Bug 903582

Summary: [abrt] will-crash-0.2-1.fc17: main: Process /usr/bin/will_segfault was killed by signal 11 (SIGSEGV)
Product: [Fedora] Fedora Reporter: Jakub Filak <jfilak>
Component: abrtAssignee: abrt <abrt-devel-list>
Status: CLOSED NOTABUG QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 17CC: abrt-devel-list, dvlasenk, iprikryl, jberan, jfilak, jmoskovc, kklic, mmilata, mtoman
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Unspecified   
Whiteboard: abrt_hash:350f14424bdf6726346c74fe5329c980cc19c899
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-01-24 10:51:42 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
File: backtrace
none
File: build_ids
none
File: cgroup
none
File: comments.xml
none
File: core_backtrace
none
File: dso_list
none
File: environ
none
File: limits
none
File: maps
none
File: open_fds
none
File: proc_pid_status
none
File: response.xml
none
File: var_log_messages
none
File: backtrace none

Description Jakub Filak 2013-01-24 10:43:52 UTC
Description of problem:
Testing new Bugzilla RPC methods names ...

Version-Release number of selected component:
will-crash-0.2-1.fc17

Additional info:
backtrace_rating: 3
cmdline:        will_segfault
crash_function: main
executable:     /usr/bin/will_segfault
kernel:         3.6.10-2.fc17.x86_64
uid:            18601

Truncated backtrace:
[New LWP 20879]
Core was generated by `will_segfault'.
Program terminated with signal 11, Segmentation fault.
#0  main () at will_segfault.c:7
7	will_segfault.c: No such file or directory.

Thread 1 (LWP 20879):
#0  main () at will_segfault.c:7
        i = <error reading variable i (Cannot access memory at address 0x0)>
From                To                  Syms Read   Shared Object Library
0x0000003ea361ef60  0x0000003ea375f7a0  Yes         /lib64/libc.so.6
0x0000003ea3200b20  0x0000003ea321a2e9  Yes         /lib64/ld-linux-x86-64.so.2
$1 = 0x0
No symbol "__glib_assert_msg" in current context.
rax            0xf	15
rbx            0x0	0
rcx            0x3ea36e4950	269029886288
rdx            0x3ea39b2ae0	269032827616
rsi            0x7f61109f6000	140054867435520
rdi            0xffffffff	4294967295
rbp            0x0	0x0
rsp            0x7fff14ffa120	0x7fff14ffa120
r8             0xffffffff	4294967295
r9             0x0	0
r10            0x22	34
r11            0x246	582
r12            0x40042c	4195372
r13            0x7fff14ffa200	140733545685504
r14            0x0	0
r15            0x0	0
rip            0x40041e	0x40041e <main+14>
eflags         0x10246	[ PF ZF IF RF ]
cs             0x33	51
ss             0x2b	43
ds             0x0	0
es             0x0	0
fs             0x0	0
gs             0x0	0
Dump of assembler code for function main:
   0x0000000000400410 <+0>:	sub    $0x8,%rsp
   0x0000000000400414 <+4>:	mov    $0x4005e0,%edi
   0x0000000000400419 <+9>:	callq  0x4003f0 <puts@plt>
=> 0x000000000040041e <+14>:	mov    0x0,%eax
   0x0000000000400425 <+21>:	add    $0x8,%rsp
   0x0000000000400429 <+25>:	retq   
End of assembler dump.

Comment 1 Jakub Filak 2013-01-24 10:43:55 UTC
Created attachment 686649 [details]
File: backtrace

Comment 2 Jakub Filak 2013-01-24 10:43:57 UTC
Created attachment 686650 [details]
File: build_ids

Comment 3 Jakub Filak 2013-01-24 10:44:00 UTC
Created attachment 686651 [details]
File: cgroup

Comment 4 Jakub Filak 2013-01-24 10:44:03 UTC
Created attachment 686652 [details]
File: comments.xml

Comment 5 Jakub Filak 2013-01-24 10:44:05 UTC
Created attachment 686653 [details]
File: core_backtrace

Comment 6 Jakub Filak 2013-01-24 10:44:07 UTC
Created attachment 686654 [details]
File: dso_list

Comment 7 Jakub Filak 2013-01-24 10:44:09 UTC
Created attachment 686655 [details]
File: environ

Comment 8 Jakub Filak 2013-01-24 10:44:11 UTC
Created attachment 686656 [details]
File: limits

Comment 9 Jakub Filak 2013-01-24 10:44:14 UTC
Created attachment 686657 [details]
File: maps

Comment 10 Jakub Filak 2013-01-24 10:44:16 UTC
Created attachment 686658 [details]
File: open_fds

Comment 11 Jakub Filak 2013-01-24 10:44:18 UTC
Created attachment 686659 [details]
File: proc_pid_status

Comment 12 Jakub Filak 2013-01-24 10:44:21 UTC
Created attachment 686660 [details]
File: response.xml

Comment 13 Jakub Filak 2013-01-24 10:44:24 UTC
Created attachment 686661 [details]
File: var_log_messages

Comment 14 Jakub Filak 2013-01-24 10:47:30 UTC
Description of problem:
Testing new Bugzilla RPC methods names ... additional comment

Version-Release number of selected component:
will-crash-0.2-1.fc17

Additional info:
backtrace_rating: 3
cmdline:        will_segfault
crash_function: main
executable:     /usr/bin/will_segfault
kernel:         3.6.10-2.fc17.x86_64
uid:            18601

Truncated backtrace:
[New LWP 20879]
Core was generated by `will_segfault'.
Program terminated with signal 11, Segmentation fault.
#0  main () at will_segfault.c:7
7	will_segfault.c: No such file or directory.

Thread 1 (LWP 20879):
#0  main () at will_segfault.c:7
        i = <error reading variable i (Cannot access memory at address 0x0)>
From                To                  Syms Read   Shared Object Library
0x0000003ea361ef60  0x0000003ea375f7a0  Yes         /lib64/libc.so.6
0x0000003ea3200b20  0x0000003ea321a2e9  Yes         /lib64/ld-linux-x86-64.so.2
$1 = 0x0
No symbol "__glib_assert_msg" in current context.
rax            0xf	15
rbx            0x0	0
rcx            0x3ea36e4950	269029886288
rdx            0x3ea39b2ae0	269032827616
rsi            0x7f61109f6000	140054867435520
rdi            0xffffffff	4294967295
rbp            0x0	0x0
rsp            0x7fff14ffa120	0x7fff14ffa120
r8             0xffffffff	4294967295
r9             0x0	0
r10            0x22	34
r11            0x246	582
r12            0x40042c	4195372
r13            0x7fff14ffa200	140733545685504
r14            0x0	0
r15            0x0	0
rip            0x40041e	0x40041e <main+14>
eflags         0x10246	[ PF ZF IF RF ]
cs             0x33	51
ss             0x2b	43
ds             0x0	0
es             0x0	0
fs             0x0	0
gs             0x0	0
Dump of assembler code for function main:
   0x0000000000400410 <+0>:	sub    $0x8,%rsp
   0x0000000000400414 <+4>:	mov    $0x4005e0,%edi
   0x0000000000400419 <+9>:	callq  0x4003f0 <puts@plt>
=> 0x000000000040041e <+14>:	mov    0x0,%eax
   0x0000000000400425 <+21>:	add    $0x8,%rsp
   0x0000000000400429 <+25>:	retq   
End of assembler dump.

Comment 15 Jakub Filak 2013-01-24 10:51:00 UTC
Description of problem:
Testing new Bugzilla RPC methods names ... the best backtrace

Version-Release number of selected component:
will-crash-0.2-1.fc17

Additional info:
backtrace_rating: 6
cmdline:        will_segfault
crash_function: main
executable:     /usr/bin/will_segfault
kernel:         3.6.10-2.fc17.x86_64
uid:            18601

Truncated backtrace:
[New LWP 20879]
Core was generated by `will_segfault'.
Program terminated with signal 11, Segmentation fault.
#0  main () at will_segfault.c:7
7	will_segfault.c: No such file or directory.

Thread 1 (LWP 20879):
#0  main () at will_segfault.c:7
        i = <error reading variable i (Cannot access memory at address 0x0)>
From                To                  Syms Read   Shared Object Library
0x0000003ea361ef60  0x0000003ea375f7a0  Yes         /lib64/libc.so.6
0x0000003ea3200b20  0x0000003ea321a2e9  Yes         /lib64/ld-linux-x86-64.so.2
$1 = 0x0
No symbol "__glib_assert_msg" in current context.
rax            0xf	15
rbx            0x0	0
rcx            0x3ea36e4950	269029886288
rdx            0x3ea39b2ae0	269032827616
rsi            0x7f61109f6000	140054867435520
rdi            0xffffffff	4294967295
rbp            0x0	0x0
rsp            0x7fff14ffa120	0x7fff14ffa120
r8             0xffffffff	4294967295
r9             0x0	0
r10            0x22	34
r11            0x246	582
r12            0x40042c	4195372
r13            0x7fff14ffa200	140733545685504
r14            0x0	0
r15            0x0	0
rip            0x40041e	0x40041e <main+14>
eflags         0x10246	[ PF ZF IF RF ]
cs             0x33	51
ss             0x2b	43
ds             0x0	0
es             0x0	0
fs             0x0	0
gs             0x0	0
Dump of assembler code for function main:
   0x0000000000400410 <+0>:	sub    $0x8,%rsp
   0x0000000000400414 <+4>:	mov    $0x4005e0,%edi
   0x0000000000400419 <+9>:	callq  0x4003f0 <puts@plt>
=> 0x000000000040041e <+14>:	mov    0x0,%eax
   0x0000000000400425 <+21>:	add    $0x8,%rsp
   0x0000000000400429 <+25>:	retq   
End of assembler dump.

Comment 16 Jakub Filak 2013-01-24 10:51:03 UTC
Created attachment 686662 [details]
File: backtrace