Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 880995 Details for
Bug 1082749
[abrt] dbus-1.6.8-5.fc19: epoll_wait: Process /usr/bin/dbus-daemon was killed by signal 6 (SIGABRT)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 3.10 KB, created by
robert fairb
on 2014-03-31 18:21:37 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
robert fairb
Created:
2014-03-31 18:21:37 UTC
Size:
3.10 KB
patch
obsolete
>[New LWP 1127] >[New LWP 1128] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib/libthread_db.so.1". >Core was generated by `/bin/dbus-daemon --fork --print-pid 4 --print-address 6 --session'. >Program terminated with signal 6, Aborted. >#0 0xb76ca424 in __kernel_vsyscall () > >Thread 2 (Thread 0xb73e1b40 (LWP 1128)): >#0 0xb76ca424 in __kernel_vsyscall () >No symbol table info available. >#1 0xb754840b in poll () from /lib/libc.so.6 >No symbol table info available. >#2 0xb76802c4 in avc_netlink_receive.constprop.0 () from /lib/libselinux.so.1 >No symbol table info available. >#3 0xb76807b1 in avc_netlink_loop () from /lib/libselinux.so.1 >No symbol table info available. >#4 0xb762b9da in start_thread () from /lib/libpthread.so.0 >No symbol table info available. >#5 0xb7554a2e in clone () from /lib/libc.so.6 >No symbol table info available. > >Thread 1 (Thread 0xb73ef780 (LWP 1127)): >#0 0xb76ca424 in __kernel_vsyscall () >No symbol table info available. >#1 0xb75553b6 in epoll_wait () from /lib/libc.so.6 >No symbol table info available. >#2 0xb7738381 in socket_set_epoll_poll () >No symbol table info available. >#3 0xb772ac19 in _dbus_loop_iterate () >No symbol table info available. >#4 0xb772b120 in _dbus_loop_run () >No symbol table info available. >#5 0xb76ef964 in main () >No symbol table info available. >From To Syms Read Shared Object Library >0xb76901b0 0xb76a8a64 Yes (*) /lib/libexpat.so.1 >0xb766faf0 0xb7683074 Yes (*) /lib/libselinux.so.1 >0xb7647d60 0xb764d974 Yes (*) /lib/libaudit.so.1 >0xb7640e20 0xb76429f4 Yes (*) /lib/libcap-ng.so.0 >0xb76296b0 0xb7634d70 Yes (*) /lib/libpthread.so.0 >0xb761d940 0xb7620e4c Yes (*) /lib/librt.so.1 >0xb74752d0 0xb75b96fc Yes (*) /lib/libc.so.6 >0xb7459ad0 0xb745a9bc Yes (*) /lib/libdl.so.2 >0xb73f1f20 0xb743df84 Yes (*) /lib/libpcre.so.1 >0xb76cb850 0xb76e409c Yes (*) /lib/ld-linux.so.2 >0xb73e3a40 0xb73eae1c Yes (*) /lib/libnss_files.so.2 >(*): Shared library is missing debugging information. >$1 = 0x0 >No symbol table is loaded. Use the "file" command. >eax 0xfffffffc -4 >ecx 0xbfeebc70 -1074873232 >edx 0x40 64 >ebx 0x3 3 >esp 0xbfeebc30 0xbfeebc30 >ebp 0x0 0x0 >esi 0xffffffff -1 >edi 0xb7bcde38 -1212359112 >eip 0xb76ca424 0xb76ca424 <__kernel_vsyscall+16> >eflags 0x293 [ CF AF SF IF ] >cs 0x73 115 >ss 0x7b 123 >ds 0x7b 123 >es 0x7b 123 >fs 0x0 0 >gs 0x33 51 >Dump of assembler code for function __kernel_vsyscall: > 0xb76ca414 <+0>: push %ecx > 0xb76ca415 <+1>: push %edx > 0xb76ca416 <+2>: push %ebp > 0xb76ca417 <+3>: mov %esp,%ebp > 0xb76ca419 <+5>: sysenter > 0xb76ca41b <+7>: nop > 0xb76ca41c <+8>: nop > 0xb76ca41d <+9>: nop > 0xb76ca41e <+10>: nop > 0xb76ca41f <+11>: nop > 0xb76ca420 <+12>: nop > 0xb76ca421 <+13>: nop > 0xb76ca422 <+14>: int $0x80 >=> 0xb76ca424 <+16>: pop %ebp > 0xb76ca425 <+17>: pop %edx > 0xb76ca426 <+18>: pop %ecx > 0xb76ca427 <+19>: ret >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1082749
: 880995 |
880996
|
880997
|
880998
|
880999
|
881000
|
881001
|
881002
|
881003
|
881005