Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 636022 Details for
Bug 871778
[abrt] btrfs-progs-0.20.rc1.20121017git91d9eec-1.fc18: strrchr: Process /usr/sbin/mkfs.btrfs was killed by signal 11 (SIGSEGV)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 5.97 KB, created by
Kamil Páral
on 2012-10-31 11:07:55 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Kamil Páral
Created:
2012-10-31 11:07:55 UTC
Size:
5.97 KB
patch
obsolete
>[New LWP 1676] >Core was generated by `mkfs.btrfs file'. >Program terminated with signal 11, Segmentation fault. >#0 __strrchr_sse2 () at ../sysdeps/x86_64/strrchr.S:32 >32 movdqa (%rdi), %xmm0 > >Thread 1 (LWP 1676): >#0 __strrchr_sse2 () at ../sysdeps/x86_64/strrchr.S:32 >No locals. >#1 0x000000000042074d in is_ssd (file=file@entry=0x7fff5ea6b5c5 "file") at mkfs.c:1244 > devname = 0x0 > probe = 0x12c2260 > dev = <optimized out> > path = '\000' <repeats 24 times>, "8\302b", '\000' <repeats 15 times>, "\001", '\000' <repeats 13 times>, "0\234\246^\377\177\000\000\020\020,\001\000\000\000\000\004T\tD\177\177\000\000\001", '\000' <repeats 15 times>, "(\335YC\177\177\000\000\000\000\000\000\000\000\000\000\003\000\000\000\000\000\000\000\020\020,\001", '\000' <repeats 12 times>"\365, \271\tD\177\177", '\000' <repeats 12 times>, "\001\000\000\000\000\000\313\r\000\000\000\000\000\000\020\234\246^\377\177\000\000\003\000\000\000\000\000\000\000\000\060.\001\000\000\000\000c\000\000\000\000\000\000\000\250\222*D\177\177\000\000D\000\000\000\000\000\000\000x\244@", '\000' <repeats 1016 times>, "\005\000\000\000\000\377\377\377\377\377\377\377\377\000\000\000\000\000\000\000\000@\000\000\000\000\000\000\000\200"... > disk = <optimized out> > fd = <optimized out> > rotational = 0 '\000' >#2 0x00000000004023fa in main (ac=0, av=<optimized out>) at mkfs.c:1413 > file = 0x7fff5ea6b5c5 "file" > root = <optimized out> > trans = <optimized out> > label = 0x0 > first_file = 0x7fff5ea6b5c5 "file" > block_count = 0 > dev_block_count = 1048576000 > blocks = {140184581125320, 2090266759, 140734781370016, 4, 6, 140184579018448, 140734782243335} > alloc_start = 0 > metadata_profile = 0 > data_profile = 0 > leafsize = 4096 > sectorsize = 4096 > nodesize = 4096 > zero_end = <optimized out> > option_index = 0 > fd = 3 > ret = <optimized out> > i = <optimized out> > mixed = 1 > data_profile_opt = 0 > metadata_profile_opt = 0 > nodiscard = 0 > ssd = 0 > source_dir = 0x0 > source_dir_set = 0 > num_of_meta_chunks = 0 > size_of_data = 0 > source_dir_size = <optimized out> > pretty_buf = <optimized out> > __PRETTY_FUNCTION__ = "main" >From To Syms Read Shared Object Library >0x00007f7f43e83510 0x00007f7f43e84a8c Yes /lib64/libuuid.so.1 >0x00007f7f43b865b0 0x00007f7f43bf0d68 Yes /lib64/libm.so.6 >0x00007f7f43955b30 0x00007f7f43972ddc Yes /lib64/libblkid.so.1 >0x00007f7f435b51a0 0x00007f7f436f67a0 Yes /lib64/libc.so.6 >0x00007f7f44087b20 0x00007f7f440a13f9 Yes /lib64/ld-linux-x86-64.so.2 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0x0 0 >rbx 0x12c2260 19669600 >rcx 0x0 0 >rdx 0x0 0 >rsi 0xffffffff 4294967295 >rdi 0x0 0 >rbp 0x0 0x0 >rsp 0x7fff5ea69af8 0x7fff5ea69af8 >r8 0x1 1 >r9 0x0 0 >r10 0x7fff5ea69890 140734781364368 >r11 0x7f7f4361da80 140184568060544 >r12 0x1 1 >r13 0x0 0 >r14 0xffffffffffffffff -1 >r15 0x3 3 >rip 0x7f7f4361da9a 0x7f7f4361da9a <__strrchr_sse2+26> >eflags 0x10286 [ PF SF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >Dump of assembler code for function __strrchr_sse2: > 0x00007f7f4361da80 <+0>: movd %esi,%xmm1 > 0x00007f7f4361da84 <+4>: mov %rdi,%rcx > 0x00007f7f4361da87 <+7>: punpcklbw %xmm1,%xmm1 > 0x00007f7f4361da8b <+11>: and $0xfffffffffffffff0,%rdi > 0x00007f7f4361da8f <+15>: pxor %xmm2,%xmm2 > 0x00007f7f4361da93 <+19>: punpcklbw %xmm1,%xmm1 > 0x00007f7f4361da97 <+23>: or $0xffffffff,%esi >=> 0x00007f7f4361da9a <+26>: movdqa (%rdi),%xmm0 > 0x00007f7f4361da9e <+30>: pshufd $0x0,%xmm1,%xmm1 > 0x00007f7f4361daa3 <+35>: sub %rdi,%rcx > 0x00007f7f4361daa6 <+38>: movdqa %xmm0,%xmm3 > 0x00007f7f4361daaa <+42>: lea 0x10(%rdi),%rdi > 0x00007f7f4361daae <+46>: pcmpeqb %xmm1,%xmm0 > 0x00007f7f4361dab2 <+50>: pcmpeqb %xmm2,%xmm3 > 0x00007f7f4361dab6 <+54>: shl %cl,%esi > 0x00007f7f4361dab8 <+56>: pmovmskb %xmm0,%edx > 0x00007f7f4361dabc <+60>: pmovmskb %xmm3,%ecx > 0x00007f7f4361dac0 <+64>: and %esi,%edx > 0x00007f7f4361dac2 <+66>: and %esi,%ecx > 0x00007f7f4361dac4 <+68>: xor %eax,%eax > 0x00007f7f4361dac6 <+70>: mov %edx,%esi > 0x00007f7f4361dac8 <+72>: or %ecx,%esi > 0x00007f7f4361daca <+74>: jne 0x7f7f4361daee <__strrchr_sse2+110> > 0x00007f7f4361dacc <+76>: movdqa (%rdi),%xmm0 > 0x00007f7f4361dad0 <+80>: lea 0x10(%rdi),%rdi > 0x00007f7f4361dad4 <+84>: movdqa %xmm0,%xmm3 > 0x00007f7f4361dad8 <+88>: pcmpeqb %xmm1,%xmm0 > 0x00007f7f4361dadc <+92>: pcmpeqb %xmm2,%xmm3 > 0x00007f7f4361dae0 <+96>: pmovmskb %xmm0,%edx > 0x00007f7f4361dae4 <+100>: pmovmskb %xmm3,%ecx > 0x00007f7f4361dae8 <+104>: mov %edx,%esi > 0x00007f7f4361daea <+106>: or %ecx,%esi > 0x00007f7f4361daec <+108>: je 0x7f7f4361dacc <__strrchr_sse2+76> > 0x00007f7f4361daee <+110>: bsf %ecx,%r9d > 0x00007f7f4361daf2 <+114>: mov $0xffffffff,%r8d > 0x00007f7f4361daf8 <+120>: mov $0x1f,%ecx > 0x00007f7f4361dafd <+125>: jne 0x7f7f4361db0b <__strrchr_sse2+139> > 0x00007f7f4361daff <+127>: bsr %edx,%edx > 0x00007f7f4361db02 <+130>: je 0x7f7f4361dacc <__strrchr_sse2+76> > 0x00007f7f4361db04 <+132>: lea -0x10(%rdi,%rdx,1),%rax > 0x00007f7f4361db09 <+137>: jmp 0x7f7f4361dacc <__strrchr_sse2+76> > 0x00007f7f4361db0b <+139>: sub %r9d,%ecx > 0x00007f7f4361db0e <+142>: shr %cl,%r8d > 0x00007f7f4361db11 <+145>: and %r8d,%edx > 0x00007f7f4361db14 <+148>: bsr %edx,%edx > 0x00007f7f4361db17 <+151>: je 0x7f7f4361db1e <__strrchr_sse2+158> > 0x00007f7f4361db19 <+153>: lea -0x10(%rdi,%rdx,1),%rax > 0x00007f7f4361db1e <+158>: retq >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 871778
:
636020
|
636021
| 636022 |
636023
|
636024
|
636025
|
636026
|
636027
|
636028
|
636029
|
636030