From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: by sourceware.org (Postfix, from userid 48) id 257153858422; Tue, 5 Sep 2023 16:05:43 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 257153858422 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sourceware.org; s=default; t=1693929943; bh=2DWO0tB7efZmO3kpXJWSI9P7kx1+qMihu+NLpgbhGdQ=; h=From:To:Subject:Date:In-Reply-To:References:From; b=cjKYFfzoa1Rre/L9pk1DsSbg51tULWTxR49dAQWJlSViSicZeySTC9Igo7+VQjOpa 7G2dTpEkdRZCo7oEWMtOgkih87hti+y5vmZMRjjfBU7S9+g63XJTxp6EQ+QjPNBEbJ xpnubL6hbCzJUMaeX6A5d2R/iuzAH6Zj87ilWy34= From: "cvs-commit at gcc dot gnu.org" To: gdb-prs@sourceware.org Subject: [Bug ada/25811] [ada] start attempts to set breakpoint on main of previous exec Date: Tue, 05 Sep 2023 16:05:42 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: gdb X-Bugzilla-Component: ada X-Bugzilla-Version: HEAD X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: cvs-commit at gcc dot gnu.org X-Bugzilla-Status: NEW X-Bugzilla-Resolution: X-Bugzilla-Priority: P2 X-Bugzilla-Assigned-To: tromey at sourceware dot org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: http://sourceware.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 List-Id: https://sourceware.org/bugzilla/show_bug.cgi?id=3D25811 --- Comment #4 from cvs-commit at gcc dot gnu.org --- The master branch has been updated by Tom Tromey : https://sourceware.org/git/gitweb.cgi?p=3Dbinutils-gdb.git;h=3D358be6e72d46= 4349e5146095bdb04b96be5734c1 commit 358be6e72d464349e5146095bdb04b96be5734c1 Author: Tom Tromey Date: Mon Aug 21 09:55:14 2023 -0600 Read Ada main name from executable, not inferior An upstream bug report points out this bug: if the user switches from one Ada executable to another without "kill"ing the inferior, then the "start" command will fail. What happens here is that the Ada "main" name is found in a constant string in the executable. But, if the inferior is running, then the process_stratum target reads from the inferior memory. This patch fixes the problem by changing the main name code to set trust-readonly-sections, causing the target stack to read from the executable instead. I looked briefly at changing GNAT to emit DW_AT_main_subprogram instead, but this looks to be pretty involved. Bug: https://sourceware.org/bugzilla/show_bug.cgi?id=3D25811 --=20 You are receiving this mail because: You are on the CC list for the bug.=