From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 19150 invoked by alias); 19 Feb 2015 16:01:25 -0000 Mailing-List: contact gdb-patches-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-patches-owner@sourceware.org Received: (qmail 19139 invoked by uid 89); 19 Feb 2015 16:01:25 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-1.9 required=5.0 tests=AWL,BAYES_00,SPF_PASS,T_RP_MATCHES_RCVD autolearn=ham version=3.3.2 X-HELO: smtp.gentoo.org Received: from smtp.gentoo.org (HELO smtp.gentoo.org) (140.211.166.183) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with (AES256-GCM-SHA384 encrypted) ESMTPS; Thu, 19 Feb 2015 16:01:24 +0000 Received: from vapier (localhost [127.0.0.1]) by smtp.gentoo.org (Postfix) with SMTP id 831E733F7F8; Thu, 19 Feb 2015 16:01:21 +0000 (UTC) Date: Thu, 19 Feb 2015 16:01:00 -0000 From: Mike Frysinger To: Amrita Honap Cc: gdb-patches@sourceware.org, dj@redhat.com Subject: Re: [PATCH RL78]:Fix offset for mem_get_si in sim Message-ID: <20150219160121.GN544@vapier> Mail-Followup-To: Amrita Honap , gdb-patches@sourceware.org, dj@redhat.com References: MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="CeC2K4acttR/mmFn" Content-Disposition: inline In-Reply-To: X-IsSubscribed: yes X-SW-Source: 2015-02/txt/msg00544.txt.bz2 --CeC2K4acttR/mmFn Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Content-length: 332 On 19 Feb 2015 10:52, Amrita Honap wrote: > The following patch fixes the handling of the offset that is generated=20 > for the mem_get_si. > The mem_get_si reads the 0th,1st and 2nd byte correctly and fails on the = 3rd byte, > where it is again reading the 2nd byte. seems logical to me, but probably want DJ to approve it -mike --CeC2K4acttR/mmFn Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature Content-length: 819 -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBAgAGBQJU5gjRAAoJEEFjO5/oN/WBbCoQAMqTBm3aXvWU3LcrahEGbZTT XW0WyZTyRibNGu2JIS9F7vnmQmu+d8ZG4Q1C8EQ6DB+af/bmm7c1URmRzy4nH1OM jCfrdX2dGFJdNIkW/6oH8xu4F9Tvaa6T0zs1TXgGbdaKRTpzgiYh5H2+MqhZzJOx +4EyQMSQjIlcZJFDUqQV0JO1nDXLkgR8/V+SrTpmT4rMNyhk/bYULllOU2zBhNDe yvsL4EDfCff56+vTlcsG8tohw9QyvuT+xgQ79P4ZEg9DGOw4tC58X+4uysGCgCpR UfKd/nrSe2b4oQ05BKDtNHEj7p8SC3ETxVLmkhcXoWPIiC+VCdixQLqmY8G9pJe2 RAhIgQTl9BF0aYW/PPn1wAQ55xkrnfEx5GzKAAuLmYaraLVNlUZl6HUGJFsO4LZ6 oaAISLhzkJpLLoufRya477pB7YLPM+lD/ohMw68VY3cqJNJ2jAxO0g0iD5EpJaOQ MSX5/0lEhUUp28Sz4VD+eDuJ6eY3rJE0ZKtLpnhWDJABnCLF4J7ReWgk23A93LSG 8dVfFlgDRXFhuqVVve50pyKXCIxcXth6r4MU0FThZozslwjGaZxFvMeC2M+cKgka C2zWZsCXWk2nb3TU7CyhKOgnhtHZSZrcGlGq+bWqTH+oXikJDSsrjXQXJ9Gd5WfR Po11a3n5HBN/Ue4QpoUo =PgTO -----END PGP SIGNATURE----- --CeC2K4acttR/mmFn--