From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 10453 invoked by alias); 11 Feb 2006 16:22:00 -0000 Received: (qmail 10444 invoked by uid 22791); 11 Feb 2006 16:22:00 -0000 X-Spam-Check-By: sourceware.org Received: from mx2.suse.de (HELO mx2.suse.de) (195.135.220.15) by sourceware.org (qpsmtpd/0.31) with ESMTP; Sat, 11 Feb 2006 16:21:58 +0000 Received: from Relay2.suse.de (mail2.suse.de [195.135.221.8]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mx2.suse.de (Postfix) with ESMTP id B00C11D779; Sat, 11 Feb 2006 17:21:55 +0100 (CET) From: Andreas Schwab To: David Lecomber Cc: gdb Subject: Re: Whacky ia64: linux_proc_xfer_partial and lseek vs pread64 References: <1139591736.3780.26.camel@cpc2-oxfd8-0-0-cust771.oxfd.cable.ntl.com> <20060210181441.GA29255@nevyn.them.org> <20060210190617.GA30740@nevyn.them.org> X-Yow: Now I'm concentrating on a specific tank battle toward the end of World War II! Date: Sat, 11 Feb 2006 16:22:00 -0000 In-Reply-To: <20060210190617.GA30740@nevyn.them.org> (Daniel Jacobowitz's message of "Fri, 10 Feb 2006 14:06:17 -0500") Message-ID: User-Agent: Gnus/5.110003 (No Gnus v0.3) Emacs/22.0.50 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Transfer-Encoding: 8bit X-IsSubscribed: yes Mailing-List: contact gdb-help@sourceware.org; run by ezmlm Precedence: bulk List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-owner@sourceware.org X-SW-Source: 2006-02/txt/msg00102.txt.bz2 Daniel Jacobowitz writes: > Fascinating. That definitely seems like a kernel bug to me; why not? The vDSO page is quite special, since it is only executable, but not readable. > I see some magic bits in the kernel ptrace support to read backing > stores, which are obviously going to get fouled up by pread support. > But I don't see anything that would affect the vDSO. That's problably the effect of ptrace overriding page protections. Andreas. -- Andreas Schwab, SuSE Labs, schwab@suse.de SuSE Linux Products GmbH, Maxfeldstraße 5, 90409 Nürnberg, Germany PGP key fingerprint = 58CA 54C7 6D53 942B 1756 01D3 44D5 214B 8276 4ED5 "And now for something completely different."