Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 633174 Details for
Bug 869901
[abrt] pptp-1.7.2-14.fc17: binary_search: Process /usr/sbin/pptp was killed by signal 11 (SIGSEGV)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 6.99 KB, created by
Pizhong Zhou
on 2012-10-25 06:10:21 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Pizhong Zhou
Created:
2012-10-25 06:10:21 UTC
Size:
6.99 KB
patch
obsolete
>warning: core file may not match specified executable file. >[New LWP 5816] >Core was generated by `/sbin/pptp 74.82.186.59 --nolaunchpppd --loglevel 0 --logstring nm-pptp-service'. >Program terminated with signal 11, Segmentation fault. >#0 binary_search (key=5240, v=<optimized out>) at vector.c:149 >149 if (key < v->item[x].key) r = x - 1; else l = x + 1; > >Thread 1 (LWP 5816): >#0 binary_search (key=5240, v=<optimized out>) at vector.c:149 > l = <optimized out> > r = 1114379391 > x = 557189695 >#1 vector_contains (v=0x9c264f0, key=5240) at vector.c:138 > __PRETTY_FUNCTION__ = "vector_contains" >#2 0x0804bf14 in pptp_call_destroy (conn=0x9c26430, call=0x426c1478) at pptp_ctrl.c:410 > __PRETTY_FUNCTION__ = "pptp_call_destroy" >#3 0x0804c019 in pptp_conn_destroy (conn=conn@entry=0x9c26430) at pptp_ctrl.c:449 > i = 0 > __PRETTY_FUNCTION__ = "pptp_conn_destroy" >#4 0x080511d6 in callmgr_main (argc=argc@entry=3, argv=argv@entry=0xbf896070, envp=envp@entry=0xbf897404) at pptp_callmgr.c:304 > rc = <optimized out> > read_set = {__fds_bits = {0 <repeats 32 times>}} > write_set = {__fds_bits = {0 <repeats 32 times>}} > tv = {tv_sec = 0, tv_usec = 0} > inetaddr = {s_addr = 1002066506} > inet_sock = 0 > unix_sock = 1 > call_set = {__fds_bits = {0 <repeats 32 times>}} > conn = 0x9c26430 > call_list = 0x9c28710 > max_fd = 4 > first = 1 > retval = <optimized out> > i = <optimized out> > phonenr = 0x0 > __FUNCTION__ = "callmgr_main" > __PRETTY_FUNCTION__ = "callmgr_main" >#5 0x0804a42e in launch_callmgr (inetaddr=inetaddr@entry=..., phonenr=phonenr@entry=0x0, argc=argc@entry=7, argv=argv@entry=0xbf8973e4, envp=envp@entry=0xbf897404) at pptp.c:527 > my_argv = {0xbf897edf "/sbin/pptp", 0xb77856a0 "74.82.186.59", 0x0} > buf = "pptp: call manager for 74.82.186.59\000\240\032lB\334`\211\277\071kXB\364\017lB\320(lB\000\000\000\000\ba\211\277\257\243\\B\206@\005\b\334`\211\277\354`\211\277\003\000\000\000\300Vx\267\000\000\000\000\000\000\000\000\260`\211\277\062\065\065.255.255\000\364\017lB2.186.59k\243\\B" > rc = <optimized out> >#6 0x0804a5d4 in open_callmgr (inetaddr=..., phonenr=0x0, argc=argc@entry=7, argv=argv@entry=0xbf8973e4, envp=envp@entry=0xbf897404, pty_fd=0, gre_fd=gre_fd@entry=4) at pptp.c:496 > where = {a = {sa_family = 1, sa_data = "/var/run/pptp/"}, u = {sun_family = 1, sun_path = "/var/run/pptp/255.255.255.255:74.82.186.59\000B\376\255\004\b\004\000\000\000\274a\211\277\020\000\000\000\000\000\000\000Tb\211\277\000\000\000\000\200-lB(b\211\277\352~\211\277\a\000\000\000\070s\211\277\214\242\004\b\352~\211\277\344s\211\277`#\005\b"}} > fd = 1 > pid = <optimized out> > status = -1081515636 > __FUNCTION__ = "open_callmgr" >#7 0x080498ee in main (argc=7, argv=0xbf8973e4, envp=0xbf897404) at pptp.c:394 > inetaddr = {s_addr = 1002066506} > callmgr_sock = -1 > ttydev = '\000' <repeats 2028 times>, "+\031PBx\326y\267lk\211\277\304\377PBXm\211\277\233nOB\000 lB\274*\000\000\003\000\000\000\062\000\000\000\377\377\377\377", '\000' <repeats 24 times>"\330, \323y\267\254k\211\277\000\060QB\000\340kB\234\336kB\234\336kB\000\000\000\000\005\000\000\000\000\360kB\000 lB\274\036lB\274JlB\000\260\032\000\003\000\000\000r\002\000\000r\002\000\000\303^PB\b\000\000\000r\002\000\000\000 \376Cl\031\376C\304\377PBx\326y\267/\000\000\000\303^PB\b\000\000\000\017\000\000\000|0\376C\000\020\000\000\304\377PB\020\000\000\000\304\377PB\240\263OB\360\330y\267h\326y\267\017\000\000\000\255\260OB\334\004QB\320\330y\267\016\000\000\000\017\000\000\000h\326y\267\300\323y\267\n\000\000\000\334\004QB\334\004QB0\326y\267\331\260OB\304\377PB\000\000\000\000x\326y\267Xm\211"... > tty_name = <optimized out> > pty_fd = 0 > tty_fd = 0 > gre_fd = 4 > rc = <optimized out> > parent_pid = 0 > child_pid = 557189695 > call_id = <optimized out> > peer_call_id = <optimized out> > buf = '\000' <repeats 127 times> > pppdargc = <optimized out> > pppdargv = <optimized out> > phonenrbuf = '\000' <repeats 64 times> > phonenr = 0x0 > launchpppd = 0 > debug = 0 > __FUNCTION__ = "main" >From To Syms Read Shared Object Library >0x43fe0a90 0x43fe1540 Yes /lib/libutil.so.1 >0x42529f20 0x4266a02c Yes /lib/libc.so.6 >0x424f0850 0x42508ec7 Yes /lib/ld-linux.so.2 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >eax 0x21360a3f 557189695 >ecx 0x0 0 >edx 0x426c147f 1114379391 >ebx 0x0 0 >esp 0xbf895d60 0xbf895d60 >ebp 0xbf895f3c 0xbf895f3c >esi 0x1478 5240 >edi 0x426c1480 1114379392 >eip 0x804eb7c 0x804eb7c <vector_contains+60> >eflags 0x210207 [ CF PF IF RF ID ] >cs 0x73 115 >ss 0x7b 123 >ds 0x7b 123 >es 0x7b 123 >fs 0x0 0 >gs 0x33 51 >Dump of assembler code for function vector_contains: > 0x0804eb40 <+0>: push %edi > 0x0804eb41 <+1>: push %esi > 0x0804eb42 <+2>: push %ebx > 0x0804eb43 <+3>: lea -0x10(%esp),%esp > 0x0804eb47 <+7>: mov 0x20(%esp),%eax > 0x0804eb4b <+11>: mov 0x24(%esp),%esi > 0x0804eb4f <+15>: test %eax,%eax > 0x0804eb51 <+17>: je 0x804eba2 <vector_contains+98> > 0x0804eb53 <+19>: mov 0x4(%eax),%edx > 0x0804eb56 <+22>: mov (%eax),%edi > 0x0804eb58 <+24>: sub $0x1,%edx > 0x0804eb5b <+27>: js 0x804eb98 <vector_contains+88> > 0x0804eb5d <+29>: xor %ecx,%ecx > 0x0804eb5f <+31>: jmp 0x804eb6f <vector_contains+47> > 0x0804eb61 <+33>: lea 0x0(%esi,%eiz,1),%esi > 0x0804eb68 <+40>: lea -0x1(%eax),%edx > 0x0804eb6b <+43>: cmp %ecx,%edx > 0x0804eb6d <+45>: jl 0x804eb98 <vector_contains+88> > 0x0804eb6f <+47>: mov %ecx,%eax > 0x0804eb71 <+49>: add %edx,%eax > 0x0804eb73 <+51>: mov %eax,%ebx > 0x0804eb75 <+53>: shr $0x1f,%ebx > 0x0804eb78 <+56>: add %ebx,%eax > 0x0804eb7a <+58>: sar %eax >=> 0x0804eb7c <+60>: mov (%edi,%eax,8),%ebx > 0x0804eb7f <+63>: cmp %ebx,%esi > 0x0804eb81 <+65>: jl 0x804eb68 <vector_contains+40> > 0x0804eb83 <+67>: cmp %ebx,%esi > 0x0804eb85 <+69>: lea 0x1(%eax),%ecx > 0x0804eb88 <+72>: jne 0x804eb6b <vector_contains+43> > 0x0804eb8a <+74>: lea 0x10(%esp),%esp > 0x0804eb8e <+78>: mov $0x1,%eax > 0x0804eb93 <+83>: pop %ebx > 0x0804eb94 <+84>: pop %esi > 0x0804eb95 <+85>: pop %edi > 0x0804eb96 <+86>: ret > 0x0804eb97 <+87>: nop > 0x0804eb98 <+88>: lea 0x10(%esp),%esp > 0x0804eb9c <+92>: xor %eax,%eax > 0x0804eb9e <+94>: pop %ebx > 0x0804eb9f <+95>: pop %esi > 0x0804eba0 <+96>: pop %edi > 0x0804eba1 <+97>: ret > 0x0804eba2 <+98>: movl $0x8053e07,0xc(%esp) > 0x0804ebaa <+106>: movl $0x89,0x8(%esp) > 0x0804ebb2 <+114>: movl $0x8053cb0,0x4(%esp) > 0x0804ebba <+122>: movl $0x8053cb9,(%esp) > 0x0804ebc1 <+129>: call 0x8049370 <__assert_fail@plt> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 869901
:
633171
|
633172
|
633173
| 633174 |
633175
|
633176
|
633177
|
633178
|
633179