From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 26511 invoked by alias); 9 Jun 2014 14:26:15 -0000 Mailing-List: contact gdb-patches-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-patches-owner@sourceware.org Received: (qmail 26496 invoked by uid 89); 9 Jun 2014 14:26:14 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-2.2 required=5.0 tests=AWL,BAYES_00,RP_MATCHES_RCVD,SPF_HELO_PASS,SPF_PASS autolearn=ham version=3.3.2 X-HELO: mx1.redhat.com Received: from mx1.redhat.com (HELO mx1.redhat.com) (209.132.183.28) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Mon, 09 Jun 2014 14:26:13 +0000 Received: from int-mx09.intmail.prod.int.phx2.redhat.com (int-mx09.intmail.prod.int.phx2.redhat.com [10.5.11.22]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id s59EQAAl012096 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 9 Jun 2014 10:26:10 -0400 Received: from [127.0.0.1] (ovpn01.gateway.prod.ext.ams2.redhat.com [10.39.146.11]) by int-mx09.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id s59EQ9mS018811; Mon, 9 Jun 2014 10:26:09 -0400 Message-ID: <5395C400.7070405@redhat.com> Date: Mon, 09 Jun 2014 14:26:00 -0000 From: Pedro Alves User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.5.0 MIME-Version: 1.0 To: gdb-patches@sourceware.org CC: Joel Brobecker Subject: Re: [pushed] sss-bp-on-user-bp-2.exp sometimes fails on native GNU/Linux. References: <1401394280-14999-1-git-send-email-brobecker@adacore.com> <5387BFF0.6010208@redhat.com> <20140530122253.GC4289@adacore.com> <53887ED5.5050603@redhat.com> <20140530132659.GD4289@adacore.com> <20140530193549.GF4289@adacore.com> <538D05CC.8050608@redhat.com> <538D85A9.5010004@redhat.com> <538DB728.7080702@redhat.com> <538DC8D5.507@redhat.com> <539210E5.60000@redhat.com> In-Reply-To: <539210E5.60000@redhat.com> Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-SW-Source: 2014-06/txt/msg00379.txt.bz2 On 06/06/2014 08:05 PM, Pedro Alves wrote: > Enabling infrun/target debug logs, we can see the problem. > Simplified, that's: > > (gdb) PASS: gdb.base/sss-bp-on-user-bp-2.exp: define stepi_del_break > stepi_del_break > infrun: clear_proceed_status_thread (process 25311) > infrun: resume (step=1, signal=GDB_SIGNAL_0), trap_expected=0, current thread [process 25311] at 0x400594 > LLR: PTRACE_SINGLESTEP process 25311, 0 (resume event thread) > target_resume (25311, step, 0) > native:target_xfer_partial (3, (null), 0x0, 0x32dce4c, 0x400595, 1) = 0, 0 > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ > (gdb) linux_nat_wait: [process -1], [TARGET_WNOHANG] > > 0x400595 is the address of the breakpoint, and "= 0" is > TARGET_XFER_EOF. That's default_memory_remove_breakpoint trying to > remove the breakpoint, but failing. I was quite surprised this didn't result in a user visible warning. Turns out that's a regression compared to 7.7. This fixes it: https://sourceware.org/ml/gdb-patches/2014-06/msg00377.html -- Pedro Alves