Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 859374 Details for
Bug 1061463
[abrt] openocd: ioutil_Jim_Command_peek(): openocd killed by SIGSEGV
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 10.28 KB, created by
Josep
on 2014-02-04 21:13:41 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Josep
Created:
2014-02-04 21:13:41 UTC
Size:
10.28 KB
patch
obsolete
>[New LWP 3317] >[New LWP 3318] >warning: Could not load shared library symbols for /lib64/libusb-1.0.so.0. >Do you need "set solib-search-path" or "set sysroot"? >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `openocd -s /usr/share/openocd/scripts -f ../daemon.cfg -f interface/olimex-arm-'. >Program terminated with signal SIGSEGV, Segmentation fault. >#0 ioutil_Jim_Command_peek (interp=0x163d070, argc=<optimized out>, argv=<optimized out>) at ioutil.c:421 >421 int value = *((volatile int *) address); > >Thread 2 (Thread 0x7f0708c32700 (LWP 3318)): >#0 0x00007f0709c199dd in poll () at ../sysdeps/unix/syscall-template.S:81 >No locals. >#1 0x00007f070aa65bdc in ?? () >No symbol table info available. >#2 0x0000000000000000 in ?? () >No symbol table info available. > >Thread 1 (Thread 0x7f070ae6d840 (LWP 3317)): >#0 ioutil_Jim_Command_peek (interp=0x163d070, argc=<optimized out>, argv=<optimized out>) at ioutil.c:421 > address = 0 > value = <optimized out> > argc = 2 > argv = <optimized out> > interp = 0x163d070 >#1 0x00007f070a822d57 in JimInvokeCommand (interp=interp@entry=0x163d070, objc=objc@entry=2, objv=objv@entry=0x7fff0e1ee360) at jim.c:10074 > retcode = <optimized out> > cmdPtr = 0x16787c0 >#2 0x00007f070a82394b in Jim_EvalObj (interp=interp@entry=0x163d070, scriptObjPtr=scriptObjPtr@entry=0x16b7f90) at jim.c:10519 > argc = 2 > j = <optimized out> > i = 3 > script = 0x16aa440 > token = 0x16b89e0 > retcode = 0 > sargv = {0x16b4cf0, 0x16b53a0, 0x7fff0e1ee380, 0x7f0709ee7760 <main_arena>, 0x9, 0x16aa98c, 0x0, 0x163d030} > argv = <optimized out> > prevScriptObj = 0x163d480 >#3 0x00007f070a824ecb in Jim_EvalSource (interp=interp@entry=0x163d070, filename=filename@entry=0x0, lineno=lineno@entry=0, script=script@entry=0x16aa98c "peek 0x0") at jim.c:10838 > retval = <optimized out> > scriptObjPtr = 0x16b7f90 >#4 0x000000000043c0c7 in command_run_line (context=context@entry=0x16aa5b0, line=line@entry=0x16aa98c "peek 0x0") at command.c:659 > retval = <optimized out> > retcode = 0 > interp = 0x163d070 > __func__ = "command_run_line" >#5 0x0000000000438a0a in telnet_input (connection=0x1676710) at telnet_server.c:391 > retval = <optimized out> > prev_line = <optimized out> > bytes_read = 1 > buffer = "\r\000i\001\000\000\000\000\000\b\246\n\a\177\000\000<", '\000' <repeats 16 times>, "\020", '\000' <repeats 14 times>, "\002\000\000\000\000\000\000\000\000\020\000\000\000\000\000\000PKi\001\000\000\000\000\210\023\000\000\000\000\000\000\070\207k\001\000\000\000\000\270\021\246\n\a\177\000\000\004\000\000\000\000\000\000\000\204\346\036\016\377\177\000\000c\000\000\000\001\000\000\000\000\276G\352\017\367\325I\002\000\000\000\000\000\000\000\376\001\000\000\000\000\000\000\001\000\000\000\000\000\000\000t\347\036\016\377\177\000\000\005\000\000\000\000\000\000\000\300\301y\000\000\000\000\000\300\301y\000\000\000\000\000$\025\246\n\a\177\000\000\002\000\000\000\001\000\000\000\000"... > buf_p = 0x7fff0e1ee5a1 "" > t_con = 0x16aa980 > command_context = 0x16aa5b0 > __func__ = "telnet_input" >#6 0x000000000043723b in server_loop (command_context=command_context@entry=0x163d030) at server.c:465 > c = 0x1676710 > tv = {tv_sec = 0, tv_usec = 13612} > service = 0x167cf30 > poll_ok = true > read_fds = {fds_bits = {32768, 0 <repeats 15 times>}} > fd_max = <optimized out> > retval = <optimized out> > __func__ = "server_loop" >#7 0x0000000000405645 in openocd_thread (cmd_ctx=0x163d030, argv=0x7fff0e1eebe8, argc=<optimized out>) at openocd.c:295 > ret = 0 >#8 openocd_main (argc=<optimized out>, argv=0x7fff0e1eebe8) at openocd.c:328 > cmd_ctx = 0x163d030 > __func__ = "openocd_main" >#9 0x00007f0709b50d65 in __libc_start_main (main=0x404f50 <main>, argc=9, argv=0x7fff0e1eebe8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fff0e1eebd8) at libc-start.c:285 > result = <optimized out> > unwind_buf = {cancel_jmp_buf = {{jmp_buf = {0, -5673346470539267619, 4214796, 140733430295520, 0, 0, 5672887690080186845, 5713425375106724317}, mask_was_saved = 0}}, priv = {pad = {0x0, 0x0, 0x4e6c00 <__libc_csu_init>, 0x7fff0e1eebe8}, data = {prev = 0x0, cleanup = 0x0, canceltype = 5139456}}} > not_first_call = <optimized out> >#10 0x0000000000405035 in _start () >No symbol table info available. >From To Syms Read Shared Object Library > No /lib64/libusb-1.0.so.0 >0x00007f070a813730 0x00007f070a83e38c Yes /lib64/libjim.so.0.74 >0x00007f070a505890 0x00007f070a574bb8 Yes /lib64/libm.so.6 >0x00007f070a2fced0 0x00007f070a2fd9d0 Yes /lib64/libdl.so.2 >0x00007f070a0f5c20 0x00007f070a0f8f78 Yes /lib64/libftdi.so.1 >0x00007f0709eef870 0x00007f0709ef146c Yes /lib64/libusb-0.1.so.4 >0x00007f0709b4e560 0x00007f0709c8fbb4 Yes /lib64/libc.so.6 >0x00007f07099204f0 0x00007f0709928f62 Yes /lib64/libudev.so.1 >0x00007f07097059f0 0x00007f0709711614 Yes /lib64/libpthread.so.0 >0x00007f070ac6eb10 0x00007f070ac87c70 Yes /lib64/ld-linux-x86-64.so.2 >0x00007f07094e24a0 0x00007f07094f4fe4 Yes /lib64/libselinux.so.1 >0x00007f07092d62d0 0x00007f07092d90bc Yes /lib64/librt.so.1 >0x00007f07090c0af0 0x00007f07090d0218 Yes /lib64/libgcc_s.so.1 >0x00007f0708e59770 0x00007f0708ea38e8 Yes /lib64/libpcre.so.1 >0x00007f0708c360e0 0x00007f0708c4c060 Yes /lib64/liblzma.so.5 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0x0 0 >rbx 0x0 0 >rcx 0x0 0 >rdx 0x0 0 >rsi 0x163d230 23319088 >rdi 0x163d070 23318640 >rbp 0x163d070 0x163d070 >rsp 0x7fff0e1ee280 0x7fff0e1ee280 >r8 0x7f0709ee8060 139668208124000 >r9 0x16b8323 23823139 >r10 0x0 0 >r11 0x0 0 >r12 0x163d230 23319088 >r13 0x7fff0e1ee360 140733430293344 >r14 0x2 2 >r15 0x2 2 >rip 0x43e678 0x43e678 <ioutil_Jim_Command_peek+120> >eflags 0x10246 [ PF ZF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >st0 *value not available* >st1 *value not available* >st2 *value not available* >st3 *value not available* >st4 *value not available* >st5 *value not available* >st6 *value not available* >st7 *value not available* >fctrl *value not available* >fstat *value not available* >ftag *value not available* >fiseg *value not available* >fioff *value not available* >foseg *value not available* >fooff *value not available* >fop *value not available* >mxcsr *value not available* >ymm0 *value not available* >ymm1 *value not available* >ymm2 *value not available* >ymm3 *value not available* >ymm4 *value not available* >ymm5 *value not available* >ymm6 *value not available* >ymm7 *value not available* >ymm8 *value not available* >ymm9 *value not available* >ymm10 *value not available* >ymm11 *value not available* >ymm12 *value not available* >ymm13 *value not available* >ymm14 *value not available* >ymm15 *value not available* >Dump of assembler code for function ioutil_Jim_Command_peek: > 0x000000000043e600 <+0>: push %rbp > 0x000000000043e601 <+1>: mov %rdi,%rbp > 0x000000000043e604 <+4>: push %rbx > 0x000000000043e605 <+5>: sub $0x28,%rsp > 0x000000000043e609 <+9>: mov %fs:0x28,%rax > 0x000000000043e612 <+18>: mov %rax,0x18(%rsp) > 0x000000000043e617 <+23>: xor %eax,%eax > 0x000000000043e619 <+25>: cmp $0x2,%esi > 0x000000000043e61c <+28>: je 0x43e650 <ioutil_Jim_Command_peek+80> > 0x000000000043e61e <+30>: mov $0x5019ad,%ecx > 0x000000000043e623 <+35>: mov $0x1,%esi > 0x000000000043e628 <+40>: mov $0x1,%ebx > 0x000000000043e62d <+45>: callq 0x404540 <Jim_WrongNumArgs@plt> > 0x000000000043e632 <+50>: mov 0x18(%rsp),%rcx > 0x000000000043e637 <+55>: xor %fs:0x28,%rcx > 0x000000000043e640 <+64>: mov %ebx,%eax > 0x000000000043e642 <+66>: jne 0x43e6af <ioutil_Jim_Command_peek+175> > 0x000000000043e644 <+68>: add $0x28,%rsp > 0x000000000043e648 <+72>: pop %rbx > 0x000000000043e649 <+73>: pop %rbp > 0x000000000043e64a <+74>: retq > 0x000000000043e64b <+75>: nopl 0x0(%rax,%rax,1) > 0x000000000043e650 <+80>: mov 0x8(%rdx),%rsi > 0x000000000043e654 <+84>: lea 0x10(%rsp),%rdx > 0x000000000043e659 <+89>: callq 0x4045d0 <Jim_GetLong@plt> > 0x000000000043e65e <+94>: test %eax,%eax > 0x000000000043e660 <+96>: mov %eax,%ebx > 0x000000000043e662 <+98>: je 0x43e670 <ioutil_Jim_Command_peek+112> > 0x000000000043e664 <+100>: mov $0x1,%ebx > 0x000000000043e669 <+105>: jmp 0x43e632 <ioutil_Jim_Command_peek+50> > 0x000000000043e66b <+107>: nopl 0x0(%rax,%rax,1) > 0x000000000043e670 <+112>: mov 0x10(%rsp),%rax > 0x000000000043e675 <+117>: mov %rbp,%rdi >=> 0x000000000043e678 <+120>: movslq (%rax),%rsi > 0x000000000043e67b <+123>: callq 0x404600 <Jim_NewIntObj@plt> > 0x000000000043e680 <+128>: mov 0x0(%rbp),%rsi > 0x000000000043e684 <+132>: addl $0x1,0x10(%rax) > 0x000000000043e688 <+136>: mov 0x10(%rsi),%ecx > 0x000000000043e68b <+139>: lea -0x1(%rcx),%edx > 0x000000000043e68e <+142>: test %edx,%edx > 0x000000000043e690 <+144>: mov %edx,0x10(%rsi) > 0x000000000043e693 <+147>: jle 0x43e69b <ioutil_Jim_Command_peek+155> > 0x000000000043e695 <+149>: mov %rax,0x0(%rbp) > 0x000000000043e699 <+153>: jmp 0x43e632 <ioutil_Jim_Command_peek+50> > 0x000000000043e69b <+155>: mov %rbp,%rdi > 0x000000000043e69e <+158>: mov %rax,0x8(%rsp) > 0x000000000043e6a3 <+163>: callq 0x4045a0 <Jim_FreeObj@plt> > 0x000000000043e6a8 <+168>: mov 0x8(%rsp),%rax > 0x000000000043e6ad <+173>: jmp 0x43e695 <ioutil_Jim_Command_peek+149> > 0x000000000043e6af <+175>: callq 0x403d10 <__stack_chk_fail@plt> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1061463
: 859374 |
859375
|
859376
|
859377
|
859378
|
859379
|
859380
|
859381
|
859382
|
859383
|
859384