Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 623966 Details for
Bug 864348
[abrt] gdb-7.4.50.20120120-52.fc17: elf_symtab_read: Process /usr/bin/gdb was killed by signal 11 (SIGSEGV)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 35.37 KB, created by
millemiglia
on 2012-10-09 08:23:37 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
millemiglia
Created:
2012-10-09 08:23:37 UTC
Size:
35.37 KB
patch
obsolete
>[New LWP 18933] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `/usr/bin/gdb --quiet -nx /proc/11659/exe 11659'. >Program terminated with signal 11, Segmentation fault. >#0 0x00000000004ddaa5 in elf_symtab_read (objfile=objfile@entry=0x27eb220, type=type@entry=0, number_of_symbols=number_of_symbols@entry=62986, symbol_table=symbol_table@entry=0x7fb9acb0c010, copy_names=copy_names@entry=0) at ../../gdb/elfread.c:290 >290 offset = ANOFFSET (objfile->section_offsets, sym->section->index); > >Thread 1 (Thread 0x7fb9af641800 (LWP 18933)): >#0 0x00000000004ddaa5 in elf_symtab_read (objfile=objfile@entry=0x27eb220, type=type@entry=0, number_of_symbols=number_of_symbols@entry=62986, symbol_table=symbol_table@entry=0x7fb9acb0c010, copy_names=copy_names@entry=0) at ../../gdb/elfread.c:290 > gdbarch = 0x279e400 > sym = 0x7fb9ac44c140 > i = <optimized out> > symaddr = <optimized out> > offset = <optimized out> > ms_type = <optimized out> > sectinfo = <optimized out> > filesym = <optimized out> > filesymname = <optimized out> > dbx = 0x27c8f50 > stripped = 0 >#1 0x00000000004dff09 in elf_symfile_read (objfile=0x27eb220, symfile_flags=6) at ../../gdb/elfread.c:2289 > synth_abfd = <optimized out> > abfd = 0x27d15c0 > ei = {stabsect = 0x0, stabindexsect = 0x0, mdebugsect = 0x0} > back_to = 0x27d1cb0 > symcount = 62986 > dynsymcount = 0 > synthcount = <optimized out> > storage_needed = <optimized out> > symbol_table = 0x7fb9acb0c010 > dyn_symbol_table = 0x0 > synthsyms = <optimized out> >#2 0x000000000054c925 in syms_from_objfile (objfile=objfile@entry=0x27eb220, addrs=0x27ab900, addrs@entry=0x0, offsets=offsets@entry=0x0, num_offsets=num_offsets@entry=0, add_flags=add_flags@entry=6) at ../../gdb/symfile.c:1016 > local_addr = 0x27ab900 > old_chain = 0x0 > mainline = 4 > __PRETTY_FUNCTION__ = "syms_from_objfile" >#3 0x000000000054cdbb in symbol_file_add_with_addrs_or_offsets (abfd=0x27d15c0, add_flags=add_flags@entry=6, addrs=addrs@entry=0x0, flags=flags@entry=0, parent=parent@entry=0x0, num_offsets=0, offsets=0x0) at ../../gdb/symfile.c:1126 > objfile = 0x27eb220 > my_cleanups = 0x0 > name = 0x27b72e0 "/proc/11659/exe" > from_tty = 2 > mainline = 4 >#4 0x000000000054cf65 in symbol_file_add_from_bfd (abfd=<optimized out>, add_flags=add_flags@entry=6, addrs=addrs@entry=0x0, flags=flags@entry=0, parent=parent@entry=0x0) at ../../gdb/symfile.c:1216 >No locals. >#5 0x000000000054cfb5 in symbol_file_add (name=name@entry=0x7fff9860c4ea "11659", add_flags=add_flags@entry=6, addrs=addrs@entry=0x0, flags=flags@entry=0) at ../../gdb/symfile.c:1228 >No locals. >#6 0x000000000054d338 in symbol_file_add_main_1 (flags=0, from_tty=from_tty@entry=32767, args=args@entry=0x7fff9860c4ea "11659") at ../../gdb/symfile.c:1251 > add_flags = 6 >#7 symbol_file_add_main (args=args@entry=0x7fff9860c4da "/proc/11659/exe", from_tty=from_tty@entry=1) at ../../gdb/symfile.c:1244 >No locals. >#8 0x0000000000570fb2 in catch_command_errors (command=0x54d320 <symbol_file_add_main>, arg=arg@entry=0x7fff9860c4da "/proc/11659/exe", from_tty=1, mask=mask@entry=6) at ../../gdb/exceptions.c:573 > e = {reason = 0, error = GDB_NO_ERROR, message = 0x0} >#9 0x0000000000573385 in captured_main (data=data@entry=0x7fff9860bc50) at ../../gdb/main.c:974 > func = <optimized out> > context = 0x7fff9860bc50 > argc = 5 > argv = 0x7fff9860bd58 > quiet = 1 > set_args = 0 > symarg = <optimized out> > execarg = 0x7fff9860c4da "/proc/11659/exe" > pidarg = <optimized out> > corearg = 0x0 > pid_or_core_arg = 0x7fff9860c4ea "11659" > cdarg = <optimized out> > ttyarg = <optimized out> > python_script = <optimized out> > print_help = 0 > print_version = 0 > cmdarg_vec = 0x0 > cmdarg_p = 0x0 > dirarg = <optimized out> > dirsize = <optimized out> > ndir = <optimized out> > system_gdbinit = 0x27a4200 "/etc/gdbinit" > home_gdbinit = 0x0 > local_gdbinit = <optimized out> > i = <optimized out> > save_auto_load = 1 > objfile = <optimized out> > pre_stat_chain = 0x0 >#10 0x0000000000570eee in catch_errors (func=func@entry=0x572170 <captured_main>, func_args=func_args@entry=0x7fff9860bc50, errstring=errstring@entry=0x6fe714 "", mask=mask@entry=6) at ../../gdb/exceptions.c:546 > val = 0 > exception = {reason = 0, error = GDB_NO_ERROR, message = 0x0} > saved_uiout = 0xacd4c0 >#11 0x00000000005735e4 in gdb_main (args=args@entry=0x7fff9860bc50) at ../../gdb/main.c:1105 >No locals. >#12 0x00000000004511ee in main (argc=<optimized out>, argv=<optimized out>) at ../../gdb/gdb.c:34 > args = {argc = 5, argv = 0x7fff9860bd58, use_windows = 0, interpreter_p = 0x6f4070 "console"} >From To Syms Read Shared Object Library >0x0000003f59014f20 0x0000003f59033848 Yes /lib64/libreadline.so.6 >0x0000003f58405fc0 0x0000003f58416768 Yes /lib64/libselinux.so.1 >0x0000003f6a806d20 0x0000003f6a81de08 Yes /lib64/libncurses.so.5 >0x0000003f6600cd90 0x0000003f66018c48 Yes /lib64/libtinfo.so.5 >0x0000003f58001f50 0x0000003f5800e718 Yes /lib64/libz.so.1 >0x0000003f578055f0 0x0000003f5786ca4c Yes /lib64/libm.so.6 >0x0000003f57000ea0 0x0000003f570019e0 Yes /lib64/libdl.so.2 >0x0000003f57405790 0x0000003f57410494 Yes /lib64/libpthread.so.0 >0x0000003f67000ee0 0x0000003f67001814 Yes /lib64/libutil.so.1 >0x0000003f57c3efd0 0x0000003f57d1e560 Yes /lib64/libpython2.7.so.1.0 >0x0000003f5d403dd0 0x0000003f5d41cccc Yes /lib64/libexpat.so.1 >0x0000003f56c1ef60 0x0000003f56d5f780 Yes /lib64/libc.so.6 >0x0000003f56800b20 0x0000003f5681a319 Yes /lib64/ld-linux-x86-64.so.2 >0x00007fb9af304720 0x00007fb9af306de4 Yes /usr/lib64/python2.7/lib-dynload/stropmodule.so >0x00007fb9af0bb040 0x00007fb9af0bcae4 Yes /usr/lib64/python2.7/lib-dynload/operator.so >0x00007fb9aeeb1370 0x00007fb9aeeb38dc Yes /usr/lib64/python2.7/lib-dynload/_collectionsmodule.so >0x00007fb9aeca2ee0 0x00007fb9aeca7958 Yes /usr/lib64/python2.7/lib-dynload/itertoolsmodule.so >0x00007fb9aea9dc60 0x00007fb9aea9e2a4 Yes /usr/lib64/python2.7/lib-dynload/_bisectmodule.so >0x00007fb9ae898d60 0x00007fb9ae899d34 Yes /usr/lib64/python2.7/lib-dynload/_heapq.so >0x00007fb9ae68a130 0x00007fb9ae6906ac Yes /usr/lib64/python2.7/site-packages/rpm/_rpmmodule.so >0x0000003a820127c0 0x0000003a8204b678 Yes /lib64/librpm.so.2 >0x0000003f59401500 0x0000003f59402c34 Yes /lib64/libcap.so.2 >0x0000003f6a001f50 0x0000003f6a005dc4 Yes /lib64/libacl.so.1 >0x0000003f5982de50 0x0000003f59968348 Yes /lib64/libdb-5.2.so >0x0000003a8240b100 0x0000003a82420920 Yes /lib64/librpmio.so.2 >0x00007fb9ae35fac0 0x00007fb9ae442a04 Yes /lib64/libnss3.so >0x0000003f640016f0 0x0000003f6400d2c0 Yes /lib64/libbz2.so.1 >0x00007fb9ae134af0 0x00007fb9ae141a24 Yes /lib64/libelf.so.1 >0x0000003f65001cc0 0x0000003f65007104 Yes /lib64/libpopt.so.0 >0x0000003f678030b0 0x0000003f67819320 Yes /lib64/liblzma.so.5 >0x0000003f6dc06f30 0x0000003f6dc21778 Yes /lib64/liblua-5.1.so >0x00007fb9adf2c260 0x00007fb9adf2f54c Yes /lib64/librt.so.1 >0x0000003f67c013a0 0x0000003f67c0348c Yes /lib64/libattr.so.1 >0x00007fb9add0ea30 0x00007fb9add19af4 Yes /lib64/libnssutil3.so >0x0000003f690014d0 0x0000003f69002bd4 Yes /lib64/libplc4.so >0x0000003f68800fb0 0x0000003f68801ef8 Yes /lib64/libplds4.so >0x0000003f68c0d250 0x0000003f68c2cc10 Yes /lib64/libnspr4.so >0x00007fb9adaf91b0 0x00007fb9adb0067c Yes /lib64/libnss_files.so.2 >0x00007fb9ad8bb9f0 0x00007fb9ad8e879c Yes /lib64/libsoftokn3.so >0x0000003f6bc0a2e0 0x0000003f6bc86860 Yes /lib64/libsqlite3.so.0 >0x00007fb9ad657520 0x00007fb9ad6964f8 Yes /lib64/libfreebl3.so >0x00007fb9ad452480 0x00007fb9ad452c30 Yes /usr/lib64/python2.7/site-packages/rpm/_rpmbmodule.so >0x00007fb9ad233e30 0x00007fb9ad249df0 Yes /lib64/librpmbuild.so.2 >0x00007fb9ad016280 0x00007fb9ad0265c8 Yes /lib64/libmagic.so.1 >0x00007fb9ace11830 0x00007fb9ace11ab4 Yes /usr/lib64/python2.7/site-packages/rpm/_rpmsmodule.so >0x00007fb9acc0ec20 0x00007fb9acc0ffdc Yes /lib64/librpmsign.so.0 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0x74727473 1953657971 >rbx 0x5183 20867 >rcx 0x2a2f378 44233592 >rdx 0x27dbac8 41794248 >rsi 0x7fb9ac44c140 140435435864384 >rdi 0x5 5 >rbp 0x7fb9ac44c140 0x7fb9ac44c140 >rsp 0x7fff9860b850 0x7fff9860b850 >r8 0x7b8 1976 >r9 0x27e6288 41837192 >r10 0x90ab9dc 151697884 >r11 0x2a2e488 44229768 >r12 0x7fb9acb0c010 140435442941968 >r13 0x1 1 >r14 0x27eb220 41857568 >r15 0xf60a 62986 >rip 0x4ddaa5 0x4ddaa5 <elf_symtab_read+197> >eflags 0x10297 [ CF PF AF SF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >Dump of assembler code for function elf_symtab_read: > 0x00000000004dd9e0 <+0>: push %r15 > 0x00000000004dd9e2 <+2>: mov %rdx,%r15 > 0x00000000004dd9e5 <+5>: push %r14 > 0x00000000004dd9e7 <+7>: push %r13 > 0x00000000004dd9e9 <+9>: mov %rdi,%r13 > 0x00000000004dd9ec <+12>: push %r12 > 0x00000000004dd9ee <+14>: mov %rcx,%r12 > 0x00000000004dd9f1 <+17>: push %rbp > 0x00000000004dd9f2 <+18>: push %rbx > 0x00000000004dd9f3 <+19>: sub $0x78,%rsp > 0x00000000004dd9f7 <+23>: mov %esi,0x34(%rsp) > 0x00000000004dd9fb <+27>: mov %r8d,0x64(%rsp) > 0x00000000004dda00 <+32>: callq 0x5a2430 <get_objfile_arch> > 0x00000000004dda05 <+37>: mov %rax,0x40(%rsp) > 0x00000000004dda0a <+42>: mov 0x80b0(%r13),%rax > 0x00000000004dda11 <+49>: test %r15,%r15 > 0x00000000004dda14 <+52>: mov %rax,0x48(%rsp) > 0x00000000004dda19 <+57>: mov 0x48(%r13),%rax > 0x00000000004dda1d <+61>: mov 0xb0(%rax),%eax > 0x00000000004dda23 <+67>: mov %eax,0x60(%rsp) > 0x00000000004dda27 <+71>: jle 0x4ddb20 <elf_symtab_read+320> > 0x00000000004dda2d <+77>: movq $0x6fe714,0x50(%rsp) > 0x00000000004dda36 <+86>: movq $0x0,0x58(%rsp) > 0x00000000004dda3f <+95>: xor %ebx,%ebx > 0x00000000004dda41 <+97>: movq $0x0,0x38(%rsp) > 0x00000000004dda4a <+106>: mov %r13,%r14 > 0x00000000004dda4d <+109>: jmp 0x4dda5d <elf_symtab_read+125> > 0x00000000004dda4f <+111>: nop > 0x00000000004dda50 <+112>: add $0x1,%rbx > 0x00000000004dda54 <+116>: cmp %r15,%rbx > 0x00000000004dda57 <+119>: je 0x4ddb20 <elf_symtab_read+320> > 0x00000000004dda5d <+125>: mov (%r12,%rbx,8),%rbp > 0x00000000004dda61 <+129>: mov 0x8(%rbp),%rax > 0x00000000004dda65 <+133>: test %rax,%rax > 0x00000000004dda68 <+136>: je 0x4dda50 <elf_symtab_read+112> > 0x00000000004dda6a <+138>: cmpb $0x0,(%rax) > 0x00000000004dda6d <+141>: je 0x4dda50 <elf_symtab_read+112> > 0x00000000004dda6f <+143>: mov 0x48(%r14),%rdi > 0x00000000004dda73 <+147>: mov %rbp,%rsi > 0x00000000004dda76 <+150>: mov 0x10(%rdi),%rax > 0x00000000004dda7a <+154>: callq *0x220(%rax) > 0x00000000004dda80 <+160>: test %eax,%eax > 0x00000000004dda82 <+162>: jne 0x4ddb30 <elf_symtab_read+336> > 0x00000000004dda88 <+168>: mov 0x20(%rbp),%r9 > 0x00000000004dda8c <+172>: movslq 0xc(%r9),%rax > 0x00000000004dda90 <+176>: cmp $0xffffffff,%eax > 0x00000000004dda93 <+179>: je 0x4de190 <elf_symtab_read+1968> > 0x00000000004dda99 <+185>: cmpl $0x1,0x34(%rsp) > 0x00000000004dda9e <+190>: mov 0x80d0(%r14),%rdx >=> 0x00000000004ddaa5 <+197>: mov (%rdx,%rax,8),%r8 > 0x00000000004ddaa9 <+201>: je 0x4ddb60 <elf_symtab_read+384> > 0x00000000004ddaaf <+207>: mov 0x18(%rbp),%eax > 0x00000000004ddab2 <+210>: test $0x40,%ah > 0x00000000004ddab5 <+213>: je 0x4ddb80 <elf_symtab_read+416> > 0x00000000004ddabb <+219>: cmpq $0x0,0x38(%rsp) > 0x00000000004ddac1 <+225>: je 0x4ddade <elf_symtab_read+254> > 0x00000000004ddac3 <+227>: mov 0x48(%rsp),%rdx > 0x00000000004ddac8 <+232>: mov 0x30(%rdx),%rax > 0x00000000004ddacc <+236>: mov 0x38(%rsp),%rdx > 0x00000000004ddad1 <+241>: mov %rax,0x8(%rdx) > 0x00000000004ddad5 <+245>: mov 0x48(%rsp),%rax > 0x00000000004ddada <+250>: mov %rdx,0x30(%rax) > 0x00000000004ddade <+254>: mov 0x8(%rbp),%r13 > 0x00000000004ddae2 <+258>: add $0x1,%rbx > 0x00000000004ddae6 <+262>: mov %r13,%rdi > 0x00000000004ddae9 <+265>: callq 0x44f0f0 <strlen@plt> > 0x00000000004ddaee <+270>: mov 0xd8(%r14),%rdx > 0x00000000004ddaf5 <+277>: lea 0x1(%rax),%esi > 0x00000000004ddaf8 <+280>: mov %r13,%rdi > 0x00000000004ddafb <+283>: callq 0x5a1a00 <bcache> > 0x00000000004ddb00 <+288>: cmp %r15,%rbx > 0x00000000004ddb03 <+291>: mov %rax,0x50(%rsp) > 0x00000000004ddb08 <+296>: mov %rbp,0x58(%rsp) > 0x00000000004ddb0d <+301>: movq $0x0,0x38(%rsp) > 0x00000000004ddb16 <+310>: jne 0x4dda5d <elf_symtab_read+125> > 0x00000000004ddb1c <+316>: nopl 0x0(%rax) > 0x00000000004ddb20 <+320>: add $0x78,%rsp > 0x00000000004ddb24 <+324>: pop %rbx > 0x00000000004ddb25 <+325>: pop %rbp > 0x00000000004ddb26 <+326>: pop %r12 > 0x00000000004ddb28 <+328>: pop %r13 > 0x00000000004ddb2a <+330>: pop %r14 > 0x00000000004ddb2c <+332>: pop %r15 > 0x00000000004ddb2e <+334>: retq > 0x00000000004ddb2f <+335>: nop > 0x00000000004ddb30 <+336>: mov 0x40(%rsp),%rdi > 0x00000000004ddb35 <+341>: callq 0x5821a0 <gdbarch_record_special_symbol_p> > 0x00000000004ddb3a <+346>: test %eax,%eax > 0x00000000004ddb3c <+348>: je 0x4dda50 <elf_symtab_read+112> > 0x00000000004ddb42 <+354>: mov 0x40(%rsp),%rdi > 0x00000000004ddb47 <+359>: mov %rbp,%rdx > 0x00000000004ddb4a <+362>: mov %r14,%rsi > 0x00000000004ddb4d <+365>: callq 0x5821f0 <gdbarch_record_special_symbol> > 0x00000000004ddb52 <+370>: jmpq 0x4dda50 <elf_symtab_read+112> > 0x00000000004ddb57 <+375>: nopw 0x0(%rax,%rax,1) > 0x00000000004ddb60 <+384>: cmp $0xacf8e0,%r9 > 0x00000000004ddb67 <+391>: je 0x4ddd20 <elf_symtab_read+832> > 0x00000000004ddb6d <+397>: mov 0x60(%rsp),%eax > 0x00000000004ddb71 <+401>: test %eax,%eax > 0x00000000004ddb73 <+403>: jne 0x4dda50 <elf_symtab_read+112> > 0x00000000004ddb79 <+409>: jmpq 0x4ddaaf <elf_symtab_read+207> > 0x00000000004ddb7e <+414>: xchg %ax,%ax > 0x00000000004ddb80 <+416>: test $0x1,%ah > 0x00000000004ddb83 <+419>: jne 0x4dda50 <elf_symtab_read+112> > 0x00000000004ddb89 <+425>: test $0x83,%al > 0x00000000004ddb8b <+427>: nopl 0x0(%rax,%rax,1) > 0x00000000004ddb90 <+432>: je 0x4dda50 <elf_symtab_read+112> > 0x00000000004ddb96 <+438>: mov 0x28(%r9),%r10 > 0x00000000004ddb9a <+442>: add 0x10(%rbp),%r10 > 0x00000000004ddb9e <+446>: cmp $0xacf7c0,%r9 > 0x00000000004ddba5 <+453>: je 0x4dde60 <elf_symtab_read+1152> > 0x00000000004ddbab <+459>: mov 0x20(%r9),%r13d > 0x00000000004ddbaf <+463>: lea (%r10,%r8,1),%rdx > 0x00000000004ddbb3 <+467>: test $0x400,%r13d > 0x00000000004ddbba <+474>: cmove %rdx,%r10 > 0x00000000004ddbbe <+478>: test $0x10,%r13b > 0x00000000004ddbc2 <+482>: je 0x4dddf8 <elf_symtab_read+1048> > 0x00000000004ddbc8 <+488>: test $0x82,%al > 0x00000000004ddbca <+490>: mov 0x8(%rbp),%r11 > 0x00000000004ddbce <+494>: je 0x4dde23 <elf_symtab_read+1091> > 0x00000000004ddbd4 <+500>: test $0x400000,%eax > 0x00000000004ddbd9 <+505>: mov $0x2,%r13d > 0x00000000004ddbdf <+511>: jne 0x4ddbe7 <elf_symtab_read+519> > 0x00000000004ddbe1 <+513>: mov $0x1,%r13d > 0x00000000004ddbe7 <+519>: mov %r11,%rdi > 0x00000000004ddbea <+522>: mov %r9,0x28(%rsp) > 0x00000000004ddbef <+527>: mov %r10,0x18(%rsp) > 0x00000000004ddbf4 <+532>: mov %r11,0x20(%rsp) > 0x00000000004ddbf9 <+537>: callq 0x44f0f0 <strlen@plt> > 0x00000000004ddbfe <+542>: mov 0x18(%rsp),%r10 > 0x00000000004ddc03 <+547>: mov 0x20(%rsp),%r11 > 0x00000000004ddc08 <+552>: mov %r13d,%r8d > 0x00000000004ddc0b <+555>: mov 0x28(%rsp),%r9 > 0x00000000004ddc10 <+560>: mov 0x64(%rsp),%edx > 0x00000000004ddc14 <+564>: mov %eax,%esi > 0x00000000004ddc16 <+566>: mov %r14,(%rsp) > 0x00000000004ddc1a <+570>: mov %r10,%rcx > 0x00000000004ddc1d <+573>: mov %r11,%rdi > 0x00000000004ddc20 <+576>: callq 0x4dd930 <record_minimal_symbol> > 0x00000000004ddc25 <+581>: test %rax,%rax > 0x00000000004ddc28 <+584>: mov %rax,%r11 > 0x00000000004ddc2b <+587>: mov 0x18(%rsp),%r10 > 0x00000000004ddc30 <+592>: je 0x4dda50 <elf_symtab_read+112> > 0x00000000004ddc36 <+598>: cmp $0x1,%r13d > 0x00000000004ddc3a <+602>: sete 0x68(%rsp) > 0x00000000004ddc3f <+607>: cmpl $0x2,0x34(%rsp) > 0x00000000004ddc44 <+612>: je 0x4ddf41 <elf_symtab_read+1377> > 0x00000000004ddc4a <+618>: mov %rbp,%rax > 0x00000000004ddc4d <+621>: mov 0x38(%rax),%rax > 0x00000000004ddc51 <+625>: mov %rax,0x28(%r11) > 0x00000000004ddc55 <+629>: mov 0x50(%rsp),%rax > 0x00000000004ddc5a <+634>: mov 0x40(%rsp),%rdi > 0x00000000004ddc5f <+639>: mov %r11,%rdx > 0x00000000004ddc62 <+642>: mov %rbp,%rsi > 0x00000000004ddc65 <+645>: mov %rax,0x30(%r11) > 0x00000000004ddc69 <+649>: mov %r10,0x18(%rsp) > 0x00000000004ddc6e <+654>: mov %r11,0x20(%rsp) > 0x00000000004ddc73 <+659>: callq 0x5802d0 <gdbarch_elf_make_msymbol_special> > 0x00000000004ddc78 <+664>: cmpb $0x0,0x68(%rsp) > 0x00000000004ddc7d <+669>: je 0x4dda50 <elf_symtab_read+112> > 0x00000000004ddc83 <+675>: cmpl $0x2,0x34(%rsp) > 0x00000000004ddc88 <+680>: jne 0x4dda50 <elf_symtab_read+112> > 0x00000000004ddc8e <+686>: mov 0x8(%rbp),%r13 > 0x00000000004ddc92 <+690>: mov %r13,%rdi > 0x00000000004ddc95 <+693>: callq 0x44f0f0 <strlen@plt> > 0x00000000004ddc9a <+698>: cmp $0x4,%eax > 0x00000000004ddc9d <+701>: mov 0x18(%rsp),%r10 > 0x00000000004ddca2 <+706>: jle 0x4dda50 <elf_symtab_read+112> > 0x00000000004ddca8 <+712>: movslq %eax,%rdx > 0x00000000004ddcab <+715>: mov $0x717921,%edi > 0x00000000004ddcb0 <+720>: mov $0x5,%ecx > 0x00000000004ddcb5 <+725>: lea -0x4(%r13,%rdx,1),%rsi > 0x00000000004ddcba <+730>: repz cmpsb %es:(%rdi),%ds:(%rsi) > 0x00000000004ddcbc <+732>: jne 0x4dda50 <elf_symtab_read+112> > 0x00000000004ddcc2 <+738>: mov 0x20(%rbp),%r9 > 0x00000000004ddcc6 <+742>: lea -0x4(%rax),%esi > 0x00000000004ddcc9 <+745>: mov %r14,(%rsp) > 0x00000000004ddccd <+749>: mov $0x7,%r8d > 0x00000000004ddcd3 <+755>: mov %r10,%rcx > 0x00000000004ddcd6 <+758>: mov $0x1,%edx > 0x00000000004ddcdb <+763>: mov %r13,%rdi > 0x00000000004ddcde <+766>: callq 0x4dd930 <record_minimal_symbol> > 0x00000000004ddce3 <+771>: test %rax,%rax > 0x00000000004ddce6 <+774>: mov 0x20(%rsp),%r11 > 0x00000000004ddceb <+779>: je 0x4dda50 <elf_symtab_read+112> > 0x00000000004ddcf1 <+785>: mov 0x28(%r11),%rdx > 0x00000000004ddcf5 <+789>: mov 0x40(%rsp),%rdi > 0x00000000004ddcfa <+794>: mov %rbp,%rsi > 0x00000000004ddcfd <+797>: mov %rdx,0x28(%rax) > 0x00000000004ddd01 <+801>: mov 0x50(%rsp),%rdx > 0x00000000004ddd06 <+806>: mov %rdx,0x30(%rax) > 0x00000000004ddd0a <+810>: mov %rax,%rdx > 0x00000000004ddd0d <+813>: callq 0x5802d0 <gdbarch_elf_make_msymbol_special> > 0x00000000004ddd12 <+818>: jmpq 0x4dda50 <elf_symtab_read+112> > 0x00000000004ddd17 <+823>: nopw 0x0(%rax,%rax,1) > 0x00000000004ddd20 <+832>: testb $0x8,0x18(%rbp) > 0x00000000004ddd24 <+836>: je 0x4ddb6d <elf_symtab_read+397> > 0x00000000004ddd2a <+842>: mov 0x10(%rbp),%rdx > 0x00000000004ddd2e <+846>: mov 0x48(%r14),%r8 > 0x00000000004ddd32 <+850>: test %rdx,%rdx > 0x00000000004ddd35 <+853>: je 0x4dda50 <elf_symtab_read+112> > 0x00000000004ddd3b <+859>: mov 0x90(%r8),%r13 > 0x00000000004ddd42 <+866>: test %r13,%r13 > 0x00000000004ddd45 <+869>: jne 0x4ddd5d <elf_symtab_read+893> > 0x00000000004ddd47 <+871>: jmpq 0x4dda50 <elf_symtab_read+112> > 0x00000000004ddd4c <+876>: nopl 0x0(%rax) > 0x00000000004ddd50 <+880>: mov 0x10(%r13),%r13 > 0x00000000004ddd54 <+884>: test %r13,%r13 > 0x00000000004ddd57 <+887>: je 0x4dda50 <elf_symtab_read+112> > 0x00000000004ddd5d <+893>: testb $0x1,0x20(%r13) > 0x00000000004ddd62 <+898>: je 0x4ddd50 <elf_symtab_read+880> > 0x00000000004ddd64 <+900>: mov 0x28(%r13),%rax > 0x00000000004ddd68 <+904>: cmp %rax,%rdx > 0x00000000004ddd6b <+907>: jb 0x4ddd50 <elf_symtab_read+880> > 0x00000000004ddd6d <+909>: add 0x38(%r13),%rax > 0x00000000004ddd71 <+913>: cmp %rax,%rdx > 0x00000000004ddd74 <+916>: jae 0x4ddd50 <elf_symtab_read+880> > 0x00000000004ddd76 <+918>: mov 0x0(%r13),%rsi > 0x00000000004ddd7a <+922>: mov $0x81e629,%edi > 0x00000000004ddd7f <+927>: mov $0x4,%ecx > 0x00000000004ddd84 <+932>: repz cmpsb %es:(%rdi),%ds:(%rsi) > 0x00000000004ddd86 <+934>: jne 0x4de005 <elf_symtab_read+1573> > 0x00000000004ddd8c <+940>: mov 0xc(%r13),%ecx > 0x00000000004ddd90 <+944>: cmp $0xffffffff,%ecx > 0x00000000004ddd93 <+947>: je 0x4de1bf <elf_symtab_read+2015> > 0x00000000004ddd99 <+953>: mov 0x8(%rbp),%rbp > 0x00000000004ddd9d <+957>: mov %rdx,0x28(%rsp) > 0x00000000004ddda2 <+962>: mov %ecx,0x20(%rsp) > 0x00000000004ddda6 <+966>: mov %rbp,%rdi > 0x00000000004ddda9 <+969>: callq 0x44f0f0 <strlen@plt> > 0x00000000004dddae <+974>: movslq 0x20(%rsp),%rcx > 0x00000000004dddb3 <+979>: mov 0x80d0(%r14),%rsi > 0x00000000004dddba <+986>: mov %r13,%r9 > 0x00000000004dddbd <+989>: mov 0x28(%rsp),%rdx > 0x00000000004dddc2 <+994>: mov $0x7,%r8d > 0x00000000004dddc8 <+1000>: mov %rbp,%rdi > 0x00000000004dddcb <+1003>: add (%rsi,%rcx,8),%rdx > 0x00000000004dddcf <+1007>: mov %r14,(%rsp) > 0x00000000004dddd3 <+1011>: mov %eax,%esi > 0x00000000004dddd5 <+1013>: mov %rdx,%rcx > 0x00000000004dddd8 <+1016>: mov 0x64(%rsp),%edx > 0x00000000004ddddc <+1020>: callq 0x4dd930 <record_minimal_symbol> > 0x00000000004ddde1 <+1025>: test %rax,%rax > 0x00000000004ddde4 <+1028>: je 0x4dda50 <elf_symtab_read+112> > 0x00000000004dddea <+1034>: mov 0x50(%rsp),%rdx > 0x00000000004dddef <+1039>: mov %rdx,0x30(%rax) > 0x00000000004dddf3 <+1043>: jmpq 0x4dda50 <elf_symtab_read+112> > 0x00000000004dddf8 <+1048>: test $0x1,%r13b > 0x00000000004dddfc <+1052>: je 0x4dda50 <elf_symtab_read+112> > 0x00000000004dde02 <+1058>: test $0x82,%al > 0x00000000004dde04 <+1060>: mov 0x8(%rbp),%r11 > 0x00000000004dde08 <+1064>: je 0x4ddf53 <elf_symtab_read+1395> > 0x00000000004dde0e <+1070>: and $0x2,%r13d > 0x00000000004dde12 <+1074>: je 0x4ddfc4 <elf_symtab_read+1508> > 0x00000000004dde18 <+1080>: mov $0x4,%r13d > 0x00000000004dde1e <+1086>: jmpq 0x4ddbe7 <elf_symtab_read+519> > 0x00000000004dde23 <+1091>: movzbl (%r11),%edx > 0x00000000004dde27 <+1095>: mov $0x8,%r13d > 0x00000000004dde2d <+1101>: cmp $0x2e,%dl > 0x00000000004dde30 <+1104>: je 0x4ddfea <elf_symtab_read+1546> > 0x00000000004dde36 <+1110>: test $0x1,%al > 0x00000000004dde38 <+1112>: je 0x4ddbe7 <elf_symtab_read+519> > 0x00000000004dde3e <+1118>: cmp $0x24,%dl > 0x00000000004dde41 <+1121>: jne 0x4ddbe7 <elf_symtab_read+519> > 0x00000000004dde47 <+1127>: cmpb $0x4c,0x1(%r11) > 0x00000000004dde4c <+1132>: jne 0x4ddbe7 <elf_symtab_read+519> > 0x00000000004dde52 <+1138>: jmpq 0x4dda50 <elf_symtab_read+112> > 0x00000000004dde57 <+1143>: nopw 0x0(%rax,%rax,1) > 0x00000000004dde60 <+1152>: cmpl $0x2,0x34(%rsp) > 0x00000000004dde65 <+1157>: je 0x4ddef4 <elf_symtab_read+1300> > 0x00000000004dde6b <+1163>: mov 0x4c(%rbp),%eax > 0x00000000004dde6e <+1166>: add $0x100,%eax > 0x00000000004dde73 <+1171>: cmp $0x2,%eax > 0x00000000004dde76 <+1174>: ja 0x4ddfd7 <elf_symtab_read+1527> > 0x00000000004dde7c <+1180>: mov 0x717c80(,%rax,4),%edx > 0x00000000004dde83 <+1187>: mov 0x8(%rbp),%r13 > 0x00000000004dde87 <+1191>: cmp $0x6,%edx > 0x00000000004dde8a <+1194>: je 0x4de1b5 <elf_symtab_read+2005> > 0x00000000004dde90 <+1200>: cmpb $0x2e,0x0(%r13) > 0x00000000004dde95 <+1205>: je 0x4dda50 <elf_symtab_read+112> > 0x00000000004dde9b <+1211>: add %r8,%r10 > 0x00000000004dde9e <+1214>: cmp $0x1,%edx > 0x00000000004ddea1 <+1217>: sete 0x68(%rsp) > 0x00000000004ddea6 <+1222>: mov %r13,%rdi > 0x00000000004ddea9 <+1225>: mov %edx,0x28(%rsp) > 0x00000000004ddead <+1229>: mov %r10,0x18(%rsp) > 0x00000000004ddeb2 <+1234>: callq 0x44f0f0 <strlen@plt> > 0x00000000004ddeb7 <+1239>: mov 0x28(%rsp),%edx > 0x00000000004ddebb <+1243>: mov 0x18(%rsp),%r10 > 0x00000000004ddec0 <+1248>: mov $0xacf7c0,%r9d > 0x00000000004ddec6 <+1254>: mov %r14,(%rsp) > 0x00000000004ddeca <+1258>: mov %eax,%esi > 0x00000000004ddecc <+1260>: mov %r13,%rdi > 0x00000000004ddecf <+1263>: mov %edx,%r8d > 0x00000000004dded2 <+1266>: mov 0x64(%rsp),%edx > 0x00000000004dded6 <+1270>: mov %r10,%rcx > 0x00000000004dded9 <+1273>: callq 0x4dd930 <record_minimal_symbol> > 0x00000000004ddede <+1278>: test %rax,%rax > 0x00000000004ddee1 <+1281>: mov %rax,%r11 > 0x00000000004ddee4 <+1284>: mov 0x18(%rsp),%r10 > 0x00000000004ddee9 <+1289>: jne 0x4ddc4a <elf_symtab_read+618> > 0x00000000004ddeef <+1295>: jmpq 0x4dda50 <elf_symtab_read+112> > 0x00000000004ddef4 <+1300>: mov 0x8(%rbp),%r13 > 0x00000000004ddef8 <+1304>: mov %r10,0x18(%rsp) > 0x00000000004ddefd <+1309>: mov %r13,%rdi > 0x00000000004ddf00 <+1312>: callq 0x44f0f0 <strlen@plt> > 0x00000000004ddf05 <+1317>: mov 0x18(%rsp),%r10 > 0x00000000004ddf0a <+1322>: mov 0x64(%rsp),%edx > 0x00000000004ddf0e <+1326>: mov $0xacf7c0,%r9d > 0x00000000004ddf14 <+1332>: mov %r14,(%rsp) > 0x00000000004ddf18 <+1336>: mov $0x6,%r8d > 0x00000000004ddf1e <+1342>: mov %eax,%esi > 0x00000000004ddf20 <+1344>: mov %r13,%rdi > 0x00000000004ddf23 <+1347>: mov %r10,%rcx > 0x00000000004ddf26 <+1350>: callq 0x4dd930 <record_minimal_symbol> > 0x00000000004ddf2b <+1355>: test %rax,%rax > 0x00000000004ddf2e <+1358>: mov %rax,%r11 > 0x00000000004ddf31 <+1361>: movb $0x0,0x68(%rsp) > 0x00000000004ddf36 <+1366>: mov 0x18(%rsp),%r10 > 0x00000000004ddf3b <+1371>: je 0x4dda50 <elf_symtab_read+112> > 0x00000000004ddf41 <+1377>: mov 0x28(%rbp),%rax > 0x00000000004ddf45 <+1381>: test %rax,%rax > 0x00000000004ddf48 <+1384>: je 0x4ddc55 <elf_symtab_read+629> > 0x00000000004ddf4e <+1390>: jmpq 0x4ddc4d <elf_symtab_read+621> > 0x00000000004ddf53 <+1395>: test $0x1,%al > 0x00000000004ddf55 <+1397>: je 0x4ddfcf <elf_symtab_read+1519> > 0x00000000004ddf57 <+1399>: mov $0x7178fe,%esi > 0x00000000004ddf5c <+1404>: mov $0x9,%ecx > 0x00000000004ddf61 <+1409>: mov %r11,%rdi > 0x00000000004ddf64 <+1412>: repz cmpsb %es:(%rdi),%ds:(%rsi) > 0x00000000004ddf66 <+1414>: jne 0x4de02a <elf_symtab_read+1610> > 0x00000000004ddf6c <+1420>: mov 0x80e4(%r14),%ecx > 0x00000000004ddf73 <+1427>: test %ecx,%ecx > 0x00000000004ddf75 <+1429>: js 0x4de070 <elf_symtab_read+1680> > 0x00000000004ddf7b <+1435>: cmpq $0x0,0x38(%rsp) > 0x00000000004ddf81 <+1441>: je 0x4de10c <elf_symtab_read+1836> > 0x00000000004ddf87 <+1447>: mov 0x38(%rsp),%rax > 0x00000000004ddf8c <+1452>: movslq %ecx,%r13 > 0x00000000004ddf8f <+1455>: cmpq $0x0,0x20(%rax,%r13,8) > 0x00000000004ddf95 <+1461>: jne 0x4de0d0 <elf_symtab_read+1776> > 0x00000000004ddf9b <+1467>: mov 0x20(%rbp),%rdx > 0x00000000004ddf9f <+1471>: mov 0x28(%rdx),%rax > 0x00000000004ddfa3 <+1475>: add 0x10(%rbp),%rax > 0x00000000004ddfa7 <+1479>: add %rax,%r8 > 0x00000000004ddfaa <+1482>: cmp $0xacf7c0,%rdx > 0x00000000004ddfb1 <+1489>: mov 0x38(%rsp),%rdx > 0x00000000004ddfb6 <+1494>: cmovne %r8,%rax > 0x00000000004ddfba <+1498>: mov %rax,0x20(%rdx,%r13,8) > 0x00000000004ddfbf <+1503>: jmpq 0x4dda50 <elf_symtab_read+112> > 0x00000000004ddfc4 <+1508>: mov $0x5,%r13d > 0x00000000004ddfca <+1514>: jmpq 0x4ddbe7 <elf_symtab_read+519> > 0x00000000004ddfcf <+1519>: xor %r13d,%r13d > 0x00000000004ddfd2 <+1522>: jmpq 0x4ddbe7 <elf_symtab_read+519> > 0x00000000004ddfd7 <+1527>: mov 0x8(%rbp),%r13 > 0x00000000004ddfdb <+1531>: movb $0x0,0x68(%rsp) > 0x00000000004ddfe0 <+1536>: mov $0x6,%edx > 0x00000000004ddfe5 <+1541>: jmpq 0x4ddea6 <elf_symtab_read+1222> > 0x00000000004ddfea <+1546>: cmpb $0x4c,0x1(%r11) > 0x00000000004ddfef <+1551>: jne 0x4ddbe7 <elf_symtab_read+519> > 0x00000000004ddff5 <+1557>: test $0x200000,%eax > 0x00000000004ddffa <+1562>: je 0x4dda50 <elf_symtab_read+112> > 0x00000000004de000 <+1568>: jmpq 0x4ddbe7 <elf_symtab_read+519> > 0x00000000004de005 <+1573>: mov $0x81e629,%esi > 0x00000000004de00a <+1578>: mov %r8,%rdi > 0x00000000004de00d <+1581>: mov %rdx,0x28(%rsp) > 0x00000000004de012 <+1586>: callq 0x660020 <bfd_get_section_by_name> > 0x00000000004de017 <+1591>: test %rax,%rax > 0x00000000004de01a <+1594>: mov 0x28(%rsp),%rdx > 0x00000000004de01f <+1599>: jne 0x4dda50 <elf_symtab_read+112> > 0x00000000004de025 <+1605>: jmpq 0x4ddd8c <elf_symtab_read+940> > 0x00000000004de02a <+1610>: mov $0x717907,%esi > 0x00000000004de02f <+1615>: mov $0xb,%ecx > 0x00000000004de034 <+1620>: mov %r11,%rdi > 0x00000000004de037 <+1623>: repz cmpsb %es:(%rdi),%ds:(%rsi) > 0x00000000004de039 <+1625>: jne 0x4de081 <elf_symtab_read+1697> > 0x00000000004de03b <+1627>: mov 0x80e0(%r14),%ecx > 0x00000000004de042 <+1634>: cmp $0xffffffff,%ecx > 0x00000000004de045 <+1637>: jne 0x4ddf73 <elf_symtab_read+1427> > 0x00000000004de04b <+1643>: mov $0x5,%edx > 0x00000000004de050 <+1648>: mov $0x700c48,%esi > 0x00000000004de055 <+1653>: xor %edi,%edi > 0x00000000004de057 <+1655>: callq 0x44f7f0 <dcgettext@plt> > 0x00000000004de05c <+1660>: mov $0x1e2,%esi > 0x00000000004de061 <+1665>: mov %rax,%rdx > 0x00000000004de064 <+1668>: mov $0x7178b5,%edi > 0x00000000004de069 <+1673>: xor %eax,%eax > 0x00000000004de06b <+1675>: callq 0x626990 <internal_error> > 0x00000000004de070 <+1680>: shl $0x1e,%r13d > 0x00000000004de074 <+1684>: sar $0x1f,%r13d > 0x00000000004de078 <+1688>: add $0xa,%r13d > 0x00000000004de07c <+1692>: jmpq 0x4ddbe7 <elf_symtab_read+519> > 0x00000000004de081 <+1697>: mov $0x717912,%esi > 0x00000000004de086 <+1702>: mov $0xf,%ecx > 0x00000000004de08b <+1707>: mov %r11,%rdi > 0x00000000004de08e <+1710>: repz cmpsb %es:(%rdi),%ds:(%rsi) > 0x00000000004de090 <+1712>: jne 0x4de070 <elf_symtab_read+1680> > 0x00000000004de092 <+1714>: mov 0x80e8(%r14),%ecx > 0x00000000004de099 <+1721>: cmp $0xffffffff,%ecx > 0x00000000004de09c <+1724>: jne 0x4ddf73 <elf_symtab_read+1427> > 0x00000000004de0a2 <+1730>: mov $0x5,%edx > 0x00000000004de0a7 <+1735>: mov $0x717180,%esi > 0x00000000004de0ac <+1740>: xor %edi,%edi > 0x00000000004de0ae <+1742>: callq 0x44f7f0 <dcgettext@plt> > 0x00000000004de0b3 <+1747>: mov $0x1e4,%esi > 0x00000000004de0b8 <+1752>: mov %rax,%rdx > 0x00000000004de0bb <+1755>: mov $0x7178b5,%edi > 0x00000000004de0c0 <+1760>: xor %eax,%eax > 0x00000000004de0c2 <+1762>: callq 0x626990 <internal_error> > 0x00000000004de0c7 <+1767>: nopw 0x0(%rax,%rax,1) > 0x00000000004de0d0 <+1776>: mov (%rax),%rdx > 0x00000000004de0d3 <+1779>: mov $0x7171e8,%esi > 0x00000000004de0d8 <+1784>: xor %edi,%edi > 0x00000000004de0da <+1786>: mov %r8,0x18(%rsp) > 0x00000000004de0df <+1791>: mov %rdx,0x68(%rsp) > 0x00000000004de0e4 <+1796>: mov $0x5,%edx > 0x00000000004de0e9 <+1801>: callq 0x44f7f0 <dcgettext@plt> > 0x00000000004de0ee <+1806>: mov 0x68(%rsp),%rdx > 0x00000000004de0f3 <+1811>: mov %rax,%rsi > 0x00000000004de0f6 <+1814>: mov $0xacd880,%edi > 0x00000000004de0fb <+1819>: xor %eax,%eax > 0x00000000004de0fd <+1821>: callq 0x60ba40 <complaint> > 0x00000000004de102 <+1826>: mov 0x18(%rsp),%r8 > 0x00000000004de107 <+1831>: jmpq 0x4ddf9b <elf_symtab_read+1467> > 0x00000000004de10c <+1836>: mov 0x80e4(%r14),%eax > 0x00000000004de113 <+1843>: mov 0x80e0(%r14),%edx > 0x00000000004de11a <+1850>: cmp %eax,%edx > 0x00000000004de11c <+1852>: cmovl %eax,%edx > 0x00000000004de11f <+1855>: mov 0x80e8(%r14),%eax > 0x00000000004de126 <+1862>: mov %ecx,0x20(%rsp) > 0x00000000004de12a <+1866>: mov %r8,0x18(%rsp) > 0x00000000004de12f <+1871>: cmp %eax,%edx > 0x00000000004de131 <+1873>: cmovge %edx,%eax > 0x00000000004de134 <+1876>: movslq %eax,%r13 > 0x00000000004de137 <+1879>: lea 0x28(,%r13,8),%rdx > 0x00000000004de13f <+1887>: mov %rdx,%rdi > 0x00000000004de142 <+1890>: mov %rdx,0x28(%rsp) > 0x00000000004de147 <+1895>: callq 0x64eb90 <xmalloc> > 0x00000000004de14c <+1900>: mov 0x28(%rsp),%rdx > 0x00000000004de151 <+1905>: xor %esi,%esi > 0x00000000004de153 <+1907>: mov %rax,%rdi > 0x00000000004de156 <+1910>: mov %rax,0x38(%rsp) > 0x00000000004de15b <+1915>: callq 0x44e7c0 <memset@plt> > 0x00000000004de160 <+1920>: cmpq $0x0,0x58(%rsp) > 0x00000000004de166 <+1926>: mov 0x38(%rsp),%rax > 0x00000000004de16b <+1931>: mov 0x20(%rsp),%ecx > 0x00000000004de16f <+1935>: mov 0x18(%rsp),%r8 > 0x00000000004de174 <+1940>: mov %r13,0x18(%rax) > 0x00000000004de178 <+1944>: je 0x4de1e4 <elf_symtab_read+2052> > 0x00000000004de17a <+1946>: mov 0x58(%rsp),%rdx > 0x00000000004de17f <+1951>: mov 0x8(%rdx),%rax > 0x00000000004de183 <+1955>: mov 0x38(%rsp),%rdx > 0x00000000004de188 <+1960>: mov %rax,(%rdx) > 0x00000000004de18b <+1963>: jmpq 0x4ddf87 <elf_symtab_read+1447> > 0x00000000004de190 <+1968>: mov $0x5,%edx > 0x00000000004de195 <+1973>: mov $0x6f7868,%esi > 0x00000000004de19a <+1978>: xor %edi,%edi > 0x00000000004de19c <+1980>: callq 0x44f7f0 <dcgettext@plt> > 0x00000000004de1a1 <+1985>: mov $0x122,%esi > 0x00000000004de1a6 <+1990>: mov %rax,%rdx > 0x00000000004de1a9 <+1993>: mov $0x7178b5,%edi > 0x00000000004de1ae <+1998>: xor %eax,%eax > 0x00000000004de1b0 <+2000>: callq 0x626990 <internal_error> > 0x00000000004de1b5 <+2005>: movb $0x0,0x68(%rsp) > 0x00000000004de1ba <+2010>: jmpq 0x4ddea6 <elf_symtab_read+1222> > 0x00000000004de1bf <+2015>: mov $0x5,%edx > 0x00000000004de1c4 <+2020>: mov $0x6f7868,%esi > 0x00000000004de1c9 <+2025>: xor %edi,%edi > 0x00000000004de1cb <+2027>: callq 0x44f7f0 <dcgettext@plt> > 0x00000000004de1d0 <+2032>: mov $0x159,%esi > 0x00000000004de1d5 <+2037>: mov %rax,%rdx > 0x00000000004de1d8 <+2040>: mov $0x7178b5,%edi > 0x00000000004de1dd <+2045>: xor %eax,%eax > 0x00000000004de1df <+2047>: callq 0x626990 <internal_error> > 0x00000000004de1e4 <+2052>: mov 0x8(%rbp),%r13 > 0x00000000004de1e8 <+2056>: mov $0x5,%edx > 0x00000000004de1ed <+2061>: mov $0x7171a8,%esi > 0x00000000004de1f2 <+2066>: xor %edi,%edi > 0x00000000004de1f4 <+2068>: callq 0x44f7f0 <dcgettext@plt> > 0x00000000004de1f9 <+2073>: mov %r13,%rdx > 0x00000000004de1fc <+2076>: mov %rax,%rsi > 0x00000000004de1ff <+2079>: mov $0xacd880,%edi > 0x00000000004de204 <+2084>: xor %eax,%eax > 0x00000000004de206 <+2086>: callq 0x60ba40 <complaint> > 0x00000000004de20b <+2091>: mov 0x20(%rsp),%ecx > 0x00000000004de20f <+2095>: mov 0x18(%rsp),%r8 > 0x00000000004de214 <+2100>: jmpq 0x4ddf87 <elf_symtab_read+1447> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 864348
:
623963
|
623964
|
623965
| 623966 |
623967
|
623968
|
623969
|
623970
|
623971
|
623972