Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 922553 Details for
Bug 1124836
[abrt] binutils: hash_traverse(): as killed by SIGSEGV
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 3.64 KB, created by
Frank Crawford
on 2014-07-30 12:28:04 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Frank Crawford
Created:
2014-07-30 12:28:04 UTC
Size:
3.64 KB
patch
obsolete
>[New LWP 11536] >Core was generated by `as -I /usr/src/linux-3.14/arch/x86/include -I arch/x86/include/generated -I inc'. >Program terminated with signal SIGSEGV, Segmentation fault. >#0 hash_traverse (table=0x1814070, pfn=pfn@entry=0x4240d0 <resolve_local_symbol>) at hash.c:368 >368 (*pfn) (p->string, p->data); > >Thread 1 (LWP 11536): >#0 hash_traverse (table=0x1814070, pfn=pfn@entry=0x4240d0 <resolve_local_symbol>) at hash.c:368 > p = 0x100000 > i = 16540 >#1 0x0000000000421e01 in resolve_local_symbol_values () at symbols.c:1496 >No locals. >#2 0x000000000042888d in write_object_file () at write.c:1985 > rsi = {pass = 2, changed = 0} >#3 0x00000000004044e4 in main (argc=1, argv=0x18146d0) at as.c:1289 > argv_orig = <optimized out> > macro_strip_at = 0 > __PRETTY_FUNCTION__ = "main" >From To Syms Read Shared Object Library >0x000000361e62c7e0 0x000000361e6341b4 Yes /lib64/libopcodes-2.23.2.so >0x000000361ee3b2a0 0x000000361eecb7b4 Yes /lib64/libbfd-2.23.2.so >0x000000361ea00ed0 0x000000361ea019d0 Yes /lib64/libdl.so.2 >0x000000361f202210 0x000000361f20e930 Yes /lib64/libz.so.1 >0x000000361e21f560 0x000000361e360bb4 Yes /lib64/libc.so.6 >0x000000361de00b10 0x000000361de19c70 Yes /lib64/ld-linux-x86-64.so.2 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0x2b96d75b5020 47926858174496 >rbx 0x100000 1048576 >rcx 0x184f610 25490960 >rdx 0x409c 16540 >rsi 0x0 0 >rdi 0x1817d70 25263472 >rbp 0x4240d0 0x4240d0 <resolve_local_symbol> >rsp 0x7fffd6fd7d60 0x7fffd6fd7d60 >r8 0x0 0 >r9 0x1 1 >r10 0x1 1 >r11 0x1 1 >r12 0x409c 16540 >r13 0x1814070 25247856 >r14 0x18146d0 25249488 >r15 0x1 1 >rip 0x410c00 0x410c00 <hash_traverse+48> >eflags 0x10206 [ PF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >Dump of assembler code for function hash_traverse: > 0x0000000000410bd0 <+0>: push %r13 > 0x0000000000410bd2 <+2>: mov %rdi,%r13 > 0x0000000000410bd5 <+5>: push %r12 > 0x0000000000410bd7 <+7>: xor %r12d,%r12d > 0x0000000000410bda <+10>: push %rbp > 0x0000000000410bdb <+11>: mov %rsi,%rbp > 0x0000000000410bde <+14>: push %rbx > 0x0000000000410bdf <+15>: sub $0x8,%rsp > 0x0000000000410be3 <+19>: mov 0x8(%rdi),%eax > 0x0000000000410be6 <+22>: test %eax,%eax > 0x0000000000410be8 <+24>: je 0x410c1c <hash_traverse+76> > 0x0000000000410bea <+26>: nopw 0x0(%rax,%rax,1) > 0x0000000000410bf0 <+32>: mov 0x0(%r13),%rax > 0x0000000000410bf4 <+36>: mov %r12d,%edx > 0x0000000000410bf7 <+39>: mov (%rax,%rdx,8),%rbx > 0x0000000000410bfb <+43>: test %rbx,%rbx > 0x0000000000410bfe <+46>: je 0x410c12 <hash_traverse+66> >=> 0x0000000000410c00 <+48>: mov 0x18(%rbx),%rsi > 0x0000000000410c04 <+52>: mov 0x8(%rbx),%rdi > 0x0000000000410c08 <+56>: callq *%rbp > 0x0000000000410c0a <+58>: mov (%rbx),%rbx > 0x0000000000410c0d <+61>: test %rbx,%rbx > 0x0000000000410c10 <+64>: jne 0x410c00 <hash_traverse+48> > 0x0000000000410c12 <+66>: add $0x1,%r12d > 0x0000000000410c16 <+70>: cmp %r12d,0x8(%r13) > 0x0000000000410c1a <+74>: ja 0x410bf0 <hash_traverse+32> > 0x0000000000410c1c <+76>: add $0x8,%rsp > 0x0000000000410c20 <+80>: pop %rbx > 0x0000000000410c21 <+81>: pop %rbp > 0x0000000000410c22 <+82>: pop %r12 > 0x0000000000410c24 <+84>: pop %r13 > 0x0000000000410c26 <+86>: retq >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1124836
: 922553 |
922554
|
922555
|
922556
|
922557
|
922558
|
922559
|
922560
|
922561
|
922562