This is the mail archive of the gdb-prs@sourceware.org mailing list for the GDB project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug python/17837] python-injected silent breakpoints broken since 1a853c52


https://sourceware.org/bugzilla/show_bug.cgi?id=17837

--- Comment #10 from Jan Kiszka <jan.kiszka at siemens dot com> ---
Tried this path but didn't succeed so far. While I was able to shrink down the
kernel-based reproduction case on basically

    class LoadModuleBreakpoint(gdb.Breakpoint):
        ....
        def stop(self):
            cmdline = "add-symbol-file /path/module.ko 0xffffffffa05f0000"
            gdb.execute(cmdline, to_string=True)
            return False

and still get the bug, using a normal userspace application with the same
binary added on breakpoint hit does not trigger it.

Could it be that the vmlinux layout makes the difference here?

-- 
You are receiving this mail because:
You are on the CC list for the bug.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]