Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 697677 Details for
Bug 911562
[abrt] noip-2.1.9-11.fc18: strcpy: Process /usr/sbin/noip2 was killed by signal 6 (SIGABRT)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 4.72 KB, created by
totophe56
on 2013-02-15 11:22:16 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
totophe56
Created:
2013-02-15 11:22:16 UTC
Size:
4.72 KB
patch
obsolete
>[New LWP 9363] >Core was generated by `noip2 -C -u dwarf56@hotmail.fr -p 0intdtp2244 -i ribetchris.serveftp.com'. >Program terminated with signal 6, Aborted. >#0 0x0000003379e35ba5 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:63 >63 return INLINE_SYSCALL (tgkill, 3, pid, selftid, sig); > >Thread 1 (LWP 9363): >#0 0x0000003379e35ba5 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:63 > resultvar = 0 > pid = 9363 > selftid = 9363 >#1 0x0000003379e37358 in __GI_abort () at abort.c:90 > save_stage = 2 > act = {__sigaction_handler = {sa_handler = 0x7fffac831d0a, sa_sigaction = 0x7fffac831d0a}, sa_mask = {__val = {6, 221089597346, 2, 140736087661854, 2, 221089590644, 1, 221089597342, 3, 140736087661830, 10, 221089597346, 2, 140736087662512, 7, 140736087664272}}, sa_flags = 51, sa_restorer = 0x5} > sigs = {__val = {32, 0 <repeats 15 times>}} >#2 0x0000003379e7559b in __libc_message (do_abort=do_abort@entry=2, fmt=fmt@entry=0x3379f787ff "*** %s ***: %s terminated\n") at ../sysdeps/unix/sysv/linux/libc_fatal.c:197 > ap = {{gp_offset = 32, fp_offset = 48, overflow_arg_area = 0x7fffac8326a0, reg_save_area = 0x7fffac8325b0}} > ap_copy = {{gp_offset = 16, fp_offset = 48, overflow_arg_area = 0x7fffac8326a0, reg_save_area = 0x7fffac8325b0}} > fd = 3 > on_2 = <optimized out> > list = <optimized out> > nlist = <optimized out> > cp = <optimized out> > written = <optimized out> >#3 0x0000003379f0a697 in __GI___fortify_fail (msg=msg@entry=0x3379f787a5 "buffer overflow detected") at fortify_fail.c:31 >No locals. >#4 0x0000003379f08810 in __GI___chk_fail () at chk_fail.c:28 >No locals. >#5 0x0000000000406dd9 in strcpy (__src=0x7fffac8344f7 "ribetchris.serveftp.com", __dest=0x6101e0 <IPaddress> "ribetchris.serve") at /usr/include/bits/string3.h:104 >No locals. >#6 process_options (argc=argc@entry=8, argv=argv@entry=0x7fffac8327f8) at noip2.c:724 > c = <optimized out> > have_args = 97 >#7 0x0000000000401da5 in main (argc=8, argv=0x7fffac8327f8) at noip2.c:582 > p = <optimized out> > nobody = <optimized out> >From To Syms Read Shared Object Library >0x0000003379e1f1a0 0x0000003379f60940 Yes /lib64/libc.so.6 >0x0000003379a00b20 0x0000003379a1a3d9 Yes /lib64/ld-linux-x86-64.so.2 >0x000000337b602a40 0x000000337b612168 Yes /lib64/libgcc_s.so.1 >$1 = 0x7f5d81e09000 "" >No symbol "__glib_assert_msg" in current context. >rax 0x0 0 >rbx 0x0 0 >rcx 0xffffffffffffffff -1 >rdx 0x6 6 >rsi 0x2493 9363 >rdi 0x2493 9363 >rbp 0x7fffac832690 0x7fffac832690 >rsp 0x7fffac831cd8 0x7fffac831cd8 >r8 0x3379f70540 221089563968 >r9 0x1c 28 >r10 0x8 8 >r11 0x246 582 >r12 0x4 4 >r13 0x5 5 >r14 0x5 5 >r15 0x7fffac831e60 140736087662176 >rip 0x3379e35ba5 0x3379e35ba5 <__GI_raise+53> >eflags 0x246 [ PF ZF IF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >Dump of assembler code for function __GI_raise: > 0x0000003379e35b70 <+0>: mov %fs:0x2d4,%eax > 0x0000003379e35b78 <+8>: mov %fs:0x2d0,%esi > 0x0000003379e35b80 <+16>: test %esi,%esi > 0x0000003379e35b82 <+18>: jne 0x3379e35bb0 <__GI_raise+64> > 0x0000003379e35b84 <+20>: mov $0xba,%eax > 0x0000003379e35b89 <+25>: syscall > 0x0000003379e35b8b <+27>: mov %eax,%esi > 0x0000003379e35b8d <+29>: mov %eax,%fs:0x2d0 > 0x0000003379e35b95 <+37>: movslq %edi,%rdx > 0x0000003379e35b98 <+40>: movslq %esi,%rsi > 0x0000003379e35b9b <+43>: movslq %eax,%rdi > 0x0000003379e35b9e <+46>: mov $0xea,%eax > 0x0000003379e35ba3 <+51>: syscall >=> 0x0000003379e35ba5 <+53>: cmp $0xfffffffffffff000,%rax > 0x0000003379e35bab <+59>: ja 0x3379e35bbf <__GI_raise+79> > 0x0000003379e35bad <+61>: repz retq > 0x0000003379e35baf <+63>: nop > 0x0000003379e35bb0 <+64>: test %eax,%eax > 0x0000003379e35bb2 <+66>: jg 0x3379e35b95 <__GI_raise+37> > 0x0000003379e35bb4 <+68>: test $0x7fffffff,%eax > 0x0000003379e35bb9 <+73>: je 0x3379e35bd0 <__GI_raise+96> > 0x0000003379e35bbb <+75>: neg %eax > 0x0000003379e35bbd <+77>: jmp 0x3379e35b95 <__GI_raise+37> > 0x0000003379e35bbf <+79>: mov 0x37b272(%rip),%rdx # 0x337a1b0e38 > 0x0000003379e35bc6 <+86>: neg %eax > 0x0000003379e35bc8 <+88>: mov %eax,%fs:(%rdx) > 0x0000003379e35bcb <+91>: or $0xffffffffffffffff,%rax > 0x0000003379e35bcf <+95>: retq > 0x0000003379e35bd0 <+96>: mov %esi,%eax > 0x0000003379e35bd2 <+98>: jmp 0x3379e35b95 <__GI_raise+37> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 911562
: 697677 |
697678
|
697679
|
697680
|
697681
|
697682
|
697683
|
697684
|
697685
|
697686