Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 851990 Details for
Bug 1055062
[abrt] libgsf: memcpy(): gsf-office-thumbnailer killed by SIGBUS
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 4.87 KB, created by
weidemann.m
on 2014-01-18 13:54:37 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
weidemann.m
Created:
2014-01-18 13:54:37 UTC
Size:
4.87 KB
patch
obsolete
>warning: core file may not match specified executable file. >[New LWP 3276] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib/libthread_db.so.1". >Core was generated by `gsf-office-thumbnailer -i /media/shares/Dokumente/Finanzen/PV/2012/sw.ods -o /h'. >Program terminated with signal 7, Bus error. >#0 __memcpy_ia32 () at ../sysdeps/i386/i686/memcpy.S:74 >74 rep > >Thread 1 (Thread 0xb7763740 (LWP 3276)): >#0 __memcpy_ia32 () at ../sysdeps/i386/i686/memcpy.S:74 >No locals. >#1 0x00000000 in ?? () >No symbol table info available. >From To Syms Read Shared Object Library >0x49f2e120 0x49f51e34 Yes /lib/libgsf-1.so.114 >0x4936cf40 0x4943f094 Yes /lib/libgio-2.0.so.0 >0x492fde50 0x4932e6a4 Yes /lib/libgobject-2.0.so.0 >0x4918f1e0 0x4922e4c4 Yes /lib/libglib-2.0.so.0 >0x49796080 0x49886074 Yes /lib/libxml2.so.2 >0x48eb52d0 0x48ffa4ec Yes /lib/libc.so.6 >0x490c8860 0x490d5704 Yes /lib/libz.so.1 >0x4ae9c050 0x4aea9744 Yes /lib/libbz2.so.1 >0x492e5fc0 0x492e9664 Yes /lib/libffi.so.6 >0x492efc80 0x492f0d30 Yes /lib/libgmodule-2.0.so.0 >0x4905fad0 0x490609bc Yes /lib/libdl.so.2 >0x4906a6b0 0x49075d70 Yes /lib/libpthread.so.0 >0x49159af0 0x4916d074 Yes /lib/libselinux.so.1 >0x492ad6e0 0x492bc534 Yes /lib/libresolv.so.2 >0x49693230 0x496acb54 Yes /lib/liblzma.so.5 >0x49086560 0x490b0f48 Yes /lib/libm.so.6 >0x48e7b850 0x48e9411c Yes /lib/ld-linux.so.2 >0x490ebf20 0x49137f84 Yes /lib/libpcre.so.1 >$1 = 0x0 >$2 = 0x0 >eax 0x0 0 >ecx 0x1 1 >edx 0xbf94bf18 -1080770792 >ebx 0x49f66000 1240883200 >esp 0xbf94bea8 0xbf94bea8 >ebp 0x9f42e50 0x9f42e50 >esi 0xb777c000 -1216888832 >edi 0xbf94bf18 -1080770792 >eip 0x48f1d4c6 0x48f1d4c6 <__memcpy_ia32+70> >eflags 0x10246 [ PF ZF IF RF ] >cs 0x73 115 >ss 0x7b 123 >ds 0x7b 123 >es 0x7b 123 >fs 0x0 0 >gs 0x33 51 >st0 *value not available* >st1 *value not available* >st2 *value not available* >st3 *value not available* >st4 *value not available* >st5 *value not available* >st6 *value not available* >st7 *value not available* >fctrl *value not available* >fstat *value not available* >ftag *value not available* >fiseg *value not available* >fioff *value not available* >foseg *value not available* >fooff *value not available* >fop *value not available* >mm0 *value not available* >mm1 *value not available* >mm2 *value not available* >mm3 *value not available* >mm4 *value not available* >mm5 *value not available* >mm6 *value not available* >mm7 *value not available* >Dump of assembler code for function __memcpy_ia32: > 0x48f1d480 <+0>: mov %edi,%eax > 0x48f1d482 <+2>: mov 0x4(%esp),%edi > 0x48f1d486 <+6>: mov %esi,%edx > 0x48f1d488 <+8>: mov 0x8(%esp),%esi > 0x48f1d48c <+12>: mov %edi,%ecx > 0x48f1d48e <+14>: xor %esi,%ecx > 0x48f1d490 <+16>: and $0x3,%ecx > 0x48f1d493 <+19>: mov 0xc(%esp),%ecx > 0x48f1d497 <+23>: cld > 0x48f1d498 <+24>: jne 0x48f1d4d6 <__memcpy_ia32+86> > 0x48f1d49a <+26>: cmp $0x3,%ecx > 0x48f1d49d <+29>: jbe 0x48f1d4d6 <__memcpy_ia32+86> > 0x48f1d49f <+31>: test $0x3,%esi > 0x48f1d4a5 <+37>: je 0x48f1d4bd <__memcpy_ia32+61> > 0x48f1d4a7 <+39>: movsb %ds:(%esi),%es:(%edi) > 0x48f1d4a8 <+40>: dec %ecx > 0x48f1d4a9 <+41>: test $0x3,%esi > 0x48f1d4af <+47>: je 0x48f1d4bd <__memcpy_ia32+61> > 0x48f1d4b1 <+49>: movsb %ds:(%esi),%es:(%edi) > 0x48f1d4b2 <+50>: dec %ecx > 0x48f1d4b3 <+51>: test $0x3,%esi > 0x48f1d4b9 <+57>: je 0x48f1d4bd <__memcpy_ia32+61> > 0x48f1d4bb <+59>: movsb %ds:(%esi),%es:(%edi) > 0x48f1d4bc <+60>: dec %ecx > 0x48f1d4bd <+61>: push %eax > 0x48f1d4be <+62>: mov %ecx,%eax > 0x48f1d4c0 <+64>: shr $0x2,%ecx > 0x48f1d4c3 <+67>: and $0x3,%eax >=> 0x48f1d4c6 <+70>: rep movsl %ds:(%esi),%es:(%edi) > 0x48f1d4c8 <+72>: mov %eax,%ecx > 0x48f1d4ca <+74>: rep movsb %ds:(%esi),%es:(%edi) > 0x48f1d4cc <+76>: pop %eax > 0x48f1d4cd <+77>: mov %eax,%edi > 0x48f1d4cf <+79>: mov %edx,%esi > 0x48f1d4d1 <+81>: mov 0x4(%esp),%eax > 0x48f1d4d5 <+85>: ret > 0x48f1d4d6 <+86>: shr %ecx > 0x48f1d4d8 <+88>: jae 0x48f1d4db <__memcpy_ia32+91> > 0x48f1d4da <+90>: movsb %ds:(%esi),%es:(%edi) > 0x48f1d4db <+91>: shr %ecx > 0x48f1d4dd <+93>: jae 0x48f1d4e1 <__memcpy_ia32+97> > 0x48f1d4df <+95>: movsw %ds:(%esi),%es:(%edi) > 0x48f1d4e1 <+97>: rep movsl %ds:(%esi),%es:(%edi) > 0x48f1d4e3 <+99>: jmp 0x48f1d4cd <__memcpy_ia32+77> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1055062
: 851990 |
851991
|
851992
|
851993
|
851994
|
851995
|
851996
|
851997
|
851998
|
851999