Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 692026 Details for
Bug 907025
[abrt] pptp-1.7.2-18.fc18: binary_search: Process /usr/sbin/pptp was killed by signal 11 (SIGSEGV)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 7.05 KB, created by
Dmitriy
on 2013-02-02 18:48:06 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Dmitriy
Created:
2013-02-02 18:48:06 UTC
Size:
7.05 KB
patch
obsolete
>warning: core file may not match specified executable file. >[New LWP 18127] >Core was generated by `/sbin/pptp 213.85.131.82 --nolaunchpppd --loglevel 0 --logstring nm-pptp-servic'. >Program terminated with signal 11, Segmentation fault. >#0 binary_search (v=0x8f47530, v=0x8f47530, key=42104) at vector.c:149 >149 if (key < v->item[x].key) r = x - 1; else l = x + 1; > >Thread 1 (LWP 18127): >#0 binary_search (v=0x8f47530, v=0x8f47530, key=42104) at vector.c:149 > l = 0 > r = 1276093567 > x = 638046783 >#1 vector_contains (v=0x8f47530, key=42104) at vector.c:138 > __PRETTY_FUNCTION__ = "vector_contains" >#2 0x0804bf74 in pptp_call_destroy (conn=0x8f47470, call=0x4c0fa478 <main_arena+88>) at pptp_ctrl.c:410 > __PRETTY_FUNCTION__ = "pptp_call_destroy" >#3 0x0804c079 in pptp_conn_destroy (conn=conn@entry=0x8f47470) at pptp_ctrl.c:449 > i = 0 > __PRETTY_FUNCTION__ = "pptp_conn_destroy" >#4 0x0805127e in callmgr_main (argc=argc@entry=3, argv=argv@entry=0xbfbe2960, envp=envp@entry=0xbfbe3cf4) at pptp_callmgr.c:304 > rc = <optimized out> > read_set = {__fds_bits = {0 <repeats 32 times>}} > write_set = {__fds_bits = {0 <repeats 32 times>}} > tv = {tv_sec = 0, tv_usec = 0} > inetaddr = {s_addr = 1384338901} > inet_sock = 0 > unix_sock = 1 > call_set = {__fds_bits = {0 <repeats 32 times>}} > conn = 0x8f47470 > call_list = 0x8f49658 > max_fd = 6 > first = 0 > retval = <optimized out> > i = <optimized out> > phonenr = 0x0 > __FUNCTION__ = "callmgr_main" > __PRETTY_FUNCTION__ = "callmgr_main" >#5 0x0804a4b2 in launch_callmgr (inetaddr=inetaddr@entry=..., phonenr=phonenr@entry=0x0, argc=argc@entry=7, argv=argv@entry=0xbfbe3cd4, envp=envp@entry=0xbfbe3cf4) at pptp.c:527 > my_argv = {0xbfbe3ece "/sbin/pptp", 0xb773e6a0 "213.85.131.82", 0x0} > buf = "pptp: call manager for 213.85.131.82\000\252\017L\314)\276\277\371\300\373K\000\240\017L\320\270\017L\000\000\000\000\370)\276\277\357\377\377Kf@\005\b\314)\276\277\334)\276\277\003\000\000\000\300\346s\267\000\000\000\000\000\000\000\000\240)\276\277\062\065\065.255.255\000\000\240\017L85.131.8\253\377\377K" > rc = <optimized out> >#6 0x0804a664 in open_callmgr (inetaddr=..., phonenr=0x0, argc=argc@entry=7, argv=argv@entry=0xbfbe3cd4, envp=envp@entry=0xbfbe3cf4, pty_fd=0, gre_fd=gre_fd@entry=4) at pptp.c:496 > where = {a = {sa_family = 1, sa_data = "/var/run/pptp/"}, u = {sun_family = 1, sun_path = "/var/run/pptp/255.255.255.255:213.85.131.82\000\221\256\004\b\004\000\000\000\254*\276\277\020\000\000\000\000\000\000\000D+\276\277\000\000\000\000\240\275\017L\030+\276\277\331>\276\277\a\000\000\000(<\276\277\034\243\004\b\331>\276\277\324<\276\277@$\005\b"}} > i = 0 > fd = 1 > pid = <optimized out> > status = -1078056324 > __FUNCTION__ = "open_callmgr" >#7 0x0804996e in main (argc=7, argv=0xbfbe3cd4, envp=0xbfbe3cf4) at pptp.c:394 > inetaddr = {s_addr = 1384338901} > callmgr_sock = -1 > ttydev = '\000' <repeats 2028 times>"\313, i\363Kxvu\267\\4\276\277\300O\364K86\276\277+\277\362K\000\260\017L\334*\000\000\003\000\000\000\062\000\000\000\377\377\377\377", '\000' <repeats 24 times>"\330, su\267\234\064\276\277\000\200\364K\000\200\017LPr\017LPr\017L\000\000\000\000\005\000\000\000\000\200\017L\000\260\017L\274\256\017L\334\332\017L\000\000\033\000\003\000\000\000r\002\000\000r\002\000\000#\257\363K\b\000\000\000r\002\000\000\000\240\nOl\231\nO\300O\364Kxvu\267/\000\000\000#\257\363K\b\000\000\000\017\000\000\000\210\260\nO\000\020\000\000\300O\364K\020\000\000\000\300O\364K@\004\363K\360xu\267hvu\267\017\000\000\000M\001\363K\334T\364K\320xu\267\016\000\000\000\017\000\000\000hvu\267\300su\267\n\000\000\000xvu\267\334T\364K0vu\267y\001\363K\300O\364K\000\000\000\000x"... > tty_name = <optimized out> > pty_fd = 0 > tty_fd = 0 > gre_fd = 4 > rc = <optimized out> > parent_pid = 0 > child_pid = 638046783 > call_id = <optimized out> > peer_call_id = <optimized out> > buf = '\000' <repeats 127 times> > pppdargc = <optimized out> > pppdargv = <optimized out> > phonenrbuf = '\000' <repeats 64 times> > phonenr = 0x0 > launchpppd = 0 > debug = 0 > __FUNCTION__ = "main" >From To Syms Read Shared Object Library >0x4f0a8a90 0x4f0a9540 Yes /lib/libutil.so.1 >0x4bf5f0b0 0x4c0a2fbc Yes /lib/libc.so.6 >0x4bf25850 0x4bf3df7c Yes /lib/ld-linux.so.2 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >eax 0x2607d23f 638046783 >ecx 0x0 0 >edx 0x4c0fa47f 1276093567 >ebx 0x0 0 >esp 0xbfbe2650 0xbfbe2650 >ebp 0xbfbe282c 0xbfbe282c >esi 0xa478 42104 >edi 0x4c0fa480 1276093568 >eip 0x804ec5c 0x804ec5c <vector_contains+60> >eflags 0x10207 [ CF PF IF RF ] >cs 0x73 115 >ss 0x7b 123 >ds 0x7b 123 >es 0x7b 123 >fs 0x0 0 >gs 0x33 51 >Dump of assembler code for function vector_contains: > 0x0804ec20 <+0>: push %edi > 0x0804ec21 <+1>: push %esi > 0x0804ec22 <+2>: push %ebx > 0x0804ec23 <+3>: lea -0x10(%esp),%esp > 0x0804ec27 <+7>: mov 0x20(%esp),%eax > 0x0804ec2b <+11>: mov 0x24(%esp),%esi > 0x0804ec2f <+15>: test %eax,%eax > 0x0804ec31 <+17>: je 0x804ec82 <vector_contains+98> > 0x0804ec33 <+19>: mov 0x4(%eax),%edx > 0x0804ec36 <+22>: mov (%eax),%edi > 0x0804ec38 <+24>: sub $0x1,%edx > 0x0804ec3b <+27>: js 0x804ec78 <vector_contains+88> > 0x0804ec3d <+29>: xor %ecx,%ecx > 0x0804ec3f <+31>: jmp 0x804ec4f <vector_contains+47> > 0x0804ec41 <+33>: lea 0x0(%esi,%eiz,1),%esi > 0x0804ec48 <+40>: lea -0x1(%eax),%edx > 0x0804ec4b <+43>: cmp %ecx,%edx > 0x0804ec4d <+45>: jl 0x804ec78 <vector_contains+88> > 0x0804ec4f <+47>: mov %ecx,%eax > 0x0804ec51 <+49>: add %edx,%eax > 0x0804ec53 <+51>: mov %eax,%ebx > 0x0804ec55 <+53>: shr $0x1f,%ebx > 0x0804ec58 <+56>: add %ebx,%eax > 0x0804ec5a <+58>: sar %eax >=> 0x0804ec5c <+60>: mov (%edi,%eax,8),%ebx > 0x0804ec5f <+63>: cmp %ebx,%esi > 0x0804ec61 <+65>: jl 0x804ec48 <vector_contains+40> > 0x0804ec63 <+67>: cmp %ebx,%esi > 0x0804ec65 <+69>: lea 0x1(%eax),%ecx > 0x0804ec68 <+72>: jne 0x804ec4b <vector_contains+43> > 0x0804ec6a <+74>: lea 0x10(%esp),%esp > 0x0804ec6e <+78>: mov $0x1,%eax > 0x0804ec73 <+83>: pop %ebx > 0x0804ec74 <+84>: pop %esi > 0x0804ec75 <+85>: pop %edi > 0x0804ec76 <+86>: ret > 0x0804ec77 <+87>: nop > 0x0804ec78 <+88>: lea 0x10(%esp),%esp > 0x0804ec7c <+92>: xor %eax,%eax > 0x0804ec7e <+94>: pop %ebx > 0x0804ec7f <+95>: pop %esi > 0x0804ec80 <+96>: pop %edi > 0x0804ec81 <+97>: ret > 0x0804ec82 <+98>: movl $0x8053de7,0xc(%esp) > 0x0804ec8a <+106>: movl $0x89,0x8(%esp) > 0x0804ec92 <+114>: movl $0x8053c90,0x4(%esp) > 0x0804ec9a <+122>: movl $0x8053c99,(%esp) > 0x0804eca1 <+129>: call 0x80493f0 <__assert_fail@plt> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 907025
: 692026 |
692027
|
692028
|
692029
|
692030
|
692031
|
692032
|
692033
|
692034
|
692035