Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 712794 Details for
Bug 923367
[abrt] gdb-7.5.1-36.fc18: gdb_bfd_unref: Process /usr/bin/gdb was killed by signal 11 (SIGSEGV)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 5.70 KB, created by
Drazen Matijacic
on 2013-03-19 16:41:12 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Drazen Matijacic
Created:
2013-03-19 16:41:12 UTC
Size:
5.70 KB
patch
obsolete
>BFD: Warning: /var/spool/abrt/crash/coredump is truncated: expected core file size >= 104222720, found: 4255744. >[New LWP 5793] >Cannot access memory at address 0x361fa22288 >Cannot access memory at address 0x361fa22280 > >Thread 1 (LWP 5793): >#0 gdb_bfd_unref (abfd=0x185e880, abfd@entry=<error reading variable: Cannot access memory at address 0x7fff20162d78>) at ../../gdb/gdb_bfd.c:277 > gdata = 0x0 > search = <error reading variable search (Cannot access memory at address 0x7fff20162d50)> > __PRETTY_FUNCTION__ = "gdb_bfd_unref" >Cannot access memory at address 0x7fff20162d78 >Cannot access memory at address 0x361fa22288 >Cannot access memory at address 0x361fa22280 >No symbol "__abort_msg" in current context. >No symbol "__glib_assert_msg" in current context. >rax 0x17ed180 25088384 >rbx 0x185e880 25553024 >rcx 0x361ffb1750 232464783184 >rdx 0x473dbd0 74701776 >rsi 0x0 0 >rdi 0x185e880 25553024 >rbp 0x0 0x0 >rsp 0x7fff20162d50 0x7fff20162d50 >r8 0x1 1 >r9 0x600000 6291456 >r10 0x20 32 >r11 0x246 582 >r12 0x1 1 >r13 0x75e660 7726688 >r14 0x7fff201649fb 140733731719675 >r15 0x3b07fc0 61898688 >rip 0x5a3bdd 0x5a3bdd <gdb_bfd_unref+29> >eflags 0x10202 [ IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >Dump of assembler code for function gdb_bfd_unref: > 0x00000000005a3bc0 <+0>: mov %rbx,-0x10(%rsp) > 0x00000000005a3bc5 <+5>: mov %rbp,-0x8(%rsp) > 0x00000000005a3bca <+10>: sub $0x28,%rsp > 0x00000000005a3bce <+14>: test %rdi,%rdi > 0x00000000005a3bd1 <+17>: mov %rdi,%rbx > 0x00000000005a3bd4 <+20>: je 0x5a3bf2 <gdb_bfd_unref+50> > 0x00000000005a3bd6 <+22>: mov 0x110(%rdi),%rbp >=> 0x00000000005a3bdd <+29>: mov 0x0(%rbp),%eax > 0x00000000005a3be0 <+32>: test %eax,%eax > 0x00000000005a3be2 <+34>: jle 0x5a3ccc <gdb_bfd_unref+268> > 0x00000000005a3be8 <+40>: sub $0x1,%eax > 0x00000000005a3beb <+43>: test %eax,%eax > 0x00000000005a3bed <+45>: mov %eax,0x0(%rbp) > 0x00000000005a3bf0 <+48>: je 0x5a3c08 <gdb_bfd_unref+72> > 0x00000000005a3bf2 <+50>: mov 0x18(%rsp),%rbx > 0x00000000005a3bf7 <+55>: mov 0x20(%rsp),%rbp > 0x00000000005a3bfc <+60>: add $0x28,%rsp > 0x00000000005a3c00 <+64>: retq > 0x00000000005a3c01 <+65>: nopl 0x0(%rax) > 0x00000000005a3c08 <+72>: cmpq $0x0,0x5699f8(%rip) # 0xb0d608 <gdb_bfd_cache> > 0x00000000005a3c10 <+80>: mov 0x8(%rdi),%rdi > 0x00000000005a3c14 <+84>: mov %rdi,(%rsp) > 0x00000000005a3c18 <+88>: je 0x5a3c5a <gdb_bfd_unref+154> > 0x00000000005a3c1a <+90>: test %rdi,%rdi > 0x00000000005a3c1d <+93>: je 0x5a3c5a <gdb_bfd_unref+154> > 0x00000000005a3c1f <+95>: callq 0x704b30 <htab_hash_string> > 0x00000000005a3c24 <+100>: mov 0x8(%rbp),%rdx > 0x00000000005a3c28 <+104>: mov 0x5699d9(%rip),%rdi # 0xb0d608 <gdb_bfd_cache> > 0x00000000005a3c2f <+111>: xor %ecx,%ecx > 0x00000000005a3c31 <+113>: mov %rsp,%rsi > 0x00000000005a3c34 <+116>: mov %rdx,0x8(%rsp) > 0x00000000005a3c39 <+121>: mov %eax,%edx > 0x00000000005a3c3b <+123>: callq 0x704730 <htab_find_slot_with_hash> > 0x00000000005a3c40 <+128>: test %rax,%rax > 0x00000000005a3c43 <+131>: je 0x5a3c5a <gdb_bfd_unref+154> > 0x00000000005a3c45 <+133>: cmpq $0x0,(%rax) > 0x00000000005a3c49 <+137>: je 0x5a3c5a <gdb_bfd_unref+154> > 0x00000000005a3c4b <+139>: mov 0x5699b6(%rip),%rdi # 0xb0d608 <gdb_bfd_cache> > 0x00000000005a3c52 <+146>: mov %rax,%rsi > 0x00000000005a3c55 <+149>: callq 0x704a00 <htab_clear_slot> > 0x00000000005a3c5a <+154>: mov 0x5699af(%rip),%rdi # 0xb0d610 <all_bfds> > 0x00000000005a3c61 <+161>: mov %rbx,%rsi > 0x00000000005a3c64 <+164>: movq $0x0,0x110(%rbx) > 0x00000000005a3c6f <+175>: callq 0x7049c0 <htab_remove_elt> > 0x00000000005a3c74 <+180>: xor %edx,%edx > 0x00000000005a3c76 <+182>: mov $0x5a3860,%esi > 0x00000000005a3c7b <+187>: mov %rbx,%rdi > 0x00000000005a3c7e <+190>: mov 0x8(%rbx),%rbp > 0x00000000005a3c82 <+194>: callq 0x6830f0 <bfd_map_over_sections> > 0x00000000005a3c87 <+199>: mov %rbx,%rdi > 0x00000000005a3c8a <+202>: callq 0x681cf0 <bfd_close> > 0x00000000005a3c8f <+207>: test %eax,%eax > 0x00000000005a3c91 <+209>: jne 0x5a3bf2 <gdb_bfd_unref+50> > 0x00000000005a3c97 <+215>: callq 0x67a4e0 <bfd_get_error> > 0x00000000005a3c9c <+220>: mov %eax,%edi > 0x00000000005a3c9e <+222>: callq 0x67a4f0 <bfd_errmsg> > 0x00000000005a3ca3 <+227>: xor %edi,%edi > 0x00000000005a3ca5 <+229>: mov %rax,%rbx > 0x00000000005a3ca8 <+232>: mov $0x5,%edx > 0x00000000005a3cad <+237>: mov $0x783018,%esi > 0x00000000005a3cb2 <+242>: callq 0x450eb0 <dcgettext@plt> > 0x00000000005a3cb7 <+247>: mov %rbx,%rdx > 0x00000000005a3cba <+250>: mov %rax,%rdi > 0x00000000005a3cbd <+253>: mov %rbp,%rsi > 0x00000000005a3cc0 <+256>: xor %eax,%eax > 0x00000000005a3cc2 <+258>: callq 0x6444d0 <warning> > 0x00000000005a3cc7 <+263>: jmpq 0x5a3bf2 <gdb_bfd_unref+50> > 0x00000000005a3ccc <+268>: mov $0x5,%edx > 0x00000000005a3cd1 <+273>: mov $0x7159ec,%esi > 0x00000000005a3cd6 <+278>: xor %edi,%edi > 0x00000000005a3cd8 <+280>: callq 0x450eb0 <dcgettext@plt> > 0x00000000005a3cdd <+285>: mov $0x783007,%r8d > 0x00000000005a3ce3 <+291>: mov %rax,%rdx > 0x00000000005a3ce6 <+294>: mov $0x7831e9,%ecx > 0x00000000005a3ceb <+299>: mov $0x115,%esi > 0x00000000005a3cf0 <+304>: mov $0x782fe4,%edi > 0x00000000005a3cf5 <+309>: xor %eax,%eax > 0x00000000005a3cf7 <+311>: callq 0x645320 <internal_error> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 923367
: 712794 |
712795
|
712796
|
712797
|
712798
|
712799
|
712800
|
712801
|
712802
|
712803