From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 64083 invoked by alias); 12 Mar 2015 17:48:05 -0000 Mailing-List: contact gdb-patches-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-patches-owner@sourceware.org Received: (qmail 64058 invoked by uid 89); 12 Mar 2015 17:48:04 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-3.9 required=5.0 tests=AWL,BAYES_00,SPF_HELO_PASS,SPF_PASS,T_RP_MATCHES_RCVD autolearn=ham version=3.3.2 X-Spam-User: qpsmtpd, 2 recipients X-HELO: mx1.redhat.com Received: from mx1.redhat.com (HELO mx1.redhat.com) (209.132.183.28) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with (AES256-GCM-SHA384 encrypted) ESMTPS; Thu, 12 Mar 2015 17:48:03 +0000 Received: from int-mx10.intmail.prod.int.phx2.redhat.com (int-mx10.intmail.prod.int.phx2.redhat.com [10.5.11.23]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id t2CHm2Z3015035 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Thu, 12 Mar 2015 13:48:02 -0400 Received: from host1.jankratochvil.net ([10.40.204.23]) by int-mx10.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id t2CHlwMf003384 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NO); Thu, 12 Mar 2015 13:48:01 -0400 Date: Thu, 12 Mar 2015 17:48:00 -0000 From: Jan Kratochvil To: Michael Eager Cc: Pedro Alves , "gdb-patches@sourceware.org" , binutils Subject: Re: [PATCH] Support gzip compressed exec and core files in gdb Message-ID: <20150312174757.GA2956@host1.jankratochvil.net> References: <54FF77D6.7010400@eagerm.com> <20150311221329.GB11980@host1.jankratochvil.net> <5500E074.6070002@eagerm.com> <55016D6F.4010104@redhat.com> <5501B1EB.5010806@eagerm.com> <5501BB08.90503@redhat.com> <5501C59A.1070405@eagerm.com> <20150312171144.GA13600@host1.jankratochvil.net> <5501CEE9.2060607@eagerm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <5501CEE9.2060607@eagerm.com> User-Agent: Mutt/1.5.23 (2014-03-12) X-IsSubscribed: yes X-SW-Source: 2015-03/txt/msg00359.txt.bz2 On Thu, 12 Mar 2015 18:37:45 +0100, Michael Eager wrote: > On 03/12/15 10:11, Jan Kratochvil wrote: > > One can readlink(/proc/self/fd/%d) although I haven't checked now how exactly > > to use it. > > This won't tell what flags were used to open the file, > so that the same flags can be used on the decompressed file. If you mean the O_RDONLY etc. flags then read(/proc/self/fdinfo/%d): pos: 0 flags: 0102002 mnt_id: 20 Jan