https://bugs.kde.org/show_bug.cgi?id=373166

--- Comment #10 from Tushar <ntus...@yahoo.com> ---
Based on the crash information, I did disassemble the library in question
(/lib64/tls/libpthread-2.3.4.so) and looked at the instructions at the address
0x382BF0A2F0.  The instructions are

  382bf0a2d1:   e8 92 ab ff ff          callq  382bf04e68 <memcpy@plt>
  382bf0a2d6:   49 83 fc ff             cmp    $0xffffffffffffffff,%r12
  382bf0a2da:   74 23                   je     382bf0a2ff
<check_add_mapping+0x19f>
  382bf0a2dc:   48 8d 15 3d fe ff ff    lea    -0x1c3(%rip),%rdx        #
382bf0a120 <__sem_search>
  382bf0a2e3:   48 8d 35 66 a0 10 00    lea    0x10a066(%rip),%rsi        #
382c014350 <__sem_mappings>
  382bf0a2ea:   48 89 df                mov    %rbx,%rdi
  382bf0a2ed:   e8 46 ad ff ff          callq  382bf05038 <tsearch@plt>
  382bf0a2f2:   48 85 c0                test   %rax,%rax
  382bf0a2f5:   74 08                   je     382bf0a2ff
<check_add_mapping+0x19f>
  382bf0a2f7:   4d 89 e7                mov    %r12,%r15
  382bf0a2fa:   e9 74 ff ff ff          jmpq   382bf0a273
<check_add_mapping+0x113>
  382bf0a2ff:   48 89 df                mov    %rbx,%rdi
  382bf0a302:   e8 71 ad ff ff          callq  382bf05078 <free@plt>
  382bf0a307:   e9 67 ff ff ff          jmpq   382bf0a273
<check_add_mapping+0x113>
  382bf0a30c:   45 31 c9                xor    %r9d,%r9d
  382bf0a30f:   45 89 f0                mov    %r14d,%r8d

The thing that caught my attention is that data @ 0x382BF0A2F0 seems to be part
of  callq instruction @ 382bf0a2ed.  VEX seems to think it is the start of a
new instruction.

The disassembly of the test code (sem_open) itself at the are of interest is

  400aca:       ba f6 0d 40 00          mov    $0x400df6,%edx
  400acf:       be 20 00 00 00          mov    $0x20,%esi
  400ad4:       b8 00 00 00 00          mov    $0x0,%eax
  400ad9:       e8 e2 fd ff ff          callq  4008c0 <snprintf@plt>
  400ade:       48 8d 7d c0             lea    -0x40(%rbp),%rdi
  400ae2:       b9 01 00 00 00          mov    $0x1,%ecx
  400ae7:       ba 80 01 00 00          mov    $0x180,%edx
  400aec:       be c0 00 00 00          mov    $0xc0,%esi
  400af1:       b8 00 00 00 00          mov    $0x0,%eax
  400af6:       e8 25 fe ff ff          callq  400920 <sem_open@plt>
  400afb:       48 89 05 b6 07 20 00    mov    %rax,0x2007b6(%rip)        #
6012b8 <s_sem>
  400b02:       48 83 3d ae 07 20 00    cmpq   $0x0,0x2007ae(%rip)        #
6012b8 <s_sem>
  400b09:       00
  400b0a:       75 24                   jne    400b30 <main+0xfa>
  400b0c:       48 8d 55 c0             lea    -0x40(%rbp),%rdx
  400b10:       be 10 0e 40 00          mov    $0x400e10,%esi
  400b15:       48 8b 3d 7c 07 20 00    mov    0x20077c(%rip),%rdi        #
601298 <stderr@@GLIBC_2.2.5>
  400b1c:       b8 00 00 00 00          mov    $0x0,%eax
  400b21:       e8 ea fd ff ff          callq  400910 <fprintf@plt>



I hope this information helps

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to