Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 921814 Details for
Bug 1123925
[abrt] fuse-afp: __strncat_sse2(): afpfsd killed by SIGSEGV
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 15.00 KB, created by
Stefan Ringel
on 2014-07-28 16:19:27 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Stefan Ringel
Created:
2014-07-28 16:19:27 UTC
Size:
15.00 KB
patch
obsolete
>[New LWP 3665] >[New LWP 3664] >warning: the debug information found in "/var/cache/abrt-di/usr/lib/debug/usr/lib64/libgcrypt.so.20.0.1.debug" does not match "/lib64/libgcrypt.so.20" (CRC mismatch). > >warning: the debug information found in "/var/cache/abrt-di/usr/lib/debug//usr/lib64/libgcrypt.so.20.0.1.debug" does not match "/lib64/libgcrypt.so.20" (CRC mismatch). > >warning: the debug information found in "/var/cache/abrt-di/usr/lib/debug/usr/lib64//libgcrypt.so.20.0.1.debug" does not match "/lib64/libgcrypt.so.20" (CRC mismatch). > >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `'. >Program terminated with signal SIGSEGV, Segmentation fault. >#0 __strncat_sse2 (s1=0xa45843 "", s2=0x801 <error: Cannot access memory at address 0x801>, n=139680082205280) at ../string/strncat.c:49 >49 c = *s2++; > >Thread 2 (Thread 0x7f09cf71d700 (LWP 3664)): >#0 0x00007f09cdffa94c in __pselect (nfds=7, readfds=readfds@entry=0x7fffffb645b0, writefds=writefds@entry=0x0, exceptfds=exceptfds@entry=0x7fffffb64630, timeout=<optimized out>, timeout@entry=0x7fffffb645a0, sigmask=sigmask@entry=0x7fffffb64730) at ../sysdeps/unix/sysv/linux/pselect.c:77 > resultvar = 18446744073709551102 > oldtype = 0 > tval = {tv_sec = 29, tv_nsec = 999185182} > data = {ss = 140737483523888, ss_len = 8} > result = <optimized out> >#1 0x00007f09cf321031 in afp_main_loop (command_fd=command_fd@entry=4) at loop.c:221 > ords = {__fds_bits = {16, 0 <repeats 15 times>}} > oeds = {__fds_bits = {16, 0 <repeats 15 times>}} > tv = {tv_sec = 30, tv_nsec = 0} > ret = <optimized out> > fderrors = 0 > sigmask = {__val = {2048, 0 <repeats 15 times>}} > orig_sigmask = {__val = {0, 0, 4213647, 139680107541784, 4, 140737483524112, 140737483524114, 139680109867584, 140737483524656, 139680107631564, 0, 139680087308047, 139680090434760, 140737483524016, 1, 6}} >#2 0x0000000000402bf5 in main (argc=<optimized out>, argv=<optimized out>) at daemon.c:281 > option_index = 0 > long_options = {{name = 0x404b49 "logmethod", has_arg = 1, flag = 0x0, val = 108}, {name = 0x404b53 "foreground", has_arg = 0, flag = 0x0, val = 102}, {name = 0x404b5e "debug", has_arg = 1, flag = 0x0, val = 100}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} > new_log_method = 1 > dofork = 1 > c = <optimized out> > command_fd = <optimized out> > >Thread 1 (Thread 0x7f09cdaf5700 (LWP 3665)): >#0 __strncat_sse2 (s1=0xa45843 "", s2=0x801 <error: Cannot access memory at address 0x801>, n=139680082205280) at ../string/strncat.c:49 > n4 = <optimized out> > c = <optimized out> > s = 0xa45844 "" >#1 0x00007f09cf320314 in log_for_client (priv=priv@entry=0xa45040, loglevel=loglevel@entry=AFPFSD, logtype=logtype@entry=6, format=format@entry=0x7f09cdae9f60 "AFPFS Version: 0.8.1\nUAMs compiled in: Cleartxt Passwrd, No User Authent, Randnum Exchange, 2-Way Randnum Exchange, DHCAST128, DHX2\n") at log.c:18 > ap = {{gp_offset = 32, fp_offset = 48, overflow_arg_area = 0x7f09cdae9f50, reg_save_area = 0x7f09cdae9e70}} > new_message = "AFPFS Version: 0.8.1\nUAMs compiled in: Cleartxt Passwrd, No User Authent, Randnum Exchange, 2-Way Randnum Exchange, DHCAST128, DHX2\n", '\000' <repeats 276 times>... >#2 0x0000000000402f45 in process_status (c=0xa45040) at commands.c:393 > s = <optimized out> > text = "AFPFS Version: 0.8.1\nUAMs compiled in: Cleartxt Passwrd, No User Authent, Randnum Exchange, 2-Way Randnum Exchange, DHCAST128, DHX2\n", '\000' <repeats 40827 times> > len = 40828 >#3 0x0000000000403205 in process_command_thread (other=0xa45040) at commands.c:565 > tosend = '\000' <repeats 1320 times>... >#4 0x00007f09ce96858a in start_thread (arg=0x7f09cdaf5700) at pthread_create.c:310 > __res = <optimized out> > pd = 0x7f09cdaf5700 > now = <optimized out> > unwind_buf = {cancel_jmp_buf = {{jmp_buf = {139680082253568, -4506862495330935673, 140737483523072, 0, 139680082253568, 139680082254272, 4568887729181744263, 4568890128128203911}, mask_was_saved = 0}}, priv = {pad = {0x0, 0x0, 0x0, 0x0}, data = {prev = 0x0, cleanup = 0x0, canceltype = 0}}} > not_first_call = <optimized out> > pagesize_m1 = <optimized out> > sp = <optimized out> > freesize = <optimized out> > __PRETTY_FUNCTION__ = "start_thread" >#5 0x00007f09ce003f5d in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:109 >No locals. >From To Syms Read Shared Object Library >0x00007f09cf31a010 0x00007f09cf328e19 Yes /lib64/libafpclient.so.0 >0x00007f09cf0a6480 0x00007f09cf0f9aa8 Yes (*) /lib64/libgmp.so.10 >0x00007f09cee65640 0x00007f09cee7d6db Yes (*) /lib64/libfuse.so.2 >0x00007f09ceb86600 0x00007f09cec26d48 Yes (*) /lib64/libgcrypt.so.20 >0x00007f09ce966ac0 0x00007f09ce973551 Yes /lib64/libpthread.so.0 >0x00007f09ce72cdf0 0x00007f09ce74e385 Yes (*) /lib64/libreadline.so.6 >0x00007f09ce4f5d80 0x00007f09ce5103b7 Yes /lib64/libncurses.so.5 >0x00007f09ce2d1e40 0x00007f09ce2ddfb8 Yes /lib64/libtinfo.so.5 >0x00007f09cdf1e4d0 0x00007f09ce06dda4 Yes /lib64/libc.so.6 >0x00007f09cdcfbed0 0x00007f09cdcfcade Yes /lib64/libdl.so.2 >0x00007f09cdaf6db0 0x00007f09cdaf75f5 Yes (*) /lib64/libgpg-error.so.0 >0x00007f09cf534b10 0x00007f09cf5507a0 Yes /lib64/ld-linux-x86-64.so.2 >(*): Shared library is missing debugging information. >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0xa45844 10770500 >rbx 0x7f09cdae9a60 139680082205280 >rcx 0xa45843 10770499 >rdx 0x7f09cdae9a60 139680082205280 >rsi 0x800 2048 >rdi 0x7f09ce52f2a3 139680092975779 >rbp 0xa45040 0xa45040 >rsp 0x7f09cdae9a38 0x7f09cdae9a38 >r8 0xa45845 10770501 >r9 0x41434844202c6567 4702681893339686247 >r10 0x5d7 1495 >r11 0x7f09cdf9d3f0 139680087135216 >r12 0x0 0 >r13 0x6 6 >r14 0x7f09cdaf5700 139680082253568 >r15 0x7f09cdaf59c0 139680082254272 >rip 0x7f09cdf9d45e 0x7f09cdf9d45e <__strncat_sse2+110> >eflags 0x10206 [ PF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >st0 0 (raw 0x00000000000000000000) >st1 0 (raw 0x00000000000000000000) >st2 0 (raw 0x00000000000000000000) >st3 0 (raw 0x00000000000000000000) >st4 0 (raw 0x00000000000000000000) >st5 0 (raw 0x00000000000000000000) >st6 0 (raw 0x00000000000000000000) >st7 0 (raw 0x00000000000000000000) >fctrl 0x37f 895 >fstat 0x0 0 >ftag 0xffff 65535 >fiseg 0x0 0 >fioff 0x0 0 >foseg 0x0 0 >fooff 0x0 0 >fop 0x0 0 >xmm0 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm1 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x25 <repeats 16 times>}, v8_int16 = {0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525}, v4_int32 = {0x25252525, 0x25252525, 0x25252525, 0x25252525}, v2_int64 = {0x2525252525252525, 0x2525252525252525}, uint128 = 0x25252525252525252525252525252525} >xmm2 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm3 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x8000000000000000, 0x8000000000000000}, v16_int8 = {0x0, 0x0, 0x0, 0x0, 0xff <repeats 12 times>}, v8_int16 = {0x0, 0x0, 0xffff, 0xffff, 0xffff, 0xffff, 0xffff, 0xffff}, v4_int32 = {0x0, 0xffffffff, 0xffffffff, 0xffffffff}, v2_int64 = {0xffffffff00000000, 0xffffffffffffffff}, uint128 = 0xffffffffffffffffffffffff00000000} >xmm4 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x8000000000000000, 0x8000000000000000}, v16_int8 = {0xff <repeats 16 times>}, v8_int16 = {0xffff, 0xffff, 0xffff, 0xffff, 0xffff, 0xffff, 0xffff, 0xffff}, v4_int32 = {0xffffffff, 0xffffffff, 0xffffffff, 0xffffffff}, v2_int64 = {0xffffffffffffffff, 0xffffffffffffffff}, uint128 = 0xffffffffffffffffffffffffffffffff} >xmm5 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm6 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm7 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x20 <repeats 16 times>}, v8_int16 = {0x2020, 0x2020, 0x2020, 0x2020, 0x2020, 0x2020, 0x2020, 0x2020}, v4_int32 = {0x20202020, 0x20202020, 0x20202020, 0x20202020}, v2_int64 = {0x2020202020202020, 0x2020202020202020}, uint128 = 0x20202020202020202020202020202020} >xmm8 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm9 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm10 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm11 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm12 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x8000000000000000, 0x8000000000000000}, v16_int8 = {0xff <repeats 16 times>}, v8_int16 = {0xffff, 0xffff, 0xffff, 0xffff, 0xffff, 0xffff, 0xffff, 0xffff}, v4_int32 = {0xffffffff, 0xffffffff, 0xffffffff, 0xffffffff}, v2_int64 = {0xffffffffffffffff, 0xffffffffffffffff}, uint128 = 0xffffffffffffffffffffffffffffffff} >xmm13 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm14 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm15 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >mxcsr 0x1f80 [ IM DM ZM OM UM PM ] >Dump of assembler code for function __strncat_sse2: > 0x00007f09cdf9d3f0 <+0>: mov %rdi,%rax > 0x00007f09cdf9d3f3 <+3>: mov %rdi,%rcx > 0x00007f09cdf9d3f6 <+6>: jmp 0x7f09cdf9d403 <__strncat_sse2+19> > 0x00007f09cdf9d3f8 <+8>: nopl 0x0(%rax,%rax,1) > 0x00007f09cdf9d400 <+16>: mov %r8,%rcx > 0x00007f09cdf9d403 <+19>: lea 0x1(%rcx),%r8 > 0x00007f09cdf9d407 <+23>: cmpb $0x0,-0x1(%r8) > 0x00007f09cdf9d40c <+28>: jne 0x7f09cdf9d400 <__strncat_sse2+16> > 0x00007f09cdf9d40e <+30>: sub $0x1,%rcx > 0x00007f09cdf9d412 <+34>: cmp $0x3,%rdx > 0x00007f09cdf9d416 <+38>: jbe 0x7f09cdf9d478 <__strncat_sse2+136> > 0x00007f09cdf9d418 <+40>: mov %rdx,%rdi > 0x00007f09cdf9d41b <+43>: and $0xfffffffffffffffc,%rdi > 0x00007f09cdf9d41f <+47>: add %rcx,%rdi > 0x00007f09cdf9d422 <+50>: jmp 0x7f09cdf9d45e <__strncat_sse2+110> > 0x00007f09cdf9d424 <+52>: nopl 0x0(%rax) > 0x00007f09cdf9d428 <+56>: movzbl 0x1(%rsi),%r8d > 0x00007f09cdf9d42d <+61>: test %r8b,%r8b > 0x00007f09cdf9d430 <+64>: mov %r8b,0x2(%rcx) > 0x00007f09cdf9d434 <+68>: je 0x7f09cdf9d470 <__strncat_sse2+128> > 0x00007f09cdf9d436 <+70>: movzbl 0x2(%rsi),%r8d > 0x00007f09cdf9d43b <+75>: test %r8b,%r8b > 0x00007f09cdf9d43e <+78>: mov %r8b,0x3(%rcx) > 0x00007f09cdf9d442 <+82>: je 0x7f09cdf9d470 <__strncat_sse2+128> > 0x00007f09cdf9d444 <+84>: add $0x4,%rsi > 0x00007f09cdf9d448 <+88>: movzbl -0x1(%rsi),%r8d > 0x00007f09cdf9d44d <+93>: add $0x4,%rcx > 0x00007f09cdf9d451 <+97>: test %r8b,%r8b > 0x00007f09cdf9d454 <+100>: mov %r8b,(%rcx) > 0x00007f09cdf9d457 <+103>: je 0x7f09cdf9d470 <__strncat_sse2+128> > 0x00007f09cdf9d459 <+105>: cmp %rdi,%rcx > 0x00007f09cdf9d45c <+108>: je 0x7f09cdf9d4bf <__strncat_sse2+207> >=> 0x00007f09cdf9d45e <+110>: movzbl (%rsi),%r8d > 0x00007f09cdf9d462 <+114>: test %r8b,%r8b > 0x00007f09cdf9d465 <+117>: mov %r8b,0x1(%rcx) > 0x00007f09cdf9d469 <+121>: jne 0x7f09cdf9d428 <__strncat_sse2+56> > 0x00007f09cdf9d46b <+123>: nopl 0x0(%rax,%rax,1) > 0x00007f09cdf9d470 <+128>: repz retq > 0x00007f09cdf9d472 <+130>: nopw 0x0(%rax,%rax,1) > 0x00007f09cdf9d478 <+136>: test %rdx,%rdx > 0x00007f09cdf9d47b <+139>: je 0x7f09cdf9d470 <__strncat_sse2+128> > 0x00007f09cdf9d47d <+141>: movzbl (%rsi),%edi > 0x00007f09cdf9d480 <+144>: lea 0x1(%rsi),%r8 > 0x00007f09cdf9d484 <+148>: lea 0x1(%rcx),%r9 > 0x00007f09cdf9d488 <+152>: test %dil,%dil > 0x00007f09cdf9d48b <+155>: mov %dil,0x1(%rcx) > 0x00007f09cdf9d48f <+159>: je 0x7f09cdf9d470 <__strncat_sse2+128> > 0x00007f09cdf9d491 <+161>: add %rdx,%rsi > 0x00007f09cdf9d494 <+164>: jmp 0x7f09cdf9d4b4 <__strncat_sse2+196> > 0x00007f09cdf9d496 <+166>: nopw %cs:0x0(%rax,%rax,1) > 0x00007f09cdf9d4a0 <+176>: add $0x1,%r8 > 0x00007f09cdf9d4a4 <+180>: movzbl -0x1(%r8),%ecx > 0x00007f09cdf9d4a9 <+185>: add $0x1,%r9 > 0x00007f09cdf9d4ad <+189>: test %cl,%cl > 0x00007f09cdf9d4af <+191>: mov %cl,(%r9) > 0x00007f09cdf9d4b2 <+194>: je 0x7f09cdf9d470 <__strncat_sse2+128> > 0x00007f09cdf9d4b4 <+196>: cmp %rsi,%r8 > 0x00007f09cdf9d4b7 <+199>: jne 0x7f09cdf9d4a0 <__strncat_sse2+176> > 0x00007f09cdf9d4b9 <+201>: movb $0x0,0x1(%r9) > 0x00007f09cdf9d4be <+206>: retq > 0x00007f09cdf9d4bf <+207>: and $0x3,%edx > 0x00007f09cdf9d4c2 <+210>: jne 0x7f09cdf9d47d <__strncat_sse2+141> > 0x00007f09cdf9d4c4 <+212>: mov %rcx,%r9 > 0x00007f09cdf9d4c7 <+215>: jmp 0x7f09cdf9d4b9 <__strncat_sse2+201> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1123925
: 921814 |
921815
|
921816
|
921817
|
921818
|
921819
|
921820
|
921821
|
921822
|
921823