Bug 903582
| Summary: | [abrt] will-crash-0.2-1.fc17: main: Process /usr/bin/will_segfault was killed by signal 11 (SIGSEGV) | ||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Jakub Filak <jfilak> | ||||||||||||||||||||||||||||||
| Component: | abrt | Assignee: | abrt <abrt-devel-list> | ||||||||||||||||||||||||||||||
| Status: | CLOSED NOTABUG | QA Contact: | Fedora Extras Quality Assurance <extras-qa> | ||||||||||||||||||||||||||||||
| Severity: | unspecified | Docs Contact: | |||||||||||||||||||||||||||||||
| Priority: | unspecified | ||||||||||||||||||||||||||||||||
| Version: | 17 | CC: | abrt-devel-list, dvlasenk, iprikryl, jberan, jfilak, jmoskovc, kklic, mmilata, mtoman | ||||||||||||||||||||||||||||||
| Target Milestone: | --- | ||||||||||||||||||||||||||||||||
| Target Release: | --- | ||||||||||||||||||||||||||||||||
| Hardware: | x86_64 | ||||||||||||||||||||||||||||||||
| OS: | Unspecified | ||||||||||||||||||||||||||||||||
| Whiteboard: | abrt_hash:350f14424bdf6726346c74fe5329c980cc19c899 | ||||||||||||||||||||||||||||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||||||||||||||||||||||||||||
| Doc Text: | Story Points: | --- | |||||||||||||||||||||||||||||||
| Clone Of: | Environment: | ||||||||||||||||||||||||||||||||
| Last Closed: | 2013-01-24 10:51:42 UTC | Type: | --- | ||||||||||||||||||||||||||||||
| Regression: | --- | Mount Type: | --- | ||||||||||||||||||||||||||||||
| Documentation: | --- | CRM: | |||||||||||||||||||||||||||||||
| Verified Versions: | Category: | --- | |||||||||||||||||||||||||||||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||||||||||||||||||||||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||||||||||||||||||||||||||||
| Embargoed: | |||||||||||||||||||||||||||||||||
| Attachments: |
|
||||||||||||||||||||||||||||||||
Created attachment 686649 [details]
File: backtrace
Created attachment 686650 [details]
File: build_ids
Created attachment 686651 [details]
File: cgroup
Created attachment 686652 [details]
File: comments.xml
Created attachment 686653 [details]
File: core_backtrace
Created attachment 686654 [details]
File: dso_list
Created attachment 686655 [details]
File: environ
Created attachment 686656 [details]
File: limits
Created attachment 686657 [details]
File: maps
Created attachment 686658 [details]
File: open_fds
Created attachment 686659 [details]
File: proc_pid_status
Created attachment 686660 [details]
File: response.xml
Created attachment 686661 [details]
File: var_log_messages
Description of problem:
Testing new Bugzilla RPC methods names ... additional comment
Version-Release number of selected component:
will-crash-0.2-1.fc17
Additional info:
backtrace_rating: 3
cmdline: will_segfault
crash_function: main
executable: /usr/bin/will_segfault
kernel: 3.6.10-2.fc17.x86_64
uid: 18601
Truncated backtrace:
[New LWP 20879]
Core was generated by `will_segfault'.
Program terminated with signal 11, Segmentation fault.
#0 main () at will_segfault.c:7
7 will_segfault.c: No such file or directory.
Thread 1 (LWP 20879):
#0 main () at will_segfault.c:7
i = <error reading variable i (Cannot access memory at address 0x0)>
From To Syms Read Shared Object Library
0x0000003ea361ef60 0x0000003ea375f7a0 Yes /lib64/libc.so.6
0x0000003ea3200b20 0x0000003ea321a2e9 Yes /lib64/ld-linux-x86-64.so.2
$1 = 0x0
No symbol "__glib_assert_msg" in current context.
rax 0xf 15
rbx 0x0 0
rcx 0x3ea36e4950 269029886288
rdx 0x3ea39b2ae0 269032827616
rsi 0x7f61109f6000 140054867435520
rdi 0xffffffff 4294967295
rbp 0x0 0x0
rsp 0x7fff14ffa120 0x7fff14ffa120
r8 0xffffffff 4294967295
r9 0x0 0
r10 0x22 34
r11 0x246 582
r12 0x40042c 4195372
r13 0x7fff14ffa200 140733545685504
r14 0x0 0
r15 0x0 0
rip 0x40041e 0x40041e <main+14>
eflags 0x10246 [ PF ZF IF RF ]
cs 0x33 51
ss 0x2b 43
ds 0x0 0
es 0x0 0
fs 0x0 0
gs 0x0 0
Dump of assembler code for function main:
0x0000000000400410 <+0>: sub $0x8,%rsp
0x0000000000400414 <+4>: mov $0x4005e0,%edi
0x0000000000400419 <+9>: callq 0x4003f0 <puts@plt>
=> 0x000000000040041e <+14>: mov 0x0,%eax
0x0000000000400425 <+21>: add $0x8,%rsp
0x0000000000400429 <+25>: retq
End of assembler dump.
Description of problem:
Testing new Bugzilla RPC methods names ... the best backtrace
Version-Release number of selected component:
will-crash-0.2-1.fc17
Additional info:
backtrace_rating: 6
cmdline: will_segfault
crash_function: main
executable: /usr/bin/will_segfault
kernel: 3.6.10-2.fc17.x86_64
uid: 18601
Truncated backtrace:
[New LWP 20879]
Core was generated by `will_segfault'.
Program terminated with signal 11, Segmentation fault.
#0 main () at will_segfault.c:7
7 will_segfault.c: No such file or directory.
Thread 1 (LWP 20879):
#0 main () at will_segfault.c:7
i = <error reading variable i (Cannot access memory at address 0x0)>
From To Syms Read Shared Object Library
0x0000003ea361ef60 0x0000003ea375f7a0 Yes /lib64/libc.so.6
0x0000003ea3200b20 0x0000003ea321a2e9 Yes /lib64/ld-linux-x86-64.so.2
$1 = 0x0
No symbol "__glib_assert_msg" in current context.
rax 0xf 15
rbx 0x0 0
rcx 0x3ea36e4950 269029886288
rdx 0x3ea39b2ae0 269032827616
rsi 0x7f61109f6000 140054867435520
rdi 0xffffffff 4294967295
rbp 0x0 0x0
rsp 0x7fff14ffa120 0x7fff14ffa120
r8 0xffffffff 4294967295
r9 0x0 0
r10 0x22 34
r11 0x246 582
r12 0x40042c 4195372
r13 0x7fff14ffa200 140733545685504
r14 0x0 0
r15 0x0 0
rip 0x40041e 0x40041e <main+14>
eflags 0x10246 [ PF ZF IF RF ]
cs 0x33 51
ss 0x2b 43
ds 0x0 0
es 0x0 0
fs 0x0 0
gs 0x0 0
Dump of assembler code for function main:
0x0000000000400410 <+0>: sub $0x8,%rsp
0x0000000000400414 <+4>: mov $0x4005e0,%edi
0x0000000000400419 <+9>: callq 0x4003f0 <puts@plt>
=> 0x000000000040041e <+14>: mov 0x0,%eax
0x0000000000400425 <+21>: add $0x8,%rsp
0x0000000000400429 <+25>: retq
End of assembler dump.
Created attachment 686662 [details]
File: backtrace
|
Description of problem: Testing new Bugzilla RPC methods names ... Version-Release number of selected component: will-crash-0.2-1.fc17 Additional info: backtrace_rating: 3 cmdline: will_segfault crash_function: main executable: /usr/bin/will_segfault kernel: 3.6.10-2.fc17.x86_64 uid: 18601 Truncated backtrace: [New LWP 20879] Core was generated by `will_segfault'. Program terminated with signal 11, Segmentation fault. #0 main () at will_segfault.c:7 7 will_segfault.c: No such file or directory. Thread 1 (LWP 20879): #0 main () at will_segfault.c:7 i = <error reading variable i (Cannot access memory at address 0x0)> From To Syms Read Shared Object Library 0x0000003ea361ef60 0x0000003ea375f7a0 Yes /lib64/libc.so.6 0x0000003ea3200b20 0x0000003ea321a2e9 Yes /lib64/ld-linux-x86-64.so.2 $1 = 0x0 No symbol "__glib_assert_msg" in current context. rax 0xf 15 rbx 0x0 0 rcx 0x3ea36e4950 269029886288 rdx 0x3ea39b2ae0 269032827616 rsi 0x7f61109f6000 140054867435520 rdi 0xffffffff 4294967295 rbp 0x0 0x0 rsp 0x7fff14ffa120 0x7fff14ffa120 r8 0xffffffff 4294967295 r9 0x0 0 r10 0x22 34 r11 0x246 582 r12 0x40042c 4195372 r13 0x7fff14ffa200 140733545685504 r14 0x0 0 r15 0x0 0 rip 0x40041e 0x40041e <main+14> eflags 0x10246 [ PF ZF IF RF ] cs 0x33 51 ss 0x2b 43 ds 0x0 0 es 0x0 0 fs 0x0 0 gs 0x0 0 Dump of assembler code for function main: 0x0000000000400410 <+0>: sub $0x8,%rsp 0x0000000000400414 <+4>: mov $0x4005e0,%edi 0x0000000000400419 <+9>: callq 0x4003f0 <puts@plt> => 0x000000000040041e <+14>: mov 0x0,%eax 0x0000000000400425 <+21>: add $0x8,%rsp 0x0000000000400429 <+25>: retq End of assembler dump.