From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 72336 invoked by alias); 9 Sep 2015 23:05:50 -0000 Mailing-List: contact gdb-patches-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-patches-owner@sourceware.org Received: (qmail 72324 invoked by uid 89); 9 Sep 2015 23:05:49 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-2.2 required=5.0 tests=AWL,BAYES_00,RCVD_IN_DNSWL_LOW,SPF_PASS,T_FROM_12LTRDOM autolearn=ham version=3.3.2 X-HELO: relay1.mentorg.com Received: from relay1.mentorg.com (HELO relay1.mentorg.com) (192.94.38.131) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Wed, 09 Sep 2015 23:05:47 +0000 Received: from svr-orw-fem-05.mgc.mentorg.com ([147.34.97.43]) by relay1.mentorg.com with esmtp id 1ZZoQy-0006Fb-Cd from Don_Breazeal@mentor.com ; Wed, 09 Sep 2015 16:05:44 -0700 Received: from build4-lucid-cs (147.34.91.1) by svr-orw-fem-05.mgc.mentorg.com (147.34.97.43) with Microsoft SMTP Server id 14.3.224.2; Wed, 9 Sep 2015 16:05:44 -0700 Received: by build4-lucid-cs (Postfix, from userid 1905) id 7EA3C41048; Wed, 9 Sep 2015 16:05:43 -0700 (PDT) From: Don Breazeal To: , Subject: [PATCH v3 0/4] Extended-remote exec events Date: Wed, 09 Sep 2015 23:05:00 -0000 Message-ID: <1441839937-22251-1-git-send-email-donb@codesourcery.com> In-Reply-To: <1438298360-29594-1-git-send-email-donb@codesourcery.com> References: <1438298360-29594-1-git-send-email-donb@codesourcery.com> MIME-Version: 1.0 Content-Type: text/plain X-IsSubscribed: yes X-SW-Source: 2015-09/txt/msg00144.txt.bz2 Hi Pedro, Thanks for the previous review(s). This is an update to version 2 of the extended-remote exec event patchset. The most significant differences from the previous version include: 1) Gdbserver always creates a new inferior for an execing process. 2) GDB's 'remote exec-file' is now per-inferior instead off a static string. 3) There is a new GDB target hook 'target_follow_exec'. 4) Elimination of patch #4, which eliminated spurious warnings when setting up the solib event hook after an exec. The patch was no longer needed after change #1 above. 5) Test and documentation updates per review comments. Original description is unchanged below, except for eliminating patch #4. Thanks --Don -------------- This patch series implements exec events for extended-remote Linux targets. It provides exec event notification, follow-exec functionality, and exec catchpoints. Several tests related to exec event features have been modified to work with the native-extended-gdbserver target. It is part of the larger effort to implement "remote follow fork". This work has been divided into three parts: 1) Extended-remote fork events, providing follow-fork-mode, detach-on-fork, and fork catchpoints. This was pushed earlier this year: https://sourceware.org/ml/gdb-patches/2015-05/msg00278.html 2) Extended-remote exec events, this patchset. 3) Fork and exec events for native-gdbserver target. This patchset derives from part of a patch series submitted last October: https://sourceware.org/ml/gdb-patches/2014-10/msg00868.html The primary difference between this patchset and that one is that this one does not use ptrace exit events (PTRACE_O_TRACEEXIT) for notification of thread exit. In addition, a number of changes were made to conform to to the final version of the extended-remote fork event patchset (#1 above). Tested on x86_64 GNU/Linux with native, native-gdbserver, and native-extended-gdbserver targets. The contents of this patchset are as follows: Patch 1/4: Extended-remote exec event support. Patch 2/4: Extended-remote exec catchpoints. Patch 3/4: Extended-remote exec-related test updates. Patch 4/4: Extended-remote exec event documentation.