Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 847238 Details for
Bug 1050046
[abrt] arp-scan: get_hardware_address(): arp-scan killed by SIGSEGV
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 8.54 KB, created by
Uosef
on 2014-01-08 16:34:09 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Uosef
Created:
2014-01-08 16:34:09 UTC
Size:
8.54 KB
patch
obsolete
>[New LWP 10904] >Core was generated by `arp-scan --interface=eth0 --localnet'. >Program terminated with signal SIGSEGV, Segmentation fault. >#0 0x00000000004086d0 in get_hardware_address () > >Thread 1 (LWP 10904): >#0 0x00000000004086d0 in get_hardware_address () >No symbol table info available. >#1 0x00000000004025a8 in main () >No symbol table info available. >From To Syms Read Shared Object Library >0x0000003ee9407be0 0x0000003ee94266bc Yes (*) /lib64/libpcap.so.1 >0x0000003ee981f560 0x0000003ee9960cc4 Yes (*) /lib64/libc.so.6 >0x0000003ee9000b10 0x0000003ee9019cb0 Yes (*) /lib64/ld-linux-x86-64.so.2 >(*): Shared library is missing debugging information. >$1 = 0x0 >No symbol table is loaded. Use the "file" command. >rax 0x0 0 >rbx 0x0 0 >rcx 0x0 0 >rdx 0x8 8 >rsi 0xffffffff 4294967295 >rdi 0x3ee9bb8760 270209353568 >rbp 0x7fffa790cad0 0x7fffa790cad0 >rsp 0x7fffa790c990 0x7fffa790c990 >r8 0x0 0 >r9 0x5 5 >r10 0x7fffa790c750 140736004671312 >r11 0x3ee98803d0 270205977552 >r12 0x231f010 36827152 >r13 0x7fffa790ce00 140736004673024 >r14 0x7fffa790ce08 140736004673032 >r15 0x0 0 >rip 0x4086d0 0x4086d0 <get_hardware_address+208> >eflags 0x10202 [ IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >st0 *value not available* >st1 *value not available* >st2 *value not available* >st3 *value not available* >st4 *value not available* >st5 *value not available* >st6 *value not available* >st7 *value not available* >fctrl *value not available* >fstat *value not available* >ftag *value not available* >fiseg *value not available* >fioff *value not available* >foseg *value not available* >fooff *value not available* >fop *value not available* >xmm0 *value not available* >xmm1 *value not available* >xmm2 *value not available* >xmm3 *value not available* >xmm4 *value not available* >xmm5 *value not available* >xmm6 *value not available* >xmm7 *value not available* >xmm8 *value not available* >xmm9 *value not available* >xmm10 *value not available* >xmm11 *value not available* >xmm12 *value not available* >xmm13 *value not available* >xmm14 *value not available* >xmm15 *value not available* >mxcsr *value not available* >Dump of assembler code for function get_hardware_address: > 0x0000000000408600 <+0>: push %r13 > 0x0000000000408602 <+2>: push %r12 > 0x0000000000408604 <+4>: mov %rdi,%r12 > 0x0000000000408607 <+7>: mov $0x48,%edi > 0x000000000040860c <+12>: push %rbp > 0x000000000040860d <+13>: mov %rsi,%rbp > 0x0000000000408610 <+16>: push %rbx > 0x0000000000408611 <+17>: sub $0x8,%rsp > 0x0000000000408615 <+21>: callq 0x407360 <Malloc> > 0x000000000040861a <+26>: test $0x1,%al > 0x000000000040861c <+28>: mov %rax,%rbx > 0x000000000040861f <+31>: mov %rax,%rdi > 0x0000000000408622 <+34>: mov $0x48,%r8d > 0x0000000000408628 <+40>: jne 0x408758 <get_hardware_address+344> > 0x000000000040862e <+46>: test $0x2,%dil > 0x0000000000408632 <+50>: jne 0x408770 <get_hardware_address+368> > 0x0000000000408638 <+56>: test $0x4,%dil > 0x000000000040863c <+60>: jne 0x408740 <get_hardware_address+320> > 0x0000000000408642 <+66>: mov %r8d,%ecx > 0x0000000000408645 <+69>: xor %eax,%eax > 0x0000000000408647 <+71>: shr $0x3,%ecx > 0x000000000040864a <+74>: test $0x4,%r8b > 0x000000000040864e <+78>: rep stos %rax,%es:(%rdi) > 0x0000000000408651 <+81>: je 0x40865d <get_hardware_address+93> > 0x0000000000408653 <+83>: movl $0x0,(%rdi) > 0x0000000000408659 <+89>: add $0x4,%rdi > 0x000000000040865d <+93>: test $0x2,%r8b > 0x0000000000408661 <+97>: je 0x40866d <get_hardware_address+109> > 0x0000000000408663 <+99>: xor %edx,%edx > 0x0000000000408665 <+101>: add $0x2,%rdi > 0x0000000000408669 <+105>: mov %dx,-0x2(%rdi) > 0x000000000040866d <+109>: and $0x1,%r8d > 0x0000000000408671 <+113>: je 0x408676 <get_hardware_address+118> > 0x0000000000408673 <+115>: movb $0x0,(%rdi) > 0x0000000000408676 <+118>: xor %edx,%edx > 0x0000000000408678 <+120>: mov $0x3,%esi > 0x000000000040867d <+125>: mov $0x11,%edi > 0x0000000000408682 <+130>: callq 0x401fc0 <socket@plt> > 0x0000000000408687 <+135>: test %eax,%eax > 0x0000000000408689 <+137>: mov %eax,(%rbx) > 0x000000000040868b <+139>: js 0x408788 <get_hardware_address+392> > 0x0000000000408691 <+145>: lea 0x8(%rbx),%r13 > 0x0000000000408695 <+149>: mov $0x10,%edx > 0x000000000040869a <+154>: mov %r12,%rsi > 0x000000000040869d <+157>: mov %r13,%rdi > 0x00000000004086a0 <+160>: callq 0x408860 <strlcpy> > 0x00000000004086a5 <+165>: mov (%rbx),%edi > 0x00000000004086a7 <+167>: xor %eax,%eax > 0x00000000004086a9 <+169>: mov %r13,%rdx > 0x00000000004086ac <+172>: mov $0x8933,%esi > 0x00000000004086b1 <+177>: callq 0x401c90 <ioctl@plt> > 0x00000000004086b6 <+182>: test %eax,%eax > 0x00000000004086b8 <+184>: jne 0x408718 <get_hardware_address+280> > 0x00000000004086ba <+186>: mov $0x11,%eax > 0x00000000004086bf <+191>: movb $0x6,0x3b(%rbx) > 0x00000000004086c3 <+195>: mov %r13,%rdx > 0x00000000004086c6 <+198>: mov %ax,0x30(%rbx) > 0x00000000004086ca <+202>: mov 0x18(%rbx),%eax > 0x00000000004086cd <+205>: mov %eax,0x34(%rbx) >=> 0x00000000004086d0 <+208>: mov (%rbx),%edi > 0x00000000004086d2 <+210>: xor %eax,%eax > 0x00000000004086d4 <+212>: mov $0x8927,%esi > 0x00000000004086d9 <+217>: callq 0x401c90 <ioctl@plt> > 0x00000000004086de <+222>: test %eax,%eax > 0x00000000004086e0 <+224>: je 0x4086ee <get_hardware_address+238> > 0x00000000004086e2 <+226>: mov $0x40db58,%edi > 0x00000000004086e7 <+231>: xor %eax,%eax > 0x00000000004086e9 <+233>: callq 0x4070a0 <err_sys> > 0x00000000004086ee <+238>: mov (%rbx),%edi > 0x00000000004086f0 <+240>: test %edi,%edi > 0x00000000004086f2 <+242>: jne 0x408730 <get_hardware_address+304> > 0x00000000004086f4 <+244>: mov %rbx,%rdi > 0x00000000004086f7 <+247>: callq 0x401ac0 <free@plt> > 0x00000000004086fc <+252>: mov 0x1a(%rbx),%eax > 0x00000000004086ff <+255>: mov %eax,0x0(%rbp) > 0x0000000000408702 <+258>: movzwl 0x1e(%rbx),%eax > 0x0000000000408706 <+262>: mov %ax,0x4(%rbp) > 0x000000000040870a <+266>: add $0x8,%rsp > 0x000000000040870e <+270>: pop %rbx > 0x000000000040870f <+271>: pop %rbp > 0x0000000000408710 <+272>: pop %r12 > 0x0000000000408712 <+274>: pop %r13 > 0x0000000000408714 <+276>: retq > 0x0000000000408715 <+277>: nopl (%rax) > 0x0000000000408718 <+280>: mov $0x40db58,%edi > 0x000000000040871d <+285>: xor %eax,%eax > 0x000000000040871f <+287>: callq 0x4070a0 <err_sys> > 0x0000000000408724 <+292>: jmp 0x4086ba <get_hardware_address+186> > 0x0000000000408726 <+294>: nopw %cs:0x0(%rax,%rax,1) > 0x0000000000408730 <+304>: callq 0x401cb0 <close@plt> > 0x0000000000408735 <+309>: jmp 0x4086f4 <get_hardware_address+244> > 0x0000000000408737 <+311>: nopw 0x0(%rax,%rax,1) > 0x0000000000408740 <+320>: movl $0x0,(%rdi) > 0x0000000000408746 <+326>: sub $0x4,%r8d > 0x000000000040874a <+330>: add $0x4,%rdi > 0x000000000040874e <+334>: jmpq 0x408642 <get_hardware_address+66> > 0x0000000000408753 <+339>: nopl 0x0(%rax,%rax,1) > 0x0000000000408758 <+344>: lea 0x1(%rax),%rdi > 0x000000000040875c <+348>: movb $0x0,(%rax) > 0x000000000040875f <+351>: mov $0x47,%r8b > 0x0000000000408762 <+354>: test $0x2,%dil > 0x0000000000408766 <+358>: je 0x408638 <get_hardware_address+56> > 0x000000000040876c <+364>: nopl 0x0(%rax) > 0x0000000000408770 <+368>: xor %ecx,%ecx > 0x0000000000408772 <+370>: add $0x2,%rdi > 0x0000000000408776 <+374>: sub $0x2,%r8d > 0x000000000040877a <+378>: mov %cx,-0x2(%rdi) > 0x000000000040877e <+382>: jmpq 0x408638 <get_hardware_address+56> > 0x0000000000408783 <+387>: nopl 0x0(%rax,%rax,1) > 0x0000000000408788 <+392>: mov %rbx,%rdi > 0x000000000040878b <+395>: xor %ebx,%ebx > 0x000000000040878d <+397>: callq 0x401ac0 <free@plt> > 0x0000000000408792 <+402>: mov $0x8,%edx > 0x0000000000408797 <+407>: jmpq 0x4086d0 <get_hardware_address+208> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1050046
: 847238 |
847239
|
847240
|
847241
|
847242
|
847243
|
847244
|
847245
|
847246
|
847247
|
847248