Description of problem: Testing new Bugzilla RPC methods names ... Version-Release number of selected component: will-crash-0.2-1.fc17 Additional info: backtrace_rating: 3 cmdline: will_segfault crash_function: main executable: /usr/bin/will_segfault kernel: 3.6.10-2.fc17.x86_64 uid: 18601 Truncated backtrace: [New LWP 20879] Core was generated by `will_segfault'. Program terminated with signal 11, Segmentation fault. #0 main () at will_segfault.c:7 7 will_segfault.c: No such file or directory. Thread 1 (LWP 20879): #0 main () at will_segfault.c:7 i = <error reading variable i (Cannot access memory at address 0x0)> From To Syms Read Shared Object Library 0x0000003ea361ef60 0x0000003ea375f7a0 Yes /lib64/libc.so.6 0x0000003ea3200b20 0x0000003ea321a2e9 Yes /lib64/ld-linux-x86-64.so.2 $1 = 0x0 No symbol "__glib_assert_msg" in current context. rax 0xf 15 rbx 0x0 0 rcx 0x3ea36e4950 269029886288 rdx 0x3ea39b2ae0 269032827616 rsi 0x7f61109f6000 140054867435520 rdi 0xffffffff 4294967295 rbp 0x0 0x0 rsp 0x7fff14ffa120 0x7fff14ffa120 r8 0xffffffff 4294967295 r9 0x0 0 r10 0x22 34 r11 0x246 582 r12 0x40042c 4195372 r13 0x7fff14ffa200 140733545685504 r14 0x0 0 r15 0x0 0 rip 0x40041e 0x40041e <main+14> eflags 0x10246 [ PF ZF IF RF ] cs 0x33 51 ss 0x2b 43 ds 0x0 0 es 0x0 0 fs 0x0 0 gs 0x0 0 Dump of assembler code for function main: 0x0000000000400410 <+0>: sub $0x8,%rsp 0x0000000000400414 <+4>: mov $0x4005e0,%edi 0x0000000000400419 <+9>: callq 0x4003f0 <puts@plt> => 0x000000000040041e <+14>: mov 0x0,%eax 0x0000000000400425 <+21>: add $0x8,%rsp 0x0000000000400429 <+25>: retq End of assembler dump.
Created attachment 686649 [details] File: backtrace
Created attachment 686650 [details] File: build_ids
Created attachment 686651 [details] File: cgroup
Created attachment 686652 [details] File: comments.xml
Created attachment 686653 [details] File: core_backtrace
Created attachment 686654 [details] File: dso_list
Created attachment 686655 [details] File: environ
Created attachment 686656 [details] File: limits
Created attachment 686657 [details] File: maps
Created attachment 686658 [details] File: open_fds
Created attachment 686659 [details] File: proc_pid_status
Created attachment 686660 [details] File: response.xml
Created attachment 686661 [details] File: var_log_messages
Description of problem: Testing new Bugzilla RPC methods names ... additional comment Version-Release number of selected component: will-crash-0.2-1.fc17 Additional info: backtrace_rating: 3 cmdline: will_segfault crash_function: main executable: /usr/bin/will_segfault kernel: 3.6.10-2.fc17.x86_64 uid: 18601 Truncated backtrace: [New LWP 20879] Core was generated by `will_segfault'. Program terminated with signal 11, Segmentation fault. #0 main () at will_segfault.c:7 7 will_segfault.c: No such file or directory. Thread 1 (LWP 20879): #0 main () at will_segfault.c:7 i = <error reading variable i (Cannot access memory at address 0x0)> From To Syms Read Shared Object Library 0x0000003ea361ef60 0x0000003ea375f7a0 Yes /lib64/libc.so.6 0x0000003ea3200b20 0x0000003ea321a2e9 Yes /lib64/ld-linux-x86-64.so.2 $1 = 0x0 No symbol "__glib_assert_msg" in current context. rax 0xf 15 rbx 0x0 0 rcx 0x3ea36e4950 269029886288 rdx 0x3ea39b2ae0 269032827616 rsi 0x7f61109f6000 140054867435520 rdi 0xffffffff 4294967295 rbp 0x0 0x0 rsp 0x7fff14ffa120 0x7fff14ffa120 r8 0xffffffff 4294967295 r9 0x0 0 r10 0x22 34 r11 0x246 582 r12 0x40042c 4195372 r13 0x7fff14ffa200 140733545685504 r14 0x0 0 r15 0x0 0 rip 0x40041e 0x40041e <main+14> eflags 0x10246 [ PF ZF IF RF ] cs 0x33 51 ss 0x2b 43 ds 0x0 0 es 0x0 0 fs 0x0 0 gs 0x0 0 Dump of assembler code for function main: 0x0000000000400410 <+0>: sub $0x8,%rsp 0x0000000000400414 <+4>: mov $0x4005e0,%edi 0x0000000000400419 <+9>: callq 0x4003f0 <puts@plt> => 0x000000000040041e <+14>: mov 0x0,%eax 0x0000000000400425 <+21>: add $0x8,%rsp 0x0000000000400429 <+25>: retq End of assembler dump.
Description of problem: Testing new Bugzilla RPC methods names ... the best backtrace Version-Release number of selected component: will-crash-0.2-1.fc17 Additional info: backtrace_rating: 6 cmdline: will_segfault crash_function: main executable: /usr/bin/will_segfault kernel: 3.6.10-2.fc17.x86_64 uid: 18601 Truncated backtrace: [New LWP 20879] Core was generated by `will_segfault'. Program terminated with signal 11, Segmentation fault. #0 main () at will_segfault.c:7 7 will_segfault.c: No such file or directory. Thread 1 (LWP 20879): #0 main () at will_segfault.c:7 i = <error reading variable i (Cannot access memory at address 0x0)> From To Syms Read Shared Object Library 0x0000003ea361ef60 0x0000003ea375f7a0 Yes /lib64/libc.so.6 0x0000003ea3200b20 0x0000003ea321a2e9 Yes /lib64/ld-linux-x86-64.so.2 $1 = 0x0 No symbol "__glib_assert_msg" in current context. rax 0xf 15 rbx 0x0 0 rcx 0x3ea36e4950 269029886288 rdx 0x3ea39b2ae0 269032827616 rsi 0x7f61109f6000 140054867435520 rdi 0xffffffff 4294967295 rbp 0x0 0x0 rsp 0x7fff14ffa120 0x7fff14ffa120 r8 0xffffffff 4294967295 r9 0x0 0 r10 0x22 34 r11 0x246 582 r12 0x40042c 4195372 r13 0x7fff14ffa200 140733545685504 r14 0x0 0 r15 0x0 0 rip 0x40041e 0x40041e <main+14> eflags 0x10246 [ PF ZF IF RF ] cs 0x33 51 ss 0x2b 43 ds 0x0 0 es 0x0 0 fs 0x0 0 gs 0x0 0 Dump of assembler code for function main: 0x0000000000400410 <+0>: sub $0x8,%rsp 0x0000000000400414 <+4>: mov $0x4005e0,%edi 0x0000000000400419 <+9>: callq 0x4003f0 <puts@plt> => 0x000000000040041e <+14>: mov 0x0,%eax 0x0000000000400425 <+21>: add $0x8,%rsp 0x0000000000400429 <+25>: retq End of assembler dump.
Created attachment 686662 [details] File: backtrace