This is the mail archive of the
gdb-prs@sourceware.org
mailing list for the GDB project.
[Bug python/17837] python-injected silent breakpoints broken since 1a853c52
- From: "palves at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: gdb-prs at sourceware dot org
- Date: Tue, 03 Feb 2015 13:06:21 +0000
- Subject: [Bug python/17837] python-injected silent breakpoints broken since 1a853c52
- Auto-submitted: auto-generated
- References: <bug-17837-4717 at http dot sourceware dot org/bugzilla/>
https://sourceware.org/bugzilla/show_bug.cgi?id=17837
--- Comment #9 from Pedro Alves <palves at redhat dot com> ---
I think it should be possible to see the same bug when debugging a userspace
program, as long as the script does the same things. E.g., have gdb debug a
program that just does something like:
void do_init_module(void)
{
}
int main ()
{
do_init_module ();
return 0;
}
instead of debugging the kernel, and tweak/hack the lx-symbols command to set
the breakpoint at that do_init_module, and have it do add-symbol-file/
remove-symbol-file to emulate module loading.
Could you do that? An easy reproducer like would be very useful.
--
You are receiving this mail because:
You are on the CC list for the bug.