Hi Dan, I think this one arrived with your mega-change in September. I've binary searched it to the diffs you made on 2005-09-10: 2005-09-10 Daniel Jacobowitz Ulrich Weigand When debugging it, as I said before, I really didn't believe the output from where ppp64_linux_convert_from_func_ptr_addr attempted to read from the address of that function pointer.. (stack is after my .sig..) but that is also the point at which my subject knowledge is exhausted. -- David Lecomber #0 xfer_memory (memaddr=549757565040, myaddr=0x1ffffffcd70 "", len=8, write=0, attrib=0x0, target=0x104965c8) at /tmp/david/gdb-6.3.50.20051116/gdb/exec.c:477 #1 0x0000000010172948 in default_xfer_partial (ops=0x104965c8, object=TARGET_OBJECT_MEMORY, annex=0x0, readbuf=0x1ffffffcd70 "", writebuf=0x0, offset=549757565040, len=8) at /tmp/david/gdb-6.3.50.200 51116/gdb/target.c:1321 #2 0x0000000010171758 in target_xfer_partial (ops=0x104965c8, object=TARGET_OBJECT_MEMORY, annex=0x0, readbuf=0x1ffffffcd70, writebuf=0x0, offset=549757565040, len=8) at /tmp/david/gdb-6.3.50.2005111 6/gdb/target.c:863 #3 0x0000000010172a80 in target_read_partial (ops=0x104965c8, object=TARGET_OBJECT_MEMORY, annex=0x0, buf=0x1ffffffcd70 "", offset=549757565040, len=8) at /tmp/david/gdb-6.3.50.20051116/gdb/target.c: 1351 #4 0x0000000010172bc4 in target_read (ops=0x104965c8, object=TARGET_OBJECT_MEMORY, annex=0x0, buf=0x1ffffffcd70 "", offset=549757565040, len=8) at /tmp/david/gdb-6.3.50.20051116/gdb/target.c:1373 #5 0x0000000010172e00 in get_target_memory (ops=0x104965c8, addr=549757565040, buf=0x1ffffffcd70 "", len=8) at /tmp/david/gdb-6.3.50.20051116/gdb/target.c:1414 #6 0x0000000010172eb0 in get_target_memory_unsigned (ops=0x104965c8, addr=549757565040, len=8) at /tmp/david/gdb-6.3.50.20051116/gdb/target.c:1426 #7 0x0000000010078220 in ppc64_linux_convert_from_func_ptr_addr (gdbarch=0x1052dfb0, addr=549757565040, targ=0x104965c8) at /tmp/david/gdb-6.3.50.20051116/gdb/ppc-linux-tdep.c:801