Message186561
Give the attached file execute permission and run it. At the first breakpoint, the backtrace will be correct. Continue. At the second breakpoint, a backtrace will show the foo('first call') on the stack when, in fact, the call came from foo('second call'), as verified by the printed message.
I am running this on an up-to-date 64-bit Arch Linux system. Python 3.3.1. |
|
Date |
User |
Action |
Args |
2013-04-11 15:07:39 | donaldcallen | set | recipients:
+ donaldcallen |
2013-04-11 15:07:39 | donaldcallen | set | messageid: <1365692859.49.0.652230897549.issue17697@psf.upfronthosting.co.za> |
2013-04-11 15:07:39 | donaldcallen | link | issue17697 messages |
2013-04-11 15:07:39 | donaldcallen | create | |
|