From mboxrd@z Thu Jan  1 00:00:00 1970
Return-Path: <sourceware-bugzilla@sourceware.org>
Received: by sourceware.org (Postfix, from userid 48)
	id 57AC43858D28; Mon,  8 May 2023 22:49:35 +0000 (GMT)
DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 57AC43858D28
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sourceware.org;
	s=default; t=1683586175;
	bh=P3LFyHyDnH0kS0Uaf3ZnVa9+Pl7pIXcPGFOHs8HFkaE=;
	h=From:To:Subject:Date:In-Reply-To:References:From;
	b=wmekV+val7l1qRPFQBOthMGXgy67+sJ/bmaxgKn5rAy9bb8zPUYPZ/3sMZr8nNepR
	 FNm1ITk5AaJ+KkdSMfk/7MRJVvD4nUtvJuAwm2RtwO+GZJhodPP8S1/bsQ0wLXPHSm
	 U+MfmCQFfmdMFC2yvTHaeKsNtqLCLqGGVZLtuy5g=
From: "mikeowens at gmail dot com" <sourceware-bugzilla@sourceware.org>
To: gdb-prs@sourceware.org
Subject: [Bug c++/30430] SIGABRT on run (Illumos on SPARC)
Date: Mon, 08 May 2023 22:49:34 +0000
X-Bugzilla-Reason: CC
X-Bugzilla-Type: changed
X-Bugzilla-Watch-Reason: None
X-Bugzilla-Product: gdb
X-Bugzilla-Component: c++
X-Bugzilla-Version: 13.1
X-Bugzilla-Keywords: 
X-Bugzilla-Severity: normal
X-Bugzilla-Who: mikeowens at gmail dot com
X-Bugzilla-Status: UNCONFIRMED
X-Bugzilla-Resolution: 
X-Bugzilla-Priority: P2
X-Bugzilla-Assigned-To: unassigned at sourceware dot org
X-Bugzilla-Target-Milestone: ---
X-Bugzilla-Flags: 
X-Bugzilla-Changed-Fields: 
Message-ID: <bug-30430-4717-1hmlV2YE8K@http.sourceware.org/bugzilla/>
In-Reply-To: <bug-30430-4717@http.sourceware.org/bugzilla/>
References: <bug-30430-4717@http.sourceware.org/bugzilla/>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Bugzilla-URL: http://sourceware.org/bugzilla/
Auto-Submitted: auto-generated
MIME-Version: 1.0
List-Id: <gdb-prs.sourceware.org>

https://sourceware.org/bugzilla/show_bug.cgi?id=3D30430

--- Comment #2 from Mike Owens <mikeowens at gmail dot com> ---
I found that the ABRT is triggered in procfs.c within procfs_xfer_memory():=
 the
lseek() followed by read():

  if (lseek (pi->as_fd, (off_t) memaddr, SEEK_SET) !=3D (off_t) memaddr)
    return TARGET_XFER_E_IO;

  if (writebuf !=3D NULL)
    {
      PROCFS_NOTE ("write memory:\n");
      nbytes =3D write (pi->as_fd, writebuf, len);
    }
  else
    {
      PROCFS_NOTE ("read  memory:\n");
      nbytes =3D read (pi->as_fd, readbuf, len);
    }

I noticed there was a procfs_trace variable so I enabled it and ran again. =
This
is the latter part of the debug output sent to "procfs_trace" file before t=
he
ABRT:

    Thread 1: PR_STOPPED PR_ISTOP PR_RLC PR_MSACCT PR_PCOMPAT=20
    PR_FAULTED FLTBPT=20
    read  memory:

This is pretty much repeated through the file.

--=20
You are receiving this mail because:
You are on the CC list for the bug.=