For the first backtrace:
(gdb) print *cur
Cannot access memory at address 0xfffffffc

(gdb) print *ctx
$1 = {debug = 0, debug_fixed = 0, ctrl_pipe = {8, 9}, usb_devs = {prev = 
0x9089010, next = 0x90899c0}, usb_devs_lock = {__data = {__lock = 0, __count = 
0, __owner = 0, __kind = 0, __nusers = 0, {__spins = 0, __list = {__next = 
0x0}}},
    __size = '\000' <repeats 23 times>, __align = 0}, open_devs = {prev = 
0x908916c, next = 0x908916c}, open_devs_lock = {__data = {__lock = 0, __count = 
0, __owner = 0, __kind = 0, __nusers = 0, {__spins = 0, __list = {__next = 
0x0}}},
    __size = '\000' <repeats 23 times>, __align = 0}, flying_transfers = {prev 
= 0xb660046c, next = 0xb660046c}, flying_transfers_lock = {__data = {__lock = 
1, __count = 0, __owner = 899, __kind = 0, __nusers = 1, {__spins = 0,
        __list = {__next = 0x0}}}, __size = 
"\001\000\000\000\000\000\000\000\203\003\000\000\000\000\000\000\001\000\000\000\000\000\000",
 __align = 1}, pollfds = {prev = 0x90899f8, next = 0x9088630}, pollfds_lock = 
{__data = {
      __lock = 0, __count = 0, __owner = 0, __kind = 0, __nusers = 0, {__spins 
= 0, __list = {__next = 0x0}}}, __size = '\000' <repeats 23 times>, __align = 
0}, pollfd_modify = 0, pollfd_modify_lock = {__data = {__lock = 0, __count = 0,
      __owner = 0, __kind = 0, __nusers = 0, {__spins = 0, __list = {__next = 
0x0}}}, __size = '\000' <repeats 23 times>, __align = 0}, fd_added_cb = 0, 
fd_removed_cb = 0, fd_cb_user_data = 0x0, events_lock = {__data = {__lock = 0,
      __count = 0, __owner = 0, __kind = 1, __nusers = 0, {__spins = 0, __list 
= {__next = 0x0}}}, __size = '\000' <repeats 12 times>, 
"\001\000\000\000\000\000\000\000\000\000\000", __align = 0}, 
event_handler_active = 0,
  event_waiters_lock = {__data = {__lock = 0, __count = 0, __owner = 0, __kind 
= 0, __nusers = 0, {__spins = 0, __list = {__next = 0x0}}}, __size = '\000' 
<repeats 23 times>, __align = 0}, event_waiters_cond = {__data = {__lock = 0,
      __futex = 0, __total_seq = 0, __wakeup_seq = 0, __woken_seq = 0, __mutex 
= 0x0, __nwaiters = 0, __broadcast_seq = 0}, __size = '\000' <repeats 47 
times>, __align = 0}, timerfd = 10}

(gdb) print ctx->flying_transfers
$2 = {prev = 0xb660046c, next = 0xb660046c}

For the second backtrace:
(gdb) print *cur
Cannot access memory at address 0xfffffffc

(gdb) print *ctx
$1 = {debug = 0, debug_fixed = 0, ctrl_pipe = {8, 9}, usb_devs = {prev = 
0x8b64010, next = 0x8b649c0}, usb_devs_lock = {__data = {__lock = 0, __count = 
0, __owner = 0, __kind = 0, __nusers = 0, {__spins = 0, __list = {__next = 
0x0}}},
    __size = '\000' <repeats 23 times>, __align = 0}, open_devs = {prev = 
0x8b6416c, next = 0x8b6416c}, open_devs_lock = {__data = {__lock = 0, __count = 
0, __owner = 0, __kind = 0, __nusers = 0, {__spins = 0, __list = {__next = 
0x0}}},
    __size = '\000' <repeats 23 times>, __align = 0}, flying_transfers = {prev 
= 0x8b64a0c, next = 0x8b64a0c}, flying_transfers_lock = {__data = {__lock = 1, 
__count = 0, __owner = 1913, __kind = 0, __nusers = 1, {__spins = 0, __list = {
          __next = 0x0}}}, __size = 
"\001\000\000\000\000\000\000\000y\a\000\000\000\000\000\000\001\000\000\000\000\000\000",
 __align = 1}, pollfds = {prev = 0x8b649f8, next = 0x8b63630}, pollfds_lock = 
{__data = {__lock = 0,
      __count = 0, __owner = 0, __kind = 0, __nusers = 0, {__spins = 0, __list 
= {__next = 0x0}}}, __size = '\000' <repeats 23 times>, __align = 0}, 
pollfd_modify = 0, pollfd_modify_lock = {__data = {__lock = 0, __count = 0,
      __owner = 0, __kind = 0, __nusers = 0, {__spins = 0, __list = {__next = 
0x0}}}, __size = '\000' <repeats 23 times>, __align = 0}, fd_added_cb = 0, 
fd_removed_cb = 0, fd_cb_user_data = 0x0, events_lock = {__data = {__lock = 0,
      __count = 0, __owner = 0, __kind = 1, __nusers = 0, {__spins = 0, __list 
= {__next = 0x0}}}, __size = '\000' <repeats 12 times>, 
"\001\000\000\000\000\000\000\000\000\000\000", __align = 0}, 
event_handler_active = 0,
  event_waiters_lock = {__data = {__lock = 0, __count = 0, __owner = 0, __kind 
= 0, __nusers = 0, {__spins = 0, __list = {__next = 0x0}}}, __size = '\000' 
<repeats 23 times>, __align = 0}, event_waiters_cond = {__data = {__lock = 0,
      __futex = 0, __total_seq = 0, __wakeup_seq = 0, __woken_seq = 0, __mutex 
= 0x0, __nwaiters = 0, __broadcast_seq = 0}, __size = '\000' <repeats 47 
times>, __align = 0}, timerfd = 10}

(gdb) print ctx->flying_transfers
$2 = {prev = 0x8b64a0c, next = 0x8b64a0c}

=========
Regards

Sebastian
=========

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
libusbx-devel mailing list
libusbx-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/libusbx-devel

Reply via email to