Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 926921 Details for
Bug 1130333
[abrt] dbus: _dbus_abort(): dbus-send killed by SIGABRT
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 11.10 KB, created by
phaet0n
on 2014-08-14 22:27:19 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
phaet0n
Created:
2014-08-14 22:27:19 UTC
Size:
11.10 KB
patch
obsolete
>[New LWP 6700] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `dbus-send --system --dest=home.dnsmasq /uk/org/thekelleys/dnsmasq array:string:'. >Program terminated with signal SIGABRT, Aborted. >#0 0x00007f9e76426c39 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:56 >56 ../nptl/sysdeps/unix/sysv/linux/raise.c: No such file or directory. > >Thread 1 (Thread 0x7f9e77024740 (LWP 6700)): >#0 0x00007f9e76426c39 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:56 > resultvar = 0 > pid = 6700 > selftid = 6700 >#1 0x00007f9e76428348 in __GI_abort () at abort.c:89 > save_stage = 2 > act = {__sigaction_handler = {sa_handler = 0x1, sa_sigaction = 0x1}, sa_mask = {__val = {5, 140318573905472, 140318576129830, 140316581560321, 0, 64, 140318565432640, 140318569310312, 140318573905472, 140733714749239, 140318576157061, 0, 14, 59244544, 64, 140318573910622}}, sa_flags = 226, sa_restorer = 0x7f9e76c0d5f0} > sigs = {__val = {32, 0 <repeats 15 times>}} >#2 0x00007f9e76c061b5 in _dbus_abort () at dbus-sysdeps.c:94 > s = <optimized out> >#3 0x00007f9e76bfca3e in _dbus_warn_check_failed (format=0x7f9e76c0c640 "arguments to %s() were incorrect, assertion \"%s\" failed in file %s line %d.\nThis is normally a bug in some application using the D-Bus library.\n") at dbus-internals.c:290 > args = {{gp_offset = 40, fp_offset = 48, overflow_arg_area = 0x7fff1f1337d0, reg_save_area = 0x7fff1f133700}} >#4 0x00007f9e76befc48 in dbus_message_new_signal (path=0x7fff1f1356db "/uk/org/thekelleys/dnsmasq", interface=<optimized out>, name=<optimized out>) at dbus-message.c:1353 > message = <optimized out> > __FUNCTION__ = "dbus_message_new_signal" >#5 0x00007f9e77040c03 in main (argc=5, argv=0x7fff1f133aa8) at dbus-send.c:384 > last_dot = <optimized out> > connection = 0x7f9e77775bb0 > error = {name = 0x0, message = 0x0, dummy1 = 1, dummy2 = 0, dummy3 = 0, dummy4 = 0, dummy5 = 0, padding1 = 0x7f9e7703e700} > message = <optimized out> > print_reply = 0 > print_reply_literal = 0 > reply_timeout = -1 > iter = {dummy1 = 0x7f9e7703e168, dummy2 = 0x0, dummy3 = 1996738560, dummy4 = 32670, dummy5 = 1994569510, dummy6 = 32670, dummy7 = 0, dummy8 = 0, dummy9 = 1996745352, dummy10 = 32670, dummy11 = 521353456, pad1 = 32767, pad2 = 521353440, pad3 = 0x6562b026} > i = 5 > type = DBUS_BUS_SYSTEM > dest = 0x7fff1f1356ce "uk.org.thekelleys.dnsmasq" > name = 0x7fff1f1356f6 "array:string:10.0.0.1,10.0.0.2,10.0.0.3,10.0.0.4,10.0.0.5,10.0.0" > path = 0x7fff1f1356db "/uk/org/thekelleys/dnsmasq" > message_type = 4 > type_str = 0x0 > address = 0x0 > session_or_system = <optimized out> >From To Syms Read Shared Object Library >0x00007f9e76bdcab0 0x00007f9e76c06a54 Yes /lib64/libdbus-1.so.3 >0x00007f9e769bd9f0 0x00007f9e769c9614 Yes /lib64/libpthread.so.0 >0x00007f9e767b22d0 0x00007f9e767b50bc Yes /lib64/librt.so.1 >0x00007f9e76410560 0x00007f9e76551bb4 Yes /lib64/libc.so.6 >0x00007f9e76e1db10 0x00007f9e76e36c70 Yes /lib64/ld-linux-x86-64.so.2 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0x0 0 >rbx 0x7f9e767aa868 140318569310312 >rcx 0xffffffffffffffff -1 >rdx 0x6 6 >rsi 0x1a2c 6700 >rdi 0x1a2c 6700 >rbp 0x7f9e76c0c640 0x7f9e76c0c640 >rsp 0x7fff1f133598 0x7fff1f133598 >r8 0xe2 226 >r9 0x7f9e76c0d5f0 140318573909488 >r10 0x8 8 >r11 0x202 514 >r12 0x7fff1f135737 140733714749239 >r13 0x7fff1f133870 140733714741360 >r14 0x1 1 >r15 0x5 5 >rip 0x7f9e76426c39 0x7f9e76426c39 <__GI_raise+57> >eflags 0x202 [ IF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >st0 0 (raw 0x00000000000000000000) >st1 0 (raw 0x00000000000000000000) >st2 0 (raw 0x00000000000000000000) >st3 0 (raw 0x00000000000000000000) >st4 0 (raw 0x00000000000000000000) >st5 0 (raw 0x00000000000000000000) >st6 0 (raw 0x00000000000000000000) >st7 0 (raw 0x00000000000000000000) >fctrl 0x37f 895 >fstat 0x0 0 >ftag 0xffff 65535 >fiseg 0x0 0 >fioff 0x0 0 >foseg 0x0 0 >fooff 0x0 0 >fop 0x0 0 >xmm0 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm1 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x25 <repeats 16 times>}, v8_int16 = {0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525}, v4_int32 = {0x25252525, 0x25252525, 0x25252525, 0x25252525}, v2_int64 = {0x2525252525252525, 0x2525252525252525}, uint128 = 0x25252525252525252525252525252525} >xmm2 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm3 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x8000000000000000, 0x0}, v16_int8 = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int16 = {0xffff, 0xffff, 0xffff, 0xffff, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0xffffffff, 0xffffffff, 0x0, 0x0}, v2_int64 = {0xffffffffffffffff, 0x0}, uint128 = 0x0000000000000000ffffffffffffffff} >xmm4 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x69, 0x72, 0x65, 0x64, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x73, 0x0, 0x6, 0x0, 0x0, 0x0}, v8_int16 = {0x7269, 0x6465, 0x0, 0x0, 0x106, 0x73, 0x6, 0x0}, v4_int32 = {0x64657269, 0x0, 0x730106, 0x6}, v2_int64 = {0x64657269, 0x600730106}, uint128 = 0x00000006007301060000000064657269} >xmm5 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x8000000000000000, 0x0}, v16_int8 = {0x65, 0x64, 0x65, 0x73, 0x6b, 0x74, 0x6f, 0x70, 0x2f, 0x44, 0x42, 0x75, 0x73, 0x0, 0x0, 0x0}, v8_int16 = {0x6465, 0x7365, 0x746b, 0x706f, 0x442f, 0x7542, 0x73, 0x0}, v4_int32 = {0x73656465, 0x706f746b, 0x7542442f, 0x73}, v2_int64 = {0x706f746b73656465, 0x737542442f}, uint128 = 0x000000737542442f706f746b73656465} >xmm6 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x8000000000000000}, v16_int8 = {0x3, 0x1, 0x73, 0x0, 0xc, 0x0, 0x0, 0x0, 0x4e, 0x61, 0x6d, 0x65, 0x41, 0x63, 0x71, 0x75}, v8_int16 = {0x103, 0x73, 0xc, 0x0, 0x614e, 0x656d, 0x6341, 0x7571}, v4_int32 = {0x730103, 0xc, 0x656d614e, 0x75716341}, v2_int64 = {0xc00730103, 0x75716341656d614e}, uint128 = 0x75716341656d614e0000000c00730103} >xmm7 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x69, 0x72, 0x65, 0x64, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x73, 0x0, 0x6, 0x0, 0x0, 0x0}, v8_int16 = {0x7269, 0x6465, 0x0, 0x0, 0x106, 0x73, 0x6, 0x0}, v4_int32 = {0x64657269, 0x0, 0x730106, 0x6}, v2_int64 = {0x64657269, 0x600730106}, uint128 = 0x00000006007301060000000064657269} >xmm8 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm9 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm10 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x8000000000000000, 0x0}, v16_int8 = {0x0, 0xff, 0x0, 0x0, 0x0, 0xff, 0xff, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int16 = {0xff00, 0x0, 0xff00, 0xffff, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0xff00, 0xffffff00, 0x0, 0x0}, v2_int64 = {0xffffff000000ff00, 0x0}, uint128 = 0x0000000000000000ffffff000000ff00} >xmm11 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm12 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm13 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm14 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm15 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >mxcsr 0x1f80 [ IM DM ZM OM UM PM ] >Dump of assembler code for function __GI_raise: > 0x00007f9e76426c00 <+0>: mov %fs:0x2d4,%eax > 0x00007f9e76426c08 <+8>: mov %eax,%ecx > 0x00007f9e76426c0a <+10>: mov %fs:0x2d0,%esi > 0x00007f9e76426c12 <+18>: test %esi,%esi > 0x00007f9e76426c14 <+20>: jne 0x7f9e76426c48 <__GI_raise+72> > 0x00007f9e76426c16 <+22>: mov $0xba,%eax > 0x00007f9e76426c1b <+27>: syscall > 0x00007f9e76426c1d <+29>: mov %eax,%ecx > 0x00007f9e76426c1f <+31>: mov %eax,%fs:0x2d0 > 0x00007f9e76426c27 <+39>: mov %eax,%esi > 0x00007f9e76426c29 <+41>: movslq %edi,%rdx > 0x00007f9e76426c2c <+44>: movslq %esi,%rsi > 0x00007f9e76426c2f <+47>: movslq %ecx,%rdi > 0x00007f9e76426c32 <+50>: mov $0xea,%eax > 0x00007f9e76426c37 <+55>: syscall >=> 0x00007f9e76426c39 <+57>: cmp $0xfffffffffffff000,%rax > 0x00007f9e76426c3f <+63>: ja 0x7f9e76426c5a <__GI_raise+90> > 0x00007f9e76426c41 <+65>: repz retq > 0x00007f9e76426c43 <+67>: nopl 0x0(%rax,%rax,1) > 0x00007f9e76426c48 <+72>: test %eax,%eax > 0x00007f9e76426c4a <+74>: jg 0x7f9e76426c29 <__GI_raise+41> > 0x00007f9e76426c4c <+76>: mov %eax,%ecx > 0x00007f9e76426c4e <+78>: neg %ecx > 0x00007f9e76426c50 <+80>: test $0x7fffffff,%eax > 0x00007f9e76426c55 <+85>: cmove %esi,%ecx > 0x00007f9e76426c58 <+88>: jmp 0x7f9e76426c29 <__GI_raise+41> > 0x00007f9e76426c5a <+90>: mov 0x3821d7(%rip),%rdx # 0x7f9e767a8e38 > 0x00007f9e76426c61 <+97>: neg %eax > 0x00007f9e76426c63 <+99>: mov %eax,%fs:(%rdx) > 0x00007f9e76426c66 <+102>: or $0xffffffffffffffff,%rax > 0x00007f9e76426c6a <+106>: retq >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1130333
: 926921 |
926922
|
926923
|
926924
|
926925
|
926926
|
926927
|
926928
|
926929