From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 21823 invoked by alias); 29 Jul 2009 05:38:29 -0000 Received: (qmail 21810 invoked by uid 48); 29 Jul 2009 05:38:29 -0000 Date: Wed, 29 Jul 2009 05:38:00 -0000 From: "zecke at selfish dot org" To: gdb-prs@sourceware.org Message-ID: <20090729053825.10457.zecke@selfish.org> Reply-To: sourceware-bugzilla@sourceware.org Subject: [Bug symtab/10457] New: gdb Segfaults due stack overflow (excessive usage of alloca) X-Bugzilla-Reason: CC Mailing-List: contact gdb-prs-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-prs-owner@sourceware.org X-SW-Source: 2009-q3/txt/msg00026.txt.bz2 Debugging a process that loaded a debug enabled libWebKitQt will lead to a segfault in gdb. This is due a stack overflow. valgrind reports the event the following way and a backtrace from a core file is also in this description. valgrind: ==11373== Process terminating with default action of signal 11 (SIGSEGV) ==11373== Access not within mapped region at address 0xBE26EFDC ==11373== at 0x827D2C2: cplus_demangle_type (in /usr/bin/gdb) ==11373== If you believe this happened as a result of a stack overflow in your ==11373== program's main thread (unlikely but possible), you can try to increase ==11373== the size of the main thread stack using the --main-stacksize= flag. ==11373== The main thread stack size used in this run was 8388608. ==11373== Stack overflow in thread 1: can't grow stack to 0xbe26efd8 gdb on the core: Core was generated by `gdb --args ./bin/QtLauncher http://index.hu'. Program terminated with signal 11, Segmentation fault. #0 0x0827e538 in ?? () (gdb) bt #0 0x0827e538 in ?? () #1 0x0827d2c7 in cplus_demangle_type () #2 0x0827d39e in cplus_demangle_type () #3 0x0827df55 in ?? () #4 0x0827e6b5 in ?? () #5 0x0827e76c in ?? () #6 0x08280b2b in ?? () #7 0x08280c95 in ?? () #8 0x08280d04 in cplus_demangle_v3 () #9 0x08279e03 in cplus_demangle () #10 0x08139fc4 in symbol_set_names () #11 0x0808dc80 in prim_record_minimal_symbol_and_info () #12 0x080fce83 in ?? () #13 0x080fd0ce in ?? () #14 0x080fda39 in ?? () #15 0x0813dcf0 in syms_from_objfile () #16 0x0813f383 in ?? () #17 0x080a879e in solib_read_symbols () #18 0x080a8dcc in solib_add () #19 0x08152341 in handle_inferior_event () #20 0x08154760 in wait_for_inferior () #21 0x08154b2c in proceed () #22 0x0814c157 in ?? () #23 0x08090ea2 in execute_command () #24 0x08161a9b in ?? () #25 0x081627ea in ?? () #26 0xb7ec1277 in rl_callback_read_char () from /lib/libreadline.so.5 #27 0x08161bdb in ?? () #28 0x081610b9 in ?? () #29 0x081608db in ?? () #30 0x08161796 in gdb_do_one_event () #31 0x0815baa3 in catch_errors () #32 0x080ee2d4 in ?? () #33 0x0815c173 in current_interp_command_loop () #34 0x0808890b in ?? () #35 0x0815baa3 in catch_errors () #36 0x080894a4 in ?? () #37 0x0815baa3 in catch_errors () #38 0x08088832 in gdb_main () #39 0x080887f3 in main () (gdb) -- Summary: gdb Segfaults due stack overflow (excessive usage of alloca) Product: gdb Version: unknown Status: UNCONFIRMED Severity: normal Priority: P2 Component: symtab AssignedTo: unassigned at sourceware dot org ReportedBy: zecke at selfish dot org CC: gdb-prs at sourceware dot org http://sourceware.org/bugzilla/show_bug.cgi?id=10457 ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.