Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 697948 Details for
Bug 911724
[abrt] setroubleshoot-server-3.1.19-3.fc18: nvlist_clear: Process /usr/sbin/sedispatch was killed by signal 11 (SIGSEGV)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 6.51 KB, created by
Jd
on 2013-02-15 19:05:38 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Jd
Created:
2013-02-15 19:05:38 UTC
Size:
6.51 KB
patch
obsolete
>[New LWP 595] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib/libthread_db.so.1". >Core was generated by `/usr/sbin/sedispatch'. >Program terminated with signal 11, Segmentation fault. >#0 __GI___libc_free (mem=0x3539) at malloc.c:2907 >2907 malloc.c: No such file or directory. > >Thread 1 (Thread 0xb77159c0 (LWP 595)): >#0 __GI___libc_free (mem=0x3539) at malloc.c:2907 > ar_ptr = <optimized out> > p = <optimized out> > hook = 0x0 >#1 0x48cc628d in nvlist_clear (l=l@entry=0x915bb30) at nvlist.c:126 > nextnode = 0x6465722e > current = 0x915bf70 >#2 0x48cc6dee in aup_list_clear (l=l@entry=0x915b044) at ellist.c:326 > nextnode = 0x0 > current = 0x915bb10 >#3 0x48cc841f in auparse_next_event_internal (au=au@entry=0x915b020) at auparse.c:949 > event = {sec = 1360949197, milli = 79, serial = 106, host = 0x915bf30 "p\277\025\ton64.redlocal.org"} >#4 0x48cc846f in consume_feed (au=0x915b020, flush=0) at auparse.c:241 >No locals. >#5 0x48cc8531 in auparse_feed (au=0x915b020, data=data@entry=0xbfe6f041 "node=athlon64.redlocal.org type=ANOM_ABEND msg=audit(1360949197.079:106): auid=1000 uid=1000 gid=1000 ses=1 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 pid=1231 comm=\"gnome-shell\" reaso"..., data_len=228) at auparse.c:267 >No locals. >#6 0x0804935f in main (argc=1, argv=0xbfe713f4) at sedispatch.c:132 > tmp = "node=athlon64.redlocal.org type=ANOM_ABEND msg=audit(1360949197.079:106): auid=1000 uid=1000 gid=1000 ses=1 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 pid=1231 comm=\"gnome-shell\" reaso"... > sa = {__sigaction_handler = {sa_handler = 0x8049540 <hup_handler>, sa_sigaction = 0x8049540 <hup_handler>}, sa_mask = {__val = {0 <repeats 32 times>}}, sa_flags = 0, sa_restorer = 0x0} >From To Syms Read Shared Object Library >0x48cb9e20 0x48cbbb04 Yes /lib/libcap-ng.so.0 >0x48c6b9d0 0x48c9bf24 Yes /lib/libdbus-1.so.3 >0x48cc2b80 0x48ccb294 Yes /lib/libauparse.so.0 >0x486d69f0 0x486e9ac4 Yes /lib/libselinux.so.1 >0x484220b0 0x48565fbc Yes /lib/libc.so.6 >0x483e3850 0x483fbf7c Yes /lib/ld-linux.so.2 >0x485c76b0 0x485d2eb0 Yes /lib/libpthread.so.0 >0x485e7920 0x485eb43c Yes /lib/librt.so.1 >0x4b41ed60 0x4b424af4 Yes /lib/libaudit.so.1 >0x4866d4a0 0x486b6d74 Yes /lib/libpcre.so.1 >0x485dfad0 0x485e0afc Yes /lib/libdl.so.2 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >eax 0x3539 13625 >ecx 0x915bfc8 152420296 >edx 0x0 0 >ebx 0x485bd000 1213976576 >esp 0xbfe6eea0 0xbfe6eea0 >ebp 0x915bb30 0x915bb30 >esi 0x915bf70 152420208 >edi 0x6465722e 1684369966 >eip 0x48483c06 0x48483c06 <__GI___libc_free+54> >eflags 0x10206 [ PF IF RF ] >cs 0x73 115 >ss 0x7b 123 >ds 0x7b 123 >es 0x7b 123 >fs 0x0 0 >gs 0x33 51 >Dump of assembler code for function __GI___libc_free: > 0x48483bd0 <+0>: sub $0x1c,%esp > 0x48483bd3 <+3>: mov %ebx,0x10(%esp) > 0x48483bd7 <+7>: mov 0x20(%esp),%eax > 0x48483bdb <+11>: call 0x48540c03 <__x86.get_pc_thunk.bx> > 0x48483be0 <+16>: add $0x139420,%ebx > 0x48483be6 <+22>: mov %esi,0x14(%esp) > 0x48483bea <+26>: mov %edi,0x18(%esp) > 0x48483bee <+30>: mov -0x9c(%ebx),%edx > 0x48483bf4 <+36>: mov (%edx),%edx > 0x48483bf6 <+38>: test %edx,%edx > 0x48483bf8 <+40>: jne 0x48483cc4 <__GI___libc_free+244> > 0x48483bfe <+46>: test %eax,%eax > 0x48483c00 <+48>: je 0x48483c91 <__GI___libc_free+193> >=> 0x48483c06 <+54>: mov -0x4(%eax),%ecx > 0x48483c09 <+57>: lea -0x8(%eax),%edx > 0x48483c0c <+60>: test $0x2,%cl > 0x48483c0f <+63>: jne 0x48483c48 <__GI___libc_free+120> > 0x48483c11 <+65>: and $0x4,%ecx > 0x48483c14 <+68>: lea 0x420(%ebx),%eax > 0x48483c1a <+74>: je 0x48483c25 <__GI___libc_free+85> > 0x48483c1c <+76>: mov %edx,%eax > 0x48483c1e <+78>: and $0xfff00000,%eax > 0x48483c23 <+83>: mov (%eax),%eax > 0x48483c25 <+85>: mov 0x10(%esp),%ebx > 0x48483c29 <+89>: mov 0x14(%esp),%esi > 0x48483c2d <+93>: mov 0x18(%esp),%edi > 0x48483c31 <+97>: movl $0x0,0x20(%esp) > 0x48483c39 <+105>: add $0x1c,%esp > 0x48483c3c <+108>: jmp 0x484809c0 <_int_free> > 0x48483c41 <+113>: lea 0x0(%esi,%eiz,1),%esi > 0x48483c48 <+120>: mov 0x140(%ebx),%esi > 0x48483c4e <+126>: test %esi,%esi > 0x48483c50 <+128>: jne 0x48483c5a <__GI___libc_free+138> > 0x48483c52 <+130>: cmp 0x128(%ebx),%ecx > 0x48483c58 <+136>: ja 0x48483ca8 <__GI___libc_free+216> > 0x48483c5a <+138>: and $0xfffffff8,%ecx > 0x48483c5d <+141>: mov -0x8(%eax),%esi > 0x48483c60 <+144>: sub %esi,%edx > 0x48483c62 <+146>: add %esi,%ecx > 0x48483c64 <+148>: mov -0xe0(%ebx),%esi > 0x48483c6a <+154>: mov %ecx,%edi > 0x48483c6c <+156>: or %edx,%edi > 0x48483c6e <+158>: mov 0x10(%esi),%esi > 0x48483c71 <+161>: sub $0x1,%esi > 0x48483c74 <+164>: test %esi,%edi > 0x48483c76 <+166>: jne 0x48483cd3 <__GI___libc_free+259> > 0x48483c78 <+168>: mov %ecx,0x4(%esp) > 0x48483c7c <+172>: mov %edx,(%esp) > 0x48483c7f <+175>: subl $0x1,0x134(%ebx) > 0x48483c86 <+182>: sub %ecx,0x144(%ebx) > 0x48483c8c <+188>: call 0x484fc4f0 <munmap> > 0x48483c91 <+193>: mov 0x10(%esp),%ebx > 0x48483c95 <+197>: mov 0x14(%esp),%esi > 0x48483c99 <+201>: mov 0x18(%esp),%edi > 0x48483c9d <+205>: add $0x1c,%esp > 0x48483ca0 <+208>: ret > 0x48483ca1 <+209>: lea 0x0(%esi,%eiz,1),%esi > 0x48483ca8 <+216>: cmp $0x80000,%ecx > 0x48483cae <+222>: ja 0x48483c5a <__GI___libc_free+138> > 0x48483cb0 <+224>: and $0xfffffff8,%ecx > 0x48483cb3 <+227>: lea (%ecx,%ecx,1),%esi > 0x48483cb6 <+230>: mov %ecx,0x128(%ebx) > 0x48483cbc <+236>: mov %esi,0x120(%ebx) > 0x48483cc2 <+242>: jmp 0x48483c5d <__GI___libc_free+141> > 0x48483cc4 <+244>: mov 0x1c(%esp),%ecx > 0x48483cc8 <+248>: mov %eax,(%esp) > 0x48483ccb <+251>: mov %ecx,0x4(%esp) > 0x48483ccf <+255>: call *%edx > 0x48483cd1 <+257>: jmp 0x48483c91 <__GI___libc_free+193> > 0x48483cd3 <+259>: mov %eax,0x20(%esp) > 0x48483cd7 <+263>: lea -0x3df4c(%ebx),%edx > 0x48483cdd <+269>: mov 0x154(%ebx),%eax > 0x48483ce3 <+275>: mov 0x14(%esp),%esi > 0x48483ce7 <+279>: mov 0x10(%esp),%ebx > 0x48483ceb <+283>: mov 0x18(%esp),%edi > 0x48483cef <+287>: add $0x1c,%esp > 0x48483cf2 <+290>: jmp 0x4847fd90 <malloc_printerr> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 911724
: 697948 |
697949
|
697950
|
697951
|
697952
|
697953
|
697954
|
697955
|
697956
|
697957
|
697958