From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 119452 invoked by alias); 12 Jul 2017 03:25:34 -0000 Mailing-List: contact gdb-patches-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-patches-owner@sourceware.org Received: (qmail 54996 invoked by uid 89); 12 Jul 2017 03:23:08 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-1.4 required=5.0 tests=BAYES_00,RCVD_IN_SORBS_SPAM,RP_MATCHES_RCVD,SPF_PASS autolearn=no version=3.3.2 spammy=Great, super X-HELO: aserp1040.oracle.com Received: from aserp1040.oracle.com (HELO aserp1040.oracle.com) (141.146.126.69) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Wed, 12 Jul 2017 03:23:06 +0000 Received: from userv0021.oracle.com (userv0021.oracle.com [156.151.31.71]) by aserp1040.oracle.com (Sentrion-MTA-4.3.2/Sentrion-MTA-4.3.2) with ESMTP id v6C3N1Bk008967 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 12 Jul 2017 03:23:02 GMT Received: from userv0122.oracle.com (userv0122.oracle.com [156.151.31.75]) by userv0021.oracle.com (8.14.4/8.14.4) with ESMTP id v6C3N1Zs014427 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 12 Jul 2017 03:23:01 GMT Received: from abhmp0015.oracle.com (abhmp0015.oracle.com [141.146.116.21]) by userv0122.oracle.com (8.14.4/8.14.4) with ESMTP id v6C3N08b013871; Wed, 12 Jul 2017 03:23:01 GMT Received: from [172.27.35.125] (/108.88.88.153) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Tue, 11 Jul 2017 20:23:00 -0700 Subject: Re: [PING] [PATCH v3] gdb: ADI support To: Pedro Alves Cc: qiyaoltc@gmail.com, gdb-patches@sourceware.org References: <98885f9a-7c06-4ab5-b9a2-342277839cc4@default> <4d405b43-8c9f-c6fd-ab83-d0de9f698cb9@redhat.com> From: Wei-min Pan Message-ID: Date: Wed, 12 Jul 2017 03:25:00 -0000 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1 MIME-Version: 1.0 In-Reply-To: <4d405b43-8c9f-c6fd-ab83-d0de9f698cb9@redhat.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-SW-Source: 2017-07/txt/msg00103.txt.bz2 On 7/11/2017 5:43 PM, Pedro Alves wrote: > On 07/12/2017 01:36 AM, Weimin Pan wrote: >> Simply using target_fileio_xxx routines to replace their >> corresponding open/pread64/pwrite64/close calls, as you >> suggested, does solve the cross-referencing problem. >> The cross gdb build for all targets was then retried and >> was successful. > Great. If you can make sure that the new test runs > FAIL free against gdbserver too, that'll be super. OK, will give it a try. > Note that this /proc reading won't work with core debugging, > of course. If it makes sense to inspect ADI state in core > dumps, and the info is actually available in the cores, the > target_object / target_xfer path may be the way to go. > But that can be left for later if you'd like. Thanks for pointing it out and will keep that in mind. Dumping ADI state to a core file, most likely in a separate ELF section, is planned for the next phase. Until that's done, ADI information will only be available for live processes. > Thanks, > Pedro Alves