 693f07a9995SKamil Rytarowski actual_opcode_size = sizeof(g_i386_opcode); 69497206d57SZachary Turner return Status(); 695f07a9995SKamil Rytarowski default: 696f07a9995SKamil Rytarowski assert(false && "CPU type not supported!"); 69797206d57SZachary Turner return Status("CPU type not supported"); 698f07a9995SKamil Rytarowski } 699f07a9995SKamil Rytarowski } 700f07a9995SKamil Rytarowski 70197206d57SZachary Turner Status NativeProcessNetBSD::GetLoadedModuleFileSpec(const char *module_path, 702f07a9995SKamil Rytarowski FileSpec &file_spec) { 70397206d57SZachary Turner return Status("Unimplemented"); 704f07a9995SKamil Rytarowski } 705f07a9995SKamil Rytarowski 70697206d57SZachary Turner Status NativeProcessNetBSD::GetFileLoadAddress(const llvm::StringRef &file_name, 707f07a9995SKamil Rytarowski lldb::addr_t &load_addr) { 708f07a9995SKamil Rytarowski load_addr = LLDB_INVALID_ADDRESS; 70997206d57SZachary Turner return Status(); 710f07a9995SKamil Rytarowski } 711f07a9995SKamil Rytarowski 71297206d57SZachary Turner Status NativeProcessNetBSD::LaunchInferior(MainLoop &mainloop, 713f07a9995SKamil Rytarowski ProcessLaunchInfo &launch_info) { 71497206d57SZachary Turner Status error; 715f07a9995SKamil Rytarowski m_sigchld_handle = mainloop.RegisterSignal( 716f07a9995SKamil Rytarowski SIGCHLD, [this](MainLoopBase &) { SigchldHandler(); }, error); 717f07a9995SKamil Rytarowski if (!m_sigchld_handle) 718f07a9995SKamil Rytarowski return error; 719f07a9995SKamil Rytarowski 720f07a9995SKamil Rytarowski SetState(eStateLaunching); 721f07a9995SKamil Rytarowski 722f07a9995SKamil Rytarowski ::pid_t pid = ProcessLauncherPosixFork() 723f07a9995SKamil Rytarowski .LaunchProcess(launch_info, error) 724f07a9995SKamil Rytarowski .GetProcessId(); 725f07a9995SKamil Rytarowski if (error.Fail()) 726f07a9995SKamil Rytarowski return error; 727f07a9995SKamil Rytarowski 728f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 729f07a9995SKamil Rytarowski 730f07a9995SKamil Rytarowski // Wait for the child process to trap on its call to execve. 731f07a9995SKamil Rytarowski ::pid_t wpid; 732f07a9995SKamil Rytarowski int status; 733f07a9995SKamil Rytarowski if ((wpid = waitpid(pid, &status, 0)) < 0) { 734f07a9995SKamil Rytarowski error.SetErrorToErrno(); 735f07a9995SKamil Rytarowski LLDB_LOG(log, "waitpid for inferior failed with %s", error); 736f07a9995SKamil Rytarowski 737f07a9995SKamil Rytarowski // Mark the inferior as invalid. 73836e23ecaSKamil Rytarowski // FIXME this could really use a new state - eStateLaunchFailure. For 73936e23ecaSKamil Rytarowski // now, using eStateInvalid. 740f07a9995SKamil Rytarowski SetState(StateType::eStateInvalid); 741f07a9995SKamil Rytarowski 742f07a9995SKamil Rytarowski return error; 743f07a9995SKamil Rytarowski } 744f07a9995SKamil Rytarowski assert(WIFSTOPPED(status) && (wpid == static_cast<::pid_t>(pid)) && 745f07a9995SKamil Rytarowski "Could not sync with inferior process."); 746f07a9995SKamil Rytarowski 747f07a9995SKamil Rytarowski LLDB_LOG(log, "inferior started, now in stopped state"); 748f07a9995SKamil Rytarowski 749f07a9995SKamil Rytarowski // Release the master terminal descriptor and pass it off to the 750f07a9995SKamil Rytarowski // NativeProcessNetBSD instance. Similarly stash the inferior pid. 751f07a9995SKamil Rytarowski m_terminal_fd = launch_info.GetPTY().ReleaseMasterFileDescriptor(); 752f07a9995SKamil Rytarowski m_pid = pid; 753f07a9995SKamil Rytarowski launch_info.SetProcessID(pid); 754f07a9995SKamil Rytarowski 755f07a9995SKamil Rytarowski if (m_terminal_fd != -1) { 756f07a9995SKamil Rytarowski error = EnsureFDFlags(m_terminal_fd, O_NONBLOCK); 757f07a9995SKamil Rytarowski if (error.Fail()) { 758f07a9995SKamil Rytarowski LLDB_LOG(log, 759f07a9995SKamil Rytarowski "inferior EnsureFDFlags failed for ensuring terminal " 760f07a9995SKamil Rytarowski "O_NONBLOCK setting: {0}", 761f07a9995SKamil Rytarowski error); 762f07a9995SKamil Rytarowski 763f07a9995SKamil Rytarowski // Mark the inferior as invalid. 764f07a9995SKamil Rytarowski // FIXME this could really use a new state - eStateLaunchFailure. For 765f07a9995SKamil Rytarowski // now, using eStateInvalid. 766f07a9995SKamil Rytarowski SetState(StateType::eStateInvalid); 767f07a9995SKamil Rytarowski 768f07a9995SKamil Rytarowski return error; 769f07a9995SKamil Rytarowski } 770f07a9995SKamil Rytarowski } 771f07a9995SKamil Rytarowski 772f07a9995SKamil Rytarowski LLDB_LOG(log, "adding pid = {0}", pid); 773f07a9995SKamil Rytarowski 774f07a9995SKamil Rytarowski ResolveProcessArchitecture(m_pid, m_arch); 775f07a9995SKamil Rytarowski 7763eef2b5eSKamil Rytarowski error = ReinitializeThreads(); 777f07a9995SKamil Rytarowski if (error.Fail()) { 778f07a9995SKamil Rytarowski SetState(StateType::eStateInvalid); 779f07a9995SKamil Rytarowski return error; 780f07a9995SKamil Rytarowski } 781f07a9995SKamil Rytarowski 78236e23ecaSKamil Rytarowski for (const auto &thread_sp : m_threads) { 78336e23ecaSKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp)->SetStoppedBySignal( 78436e23ecaSKamil Rytarowski SIGSTOP); 78536e23ecaSKamil Rytarowski } 78636e23ecaSKamil Rytarowski 787f07a9995SKamil Rytarowski /* Set process stopped */ 788f07a9995SKamil Rytarowski SetState(StateType::eStateStopped); 789f07a9995SKamil Rytarowski 790f07a9995SKamil Rytarowski if (error.Fail()) 791f07a9995SKamil Rytarowski LLDB_LOG(log, "inferior launching failed {0}", error); 792f07a9995SKamil Rytarowski return error; 793f07a9995SKamil Rytarowski } 794f07a9995SKamil Rytarowski 795f07a9995SKamil Rytarowski void NativeProcessNetBSD::AttachToInferior(MainLoop &mainloop, lldb::pid_t pid, 79697206d57SZachary Turner Status &error) { 797f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 798f07a9995SKamil Rytarowski LLDB_LOG(log, "pid = {0:x}", pid); 799f07a9995SKamil Rytarowski 800f07a9995SKamil Rytarowski m_sigchld_handle = mainloop.RegisterSignal( 801f07a9995SKamil Rytarowski SIGCHLD, [this](MainLoopBase &) { SigchldHandler(); }, error); 802f07a9995SKamil Rytarowski if (!m_sigchld_handle) 803f07a9995SKamil Rytarowski return; 804f07a9995SKamil Rytarowski 805f07a9995SKamil Rytarowski error = ResolveProcessArchitecture(pid, m_arch); 806f07a9995SKamil Rytarowski if (!error.Success()) 807f07a9995SKamil Rytarowski return; 808f07a9995SKamil Rytarowski 809f07a9995SKamil Rytarowski // Set the architecture to the exe architecture. 810f07a9995SKamil Rytarowski LLDB_LOG(log, "pid = {0:x}, detected architecture {1}", pid, 811f07a9995SKamil Rytarowski m_arch.GetArchitectureName()); 812f07a9995SKamil Rytarowski 813f07a9995SKamil Rytarowski m_pid = pid; 814f07a9995SKamil Rytarowski SetState(eStateAttaching); 815f07a9995SKamil Rytarowski 816f07a9995SKamil Rytarowski Attach(pid, error); 817f07a9995SKamil Rytarowski } 818f07a9995SKamil Rytarowski 819f07a9995SKamil Rytarowski void NativeProcessNetBSD::SigchldHandler() { 820f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 821f07a9995SKamil Rytarowski // Process all pending waitpid notifications. 822f07a9995SKamil Rytarowski int status; 823f07a9995SKamil Rytarowski ::pid_t wait_pid = waitpid(GetID(), &status, WALLSIG | WNOHANG); 824f07a9995SKamil Rytarowski 825f07a9995SKamil Rytarowski if (wait_pid == 0) 826f07a9995SKamil Rytarowski return; // We are done. 827f07a9995SKamil Rytarowski 828f07a9995SKamil Rytarowski if (wait_pid == -1) { 829f07a9995SKamil Rytarowski if (errno == EINTR) 830f07a9995SKamil Rytarowski return; 831f07a9995SKamil Rytarowski 83297206d57SZachary Turner Status error(errno, eErrorTypePOSIX); 833f07a9995SKamil Rytarowski LLDB_LOG(log, "waitpid ({0}, &status, _) failed: {1}", GetID(), error); 834f07a9995SKamil Rytarowski } 835f07a9995SKamil Rytarowski 8363508fc8cSPavel Labath WaitStatus wait_status = WaitStatus::Decode(status); 8373508fc8cSPavel Labath bool exited = wait_status.type == WaitStatus::Exit || 8383508fc8cSPavel Labath (wait_status.type == WaitStatus::Signal && 8393508fc8cSPavel Labath wait_pid == static_cast<::pid_t>(GetID())); 840f07a9995SKamil Rytarowski 841f07a9995SKamil Rytarowski LLDB_LOG(log, 8423508fc8cSPavel Labath "waitpid ({0}, &status, _) => pid = {1}, status = {2}, exited = {3}", 8433508fc8cSPavel Labath GetID(), wait_pid, status, exited); 844f07a9995SKamil Rytarowski 845f07a9995SKamil Rytarowski if (exited) 8463508fc8cSPavel Labath MonitorExited(wait_pid, wait_status); 8473508fc8cSPavel Labath else { 848*4bb74415SKamil Rytarowski assert(wait_status.type == WaitStatus::Stop); 8493508fc8cSPavel Labath MonitorCallback(wait_pid, wait_status.status); 8503508fc8cSPavel Labath } 851f07a9995SKamil Rytarowski } 852f07a9995SKamil Rytarowski 853269eec03SKamil Rytarowski bool NativeProcessNetBSD::HasThreadNoLock(lldb::tid_t thread_id) { 854269eec03SKamil Rytarowski for (auto thread_sp : m_threads) { 855269eec03SKamil Rytarowski assert(thread_sp && "thread list should not contain NULL threads"); 856269eec03SKamil Rytarowski if (thread_sp->GetID() == thread_id) { 857269eec03SKamil Rytarowski // We have this thread. 858269eec03SKamil Rytarowski return true; 859269eec03SKamil Rytarowski } 860269eec03SKamil Rytarowski } 861269eec03SKamil Rytarowski 862269eec03SKamil Rytarowski // We don't have this thread. 863269eec03SKamil Rytarowski return false; 864269eec03SKamil Rytarowski } 865269eec03SKamil Rytarowski 866f07a9995SKamil Rytarowski NativeThreadNetBSDSP NativeProcessNetBSD::AddThread(lldb::tid_t thread_id) { 867f07a9995SKamil Rytarowski 868f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_THREAD)); 869f07a9995SKamil Rytarowski LLDB_LOG(log, "pid {0} adding thread with tid {1}", GetID(), thread_id); 870f07a9995SKamil Rytarowski 871f07a9995SKamil Rytarowski assert(!HasThreadNoLock(thread_id) && 872f07a9995SKamil Rytarowski "attempted to add a thread by id that already exists"); 873f07a9995SKamil Rytarowski 874f07a9995SKamil Rytarowski // If this is the first thread, save it as the current thread 875f07a9995SKamil Rytarowski if (m_threads.empty()) 876f07a9995SKamil Rytarowski SetCurrentThreadID(thread_id); 877f07a9995SKamil Rytarowski 878f07a9995SKamil Rytarowski auto thread_sp = std::make_shared<NativeThreadNetBSD>(this, thread_id); 879f07a9995SKamil Rytarowski m_threads.push_back(thread_sp); 880f07a9995SKamil Rytarowski return thread_sp; 881f07a9995SKamil Rytarowski } 882f07a9995SKamil Rytarowski 88397206d57SZachary Turner ::pid_t NativeProcessNetBSD::Attach(lldb::pid_t pid, Status &error) { 884f07a9995SKamil Rytarowski if (pid <= 1) { 885f07a9995SKamil Rytarowski error.SetErrorToGenericError(); 886f07a9995SKamil Rytarowski error.SetErrorString("Attaching to process 1 is not allowed."); 887f07a9995SKamil Rytarowski return -1; 888f07a9995SKamil Rytarowski } 889f07a9995SKamil Rytarowski 890f07a9995SKamil Rytarowski // Attach to the requested process. 891f07a9995SKamil Rytarowski // An attach will cause the thread to stop with a SIGSTOP. 892f07a9995SKamil Rytarowski error = PtraceWrapper(PT_ATTACH, pid); 893f07a9995SKamil Rytarowski if (error.Fail()) 894f07a9995SKamil Rytarowski return -1; 895f07a9995SKamil Rytarowski 896f07a9995SKamil Rytarowski int status; 897f07a9995SKamil Rytarowski // Need to use WALLSIG otherwise we receive an error with errno=ECHLD 898f07a9995SKamil Rytarowski // At this point we should have a thread stopped if waitpid succeeds. 899f07a9995SKamil Rytarowski if ((status = waitpid(pid, NULL, WALLSIG)) < 0) 900f07a9995SKamil Rytarowski return -1; 901f07a9995SKamil Rytarowski 902f07a9995SKamil Rytarowski m_pid = pid; 903f07a9995SKamil Rytarowski 904f07a9995SKamil Rytarowski /* Initialize threads */ 9053eef2b5eSKamil Rytarowski error = ReinitializeThreads(); 906f07a9995SKamil Rytarowski if (error.Fail()) { 907f07a9995SKamil Rytarowski SetState(StateType::eStateInvalid); 908f07a9995SKamil Rytarowski return -1; 909f07a9995SKamil Rytarowski } 910f07a9995SKamil Rytarowski 91136e23ecaSKamil Rytarowski for (const auto &thread_sp : m_threads) { 91236e23ecaSKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp)->SetStoppedBySignal( 91336e23ecaSKamil Rytarowski SIGSTOP); 91436e23ecaSKamil Rytarowski } 91536e23ecaSKamil Rytarowski 916f07a9995SKamil Rytarowski // Let our process instance know the thread has stopped. 917f07a9995SKamil Rytarowski SetState(StateType::eStateStopped); 918f07a9995SKamil Rytarowski 919f07a9995SKamil Rytarowski return pid; 920f07a9995SKamil Rytarowski } 921f07a9995SKamil Rytarowski 92297206d57SZachary Turner Status NativeProcessNetBSD::ReadMemory(lldb::addr_t addr, void *buf, 92397206d57SZachary Turner size_t size, size_t &bytes_read) { 924f07a9995SKamil Rytarowski unsigned char *dst = static_cast<unsigned char *>(buf); 925f07a9995SKamil Rytarowski struct ptrace_io_desc io; 926f07a9995SKamil Rytarowski 927f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_MEMORY)); 928f07a9995SKamil Rytarowski LLDB_LOG(log, "addr = {0}, buf = {1}, size = {2}", addr, buf, size); 929f07a9995SKamil Rytarowski 930f07a9995SKamil Rytarowski bytes_read = 0; 931f07a9995SKamil Rytarowski io.piod_op = PIOD_READ_D; 932f07a9995SKamil Rytarowski io.piod_len = size; 933f07a9995SKamil Rytarowski 934f07a9995SKamil Rytarowski do { 935f07a9995SKamil Rytarowski io.piod_offs = (void *)(addr + bytes_read); 936f07a9995SKamil Rytarowski io.piod_addr = dst + bytes_read; 937f07a9995SKamil Rytarowski 93897206d57SZachary Turner Status error = NativeProcessNetBSD::PtraceWrapper(PT_IO, GetID(), &io); 939f07a9995SKamil Rytarowski if (error.Fail()) 940f07a9995SKamil Rytarowski return error; 941f07a9995SKamil Rytarowski 942f07a9995SKamil Rytarowski bytes_read = io.piod_len; 943f07a9995SKamil Rytarowski io.piod_len = size - bytes_read; 944f07a9995SKamil Rytarowski } while (bytes_read < size); 945f07a9995SKamil Rytarowski 94697206d57SZachary Turner return Status(); 947f07a9995SKamil Rytarowski } 948f07a9995SKamil Rytarowski 94997206d57SZachary Turner Status NativeProcessNetBSD::ReadMemoryWithoutTrap(lldb::addr_t addr, void *buf, 950f07a9995SKamil Rytarowski size_t size, 951f07a9995SKamil Rytarowski size_t &bytes_read) { 95297206d57SZachary Turner Status error = ReadMemory(addr, buf, size, bytes_read); 953f07a9995SKamil Rytarowski if (error.Fail()) 954f07a9995SKamil Rytarowski return error; 955f07a9995SKamil Rytarowski return m_breakpoint_list.RemoveTrapsFromBuffer(addr, buf, size); 956f07a9995SKamil Rytarowski } 957f07a9995SKamil Rytarowski 95897206d57SZachary Turner Status NativeProcessNetBSD::WriteMemory(lldb::addr_t addr, const void *buf, 959f07a9995SKamil Rytarowski size_t size, size_t &bytes_written) { 960f07a9995SKamil Rytarowski const unsigned char *src = static_cast<const unsigned char *>(buf); 96197206d57SZachary Turner Status error; 962f07a9995SKamil Rytarowski struct ptrace_io_desc io; 963f07a9995SKamil Rytarowski 964f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_MEMORY)); 965f07a9995SKamil Rytarowski LLDB_LOG(log, "addr = {0}, buf = {1}, size = {2}", addr, buf, size); 966f07a9995SKamil Rytarowski 967f07a9995SKamil Rytarowski bytes_written = 0; 968f07a9995SKamil Rytarowski io.piod_op = PIOD_WRITE_D; 969f07a9995SKamil Rytarowski io.piod_len = size; 970f07a9995SKamil Rytarowski 971f07a9995SKamil Rytarowski do { 972269eec03SKamil Rytarowski io.piod_addr = const_cast<void *>(static_cast<const void *>(src + bytes_written)); 973f07a9995SKamil Rytarowski io.piod_offs = (void *)(addr + bytes_written); 974f07a9995SKamil Rytarowski 97597206d57SZachary Turner Status error = NativeProcessNetBSD::PtraceWrapper(PT_IO, GetID(), &io); 976f07a9995SKamil Rytarowski if (error.Fail()) 977f07a9995SKamil Rytarowski return error; 978f07a9995SKamil Rytarowski 979f07a9995SKamil Rytarowski bytes_written = io.piod_len; 980f07a9995SKamil Rytarowski io.piod_len = size - bytes_written; 981f07a9995SKamil Rytarowski } while (bytes_written < size); 982f07a9995SKamil Rytarowski 983f07a9995SKamil Rytarowski return error; 984f07a9995SKamil Rytarowski } 985f07a9995SKamil Rytarowski 986f07a9995SKamil Rytarowski llvm::ErrorOr<std::unique_ptr<llvm::MemoryBuffer>> 987f07a9995SKamil Rytarowski NativeProcessNetBSD::GetAuxvData() const { 988f07a9995SKamil Rytarowski /* 989f07a9995SKamil Rytarowski * ELF_AUX_ENTRIES is currently restricted to kernel 990f07a9995SKamil Rytarowski * (<sys/exec_elf.h> r. 1.155 specifies 15) 991f07a9995SKamil Rytarowski * 992f07a9995SKamil Rytarowski * ptrace(2) returns the whole AUXV including extra fiels after AT_NULL this 993f07a9995SKamil Rytarowski * information isn't needed. 994f07a9995SKamil Rytarowski */ 995f07a9995SKamil Rytarowski size_t auxv_size = 100 * sizeof(AuxInfo); 996f07a9995SKamil Rytarowski 997f07a9995SKamil Rytarowski ErrorOr<std::unique_ptr<MemoryBuffer>> buf = 998f07a9995SKamil Rytarowski llvm::MemoryBuffer::getNewMemBuffer(auxv_size); 999f07a9995SKamil Rytarowski 1000269eec03SKamil Rytarowski struct ptrace_io_desc io; 1001269eec03SKamil Rytarowski io.piod_op = PIOD_READ_AUXV; 1002269eec03SKamil Rytarowski io.piod_offs = 0; 1003269eec03SKamil Rytarowski io.piod_addr = const_cast<void *>(static_cast<const void *>(buf.get()->getBufferStart())); 1004269eec03SKamil Rytarowski io.piod_len = auxv_size; 1005f07a9995SKamil Rytarowski 100697206d57SZachary Turner Status error = NativeProcessNetBSD::PtraceWrapper(PT_IO, GetID(), &io); 1007f07a9995SKamil Rytarowski 1008f07a9995SKamil Rytarowski if (error.Fail()) 1009f07a9995SKamil Rytarowski return std::error_code(error.GetError(), std::generic_category()); 1010f07a9995SKamil Rytarowski 1011f07a9995SKamil Rytarowski if (io.piod_len < 1) 1012f07a9995SKamil Rytarowski return std::error_code(ECANCELED, std::generic_category()); 1013f07a9995SKamil Rytarowski 1014f07a9995SKamil Rytarowski return buf; 1015f07a9995SKamil Rytarowski } 10163eef2b5eSKamil Rytarowski 101797206d57SZachary Turner Status NativeProcessNetBSD::ReinitializeThreads() { 10183eef2b5eSKamil Rytarowski // Clear old threads 10193eef2b5eSKamil Rytarowski m_threads.clear(); 10203eef2b5eSKamil Rytarowski 10213eef2b5eSKamil Rytarowski // Initialize new thread 10223eef2b5eSKamil Rytarowski struct ptrace_lwpinfo info = {}; 102397206d57SZachary Turner Status error = PtraceWrapper(PT_LWPINFO, GetID(), &info, sizeof(info)); 10243eef2b5eSKamil Rytarowski if (error.Fail()) { 10253eef2b5eSKamil Rytarowski return error; 10263eef2b5eSKamil Rytarowski } 10273eef2b5eSKamil Rytarowski // Reinitialize from scratch threads and register them in process 10283eef2b5eSKamil Rytarowski while (info.pl_lwpid != 0) { 10293eef2b5eSKamil Rytarowski NativeThreadNetBSDSP thread_sp = AddThread(info.pl_lwpid); 10303eef2b5eSKamil Rytarowski error = PtraceWrapper(PT_LWPINFO, GetID(), &info, sizeof(info)); 10313eef2b5eSKamil Rytarowski if (error.Fail()) { 10323eef2b5eSKamil Rytarowski return error; 10333eef2b5eSKamil Rytarowski } 10343eef2b5eSKamil Rytarowski } 10353eef2b5eSKamil Rytarowski 10363eef2b5eSKamil Rytarowski return error; 10373eef2b5eSKamil Rytarowski } 1038