Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.

Bug 1384529

Summary: Squid crashes 'assertion failed: disk.cc:377: "fd >= 0"'
Product: Red Hat Enterprise Linux 6 Reporter: SHAURYA <sshaurya>
Component: squidAssignee: Luboš Uhliarik <luhliari>
Status: CLOSED DUPLICATE QA Contact: BaseOS QE - Apps <qe-baseos-apps>
Severity: high Docs Contact:
Priority: unspecified    
Version: 6.7   
Target Milestone: rc   
Target Release: ---   
Hardware: x86_64   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-10-13 14:00:12 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description SHAURYA 2016-10-13 13:20:32 UTC
Description of problem:

Squid crash assembler dump-

Core was generated by `(squid) -f /etc/squid/squid.conf'.
Program terminated with signal 6, Aborted.
#0  0x00007fb2680355e5 in raise () from /lib64/libc.so.6

Thread 1 (Thread 0x7fb26a78c7e0 (LWP 27629)):
#0  0x00007fb2680355e5 in raise () from /lib64/libc.so.6
No symbol table info available.
#1  0x00007fb268036dc5 in abort () from /lib64/libc.so.6
No symbol table info available.
#2  0x00007fb26a8bd355 in xassert ()
No symbol table info available.
#3  0x00007fb26a8c7e40 in file_write ()
No symbol table info available.
#4  0x00007fb26a9ac51d in UFSSwapDir::logEntry(StoreEntry const&, int) const ()
No symbol table info available.
#5  0x00007fb26a9b3a7d in RebuildState::rebuildFromSwapLog() ()
No symbol table info available.
#6  0x00007fb26a9b5ad9 in RebuildState::RebuildStep(void*) ()
No symbol table info available.
#7  0x00007fb26a9731f4 in AsyncCall::make() ()
No symbol table info available.
#8  0x00007fb26a97581b in AsyncCallQueue::fireNext() ()
No symbol table info available.
#9  0x00007fb26a9759b0 in AsyncCallQueue::fire() ()
No symbol table info available.
#10 0x00007fb26a8d2043 in EventLoop::runOnce() ()
No symbol table info available.
#11 0x00007fb26a8d2178 in EventLoop::run() ()
No symbol table info available.
#12 0x00007fb26a920c95 in SquidMain(int, char**) ()
No symbol table info available.
#13 0x00007fb26a921263 in main ()
No symbol table info available.
From                To                  Syms Read   Shared Object Library
0x00007fb26a3821a0  0x00007fb26a385558  Yes (*)     /lib64/librt.so.1
0x00007fb26a168790  0x00007fb26a174198  Yes (*)     /lib64/libpthread.so.0
0x00007fb269f2cc00  0x00007fb269f319a8  Yes (*)     /lib64/libcrypt.so.1
0x00007fb269c05830  0x00007fb269ce2df8  Yes (*)     /usr/lib64/libxml2.so.2
0x00007fb2699b4cd0  0x00007fb2699cdc88  Yes         /lib64/libexpat.so.1.5.2
0x00007fb26975d2f0  0x00007fb269798508  Yes (*)     /usr/lib64/libssl.so.10
0x00007fb2693cacc0  0x00007fb2694bfb48  Yes (*)     /usr/lib64/libcrypto.so.10
0x00007fb26914c070  0x00007fb2691599f8  Yes (*)     /lib64/libnsl.so.1
0x00007fb268f45330  0x00007fb268f46ca8  Yes         /lib64/libcap.so.2.16
0x00007fb268d40de0  0x00007fb268d41998  Yes (*)     /lib64/libdl.so.2
0x00007fb268b39370  0x00007fb268b3d758  Yes         /usr/lib64/libltdl.so.7.2.1
0x00007fb2688873f0  0x00007fb2688f4396  Yes (*)     /usr/lib64/libstdc++.so.6
0x00007fb2685b0e70  0x00007fb2685f0fb8  Yes (*)     /lib64/libm.so.6
0x00007fb268399910  0x00007fb2683a9f78  Yes (*)     /lib64/libgcc_s.so.1
0x00007fb268021a60  0x00007fb26814320c  Yes (*)     /lib64/libc.so.6
0x00007fb26a588b00  0x00007fb26a5a20cb  Yes (*)     /lib64/ld-linux-x86-64.so.2
0x00007fb267e00a90  0x00007fb267e011c8  Yes         /lib64/libfreebl3.so
0x00007fb267bec120  0x00007fb267bf73a8  Yes         /lib64/libz.so.1.2.3
0x00007fb2679b0c90  0x00007fb2679de7f8  Yes (*)     /lib64/libgssapi_krb5.so.2
0x00007fb2676da540  0x00007fb2677545e8  Yes (*)     /lib64/libkrb5.so.3
0x00007fb2674bc3f0  0x00007fb2674bcfc8  Yes (*)     /lib64/libcom_err.so.2
0x00007fb2672933d0  0x00007fb2672ac5a8  Yes (*)     /lib64/libk5crypto.so.3
0x00007fb26708b380  0x00007fb26708d458  Yes         /lib64/libattr.so.1.1.0
0x00007fb266e81a40  0x00007fb266e870d8  Yes (*)     /lib64/libkrb5support.so.0
0x00007fb266c7cbf0  0x00007fb266c7d1d8  Yes         /lib64/libkeyutils.so.1.3
0x00007fb266a65930  0x00007fb266a74a98  Yes (*)     /lib64/libresolv.so.2
0x00007fb266848950  0x00007fb266858e38  Yes (*)     /lib64/libselinux.so.1
0x00007fb2666371f0  0x00007fb26663f6e8  Yes (*)     /lib64/libnss_files.so.2
0x00007fb266430000  0x00007fb266433488  Yes (*)     /lib64/libnss_dns.so.2
(*): Shared library is missing debugging information.
$1 = 0x0
No symbol "__glib_assert_msg" in current context.
rax            0x0	0
rbx            0x7fb26aa250e7	140404269928679
rcx            0xffffffffffffffff	-1
rdx            0x6	6
rsi            0x6bed	27629
rdi            0x6bed	27629
rbp            0x7fb26b371ff0	0x7fb26b371ff0
rsp            0x7ffd28d80ad8	0x7ffd28d80ad8
r8             0xffffffff	4294967295
r9             0x632e6b736964203a	7146767802117136442
r10            0x8	8
r11            0x206	518
r12            0x7fb26b371ff0	140404279681008
r13            0x179	377
r14            0x7fb265e2de90	140404190273168
r15            0x0	0
rip            0x7fb2680355e5	0x7fb2680355e5 <raise+53>
eflags         0x206	[ PF IF ]
cs             0x33	51
ss             0x2b	43
ds             0x0	0
es             0x0	0
fs             0x0	0
gs             0x0	0
st0            -nan(0x000000034)	(raw 0xffff0000000000000034)
st1            -nan(0x00000000c)	(raw 0xffff000000000000000c)
st2            -nan(0xf83854b17639d000)	(raw 0xfffff83854b17639d000)
st3            -nan(0x1f83854b17639d)	(raw 0xffff001f83854b17639d)
st4            0	(raw 0x00000000000000000000)
st5            0	(raw 0x00000000000000000000)
st6            0	(raw 0x00000000000000000000)
st7            -nan(0x000000001)	(raw 0xffff0000000000000001)
fctrl          0x37f	895
fstat          0x0	0
ftag           0xffff	65535
fiseg          0x0	0
fioff          0x0	0
foseg          0x0	0
fooff          0x0	0
fop            0x0	0
mxcsr          0x1fa1	[ IE PE IM DM ZM OM UM PM ]
ymm0           {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0 <repeats 26 times>}, v16_int16 = {0x0, 0x0, 0xff00, 0x0 <repeats 13 times>}, v8_int32 = {0x0, 0xff00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xff0000000000, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000ff0000000000, 0x00000000000000000000000000000000}}
ymm1           {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x25 <repeats 16 times>, 0x0 <repeats 16 times>}, v16_int16 = {0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x25252525, 0x25252525, 0x25252525, 0x25252525, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x2525252525252525, 0x2525252525252525, 0x0, 0x0}, v2_int128 = {0x25252525252525252525252525252525, 0x00000000000000000000000000000000}}
ymm2           {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}}
ymm3           {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x8000000000000000, 0x0, 0x0}, v32_int8 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x0 <repeats 16 times>}, v16_int16 = {0x0, 0x0, 0x0, 0x0, 0xffff, 0xffff, 0xffff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x0, 0x0, 0xffffffff, 0xffffffff, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0xffffffffffffffff, 0x0, 0x0}, v2_int128 = {0xffffffffffffffff0000000000000000, 0x00000000000000000000000000000000}}
ymm4           {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0xb2, 0x53, 0x98, 0x7b, 0x1c, 0xb7, 0x43, 0xbe, 0x0 <repeats 24 times>}, v16_int16 = {0x53b2, 0x7b98, 0xb71c, 0xbe43, 0x0 <repeats 12 times>}, v8_int32 = {0x7b9853b2, 0xbe43b71c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xbe43b71c7b9853b2, 0x0, 0x0, 0x0}, v2_int128 = {0x0000000000000000be43b71c7b9853b2, 0x00000000000000000000000000000000}}
ymm5           {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0xf4, 0x5, 0x89, 0xe2, 0xc0, 0xf8, 0x36, 0xbe, 0x0 <repeats 24 times>}, v16_int16 = {0x5f4, 0xe289, 0xf8c0, 0xbe36, 0x0 <repeats 12 times>}, v8_int32 = {0xe28905f4, 0xbe36f8c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xbe36f8c0e28905f4, 0x0, 0x0, 0x0}, v2_int128 = {0x0000000000000000be36f8c0e28905f4, 0x00000000000000000000000000000000}}
ymm6           {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0xbc, 0x6b, 0xf7, 0xb0, 0xd9, 0x25, 0x29, 0xbe, 0x0 <repeats 24 times>}, v16_int16 = {0x6bbc, 0xb0f7, 0x25d9, 0xbe29, 0x0 <repeats 12 times>}, v8_int32 = {0xb0f76bbc, 0xbe2925d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xbe2925d9b0f76bbc, 0x0, 0x0, 0x0}, v2_int128 = {0x0000000000000000be2925d9b0f76bbc, 0x00000000000000000000000000000000}}
ymm7           {v8_float = {0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x1000000, 0x0, 0x0, 0x0}, v32_int8 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, 0x41, 0x0 <repeats 24 times>}, v16_int16 = {0x0, 0x0, 0x0, 0x4170, 0x0 <repeats 12 times>}, v8_int32 = {0x0, 0x41700000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x4170000000000000, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000004170000000000000, 0x00000000000000000000000000000000}}
ymm8           {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x8000000000000000, 0x8000000000000000, 0x0, 0x0}, v32_int8 = {0x0, 0x0, 0x0, 0x0, 0xff <repeats 12 times>, 0x0 <repeats 16 times>}, v16_int16 = {0x0, 0x0, 0xffff, 0xffff, 0xffff, 0xffff, 0xffff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x0, 0xffffffff, 0xffffffff, 0xffffffff, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xffffffff00000000, 0xffffffffffffffff, 0x0, 0x0}, v2_int128 = {0xffffffffffffffffffffffff00000000, 0x00000000000000000000000000000000}}
ymm9           {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 12 times>, 0x20, 0x20, 0x20, 0x20, 0x0 <repeats 16 times>}, v16_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2020, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x0, 0x0, 0x0, 0x20202020, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x2020202000000000, 0x0, 0x0}, v2_int128 = {0x20202020000000000000000000000000, 0x00000000000000000000000000000000}}
ymm10          {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x8000000000000000, 0x0, 0x0}, v32_int8 = {0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x0 <repeats 16 times>}, v16_int16 = {0x0, 0x0, 0xff, 0x0, 0xffff, 0xffff, 0xffff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x0, 0xff, 0xffffffff, 0xffffffff, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xff00000000, 0xffffffffffffffff, 0x0, 0x0}, v2_int128 = {0xffffffffffffffff000000ff00000000, 0x00000000000000000000000000000000}}
ymm11          {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x44, 0x65, 0xbe, 0xff, 0x7b, 0x60, 0x72, 0x3d, 0x0 <repeats 24 times>}, v16_int16 = {0x6544, 0xffbe, 0x607b, 0x3d72, 0x0 <repeats 12 times>}, v8_int32 = {0xffbe6544, 0x3d72607b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x3d72607bffbe6544, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000003d72607bffbe6544, 0x00000000000000000000000000000000}}
ymm12          {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x18, 0xdc, 0x77, 0x62, 0x5e, 0x95, 0xbe, 0x3e, 0x0 <repeats 24 times>}, v16_int16 = {0xdc18, 0x6277, 0x955e, 0x3ebe, 0x0 <repeats 12 times>}, v8_int32 = {0x6277dc18, 0x3ebe955e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x3ebe955e6277dc18, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000003ebe955e6277dc18, 0x00000000000000000000000000000000}}
ymm13          {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x9a, 0xfd, 0x4d, 0xaa, 0xf7, 0x88, 0xbd, 0x3b, 0x0 <repeats 24 times>}, v16_int16 = {0xfd9a, 0xaa4d, 0x88f7, 0x3bbd, 0x0 <repeats 12 times>}, v8_int32 = {0xaa4dfd9a, 0x3bbd88f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x3bbd88f7aa4dfd9a, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000003bbd88f7aa4dfd9a, 0x00000000000000000000000000000000}}
ymm14          {v8_float = {0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0xd, 0x0, 0x0, 0x0}, v32_int8 = {0x80, 0x22, 0xc9, 0x8e, 0xef, 0x56, 0x2a, 0x40, 0x0 <repeats 24 times>}, v16_int16 = {0x2280, 0x8ec9, 0x56ef, 0x402a, 0x0 <repeats 12 times>}, v8_int32 = {0x8ec92280, 0x402a56ef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x402a56ef8ec92280, 0x0, 0x0, 0x0}, v2_int128 = {0x0000000000000000402a56ef8ec92280, 0x00000000000000000000000000000000}}
ymm15          {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}}
Dump of assembler code for function raise:
   0x00007fb2680355b0 <+0>:	mov    %fs:0x2d4,%eax
   0x00007fb2680355b8 <+8>:	mov    %fs:0x2d0,%esi
   0x00007fb2680355c0 <+16>:	test   %esi,%esi
   0x00007fb2680355c2 <+18>:	jne    0x7fb2680355f0 <raise+64>
   0x00007fb2680355c4 <+20>:	mov    $0xba,%eax
   0x00007fb2680355c9 <+25>:	syscall 
   0x00007fb2680355cb <+27>:	mov    %eax,%esi
   0x00007fb2680355cd <+29>:	mov    %eax,%fs:0x2d0
   0x00007fb2680355d5 <+37>:	movslq %edi,%rdx
   0x00007fb2680355d8 <+40>:	movslq %esi,%rsi
   0x00007fb2680355db <+43>:	movslq %eax,%rdi
   0x00007fb2680355de <+46>:	mov    $0xea,%eax
   0x00007fb2680355e3 <+51>:	syscall 
=> 0x00007fb2680355e5 <+53>:	cmp    $0xfffffffffffff000,%rax
   0x00007fb2680355eb <+59>:	ja     0x7fb2680355ff <raise+79>
   0x00007fb2680355ed <+61>:	repz retq 
   0x00007fb2680355ef <+63>:	nop
   0x00007fb2680355f0 <+64>:	test   %eax,%eax
   0x00007fb2680355f2 <+66>:	jg     0x7fb2680355d5 <raise+37>
   0x00007fb2680355f4 <+68>:	test   $0x7fffffff,%eax
   0x00007fb2680355f9 <+73>:	jne    0x7fb26803560f <raise+95>
   0x00007fb2680355fb <+75>:	mov    %esi,%eax
   0x00007fb2680355fd <+77>:	jmp    0x7fb2680355d5 <raise+37>
   0x00007fb2680355ff <+79>:	mov    0x35b9a2(%rip),%rdx        # 0x7fb268390fa8
   0x00007fb268035606 <+86>:	neg    %eax
   0x00007fb268035608 <+88>:	mov    %eax,%fs:(%rdx)
   0x00007fb26803560b <+91>:	or     $0xffffffffffffffff,%eax
   0x00007fb26803560e <+94>:	retq   
   0x00007fb26803560f <+95>:	neg    %eax
   0x00007fb268035611 <+97>:	jmp    0x7fb2680355d5 <raise+37>
End of assembler dump.


Version-Release number of selected component (if applicable):

squid-3.1.23-20.testing2.el6.x86_64.rpm

How reproducible:

Once

Steps to Reproduce:
NA

Actual results:
NA

Expected results:
NA

Additional info:

Comment 2 Luboš Uhliarik 2016-10-13 14:00:12 UTC

*** This bug has been marked as a duplicate of bug 1235114 ***