This is the mail archive of the gdb-patches@sourceware.org mailing list for the GDB project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

Re: [RFC/Patch v4] Call overloaded operators to perform valid Python operations on struct/class values.


I have pushed the attached patch (which includes the corrections
suggested by Eli).

On Thu, Feb 6, 2014 at 10:53 PM, Doug Evans <dje@google.com> wrote:
> Hi.
>
> The patch is fine with me.
>
> I put in some time to play with the patch.
> One thing I wondered about is what happens if the user does string1 + string2?
> We do leak memory.  That's not a problem with this patch of course,
> though by making this scriptable the problem gets worse.
> I filed https://sourceware.org/bugzilla/show_bug.cgi?id=16537
>
> btw, Just writing this down since it's on my mind:
> If anything needs to be done it should be addressed in a separate
> patch.  And maybe leaving things as-is is ok, and just a doc addition
> is all that's needed. Anyways, hand called functions (which includes
> c++ operators) run the inferior (setting aside using debug methods).
> The more we make it easy to invoke c++ operators the more users are
> going to run into the issues of hand called functions (e.g. what if
> they have a breakpoint set that the c++ operator happens to trip?).

Attachment: python_op_patch_v5.txt
Description: Text document


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]