Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 609537 Details for
Bug 854108
[abrt] binutils-2.22.52.0.1-10.fc17: OP_VEX: Process /usr/bin/objdump was killed by signal 6 (SIGABRT)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 8.97 KB, created by
uq.yosuke.kobayashi
on 2012-09-04 03:44:14 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
uq.yosuke.kobayashi
Created:
2012-09-04 03:44:14 UTC
Size:
8.97 KB
patch
obsolete
>[New LWP 7223] >Core was generated by `objdump -D /usr/lib64/flash-plugin/libflashplayer.so -M intel'. >Program terminated with signal 6, Aborted. >#0 0x0000003652635925 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:64 >64 return INLINE_SYSCALL (tgkill, 3, pid, selftid, sig); > >Thread 1 (LWP 7223): >#0 0x0000003652635925 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:64 > resultvar = 0 > pid = 7223 > selftid = 7223 >#1 0x00000036526370d8 in __GI_abort () at abort.c:91 > save_stage = 2 > act = {__sigaction_handler = {sa_handler = 0x373464636666da04, sa_sigaction = 0x373464636666da04}, sa_mask = {__val = {140735228678592, 140735228679440, 140735228679440, 230012258971, 140735228678888, 1, 0, 1, 2, 2, 72198327231315968, 243, 1099511627904, 140735228679440, 4978139549933553920, 140735228678784}}, sa_flags = -1909531592, sa_restorer = 0x3} > sigs = {__val = {32, 0 <repeats 15 times>}} >#2 0x000000358e02f51f in OP_VEX (bytemode=<optimized out>, sizeflag=<optimized out>) at i386-dis.c:14663 > reg = <optimized out> > names = <optimized out> >#3 OP_VEX (bytemode=<optimized out>, sizeflag=<optimized out>) at i386-dis.c:14608 >No locals. >#4 0x000000358e0322de in print_insn (pc=16764231, info=0x7fff79501600) at i386-dis.c:11497 > dp = <optimized out> > i = <optimized out> > op_txt = {0x358e2ed9a0 "ymm14", 0x358e2eda04 "", 0x358e2eda68 "", 0x0, 0x358e2edb30 ""} > needcomma = <optimized out> > sizeflag = <optimized out> > p = <optimized out> > priv = {max_fetched = 0x7fff7950128d "0U\345R77\314hhhh`\022\233R6", the_buffer = "\217h\266\357\267\060U\345R77\314hhhh`\022\233R", insn_start = 16764231, orig_sizeflag = 3, bailout = {{__jmpbuf = {6, 6207323537491654754, 230015843530, 230015843535, 16764231, 230015843541, -6219126419508004766, 6207323539151288418}, __mask_was_saved = 0, __saved_mask = {__val = {140735228678912, 140735228679448, 140735228679448, 230012258977, 140579588515648, 16764231, 140579588515648, 2, 233314128480, 4096, 140579588648960, 1, 233310740130, 4096, 32, 25548003}}}}} > prefix_length = <optimized out> > default_prefixes = 0 >#5 0x000000000040911d in disassemble_bytes (relppend=0x0, relppp=<synthetic pointer>, rel_offset=0, stop_offset=1197392, start_offset=1144327, data=<optimized out>, insns=<optimized out>, disassemble_fn=0x358e0338c0 <print_insn_i386>, inf=0x7fff79501600) at ./objdump.c:1651 > buf = "00000000 ffcd47\000\000\000\000\000\000\000\000pUr\001\000\000\000\000\367\002\000\000\000\000\000\000\000lr\001\000\000\000\000p%" > bpc = 0 > pb = 0 > z = <optimized out> > need_nl = 0 > previous_octets = 6 > section = 0x170a300 > skip_addr_chars = <optimized out> > skip_zeroes_at_end = 3 > opb = 1 > aux = 0x7fff795015c0 > octets_per_line = 7 > addr_offset = 1144327 > skip_zeroes = 8 > octets = 0 > sfile = {buffer = 0x1709400 "cmp BYTE PTR [rax+0x305b9124],dh", pos = 0, alloc = 272} >#6 disassemble_section (abfd=0x1707060, section=0x170a300, inf=0x7fff79501600) at ./objdump.c:2087 > addr = <optimized out> > nextsym = <optimized out> > nextstop_offset = 1197392 > insns = <optimized out> > bed = <optimized out> > sign_adjust = 0 > pinfo = 0x7fff79501600 > paux = 0x7fff795015c0 > opb = <optimized out> > data = <optimized out> > datasize = <optimized out> > rel_pp = 0x0 > rel_ppstart = 0x0 > rel_ppend = 0x0 > stop_offset = 1197392 > sym = <optimized out> > place = 0 > rel_count = <optimized out> > rel_offset = 0 > addr_offset = 1144327 >#7 0x000000358dc4723c in bfd_map_over_sections (abfd=abfd@entry=0x1707060, operation=operation@entry=0x4089f0 <disassemble_section>, user_storage=user_storage@entry=0x7fff79501600) at section.c:1288 > sect = 0x170a300 > i = <optimized out> > __PRETTY_FUNCTION__ = "bfd_map_over_sections" >#8 0x0000000000405755 in disassemble_data (abfd=abfd@entry=0x1707060) at ./objdump.c:2222 > disasm_info = {fprintf_func = 0x405d90 <objdump_sprintf>, stream = 0x7fff795014f0, application_data = 0x7fff795015c0, flavour = bfd_target_elf_flavour, arch = bfd_arch_i386, mach = 8, endian = BFD_ENDIAN_LITTLE, endian_code = BFD_ENDIAN_UNKNOWN, insn_sets = 0x0, section = 0x170a300, symbols = 0x0, num_symbols = 0, symtab = 0x1722580, symtab_pos = -1, symtab_size = 759, flags = 1073741824, private_data = 0x7fff79501280, read_memory_func = 0x358e02c7c0 <buffer_read_memory>, memory_error_func = 0x358e02c840 <perror_memory>, print_address_func = 0x406ef0 <objdump_print_address>, symbol_at_address_func = 0x405070 <objdump_symbol_at_address>, symbol_is_valid = 0x358e02c990 <generic_symbol_is_valid>, buffer = 0x1745f10 "Gecko", buffer_vma = 15619904, buffer_length = 1197392, bytes_per_line = 7, bytes_per_chunk = 0, display_endian = BFD_ENDIAN_LITTLE, octets_per_byte = 1, skip_zeroes = 8, skip_zeroes_at_end = 3, disassembler_needs_relocs = 0, insn_info_valid = 0 '\000', branch_delay_insns = 0 '\000', data_size = 0 '\000', insn_type = dis_noninsn, target = 0, target2 = 0, disassembler_options = 0x7fff79502328 "intel"} > aux = {abfd = 0x1707060, sec = 0x170a300, require_sec = 0, dynrelbuf = 0x0, dynrelcount = 0, disassemble_fn = 0x358e0338c0 <print_insn_i386>, reloc = 0x0} > i = <optimized out> >#9 0x0000000000407a86 in dump_bfd (abfd=abfd@entry=0x1707060) at ./objdump.c:3224 >No locals. >#10 0x000000000040a290 in display_object_bfd (abfd=0x1707060) at ./objdump.c:3280 > matching = <optimized out> >#11 display_any_bfd (file=file@entry=0x1707060, level=level@entry=0) at ./objdump.c:3354 >No locals. >#12 0x000000000040a348 in display_file (filename=filename@entry=0x7fff795022fb "/usr/lib64/flash-plugin/libflashplayer.so", target=target@entry=0x0) at ./objdump.c:3375 > file = 0x1707060 >#13 0x00000000004048d0 in display_file (target=0x0, filename=0x7fff795022fb "/usr/lib64/flash-plugin/libflashplayer.so") at ./objdump.c:3362 >No locals. >#14 main (argc=5, argv=0x7fff795018f8) at ./objdump.c:3654 > c = <optimized out> > target = 0x0 > seenflag = <optimized out> >From To Syms Read Shared Object Library >0x000000358e02c6c0 0x000000358e033b24 Yes /lib64/libopcodes-2.22.52.0.1-10.fc17.so >0x000000358dc38560 0x000000358dcc87e4 Yes /lib64/libbfd-2.22.52.0.1-10.fc17.so >0x0000003652e00ea0 0x0000003652e019e0 Yes /lib64/libdl.so.2 >0x000000358d801f50 0x000000358d80e718 Yes /lib64/libz.so.1 >0x000000365261ef60 0x000000365275f780 Yes /lib64/libc.so.6 >0x0000003652200b20 0x000000365221a319 Yes /lib64/ld-linux-x86-64.so.2 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0x0 0 >rbx 0x358e2edc38 230018702392 >rcx 0xffffffffffffffff -1 >rdx 0x6 6 >rsi 0x1c37 7223 >rdi 0x1c37 7223 >rbp 0x3 0x3 >rsp 0x7fff795010e8 0x7fff795010e8 >r8 0x80 128 >r9 0x0 0 >r10 0x8 8 >r11 0x246 582 >r12 0x0 0 >r13 0x1 1 >r14 0x358e28f2d8 230018314968 >r15 0x358e2edc00 230018702336 >rip 0x3652635925 0x3652635925 <__GI_raise+53> >eflags 0x246 [ PF ZF IF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >Dump of assembler code for function __GI_raise: > 0x00000036526358f0 <+0>: mov %fs:0x2d4,%eax > 0x00000036526358f8 <+8>: mov %fs:0x2d0,%esi > 0x0000003652635900 <+16>: test %esi,%esi > 0x0000003652635902 <+18>: jne 0x3652635930 <__GI_raise+64> > 0x0000003652635904 <+20>: mov $0xba,%eax > 0x0000003652635909 <+25>: syscall > 0x000000365263590b <+27>: mov %eax,%esi > 0x000000365263590d <+29>: mov %eax,%fs:0x2d0 > 0x0000003652635915 <+37>: movslq %edi,%rdx > 0x0000003652635918 <+40>: movslq %esi,%rsi > 0x000000365263591b <+43>: movslq %eax,%rdi > 0x000000365263591e <+46>: mov $0xea,%eax > 0x0000003652635923 <+51>: syscall >=> 0x0000003652635925 <+53>: cmp $0xfffffffffffff000,%rax > 0x000000365263592b <+59>: ja 0x365263593f <__GI_raise+79> > 0x000000365263592d <+61>: repz retq > 0x000000365263592f <+63>: nop > 0x0000003652635930 <+64>: test %eax,%eax > 0x0000003652635932 <+66>: jg 0x3652635915 <__GI_raise+37> > 0x0000003652635934 <+68>: test $0x7fffffff,%eax > 0x0000003652635939 <+73>: je 0x3652635950 <__GI_raise+96> > 0x000000365263593b <+75>: neg %eax > 0x000000365263593d <+77>: jmp 0x3652635915 <__GI_raise+37> > 0x000000365263593f <+79>: mov 0x37a4ea(%rip),%rdx # 0x36529afe30 > 0x0000003652635946 <+86>: neg %eax > 0x0000003652635948 <+88>: mov %eax,%fs:(%rdx) > 0x000000365263594b <+91>: or $0xffffffffffffffff,%rax > 0x000000365263594f <+95>: retq > 0x0000003652635950 <+96>: mov %esi,%eax > 0x0000003652635952 <+98>: jmp 0x3652635915 <__GI_raise+37> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 854108
:
609535
|
609536
| 609537 |
609538
|
609539
|
609540
|
609541
|
609542
|
609543
|
609544
|
609545