From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from barracuda.ebox.ca (barracuda.ebox.ca [96.127.255.19]) by sourceware.org (Postfix) with ESMTPS id EBFC4386FC39 for ; Thu, 5 Aug 2021 16:18:37 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org EBFC4386FC39 X-ASG-Debug-ID: 1628180317-0c856e67e21c8bed0001-fS2M51 Received: from smtp.ebox.ca (smtp.ebox.ca [96.127.255.82]) by barracuda.ebox.ca with ESMTP id EFoG0oDLgyEx5CC5 (version=TLSv1 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 05 Aug 2021 12:18:37 -0400 (EDT) X-Barracuda-Envelope-From: simon.marchi@polymtl.ca X-Barracuda-RBL-Trusted-Forwarder: 96.127.255.82 Received: from simark.localdomain (192-222-157-6.qc.cable.ebox.net [192.222.157.6]) by smtp.ebox.ca (Postfix) with ESMTP id 0559D441B21; Thu, 5 Aug 2021 12:18:37 -0400 (EDT) From: Simon Marchi X-Barracuda-RBL-IP: 192.222.157.6 X-Barracuda-Effective-Source-IP: 192-222-157-6.qc.cable.ebox.net[192.222.157.6] X-Barracuda-Apparent-Source-IP: 192.222.157.6 To: gdb-patches@sourceware.org Subject: [pushed] gdb: target_waitstatus_to_string: print extra info for FORKED, VFORKED, EXECD Date: Thu, 5 Aug 2021 12:18:36 -0400 X-ASG-Orig-Subj: [pushed] gdb: target_waitstatus_to_string: print extra info for FORKED, VFORKED, EXECD Message-Id: <20210805161836.728081-1-simon.marchi@polymtl.ca> X-Mailer: git-send-email 2.32.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Barracuda-Connect: smtp.ebox.ca[96.127.255.82] X-Barracuda-Start-Time: 1628180317 X-Barracuda-Encrypted: DHE-RSA-AES256-SHA X-Barracuda-URL: https://96.127.255.19:443/cgi-mod/mark.cgi X-Barracuda-BRTS-Status: 1 X-Virus-Scanned: by bsmtpd at ebox.ca X-Barracuda-Scan-Msg-Size: 3852 X-Barracuda-Spam-Score: 0.00 X-Barracuda-Spam-Status: No, SCORE=0.00 using global scores of TAG_LEVEL=1000.0 QUARANTINE_LEVEL=1000.0 KILL_LEVEL=8.0 tests= X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.3.91697 Rule breakdown below pts rule name description ---- ---------------------- -------------------------------------------------- X-Spam-Status: No, score=-16.6 required=5.0 tests=BAYES_00, GIT_PATCH_0, KAM_DMARC_QUARANTINE, KAM_DMARC_STATUS, RCVD_IN_DNSWL_LOW, SPF_HELO_NONE, SPF_SOFTFAIL, TXREP autolearn=ham autolearn_force=no version=3.4.4 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on server2.sourceware.org X-BeenThere: gdb-patches@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gdb-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 05 Aug 2021 16:18:39 -0000 Print the extra information contained in target_waitstatus for these events. For TARGET_WAITKIND_{FORKED,VFORKED}, the extra information is contained in related_pid, and is the ptid of the new process. For TARGET_WAITKIND_EXECD, it,s the exec'd path name in execd_pathname. Print it using the same format used for TARGET_WAITKIND_STOPPED and others. Here are sample outputs for all three events: [infrun] print_target_wait_results: target_wait (-1.0.0 [process -1], status) = [infrun] print_target_wait_results: 726890.726890.0 [process 726890], [infrun] print_target_wait_results: status->kind = vforked, related_pid = 726894.726894.0 [infrun] print_target_wait_results: target_wait (-1.0.0 [process -1], status) = [infrun] print_target_wait_results: 727045.727045.0 [process 727045], [infrun] print_target_wait_results: status->kind = forked, related_pid = 727049.727049.0 [infrun] print_target_wait_results: target_wait (-1.0.0 [process -1], status) = [infrun] print_target_wait_results: 727119.727119.0 [process 727119], [infrun] print_target_wait_results: status->kind = execd, execd_pathname = /usr/bin/ls Change-Id: I4416a74e3bf792a625a68bf26c51689e170f2184 --- gdb/target/waitstatus.c | 25 ++++++++++++++++++++++--- 1 file changed, 22 insertions(+), 3 deletions(-) diff --git a/gdb/target/waitstatus.c b/gdb/target/waitstatus.c index c4fb061b2936..be5e21eae785 100644 --- a/gdb/target/waitstatus.c +++ b/gdb/target/waitstatus.c @@ -32,41 +32,60 @@ target_waitstatus_to_string (const struct target_waitstatus *ws) case TARGET_WAITKIND_EXITED: return string_printf ("%sexited, status = %d", kind_str, ws->value.integer); + case TARGET_WAITKIND_STOPPED: return string_printf ("%sstopped, signal = %s", kind_str, gdb_signal_to_symbol_string (ws->value.sig)); + case TARGET_WAITKIND_SIGNALLED: return string_printf ("%ssignalled, signal = %s", kind_str, gdb_signal_to_symbol_string (ws->value.sig)); + case TARGET_WAITKIND_LOADED: return string_printf ("%sloaded", kind_str); + case TARGET_WAITKIND_FORKED: - return string_printf ("%sforked", kind_str); + return string_printf ("%sforked, related_pid = %s", kind_str, + ws->value.related_pid.to_string ().c_str ()); + case TARGET_WAITKIND_VFORKED: - return string_printf ("%svforked", kind_str); + return string_printf ("%svforked, related_pid = %s", kind_str, + ws->value.related_pid.to_string ().c_str ()); + case TARGET_WAITKIND_EXECD: - return string_printf ("%sexecd", kind_str); + return string_printf ("%sexecd, execd_pathname = %s", kind_str, + ws->value.execd_pathname); + case TARGET_WAITKIND_VFORK_DONE: return string_printf ("%svfork-done", kind_str); + case TARGET_WAITKIND_SYSCALL_ENTRY: return string_printf ("%sentered syscall", kind_str); + case TARGET_WAITKIND_SYSCALL_RETURN: return string_printf ("%sexited syscall", kind_str); + case TARGET_WAITKIND_SPURIOUS: return string_printf ("%sspurious", kind_str); + case TARGET_WAITKIND_IGNORE: return string_printf ("%signore", kind_str); + case TARGET_WAITKIND_NO_HISTORY: return string_printf ("%sno-history", kind_str); + case TARGET_WAITKIND_NO_RESUMED: return string_printf ("%sno-resumed", kind_str); + case TARGET_WAITKIND_THREAD_CREATED: return string_printf ("%sthread created", kind_str); + case TARGET_WAITKIND_THREAD_EXITED: return string_printf ("%sthread exited, status = %d", kind_str, ws->value.integer); + default: return string_printf ("%sunknown???", kind_str); } -- 2.32.0