Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 939542 Details for
Bug 1144763
[abrt] util-linux: avc_context_to_sid_raw(): su killed by SIGABRT
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 21.03 KB, created by
Moez Roy
on 2014-09-20 14:21:04 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Moez Roy
Created:
2014-09-20 14:21:04 UTC
Size:
21.03 KB
patch
obsolete
>[New LWP 11147] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `su'. >Program terminated with signal SIGABRT, Aborted. >#0 0x00007fdc2e0c8827 in __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:55 >55 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. > >Thread 1 (Thread 0x7fdc2ea67700 (LWP 11147)): >#0 0x00007fdc2e0c8827 in __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:55 > resultvar = 0 > pid = 11147 > selftid = 11147 >#1 0x00007fdc2e0ca48a in __GI_abort () at abort.c:89 > save_stage = 2 > act = {__sigaction_handler = {sa_handler = 0x7fff37940db0, sa_sigaction = 0x7fff37940db0}, sa_mask = {__val = {140583665504011, 140583643498736, 140734125837824, 4, 9522384527, 0, 0, 140734125837976, 0, 140734125837776, 21474836480, 140583643480862, 140583643492024, 140583643481663, 140583652306944, 140583643492024}}, sa_flags = 655217090, sa_restorer = 0x7fdc270dd250 <__PRETTY_FUNCTION__.5357>} > sigs = {__val = {32, 0 <repeats 15 times>}} >#2 0x00007fdc2e0c145d in __assert_fail_base (fmt=0x7fdc2e21aeb8 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n", assertion=assertion@entry=0x7fdc270dd1c2 "avc_running", file=file@entry=0x7fdc270dd1bc "avc.c", line=line@entry=74, function=function@entry=0x7fdc270dd250 <__PRETTY_FUNCTION__.5357> "avc_context_to_sid_raw") at assert.c:92 > str = 0x7fdc2f744cf0 "\020Lt/\334\177" > total = 4096 >#3 0x00007fdc2e0c1512 in __GI___assert_fail (assertion=assertion@entry=0x7fdc270dd1c2 "avc_running", file=file@entry=0x7fdc270dd1bc "avc.c", line=line@entry=74, function=function@entry=0x7fdc270dd250 <__PRETTY_FUNCTION__.5357> "avc_context_to_sid_raw") at assert.c:101 >No locals. >#4 0x00007fdc270d1d1c in avc_context_to_sid_raw (ctx=<optimized out>, sid=<optimized out>) at avc.c:74 > ctx = <optimized out> > sid = <optimized out> > rc = <optimized out> >#5 0x00007fdc270d1d55 in avc_context_to_sid (ctx=ctx@entry=0x7fdc2f71a980 "staff_u:staff_r:staff_sudo_t:s0", sid=sid@entry=0x7fff37940f98) at avc.c:90 > ret = <optimized out> > rctx = 0x7fdc2f71a950 "staff_u:staff_r:staff_sudo_t:s0" >#6 0x00007fdc270cd506 in selinux_check_access (scon=0x7fdc2f71a980 "staff_u:staff_r:staff_sudo_t:s0", tcon=0x7fdc2f71a980 "staff_u:staff_r:staff_sudo_t:s0", class=class@entry=0x7fdc272e6faf "passwd", perm=perm@entry=0x7fdc272e6faf "passwd", aux=aux@entry=0x0) at checkAccess.c:30 > rc = <optimized out> > scon_id = 0x7fdc2f71a7d0 > tcon_id = 0x0 > sclass = <optimized out> > av = <optimized out> >#7 0x00007fdc272e6d86 in selinux_check_root () at pam_rootok.c:109 > status = <optimized out> > user_context = 0x7fdc2f71a980 "staff_u:staff_r:staff_sudo_t:s0" > old_callback = <optimized out> >#8 check_for_root (pamh=0x7fdc2f71a4d0, ctrl=0) at pam_rootok.c:124 > retval = 7 >#9 0x00007fdc2e657fd2 in _pam_dispatch_aux (use_cached_chain=<optimized out>, resumed=<optimized out>, h=<optimized out>, flags=0, pamh=0x7fdc2f71a4d0) at pam_dispatch.c:110 > retval = <optimized out> > cached_retval = <optimized out> > action = <optimized out> > depth = 0 > status = 6 > prev_level = <optimized out> > stack_level = <optimized out> > impression = 0 > skip_depth = 0 > substates = 0x7fdc2f71a7d0 >#10 _pam_dispatch (pamh=pamh@entry=0x7fdc2f71a4d0, flags=0, choice=choice@entry=1) at pam_dispatch.c:424 > h = <optimized out> > retval = <optimized out> > use_cached_chain = <optimized out> > resumed = <optimized out> >#11 0x00007fdc2e657890 in pam_authenticate (pamh=0x7fdc2f71a4d0, flags=<optimized out>) at pam_auth.c:34 > retval = <optimized out> >#12 0x00007fdc2ea8b8e4 in authenticate (pw=<optimized out>) at login-utils/su-common.c:478 > lpw = 0x0 > retval = 0 > srvname = 0x2b8b <error: Cannot access memory at address 0x2b8b> >#13 su_main (argc=1, argv=0x7fff37981558, mode=0) at login-utils/su-common.c:925 > optc = 0 > command = 0x0 > pw = 0x0 > groups = {0 <repeats 64750 times>, 780578334, 32732, 0, 0, 12288, 0, 8552, 0, 8552, 0, 0, 0, 5, 0, 2105344, 0, 2113536, 0, 2109592, 0, 2109712, 0, 8192, 0, 3, 0 <repeats 11 times>, 780578997, 32732, 0, 0, 110592, 0, 109364, 0, 109364, 0, 0, 0, 5, 0, 2207744, 0, 2215936, 0, 2212364, 0, 2253440, 0, 110592, 0, 3, 0 <repeats 19 times>, 782670216, 32732, 0, 0, 780598412, 32732, 0, 0, 782670216, 32732, 18, 0, 778396463, 32732, 0, 1, 11, 0, 3878912, 0, 782779992, 32732, 932711136, 32767, 780597431, 32732, 2147479968, 3, 932711136, 32767, 782670240, 32732, 780577721, 32732, 932711184, 32767, 0, 32732, 3, 32767, 770097424, 32732, 770097424, 32732, 932710832, 32767, 932710384, 32767, 2109712, 0, 4, 3, 6, 0, 1, 32732, 782670216, 32732, 778396627, 32732, 782790944, 32732, 35, 0, 291116, 0, 1, 0, 33261, 0, 0, 0, 0, 0, 19512, 0, 4096, 0, 40, 0, 1411158899, 0, 539875855, 0, 1410888548, 0, 0, 0, 780619588, 32732, 249401630, 0, 767989967, 32732, 782670240, 32732, 780585221, 32732, 999, 0, 780619588, 1, 0, 0, 772449667, 32732, 782667776, 32732, 780585221, 32732, 782779992, 32732, 780585795, 1, 0, 0, 932711280, 32767, 0, 0...} > longopts = {{name = 0x7fdc2ea8d338 "command", has_arg = 1, flag = 0x0, val = 99}, {name = 0x7fdc2ea8d330 "session-command", has_arg = 1, flag = 0x0, val = 67}, {name = 0x7fdc2ea8d340 "fast", has_arg = 0, flag = 0x0, val = 102}, {name = 0x7fdc2ea8db65 "login", has_arg = 0, flag = 0x0, val = 108}, {name = 0x7fdc2ea8d345 "preserve-environment", has_arg = 0, flag = 0x0, val = 112}, {name = 0x7fdc2ea8d35a "shell", has_arg = 1, flag = 0x0, val = 115}, {name = 0x7fdc2ea8d365 "group", has_arg = 1, flag = 0x0, val = 103}, {name = 0x7fdc2ea8d360 "supp-group", has_arg = 1, flag = 0x0, val = 71}, {name = 0x7fdc2ea8cfee "user", has_arg = 1, flag = 0x0, val = 117}, {name = 0x7fdc2ea8d36b "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x7fdc2ea8d370 "version", has_arg = 0, flag = 0x0, val = 86}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} >#14 0x00007fdc2e0b3fe0 in __libc_start_main (main=0x7fdc2ea8a8a0 <main>, argc=1, argv=0x7fff37981558, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fff37981548) at libc-start.c:289 > result = <optimized out> > unwind_buf = {cancel_jmp_buf = {{jmp_buf = {0, -7864364113203859711, 140583652337831, 140734126101840, 0, 0, -7882960846617874687, -7864362717858533631}, mask_was_saved = 0}}, priv = {pad = {0x0, 0x0, 0x7fff37981568, 0x7fdc2ea87148}, data = {prev = 0x0, cleanup = 0x0, canceltype = 932713832}}} > not_first_call = <optimized out> >#15 0x00007fdc2ea8a8d0 in _start () >No symbol table info available. >From To Syms Read Shared Object Library >0x00007fdc2e657710 0x00007fdc2e65ec7a Yes /lib64/libpam.so.0 >0x00007fdc2e452100 0x00007fdc2e452e3b Yes /lib64/libpam_misc.so.0 >0x00007fdc2e0b34f0 0x00007fdc2e1fe994 Yes /lib64/libc.so.6 >0x00007fdc2de6fa10 0x00007fdc2de75394 Yes /lib64/libaudit.so.1 >0x00007fdc2dc69ed0 0x00007fdc2dc6aade Yes /lib64/libdl.so.2 >0x00007fdc2e864b10 0x00007fdc2e87f6e0 Yes /lib64/ld-linux-x86-64.so.2 >0x00007fdc274eb240 0x00007fdc274f22d3 Yes /lib64/libnss_files.so.2 >0x00007fdc272e6b40 0x00007fdc272e6f79 Yes /usr/lib64/security/pam_rootok.so >0x00007fdc270c7500 0x00007fdc270da52a Yes /lib64/libselinux.so.1 >0x00007fdc26e556f0 0x00007fdc26ea37a5 Yes /lib64/libpcre.so.1 >0x00007fdc26c31f30 0x00007fdc26c47d72 Yes /lib64/liblzma.so.5 >0x00007fdc26a18a70 0x00007fdc26a24e81 Yes /lib64/libpthread.so.0 >0x00007fdc2680fdc0 0x00007fdc268113c1 Yes /usr/lib64/security/pam_env.so >0x00007fdc2660af90 0x00007fdc2660bfcd Yes /usr/lib64/security/pam_fprintd.so >0x00007fdc263eb650 0x00007fdc263fd9e1 Yes /lib64/libdbus-glib-1.so.2 >0x00007fdc2619f920 0x00007fdc261ca094 Yes /lib64/libdbus-1.so.3 >0x00007fdc25f50e40 0x00007fdc25f81186 Yes /lib64/libgobject-2.0.so.0 >0x00007fdc25c27620 0x00007fdc25cc3269 Yes /lib64/libglib-2.0.so.0 >0x00007fdc258bdd80 0x00007fdc259912eb Yes /lib64/libgio-2.0.so.0 >0x00007fdc25683870 0x00007fdc25687fbc Yes /lib64/libffi.so.6 >0x00007fdc2547f190 0x00007fdc25480075 Yes /lib64/libgmodule-2.0.so.0 >0x00007fdc2526a200 0x00007fdc25276729 Yes /lib64/libz.so.1 >0x00007fdc25051a40 0x00007fdc25060b11 Yes /lib64/libresolv.so.2 >0x00007fdc24e368d0 0x00007fdc24e3e600 Yes /usr/lib64/security/pam_unix.so >0x00007fdc24bfeec0 0x00007fdc24c03038 Yes /lib64/libcrypt.so.1 >0x00007fdc249e9110 0x00007fdc249f5eb1 Yes /lib64/libnsl.so.1 >0x00007fdc2476a900 0x00007fdc247bf46d Yes /lib64/libfreebl3.so >0x00007fdc24563cd0 0x00007fdc24564e25 Yes /usr/lib64/security/pam_succeed_if.so >0x00007fdc24361610 0x00007fdc24361766 Yes /usr/lib64/security/pam_deny.so >0x00007fdc2415e930 0x00007fdc2415ecf5 Yes /usr/lib64/security/pam_localuser.so >0x00007fdc23f5c750 0x00007fdc23f5c913 Yes /usr/lib64/security/pam_permit.so >0x00007fdc23d59de0 0x00007fdc23d5a6cb Yes /usr/lib64/security/pam_pwquality.so >0x00007fdc23b54210 0x00007fdc23b5612d Yes /lib64/libpwquality.so.1 >0x00007fdc2394bba0 0x00007fdc2394e51d Yes /lib64/libcrack.so.2 >0x00007fdc237459c0 0x00007fdc237461f0 Yes /usr/lib64/security/pam_keyinit.so >0x00007fdc23541330 0x00007fdc23543263 Yes /usr/lib64/security/pam_limits.so >0x00007fdc2ea30f00 0x00007fdc2ea55080 Yes (*) /usr/lib64/security/pam_systemd.so >0x00007fdc2333c670 0x00007fdc2333df96 Yes /lib64/libcap.so.2 >0x00007fdc231352a0 0x00007fdc23138407 Yes /lib64/librt.so.1 >0x00007fdc22ef94d0 0x00007fdc22f24b10 Yes /lib64/libdw.so.1 >0x00007fdc22cdbaf0 0x00007fdc22ceb9d5 Yes /lib64/libgcc_s.so.1 >0x00007fdc22ad53d0 0x00007fdc22ad74aa Yes /lib64/libattr.so.1 >0x00007fdc228c0ae0 0x00007fdc228cea6a Yes /lib64/libelf.so.1 >0x00007fdc226af760 0x00007fdc226bb462 Yes /lib64/libbz2.so.1 >0x00007fdc224aaf20 0x00007fdc224ac31b Yes /usr/lib64/security/pam_lastlog.so >0x00007fdc222a7f10 0x00007fdc222a87f5 Yes /lib64/libutil.so.1 >0x00007fdc220a3870 0x00007fdc220a50e1 Yes /usr/lib64/security/pam_xauth.so >(*): Shared library is missing debugging information. >$1 = 0x7fdc2ea83000 "" >$2 = 0x0 >rax 0x0 0 >rbx 0x7fdc2ea83000 140583652306944 >rcx 0xffffffffffffffff -1 >rdx 0x6 6 >rsi 0x2b8b 11147 >rdi 0x2b8b 11147 >rbp 0x7fdc2e21aeb8 0x7fdc2e21aeb8 >rsp 0x7fff37940d98 0x7fff37940d98 >r8 0x7fdc2f744cf0 140583665683696 >r9 0xfeff092d63646b68 -72328978468934808 >r10 0x8 8 >r11 0x206 518 >r12 0x7fdc270dd1c2 140583524749762 >r13 0x7fdc270dd250 140583524749904 >r14 0x7fdc2f71a980 140583665510784 >r15 0x0 0 >rip 0x7fdc2e0c8827 0x7fdc2e0c8827 <__GI_raise+55> >eflags 0x206 [ PF IF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >st0 0 (raw 0x00000000000000000000) >st1 0 (raw 0x00000000000000000000) >st2 0 (raw 0x00000000000000000000) >st3 0 (raw 0x00000000000000000000) >st4 0 (raw 0x00000000000000000000) >st5 0 (raw 0x00000000000000000000) >st6 0 (raw 0x00000000000000000000) >st7 0 (raw 0x00000000000000000000) >fctrl 0x37f 895 >fstat 0x0 0 >ftag 0xffff 65535 >fiseg 0x0 0 >fioff 0x0 0 >foseg 0x0 0 >fooff 0x0 0 >fop 0x0 0 >mxcsr 0x1f80 [ IM DM ZM OM UM PM ] >ymm0 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0xff, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xff, 0x0 <repeats 18 times>}, v16_int16 = {0xff, 0x0, 0xff00, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0xff, 0xff00, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xff00000000ff, 0xffff00000000, 0x0, 0x0}, v2_int128 = {0x0000ffff000000000000ff00000000ff, 0x00000000000000000000000000000000}} >ymm1 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x25 <repeats 16 times>, 0x0 <repeats 16 times>}, v16_int16 = {0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x25252525, 0x25252525, 0x25252525, 0x25252525, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x2525252525252525, 0x2525252525252525, 0x0, 0x0}, v2_int128 = {0x25252525252525252525252525252525, 0x00000000000000000000000000000000}} >ymm2 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x6f, 0x0, 0x74, 0x2f, 0xdc, 0x7f, 0x0, 0x0, 0x51, 0x0 <repeats 23 times>}, v16_int16 = {0x6f, 0x2f74, 0x7fdc, 0x0, 0x51, 0x0 <repeats 11 times>}, v8_int32 = {0x2f74006f, 0x7fdc, 0x51, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x7fdc2f74006f, 0x51, 0x0, 0x0}, v2_int128 = {0x000000000000005100007fdc2f74006f, 0x00000000000000000000000000000000}} >ymm3 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm4 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0xff, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0 <repeats 19 times>}, v16_int16 = {0xff, 0x0, 0xff00, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0xff, 0xff00, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xff00000000ff, 0xff00000000, 0x0, 0x0}, v2_int128 = {0x000000ff000000000000ff00000000ff, 0x00000000000000000000000000000000}} >ymm5 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x8000000000000000, 0x8000000000000000, 0x0, 0x0}, v32_int8 = {0x69, 0x6e, 0x2f, 0x73, 0x75, 0x22, 0x20, 0x73, 0x61, 0x75, 0x69, 0x64, 0x3d, 0x30, 0x20, 0x68, 0x0 <repeats 16 times>}, v16_int16 = {0x6e69, 0x732f, 0x2275, 0x7320, 0x7561, 0x6469, 0x303d, 0x6820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x732f6e69, 0x73202275, 0x64697561, 0x6820303d, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x73202275732f6e69, 0x6820303d64697561, 0x0, 0x0}, v2_int128 = {0x6820303d6469756173202275732f6e69, 0x00000000000000000000000000000000}} >ymm6 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x6f, 0x73, 0x74, 0x6e, 0x61, 0x6d, 0x65, 0x3d, 0x3f, 0x20, 0x61, 0x64, 0x64, 0x72, 0x3d, 0x3f, 0x0 <repeats 16 times>}, v16_int16 = {0x736f, 0x6e74, 0x6d61, 0x3d65, 0x203f, 0x6461, 0x7264, 0x3f3d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x6e74736f, 0x3d656d61, 0x6461203f, 0x3f3d7264, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x3d656d616e74736f, 0x3f3d72646461203f, 0x0, 0x0}, v2_int128 = {0x3f3d72646461203f3d656d616e74736f, 0x00000000000000000000000000000000}} >ymm7 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x8000000000000000, 0x0, 0x0, 0x0}, v32_int8 = {0x20, 0x74, 0x65, 0x72, 0x6d, 0x69, 0x6e, 0x61, 0x6c, 0x3d, 0x70, 0x74, 0x73, 0x2f, 0x30, 0x0 <repeats 17 times>}, v16_int16 = {0x7420, 0x7265, 0x696d, 0x616e, 0x3d6c, 0x7470, 0x2f73, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x72657420, 0x616e696d, 0x74703d6c, 0x302f73, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x616e696d72657420, 0x302f7374703d6c, 0x0, 0x0}, v2_int128 = {0x00302f7374703d6c616e696d72657420, 0x00000000000000000000000000000000}} >ymm8 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm9 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0, 0xff, 0x0 <repeats 30 times>}, v16_int16 = {0xff00, 0x0 <repeats 15 times>}, v8_int32 = {0xff00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xff00, 0x0, 0x0, 0x0}, v2_int128 = {0x0000000000000000000000000000ff00, 0x00000000000000000000000000000000}} >ymm10 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x8000000000000000, 0x0, 0x0}, v32_int8 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xff, 0xff, 0xff, 0x0 <repeats 16 times>}, v16_int16 = {0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0xff00, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x0, 0x0, 0xff, 0xffffff00, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0xffffff00000000ff, 0x0, 0x0}, v2_int128 = {0xffffff00000000ff0000000000000000, 0x00000000000000000000000000000000}} >ymm11 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x8000000000000000, 0x8000000000000000, 0x0, 0x0}, v32_int8 = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x0, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x0 <repeats 16 times>}, v16_int16 = {0xffff, 0xffff, 0xffff, 0xffff, 0xff00, 0xffff, 0xffff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0xffffffff, 0xffffffff, 0xffffff00, 0xffffffff, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xffffffffffffffff, 0xffffffffffffff00, 0x0, 0x0}, v2_int128 = {0xffffffffffffff00ffffffffffffffff, 0x00000000000000000000000000000000}} >ymm12 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm13 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x8000000000000000, 0x0, 0x0}, v32_int8 = {0x0 <repeats 12 times>, 0x73, 0x69, 0x6c, 0x65, 0x0 <repeats 16 times>}, v16_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6973, 0x656c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x0, 0x0, 0x0, 0x656c6973, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x656c697300000000, 0x0, 0x0}, v2_int128 = {0x656c6973000000000000000000000000, 0x00000000000000000000000000000000}} >ymm14 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x8000000000000000, 0x8000000000000000, 0x0, 0x0}, v32_int8 = {0x6e, 0x74, 0x0, 0x6e, 0x6f, 0x75, 0x70, 0x64, 0x61, 0x74, 0x65, 0x0, 0x73, 0x68, 0x6f, 0x77, 0x0 <repeats 16 times>}, v16_int16 = {0x746e, 0x6e00, 0x756f, 0x6470, 0x7461, 0x65, 0x6873, 0x776f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x6e00746e, 0x6470756f, 0x657461, 0x776f6873, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x6470756f6e00746e, 0x776f687300657461, 0x0, 0x0}, v2_int128 = {0x776f6873006574616470756f6e00746e, 0x00000000000000000000000000000000}} >ymm15 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x66, 0x61, 0x69, 0x6c, 0x65, 0x64, 0x0 <repeats 26 times>}, v16_int16 = {0x6166, 0x6c69, 0x6465, 0x0 <repeats 13 times>}, v8_int32 = {0x6c696166, 0x6465, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x64656c696166, 0x0, 0x0, 0x0}, v2_int128 = {0x0000000000000000000064656c696166, 0x00000000000000000000000000000000}} >Dump of assembler code for function __GI_raise: > 0x00007fdc2e0c87f0 <+0>: mov %fs:0x2d4,%ecx > 0x00007fdc2e0c87f8 <+8>: mov %fs:0x2d0,%esi > 0x00007fdc2e0c8800 <+16>: test %esi,%esi > 0x00007fdc2e0c8802 <+18>: jne 0x7fdc2e0c8838 <__GI_raise+72> > 0x00007fdc2e0c8804 <+20>: mov $0xba,%eax > 0x00007fdc2e0c8809 <+25>: syscall > 0x00007fdc2e0c880b <+27>: mov %eax,%ecx > 0x00007fdc2e0c880d <+29>: mov %eax,%fs:0x2d0 > 0x00007fdc2e0c8815 <+37>: mov %eax,%esi > 0x00007fdc2e0c8817 <+39>: movslq %edi,%rdx > 0x00007fdc2e0c881a <+42>: movslq %esi,%rsi > 0x00007fdc2e0c881d <+45>: movslq %ecx,%rdi > 0x00007fdc2e0c8820 <+48>: mov $0xea,%eax > 0x00007fdc2e0c8825 <+53>: syscall >=> 0x00007fdc2e0c8827 <+55>: cmp $0xfffffffffffff000,%rax > 0x00007fdc2e0c882d <+61>: ja 0x7fdc2e0c8850 <__GI_raise+96> > 0x00007fdc2e0c882f <+63>: repz retq > 0x00007fdc2e0c8831 <+65>: nopl 0x0(%rax) > 0x00007fdc2e0c8838 <+72>: test %ecx,%ecx > 0x00007fdc2e0c883a <+74>: jg 0x7fdc2e0c8817 <__GI_raise+39> > 0x00007fdc2e0c883c <+76>: mov %ecx,%edx > 0x00007fdc2e0c883e <+78>: neg %edx > 0x00007fdc2e0c8840 <+80>: and $0x7fffffff,%ecx > 0x00007fdc2e0c8846 <+86>: cmove %esi,%edx > 0x00007fdc2e0c8849 <+89>: mov %edx,%ecx > 0x00007fdc2e0c884b <+91>: jmp 0x7fdc2e0c8817 <__GI_raise+39> > 0x00007fdc2e0c884d <+93>: nopl (%rax) > 0x00007fdc2e0c8850 <+96>: mov 0x3825e9(%rip),%rdx # 0x7fdc2e44ae40 > 0x00007fdc2e0c8857 <+103>: neg %eax > 0x00007fdc2e0c8859 <+105>: mov %eax,%fs:(%rdx) > 0x00007fdc2e0c885c <+108>: mov $0xffffffff,%eax > 0x00007fdc2e0c8861 <+113>: retq >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1144763
: 939542 |
939543
|
939544
|
939545
|
939546
|
939547
|
939548
|
939549
|
939550
|
939551
|
939552