Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 930829 Details for
Bug 1133885
[abrt] rpm: rpmReadSignature(): rpm killed by SIGABRT
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 9.49 KB, created by
Jan Sedlák
on 2014-08-26 11:37:50 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Jan Sedlák
Created:
2014-08-26 11:37:50 UTC
Size:
9.49 KB
patch
obsolete
>[New LWP 13271] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `rpm -qp lo.rpm'. >Program terminated with signal SIGABRT, Aborted. >#0 0x0000003e78635c39 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:56 >56 return INLINE_SYSCALL (tgkill, 3, pid, selftid, sig); > >Thread 1 (Thread 0x7f98084a2840 (LWP 13271)): >#0 0x0000003e78635c39 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:56 > resultvar = 0 > pid = 13271 > selftid = 13271 >#1 0x0000003e78637348 in __GI_abort () at abort.c:89 > save_stage = 2 > act = {__sigaction_handler = {sa_handler = 0x2020202020202020, sa_sigaction = 0x2020202020202020}, sa_mask = {__val = {2314885530818453536, 6732726843261788192, 7378697629483820554, 3472328296331896422, 7378697629483806000, 3472609797883717222, 2337500343188860976, 3472328296227680304, 3467824696768081952, 2314885530818453536, 2314885530818453536, 7166204968890474528, 8315171078782348385, 8030813379409883693, 7219604695690917642, 0}}, sa_flags = 76, sa_restorer = 0x7fff1a6d6750} > sigs = {__val = {32, 0 <repeats 15 times>}} >#2 0x0000003e78675d04 in __libc_message (do_abort=do_abort@entry=2, fmt=fmt@entry=0x3e7877c528 "*** Error in `%s': %s: 0x%s ***\n") at ../sysdeps/posix/libc_fatal.c:175 > ap = {{gp_offset = 40, fp_offset = 0, overflow_arg_area = 0x7fff1a6d6760, reg_save_area = 0x7fff1a6d66f0}} > fd = 7 > on_2 = <optimized out> > list = <optimized out> > nlist = <optimized out> > cp = <optimized out> > written = <optimized out> >#3 0x0000003e7867cff8 in malloc_printerr (ptr=<optimized out>, str=0x3e7877c5c0 "double free or corruption (top)", action=3) at malloc.c:4930 > buf = "00000000010c74b0" > cp = <optimized out> >#4 _int_free (av=0x3e789b8760 <main_arena>, p=<optimized out>, have_lock=0) at malloc.c:3782 > size = <optimized out> > fb = <optimized out> > nextchunk = <optimized out> > nextsize = <optimized out> > nextinuse = <optimized out> > prevsize = <optimized out> > bck = <optimized out> > fwd = <optimized out> > errstr = 0x3e7877c5c0 "double free or corruption (top)" > locked = <optimized out> >#5 0x000000384b042b7f in rpmReadSignature (fd=fd@entry=0x1063950, sighp=sighp@entry=0x7fff1a6d6998, sig_type=sig_type@entry=RPMSIGTYPE_HEADERSIG, msg=msg@entry=0x7fff1a6d69a8) at signature.c:245 > buf = 0x109f460 "sigh pad(4): BAD, read 0 bytes\n" > block = {32025998, 0, 100663296, 1410334720} > il = <optimized out> > dl = <optimized out> > ei = <optimized out> > pe = <optimized out> > nb = <optimized out> > uc = <optimized out> > ril = <optimized out> > entry = {info = {tag = 1008, type = 7, offset = 68, count = 4096}, data = 0x0, length = 0, rdlen = 0} > info = {tag = 0, type = 0, offset = 0, count = 0} > dataStart = <optimized out> > dataEnd = <optimized out> > sigh = <optimized out> > rc = <optimized out> > xx = <optimized out> > i = <optimized out> >#6 0x000000384b02d885 in rpmpkgRead (keyring=keyring@entry=0x10660b0, vsflags=vsflags@entry=983040, fd=fd@entry=0x1063950, fn=fn@entry=0x1064fa0 "lo.rpm", hdrp=hdrp@entry=0x7fff1a6e6a88) at package.c:529 > sig = 0x0 > buf = '\000' <repeats 45852 times>... > count = <optimized out> > sigh = 0x0 > sigtag = <optimized out> > sigtd = {tag = 0, type = 0, count = 0, data = 0x0, flags = 0, ix = -1} > h = 0x0 > msg = 0x0 > rc = RPMRC_OK > leadtype = 0 > ctx = 0x0 >#7 0x000000384b02e27e in rpmReadPackageFile (ts=<optimized out>, fd=fd@entry=0x1063950, fn=fn@entry=0x1064fa0 "lo.rpm", hdrp=hdrp@entry=0x7fff1a6e6a88) at package.c:717 > rc = <optimized out> > vsflags = 983040 > keyring = 0x10660b0 >#8 0x000000384b039862 in rpmgiReadHeader (gi=<optimized out>, hdrp=<synthetic pointer>, path=0x1064fa0 "lo.rpm") at rpmgi.c:90 > rpmrc = <optimized out> > fd = 0x1063950 > h = 0x0 >#9 rpmgiLoadReadHeader (gi=0x1063360) at rpmgi.c:126 > fn = 0x1064fa0 "lo.rpm" > h = <optimized out> >#10 rpmgiNext (gi=gi@entry=0x1063360) at rpmgi.c:216 > h = 0x0 >#11 0x000000384b031ea9 in rpmgiShowMatches (gi=0x1063360, ts=0x105fa10, qva=0x384b2654a0 <rpmQVKArgs>) at query.c:274 > ec = 0 > h = <optimized out> >#12 rpmcliArgIter (ts=ts@entry=0x105fa10, qva=qva@entry=0x384b2654a0 <rpmQVKArgs>, argv=argv@entry=0x1019370) at query.c:518 > gi = 0x1063360 > ec = 0 >#13 0x000000384b031f77 in rpmcliQuery (ts=ts@entry=0x105fa10, qva=qva@entry=0x384b2654a0 <rpmQVKArgs>, argv=0x1019370) at query.c:568 > vsflags = <optimized out> > ovsflags = 0 > ec = 0 >#14 0x0000000000401939 in main (argc=3, argv=<optimized out>) at rpmqv.c:304 > ts = 0x105fa10 > bigMode = <optimized out> > optCon = 0x1019050 > ec = 0 > i = <optimized out> >From To Syms Read Shared Object Library >0x000000384b012bf0 0x000000384b04b588 Yes /lib64/librpm.so.3 >0x0000003cc760afc0 0x0000003cc7620070 Yes /lib64/librpmio.so.3 >0x000000384ac064a0 0x000000384ac18fe4 Yes /lib64/libselinux.so.1 >0x0000003e90e01620 0x0000003e90e02e58 Yes /lib64/libcap.so.2 >0x0000003e91e01f80 0x0000003e91e05df4 Yes /lib64/libacl.so.1 >0x0000003e8fe2f290 0x0000003e8ff7237c Yes /lib64/libdb-5.3.so >0x0000003e90a01760 0x0000003e90a0d570 Yes /lib64/libbz2.so.1 >0x0000003e27202ae0 0x0000003e27210528 Yes /lib64/libelf.so.1 >0x0000003e252030e0 0x0000003e25219050 Yes /lib64/liblzma.so.5 >0x0000003e8ce07ae0 0x0000003e8ce24e70 Yes /lib64/liblua-5.2.so >0x0000003e78a05890 0x0000003e78a74bb8 Yes /lib64/libm.so.6 >0x00000033c76194f0 0x00000033c76ea984 Yes /lib64/libnss3.so >0x0000003ccbc02520 0x0000003ccbc093e0 Yes /lib64/libpopt.so.0 >0x0000003e79602210 0x0000003e7960e930 Yes /lib64/libz.so.1 >0x0000003e79200ed0 0x0000003e792019d0 Yes /lib64/libdl.so.2 >0x0000003e78e059f0 0x0000003e78e11614 Yes /lib64/libpthread.so.0 >0x0000003e7861f560 0x0000003e78760bb4 Yes /lib64/libc.so.6 >0x000000384a801770 0x000000384a84b9e0 Yes /lib64/libpcre.so.1 >0x0000003e78200b10 0x0000003e78219c70 Yes /lib64/ld-linux-x86-64.so.2 >0x0000003e902013d0 0x0000003e9020341c Yes /lib64/libattr.so.1 >0x00000033c7a0be40 0x00000033c7a19f08 Yes /lib64/libnssutil3.so >0x0000003490001510 0x0000003490002b18 Yes /lib64/libplc4.so >0x000000348fc01090 0x000000348fc02018 Yes /lib64/libplds4.so >0x000000348f80d1e0 0x000000348f82d160 Yes /lib64/libnspr4.so >0x000000345bc022d0 0x000000345bc050bc Yes /lib64/librt.so.1 >0x00007f9801d40240 0x00007f9801d46ee4 Yes /lib64/libnss_files.so.2 >0x00000034c6204b40 0x00000034c622f0fc Yes /lib64/libsoftokn3.so >0x00000034c5e0b210 0x00000034c5e9dd70 Yes /lib64/libsqlite3.so.0 >0x00000033c8a03f80 0x00000033c8a5812d Yes /lib64/libfreebl3.so >0x0000003862202af0 0x00000038622122a8 Yes /lib64/libgcc_s.so.1 >$1 = 0x7f98084d6000 "" >No symbol "__glib_assert_msg" in current context. >rax 0x0 0 >rbx 0x4c 76 >rcx 0xffffffffffffffff -1 >rdx 0x6 6 >rsi 0x33d7 13271 >rdi 0x33d7 13271 >rbp 0x7fff1a6d6750 0x7fff1a6d6750 >rsp 0x7fff1a6d63b8 0x7fff1a6d63b8 >r8 0x3e787732c0 268309050048 >r9 0x4020d4 4202708 >r10 0x8 8 >r11 0x206 518 >r12 0x7fff1a6d6560 140733636765024 >r13 0x7 7 >r14 0x4c 76 >r15 0x7 7 >rip 0x3e78635c39 0x3e78635c39 <__GI_raise+57> >eflags 0x206 [ PF IF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >Dump of assembler code for function __GI_raise: > 0x0000003e78635c00 <+0>: mov %fs:0x2d4,%eax > 0x0000003e78635c08 <+8>: mov %eax,%ecx > 0x0000003e78635c0a <+10>: mov %fs:0x2d0,%esi > 0x0000003e78635c12 <+18>: test %esi,%esi > 0x0000003e78635c14 <+20>: jne 0x3e78635c48 <__GI_raise+72> > 0x0000003e78635c16 <+22>: mov $0xba,%eax > 0x0000003e78635c1b <+27>: syscall > 0x0000003e78635c1d <+29>: mov %eax,%ecx > 0x0000003e78635c1f <+31>: mov %eax,%fs:0x2d0 > 0x0000003e78635c27 <+39>: mov %eax,%esi > 0x0000003e78635c29 <+41>: movslq %edi,%rdx > 0x0000003e78635c2c <+44>: movslq %esi,%rsi > 0x0000003e78635c2f <+47>: movslq %ecx,%rdi > 0x0000003e78635c32 <+50>: mov $0xea,%eax > 0x0000003e78635c37 <+55>: syscall >=> 0x0000003e78635c39 <+57>: cmp $0xfffffffffffff000,%rax > 0x0000003e78635c3f <+63>: ja 0x3e78635c5a <__GI_raise+90> > 0x0000003e78635c41 <+65>: repz retq > 0x0000003e78635c43 <+67>: nopl 0x0(%rax,%rax,1) > 0x0000003e78635c48 <+72>: test %eax,%eax > 0x0000003e78635c4a <+74>: jg 0x3e78635c29 <__GI_raise+41> > 0x0000003e78635c4c <+76>: mov %eax,%ecx > 0x0000003e78635c4e <+78>: neg %ecx > 0x0000003e78635c50 <+80>: test $0x7fffffff,%eax > 0x0000003e78635c55 <+85>: cmove %esi,%ecx > 0x0000003e78635c58 <+88>: jmp 0x3e78635c29 <__GI_raise+41> > 0x0000003e78635c5a <+90>: mov 0x3821d7(%rip),%rdx # 0x3e789b7e38 > 0x0000003e78635c61 <+97>: neg %eax > 0x0000003e78635c63 <+99>: mov %eax,%fs:(%rdx) > 0x0000003e78635c66 <+102>: or $0xffffffffffffffff,%rax > 0x0000003e78635c6a <+106>: retq >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1133885
: 930829 |
930830
|
930831
|
930832
|
930833
|
930834
|
930835
|
930836
|
930837
|
930838
|
930841