https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=267028

--- Comment #221 from Mark Millard <marklmi26-f...@yahoo.com> ---
(In reply to George Mitchell from comment #220)

+0x274 == +628 (at 0xffffffff80bc0ab4)

1488                    if (strcmp(mod->name, name) == 0 &&
  0xffffffff80bc0aa8 <+616>:   mov    0x18(%rbx),%rdi
  0xffffffff80bc0aac <+620>:   mov    %r12,%rsi
  0xffffffff80bc0aaf <+623>:   call   0xffffffff80cf0100 <strcmp>
  0xffffffff80bc0ab4 <+628>:   test   %eax,%eax
  0xffffffff80bc0ab6 <+630>:   jne    0xffffffff80bc0aa0
<linker_load_dependencies+608>

I expect that kgdb would expose strcmp in the backtrace, as
it does a better job generally. (The original Fatal Trap
notice reported the address in strcmp as well.)

This suggests problems for the value in mp->md_cval (via modname)
as of the strcmp call (based on where the Fatal Trap was reported
to be at in strcmp).

Note the mod->name argument to strcmp .

Note that if mod-> could not be dereferenced, the failure would be
before strcmp was called. Thus it looks to be the ->name value
that strcmp ends up using that lead to the failure.

Same sort of thing as for comment #82 (but a separate in-line).

in strcmp it showed:

   0xffffffff80cf0110 <+16>:    movzbl (%rdi,%rcx,1),%eax

So if you ever get a chance to have it report the %rdi value
on an actual failure, the value may prove interesting.

Of course, none of this gets far enough to suggest why the
value of mod->name would be messed up.

-- 
You are receiving this mail because:
You are the assignee for the bug.

Reply via email to