Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 717382 Details for
Bug 928571
[abrt] wireless-tools-29-8.1.fc18: set_spy_threshold: Process /usr/sbin/iwspy was killed by signal 11 (SIGSEGV)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 13.03 KB, created by
Alejandro
on 2013-03-28 01:10:05 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Alejandro
Created:
2013-03-28 01:10:05 UTC
Size:
13.03 KB
patch
obsolete
>[New LWP 26344] >Core was generated by `iwspy wlan0 setthr'. >Program terminated with signal 11, Segmentation fault. >#0 0x0000000000400ec0 in set_spy_threshold (count=0, args=0x7ffff041c470, ifname=0x7ffff041e1b9 "wlan0", skfd=3) at iwspy.c:279 >279 if(!strcmp(args[0], "off")) > >Thread 1 (LWP 26344): >#0 0x0000000000400ec0 in set_spy_threshold (count=0, args=0x7ffff041c470, ifname=0x7ffff041e1b9 "wlan0", skfd=3) at iwspy.c:279 > __s1 = 0x0 > __result = <error reading variable __result (Cannot access memory at address 0x0)> > __s2_len = 3 > wrq = {ifr_ifrn = {ifrn_name = "\335\262\360\000\000\000\000\000\302\000\000\000\000\000\000"}, u = {name = "\001\000\000\000\000\000\000\000\215\030@\000\000\000\000", essid = {pointer = 0x1, length = 6285, flags = 64}, nwid = {value = 1, fixed = 0 '\000', disabled = 0 '\000', flags = 0}, freq = {m = 1, e = 0, i = 0 '\000', flags = 0 '\000'}, sens = {value = 1, fixed = 0 '\000', disabled = 0 '\000', flags = 0}, bitrate = {value = 1, fixed = 0 '\000', disabled = 0 '\000', flags = 0}, txpower = {value = 1, fixed = 0 '\000', disabled = 0 '\000', flags = 0}, rts = {value = 1, fixed = 0 '\000', disabled = 0 '\000', flags = 0}, frag = {value = 1, fixed = 0 '\000', disabled = 0 '\000', flags = 0}, mode = 1, retry = {value = 1, fixed = 0 '\000', disabled = 0 '\000', flags = 0}, encoding = {pointer = 0x1, length = 6285, flags = 64}, power = {value = 1, fixed = 0 '\000', disabled = 0 '\000', flags = 0}, qual = {qual = 1 '\001', level = 0 '\000', noise = 0 '\000', updated = 0 '\000'}, ap_addr = {sa_family = 1, sa_data = "\000\000\000\000\000\000\215\030@\000\000\000\000"}, addr = {sa_family = 1, sa_data = "\000\000\000\000\000\000\215\030@\000\000\000\000"}, param = {value = 1, fixed = 0 '\000', disabled = 0 '\000', flags = 0}, data = {pointer = 0x1, length = 6285, flags = 64}}} > threshold = {addr = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, qual = {qual = 0 '\000', level = 0 '\000', noise = 0 '\000', updated = 0 '\000'}, low = {qual = 0 '\000', level = 0 '\000', noise = 0 '\000', updated = 0 '\000'}, high = {qual = 0 '\000', level = 0 '\000', noise = 0 '\000', updated = 0 '\000'}} > low_thr = <optimized out> > high_thr = <optimized out> >#1 main (argc=3, argv=0x7ffff041c458) at iwspy.c:364 > skfd = 3 > goterr = 0 >From To Syms Read Shared Object Library >0x0000003ccfa020c0 0x0000003ccfa05b94 Yes /lib64/libiw.so.29 >0x0000003cd0a055b0 0x0000003cd0a6fd68 Yes /lib64/libm.so.6 >0x0000003ccfe1f1a0 0x0000003ccff60960 Yes /lib64/libc.so.6 >0x0000003ccf600b20 0x0000003ccf61a3d9 Yes /lib64/ld-linux-x86-64.so.2 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0x0 0 >rbx 0x3 3 >rcx 0x0 0 >rdx 0x10 16 >rsi 0x7ffff041e1b0 140737224237488 >rdi 0x0 0 >rbp 0x7ffff041e1b9 0x7ffff041e1b9 >rsp 0x7ffff041c2f0 0x7ffff041c2f0 >r8 0xffff 65535 >r9 0xd 13 >r10 0xfffffffffffffcdd -803 >r11 0x246 582 >r12 0x3 3 >r13 0x7ffff041c458 140737224229976 >r14 0x7ffff041c300 140737224229632 >r15 0x0 0 >rip 0x400ec0 0x400ec0 <main+368> >eflags 0x10246 [ PF ZF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >Dump of assembler code for function main: > 0x0000000000400d50 <+0>: push %r14 > 0x0000000000400d52 <+2>: push %r13 > 0x0000000000400d54 <+4>: mov %rsi,%r13 > 0x0000000000400d57 <+7>: push %r12 > 0x0000000000400d59 <+9>: mov %edi,%r12d > 0x0000000000400d5c <+12>: push %rbp > 0x0000000000400d5d <+13>: push %rbx > 0x0000000000400d5e <+14>: sub $0x60,%rsp > 0x0000000000400d62 <+18>: mov %fs:0x28,%rax > 0x0000000000400d6b <+27>: mov %rax,0x58(%rsp) > 0x0000000000400d70 <+32>: xor %eax,%eax > 0x0000000000400d72 <+34>: callq 0x400bd0 <iw_sockets_open@plt> > 0x0000000000400d77 <+39>: test %eax,%eax > 0x0000000000400d79 <+41>: mov %eax,%ebx > 0x0000000000400d7b <+43>: js 0x400fe9 <main+665> > 0x0000000000400d81 <+49>: cmp $0x1,%r12d > 0x0000000000400d85 <+53>: je 0x400e7c <main+300> > 0x0000000000400d8b <+59>: mov 0x8(%r13),%rbp > 0x0000000000400d8f <+63>: cmpb $0x2d,0x0(%rbp) > 0x0000000000400d93 <+67>: jne 0x400e19 <main+201> > 0x0000000000400d99 <+73>: cmpb $0x68,0x1(%rbp) > 0x0000000000400d9d <+77>: je 0x400df7 <main+167> > 0x0000000000400d9f <+79>: mov $0x401cf0,%esi > 0x0000000000400da4 <+84>: mov %rbp,%rdi > 0x0000000000400da7 <+87>: callq 0x400c80 <strcmp@plt> > 0x0000000000400dac <+92>: test %eax,%eax > 0x0000000000400dae <+94>: jne 0x400dff <main+175> > 0x0000000000400db0 <+96>: mov 0x202321(%rip),%rcx # 0x6030d8 <stderr> > 0x0000000000400db7 <+103>: mov $0x36,%edx > 0x0000000000400dbc <+108>: mov $0x1,%esi > 0x0000000000400dc1 <+113>: mov $0x401b68,%edi > 0x0000000000400dc6 <+118>: xor %ebp,%ebp > 0x0000000000400dc8 <+120>: callq 0x400d10 <fwrite@plt> > 0x0000000000400dcd <+125>: mov %ebx,%edi > 0x0000000000400dcf <+127>: callq 0x400c40 <close@plt> > 0x0000000000400dd4 <+132>: mov 0x58(%rsp),%rdx > 0x0000000000400dd9 <+137>: xor %fs:0x28,%rdx > 0x0000000000400de2 <+146>: mov %ebp,%eax > 0x0000000000400de4 <+148>: jne 0x401008 <main+696> > 0x0000000000400dea <+154>: add $0x60,%rsp > 0x0000000000400dee <+158>: pop %rbx > 0x0000000000400def <+159>: pop %rbp > 0x0000000000400df0 <+160>: pop %r12 > 0x0000000000400df2 <+162>: pop %r13 > 0x0000000000400df4 <+164>: pop %r14 > 0x0000000000400df6 <+166>: retq > 0x0000000000400df7 <+167>: cmpb $0x0,0x2(%rbp) > 0x0000000000400dfb <+171>: je 0x400db0 <main+96> > 0x0000000000400dfd <+173>: jmp 0x400d9f <main+79> > 0x0000000000400dff <+175>: cmpb $0x76,0x1(%rbp) > 0x0000000000400e03 <+179>: jne 0x400e2a <main+218> > 0x0000000000400e05 <+181>: cmpb $0x0,0x2(%rbp) > 0x0000000000400e09 <+185>: jne 0x400e2a <main+218> > 0x0000000000400e0b <+187>: mov $0x401cc6,%edi > 0x0000000000400e10 <+192>: callq 0x400ce0 <iw_print_version_info@plt> > 0x0000000000400e15 <+197>: mov %eax,%ebp > 0x0000000000400e17 <+199>: jmp 0x400dcd <main+125> > 0x0000000000400e19 <+201>: mov $0x401cf0,%esi > 0x0000000000400e1e <+206>: mov %rbp,%rdi > 0x0000000000400e21 <+209>: callq 0x400c80 <strcmp@plt> > 0x0000000000400e26 <+214>: test %eax,%eax > 0x0000000000400e28 <+216>: je 0x400db0 <main+96> > 0x0000000000400e2a <+218>: mov $0x401cbc,%esi > 0x0000000000400e2f <+223>: mov %rbp,%rdi > 0x0000000000400e32 <+226>: callq 0x400c80 <strcmp@plt> > 0x0000000000400e37 <+231>: test %eax,%eax > 0x0000000000400e39 <+233>: je 0x400e0b <main+187> > 0x0000000000400e3b <+235>: cmp $0x2,%r12d > 0x0000000000400e3f <+239>: je 0x400fd4 <main+644> > 0x0000000000400e45 <+245>: mov 0x10(%r13),%r14 > 0x0000000000400e49 <+249>: mov $0x401ccc,%esi > 0x0000000000400e4e <+254>: mov %r14,%rdi > 0x0000000000400e51 <+257>: callq 0x400c80 <strcmp@plt> > 0x0000000000400e56 <+262>: test %eax,%eax > 0x0000000000400e58 <+264>: je 0x400ead <main+349> > 0x0000000000400e5a <+266>: mov $0x401ce9,%esi > 0x0000000000400e5f <+271>: mov %r14,%rdi > 0x0000000000400e62 <+274>: callq 0x400c80 <strcmp@plt> > 0x0000000000400e67 <+279>: test %eax,%eax > 0x0000000000400e69 <+281>: jne 0x400e93 <main+323> > 0x0000000000400e6b <+283>: mov %rbp,%rsi > 0x0000000000400e6e <+286>: mov %ebx,%edi > 0x0000000000400e70 <+288>: callq 0x4016a0 <get_spy_threshold> > 0x0000000000400e75 <+293>: mov %eax,%ebp > 0x0000000000400e77 <+295>: jmpq 0x400dcd <main+125> > 0x0000000000400e7c <+300>: xor %ecx,%ecx > 0x0000000000400e7e <+302>: xor %edx,%edx > 0x0000000000400e80 <+304>: mov $0x4013f0,%esi > 0x0000000000400e85 <+309>: mov %eax,%edi > 0x0000000000400e87 <+311>: xor %ebp,%ebp > 0x0000000000400e89 <+313>: callq 0x400c50 <iw_enum_devices@plt> > 0x0000000000400e8e <+318>: jmpq 0x400dcd <main+125> > 0x0000000000400e93 <+323>: lea -0x2(%r12),%ecx > 0x0000000000400e98 <+328>: lea 0x10(%r13),%rdx > 0x0000000000400e9c <+332>: mov %rbp,%rsi > 0x0000000000400e9f <+335>: mov %ebx,%edi > 0x0000000000400ea1 <+337>: callq 0x401110 <set_spy_info> > 0x0000000000400ea6 <+342>: mov %eax,%ebp > 0x0000000000400ea8 <+344>: jmpq 0x400dcd <main+125> > 0x0000000000400ead <+349>: lea 0x10(%rsp),%r14 > 0x0000000000400eb2 <+354>: mov $0x7,%ecx > 0x0000000000400eb7 <+359>: mov %r14,%rdi > 0x0000000000400eba <+362>: rep stos %eax,%es:(%rdi) > 0x0000000000400ebc <+364>: mov 0x18(%r13),%rdi >=> 0x0000000000400ec0 <+368>: cmpb $0x6f,(%rdi) > 0x0000000000400ec3 <+371>: jne 0x400f73 <main+547> > 0x0000000000400ec9 <+377>: cmpb $0x66,0x1(%rdi) > 0x0000000000400ecd <+381>: jne 0x400f73 <main+547> > 0x0000000000400ed3 <+387>: cmpb $0x66,0x2(%rdi) > 0x0000000000400ed7 <+391>: jne 0x400f73 <main+547> > 0x0000000000400edd <+397>: cmpb $0x0,0x3(%rdi) > 0x0000000000400ee1 <+401>: jne 0x400f73 <main+547> > 0x0000000000400ee7 <+407>: lea 0x30(%rsp),%rdi > 0x0000000000400eec <+412>: mov %rbp,%rsi > 0x0000000000400eef <+415>: mov $0x10,%edx > 0x0000000000400ef4 <+420>: mov %r14,0x40(%rsp) > 0x0000000000400ef9 <+425>: movw $0x1,0x48(%rsp) > 0x0000000000400f00 <+432>: xor %ebp,%ebp > 0x0000000000400f02 <+434>: movw $0x0,0x4a(%rsp) > 0x0000000000400f09 <+441>: callq 0x400c00 <strncpy@plt> > 0x0000000000400f0e <+446>: lea 0x30(%rsp),%rdx > 0x0000000000400f13 <+451>: xor %eax,%eax > 0x0000000000400f15 <+453>: mov $0x8b12,%esi > 0x0000000000400f1a <+458>: mov %ebx,%edi > 0x0000000000400f1c <+460>: callq 0x400c30 <ioctl@plt> > 0x0000000000400f21 <+465>: test %eax,%eax > 0x0000000000400f23 <+467>: jns 0x400dcd <main+125> > 0x0000000000400f29 <+473>: mov 0x2021a8(%rip),%rcx # 0x6030d8 <stderr> > 0x0000000000400f30 <+480>: mov $0x27,%edx > 0x0000000000400f35 <+485>: mov $0x1,%esi > 0x0000000000400f3a <+490>: mov $0x401c18,%edi > 0x0000000000400f3f <+495>: callq 0x400d10 <fwrite@plt> > 0x0000000000400f44 <+500>: callq 0x400bf0 <__errno_location@plt> > 0x0000000000400f49 <+505>: mov (%rax),%edi > 0x0000000000400f4b <+507>: callq 0x400d40 <strerror@plt> > 0x0000000000400f50 <+512>: mov $0x401cd6,%edx > 0x0000000000400f55 <+517>: mov %rax,%rcx > 0x0000000000400f58 <+520>: mov 0x202179(%rip),%rdi # 0x6030d8 <stderr> > 0x0000000000400f5f <+527>: mov $0x1,%esi > 0x0000000000400f64 <+532>: xor %eax,%eax > 0x0000000000400f66 <+534>: or $0xffffffff,%ebp > 0x0000000000400f69 <+537>: callq 0x400d20 <__fprintf_chk@plt> > 0x0000000000400f6e <+542>: jmpq 0x400dcd <main+125> > 0x0000000000400f73 <+547>: cmp $0x4,%r12d > 0x0000000000400f77 <+551>: mov %rbp,%rcx > 0x0000000000400f7a <+554>: mov $0x401ba0,%edx > 0x0000000000400f7f <+559>: jle 0x400f58 <main+520> > 0x0000000000400f81 <+561>: lea 0x8(%rsp),%rdx > 0x0000000000400f86 <+566>: xor %eax,%eax > 0x0000000000400f88 <+568>: mov $0x401cd3,%esi > 0x0000000000400f8d <+573>: callq 0x400cc0 <__isoc99_sscanf@plt> > 0x0000000000400f92 <+578>: sub $0x1,%eax > 0x0000000000400f95 <+581>: jne 0x400ffb <main+683> > 0x0000000000400f97 <+583>: mov 0x20(%r13),%rdi > 0x0000000000400f9b <+587>: lea 0xc(%rsp),%rdx > 0x0000000000400fa0 <+592>: xor %eax,%eax > 0x0000000000400fa2 <+594>: mov $0x401cd3,%esi > 0x0000000000400fa7 <+599>: callq 0x400cc0 <__isoc99_sscanf@plt> > 0x0000000000400fac <+604>: sub $0x1,%eax > 0x0000000000400faf <+607>: jne 0x400ffb <main+683> > 0x0000000000400fb1 <+609>: mov 0xc(%rsp),%eax > 0x0000000000400fb5 <+613>: mov 0x8(%rsp),%edx > 0x0000000000400fb9 <+617>: cmp %edx,%eax > 0x0000000000400fbb <+619>: jl 0x40100d <main+701> > 0x0000000000400fbd <+621>: mov %dl,0x25(%rsp) > 0x0000000000400fc1 <+625>: movb $0x2,0x27(%rsp) > 0x0000000000400fc6 <+630>: mov %al,0x29(%rsp) > 0x0000000000400fca <+634>: movb $0x2,0x2b(%rsp) > 0x0000000000400fcf <+639>: jmpq 0x400ee7 <main+407> > 0x0000000000400fd4 <+644>: mov %rbp,%rsi > 0x0000000000400fd7 <+647>: xor %ecx,%ecx > 0x0000000000400fd9 <+649>: xor %edx,%edx > 0x0000000000400fdb <+651>: mov %ebx,%edi > 0x0000000000400fdd <+653>: xor %ebp,%ebp > 0x0000000000400fdf <+655>: callq 0x4013f0 <print_spy_info> > 0x0000000000400fe4 <+660>: jmpq 0x400dcd <main+125> > 0x0000000000400fe9 <+665>: mov $0x401cb5,%edi > 0x0000000000400fee <+670>: or $0xffffffff,%ebp > 0x0000000000400ff1 <+673>: callq 0x400d00 <perror@plt> > 0x0000000000400ff6 <+678>: jmpq 0x400dd4 <main+132> > 0x0000000000400ffb <+683>: mov %rbp,%rcx > 0x0000000000400ffe <+686>: mov $0x401bc8,%edx > 0x0000000000401003 <+691>: jmpq 0x400f58 <main+520> > 0x0000000000401008 <+696>: callq 0x400c20 <__stack_chk_fail@plt> > 0x000000000040100d <+701>: mov %rbp,%rcx > 0x0000000000401010 <+704>: mov $0x401bf0,%edx > 0x0000000000401015 <+709>: jmpq 0x400f58 <main+520> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 928571
: 717382 |
717383
|
717384
|
717385
|
717386
|
717387
|
717388
|
717389
|
717390
|
717391