Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 611227 Details for
Bug 855632
[abrt] man-db-2.6.0.2-8.fc17: check_for_stray: Process /usr/bin/mandb was killed by signal 6 (SIGABRT)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 6.23 KB, created by
Sergio
on 2012-09-09 12:52:29 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Sergio
Created:
2012-09-09 12:52:29 UTC
Size:
6.23 KB
patch
obsolete
>[New LWP 3745] >Core was generated by `mandb -q'. >Program terminated with signal 6, Aborted. >#0 0xb774a424 in __kernel_vsyscall () > >Thread 1 (LWP 3745): >#0 0xb774a424 in __kernel_vsyscall () >No symbol table info available. >#1 0xb756593f in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:64 > resultvar = <optimized out> > resultvar = <optimized out> > pid = -1217507340 > selftid = 3745 >#2 0xb7567293 in __GI_abort () at abort.c:91 > save_stage = 2 > act = {__sigaction_handler = {sa_handler = 0x4, sa_sigaction = 0x4}, sa_mask = {__val = {5, 3077194091, 0, 3078011128, 875575394, 959537761, 922746880, 895891509, 3219578698, 134512640, 0, 0, 3219578698, 5, 3077200776, 3, 3219568921, 7, 3077200780, 2, 3219568934, 2, 3077194043, 1, 3077200776, 3, 3219568920, 8, 3077200780, 2, 3, 4096}}, sa_flags = -1075396568, sa_restorer = 0x400} > sigs = {__val = {32, 0 <repeats 31 times>}} >#3 0xb75a4f65 in __libc_message (do_abort=do_abort@entry=2, fmt=fmt@entry=0xb76a6f54 "*** glibc detected *** %s: %s: 0x%s ***\n") at ../sysdeps/unix/sysv/linux/libc_fatal.c:198 > ap = 0x7 <Address 0x7 out of bounds> > ap_copy = 0x7 <Address 0x7 out of bounds> > fd = 2 > on_2 = <optimized out> > list = <optimized out> > nlist = <optimized out> > cp = <optimized out> > written = <optimized out> >#4 0xb75ac8e9 in malloc_printerr (ptr=0xb773a923, str=0xb76a4dac "free(): invalid pointer", action=<optimized out>) at malloc.c:5027 > buf = "b773a923" > cp = <optimized out> >#5 _int_free (av=0xb76e5420, p=0xb773a91b, have_lock=0) at malloc.c:3948 > size = <optimized out> > fb = <optimized out> > nextchunk = <optimized out> > nextsize = <optimized out> > nextinuse = <optimized out> > prevsize = <optimized out> > bck = <optimized out> > fwd = <optimized out> > errstr = <optimized out> > locked = <optimized out> >#6 0x080548da in check_for_stray () at straycats.c:234 > decomp = 0x8fe3090 > exists = 0x0 > lang = <optimized out> > page_encoding = <optimized out> > mandir_base = 0x8fe6080 "ntpdate" > col_cmd = 0x8fe4ff8 > fullpath = <optimized out> > lg = {type = 15, whatis = 0x0, filters = 0x18 <Address 0x18 out of bounds>} > col_locale = <optimized out> > info = {next = 0x0, addr = 0x0, name = 0x0, ext = 0x8fe4844 "8", sec = 0x8fdc330 "8", id = 68 'D', pointer = 0x0, comp = 0x8fe4846 "gz", filter = 0x8056640 "-", whatis = 0x0, _st_mtime = 0} > ext = <optimized out> > section = 0x8fdc330 "8" > buf = {st_dev = 638542365822062310, __pad1 = 0, __st_ino = 3077832692, st_mode = 15, st_nlink = 3219571152, st_uid = 0, st_gid = 3077808955, st_rdev = 64575398320, __pad2 = 36713, st_size = -5227553315933700499, st_blksize = 149340288, st_blocks = -5227957939138043472, st_atim = {tv_sec = 149340288, tv_nsec = 149340288}, st_mtim = {tv_sec = 15, tv_nsec = 6}, st_ctim = {tv_sec = 1346591293, tv_nsec = -1217134604}, st_ino = 648062805078740696} > found = 0 > comp = <optimized out> > cdir = 0x8fe75d0 > strays = 0 > catlist = <optimized out> > lenman = 20 > lencat = 20 >#7 open_catdir () at straycats.c:327 > t1 = <optimized out> > cdir = 0x8eca780 > catlist = <optimized out> > catlen = 15 > manlen = 15 > strays = 0 >#8 0x08054df5 in straycats (manpath=manpath@entry=0x8dc8ed8 "/usr/share/man") at straycats.c:368 > catpath = 0x8e6c080 "/var/cache/man" > strays = 0 >#9 0x08051723 in process_manpath (manpath=0x8dc8ed8 "/usr/share/man", global_manpath=global_manpath@entry=1, tried_catdirs=tried_catdirs@entry=0x8dc8678) at mandb.c:577 > catpath = 0x8dc80f8 "/var/cache/man" > tried = <optimized out> > st = {st_dev = 2051, __pad1 = 0, __st_ino = 914494, st_mode = 16877, st_nlink = 43, st_uid = 0, st_gid = 0, st_rdev = 0, __pad2 = 0, st_size = 4096, st_blksize = 4096, st_blocks = 8, st_atim = {tv_sec = 1346585657, tv_nsec = 297099132}, st_mtim = {tv_sec = 1340822238, tv_nsec = 0}, st_ctim = {tv_sec = 1340841760, tv_nsec = 669965082}, st_ino = 914494} > amount = 6 > __PRETTY_FUNCTION__ = "process_manpath" >#10 0x0804a765 in main (argc=2, argv=0xbfe6c414) at mandb.c:821 > global_manpath = 1 > ret = <optimized out> > dir = <optimized out> > subdirent = <optimized out> > sys_manp = <optimized out> > amount = <optimized out> > mp = <optimized out> > tried_catdirs = 0x8dc8678 > sa = {__sigaction_handler = {sa_handler = 0, sa_sigaction = 0}, sa_mask = {__val = {0 <repeats 32 times>}}, sa_flags = 0, sa_restorer = 0} >From To Syms Read Shared Object Library >0xb77431c0 0xb7745908 Yes /usr/lib/man-db/libmandb-2.6.0.2.so >0xb7728d40 0xb773a834 Yes /usr/lib/man-db/libman-2.6.0.2.so >0xb77006e0 0xb770da7c Yes /lib/libz.so.1 >0xb76f7530 0xb76fbcc4 Yes /lib/libgdbm.so.4 >0xb76eab70 0xb76f1f00 Yes /lib/libpipeline.so.1 >0xb754df20 0xb768e02c Yes /lib/libc.so.6 >0xb774b850 0xb7763ec7 Yes /lib/ld-linux.so.2 >0xb70ba020 0xb70d0b54 Yes /lib/libgcc_s.so.1 >$1 = 0xb7723000 "" >No symbol "__glib_assert_msg" in current context. >eax 0x0 0 >ecx 0xea1 3745 >edx 0x6 6 >ebx 0xea1 3745 >esp 0xbfe6b854 0xbfe6b854 >ebp 0xbfe6c028 0xbfe6c028 >esi 0x6 6 >edi 0xb76e4ff4 -1217507340 >eip 0xb774a424 0xb774a424 <__kernel_vsyscall+16> >eflags 0x246 [ PF ZF IF ] >cs 0x73 115 >ss 0x7b 123 >ds 0x7b 123 >es 0x7b 123 >fs 0x0 0 >gs 0x33 51 >Dump of assembler code for function __kernel_vsyscall: > 0xb774a414 <+0>: push %ecx > 0xb774a415 <+1>: push %edx > 0xb774a416 <+2>: push %ebp > 0xb774a417 <+3>: mov %esp,%ebp > 0xb774a419 <+5>: sysenter > 0xb774a41b <+7>: nop > 0xb774a41c <+8>: nop > 0xb774a41d <+9>: nop > 0xb774a41e <+10>: nop > 0xb774a41f <+11>: nop > 0xb774a420 <+12>: nop > 0xb774a421 <+13>: nop > 0xb774a422 <+14>: int $0x80 >=> 0xb774a424 <+16>: pop %ebp > 0xb774a425 <+17>: pop %edx > 0xb774a426 <+18>: pop %ecx > 0xb774a427 <+19>: ret >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 855632
:
611224
|
611225
|
611226
| 611227 |
611228
|
611229
|
611230
|
611231
|
611232
|
611233