From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 86974 invoked by alias); 19 Nov 2015 16:18:17 -0000 Mailing-List: contact gdb-patches-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-patches-owner@sourceware.org Received: (qmail 86885 invoked by uid 89); 19 Nov 2015 16:18:16 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-2.1 required=5.0 tests=AWL,BAYES_00,RP_MATCHES_RCVD,SPF_HELO_PASS autolearn=ham version=3.3.2 X-HELO: mx1.redhat.com Received: from mx1.redhat.com (HELO mx1.redhat.com) (209.132.183.28) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with (AES256-GCM-SHA384 encrypted) ESMTPS; Thu, 19 Nov 2015 16:18:15 +0000 Received: from int-mx14.intmail.prod.int.phx2.redhat.com (int-mx14.intmail.prod.int.phx2.redhat.com [10.5.11.27]) by mx1.redhat.com (Postfix) with ESMTPS id 94D9AA8A; Thu, 19 Nov 2015 16:18:13 +0000 (UTC) Received: from [127.0.0.1] (ovpn01.gateway.prod.ext.ams2.redhat.com [10.39.146.11]) by int-mx14.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id tAJGICUG013324; Thu, 19 Nov 2015 11:18:12 -0500 Message-ID: <564DF643.6000407@redhat.com> Date: Thu, 19 Nov 2015 16:18:00 -0000 From: Pedro Alves User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.7.0 MIME-Version: 1.0 To: "Jose E. Marchesi" , gdb-patches@sourceware.org Subject: Re: [PATCH] [SPARC] callfuncs.exp: avoid spurious register differences in sparc64 targets. References: <87ziyam0yh.fsf@oracle.com> In-Reply-To: <87ziyam0yh.fsf@oracle.com> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit X-SW-Source: 2015-11/txt/msg00403.txt.bz2 On 11/19/2015 04:02 PM, Jose E. Marchesi wrote: > > Hi all! Ok to commit? > > commit 50fa72dabc43ba7fabbd5d213013d78cd22e2342 > Author: Jose E. Marchesi > Date: Thu Nov 19 10:55:06 2015 -0500 > > callfuncs.exp: avoid spurious register differences in sparc64 targets. > > The Linux kernel disables the FPU upon returning to userland. This > introduces spurious failures in the register preservation tests in > callfuncs.exp, since the pstate.PEF bit gets cleared after system calls. > + -re "^pstate\[ \t\]+\[^\r\n\]+\r\n" { > + if [istarget "sparc64-*-linux-gnu"] { > + # Filter out the pstate register, since in sparc64 > + # targets the Linux kernel disables pstate.PEF when > + # returning from traps, giving spurious differences. Isn't this a kernel bug? It sounds like it's impossible to debug FPU code if you e.g. step over FPU instructions? > + } else { > + lappend all_registers_lines $expect_out(0,string) > + } > + exp_continue > + } Thanks, Pedro Alves