gdb --args /usr/bin/i686-w64-mingw32-dump_syms bin/kdeinit4.exe Reading symbols from /usr/bin/i686-w64-mingw32-dump_syms... Reading symbols from /usr/lib/debug/usr/i686-w64-mingw32/bin/dump_syms-20140827-lp153.12.2.x86_64.debug... (gdb) r Starting program: /usr/bin/i686-w64-mingw32-dump_syms bin/kdeinit4.exe Missing separate debuginfos, use: zypper install glibc-debuginfo-2.31-150300.20.7.x86_64 Program received signal SIGSEGV, Segmentation fault. dwarf2reader::ByteReader::ReadUnsignedLEB128 (this=<optimized out>, len=<synthetic pointer>, buffer=0x7ffffd2d9e02 <error: Cannot access memory at address 0x7ffffd2d9e02>) at /usr/src/debug/mingw32-cross-breakpad-tools-20140827-lp153.12.2.x86_64/src/common/dwarf/bytereader-inl.h:100 100 byte = *buffer++; Missing separate debuginfos, use: zypper install libgcc_s1-debuginfo-11.2.1+git610-150000.1.6.6.x86_64 libstdc++6-debuginfo-11.2.1+git610-150000.1.6.6.x86_64 (gdb) bt #0 dwarf2reader::ByteReader::ReadUnsignedLEB128 (this=<optimized out>, len=<synthetic pointer>, buffer=0x7ffffd2d9e02 <error: Cannot access memory at address 0x7ffffd2d9e02>) at /usr/src/debug/mingw32-cross-breakpad-tools-20140827-lp153.12.2.x86_64/src/common/dwarf/bytereader-inl.h:100 #1 dwarf2reader::CompilationUnit::ReadAbbrevs (this=this@entry=0x7fffffffd380) at /usr/src/debug/mingw32-cross-breakpad-tools-20140827-lp153.12.2.x86_64/src/common/dwarf/dwarf2reader.cc:96 #2 0x0000555555582ccf in dwarf2reader::CompilationUnit::Start (this=this@entry=0x7fffffffd380) at /usr/src/debug/mingw32-cross-breakpad-tools-20140827-lp153.12.2.x86_64/src/common/dwarf/dwarf2reader.cc:285 #3 0x000055555556ca7f in (anonymous namespace)::LoadDwarf<google_breakpad::PeCoffClass32> (module=0x5555557a4f70, handle_inter_cu_refs=<optimized out>, big_endian=false, header=0x7ffff7f15000 "MZ\220", dwarf_filename=...) at /usr/src/debug/mingw32-cross-breakpad-tools-20140827-lp153.12.2.x86_64/src/common/pecoff/dump_symbols-inl.h:267 #4 (anonymous namespace)::LoadSymbols<google_breakpad::PeCoffClass32> (obj_file=..., big_endian=<optimized out>, header=header@entry=0x7ffff7f15000 "MZ\220", read_gnu_debug_link=<optimized out>, info=info@entry=0x7fffffffd680, options=..., module=0x5555557a4f70) at /usr/src/debug/mingw32-cross-breakpad-tools-20140827-lp153.12.2.x86_64/src/common/pecoff/dump_symbols-inl.h:538 #5 0x000055555556d18e in (anonymous namespace)::ReadSymbolDataFromObjectFile<google_breakpad::PeCoffClass32> (header=0x7ffff7f15000 "MZ\220", obj_filename=..., debug_dirs=..., options=..., out_module=0x7fffffffd7d0) at /usr/src/debug/mingw32-cross-breakpad-tools-20140827-lp153.12.2.x86_64/src/common/pecoff/dump_symbols-inl.h:676 #6 0x000055555556efe6 in google_breakpad::ReadSymbolData (obj_file=..., debug_dirs=..., options=..., module=module@entry=0x7fffffffd7d0) at /usr/src/debug/mingw32-cross-breakpad-tools-20140827-lp153.12.2.x86_64/src/common/pecoff/dump_symbols.cc:87 #7 0x000055555556f036 in google_breakpad::WriteSymbolFile (obj_file=..., debug_dirs=..., options=..., sym_stream=...) at /usr/src/debug/mingw32-cross-breakpad-tools-20140827-lp153.12.2.x86_64/src/common/pecoff/dump_symbols.cc:68 #8 0x000055555556a802 in main (argc=<optimized out>, argv=<optimized out>) at /usr/src/debug/mingw32-cross-breakpad-tools-20140827-lp153.12.2.x86_64/src/tools/windows/dump_syms_dwarf/dump_syms.cc:82 (gdb)