Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 856633 Details for
Bug 1058802
[abrt] dsniff: gen_linktype(): urlsnarf killed by SIGABRT
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 11.28 KB, created by
Jacek Wielemborek
on 2014-01-28 14:43:32 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Jacek Wielemborek
Created:
2014-01-28 14:43:32 UTC
Size:
11.28 KB
patch
obsolete
>[New LWP 9992] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `urlsnarf'. >Program terminated with signal SIGABRT, Aborted. >#0 0x00000038bf235c59 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:56 >56 return INLINE_SYSCALL (tgkill, 3, pid, selftid, sig); > >Thread 1 (Thread 0x7f28a2a99740 (LWP 9992)): >#0 0x00000038bf235c59 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:56 > resultvar = 0 > pid = 9992 > selftid = 9992 >#1 0x00000038bf237368 in __GI_abort () at abort.c:89 > save_stage = 2 > act = {__sigaction_handler = {sa_handler = 0x0, sa_sigaction = 0x0}, sa_mask = {__val = {0, 0, 0, 3746994889972252672, 140734413188512, 140734413189152, 140734413188512, 213779640614, 140734413188888, 1, 39, 140734413189152, 243725780149, 214675849217, 213779626361, 140734413189152}}, sa_flags = 9122233, sa_restorer = 0x7fff48b4b020} > sigs = {__val = {32, 0 <repeats 15 times>}} >#2 0x00000031c6418165 in gen_linktype () from /lib64/libpcap.so.1 >No symbol table info available. >#3 0x00000031c64199c9 in gen_port () from /lib64/libpcap.so.1 >No symbol table info available. >#4 0x00000031c641a64d in gen_ncode () from /lib64/libpcap.so.1 >No symbol table info available. >#5 0x00000031c64252e8 in pcap_parse () from /lib64/libpcap.so.1 >No symbol table info available. >#6 0x00000031c6413845 in pcap_compile () from /lib64/libpcap.so.1 >No symbol table info available. >#7 0x00000031c6804dc1 in nids_init () from /lib64/libnids.so.1.24 >No symbol table info available. >#8 0x00000000004015a9 in main () >No symbol table info available. >From To Syms Read Shared Object Library >0x00000038c4203a40 0x00000038c421281c Yes /lib64/libresolv.so.2 >0x00000038dda04110 0x00000038dda10d94 Yes /lib64/libnsl.so.1 >0x00000031c6802990 0x00000031c6807740 Yes (*) /lib64/libnids.so.1.24 >0x00000038c161a6e0 0x00000038c16b2f1c Yes (*) /lib64/libglib-2.0.so.0 >0x00000038c52006b0 0x00000038c520081c Yes (*) /lib64/libgthread-2.0.so.0 >0x00000038bfa059f0 0x00000038bfa11614 Yes /lib64/libpthread.so.0 >0x00000031c6407be0 0x00000031c64266dc Yes (*) /lib64/libpcap.so.1 >0x00000038bfe040c0 0x00000038bfe1143c Yes (*) /lib64/libnet.so.1 >0x00000038bf21f560 0x00000038bf360cc4 Yes /lib64/libc.so.6 >0x00000038bee00b10 0x00000038bee19cb0 Yes /lib64/ld-linux-x86-64.so.2 >(*): Shared library is missing debugging information. >$1 = 0x0 >$2 = 0x0 >rax 0x0 0 >rbx 0x800 2048 >rcx 0xffffffffffffffff -1 >rdx 0x6 6 >rsi 0x2708 9992 >rdi 0x2708 9992 >rbp 0x50 0x50 >rsp 0x7fff48b4aca8 0x7fff48b4aca8 >r8 0x31c6435ca0 213779700896 >r9 0x1 1 >r10 0x8 8 >r11 0x202 514 >r12 0x0 0 >r13 0x0 0 >r14 0xd 13 >r15 0x0 0 >rip 0x38bf235c59 0x38bf235c59 <__GI_raise+57> >eflags 0x202 [ IF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >st0 0 (raw 0x00000000000000000000) >st1 0 (raw 0x00000000000000000000) >st2 0 (raw 0x00000000000000000000) >st3 0 (raw 0x00000000000000000000) >st4 0 (raw 0x00000000000000000000) >st5 0 (raw 0x00000000000000000000) >st6 0 (raw 0x00000000000000000000) >st7 0 (raw 0x00000000000000000000) >fctrl 0x37f 895 >fstat 0x0 0 >ftag 0xffff 65535 >fiseg 0x0 0 >fioff 0x0 0 >foseg 0x0 0 >fooff 0x0 0 >fop 0x0 0 >mxcsr 0x1f80 [ IM DM ZM OM UM PM ] >ymm0 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm1 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x2f <repeats 16 times>, 0x0 <repeats 16 times>}, v16_int16 = {0x2f2f, 0x2f2f, 0x2f2f, 0x2f2f, 0x2f2f, 0x2f2f, 0x2f2f, 0x2f2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x2f2f2f2f, 0x2f2f2f2f, 0x2f2f2f2f, 0x2f2f2f2f, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x2f2f2f2f2f2f2f2f, 0x2f2f2f2f2f2f2f2f, 0x0, 0x0}, v2_int128 = {0x2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f, 0x00000000000000000000000000000000}} >ymm2 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm3 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x8000000000000000, 0x8000000000000000, 0x0, 0x0}, v32_int8 = {0x0, 0x0, 0x0, 0x0, 0x0, 0xff <repeats 11 times>, 0x0 <repeats 16 times>}, v16_int16 = {0x0, 0x0, 0xff00, 0xffff, 0xffff, 0xffff, 0xffff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x0, 0xffffff00, 0xffffffff, 0xffffffff, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xffffff0000000000, 0xffffffffffffffff, 0x0, 0x0}, v2_int128 = {0xffffffffffffffffffffff0000000000, 0x00000000000000000000000000000000}} >ymm4 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm5 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm6 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm7 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm8 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm9 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm10 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x8000000000000000, 0x0, 0x0}, v32_int8 = {0x0 <repeats 13 times>, 0xff, 0xff, 0xff, 0x0 <repeats 16 times>}, v16_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x0, 0x0, 0x0, 0xffffff00, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0xffffff0000000000, 0x0, 0x0}, v2_int128 = {0xffffff00000000000000000000000000, 0x00000000000000000000000000000000}} >ymm11 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm12 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm13 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm14 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm15 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >Dump of assembler code for function __GI_raise: > 0x00000038bf235c20 <+0>: mov %fs:0x2d4,%eax > 0x00000038bf235c28 <+8>: mov %eax,%ecx > 0x00000038bf235c2a <+10>: mov %fs:0x2d0,%esi > 0x00000038bf235c32 <+18>: test %esi,%esi > 0x00000038bf235c34 <+20>: jne 0x38bf235c68 <__GI_raise+72> > 0x00000038bf235c36 <+22>: mov $0xba,%eax > 0x00000038bf235c3b <+27>: syscall > 0x00000038bf235c3d <+29>: mov %eax,%ecx > 0x00000038bf235c3f <+31>: mov %eax,%fs:0x2d0 > 0x00000038bf235c47 <+39>: mov %eax,%esi > 0x00000038bf235c49 <+41>: movslq %edi,%rdx > 0x00000038bf235c4c <+44>: movslq %esi,%rsi > 0x00000038bf235c4f <+47>: movslq %ecx,%rdi > 0x00000038bf235c52 <+50>: mov $0xea,%eax > 0x00000038bf235c57 <+55>: syscall >=> 0x00000038bf235c59 <+57>: cmp $0xfffffffffffff000,%rax > 0x00000038bf235c5f <+63>: ja 0x38bf235c7a <__GI_raise+90> > 0x00000038bf235c61 <+65>: repz retq > 0x00000038bf235c63 <+67>: nopl 0x0(%rax,%rax,1) > 0x00000038bf235c68 <+72>: test %eax,%eax > 0x00000038bf235c6a <+74>: jg 0x38bf235c49 <__GI_raise+41> > 0x00000038bf235c6c <+76>: mov %eax,%ecx > 0x00000038bf235c6e <+78>: neg %ecx > 0x00000038bf235c70 <+80>: test $0x7fffffff,%eax > 0x00000038bf235c75 <+85>: cmove %esi,%ecx > 0x00000038bf235c78 <+88>: jmp 0x38bf235c49 <__GI_raise+41> > 0x00000038bf235c7a <+90>: mov 0x3821b7(%rip),%rdx # 0x38bf5b7e38 > 0x00000038bf235c81 <+97>: neg %eax > 0x00000038bf235c83 <+99>: mov %eax,%fs:(%rdx) > 0x00000038bf235c86 <+102>: or $0xffffffffffffffff,%rax > 0x00000038bf235c8a <+106>: retq >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1058802
: 856633 |
856634
|
856635
|
856636
|
856637
|
856638
|
856639
|
856640
|
856641
|
856642