Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 888991 Details for
Bug 1090572
[abrt] will-crash: printf(): will_segfault killed by SIGSEGV
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 4.26 KB, created by
Jakub Filak
on 2014-04-23 15:46:15 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Jakub Filak
Created:
2014-04-23 15:46:15 UTC
Size:
4.26 KB
patch
obsolete
>[New LWP 7400] >Core was generated by `will_segfault'. >Program terminated with signal 11, Segmentation fault. >#0 printf (__fmt=0x400a0f "Result: %d\n") at /usr/include/bits/stdio2.h:104 >warning: Source file is more recent than executable. >104 return __printf_chk (__USE_FORTIFY_LEVEL - 1, __fmt, __va_arg_pack ()); > >Thread 1 (LWP 7400): >#0 printf (__fmt=0x400a0f "Result: %d\n") at /usr/include/bits/stdio2.h:104 >No locals. >#1 crash (p=p@entry=0x0) at will_segfault.c:17 > i = <error reading variable i (Cannot access memory at address 0x0)> >#2 0x00000000004008a4 in varargs (num_args=1, num_args@entry=2) at will_segfault.c:29 > p = <optimized out> > ap = {{gp_offset = 24, fp_offset = 0, overflow_arg_area = 0x7fff717810b0, reg_save_area = 0x7fff71781070}} >#3 0x00000000004008fe in inlined (p=0x0) at will_segfault.c:38 > num = 42 >#4 f (p=p@entry=0x0) at will_segfault.c:43 >No locals. >#5 0x0000000000400929 in callback (data=data@entry=0x0) at will_segfault.c:48 >No locals. >#6 0x00007f787e59b6e9 in call_me_back (cb=cb@entry=0x400920 <callback>, data=data@entry=0x0) at libwillcrash.c:8 > res = <optimized out> >#7 0x0000000000400954 in recursive (i=i@entry=0) at will_segfault.c:57 > p = <optimized out> >#8 0x0000000000400940 in recursive (i=i@entry=1) at will_segfault.c:64 >No locals. >#9 0x0000000000400940 in recursive (i=i@entry=2) at will_segfault.c:64 >No locals. >#10 0x00000000004006de in main () at will_segfault.c:68 >No locals. >From To Syms Read Shared Object Library >0x00007f787e59b5f0 0x00007f787e59b704 Yes /lib64/libwillcrash.so.0 >0x00007f787e1f93c0 0x00007f787e33cd50 Yes /lib64/libc.so.6 >0x00007f787e79dae0 0x00007f787e7b7c9a Yes /lib64/ld-linux-x86-64.so.2 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0xf 15 >rbx 0x0 0 >rcx 0x7f787e2c1c70 140155489623152 >rdx 0x7f787e596a10 140155492592144 >rsi 0x7f787e9bb000 140155496935424 >rdi 0x1 1 >rbp 0x0 0x0 >rsp 0x7fff71781040 0x7fff71781040 >r8 0xffffffff 4294967295 >r9 0x0 0 >r10 0x22 34 >r11 0x246 582 >r12 0x4006e8 4196072 >r13 0x7fff71781200 140735097082368 >r14 0x0 0 >r15 0x0 0 >rip 0x4007ee 0x4007ee <crash+14> >eflags 0x10246 [ PF ZF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >st0 *value not available* >st1 *value not available* >st2 *value not available* >st3 *value not available* >st4 *value not available* >st5 *value not available* >st6 *value not available* >st7 *value not available* >fctrl *value not available* >fstat *value not available* >ftag *value not available* >fiseg *value not available* >fioff *value not available* >foseg *value not available* >fooff *value not available* >fop *value not available* >xmm0 *value not available* >xmm1 *value not available* >xmm2 *value not available* >xmm3 *value not available* >xmm4 *value not available* >xmm5 *value not available* >xmm6 *value not available* >xmm7 *value not available* >xmm8 *value not available* >xmm9 *value not available* >xmm10 *value not available* >xmm11 *value not available* >xmm12 *value not available* >xmm13 *value not available* >xmm14 *value not available* >xmm15 *value not available* >mxcsr *value not available* >Dump of assembler code for function crash: > 0x00000000004007e0 <+0>: push %rbx > 0x00000000004007e1 <+1>: mov %rdi,%rbx > 0x00000000004007e4 <+4>: mov $0x400a00,%edi > 0x00000000004007e9 <+9>: callq 0x400670 <puts@plt> >=> 0x00000000004007ee <+14>: mov (%rbx),%edx > 0x00000000004007f0 <+16>: mov $0x400a0f,%esi > 0x00000000004007f5 <+21>: mov $0x1,%edi > 0x00000000004007fa <+26>: xor %eax,%eax > 0x00000000004007fc <+28>: callq 0x4006c0 <__printf_chk@plt> > 0x0000000000400801 <+33>: pop %rbx > 0x0000000000400802 <+34>: retq >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1090572
: 888991 |
888992
|
888993
|
888994
|
888995
|
888996
|
888997
|
888998
|
888999
|
889000