Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 706371 Details for
Bug 918877
[abrt] xcm-0.5.1-1.fc18: XcmDDCgetEDID: Process /usr/bin/xcmddc was killed by signal 11 (SIGSEGV)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 8.77 KB, created by
Kostya Berger
on 2013-03-07 07:06:09 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Kostya Berger
Created:
2013-03-07 07:06:09 UTC
Size:
8.77 KB
patch
obsolete
>[New LWP 9829] >Core was generated by `xcmddc -l'. >Program terminated with signal 11, Segmentation fault. >#0 XcmDDCgetEDID (device_name=device_name@entry=0x187e040 "/dev/i2c-3", data=data@entry=0x7fff97ee0950, size=size@entry=0x7fff97ee0958) at XcmDDC.c:183 >183 if( > >Thread 1 (LWP 9829): >#0 XcmDDCgetEDID (device_name=device_name@entry=0x187e040 "/dev/i2c-3", data=data@entry=0x7fff97ee0950, size=size@entry=0x7fff97ee0958) at XcmDDC.c:183 > edid = 0x0 > fd = 4 > ret = <optimized out> > error = <optimized out> > command = '\000' <repeats 127 times> >#1 0x0000003887203e4b in XcmDDClist (list=list@entry=0x7fff97ee09f8, count=count@entry=0x7fff97ee09e4) at XcmDDC.c:100 > error = XCM_DDC_OK > dir = 0x1876010 > entry = 0x1876088 > data = 0x0 > size = 0 > fn = 0x187e040 "/dev/i2c-3" > n = 0 > devices = 0x187e450 >#2 0x0000000000400ea8 in main (argc=2, argv=0x7fff97ee0b18) at xcmddc.c:121 > error = XCM_DDC_OK > i = <optimized out> > data = 0x0 > size = <optimized out> > list_devices = 1 > device = -1 > devices = 0x0 > force_output = 0 > identify = 0 > oy_debug = 0 > n = 0 > i2c_node_name = 0x0 > result = 0 >From To Syms Read Shared Object Library >0x0000003887202400 0x0000003887206cf8 Yes /lib64/libXcm.so.0 >0x0000003d004055b0 0x0000003d0046fd68 Yes /lib64/libm.so.6 >0x0000003cff41f1a0 0x0000003cff560940 Yes /lib64/libc.so.6 >0x0000003d05401530 0x0000003d05403da8 Yes /lib64/libXfixes.so.3 >0x00000031bf2067c0 0x00000031bf21410c Yes /lib64/libXmu.so.6 >0x00000031bee131b0 0x00000031bee4f2bc Yes /lib64/libXt.so.6 >0x0000003d0201dee0 0x0000003d020a4280 Yes /lib64/libX11.so.6 >0x0000003cff000b20 0x0000003cff01a3d9 Yes /lib64/ld-linux-x86-64.so.2 >0x0000003d03003740 0x0000003d0300d810 Yes /lib64/libXext.so.6 >0x00000039b5a01c20 0x00000039b5a05d38 Yes /lib64/libSM.so.6 >0x0000003d05804f30 0x0000003d0581259c Yes /lib64/libICE.so.6 >0x0000003d02409a00 0x0000003d024158f8 Yes /lib64/libxcb.so.1 >0x0000003cff800ed0 0x0000003cff8019f0 Yes /lib64/libdl.so.2 >0x00000039b5601510 0x00000039b5602a8c Yes /lib64/libuuid.so.1 >0x0000003d02800eb0 0x0000003d02801bcc Yes /lib64/libXau.so.6 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0x0 0 >rbx 0x2 2 >rcx 0xffffffffffffff80 -128 >rdx 0x50 80 >rsi 0x703 1795 >rdi 0x4 4 >rbp 0x187e040 0x187e040 >rsp 0x7fff97ee0870 0x7fff97ee0870 >r8 0x187e040 25681984 >r9 0x3cff7b0a20 261984291360 >r10 0x5 5 >r11 0x246 582 >r12 0x7fff97ee0950 140735742347600 >r13 0x7fff97ee0958 140735742347608 >r14 0x4 4 >r15 0x187609b 25649307 >rip 0x3887203c53 0x3887203c53 <XcmDDCgetEDID+163> >eflags 0x10286 [ PF SF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >Dump of assembler code for function XcmDDCgetEDID: > 0x0000003887203bb0 <+0>: mov %rbx,-0x28(%rsp) > 0x0000003887203bb5 <+5>: mov %r12,-0x18(%rsp) > 0x0000003887203bba <+10>: mov %rdi,%r8 > 0x0000003887203bbd <+13>: mov %r13,-0x10(%rsp) > 0x0000003887203bc2 <+18>: mov %r14,-0x8(%rsp) > 0x0000003887203bc7 <+23>: mov $0x10,%ecx > 0x0000003887203bcc <+28>: mov %rbp,-0x20(%rsp) > 0x0000003887203bd1 <+33>: sub $0xb8,%rsp > 0x0000003887203bd8 <+40>: mov 0x2053e1(%rip),%rbx # 0x3887408fc0 > 0x0000003887203bdf <+47>: mov %fs:0x28,%rax > 0x0000003887203be8 <+56>: mov %rax,0x88(%rsp) > 0x0000003887203bf0 <+64>: xor %eax,%eax > 0x0000003887203bf2 <+66>: mov %rsp,%rdi > 0x0000003887203bf5 <+69>: mov %rsi,%r12 > 0x0000003887203bf8 <+72>: mov $0x2,%esi > 0x0000003887203bfd <+77>: mov (%rbx),%r14d > 0x0000003887203c00 <+80>: mov %rdx,%r13 > 0x0000003887203c03 <+83>: rep stos %rax,%es:(%rdi) > 0x0000003887203c06 <+86>: mov %r8,%rdi > 0x0000003887203c09 <+89>: add $0x1,%r14d > 0x0000003887203c0d <+93>: mov %r14d,(%rbx) > 0x0000003887203c10 <+96>: movslq %r14d,%r14 > 0x0000003887203c13 <+99>: callq 0x3887202320 <open@plt> > 0x0000003887203c18 <+104>: mov 0x2053b1(%rip),%rdx # 0x3887408fd0 > 0x0000003887203c1f <+111>: mov %eax,(%rdx,%r14,4) > 0x0000003887203c23 <+115>: movslq (%rbx),%rax > 0x0000003887203c26 <+118>: mov $0x1,%ebx > 0x0000003887203c2b <+123>: mov (%rdx,%rax,4),%r14d > 0x0000003887203c2f <+127>: cmp $0xffffffff,%r14d > 0x0000003887203c33 <+131>: je 0x3887203c67 <XcmDDCgetEDID+183> > 0x0000003887203c35 <+133>: xor %eax,%eax > 0x0000003887203c37 <+135>: mov $0x50,%edx > 0x0000003887203c3c <+140>: mov $0x703,%esi > 0x0000003887203c41 <+145>: mov %r14d,%edi > 0x0000003887203c44 <+148>: mov $0x2,%bl > 0x0000003887203c46 <+150>: callq 0x38872020d0 <ioctl@plt> > 0x0000003887203c4b <+155>: test %eax,%eax > 0x0000003887203c4d <+157>: je 0x3887203cb0 <XcmDDCgetEDID+256> > 0x0000003887203c4f <+159>: mov (%r12),%rax >=> 0x0000003887203c53 <+163>: cmpb $0x0,(%rax) > 0x0000003887203c56 <+166>: jne 0x3887203c62 <XcmDDCgetEDID+178> > 0x0000003887203c58 <+168>: cmpb $0xff,0x1(%rax) > 0x0000003887203c5c <+172>: je 0x3887203d40 <XcmDDCgetEDID+400> > 0x0000003887203c62 <+178>: mov $0x4,%ebx > 0x0000003887203c67 <+183>: mov 0x88(%rsp),%rdx > 0x0000003887203c6f <+191>: xor %fs:0x28,%rdx > 0x0000003887203c78 <+200>: mov %ebx,%eax > 0x0000003887203c7a <+202>: jne 0x3887203d86 <XcmDDCgetEDID+470> > 0x0000003887203c80 <+208>: mov 0x90(%rsp),%rbx > 0x0000003887203c88 <+216>: mov 0x98(%rsp),%rbp > 0x0000003887203c90 <+224>: mov 0xa0(%rsp),%r12 > 0x0000003887203c98 <+232>: mov 0xa8(%rsp),%r13 > 0x0000003887203ca0 <+240>: mov 0xb0(%rsp),%r14 > 0x0000003887203ca8 <+248>: add $0xb8,%rsp > 0x0000003887203caf <+255>: retq > 0x0000003887203cb0 <+256>: mov $0xc350,%edi > 0x0000003887203cb5 <+261>: callq 0x38872023b0 <usleep@plt> > 0x0000003887203cba <+266>: mov $0x1,%edx > 0x0000003887203cbf <+271>: mov %rsp,%rsi > 0x0000003887203cc2 <+274>: mov %r14d,%edi > 0x0000003887203cc5 <+277>: callq 0x3887201fd0 <write@plt> > 0x0000003887203cca <+282>: cmp $0x1,%eax > 0x0000003887203ccd <+285>: jne 0x3887203cff <XcmDDCgetEDID+335> > 0x0000003887203ccf <+287>: mov $0x100,%esi > 0x0000003887203cd4 <+292>: mov $0x1,%edi > 0x0000003887203cd9 <+297>: xor %bl,%bl > 0x0000003887203cdb <+299>: callq 0x3887202130 <calloc@plt> > 0x0000003887203ce0 <+304>: mov $0xc350,%edi > 0x0000003887203ce5 <+309>: mov %rax,(%r12) > 0x0000003887203ce9 <+313>: callq 0x38872023b0 <usleep@plt> > 0x0000003887203cee <+318>: mov (%r12),%rsi > 0x0000003887203cf2 <+322>: mov $0x80,%edx > 0x0000003887203cf7 <+327>: mov %r14d,%edi > 0x0000003887203cfa <+330>: callq 0x3887202110 <read@plt> > 0x0000003887203cff <+335>: test $0x7f,%al > 0x0000003887203d01 <+337>: je 0x3887203c4f <XcmDDCgetEDID+159> > 0x0000003887203d07 <+343>: test %ebx,%ebx > 0x0000003887203d09 <+345>: jne 0x3887203c67 <XcmDDCgetEDID+183> > 0x0000003887203d0f <+351>: mov $0xc350,%edi > 0x0000003887203d14 <+356>: callq 0x38872023b0 <usleep@plt> > 0x0000003887203d19 <+361>: xor %eax,%eax > 0x0000003887203d1b <+363>: mov $0x37,%edx > 0x0000003887203d20 <+368>: mov $0x706,%esi > 0x0000003887203d25 <+373>: mov %r14d,%edi > 0x0000003887203d28 <+376>: callq 0x38872020d0 <ioctl@plt> > 0x0000003887203d2d <+381>: test %eax,%eax > 0x0000003887203d2f <+383>: mov $0x2,%eax > 0x0000003887203d34 <+388>: cmovne %eax,%ebx > 0x0000003887203d37 <+391>: jmpq 0x3887203c67 <XcmDDCgetEDID+183> > 0x0000003887203d3c <+396>: nopl 0x0(%rax) > 0x0000003887203d40 <+400>: cmpb $0xff,0x2(%rax) > 0x0000003887203d44 <+404>: jne 0x3887203c62 <XcmDDCgetEDID+178> > 0x0000003887203d4a <+410>: cmpb $0xff,0x3(%rax) > 0x0000003887203d4e <+414>: jne 0x3887203c62 <XcmDDCgetEDID+178> > 0x0000003887203d54 <+420>: cmpb $0xff,0x4(%rax) > 0x0000003887203d58 <+424>: jne 0x3887203c62 <XcmDDCgetEDID+178> > 0x0000003887203d5e <+430>: cmpb $0xff,0x5(%rax) > 0x0000003887203d62 <+434>: jne 0x3887203c62 <XcmDDCgetEDID+178> > 0x0000003887203d68 <+440>: cmpb $0xff,0x6(%rax) > 0x0000003887203d6c <+444>: jne 0x3887203c62 <XcmDDCgetEDID+178> > 0x0000003887203d72 <+450>: cmpb $0x0,0x7(%rax) > 0x0000003887203d76 <+454>: jne 0x3887203c62 <XcmDDCgetEDID+178> > 0x0000003887203d7c <+460>: movq $0x80,0x0(%r13) > 0x0000003887203d84 <+468>: jmp 0x3887203d07 <XcmDDCgetEDID+343> > 0x0000003887203d86 <+470>: callq 0x3887202050 <__stack_chk_fail@plt> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 918877
: 706371 |
706372
|
706373
|
706374
|
706375
|
706376
|
706377
|
706378
|
706379
|
706380
|
706381