From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 73986 invoked by alias); 13 Apr 2015 16:16:51 -0000 Mailing-List: contact gdb-patches-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-patches-owner@sourceware.org Received: (qmail 73954 invoked by uid 89); 13 Apr 2015 16:16:51 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-1.0 required=5.0 tests=AWL,BAYES_00,FREEMAIL_FROM,RCVD_IN_DNSWL_LOW,SPF_PASS autolearn=ham version=3.3.2 X-HELO: mail-pd0-f176.google.com Received: from mail-pd0-f176.google.com (HELO mail-pd0-f176.google.com) (209.85.192.176) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with (AES128-GCM-SHA256 encrypted) ESMTPS; Mon, 13 Apr 2015 16:16:50 +0000 Received: by pdbnk13 with SMTP id nk13so112119183pdb.0 for ; Mon, 13 Apr 2015 09:16:49 -0700 (PDT) X-Received: by 10.66.217.129 with SMTP id oy1mr28056057pac.82.1428941809054; Mon, 13 Apr 2015 09:16:49 -0700 (PDT) Received: from E107787-LIN (gcc1-power7.osuosl.org. [140.211.15.137]) by mx.google.com with ESMTPSA id u8sm7746652pdj.46.2015.04.13.09.16.46 (version=TLSv1.2 cipher=RC4-SHA bits=128/128); Mon, 13 Apr 2015 09:16:48 -0700 (PDT) From: Yao Qi To: Pedro Alves Cc: Yao Qi , gdb-patches@sourceware.org Subject: Re: [PATCH v2 00/23] All-stop on top of non-stop References: <1428410990-28560-1-git-send-email-palves@redhat.com> <86lhi0v1el.fsf@gmail.com> <55278B2B.1070809@redhat.com> <868ue0uyfa.fsf@gmail.com> <552BE0A3.5040001@redhat.com> Date: Mon, 13 Apr 2015 16:16:00 -0000 In-Reply-To: <552BE0A3.5040001@redhat.com> (Pedro Alves's message of "Mon, 13 Apr 2015 16:28:35 +0100") Message-ID: <86vbh0t34m.fsf@gmail.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/24.3 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-IsSubscribed: yes X-SW-Source: 2015-04/txt/msg00467.txt.bz2 Pedro Alves writes: Pedro, I can't apply this patch cleanly, so unable to test it for aarch64-linux. I'll give a test once your V3 is posted, in which this patch is included, I assume. > + /* If we have events pending, go through handle_inferior_event > + again, picking up a pending event at random. This avoids > + thread starvation. */ > + pending =3D iterate_over_threads (resumed_thread_with_pending_stat= us, > + NULL); A quick question, I don't see how pending events are picked up at random. Do you mean target_ops->to_wait, such as linux_nat_wait, can get event at random? --=20 Yao (=E9=BD=90=E5=B0=A7)