11a3d19ddSKamil Rytarowski //===-- NativeProcessNetBSD.cpp ------------------------------- -*- C++ -*-===// 21a3d19ddSKamil Rytarowski // 31a3d19ddSKamil Rytarowski // The LLVM Compiler Infrastructure 41a3d19ddSKamil Rytarowski // 51a3d19ddSKamil Rytarowski // This file is distributed under the University of Illinois Open Source 61a3d19ddSKamil Rytarowski // License. See LICENSE.TXT for details. 71a3d19ddSKamil Rytarowski // 81a3d19ddSKamil Rytarowski //===----------------------------------------------------------------------===// 91a3d19ddSKamil Rytarowski 101a3d19ddSKamil Rytarowski #include "NativeProcessNetBSD.h" 111a3d19ddSKamil Rytarowski 121a3d19ddSKamil Rytarowski // C Includes 131a3d19ddSKamil Rytarowski 141a3d19ddSKamil Rytarowski // C++ Includes 151a3d19ddSKamil Rytarowski 161a3d19ddSKamil Rytarowski // Other libraries and framework includes 171a3d19ddSKamil Rytarowski #include "Plugins/Process/POSIX/ProcessPOSIXLog.h" 18f07a9995SKamil Rytarowski #include "lldb/Core/State.h" 19f07a9995SKamil Rytarowski #include "lldb/Host/HostProcess.h" 20f07a9995SKamil Rytarowski #include "lldb/Host/common/NativeBreakpoint.h" 21f07a9995SKamil Rytarowski #include "lldb/Host/common/NativeRegisterContext.h" 22f07a9995SKamil Rytarowski #include "lldb/Host/posix/ProcessLauncherPosixFork.h" 23f07a9995SKamil Rytarowski #include "lldb/Target/Process.h" 24*c1a6b128SPavel Labath #include "llvm/Support/Errno.h" 251a3d19ddSKamil Rytarowski 261a3d19ddSKamil Rytarowski // System includes - They have to be included after framework includes because 271a3d19ddSKamil Rytarowski // they define some 281a3d19ddSKamil Rytarowski // macros which collide with variable names in other modules 29f07a9995SKamil Rytarowski // clang-format off 30f07a9995SKamil Rytarowski #include <sys/types.h> 31f07a9995SKamil Rytarowski #include <sys/ptrace.h> 32f07a9995SKamil Rytarowski #include <sys/sysctl.h> 33f07a9995SKamil Rytarowski #include <sys/wait.h> 34f07a9995SKamil Rytarowski #include <uvm/uvm_prot.h> 35f07a9995SKamil Rytarowski #include <elf.h> 36f07a9995SKamil Rytarowski #include <util.h> 37f07a9995SKamil Rytarowski // clang-format on 381a3d19ddSKamil Rytarowski 391a3d19ddSKamil Rytarowski using namespace lldb; 401a3d19ddSKamil Rytarowski using namespace lldb_private; 411a3d19ddSKamil Rytarowski using namespace lldb_private::process_netbsd; 421a3d19ddSKamil Rytarowski using namespace llvm; 431a3d19ddSKamil Rytarowski 44f07a9995SKamil Rytarowski // Simple helper function to ensure flags are enabled on the given file 45f07a9995SKamil Rytarowski // descriptor. 4697206d57SZachary Turner static Status EnsureFDFlags(int fd, int flags) { 4797206d57SZachary Turner Status error; 48f07a9995SKamil Rytarowski 49f07a9995SKamil Rytarowski int status = fcntl(fd, F_GETFL); 50f07a9995SKamil Rytarowski if (status == -1) { 51f07a9995SKamil Rytarowski error.SetErrorToErrno(); 52f07a9995SKamil Rytarowski return error; 53f07a9995SKamil Rytarowski } 54f07a9995SKamil Rytarowski 55f07a9995SKamil Rytarowski if (fcntl(fd, F_SETFL, status | flags) == -1) { 56f07a9995SKamil Rytarowski error.SetErrorToErrno(); 57f07a9995SKamil Rytarowski return error; 58f07a9995SKamil Rytarowski } 59f07a9995SKamil Rytarowski 60f07a9995SKamil Rytarowski return error; 61f07a9995SKamil Rytarowski } 62f07a9995SKamil Rytarowski 631a3d19ddSKamil Rytarowski // ----------------------------------------------------------------------------- 641a3d19ddSKamil Rytarowski // Public Static Methods 651a3d19ddSKamil Rytarowski // ----------------------------------------------------------------------------- 661a3d19ddSKamil Rytarowski 6797206d57SZachary Turner Status NativeProcessProtocol::Launch( 681a3d19ddSKamil Rytarowski ProcessLaunchInfo &launch_info, 691a3d19ddSKamil Rytarowski NativeProcessProtocol::NativeDelegate &native_delegate, MainLoop &mainloop, 701a3d19ddSKamil Rytarowski NativeProcessProtocolSP &native_process_sp) { 71f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 72f07a9995SKamil Rytarowski 7397206d57SZachary Turner Status error; 74f07a9995SKamil Rytarowski 75f07a9995SKamil Rytarowski // Verify the working directory is valid if one was specified. 76f07a9995SKamil Rytarowski FileSpec working_dir{launch_info.GetWorkingDirectory()}; 77f07a9995SKamil Rytarowski if (working_dir && (!working_dir.ResolvePath() || 78f07a9995SKamil Rytarowski !llvm::sys::fs::is_directory(working_dir.GetPath()))) { 79f07a9995SKamil Rytarowski error.SetErrorStringWithFormat("No such file or directory: %s", 80f07a9995SKamil Rytarowski working_dir.GetCString()); 81f07a9995SKamil Rytarowski return error; 82f07a9995SKamil Rytarowski } 83f07a9995SKamil Rytarowski 84f07a9995SKamil Rytarowski // Create the NativeProcessNetBSD in launch mode. 85f07a9995SKamil Rytarowski native_process_sp.reset(new NativeProcessNetBSD()); 86f07a9995SKamil Rytarowski 87f07a9995SKamil Rytarowski if (!native_process_sp->RegisterNativeDelegate(native_delegate)) { 88f07a9995SKamil Rytarowski native_process_sp.reset(); 89f07a9995SKamil Rytarowski error.SetErrorStringWithFormat("failed to register the native delegate"); 90f07a9995SKamil Rytarowski return error; 91f07a9995SKamil Rytarowski } 92f07a9995SKamil Rytarowski 93f07a9995SKamil Rytarowski error = std::static_pointer_cast<NativeProcessNetBSD>(native_process_sp) 94f07a9995SKamil Rytarowski ->LaunchInferior(mainloop, launch_info); 95f07a9995SKamil Rytarowski 96f07a9995SKamil Rytarowski if (error.Fail()) { 97f07a9995SKamil Rytarowski native_process_sp.reset(); 98f07a9995SKamil Rytarowski LLDB_LOG(log, "failed to launch process: {0}", error); 99f07a9995SKamil Rytarowski return error; 100f07a9995SKamil Rytarowski } 101f07a9995SKamil Rytarowski 102f07a9995SKamil Rytarowski launch_info.SetProcessID(native_process_sp->GetID()); 103f07a9995SKamil Rytarowski 104f07a9995SKamil Rytarowski return error; 1051a3d19ddSKamil Rytarowski } 1061a3d19ddSKamil Rytarowski 10797206d57SZachary Turner Status NativeProcessProtocol::Attach( 1081a3d19ddSKamil Rytarowski lldb::pid_t pid, NativeProcessProtocol::NativeDelegate &native_delegate, 1091a3d19ddSKamil Rytarowski MainLoop &mainloop, NativeProcessProtocolSP &native_process_sp) { 110f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 111f07a9995SKamil Rytarowski LLDB_LOG(log, "pid = {0:x}", pid); 112f07a9995SKamil Rytarowski 113f07a9995SKamil Rytarowski // Retrieve the architecture for the running process. 114f07a9995SKamil Rytarowski ArchSpec process_arch; 11597206d57SZachary Turner Status error = ResolveProcessArchitecture(pid, process_arch); 116f07a9995SKamil Rytarowski if (!error.Success()) 117f07a9995SKamil Rytarowski return error; 118f07a9995SKamil Rytarowski 119f07a9995SKamil Rytarowski std::shared_ptr<NativeProcessNetBSD> native_process_netbsd_sp( 120f07a9995SKamil Rytarowski new NativeProcessNetBSD()); 121f07a9995SKamil Rytarowski 122f07a9995SKamil Rytarowski if (!native_process_netbsd_sp->RegisterNativeDelegate(native_delegate)) { 123f07a9995SKamil Rytarowski error.SetErrorStringWithFormat("failed to register the native delegate"); 124f07a9995SKamil Rytarowski return error; 125f07a9995SKamil Rytarowski } 126f07a9995SKamil Rytarowski 127f07a9995SKamil Rytarowski native_process_netbsd_sp->AttachToInferior(mainloop, pid, error); 128f07a9995SKamil Rytarowski if (!error.Success()) 129f07a9995SKamil Rytarowski return error; 130f07a9995SKamil Rytarowski 131f07a9995SKamil Rytarowski native_process_sp = native_process_netbsd_sp; 132f07a9995SKamil Rytarowski return error; 1331a3d19ddSKamil Rytarowski } 1341a3d19ddSKamil Rytarowski 1351a3d19ddSKamil Rytarowski // ----------------------------------------------------------------------------- 1361a3d19ddSKamil Rytarowski // Public Instance Methods 1371a3d19ddSKamil Rytarowski // ----------------------------------------------------------------------------- 1381a3d19ddSKamil Rytarowski 1391a3d19ddSKamil Rytarowski NativeProcessNetBSD::NativeProcessNetBSD() 140f07a9995SKamil Rytarowski : NativeProcessProtocol(LLDB_INVALID_PROCESS_ID), m_arch(), 141f07a9995SKamil Rytarowski m_supports_mem_region(eLazyBoolCalculate), m_mem_region_cache() {} 142f07a9995SKamil Rytarowski 143f07a9995SKamil Rytarowski // Handles all waitpid events from the inferior process. 144f07a9995SKamil Rytarowski void NativeProcessNetBSD::MonitorCallback(lldb::pid_t pid, int signal) { 145f07a9995SKamil Rytarowski switch (signal) { 146f07a9995SKamil Rytarowski case SIGTRAP: 147f07a9995SKamil Rytarowski return MonitorSIGTRAP(pid); 148f07a9995SKamil Rytarowski case SIGSTOP: 149f07a9995SKamil Rytarowski return MonitorSIGSTOP(pid); 150f07a9995SKamil Rytarowski default: 151f07a9995SKamil Rytarowski return MonitorSignal(pid, signal); 152f07a9995SKamil Rytarowski } 153f07a9995SKamil Rytarowski } 154f07a9995SKamil Rytarowski 1553508fc8cSPavel Labath void NativeProcessNetBSD::MonitorExited(lldb::pid_t pid, WaitStatus status) { 156f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 157f07a9995SKamil Rytarowski 1583508fc8cSPavel Labath LLDB_LOG(log, "got exit signal({0}) , pid = {1}", status, pid); 159f07a9995SKamil Rytarowski 160f07a9995SKamil Rytarowski /* Stop Tracking All Threads attached to Process */ 161f07a9995SKamil Rytarowski m_threads.clear(); 162f07a9995SKamil Rytarowski 1633508fc8cSPavel Labath SetExitStatus(status, true); 164f07a9995SKamil Rytarowski 165f07a9995SKamil Rytarowski // Notify delegate that our process has exited. 166f07a9995SKamil Rytarowski SetState(StateType::eStateExited, true); 167f07a9995SKamil Rytarowski } 168f07a9995SKamil Rytarowski 169f07a9995SKamil Rytarowski void NativeProcessNetBSD::MonitorSIGSTOP(lldb::pid_t pid) { 170f07a9995SKamil Rytarowski ptrace_siginfo_t info; 171f07a9995SKamil Rytarowski 172f07a9995SKamil Rytarowski const auto siginfo_err = 173f07a9995SKamil Rytarowski PtraceWrapper(PT_GET_SIGINFO, pid, &info, sizeof(info)); 174f07a9995SKamil Rytarowski 175f07a9995SKamil Rytarowski // Get details on the signal raised. 176f07a9995SKamil Rytarowski if (siginfo_err.Success()) { 177f07a9995SKamil Rytarowski // Handle SIGSTOP from LLGS (LLDB GDB Server) 178f07a9995SKamil Rytarowski if (info.psi_siginfo.si_code == SI_USER && 179f07a9995SKamil Rytarowski info.psi_siginfo.si_pid == ::getpid()) { 180f07a9995SKamil Rytarowski /* Stop Tracking All Threads attached to Process */ 181f07a9995SKamil Rytarowski for (const auto &thread_sp : m_threads) { 182f07a9995SKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp)->SetStoppedBySignal( 183f07a9995SKamil Rytarowski SIGSTOP, &info.psi_siginfo); 184f07a9995SKamil Rytarowski } 185f07a9995SKamil Rytarowski } 186f07a9995SKamil Rytarowski } 187f07a9995SKamil Rytarowski } 188f07a9995SKamil Rytarowski 189f07a9995SKamil Rytarowski void NativeProcessNetBSD::MonitorSIGTRAP(lldb::pid_t pid) { 190f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 191f07a9995SKamil Rytarowski ptrace_siginfo_t info; 192f07a9995SKamil Rytarowski 193f07a9995SKamil Rytarowski const auto siginfo_err = 194f07a9995SKamil Rytarowski PtraceWrapper(PT_GET_SIGINFO, pid, &info, sizeof(info)); 195f07a9995SKamil Rytarowski 196f07a9995SKamil Rytarowski // Get details on the signal raised. 19736e23ecaSKamil Rytarowski if (siginfo_err.Fail()) { 19836e23ecaSKamil Rytarowski return; 19936e23ecaSKamil Rytarowski } 20036e23ecaSKamil Rytarowski 201f07a9995SKamil Rytarowski switch (info.psi_siginfo.si_code) { 202f07a9995SKamil Rytarowski case TRAP_BRKPT: 203f07a9995SKamil Rytarowski for (const auto &thread_sp : m_threads) { 204f07a9995SKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp) 205f07a9995SKamil Rytarowski ->SetStoppedByBreakpoint(); 206f07a9995SKamil Rytarowski FixupBreakpointPCAsNeeded( 207f07a9995SKamil Rytarowski *static_pointer_cast<NativeThreadNetBSD>(thread_sp)); 208f07a9995SKamil Rytarowski } 209f07a9995SKamil Rytarowski SetState(StateType::eStateStopped, true); 210f07a9995SKamil Rytarowski break; 2113eef2b5eSKamil Rytarowski case TRAP_TRACE: 2123eef2b5eSKamil Rytarowski for (const auto &thread_sp : m_threads) { 2133eef2b5eSKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp)->SetStoppedByTrace(); 2143eef2b5eSKamil Rytarowski } 2153eef2b5eSKamil Rytarowski SetState(StateType::eStateStopped, true); 2163eef2b5eSKamil Rytarowski break; 2173eef2b5eSKamil Rytarowski case TRAP_EXEC: { 21897206d57SZachary Turner Status error = ReinitializeThreads(); 2193eef2b5eSKamil Rytarowski if (error.Fail()) { 2203eef2b5eSKamil Rytarowski SetState(StateType::eStateInvalid); 2213eef2b5eSKamil Rytarowski return; 2223eef2b5eSKamil Rytarowski } 2233eef2b5eSKamil Rytarowski 2243eef2b5eSKamil Rytarowski // Let our delegate know we have just exec'd. 2253eef2b5eSKamil Rytarowski NotifyDidExec(); 2263eef2b5eSKamil Rytarowski 22736e23ecaSKamil Rytarowski for (const auto &thread_sp : m_threads) { 22836e23ecaSKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp)->SetStoppedByExec(); 22936e23ecaSKamil Rytarowski } 2303eef2b5eSKamil Rytarowski SetState(StateType::eStateStopped, true); 2313eef2b5eSKamil Rytarowski } break; 23236e23ecaSKamil Rytarowski case TRAP_DBREG: { 23336e23ecaSKamil Rytarowski // If a watchpoint was hit, report it 23436e23ecaSKamil Rytarowski uint32_t wp_index; 23597206d57SZachary Turner Status error = 23636e23ecaSKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(m_threads[info.psi_lwpid]) 23736e23ecaSKamil Rytarowski ->GetRegisterContext() 23836e23ecaSKamil Rytarowski ->GetWatchpointHitIndex(wp_index, 23936e23ecaSKamil Rytarowski (uintptr_t)info.psi_siginfo.si_addr); 24036e23ecaSKamil Rytarowski if (error.Fail()) 24136e23ecaSKamil Rytarowski LLDB_LOG(log, 24236e23ecaSKamil Rytarowski "received error while checking for watchpoint hits, pid = " 24336e23ecaSKamil Rytarowski "{0}, LWP = {1}, error = {2}", 24436e23ecaSKamil Rytarowski GetID(), info.psi_lwpid, error); 24536e23ecaSKamil Rytarowski if (wp_index != LLDB_INVALID_INDEX32) { 24636e23ecaSKamil Rytarowski for (const auto &thread_sp : m_threads) { 24736e23ecaSKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp) 24836e23ecaSKamil Rytarowski ->SetStoppedByWatchpoint(wp_index); 249f07a9995SKamil Rytarowski } 25036e23ecaSKamil Rytarowski SetState(StateType::eStateStopped, true); 25136e23ecaSKamil Rytarowski break; 25236e23ecaSKamil Rytarowski } 25336e23ecaSKamil Rytarowski 25436e23ecaSKamil Rytarowski // If a breakpoint was hit, report it 25536e23ecaSKamil Rytarowski uint32_t bp_index; 25636e23ecaSKamil Rytarowski error = static_pointer_cast<NativeThreadNetBSD>(m_threads[info.psi_lwpid]) 25736e23ecaSKamil Rytarowski ->GetRegisterContext() 25836e23ecaSKamil Rytarowski ->GetHardwareBreakHitIndex(bp_index, 25936e23ecaSKamil Rytarowski (uintptr_t)info.psi_siginfo.si_addr); 26036e23ecaSKamil Rytarowski if (error.Fail()) 26136e23ecaSKamil Rytarowski LLDB_LOG(log, 26236e23ecaSKamil Rytarowski "received error while checking for hardware " 26336e23ecaSKamil Rytarowski "breakpoint hits, pid = {0}, LWP = {1}, error = {2}", 26436e23ecaSKamil Rytarowski GetID(), info.psi_lwpid, error); 26536e23ecaSKamil Rytarowski if (bp_index != LLDB_INVALID_INDEX32) { 26636e23ecaSKamil Rytarowski for (const auto &thread_sp : m_threads) { 26736e23ecaSKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp) 26836e23ecaSKamil Rytarowski ->SetStoppedByBreakpoint(); 26936e23ecaSKamil Rytarowski } 27036e23ecaSKamil Rytarowski SetState(StateType::eStateStopped, true); 27136e23ecaSKamil Rytarowski break; 27236e23ecaSKamil Rytarowski } 27336e23ecaSKamil Rytarowski } break; 274f07a9995SKamil Rytarowski } 275f07a9995SKamil Rytarowski } 276f07a9995SKamil Rytarowski 277f07a9995SKamil Rytarowski void NativeProcessNetBSD::MonitorSignal(lldb::pid_t pid, int signal) { 278f07a9995SKamil Rytarowski ptrace_siginfo_t info; 279f07a9995SKamil Rytarowski const auto siginfo_err = 280f07a9995SKamil Rytarowski PtraceWrapper(PT_GET_SIGINFO, pid, &info, sizeof(info)); 281f07a9995SKamil Rytarowski 282f07a9995SKamil Rytarowski for (const auto &thread_sp : m_threads) { 283f07a9995SKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp)->SetStoppedBySignal( 284f07a9995SKamil Rytarowski info.psi_siginfo.si_signo, &info.psi_siginfo); 285f07a9995SKamil Rytarowski } 286f07a9995SKamil Rytarowski SetState(StateType::eStateStopped, true); 287f07a9995SKamil Rytarowski } 288f07a9995SKamil Rytarowski 28997206d57SZachary Turner Status NativeProcessNetBSD::PtraceWrapper(int req, lldb::pid_t pid, void *addr, 290f07a9995SKamil Rytarowski int data, int *result) { 291f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PTRACE)); 29297206d57SZachary Turner Status error; 293f07a9995SKamil Rytarowski int ret; 294f07a9995SKamil Rytarowski 295f07a9995SKamil Rytarowski errno = 0; 296f07a9995SKamil Rytarowski ret = ptrace(req, static_cast<::pid_t>(pid), addr, data); 297f07a9995SKamil Rytarowski 298f07a9995SKamil Rytarowski if (ret == -1) 299f07a9995SKamil Rytarowski error.SetErrorToErrno(); 300f07a9995SKamil Rytarowski 301f07a9995SKamil Rytarowski if (result) 302f07a9995SKamil Rytarowski *result = ret; 303f07a9995SKamil Rytarowski 304f07a9995SKamil Rytarowski LLDB_LOG(log, "ptrace({0}, {1}, {2}, {3})={4:x}", req, pid, addr, data, ret); 305f07a9995SKamil Rytarowski 306f07a9995SKamil Rytarowski if (error.Fail()) 307f07a9995SKamil Rytarowski LLDB_LOG(log, "ptrace() failed: {0}", error); 308f07a9995SKamil Rytarowski 309f07a9995SKamil Rytarowski return error; 310f07a9995SKamil Rytarowski } 311f07a9995SKamil Rytarowski 31297206d57SZachary Turner Status NativeProcessNetBSD::GetSoftwareBreakpointPCOffset( 313f07a9995SKamil Rytarowski uint32_t &actual_opcode_size) { 314f07a9995SKamil Rytarowski // FIXME put this behind a breakpoint protocol class that can be 315f07a9995SKamil Rytarowski // set per architecture. Need ARM, MIPS support here. 316f07a9995SKamil Rytarowski static const uint8_t g_i386_opcode[] = {0xCC}; 317f07a9995SKamil Rytarowski switch (m_arch.GetMachine()) { 318f07a9995SKamil Rytarowski case llvm::Triple::x86_64: 319f07a9995SKamil Rytarowski actual_opcode_size = static_cast<uint32_t>(sizeof(g_i386_opcode)); 32097206d57SZachary Turner return Status(); 321f07a9995SKamil Rytarowski default: 322f07a9995SKamil Rytarowski assert(false && "CPU type not supported!"); 32397206d57SZachary Turner return Status("CPU type not supported"); 324f07a9995SKamil Rytarowski } 325f07a9995SKamil Rytarowski } 326f07a9995SKamil Rytarowski 32797206d57SZachary Turner Status 32897206d57SZachary Turner NativeProcessNetBSD::FixupBreakpointPCAsNeeded(NativeThreadNetBSD &thread) { 329f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_BREAKPOINTS)); 33097206d57SZachary Turner Status error; 331f07a9995SKamil Rytarowski // Find out the size of a breakpoint (might depend on where we are in the 332f07a9995SKamil Rytarowski // code). 333f07a9995SKamil Rytarowski NativeRegisterContextSP context_sp = thread.GetRegisterContext(); 334f07a9995SKamil Rytarowski if (!context_sp) { 335f07a9995SKamil Rytarowski error.SetErrorString("cannot get a NativeRegisterContext for the thread"); 336f07a9995SKamil Rytarowski LLDB_LOG(log, "failed: {0}", error); 337f07a9995SKamil Rytarowski return error; 338f07a9995SKamil Rytarowski } 339f07a9995SKamil Rytarowski uint32_t breakpoint_size = 0; 340f07a9995SKamil Rytarowski error = GetSoftwareBreakpointPCOffset(breakpoint_size); 341f07a9995SKamil Rytarowski if (error.Fail()) { 342f07a9995SKamil Rytarowski LLDB_LOG(log, "GetBreakpointSize() failed: {0}", error); 343f07a9995SKamil Rytarowski return error; 344f07a9995SKamil Rytarowski } else 345f07a9995SKamil Rytarowski LLDB_LOG(log, "breakpoint size: {0}", breakpoint_size); 34636e23ecaSKamil Rytarowski // First try probing for a breakpoint at a software breakpoint location: PC 34736e23ecaSKamil Rytarowski // - breakpoint size. 348f07a9995SKamil Rytarowski const lldb::addr_t initial_pc_addr = 349f07a9995SKamil Rytarowski context_sp->GetPCfromBreakpointLocation(); 350f07a9995SKamil Rytarowski lldb::addr_t breakpoint_addr = initial_pc_addr; 351f07a9995SKamil Rytarowski if (breakpoint_size > 0) { 352f07a9995SKamil Rytarowski // Do not allow breakpoint probe to wrap around. 353f07a9995SKamil Rytarowski if (breakpoint_addr >= breakpoint_size) 354f07a9995SKamil Rytarowski breakpoint_addr -= breakpoint_size; 355f07a9995SKamil Rytarowski } 356f07a9995SKamil Rytarowski // Check if we stopped because of a breakpoint. 357f07a9995SKamil Rytarowski NativeBreakpointSP breakpoint_sp; 358f07a9995SKamil Rytarowski error = m_breakpoint_list.GetBreakpoint(breakpoint_addr, breakpoint_sp); 359f07a9995SKamil Rytarowski if (!error.Success() || !breakpoint_sp) { 360f07a9995SKamil Rytarowski // We didn't find one at a software probe location. Nothing to do. 361f07a9995SKamil Rytarowski LLDB_LOG(log, 362f07a9995SKamil Rytarowski "pid {0} no lldb breakpoint found at current pc with " 363f07a9995SKamil Rytarowski "adjustment: {1}", 364f07a9995SKamil Rytarowski GetID(), breakpoint_addr); 36597206d57SZachary Turner return Status(); 366f07a9995SKamil Rytarowski } 367f07a9995SKamil Rytarowski // If the breakpoint is not a software breakpoint, nothing to do. 368f07a9995SKamil Rytarowski if (!breakpoint_sp->IsSoftwareBreakpoint()) { 369f07a9995SKamil Rytarowski LLDB_LOG( 370f07a9995SKamil Rytarowski log, 371f07a9995SKamil Rytarowski "pid {0} breakpoint found at {1:x}, not software, nothing to adjust", 372f07a9995SKamil Rytarowski GetID(), breakpoint_addr); 37397206d57SZachary Turner return Status(); 374f07a9995SKamil Rytarowski } 375f07a9995SKamil Rytarowski // 376f07a9995SKamil Rytarowski // We have a software breakpoint and need to adjust the PC. 377f07a9995SKamil Rytarowski // 378f07a9995SKamil Rytarowski // Sanity check. 379f07a9995SKamil Rytarowski if (breakpoint_size == 0) { 380f07a9995SKamil Rytarowski // Nothing to do! How did we get here? 381f07a9995SKamil Rytarowski LLDB_LOG(log, 382f07a9995SKamil Rytarowski "pid {0} breakpoint found at {1:x}, it is software, but the " 383f07a9995SKamil Rytarowski "size is zero, nothing to do (unexpected)", 384f07a9995SKamil Rytarowski GetID(), breakpoint_addr); 38597206d57SZachary Turner return Status(); 386f07a9995SKamil Rytarowski } 387f07a9995SKamil Rytarowski // 388f07a9995SKamil Rytarowski // We have a software breakpoint and need to adjust the PC. 389f07a9995SKamil Rytarowski // 390f07a9995SKamil Rytarowski // Sanity check. 391f07a9995SKamil Rytarowski if (breakpoint_size == 0) { 392f07a9995SKamil Rytarowski // Nothing to do! How did we get here? 393f07a9995SKamil Rytarowski LLDB_LOG(log, 394f07a9995SKamil Rytarowski "pid {0} breakpoint found at {1:x}, it is software, but the " 395f07a9995SKamil Rytarowski "size is zero, nothing to do (unexpected)", 396f07a9995SKamil Rytarowski GetID(), breakpoint_addr); 39797206d57SZachary Turner return Status(); 398f07a9995SKamil Rytarowski } 399f07a9995SKamil Rytarowski // Change the program counter. 400f07a9995SKamil Rytarowski LLDB_LOG(log, "pid {0} tid {1}: changing PC from {2:x} to {3:x}", GetID(), 401f07a9995SKamil Rytarowski thread.GetID(), initial_pc_addr, breakpoint_addr); 402f07a9995SKamil Rytarowski error = context_sp->SetPC(breakpoint_addr); 403f07a9995SKamil Rytarowski if (error.Fail()) { 404f07a9995SKamil Rytarowski LLDB_LOG(log, "pid {0} tid {1}: failed to set PC: {2}", GetID(), 405f07a9995SKamil Rytarowski thread.GetID(), error); 406f07a9995SKamil Rytarowski return error; 407f07a9995SKamil Rytarowski } 408f07a9995SKamil Rytarowski return error; 409f07a9995SKamil Rytarowski } 410f07a9995SKamil Rytarowski 41197206d57SZachary Turner Status NativeProcessNetBSD::Resume(const ResumeActionList &resume_actions) { 412f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 413f07a9995SKamil Rytarowski LLDB_LOG(log, "pid {0}", GetID()); 414f07a9995SKamil Rytarowski 415f07a9995SKamil Rytarowski const auto &thread_sp = m_threads[0]; 416f07a9995SKamil Rytarowski const ResumeAction *const action = 417f07a9995SKamil Rytarowski resume_actions.GetActionForThread(thread_sp->GetID(), true); 418f07a9995SKamil Rytarowski 419f07a9995SKamil Rytarowski if (action == nullptr) { 420f07a9995SKamil Rytarowski LLDB_LOG(log, "no action specified for pid {0} tid {1}", GetID(), 421f07a9995SKamil Rytarowski thread_sp->GetID()); 42297206d57SZachary Turner return Status(); 423f07a9995SKamil Rytarowski } 424f07a9995SKamil Rytarowski 42597206d57SZachary Turner Status error; 4263eef2b5eSKamil Rytarowski 427f07a9995SKamil Rytarowski switch (action->state) { 428f07a9995SKamil Rytarowski case eStateRunning: { 429f07a9995SKamil Rytarowski // Run the thread, possibly feeding it the signal. 4303eef2b5eSKamil Rytarowski error = NativeProcessNetBSD::PtraceWrapper(PT_CONTINUE, GetID(), (void *)1, 4313eef2b5eSKamil Rytarowski action->signal); 432f07a9995SKamil Rytarowski if (!error.Success()) 433f07a9995SKamil Rytarowski return error; 434f07a9995SKamil Rytarowski for (const auto &thread_sp : m_threads) { 435f07a9995SKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp)->SetRunning(); 436f07a9995SKamil Rytarowski } 437f07a9995SKamil Rytarowski SetState(eStateRunning, true); 438f07a9995SKamil Rytarowski break; 439f07a9995SKamil Rytarowski } 440f07a9995SKamil Rytarowski case eStateStepping: 4413eef2b5eSKamil Rytarowski // Run the thread, possibly feeding it the signal. 4423eef2b5eSKamil Rytarowski error = NativeProcessNetBSD::PtraceWrapper(PT_STEP, GetID(), (void *)1, 4433eef2b5eSKamil Rytarowski action->signal); 4443eef2b5eSKamil Rytarowski if (!error.Success()) 4453eef2b5eSKamil Rytarowski return error; 4463eef2b5eSKamil Rytarowski for (const auto &thread_sp : m_threads) { 4473eef2b5eSKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp)->SetStepping(); 4483eef2b5eSKamil Rytarowski } 4493eef2b5eSKamil Rytarowski SetState(eStateStepping, true); 450f07a9995SKamil Rytarowski break; 451f07a9995SKamil Rytarowski 452f07a9995SKamil Rytarowski case eStateSuspended: 453f07a9995SKamil Rytarowski case eStateStopped: 454f07a9995SKamil Rytarowski llvm_unreachable("Unexpected state"); 455f07a9995SKamil Rytarowski 456f07a9995SKamil Rytarowski default: 45797206d57SZachary Turner return Status("NativeProcessNetBSD::%s (): unexpected state %s specified " 458f07a9995SKamil Rytarowski "for pid %" PRIu64 ", tid %" PRIu64, 459f07a9995SKamil Rytarowski __FUNCTION__, StateAsCString(action->state), GetID(), 460f07a9995SKamil Rytarowski thread_sp->GetID()); 461f07a9995SKamil Rytarowski } 462f07a9995SKamil Rytarowski 46397206d57SZachary Turner return Status(); 464f07a9995SKamil Rytarowski } 465f07a9995SKamil Rytarowski 46697206d57SZachary Turner Status NativeProcessNetBSD::Halt() { 46797206d57SZachary Turner Status error; 468f07a9995SKamil Rytarowski 469f07a9995SKamil Rytarowski if (kill(GetID(), SIGSTOP) != 0) 470f07a9995SKamil Rytarowski error.SetErrorToErrno(); 471f07a9995SKamil Rytarowski 472f07a9995SKamil Rytarowski return error; 473f07a9995SKamil Rytarowski } 474f07a9995SKamil Rytarowski 47597206d57SZachary Turner Status NativeProcessNetBSD::Detach() { 47697206d57SZachary Turner Status error; 477f07a9995SKamil Rytarowski 478f07a9995SKamil Rytarowski // Stop monitoring the inferior. 479f07a9995SKamil Rytarowski m_sigchld_handle.reset(); 480f07a9995SKamil Rytarowski 481f07a9995SKamil Rytarowski // Tell ptrace to detach from the process. 482f07a9995SKamil Rytarowski if (GetID() == LLDB_INVALID_PROCESS_ID) 483f07a9995SKamil Rytarowski return error; 484f07a9995SKamil Rytarowski 485f07a9995SKamil Rytarowski return PtraceWrapper(PT_DETACH, GetID()); 486f07a9995SKamil Rytarowski } 487f07a9995SKamil Rytarowski 48897206d57SZachary Turner Status NativeProcessNetBSD::Signal(int signo) { 48997206d57SZachary Turner Status error; 490f07a9995SKamil Rytarowski 491f07a9995SKamil Rytarowski if (kill(GetID(), signo)) 492f07a9995SKamil Rytarowski error.SetErrorToErrno(); 493f07a9995SKamil Rytarowski 494f07a9995SKamil Rytarowski return error; 495f07a9995SKamil Rytarowski } 496f07a9995SKamil Rytarowski 49797206d57SZachary Turner Status NativeProcessNetBSD::Kill() { 498f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 499f07a9995SKamil Rytarowski LLDB_LOG(log, "pid {0}", GetID()); 500f07a9995SKamil Rytarowski 50197206d57SZachary Turner Status error; 502f07a9995SKamil Rytarowski 503f07a9995SKamil Rytarowski switch (m_state) { 504f07a9995SKamil Rytarowski case StateType::eStateInvalid: 505f07a9995SKamil Rytarowski case StateType::eStateExited: 506f07a9995SKamil Rytarowski case StateType::eStateCrashed: 507f07a9995SKamil Rytarowski case StateType::eStateDetached: 508f07a9995SKamil Rytarowski case StateType::eStateUnloaded: 509f07a9995SKamil Rytarowski // Nothing to do - the process is already dead. 510f07a9995SKamil Rytarowski LLDB_LOG(log, "ignored for PID {0} due to current state: {1}", GetID(), 511f07a9995SKamil Rytarowski StateAsCString(m_state)); 512f07a9995SKamil Rytarowski return error; 513f07a9995SKamil Rytarowski 514f07a9995SKamil Rytarowski case StateType::eStateConnected: 515f07a9995SKamil Rytarowski case StateType::eStateAttaching: 516f07a9995SKamil Rytarowski case StateType::eStateLaunching: 517f07a9995SKamil Rytarowski case StateType::eStateStopped: 518f07a9995SKamil Rytarowski case StateType::eStateRunning: 519f07a9995SKamil Rytarowski case StateType::eStateStepping: 520f07a9995SKamil Rytarowski case StateType::eStateSuspended: 521f07a9995SKamil Rytarowski // We can try to kill a process in these states. 522f07a9995SKamil Rytarowski break; 523f07a9995SKamil Rytarowski } 524f07a9995SKamil Rytarowski 525f07a9995SKamil Rytarowski if (kill(GetID(), SIGKILL) != 0) { 526f07a9995SKamil Rytarowski error.SetErrorToErrno(); 527f07a9995SKamil Rytarowski return error; 528f07a9995SKamil Rytarowski } 529f07a9995SKamil Rytarowski 530f07a9995SKamil Rytarowski return error; 531f07a9995SKamil Rytarowski } 532f07a9995SKamil Rytarowski 53397206d57SZachary Turner Status NativeProcessNetBSD::GetMemoryRegionInfo(lldb::addr_t load_addr, 534f07a9995SKamil Rytarowski MemoryRegionInfo &range_info) { 535f07a9995SKamil Rytarowski 536f07a9995SKamil Rytarowski if (m_supports_mem_region == LazyBool::eLazyBoolNo) { 537f07a9995SKamil Rytarowski // We're done. 53897206d57SZachary Turner return Status("unsupported"); 539f07a9995SKamil Rytarowski } 540f07a9995SKamil Rytarowski 54197206d57SZachary Turner Status error = PopulateMemoryRegionCache(); 542f07a9995SKamil Rytarowski if (error.Fail()) { 543f07a9995SKamil Rytarowski return error; 544f07a9995SKamil Rytarowski } 545f07a9995SKamil Rytarowski 546f07a9995SKamil Rytarowski lldb::addr_t prev_base_address = 0; 547f07a9995SKamil Rytarowski // FIXME start by finding the last region that is <= target address using 548f07a9995SKamil Rytarowski // binary search. Data is sorted. 549f07a9995SKamil Rytarowski // There can be a ton of regions on pthreads apps with lots of threads. 550f07a9995SKamil Rytarowski for (auto it = m_mem_region_cache.begin(); it != m_mem_region_cache.end(); 551f07a9995SKamil Rytarowski ++it) { 552f07a9995SKamil Rytarowski MemoryRegionInfo &proc_entry_info = it->first; 553f07a9995SKamil Rytarowski // Sanity check assumption that memory map entries are ascending. 554f07a9995SKamil Rytarowski assert((proc_entry_info.GetRange().GetRangeBase() >= prev_base_address) && 555f07a9995SKamil Rytarowski "descending memory map entries detected, unexpected"); 556f07a9995SKamil Rytarowski prev_base_address = proc_entry_info.GetRange().GetRangeBase(); 557f07a9995SKamil Rytarowski UNUSED_IF_ASSERT_DISABLED(prev_base_address); 55836e23ecaSKamil Rytarowski // If the target address comes before this entry, indicate distance to 55936e23ecaSKamil Rytarowski // next region. 560f07a9995SKamil Rytarowski if (load_addr < proc_entry_info.GetRange().GetRangeBase()) { 561f07a9995SKamil Rytarowski range_info.GetRange().SetRangeBase(load_addr); 562f07a9995SKamil Rytarowski range_info.GetRange().SetByteSize( 563f07a9995SKamil Rytarowski proc_entry_info.GetRange().GetRangeBase() - load_addr); 564f07a9995SKamil Rytarowski range_info.SetReadable(MemoryRegionInfo::OptionalBool::eNo); 565f07a9995SKamil Rytarowski range_info.SetWritable(MemoryRegionInfo::OptionalBool::eNo); 566f07a9995SKamil Rytarowski range_info.SetExecutable(MemoryRegionInfo::OptionalBool::eNo); 567f07a9995SKamil Rytarowski range_info.SetMapped(MemoryRegionInfo::OptionalBool::eNo); 568f07a9995SKamil Rytarowski return error; 569f07a9995SKamil Rytarowski } else if (proc_entry_info.GetRange().Contains(load_addr)) { 570f07a9995SKamil Rytarowski // The target address is within the memory region we're processing here. 571f07a9995SKamil Rytarowski range_info = proc_entry_info; 572f07a9995SKamil Rytarowski return error; 573f07a9995SKamil Rytarowski } 574f07a9995SKamil Rytarowski // The target memory address comes somewhere after the region we just 575f07a9995SKamil Rytarowski // parsed. 576f07a9995SKamil Rytarowski } 577f07a9995SKamil Rytarowski // If we made it here, we didn't find an entry that contained the given 578f07a9995SKamil Rytarowski // address. Return the 57936e23ecaSKamil Rytarowski // load_addr as start and the amount of bytes betwwen load address and the 58036e23ecaSKamil Rytarowski // end of the memory as size. 581f07a9995SKamil Rytarowski range_info.GetRange().SetRangeBase(load_addr); 582f07a9995SKamil Rytarowski range_info.GetRange().SetRangeEnd(LLDB_INVALID_ADDRESS); 583f07a9995SKamil Rytarowski range_info.SetReadable(MemoryRegionInfo::OptionalBool::eNo); 584f07a9995SKamil Rytarowski range_info.SetWritable(MemoryRegionInfo::OptionalBool::eNo); 585f07a9995SKamil Rytarowski range_info.SetExecutable(MemoryRegionInfo::OptionalBool::eNo); 586f07a9995SKamil Rytarowski range_info.SetMapped(MemoryRegionInfo::OptionalBool::eNo); 587f07a9995SKamil Rytarowski return error; 588f07a9995SKamil Rytarowski } 589f07a9995SKamil Rytarowski 59097206d57SZachary Turner Status NativeProcessNetBSD::PopulateMemoryRegionCache() { 591f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 592f07a9995SKamil Rytarowski // If our cache is empty, pull the latest. There should always be at least 593f07a9995SKamil Rytarowski // one memory region if memory region handling is supported. 594f07a9995SKamil Rytarowski if (!m_mem_region_cache.empty()) { 595f07a9995SKamil Rytarowski LLDB_LOG(log, "reusing {0} cached memory region entries", 596f07a9995SKamil Rytarowski m_mem_region_cache.size()); 59797206d57SZachary Turner return Status(); 598f07a9995SKamil Rytarowski } 599f07a9995SKamil Rytarowski 600f07a9995SKamil Rytarowski struct kinfo_vmentry *vm; 601f07a9995SKamil Rytarowski size_t count, i; 602f07a9995SKamil Rytarowski vm = kinfo_getvmmap(GetID(), &count); 603f07a9995SKamil Rytarowski if (vm == NULL) { 604f07a9995SKamil Rytarowski m_supports_mem_region = LazyBool::eLazyBoolNo; 60597206d57SZachary Turner Status error; 606f07a9995SKamil Rytarowski error.SetErrorString("not supported"); 607f07a9995SKamil Rytarowski return error; 608f07a9995SKamil Rytarowski } 609f07a9995SKamil Rytarowski for (i = 0; i < count; i++) { 610f07a9995SKamil Rytarowski MemoryRegionInfo info; 611f07a9995SKamil Rytarowski info.Clear(); 612f07a9995SKamil Rytarowski info.GetRange().SetRangeBase(vm[i].kve_start); 613f07a9995SKamil Rytarowski info.GetRange().SetRangeEnd(vm[i].kve_end); 614f07a9995SKamil Rytarowski info.SetMapped(MemoryRegionInfo::OptionalBool::eYes); 615f07a9995SKamil Rytarowski 616f07a9995SKamil Rytarowski if (vm[i].kve_protection & VM_PROT_READ) 617f07a9995SKamil Rytarowski info.SetReadable(MemoryRegionInfo::OptionalBool::eYes); 618f07a9995SKamil Rytarowski else 619f07a9995SKamil Rytarowski info.SetReadable(MemoryRegionInfo::OptionalBool::eNo); 620f07a9995SKamil Rytarowski 621f07a9995SKamil Rytarowski if (vm[i].kve_protection & VM_PROT_WRITE) 622f07a9995SKamil Rytarowski info.SetWritable(MemoryRegionInfo::OptionalBool::eYes); 623f07a9995SKamil Rytarowski else 624f07a9995SKamil Rytarowski info.SetWritable(MemoryRegionInfo::OptionalBool::eNo); 625f07a9995SKamil Rytarowski 626f07a9995SKamil Rytarowski if (vm[i].kve_protection & VM_PROT_EXECUTE) 627f07a9995SKamil Rytarowski info.SetExecutable(MemoryRegionInfo::OptionalBool::eYes); 628f07a9995SKamil Rytarowski else 629f07a9995SKamil Rytarowski info.SetExecutable(MemoryRegionInfo::OptionalBool::eNo); 630f07a9995SKamil Rytarowski 631f07a9995SKamil Rytarowski if (vm[i].kve_path[0]) 632f07a9995SKamil Rytarowski info.SetName(vm[i].kve_path); 633f07a9995SKamil Rytarowski 634f07a9995SKamil Rytarowski m_mem_region_cache.emplace_back( 635f07a9995SKamil Rytarowski info, FileSpec(info.GetName().GetCString(), true)); 636f07a9995SKamil Rytarowski } 637f07a9995SKamil Rytarowski free(vm); 638f07a9995SKamil Rytarowski 639f07a9995SKamil Rytarowski if (m_mem_region_cache.empty()) { 640f07a9995SKamil Rytarowski // No entries after attempting to read them. This shouldn't happen. 641f07a9995SKamil Rytarowski // Assume we don't support map entries. 642f07a9995SKamil Rytarowski LLDB_LOG(log, "failed to find any vmmap entries, assuming no support " 643f07a9995SKamil Rytarowski "for memory region metadata retrieval"); 644f07a9995SKamil Rytarowski m_supports_mem_region = LazyBool::eLazyBoolNo; 64597206d57SZachary Turner Status error; 646f07a9995SKamil Rytarowski error.SetErrorString("not supported"); 647f07a9995SKamil Rytarowski return error; 648f07a9995SKamil Rytarowski } 649f07a9995SKamil Rytarowski LLDB_LOG(log, "read {0} memory region entries from process {1}", 650f07a9995SKamil Rytarowski m_mem_region_cache.size(), GetID()); 651f07a9995SKamil Rytarowski // We support memory retrieval, remember that. 652f07a9995SKamil Rytarowski m_supports_mem_region = LazyBool::eLazyBoolYes; 65397206d57SZachary Turner return Status(); 654f07a9995SKamil Rytarowski } 655f07a9995SKamil Rytarowski 65697206d57SZachary Turner Status NativeProcessNetBSD::AllocateMemory(size_t size, uint32_t permissions, 657f07a9995SKamil Rytarowski lldb::addr_t &addr) { 65897206d57SZachary Turner return Status("Unimplemented"); 659f07a9995SKamil Rytarowski } 660f07a9995SKamil Rytarowski 66197206d57SZachary Turner Status NativeProcessNetBSD::DeallocateMemory(lldb::addr_t addr) { 66297206d57SZachary Turner return Status("Unimplemented"); 663f07a9995SKamil Rytarowski } 664f07a9995SKamil Rytarowski 665f07a9995SKamil Rytarowski lldb::addr_t NativeProcessNetBSD::GetSharedLibraryInfoAddress() { 666f07a9995SKamil Rytarowski // punt on this for now 667f07a9995SKamil Rytarowski return LLDB_INVALID_ADDRESS; 668f07a9995SKamil Rytarowski } 669f07a9995SKamil Rytarowski 670f07a9995SKamil Rytarowski size_t NativeProcessNetBSD::UpdateThreads() { return m_threads.size(); } 671f07a9995SKamil Rytarowski 672f07a9995SKamil Rytarowski bool NativeProcessNetBSD::GetArchitecture(ArchSpec &arch) const { 673f07a9995SKamil Rytarowski arch = m_arch; 674f07a9995SKamil Rytarowski return true; 675f07a9995SKamil Rytarowski } 676f07a9995SKamil Rytarowski 67797206d57SZachary Turner Status NativeProcessNetBSD::SetBreakpoint(lldb::addr_t addr, uint32_t size, 678f07a9995SKamil Rytarowski bool hardware) { 679f07a9995SKamil Rytarowski if (hardware) 68097206d57SZachary Turner return Status("NativeProcessNetBSD does not support hardware breakpoints"); 681f07a9995SKamil Rytarowski else 682f07a9995SKamil Rytarowski return SetSoftwareBreakpoint(addr, size); 683f07a9995SKamil Rytarowski } 684f07a9995SKamil Rytarowski 68597206d57SZachary Turner Status NativeProcessNetBSD::GetSoftwareBreakpointTrapOpcode( 686f07a9995SKamil Rytarowski size_t trap_opcode_size_hint, size_t &actual_opcode_size, 687f07a9995SKamil Rytarowski const uint8_t *&trap_opcode_bytes) { 688f07a9995SKamil Rytarowski static const uint8_t g_i386_opcode[] = {0xCC}; 689f07a9995SKamil Rytarowski 690f07a9995SKamil Rytarowski switch (m_arch.GetMachine()) { 691f07a9995SKamil Rytarowski case llvm::Triple::x86: 692f07a9995SKamil Rytarowski case llvm::Triple::x86_64: 693f07a9995SKamil Rytarowski trap_opcode_bytes = g_i386_opcode; 694f07a9995SKamil Rytarowski actual_opcode_size = sizeof(g_i386_opcode); 69597206d57SZachary Turner return Status(); 696f07a9995SKamil Rytarowski default: 697f07a9995SKamil Rytarowski assert(false && "CPU type not supported!"); 69897206d57SZachary Turner return Status("CPU type not supported"); 699f07a9995SKamil Rytarowski } 700f07a9995SKamil Rytarowski } 701f07a9995SKamil Rytarowski 70297206d57SZachary Turner Status NativeProcessNetBSD::GetLoadedModuleFileSpec(const char *module_path, 703f07a9995SKamil Rytarowski FileSpec &file_spec) { 70497206d57SZachary Turner return Status("Unimplemented"); 705f07a9995SKamil Rytarowski } 706f07a9995SKamil Rytarowski 70797206d57SZachary Turner Status NativeProcessNetBSD::GetFileLoadAddress(const llvm::StringRef &file_name, 708f07a9995SKamil Rytarowski lldb::addr_t &load_addr) { 709f07a9995SKamil Rytarowski load_addr = LLDB_INVALID_ADDRESS; 71097206d57SZachary Turner return Status(); 711f07a9995SKamil Rytarowski } 712f07a9995SKamil Rytarowski 71397206d57SZachary Turner Status NativeProcessNetBSD::LaunchInferior(MainLoop &mainloop, 714f07a9995SKamil Rytarowski ProcessLaunchInfo &launch_info) { 71597206d57SZachary Turner Status error; 716f07a9995SKamil Rytarowski m_sigchld_handle = mainloop.RegisterSignal( 717f07a9995SKamil Rytarowski SIGCHLD, [this](MainLoopBase &) { SigchldHandler(); }, error); 718f07a9995SKamil Rytarowski if (!m_sigchld_handle) 719f07a9995SKamil Rytarowski return error; 720f07a9995SKamil Rytarowski 721f07a9995SKamil Rytarowski SetState(eStateLaunching); 722f07a9995SKamil Rytarowski 723f07a9995SKamil Rytarowski ::pid_t pid = ProcessLauncherPosixFork() 724f07a9995SKamil Rytarowski .LaunchProcess(launch_info, error) 725f07a9995SKamil Rytarowski .GetProcessId(); 726f07a9995SKamil Rytarowski if (error.Fail()) 727f07a9995SKamil Rytarowski return error; 728f07a9995SKamil Rytarowski 729f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 730f07a9995SKamil Rytarowski 731f07a9995SKamil Rytarowski // Wait for the child process to trap on its call to execve. 732f07a9995SKamil Rytarowski ::pid_t wpid; 733f07a9995SKamil Rytarowski int status; 734f07a9995SKamil Rytarowski if ((wpid = waitpid(pid, &status, 0)) < 0) { 735f07a9995SKamil Rytarowski error.SetErrorToErrno(); 736f07a9995SKamil Rytarowski LLDB_LOG(log, "waitpid for inferior failed with %s", error); 737f07a9995SKamil Rytarowski 738f07a9995SKamil Rytarowski // Mark the inferior as invalid. 73936e23ecaSKamil Rytarowski // FIXME this could really use a new state - eStateLaunchFailure. For 74036e23ecaSKamil Rytarowski // now, using eStateInvalid. 741f07a9995SKamil Rytarowski SetState(StateType::eStateInvalid); 742f07a9995SKamil Rytarowski 743f07a9995SKamil Rytarowski return error; 744f07a9995SKamil Rytarowski } 745f07a9995SKamil Rytarowski assert(WIFSTOPPED(status) && (wpid == static_cast<::pid_t>(pid)) && 746f07a9995SKamil Rytarowski "Could not sync with inferior process."); 747f07a9995SKamil Rytarowski 748f07a9995SKamil Rytarowski LLDB_LOG(log, "inferior started, now in stopped state"); 749f07a9995SKamil Rytarowski 750f07a9995SKamil Rytarowski // Release the master terminal descriptor and pass it off to the 751f07a9995SKamil Rytarowski // NativeProcessNetBSD instance. Similarly stash the inferior pid. 752f07a9995SKamil Rytarowski m_terminal_fd = launch_info.GetPTY().ReleaseMasterFileDescriptor(); 753f07a9995SKamil Rytarowski m_pid = pid; 754f07a9995SKamil Rytarowski launch_info.SetProcessID(pid); 755f07a9995SKamil Rytarowski 756f07a9995SKamil Rytarowski if (m_terminal_fd != -1) { 757f07a9995SKamil Rytarowski error = EnsureFDFlags(m_terminal_fd, O_NONBLOCK); 758f07a9995SKamil Rytarowski if (error.Fail()) { 759f07a9995SKamil Rytarowski LLDB_LOG(log, 760f07a9995SKamil Rytarowski "inferior EnsureFDFlags failed for ensuring terminal " 761f07a9995SKamil Rytarowski "O_NONBLOCK setting: {0}", 762f07a9995SKamil Rytarowski error); 763f07a9995SKamil Rytarowski 764f07a9995SKamil Rytarowski // Mark the inferior as invalid. 765f07a9995SKamil Rytarowski // FIXME this could really use a new state - eStateLaunchFailure. For 766f07a9995SKamil Rytarowski // now, using eStateInvalid. 767f07a9995SKamil Rytarowski SetState(StateType::eStateInvalid); 768f07a9995SKamil Rytarowski 769f07a9995SKamil Rytarowski return error; 770f07a9995SKamil Rytarowski } 771f07a9995SKamil Rytarowski } 772f07a9995SKamil Rytarowski 773f07a9995SKamil Rytarowski LLDB_LOG(log, "adding pid = {0}", pid); 774f07a9995SKamil Rytarowski 775f07a9995SKamil Rytarowski ResolveProcessArchitecture(m_pid, m_arch); 776f07a9995SKamil Rytarowski 7773eef2b5eSKamil Rytarowski error = ReinitializeThreads(); 778f07a9995SKamil Rytarowski if (error.Fail()) { 779f07a9995SKamil Rytarowski SetState(StateType::eStateInvalid); 780f07a9995SKamil Rytarowski return error; 781f07a9995SKamil Rytarowski } 782f07a9995SKamil Rytarowski 78336e23ecaSKamil Rytarowski for (const auto &thread_sp : m_threads) { 78436e23ecaSKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp)->SetStoppedBySignal( 78536e23ecaSKamil Rytarowski SIGSTOP); 78636e23ecaSKamil Rytarowski } 78736e23ecaSKamil Rytarowski 788f07a9995SKamil Rytarowski /* Set process stopped */ 789f07a9995SKamil Rytarowski SetState(StateType::eStateStopped); 790f07a9995SKamil Rytarowski 791f07a9995SKamil Rytarowski if (error.Fail()) 792f07a9995SKamil Rytarowski LLDB_LOG(log, "inferior launching failed {0}", error); 793f07a9995SKamil Rytarowski return error; 794f07a9995SKamil Rytarowski } 795f07a9995SKamil Rytarowski 796f07a9995SKamil Rytarowski void NativeProcessNetBSD::AttachToInferior(MainLoop &mainloop, lldb::pid_t pid, 79797206d57SZachary Turner Status &error) { 798f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 799f07a9995SKamil Rytarowski LLDB_LOG(log, "pid = {0:x}", pid); 800f07a9995SKamil Rytarowski 801f07a9995SKamil Rytarowski m_sigchld_handle = mainloop.RegisterSignal( 802f07a9995SKamil Rytarowski SIGCHLD, [this](MainLoopBase &) { SigchldHandler(); }, error); 803f07a9995SKamil Rytarowski if (!m_sigchld_handle) 804f07a9995SKamil Rytarowski return; 805f07a9995SKamil Rytarowski 806f07a9995SKamil Rytarowski error = ResolveProcessArchitecture(pid, m_arch); 807f07a9995SKamil Rytarowski if (!error.Success()) 808f07a9995SKamil Rytarowski return; 809f07a9995SKamil Rytarowski 810f07a9995SKamil Rytarowski // Set the architecture to the exe architecture. 811f07a9995SKamil Rytarowski LLDB_LOG(log, "pid = {0:x}, detected architecture {1}", pid, 812f07a9995SKamil Rytarowski m_arch.GetArchitectureName()); 813f07a9995SKamil Rytarowski 814f07a9995SKamil Rytarowski m_pid = pid; 815f07a9995SKamil Rytarowski SetState(eStateAttaching); 816f07a9995SKamil Rytarowski 817f07a9995SKamil Rytarowski Attach(pid, error); 818f07a9995SKamil Rytarowski } 819f07a9995SKamil Rytarowski 820f07a9995SKamil Rytarowski void NativeProcessNetBSD::SigchldHandler() { 821f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_PROCESS)); 822f07a9995SKamil Rytarowski // Process all pending waitpid notifications. 823f07a9995SKamil Rytarowski int status; 824*c1a6b128SPavel Labath ::pid_t wait_pid = 825*c1a6b128SPavel Labath llvm::sys::RetryAfterSignal(-1, waitpid, GetID(), &status, WALLSIG | WNOHANG); 826f07a9995SKamil Rytarowski 827f07a9995SKamil Rytarowski if (wait_pid == 0) 828f07a9995SKamil Rytarowski return; // We are done. 829f07a9995SKamil Rytarowski 830f07a9995SKamil Rytarowski if (wait_pid == -1) { 83197206d57SZachary Turner Status error(errno, eErrorTypePOSIX); 832f07a9995SKamil Rytarowski LLDB_LOG(log, "waitpid ({0}, &status, _) failed: {1}", GetID(), error); 833f07a9995SKamil Rytarowski } 834f07a9995SKamil Rytarowski 8353508fc8cSPavel Labath WaitStatus wait_status = WaitStatus::Decode(status); 8363508fc8cSPavel Labath bool exited = wait_status.type == WaitStatus::Exit || 8373508fc8cSPavel Labath (wait_status.type == WaitStatus::Signal && 8383508fc8cSPavel Labath wait_pid == static_cast<::pid_t>(GetID())); 839f07a9995SKamil Rytarowski 840f07a9995SKamil Rytarowski LLDB_LOG(log, 8413508fc8cSPavel Labath "waitpid ({0}, &status, _) => pid = {1}, status = {2}, exited = {3}", 8423508fc8cSPavel Labath GetID(), wait_pid, status, exited); 843f07a9995SKamil Rytarowski 844f07a9995SKamil Rytarowski if (exited) 8453508fc8cSPavel Labath MonitorExited(wait_pid, wait_status); 8463508fc8cSPavel Labath else { 8474bb74415SKamil Rytarowski assert(wait_status.type == WaitStatus::Stop); 8483508fc8cSPavel Labath MonitorCallback(wait_pid, wait_status.status); 8493508fc8cSPavel Labath } 850f07a9995SKamil Rytarowski } 851f07a9995SKamil Rytarowski 852269eec03SKamil Rytarowski bool NativeProcessNetBSD::HasThreadNoLock(lldb::tid_t thread_id) { 853269eec03SKamil Rytarowski for (auto thread_sp : m_threads) { 854269eec03SKamil Rytarowski assert(thread_sp && "thread list should not contain NULL threads"); 855269eec03SKamil Rytarowski if (thread_sp->GetID() == thread_id) { 856269eec03SKamil Rytarowski // We have this thread. 857269eec03SKamil Rytarowski return true; 858269eec03SKamil Rytarowski } 859269eec03SKamil Rytarowski } 860269eec03SKamil Rytarowski 861269eec03SKamil Rytarowski // We don't have this thread. 862269eec03SKamil Rytarowski return false; 863269eec03SKamil Rytarowski } 864269eec03SKamil Rytarowski 865f07a9995SKamil Rytarowski NativeThreadNetBSDSP NativeProcessNetBSD::AddThread(lldb::tid_t thread_id) { 866f07a9995SKamil Rytarowski 867f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_THREAD)); 868f07a9995SKamil Rytarowski LLDB_LOG(log, "pid {0} adding thread with tid {1}", GetID(), thread_id); 869f07a9995SKamil Rytarowski 870f07a9995SKamil Rytarowski assert(!HasThreadNoLock(thread_id) && 871f07a9995SKamil Rytarowski "attempted to add a thread by id that already exists"); 872f07a9995SKamil Rytarowski 873f07a9995SKamil Rytarowski // If this is the first thread, save it as the current thread 874f07a9995SKamil Rytarowski if (m_threads.empty()) 875f07a9995SKamil Rytarowski SetCurrentThreadID(thread_id); 876f07a9995SKamil Rytarowski 877f07a9995SKamil Rytarowski auto thread_sp = std::make_shared<NativeThreadNetBSD>(this, thread_id); 878f07a9995SKamil Rytarowski m_threads.push_back(thread_sp); 879f07a9995SKamil Rytarowski return thread_sp; 880f07a9995SKamil Rytarowski } 881f07a9995SKamil Rytarowski 88297206d57SZachary Turner ::pid_t NativeProcessNetBSD::Attach(lldb::pid_t pid, Status &error) { 883f07a9995SKamil Rytarowski if (pid <= 1) { 884f07a9995SKamil Rytarowski error.SetErrorToGenericError(); 885f07a9995SKamil Rytarowski error.SetErrorString("Attaching to process 1 is not allowed."); 886f07a9995SKamil Rytarowski return -1; 887f07a9995SKamil Rytarowski } 888f07a9995SKamil Rytarowski 889f07a9995SKamil Rytarowski // Attach to the requested process. 890f07a9995SKamil Rytarowski // An attach will cause the thread to stop with a SIGSTOP. 891f07a9995SKamil Rytarowski error = PtraceWrapper(PT_ATTACH, pid); 892f07a9995SKamil Rytarowski if (error.Fail()) 893f07a9995SKamil Rytarowski return -1; 894f07a9995SKamil Rytarowski 895f07a9995SKamil Rytarowski int status; 896f07a9995SKamil Rytarowski // Need to use WALLSIG otherwise we receive an error with errno=ECHLD 897f07a9995SKamil Rytarowski // At this point we should have a thread stopped if waitpid succeeds. 898f07a9995SKamil Rytarowski if ((status = waitpid(pid, NULL, WALLSIG)) < 0) 899f07a9995SKamil Rytarowski return -1; 900f07a9995SKamil Rytarowski 901f07a9995SKamil Rytarowski m_pid = pid; 902f07a9995SKamil Rytarowski 903f07a9995SKamil Rytarowski /* Initialize threads */ 9043eef2b5eSKamil Rytarowski error = ReinitializeThreads(); 905f07a9995SKamil Rytarowski if (error.Fail()) { 906f07a9995SKamil Rytarowski SetState(StateType::eStateInvalid); 907f07a9995SKamil Rytarowski return -1; 908f07a9995SKamil Rytarowski } 909f07a9995SKamil Rytarowski 91036e23ecaSKamil Rytarowski for (const auto &thread_sp : m_threads) { 91136e23ecaSKamil Rytarowski static_pointer_cast<NativeThreadNetBSD>(thread_sp)->SetStoppedBySignal( 91236e23ecaSKamil Rytarowski SIGSTOP); 91336e23ecaSKamil Rytarowski } 91436e23ecaSKamil Rytarowski 915f07a9995SKamil Rytarowski // Let our process instance know the thread has stopped. 916f07a9995SKamil Rytarowski SetState(StateType::eStateStopped); 917f07a9995SKamil Rytarowski 918f07a9995SKamil Rytarowski return pid; 919f07a9995SKamil Rytarowski } 920f07a9995SKamil Rytarowski 92197206d57SZachary Turner Status NativeProcessNetBSD::ReadMemory(lldb::addr_t addr, void *buf, 92297206d57SZachary Turner size_t size, size_t &bytes_read) { 923f07a9995SKamil Rytarowski unsigned char *dst = static_cast<unsigned char *>(buf); 924f07a9995SKamil Rytarowski struct ptrace_io_desc io; 925f07a9995SKamil Rytarowski 926f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_MEMORY)); 927f07a9995SKamil Rytarowski LLDB_LOG(log, "addr = {0}, buf = {1}, size = {2}", addr, buf, size); 928f07a9995SKamil Rytarowski 929f07a9995SKamil Rytarowski bytes_read = 0; 930f07a9995SKamil Rytarowski io.piod_op = PIOD_READ_D; 931f07a9995SKamil Rytarowski io.piod_len = size; 932f07a9995SKamil Rytarowski 933f07a9995SKamil Rytarowski do { 934f07a9995SKamil Rytarowski io.piod_offs = (void *)(addr + bytes_read); 935f07a9995SKamil Rytarowski io.piod_addr = dst + bytes_read; 936f07a9995SKamil Rytarowski 93797206d57SZachary Turner Status error = NativeProcessNetBSD::PtraceWrapper(PT_IO, GetID(), &io); 938f07a9995SKamil Rytarowski if (error.Fail()) 939f07a9995SKamil Rytarowski return error; 940f07a9995SKamil Rytarowski 941f07a9995SKamil Rytarowski bytes_read = io.piod_len; 942f07a9995SKamil Rytarowski io.piod_len = size - bytes_read; 943f07a9995SKamil Rytarowski } while (bytes_read < size); 944f07a9995SKamil Rytarowski 94597206d57SZachary Turner return Status(); 946f07a9995SKamil Rytarowski } 947f07a9995SKamil Rytarowski 94897206d57SZachary Turner Status NativeProcessNetBSD::ReadMemoryWithoutTrap(lldb::addr_t addr, void *buf, 949f07a9995SKamil Rytarowski size_t size, 950f07a9995SKamil Rytarowski size_t &bytes_read) { 95197206d57SZachary Turner Status error = ReadMemory(addr, buf, size, bytes_read); 952f07a9995SKamil Rytarowski if (error.Fail()) 953f07a9995SKamil Rytarowski return error; 954f07a9995SKamil Rytarowski return m_breakpoint_list.RemoveTrapsFromBuffer(addr, buf, size); 955f07a9995SKamil Rytarowski } 956f07a9995SKamil Rytarowski 95797206d57SZachary Turner Status NativeProcessNetBSD::WriteMemory(lldb::addr_t addr, const void *buf, 958f07a9995SKamil Rytarowski size_t size, size_t &bytes_written) { 959f07a9995SKamil Rytarowski const unsigned char *src = static_cast<const unsigned char *>(buf); 96097206d57SZachary Turner Status error; 961f07a9995SKamil Rytarowski struct ptrace_io_desc io; 962f07a9995SKamil Rytarowski 963f07a9995SKamil Rytarowski Log *log(ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_MEMORY)); 964f07a9995SKamil Rytarowski LLDB_LOG(log, "addr = {0}, buf = {1}, size = {2}", addr, buf, size); 965f07a9995SKamil Rytarowski 966f07a9995SKamil Rytarowski bytes_written = 0; 967f07a9995SKamil Rytarowski io.piod_op = PIOD_WRITE_D; 968f07a9995SKamil Rytarowski io.piod_len = size; 969f07a9995SKamil Rytarowski 970f07a9995SKamil Rytarowski do { 971269eec03SKamil Rytarowski io.piod_addr = const_cast<void *>(static_cast<const void *>(src + bytes_written)); 972f07a9995SKamil Rytarowski io.piod_offs = (void *)(addr + bytes_written); 973f07a9995SKamil Rytarowski 97497206d57SZachary Turner Status error = NativeProcessNetBSD::PtraceWrapper(PT_IO, GetID(), &io); 975f07a9995SKamil Rytarowski if (error.Fail()) 976f07a9995SKamil Rytarowski return error; 977f07a9995SKamil Rytarowski 978f07a9995SKamil Rytarowski bytes_written = io.piod_len; 979f07a9995SKamil Rytarowski io.piod_len = size - bytes_written; 980f07a9995SKamil Rytarowski } while (bytes_written < size); 981f07a9995SKamil Rytarowski 982f07a9995SKamil Rytarowski return error; 983f07a9995SKamil Rytarowski } 984f07a9995SKamil Rytarowski 985f07a9995SKamil Rytarowski llvm::ErrorOr<std::unique_ptr<llvm::MemoryBuffer>> 986f07a9995SKamil Rytarowski NativeProcessNetBSD::GetAuxvData() const { 987f07a9995SKamil Rytarowski /* 988f07a9995SKamil Rytarowski * ELF_AUX_ENTRIES is currently restricted to kernel 989f07a9995SKamil Rytarowski * (<sys/exec_elf.h> r. 1.155 specifies 15) 990f07a9995SKamil Rytarowski * 991f07a9995SKamil Rytarowski * ptrace(2) returns the whole AUXV including extra fiels after AT_NULL this 992f07a9995SKamil Rytarowski * information isn't needed. 993f07a9995SKamil Rytarowski */ 994f07a9995SKamil Rytarowski size_t auxv_size = 100 * sizeof(AuxInfo); 995f07a9995SKamil Rytarowski 996f07a9995SKamil Rytarowski ErrorOr<std::unique_ptr<MemoryBuffer>> buf = 997f07a9995SKamil Rytarowski llvm::MemoryBuffer::getNewMemBuffer(auxv_size); 998f07a9995SKamil Rytarowski 999269eec03SKamil Rytarowski struct ptrace_io_desc io; 1000269eec03SKamil Rytarowski io.piod_op = PIOD_READ_AUXV; 1001269eec03SKamil Rytarowski io.piod_offs = 0; 1002269eec03SKamil Rytarowski io.piod_addr = const_cast<void *>(static_cast<const void *>(buf.get()->getBufferStart())); 1003269eec03SKamil Rytarowski io.piod_len = auxv_size; 1004f07a9995SKamil Rytarowski 100597206d57SZachary Turner Status error = NativeProcessNetBSD::PtraceWrapper(PT_IO, GetID(), &io); 1006f07a9995SKamil Rytarowski 1007f07a9995SKamil Rytarowski if (error.Fail()) 1008f07a9995SKamil Rytarowski return std::error_code(error.GetError(), std::generic_category()); 1009f07a9995SKamil Rytarowski 1010f07a9995SKamil Rytarowski if (io.piod_len < 1) 1011f07a9995SKamil Rytarowski return std::error_code(ECANCELED, std::generic_category()); 1012f07a9995SKamil Rytarowski 1013f07a9995SKamil Rytarowski return buf; 1014f07a9995SKamil Rytarowski } 10153eef2b5eSKamil Rytarowski 101697206d57SZachary Turner Status NativeProcessNetBSD::ReinitializeThreads() { 10173eef2b5eSKamil Rytarowski // Clear old threads 10183eef2b5eSKamil Rytarowski m_threads.clear(); 10193eef2b5eSKamil Rytarowski 10203eef2b5eSKamil Rytarowski // Initialize new thread 10213eef2b5eSKamil Rytarowski struct ptrace_lwpinfo info = {}; 102297206d57SZachary Turner Status error = PtraceWrapper(PT_LWPINFO, GetID(), &info, sizeof(info)); 10233eef2b5eSKamil Rytarowski if (error.Fail()) { 10243eef2b5eSKamil Rytarowski return error; 10253eef2b5eSKamil Rytarowski } 10263eef2b5eSKamil Rytarowski // Reinitialize from scratch threads and register them in process 10273eef2b5eSKamil Rytarowski while (info.pl_lwpid != 0) { 10283eef2b5eSKamil Rytarowski NativeThreadNetBSDSP thread_sp = AddThread(info.pl_lwpid); 10293eef2b5eSKamil Rytarowski error = PtraceWrapper(PT_LWPINFO, GetID(), &info, sizeof(info)); 10303eef2b5eSKamil Rytarowski if (error.Fail()) { 10313eef2b5eSKamil Rytarowski return error; 10323eef2b5eSKamil Rytarowski } 10333eef2b5eSKamil Rytarowski } 10343eef2b5eSKamil Rytarowski 10353eef2b5eSKamil Rytarowski return error; 10363eef2b5eSKamil Rytarowski } 1037