Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 692939 Details for
Bug 907581
[abrt] kmod-10-1.fc18: elf_get_mem: Process /usr/bin/kmod was killed by signal 6 (SIGABRT)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 7.92 KB, created by
bug-zilla
on 2013-02-04 18:37:20 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
bug-zilla
Created:
2013-02-04 18:37:20 UTC
Size:
7.92 KB
patch
obsolete
>warning: core file may not match specified executable file. >[New LWP 12774] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `/sbin/depmod -a 3.7.4-204.fc18.x86_64'. >Program terminated with signal 6, Aborted. >#0 0x00000030aa435ba5 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:63 >63 ../nptl/sysdeps/unix/sysv/linux/raise.c: No such file or directory. > >Thread 1 (Thread 0x7fd94c018740 (LWP 12774)): >#0 0x00000030aa435ba5 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:63 > resultvar = 0 > pid = 12774 > selftid = 12774 >#1 0x00000030aa437358 in __GI_abort () at abort.c:90 > save_stage = 2 > act = {__sigaction_handler = {sa_handler = 0x7fffe56df7c8, sa_sigaction = 0x7fffe56df7c8}, sa_mask = {__val = {209016286333, 209019013596, 207, 532575944823, 209014948881, 28922336, 140571259789312, 8589934612, 4, 140737042556080, 0, 0, 0, 209016286139, 140571259686912, 209016296424}}, sa_flags = -1434383886, sa_restorer = 0x30aa810a98 <__PRETTY_FUNCTION__.4857>} > sigs = {__val = {32, 0 <repeats 15 times>}} >#2 0x00000030aa42e972 in __assert_fail_base (fmt=0x30aa5793e8 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n", assertion=assertion@entry=0x30aa8109f2 "offset < elf->size", file=file@entry=0x30aa8109dc "libkmod/libkmod-elf.c", line=line@entry=207, function=function@entry=0x30aa810a98 <__PRETTY_FUNCTION__.4857> "elf_get_mem") at assert.c:92 > str = 0x1b95840 "" > total = 4096 >#3 0x00000030aa42ea22 in __GI___assert_fail (assertion=assertion@entry=0x30aa8109f2 "offset < elf->size", file=file@entry=0x30aa8109dc "libkmod/libkmod-elf.c", line=line@entry=207, function=function@entry=0x30aa810a98 <__PRETTY_FUNCTION__.4857> "elf_get_mem") at assert.c:101 >No locals. >#4 0x00000030aa80c160 in elf_get_mem (elf=<optimized out>, elf=<optimized out>, offset=<optimized out>) at libkmod/libkmod-elf.c:207 >No locals. >#5 0x00000030aa80c85b in elf_get_uint (size=<optimized out>, offset=<optimized out>, elf=<optimized out>) at libkmod/libkmod-elf.c:142 > p = <optimized out> > ret = <optimized out> > i = <optimized out> >#6 kmod_elf_new (memory=<optimized out>, size=size@entry=103327) at libkmod/libkmod-elf.c:315 > elf = <optimized out> > hdr_size = <optimized out> > shdr_size = <optimized out> > min_size = <optimized out> > class = 0 >#7 0x00000030aa80b439 in kmod_module_get_symbols (mod=<optimized out>, list=list@entry=0x7fffe56da738) at libkmod/libkmod-module.c:2458 > file = 0x1b95330 > elf = <optimized out> > path = <optimized out> > mem = <optimized out> > symbols = <optimized out> > size = 103327 > i = <optimized out> > count = <optimized out> > ret = 0 > __PRETTY_FUNCTION__ = "kmod_module_get_symbols" >#8 0x000000000040a7cd in depmod_load_symbols (depmod=0x7fffe56da790) at tools/depmod.c:1543 > mod = 0x1879ca0 > l = <optimized out> > list = 0x0 > err = <optimized out> > itr = 0x1956200 > itr_end = 0x1956530 >#9 depmod_load (depmod=0x7fffe56da790) at tools/depmod.c:1733 >No locals. >#10 do_depmod (argc=<optimized out>, argv=<optimized out>) at tools/depmod.c:2751 > out = 0x0 > err = <optimized out> > all = <optimized out> > maybe_all = <optimized out> > n_config_paths = <optimized out> > root = 0x0 > config_paths = 0x0 > system_map = <optimized out> > module_symvers = 0x0 > null_kmod_config = 0x0 > un = {sysname = '\000' <repeats 64 times>, nodename = '\000' <repeats 64 times>, release = '\000' <repeats 64 times>, version = '\000' <repeats 64 times>, machine = '\000' <repeats 64 times>, domainname = '\000' <repeats 64 times>} > ctx = 0x0 > cfg = {kversion = 0x7fffe56df7d2 "3.7.4-204.fc18.x86_64", dirname = "/lib/modules/3.7.4-204.fc18.x86_64", '\000' <repeats 4061 times>, dirnamelen = 34, sym_prefix = 0 '\000', check_symvers = 0 '\000', print_unknown = 0 '\000', warn_dups = 0 '\000', overrides = 0x0, searches = 0x18542e0} > depmod = {cfg = 0x7fffe56dba90, ctx = 0x1847010, modules = {array = 0x1951a40, count = 2398, total = 2432, step = 128}, modules_by_relpath = 0x1848280, modules_by_name = 0x184a2a0, symbols = 0x184c2c0, dep_loops = 0} >#11 0x00000030aa421a05 in __libc_start_main (main=0x403120 <main>, argc=3, ubp_av=0x7fffe56df3e8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffe56df3d8) at libc-start.c:225 > result = <optimized out> > unwind_buf = {cancel_jmp_buf = {{jmp_buf = {0, 7111082883634064033, 4207320, 140737042576352, 0, 0, -7111061837877187935, 7119892703586052769}, mask_was_saved = 0}}, priv = {pad = {0x0, 0x0, 0x30aa00eff0 <_dl_init+160>, 0x1da219e}, data = {prev = 0x0, cleanup = 0x0, canceltype = -1442779152}}} > not_first_call = <optimized out> >#12 0x0000000000403301 in _start () >No symbol table info available. >From To Syms Read Shared Object Library >0x00000030aa803060 0x00000030aa80f888 Yes /usr/lib64/libkmod.so.2 >0x00000030aa41f1a0 0x00000030aa560940 Yes /usr/lib64/libc.so.6 >0x00000030b08030f0 0x00000030b0819340 Yes /usr/lib64/liblzma.so.5 >0x00000030ab402190 0x00000030ab40e640 Yes /usr/lib64/libz.so.1 >0x00000030aa000b20 0x00000030aa01a3d9 Yes /lib64/ld-linux-x86-64.so.2 >0x00000030ab0022a0 0x00000030ab00557c Yes /usr/lib64/librt.so.1 >0x00000030aac05790 0x00000030aac104b4 Yes /usr/lib64/libpthread.so.0 >$1 = 0x7fd94bffd000 "" >No symbol "__glib_assert_msg" in current context. >rax 0x0 0 >rbx 0x7fd94bffd000 140571259686912 >rcx 0xffffffffffffffff -1 >rdx 0x6 6 >rsi 0x31e6 12774 >rdi 0x31e6 12774 >rbp 0x30aa5793e8 0x30aa5793e8 >rsp 0x7fffe56da418 0x7fffe56da418 >r8 0xfefefefefefefeff -72340172838076673 >r9 0xff092d63646b6860 -69474414337759136 >r10 0x8 8 >r11 0x202 514 >r12 0x30aa8109f2 209019013618 >r13 0x30aa810a98 209019013784 >r14 0x1879ca0 25664672 >r15 0x1959a58 26581592 >rip 0x30aa435ba5 0x30aa435ba5 <__GI_raise+53> >eflags 0x202 [ IF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >Dump of assembler code for function __GI_raise: > 0x00000030aa435b70 <+0>: mov %fs:0x2d4,%eax > 0x00000030aa435b78 <+8>: mov %fs:0x2d0,%esi > 0x00000030aa435b80 <+16>: test %esi,%esi > 0x00000030aa435b82 <+18>: jne 0x30aa435bb0 <__GI_raise+64> > 0x00000030aa435b84 <+20>: mov $0xba,%eax > 0x00000030aa435b89 <+25>: syscall > 0x00000030aa435b8b <+27>: mov %eax,%esi > 0x00000030aa435b8d <+29>: mov %eax,%fs:0x2d0 > 0x00000030aa435b95 <+37>: movslq %edi,%rdx > 0x00000030aa435b98 <+40>: movslq %esi,%rsi > 0x00000030aa435b9b <+43>: movslq %eax,%rdi > 0x00000030aa435b9e <+46>: mov $0xea,%eax > 0x00000030aa435ba3 <+51>: syscall >=> 0x00000030aa435ba5 <+53>: cmp $0xfffffffffffff000,%rax > 0x00000030aa435bab <+59>: ja 0x30aa435bbf <__GI_raise+79> > 0x00000030aa435bad <+61>: repz retq > 0x00000030aa435baf <+63>: nop > 0x00000030aa435bb0 <+64>: test %eax,%eax > 0x00000030aa435bb2 <+66>: jg 0x30aa435b95 <__GI_raise+37> > 0x00000030aa435bb4 <+68>: test $0x7fffffff,%eax > 0x00000030aa435bb9 <+73>: je 0x30aa435bd0 <__GI_raise+96> > 0x00000030aa435bbb <+75>: neg %eax > 0x00000030aa435bbd <+77>: jmp 0x30aa435b95 <__GI_raise+37> > 0x00000030aa435bbf <+79>: mov 0x37b272(%rip),%rdx # 0x30aa7b0e38 > 0x00000030aa435bc6 <+86>: neg %eax > 0x00000030aa435bc8 <+88>: mov %eax,%fs:(%rdx) > 0x00000030aa435bcb <+91>: or $0xffffffffffffffff,%rax > 0x00000030aa435bcf <+95>: retq > 0x00000030aa435bd0 <+96>: mov %esi,%eax > 0x00000030aa435bd2 <+98>: jmp 0x30aa435b95 <__GI_raise+37> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 907581
: 692939 |
692940
|
692941
|
692942
|
692943
|
692944
|
692945
|
692946
|
692947
|
692948