From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 36079 invoked by alias); 9 Apr 2015 09:25:30 -0000 Mailing-List: contact gdb-patches-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-patches-owner@sourceware.org Received: (qmail 36061 invoked by uid 89); 9 Apr 2015 09:25:29 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-0.6 required=5.0 tests=AWL,BAYES_00,FREEMAIL_FROM,RCVD_IN_DNSWL_LOW,SPF_PASS autolearn=ham version=3.3.2 X-HELO: mail-pd0-f178.google.com Received: from mail-pd0-f178.google.com (HELO mail-pd0-f178.google.com) (209.85.192.178) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with (AES128-GCM-SHA256 encrypted) ESMTPS; Thu, 09 Apr 2015 09:25:27 +0000 Received: by pdea3 with SMTP id a3so146822527pde.3 for ; Thu, 09 Apr 2015 02:25:25 -0700 (PDT) X-Received: by 10.70.53.3 with SMTP id x3mr54439558pdo.133.1428571525547; Thu, 09 Apr 2015 02:25:25 -0700 (PDT) Received: from [127.0.0.1] (gcc1-power7.osuosl.org. [140.211.15.137]) by mx.google.com with ESMTPSA id kn7sm14031774pab.10.2015.04.09.02.25.23 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 09 Apr 2015 02:25:24 -0700 (PDT) Message-ID: <55264580.2030504@gmail.com> Date: Thu, 09 Apr 2015 09:25:00 -0000 From: Yao Qi User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.5.0 MIME-Version: 1.0 To: Pedro Alves , gdb-patches@sourceware.org Subject: Re: [PATCH] gdbserver gnu/linux: stepping over breakpoint References: <1428569112-18004-1-git-send-email-qiyaoltc@gmail.com> <552640A8.1050504@redhat.com> In-Reply-To: <552640A8.1050504@redhat.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-IsSubscribed: yes X-SW-Source: 2015-04/txt/msg00319.txt.bz2 On 09/04/15 10:04, Pedro Alves wrote: > On 04/09/2015 09:45 AM, Yao Qi wrote: > >> gdb/gdbserver: >> >> 2015-04-09 Yao Qi >> >> * linux-low.c (linux_insert_point): Call >> insert_memory_breakpoint if TYPE is raw_bkpt_type_sw. >> (linux_remove_point): Call remove_memory_breakpoint if type is >> raw_bkpt_type_sw. >> * linux-x86-low.c (x86_insert_point): Don't call >> insert_memory_breakpoint. >> (x86_remove_point): Don't call remove_memory_breakpoint. > > LGTM. > Patch is pushed in. -- Yao (齐尧)