https://bugs.kde.org/show_bug.cgi?id=362062

--- Comment #8 from Akshay <ajos...@mail.csuchico.edu> ---
GNU gdb (Ubuntu 7.10-1ubuntu2) 7.10
Copyright (C) 2015 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word".
(gdb) handle SIG [K3 pass non[Kstop st[K[Knoprint
Unrecognized or ambiguous flag word: "SIG3".
(gdb) handle SIG3 pass nostop noprint[C[1@3
Signal        Stop    Print    Pass to program    Description
SIG33         No    No    Yes        Real-time event 33
(gdb) set pagination 0
(gdb) attach 2331
Attaching to process 2331
Reading symbols from /usr/lib/valgrind/memcheck-amd64-linux...(no debugging
symbols found)...done.
Failed to read a valid object file image from memory.
0x0000000038135ecc in ?? ()
(gdb) conitnue
Undefined command: "conitnue".  Try "help".
(gdb) conitnue[K[K[K[K[Ktinue 
Continuing.

Program received signal SIGSEGV, Segmentation fault.
0x0000000808e12cac in ?? ()
(gdb) btu[Kfull full
#0  0x0000000808e12cac in ?? ()
No symbol table info available.
#1  0x0000000802ca9f30 in ?? ()
No symbol table info available.
#2  0x0000000802008330 in ?? ()
No symbol table info available.
#3  0x000000000e874100 in ?? ()
No symbol table info available.
#4  0x0000000802008330 in ?? ()
No symbol table info available.
#5  0x0000000000001c00 in ?? ()
No symbol table info available.
#6  0x0000000000746a6d in ?? ()
No symbol table info available.
#7  0x0000000807779000 in ?? ()
No symbol table info available.
#8  0x0000000000004343 in ?? ()
No symbol table info available.
#9  0x0000000000000000 in ?? ()
No symbol table info available.
(gdb) ifn[K[Knfo registers
rax            0x802ba0bfe    34405485566
rbx            0x0    0
rcx            0xffffaaaa    4294945450
rdx            0x802ba0000    34405482496
rsi            0x0    0
rdi            0xffeff2ff8    68702646264
rbp            0x802008340    0x802008340
rsp            0x802ca9e00    0x802ca9e00
r8             0x90c    2316
r9             0x0    0
r10            0x0    0
r11            0x380598c0    939890880
r12            0x0    0
r13            0xffeff2ff8    68702646264
r14            0x0    0
r15            0xffeff3490    68702647440
rip            0x808e12cac    0x808e12cac
eflags         0x10246    [ PF ZF IF RF ]
cs             0x33    51
ss             0x2b    43
ds             0x0    0
es             0x0    0
fs             0x0    0
gs             0x0    0
(gdb) x /16i $pc
=> 0x808e12cac:    movq   $0xe873ab6,0x0(%r13)
   0x808e12cb4:    mov    %r13,%r12
   0x808e12cb7:    sub    $0x80,%r12
   0x808e12cbe:    mov    %r12,%rdi
   0x808e12cc1:    mov    $0x80,%esi
   0x808e12cc6:    mov    $0x0,%edx
   0x808e12ccb:    mov    $0x38060d10,%r11
   0x808e12cd2:    callq  *%r11
   0x808e12cd5:    movq   $0xe873520,0xb8(%rbp)
   0x808e12ce0:    sub    $0x8,%r13
   0x808e12ce4:    movq   $0x0,0x3d0(%rbp)
   0x808e12cef:    mov    %r13,%rdi
   0x808e12cf2:    mov    $0x38057e30,%r11
   0x808e12cf9:    callq  *%r11
   0x808e12cfc:    mov    %r13,0x30(%rbp)
   0x808e12d00:    mov    %r13,%rdi
(gdb) thread apply all backtrace

Thread 1 (LWP 2331):
#0  0x0000000808e12cac in ?? ()
#1  0x0000000802ca9f30 in ?? ()
#2  0x0000000802008330 in ?? ()
#3  0x000000000e874100 in ?? ()
#4  0x0000000802008330 in ?? ()
#5  0x0000000000001c00 in ?? ()
#6  0x0000000000746a6d in ?? ()
#7  0x0000000807779000 in ?? ()
#8  0x0000000000004343 in ?? ()
#9  0x0000000000000000 in ?? ()
(gdb) quit
A debugging session is active.

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to