Guest User

gdb dump of vim segfault

a guest
Jan 18th, 2013
62
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.23 KB | None | 0 0
  1. Starting program:
  2. No executable file specified.
  3. Use the "file" or "exec-file" command.
  4. Starting program: vim
  5. No executable file specified.
  6. Use the "file" or "exec-file" command.
  7. Starting program: /usr/bin/vim
  8. warning: Could not load shared library symbols for linux-vdso.so.1.
  9. Do you need "set solib-search-path" or "set sysroot"?
  10. [Thread debugging using libthread_db enabled]
  11. Using host libthread_db library "/lib64/libthread_db.so.1".
  12.  
  13. Program received signal SIGSEGV, Segmentation fault.
  14. 0x00007ffff6a7b421 in __strlen_sse2_pminub () from /lib64/libc.so.6
  15. #0 0x00007ffff6a7b421 in __strlen_sse2_pminub () from /lib64/libc.so.6
  16. #1 0x00007ffff65d52bb in PyString_FromString () from /usr/lib64/libpython2.7.so.1.0
  17. #2 0x0000000000588232 in ?? ()
  18. #3 0x00007ffff6585a3e in PyObject_Call () from /usr/lib64/libpython2.7.so.1.0
  19. #4 0x00007ffff6628de9 in PyEval_EvalFrameEx () from /usr/lib64/libpython2.7.so.1.0
  20. #5 0x00007ffff662db48 in PyEval_EvalCodeEx () from /usr/lib64/libpython2.7.so.1.0
  21. #6 0x00007ffff65b0a27 in ?? () from /usr/lib64/libpython2.7.so.1.0
  22. #7 0x00007ffff6585a3e in PyObject_Call () from /usr/lib64/libpython2.7.so.1.0
  23. #8 0x00007ffff6628481 in PyEval_EvalFrameEx () from /usr/lib64/libpython2.7.so.1.0
  24. #9 0x00007ffff65a5c7b in ?? () from /usr/lib64/libpython2.7.so.1.0
  25. #10 0x00007ffff6627f4a in PyEval_EvalFrameEx () from /usr/lib64/libpython2.7.so.1.0
  26. #11 0x00007ffff662cfe9 in PyEval_EvalFrameEx () from /usr/lib64/libpython2.7.so.1.0
  27. #12 0x00007ffff662db48 in PyEval_EvalCodeEx () from /usr/lib64/libpython2.7.so.1.0
  28. #13 0x00007ffff662dc82 in PyEval_EvalCode () from /usr/lib64/libpython2.7.so.1.0
  29. #14 0x00007ffff664f11d in PyRun_StringFlags () from /usr/lib64/libpython2.7.so.1.0
  30. #15 0x0000000000588338 in ?? ()
  31. #16 0x0000000000588e09 in do_pyeval ()
  32. #17 0x000000000044d49b in ?? ()
  33. #18 0x000000000045cb89 in ?? ()
  34. #19 0x00000000004609a8 in ?? ()
  35. #20 0x000000000045f396 in ?? ()
  36. #21 0x000000000045f594 in ?? ()
  37. #22 0x000000000045f81e in ?? ()
  38. #23 0x0000000000460465 in ?? ()
  39. #24 0x00000000004605e5 in ?? ()
  40. #25 0x0000000000460a9c in ?? ()
  41. #26 0x0000000000466c9e in ex_return ()
  42. #27 0x00000000004847b6 in do_cmdline ()
  43. #28 0x000000000045bf8b in ?? ()
  44. #29 0x000000000045c99d in ?? ()
  45. #30 0x00000000004609a8 in ?? ()
  46. #31 0x000000000045f396 in ?? ()
  47. #32 0x000000000045f594 in ?? ()
  48. #33 0x000000000045f81e in ?? ()
  49. #34 0x0000000000460465 in ?? ()
  50. #35 0x00000000004605e5 in ?? ()
  51. #36 0x0000000000460a9c in ?? ()
  52. #37 0x0000000000460e77 in eval_to_string ()
  53. #38 0x00000000004612f7 in eval_to_string_safe ()
  54. #39 0x00000000004306ed in build_stl_str_hl ()
  55. #40 0x0000000000527834 in ?? ()
  56. #41 0x0000000000527d0a in ?? ()
  57. #42 0x000000000052c429 in win_redr_status ()
  58. #43 0x0000000000534436 in update_screen ()
  59. #44 0x000000000047bb9e in ?? ()
  60. #45 0x00000000004847b6 in do_cmdline ()
  61. #46 0x000000000045bf8b in ?? ()
  62. #47 0x000000000045c99d in ?? ()
  63. #48 0x00000000004609a8 in ?? ()
  64. #49 0x0000000000464487 in ex_call ()
  65. #50 0x00000000004847b6 in do_cmdline ()
  66. #51 0x0000000000499937 in ?? ()
  67. #52 0x0000000000499d61 in apply_autocmds_retval ()
  68. #53 0x0000000000433d73 in open_buffer ()
  69. #54 0x000000000042b5a2 in main ()
  70. A debugging session is active.
  71.  
  72. Inferior 1 [process 9962] will be killed.
  73.  
  74. Quit anyway? (y or n)
Add Comment
Please, Sign In to add comment