Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 704868 Details for
Bug 917573
[abrt] alsa-tools-1.0.26.1-1.fc18: main: Process /usr/bin/hdspmixer was killed by signal 11 (SIGSEGV)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 6.57 KB, created by
Moez Roy
on 2013-03-04 11:18:17 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Moez Roy
Created:
2013-03-04 11:18:17 UTC
Size:
6.57 KB
patch
obsolete
>[New LWP 2587] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `hdspmixer'. >Program terminated with signal 11, Segmentation fault. >#0 __GI___libc_free (mem=0x2) at malloc.c:2907 >2907 malloc.c: No such file or directory. > >Thread 1 (Thread 0x7f94f3e95740 (LWP 2587)): >#0 __GI___libc_free (mem=0x2) at malloc.c:2907 > ar_ptr = <optimized out> > p = <optimized out> > hook = 0x0 >#1 0x0000000000404344 in main (argc=1, argv=0x7fff233254a8) at hdspmixer.cxx:105 > window = <optimized out> > shortname = 0x32f7bb1740 <main_arena> "" > card = -1 > cards = 0 > hdsp_cards = {0x20, 0x1, 0x1} > name = 0x2 <Address 0x2 out of bounds> >From To Syms Read Shared Object Library >0x00000032fd82c990 0x00000032fd8a56c0 Yes /lib64/libasound.so.2 >0x00000032f7c00ed0 0x00000032f7c019f0 Yes /lib64/libdl.so.2 >0x00000032f8005790 0x00000032f80104b4 Yes /lib64/libpthread.so.0 >0x00000032f8c055b0 0x00000032f8c6fd68 Yes /lib64/libm.so.6 >0x00000034f884e4b0 0x00000034f88cb948 Yes /lib64/libfltk.so.1.3 >0x00000032fb85bb80 0x00000032fb8c10bb Yes /lib64/libstdc++.so.6 >0x00000032f9802a40 0x00000032f9812168 Yes /lib64/libgcc_s.so.1 >0x00000032f781f1a0 0x00000032f7960940 Yes /lib64/libc.so.6 >0x00000032f84022a0 0x00000032f840557c Yes /lib64/librt.so.1 >0x00000032f7400b20 0x00000032f741a3d9 Yes /lib64/ld-linux-x86-64.so.2 >0x0000003306402ab0 0x00000033064076ec Yes /lib64/libXcursor.so.1 >0x0000003302801530 0x0000003302803da8 Yes /lib64/libXfixes.so.3 >0x00000032fc803740 0x00000032fc80d810 Yes /lib64/libXext.so.6 >0x00000032fa0041f0 0x00000032fa010f48 Yes /lib64/libXft.so.2 >0x0000003300406220 0x000000330042260c Yes /lib64/libfontconfig.so.1 >0x00000032ff400b40 0x00000032ff401458 Yes /lib64/libXinerama.so.1 >0x00000032fc41dee0 0x00000032fc4a4280 Yes /lib64/libX11.so.6 >0x00000032fdc01ab0 0x00000032fdc07a00 Yes /lib64/libXrender.so.1 >0x00000032ff80cc80 0x00000032ff876ef0 Yes /lib64/libfreetype.so.6 >0x00000032fe403e00 0x00000032fe41ccdc Yes /lib64/libexpat.so.1 >0x00000032fc009a00 0x00000032fc0158f8 Yes /lib64/libxcb.so.1 >0x00000032fbc00eb0 0x00000032fbc01bcc Yes /lib64/libXau.so.6 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0x0 0 >rbx 0x0 0 >rcx 0xffffffffffffff60 -160 >rdx 0x0 0 >rsi 0x80000 524288 >rdi 0x2 2 >rbp 0x0 0x0 >rsp 0x7fff23325328 0x7fff23325328 >r8 0x32f78493ee 218901025774 >r9 0x32f7bb0a20 218904594976 >r10 0x20656573202c6572 2334383526996895090 >r11 0x246 582 >r12 0x1e 30 >r13 0x1d 29 >r14 0x1 1 >r15 0x7fff233254a8 140733783889064 >rip 0x32f787f8ec 0x32f787f8ec <__GI___libc_free+28> >eflags 0x10202 [ IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >Dump of assembler code for function __GI___libc_free: > 0x00000032f787f8d0 <+0>: mov 0x3315e9(%rip),%rax # 0x32f7bb0ec0 > 0x00000032f787f8d7 <+7>: mov (%rax),%rax > 0x00000032f787f8da <+10>: test %rax,%rax > 0x00000032f787f8dd <+13>: jne 0x32f787f9a2 <__GI___libc_free+210> > 0x00000032f787f8e3 <+19>: test %rdi,%rdi > 0x00000032f787f8e6 <+22>: je 0x32f787f9a0 <__GI___libc_free+208> >=> 0x00000032f787f8ec <+28>: mov -0x8(%rdi),%rax > 0x00000032f787f8f0 <+32>: lea -0x10(%rdi),%rsi > 0x00000032f787f8f4 <+36>: test $0x2,%al > 0x00000032f787f8f6 <+38>: jne 0x32f787f920 <__GI___libc_free+80> > 0x00000032f787f8f8 <+40>: test $0x4,%al > 0x00000032f787f8fa <+42>: lea 0x331e3f(%rip),%rdi # 0x32f7bb1740 <main_arena> > 0x00000032f787f901 <+49>: je 0x32f787f90f <__GI___libc_free+63> > 0x00000032f787f903 <+51>: mov %rsi,%rax > 0x00000032f787f906 <+54>: and $0xfffffffffc000000,%rax > 0x00000032f787f90c <+60>: mov (%rax),%rdi > 0x00000032f787f90f <+63>: xor %edx,%edx > 0x00000032f787f911 <+65>: jmpq 0x32f787c3a0 <_int_free> > 0x00000032f787f916 <+70>: nopw %cs:0x0(%rax,%rax,1) > 0x00000032f787f920 <+80>: mov 0x33188e(%rip),%edx # 0x32f7bb11b4 <mp_+52> > 0x00000032f787f926 <+86>: test %edx,%edx > 0x00000032f787f928 <+88>: jne 0x32f787f958 <__GI___libc_free+136> > 0x00000032f787f92a <+90>: cmp 0x33185f(%rip),%rax # 0x32f7bb1190 <mp_+16> > 0x00000032f787f931 <+97>: jbe 0x32f787f958 <__GI___libc_free+136> > 0x00000032f787f933 <+99>: cmp $0x2000000,%rax > 0x00000032f787f939 <+105>: ja 0x32f787f958 <__GI___libc_free+136> > 0x00000032f787f93b <+107>: and $0xfffffffffffffff8,%rax > 0x00000032f787f93f <+111>: lea (%rax,%rax,1),%rdx > 0x00000032f787f943 <+115>: mov %rax,0x331846(%rip) # 0x32f7bb1190 <mp_+16> > 0x00000032f787f94a <+122>: mov %rdx,0x33182f(%rip) # 0x32f7bb1180 <mp_> > 0x00000032f787f951 <+129>: jmp 0x32f787f95c <__GI___libc_free+140> > 0x00000032f787f953 <+131>: nopl 0x0(%rax,%rax,1) > 0x00000032f787f958 <+136>: and $0xfffffffffffffff8,%rax > 0x00000032f787f95c <+140>: mov -0x10(%rdi),%rdx > 0x00000032f787f960 <+144>: mov %rsi,%rcx > 0x00000032f787f963 <+147>: lea (%rax,%rdx,1),%rsi > 0x00000032f787f967 <+151>: mov 0x3314c2(%rip),%rax # 0x32f7bb0e30 > 0x00000032f787f96e <+158>: sub %rdx,%rcx > 0x00000032f787f971 <+161>: mov %rsi,%rdx > 0x00000032f787f974 <+164>: mov 0x18(%rax),%rax > 0x00000032f787f978 <+168>: or %rcx,%rdx > 0x00000032f787f97b <+171>: sub $0x1,%rax > 0x00000032f787f97f <+175>: test %rax,%rdx > 0x00000032f787f982 <+178>: jne 0x32f787f9a8 <__GI___libc_free+216> > 0x00000032f787f984 <+180>: subl $0x1,0x33181d(%rip) # 0x32f7bb11a8 <mp_+40> > 0x00000032f787f98b <+187>: sub %rsi,0x331826(%rip) # 0x32f7bb11b8 <mp_+56> > 0x00000032f787f992 <+194>: mov %rcx,%rdi > 0x00000032f787f995 <+197>: jmpq 0x32f78eed70 <munmap> > 0x00000032f787f99a <+202>: nopw 0x0(%rax,%rax,1) > 0x00000032f787f9a0 <+208>: repz retq > 0x00000032f787f9a2 <+210>: mov (%rsp),%rsi > 0x00000032f787f9a6 <+214>: jmpq *%rax > 0x00000032f787f9a8 <+216>: mov %rdi,%rdx > 0x00000032f787f9ab <+219>: mov 0x33182f(%rip),%edi # 0x32f7bb11e0 <check_action> > 0x00000032f787f9b1 <+225>: lea 0xfa308(%rip),%rsi # 0x32f7979cc0 > 0x00000032f787f9b8 <+232>: jmpq 0x32f787b6c0 <malloc_printerr> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 917573
: 704868 |
704869
|
704870
|
704871
|
704872
|
704873
|
704874
|
704875
|
704876
|
704877
|
704878