Comment # 2 on bug 1201107 from
gdb --args /usr/bin/i686-w64-mingw32-dump_syms bin/kdeinit4.exe
Reading symbols from /usr/bin/i686-w64-mingw32-dump_syms...
Reading symbols from
/usr/lib/debug/usr/i686-w64-mingw32/bin/dump_syms-20140827-lp153.12.2.x86_64.debug...
(gdb) r
Starting program: /usr/bin/i686-w64-mingw32-dump_syms bin/kdeinit4.exe
Missing separate debuginfos, use: zypper install
glibc-debuginfo-2.31-150300.20.7.x86_64

Program received signal SIGSEGV, Segmentation fault.
dwarf2reader::ByteReader::ReadUnsignedLEB128 (this=<optimized out>,
len=<synthetic pointer>, buffer=0x7ffffd2d9e02 <error: Cannot access memory at
address 0x7ffffd2d9e02>) at
/usr/src/debug/mingw32-cross-breakpad-tools-20140827-lp153.12.2.x86_64/src/common/dwarf/bytereader-inl.h:100
100         byte = *buffer++;
Missing separate debuginfos, use: zypper install
libgcc_s1-debuginfo-11.2.1+git610-150000.1.6.6.x86_64
libstdc++6-debuginfo-11.2.1+git610-150000.1.6.6.x86_64
(gdb) bt
#0  dwarf2reader::ByteReader::ReadUnsignedLEB128 (this=<optimized out>,
len=<synthetic pointer>, 
    buffer=0x7ffffd2d9e02 <error: Cannot access memory at address
0x7ffffd2d9e02>)
    at
/usr/src/debug/mingw32-cross-breakpad-tools-20140827-lp153.12.2.x86_64/src/common/dwarf/bytereader-inl.h:100
#1  dwarf2reader::CompilationUnit::ReadAbbrevs (this=this@entry=0x7fffffffd380)
    at
/usr/src/debug/mingw32-cross-breakpad-tools-20140827-lp153.12.2.x86_64/src/common/dwarf/dwarf2reader.cc:96
#2  0x0000555555582ccf in dwarf2reader::CompilationUnit::Start
(this=this@entry=0x7fffffffd380)
    at
/usr/src/debug/mingw32-cross-breakpad-tools-20140827-lp153.12.2.x86_64/src/common/dwarf/dwarf2reader.cc:285
#3  0x000055555556ca7f in (anonymous
namespace)::LoadDwarf<google_breakpad::PeCoffClass32> (module=0x5555557a4f70,
handle_inter_cu_refs=<optimized out>, big_endian=false, 
    header=0x7ffff7f15000 "MZ\220", dwarf_filename=...) at
/usr/src/debug/mingw32-cross-breakpad-tools-20140827-lp153.12.2.x86_64/src/common/pecoff/dump_symbols-inl.h:267
#4  (anonymous namespace)::LoadSymbols<google_breakpad::PeCoffClass32>
(obj_file=..., big_endian=<optimized out>, header=header@entry=0x7ffff7f15000
"MZ\220", 
    read_gnu_debug_link=<optimized out>, info=info@entry=0x7fffffffd680,
options=..., module=0x5555557a4f70)
    at
/usr/src/debug/mingw32-cross-breakpad-tools-20140827-lp153.12.2.x86_64/src/common/pecoff/dump_symbols-inl.h:538
#5  0x000055555556d18e in (anonymous
namespace)::ReadSymbolDataFromObjectFile<google_breakpad::PeCoffClass32>
(header=0x7ffff7f15000 "MZ\220", obj_filename=..., 
    debug_dirs=..., options=..., out_module=0x7fffffffd7d0)
    at
/usr/src/debug/mingw32-cross-breakpad-tools-20140827-lp153.12.2.x86_64/src/common/pecoff/dump_symbols-inl.h:676
#6  0x000055555556efe6 in google_breakpad::ReadSymbolData (obj_file=...,
debug_dirs=..., options=..., module=module@entry=0x7fffffffd7d0)
    at
/usr/src/debug/mingw32-cross-breakpad-tools-20140827-lp153.12.2.x86_64/src/common/pecoff/dump_symbols.cc:87
#7  0x000055555556f036 in google_breakpad::WriteSymbolFile (obj_file=...,
debug_dirs=..., options=..., sym_stream=...)
    at
/usr/src/debug/mingw32-cross-breakpad-tools-20140827-lp153.12.2.x86_64/src/common/pecoff/dump_symbols.cc:68
#8  0x000055555556a802 in main (argc=<optimized out>, argv=<optimized out>)
    at
/usr/src/debug/mingw32-cross-breakpad-tools-20140827-lp153.12.2.x86_64/src/tools/windows/dump_syms_dwarf/dump_syms.cc:82
(gdb)


You are receiving this mail because: