Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 852216 Details for
Bug 1055138
[abrt] kmod: __bswap_32(): kmod killed by SIGBUS
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 13.08 KB, created by
Lawrenc Graves
on 2014-01-19 05:29:57 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Lawrenc Graves
Created:
2014-01-19 05:29:57 UTC
Size:
13.08 KB
patch
obsolete
>warning: core file may not match specified executable file. >[New LWP 15069] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `/sbin/modprobe -q -- netdev-eth0'. >Program terminated with signal SIGBUS, Bus error. >#0 __bswap_32 (__bsx=<error reading variable: Cannot access memory at address 0x7f8ba0bf9000>) at /usr/include/bits/byteswap.h:47 >47 /usr/include/bits/byteswap.h: No such file or directory. > >Thread 1 (Thread 0x7f8ba0c54740 (LWP 15069)): >#0 __bswap_32 (__bsx=<error reading variable: Cannot access memory at address 0x7f8ba0bf9000>) at /usr/include/bits/byteswap.h:47 >No locals. >#1 read_long_mm (p=<synthetic pointer>) at libkmod/libkmod-index.c:684 > addr = 0x7f8ba0bf9000 <Address 0x7f8ba0bf9000 out of bounds> > v = <error reading variable v (Cannot access memory at address 0x7f8ba0bf9000)> >#2 index_mm_open (ctx=ctx@entry=0x1faa090, filename=filename@entry=0x7fff38854380 "/lib/modules/3.12.7-300.fc20.x86_64/modules.dep.bin", stamp=stamp@entry=0x1faa0e8) at libkmod/libkmod-index.c:815 > fd = 0 > st = {st_dev = 32, st_ino = 486836, st_nlink = 1, st_mode = 33188, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 372170, st_blksize = 4096, st_blocks = 728, st_atim = {tv_sec = 1390082525, tv_nsec = 518908809}, st_mtim = {tv_sec = 1390082525, tv_nsec = 72038320}, st_ctim = {tv_sec = 1390082525, tv_nsec = 73038030}, __unused = {0, 0, 0}} > idx = 0x1faa460 > hdr = <optimized out> > p = 0x7f8ba0bf9004 > __func__ = "index_mm_open" >#3 0x000000000040cd82 in kmod_load_resources (ctx=ctx@entry=0x1faa090) at libkmod/libkmod.c:812 > path = "/lib/modules/3.12.7-300.fc20.x86_64/modules.dep.bin\000hgb\000quiet\000nouveau\000modeset=0\000rd\000driver.blacklist=nouveau\000video=vesa:off\000LANG=en_US\000UTF-8", '\000' <repeats 1421 times>... > __func__ = "kmod_load_resources" >#4 0x0000000000404ca2 in do_modprobe (argc=<optimized out>, orig_argv=0x7fff388566d8) at tools/modprobe.c:908 > ctx = 0x1faa090 > args = 0x7fff388566f0 > config_paths = 0x0 > nargs = 1 > n_config_paths = <optimized out> > dirname_buf = '\000' <repeats 952 times>... > dirname = <optimized out> > root = 0x0 > kversion = 0x1faa090 "\001" > use_all = 0 > do_remove = 0 > do_show_config = 0 > do_show_modversions = 0 > err = <optimized out> >#5 0x0000003384621d65 in __libc_start_main (main=0x4023c0 <main>, argc=4, argv=0x7fff388566d8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fff388566c8) at libc-start.c:285 > result = <optimized out> > unwind_buf = {cancel_jmp_buf = {{jmp_buf = {0, 4963154152077056247, 4203892, 140734141654736, 0, 0, -4963288478049707785, 4938094341461956855}, mask_was_saved = 0}}, priv = {pad = {0x0, 0x0, 0x7fff38856700, 0x3384021168}, data = {prev = 0x0, cleanup = 0x0, canceltype = 948266752}}} > not_first_call = <optimized out> >#6 0x000000000040259d in _start () >No symbol table info available. >From To Syms Read Shared Object Library >0x0000003385a030e0 0x0000003385a19060 Yes /lib64/liblzma.so.5 >0x0000003385602210 0x000000338560e930 Yes /lib64/libz.so.1 >0x000000338461f560 0x0000003384760cc4 Yes /lib64/libc.so.6 >0x0000003384e059f0 0x0000003384e11614 Yes /lib64/libpthread.so.0 >0x0000003383e00b10 0x0000003383e19cb0 Yes /lib64/ld-linux-x86-64.so.2 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0x7f8ba0bf9000 140237674090496 >rbx 0x1faa460 33203296 >rcx 0x33846ef97a 221265197434 >rdx 0x1 1 >rsi 0x5adca 372170 >rdi 0x0 0 >rbp 0x0 0x0 >rsp 0x7fff38854270 0x7fff38854270 >r8 0x0 0 >r9 0x0 0 >r10 0x2 2 >r11 0x246 582 >r12 0x7fff38854290 140734141645456 >r13 0x1faa090 33202320 >r14 0x1faa0e8 33202408 >r15 0x1faa090 33202320 >rip 0x410214 0x410214 <index_mm_open+164> >eflags 0x10213 [ CF AF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >st0 *value not available* >st1 *value not available* >st2 *value not available* >st3 *value not available* >st4 *value not available* >st5 *value not available* >st6 *value not available* >st7 *value not available* >fctrl *value not available* >fstat *value not available* >ftag *value not available* >fiseg *value not available* >fioff *value not available* >foseg *value not available* >fooff *value not available* >fop *value not available* >xmm0 *value not available* >xmm1 *value not available* >xmm2 *value not available* >xmm3 *value not available* >xmm4 *value not available* >xmm5 *value not available* >xmm6 *value not available* >xmm7 *value not available* >xmm8 *value not available* >xmm9 *value not available* >xmm10 *value not available* >xmm11 *value not available* >xmm12 *value not available* >xmm13 *value not available* >xmm14 *value not available* >xmm15 *value not available* >mxcsr *value not available* >Dump of assembler code for function index_mm_open: > 0x0000000000410170 <+0>: push %r15 > 0x0000000000410172 <+2>: push %r14 > 0x0000000000410174 <+4>: mov %rdx,%r14 > 0x0000000000410177 <+7>: push %r13 > 0x0000000000410179 <+9>: mov %rdi,%r13 > 0x000000000041017c <+12>: mov $0x20,%edi > 0x0000000000410181 <+17>: push %r12 > 0x0000000000410183 <+19>: push %rbp > 0x0000000000410184 <+20>: mov %rsi,%rbp > 0x0000000000410187 <+23>: push %rbx > 0x0000000000410188 <+24>: sub $0xc8,%rsp > 0x000000000041018f <+31>: mov %fs:0x28,%rax > 0x0000000000410198 <+40>: mov %rax,0xb8(%rsp) > 0x00000000004101a0 <+48>: xor %eax,%eax > 0x00000000004101a2 <+50>: callq 0x4021d0 <malloc@plt> > 0x00000000004101a7 <+55>: test %rax,%rax > 0x00000000004101aa <+58>: mov %rax,%rbx > 0x00000000004101ad <+61>: je 0x4102d0 <index_mm_open+352> > 0x00000000004101b3 <+67>: mov %rbp,%rdi > 0x00000000004101b6 <+70>: xor %eax,%eax > 0x00000000004101b8 <+72>: mov $0x80000,%esi > 0x00000000004101bd <+77>: callq 0x4022d0 <open@plt> > 0x00000000004101c2 <+82>: test %eax,%eax > 0x00000000004101c4 <+84>: mov %eax,%ebp > 0x00000000004101c6 <+86>: js 0x4102be <index_mm_open+334> > 0x00000000004101cc <+92>: lea 0x20(%rsp),%r12 > 0x00000000004101d1 <+97>: mov %eax,%esi > 0x00000000004101d3 <+99>: mov $0x1,%edi > 0x00000000004101d8 <+104>: mov %r12,%rdx > 0x00000000004101db <+107>: callq 0x402210 <__fxstat@plt> > 0x00000000004101e0 <+112>: mov 0x50(%rsp),%rsi > 0x00000000004101e5 <+117>: cmp $0xb,%rsi > 0x00000000004101e9 <+121>: jbe 0x4102b7 <index_mm_open+327> > 0x00000000004101ef <+127>: xor %r9d,%r9d > 0x00000000004101f2 <+130>: xor %edi,%edi > 0x00000000004101f4 <+132>: mov %ebp,%r8d > 0x00000000004101f7 <+135>: mov $0x2,%ecx > 0x00000000004101fc <+140>: mov $0x1,%edx > 0x0000000000410201 <+145>: callq 0x401f20 <mmap@plt> > 0x0000000000410206 <+150>: cmp $0xffffffffffffffff,%rax > 0x000000000041020a <+154>: mov %rax,0x8(%rbx) > 0x000000000041020e <+158>: je 0x41037d <index_mm_open+525> >=> 0x0000000000410214 <+164>: mov (%rax),%r15d > 0x0000000000410217 <+167>: mov 0x4(%rax),%edx > 0x000000000041021a <+170>: mov 0x8(%rax),%eax > 0x000000000041021d <+173>: bswap %r15d > 0x0000000000410220 <+176>: bswap %edx > 0x0000000000410222 <+178>: cmp $0xb007f457,%r15d > 0x0000000000410229 <+185>: bswap %eax > 0x000000000041022b <+187>: jne 0x410310 <index_mm_open+416> > 0x0000000000410231 <+193>: mov %edx,%ecx > 0x0000000000410233 <+195>: shr $0x10,%ecx > 0x0000000000410236 <+198>: cmp $0x2,%ecx > 0x0000000000410239 <+201>: jne 0x410290 <index_mm_open+288> > 0x000000000041023b <+203>: mov %eax,0x10(%rbx) > 0x000000000041023e <+206>: mov 0x50(%rsp),%rax > 0x0000000000410243 <+211>: mov %ebp,%edi > 0x0000000000410245 <+213>: mov %r13,(%rbx) > 0x0000000000410248 <+216>: mov %rax,0x18(%rbx) > 0x000000000041024c <+220>: callq 0x402020 <close@plt> > 0x0000000000410251 <+225>: mov %r12,%rdi > 0x0000000000410254 <+228>: callq 0x40bc60 <stat_mstamp> > 0x0000000000410259 <+233>: mov %rax,(%r14) > 0x000000000041025c <+236>: mov 0xb8(%rsp),%rcx > 0x0000000000410264 <+244>: xor %fs:0x28,%rcx > 0x000000000041026d <+253>: mov %rbx,%rax > 0x0000000000410270 <+256>: jne 0x4103c9 <index_mm_open+601> > 0x0000000000410276 <+262>: add $0xc8,%rsp > 0x000000000041027d <+269>: pop %rbx > 0x000000000041027e <+270>: pop %rbp > 0x000000000041027f <+271>: pop %r12 > 0x0000000000410281 <+273>: pop %r13 > 0x0000000000410283 <+275>: pop %r14 > 0x0000000000410285 <+277>: pop %r15 > 0x0000000000410287 <+279>: retq > 0x0000000000410288 <+280>: nopl 0x0(%rax,%rax,1) > 0x0000000000410290 <+288>: mov %r13,%rdi > 0x0000000000410293 <+291>: mov %edx,0x1c(%rsp) > 0x0000000000410297 <+295>: callq 0x40be50 <kmod_get_log_priority> > 0x000000000041029c <+300>: cmp $0x2,%eax > 0x000000000041029f <+303>: mov 0x1c(%rsp),%edx > 0x00000000004102a3 <+307>: jg 0x410360 <index_mm_open+496> > 0x00000000004102a9 <+313>: mov 0x8(%rbx),%rdi > 0x00000000004102ad <+317>: mov 0x50(%rsp),%rsi > 0x00000000004102b2 <+322>: callq 0x402290 <munmap@plt> > 0x00000000004102b7 <+327>: mov %ebp,%edi > 0x00000000004102b9 <+329>: callq 0x402020 <close@plt> > 0x00000000004102be <+334>: mov %rbx,%rdi > 0x00000000004102c1 <+337>: xor %ebx,%ebx > 0x00000000004102c3 <+339>: callq 0x401db0 <free@plt> > 0x00000000004102c8 <+344>: jmp 0x41025c <index_mm_open+236> > 0x00000000004102ca <+346>: nopw 0x0(%rax,%rax,1) > 0x00000000004102d0 <+352>: mov %r13,%rdi > 0x00000000004102d3 <+355>: callq 0x40be50 <kmod_get_log_priority> > 0x00000000004102d8 <+360>: cmp $0x2,%eax > 0x00000000004102db <+363>: jle 0x41025c <index_mm_open+236> > 0x00000000004102e1 <+369>: lea 0xd75d(%rip),%r9 # 0x41da45 > 0x00000000004102e8 <+376>: lea 0xd7f5(%rip),%r8 # 0x41dae4 <__func__.6691> > 0x00000000004102ef <+383>: lea 0xd71a(%rip),%rdx # 0x41da10 > 0x00000000004102f6 <+390>: mov $0x31a,%ecx > 0x00000000004102fb <+395>: mov $0x3,%esi > 0x0000000000410300 <+400>: mov %r13,%rdi > 0x0000000000410303 <+403>: xor %eax,%eax > 0x0000000000410305 <+405>: callq 0x40bd70 <kmod_log> > 0x000000000041030a <+410>: jmpq 0x41025c <index_mm_open+236> > 0x000000000041030f <+415>: nop > 0x0000000000410310 <+416>: mov %r13,%rdi > 0x0000000000410313 <+419>: callq 0x40be50 <kmod_get_log_priority> > 0x0000000000410318 <+424>: cmp $0x2,%eax > 0x000000000041031b <+427>: jle 0x4102a9 <index_mm_open+313> > 0x000000000041031d <+429>: lea 0xd76c(%rip),%r9 # 0x41da90 > 0x0000000000410324 <+436>: lea 0xd7b9(%rip),%r8 # 0x41dae4 <__func__.6691> > 0x000000000041032b <+443>: movl $0xb007f457,0x8(%rsp) > 0x0000000000410333 <+451>: mov %r15d,(%rsp) > 0x0000000000410337 <+455>: mov $0x335,%ecx > 0x000000000041033c <+460>: lea 0xd6cd(%rip),%rdx # 0x41da10 > 0x0000000000410343 <+467>: mov $0x3,%esi > 0x0000000000410348 <+472>: mov %r13,%rdi > 0x000000000041034b <+475>: xor %eax,%eax > 0x000000000041034d <+477>: callq 0x40bd70 <kmod_log> > 0x0000000000410352 <+482>: jmpq 0x4102a9 <index_mm_open+313> > 0x0000000000410357 <+487>: nopw 0x0(%rax,%rax,1) > 0x0000000000410360 <+496>: mov %r15d,0x8(%rsp) > 0x0000000000410365 <+501>: mov %edx,(%rsp) > 0x0000000000410368 <+504>: lea 0xd749(%rip),%r9 # 0x41dab8 > 0x000000000041036f <+511>: lea 0xd76e(%rip),%r8 # 0x41dae4 <__func__.6691> > 0x0000000000410376 <+518>: mov $0x33b,%ecx > 0x000000000041037b <+523>: jmp 0x41033c <index_mm_open+460> > 0x000000000041037d <+525>: mov %r13,%rdi > 0x0000000000410380 <+528>: callq 0x40be50 <kmod_get_log_priority> > 0x0000000000410385 <+533>: cmp $0x2,%eax > 0x0000000000410388 <+536>: jle 0x4102b7 <index_mm_open+327> > 0x000000000041038e <+542>: mov 0x50(%rsp),%rax > 0x0000000000410393 <+547>: lea 0xd6be(%rip),%r9 # 0x41da58 > 0x000000000041039a <+554>: lea 0xd743(%rip),%r8 # 0x41dae4 <__func__.6691> > 0x00000000004103a1 <+561>: lea 0xd668(%rip),%rdx # 0x41da10 > 0x00000000004103a8 <+568>: mov %ebp,0x8(%rsp) > 0x00000000004103ac <+572>: mov $0x32a,%ecx > 0x00000000004103b1 <+577>: mov $0x3,%esi > 0x00000000004103b6 <+582>: mov %r13,%rdi > 0x00000000004103b9 <+585>: mov %rax,(%rsp) > 0x00000000004103bd <+589>: xor %eax,%eax > 0x00000000004103bf <+591>: callq 0x40bd70 <kmod_log> > 0x00000000004103c4 <+596>: jmpq 0x4102b7 <index_mm_open+327> > 0x00000000004103c9 <+601>: callq 0x401f10 <__stack_chk_fail@plt> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1055138
: 852216 |
852217
|
852218
|
852219
|
852220
|
852221
|
852222
|
852223
|
852224
|
852225
|
852226