Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 847052 Details for
Bug 1049835
[abrt] pptp: vector_destroy(): pptp killed by SIGABRT
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 7.15 KB, created by
Christopher Meng
on 2014-01-08 10:30:36 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Christopher Meng
Created:
2014-01-08 10:30:36 UTC
Size:
7.15 KB
patch
obsolete
>warning: core file may not match specified executable file. >[New LWP 2028] >Core was generated by `pptp --nolaunchpppd 10.6.205.202'. >Program terminated with signal SIGABRT, Aborted. >#0 0xb77c7424 in __kernel_vsyscall () > >Thread 1 (LWP 2028): >#0 0xb77c7424 in __kernel_vsyscall () >No symbol table info available. >#1 0xb75f7946 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:56 > resultvar = <optimized out> > resultvar = <optimized out> > pid = -1216831488 > selftid = 2028 >#2 0xb75f9183 in __GI_abort () at abort.c:89 > save_stage = 2 > act = {__sigaction_handler = {sa_handler = 0x31323133, sa_sigaction = 0x31323133}, sa_mask = {__val = {1869819442, 1644835118, 862140215, 758132784, 1664563042, 808464436, 757953056, 808460400, 811675952, 807415856, 909130296, 808662304, 540358194, 538976288, 1920169263, 1651076143, 1651076143, 1600349031, 775171443, 758263352, 858861618, 842084913, 779055918, 929172017, 808739639, 1647128624, 895694647, 540028976, 1882027890, 808464416, 3, 4096}}, sa_flags = -1218581171, sa_restorer = 0xb75f9048 <__GI_abort+8>} > sigs = {__val = {32, 0 <repeats 31 times>}} >#3 0xb7638cf8 in __libc_message (do_abort=do_abort@entry=2, fmt=fmt@entry=0xb7745df0 "*** Error in `%s': %s: 0x%s ***\n") at ../sysdeps/posix/libc_fatal.c:175 > ap = <optimized out> > fd = 0 > on_2 = <optimized out> > list = <optimized out> > nlist = <optimized out> > cp = <optimized out> > written = <optimized out> >#4 0xb7640b92 in malloc_printerr (ptr=<optimized out>, str=0xb7741985 "free(): invalid pointer", action=3) at malloc.c:4862 > buf = "b778a480" > cp = <optimized out> >#5 _int_free (av=0xb778a420 <main_arena>, p=<optimized out>, have_lock=0) at malloc.c:3736 > size = <optimized out> > fb = <optimized out> > nextchunk = <optimized out> > nextsize = <optimized out> > nextinuse = <optimized out> > prevsize = <optimized out> > bck = <optimized out> > fwd = <optimized out> > errstr = 0xb7741985 "free(): invalid pointer" > locked = <optimized out> >#6 0x0804eb33 in vector_destroy (v=0x8e504d0) at vector.c:58 >No locals. >#7 0x0804c11f in pptp_conn_destroy (conn=conn@entry=0x8e50410) at pptp_ctrl.c:459 > i = 0 > __PRETTY_FUNCTION__ = "pptp_conn_destroy" >#8 0x080513bf in callmgr_main (argc=argc@entry=3, argv=argv@entry=0xbfabf690, envp=envp@entry=0xbfac0a04) at pptp_callmgr.c:307 > rc = <optimized out> > read_set = {__fds_bits = {0 <repeats 32 times>}} > write_set = {__fds_bits = {0 <repeats 32 times>}} > tv = {tv_sec = 0, tv_usec = 0} > inetaddr = {s_addr = 3402434058} > inet_sock = 0 > unix_sock = 1 > call_set = {__fds_bits = {0 <repeats 32 times>}} > conn = 0x8e50410 > call_list = 0x8e526c8 > max_fd = 6 > first = 0 > retval = <optimized out> > i = <optimized out> > phonenr = 0x0 > __FUNCTION__ = "callmgr_main" > __PRETTY_FUNCTION__ = "callmgr_main" >#9 0x0804a4b2 in launch_callmgr (inetaddr=inetaddr@entry=..., phonenr=phonenr@entry=0x0, argc=argc@entry=3, argv=argv@entry=0xbfac09f4, envp=envp@entry=0xbfac0a04) at pptp.c:527 > my_argv = {0xbfac1060 "pptp", 0xb75c66e0 "10.6.205.202", 0x0} > buf = "pptp: call manager for 10.6.205.202\000 \254x\267\001\000\000\000i\351c\267\000\240x\267\330\270x\267\000\000\000\000(\367\253\277Oah\267\360X\005\b\f\206\004\b\f\367\253\277\002\000\000\000\000\000\000\000\350\a\000\000\000\000\000\000\320\366\253\277\062\065\065.\001\000\000\000^\367\253\277\000\240x\267\004\n\254\277 \351}\267\vah\267" > rc = <optimized out> >#10 0x0804a64c in open_callmgr (inetaddr=inetaddr@entry=..., phonenr=0x0, argc=argc@entry=3, argv=argv@entry=0xbfac09f4, envp=envp@entry=0xbfac0a04, pty_fd=0, gre_fd=gre_fd@entry=4) at pptp.c:496 > where = {a = {sa_family = 1, sa_data = "/var/run/pptp/"}, u = {sun_family = 1, sun_path = "/var/run/pptp/255.255.255.255:10.6.205.202\000\000\301\256\004\b\004\000\000\000\314\367\253\277\264\367\253\277\214p\005\b\360X\005\b\f\204\004\b8\370\253\277\070\370\253\277t\020\254\277\234\323\\\267H\t\254\277\026\243\004\bt\020\254\277\364\t\254\277\003\000\000"}} > i = 0 > fd = 1 > pid = <optimized out> > status = 4 > __FUNCTION__ = "open_callmgr" >#11 0x0804995e in main (argc=3, argv=0xbfac09f4, envp=0xbfac0a04) at pptp.c:394 > inetaddr = <optimized out> > callmgr_sock = -1 > ttydev = '\000' <repeats 2108 times>... > tty_name = <optimized out> > pty_fd = 0 > tty_fd = 0 > gre_fd = 4 > rc = <optimized out> > parent_pid = 0 > child_pid = 2024 > call_id = 0 > peer_call_id = 0 > buf = '\000' <repeats 127 times> > pppdargc = <optimized out> > pppdargv = <optimized out> > phonenrbuf = '\000' <repeats 64 times> > phonenr = 0x0 > launchpppd = 0 > debug = 0 > __FUNCTION__ = "main" >From To Syms Read Shared Object Library >0xb778ea90 0xb778f4f7 Yes /lib/libutil.so.1 >0xb75de3a0 0xb7727c7b Yes /lib/libc.so.6 >0xb77c88b0 0xb77e2ffc Yes /lib/ld-linux.so.2 >0xb77aa0c0 0xb77bf701 Yes /lib/libgcc_s.so.1 >$1 = 0xb77c5000 "" >No symbol "__glib_assert_msg" in current context. >eax 0x0 0 >ecx 0x7ec 2028 >edx 0x6 6 >ebx 0x7ec 2028 >esp 0xbfabf084 0xbfabf084 >ebp 0xbfabf348 0xbfabf348 >esi 0x3d 61 >edi 0xb778a000 -1216831488 >eip 0xb77c7424 0xb77c7424 <__kernel_vsyscall+16> >eflags 0x202 [ IF ] >cs 0x73 115 >ss 0x7b 123 >ds 0x7b 123 >es 0x7b 123 >fs 0x0 0 >gs 0x33 51 >st0 *value not available* >st1 *value not available* >st2 *value not available* >st3 *value not available* >st4 *value not available* >st5 *value not available* >st6 *value not available* >st7 *value not available* >fctrl *value not available* >fstat *value not available* >ftag *value not available* >fiseg *value not available* >fioff *value not available* >foseg *value not available* >fooff *value not available* >fop *value not available* >mm0 *value not available* >mm1 *value not available* >mm2 *value not available* >mm3 *value not available* >mm4 *value not available* >mm5 *value not available* >mm6 *value not available* >mm7 *value not available* >Dump of assembler code for function __kernel_vsyscall: > 0xb77c7414 <+0>: push %ecx > 0xb77c7415 <+1>: push %edx > 0xb77c7416 <+2>: push %ebp > 0xb77c7417 <+3>: mov %esp,%ebp > 0xb77c7419 <+5>: sysenter > 0xb77c741b <+7>: nop > 0xb77c741c <+8>: nop > 0xb77c741d <+9>: nop > 0xb77c741e <+10>: nop > 0xb77c741f <+11>: nop > 0xb77c7420 <+12>: nop > 0xb77c7421 <+13>: nop > 0xb77c7422 <+14>: int $0x80 >=> 0xb77c7424 <+16>: pop %ebp > 0xb77c7425 <+17>: pop %edx > 0xb77c7426 <+18>: pop %ecx > 0xb77c7427 <+19>: ret >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1049835
: 847052 |
847053
|
847054
|
847055
|
847056
|
847057
|
847058
|
847060
|
847061
|
847062