From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 18039 invoked by alias); 16 Mar 2010 16:23:41 -0000 Received: (qmail 18024 invoked by uid 22791); 16 Mar 2010 16:23:40 -0000 X-SWARE-Spam-Status: No, hits=-7.3 required=5.0 tests=AWL,BAYES_00,RCVD_IN_DNSWL_HI,SPF_HELO_PASS X-Spam-Check-By: sourceware.org Received: from mx1.redhat.com (HELO mx1.redhat.com) (209.132.183.28) by sourceware.org (qpsmtpd/0.43rc1) with ESMTP; Tue, 16 Mar 2010 16:23:33 +0000 Received: from int-mx01.intmail.prod.int.phx2.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) by mx1.redhat.com (8.13.8/8.13.8) with ESMTP id o2GGNOPh014920 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 16 Mar 2010 12:23:24 -0400 Received: from ns3.rdu.redhat.com (ns3.rdu.redhat.com [10.11.255.199]) by int-mx01.intmail.prod.int.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id o2GGNOvS009590; Tue, 16 Mar 2010 12:23:24 -0400 Received: from opsy.redhat.com (ovpn01.gateway.prod.ext.phx2.redhat.com [10.5.9.1]) by ns3.rdu.redhat.com (8.13.8/8.13.8) with ESMTP id o2GGNNxW011914; Tue, 16 Mar 2010 12:23:23 -0400 Received: by opsy.redhat.com (Postfix, from userid 500) id ECEFC378261; Tue, 16 Mar 2010 10:23:22 -0600 (MDT) From: Tom Tromey To: Vladimir Prus Cc: gdb-patches@sourceware.org Subject: Re: [MI tracepoints 5/9] -break-passcount References: <201003141156.07046.vladimir@codesourcery.com> <201003161847.47956.vladimir@codesourcery.com> <201003161905.27202.vladimir@codesourcery.com> Reply-To: Tom Tromey Date: Tue, 16 Mar 2010 16:23:00 -0000 In-Reply-To: <201003161905.27202.vladimir@codesourcery.com> (Vladimir Prus's message of "Tue, 16 Mar 2010 19:05:27 +0300") Message-ID: User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/23.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Mailing-List: contact gdb-patches-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-patches-owner@sourceware.org X-SW-Source: 2010-03/txt/msg00592.txt.bz2 >>>>> "Volodya" == Vladimir Prus writes: Tom> It is odd to have a command named -break-passcount that can't actually Tom> be used on breakpoints Volodya> It can -- just not on all kinds of breakpoints. Ok. Maybe you could explain how -break-passcount and -break-after are different, without referring to "tracepoints" as something separate from "breakpoints". Tom> -- and that will never be usable on breakpoints. Volodya> You mean, on "ordinary" breakpoints? It's totally unclear -- Volodya> while presently tracing breakpoints are always target assisted, Volodya> we may in future implement a software tracing breakpoints, Volodya> where GDB would execute the commands implicitly for user. I was just basing this observation on your own statement that merging -break-passcount and -break-after doesn't make sense. Tom