Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 948757 Details for
Bug 1154886
[abrt] libgpod: strlen(): iphone-set-info killed by SIGSEGV
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 19.65 KB, created by
Erik Johnson
on 2014-10-21 00:15:18 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Erik Johnson
Created:
2014-10-21 00:15:18 UTC
Size:
19.65 KB
patch
obsolete
>[New LWP 13454] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `/lib/udev/iphone-set-info'. >Program terminated with signal SIGSEGV, Segmentation fault. >#0 strlen () at ../sysdeps/x86_64/strlen.S:106 >106 movdqu (%rax), %xmm12 > >Thread 1 (Thread 0x7fb8c113c840 (LWP 13454)): >#0 strlen () at ../sysdeps/x86_64/strlen.S:106 >No locals. >#1 0x00000039a78860ae in __GI___strdup (s=0x0) at strdup.c:41 > len = <optimized out> > new = <optimized out> >#2 0x00000039ab40637a in plist_new_string (val=0x0) at plist.c:118 > data = 0x892980 >#3 0x00000039ac00b024 in pair_record_generate (pair_record=0x7fff914612b8, client=0x90b2d0) at lockdown.c:879 > ret = 0 > uret = <optimized out> > public_key = {data = 0x90bb40 "-----BEGIN RSA PUBLIC KEY-----\nMIGJAoGBAMqqG9an3S6hycJhEz5hMdqB3xgM1n0Pg69iYTfRoTqP+t1ALtCnfrW8\nOLT8QKVbu3KqJPoOqG729YnzlSNkDHQU/KFjvF/WQhLDYS7pVa0ANujATGN5uLyx\nCEVQqy9g1sHjVeS5YNf0A22IVunyFqS5kVw+zKj"..., size = <optimized out>} > host_id = 0x0 > system_buid = 0x0 >#4 lockdownd_do_pair (client=0x90b2d0, pair_record=pair_record@entry=0x0, verb=<optimized out>, verb@entry=0x39ac0185e5 "Pair") at lockdown.c:939 > ret = -256 > dict = 0x0 > pair_record_plist = 0x90e150 > wifi_node = 0x0 > pairing_mode = 0 > request_pair_record = <optimized out> > options = <optimized out> >#5 0x00000039ac00b5bc in lockdownd_pair (client=<optimized out>, pair_record=pair_record@entry=0x0) at lockdown.c:1102 >No locals. >#6 0x00000039ac00bbfc in lockdownd_client_new_with_handshake (device=<optimized out>, client=client@entry=0x7fff91461388, label=label@entry=0x401d07 "libgpod") at lockdown.c:774 > ret = -16 > client_loc = 0x90b2d0 > host_id = 0x0 > type = 0x90b0f0 "" > pair_record = 0x0 >#7 0x0000000000401504 in read_sysinfo_extended_by_uuid (uuid=uuid@entry=0x7fff91462e57 "b128c3102a14278788218afb418745d95b174e98") at ipod-lockdown.c:74 > client = 0x0 > device = 0x897290 > ret = 0 > lockdown_ret = <optimized out> > xml = 0x0 > str = 0x0 > gxml = 0x0 > xml_length = 0 > value = 0x0 > global = 0x0 > ptr = 0x0 > cnt = 10 >#8 0x000000000040127c in write_sysinfo_extended (uuid=0x7fff91462e57 "b128c3102a14278788218afb418745d95b174e98") at iphone-callout.c:15 > write_ok = <optimized out> > sysinfo_extended = <optimized out> >#9 main (argc=<optimized out>, argv=0x7fff914614d8) at iphone-callout.c:63 > daemonize_failed = <optimized out> > uuid = 0x7fff91462e57 "b128c3102a14278788218afb418745d95b174e98" >From To Syms Read Shared Object Library >0x00000039ac411510 0x00000039ac437328 Yes /lib64/libgpod.so.4 >0x00000039a8802210 0x00000039a880e930 Yes /lib64/libz.so.1 >0x00000039a8405890 0x00000039a8474a08 Yes /lib64/libm.so.6 >0x00000039c380b210 0x00000039c389dd70 Yes /lib64/libsqlite3.so.0 >0x00000039afc01190 0x00000039afc02088 Yes /lib64/libgmodule-2.0.so.0 >0x00000039b142e870 0x00000039b1516930 Yes /lib64/libxml2.so.2 >0x00000039ba006ed0 0x00000039ba01aac0 Yes /lib64/libgdk_pixbuf-2.0.so.0 >0x00000039aac0b160 0x00000039aac39a18 Yes /lib64/libgobject-2.0.so.0 >0x00000039aa01a6e0 0x00000039aa0b2f1c Yes /lib64/libglib-2.0.so.0 >0x00000039ab00a440 0x00000039ab0192cc Yes /lib64/libsgutils2.so.2 >0x00000039c4804250 0x00000039c480fa28 Yes /lib64/libusb-1.0.so.0 >0x00000039ac008600 0x00000039ac018328 Yes /lib64/libimobiledevice.so.4 >0x00000039ab4027c0 0x00000039ab407ecc Yes /lib64/libplist.so.2 >0x00000039ab802180 0x00000039ab8057ec Yes /lib64/libusbmuxd.so.2 >0x00000039c8c22f40 0x00000039c8cdb8b8 Yes /lib64/libgnutls.so.28 >0x00000039bbe02cb0 0x00000039bbe0ed5c Yes /lib64/libtasn1.so.6 >0x00000039a80059a0 0x00000039a8011554 Yes /lib64/libpthread.so.0 >0x00000039a781f560 0x00000039a7960994 Yes /lib64/libc.so.6 >0x00000039a7c00ed0 0x00000039a7c019d0 Yes /lib64/libdl.so.2 >0x00000039a8c030e0 0x00000039a8c19050 Yes /lib64/liblzma.so.5 >0x00000039b0c31be0 0x00000039b0cf365c Yes /lib64/libgio-2.0.so.0 >0x00000039abc05680 0x00000039abc26df8 Yes /lib64/libpng16.so.16 >0x00000039aa801870 0x00000039aa805fe8 Yes /lib64/libffi.so.6 >0x00000039ad4034a0 0x00000039ad40bf6c Yes /lib64/libudev.so.1 >0x00000039c0407800 0x00000039c0456a48 Yes /lib64/libgcrypt.so.11 >0x00000039a9002af0 0x00000039a90122a8 Yes /lib64/libgcc_s.so.1 >0x00000039a9c022d0 0x00000039a9c050ac Yes /lib64/librt.so.1 >0x00000039bfc0d7e0 0x00000039bfc2a5ec Yes /lib64/libp11-kit.so.0 >0x00000039c0018e60 0x00000039c0059d34 Yes /lib64/libtspi.so.1 >0x00000039bf206360 0x00000039bf220c9c Yes /lib64/libnettle.so.4 >0x00000039c8806820 0x00000039c8811624 Yes /lib64/libhogweed.so.2 >0x00000039bd80c040 0x00000039bd85edc4 Yes /lib64/libgmp.so.10 >0x00000039a7400b10 0x00000039a7419c30 Yes /lib64/ld-linux-x86-64.so.2 >0x00000039a98064a0 0x00000039a9818fe4 Yes /lib64/libselinux.so.1 >0x00000039aa403a40 0x00000039aa4127dc Yes /lib64/libresolv.so.2 >0x00000039be200a30 0x00000039be2010a8 Yes /lib64/libgpg-error.so.0 >0x00000039b1869c40 0x00000039b195a538 Yes /lib64/libcrypto.so.10 >0x00000039b2c183c0 0x00000039b2c52550 Yes /lib64/libssl.so.10 >0x00000039a9401770 0x00000039a944b9e0 Yes /lib64/libpcre.so.1 >0x00000039b1c0bee0 0x00000039b1c3c1b4 Yes /lib64/libgssapi_krb5.so.2 >0x00000039b20251a0 0x00000039b20877ac Yes /lib64/libkrb5.so.3 >0x00000039b0801570 0x00000039b0802154 Yes /lib64/libcom_err.so.2 >0x00000039b28048b0 0x00000039b28247e8 Yes /lib64/libk5crypto.so.3 >0x00000039b1003620 0x00000039b1009f8c Yes /lib64/libkrb5support.so.0 >0x00000039b2401570 0x00000039b2402194 Yes /lib64/libkeyutils.so.1 >0x00007fb8c0f32240 0x00007fb8c0f38eb4 Yes /lib64/libnss_files.so.2 >0x00007fb8c0cffd20 0x00007fb8c0d17404 Yes /usr/lib64/pkcs11/p11-kit-trust.so >0x00000039c2403f80 0x00000039c245812d Yes /lib64/libfreebl3.so >0x00007fb8c0ae2d50 0x00007fb8c0aecc9c Yes /usr/lib64/pkcs11/gnome-keyring-pkcs11.so >$1 = 0x0 >$2 = 0x0 >rax 0x0 0 >rbx 0x0 0 >rcx 0x0 0 >rdx 0x38 56 >rsi 0x1c4003c 29622332 >rdi 0x0 0 >rbp 0x0 0x0 >rsp 0x7fff91461268 0x7fff91461268 >r8 0x20000 131072 >r9 0x3 3 >r10 0x3 3 >r11 0x246 582 >r12 0x90bb40 9485120 >r13 0x39ac0185e5 247698916837 >r14 0xfb 251 >r15 0x0 0 >rip 0x39a788636a 0x39a788636a <strlen+42> >eflags 0x10293 [ CF AF SF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >st0 0 (raw 0x00000000000000000000) >st1 0 (raw 0x00000000000000000000) >st2 0 (raw 0x00000000000000000000) >st3 0 (raw 0x00000000000000000000) >st4 0 (raw 0x00000000000000000000) >st5 0 (raw 0x00000000000000000000) >st6 0 (raw 0x00000000000000000000) >st7 0 (raw 0x00000000000000000000) >fctrl 0x37f 895 >fstat 0x0 0 >ftag 0xffff 65535 >fiseg 0x0 0 >fioff 0x0 0 >foseg 0x0 0 >fooff 0x0 0 >fop 0x0 0 >mxcsr 0x1f80 [ IM DM ZM OM UM PM ] >ymm0 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm1 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0, 0x0, 0x0, 0x0, 0xff, 0x0 <repeats 27 times>}, v16_int16 = {0x0, 0x0, 0xff, 0x0 <repeats 13 times>}, v8_int32 = {0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xff00000000, 0x0, 0x0, 0x0}, v2_int128 = {0x0000000000000000000000ff00000000, 0x00000000000000000000000000000000}} >ymm2 {v8_float = {0x0, 0x0, 0xe57461, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x8000000000000000, 0x0, 0x0, 0x0}, v32_int8 = {0x52, 0x6f, 0x6f, 0x74, 0x50, 0x72, 0x69, 0x76, 0x61, 0x74, 0x65, 0x4b, 0x65, 0x79, 0x0 <repeats 18 times>}, v16_int16 = {0x6f52, 0x746f, 0x7250, 0x7669, 0x7461, 0x4b65, 0x7965, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x746f6f52, 0x76697250, 0x4b657461, 0x7965, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x76697250746f6f52, 0x79654b657461, 0x0, 0x0}, v2_int128 = {0x000079654b65746176697250746f6f52, 0x00000000000000000000000000000000}} >ymm3 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x8000000000000000, 0x0, 0x0}, v32_int8 = {0xd1, 0xa1, 0x3a, 0x8f, 0xfa, 0xdd, 0x40, 0x2e, 0xd0, 0xa7, 0x7e, 0xb5, 0xbc, 0x38, 0xb4, 0xfc, 0x0 <repeats 16 times>}, v16_int16 = {0xa1d1, 0x8f3a, 0xddfa, 0x2e40, 0xa7d0, 0xb57e, 0x38bc, 0xfcb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x8f3aa1d1, 0x2e40ddfa, 0xb57ea7d0, 0xfcb438bc, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x2e40ddfa8f3aa1d1, 0xfcb438bcb57ea7d0, 0x0, 0x0}, v2_int128 = {0xfcb438bcb57ea7d02e40ddfa8f3aa1d1, 0x00000000000000000000000000000000}} >ymm4 {v8_float = {0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x3e, 0x61, 0x31, 0xda, 0x81, 0xdf, 0x18, 0xc, 0xd6, 0x7d, 0xf, 0x83, 0xaf, 0x62, 0x61, 0x37, 0x0 <repeats 16 times>}, v16_int16 = {0x613e, 0xda31, 0xdf81, 0xc18, 0x7dd6, 0x830f, 0x62af, 0x3761, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0xda31613e, 0xc18df81, 0x830f7dd6, 0x376162af, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xc18df81da31613e, 0x376162af830f7dd6, 0x0, 0x0}, v2_int128 = {0x376162af830f7dd60c18df81da31613e, 0x00000000000000000000000000000000}} >ymm5 {v8_float = {0x0, 0x4d800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x8000000000000000, 0x0, 0x0, 0x0}, v32_int8 = {0x2, 0x81, 0x81, 0x0, 0xca, 0xaa, 0x1b, 0xd6, 0xa7, 0xdd, 0x2e, 0xa1, 0xc9, 0xc2, 0x61, 0x13, 0x0 <repeats 16 times>}, v16_int16 = {0x8102, 0x81, 0xaaca, 0xd61b, 0xdda7, 0xa12e, 0xc2c9, 0x1361, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x818102, 0xd61baaca, 0xa12edda7, 0x1361c2c9, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xd61baaca00818102, 0x1361c2c9a12edda7, 0x0, 0x0}, v2_int128 = {0x1361c2c9a12edda7d61baaca00818102, 0x00000000000000000000000000000000}} >ymm6 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x48, 0x86, 0xf7, 0xd, 0x1, 0x1, 0x1, 0x5, 0x0, 0x3, 0x81, 0x8d, 0x0, 0x30, 0x81, 0x89, 0x0 <repeats 16 times>}, v16_int16 = {0x8648, 0xdf7, 0x101, 0x501, 0x300, 0x8d81, 0x3000, 0x8981, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0xdf78648, 0x5010101, 0x8d810300, 0x89813000, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x50101010df78648, 0x898130008d810300, 0x0, 0x0}, v2_int128 = {0x898130008d810300050101010df78648, 0x00000000000000000000000000000000}} >ymm7 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x31, 0x34, 0x34, 0x38, 0x5a, 0x30, 0x0, 0x30, 0x81, 0x9f, 0x30, 0xd, 0x6, 0x9, 0x2a, 0x86, 0x0 <repeats 16 times>}, v16_int16 = {0x3431, 0x3834, 0x305a, 0x3000, 0x9f81, 0xd30, 0x906, 0x862a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x38343431, 0x3000305a, 0xd309f81, 0x862a0906, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x3000305a38343431, 0x862a09060d309f81, 0x0, 0x0}, v2_int128 = {0x862a09060d309f813000305a38343431, 0x00000000000000000000000000000000}} >ymm8 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm9 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm10 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm11 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm12 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm13 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm14 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm15 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >Dump of assembler code for function strlen: > 0x00000039a7886340 <+0>: pxor %xmm8,%xmm8 > 0x00000039a7886345 <+5>: pxor %xmm9,%xmm9 > 0x00000039a788634a <+10>: pxor %xmm10,%xmm10 > 0x00000039a788634f <+15>: pxor %xmm11,%xmm11 > 0x00000039a7886354 <+20>: mov %rdi,%rax > 0x00000039a7886357 <+23>: mov %rdi,%rcx > 0x00000039a788635a <+26>: and $0xfff,%rcx > 0x00000039a7886361 <+33>: cmp $0xfcf,%rcx > 0x00000039a7886368 <+40>: ja 0x39a78863d0 <strlen+144> >=> 0x00000039a788636a <+42>: movdqu (%rax),%xmm12 > 0x00000039a788636f <+47>: pcmpeqb %xmm8,%xmm12 > 0x00000039a7886374 <+52>: pmovmskb %xmm12,%edx > 0x00000039a7886379 <+57>: test %edx,%edx > 0x00000039a788637b <+59>: je 0x39a7886381 <strlen+65> > 0x00000039a788637d <+61>: bsf %edx,%eax > 0x00000039a7886380 <+64>: retq > 0x00000039a7886381 <+65>: and $0xfffffffffffffff0,%rax > 0x00000039a7886385 <+69>: pcmpeqb 0x10(%rax),%xmm9 > 0x00000039a788638b <+75>: pcmpeqb 0x20(%rax),%xmm10 > 0x00000039a7886391 <+81>: pcmpeqb 0x30(%rax),%xmm11 > 0x00000039a7886397 <+87>: pmovmskb %xmm9,%edx > 0x00000039a788639c <+92>: pmovmskb %xmm10,%r8d > 0x00000039a78863a1 <+97>: pmovmskb %xmm11,%ecx > 0x00000039a78863a6 <+102>: shl $0x10,%rdx > 0x00000039a78863aa <+106>: shl $0x10,%rcx > 0x00000039a78863ae <+110>: or %r8,%rcx > 0x00000039a78863b1 <+113>: shl $0x20,%rcx > 0x00000039a78863b5 <+117>: or %rcx,%rdx > 0x00000039a78863b8 <+120>: mov %rdi,%rcx > 0x00000039a78863bb <+123>: xor %rax,%rcx > 0x00000039a78863be <+126>: and $0xffffffffffffffc0,%rax > 0x00000039a78863c2 <+130>: sar %cl,%rdx > 0x00000039a78863c5 <+133>: test %rdx,%rdx > 0x00000039a78863c8 <+136>: je 0x39a7886440 <strlen+256> > 0x00000039a78863ca <+138>: bsf %rdx,%rax > 0x00000039a78863ce <+142>: retq > 0x00000039a78863cf <+143>: nop > 0x00000039a78863d0 <+144>: and $0xffffffffffffffc0,%rax > 0x00000039a78863d4 <+148>: pcmpeqb (%rax),%xmm8 > 0x00000039a78863d9 <+153>: pcmpeqb 0x10(%rax),%xmm9 > 0x00000039a78863df <+159>: pcmpeqb 0x20(%rax),%xmm10 > 0x00000039a78863e5 <+165>: pcmpeqb 0x30(%rax),%xmm11 > 0x00000039a78863eb <+171>: pmovmskb %xmm8,%esi > 0x00000039a78863f0 <+176>: pmovmskb %xmm9,%edx > 0x00000039a78863f5 <+181>: pmovmskb %xmm10,%r8d > 0x00000039a78863fa <+186>: pmovmskb %xmm11,%ecx > 0x00000039a78863ff <+191>: shl $0x10,%rdx > 0x00000039a7886403 <+195>: shl $0x10,%rcx > 0x00000039a7886407 <+199>: or %rsi,%rdx > 0x00000039a788640a <+202>: or %r8,%rcx > 0x00000039a788640d <+205>: shl $0x20,%rcx > 0x00000039a7886411 <+209>: or %rcx,%rdx > 0x00000039a7886414 <+212>: mov %rdi,%rcx > 0x00000039a7886417 <+215>: xor %rax,%rcx > 0x00000039a788641a <+218>: and $0xffffffffffffffc0,%rax > 0x00000039a788641e <+222>: sar %cl,%rdx > 0x00000039a7886421 <+225>: test %rdx,%rdx > 0x00000039a7886424 <+228>: je 0x39a7886430 <strlen+240> > 0x00000039a7886426 <+230>: bsf %rdx,%rax > 0x00000039a788642a <+234>: retq > 0x00000039a788642b <+235>: nopl 0x0(%rax,%rax,1) > 0x00000039a7886430 <+240>: pxor %xmm9,%xmm9 > 0x00000039a7886435 <+245>: pxor %xmm10,%xmm10 > 0x00000039a788643a <+250>: pxor %xmm11,%xmm11 > 0x00000039a788643f <+255>: nop > 0x00000039a7886440 <+256>: movdqa 0x40(%rax),%xmm8 > 0x00000039a7886446 <+262>: pminub 0x50(%rax),%xmm8 > 0x00000039a788644c <+268>: pminub 0x60(%rax),%xmm8 > 0x00000039a7886452 <+274>: pminub 0x70(%rax),%xmm8 > 0x00000039a7886458 <+280>: pcmpeqb %xmm11,%xmm8 > 0x00000039a788645d <+285>: pmovmskb %xmm8,%edx > 0x00000039a7886462 <+290>: test %edx,%edx > 0x00000039a7886464 <+292>: jne 0x39a78864a0 <strlen+352> > 0x00000039a7886466 <+294>: sub $0xffffffffffffff80,%rax > 0x00000039a788646a <+298>: movdqa (%rax),%xmm8 > 0x00000039a788646f <+303>: pminub 0x10(%rax),%xmm8 > 0x00000039a7886475 <+309>: pminub 0x20(%rax),%xmm8 > 0x00000039a788647b <+315>: pminub 0x30(%rax),%xmm8 > 0x00000039a7886481 <+321>: pcmpeqb %xmm11,%xmm8 > 0x00000039a7886486 <+326>: pmovmskb %xmm8,%edx > 0x00000039a788648b <+331>: test %edx,%edx > 0x00000039a788648d <+333>: jne 0x39a78864a4 <strlen+356> > 0x00000039a788648f <+335>: jmp 0x39a7886440 <strlen+256> > 0x00000039a7886491 <+337>: data32 data32 data32 data32 data32 nopw %cs:0x0(%rax,%rax,1) > 0x00000039a78864a0 <+352>: add $0x40,%rax > 0x00000039a78864a4 <+356>: pxor %xmm8,%xmm8 > 0x00000039a78864a9 <+361>: pcmpeqb (%rax),%xmm8 > 0x00000039a78864ae <+366>: pcmpeqb 0x10(%rax),%xmm9 > 0x00000039a78864b4 <+372>: pcmpeqb 0x20(%rax),%xmm10 > 0x00000039a78864ba <+378>: pcmpeqb 0x30(%rax),%xmm11 > 0x00000039a78864c0 <+384>: pmovmskb %xmm8,%esi > 0x00000039a78864c5 <+389>: pmovmskb %xmm9,%edx > 0x00000039a78864ca <+394>: pmovmskb %xmm10,%r8d > 0x00000039a78864cf <+399>: pmovmskb %xmm11,%ecx > 0x00000039a78864d4 <+404>: shl $0x10,%rdx > 0x00000039a78864d8 <+408>: shl $0x10,%rcx > 0x00000039a78864dc <+412>: or %rsi,%rdx > 0x00000039a78864df <+415>: or %r8,%rcx > 0x00000039a78864e2 <+418>: shl $0x20,%rcx > 0x00000039a78864e6 <+422>: or %rcx,%rdx > 0x00000039a78864e9 <+425>: bsf %rdx,%rdx > 0x00000039a78864ed <+429>: add %rdx,%rax > 0x00000039a78864f0 <+432>: sub %rdi,%rax > 0x00000039a78864f3 <+435>: retq >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1154886
: 948757 |
948758
|
948759
|
948760
|
948761
|
948762
|
948763
|
948764
|
948765
|
948766
|
948767