This is the mail archive of the
gdb-prs@sourceware.org
mailing list for the GDB project.
[Bug python/17837] python-injected silent breakpoints broken since 1a853c52
- From: "jan.kiszka at siemens dot com" <sourceware-bugzilla at sourceware dot org>
- To: gdb-prs at sourceware dot org
- Date: Tue, 13 Jan 2015 15:41:08 +0000
- Subject: [Bug python/17837] python-injected silent breakpoints broken since 1a853c52
- Auto-submitted: auto-generated
- References: <bug-17837-4717 at http dot sourceware dot org/bugzilla/>
https://sourceware.org/bugzilla/show_bug.cgi?id=17837
--- Comment #2 from Jan Kiszka <jan.kiszka at siemens dot com> ---
After running lx-symbols, which installs the breakpoint, the target memory
still contains the original code. After resuming the target, int3 gets written.
Permanent breakpoint seems to be the right trace:
...
infrun: target_wait (-1, status) =
infrun: 42000 [Thread 1],
infrun: status->kind = stopped, signal = GDB_SIGNAL_TRAP
infrun: TARGET_WAITKIND_STOPPED
infrun: stop_pc = 0xffffffff81512813
loading @0xffffffffa05eb000: /data/linux/build-dbg/crypto/xor.ko
infrun: BPSTAT_WHAT_SINGLE
infrun: no stepping, continue
infrun: resume (step=0, signal=GDB_SIGNAL_0), trap_expected=0, current thread
[Thread 1] at 0xffffffff81512813
infrun: resume: skipping permanent breakpoint
infrun: prepare_to_wait
--
You are receiving this mail because:
You are on the CC list for the bug.