From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from barracuda.ebox.ca (barracuda.ebox.ca [96.127.255.19]) by sourceware.org (Postfix) with ESMTPS id 520FE385803E for ; Tue, 17 Nov 2020 19:12:34 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.3.2 sourceware.org 520FE385803E X-ASG-Debug-ID: 1605640352-0c856e6cd613c2c0001-fS2M51 Received: from smtp.ebox.ca (smtp.ebox.ca [96.127.255.82]) by barracuda.ebox.ca with ESMTP id 6YTHCfWBHLJ6zFCj (version=TLSv1 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 17 Nov 2020 14:12:33 -0500 (EST) X-Barracuda-Envelope-From: simon.marchi@polymtl.ca X-Barracuda-RBL-Trusted-Forwarder: 96.127.255.82 Received: from simark.localdomain (173-246-6-90.qc.cable.ebox.net [173.246.6.90]) by smtp.ebox.ca (Postfix) with ESMTP id CFA9E441B21; Tue, 17 Nov 2020 14:12:32 -0500 (EST) From: Simon Marchi X-Barracuda-RBL-IP: 173.246.6.90 X-Barracuda-Effective-Source-IP: 173-246-6-90.qc.cable.ebox.net[173.246.6.90] X-Barracuda-Apparent-Source-IP: 173.246.6.90 To: gdb-patches@sourceware.org Cc: nilsgladitz@gmail.com, Simon Marchi Subject: [PATCH 0/4] Fix CU expansion queue-related problems Date: Tue, 17 Nov 2020 14:12:27 -0500 X-ASG-Orig-Subj: [PATCH 0/4] Fix CU expansion queue-related problems Message-Id: <20201117191231.2712629-1-simon.marchi@polymtl.ca> X-Mailer: git-send-email 2.29.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Barracuda-Connect: smtp.ebox.ca[96.127.255.82] X-Barracuda-Start-Time: 1605640353 X-Barracuda-Encrypted: DHE-RSA-AES256-SHA X-Barracuda-URL: https://96.127.255.19:443/cgi-mod/mark.cgi X-Barracuda-BRTS-Status: 1 X-Virus-Scanned: by bsmtpd at ebox.ca X-Barracuda-Scan-Msg-Size: 1004 X-Barracuda-Spam-Score: 0.00 X-Barracuda-Spam-Status: No, SCORE=0.00 using global scores of TAG_LEVEL=1000.0 QUARANTINE_LEVEL=1000.0 KILL_LEVEL=8.0 tests= X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.3.85943 Rule breakdown below pts rule name description ---- ---------------------- -------------------------------------------------- X-Spam-Status: No, score=-7.6 required=5.0 tests=BAYES_00, KAM_DMARC_QUARANTINE, KAM_DMARC_STATUS, RCVD_IN_DNSWL_LOW, SPF_HELO_NONE, SPF_SOFTFAIL, TXREP autolearn=no autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on server2.sourceware.org X-BeenThere: gdb-patches@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gdb-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Nov 2020 19:12:36 -0000 This patch series fixes problems explained in PR 26828 [1]. The problems are related to CU DIEs loading/freeing and the CU expansion queue. All the gory details are in the commit logs. I tried to write a test case for this using the DWARF assembler but I couldn't manage to do it. I decided to submit the series anyway, because I'd still like to fix the issue. I might try again later, but I might also not have the time, so if anybody would like to give it a try, you are welcome. [1] https://sourceware.org/bugzilla/show_bug.cgi?id=26828 Simon Marchi (4): gdb/dwarf: add some logging in dwarf2/read.c gdb/dwarf: add assertion in maybe_queue_comp_unit gdb/dwarf: don't enqueue CU in maybe_queue_comp_unit if already expanded gdb/dwarf: create and destroy dwarf2_per_bfd's CUs-to-expand queue gdb/dwarf2/read.c | 112 ++++++++++++++++++++++++++++++---------------- gdb/dwarf2/read.h | 2 +- 2 files changed, 75 insertions(+), 39 deletions(-) -- 2.29.1