From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 14265 invoked by alias); 30 Jul 2015 23:19:33 -0000 Mailing-List: contact gdb-patches-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-patches-owner@sourceware.org Received: (qmail 14250 invoked by uid 89); 30 Jul 2015 23:19:32 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-2.2 required=5.0 tests=AWL,BAYES_00,FROM_12LTRDOM,RCVD_IN_DNSWL_LOW,SPF_PASS autolearn=ham version=3.3.2 X-HELO: relay1.mentorg.com Received: from relay1.mentorg.com (HELO relay1.mentorg.com) (192.94.38.131) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Thu, 30 Jul 2015 23:19:31 +0000 Received: from svr-orw-fem-04.mgc.mentorg.com ([147.34.97.41]) by relay1.mentorg.com with esmtp id 1ZKx6l-0004tP-DF from Don_Breazeal@mentor.com ; Thu, 30 Jul 2015 16:19:27 -0700 Received: from build4-lucid-cs (147.34.91.1) by svr-orw-fem-04.mgc.mentorg.com (147.34.97.41) with Microsoft SMTP Server id 14.3.224.2; Thu, 30 Jul 2015 16:19:26 -0700 Received: by build4-lucid-cs (Postfix, from userid 1905) id 8753241034; Thu, 30 Jul 2015 16:19:27 -0700 (PDT) From: Don Breazeal To: , Subject: [PATCH v2 0/5] Extended-remote exec events Date: Thu, 30 Jul 2015 23:19:00 -0000 Message-ID: <1438298360-29594-1-git-send-email-donb@codesourcery.com> In-Reply-To: <1436996979-32350-1-git-send-email-donb@codesourcery.com> References: <1436996979-32350-1-git-send-email-donb@codesourcery.com> MIME-Version: 1.0 Content-Type: text/plain X-IsSubscribed: yes X-SW-Source: 2015-07/txt/msg00923.txt.bz2 This is an update to the extended-remote exec event patchset. The differences from the previous version include: 1) support for the multi-arch case (e.g. 64-bit executable execs a 32-bit executable). This is mainly accomplished by re-initializing the target architecture on both the remote and client sides after an exec event. 2) fixing the exec event message to use a process-style ptid to match the message for the native case (same as was done for fork events). 3) fixing intermittent failure introduced in gdb.base/pie-execl.exp in the previous version. Original description is mostly unchanged below. Thanks --Don -------------- This patch series implements exec events for extended-remote Linux targets. It provides exec event notification, follow-exec functionality, and exec catchpoints. Several tests related to exec event features have been modified to work with the native-extended-gdbserver target. It is part of the larger effort to implement "remote follow fork". This work has been divided into three parts: 1) Extended-remote fork events, providing follow-fork-mode, detach-on-fork, and fork catchpoints. This was pushed earlier this year: https://sourceware.org/ml/gdb-patches/2015-05/msg00278.html 2) Extended-remote exec events, this patchset. 3) Fork and exec events for native-gdbserver target. This patchset derives from part of a patch series submitted last October: https://sourceware.org/ml/gdb-patches/2014-10/msg00868.html The primary difference between this patchset and that one is that this one does not use ptrace exit events (PTRACE_O_TRACEEXIT) for notification of thread exit. In addition, a number of changes were made to conform to to the final version of the extended-remote fork event patchset (#1 above). Tested on x86_64 GNU/Linux with native, native-gdbserver, and native-extended-gdbserver targets. The contents of this patchset are as follows: Patch 1/5: Extended-remote exec event support. Patch 2/5: Extended-remote exec catchpoints. Patch 3/5: Extended-remote exec-related test updates. Patch 4/5: Eliminates some spurious warnings related to the solib event hook that are emitted after an extended-remote exec event. Patch 5/5: Extended-remote exec event documentation.