Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 678354 Details for
Bug 895167
[abrt] sed-4.2.1-10.fc18: re_node_set_compare: Process /usr/bin/sed was killed by signal 11 (SIGSEGV)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 9.54 KB, created by
Jan Teichmann
on 2013-01-14 17:56:48 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Jan Teichmann
Created:
2013-01-14 17:56:48 UTC
Size:
9.54 KB
patch
obsolete
>[New LWP 4489] >Core was generated by `sed -e s/.*release.*//'. >Program terminated with signal 11, Segmentation fault. >#0 0x00007f675b6e8fc0 in re_node_set_compare (set2=<optimized out>, set1=<optimized out>) at regex_internal.c:1521 >1521 re_acquire_state_context (reg_errcode_t *err, const re_dfa_t *dfa, > >Thread 1 (LWP 4489): >#0 0x00007f675b6e8fc0 in re_node_set_compare (set2=<optimized out>, set1=<optimized out>) at regex_internal.c:1521 > i = <optimized out> >#1 re_node_set_compare (set2=<optimized out>, set1=<optimized out>) at regex_internal.c:1521 >No locals. >#2 re_acquire_state_context (err=0x7fffcd35aa70, err@entry=<error reading variable: Cannot access memory at address 0x7fffcd35e048>, dfa=0x1895b00, nodes=0x7fffcd35aa80, context=0, context=0) at regex_internal.c:1541 > state = 0x18962c0 > new_state = <optimized out> > spot = 0x1895cc0 > i = 1 >From To Syms Read Shared Object Library >0x000000304b206170 0x000000304b2175d4 Yes /lib64/libselinux.so.1 >0x00007f675b63e1a0 0x00007f675b77f940 Yes /lib64/libc.so.6 >0x00007f675b3c2db0 0x00007f675b4062e8 Yes /lib64/libpcre.so.1 >0x00007f675b1bded0 0x00007f675b1be9f0 Yes /lib64/libdl.so.2 >0x00007f675b9d7b20 0x00007f675b9f13d9 Yes /lib64/ld-linux-x86-64.so.2 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0x18962c0 25780928 >rbx 0x7fffcd35aa70 140736636234352 >rcx 0x0 0 >rdx 0x1 1 >rsi 0x7fffcd35aa80 140736636234368 >rdi 0x1895b00 25778944 >rbp 0x7fffcd35ab20 0x7fffcd35ab20 >rsp 0x7fffcd35e000 0x7fffcd35e000 >r8 0x0 0 >r9 0x1896340 25781056 >r10 0x7 7 >r11 0x1896360 25781088 >r12 0x18962c8 25780936 >r13 0x1896760 25782112 >r14 0x1895b00 25778944 >r15 0x1c 28 >rip 0x7f675b6e8fc0 0x7f675b6e8fc0 <re_acquire_state_context+288> >eflags 0x10297 [ CF PF AF SF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >Dump of assembler code for function re_acquire_state_context: > 0x00007f675b6e8ea0 <+0>: push %r15 > 0x00007f675b6e8ea2 <+2>: push %r14 > 0x00007f675b6e8ea4 <+4>: push %r13 > 0x00007f675b6e8ea6 <+6>: push %r12 > 0x00007f675b6e8ea8 <+8>: push %rbp > 0x00007f675b6e8ea9 <+9>: push %rbx > 0x00007f675b6e8eaa <+10>: mov %rdi,%rbx > 0x00007f675b6e8ead <+13>: mov %rsi,%rdi > 0x00007f675b6e8eb0 <+16>: mov %rdx,%rsi > 0x00007f675b6e8eb3 <+19>: sub $0x18,%rsp > 0x00007f675b6e8eb7 <+23>: mov 0x4(%rdx),%r10d > 0x00007f675b6e8ebb <+27>: cmp $0x0,%r10d > 0x00007f675b6e8ebf <+31>: je 0x7f675b6e903b <re_acquire_state_context+411> > 0x00007f675b6e8ec5 <+37>: mov %r10d,%ecx > 0x00007f675b6e8ec8 <+40>: jle 0x7f675b6e8f97 <re_acquire_state_context+247> > 0x00007f675b6e8ece <+46>: mov 0x8(%rdx),%r11 > 0x00007f675b6e8ed2 <+50>: mov %r11,%rdx > 0x00007f675b6e8ed5 <+53>: mov %r11,%r8 > 0x00007f675b6e8ed8 <+56>: and $0xf,%edx > 0x00007f675b6e8edb <+59>: shr $0x2,%rdx > 0x00007f675b6e8edf <+63>: neg %rdx > 0x00007f675b6e8ee2 <+66>: and $0x3,%edx > 0x00007f675b6e8ee5 <+69>: cmp %edx,%r10d > 0x00007f675b6e8ee8 <+72>: cmovbe %r10d,%edx > 0x00007f675b6e8eec <+76>: cmp $0x7,%r10d > 0x00007f675b6e8ef0 <+80>: cmovbe %r10d,%edx > 0x00007f675b6e8ef4 <+84>: test %edx,%edx > 0x00007f675b6e8ef6 <+86>: je 0x7f675b6e905a <re_acquire_state_context+442> > 0x00007f675b6e8efc <+92>: xor %eax,%eax > 0x00007f675b6e8efe <+94>: xchg %ax,%ax > 0x00007f675b6e8f00 <+96>: add $0x1,%eax > 0x00007f675b6e8f03 <+99>: add (%r8),%ecx > 0x00007f675b6e8f06 <+102>: add $0x4,%r8 > 0x00007f675b6e8f0a <+106>: cmp %edx,%eax > 0x00007f675b6e8f0c <+108>: jb 0x7f675b6e8f00 <re_acquire_state_context+96> > 0x00007f675b6e8f0e <+110>: cmp %edx,%r10d > 0x00007f675b6e8f11 <+113>: je 0x7f675b6e8f97 <re_acquire_state_context+247> > 0x00007f675b6e8f17 <+119>: mov %r10d,%r12d > 0x00007f675b6e8f1a <+122>: mov %edx,%r8d > 0x00007f675b6e8f1d <+125>: sub %edx,%r12d > 0x00007f675b6e8f20 <+128>: mov %r12d,%edx > 0x00007f675b6e8f23 <+131>: shr $0x2,%edx > 0x00007f675b6e8f26 <+134>: lea 0x0(,%rdx,4),%ebp > 0x00007f675b6e8f2d <+141>: test %ebp,%ebp > 0x00007f675b6e8f2f <+143>: je 0x7f675b6e8f7d <re_acquire_state_context+221> > 0x00007f675b6e8f31 <+145>: pxor %xmm0,%xmm0 > 0x00007f675b6e8f35 <+149>: lea (%r11,%r8,4),%r9 > 0x00007f675b6e8f39 <+153>: xor %r8d,%r8d > 0x00007f675b6e8f3c <+156>: nopl 0x0(%rax) > 0x00007f675b6e8f40 <+160>: add $0x1,%r8d > 0x00007f675b6e8f44 <+164>: paddd (%r9),%xmm0 > 0x00007f675b6e8f49 <+169>: add $0x10,%r9 > 0x00007f675b6e8f4d <+173>: cmp %edx,%r8d > 0x00007f675b6e8f50 <+176>: jb 0x7f675b6e8f40 <re_acquire_state_context+160> > 0x00007f675b6e8f52 <+178>: movdqa %xmm0,%xmm1 > 0x00007f675b6e8f56 <+182>: add %ebp,%eax > 0x00007f675b6e8f58 <+184>: psrldq $0x8,%xmm1 > 0x00007f675b6e8f5d <+189>: paddd %xmm1,%xmm0 > 0x00007f675b6e8f61 <+193>: movdqa %xmm0,%xmm1 > 0x00007f675b6e8f65 <+197>: psrldq $0x4,%xmm1 > 0x00007f675b6e8f6a <+202>: paddd %xmm1,%xmm0 > 0x00007f675b6e8f6e <+206>: movd %xmm0,0xc(%rsp) > 0x00007f675b6e8f74 <+212>: add 0xc(%rsp),%ecx > 0x00007f675b6e8f78 <+216>: cmp %ebp,%r12d > 0x00007f675b6e8f7b <+219>: je 0x7f675b6e8f97 <re_acquire_state_context+247> > 0x00007f675b6e8f7d <+221>: movslq %eax,%rdx > 0x00007f675b6e8f80 <+224>: lea (%r11,%rdx,4),%r8 > 0x00007f675b6e8f84 <+228>: nopl 0x0(%rax) > 0x00007f675b6e8f88 <+232>: add $0x1,%eax > 0x00007f675b6e8f8b <+235>: add (%r8),%ecx > 0x00007f675b6e8f8e <+238>: add $0x4,%r8 > 0x00007f675b6e8f92 <+242>: cmp %eax,%r10d > 0x00007f675b6e8f95 <+245>: jg 0x7f675b6e8f88 <re_acquire_state_context+232> > 0x00007f675b6e8f97 <+247>: mov %ecx,%eax > 0x00007f675b6e8f99 <+249>: and 0x84(%rdi),%eax > 0x00007f675b6e8f9f <+255>: shl $0x4,%rax > 0x00007f675b6e8fa3 <+259>: add 0x40(%rdi),%rax > 0x00007f675b6e8fa7 <+263>: mov (%rax),%edx > 0x00007f675b6e8fa9 <+265>: test %edx,%edx > 0x00007f675b6e8fab <+267>: jle 0x7f675b6e9020 <re_acquire_state_context+384> > 0x00007f675b6e8fad <+269>: movslq %r10d,%r15 > 0x00007f675b6e8fb0 <+272>: mov 0x8(%rax),%r9 > 0x00007f675b6e8fb4 <+276>: xor %r8d,%r8d > 0x00007f675b6e8fb7 <+279>: shl $0x2,%r15 > 0x00007f675b6e8fbb <+283>: jmp 0x7f675b6e8fc9 <re_acquire_state_context+297> > 0x00007f675b6e8fbd <+285>: nopl (%rax) >=> 0x00007f675b6e8fc0 <+288>: add $0x1,%r8 > 0x00007f675b6e8fc4 <+292>: cmp %r8d,%edx > 0x00007f675b6e8fc7 <+295>: jle 0x7f675b6e9020 <re_acquire_state_context+384> > 0x00007f675b6e8fc9 <+297>: mov (%r9,%r8,8),%rax > 0x00007f675b6e8fcd <+301>: cmp (%rax),%ecx > 0x00007f675b6e8fcf <+303>: jne 0x7f675b6e8fc0 <re_acquire_state_context+288> > 0x00007f675b6e8fd1 <+305>: testb $0xf,0x50(%rax) > 0x00007f675b6e8fd5 <+309>: jne 0x7f675b6e8fc0 <re_acquire_state_context+288> > 0x00007f675b6e8fd7 <+311>: mov 0x38(%rax),%r12 > 0x00007f675b6e8fdb <+315>: test %r12,%r12 > 0x00007f675b6e8fde <+318>: je 0x7f675b6e8fc0 <re_acquire_state_context+288> > 0x00007f675b6e8fe0 <+320>: cmp 0x4(%r12),%r10d > 0x00007f675b6e8fe5 <+325>: jne 0x7f675b6e8fc0 <re_acquire_state_context+288> > 0x00007f675b6e8fe7 <+327>: lea -0x4(%r15),%r11 > 0x00007f675b6e8feb <+331>: mov %r10d,%ebp > 0x00007f675b6e8fee <+334>: xchg %ax,%ax > 0x00007f675b6e8ff0 <+336>: sub $0x1,%ebp > 0x00007f675b6e8ff3 <+339>: js 0x7f675b6e902c <re_acquire_state_context+396> > 0x00007f675b6e8ff5 <+341>: mov 0x8(%r12),%r13 > 0x00007f675b6e8ffa <+346>: mov 0x0(%r13,%r11,1),%r14d > 0x00007f675b6e8fff <+351>: mov 0x8(%rsi),%r13 > 0x00007f675b6e9003 <+355>: mov 0x0(%r13,%r11,1),%r13d > 0x00007f675b6e9008 <+360>: sub $0x4,%r11 > 0x00007f675b6e900c <+364>: cmp %r13d,%r14d > 0x00007f675b6e900f <+367>: je 0x7f675b6e8ff0 <re_acquire_state_context+336> > 0x00007f675b6e9011 <+369>: add $0x1,%r8 > 0x00007f675b6e9015 <+373>: cmp %r8d,%edx > 0x00007f675b6e9018 <+376>: jg 0x7f675b6e8fc9 <re_acquire_state_context+297> > 0x00007f675b6e901a <+378>: nopw 0x0(%rax,%rax,1) > 0x00007f675b6e9020 <+384>: xor %edx,%edx > 0x00007f675b6e9022 <+386>: callq 0x7f675b6e8930 <create_cd_newstate> > 0x00007f675b6e9027 <+391>: test %rax,%rax > 0x00007f675b6e902a <+394>: je 0x7f675b6e9052 <re_acquire_state_context+434> > 0x00007f675b6e902c <+396>: add $0x18,%rsp > 0x00007f675b6e9030 <+400>: pop %rbx > 0x00007f675b6e9031 <+401>: pop %rbp > 0x00007f675b6e9032 <+402>: pop %r12 > 0x00007f675b6e9034 <+404>: pop %r13 > 0x00007f675b6e9036 <+406>: pop %r14 > 0x00007f675b6e9038 <+408>: pop %r15 > 0x00007f675b6e903a <+410>: retq > 0x00007f675b6e903b <+411>: movl $0x0,(%rbx) > 0x00007f675b6e9041 <+417>: add $0x18,%rsp > 0x00007f675b6e9045 <+421>: xor %eax,%eax > 0x00007f675b6e9047 <+423>: pop %rbx > 0x00007f675b6e9048 <+424>: pop %rbp > 0x00007f675b6e9049 <+425>: pop %r12 > 0x00007f675b6e904b <+427>: pop %r13 > 0x00007f675b6e904d <+429>: pop %r14 > 0x00007f675b6e904f <+431>: pop %r15 > 0x00007f675b6e9051 <+433>: retq > 0x00007f675b6e9052 <+434>: movl $0xc,(%rbx) > 0x00007f675b6e9058 <+440>: jmp 0x7f675b6e902c <re_acquire_state_context+396> > 0x00007f675b6e905a <+442>: mov %r10d,%ecx > 0x00007f675b6e905d <+445>: xor %eax,%eax > 0x00007f675b6e905f <+447>: jmpq 0x7f675b6e8f17 <re_acquire_state_context+119> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 895167
: 678354 |
678355
|
678356
|
678357
|
678358
|
678359
|
678360
|
678361
|
678362
|
686919