Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 1473244 Details for
Bug 1612422
[abrt] systemd-udev: epoll_wait(): systemd-udevd killed by SIGABRT
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 6.78 KB, created by
Patrick Thies
on 2018-08-04 06:57:04 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Patrick Thies
Created:
2018-08-04 06:57:04 UTC
Size:
6.78 KB
patch
obsolete
>[New LWP 1185] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `/usr/lib/systemd/systemd-udevd'. >Program terminated with signal SIGABRT, Aborted. >#0 0x00007f2691209317 in epoll_wait (epfd=10, events=0x7fff767882d0, maxevents=9, timeout=-1860136169) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30 >30 return SYSCALL_CANCEL (epoll_wait, epfd, events, maxevents, timeout); > >Thread 1 (Thread 0x7f26925c8180 (LWP 1185)): >#0 0x00007f2691209317 in epoll_wait (epfd=10, events=0x7fff767882d0, maxevents=9, timeout=-1860136169) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30 > sc_cancel_oldtype = <optimized out> > sc_ret = <optimized out> >#1 0x0000000000000000 in ?? () >No symbol table info available. >From To Syms Read Shared Object Library >0x00007f2691fbc9b0 0x00007f26920df520 Yes /usr/lib/systemd/libsystemd-shared-238.so >0x00007f2691d623c0 0x00007f2691d6fc5d No /lib64/libkmod.so.2 >0x00007f2691b57ee0 0x00007f2691b5c191 No /lib64/libacl.so.1 >0x00007f269190f6f0 0x00007f269194027e No /lib64/libblkid.so.1 >0x00007f26916efad0 0x00007f2691700705 No /lib64/libgcc_s.so.1 >0x00007f26914d3be0 0x00007f26914e1801 Yes /lib64/libpthread.so.0 >0x00007f2691130340 0x00007f269127725f Yes /lib64/libc.so.6 >0x00007f2690f09210 0x00007f2690f0c47c Yes /lib64/librt.so.1 >0x00007f2690d035b0 0x00007f2690d04e8f Yes /lib64/libcap.so.2 >0x00007f2690ab8780 0x00007f2690aed387 No /lib64/libcryptsetup.so.12 >0x00007f26907a25c0 0x00007f269086fbfc Yes (*) /lib64/libgcrypt.so.20 >0x00007f2690590920 0x00007f2690593aaf No /lib64/libip4tc.so.0 >0x00007f269036caa0 0x00007f2690375c05 Yes /lib64/libseccomp.so.2 >0x00007f269012adf0 0x00007f269014293f Yes /lib64/libselinux.so.1 >0x00007f268ff08750 0x00007f268ff0c2b7 Yes /lib64/libidn2.so.0 >0x00007f268fce30b0 0x00007f268fcf9f66 Yes /lib64/liblzma.so.5 >0x00007f268facafd0 0x00007f268fadc3db No /lib64/liblz4.so.1 >0x00007f268f87bee0 0x00007f268f8b325e No /lib64/libmount.so.1 >0x00007f26923e2f60 0x00007f26923ff910 Yes /lib64/ld-linux-x86-64.so.2 >0x00007f268f65a420 0x00007f268f6675f7 Yes /lib64/libz.so.1 >0x00007f268f454370 0x00007f268f45648e No /lib64/libattr.so.1 >0x00007f268f24d740 0x00007f268f251171 No /lib64/libuuid.so.1 >0x00007f268f000650 0x00007f268f03359a Yes (*) /lib64/libdevmapper.so.1.02 >0x00007f268edd91e0 0x00007f268edea7ee Yes /lib64/libgpg-error.so.0 >0x00007f268ebcdeb0 0x00007f268ebd1c7e No /lib64/libargon2.so.0 >0x00007f268e9c9ee0 0x00007f268e9cabbe Yes /lib64/libdl.so.2 >0x00007f268e7bd700 0x00007f268e7c4c3b Yes /lib64/libjson-c.so.4 >0x00007f268e57c8b0 0x00007f268e59e45e Yes /lib64/libpcap.so.1 >0x00007f268e2f9160 0x00007f268e353cb3 Yes /lib64/libpcre2-8.so.0 >0x00007f268df87a70 0x00007f268dfbbe9e Yes /lib64/libunistring.so.2 >0x00007f268dccbbd0 0x00007f268dd49fab Yes /lib64/libsepol.so.1 >0x00007f268daa2e30 0x00007f268dab9d61 Yes /lib64/libudev.so.1 >0x00007f268d7169f0 0x00007f268d7c8e6a Yes /lib64/libm.so.6 >0x00007f268ca20340 0x00007f268ca265c8 Yes /lib64/libnss_files.so.2 >(*): Shared library is missing debugging information. >$1 = 0x0 >rax 0xfffffffffffffffc -4 >rbx 0x55fd2852db20 94545791605536 >rcx 0x7f2691209317 139803620315927 >rdx 0x9 9 >rsi 0x7fff767882d0 140735180997328 >rdi 0xa 10 >rbp 0x7fff76788440 0x7fff76788440 >rsp 0x7fff767882c8 0x7fff767882c8 >r8 0x1c9c380 30000000 >r9 0x7fff767882d0 140735180997328 >r10 0xffffffff 4294967295 >r11 0x246 582 >r12 0x1 1 >r13 0x7fff767882d0 140735180997328 >r14 0xffffffffffffffff -1 >r15 0x55fd285096e0 94545791456992 >rip 0x7f2691209317 0x7f2691209317 <epoll_wait+55> >eflags 0x246 [ PF ZF IF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >Dump of assembler code for function epoll_wait: > 0x00007f26912092e0 <+0>: lea 0x2c46f1(%rip),%rax # 0x7f26914cd9d8 <__libc_multiple_threads> > 0x00007f26912092e7 <+7>: mov %ecx,%r10d > 0x00007f26912092ea <+10>: mov (%rax),%eax > 0x00007f26912092ec <+12>: test %eax,%eax > 0x00007f26912092ee <+14>: jne 0x7f2691209300 <epoll_wait+32> > 0x00007f26912092f0 <+16>: mov $0xe8,%eax > 0x00007f26912092f5 <+21>: syscall > 0x00007f26912092f7 <+23>: cmp $0xfffffffffffff000,%rax > 0x00007f26912092fd <+29>: ja 0x7f2691209358 <epoll_wait+120> > 0x00007f26912092ff <+31>: retq > 0x00007f2691209300 <+32>: push %r13 > 0x00007f2691209302 <+34>: mov %ecx,%r13d > 0x00007f2691209305 <+37>: push %r12 > 0x00007f2691209307 <+39>: mov %edx,%r12d > 0x00007f269120930a <+42>: push %rbp > 0x00007f269120930b <+43>: mov %rsi,%rbp > 0x00007f269120930e <+46>: push %rbx > 0x00007f269120930f <+47>: mov %edi,%ebx > 0x00007f2691209311 <+49>: sub $0x18,%rsp > 0x00007f2691209315 <+53>: callq 0x7f2691216470 <__libc_enable_asynccancel> > 0x00007f269120931a <+58>: mov %r13d,%r10d > 0x00007f269120931d <+61>: mov %r12d,%edx > 0x00007f2691209320 <+64>: mov %rbp,%rsi > 0x00007f2691209323 <+67>: mov %eax,%r8d > 0x00007f2691209326 <+70>: mov %ebx,%edi > 0x00007f2691209328 <+72>: mov $0xe8,%eax > 0x00007f269120932d <+77>: syscall > 0x00007f269120932f <+79>: cmp $0xfffffffffffff000,%rax > 0x00007f2691209335 <+85>: ja 0x7f269120936a <epoll_wait+138> > 0x00007f2691209337 <+87>: mov %r8d,%edi > 0x00007f269120933a <+90>: mov %eax,0xc(%rsp) > 0x00007f269120933e <+94>: callq 0x7f26912164d0 <__libc_disable_asynccancel> > 0x00007f2691209343 <+99>: mov 0xc(%rsp),%eax > 0x00007f2691209347 <+103>: add $0x18,%rsp > 0x00007f269120934b <+107>: pop %rbx > 0x00007f269120934c <+108>: pop %rbp > 0x00007f269120934d <+109>: pop %r12 > 0x00007f269120934f <+111>: pop %r13 > 0x00007f2691209351 <+113>: retq > 0x00007f2691209352 <+114>: nopw 0x0(%rax,%rax,1) > 0x00007f2691209358 <+120>: mov 0x2beb41(%rip),%rdx # 0x7f26914c7ea0 > 0x00007f269120935f <+127>: neg %eax > 0x00007f2691209361 <+129>: mov %eax,%fs:(%rdx) > 0x00007f2691209364 <+132>: mov $0xffffffff,%eax > 0x00007f2691209369 <+137>: retq > 0x00007f269120936a <+138>: mov 0x2beb2f(%rip),%rdx # 0x7f26914c7ea0 > 0x00007f2691209371 <+145>: neg %eax > 0x00007f2691209373 <+147>: mov %eax,%fs:(%rdx) > 0x00007f2691209376 <+150>: mov $0xffffffff,%eax > 0x00007f269120937b <+155>: jmp 0x7f2691209337 <epoll_wait+87> >End of assembler dump. >== EXPLOITABLE ==
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1612422
: 1473244 |
1473245
|
1473246
|
1473247
|
1473248
|
1473249
|
1473250
|
1473251
|
1473252
|
1473253
|
1473254
|
1473255