aboutsummaryrefslogtreecommitdiff
path: root/gdbserver/linux-aarch64-ipa.cc
diff options
context:
space:
mode:
authorAndrew Burgess <aburgess@redhat.com>2022-10-20 11:14:33 +0100
committerAndrew Burgess <aburgess@redhat.com>2023-04-03 14:46:32 +0100
commit3812b38d8de5804ad3eadd6c7a5d532402ddabab (patch)
tree24567807fc8f29e4b8eaab45db57fcf4e9f494d6 /gdbserver/linux-aarch64-ipa.cc
parent0576dff20f052ab6d1ddba861235c7dc2584a145 (diff)
downloadfsf-binutils-gdb-3812b38d8de5804ad3eadd6c7a5d532402ddabab.zip
fsf-binutils-gdb-3812b38d8de5804ad3eadd6c7a5d532402ddabab.tar.gz
fsf-binutils-gdb-3812b38d8de5804ad3eadd6c7a5d532402ddabab.tar.bz2
gdbserver: allow agent expressions to fail with invalid memory access
This commit extends gdbserver to take account of a failed memory access from agent_mem_read, and to return a new eval_result_type expr_eval_invalid_memory_access. I have only updated the agent_mem_read calls related directly to reading memory, I have not updated any of the calls related to tracepoint data collection. This is just because I'm not familiar with that area of gdb/gdbserver, and I don't want to break anything, so leaving the existing behaviour untouched seems like the safest approach. I've then updated gdb.base/bp-cond-failure.exp to test evaluating the breakpoints on the target, and have also extended the test so that it checks for different sizes of memory access.
Diffstat (limited to 'gdbserver/linux-aarch64-ipa.cc')
0 files changed, 0 insertions, 0 deletions