Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 927193 Details for
Bug 1130631
[abrt] systemd: log_assert_failed(): systemd-logind killed by SIGABRT
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 13.30 KB, created by
Lukas Slebodnik
on 2014-08-15 17:49:52 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Lukas Slebodnik
Created:
2014-08-15 17:49:52 UTC
Size:
13.30 KB
patch
obsolete
>warning: the debug information found in "/usr/lib/debug//usr/lib/systemd/systemd-logind.debug" does not match "/usr/lib/systemd/systemd-logind" (CRC mismatch). > >warning: the debug information found in "/usr/lib/debug/usr/lib/systemd/systemd-logind.debug" does not match "/usr/lib/systemd/systemd-logind" (CRC mismatch). > >[New LWP 22298] >warning: the debug information found in "/usr/lib/debug/usr/lib64/libselinux.so.1.debug" does not match "/lib64/libselinux.so.1" (CRC mismatch). > >warning: the debug information found in "/usr/lib/debug/usr/lib64/libacl.so.1.1.0.debug" does not match "/lib64/libacl.so.1" (CRC mismatch). > >warning: the debug information found in "/usr/lib/debug//usr/lib64/libacl.so.1.1.0.debug" does not match "/lib64/libacl.so.1" (CRC mismatch). > >warning: the debug information found in "/usr/lib/debug/usr/lib64//libacl.so.1.1.0.debug" does not match "/lib64/libacl.so.1" (CRC mismatch). > >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >warning: the debug information found in "/usr/lib/debug/usr/lib64/liblzma.so.5.0.99.debug" does not match "/lib64/liblzma.so.5" (CRC mismatch). > >warning: the debug information found in "/usr/lib/debug//usr/lib64/liblzma.so.5.0.99.debug" does not match "/lib64/liblzma.so.5" (CRC mismatch). > >warning: the debug information found in "/usr/lib/debug/usr/lib64//liblzma.so.5.0.99.debug" does not match "/lib64/liblzma.so.5" (CRC mismatch). > >warning: the debug information found in "/usr/lib/debug/usr/lib64/libattr.so.1.1.0.debug" does not match "/lib64/libattr.so.1" (CRC mismatch). > >warning: the debug information found in "/usr/lib/debug//usr/lib64/libattr.so.1.1.0.debug" does not match "/lib64/libattr.so.1" (CRC mismatch). > >warning: the debug information found in "/usr/lib/debug/usr/lib64//libattr.so.1.1.0.debug" does not match "/lib64/libattr.so.1" (CRC mismatch). > >Core was generated by `/usr/lib/systemd/systemd-logind'. >Program terminated with signal SIGABRT, Aborted. >#0 0x00007f2ede618cc7 in raise () from /lib64/libc.so.6 > >Thread 1 (Thread 0x7f2edf6138c0 (LWP 22298)): >#0 0x00007f2ede618cc7 in raise () from /lib64/libc.so.6 >No symbol table info available. >#1 0x00007f2ede61a92a in abort () from /lib64/libc.so.6 >No symbol table info available. >#2 0x00007f2edf658512 in log_assert_failed () >No symbol table info available. >#3 0x00007f2edf68d3ff in session_start () >No symbol table info available. >#4 0x00007f2edf677fd5 in method_create_session.lto_priv () >No symbol table info available. >#5 0x00007f2edf643175 in object_find_and_run.lto_priv () >No symbol table info available. >#6 0x00007f2edf669ccd in bus_process_internal.constprop () >No symbol table info available. >#7 0x00007f2edf66b1c1 in io_callback () >No symbol table info available. >#8 0x00007f2edf665c00 in source_dispatch () >No symbol table info available. >#9 0x00007f2edf667f67 in sd_event_run () >No symbol table info available. >#10 0x00007f2edf646384 in main () >No symbol table info available. >From To Syms Read Shared Object Library >0x00007f2edf1f4500 0x00007f2edf207527 Yes (*) /lib64/libselinux.so.1 >0x00007f2edefe82f0 0x00007f2edefeb5b7 Yes (*) /lib64/librt.so.1 >0x00007f2ededdef80 0x00007f2edede2f61 Yes (*) /lib64/libacl.so.1 >0x00007f2edebc8af0 0x00007f2edebd89d5 Yes (*) /lib64/libgcc_s.so.1 >0x00007f2ede9aeac0 0x00007f2ede9bb5c1 Yes (*) /lib64/libpthread.so.0 >0x00007f2ede6024f0 0x00007f2ede751ee4 Yes (*) /lib64/libc.so.6 >0x00007f2edf413b10 0x00007f2edf42f7a0 Yes (*) /lib64/ld-linux-x86-64.so.2 >0x00007f2ede3776f0 0x00007f2ede3c57a5 Yes (*) /lib64/libpcre.so.1 >0x00007f2ede153f30 0x00007f2ede169d72 Yes (*) /lib64/liblzma.so.5 >0x00007f2eddf4ded0 0x00007f2eddf4eade Yes (*) /lib64/libdl.so.2 >0x00007f2eddd493d0 0x00007f2eddd4b4aa Yes (*) /lib64/libattr.so.1 >0x00007f2eddb3d290 0x00007f2eddb443e3 Yes (*) /lib64/libnss_files.so.2 >(*): Shared library is missing debugging information. >$1 = 0x0 >No symbol table is loaded. Use the "file" command. >rax 0x0 0 >rbx 0x7f2ee0701230 139839310664240 >rcx 0xffffffffffffffff -1 >rdx 0x6 6 >rsi 0x571a 22298 >rdi 0x571a 22298 >rbp 0x7fff3bacd260 0x7fff3bacd260 >rsp 0x7fff3bacd098 0x7fff3bacd098 >r8 0x0 0 >r9 0xe 14 >r10 0x8 8 >r11 0x202 514 >r12 0x0 0 >r13 0x7fff3bacd300 140734194569984 >r14 0x0 0 >r15 0x7f2ee0701230 139839310664240 >rip 0x7f2ede618cc7 0x7f2ede618cc7 <raise+55> >eflags 0x202 [ IF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >st0 0 (raw 0x00000000000000000000) >st1 0 (raw 0x00000000000000000000) >st2 0 (raw 0x00000000000000000000) >st3 0 (raw 0x00000000000000000000) >st4 0 (raw 0x00000000000000000000) >st5 0 (raw 0x00000000000000000000) >st6 0 (raw 0x00000000000000000000) >st7 0 (raw 0x00000000000000000000) >fctrl 0x37f 895 >fstat 0x0 0 >ftag 0xffff 65535 >fiseg 0x0 0 >fioff 0x0 0 >foseg 0x0 0 >fooff 0x0 0 >fop 0x0 0 >mxcsr 0x9fc0 [ DAZ IM DM ZM OM UM PM FZ ] >ymm0 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0, 0xff, 0xff, 0xff, 0xff, 0x0 <repeats 27 times>}, v16_int16 = {0xff00, 0xffff, 0xff, 0x0 <repeats 13 times>}, v8_int32 = {0xffffff00, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xffffffff00, 0x0, 0x0, 0x0}, v2_int128 = {0x0000000000000000000000ffffffff00, 0x00000000000000000000000000000000}} >ymm1 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x25 <repeats 16 times>, 0x0 <repeats 16 times>}, v16_int16 = {0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x25252525, 0x25252525, 0x25252525, 0x25252525, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x2525252525252525, 0x2525252525252525, 0x0, 0x0}, v2_int128 = {0x25252525252525252525252525252525, 0x00000000000000000000000000000000}} >ymm2 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x8000000000000000, 0x8000000000000000, 0x0, 0x0}, v32_int8 = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x0, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x0 <repeats 16 times>}, v16_int16 = {0xffff, 0xffff, 0xffff, 0xffff, 0xff00, 0xffff, 0xffff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0xffffffff, 0xffffffff, 0xffffff00, 0xffffffff, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xffffffffffffffff, 0xffffffffffffff00, 0x0, 0x0}, v2_int128 = {0xffffffffffffff00ffffffffffffffff, 0x00000000000000000000000000000000}} >ymm3 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm4 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0, 0xff, 0xff, 0xff, 0xff, 0x0 <repeats 27 times>}, v16_int16 = {0xff00, 0xffff, 0xff, 0x0 <repeats 13 times>}, v8_int32 = {0xffffff00, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xffffffff00, 0x0, 0x0, 0x0}, v2_int128 = {0x0000000000000000000000ffffffff00, 0x00000000000000000000000000000000}} >ymm5 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x8000000000000000, 0x8000000000000000, 0x0, 0x0}, v32_int8 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xff, 0x0 <repeats 16 times>}, v16_int16 = {0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x0, 0xffff0000, 0x0, 0xffff0000, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xffff000000000000, 0xffff000000000000, 0x0, 0x0}, v2_int128 = {0xffff000000000000ffff000000000000, 0x00000000000000000000000000000000}} >ymm6 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm7 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm8 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm9 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm10 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm11 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x8000000000000000, 0x8000000000000000, 0x0, 0x0}, v32_int8 = {0x0, 0xff <repeats 15 times>, 0x0 <repeats 16 times>}, v16_int16 = {0xff00, 0xffff, 0xffff, 0xffff, 0xffff, 0xffff, 0xffff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0xffffff00, 0xffffffff, 0xffffffff, 0xffffffff, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xffffffffffffff00, 0xffffffffffffffff, 0x0, 0x0}, v2_int128 = {0xffffffffffffffffffffffffffffff00, 0x00000000000000000000000000000000}} >ymm12 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm13 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm14 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm15 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >Dump of assembler code for function raise: > 0x00007f2ede618c90 <+0>: mov ecx,DWORD PTR fs:0x2d4 > 0x00007f2ede618c98 <+8>: mov esi,DWORD PTR fs:0x2d0 > 0x00007f2ede618ca0 <+16>: test esi,esi > 0x00007f2ede618ca2 <+18>: jne 0x7f2ede618cd8 <raise+72> > 0x00007f2ede618ca4 <+20>: mov eax,0xba > 0x00007f2ede618ca9 <+25>: syscall > 0x00007f2ede618cab <+27>: mov ecx,eax > 0x00007f2ede618cad <+29>: mov DWORD PTR fs:0x2d0,eax > 0x00007f2ede618cb5 <+37>: mov esi,eax > 0x00007f2ede618cb7 <+39>: movsxd rdx,edi > 0x00007f2ede618cba <+42>: movsxd rsi,esi > 0x00007f2ede618cbd <+45>: movsxd rdi,ecx > 0x00007f2ede618cc0 <+48>: mov eax,0xea > 0x00007f2ede618cc5 <+53>: syscall >=> 0x00007f2ede618cc7 <+55>: cmp rax,0xfffffffffffff000 > 0x00007f2ede618ccd <+61>: ja 0x7f2ede618cf0 <raise+96> > 0x00007f2ede618ccf <+63>: repz ret > 0x00007f2ede618cd1 <+65>: nop DWORD PTR [rax+0x0] > 0x00007f2ede618cd8 <+72>: test ecx,ecx > 0x00007f2ede618cda <+74>: jg 0x7f2ede618cb7 <raise+39> > 0x00007f2ede618cdc <+76>: mov edx,ecx > 0x00007f2ede618cde <+78>: neg edx > 0x00007f2ede618ce0 <+80>: and ecx,0x7fffffff > 0x00007f2ede618ce6 <+86>: cmove edx,esi > 0x00007f2ede618ce9 <+89>: mov ecx,edx > 0x00007f2ede618ceb <+91>: jmp 0x7f2ede618cb7 <raise+39> > 0x00007f2ede618ced <+93>: nop DWORD PTR [rax] > 0x00007f2ede618cf0 <+96>: mov rdx,QWORD PTR [rip+0x38a149] # 0x7f2ede9a2e40 > 0x00007f2ede618cf7 <+103>: neg eax > 0x00007f2ede618cf9 <+105>: mov DWORD PTR fs:[rdx],eax > 0x00007f2ede618cfc <+108>: mov eax,0xffffffff > 0x00007f2ede618d01 <+113>: ret >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1130631
: 927193 |
927194
|
927195
|
927196
|
927197
|
927198
|
927199
|
927200
|
927201
|
927202