This is the mail archive of the gdb-prs@sourceware.org mailing list for the GDB project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug symtab/10457] New: gdb Segfaults due stack overflow (excessive usage of alloca)


Debugging a process that loaded a debug enabled libWebKitQt will lead to a segfault in gdb. This 
is due a stack overflow. valgrind reports the event the following way and a backtrace from a core 
file is also in this description.

valgrind:
==11373== Process terminating with default action of signal 11 (SIGSEGV)
==11373==  Access not within mapped region at address 0xBE26EFDC
==11373==    at 0x827D2C2: cplus_demangle_type (in /usr/bin/gdb)
==11373==  If you believe this happened as a result of a stack overflow in your
==11373==  program's main thread (unlikely but possible), you can try to increase
==11373==  the size of the main thread stack using the --main-stacksize= flag.
==11373==  The main thread stack size used in this run was 8388608.
==11373== Stack overflow in thread 1: can't grow stack to 0xbe26efd8


gdb on the core:
Core was generated by `gdb --args ./bin/QtLauncher http://index.hu'.
Program terminated with signal 11, Segmentation fault.
#0  0x0827e538 in ?? ()
(gdb) bt
#0  0x0827e538 in ?? ()
#1  0x0827d2c7 in cplus_demangle_type ()
#2  0x0827d39e in cplus_demangle_type ()
#3  0x0827df55 in ?? ()
#4  0x0827e6b5 in ?? ()
#5  0x0827e76c in ?? ()
#6  0x08280b2b in ?? ()
#7  0x08280c95 in ?? ()
#8  0x08280d04 in cplus_demangle_v3 ()
#9  0x08279e03 in cplus_demangle ()
#10 0x08139fc4 in symbol_set_names ()
#11 0x0808dc80 in prim_record_minimal_symbol_and_info ()
#12 0x080fce83 in ?? ()
#13 0x080fd0ce in ?? ()
#14 0x080fda39 in ?? ()
#15 0x0813dcf0 in syms_from_objfile ()
#16 0x0813f383 in ?? ()
#17 0x080a879e in solib_read_symbols ()
#18 0x080a8dcc in solib_add ()
#19 0x08152341 in handle_inferior_event ()
#20 0x08154760 in wait_for_inferior ()
#21 0x08154b2c in proceed ()
#22 0x0814c157 in ?? ()
#23 0x08090ea2 in execute_command ()
#24 0x08161a9b in ?? ()
#25 0x081627ea in ?? ()
#26 0xb7ec1277 in rl_callback_read_char () from /lib/libreadline.so.5
#27 0x08161bdb in ?? ()
#28 0x081610b9 in ?? ()
#29 0x081608db in ?? ()
#30 0x08161796 in gdb_do_one_event ()
#31 0x0815baa3 in catch_errors ()
#32 0x080ee2d4 in ?? ()
#33 0x0815c173 in current_interp_command_loop ()
#34 0x0808890b in ?? ()
#35 0x0815baa3 in catch_errors ()
#36 0x080894a4 in ?? ()
#37 0x0815baa3 in catch_errors ()
#38 0x08088832 in gdb_main ()
#39 0x080887f3 in main ()
(gdb)

-- 
           Summary: gdb Segfaults due stack overflow (excessive usage of
                    alloca)
           Product: gdb
           Version: unknown
            Status: UNCONFIRMED
          Severity: normal
          Priority: P2
         Component: symtab
        AssignedTo: unassigned at sourceware dot org
        ReportedBy: zecke at selfish dot org
                CC: gdb-prs at sourceware dot org


http://sourceware.org/bugzilla/show_bug.cgi?id=10457

------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]