Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 843544 Details for
Bug 1047391
[abrt] libgsf: __memcpy_sse2_unaligned(): gsf-office-thumbnailer killed by SIGBUS
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 12.04 KB, created by
Andrey Motoshkov
on 2013-12-30 21:48:32 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Andrey Motoshkov
Created:
2013-12-30 21:48:32 UTC
Size:
12.04 KB
patch
obsolete
>warning: core file may not match specified executable file. >[New LWP 8806] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `gsf-office-thumbnailer -i /home/andrey/pineapp/pinedc_share/public/R&D/Release'. >Program terminated with signal SIGBUS, Bus error. >#0 __memcpy_sse2_unaligned () at ../sysdeps/x86_64/multiarch/memcpy-sse2-unaligned.S:170 >170 movl (%rsi), %eax > >Thread 1 (Thread 0x7f1bc24d6840 (LWP 8806)): >#0 __memcpy_sse2_unaligned () at ../sysdeps/x86_64/multiarch/memcpy-sse2-unaligned.S:170 >No locals. >#1 0x0000003e0f41dfeb in memcpy (__len=<optimized out>, __src=<optimized out>, __dest=<optimized out>) at /usr/include/bits/string3.h:51 >No locals. >#2 gsf_input_memory_read (input=<optimized out>, num_bytes=<optimized out>, optional_buffer=<optimized out>) at gsf-input-memory.c:132 > mem = <optimized out> > src = <optimized out> >#3 0x0000003e0f41bdf6 in gsf_input_read (input=0x698000, num_bytes=<optimized out>, optional_buffer=<optimized out>) at gsf-input.c:375 > res = <optimized out> > newpos = 4 >#4 0x0000003e0f41c6f6 in gsf_input_uncompress (src=0x698000) at gsf-input.c:723 > cur_offset = 0 > header = "\000\000\000" >#5 0x00000000004014a0 in read_thumbnail_and_write (thumb_size=256, out_filename=<optimized out>, in_filename=0x693130 "/home/andrey/pineapp/pinedc_share/public/R&D/Release Notes/Mail-SeCure/MNGS/07-Nov-13.ods") at main.c:232 > input = <optimized out> > infile = <optimized out> > error = 0x8 >#6 main (argc=1, argv=0x7fffaf8f8d98) at main.c:306 > option_ctx = <optimized out> >From To Syms Read Shared Object Library >0x0000003e0f410b00 0x0000003e0f42f2d0 Yes /lib64/libgsf-1.so.114 >0x0000003e0f031be0 0x0000003e0f0f365c Yes /lib64/libgio-2.0.so.0 >0x0000003e0e40b160 0x0000003e0e439a18 Yes /lib64/libgobject-2.0.so.0 >0x0000003e0dc1a6e0 0x0000003e0dcb2f1c Yes /lib64/libglib-2.0.so.0 >0x0000003e11c2e870 0x0000003e11d16930 Yes /lib64/libxml2.so.2 >0x0000003e0b01f560 0x0000003e0b160cc4 Yes /lib64/libc.so.6 >0x0000003e0c002210 0x0000003e0c00e930 Yes /lib64/libz.so.1 >0x0000003e24c01760 0x0000003e24c0d570 Yes /lib64/libbz2.so.1 >0x0000003e0d801870 0x0000003e0d805fe8 Yes /lib64/libffi.so.6 >0x0000003e0e001190 0x0000003e0e002088 Yes /lib64/libgmodule-2.0.so.0 >0x0000003e0b800ed0 0x0000003e0b8019d0 Yes /lib64/libdl.so.2 >0x0000003e0bc059f0 0x0000003e0bc11614 Yes /lib64/libpthread.so.0 >0x0000003e0c406260 0x0000003e0c41881c Yes /lib64/libselinux.so.1 >0x0000003e0d403a40 0x0000003e0d41281c Yes /lib64/libresolv.so.2 >0x0000003e100030e0 0x0000003e10019060 Yes /lib64/liblzma.so.5 >0x0000003e0b405890 0x0000003e0b474bb8 Yes /lib64/libm.so.6 >0x0000003e0a800b10 0x0000003e0a819cb0 Yes /lib64/ld-linux-x86-64.so.2 >0x0000003e0c801770 0x0000003e0c84b8d8 Yes /lib64/libpcre.so.1 >$1 = 0x0 >$2 = 0x0 >rax 0xffffff1c12c0040c -978937969652 >rbx 0x698000 6914048 >rcx 0x8 8 >rdx 0x4 4 >rsi 0x7f1bc24f9000 139757200838656 >rdi 0x7fffaf8f8bf0 140736138808304 >rbp 0x4 0x4 >rsp 0x7fffaf8f8ba8 0x7fffaf8f8ba8 >r8 0x694c10 6900752 >r9 0x694ce0 6900960 >r10 0x1 1 >r11 0x246 582 >r12 0x0 0 >r13 0x7fffaf8f8d90 140736138808720 >r14 0x0 0 >r15 0x100 256 >rip 0x3e0b0941b6 0x3e0b0941b6 <__memcpy_sse2_unaligned+518> >eflags 0x10202 [ IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >st0 *value not available* >st1 *value not available* >st2 *value not available* >st3 *value not available* >st4 *value not available* >st5 *value not available* >st6 *value not available* >st7 *value not available* >fctrl *value not available* >fstat *value not available* >ftag *value not available* >fiseg *value not available* >fioff *value not available* >foseg *value not available* >fooff *value not available* >fop *value not available* >xmm0 *value not available* >xmm1 *value not available* >xmm2 *value not available* >xmm3 *value not available* >xmm4 *value not available* >xmm5 *value not available* >xmm6 *value not available* >xmm7 *value not available* >xmm8 *value not available* >xmm9 *value not available* >xmm10 *value not available* >xmm11 *value not available* >xmm12 *value not available* >xmm13 *value not available* >xmm14 *value not available* >xmm15 *value not available* >mxcsr *value not available* >Dump of assembler code for function __memcpy_sse2_unaligned: > 0x0000003e0b093fb0 <+0>: mov %rsi,%rax > 0x0000003e0b093fb3 <+3>: lea (%rdx,%rdx,1),%rcx > 0x0000003e0b093fb7 <+7>: sub %rdi,%rax > 0x0000003e0b093fba <+10>: sub %rdx,%rax > 0x0000003e0b093fbd <+13>: cmp %rcx,%rax > 0x0000003e0b093fc0 <+16>: jb 0x3e0b0940cd <__memcpy_sse2_unaligned+285> > 0x0000003e0b093fc6 <+22>: cmp $0x10,%rdx > 0x0000003e0b093fca <+26>: jbe 0x3e0b09415b <__memcpy_sse2_unaligned+427> > 0x0000003e0b093fd0 <+32>: movdqu (%rsi),%xmm8 > 0x0000003e0b093fd5 <+37>: cmp $0x20,%rdx > 0x0000003e0b093fd9 <+41>: movdqu %xmm8,(%rdi) > 0x0000003e0b093fde <+46>: movdqu -0x10(%rsi,%rdx,1),%xmm8 > 0x0000003e0b093fe5 <+53>: movdqu %xmm8,-0x10(%rdi,%rdx,1) > 0x0000003e0b093fec <+60>: ja 0x3e0b094000 <__memcpy_sse2_unaligned+80> > 0x0000003e0b093fee <+62>: mov %rdi,%rax > 0x0000003e0b093ff1 <+65>: retq > 0x0000003e0b093ff2 <+66>: data32 data32 data32 data32 nopw %cs:0x0(%rax,%rax,1) > 0x0000003e0b094000 <+80>: movdqu 0x10(%rsi),%xmm8 > 0x0000003e0b094006 <+86>: cmp $0x40,%rdx > 0x0000003e0b09400a <+90>: movdqu %xmm8,0x10(%rdi) > 0x0000003e0b094010 <+96>: movdqu -0x20(%rsi,%rdx,1),%xmm8 > 0x0000003e0b094017 <+103>: movdqu %xmm8,-0x20(%rdi,%rdx,1) > 0x0000003e0b09401e <+110>: jbe 0x3e0b093fee <__memcpy_sse2_unaligned+62> > 0x0000003e0b094020 <+112>: movdqu 0x20(%rsi),%xmm8 > 0x0000003e0b094026 <+118>: cmp $0x80,%rdx > 0x0000003e0b09402d <+125>: movdqu %xmm8,0x20(%rdi) > 0x0000003e0b094033 <+131>: movdqu -0x30(%rsi,%rdx,1),%xmm8 > 0x0000003e0b09403a <+138>: movdqu %xmm8,-0x30(%rdi,%rdx,1) > 0x0000003e0b094041 <+145>: movdqu 0x30(%rsi),%xmm8 > 0x0000003e0b094047 <+151>: movdqu %xmm8,0x30(%rdi) > 0x0000003e0b09404d <+157>: movdqu -0x40(%rsi,%rdx,1),%xmm8 > 0x0000003e0b094054 <+164>: movdqu %xmm8,-0x40(%rdi,%rdx,1) > 0x0000003e0b09405b <+171>: jbe 0x3e0b093fee <__memcpy_sse2_unaligned+62> > 0x0000003e0b09405d <+173>: lea 0x40(%rdi),%rcx > 0x0000003e0b094061 <+177>: add %rdi,%rdx > 0x0000003e0b094064 <+180>: and $0xffffffffffffffc0,%rdx > 0x0000003e0b094068 <+184>: and $0xffffffffffffffc0,%rcx > 0x0000003e0b09406c <+188>: mov %rcx,%rax > 0x0000003e0b09406f <+191>: sub %rdi,%rax > 0x0000003e0b094072 <+194>: add %rax,%rsi > 0x0000003e0b094075 <+197>: cmp %rdx,%rcx > 0x0000003e0b094078 <+200>: je 0x3e0b093fee <__memcpy_sse2_unaligned+62> > 0x0000003e0b09407e <+206>: mov %rsi,%r10 > 0x0000003e0b094081 <+209>: sub %rcx,%r10 > 0x0000003e0b094084 <+212>: lea 0x10(%r10),%r9 > 0x0000003e0b094088 <+216>: lea 0x20(%r10),%r8 > 0x0000003e0b09408c <+220>: lea 0x30(%r10),%rax > 0x0000003e0b094090 <+224>: movdqu (%rcx,%r10,1),%xmm8 > 0x0000003e0b094096 <+230>: movdqa %xmm8,(%rcx) > 0x0000003e0b09409b <+235>: movdqu (%rcx,%r9,1),%xmm8 > 0x0000003e0b0940a1 <+241>: movdqa %xmm8,0x10(%rcx) > 0x0000003e0b0940a7 <+247>: movdqu (%rcx,%r8,1),%xmm8 > 0x0000003e0b0940ad <+253>: movdqa %xmm8,0x20(%rcx) > 0x0000003e0b0940b3 <+259>: movdqu (%rcx,%rax,1),%xmm8 > 0x0000003e0b0940b9 <+265>: movdqa %xmm8,0x30(%rcx) > 0x0000003e0b0940bf <+271>: add $0x40,%rcx > 0x0000003e0b0940c3 <+275>: cmp %rcx,%rdx > 0x0000003e0b0940c6 <+278>: jne 0x3e0b094090 <__memcpy_sse2_unaligned+224> > 0x0000003e0b0940c8 <+280>: jmpq 0x3e0b093fee <__memcpy_sse2_unaligned+62> > 0x0000003e0b0940cd <+285>: cmp %rsi,%rdi > 0x0000003e0b0940d0 <+288>: jae 0x3e0b09418b <__memcpy_sse2_unaligned+475> > 0x0000003e0b0940d6 <+294>: test %rdx,%rdx > 0x0000003e0b0940d9 <+297>: je 0x3e0b093fee <__memcpy_sse2_unaligned+62> > 0x0000003e0b0940df <+303>: mov %rdx,%r9 > 0x0000003e0b0940e2 <+306>: lea 0x10(%rsi),%rcx > 0x0000003e0b0940e6 <+310>: lea 0x10(%rdi),%r8 > 0x0000003e0b0940ea <+314>: shr $0x4,%r9 > 0x0000003e0b0940ee <+318>: mov %r9,%rax > 0x0000003e0b0940f1 <+321>: shl $0x4,%rax > 0x0000003e0b0940f5 <+325>: cmp %rcx,%rdi > 0x0000003e0b0940f8 <+328>: setae %cl > 0x0000003e0b0940fb <+331>: cmp %r8,%rsi > 0x0000003e0b0940fe <+334>: setae %r8b > 0x0000003e0b094102 <+338>: or %r8d,%ecx > 0x0000003e0b094105 <+341>: cmp $0xf,%rdx > 0x0000003e0b094109 <+345>: seta %r8b > 0x0000003e0b09410d <+349>: test %r8b,%cl > 0x0000003e0b094110 <+352>: je 0x3e0b0941b2 <__memcpy_sse2_unaligned+514> > 0x0000003e0b094116 <+358>: test %rax,%rax > 0x0000003e0b094119 <+361>: je 0x3e0b0941b2 <__memcpy_sse2_unaligned+514> > 0x0000003e0b09411f <+367>: xor %ecx,%ecx > 0x0000003e0b094121 <+369>: xor %r8d,%r8d > 0x0000003e0b094124 <+372>: movdqu (%rsi,%rcx,1),%xmm8 > 0x0000003e0b09412a <+378>: add $0x1,%r8 > 0x0000003e0b09412e <+382>: movdqu %xmm8,(%rdi,%rcx,1) > 0x0000003e0b094134 <+388>: add $0x10,%rcx > 0x0000003e0b094138 <+392>: cmp %r8,%r9 > 0x0000003e0b09413b <+395>: ja 0x3e0b094124 <__memcpy_sse2_unaligned+372> > 0x0000003e0b09413d <+397>: cmp %rax,%rdx > 0x0000003e0b094140 <+400>: je 0x3e0b093fee <__memcpy_sse2_unaligned+62> > 0x0000003e0b094146 <+406>: movzbl (%rsi,%rax,1),%ecx > 0x0000003e0b09414a <+410>: mov %cl,(%rdi,%rax,1) > 0x0000003e0b09414d <+413>: add $0x1,%rax > 0x0000003e0b094151 <+417>: cmp %rax,%rdx > 0x0000003e0b094154 <+420>: ja 0x3e0b094146 <__memcpy_sse2_unaligned+406> > 0x0000003e0b094156 <+422>: jmpq 0x3e0b093fee <__memcpy_sse2_unaligned+62> > 0x0000003e0b09415b <+427>: test $0x18,%dl > 0x0000003e0b09415e <+430>: jne 0x3e0b09419d <__memcpy_sse2_unaligned+493> > 0x0000003e0b094160 <+432>: test $0x4,%dl > 0x0000003e0b094163 <+435>: jne 0x3e0b0941b6 <__memcpy_sse2_unaligned+518> > 0x0000003e0b094165 <+437>: test %rdx,%rdx > 0x0000003e0b094168 <+440>: je 0x3e0b093fee <__memcpy_sse2_unaligned+62> > 0x0000003e0b09416e <+446>: movzbl (%rsi),%eax > 0x0000003e0b094171 <+449>: test $0x2,%dl > 0x0000003e0b094174 <+452>: mov %al,(%rdi) > 0x0000003e0b094176 <+454>: je 0x3e0b093fee <__memcpy_sse2_unaligned+62> > 0x0000003e0b09417c <+460>: movzwl -0x2(%rsi,%rdx,1),%eax > 0x0000003e0b094181 <+465>: mov %ax,-0x2(%rdi,%rdx,1) > 0x0000003e0b094186 <+470>: jmpq 0x3e0b093fee <__memcpy_sse2_unaligned+62> > 0x0000003e0b09418b <+475>: lea -0x1(%rdx),%rax > 0x0000003e0b09418f <+479>: nop > 0x0000003e0b094190 <+480>: movzbl (%rsi,%rax,1),%edx > 0x0000003e0b094194 <+484>: mov %dl,(%rdi,%rax,1) > 0x0000003e0b094197 <+487>: sub $0x1,%rax > 0x0000003e0b09419b <+491>: jmp 0x3e0b094190 <__memcpy_sse2_unaligned+480> > 0x0000003e0b09419d <+493>: mov (%rsi),%rax > 0x0000003e0b0941a0 <+496>: mov %rax,(%rdi) > 0x0000003e0b0941a3 <+499>: mov -0x8(%rsi,%rdx,1),%rax > 0x0000003e0b0941a8 <+504>: mov %rax,-0x8(%rdi,%rdx,1) > 0x0000003e0b0941ad <+509>: jmpq 0x3e0b093fee <__memcpy_sse2_unaligned+62> > 0x0000003e0b0941b2 <+514>: xor %eax,%eax > 0x0000003e0b0941b4 <+516>: jmp 0x3e0b094146 <__memcpy_sse2_unaligned+406> >=> 0x0000003e0b0941b6 <+518>: mov (%rsi),%eax > 0x0000003e0b0941b8 <+520>: mov %eax,(%rdi) > 0x0000003e0b0941ba <+522>: mov -0x4(%rsi,%rdx,1),%eax > 0x0000003e0b0941be <+526>: mov %eax,-0x4(%rdi,%rdx,1) > 0x0000003e0b0941c2 <+530>: jmpq 0x3e0b093fee <__memcpy_sse2_unaligned+62> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1047391
: 843544 |
843545
|
843546
|
843547
|
843548
|
843549
|
843550
|
843551
|
843552
|
843553
|
843554