From patchwork Thu Dec 31 04:32:27 2015 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mike Frysinger X-Patchwork-Id: 10183 X-Patchwork-Delegate: vapier@gentoo.org Received: (qmail 96554 invoked by alias); 31 Dec 2015 04:32:42 -0000 Mailing-List: contact gdb-patches-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Unsubscribe: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-patches-owner@sourceware.org Delivered-To: mailing list gdb-patches@sourceware.org Received: (qmail 96421 invoked by uid 89); 31 Dec 2015 04:32:40 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-1.8 required=5.0 tests=AWL, BAYES_00, RP_MATCHES_RCVD, SPF_PASS autolearn=ham version=3.3.2 spammy=6206 X-HELO: smtp.gentoo.org Received: from smtp.gentoo.org (HELO smtp.gentoo.org) (140.211.166.183) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with (AES256-GCM-SHA384 encrypted) ESMTPS; Thu, 31 Dec 2015 04:32:39 +0000 Received: from localhost.localdomain (localhost [127.0.0.1]) by smtp.gentoo.org (Postfix) with ESMTP id 3E84D33E3A9; Thu, 31 Dec 2015 04:32:37 +0000 (UTC) From: Mike Frysinger To: gdb-patches@sourceware.org Cc: nickc@redhat.com Subject: [PATCH 3/4] sim: bfin: add support disasm tracing Date: Wed, 30 Dec 2015 23:32:27 -0500 Message-Id: <1451536348-31380-4-git-send-email-vapier@gentoo.org> In-Reply-To: <1451536348-31380-1-git-send-email-vapier@gentoo.org> References: <1451536348-31380-1-git-send-email-vapier@gentoo.org> X-IsSubscribed: yes --- sim/bfin/interp.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/sim/bfin/interp.c b/sim/bfin/interp.c index 2da70b5..c71b0a2 100644 --- a/sim/bfin/interp.c +++ b/sim/bfin/interp.c @@ -620,6 +620,8 @@ step_once (SIM_CPU *cpu) trace_prefix (sd, cpu, NULL_CIA, oldpc, TRACE_LINENUM_P (cpu), NULL, 0, " "); /* Use a space for gcc warnings. */ + TRACE_DISASM (cpu, oldpc); + /* Handle hardware single stepping when lower than EVT3, and when SYSCFG has already had the SSSTEP bit enabled. */ ssstep = false;