Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 883248 Details for
Bug 1084765
[abrt] dvdauthor: cell_start(): dvdauthor killed by SIGABRT
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 7.98 KB, created by
Peter H. Jones
on 2014-04-06 12:23:40 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Peter H. Jones
Created:
2014-04-06 12:23:40 UTC
Size:
7.98 KB
patch
obsolete
>[New LWP 3032] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `dvdauthor -x notaire.xml -o notaire.d'. >Program terminated with signal 6, Aborted. >#0 0x00000036c26359e9 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:56 >56 return INLINE_SYSCALL (tgkill, 3, pid, selftid, sig); > >Thread 1 (Thread 0x7ffa3f38a740 (LWP 3032)): >#0 0x00000036c26359e9 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:56 > resultvar = 0 > pid = 3032 > selftid = 3032 >#1 0x00000036c26370f8 in __GI_abort () at abort.c:90 > save_stage = 2 > act = {__sigaction_handler = {sa_handler = 0x7ffff91aa2b7, sa_sigaction = 0x7ffff91aa2b7}, sa_mask = {__val = {235190857489, 4311172, 1275, 140737372654384, 235189502645, 4, 140737372654288, 8589934594, 18446603336336897153, 5, 0, 0, 0, 21474836480, 140712779423744, 235190869448}}, sa_flags = 4315776, sa_restorer = 0x41df40 <__PRETTY_FUNCTION__.5889>} > sigs = {__val = {32, 0 <repeats 15 times>}} >#2 0x00000036c262e956 in __assert_fail_base (fmt=0x36c277ddc8 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n", assertion=assertion@entry=0x41da80 "vobbasic != vob_has_chapters_pause", file=file@entry=0x41c884 "dvdcli.c", line=line@entry=1275, function=function@entry=0x41df40 <__PRETTY_FUNCTION__.5889> "cell_start") at assert.c:92 > str = 0xf82eb0 "" > total = 4096 >#3 0x00000036c262ea02 in __GI___assert_fail (assertion=assertion@entry=0x41da80 "vobbasic != vob_has_chapters_pause", file=file@entry=0x41c884 "dvdcli.c", line=line@entry=1275, function=function@entry=0x41df40 <__PRETTY_FUNCTION__.5889> "cell_start") at assert.c:101 >No locals. >#4 0x0000000000415893 in cell_start () at dvdcli.c:1275 >No locals. >#5 0x0000000000415b86 in readxml (xmlfile=xmlfile@entry=0x7ffff91aa2c4 "notaire.xml", elems=elems@entry=0x626600 <elems>, attrs=attrs@entry=0x6262c0 <attrs>) at readxml.c:125 > empty = true > depth = 5 > elemname = 0xf81990 "cell" > tagindex = 15 > r = <optimized out> > curstate = 5 > statehistory = {0, 1, 4, 9, 13, 0, 0, 0, 0, 0} > f = 0xf7c5c0 > fd = {h = 0xf7a010, ftype = 0, mode = 0} > __PRETTY_FUNCTION__ = "readxml" >#6 0x00000000004029ed in readdvdauthorxml (fb=0x7ffff91aa2d3 "notaire.d", xmlfile=0x7ffff91aa2c4 "notaire.xml") at dvdcli.c:1409 >No locals. >#7 main (argc=5, argv=0x7ffff91a8e88) at dvdcli.c:638 > va = {0x0, 0x0} > mg = <optimized out> > fbase = 0x7ffff91aa2d3 "notaire.d" > xmlfile = 0x7ffff91aa2c4 "notaire.xml" > istitle = true > istoc = false > usedtocflag = false > curpgc = 0x0 > fpc = 0x0 > curvob = 0x0 > longopts = {{name = 0x41c8f6 "video", has_arg = 1, flag = 0x0, val = 118}, {name = 0x4181e1 "audio", has_arg = 1, flag = 0x0, val = 97}, {name = 0x41c8fc "subpictures", has_arg = 1, flag = 0x0, val = 115}, {name = 0x41c908 "palette", has_arg = 2, flag = 0x0, val = 112}, {name = 0x41e1ac "file", has_arg = 1, flag = 0x0, val = 102}, {name = 0x41c910 "chapters", has_arg = 2, flag = 0x0, val = 99}, {name = 0x41c919 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x41c91e "menu", has_arg = 0, flag = 0x0, val = 109}, {name = 0x4181db "title", has_arg = 0, flag = 0x0, val = 116}, {name = 0x41c923 "button", has_arg = 1, flag = 0x0, val = 98}, {name = 0x41c92a "toc", has_arg = 0, flag = 0x0, val = 84}, {name = 0x41c92e "instructions", has_arg = 1, flag = 0x0, val = 105}, {name = 0x41c93b "entry", has_arg = 1, flag = 0x0, val = 101}, {name = 0x41c941 "fpc", has_arg = 1, flag = 0x0, val = 70}, {name = 0x41c81c "jumppad", has_arg = 0, flag = 0x0, val = 106}, {name = 0x41c814 "allgprm", has_arg = 0, flag = 0x0, val = 103}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} >From To Syms Read Shared Object Library >0x00000036d222e870 0x00000036d2315060 Yes /lib64/libxml2.so.2 >0x00000036c261f410 0x00000036c2762740 Yes /lib64/libc.so.6 >0x00000036c2a00ed0 0x00000036c2a019d0 Yes /lib64/libdl.so.2 >0x00000036c3602170 0x00000036c360e5f0 Yes /lib64/libz.so.1 >0x00000036cba02f30 0x00000036cba187a0 Yes /lib64/liblzma.so.5 >0x00000036c32054b0 0x00000036c326fbb8 Yes /lib64/libm.so.6 >0x00000036c2200ae0 0x00000036c221ac0a Yes /lib64/ld-linux-x86-64.so.2 >0x00000036c2e05790 0x00000036c2e103b4 Yes /lib64/libpthread.so.0 >$1 = 0x7ffa3f3ba000 "" >No symbol "__glib_assert_msg" in current context. >rax 0x0 0 >rbx 0x7ffa3f3ba000 140712779423744 >rcx 0xffffffffffffffff -1 >rdx 0x6 6 >rsi 0xbd8 3032 >rdi 0xbd8 3032 >rbp 0x36c277ddc8 0x36c277ddc8 >rsp 0x7ffff91a8a38 0x7ffff91a8a38 >r8 0xfefefefefefefeff -72340172838076673 >r9 0xfefeff092d63646b -72340129110072213 >r10 0x8 8 >r11 0x206 518 >r12 0x41da80 4315776 >r13 0x41df40 4316992 >r14 0xf 15 >r15 0x5 5 >rip 0x36c26359e9 0x36c26359e9 <__GI_raise+57> >eflags 0x206 [ PF IF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >st0 *value not available* >st1 *value not available* >st2 *value not available* >st3 *value not available* >st4 *value not available* >st5 *value not available* >st6 *value not available* >st7 *value not available* >fctrl *value not available* >fstat *value not available* >ftag *value not available* >fiseg *value not available* >fioff *value not available* >foseg *value not available* >fooff *value not available* >fop *value not available* >xmm0 *value not available* >xmm1 *value not available* >xmm2 *value not available* >xmm3 *value not available* >xmm4 *value not available* >xmm5 *value not available* >xmm6 *value not available* >xmm7 *value not available* >xmm8 *value not available* >xmm9 *value not available* >xmm10 *value not available* >xmm11 *value not available* >xmm12 *value not available* >xmm13 *value not available* >xmm14 *value not available* >xmm15 *value not available* >mxcsr *value not available* >Dump of assembler code for function __GI_raise: > 0x00000036c26359b0 <+0>: mov %fs:0x2d4,%eax > 0x00000036c26359b8 <+8>: mov %eax,%ecx > 0x00000036c26359ba <+10>: mov %fs:0x2d0,%esi > 0x00000036c26359c2 <+18>: test %esi,%esi > 0x00000036c26359c4 <+20>: jne 0x36c26359f8 <__GI_raise+72> > 0x00000036c26359c6 <+22>: mov $0xba,%eax > 0x00000036c26359cb <+27>: syscall > 0x00000036c26359cd <+29>: mov %eax,%ecx > 0x00000036c26359cf <+31>: mov %eax,%fs:0x2d0 > 0x00000036c26359d7 <+39>: mov %eax,%esi > 0x00000036c26359d9 <+41>: movslq %edi,%rdx > 0x00000036c26359dc <+44>: movslq %esi,%rsi > 0x00000036c26359df <+47>: movslq %ecx,%rdi > 0x00000036c26359e2 <+50>: mov $0xea,%eax > 0x00000036c26359e7 <+55>: syscall >=> 0x00000036c26359e9 <+57>: cmp $0xfffffffffffff000,%rax > 0x00000036c26359ef <+63>: ja 0x36c2635a0a <__GI_raise+90> > 0x00000036c26359f1 <+65>: repz retq > 0x00000036c26359f3 <+67>: nopl 0x0(%rax,%rax,1) > 0x00000036c26359f8 <+72>: test %eax,%eax > 0x00000036c26359fa <+74>: jg 0x36c26359d9 <__GI_raise+41> > 0x00000036c26359fc <+76>: mov %eax,%ecx > 0x00000036c26359fe <+78>: neg %ecx > 0x00000036c2635a00 <+80>: test $0x7fffffff,%eax > 0x00000036c2635a05 <+85>: cmove %esi,%ecx > 0x00000036c2635a08 <+88>: jmp 0x36c26359d9 <__GI_raise+41> > 0x00000036c2635a0a <+90>: mov 0x38444f(%rip),%rdx # 0x36c29b9e60 > 0x00000036c2635a11 <+97>: neg %eax > 0x00000036c2635a13 <+99>: mov %eax,%fs:(%rdx) > 0x00000036c2635a16 <+102>: or $0xffffffffffffffff,%rax > 0x00000036c2635a1a <+106>: retq >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1084765
: 883248 |
883249
|
883250
|
883251
|
883252
|
883253
|
883254
|
883255
|
883256