Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 939374 Details for
Bug 1144508
[abrt] alsa-utils: free_list(): alsactl killed by SIGSEGV
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 11.80 KB, created by
Moez Roy
on 2014-09-19 15:30:57 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Moez Roy
Created:
2014-09-19 15:30:57 UTC
Size:
11.80 KB
patch
obsolete
>[New LWP 857] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `/usr/sbin/alsactl -s -n 19 -c -E ALSA_CONFIG_PATH=/etc/alsa/alsactl.conf --init'. >Program terminated with signal SIGSEGV, Segmentation fault. >#0 free_list (list=list@entry=0x20) at daemon.c:74 >74 daemon.c: No such file or directory. > >Thread 1 (Thread 0x7f4d5ec5c740 (LWP 857)): >#0 free_list (list=list@entry=0x20) at daemon.c:74 > i = 0 >#1 0x00007f4d5ec91135 in card_free (card=0x7f4d5f573150) at daemon.c:83 > c = 0x0 >#2 0x00007f4d5ec91cec in state_daemon (file=0x7f4d5ec9251d "/var/lib/alsa/asound.state", cardname=0x0, period=300, pidfile=0x7f4d5ec924ec "/var/run/alsactl.pid") at daemon.c:455 > count = 3 > pcount = <optimized out> > psize = <optimized out> > i = 2 > j = <optimized out> > k = <optimized out> > changed = 0 > last_write = 1411099652 > now = 1411101451 > revents = 0 > cards = 0x7f4d5f573140 > pfd = <optimized out> > pfdn = <optimized out> > __FUNCTION__ = "state_daemon" >#3 0x00007f4d5ec85919 in main (argc=<optimized out>, argv=<optimized out>) at alsactl.c:370 > devfiles = {0x7f4d5ec92538 "/dev/snd/controlC", 0x7f4d5ec925e5 "/dev/snd/pcmC", 0x7f4d5ec925f3 "/dev/snd/midiC", 0x7f4d5ec92602 "/dev/snd/hwC", 0x0} > cfgfile = 0x7f4d5ec9251d "/var/lib/alsa/asound.state" > initfile = 0x7fffb0ab7f80 "/lib/alsa/init/00main" > pidfile = 0x7f4d5ec924ec "/var/run/alsactl.pid" > cardname = 0x0 > ncardname = "\240\t\306^M\177\000\000\000\000\000\000\000\000\000" > cmd = 0x7fffb0ab7f96 "rdaemon" > tmp = <optimized out> > removestate = 0 > init_fallback = 1 > period = 300 > background = 0 > daemoncmd = <optimized out> > use_nice = 19 > sched_idle = 1 > o = <optimized out> > j = <optimized out> > k = <optimized out> > res = 0 > long_option = 0x0 > short_option = 0x0 >From To Syms Read Shared Object Library >0x00007f4d5e79ff10 0x00007f4d5e81b8ef Yes /lib64/libasound.so.2 >0x00007f4d5e46f5c0 0x00007f4d5e4e0c61 Yes /lib64/libm.so.6 >0x00007f4d5e266ed0 0x00007f4d5e267ade Yes /lib64/libdl.so.2 >0x00007f4d5e04fa70 0x00007f4d5e05be81 Yes /lib64/libpthread.so.0 >0x00007f4d5dcac4f0 0x00007f4d5ddf7994 Yes /lib64/libc.so.6 >0x00007f4d5da872a0 0x00007f4d5da8a407 Yes /lib64/librt.so.1 >0x00007f4d5ea5bb10 0x00007f4d5ea766e0 Yes /lib64/ld-linux-x86-64.so.2 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0x7f4d5f58e980 139970288871808 >rbx 0x0 0 >rcx 0x7f4d5e044cd8 139970266549464 >rdx 0x7f4d5f58e980 139970288871808 >rsi 0x7f4d5f58e980 139970288871808 >rdi 0x20 32 >rbp 0x0 0x0 >rsp 0x7fffb0ab6850 0x7fffb0ab6850 >r8 0x7f4d5f58e340 139970288870208 >r9 0x0 0 >r10 0x0 0 >r11 0x246 582 >r12 0x7f4d5ec924ec 139970279449836 >r13 0x7fffb0ab68de 140736157411550 >r14 0x2 2 >r15 0x2 2 >rip 0x7f4d5ec91006 0x7f4d5ec91006 <free_list+6> >eflags 0x10246 [ PF ZF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >st0 0 (raw 0x00000000000000000000) >st1 0 (raw 0x00000000000000000000) >st2 0 (raw 0x00000000000000000000) >st3 0 (raw 0x00000000000000000000) >st4 0 (raw 0x00000000000000000000) >st5 0 (raw 0x00000000000000000000) >st6 0 (raw 0x00000000000000000000) >st7 0 (raw 0x00000000000000000000) >fctrl 0x37f 895 >fstat 0x0 0 >ftag 0xffff 65535 >fiseg 0x0 0 >fioff 0x0 0 >foseg 0x0 0 >fooff 0x0 0 >fop 0x0 0 >mxcsr 0x1f80 [ IM DM ZM OM UM PM ] >ymm0 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0, 0xff, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0 <repeats 23 times>}, v16_int16 = {0xff00, 0xff, 0x0, 0x0, 0xff, 0x0 <repeats 11 times>}, v8_int32 = {0xffff00, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xffff00, 0xff, 0x0, 0x0}, v2_int128 = {0x00000000000000ff0000000000ffff00, 0x00000000000000000000000000000000}} >ymm1 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x25 <repeats 16 times>, 0x0 <repeats 16 times>}, v16_int16 = {0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x25252525, 0x25252525, 0x25252525, 0x25252525, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x2525252525252525, 0x2525252525252525, 0x0, 0x0}, v2_int128 = {0x25252525252525252525252525252525, 0x00000000000000000000000000000000}} >ymm2 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x76, 0x61, 0x6c, 0x75, 0x65, 0x0, 0x0, 0x0, 0x18, 0x4d, 0x4, 0x5e, 0x4d, 0x7f, 0x0 <repeats 18 times>}, v16_int16 = {0x6176, 0x756c, 0x65, 0x0, 0x4d18, 0x5e04, 0x7f4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x756c6176, 0x65, 0x5e044d18, 0x7f4d, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x65756c6176, 0x7f4d5e044d18, 0x0, 0x0}, v2_int128 = {0x00007f4d5e044d1800000065756c6176, 0x00000000000000000000000000000000}} >ymm3 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm4 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0 <repeats 23 times>}, v16_int16 = {0xff00, 0x0, 0x0, 0x0, 0xff, 0x0 <repeats 11 times>}, v8_int32 = {0xff00, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xff00, 0xff, 0x0, 0x0}, v2_int128 = {0x00000000000000ff000000000000ff00, 0x00000000000000000000000000000000}} >ymm5 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2, 0x57, 0x5f, 0x4d, 0x7f, 0x0 <repeats 18 times>}, v16_int16 = {0x1, 0x0, 0x0, 0x0, 0xa200, 0x5f57, 0x7f4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x1, 0x0, 0x5f57a200, 0x7f4d, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x1, 0x7f4d5f57a200, 0x0, 0x0}, v2_int128 = {0x00007f4d5f57a2000000000000000001, 0x00000000000000000000000000000000}} >ymm6 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0xa0, 0x67, 0xab, 0xb0, 0xff, 0x7f, 0x0, 0x0, 0x45, 0x46, 0x7b, 0x5e, 0x4d, 0x7f, 0x0 <repeats 18 times>}, v16_int16 = {0x67a0, 0xb0ab, 0x7fff, 0x0, 0x4645, 0x5e7b, 0x7f4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0xb0ab67a0, 0x7fff, 0x5e7b4645, 0x7f4d, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x7fffb0ab67a0, 0x7f4d5e7b4645, 0x0, 0x0}, v2_int128 = {0x00007f4d5e7b464500007fffb0ab67a0, 0x00000000000000000000000000000000}} >ymm7 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0xce, 0x57, 0x5f, 0x4d, 0x7f, 0x0 <repeats 18 times>}, v16_int16 = {0x48, 0x0, 0x0, 0x0, 0xce30, 0x5f57, 0x7f4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x48, 0x0, 0x5f57ce30, 0x7f4d, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x48, 0x7f4d5f57ce30, 0x0, 0x0}, v2_int128 = {0x00007f4d5f57ce300000000000000048, 0x00000000000000000000000000000000}} >ymm8 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm9 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm10 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm11 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm12 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x8000000000000000, 0x8000000000000000, 0x0, 0x0}, v32_int8 = {0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xff, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xff, 0x0 <repeats 16 times>}, v16_int16 = {0x0, 0x0, 0xff00, 0xffff, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x0, 0xffffff00, 0x0, 0xffff0000, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xffffff0000000000, 0xffff000000000000, 0x0, 0x0}, v2_int128 = {0xffff000000000000ffffff0000000000, 0x00000000000000000000000000000000}} >ymm13 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm14 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm15 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >Dump of assembler code for function free_list: > 0x00007f4d5ec91000 <+0>: push %r12 > 0x00007f4d5ec91002 <+2>: push %rbp > 0x00007f4d5ec91003 <+3>: xor %ebp,%ebp > 0x00007f4d5ec91005 <+5>: push %rbx >=> 0x00007f4d5ec91006 <+6>: mov 0x8(%rdi),%eax > 0x00007f4d5ec91009 <+9>: xor %ebx,%ebx > 0x00007f4d5ec9100b <+11>: mov %rdi,%r12 > 0x00007f4d5ec9100e <+14>: test %eax,%eax > 0x00007f4d5ec91010 <+16>: jle 0x7f4d5ec91033 <free_list+51> > 0x00007f4d5ec91012 <+18>: nopw 0x0(%rax,%rax,1) > 0x00007f4d5ec91018 <+24>: mov (%r12),%rax > 0x00007f4d5ec9101c <+28>: add $0x1,%ebx > 0x00007f4d5ec9101f <+31>: mov (%rax,%rbp,1),%rdi > 0x00007f4d5ec91023 <+35>: add $0x8,%rbp > 0x00007f4d5ec91027 <+39>: callq 0x7f4d5ec84810 <free@plt> > 0x00007f4d5ec9102c <+44>: cmp %ebx,0x8(%r12) > 0x00007f4d5ec91031 <+49>: jg 0x7f4d5ec91018 <free_list+24> > 0x00007f4d5ec91033 <+51>: pop %rbx > 0x00007f4d5ec91034 <+52>: mov (%r12),%rdi > 0x00007f4d5ec91038 <+56>: pop %rbp > 0x00007f4d5ec91039 <+57>: pop %r12 > 0x00007f4d5ec9103b <+59>: jmpq 0x7f4d5ec84810 <free@plt> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1144508
: 939374 |
939375
|
939376
|
939377
|
939378
|
939379
|
939380
|
939381
|
939382
|
939383
|
939384
|
939385