Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 701484 Details for
Bug 914868
[abrt] openssh-clients-6.1p1-5.fc18: RAND_load_file: Process /usr/bin/ssh was killed by signal 11 (SIGSEGV)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 10.42 KB, created by
Jordan Cwang
on 2013-02-23 05:02:09 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Jordan Cwang
Created:
2013-02-23 05:02:09 UTC
Size:
10.42 KB
patch
obsolete
>[New LWP 26905] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `ssh uranium'. >Program terminated with signal 11, Segmentation fault. >#0 0x00007f1900ad5ff5 in RAND_load_file (file=0x6 <Address 0x6 out of bounds>, bytes=0) at randfile.c:107 >107 randfile.c: No such file or directory. > >Thread 1 (Thread 0x7f19013d4800 (LWP 26905)): >#0 0x00007f1900ad5ff5 in RAND_load_file (file=0x6 <Address 0x6 out of bounds>, bytes=0) at randfile.c:107 > buf = "`\000\000\000\000\000\000\000\240\230d\003\031\177\000\000@\341g\001\031\177\000\000<\341g\001\031\177\000\000\360\230d\003\031\177\000\000\000\000\000\000\000\000\000\000\335rD\001\031\177\000\000\005\000\000\000\000\000\000\000\000\264\364&e\373d\317\000\000\000\000\000`\000\000\240\230d\003\031\177\000\000\240\230d\003\031\177\000\000@\341g\001\031\177\000\000<\341g\001\031\177\000\000\360\230d\003\031\177\000\000\000\000\000\000\000\000\000\000OJD\001\031\177\000\000\240Vd\003\031\177\000\000\000\264\364&e\373d\317\240\230d\003\031\177\000\000\273ND\001\031\177\000\000P\000\000\000\000\000\000\000\000\264\364&e\373d\317\000\000\000\000\000\000\000\000 \332C\001\031\177", '\000' <repeats 11 times>"\264, \364&e\373d\317\000\000\000\000\000\000\000\000<\341g\001\031\177\000\000\003", '\000' <repeats 39 times>... > sb = {st_dev = 139745407834272, st_ino = 0, st_nlink = 6, st_mode = 16, st_uid = 0, st_gid = 96, __pad0 = 0, st_rdev = 139745407818144, st_size = 6, st_blksize = 139745362274019, st_blocks = 139745372260362, st_atime = 56908144, st_atimensec = 14944345875385988096, st_mtime = 16, st_mtimensec = 139745372171822, st_ctime = 1, st_ctimensec = 139745407798266, __unused = {1, -3502398198323563520, 6}} > i = <optimized out> > ret = <optimized out> > n = 0 > in = <optimized out> >#1 0x0000000000000000 in ?? () >No symbol table info available. >From To Syms Read Shared Object Library >0x00007f1900fedc60 0x00007f1900fee05c Yes /lib64/libfipscheck.so.1 >0x00007f1900dd1170 0x00007f1900de25d4 Yes (*) /lib64/libselinux.so.1 >0x00007f1900a68fc0 0x00007f1900b4baf8 Yes /lib64/libcrypto.so.10 >0x00007f1900803ed0 0x00007f19008049f0 Yes /lib64/libdl.so.2 >0x00007f19005c3090 0x00007f19005f1998 Yes /lib64/libldap-2.4.so.2 >0x00007f19003a86d0 0x00007f19003afb24 Yes /lib64/liblber-2.4.so.2 >0x00007f19001a2f10 0x00007f19001a3824 Yes /lib64/libutil.so.1 >0x00007f18fff8e190 0x00007f18fff9a640 Yes (*) /lib64/libz.so.1 >0x00007f18ffd77110 0x00007f18ffd84954 Yes /lib64/libnsl.so.1 >0x00007f18ffb3ced0 0x00007f18ffb4210c Yes /lib64/libcrypt.so.1 >0x00007f18ff926a30 0x00007f18ff93500c Yes /lib64/libresolv.so.2 >0x00007f18ff6ead90 0x00007f18ff718264 Yes /lib64/libgssapi_krb5.so.2 >0x00007f18ff416690 0x00007f18ff48e410 Yes /lib64/libkrb5.so.3 >0x00007f18ff1d44d0 0x00007f18ff1ec938 Yes /lib64/libk5crypto.so.3 >0x00007f18fefcd560 0x00007f18fefce144 Yes /lib64/libcom_err.so.2 >0x00007f18fec331a0 0x00007f18fed74940 Yes /lib64/libc.so.6 >0x00007f18fe9b7db0 0x00007f18fe9fb2e8 Yes /lib64/libpcre.so.1 >0x00007f19011f0b20 0x00007f190120a3d9 Yes /lib64/ld-linux-x86-64.so.2 >0x00007f18fe79f870 0x00007f18fe7af514 Yes (*) /lib64/libsasl2.so.2 >0x00007f18fe56b140 0x00007f18fe58c738 Yes /lib64/libssl3.so >0x00007f18fe33dd40 0x00007f18fe3563c0 Yes /lib64/libsmime3.so >0x00007f18fe012650 0x00007f18fe0f5bf4 Yes /lib64/libnss3.so >0x00007f18fddd9c30 0x00007f18fdde7b04 Yes (*) /lib64/libnssutil3.so >0x00007f18fdbcaff0 0x00007f18fdbcbf18 Yes /lib64/libplds4.so >0x00007f18fd9c6510 0x00007f18fd9c7bf4 Yes /lib64/libplc4.so >0x00007f18fd794350 0x00007f18fd7b3df0 Yes /lib64/libnspr4.so >0x00007f18fd570790 0x00007f18fd57b4b4 Yes /lib64/libpthread.so.0 >0x00007f18fd3036c0 0x00007f18fd3499f0 Yes /lib64/libfreebl3.so >0x00007f18fd0f7b50 0x00007f18fd0fd0cc Yes /lib64/libkrb5support.so.0 >0x00007f18fcef2190 0x00007f18fcef2b44 Yes /lib64/libkeyutils.so.1 >0x00007f18fccdda40 0x00007f18fcced168 Yes (*) /lib64/libgcc_s.so.1 >0x00007f18fcad52a0 0x00007f18fcad857c Yes /lib64/librt.so.1 >0x00007f18fc8c81e0 0x00007f18fc8cf67c Yes /lib64/libnss_files.so.2 >(*): Shared library is missing debugging information. >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0x0 0 >rbx 0x6 6 >rcx 0x0 0 >rdx 0x0 0 >rsi 0x0 0 >rdi 0x6 6 >rbp 0x0 0x0 >rsp 0x7fff6788c638 0x7fff6788c638 >r8 0x5 5 >r9 0x0 0 >r10 0x0 0 >r11 0x7f18feca7c2a 139745330625578 >r12 0x0 0 >r13 0x0 0 >r14 0x5 5 >r15 0x0 0 >rip 0x7f1900ad5ff5 0x7f1900ad5ff5 <RAND_load_file+53> >eflags 0x10246 [ PF ZF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >Dump of assembler code for function RAND_load_file: > 0x00007f1900ad5fc0 <+0>: mov %r12,-0x20(%rsp) > 0x00007f1900ad5fc5 <+5>: mov %rbx,-0x30(%rsp) > 0x00007f1900ad5fca <+10>: mov %rdi,%r12 > 0x00007f1900ad5fcd <+13>: mov %rbp,-0x28(%rsp) > 0x00007f1900ad5fd2 <+18>: mov %r13,-0x18(%rsp) > 0x00007f1900ad5fd7 <+23>: mov %r14,-0x10(%rsp) > 0x00007f1900ad5fdc <+28>: mov %r15,-0x8(%rsp) > 0x00007f1900ad5fe1 <+33>: sub $0x4d8,%rsp > 0x00007f1900ad5fe8 <+40>: mov %fs:0x28,%rax > 0x00007f1900ad5ff1 <+49>: mov %rax,0x498(%rsp) > 0x00007f1900ad5ff9 <+57>: xor %eax,%eax > 0x00007f1900ad5ffb <+59>: test %rdi,%rdi > 0x00007f1900ad5ffe <+62>: je 0x7f1900ad603a <RAND_load_file+122> > 0x00007f1900ad6000 <+64>: xor %eax,%eax > 0x00007f1900ad6002 <+66>: mov $0x12,%ecx > 0x00007f1900ad6007 <+71>: mov %rsp,%rdi > 0x00007f1900ad600a <+74>: rep stos %rax,%es:(%rdi) > 0x00007f1900ad600d <+77>: mov %rsi,%rbx > 0x00007f1900ad6010 <+80>: mov %rsp,%rdx > 0x00007f1900ad6013 <+83>: mov %r12,%rsi > 0x00007f1900ad6016 <+86>: mov $0x1,%edi > 0x00007f1900ad601b <+91>: callq 0x7f1900a68cd0 <__xstat@plt> > 0x00007f1900ad6020 <+96>: test %eax,%eax > 0x00007f1900ad6022 <+98>: js 0x7f1900ad603a <RAND_load_file+122> > 0x00007f1900ad6024 <+100>: xorpd %xmm0,%xmm0 > 0x00007f1900ad6028 <+104>: mov $0x90,%esi > 0x00007f1900ad602d <+109>: mov %rsp,%rdi > 0x00007f1900ad6030 <+112>: callq 0x7f1900ad6670 <RAND_add> > 0x00007f1900ad6035 <+117>: test %rbx,%rbx > 0x00007f1900ad6038 <+120>: jne 0x7f1900ad6090 <RAND_load_file+208> > 0x00007f1900ad603a <+122>: xor %r13d,%r13d > 0x00007f1900ad603d <+125>: mov 0x498(%rsp),%rdx > 0x00007f1900ad6045 <+133>: xor %fs:0x28,%rdx > 0x00007f1900ad604e <+142>: mov %r13d,%eax > 0x00007f1900ad6051 <+145>: jne 0x7f1900ad616a <RAND_load_file+426> > 0x00007f1900ad6057 <+151>: mov 0x4a8(%rsp),%rbx > 0x00007f1900ad605f <+159>: mov 0x4b0(%rsp),%rbp > 0x00007f1900ad6067 <+167>: mov 0x4b8(%rsp),%r12 > 0x00007f1900ad606f <+175>: mov 0x4c0(%rsp),%r13 > 0x00007f1900ad6077 <+183>: mov 0x4c8(%rsp),%r14 > 0x00007f1900ad607f <+191>: mov 0x4d0(%rsp),%r15 > 0x00007f1900ad6087 <+199>: add $0x4d8,%rsp > 0x00007f1900ad608e <+206>: retq > 0x00007f1900ad608f <+207>: nop > 0x00007f1900ad6090 <+208>: lea 0x8bac1(%rip),%rsi # 0x7f1900b61b58 > 0x00007f1900ad6097 <+215>: mov %r12,%rdi > 0x00007f1900ad609a <+218>: callq 0x7f1900a68e60 <fopen@plt> > 0x00007f1900ad609f <+223>: test %rax,%rax > 0x00007f1900ad60a2 <+226>: mov %rax,%r15 > 0x00007f1900ad60a5 <+229>: je 0x7f1900ad603a <RAND_load_file+122> > 0x00007f1900ad60a7 <+231>: testl $0x6000,0x18(%rsp) > 0x00007f1900ad60af <+239>: je 0x7f1900ad60cf <RAND_load_file+271> > 0x00007f1900ad60b1 <+241>: cmp $0xffffffffffffffff,%rbx > 0x00007f1900ad60b5 <+245>: mov $0x800,%eax > 0x00007f1900ad60ba <+250>: mov $0x2,%edx > 0x00007f1900ad60bf <+255>: cmove %rax,%rbx > 0x00007f1900ad60c3 <+259>: mov %r15,%rdi > 0x00007f1900ad60c6 <+262>: xor %ecx,%ecx > 0x00007f1900ad60c8 <+264>: xor %esi,%esi > 0x00007f1900ad60ca <+266>: callq 0x7f1900a68de0 <setvbuf@plt> > 0x00007f1900ad60cf <+271>: xor %r13d,%r13d > 0x00007f1900ad60d2 <+274>: test %rbx,%rbx > 0x00007f1900ad60d5 <+277>: lea 0x90(%rsp),%r14 > 0x00007f1900ad60dd <+285>: jg 0x7f1900ad60f3 <RAND_load_file+307> > 0x00007f1900ad60df <+287>: jmp 0x7f1900ad613e <RAND_load_file+382> > 0x00007f1900ad60e1 <+289>: nopl 0x0(%rax) > 0x00007f1900ad60e8 <+296>: movslq %r12d,%r12 > 0x00007f1900ad60eb <+299>: sub %r12,%rbx > 0x00007f1900ad60ee <+302>: test %rbx,%rbx > 0x00007f1900ad60f1 <+305>: jle 0x7f1900ad6150 <RAND_load_file+400> > 0x00007f1900ad60f3 <+307>: cmp $0x3ff,%rbx > 0x00007f1900ad60fa <+314>: mov $0x400,%r12d > 0x00007f1900ad6100 <+320>: mov $0x400,%ecx > 0x00007f1900ad6105 <+325>: cmovle %ebx,%r12d > 0x00007f1900ad6109 <+329>: cmovle %rbx,%rcx > 0x00007f1900ad610d <+333>: mov %r15,%r8 > 0x00007f1900ad6110 <+336>: mov $0x1,%edx > 0x00007f1900ad6115 <+341>: mov $0x400,%esi > 0x00007f1900ad611a <+346>: mov %r14,%rdi > 0x00007f1900ad611d <+349>: callq 0x7f1900a68e20 <__fread_chk@plt> > 0x00007f1900ad6122 <+354>: test %eax,%eax > 0x00007f1900ad6124 <+356>: mov %eax,%ebp > 0x00007f1900ad6126 <+358>: jle 0x7f1900ad6150 <RAND_load_file+400> > 0x00007f1900ad6128 <+360>: cvtsi2sd %eax,%xmm0 > 0x00007f1900ad612c <+364>: mov %eax,%esi > 0x00007f1900ad612e <+366>: mov %r14,%rdi > 0x00007f1900ad6131 <+369>: add %ebp,%r13d > 0x00007f1900ad6134 <+372>: callq 0x7f1900ad6670 <RAND_add> > 0x00007f1900ad6139 <+377>: test %rbx,%rbx > 0x00007f1900ad613c <+380>: jg 0x7f1900ad60e8 <RAND_load_file+296> > 0x00007f1900ad613e <+382>: mov $0x400,%ecx > 0x00007f1900ad6143 <+387>: mov $0x400,%r12d > 0x00007f1900ad6149 <+393>: jmp 0x7f1900ad610d <RAND_load_file+333> > 0x00007f1900ad614b <+395>: nopl 0x0(%rax,%rax,1) > 0x00007f1900ad6150 <+400>: mov %r15,%rdi > 0x00007f1900ad6153 <+403>: callq 0x7f1900a689f0 <fclose@plt> > 0x00007f1900ad6158 <+408>: mov $0x400,%esi > 0x00007f1900ad615d <+413>: mov %r14,%rdi > 0x00007f1900ad6160 <+416>: callq 0x7f1900a6c8a0 <OPENSSL_cleanse> > 0x00007f1900ad6165 <+421>: jmpq 0x7f1900ad603d <RAND_load_file+125> > 0x00007f1900ad616a <+426>: callq 0x7f1900a68a40 <__stack_chk_fail@plt> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 914868
: 701484 |
701485
|
701486
|
701487
|
701488
|
701489
|
701490
|
701491
|
701492
|
701493