Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 898606 Details for
Bug 1100636
[abrt] gdb: strlen(): gdb killed by SIGSEGV
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 12.46 KB, created by
Jonas Jonsson
on 2014-05-23 09:20:04 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Jonas Jonsson
Created:
2014-05-23 09:20:04 UTC
Size:
12.46 KB
patch
obsolete
>[New LWP 31095] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >warning: File "/var/cache/abrt-di/usr/lib/debug/usr/lib64/libpython2.7.so.1.0.debug-gdb.py" auto-loading has been declined by your `auto-load safe-path' set to "$debugdir:$datadir/auto-load:/usr/bin/mono-gdb.py". >To enable execution of this file add > add-auto-load-safe-path /var/cache/abrt-di/usr/lib/debug/usr/lib64/libpython2.7.so.1.0.debug-gdb.py >line to your configuration file "/home/jonasj/.gdbinit". >To completely disable this security protection add > set auto-load safe-path / >line to your configuration file "/home/jonasj/.gdbinit". >For more information about this security protection see the >"Auto-loading safe path" section in the GDB manual. E.g., run from the shell: > info "(gdb)Auto-loading safe path" >Core was generated by `gdb --interpreter mi2 --nx'. >Program terminated with signal SIGSEGV, Segmentation fault. >#0 strlen () at ../sysdeps/x86_64/strlen.S:106 >106 movdqu (%rax), %xmm12 > >Thread 1 (Thread 0x7f1bd2764840 (LWP 31095)): >#0 strlen () at ../sysdeps/x86_64/strlen.S:106 >No locals. >#1 0x000000000057cf13 in compare_filenames_for_search () >No symbol table info available. >#2 0x0000000000613400 in dw2_map_symtabs_matching_filename () >No symbol table info available. >#3 0x000000000057d242 in iterate_over_symtabs () >No symbol table info available. >#4 0x000000000058deb7 in collect_symtabs_from_filename () >No symbol table info available. >#5 0x0000000000591993 in parse_linespec () >No symbol table info available. >#6 0x0000000000592217 in decode_line_full () >No symbol table info available. >#7 0x000000000053ef5f in decode_linespec_default.isra.49 () >No symbol table info available. >#8 0x0000000000549215 in addr_string_to_sals () >No symbol table info available. >#9 0x000000000054c55a in breakpoint_re_set_default () >No symbol table info available. >#10 0x000000000053a9cf in breakpoint_re_set_one () >No symbol table info available. >#11 0x00000000005b04ca in catch_errors () >No symbol table info available. >#12 0x000000000054c70e in breakpoint_re_set () >No symbol table info available. >#13 0x0000000000689b05 in solib_add () >No symbol table info available. >#14 0x0000000000689e7e in handle_solib_event () >No symbol table info available. >#15 0x0000000000545a7c in bpstat_stop_status () >No symbol table info available. >#16 0x00000000005a141c in handle_inferior_event () >No symbol table info available. >#17 0x00000000005a394a in wait_for_inferior () >No symbol table info available. >#18 0x00000000005a3e47 in proceed () >No symbol table info available. >#19 0x00000000004ebdcd in exec_continue.isra.0 () >No symbol table info available. >#20 0x00000000004eea99 in mi_execute_command () >No symbol table info available. >#21 0x00000000004e9dcd in mi_execute_command_input_handler () >No symbol table info available. >#22 0x00000000005b8f44 in process_event () >No symbol table info available. >#23 0x00000000005b92d7 in gdb_do_one_event () >No symbol table info available. >#24 0x00000000005b9507 in start_event_loop () >No symbol table info available. >#25 0x00000000005b23c3 in captured_command_loop () >No symbol table info available. >#26 0x00000000005b04ca in catch_errors () >No symbol table info available. >#27 0x00000000005b3096 in captured_main () >No symbol table info available. >#28 0x00000000005b04ca in catch_errors () >No symbol table info available. >#29 0x00000000005b3c54 in gdb_main () >No symbol table info available. >#30 0x0000000000457d1e in main () >No symbol table info available. >From To Syms Read Shared Object Library >0x0000003195014f50 0x0000003195033768 Yes /lib64/libreadline.so.6 >0x0000003441a064a0 0x0000003441a18fe4 Yes /lib64/libselinux.so.1 >0x0000003194406d50 0x0000003194420454 Yes /lib64/libncurses.so.5 >0x000000319100ce40 0x0000003191018ba8 Yes /lib64/libtinfo.so.5 >0x000000317a802210 0x000000317a80e930 Yes /lib64/libz.so.1 >0x000000317ac05890 0x000000317ac74bb8 Yes /lib64/libm.so.6 >0x000000317a000ed0 0x000000317a0019d0 Yes /lib64/libdl.so.2 >0x000000317a4059f0 0x000000317a411614 Yes /lib64/libpthread.so.0 >0x0000003192000f10 0x0000003192001804 Yes /lib64/libutil.so.1 >0x0000003f5883f3d0 0x0000003f58925d90 Yes /lib64/libpython2.7.so.1.0 >0x0000003180403e00 0x000000318041ccdc Yes /lib64/libexpat.so.1 >0x00000034416030e0 0x0000003441619050 Yes /lib64/liblzma.so.5 >0x000000317c402af0 0x000000317c412218 Yes /lib64/libgcc_s.so.1 >0x0000003179c1f560 0x0000003179d60bb4 Yes /lib64/libc.so.6 >0x000000317b401770 0x000000317b44b8e8 Yes /lib64/libpcre.so.1 >0x0000003179800b10 0x0000003179819c70 Yes /lib64/ld-linux-x86-64.so.2 >0x00007f1bcbf3af80 0x00007f1bcbf3fc84 Yes /usr/lib64/python2.7/lib-dynload/itertoolsmodule.so >0x00007f1bcbd32520 0x00007f1bcbd34bfc Yes /usr/lib64/python2.7/lib-dynload/_collectionsmodule.so >0x00007f1bcbb290e0 0x00007f1bcbb2b254 Yes /usr/lib64/python2.7/lib-dynload/operator.so >0x00007f1bcb920e50 0x00007f1bcb921fc4 Yes /usr/lib64/python2.7/lib-dynload/_heapq.so >0x00007f1bcb71d680 0x00007f1bcb71e7e8 Yes /usr/lib64/gconv/UTF-32.so >0x00007f1bcb199820 0x00007f1bcb19cca4 Yes /lib64/libthread_db.so.1 >0x00007f1bca4d7240 0x00007f1bca4ddee4 Yes /lib64/libnss_files.so.2 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0x101e3f560 4326684000 >rbx 0x2 2 >rcx 0x560 1376 >rdx 0x0 0 >rsi 0x1c741c0 29835712 >rdi 0x101e3f560 4326684000 >rbp 0x2 0x2 >rsp 0x7fff8d5ed5b8 0x7fff8d5ed5b8 >r8 0x0 0 >r9 0x0 0 >r10 0x3179d3c450 212497318992 >r11 0x7 7 >r12 0x1c741c0 29835712 >r13 0x101e3f560 4326684000 >r14 0x1b99cc0 28941504 >r15 0x101e3f560 4326684000 >rip 0x3179c8661a 0x3179c8661a <strlen+42> >eflags 0x10293 [ CF AF SF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >st0 *value not available* >st1 *value not available* >st2 *value not available* >st3 *value not available* >st4 *value not available* >st5 *value not available* >st6 *value not available* >st7 *value not available* >fctrl *value not available* >fstat *value not available* >ftag *value not available* >fiseg *value not available* >fioff *value not available* >foseg *value not available* >fooff *value not available* >fop *value not available* >xmm0 *value not available* >xmm1 *value not available* >xmm2 *value not available* >xmm3 *value not available* >xmm4 *value not available* >xmm5 *value not available* >xmm6 *value not available* >xmm7 *value not available* >xmm8 *value not available* >xmm9 *value not available* >xmm10 *value not available* >xmm11 *value not available* >xmm12 *value not available* >xmm13 *value not available* >xmm14 *value not available* >xmm15 *value not available* >mxcsr *value not available* >Dump of assembler code for function strlen: > 0x0000003179c865f0 <+0>: pxor %xmm8,%xmm8 > 0x0000003179c865f5 <+5>: pxor %xmm9,%xmm9 > 0x0000003179c865fa <+10>: pxor %xmm10,%xmm10 > 0x0000003179c865ff <+15>: pxor %xmm11,%xmm11 > 0x0000003179c86604 <+20>: mov %rdi,%rax > 0x0000003179c86607 <+23>: mov %rdi,%rcx > 0x0000003179c8660a <+26>: and $0xfff,%rcx > 0x0000003179c86611 <+33>: cmp $0xfcf,%rcx > 0x0000003179c86618 <+40>: ja 0x3179c86680 <strlen+144> >=> 0x0000003179c8661a <+42>: movdqu (%rax),%xmm12 > 0x0000003179c8661f <+47>: pcmpeqb %xmm8,%xmm12 > 0x0000003179c86624 <+52>: pmovmskb %xmm12,%edx > 0x0000003179c86629 <+57>: test %edx,%edx > 0x0000003179c8662b <+59>: je 0x3179c86631 <strlen+65> > 0x0000003179c8662d <+61>: bsf %edx,%eax > 0x0000003179c86630 <+64>: retq > 0x0000003179c86631 <+65>: and $0xfffffffffffffff0,%rax > 0x0000003179c86635 <+69>: pcmpeqb 0x10(%rax),%xmm9 > 0x0000003179c8663b <+75>: pcmpeqb 0x20(%rax),%xmm10 > 0x0000003179c86641 <+81>: pcmpeqb 0x30(%rax),%xmm11 > 0x0000003179c86647 <+87>: pmovmskb %xmm9,%edx > 0x0000003179c8664c <+92>: pmovmskb %xmm10,%r8d > 0x0000003179c86651 <+97>: pmovmskb %xmm11,%ecx > 0x0000003179c86656 <+102>: shl $0x10,%rdx > 0x0000003179c8665a <+106>: shl $0x10,%rcx > 0x0000003179c8665e <+110>: or %r8,%rcx > 0x0000003179c86661 <+113>: shl $0x20,%rcx > 0x0000003179c86665 <+117>: or %rcx,%rdx > 0x0000003179c86668 <+120>: mov %rdi,%rcx > 0x0000003179c8666b <+123>: xor %rax,%rcx > 0x0000003179c8666e <+126>: and $0xffffffffffffffc0,%rax > 0x0000003179c86672 <+130>: sar %cl,%rdx > 0x0000003179c86675 <+133>: test %rdx,%rdx > 0x0000003179c86678 <+136>: je 0x3179c866f0 <strlen+256> > 0x0000003179c8667a <+138>: bsf %rdx,%rax > 0x0000003179c8667e <+142>: retq > 0x0000003179c8667f <+143>: nop > 0x0000003179c86680 <+144>: and $0xffffffffffffffc0,%rax > 0x0000003179c86684 <+148>: pcmpeqb (%rax),%xmm8 > 0x0000003179c86689 <+153>: pcmpeqb 0x10(%rax),%xmm9 > 0x0000003179c8668f <+159>: pcmpeqb 0x20(%rax),%xmm10 > 0x0000003179c86695 <+165>: pcmpeqb 0x30(%rax),%xmm11 > 0x0000003179c8669b <+171>: pmovmskb %xmm8,%esi > 0x0000003179c866a0 <+176>: pmovmskb %xmm9,%edx > 0x0000003179c866a5 <+181>: pmovmskb %xmm10,%r8d > 0x0000003179c866aa <+186>: pmovmskb %xmm11,%ecx > 0x0000003179c866af <+191>: shl $0x10,%rdx > 0x0000003179c866b3 <+195>: shl $0x10,%rcx > 0x0000003179c866b7 <+199>: or %rsi,%rdx > 0x0000003179c866ba <+202>: or %r8,%rcx > 0x0000003179c866bd <+205>: shl $0x20,%rcx > 0x0000003179c866c1 <+209>: or %rcx,%rdx > 0x0000003179c866c4 <+212>: mov %rdi,%rcx > 0x0000003179c866c7 <+215>: xor %rax,%rcx > 0x0000003179c866ca <+218>: and $0xffffffffffffffc0,%rax > 0x0000003179c866ce <+222>: sar %cl,%rdx > 0x0000003179c866d1 <+225>: test %rdx,%rdx > 0x0000003179c866d4 <+228>: je 0x3179c866e0 <strlen+240> > 0x0000003179c866d6 <+230>: bsf %rdx,%rax > 0x0000003179c866da <+234>: retq > 0x0000003179c866db <+235>: nopl 0x0(%rax,%rax,1) > 0x0000003179c866e0 <+240>: pxor %xmm9,%xmm9 > 0x0000003179c866e5 <+245>: pxor %xmm10,%xmm10 > 0x0000003179c866ea <+250>: pxor %xmm11,%xmm11 > 0x0000003179c866ef <+255>: nop > 0x0000003179c866f0 <+256>: movdqa 0x40(%rax),%xmm8 > 0x0000003179c866f6 <+262>: pminub 0x50(%rax),%xmm8 > 0x0000003179c866fc <+268>: pminub 0x60(%rax),%xmm8 > 0x0000003179c86702 <+274>: pminub 0x70(%rax),%xmm8 > 0x0000003179c86708 <+280>: pcmpeqb %xmm11,%xmm8 > 0x0000003179c8670d <+285>: pmovmskb %xmm8,%edx > 0x0000003179c86712 <+290>: test %edx,%edx > 0x0000003179c86714 <+292>: jne 0x3179c86750 <strlen+352> > 0x0000003179c86716 <+294>: sub $0xffffffffffffff80,%rax > 0x0000003179c8671a <+298>: movdqa (%rax),%xmm8 > 0x0000003179c8671f <+303>: pminub 0x10(%rax),%xmm8 > 0x0000003179c86725 <+309>: pminub 0x20(%rax),%xmm8 > 0x0000003179c8672b <+315>: pminub 0x30(%rax),%xmm8 > 0x0000003179c86731 <+321>: pcmpeqb %xmm11,%xmm8 > 0x0000003179c86736 <+326>: pmovmskb %xmm8,%edx > 0x0000003179c8673b <+331>: test %edx,%edx > 0x0000003179c8673d <+333>: jne 0x3179c86754 <strlen+356> > 0x0000003179c8673f <+335>: jmp 0x3179c866f0 <strlen+256> > 0x0000003179c86741 <+337>: data32 data32 data32 data32 data32 nopw %cs:0x0(%rax,%rax,1) > 0x0000003179c86750 <+352>: add $0x40,%rax > 0x0000003179c86754 <+356>: pxor %xmm8,%xmm8 > 0x0000003179c86759 <+361>: pcmpeqb (%rax),%xmm8 > 0x0000003179c8675e <+366>: pcmpeqb 0x10(%rax),%xmm9 > 0x0000003179c86764 <+372>: pcmpeqb 0x20(%rax),%xmm10 > 0x0000003179c8676a <+378>: pcmpeqb 0x30(%rax),%xmm11 > 0x0000003179c86770 <+384>: pmovmskb %xmm8,%esi > 0x0000003179c86775 <+389>: pmovmskb %xmm9,%edx > 0x0000003179c8677a <+394>: pmovmskb %xmm10,%r8d > 0x0000003179c8677f <+399>: pmovmskb %xmm11,%ecx > 0x0000003179c86784 <+404>: shl $0x10,%rdx > 0x0000003179c86788 <+408>: shl $0x10,%rcx > 0x0000003179c8678c <+412>: or %rsi,%rdx > 0x0000003179c8678f <+415>: or %r8,%rcx > 0x0000003179c86792 <+418>: shl $0x20,%rcx > 0x0000003179c86796 <+422>: or %rcx,%rdx > 0x0000003179c86799 <+425>: bsf %rdx,%rdx > 0x0000003179c8679d <+429>: add %rdx,%rax > 0x0000003179c867a0 <+432>: sub %rdi,%rax > 0x0000003179c867a3 <+435>: retq >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1100636
: 898606 |
898607
|
898608
|
898609
|
898610
|
898611
|
898612
|
898613
|
898614
|
898615
|
898616