This is the mail archive of the gdb-prs@sourceware.org mailing list for the GDB project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug python/17837] python-injected silent breakpoints broken since 1a853c52


https://sourceware.org/bugzilla/show_bug.cgi?id=17837

--- Comment #9 from Pedro Alves <palves at redhat dot com> ---
I think it should be possible to see the same bug when debugging a userspace
program, as long as the script does the same things.  E.g., have gdb debug a
program that just does something like:

 void do_init_module(void)
 {
 }

 int main ()
 {
    do_init_module ();
    return 0;
 }

instead of debugging the kernel, and tweak/hack the lx-symbols command to set
the breakpoint at that do_init_module, and have it do add-symbol-file/
remove-symbol-file to emulate module loading.

Could you do that?  An easy reproducer like would be very useful.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]