Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 609063 Details for
Bug 853719
[abrt] util-linux-2.21.2-2.fc17: probe_ntfs: Process /usr/sbin/wipefs was killed by signal 11 (SIGSEGV)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 10.26 KB, created by
D. Charles Pyle
on 2012-09-02 11:36:04 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
D. Charles Pyle
Created:
2012-09-02 11:36:04 UTC
Size:
10.26 KB
patch
obsolete
>[New LWP 2037] >Core was generated by `wipefs -a /dev/sda3'. >Program terminated with signal 11, Segmentation fault. >#0 probe_ntfs (pr=0x8b1030, mag=<optimized out>) at ntfs.c:133 >133 attr_len = le32_to_cpu(attr->len); > >Thread 1 (LWP 2037): >#0 probe_ntfs (pr=0x8b1030, mag=<optimized out>) at ntfs.c:133 > ns = 0x8b1e18 > mft = 0x8ba288 > attr = 0xffffffff9369a498 > bytes_per_sector = 512 > sectors_per_cluster = <optimized out> > mft_record_size = 1024 > attr_off = -1830944240 > attr_len = <optimized out> > attr_type = <optimized out> > val_len = <optimized out> > val_off = <optimized out> > nr_clusters = <optimized out> > off = <optimized out> > buf_mft = 0x8ba288 "FILE0" > val = <optimized out> >#1 0x000000377bc11d1e in superblocks_probe (pr=0x8b1030, chn=0x8b1090) at superblocks.c:377 > id = 0x377be24760 > mag = 0x377be24780 > off = 3 > rc = 0 > i = <optimized out> >#2 0x000000377bc0acc9 in blkid_do_probe (pr=pr@entry=0x8b1030) at probe.c:914 > chn = 0x8b1090 > rc = 1 >#3 0x0000000000401868 in do_wipe (all=1, noact=0, devname=<optimized out>, wp=0x0) at wipefs.c:260 > pr = 0x8b1030 > w = <optimized out> >#4 main (argc=<optimized out>, argv=<optimized out>) at wipefs.c:425 > wp = <optimized out> > c = <optimized out> > all = 1 > has_offset = <optimized out> > noact = 0 > mode = 0 > devname = <optimized out> > longopts = {{name = 0x40332e "all", has_arg = 0, flag = 0x0, val = 97}, {name = 0x403332 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x403337 "no-act", has_arg = 0, flag = 0x0, val = 110}, {name = 0x40333e "offset", has_arg = 1, flag = 0x0, val = 111}, {name = 0x403345 "parsable", has_arg = 0, flag = 0x0, val = 112}, {name = 0x40334e "types", has_arg = 1, flag = 0x0, val = 116}, {name = 0x403354 "version", has_arg = 0, flag = 0x0, val = 86}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} >From To Syms Read Shared Object Library >0x000000377bc06aa0 0x000000377bc1c078 Yes /lib64/libblkid.so.1 >0x000000377ec016d0 0x000000377ec02d48 Yes /lib64/libuuid.so.1 >0x000000377a41ef60 0x000000377a55f780 Yes /lib64/libc.so.6 >0x0000003779c00b20 0x0000003779c1a319 Yes /lib64/ld-linux-x86-64.so.2 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0x18 24 >rbx 0x8b1e18 9117208 >rcx 0xffffffff9369a498 -1821793128 >rdx 0x92de0018 2464022552 >rsi 0x80 128 >rdi 0x0 0 >rbp 0x400 0x400 >rsp 0x7fff54765fe0 0x7fff54765fe0 >r8 0x26 38 >r9 0x54 84 >r10 0x28 40 >r11 0x13 19 >r12 0x8b1030 9113648 >r13 0x92de0210 2464023056 >r14 0x8ba288 9151112 >r15 0x200 512 >rip 0x377bc149de 0x377bc149de <probe_ntfs+398> >eflags 0x10282 [ SF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >Dump of assembler code for function probe_ntfs: > 0x000000377bc14850 <+0>: mov %rbx,-0x30(%rsp) > 0x000000377bc14855 <+5>: mov %r12,-0x20(%rsp) > 0x000000377bc1485a <+10>: mov $0x52,%edx > 0x000000377bc1485f <+15>: mov %rbp,-0x28(%rsp) > 0x000000377bc14864 <+20>: mov %r13,-0x18(%rsp) > 0x000000377bc14869 <+25>: mov %rdi,%r12 > 0x000000377bc1486c <+28>: mov %r14,-0x10(%rsp) > 0x000000377bc14871 <+33>: mov %r15,-0x8(%rsp) > 0x000000377bc14876 <+38>: sub $0x38,%rsp > 0x000000377bc1487a <+42>: mov 0x10(%rsi),%rsi > 0x000000377bc1487e <+46>: shl $0xa,%rsi > 0x000000377bc14882 <+50>: callq 0x377bc09ad0 <blkid_probe_get_buffer> > 0x000000377bc14887 <+55>: test %rax,%rax > 0x000000377bc1488a <+58>: mov %rax,%rbx > 0x000000377bc1488d <+61>: je 0x377bc14a45 <probe_ntfs+501> > 0x000000377bc14893 <+67>: movzbl 0xb(%rax),%edi > 0x000000377bc14897 <+71>: movzbl 0xc(%rax),%eax > 0x000000377bc1489b <+75>: movzbl 0xd(%rbx),%edx > 0x000000377bc1489f <+79>: shl $0x8,%eax > 0x000000377bc148a2 <+82>: add %eax,%edi > 0x000000377bc148a4 <+84>: movzbl %dl,%eax > 0x000000377bc148a7 <+87>: cmp $0xff,%edi > 0x000000377bc148ad <+93>: jle 0x377bc148e0 <probe_ntfs+144> > 0x000000377bc148af <+95>: test %eax,%eax > 0x000000377bc148b1 <+97>: je 0x377bc148e0 <probe_ntfs+144> > 0x000000377bc148b3 <+99>: movsbl 0x40(%rbx),%ebp > 0x000000377bc148b7 <+103>: test %bpl,%bpl > 0x000000377bc148ba <+106>: js 0x377bc14910 <probe_ntfs+192> > 0x000000377bc148bc <+108>: imul %eax,%ebp > 0x000000377bc148bf <+111>: imul %edi,%ebp > 0x000000377bc148c2 <+114>: mov 0x28(%rbx),%rax > 0x000000377bc148c6 <+118>: movzbl %dl,%r13d > 0x000000377bc148ca <+122>: xor %edx,%edx > 0x000000377bc148cc <+124>: div %r13 > 0x000000377bc148cf <+127>: cmp 0x30(%rbx),%rax > 0x000000377bc148d3 <+131>: jb 0x377bc148e0 <probe_ntfs+144> > 0x000000377bc148d5 <+133>: mov 0x38(%rbx),%rsi > 0x000000377bc148d9 <+137>: cmp %rsi,%rax > 0x000000377bc148dc <+140>: jae 0x377bc14920 <probe_ntfs+208> > 0x000000377bc148de <+142>: xchg %ax,%ax > 0x000000377bc148e0 <+144>: mov $0x1,%eax > 0x000000377bc148e5 <+149>: mov 0x8(%rsp),%rbx > 0x000000377bc148ea <+154>: mov 0x10(%rsp),%rbp > 0x000000377bc148ef <+159>: mov 0x18(%rsp),%r12 > 0x000000377bc148f4 <+164>: mov 0x20(%rsp),%r13 > 0x000000377bc148f9 <+169>: mov 0x28(%rsp),%r14 > 0x000000377bc148fe <+174>: mov 0x30(%rsp),%r15 > 0x000000377bc14903 <+179>: add $0x38,%rsp > 0x000000377bc14907 <+183>: retq > 0x000000377bc14908 <+184>: nopl 0x0(%rax,%rax,1) > 0x000000377bc14910 <+192>: movsbl %bpl,%ecx > 0x000000377bc14914 <+196>: mov $0x1,%ebp > 0x000000377bc14919 <+201>: neg %ecx > 0x000000377bc1491b <+203>: shl %cl,%ebp > 0x000000377bc1491d <+205>: jmp 0x377bc148c2 <probe_ntfs+114> > 0x000000377bc1491f <+207>: nop > 0x000000377bc14920 <+208>: imul %r13,%rsi > 0x000000377bc14924 <+212>: movslq %edi,%r15 > 0x000000377bc14927 <+215>: movslq %ebp,%r14 > 0x000000377bc1492a <+218>: mov %r14,%rdx > 0x000000377bc1492d <+221>: mov %r12,%rdi > 0x000000377bc14930 <+224>: imul %r15,%rsi > 0x000000377bc14934 <+228>: callq 0x377bc09ad0 <blkid_probe_get_buffer> > 0x000000377bc14939 <+233>: test %rax,%rax > 0x000000377bc1493c <+236>: je 0x377bc148e0 <probe_ntfs+144> > 0x000000377bc1493e <+238>: lea 0x7794(%rip),%rsi # 0x377bc1c0d9 > 0x000000377bc14945 <+245>: mov $0x4,%edx > 0x000000377bc1494a <+250>: mov %rax,%rdi > 0x000000377bc1494d <+253>: callq 0x377bc06550 <memcmp@plt> > 0x000000377bc14952 <+258>: test %eax,%eax > 0x000000377bc14954 <+260>: jne 0x377bc148e0 <probe_ntfs+144> > 0x000000377bc14956 <+262>: imul 0x30(%rbx),%r13 > 0x000000377bc1495b <+267>: mov %r14,%rdx > 0x000000377bc1495e <+270>: mov %r12,%rdi > 0x000000377bc14961 <+273>: imul %r15,%r13 > 0x000000377bc14965 <+277>: mov %r13,%rsi > 0x000000377bc14968 <+280>: callq 0x377bc09ad0 <blkid_probe_get_buffer> > 0x000000377bc1496d <+285>: test %rax,%rax > 0x000000377bc14970 <+288>: je 0x377bc148e0 <probe_ntfs+144> > 0x000000377bc14976 <+294>: lea 0x775c(%rip),%rsi # 0x377bc1c0d9 > 0x000000377bc1497d <+301>: mov $0x4,%edx > 0x000000377bc14982 <+306>: mov %rax,%rdi > 0x000000377bc14985 <+309>: callq 0x377bc06550 <memcmp@plt> > 0x000000377bc1498a <+314>: test %eax,%eax > 0x000000377bc1498c <+316>: jne 0x377bc148e0 <probe_ntfs+144> > 0x000000377bc14992 <+322>: lea 0x0(%rbp,%rbp,2),%esi > 0x000000377bc14996 <+326>: mov %r14,%rdx > 0x000000377bc14999 <+329>: mov %r12,%rdi > 0x000000377bc1499c <+332>: movslq %esi,%rsi > 0x000000377bc1499f <+335>: add %r13,%rsi > 0x000000377bc149a2 <+338>: callq 0x377bc09ad0 <blkid_probe_get_buffer> > 0x000000377bc149a7 <+343>: test %rax,%rax > 0x000000377bc149aa <+346>: mov %rax,%r14 > 0x000000377bc149ad <+349>: je 0x377bc148e0 <probe_ntfs+144> > 0x000000377bc149b3 <+355>: lea 0x771f(%rip),%rsi # 0x377bc1c0d9 > 0x000000377bc149ba <+362>: mov $0x4,%edx > 0x000000377bc149bf <+367>: mov %rax,%rdi > 0x000000377bc149c2 <+370>: callq 0x377bc06550 <memcmp@plt> > 0x000000377bc149c7 <+375>: test %eax,%eax > 0x000000377bc149c9 <+377>: jne 0x377bc148e0 <probe_ntfs+144> > 0x000000377bc149cf <+383>: movzwl 0x14(%r14),%r13d > 0x000000377bc149d4 <+388>: nopl 0x0(%rax) > 0x000000377bc149d8 <+392>: movslq %r13d,%rcx > 0x000000377bc149db <+395>: add %r14,%rcx >=> 0x000000377bc149de <+398>: mov 0x4(%rcx),%edx > 0x000000377bc149e1 <+401>: mov (%rcx),%esi > 0x000000377bc149e3 <+403>: movzwl 0x14(%rcx),%eax > 0x000000377bc149e7 <+407>: mov 0x10(%rcx),%edi > 0x000000377bc149ea <+410>: add %edx,%r13d > 0x000000377bc149ed <+413>: cmp %ebp,%r13d > 0x000000377bc149f0 <+416>: jg 0x377bc14a20 <probe_ntfs+464> > 0x000000377bc149f2 <+418>: test %edx,%edx > 0x000000377bc149f4 <+420>: je 0x377bc14a20 <probe_ntfs+464> > 0x000000377bc149f6 <+422>: cmp $0xffffffff,%esi > 0x000000377bc149f9 <+425>: je 0x377bc14a20 <probe_ntfs+464> > 0x000000377bc149fb <+427>: cmp $0x60,%esi > 0x000000377bc149fe <+430>: xchg %ax,%ax > 0x000000377bc14a00 <+432>: jne 0x377bc149d8 <probe_ntfs+392> > 0x000000377bc14a02 <+434>: lea (%rcx,%rax,1),%rsi > 0x000000377bc14a06 <+438>: mov %edi,%edx > 0x000000377bc14a08 <+440>: mov $0x1,%ecx > 0x000000377bc14a0d <+445>: mov %r12,%rdi > 0x000000377bc14a10 <+448>: callq 0x377bc12520 <blkid_probe_set_utf8label> > 0x000000377bc14a15 <+453>: jmp 0x377bc149d8 <probe_ntfs+392> > 0x000000377bc14a17 <+455>: nopw 0x0(%rax,%rax,1) > 0x000000377bc14a20 <+464>: mov 0x48(%rbx),%r8 > 0x000000377bc14a24 <+468>: lea 0x48(%rbx),%rsi > 0x000000377bc14a28 <+472>: lea 0x9265(%rip),%rcx # 0x377bc1dc94 > 0x000000377bc14a2f <+479>: mov $0x8,%edx > 0x000000377bc14a34 <+484>: mov %r12,%rdi > 0x000000377bc14a37 <+487>: xor %eax,%eax > 0x000000377bc14a39 <+489>: callq 0x377bc12620 <blkid_probe_sprintf_uuid> > 0x000000377bc14a3e <+494>: xor %eax,%eax > 0x000000377bc14a40 <+496>: jmpq 0x377bc148e5 <probe_ntfs+149> > 0x000000377bc14a45 <+501>: mov $0xffffffff,%eax > 0x000000377bc14a4a <+506>: jmpq 0x377bc148e5 <probe_ntfs+149> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 853719
:
609060
|
609061
|
609062
| 609063 |
609064
|
609065
|
609066
|
609067
|
609068
|
609069