Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 710162 Details for
Bug 921725
[abrt] cpio-2.11-17.fc19: process_copy_in: Process /usr/bin/cpio was killed by signal 11 (SIGSEGV)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 4.86 KB, created by
Nicolas Mailhot
on 2013-03-14 18:57:52 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Nicolas Mailhot
Created:
2013-03-14 18:57:52 UTC
Size:
4.86 KB
patch
obsolete
>warning: exec file is newer than core file. >[New LWP 17680] >Core was generated by `/usr/bin/cpio -i -t -v'. >Program terminated with signal 11, Segmentation fault. >#0 0x00000038d7a8031c in __GI___libc_free (mem=0x417f16) at malloc.c:2910 >2910 malloc.c: No such file or directory. > >Thread 1 (LWP 17680): >#0 0x00000038d7a8031c in __GI___libc_free (mem=0x417f16) at malloc.c:2910 > ar_ptr = <optimized out> > p = 0x417f06 > hook = <optimized out> >#1 0x00000000004045ce in process_copy_in () >No symbol table info available. >#2 0x00000000004029b1 in main () >No symbol table info available. >From To Syms Read Shared Object Library >0x00000038d7a1f410 0x00000038d7b62170 Yes /lib64/libc.so.6 >0x00000038d7600ae0 0x00000038d761ac6a Yes /lib64/ld-linux-x86-64.so.2 >0x00007f337c1271e0 0x00007f337c12e3cc Yes /lib64/libnss_files.so.2 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0x0 0 >rbx 0x47 71 >rcx 0x417f06 4292358 >rdx 0x38d7dbba20 244139670048 >rsi 0xa 10 >rdi 0x38d7db9780 244139661184 >rbp 0x0 0x0 >rsp 0x7fffe527ec58 0x7fffe527ec58 >r8 0x7f337c332740 139859103786816 >r9 0x2 2 >r10 0xffffffff 4294967295 >r11 0x246 582 >r12 0xb 11 >r13 0x417f16 4292374 >r14 0x0 0 >r15 0x0 0 >rip 0x38d7a8031c 0x38d7a8031c <__GI___libc_free+60> >eflags 0x10246 [ PF ZF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >Dump of assembler code for function __GI___libc_free: > 0x00000038d7a802e0 <+0>: mov 0x338bf9(%rip),%rax # 0x38d7db8ee0 > 0x00000038d7a802e7 <+7>: mov (%rax),%rax > 0x00000038d7a802ea <+10>: test %rax,%rax > 0x00000038d7a802ed <+13>: jne 0x38d7a803b2 <__GI___libc_free+210> > 0x00000038d7a802f3 <+19>: test %rdi,%rdi > 0x00000038d7a802f6 <+22>: je 0x38d7a803b0 <__GI___libc_free+208> > 0x00000038d7a802fc <+28>: mov -0x8(%rdi),%rax > 0x00000038d7a80300 <+32>: lea -0x10(%rdi),%rcx > 0x00000038d7a80304 <+36>: test $0x2,%al > 0x00000038d7a80306 <+38>: jne 0x38d7a80330 <__GI___libc_free+80> > 0x00000038d7a80308 <+40>: test $0x4,%al > 0x00000038d7a8030a <+42>: lea 0x33946f(%rip),%rdi # 0x38d7db9780 <main_arena> > 0x00000038d7a80311 <+49>: je 0x38d7a8031f <__GI___libc_free+63> > 0x00000038d7a80313 <+51>: mov %rcx,%rax > 0x00000038d7a80316 <+54>: and $0xfffffffffc000000,%rax >=> 0x00000038d7a8031c <+60>: mov (%rax),%rdi > 0x00000038d7a8031f <+63>: xor %edx,%edx > 0x00000038d7a80321 <+65>: mov %rcx,%rsi > 0x00000038d7a80324 <+68>: jmpq 0x38d7a7c900 <_int_free> > 0x00000038d7a80329 <+73>: nopl 0x0(%rax) > 0x00000038d7a80330 <+80>: mov 0x338ebd(%rip),%r9d # 0x38d7db91f4 <mp_+52> > 0x00000038d7a80337 <+87>: test %r9d,%r9d > 0x00000038d7a8033a <+90>: jne 0x38d7a80368 <__GI___libc_free+136> > 0x00000038d7a8033c <+92>: cmp 0x338e8d(%rip),%rax # 0x38d7db91d0 <mp_+16> > 0x00000038d7a80343 <+99>: jbe 0x38d7a80368 <__GI___libc_free+136> > 0x00000038d7a80345 <+101>: cmp $0x2000000,%rax > 0x00000038d7a8034b <+107>: ja 0x38d7a80368 <__GI___libc_free+136> > 0x00000038d7a8034d <+109>: and $0xfffffffffffffff8,%rax > 0x00000038d7a80351 <+113>: lea (%rax,%rax,1),%rdx > 0x00000038d7a80355 <+117>: mov %rax,0x338e74(%rip) # 0x38d7db91d0 <mp_+16> > 0x00000038d7a8035c <+124>: mov %rdx,0x338e5d(%rip) # 0x38d7db91c0 <mp_> > 0x00000038d7a80363 <+131>: jmp 0x38d7a8036c <__GI___libc_free+140> > 0x00000038d7a80365 <+133>: nopl (%rax) > 0x00000038d7a80368 <+136>: and $0xfffffffffffffff8,%rax > 0x00000038d7a8036c <+140>: mov -0x10(%rdi),%rdx > 0x00000038d7a80370 <+144>: mov %rcx,%rdi > 0x00000038d7a80373 <+147>: lea (%rax,%rdx,1),%rsi > 0x00000038d7a80377 <+151>: mov 0x338ada(%rip),%rax # 0x38d7db8e58 > 0x00000038d7a8037e <+158>: sub %rdx,%rdi > 0x00000038d7a80381 <+161>: mov %rsi,%rdx > 0x00000038d7a80384 <+164>: mov 0x18(%rax),%rax > 0x00000038d7a80388 <+168>: or %rdi,%rdx > 0x00000038d7a8038b <+171>: sub $0x1,%rax > 0x00000038d7a8038f <+175>: test %rax,%rdx > 0x00000038d7a80392 <+178>: jne 0x38d7a803b8 <__GI___libc_free+216> > 0x00000038d7a80394 <+180>: subl $0x1,0x338e4d(%rip) # 0x38d7db91e8 <mp_+40> > 0x00000038d7a8039b <+187>: sub %rsi,0x338e56(%rip) # 0x38d7db91f8 <mp_+56> > 0x00000038d7a803a2 <+194>: jmpq 0x38d7aefe10 <munmap> > 0x00000038d7a803a7 <+199>: nopw 0x0(%rax,%rax,1) > 0x00000038d7a803b0 <+208>: repz retq > 0x00000038d7a803b2 <+210>: mov (%rsp),%rsi > 0x00000038d7a803b6 <+214>: jmpq *%rax > 0x00000038d7a803b8 <+216>: mov %rcx,%rdi > 0x00000038d7a803bb <+219>: jmpq 0x38d7a1fda1 <munmap_chunk> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 921725
: 710162 |
710163
|
710164
|
710165
|
710166
|
710167
|
710168
|
710169
|
710170
|
710171
|
710172