Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 926824 Details for
Bug 1130210
[abrt] kmod: free(): kmod killed by SIGABRT
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 9.97 KB, created by
Stefan Ringel
on 2014-08-14 14:32:11 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Stefan Ringel
Created:
2014-08-14 14:32:11 UTC
Size:
9.97 KB
patch
obsolete
>warning: core file may not match specified executable file. >[New LWP 19208] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `depmod -ae -F /boot/System.map-3.17.0-0.rc0.git4.2.fc22.x86_64 3.17.0-0.rc0.git'. >Program terminated with signal SIGABRT, Aborted. >#0 0x00007f0025482cc7 in raise () from /lib64/libc.so.6 > >Thread 1 (Thread 0x7f0026062700 (LWP 19208)): >#0 0x00007f0025482cc7 in raise () from /lib64/libc.so.6 >No symbol table info available. >#1 0x00007f002548492a in abort () from /lib64/libc.so.6 >No symbol table info available. >#2 0x00007f00254c7b43 in __libc_message () from /lib64/libc.so.6 >No symbol table info available. >#3 0x00007f00254ced2c in _int_free () from /lib64/libc.so.6 >No symbol table info available. >#4 0x00007f00254d3aac in free () from /lib64/libc.so.6 >No symbol table info available. >#5 0x00000000004055e9 in index_destroy () >No symbol table info available. >#6 0x00000000004055b2 in index_destroy () >No symbol table info available. >#7 0x00000000004055b2 in index_destroy () >No symbol table info available. >#8 0x00000000004055b2 in index_destroy () >No symbol table info available. >#9 0x00000000004055b2 in index_destroy () >No symbol table info available. >#10 0x00000000004055b2 in index_destroy () >No symbol table info available. >#11 0x00000000004055b2 in index_destroy () >No symbol table info available. >#12 0x0000000000406f55 in output_deps_bin () >No symbol table info available. >#13 0x0000000000409f2d in do_depmod () >No symbol table info available. >#14 0x00007f002546d0e0 in __libc_start_main () from /lib64/libc.so.6 >No symbol table info available. >#15 0x000000000040264c in _start () >No symbol table info available. >From To Syms Read Shared Object Library >0x00007f0025c42f30 0x00007f0025c58d72 Yes (*) /lib64/liblzma.so.5 >0x00007f0025a2c200 0x00007f0025a38729 Yes (*) /lib64/libz.so.1 >0x00007f0025815af0 0x00007f00258259d5 Yes (*) /lib64/libgcc_s.so.1 >0x00007f002546c4f0 0x00007f00255bbee4 Yes (*) /lib64/libc.so.6 >0x00007f0025235ac0 0x00007f00252425c1 Yes (*) /lib64/libpthread.so.0 >0x00007f0025e65b10 0x00007f0025e817a0 Yes (*) /lib64/ld-linux-x86-64.so.2 >(*): Shared library is missing debugging information. >$1 = 0x26085000 <error: Cannot access memory at address 0x26085000> >No symbol table is loaded. Use the "file" command. >rax 0x0 0 >rbx 0x4f 79 >rcx 0xffffffffffffffff -1 >rdx 0x6 6 >rsi 0x4b08 19208 >rdi 0x4b08 19208 >rbp 0x7fff9dad29d0 0x7fff9dad29d0 >rsp 0x7fff9dad2638 0x7fff9dad2638 >r8 0x7f00255cee00 139638603574784 >r9 0x4002d8 4195032 >r10 0x8 8 >r11 0x202 514 >r12 0x7fff9dad27e8 140735838758888 >r13 0x4f 79 >r14 0x7fff9dad27e8 140735838758888 >r15 0x2 2 >rip 0x7f0025482cc7 0x7f0025482cc7 <raise+55> >eflags 0x202 [ IF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >st0 0 (raw 0x00000000000000000000) >st1 0 (raw 0x00000000000000000000) >st2 0 (raw 0x00000000000000000000) >st3 0 (raw 0x00000000000000000000) >st4 0 (raw 0x00000000000000000000) >st5 0 (raw 0x00000000000000000000) >st6 0 (raw 0x00000000000000000000) >st7 0 (raw 0x00000000000000000000) >fctrl 0x37f 895 >fstat 0x0 0 >ftag 0xffff 65535 >fiseg 0x0 0 >fioff 0x0 0 >foseg 0x0 0 >fooff 0x0 0 >fop 0x0 0 >xmm0 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int16 = {0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0xff0000, 0x0, 0x0}, v2_int64 = {0xff000000000000, 0x0}, uint128 = 0x000000000000000000ff000000000000} >xmm1 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x24 <repeats 16 times>}, v8_int16 = {0x2424, 0x2424, 0x2424, 0x2424, 0x2424, 0x2424, 0x2424, 0x2424}, v4_int32 = {0x24242424, 0x24242424, 0x24242424, 0x24242424}, v2_int64 = {0x2424242424242424, 0x2424242424242424}, uint128 = 0x24242424242424242424242424242424} >xmm2 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x8000000000000000, 0x0}, v16_int8 = {0x72, 0x63, 0x75, 0x5f, 0x6c, 0x6f, 0x63, 0x6b, 0x5f, 0x6d, 0x61, 0x70, 0x0, 0x0, 0x0, 0x0}, v8_int16 = {0x6372, 0x5f75, 0x6f6c, 0x6b63, 0x6d5f, 0x7061, 0x0, 0x0}, v4_int32 = {0x5f756372, 0x6b636f6c, 0x70616d5f, 0x0}, v2_int64 = {0x6b636f6c5f756372, 0x70616d5f}, uint128 = 0x0000000070616d5f6b636f6c5f756372} >xmm3 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int16 = {0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0xff0000, 0x0, 0x0}, v2_int64 = {0xff000000000000, 0x0}, uint128 = 0x000000000000000000ff000000000000} >xmm4 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0xff0000, 0x0}, v2_int64 = {0x0, 0xff0000}, uint128 = 0x0000000000ff00000000000000000000} >xmm5 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0, 0x0, 0x0, 0x0, 0xff, 0x0 <repeats 11 times>}, v8_int16 = {0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0xff, 0x0, 0x0}, v2_int64 = {0xff00000000, 0x0}, uint128 = 0x0000000000000000000000ff00000000} >xmm6 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm7 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm8 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm9 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm10 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm11 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm12 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0xff, 0x0, 0x0}, v8_int16 = {0x0, 0x0, 0x0, 0xff, 0x0, 0xff, 0xff00, 0x0}, v4_int32 = {0x0, 0xff0000, 0xff0000, 0xff00}, v2_int64 = {0xff000000000000, 0xff0000ff0000}, uint128 = 0x0000ff0000ff000000ff000000000000} >xmm13 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm14 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm15 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >mxcsr 0x1f80 [ IM DM ZM OM UM PM ] >Dump of assembler code for function raise: > 0x00007f0025482c90 <+0>: mov %fs:0x2d4,%ecx > 0x00007f0025482c98 <+8>: mov %fs:0x2d0,%esi > 0x00007f0025482ca0 <+16>: test %esi,%esi > 0x00007f0025482ca2 <+18>: jne 0x7f0025482cd8 <raise+72> > 0x00007f0025482ca4 <+20>: mov $0xba,%eax > 0x00007f0025482ca9 <+25>: syscall > 0x00007f0025482cab <+27>: mov %eax,%ecx > 0x00007f0025482cad <+29>: mov %eax,%fs:0x2d0 > 0x00007f0025482cb5 <+37>: mov %eax,%esi > 0x00007f0025482cb7 <+39>: movslq %edi,%rdx > 0x00007f0025482cba <+42>: movslq %esi,%rsi > 0x00007f0025482cbd <+45>: movslq %ecx,%rdi > 0x00007f0025482cc0 <+48>: mov $0xea,%eax > 0x00007f0025482cc5 <+53>: syscall >=> 0x00007f0025482cc7 <+55>: cmp $0xfffffffffffff000,%rax > 0x00007f0025482ccd <+61>: ja 0x7f0025482cf0 <raise+96> > 0x00007f0025482ccf <+63>: repz retq > 0x00007f0025482cd1 <+65>: nopl 0x0(%rax) > 0x00007f0025482cd8 <+72>: test %ecx,%ecx > 0x00007f0025482cda <+74>: jg 0x7f0025482cb7 <raise+39> > 0x00007f0025482cdc <+76>: mov %ecx,%edx > 0x00007f0025482cde <+78>: neg %edx > 0x00007f0025482ce0 <+80>: and $0x7fffffff,%ecx > 0x00007f0025482ce6 <+86>: cmove %esi,%edx > 0x00007f0025482ce9 <+89>: mov %edx,%ecx > 0x00007f0025482ceb <+91>: jmp 0x7f0025482cb7 <raise+39> > 0x00007f0025482ced <+93>: nopl (%rax) > 0x00007f0025482cf0 <+96>: mov 0x38a149(%rip),%rdx # 0x7f002580ce40 > 0x00007f0025482cf7 <+103>: neg %eax > 0x00007f0025482cf9 <+105>: mov %eax,%fs:(%rdx) > 0x00007f0025482cfc <+108>: mov $0xffffffff,%eax > 0x00007f0025482d01 <+113>: retq >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1130210
: 926824 |
926825
|
926826
|
926827
|
926828
|
926829
|
926830
|
926831
|
926832
|
926833