Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 874915 Details for
Bug 1076868
[abrt] java-1.8.0-openjdk: unpacker::abort(char const*)(): unpack200 killed by SIGABRT
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 6.14 KB, created by
项纪汉
on 2014-03-16 01:27:47 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
项纪汉
Created:
2014-03-16 01:27:47 UTC
Size:
6.14 KB
patch
obsolete
>[New LWP 14767] >Core was generated by `/usr/lib/jvm/java-1.8.0-openjdk-1.8.0.0.x86_64/jre/bin/unpack200 /tmp/p2.optimi'. >Program terminated with signal SIGABRT, Aborted. >#0 0x0000003bb9435c39 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:56 >56 return INLINE_SYSCALL (tgkill, 3, pid, selftid, sig); > >Thread 1 (LWP 14767): >#0 0x0000003bb9435c39 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:56 > resultvar = 0 > pid = 14767 > selftid = 14767 >#1 0x0000003bb9437348 in __GI_abort () at abort.c:89 > save_stage = 2 > act = {__sigaction_handler = {sa_handler = 0x41c72d, sa_sigaction = 0x41c72d}, sa_mask = {__val = {4294967291, 32768, 4, 29759616, 256511536259, 65536, 256514954240, 22, 140415344910336, 19504261, 256511541484, 29760400, 256514954240, 140735329785856, 65536, 19504261}}, sa_flags = -1186503408, sa_restorer = 0x3bb97b9400 <_IO_2_1_stdout_>} > sigs = {__val = {32, 0 <repeats 15 times>}} >#2 0x0000000000409eea in unpacker::abort(char const*) () >No symbol table info available. >#3 0x0000000000416246 in read_input_via_gzip(unpacker*, void*, long, long) () >No symbol table info available. >#4 0x00000000004062eb in unpacker::ensure_input(long) () >No symbol table info available. >#5 0x0000000000410794 in unpacker::write_file_to_jar(unpacker::file*) () >No symbol table info available. >#6 0x0000000000405451 in unpacker::run(int, char**) () >No symbol table info available. >#7 0x0000003bb9421d65 in __libc_start_main (main=0x401670 <main>, argc=3, argv=0x7fff7f56eb88, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fff7f56eb78) at libc-start.c:285 > result = <optimized out> > unwind_buf = {cancel_jmp_buf = {{jmp_buf = {0, 5522962070608844820, 4200060, 140735329790848, 0, 0, -5522681910520145900, 5535753222857332756}, mask_was_saved = 0}}, priv = {pad = {0x0, 0x0, 0x7fff7f56eba8, 0x3bb9221168}, data = {prev = 0x0, cleanup = 0x0, canceltype = 2136402856}}} > not_first_call = <optimized out> >#8 0x00000000004016a5 in _start () >No symbol table info available. >From To Syms Read Shared Object Library >0x0000003bba402210 0x0000003bba40e930 Yes /lib64/libz.so.1 >0x0000003bb941f560 0x0000003bb9560bb4 Yes /lib64/libc.so.6 >0x0000003bbe85bab0 0x0000003bbe8c262a Yes /lib64/libstdc++.so.6 >0x0000003bb9000b10 0x0000003bb9019c70 Yes /lib64/ld-linux-x86-64.so.2 >0x0000003bba005890 0x0000003bba074bb8 Yes /lib64/libm.so.6 >0x0000003bbac02af0 0x0000003bbac12218 Yes /lib64/libgcc_s.so.1 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0x0 0 >rbx 0x7fff7f56d9e0 140735329786336 >rcx 0xffffffffffffffff -1 >rdx 0x6 6 >rsi 0x39af 14767 >rdi 0x39af 14767 >rbp 0x7fff7f56d800 0x7fff7f56d800 >rsp 0x7fff7f56d6b8 0x7fff7f56d6b8 >r8 0x7fb4febeb780 140415344752512 >r9 0x0 0 >r10 0x8 8 >r11 0x246 582 >r12 0x10000 65536 >r13 0x1299c85 19504261 >r14 0x1c61800 29759488 >r15 0xbf29c2 12528066 >rip 0x3bb9435c39 0x3bb9435c39 <__GI_raise+57> >eflags 0x246 [ PF ZF IF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >st0 *value not available* >st1 *value not available* >st2 *value not available* >st3 *value not available* >st4 *value not available* >st5 *value not available* >st6 *value not available* >st7 *value not available* >fctrl *value not available* >fstat *value not available* >ftag *value not available* >fiseg *value not available* >fioff *value not available* >foseg *value not available* >fooff *value not available* >fop *value not available* >xmm0 *value not available* >xmm1 *value not available* >xmm2 *value not available* >xmm3 *value not available* >xmm4 *value not available* >xmm5 *value not available* >xmm6 *value not available* >xmm7 *value not available* >xmm8 *value not available* >xmm9 *value not available* >xmm10 *value not available* >xmm11 *value not available* >xmm12 *value not available* >xmm13 *value not available* >xmm14 *value not available* >xmm15 *value not available* >mxcsr *value not available* >Dump of assembler code for function __GI_raise: > 0x0000003bb9435c00 <+0>: mov %fs:0x2d4,%eax > 0x0000003bb9435c08 <+8>: mov %eax,%ecx > 0x0000003bb9435c0a <+10>: mov %fs:0x2d0,%esi > 0x0000003bb9435c12 <+18>: test %esi,%esi > 0x0000003bb9435c14 <+20>: jne 0x3bb9435c48 <__GI_raise+72> > 0x0000003bb9435c16 <+22>: mov $0xba,%eax > 0x0000003bb9435c1b <+27>: syscall > 0x0000003bb9435c1d <+29>: mov %eax,%ecx > 0x0000003bb9435c1f <+31>: mov %eax,%fs:0x2d0 > 0x0000003bb9435c27 <+39>: mov %eax,%esi > 0x0000003bb9435c29 <+41>: movslq %edi,%rdx > 0x0000003bb9435c2c <+44>: movslq %esi,%rsi > 0x0000003bb9435c2f <+47>: movslq %ecx,%rdi > 0x0000003bb9435c32 <+50>: mov $0xea,%eax > 0x0000003bb9435c37 <+55>: syscall >=> 0x0000003bb9435c39 <+57>: cmp $0xfffffffffffff000,%rax > 0x0000003bb9435c3f <+63>: ja 0x3bb9435c5a <__GI_raise+90> > 0x0000003bb9435c41 <+65>: repz retq > 0x0000003bb9435c43 <+67>: nopl 0x0(%rax,%rax,1) > 0x0000003bb9435c48 <+72>: test %eax,%eax > 0x0000003bb9435c4a <+74>: jg 0x3bb9435c29 <__GI_raise+41> > 0x0000003bb9435c4c <+76>: mov %eax,%ecx > 0x0000003bb9435c4e <+78>: neg %ecx > 0x0000003bb9435c50 <+80>: test $0x7fffffff,%eax > 0x0000003bb9435c55 <+85>: cmove %esi,%ecx > 0x0000003bb9435c58 <+88>: jmp 0x3bb9435c29 <__GI_raise+41> > 0x0000003bb9435c5a <+90>: mov 0x3821d7(%rip),%rdx # 0x3bb97b7e38 > 0x0000003bb9435c61 <+97>: neg %eax > 0x0000003bb9435c63 <+99>: mov %eax,%fs:(%rdx) > 0x0000003bb9435c66 <+102>: or $0xffffffffffffffff,%rax > 0x0000003bb9435c6a <+106>: retq >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1076868
: 874915 |
874916
|
874917
|
874918
|
874919
|
874920
|
874921
|
874922
|
874923
|
874924