From patchwork Mon Nov 27 20:20:54 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tom de Vries X-Patchwork-Id: 80842 Return-Path: X-Original-To: patchwork@sourceware.org Delivered-To: patchwork@sourceware.org Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id F25BF384F9BA for ; Mon, 27 Nov 2023 20:21:14 +0000 (GMT) X-Original-To: gdb-patches@sourceware.org Delivered-To: gdb-patches@sourceware.org Received: from smtp-out1.suse.de (smtp-out1.suse.de [IPv6:2a07:de40:b251:101:10:150:64:1]) by sourceware.org (Postfix) with ESMTPS id 7005F3858C2D for ; Mon, 27 Nov 2023 20:20:59 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 7005F3858C2D Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=suse.de Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=suse.de ARC-Filter: OpenARC Filter v1.0.0 sourceware.org 7005F3858C2D Authentication-Results: server2.sourceware.org; arc=none smtp.remote-ip=2a07:de40:b251:101:10:150:64:1 ARC-Seal: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1701116460; cv=none; b=VgbnRicI+lcxLTWBNyfO8WxvPtqcpVhNqFcUESoLnsLo+bZvW3ybY63VcDmmQf4jYZmnkD+ZGeE263XYMvkyiIJLnUyd3eZ7rKlLKx50ttjiQpX/jAcbw9FwgR0qjUxqWjAISINJT8Q9oDlgA+OdoQ+fIiOQEmaY5zhfuOiz/sk= ARC-Message-Signature: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1701116460; c=relaxed/simple; bh=RAIp44B07MmIryxbUfA+PcKnQj5AcAk/86bqvC9iveY=; h=From:To:Subject:Date:Message-Id:MIME-Version; b=N8n3+/TRQrJUGd73zJ4vLtKXNWucKfGguwIkaPdXVhEMB48P7rPkIKZDG7NkPl9J040PJrfAVQVtHf0Nt52EvQsRFBwD+3eMWeSw8UEfCbb7AmOHrpajj2oXZdm5J7h++bZhf1agA0UNwNdWGFAX/G2YFNCIsY39MdnlxkEVG14= ARC-Authentication-Results: i=1; server2.sourceware.org Received: from imap1.dmz-prg2.suse.org (imap1.dmz-prg2.suse.org [IPv6:2a07:de40:b281:104:10:150:64:97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id AE4F621B76 for ; Mon, 27 Nov 2023 20:20:57 +0000 (UTC) Received: from imap1.dmz-prg2.suse.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by imap1.dmz-prg2.suse.org (Postfix) with ESMTPS id 9897C13ABB for ; Mon, 27 Nov 2023 20:20:57 +0000 (UTC) Received: from dovecot-director2.suse.de ([2a07:de40:b281:106:10:150:64:167]) by imap1.dmz-prg2.suse.org with ESMTPSA id WNztIyn6ZGW7HwAAD6G6ig (envelope-from ) for ; Mon, 27 Nov 2023 20:20:57 +0000 From: Tom de Vries To: gdb-patches@sourceware.org Subject: [PATCH v2 3/3] [gdb/tdep] Use ptrace events to get current syscall Date: Mon, 27 Nov 2023 21:20:54 +0100 Message-Id: <20231127202054.22070-3-tdevries@suse.de> X-Mailer: git-send-email 2.35.3 In-Reply-To: <20231127202054.22070-1-tdevries@suse.de> References: <20231127202054.22070-1-tdevries@suse.de> MIME-Version: 1.0 X-Spamd-Bar: +++++++++++++++ Authentication-Results: smtp-out1.suse.de; dkim=none; dmarc=fail reason="No valid SPF, No valid DKIM" header.from=suse.de (policy=none); spf=softfail (smtp-out1.suse.de: 2a07:de40:b281:104:10:150:64:97 is neither permitted nor denied by domain of tdevries@suse.de) smtp.mailfrom=tdevries@suse.de X-Rspamd-Server: rspamd2 X-Spamd-Result: default: False [15.28 / 50.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; SPAMHAUS_XBL(0.00)[2a07:de40:b281:104:10:150:64:97:from]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_MISSING_CHARSET(2.50)[]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[gdb-patches@sourceware.org]; BROKEN_CONTENT_TYPE(1.50)[]; R_SPF_SOFTFAIL(4.60)[~all:c]; RCPT_COUNT_ONE(0.00)[1]; RCVD_COUNT_THREE(0.00)[3]; TO_DN_NONE(0.00)[]; MX_GOOD(-0.01)[]; NEURAL_SPAM_LONG(3.49)[0.998]; MID_CONTAINS_FROM(1.00)[]; FUZZY_BLOCKED(0.00)[rspamd.com]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(2.20)[]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_ALL(0.00)[]; BAYES_HAM(-0.00)[22.75%]; DMARC_POLICY_SOFTFAIL(0.10)[suse.de : No valid SPF, No valid DKIM,none] X-Spam-Score: 15.28 X-Rspamd-Queue-Id: AE4F621B76 X-Spam: Yes X-Spam-Status: No, score=-12.5 required=5.0 tests=BAYES_00, GIT_PATCH_0, KAM_DMARC_STATUS, SPF_HELO_NONE, SPF_PASS, TXREP, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: gdb-patches@sourceware.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Gdb-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: gdb-patches-bounces+patchwork=sourceware.org@sourceware.org Add a powerpc implementation of gdbarch_extended_event_to_syscall, for the moment only mapping PTRACE_EVENT_EXEC to execve. Use gdbarch_extended_event_to_syscall in linux_handle_extended_wait to update the cached syscall number. --- gdb/linux-nat.c | 5 +++++ gdb/ppc-linux-tdep.c | 17 +++++++++++++++++ 2 files changed, 22 insertions(+) diff --git a/gdb/linux-nat.c b/gdb/linux-nat.c index 89c4622160a..9bccb463764 100644 --- a/gdb/linux-nat.c +++ b/gdb/linux-nat.c @@ -1977,6 +1977,11 @@ linux_handle_extended_wait (struct lwp_info *lp, int status) you have to be using PTRACE_SEIZE to get that. */ lp->syscall_state = TARGET_WAITKIND_SYSCALL_ENTRY; + struct gdbarch *gdbarch = target_thread_architecture (lp->ptid); + int syscall_number = gdbarch_extended_event_to_syscall (gdbarch, event); + if (syscall_number != -1) + lp->syscall_number = syscall_number; + if (event == PTRACE_EVENT_FORK || event == PTRACE_EVENT_VFORK || event == PTRACE_EVENT_CLONE) { diff --git a/gdb/ppc-linux-tdep.c b/gdb/ppc-linux-tdep.c index 24e1b455afd..dffe1489144 100644 --- a/gdb/ppc-linux-tdep.c +++ b/gdb/ppc-linux-tdep.c @@ -64,6 +64,7 @@ #include "elf-bfd.h" #include "producer.h" #include "target-float.h" +#include "nat/linux-ptrace.h" #include "features/rs6000/powerpc-32l.c" #include "features/rs6000/powerpc-altivec32l.c" @@ -1373,6 +1374,19 @@ ppc_linux_get_syscall_number (struct gdbarch *gdbarch, static struct linux_record_tdep ppc_linux_record_tdep; static struct linux_record_tdep ppc64_linux_record_tdep; +static int +ppc_linux_extended_event_to_syscall (struct gdbarch *gdbarch, int event) +{ + switch (event) + { + case PTRACE_EVENT_EXEC: + /* Execve syscall. */ + return 11; + } + + return -1; +} + /* ppc_canonicalize_syscall maps from the native PowerPC Linux set of syscall ids into a canonical set of syscall ids used by process record. (See arch/powerpc/include/uapi/asm/unistd.h in kernel tree.) @@ -2173,6 +2187,9 @@ ppc_linux_init_abi (struct gdbarch_info info, /* Get the syscall number from the arch's register. */ set_gdbarch_get_syscall_number (gdbarch, ppc_linux_get_syscall_number); + set_gdbarch_extended_event_to_syscall (gdbarch, + ppc_linux_extended_event_to_syscall); + /* SystemTap functions. */ set_gdbarch_stap_integer_prefixes (gdbarch, stap_integer_prefixes); set_gdbarch_stap_register_indirection_prefixes (gdbarch,