Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 295247 Details for
Bug 433410
gdb: double free or corruption when restarting program after symbols changed
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
stack trace
gdb_stacktrace.txt (text/plain), 5.00 KB, created by
Jim Hayward
on 2008-02-19 04:45:43 UTC
(
hide
)
Description:
stack trace
Filename:
MIME Type:
Creator:
Jim Hayward
Created:
2008-02-19 04:45:43 UTC
Size:
5.00 KB
patch
obsolete
>Program exited normally. >(gdb) r >`/home/jimh/Projects/mudpuppy/src/mudpuppy' has changed; re-reading symbols. >Starting program: /home/jimh/Projects/mudpuppy/src/mudpuppy >*** glibc detected *** gdb: double free or corruption (!prev): 0x0000000001eda240 *** >======= Backtrace: ========= >/lib64/libc.so.6[0x7fc15abca748] >/lib64/libc.so.6(cfree+0x76)[0x7fc15abccd86] >/lib64/libc.so.6(fclose+0x151)[0x7fc15abbaa11] >gdb[0x59118d] >gdb(bfd_cache_close_all+0x1d)[0x5912bd] >gdb[0x4c615d] >gdb(symbol_file_add_from_bfd+0x15)[0x4c6c45] >gdb[0x4c6384] >gdb(symbol_file_add_from_bfd+0x15)[0x4c6c45] >gdb[0x44e229] >gdb(catch_errors+0x64)[0x4deca4] >gdb(solib_read_symbols+0x61)[0x44dec1] >gdb(solib_add+0x5b)[0x44e6fb] >gdb[0x4509dc] >gdb[0x450a3f] >gdb(post_create_inferior+0x3f)[0x4d100f] >gdb[0x4d145e] >gdb(execute_command+0x337)[0x441817] >gdb[0x4e2b6b] >gdb[0x4e3a3c] >/lib64/libreadline.so.5(rl_callback_read_char+0x147)[0x32e5426dc7] >gdb[0x4e2e89] >gdb[0x4e179d] >gdb(gdb_do_one_event+0x206)[0x4e2156] >gdb(catch_errors+0x64)[0x4deca4] >gdb[0x4878b0] >gdb[0x43a709] >gdb(catch_errors+0x64)[0x4deca4] >gdb[0x43ae76] >gdb(catch_errors+0x64)[0x4deca4] >gdb(gdb_main+0x24)[0x43a6f4] >gdb(main+0x36)[0x43a6c6] >/lib64/libc.so.6(__libc_start_main+0xfa)[0x7fc15ab6f36a] >gdb[0x43a5c9] >======= Memory map: ======== >00110000-0012f000 r-xp 00000000 08:02 13041692 /lib64/ld-2.7.90.so >0032e000-0032f000 r--p 0001e000 08:02 13041692 /lib64/ld-2.7.90.so >0032f000-00330000 rw-p 0001f000 08:02 13041692 /lib64/ld-2.7.90.so >00400000-006fe000 r-xp 00000000 08:02 10343329 /usr/bin/gdb >008fe000-0090b000 rw-p 002fe000 08:02 10343329 /usr/bin/gdb >0090b000-00927000 rw-p 0090b000 00:00 0 >00b0a000-00b1f000 rw-p 0030a000 08:02 10343329 /usr/bin/gdb >00b1f000-08ebd000 rw-p 00b1f000 00:00 0 [heap] >32e5400000-32e5435000 r-xp 00000000 08:02 13041886 /lib64/libreadline.so.5.2 >32e5435000-32e5635000 ---p 00035000 08:02 13041886 /lib64/libreadline.so.5.2 >32e5635000-32e563d000 rw-p 00035000 08:02 13041886 /lib64/libreadline.so.5.2 >32e563d000-32e563e000 rw-p 32e563d000 00:00 0 >32e9e00000-32e9e21000 r-xp 00000000 08:02 13041717 /lib64/libexpat.so.1.5.2 >32e9e21000-32ea020000 ---p 00021000 08:02 13041717 /lib64/libexpat.so.1.5.2 >32ea020000-32ea023000 rw-p 00020000 08:02 13041717 /lib64/libexpat.so.1.5.2 >32f4600000-32f4612000 r-xp 00000000 08:02 10342549 /usr/lib64/libelf-0.132.so >32f4612000-32f4811000 ---p 00012000 08:02 10342549 /usr/lib64/libelf-0.132.so >32f4811000-32f4812000 r--p 00011000 08:02 10342549 /usr/lib64/libelf-0.132.so >32f4812000-32f4813000 rw-p 00012000 08:02 10342549 /usr/lib64/libelf-0.132.so >32f4a00000-32f4a1c000 r-xp 00000000 08:02 13041885 /lib64/libtinfo.so.5.6 >32f4a1c000-32f4c1c000 ---p 0001c000 08:02 13041885 /lib64/libtinfo.so.5.6 >32f4c1c000-32f4c20000 rw-p 0001c000 08:02 13041885 /lib64/libtinfo.so.5.6 >32f4e00000-32f4e03000 r-xp 00000000 08:02 13041760 /lib64/libplds4.so >32f4e03000-32f5002000 ---p 00003000 08:02 13041760 /lib64/libplds4.so >32f5002000-32f5003000 rw-p 00002000 08:02 13041760 /lib64/libplds4.so >32f5200000-32f5237000 r-xp 00000000 08:02 13041756 /lib64/libnspr4.so >32f5237000-32f5437000 ---p 00037000 08:02 13041756 /lib64/libnspr4.so >32f5437000-32f5439000 rw-p 00037000 08:02 13041756 /lib64/libnspr4.so >32f5439000-32f543c000 rw-p 32f5439000 00:00 0 >32f6600000-32f6604000 r-xp 00000000 08:02 13041758 /lib64/libplc4.so >32f6604000-32f6803000 ---p 00004000 08:02 13041758 /lib64/libplc4.so >32f6803000-32f6804000 rw-p 00003000 08:02 13041758 /lib64/libplc4.so >32f9e00000-32f9e0f000 r-xp 00000000 08:02 13041773 /lib64/libbz2.so.1.0.4 >32f9e0f000-32fa00e000 ---p 0000f000 08:02 13041773 /lib64/libbz2.so.1.0.4 >32fa00e000-32fa010000 rw-p 0000e000 08:02 13041773 /lib64/libbz2.so.1.0.4 >32fc600000-32fc620000 r-xp 00000000 08:02 13041711 /lib64/libncurses.so.5.6 >32fc620000-32fc820000 ---p 00020000 08:02 13041711 /lib64/libncurses.so.5.6 >32fc820000-32fc821000 rw-p 00020000 08:02 13041711 /lib64/libncurses.so.5.6 >3486600000-348661a000 r-xp 00000000 08:02 13041726 /lib64/libselinux.so.1 >348661a000-3486819000 ---p 0001a000 08:02 13041726 /lib64/libselinux.so.1 >3486819000-348681a000 r--p 00019000 08:02 13041726 /lib64/libselinux.so.1 >348681a000-348681b000 rw-p 0001a000 08:02 13041726 /lib64/libselinux.so.1 >348681b000Aborted
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 433410
: 295247