Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Attachment 494025 Details for
Bug 698847
[abrt] bash-4.1.7-3.fc14: hash_search: Process /bin/bash was killed by signal 11 (SIGSEGV)
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh92 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 7.85 KB, created by
Robert Hinson
on 2011-04-22 00:36:15 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Robert Hinson
Created:
2011-04-22 00:36:15 UTC
Size:
7.85 KB
patch
obsolete
>[New Thread 10686] >Core was generated by `-bash'. >Program terminated with signal 11, Segmentation fault. >#0 hash_search (string=0x95319e8 "sudo", table=0x9531788, flags=0) at hashlib.c:182 >182 hashlib.c: No such file or directory. > in hashlib.c > >Thread 1 (Thread 10686): >#0 hash_search (string=0x95319e8 "sudo", table=0x9531788, flags=0) at hashlib.c:182 > list = 0x1010101 > bucket = 31 > hv = 1891611551 >#1 0x080926ed in phash_search (filename=0x95319e8 "sudo") at hashcmd.c:138 > item = <value optimized out> > path = <value optimized out> > dotted_filename = <value optimized out> > tail = <value optimized out> > same = <value optimized out> >#2 0x080a62a0 in search_for_command (pathname=0x95319e8 "sudo") at findcmd.c:312 > hashed_file = 0x0 > command = 0x0 > temp_path = 31 > st = <value optimized out> > path = 0x952d3a8 >#3 0x08072a80 in execute_disk_command (simple_command=<value optimized out>, pipe_in=-1, pipe_out=-1, async=0, fds_to_close=0x9555e90) at execute_cmd.c:4508 > pathname = 0x95319e8 "sudo" > command = 0x0 > pid = <value optimized out> > hookf = <value optimized out> > args = <value optimized out> > nofork = 0 > wl = <value optimized out> >#4 execute_simple_command (simple_command=<value optimized out>, pipe_in=-1, pipe_out=-1, async=0, fds_to_close=0x9555e90) at execute_cmd.c:3864 > words = 0x9556db0 > lastword = <value optimized out> > command_line = 0x952d438 "sudo at 19:00" > lastarg = 0x9555798 "19:00" > temp = <value optimized out> > first_word_quoted = 0 > result = 0 > builtin_is_special = <value optimized out> > already_forked = 156441064 > dofork = <value optimized out> > old_last_async_pid = 156441064 > builtin = <value optimized out> > func = <value optimized out> >#5 0x08073a22 in execute_command_internal (command=0x9556de0, asynchronous=0, pipe_in=-1, pipe_out=-1, fds_to_close=0x9555e90) at execute_cmd.c:742 > exec_result = 0 > user_subshell = <value optimized out> > invert = 0 > ignore_return = 0 > my_undo_list = 0x0 > exec_undo_list = 0x0 > last_pid = -1 > save_line_number = 41 >#6 0x08074794 in execute_command (command=0x9556de0) at execute_cmd.c:379 > bitmap = 0x9555e90 > result = <value optimized out> >#7 0x080607d7 in reader_loop () at eval.c:153 > code = <value optimized out> > our_indirection_level = 1 > current_command = 0x9556de0 >#8 0x0805fefc in main (argc=<value optimized out>, argv=0xbfaddc34, env=0xbfaddc3c) at shell.c:759 > i = <value optimized out> > code = <value optimized out> > old_errexit_flag = 0 > saverst = 0 > locally_skip_execution = 0 > arg_index = 1 > top_level_arg_index = 1 >From To Syms Read Shared Object Library >0x00a5ad00 0x00a65768 Yes /lib/libtinfo.so.5 >0x00c79a60 0x00c7aa88 Yes /lib/libdl.so.2 >0x00ae6c10 0x00c039e4 Yes /lib/libc.so.6 >0x00aaf850 0x00ac6acf Yes /lib/ld-linux.so.2 >0x00970a10 0x00977b38 Yes /lib/libnss_files.so.2 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >eax 0x9533020 156446752 >ecx 0x73 115 >edx 0x1f 31 >ebx 0x1010101 16843009 >esp 0xbfadd910 0xbfadd910 >ebp 0xbfadd948 0xbfadd948 >esi 0x70bfb39f 1891611551 >edi 0x9531788 156440456 >eip 0x8092d7e 0x8092d7e <hash_search+110> >eflags 0x10202 [ IF RF ] >cs 0x73 115 >ss 0x7b 123 >ds 0x7b 123 >es 0x7b 123 >fs 0x0 0 >gs 0x33 51 >Dump of assembler code for function hash_search: > 0x08092d10 <+0>: push %ebp > 0x08092d11 <+1>: mov %esp,%ebp > 0x08092d13 <+3>: push %edi > 0x08092d14 <+4>: push %esi > 0x08092d15 <+5>: push %ebx > 0x08092d16 <+6>: lea -0x2c(%esp),%esp > 0x08092d1a <+10>: mov 0xc(%ebp),%edi > 0x08092d1d <+13>: test %edi,%edi > 0x08092d1f <+15>: mov 0x10(%ebp),%eax > 0x08092d22 <+18>: je 0x8092dba <hash_search+170> > 0x08092d28 <+24>: and $0x2,%eax > 0x08092d2b <+27>: mov %eax,-0x1c(%ebp) > 0x08092d2e <+30>: je 0x8092e0c <hash_search+252> > 0x08092d34 <+36>: mov 0x8(%ebp),%eax > 0x08092d37 <+39>: xor %edx,%edx > 0x08092d39 <+41>: xor %esi,%esi > 0x08092d3b <+43>: movzbl (%eax),%ecx > 0x08092d3e <+46>: test %cl,%cl > 0x08092d40 <+48>: je 0x8092d65 <hash_search+85> > 0x08092d42 <+50>: mov %ecx,%edx > 0x08092d44 <+52>: lea 0x0(%esi,%eiz,1),%esi > 0x08092d48 <+56>: imul $0x1000193,%esi,%ebx > 0x08092d4e <+62>: lea 0x1(%eax),%eax > 0x08092d51 <+65>: movsbl %dl,%esi > 0x08092d54 <+68>: movzbl (%eax),%edx > 0x08092d57 <+71>: xor %ebx,%esi > 0x08092d59 <+73>: test %dl,%dl > 0x08092d5b <+75>: jne 0x8092d48 <hash_search+56> > 0x08092d5d <+77>: mov 0x4(%edi),%edx > 0x08092d60 <+80>: sub $0x1,%edx > 0x08092d63 <+83>: and %esi,%edx > 0x08092d65 <+85>: mov (%edi),%eax > 0x08092d67 <+87>: test %eax,%eax > 0x08092d69 <+89>: je 0x8092db3 <hash_search+163> > 0x08092d6b <+91>: mov (%eax,%edx,4),%ebx > 0x08092d6e <+94>: test %ebx,%ebx > 0x08092d70 <+96>: je 0x8092db3 <hash_search+163> > 0x08092d72 <+98>: mov %edx,-0x20(%ebp) > 0x08092d75 <+101>: jmp 0x8092d7e <hash_search+110> > 0x08092d77 <+103>: nop > 0x08092d78 <+104>: mov (%ebx),%ebx > 0x08092d7a <+106>: test %ebx,%ebx > 0x08092d7c <+108>: je 0x8092db0 <hash_search+160> >=> 0x08092d7e <+110>: cmp %esi,0xc(%ebx) > 0x08092d81 <+113>: jne 0x8092d78 <hash_search+104> > 0x08092d83 <+115>: mov 0x4(%ebx),%eax > 0x08092d86 <+118>: cmp %cl,(%eax) > 0x08092d88 <+120>: jne 0x8092d78 <hash_search+104> > 0x08092d8a <+122>: mov 0x8(%ebp),%edx > 0x08092d8d <+125>: mov %eax,(%esp) > 0x08092d90 <+128>: mov %edx,0x4(%esp) > 0x08092d94 <+132>: mov %cl,-0x24(%ebp) > 0x08092d97 <+135>: call 0x805df50 <strcmp@plt> > 0x08092d9c <+140>: test %eax,%eax > 0x08092d9e <+142>: movzbl -0x24(%ebp),%ecx > 0x08092da2 <+146>: jne 0x8092d78 <hash_search+104> > 0x08092da4 <+148>: addl $0x1,0x10(%ebx) > 0x08092da8 <+152>: jmp 0x8092dbc <hash_search+172> > 0x08092daa <+154>: lea 0x0(%esi),%esi > 0x08092db0 <+160>: mov -0x20(%ebp),%edx > 0x08092db3 <+163>: mov -0x1c(%ebp),%eax > 0x08092db6 <+166>: test %eax,%eax > 0x08092db8 <+168>: jne 0x8092dc8 <hash_search+184> > 0x08092dba <+170>: xor %ebx,%ebx > 0x08092dbc <+172>: lea 0x2c(%esp),%esp > 0x08092dc0 <+176>: mov %ebx,%eax > 0x08092dc2 <+178>: pop %ebx > 0x08092dc3 <+179>: pop %esi > 0x08092dc4 <+180>: pop %edi > 0x08092dc5 <+181>: pop %ebp > 0x08092dc6 <+182>: ret > 0x08092dc7 <+183>: nop > 0x08092dc8 <+184>: mov %edx,-0x24(%ebp) > 0x08092dcb <+187>: movl $0x14,(%esp) > 0x08092dd2 <+194>: call 0x80aab10 <xmalloc> > 0x08092dd7 <+199>: mov %eax,%ebx > 0x08092dd9 <+201>: mov -0x24(%ebp),%edx > 0x08092ddc <+204>: mov (%edi),%eax > 0x08092dde <+206>: mov %esi,0xc(%ebx) > 0x08092de1 <+209>: movl $0x0,0x10(%ebx) > 0x08092de8 <+216>: mov (%eax,%edx,4),%ecx > 0x08092deb <+219>: movl $0x0,0x8(%ebx) > 0x08092df2 <+226>: mov %ecx,(%ebx) > 0x08092df4 <+228>: mov %ebx,(%eax,%edx,4) > 0x08092df7 <+231>: mov 0x8(%ebp),%eax > 0x08092dfa <+234>: addl $0x1,0x8(%edi) > 0x08092dfe <+238>: mov %eax,0x4(%ebx) > 0x08092e01 <+241>: lea 0x2c(%esp),%esp > 0x08092e05 <+245>: mov %ebx,%eax > 0x08092e07 <+247>: pop %ebx > 0x08092e08 <+248>: pop %esi > 0x08092e09 <+249>: pop %edi > 0x08092e0a <+250>: pop %ebp > 0x08092e0b <+251>: ret > 0x08092e0c <+252>: mov 0x8(%edi),%edx > 0x08092e0f <+255>: test %edx,%edx > 0x08092e11 <+257>: jne 0x8092d34 <hash_search+36> > 0x08092e17 <+263>: jmp 0x8092dba <hash_search+170> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 698847
: 494025