Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 931619 Details for
Bug 1134537
[abrt] aircrack-ng: PTW_computeKey(): aircrack-ng killed by SIGSEGV
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 32.15 KB, created by
Guillaume Poirier-Morency
on 2014-08-27 17:40:22 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Guillaume Poirier-Morency
Created:
2014-08-27 17:40:22 UTC
Size:
32.15 KB
patch
obsolete
>[New LWP 3406] >[New LWP 3408] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `aircrack-ng dump-01.cap'. >Program terminated with signal SIGSEGV, Segmentation fault. >#0 0x0000000000412036 in PTW_computeKey (state=0x7f5dfa5e9010, keybuf=keybuf@entry=0x625140 <wep> "\205\025>\341\327\327-\300\316+\377\377\362", keylen=keylen@entry=5, testlimit=200000, bf=bf@entry=0x61b8e0 <PTW_DEFAULTBF>, validchars=validchars@entry=0xe40190, attacks=0) at aircrack-ptw-lib.c:465 >465 table[i][guessbuf[0]].votes += state->allsessions[j].weight; > >Thread 2 (Thread 0x7f5dfb2f4700 (LWP 3408)): >#0 0x00000000004114a6 in guesskeybytes (ivlen=ivlen@entry=3, iv=iv@entry=0x7f5df40008d8 "W\213\365", keystream=keystream@entry=0x7f5dfb2f35d0 "\315\036\236\024?\017C\246u\262P\361p\025D\363\250\016\v *\023", result=result@entry=0x7f5dfb2f3420 "\210\017\340\v\321g\220J\242\366kJ\352\210\bv\207\231G\205-\026\376\345\313\260\224wY", kb=kb@entry=29) at aircrack-ptw-lib.c:223 > state = "W\343\332\003\004\005\006\a\b\t\n\v\f\r\016\017\020\021\022\023\024\025\026\027\030\031\032\033\034\035\036\037 !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUV\000XYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\177\200\201\202\203\204\205\206\207\210\211\212\213\214\215\216\217\220\221\222\223\224\225\226\227\230\231\232\233\234\235\236\237\240\241\242\243\244\245\246\247\250\251\252\253\254\255\256\257\260\261\262\263\264\265\266\267\270\271\272\273\274\275\276\277\300\301\302\303\304\305\306\307"... > j = <optimized out> > tmp = 249 '\371' > i = 12 > jj = 15 > ii = 185 '\271' > s = 102 'f' >#1 0x00000000004126a4 in PTW_addsession (state=0x7f5dfa883010, iv=iv@entry=0x7f5df40008d8 "W\213\365", keystream=keystream@entry=0x7f5dfb2f35d0 "\315\036\236\024?\017C\246u\262P\361p\025D\363\250\016\v *\023", weight=weight@entry=0x7f5dfb2f3570, total=total@entry=1) at aircrack-ptw-lib.c:567 > i = <optimized out> > j = <optimized out> > il = <optimized out> > ir = <optimized out> > buf = "\210\017\340\v\321g\220J\242\366kJ\352\210\bv\207\231G\205-\026\376\345\313\260\224wY" >#2 0x00000000004079a1 in read_thread (arg=<optimized out>) at aircrack-ng.c:1462 > body = 0x7f5df40008d8 "W\213\365" > clear = "\315\036\236\024?\017C\246u\262P\361p\025D\363\250\016\v *\023", '\000' <repeats 2025 times> > i = <optimized out> > k = 1 > weight = {256, 0 <repeats 15 times>} > dlen = <optimized out> > clearsize = 22 > j = <optimized out> > fd = <optimized out> > n = <optimized out> > z = <optimized out> > fmt = <optimized out> > eof_notified = 1 > rb = {off1 = 61864, off2 = 65536, buf1 = 0x7f5df40108d0, buf2 = 0x7f5df40208e0} > bssid = "\000#Q\235F9" > dest = <optimized out> > stmac = "HZ\266a\207\213" > buffer = 0x7f5df40008c0 "\bB" > h80211 = 0x7f5df40008c0 "\bB" > p = <optimized out> > weight = {63266, 63288, 0, 0, -201193248, 32605, 0, 0, -1582119980, 262146, 0, 0, 65535, 105, 0, 0} > ivs2 = {flags = 0, len = 0} > fivs2 = {version = 2264} > pkh = {tv_sec = 1405286773, tv_usec = 237056, caplen = 68, len = 68} > pfh = {magic = 2712847316, version_major = 2, version_minor = 4, thiszone = 0, sigfigs = 0, snaplen = 65535, linktype = 105} > ap_prv = <optimized out> > ap_cur = 0x7f5df4132ab0 > st_prv = <optimized out> > st_cur = <optimized out> >#3 0x0000003c87e07f33 in start_thread (arg=0x7f5dfb2f4700) at pthread_create.c:309 > __res = <optimized out> > pd = 0x7f5dfb2f4700 > now = <optimized out> > unwind_buf = {cancel_jmp_buf = {{jmp_buf = {140041622865664, -4121660872524073182, 0, 0, 140041622866368, 140041622865664, 4068752778826315554, -4128142215523764446}, mask_was_saved = 0}}, priv = {pad = {0x0, 0x0, 0x0, 0x0}, data = {prev = 0x0, cleanup = 0x0, canceltype = 0}}} > not_first_call = <optimized out> > pagesize_m1 = <optimized out> > sp = <optimized out> > freesize = <optimized out> >#4 0x0000003c876f4ded in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:111 >No locals. > >Thread 1 (Thread 0x7f5dfb2f5840 (LWP 3406)): >#0 0x0000000000412036 in PTW_computeKey (state=0x7f5dfa5e9010, keybuf=keybuf@entry=0x625140 <wep> "\205\025>\341\327\327-\300\316+\377\377\362", keylen=keylen@entry=5, testlimit=200000, bf=bf@entry=0x61b8e0 <PTW_DEFAULTBF>, validchars=validchars@entry=0xe40190, attacks=0) at aircrack-ptw-lib.c:465 > strongbytes = {0, 0, 0, 0, 0, 1, 0, 1, 0, 0, 0, 0, 0, 0, 1405286752, 0, 911523742, 0, 1405286752, 0, 911523742, 0, 1405286424, 0, 911523742, 0, 0, 0, 0} > normal = {15.417420873071418, 19.259714153585278, 17.33438200866545, 18.154740922587802, 15.752261246100931, 14.697514071057913, 17.36786604596842, 14.730998108360877, 16.924202551704283, 16.572620160023288, 14.287334614096755, 18.045917801353216, 16.376299963040921, 1.2844205465701211e-312, 6.1438588472219898e+39, 4.78766309619562e-299, -176.128256144104, 2.3335862621619412e-302, 2.0462379042451438e-115, 1.2844710620354033e-312, 6.9532425093263895e-310, 6.9532425093111229e-310, 1.2844379918106868e-312, 3.2431552419692876e-314, 0, 6.9532425093220417e-310, 1.2844710595848377e-312, 1.2843983113927628e-312, -nan(0xfffffffffff60)} > ausreisser = {14.828081537152409, 18.247434096421546, 16.675775812235983, 17.582381224869611, 15.252351088853672, 14.334859250435258, 16.656006320556209, 14.376487589998419, 16.155990588792207, 15.897762382598135, 13.949293625389673, 17.666722278666711, 15.884461785573968, 2.1162995618909374e-317, 0, 0, 0, 0, 0, 1.284424037287188e-312, 2.0861683326168228e-314, 7.3824553609652412e-317, 2.09075933239482e-317, 1.657809211691619e-315, 1.2844198592852825e-312, 6.631236846766476e-316, 0, 0, 0} > helper = {{keybyte = 10, difference = 0.33804098870708188}, {keybyte = 7, difference = 0.35451051836245817}, {keybyte = 5, difference = 0.36265482062265519}, {keybyte = 11, difference = 0.37919552268650492}, {keybyte = 12, difference = 0.49183817746695269}, {keybyte = 4, difference = 0.49991015724725862}, {keybyte = 3, difference = 0.57235969771819128}, {keybyte = 2, difference = 0.65860619642946716}, {keybyte = 9, difference = 0.67485777742515296}, {keybyte = 6, difference = 0.71185972541221076}, {keybyte = 8, difference = 0.76821196291207627}, {keybyte = 1, difference = 1.012280057163732}, {keybyte = 2001779567, difference = 1.9893711246813302e-314}, {keybyte = 1, difference = 1.6333810251511611e-319}, {keybyte = 0, difference = 1.2844199174960968e-312}, {keybyte = 0, difference = 3.1641070666720113e-317}, {keybyte = 2001779872, difference = 1.2844198581291688e-312}, {keybyte = 4231744, difference = 6.631236846766476e-316}, {keybyte = 0, difference = 0}, {keybyte = 0, difference = 1.2844380615332308e-312}, {keybyte = 1, difference = 3.1649529070576915e-317}, {keybyte = 6576080, difference = 0}, {keybyte = 32768, difference = -nan(0xf800088af4391)}, {keybyte = 2049, difference = 2.5296161067071823e-321}, {keybyte = 560, difference = 3.1620201333839779e-322}, {keybyte = 2001779824, difference = 3.9525251667299724e-323}, {keybyte = 155, difference = 4.9406564584124654e-324}, {keybyte = 0, difference = 2.6312747813898164e-312}, {keybyte = 2001779823, difference = 0}} > simple = <optimized out> > onestrong = <optimized out> > twostrong = <optimized out> > i = 3 > j = 1043 > fullkeybuf = "Wx\255\205\025>\341\024\006\301>P+\t#\304[\000\000\000n\000\000\000\000\000\000\000\000\000\000" > guessbuf = " \000\000\000\000\000\000\000w\000\000\000|\000\000\000o\273Pw\377\177\000\000`\207\233\207<\000\000" > sh = 0x0 > table = 0x7fff77508fd0 >#1 0x00000000004040d7 in crack_wep_ptw (ap_cur=0x7f5df4132ab0) at aircrack-ng.c:4897 > all = 0xe40190 > i = <optimized out> > j = <optimized out> > len = <optimized out> >#2 main (argc=<optimized out>, argv=<optimized out>) at aircrack-ng.c:5822 > i = <optimized out> > n = 1 > ret = 1 > option = <optimized out> > j = <optimized out> > ret1 = <optimized out> > nbMergeBSSID = <optimized out> > unused = <optimized out> > cpu_count = <optimized out> > showhelp = 0 > zz = <optimized out> > forceptw = <optimized out> > s = <optimized out> > buf = "14\000\000\000\000\000\000K\210g\207\000\000\000\000 \206g\207<\000\000\000\020\000\344", '\000' <repeats 21 times>, "\360\275Pw\377\177\000\000\310\fB\211<", '\000' <repeats 11 times>, "\315\273f\207<\000\000\000P\002\344\000\000\000\000\000\020\000\344", '\000' <repeats 13 times>, "g\254 \211<\000\000\000h\021B\207<\000\000\000P\002\344\000\000\000\000" > ap_cur = 0x7f5df4132ab0 > old = <optimized out> > essid = '\000' <repeats 32 times> > rc = <optimized out> > zErrMsg = 0x0 > looper = "|/-\\" > looperc = 0 > waited = 0 > sqlformat = 0x416a78 "SELECT pmk.PMK, passwd.passwd FROM pmk INNER JOIN passwd ON passwd.passwd_id = pmk.passwd_id INNER JOIN essid ON essid.essid_id = pmk.essid_id WHERE essid.essid = '%q'" > sql = 0x6457d0 <mc_pipe+16> "" >From To Syms Read Shared Object Library >0x0000003c87e059f0 0x0000003c87e11614 Yes /lib64/libpthread.so.0 >0x00000037d52183c0 0x00000037d5252400 Yes /lib64/libssl.so.10 >0x0000003c8de69c40 0x0000003c8df5a4f8 Yes /lib64/libcrypto.so.10 >0x0000003c9d20b150 0x0000003c9d29bff0 Yes /lib64/libsqlite3.so.0 >0x0000003c8761f560 0x0000003c87760bb4 Yes /lib64/libc.so.6 >0x0000003c87200b10 0x0000003c87219c70 Yes /lib64/ld-linux-x86-64.so.2 >0x00000037d3e0bee0 0x00000037d3e3c1c4 Yes /lib64/libgssapi_krb5.so.2 >0x00000037d32251a0 0x00000037d32877ac Yes /lib64/libkrb5.so.3 >0x0000003c8fa01570 0x0000003c8fa02154 Yes /lib64/libcom_err.so.2 >0x00000037d36048b0 0x00000037d36247e8 Yes /lib64/libk5crypto.so.3 >0x0000003c87a00ed0 0x0000003c87a019d0 Yes /lib64/libdl.so.2 >0x0000003c88202210 0x0000003c8820e930 Yes /lib64/libz.so.1 >0x00000037d2e03620 0x00000037d2e09f8c Yes /lib64/libkrb5support.so.0 >0x0000003c90601570 0x0000003c90602194 Yes /lib64/libkeyutils.so.1 >0x0000003c89603a40 0x0000003c896127dc Yes /lib64/libresolv.so.2 >0x0000003c892064a0 0x0000003c89218fe4 Yes /lib64/libselinux.so.1 >0x0000003c88e01770 0x0000003c88e4b8e8 Yes /lib64/libpcre.so.1 >0x0000003c88a030e0 0x0000003c88a19050 Yes /lib64/liblzma.so.5 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0x20 32 >rbx 0x6 6 >rcx 0x57 87 >rdx 0x7f5dfa5c0010 140041609019408 >rsi 0x89 137 >rdi 0x7 7 >rbp 0x7fff7750bce0 0x7fff7750bce0 >rsp 0x7fff77508fb0 0x7fff77508fb0 >r8 0x1 1 >r9 0x263 611 >r10 0x6 6 >r11 0x7f5dfa5ca311 140041609061137 >r12 0xa2f8 41720 >r13 0x413 1043 >r14 0x7f5dfa5e9010 140041609187344 >r15 0x7fff7750a7d0 140735195162576 >rip 0x412036 0x412036 <PTW_computeKey+342> >eflags 0x10206 [ PF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >Dump of assembler code for function PTW_computeKey: > 0x0000000000411ee0 <+0>: push %rbp > 0x0000000000411ee1 <+1>: mov %rsp,%rbp > 0x0000000000411ee4 <+4>: push %r15 > 0x0000000000411ee6 <+6>: push %r14 > 0x0000000000411ee8 <+8>: push %r13 > 0x0000000000411eea <+10>: push %r12 > 0x0000000000411eec <+12>: push %rbx > 0x0000000000411eed <+13>: mov %rdi,%rbx > 0x0000000000411ef0 <+16>: sub $0x4f8,%rsp > 0x0000000000411ef7 <+23>: mov %rsi,-0x4e0(%rbp) > 0x0000000000411efe <+30>: mov %edx,-0x4b8(%rbp) > 0x0000000000411f04 <+36>: mov %fs:0x28,%rax > 0x0000000000411f0d <+45>: mov %rax,-0x38(%rbp) > 0x0000000000411f11 <+49>: xor %eax,%eax > 0x0000000000411f13 <+51>: movslq %edx,%rax > 0x0000000000411f16 <+54>: mov %ecx,-0x4f4(%rbp) > 0x0000000000411f1c <+60>: mov %r8,-0x4d8(%rbp) > 0x0000000000411f23 <+67>: mov %rax,-0x4f0(%rbp) > 0x0000000000411f2a <+74>: shl $0xb,%rax > 0x0000000000411f2e <+78>: mov %r9,-0x4e8(%rbp) > 0x0000000000411f35 <+85>: mov %rax,-0x500(%rbp) > 0x0000000000411f3c <+92>: add $0x10,%rax > 0x0000000000411f40 <+96>: movl $0x0,0x2348f6(%rip) # 0x646840 <tried> > 0x0000000000411f4a <+106>: sub %rax,%rsp > 0x0000000000411f4d <+109>: lea 0x27(%rsp),%rax > 0x0000000000411f52 <+114>: mov %rax,-0x4d0(%rbp) > 0x0000000000411f59 <+121>: andq $0xfffffffffffffff0,-0x4d0(%rbp) > 0x0000000000411f61 <+129>: testb $0x1,0x10(%rbp) > 0x0000000000411f65 <+133>: jne 0x4120cd <PTW_computeKey+493> > 0x0000000000411f6b <+139>: test %edx,%edx > 0x0000000000411f6d <+141>: jle 0x4120c4 <PTW_computeKey+484> > 0x0000000000411f73 <+147>: mov -0x4b8(%rbp),%eax > 0x0000000000411f79 <+153>: mov -0x4d0(%rbp),%rdi > 0x0000000000411f80 <+160>: mov -0x4e8(%rbp),%r14 > 0x0000000000411f87 <+167>: movl $0x3,-0x4b4(%rbp) > 0x0000000000411f91 <+177>: sub $0x1,%eax > 0x0000000000411f94 <+180>: mov %rdi,%r15 > 0x0000000000411f97 <+183>: shl $0xb,%rax > 0x0000000000411f9b <+187>: lea 0x800(%rdi,%rax,1),%rax > 0x0000000000411fa3 <+195>: mov %rax,-0x4c8(%rbp) > 0x0000000000411faa <+202>: nopw 0x0(%rax,%rax,1) > 0x0000000000411fb0 <+208>: mov %r15,%rdi > 0x0000000000411fb3 <+211>: mov $0x100,%ecx > 0x0000000000411fb8 <+216>: xor %eax,%eax > 0x0000000000411fba <+218>: rep stos %rax,%es:(%rdi) > 0x0000000000411fbd <+221>: nopl (%rax) > 0x0000000000411fc0 <+224>: mov %al,0x4(%r15,%rax,8) > 0x0000000000411fc5 <+229>: add $0x1,%rax > 0x0000000000411fc9 <+233>: cmp $0x100,%rax > 0x0000000000411fcf <+239>: jne 0x411fc0 <PTW_computeKey+224> > 0x0000000000411fd1 <+241>: mov (%rbx),%edi > 0x0000000000411fd3 <+243>: test %edi,%edi > 0x0000000000411fd5 <+245>: jle 0x412056 <PTW_computeKey+374> > 0x0000000000411fd7 <+247>: mov 0x270288(%rbx),%rdx > 0x0000000000411fde <+254>: mov %r14,-0x4c0(%rbp) > 0x0000000000411fe5 <+261>: mov %rbx,%r14 > 0x0000000000411fe8 <+264>: mov -0x4b4(%rbp),%ebx > 0x0000000000411fee <+270>: xor %r13d,%r13d > 0x0000000000411ff1 <+273>: nopl 0x0(%rax) > 0x0000000000411ff8 <+280>: lea 0x0(%r13,%r13,4),%r12 > 0x0000000000411ffd <+285>: lea -0x60(%rbp),%rcx > 0x0000000000412001 <+289>: lea -0x80(%rbp),%rsi > 0x0000000000412005 <+293>: mov $0x1,%r8d > 0x000000000041200b <+299>: mov %ebx,%edi > 0x000000000041200d <+301>: shl $0x3,%r12 > 0x0000000000412011 <+305>: add %r12,%rdx > 0x0000000000412014 <+308>: movzwl (%rdx),%eax > 0x0000000000412017 <+311>: add $0x3,%rdx > 0x000000000041201b <+315>: mov %ax,-0x80(%rbp) > 0x000000000041201f <+319>: movzbl -0x1(%rdx),%eax > 0x0000000000412023 <+323>: mov %al,-0x7e(%rbp) > 0x0000000000412026 <+326>: callq 0x4113e0 <guesskeybytes> > 0x000000000041202b <+331>: movzbl -0x60(%rbp),%eax > 0x000000000041202f <+335>: mov 0x270288(%r14),%rdx >=> 0x0000000000412036 <+342>: mov 0x24(%rdx,%r12,1),%ecx > 0x000000000041203b <+347>: add %ecx,(%r15,%rax,8) > 0x000000000041203f <+351>: lea 0x1(%r13),%eax > 0x0000000000412043 <+355>: add $0x1,%r13 > 0x0000000000412047 <+359>: cmp %eax,(%r14) > 0x000000000041204a <+362>: jg 0x411ff8 <PTW_computeKey+280> > 0x000000000041204c <+364>: mov %r14,%rbx > 0x000000000041204f <+367>: mov -0x4c0(%rbp),%r14 > 0x0000000000412056 <+374>: mov $0x8,%edx > 0x000000000041205b <+379>: mov $0x100,%esi > 0x0000000000412060 <+384>: mov $0x411380,%ecx > 0x0000000000412065 <+389>: mov %r15,%rdi > 0x0000000000412068 <+392>: callq 0x402380 <qsort@plt> > 0x000000000041206d <+397>: movzbl 0x4(%r15),%edx > 0x0000000000412072 <+402>: movzbl %dl,%eax > 0x0000000000412075 <+405>: mov (%r14,%rax,4),%esi > 0x0000000000412079 <+409>: test %esi,%esi > 0x000000000041207b <+411>: jne 0x412097 <PTW_computeKey+439> > 0x000000000041207d <+413>: xor %eax,%eax > 0x000000000041207f <+415>: nop > 0x0000000000412080 <+416>: add $0x1,%eax > 0x0000000000412083 <+419>: movslq %eax,%rdx > 0x0000000000412086 <+422>: movzbl 0x4(%r15,%rdx,8),%edx > 0x000000000041208c <+428>: movzbl %dl,%ecx > 0x000000000041208f <+431>: mov (%r14,%rcx,4),%ecx > 0x0000000000412093 <+435>: test %ecx,%ecx > 0x0000000000412095 <+437>: je 0x412080 <PTW_computeKey+416> > 0x0000000000412097 <+439>: movslq -0x4b4(%rbp),%rax > 0x000000000041209e <+446>: add $0x800,%r15 > 0x00000000004120a5 <+453>: addl $0x1,-0x4b4(%rbp) > 0x00000000004120ac <+460>: add $0x400,%r14 > 0x00000000004120b3 <+467>: cmp -0x4c8(%rbp),%r15 > 0x00000000004120ba <+474>: mov %dl,-0x80(%rbp,%rax,1) > 0x00000000004120be <+478>: jne 0x411fb0 <PTW_computeKey+208> > 0x00000000004120c4 <+484>: cmpl $0x2,0x200004(%rbx) > 0x00000000004120cb <+491>: jg 0x4120f7 <PTW_computeKey+535> > 0x00000000004120cd <+493>: xor %eax,%eax > 0x00000000004120cf <+495>: testb $0x2,0x10(%rbp) > 0x00000000004120d3 <+499>: je 0x41212b <PTW_computeKey+587> > 0x00000000004120d5 <+501>: mov -0x38(%rbp),%rbx > 0x00000000004120d9 <+505>: xor %fs:0x28,%rbx > 0x00000000004120e2 <+514>: jne 0x4125ed <PTW_computeKey+1805> > 0x00000000004120e8 <+520>: lea -0x28(%rbp),%rsp > 0x00000000004120ec <+524>: pop %rbx > 0x00000000004120ed <+525>: pop %r12 > 0x00000000004120ef <+527>: pop %r13 > 0x00000000004120f1 <+529>: pop %r14 > 0x00000000004120f3 <+531>: pop %r15 > 0x00000000004120f5 <+533>: pop %rbp > 0x00000000004120f6 <+534>: retq > 0x00000000004120f7 <+535>: mov -0x4b8(%rbp),%edx > 0x00000000004120fd <+541>: lea -0x7d(%rbp),%rsi > 0x0000000000412101 <+545>: mov %rbx,%rdi > 0x0000000000412104 <+548>: callq 0x4114f0 <correct> > 0x0000000000412109 <+553>: test %eax,%eax > 0x000000000041210b <+555>: je 0x4120cd <PTW_computeKey+493> > 0x000000000041210d <+557>: mov -0x4f0(%rbp),%rdx > 0x0000000000412114 <+564>: mov -0x4e0(%rbp),%rdi > 0x000000000041211b <+571>: lea -0x7d(%rbp),%rsi > 0x000000000041211f <+575>: callq 0x402540 <memcpy@plt> > 0x0000000000412124 <+580>: mov $0x1,%eax > 0x0000000000412129 <+585>: jmp 0x4120d5 <PTW_computeKey+501> > 0x000000000041212b <+587>: mov -0x4d0(%rbp),%r15 > 0x0000000000412132 <+594>: mov -0x500(%rbp),%rdx > 0x0000000000412139 <+601>: lea 0x261a88(%rbx),%r13 > 0x0000000000412140 <+608>: mov %r13,%rsi > 0x0000000000412143 <+611>: mov %r15,%rdi > 0x0000000000412146 <+614>: callq 0x402540 <memcpy@plt> > 0x000000000041214b <+619>: mov -0x4f4(%rbp),%eax > 0x0000000000412151 <+625>: mov $0x66666667,%edx > 0x0000000000412156 <+630>: mov -0x4f4(%rbp),%edi > 0x000000000041215c <+636>: imul %edx > 0x000000000041215e <+638>: mov %edi,%eax > 0x0000000000412160 <+640>: sar $0x1f,%eax > 0x0000000000412163 <+643>: mov %edx,-0x4b4(%rbp) > 0x0000000000412169 <+649>: sarl $0x2,-0x4b4(%rbp) > 0x0000000000412170 <+656>: sub %eax,-0x4b4(%rbp) > 0x0000000000412176 <+662>: mov -0x4b4(%rbp),%ecx > 0x000000000041217c <+668>: mov %ecx,%eax > 0x000000000041217e <+670>: add %eax,%eax > 0x0000000000412180 <+672>: mov %eax,%esi > 0x0000000000412182 <+674>: mov %eax,-0x4f4(%rbp) > 0x0000000000412188 <+680>: mov %edi,%eax > 0x000000000041218a <+682>: mov -0x4b8(%rbp),%edi > 0x0000000000412190 <+688>: sub %esi,%eax > 0x0000000000412192 <+690>: mov %eax,-0x4c8(%rbp) > 0x0000000000412198 <+696>: sub %ecx,-0x4c8(%rbp) > 0x000000000041219e <+702>: test %edi,%edi > 0x00000000004121a0 <+704>: jle 0x4125b8 <PTW_computeKey+1752> > 0x00000000004121a6 <+710>: lea -0x4b0(%rbp),%rax > 0x00000000004121ad <+717>: mov %rax,-0x4c0(%rbp) > 0x00000000004121b4 <+724>: mov %rax,%r14 > 0x00000000004121b7 <+727>: mov %edi,%eax > 0x00000000004121b9 <+729>: sub $0x1,%eax > 0x00000000004121bc <+732>: shl $0xb,%rax > 0x00000000004121c0 <+736>: lea 0x800(%r15,%rax,1),%r12 > 0x00000000004121c8 <+744>: mov %r15,%rdi > 0x00000000004121cb <+747>: mov $0x411380,%ecx > 0x00000000004121d0 <+752>: mov $0x8,%edx > 0x00000000004121d5 <+757>: mov $0x100,%esi > 0x00000000004121da <+762>: add $0x800,%r15 > 0x00000000004121e1 <+769>: add $0x4,%r14 > 0x00000000004121e5 <+773>: callq 0x402380 <qsort@plt> > 0x00000000004121ea <+778>: movl $0x0,-0x4(%r14) > 0x00000000004121f2 <+786>: cmp %r12,%r15 > 0x00000000004121f5 <+789>: jne 0x4121c8 <PTW_computeKey+744> > 0x00000000004121f7 <+791>: mov -0x4f0(%rbp),%r14 > 0x00000000004121fe <+798>: mov -0x4d0(%rbp),%rcx > 0x0000000000412205 <+805>: xor %edi,%edi > 0x0000000000412207 <+807>: imul $0xbf4,%r14,%rax > 0x000000000041220e <+814>: add $0x1e,%rax > 0x0000000000412212 <+818>: and $0xfffffffffffffff0,%rax > 0x0000000000412216 <+822>: sub %rax,%rsp > 0x0000000000412219 <+825>: lea 0x27(%rsp),%r15 > 0x000000000041221e <+830>: and $0xfffffffffffffff0,%r15 > 0x0000000000412222 <+834>: lea 0x8(%r15),%r9 > 0x0000000000412226 <+838>: mov (%rcx),%r8d > 0x0000000000412229 <+841>: mov %r9,%rdx > 0x000000000041222c <+844>: xor %eax,%eax > 0x000000000041222e <+846>: xchg %ax,%ax > 0x0000000000412230 <+848>: mov %r8d,%esi > 0x0000000000412233 <+851>: sub 0x8(%rcx,%rax,1),%esi > 0x0000000000412237 <+855>: mov %edi,-0x8(%rdx) > 0x000000000041223a <+858>: add $0xc,%rdx > 0x000000000041223e <+862>: mov %esi,-0xc(%rdx) > 0x0000000000412241 <+865>: movzbl 0xc(%rcx,%rax,1),%esi > 0x0000000000412246 <+870>: add $0x8,%rax > 0x000000000041224a <+874>: mov %sil,-0x10(%rdx) > 0x000000000041224e <+878>: cmp $0x7f8,%rax > 0x0000000000412254 <+884>: jne 0x412230 <PTW_computeKey+848> > 0x0000000000412256 <+886>: add $0x1,%edi > 0x0000000000412259 <+889>: add $0x800,%rcx > 0x0000000000412260 <+896>: add $0xbf4,%r9 > 0x0000000000412267 <+903>: cmp -0x4b8(%rbp),%edi > 0x000000000041226d <+909>: jne 0x412226 <PTW_computeKey+838> > 0x000000000041226f <+911>: mov -0x4b8(%rbp),%r14d > 0x0000000000412276 <+918>: mov $0x4113c0,%ecx > 0x000000000041227b <+923>: mov $0xc,%edx > 0x0000000000412280 <+928>: mov %r15,%rdi > 0x0000000000412283 <+931>: mov %r14d,%eax > 0x0000000000412286 <+934>: shl $0x8,%eax > 0x0000000000412289 <+937>: sub %r14d,%eax > 0x000000000041228c <+940>: movslq %eax,%rsi > 0x000000000041228f <+943>: callq 0x402380 <qsort@plt> > 0x0000000000412294 <+948>: mov -0x4e8(%rbp),%rax > 0x000000000041229b <+955>: mov -0x4c0(%rbp),%r9 > 0x00000000004122a2 <+962>: mov %r15,%r8 > 0x00000000004122a5 <+965>: mov -0x4d0(%rbp),%rcx > 0x00000000004122ac <+972>: mov -0x4e0(%rbp),%rsi > 0x00000000004122b3 <+979>: mov %r14d,%edx > 0x00000000004122b6 <+982>: mov %rbx,%rdi > 0x00000000004122b9 <+985>: mov %rax,0x10(%rsp) > 0x00000000004122be <+990>: mov -0x4d8(%rbp),%rax > 0x00000000004122c5 <+997>: mov %rax,0x8(%rsp) > 0x00000000004122ca <+1002>: mov -0x4c8(%rbp),%eax > 0x00000000004122d0 <+1008>: mov %eax,(%rsp) > 0x00000000004122d3 <+1011>: callq 0x411bd0 <doComputation> > 0x00000000004122d8 <+1016>: test %eax,%eax > 0x00000000004122da <+1018>: je 0x4122e6 <PTW_computeKey+1030> > 0x00000000004122dc <+1020>: mov $0x1,%eax > 0x00000000004122e1 <+1025>: jmpq 0x4120d5 <PTW_computeKey+501> > 0x00000000004122e6 <+1030>: xor %eax,%eax > 0x00000000004122e8 <+1032>: xor %edx,%edx > 0x00000000004122ea <+1034>: add 0x0(%r13,%rax,1),%edx > 0x00000000004122ef <+1039>: add $0x8,%rax > 0x00000000004122f3 <+1043>: cmp $0x800,%rax > 0x00000000004122f9 <+1049>: jne 0x4122ea <PTW_computeKey+1034> > 0x00000000004122fb <+1051>: lea 0xff(%rdx),%eax > 0x0000000000412301 <+1057>: mov -0x4b8(%rbp),%r12d > 0x0000000000412308 <+1064>: test %edx,%edx > 0x000000000041230a <+1066>: cmovns %edx,%eax > 0x000000000041230d <+1069>: sar $0x8,%eax > 0x0000000000412310 <+1072>: test %r12d,%r12d > 0x0000000000412313 <+1075>: cvtsi2sd %eax,%xmm6 > 0x0000000000412317 <+1079>: jle 0x412435 <PTW_computeKey+1365> > 0x000000000041231d <+1085>: xorpd %xmm9,%xmm9 > 0x0000000000412322 <+1090>: movsd 0x6056(%rip),%xmm2 # 0x418380 > 0x000000000041232a <+1098>: movsd 0x6055(%rip),%xmm11 # 0x418388 > 0x0000000000412333 <+1107>: cvtsi2sd %edx,%xmm10 > 0x0000000000412338 <+1112>: xor %edx,%edx > 0x000000000041233a <+1114>: movsd 0x418200(,%rdx,8),%xmm0 > 0x0000000000412343 <+1123>: xor %eax,%eax > 0x0000000000412345 <+1125>: movapd %xmm2,%xmm7 > 0x0000000000412349 <+1129>: movapd %xmm0,%xmm8 > 0x000000000041234e <+1134>: movapd %xmm9,%xmm5 > 0x0000000000412353 <+1139>: subsd %xmm0,%xmm7 > 0x0000000000412357 <+1143>: movapd %xmm9,%xmm1 > 0x000000000041235c <+1148>: mulsd %xmm10,%xmm8 > 0x0000000000412361 <+1153>: divsd %xmm11,%xmm7 > 0x0000000000412366 <+1158>: mulsd %xmm10,%xmm7 > 0x000000000041236b <+1163>: nopl 0x0(%rax,%rax,1) > 0x0000000000412370 <+1168>: cvtsi2sdl 0x0(%r13,%rax,8),%xmm0 > 0x0000000000412377 <+1175>: ucomisd %xmm1,%xmm0 > 0x000000000041237b <+1179>: jbe 0x412385 <PTW_computeKey+1189> > 0x000000000041237d <+1181>: cvtsi2sd %eax,%xmm5 > 0x0000000000412381 <+1185>: movapd %xmm0,%xmm1 > 0x0000000000412385 <+1189>: add $0x1,%rax > 0x0000000000412389 <+1193>: cmp $0x100,%rax > 0x000000000041238f <+1199>: jne 0x412370 <PTW_computeKey+1168> > 0x0000000000412391 <+1201>: xor %ax,%ax > 0x0000000000412394 <+1204>: movapd %xmm9,%xmm4 > 0x0000000000412399 <+1209>: movapd %xmm9,%xmm3 > 0x000000000041239e <+1214>: jmp 0x4123e2 <PTW_computeKey+1282> > 0x00000000004123a0 <+1216>: jne 0x4123f7 <PTW_computeKey+1303> > 0x00000000004123a2 <+1218>: divsd %xmm8,%xmm1 > 0x00000000004123a7 <+1223>: movapd %xmm2,%xmm12 > 0x00000000004123ac <+1228>: subsd %xmm1,%xmm12 > 0x00000000004123b1 <+1233>: movapd %xmm12,%xmm1 > 0x00000000004123b6 <+1238>: divsd %xmm6,%xmm0 > 0x00000000004123ba <+1242>: add $0x1,%rax > 0x00000000004123be <+1246>: cmp $0x100,%rax > 0x00000000004123c4 <+1252>: mulsd %xmm1,%xmm1 > 0x00000000004123c8 <+1256>: addsd %xmm1,%xmm3 > 0x00000000004123cc <+1260>: movapd %xmm2,%xmm1 > 0x00000000004123d0 <+1264>: subsd %xmm0,%xmm1 > 0x00000000004123d4 <+1268>: movapd %xmm1,%xmm0 > 0x00000000004123d8 <+1272>: mulsd %xmm1,%xmm0 > 0x00000000004123dc <+1276>: addsd %xmm0,%xmm4 > 0x00000000004123e0 <+1280>: je 0x41240c <PTW_computeKey+1324> > 0x00000000004123e2 <+1282>: cvtsi2sd %eax,%xmm0 > 0x00000000004123e6 <+1286>: ucomisd %xmm5,%xmm0 > 0x00000000004123ea <+1290>: cvtsi2sdl 0x0(%r13,%rax,8),%xmm0 > 0x00000000004123f1 <+1297>: movapd %xmm0,%xmm1 > 0x00000000004123f5 <+1301>: jnp 0x4123a0 <PTW_computeKey+1216> > 0x00000000004123f7 <+1303>: divsd %xmm7,%xmm1 > 0x00000000004123fb <+1307>: movapd %xmm2,%xmm13 > 0x0000000000412400 <+1312>: subsd %xmm1,%xmm13 > 0x0000000000412405 <+1317>: movapd %xmm13,%xmm1 > 0x000000000041240a <+1322>: jmp 0x4123b6 <PTW_computeKey+1238> > 0x000000000041240c <+1324>: movsd %xmm4,-0x430(%rbp,%rdx,8) > 0x0000000000412415 <+1333>: add $0x800,%r13 > 0x000000000041241c <+1340>: movsd %xmm3,-0x340(%rbp,%rdx,8) > 0x0000000000412425 <+1349>: add $0x1,%rdx > 0x0000000000412429 <+1353>: cmp %edx,-0x4b8(%rbp) > 0x000000000041242f <+1359>: jg 0x41233a <PTW_computeKey+1114> > 0x0000000000412435 <+1365>: mov -0x4b8(%rbp),%eax > 0x000000000041243b <+1371>: lea -0x250(%rbp),%r13 > 0x0000000000412442 <+1378>: lea -0x1(%rax),%ecx > 0x0000000000412445 <+1381>: test %ecx,%ecx > 0x0000000000412447 <+1383>: jle 0x41247d <PTW_computeKey+1437> > 0x0000000000412449 <+1385>: lea -0x250(%rbp),%r13 > 0x0000000000412450 <+1392>: xor %eax,%eax > 0x0000000000412452 <+1394>: xor %edx,%edx > 0x0000000000412454 <+1396>: movsd -0x428(%rbp,%rax,1),%xmm0 > 0x000000000041245d <+1405>: add $0x1,%edx > 0x0000000000412460 <+1408>: mov %edx,0x0(%r13,%rax,2) > 0x0000000000412465 <+1413>: subsd -0x338(%rbp,%rax,1),%xmm0 > 0x000000000041246e <+1422>: movsd %xmm0,0x8(%r13,%rax,2) > 0x0000000000412475 <+1429>: add $0x8,%rax > 0x0000000000412479 <+1433>: cmp %ecx,%edx > 0x000000000041247b <+1435>: jne 0x412454 <PTW_computeKey+1396> > 0x000000000041247d <+1437>: mov %r13,%rdi > 0x0000000000412480 <+1440>: movslq %ecx,%rsi > 0x0000000000412483 <+1443>: mov $0x10,%edx > 0x0000000000412488 <+1448>: mov $0x4113a0,%ecx > 0x000000000041248d <+1453>: callq 0x402380 <qsort@plt> > 0x0000000000412492 <+1458>: movslq -0x250(%rbp),%rax > 0x0000000000412499 <+1465>: mov -0x4d8(%rbp),%rdi > 0x00000000004124a0 <+1472>: lea 0x10(%r13),%rdx > 0x00000000004124a4 <+1476>: xor %r13d,%r13d > 0x00000000004124a7 <+1479>: mov -0x4d8(%rbp),%rcx > 0x00000000004124ae <+1486>: cmpl $0x1,(%rdi,%rax,4) > 0x00000000004124b2 <+1490>: jne 0x4124c5 <PTW_computeKey+1509> > 0x00000000004124b4 <+1492>: movslq (%rdx),%rax > 0x00000000004124b7 <+1495>: add $0x1,%r13d > 0x00000000004124bb <+1499>: add $0x10,%rdx > 0x00000000004124bf <+1503>: cmpl $0x1,(%rcx,%rax,4) > 0x00000000004124c3 <+1507>: je 0x4124b4 <PTW_computeKey+1492> > 0x00000000004124c5 <+1509>: movl $0x1,-0x4b0(%rbp,%rax,4) > 0x00000000004124d0 <+1520>: mov -0x4e8(%rbp),%rax > 0x00000000004124d7 <+1527>: mov %r15,%r8 > 0x00000000004124da <+1530>: mov -0x4d8(%rbp),%r14 > 0x00000000004124e1 <+1537>: mov -0x4c0(%rbp),%r9 > 0x00000000004124e8 <+1544>: mov %rbx,%rdi > 0x00000000004124eb <+1547>: mov -0x4d0(%rbp),%rcx > 0x00000000004124f2 <+1554>: mov -0x4b8(%rbp),%edx > 0x00000000004124f8 <+1560>: mov %rax,0x10(%rsp) > 0x00000000004124fd <+1565>: mov -0x4f4(%rbp),%eax > 0x0000000000412503 <+1571>: mov -0x4e0(%rbp),%rsi > 0x000000000041250a <+1578>: mov %r14,0x8(%rsp) > 0x000000000041250f <+1583>: mov %eax,(%rsp) > 0x0000000000412512 <+1586>: callq 0x411bd0 <doComputation> > 0x0000000000412517 <+1591>: test %eax,%eax > 0x0000000000412519 <+1593>: jne 0x4122dc <PTW_computeKey+1020> > 0x000000000041251f <+1599>: add $0x1,%r13d > 0x0000000000412523 <+1603>: movslq %r13d,%rax > 0x0000000000412526 <+1606>: shl $0x4,%rax > 0x000000000041252a <+1610>: movslq -0x250(%rbp,%rax,1),%rax > 0x0000000000412532 <+1618>: cmpl $0x1,(%r14,%rax,4) > 0x0000000000412537 <+1623>: jne 0x412559 <PTW_computeKey+1657> > 0x0000000000412539 <+1625>: add $0x1,%r13d > 0x000000000041253d <+1629>: mov -0x4d8(%rbp),%rdi > 0x0000000000412544 <+1636>: movslq %r13d,%rax > 0x0000000000412547 <+1639>: shl $0x4,%rax > 0x000000000041254b <+1643>: movslq -0x250(%rbp,%rax,1),%rax > 0x0000000000412553 <+1651>: cmpl $0x1,(%rdi,%rax,4) > 0x0000000000412557 <+1655>: je 0x412539 <PTW_computeKey+1625> > 0x0000000000412559 <+1657>: movl $0x1,-0x4b0(%rbp,%rax,4) > 0x0000000000412564 <+1668>: mov -0x4e8(%rbp),%rax > 0x000000000041256b <+1675>: mov %r15,%r8 > 0x000000000041256e <+1678>: mov -0x4c0(%rbp),%r9 > 0x0000000000412575 <+1685>: mov -0x4d0(%rbp),%rcx > 0x000000000041257c <+1692>: mov %rbx,%rdi > 0x000000000041257f <+1695>: mov -0x4b8(%rbp),%edx > 0x0000000000412585 <+1701>: mov -0x4e0(%rbp),%rsi > 0x000000000041258c <+1708>: mov %rax,0x10(%rsp) > 0x0000000000412591 <+1713>: mov -0x4d8(%rbp),%rax > 0x0000000000412598 <+1720>: mov %rax,0x8(%rsp) > 0x000000000041259d <+1725>: mov -0x4b4(%rbp),%eax > 0x00000000004125a3 <+1731>: mov %eax,(%rsp) > 0x00000000004125a6 <+1734>: callq 0x411bd0 <doComputation> > 0x00000000004125ab <+1739>: test %eax,%eax > 0x00000000004125ad <+1741>: setne %al > 0x00000000004125b0 <+1744>: movzbl %al,%eax > 0x00000000004125b3 <+1747>: jmpq 0x4120d5 <PTW_computeKey+501> > 0x00000000004125b8 <+1752>: mov -0x4f0(%rbp),%r11 > 0x00000000004125bf <+1759>: imul $0xbf4,%r11,%rax > 0x00000000004125c6 <+1766>: add $0x1e,%rax > 0x00000000004125ca <+1770>: and $0xfffffffffffffff0,%rax > 0x00000000004125ce <+1774>: sub %rax,%rsp > 0x00000000004125d1 <+1777>: lea -0x4b0(%rbp),%rax > 0x00000000004125d8 <+1784>: lea 0x27(%rsp),%r15 > 0x00000000004125dd <+1789>: mov %rax,-0x4c0(%rbp) > 0x00000000004125e4 <+1796>: and $0xfffffffffffffff0,%r15 > 0x00000000004125e8 <+1800>: jmpq 0x41226f <PTW_computeKey+911> > 0x00000000004125ed <+1805>: callq 0x4023a0 <__stack_chk_fail@plt> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1134537
: 931619 |
931620
|
931621
|
931622
|
931623
|
931624
|
931625
|
931626
|
931627
|
931628
|
931629