Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 696001 Details for
Bug 909860
[abrt] prelink-0.4.6-5.fc17: __elf_getdata_rdlock: Process /usr/sbin/prelink was killed by signal 11 (SIGSEGV)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 8.40 KB, created by
D.S. Ljungmark
on 2013-02-11 10:38:14 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
D.S. Ljungmark
Created:
2013-02-11 10:38:14 UTC
Size:
8.40 KB
patch
obsolete
>[New LWP 14327] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `/usr/sbin/prelink -av -mR -q'. >Program terminated with signal 11, Segmentation fault. >#0 0x0000000000444ff5 in __elf_getdata_rdlock () > >Thread 1 (Thread 0xcbe8c0 (LWP 14327)): >#0 0x0000000000444ff5 in __elf_getdata_rdlock () >No symbol table info available. >#1 0x000000000041e15a in close_dso_1 (dso=dso@entry=0x105e820) at dso.c:1626 > scn = 0x3 > data = 0x0 > i = <optimized out> >#2 0x0000000000421874 in close_dso (dso=dso@entry=0x105e820) at dso.c:1659 > rdwr = <optimized out> >#3 0x00000000004083fb in prelink_ent (ent=0xea1270) at doit.c:234 > i = <optimized out> > j = <optimized out> > dso = 0x105e820 > st = {st_dev = 64770, st_ino = 2127262, st_nlink = 1, st_mode = 33261, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 8588, st_blksize = 4096, st_blocks = 24, st_atim = {tv_sec = 1350583818, tv_nsec = 140251975}, st_mtim = {tv_sec = 1282126018, tv_nsec = 0}, st_ctim = {tv_sec = 1348132362, tv_nsec = 116007215}, __unused = {0, 0, 0}} > hardlink = <optimized out> > move = 0x0 > movelen = 0 >#4 0x0000000000408836 in prelink_all () at doit.c:253 > l = {ents = 0x7fffd9d81b50, nents = 598} > i = <optimized out> >#5 0x0000000000402d92 in main (argc=4, argv=0x7fffd9d8cca8) at main.c:484 > remaining = 4 > failures = 0 >No shared libraries loaded at this time. >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0x105f6f8 17168120 >rbx 0x3 3 >rcx 0xedc4d0 15582416 >rdx 0x74c438 7652408 >rsi 0x0 0 >rdi 0x3 3 >rbp 0x3 0x3 >rsp 0x7fffd9d81a00 0x7fffd9d81a00 >r8 0x1 1 >r9 0x0 0 >r10 0x0 0 >r11 0x202 514 >r12 0x105e820 17164320 >r13 0x17 23 >r14 0xb8 184 >r15 0x0 0 >rip 0x444ff5 0x444ff5 <__elf_getdata_rdlock+37> >eflags 0x10206 [ PF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x63 99 >gs 0x0 0 >Dump of assembler code for function __elf_getdata_rdlock: > 0x0000000000444fd0 <+0>: mov %rbx,-0x28(%rsp) > 0x0000000000444fd5 <+5>: mov %rbp,-0x20(%rsp) > 0x0000000000444fda <+10>: mov %rdi,%rbx > 0x0000000000444fdd <+13>: mov %r12,-0x18(%rsp) > 0x0000000000444fe2 <+18>: mov %r13,-0x10(%rsp) > 0x0000000000444fe7 <+23>: mov %r14,-0x8(%rsp) > 0x0000000000444fec <+28>: sub $0x28,%rsp > 0x0000000000444ff0 <+32>: test %rdi,%rdi > 0x0000000000444ff3 <+35>: je 0x445040 <__elf_getdata_rdlock+112> >=> 0x0000000000444ff5 <+37>: mov 0x88(%rdi),%rbp > 0x0000000000444ffc <+44>: cmpl $0x3,0x18(%rbp) > 0x0000000000445000 <+48>: jne 0x445160 <__elf_getdata_rdlock+400> > 0x0000000000445006 <+54>: test %rsi,%rsi > 0x0000000000445009 <+57>: je 0x445070 <__elf_getdata_rdlock+160> > 0x000000000044500b <+59>: cmpq $0x0,0x40(%rdi) > 0x0000000000445010 <+64>: je 0x445036 <__elf_getdata_rdlock+102> > 0x0000000000445012 <+66>: cmp 0x28(%rsi),%rdi > 0x0000000000445016 <+70>: jne 0x445036 <__elf_getdata_rdlock+102> > 0x0000000000445018 <+72>: cmp %rsi,%rdi > 0x000000000044501b <+75>: jne 0x44502d <__elf_getdata_rdlock+93> > 0x000000000044501d <+77>: nopl (%rax) > 0x0000000000445020 <+80>: jmp 0x445060 <__elf_getdata_rdlock+144> > 0x0000000000445022 <+82>: nopw 0x0(%rax,%rax,1) > 0x0000000000445028 <+88>: cmp %rsi,%rdi > 0x000000000044502b <+91>: je 0x445060 <__elf_getdata_rdlock+144> > 0x000000000044502d <+93>: mov 0x30(%rdi),%rdi > 0x0000000000445031 <+97>: test %rdi,%rdi > 0x0000000000445034 <+100>: jne 0x445028 <__elf_getdata_rdlock+88> > 0x0000000000445036 <+102>: mov $0x1e,%edi > 0x000000000044503b <+107>: callq 0x43fe20 <__libelf_seterrno> > 0x0000000000445040 <+112>: xor %eax,%eax > 0x0000000000445042 <+114>: mov (%rsp),%rbx > 0x0000000000445046 <+118>: mov 0x8(%rsp),%rbp > 0x000000000044504b <+123>: mov 0x10(%rsp),%r12 > 0x0000000000445050 <+128>: mov 0x18(%rsp),%r13 > 0x0000000000445055 <+133>: mov 0x20(%rsp),%r14 > 0x000000000044505a <+138>: add $0x28,%rsp > 0x000000000044505e <+142>: retq > 0x000000000044505f <+143>: nop > 0x0000000000445060 <+144>: mov 0x30(%rdi),%rax > 0x0000000000445064 <+148>: jmp 0x445042 <__elf_getdata_rdlock+114> > 0x0000000000445066 <+150>: nopw %cs:0x0(%rax,%rax,1) > 0x0000000000445070 <+160>: mov 0x78(%rdi),%eax > 0x0000000000445073 <+163>: test %eax,%eax > 0x0000000000445075 <+165>: jne 0x445080 <__elf_getdata_rdlock+176> > 0x0000000000445077 <+167>: callq 0x444bf0 <__libelf_set_rawdata_wrlock> > 0x000000000044507c <+172>: test %eax,%eax > 0x000000000044507e <+174>: jne 0x445040 <__elf_getdata_rdlock+112> > 0x0000000000445080 <+176>: cmpq $0x0,0x40(%rbx) > 0x0000000000445085 <+181>: je 0x44508c <__elf_getdata_rdlock+188> > 0x0000000000445087 <+183>: mov %rbx,%rax > 0x000000000044508a <+186>: jmp 0x445042 <__elf_getdata_rdlock+114> > 0x000000000044508c <+188>: cmpq $0x0,0x48(%rbx) > 0x0000000000445091 <+193>: je 0x4450e7 <__elf_getdata_rdlock+279> > 0x0000000000445093 <+195>: mov 0x58(%rbx),%r12 > 0x0000000000445097 <+199>: test %r12,%r12 > 0x000000000044509a <+202>: je 0x4450e7 <__elf_getdata_rdlock+279> > 0x000000000044509c <+204>: mov 0x48(%rbp),%rax > 0x00000000004450a0 <+208>: mov 0x50(%rbx),%r13d > 0x00000000004450a4 <+212>: mov 0x20(%rbp),%r14d > 0x00000000004450a8 <+216>: cmpb $0x1,0x5(%rax) > 0x00000000004450ac <+220>: jne 0x445114 <__elf_getdata_rdlock+324> > 0x00000000004450ae <+222>: mov 0xa0(%rbx),%rax > 0x00000000004450b5 <+229>: mov %rax,0xa8(%rbx) > 0x00000000004450bc <+236>: mov %rax,(%rbx) > 0x00000000004450bf <+239>: mov 0x60(%rbx),%rax > 0x00000000004450c3 <+243>: mov %r12,0x10(%rbx) > 0x00000000004450c7 <+247>: mov %r13d,0x8(%rbx) > 0x00000000004450cb <+251>: mov %rbx,0x28(%rbx) > 0x00000000004450cf <+255>: mov %rax,0x18(%rbx) > 0x00000000004450d3 <+259>: mov 0x68(%rbx),%rax > 0x00000000004450d7 <+263>: mov %rax,0x20(%rbx) > 0x00000000004450db <+267>: mov 0x54(%rbx),%eax > 0x00000000004450de <+270>: mov %eax,0xc(%rbx) > 0x00000000004450e1 <+273>: mov %rbx,0x40(%rbx) > 0x00000000004450e5 <+277>: jmp 0x445087 <__elf_getdata_rdlock+183> > 0x00000000004450e7 <+279>: mov 0x48(%rbx),%rax > 0x00000000004450eb <+283>: mov %rbx,0x28(%rbx) > 0x00000000004450ef <+287>: mov %rax,(%rbx) > 0x00000000004450f2 <+290>: mov 0x50(%rbx),%rax > 0x00000000004450f6 <+294>: mov %rax,0x8(%rbx) > 0x00000000004450fa <+298>: mov 0x58(%rbx),%rax > 0x00000000004450fe <+302>: mov %rax,0x10(%rbx) > 0x0000000000445102 <+306>: mov 0x60(%rbx),%rax > 0x0000000000445106 <+310>: mov %rax,0x18(%rbx) > 0x000000000044510a <+314>: mov 0x68(%rbx),%rax > 0x000000000044510e <+318>: mov %rax,0x20(%rbx) > 0x0000000000445112 <+322>: jmp 0x4450e1 <__elf_getdata_rdlock+273> > 0x0000000000445114 <+324>: mov %r12,%rdi > 0x0000000000445117 <+327>: callq 0x465700 <malloc> > 0x000000000044511c <+332>: test %rax,%rax > 0x000000000044511f <+335>: mov %rax,0xa8(%rbx) > 0x0000000000445126 <+342>: je 0x445171 <__elf_getdata_rdlock+417> > 0x0000000000445128 <+344>: lea -0x1(%r14),%edx > 0x000000000044512c <+348>: mov %r13d,%ecx > 0x000000000044512f <+351>: mov %rax,%rdi > 0x0000000000445132 <+354>: mov 0xa0(%rbx),%rsi > 0x0000000000445139 <+361>: movslq %edx,%rdx > 0x000000000044513c <+364>: lea (%rdx,%rdx,4),%rdx > 0x0000000000445140 <+368>: lea (%rdx,%rdx,4),%r8 > 0x0000000000445144 <+372>: mov %r12,%rdx > 0x0000000000445147 <+375>: add %rcx,%r8 > 0x000000000044514a <+378>: xor %ecx,%ecx > 0x000000000044514c <+380>: callq *0x514160(,%r8,8) > 0x0000000000445154 <+388>: mov 0xa8(%rbx),%rax > 0x000000000044515b <+395>: jmpq 0x4450bc <__elf_getdata_rdlock+236> > 0x0000000000445160 <+400>: mov $0x4,%edi > 0x0000000000445165 <+405>: callq 0x43fe20 <__libelf_seterrno> > 0x000000000044516a <+410>: xor %eax,%eax > 0x000000000044516c <+412>: jmpq 0x445042 <__elf_getdata_rdlock+114> > 0x0000000000445171 <+417>: mov $0x8,%edi > 0x0000000000445176 <+422>: callq 0x43fe20 <__libelf_seterrno> > 0x000000000044517b <+427>: jmpq 0x4450e1 <__elf_getdata_rdlock+273> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 909860
: 696001 |
696002
|
696003
|
696004
|
696005
|
696006
|
696007
|
696008
|
696009
|
696010