Bug 903582 - [abrt] will-crash-0.2-1.fc17: main: Process /usr/bin/will_segfault was killed by signal 11 (SIGSEGV)
Summary: [abrt] will-crash-0.2-1.fc17: main: Process /usr/bin/will_segfault was killed...
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Fedora
Classification: Fedora
Component: abrt
Version: 17
Hardware: x86_64
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: abrt
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: abrt_hash:350f14424bdf6726346c74fe532...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-01-24 10:43 UTC by Jakub Filak
Modified: 2016-12-01 00:43 UTC (History)
9 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2013-01-24 10:51:42 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)
File: backtrace (2.16 KB, text/plain)
2013-01-24 10:43 UTC, Jakub Filak
no flags Details
File: build_ids (164 bytes, text/plain)
2013-01-24 10:43 UTC, Jakub Filak
no flags Details
File: cgroup (172 bytes, text/plain)
2013-01-24 10:44 UTC, Jakub Filak
no flags Details
File: comments.xml (16.32 KB, text/plain)
2013-01-24 10:44 UTC, Jakub Filak
no flags Details
File: core_backtrace (428 bytes, text/plain)
2013-01-24 10:44 UTC, Jakub Filak
no flags Details
File: dso_list (312 bytes, text/plain)
2013-01-24 10:44 UTC, Jakub Filak
no flags Details
File: environ (5.23 KB, text/plain)
2013-01-24 10:44 UTC, Jakub Filak
no flags Details
File: limits (1.72 KB, text/plain)
2013-01-24 10:44 UTC, Jakub Filak
no flags Details
File: maps (1.82 KB, text/plain)
2013-01-24 10:44 UTC, Jakub Filak
no flags Details
File: open_fds (144 bytes, text/plain)
2013-01-24 10:44 UTC, Jakub Filak
no flags Details
File: proc_pid_status (1.22 KB, text/plain)
2013-01-24 10:44 UTC, Jakub Filak
no flags Details
File: response.xml (21.27 KB, text/plain)
2013-01-24 10:44 UTC, Jakub Filak
no flags Details
File: var_log_messages (10.78 KB, text/plain)
2013-01-24 10:44 UTC, Jakub Filak
no flags Details
File: backtrace (2.16 KB, text/plain)
2013-01-24 10:51 UTC, Jakub Filak
no flags Details

Description Jakub Filak 2013-01-24 10:43:52 UTC
Description of problem:
Testing new Bugzilla RPC methods names ...

Version-Release number of selected component:
will-crash-0.2-1.fc17

Additional info:
backtrace_rating: 3
cmdline:        will_segfault
crash_function: main
executable:     /usr/bin/will_segfault
kernel:         3.6.10-2.fc17.x86_64
uid:            18601

Truncated backtrace:
[New LWP 20879]
Core was generated by `will_segfault'.
Program terminated with signal 11, Segmentation fault.
#0  main () at will_segfault.c:7
7	will_segfault.c: No such file or directory.

Thread 1 (LWP 20879):
#0  main () at will_segfault.c:7
        i = <error reading variable i (Cannot access memory at address 0x0)>
From                To                  Syms Read   Shared Object Library
0x0000003ea361ef60  0x0000003ea375f7a0  Yes         /lib64/libc.so.6
0x0000003ea3200b20  0x0000003ea321a2e9  Yes         /lib64/ld-linux-x86-64.so.2
$1 = 0x0
No symbol "__glib_assert_msg" in current context.
rax            0xf	15
rbx            0x0	0
rcx            0x3ea36e4950	269029886288
rdx            0x3ea39b2ae0	269032827616
rsi            0x7f61109f6000	140054867435520
rdi            0xffffffff	4294967295
rbp            0x0	0x0
rsp            0x7fff14ffa120	0x7fff14ffa120
r8             0xffffffff	4294967295
r9             0x0	0
r10            0x22	34
r11            0x246	582
r12            0x40042c	4195372
r13            0x7fff14ffa200	140733545685504
r14            0x0	0
r15            0x0	0
rip            0x40041e	0x40041e <main+14>
eflags         0x10246	[ PF ZF IF RF ]
cs             0x33	51
ss             0x2b	43
ds             0x0	0
es             0x0	0
fs             0x0	0
gs             0x0	0
Dump of assembler code for function main:
   0x0000000000400410 <+0>:	sub    $0x8,%rsp
   0x0000000000400414 <+4>:	mov    $0x4005e0,%edi
   0x0000000000400419 <+9>:	callq  0x4003f0 <puts@plt>
=> 0x000000000040041e <+14>:	mov    0x0,%eax
   0x0000000000400425 <+21>:	add    $0x8,%rsp
   0x0000000000400429 <+25>:	retq   
End of assembler dump.

Comment 1 Jakub Filak 2013-01-24 10:43:55 UTC
Created attachment 686649 [details]
File: backtrace

Comment 2 Jakub Filak 2013-01-24 10:43:57 UTC
Created attachment 686650 [details]
File: build_ids

Comment 3 Jakub Filak 2013-01-24 10:44:00 UTC
Created attachment 686651 [details]
File: cgroup

Comment 4 Jakub Filak 2013-01-24 10:44:03 UTC
Created attachment 686652 [details]
File: comments.xml

Comment 5 Jakub Filak 2013-01-24 10:44:05 UTC
Created attachment 686653 [details]
File: core_backtrace

Comment 6 Jakub Filak 2013-01-24 10:44:07 UTC
Created attachment 686654 [details]
File: dso_list

Comment 7 Jakub Filak 2013-01-24 10:44:09 UTC
Created attachment 686655 [details]
File: environ

Comment 8 Jakub Filak 2013-01-24 10:44:11 UTC
Created attachment 686656 [details]
File: limits

Comment 9 Jakub Filak 2013-01-24 10:44:14 UTC
Created attachment 686657 [details]
File: maps

Comment 10 Jakub Filak 2013-01-24 10:44:16 UTC
Created attachment 686658 [details]
File: open_fds

Comment 11 Jakub Filak 2013-01-24 10:44:18 UTC
Created attachment 686659 [details]
File: proc_pid_status

Comment 12 Jakub Filak 2013-01-24 10:44:21 UTC
Created attachment 686660 [details]
File: response.xml

Comment 13 Jakub Filak 2013-01-24 10:44:24 UTC
Created attachment 686661 [details]
File: var_log_messages

Comment 14 Jakub Filak 2013-01-24 10:47:30 UTC
Description of problem:
Testing new Bugzilla RPC methods names ... additional comment

Version-Release number of selected component:
will-crash-0.2-1.fc17

Additional info:
backtrace_rating: 3
cmdline:        will_segfault
crash_function: main
executable:     /usr/bin/will_segfault
kernel:         3.6.10-2.fc17.x86_64
uid:            18601

Truncated backtrace:
[New LWP 20879]
Core was generated by `will_segfault'.
Program terminated with signal 11, Segmentation fault.
#0  main () at will_segfault.c:7
7	will_segfault.c: No such file or directory.

Thread 1 (LWP 20879):
#0  main () at will_segfault.c:7
        i = <error reading variable i (Cannot access memory at address 0x0)>
From                To                  Syms Read   Shared Object Library
0x0000003ea361ef60  0x0000003ea375f7a0  Yes         /lib64/libc.so.6
0x0000003ea3200b20  0x0000003ea321a2e9  Yes         /lib64/ld-linux-x86-64.so.2
$1 = 0x0
No symbol "__glib_assert_msg" in current context.
rax            0xf	15
rbx            0x0	0
rcx            0x3ea36e4950	269029886288
rdx            0x3ea39b2ae0	269032827616
rsi            0x7f61109f6000	140054867435520
rdi            0xffffffff	4294967295
rbp            0x0	0x0
rsp            0x7fff14ffa120	0x7fff14ffa120
r8             0xffffffff	4294967295
r9             0x0	0
r10            0x22	34
r11            0x246	582
r12            0x40042c	4195372
r13            0x7fff14ffa200	140733545685504
r14            0x0	0
r15            0x0	0
rip            0x40041e	0x40041e <main+14>
eflags         0x10246	[ PF ZF IF RF ]
cs             0x33	51
ss             0x2b	43
ds             0x0	0
es             0x0	0
fs             0x0	0
gs             0x0	0
Dump of assembler code for function main:
   0x0000000000400410 <+0>:	sub    $0x8,%rsp
   0x0000000000400414 <+4>:	mov    $0x4005e0,%edi
   0x0000000000400419 <+9>:	callq  0x4003f0 <puts@plt>
=> 0x000000000040041e <+14>:	mov    0x0,%eax
   0x0000000000400425 <+21>:	add    $0x8,%rsp
   0x0000000000400429 <+25>:	retq   
End of assembler dump.

Comment 15 Jakub Filak 2013-01-24 10:51:00 UTC
Description of problem:
Testing new Bugzilla RPC methods names ... the best backtrace

Version-Release number of selected component:
will-crash-0.2-1.fc17

Additional info:
backtrace_rating: 6
cmdline:        will_segfault
crash_function: main
executable:     /usr/bin/will_segfault
kernel:         3.6.10-2.fc17.x86_64
uid:            18601

Truncated backtrace:
[New LWP 20879]
Core was generated by `will_segfault'.
Program terminated with signal 11, Segmentation fault.
#0  main () at will_segfault.c:7
7	will_segfault.c: No such file or directory.

Thread 1 (LWP 20879):
#0  main () at will_segfault.c:7
        i = <error reading variable i (Cannot access memory at address 0x0)>
From                To                  Syms Read   Shared Object Library
0x0000003ea361ef60  0x0000003ea375f7a0  Yes         /lib64/libc.so.6
0x0000003ea3200b20  0x0000003ea321a2e9  Yes         /lib64/ld-linux-x86-64.so.2
$1 = 0x0
No symbol "__glib_assert_msg" in current context.
rax            0xf	15
rbx            0x0	0
rcx            0x3ea36e4950	269029886288
rdx            0x3ea39b2ae0	269032827616
rsi            0x7f61109f6000	140054867435520
rdi            0xffffffff	4294967295
rbp            0x0	0x0
rsp            0x7fff14ffa120	0x7fff14ffa120
r8             0xffffffff	4294967295
r9             0x0	0
r10            0x22	34
r11            0x246	582
r12            0x40042c	4195372
r13            0x7fff14ffa200	140733545685504
r14            0x0	0
r15            0x0	0
rip            0x40041e	0x40041e <main+14>
eflags         0x10246	[ PF ZF IF RF ]
cs             0x33	51
ss             0x2b	43
ds             0x0	0
es             0x0	0
fs             0x0	0
gs             0x0	0
Dump of assembler code for function main:
   0x0000000000400410 <+0>:	sub    $0x8,%rsp
   0x0000000000400414 <+4>:	mov    $0x4005e0,%edi
   0x0000000000400419 <+9>:	callq  0x4003f0 <puts@plt>
=> 0x000000000040041e <+14>:	mov    0x0,%eax
   0x0000000000400425 <+21>:	add    $0x8,%rsp
   0x0000000000400429 <+25>:	retq   
End of assembler dump.

Comment 16 Jakub Filak 2013-01-24 10:51:03 UTC
Created attachment 686662 [details]
File: backtrace


Note You need to log in before you can comment on or make changes to this bug.