Clint Adams wrote: > On Thu, Feb 19, 2009 at 01:57:08AM -0200, Gerardo Exequiel Pozzi wrote: > >> ==1901== Jump to the invalid address stated on the next line >> ==1901== at 0x0: ??? >> ==1901== by 0x402DA82: __xstat (in /usr/lib/libfakeroot/libfakeroot-0.so) >> ==1901== by 0x40913F3: (within /usr/lib/libGL.so.180.29) >> ==1901== Address 0x0 is not stack'd, malloc'd or (recently) free'd >> > > Hmm. > > objdump -T /usr/lib/libGL.so.180.29 ? > > More info from gdb, maybe useful...
(gdb) run Starting program: /home/djgera/hola Program received signal SIGSEGV, Segmentation fault. 0x00000000 in ?? () (gdb) bt #0 0x00000000 in ?? () #1 0xb7f37683 in tmp___xstat () from /usr/lib/libfakeroot/libfakeroot.so #2 0xb7f36a83 in __xstat () from /usr/lib/libfakeroot/libfakeroot.so #3 0xb7e9a3f4 in ?? () from /usr/lib/libGL.so.1 #4 0x00000003 in ?? () #5 0xb7ed71c1 in ?? () from /usr/lib/libGL.so.1 #6 0xb7f122a0 in ?? () from /usr/lib/libGL.so.1 #7 0xb7ee6080 in ?? () from /usr/lib/libGL.so.1 #8 0x00000001 in ?? () #9 0x00000000 in ?? () (gdb) info reg eax 0xb7f39630 -1208773072 ecx 0x0 0 edx 0xb7d11050 -1211035568 ebx 0xb7f39528 -1208773336 esp 0xbfe56dfc 0xbfe56dfc ebp 0xbfe56e18 0xbfe56e18 esi 0xb7f122a0 -1208933728 edi 0x0 0 eip 0x0 0 eflags 0x210282 [ SF IF RF ID ] cs 0x73 115 ss 0x7b 123 ds 0x7b 123 es 0x7b 123 fs 0x0 0 gs 0x33 51 (gdb) x 0xb7f39630 # *** this is the number in EAX *** 0xb7f39630 <next___xstat>: 0x00000000 (gdb) disas 0xb7f9c683 Dump of assembler code for function tmp___xstat: 0xb7f9c650 <tmp___xstat+0>: push %ebp 0xb7f9c651 <tmp___xstat+1>: mov %esp,%ebp 0xb7f9c653 <tmp___xstat+3>: push %ebx 0xb7f9c654 <tmp___xstat+4>: call 0xb7f99e67 <__i686.get_pc_thunk.bx> 0xb7f9c659 <tmp___xstat+9>: add $0x1ecf,%ebx 0xb7f9c65f <tmp___xstat+15>: sub $0x14,%esp 0xb7f9c662 <tmp___xstat+18>: call 0xb7f99c90 <load_library_symb...@plt> 0xb7f9c667 <tmp___xstat+23>: mov 0x10(%ebp),%eax 0xb7f9c66a <tmp___xstat+26>: mov %eax,0x8(%esp) 0xb7f9c66e <tmp___xstat+30>: mov 0xc(%ebp),%eax 0xb7f9c671 <tmp___xstat+33>: mov %eax,0x4(%esp) 0xb7f9c675 <tmp___xstat+37>: mov 0x8(%ebp),%eax 0xb7f9c678 <tmp___xstat+40>: mov %eax,(%esp) 0xb7f9c67b <tmp___xstat+43>: mov -0x90(%ebx),%eax 0xb7f9c681 <tmp___xstat+49>: call *(%eax) <<<< this is the JUMP to 0. 0xb7f9c683 <tmp___xstat+51>: add $0x14,%esp 0xb7f9c686 <tmp___xstat+54>: pop %ebx 0xb7f9c687 <tmp___xstat+55>: pop %ebp 0xb7f9c688 <tmp___xstat+56>: ret End of assembler dump. -- Gerardo Exequiel Pozzi ( djgera ) http://www.djgera.com.ar KeyID: 0x1B8C330D Key fingerprint = 0CAA D5D4 CD85 4434 A219 76ED 39AB 221B 1B8C 330D -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org