This is the mail archive of the
gdb-prs@sourceware.org
mailing list for the GDB project.
[Bug python/17837] python-injected silent breakpoints broken since 1a853c52
- From: "jan.kiszka at siemens dot com" <sourceware-bugzilla at sourceware dot org>
- To: gdb-prs at sourceware dot org
- Date: Wed, 04 Feb 2015 16:22:52 +0000
- Subject: [Bug python/17837] python-injected silent breakpoints broken since 1a853c52
- Auto-submitted: auto-generated
- References: <bug-17837-4717 at http dot sourceware dot org/bugzilla/>
https://sourceware.org/bugzilla/show_bug.cgi?id=17837
--- Comment #10 from Jan Kiszka <jan.kiszka at siemens dot com> ---
Tried this path but didn't succeed so far. While I was able to shrink down the
kernel-based reproduction case on basically
class LoadModuleBreakpoint(gdb.Breakpoint):
....
def stop(self):
cmdline = "add-symbol-file /path/module.ko 0xffffffffa05f0000"
gdb.execute(cmdline, to_string=True)
return False
and still get the bug, using a normal userspace application with the same
binary added on breakpoint hit does not trigger it.
Could it be that the vmlinux layout makes the difference here?
--
You are receiving this mail because:
You are on the CC list for the bug.