Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 838469 Details for
Bug 1044622
[abrt] pptp: vector_destroy(): pptp killed by SIGABRT
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 9.08 KB, created by
Matthew Wilson
on 2013-12-18 17:10:42 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Matthew Wilson
Created:
2013-12-18 17:10:42 UTC
Size:
9.08 KB
patch
obsolete
>warning: core file may not match specified executable file. >[New LWP 1707] >Core was generated by `/sbin/pptp 90.155.97.141 --nolaunchpppd --loglevel 0 --logstring nm-pptp-servic'. >Program terminated with signal SIGABRT, Aborted. >#0 0x00000035f2c35c59 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:56 >56 return INLINE_SYSCALL (tgkill, 3, pid, selftid, sig); > >Thread 1 (LWP 1707): >#0 0x00000035f2c35c59 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:56 > resultvar = 0 > pid = 1707 > selftid = 1707 >#1 0x00000035f2c37368 in __GI_abort () at abort.c:89 > save_stage = 2 > act = {__sigaction_handler = {sa_handler = 0x303a383020303030, sa_sigaction = 0x303a383020303030}, sa_mask = {__val = {3762820389390131250, 2314885530818453536, 2314885530818453536, 2314885530818453536, 7596498840077020960, 8458438963524548194, 4049068333028108660, 4136051801121059630, 3687656653411463269, 3472331595652359733, 3467895053655089200, 2319406791654387760, 3977276820851144752, 2314885531155577141, 2314885530818453536, 7309458125523674475}}, sa_flags = 75, sa_restorer = 0x7fff886eac50} > sigs = {__val = {32, 0 <repeats 15 times>}} >#2 0x00000035f2c75da4 in __libc_message (do_abort=do_abort@entry=2, fmt=fmt@entry=0x35f2d7c648 "*** Error in `%s': %s: 0x%s ***\n") at ../sysdeps/posix/libc_fatal.c:175 > ap = {{gp_offset = 40, fp_offset = 53, overflow_arg_area = 0x7fff886eac60, reg_save_area = 0x7fff886eabf0}} > fd = 2 > on_2 = <optimized out> > list = <optimized out> > nlist = <optimized out> > cp = <optimized out> > written = <optimized out> >#3 0x00000035f2c7d098 in malloc_printerr (ptr=<optimized out>, str=0x35f2d79df7 "free(): invalid pointer", action=3) at malloc.c:4930 > buf = "00000035f2fb87c8" > cp = <optimized out> >#4 _int_free (av=0x35f2fb8760 <main_arena>, p=<optimized out>, have_lock=0) at malloc.c:3782 > size = <optimized out> > fb = <optimized out> > nextchunk = <optimized out> > nextsize = <optimized out> > nextinuse = <optimized out> > prevsize = <optimized out> > bck = <optimized out> > fwd = <optimized out> > errstr = 0x35f2d79df7 "free(): invalid pointer" > locked = <optimized out> >#5 0x00000000004069ec in vector_destroy (v=0x2062770) at vector.c:58 >No locals. >#6 0x00000000004043ab in pptp_conn_destroy (conn=conn@entry=0x2062790) at pptp_ctrl.c:459 > i = 0 > __PRETTY_FUNCTION__ = "pptp_conn_destroy" >#7 0x000000000040920e in callmgr_main (argc=argc@entry=3, argv=argv@entry=0x7fff886eafb0, envp=envp@entry=0x7fff886ec3e8) at pptp_callmgr.c:307 > rc = <optimized out> > read_set = {__fds_bits = {0 <repeats 16 times>}} > write_set = {__fds_bits = {0 <repeats 16 times>}} > tv = {tv_sec = 0, tv_usec = 0} > inetaddr = {s_addr = 2371984218} > inet_sock = 0 > unix_sock = 1 > call_set = {__fds_bits = {0 <repeats 16 times>}} > conn = 0x2062790 > call_list = 0x20628d0 > max_fd = 6 > first = 0 > retval = <optimized out> > i = <optimized out> > phonenr = 0x0 > __FUNCTION__ = "callmgr_main" > __PRETTY_FUNCTION__ = "callmgr_main" >#8 0x00000000004029c8 in launch_callmgr (inetaddr=..., inetaddr@entry=..., phonenr=phonenr@entry=0x0, argc=argc@entry=7, argv=argv@entry=0x7fff886ec3a8, envp=envp@entry=0x7fff886ec3e8) at pptp.c:527 > my_argv = {0x7fff886edf22 "/sbin/pptp", 0x7fdb8e23a718 "90.155.97.141", 0x0} > buf = "pptp: call manager for 90.155.97.141\000\177\000\000\260\260n\210\377\177\000\000\262\260n\210\377\177\000\000\003\000\000\000\000\000\000\000\350\303n\210\377\177\000\000\264\207@\000\000\000\000\000@\260n\210\377\177\000\000'\314\313\362\065\000\000\000\340\252\373\362\065", '\000' <repeats 11 times>, "\340\252\373\362\065\000\000\000\262\312\313\362\065\000\000" > rc = <optimized out> >#9 0x0000000000402b13 in open_callmgr (inetaddr=inetaddr@entry=..., phonenr=0x0, argc=argc@entry=7, argv=argv@entry=0x7fff886ec3a8, envp=envp@entry=0x7fff886ec3e8, pty_fd=0, gre_fd=gre_fd@entry=4) at pptp.c:496 > where = {a = {sa_family = 1, sa_data = "/var/run/pptp/"}, u = {sun_family = 1, sun_path = "/var/run/pptp/255.255.255.255:90.155.97.141", '\000' <repeats 11 times>, "\f\000\310\362\065", '\000' <repeats 11 times>, "\004\000\000\000\000\000\000\000Z\233a\215\000\000\000\000\n{@\000\000\000\000\000 \261n\210\377\177\000\000\377\062@\000\000"}} > i = 0 > fd = 1 > pid = <optimized out> > status = 0 > __FUNCTION__ = "open_callmgr" >#10 0x0000000000402121 in main (argc=7, argv=0x7fff886ec3a8, envp=0x7fff886ec3e8) at pptp.c:394 > inetaddr = {s_addr = 2371984218} > callmgr_sock = -1 > ttydev = '\000' <repeats 1256 times>... > tty_name = <optimized out> > pty_fd = 0 > tty_fd = 0 > gre_fd = 4 > rc = <optimized out> > parent_pid = 0 > child_pid = 1700 > call_id = 0 > peer_call_id = 0 > buf = '\000' <repeats 127 times> > pppdargc = 0 > pppdargv = 0x7fff886ec3e0 > phonenrbuf = '\000' <repeats 64 times> > phonenr = 0x0 > launchpppd = 0 > debug = 0 > __FUNCTION__ = "main" >From To Syms Read Shared Object Library >0x00000035f9c00f10 0x00000035f9c01804 Yes /lib64/libutil.so.1 >0x00000035f2c1f560 0x00000035f2d60cc4 Yes /lib64/libc.so.6 >0x00000035f2800b10 0x00000035f2819cb0 Yes /lib64/ld-linux-x86-64.so.2 >0x00000035f4c02af0 0x00000035f4c12218 Yes /lib64/libgcc_s.so.1 >$1 = 0x7fdb8e24f000 "" >No symbol "__glib_assert_msg" in current context. >rax 0x0 0 >rbx 0x4b 75 >rcx 0xffffffffffffffff -1 >rdx 0x6 6 >rsi 0x6ab 1707 >rdi 0x6ab 1707 >rbp 0x7fff886eac50 0x7fff886eac50 >rsp 0x7fff886ea8b8 0x7fff886ea8b8 >r8 0x35f2d733e0 231707456480 >r9 0x60e688 6350472 >r10 0x8 8 >r11 0x202 514 >r12 0x7fff886eaa60 140735482341984 >r13 0x7 7 >r14 0x4b 75 >r15 0x7 7 >rip 0x35f2c35c59 0x35f2c35c59 <__GI_raise+57> >eflags 0x202 [ IF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >st0 *value not available* >st1 *value not available* >st2 *value not available* >st3 *value not available* >st4 *value not available* >st5 *value not available* >st6 *value not available* >st7 *value not available* >fctrl *value not available* >fstat *value not available* >ftag *value not available* >fiseg *value not available* >fioff *value not available* >foseg *value not available* >fooff *value not available* >fop *value not available* >xmm0 *value not available* >xmm1 *value not available* >xmm2 *value not available* >xmm3 *value not available* >xmm4 *value not available* >xmm5 *value not available* >xmm6 *value not available* >xmm7 *value not available* >xmm8 *value not available* >xmm9 *value not available* >xmm10 *value not available* >xmm11 *value not available* >xmm12 *value not available* >xmm13 *value not available* >xmm14 *value not available* >xmm15 *value not available* >mxcsr *value not available* >Dump of assembler code for function __GI_raise: > 0x00000035f2c35c20 <+0>: mov %fs:0x2d4,%eax > 0x00000035f2c35c28 <+8>: mov %eax,%ecx > 0x00000035f2c35c2a <+10>: mov %fs:0x2d0,%esi > 0x00000035f2c35c32 <+18>: test %esi,%esi > 0x00000035f2c35c34 <+20>: jne 0x35f2c35c68 <__GI_raise+72> > 0x00000035f2c35c36 <+22>: mov $0xba,%eax > 0x00000035f2c35c3b <+27>: syscall > 0x00000035f2c35c3d <+29>: mov %eax,%ecx > 0x00000035f2c35c3f <+31>: mov %eax,%fs:0x2d0 > 0x00000035f2c35c47 <+39>: mov %eax,%esi > 0x00000035f2c35c49 <+41>: movslq %edi,%rdx > 0x00000035f2c35c4c <+44>: movslq %esi,%rsi > 0x00000035f2c35c4f <+47>: movslq %ecx,%rdi > 0x00000035f2c35c52 <+50>: mov $0xea,%eax > 0x00000035f2c35c57 <+55>: syscall >=> 0x00000035f2c35c59 <+57>: cmp $0xfffffffffffff000,%rax > 0x00000035f2c35c5f <+63>: ja 0x35f2c35c7a <__GI_raise+90> > 0x00000035f2c35c61 <+65>: repz retq > 0x00000035f2c35c63 <+67>: nopl 0x0(%rax,%rax,1) > 0x00000035f2c35c68 <+72>: test %eax,%eax > 0x00000035f2c35c6a <+74>: jg 0x35f2c35c49 <__GI_raise+41> > 0x00000035f2c35c6c <+76>: mov %eax,%ecx > 0x00000035f2c35c6e <+78>: neg %ecx > 0x00000035f2c35c70 <+80>: test $0x7fffffff,%eax > 0x00000035f2c35c75 <+85>: cmove %esi,%ecx > 0x00000035f2c35c78 <+88>: jmp 0x35f2c35c49 <__GI_raise+41> > 0x00000035f2c35c7a <+90>: mov 0x3821b7(%rip),%rdx # 0x35f2fb7e38 > 0x00000035f2c35c81 <+97>: neg %eax > 0x00000035f2c35c83 <+99>: mov %eax,%fs:(%rdx) > 0x00000035f2c35c86 <+102>: or $0xffffffffffffffff,%rax > 0x00000035f2c35c8a <+106>: retq >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1044622
: 838469 |
838470
|
838471
|
838472
|
838473
|
838474
|
838475
|
838476
|
838477