From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 1403 invoked by alias); 31 May 2012 00:31:33 -0000 Received: (qmail 1394 invoked by uid 22791); 31 May 2012 00:31:32 -0000 X-SWARE-Spam-Status: No, hits=-1.6 required=5.0 tests=AWL,BAYES_00,KAM_STOCKGEN,KHOP_THREADED,T_RP_MATCHES_RCVD X-Spam-Check-By: sourceware.org Received: from gw1.transmode.se (HELO gw1.transmode.se) (195.58.98.146) by sourceware.org (qpsmtpd/0.43rc1) with ESMTP; Thu, 31 May 2012 00:31:19 +0000 Received: from mail1.transmode.se (mail1.transmode.se [192.168.201.18]) by gw1.transmode.se (Postfix) with ESMTP id 7007A258021; Thu, 31 May 2012 02:31:18 +0200 (CEST) In-Reply-To: <20120530213539.GA32534@host2.jankratochvil.net> References: <20120530213539.GA32534@host2.jankratochvil.net> Subject: Re: GDB 7.4 adds shlib_events BPs, casuing problem in debugging vmlinux X-KeepSent: 020DF8F0:F8677382-C1257A0F:00028D6D; type=4; name=$KeepSent To: Jan Kratochvil Cc: gdb@sourceware.org Message-ID: From: Joakim Tjernlund Date: Thu, 31 May 2012 00:31:00 -0000 MIME-Version: 1.0 Content-type: text/plain; charset=US-ASCII Mailing-List: contact gdb-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-owner@sourceware.org X-SW-Source: 2012-05/txt/msg00149.txt.bz2 Jan Kratochvil wrote on 2012/05/30 23:35:39: > > On Wed, 30 May 2012 16:25:29 +0200, Joakim Tjernlund wrote: > > Found this in solib-svr4.c which I think is the problem: > > static const char * const bkpt_names[] = > > { > > "_start", > > "__start", > > "main", > > NULL > > }; > > ... > > ... > > if (!current_inferior ()->attach_flag) > > { > > for (bkpt_namep = bkpt_names; *bkpt_namep != NULL; bkpt_namep++) > > { > > msymbol = lookup_minimal_symbol (*bkpt_namep, NULL, symfile_objfile); > > if ((msymbol != NULL) && (SYMBOL_VALUE_ADDRESS (msymbol) != 0)) > > { > > sym_addr = SYMBOL_VALUE_ADDRESS (msymbol); > > sym_addr = gdbarch_convert_from_func_ptr_addr (target_gdbarch, > > sym_addr, > > ¤t_target); > > create_solib_event_breakpoint (target_gdbarch, sym_addr); > > return 1; > > } > > } > > } > > > > This will insert the above BP just because the symbol _start is present. Seems like > > there are missing safe guards to avoid the unwanted BP > > This breakpoint is wanted. If GDB fails to insert the "_r_debug_state" > breakpoint into ld.so for whatever reason then after initial DT_NEEDED loading > of shared libraries ld.so gives away control to the main executable. > "_start" is the possible symbol there how to catch just exit from ld.so. BTW, if this is all about ld.so, then why not guard this with if (interp_name) /* Check if there is a ld.so at all */ { ... }