From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 104349 invoked by alias); 28 Mar 2016 21:33:55 -0000 Mailing-List: contact gdb-patches-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-patches-owner@sourceware.org Received: (qmail 103326 invoked by uid 89); 28 Mar 2016 21:33:54 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-1.7 required=5.0 tests=AWL,BAYES_00,FROM_12LTRDOM,RCVD_IN_DNSWL_NONE,SPF_PASS autolearn=no version=3.3.2 spammy=H*Ad:U*palves, HTo:U*palves, H*r:1905, month X-HELO: relay1.mentorg.com Received: from relay1.mentorg.com (HELO relay1.mentorg.com) (192.94.38.131) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with (AES256-GCM-SHA384 encrypted) ESMTPS; Mon, 28 Mar 2016 21:33:47 +0000 Received: from svr-orw-fem-06.mgc.mentorg.com ([147.34.97.120]) by relay1.mentorg.com with esmtp id 1akenA-0005a1-LD from Don_Breazeal@mentor.com ; Mon, 28 Mar 2016 14:33:44 -0700 Received: from build4-lucid-cs (147.34.91.1) by SVR-ORW-FEM-06.mgc.mentorg.com (147.34.97.120) with Microsoft SMTP Server id 14.3.224.2; Mon, 28 Mar 2016 14:33:44 -0700 Received: by build4-lucid-cs (Postfix, from userid 1905) id 0BF4841294; Mon, 28 Mar 2016 14:33:43 -0700 (PDT) From: Don Breazeal To: , , Subject: [PATCH v2 0/2] Optzd-out ptr: Error handling improvement Date: Mon, 28 Mar 2016 21:33:00 -0000 Message-ID: <1459200820-24735-1-git-send-email-donb@codesourcery.com> In-Reply-To: <56CEF1F5.7060307@redhat.com> References: <56CEF1F5.7060307@redhat.com> MIME-Version: 1.0 Content-Type: text/plain X-IsSubscribed: yes X-SW-Source: 2016-03/txt/msg00506.txt.bz2 This patchset is follows up on a patch submitted about a month ago, which eliminated an error caused by an MI -var-create request for an optimized-out pointer-to-struct. When 'set print object' is 'on', GDB tries to obtain the actual type rather than the declared type, and to do so must dereference the pointer, which is impossible because it has been optimized out. The original patch did not include a test; that has now been added. Patch 1/1: New test for accessing optimized-out pointer-to-struct. Patch 2/2: The original patch, which eliminates the error when accessing an optimized-out-pointer. The fix was regression tested on a PowerPC board with a Linux x86 host, and the test was tested on native Linux x86_64. Thanks, --Don