From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: <sourceware-bugzilla@sourceware.org> Received: by sourceware.org (Postfix, from userid 48) id 57AC43858D28; Mon, 8 May 2023 22:49:35 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 57AC43858D28 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sourceware.org; s=default; t=1683586175; bh=P3LFyHyDnH0kS0Uaf3ZnVa9+Pl7pIXcPGFOHs8HFkaE=; h=From:To:Subject:Date:In-Reply-To:References:From; b=wmekV+val7l1qRPFQBOthMGXgy67+sJ/bmaxgKn5rAy9bb8zPUYPZ/3sMZr8nNepR FNm1ITk5AaJ+KkdSMfk/7MRJVvD4nUtvJuAwm2RtwO+GZJhodPP8S1/bsQ0wLXPHSm U+MfmCQFfmdMFC2yvTHaeKsNtqLCLqGGVZLtuy5g= From: "mikeowens at gmail dot com" <sourceware-bugzilla@sourceware.org> To: gdb-prs@sourceware.org Subject: [Bug c++/30430] SIGABRT on run (Illumos on SPARC) Date: Mon, 08 May 2023 22:49:34 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: gdb X-Bugzilla-Component: c++ X-Bugzilla-Version: 13.1 X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: mikeowens at gmail dot com X-Bugzilla-Status: UNCONFIRMED X-Bugzilla-Resolution: X-Bugzilla-Priority: P2 X-Bugzilla-Assigned-To: unassigned at sourceware dot org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: <bug-30430-4717-1hmlV2YE8K@http.sourceware.org/bugzilla/> In-Reply-To: <bug-30430-4717@http.sourceware.org/bugzilla/> References: <bug-30430-4717@http.sourceware.org/bugzilla/> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: http://sourceware.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 List-Id: <gdb-prs.sourceware.org> https://sourceware.org/bugzilla/show_bug.cgi?id=3D30430 --- Comment #2 from Mike Owens <mikeowens at gmail dot com> --- I found that the ABRT is triggered in procfs.c within procfs_xfer_memory():= the lseek() followed by read(): if (lseek (pi->as_fd, (off_t) memaddr, SEEK_SET) !=3D (off_t) memaddr) return TARGET_XFER_E_IO; if (writebuf !=3D NULL) { PROCFS_NOTE ("write memory:\n"); nbytes =3D write (pi->as_fd, writebuf, len); } else { PROCFS_NOTE ("read memory:\n"); nbytes =3D read (pi->as_fd, readbuf, len); } I noticed there was a procfs_trace variable so I enabled it and ran again. = This is the latter part of the debug output sent to "procfs_trace" file before t= he ABRT: Thread 1: PR_STOPPED PR_ISTOP PR_RLC PR_MSACCT PR_PCOMPAT=20 PR_FAULTED FLTBPT=20 read memory: This is pretty much repeated through the file. --=20 You are receiving this mail because: You are on the CC list for the bug.=