Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 946098 Details for
Bug 1151847
[abrt] systemd: sd_journal_enumerate_data(): journalctl killed by SIGBUS
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 11.19 KB, created by
Tomasz Torcz
on 2014-10-12 14:54:29 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Tomasz Torcz
Created:
2014-10-12 14:54:29 UTC
Size:
11.19 KB
patch
obsolete
>[New LWP 17066] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `journalctl -b --system'. >Program terminated with signal SIGBUS, Bus error. >#0 sd_journal_enumerate_data (j=j@entry=0x7fac21da4f40, data=data@entry=0x7fff4d42aa10, size=size@entry=0x7fff4d42aa18) at ../src/journal/sd-journal.c:2103 >2103 le_hash = o->entry.items[j->current_field].hash; > >Thread 1 (Thread 0x7fac21b72780 (LWP 17066)): >#0 sd_journal_enumerate_data (j=j@entry=0x7fac21da4f40, data=data@entry=0x7fff4d42aa10, size=size@entry=0x7fff4d42aa18) at ../src/journal/sd-journal.c:2103 > f = 0x7fac21dbbb90 > p = <error reading variable p (Cannot access memory at address 0x7fac0c8c8ff8)> > n = <optimized out> > le_hash = <optimized out> > r = <optimized out> > o = 0x7fac0c8c8ed8 > __PRETTY_FUNCTION__ = "sd_journal_enumerate_data" >#1 0x00007fac21bc659a in output_short.lto_priv.109 (f=0x7fac20a2c800 <_IO_2_1_stdout_>, j=0x7fac21da4f40, mode=OUTPUT_SHORT, n_columns=80, flags=OUTPUT_FULL_WIDTH) at ../src/shared/logs-show.c:219 > r = <optimized out> > data = 0x7fac11706848 > length = 13 > n = 0 > hostname = 0x7fac21da78e0 "sandworm.pipebreaker.pl" > identifier = 0x7fac21da6890 "anacron" > comm = 0x7fac21da7900 "anacron" > pid = 0x0 > fake_pid = 0x0 > message = 0x0 > realtime = 0x0 > monotonic = 0x0 > priority = 0x7fac21da7840 "5" > hostname_len = 23 > identifier_len = 7 > comm_len = 7 > pid_len = 0 > fake_pid_len = 0 > message_len = 0 > realtime_len = 0 > monotonic_len = 0 > priority_len = 1 > p = 6 > ellipsized = false > __PRETTY_FUNCTION__ = "output_short" > __func__ = "output_short" >#2 0x00007fac21bd09bf in output_journal.constprop.28 (f=0x7fac20a2c800 <_IO_2_1_stdout_>, j=0x7fac21da4f40, mode=OUTPUT_SHORT, flags=OUTPUT_FULL_WIDTH, ellipsized=0x7fff4d42ac6b, n_columns=<optimized out>) at ../src/shared/logs-show.c:922 > ret = <optimized out> >#3 0x00007fac21bb2d64 in main (argc=<optimized out>, argv=<optimized out>) at ../src/journal/journalctl.c:1904 > flags = <optimized out> > r = <optimized out> > j = 0x7fac21da4f40 > need_seek = <optimized out> > previous_boot_id = <optimized out> > previous_boot_id_valid = true > first_line = true > n_shown = 3658 > ellipsized = false > __func__ = "main" >From To Syms Read Shared Object Library >0x00007fac21763f30 0x00007fac21779d72 Yes /lib64/liblzma.so.5 >0x00007fac2148a600 0x00007fac2152ad48 Yes /lib64/libgcrypt.so.20 >0x00007fac2127c2a0 0x00007fac2127f417 Yes /lib64/librt.so.1 >0x00007fac21072f80 0x00007fac21076f61 Yes /lib64/libacl.so.1 >0x00007fac20e66e20 0x00007fac20e6c92d Yes /lib64/libqrencode.so.3 >0x00007fac20c4faf0 0x00007fac20c5f9d5 Yes /lib64/libgcc_s.so.1 >0x00007fac20a36a20 0x00007fac20a42e01 Yes /lib64/libpthread.so.0 >0x00007fac206934f0 0x00007fac207deca4 Yes /lib64/libc.so.6 >0x00007fac21986b10 0x00007fac219a16d0 Yes /lib64/ld-linux-x86-64.so.2 >0x00007fac2046fdb0 0x00007fac204705f5 Yes /lib64/libgpg-error.so.0 >0x00007fac2026bed0 0x00007fac2026cace Yes /lib64/libdl.so.2 >0x00007fac200673d0 0x00007fac200694aa Yes /lib64/libattr.so.1 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0x0 0 >rbx 0x7fac21da4f40 140377279057728 >rcx 0x7fff4d42a990 140734489602448 >rdx 0x7fac0c8c8fb8 140376921640888 >rsi 0x1 1 >rdi 0x7fac21dbbb90 140377279150992 >rbp 0x7fff4d42aa10 0x7fff4d42aa10 >rsp 0x7fff4d42a990 0x7fff4d42a990 >r8 0x41ec0a8 69124264 >r9 0x7fac21dbb950 140377279150416 >r10 0x7fff4d42a830 140734489602096 >r11 0x7fac21da65b0 140377279063472 >r12 0x7fff4d42aa18 140734489602584 >r13 0x7fff4d42aaa8 140734489602728 >r14 0x7fac0c8c8ed8 140376921640664 >r15 0x7fac21dbbb90 140377279150992 >rip 0x7fac21bbc122 0x7fac21bbc122 <sd_journal_enumerate_data+210> >eflags 0x10206 [ PF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >Dump of assembler code for function sd_journal_enumerate_data: > 0x00007fac21bbc050 <+0>: push %r15 > 0x00007fac21bbc052 <+2>: push %r14 > 0x00007fac21bbc054 <+4>: push %r13 > 0x00007fac21bbc056 <+6>: push %r12 > 0x00007fac21bbc058 <+8>: push %rbp > 0x00007fac21bbc059 <+9>: push %rbx > 0x00007fac21bbc05a <+10>: mov %rdi,%rbx > 0x00007fac21bbc05d <+13>: sub $0x18,%rsp > 0x00007fac21bbc061 <+17>: mov %fs:0x28,%rax > 0x00007fac21bbc06a <+26>: mov %rax,0x8(%rsp) > 0x00007fac21bbc06f <+31>: xor %eax,%eax > 0x00007fac21bbc071 <+33>: test %rdi,%rdi > 0x00007fac21bbc074 <+36>: je 0x7fac21bbc170 <sd_journal_enumerate_data+288> > 0x00007fac21bbc07a <+42>: mov %rsi,%rbp > 0x00007fac21bbc07d <+45>: mov %rdx,%r12 > 0x00007fac21bbc080 <+48>: callq 0x7fac21bd14f0 <journal_pid_changed.lto_priv.114> > 0x00007fac21bbc085 <+53>: test %al,%al > 0x00007fac21bbc087 <+55>: jne 0x7fac21bbc1a0 <sd_journal_enumerate_data+336> > 0x00007fac21bbc08d <+61>: test %rbp,%rbp > 0x00007fac21bbc090 <+64>: je 0x7fac21bbc1d0 <sd_journal_enumerate_data+384> > 0x00007fac21bbc096 <+70>: test %r12,%r12 > 0x00007fac21bbc099 <+73>: je 0x7fac21bbc200 <sd_journal_enumerate_data+432> > 0x00007fac21bbc09f <+79>: mov 0x68(%rbx),%r15 > 0x00007fac21bbc0a3 <+83>: test %r15,%r15 > 0x00007fac21bbc0a6 <+86>: je 0x7fac21bbc229 <sd_journal_enumerate_data+473> > 0x00007fac21bbc0ac <+92>: mov 0xc8(%r15),%rdx > 0x00007fac21bbc0b3 <+99>: mov $0xffffff9d,%eax > 0x00007fac21bbc0b8 <+104>: test %rdx,%rdx > 0x00007fac21bbc0bb <+107>: je 0x7fac21bbc0eb <sd_journal_enumerate_data+155> > 0x00007fac21bbc0bd <+109>: mov %rsp,%rcx > 0x00007fac21bbc0c0 <+112>: mov $0x3,%esi > 0x00007fac21bbc0c5 <+117>: mov %r15,%rdi > 0x00007fac21bbc0c8 <+120>: callq 0x7fac21bce460 <journal_file_move_to_object> > 0x00007fac21bbc0cd <+125>: test %eax,%eax > 0x00007fac21bbc0cf <+127>: js 0x7fac21bbc0eb <sd_journal_enumerate_data+155> > 0x00007fac21bbc0d1 <+129>: mov (%rsp),%r14 > 0x00007fac21bbc0d5 <+133>: mov %r14,%rdi > 0x00007fac21bbc0d8 <+136>: callq 0x7fac21bce2f0 <journal_file_entry_n_items> > 0x00007fac21bbc0dd <+141>: mov 0x70(%rbx),%rdx > 0x00007fac21bbc0e1 <+145>: mov %rax,%rcx > 0x00007fac21bbc0e4 <+148>: xor %eax,%eax > 0x00007fac21bbc0e6 <+150>: cmp %rdx,%rcx > 0x00007fac21bbc0e9 <+153>: ja 0x7fac21bbc110 <sd_journal_enumerate_data+192> > 0x00007fac21bbc0eb <+155>: mov 0x8(%rsp),%rcx > 0x00007fac21bbc0f0 <+160>: xor %fs:0x28,%rcx > 0x00007fac21bbc0f9 <+169>: jne 0x7fac21bbc233 <sd_journal_enumerate_data+483> > 0x00007fac21bbc0ff <+175>: add $0x18,%rsp > 0x00007fac21bbc103 <+179>: pop %rbx > 0x00007fac21bbc104 <+180>: pop %rbp > 0x00007fac21bbc105 <+181>: pop %r12 > 0x00007fac21bbc107 <+183>: pop %r13 > 0x00007fac21bbc109 <+185>: pop %r14 > 0x00007fac21bbc10b <+187>: pop %r15 > 0x00007fac21bbc10d <+189>: retq > 0x00007fac21bbc10e <+190>: xchg %ax,%ax > 0x00007fac21bbc110 <+192>: shl $0x4,%rdx > 0x00007fac21bbc114 <+196>: mov %rsp,%rcx > 0x00007fac21bbc117 <+199>: mov $0x1,%esi > 0x00007fac21bbc11c <+204>: add %r14,%rdx > 0x00007fac21bbc11f <+207>: mov %r15,%rdi >=> 0x00007fac21bbc122 <+210>: mov 0x48(%rdx),%r14 > 0x00007fac21bbc126 <+214>: mov 0x40(%rdx),%rdx > 0x00007fac21bbc12a <+218>: callq 0x7fac21bce460 <journal_file_move_to_object> > 0x00007fac21bbc12f <+223>: test %eax,%eax > 0x00007fac21bbc131 <+225>: js 0x7fac21bbc0eb <sd_journal_enumerate_data+155> > 0x00007fac21bbc133 <+227>: mov (%rsp),%rdx > 0x00007fac21bbc137 <+231>: mov $0xffffffb6,%eax > 0x00007fac21bbc13c <+236>: cmp %r14,0x10(%rdx) > 0x00007fac21bbc140 <+240>: jne 0x7fac21bbc0eb <sd_journal_enumerate_data+155> > 0x00007fac21bbc142 <+242>: lea 0xc8(%rbx),%rdi > 0x00007fac21bbc149 <+249>: mov %r12,%r8 > 0x00007fac21bbc14c <+252>: mov %rbp,%rcx > 0x00007fac21bbc14f <+255>: mov %r15,%rsi > 0x00007fac21bbc152 <+258>: callq 0x7fac21bcefa0 <return_data.isra.11.lto_priv.146> > 0x00007fac21bbc157 <+263>: test %eax,%eax > 0x00007fac21bbc159 <+265>: js 0x7fac21bbc0eb <sd_journal_enumerate_data+155> > 0x00007fac21bbc15b <+267>: addq $0x1,0x70(%rbx) > 0x00007fac21bbc160 <+272>: mov $0x1,%eax > 0x00007fac21bbc165 <+277>: jmp 0x7fac21bbc0eb <sd_journal_enumerate_data+155> > 0x00007fac21bbc167 <+279>: nopw 0x0(%rax,%rax,1) > 0x00007fac21bbc170 <+288>: lea 0x1ced9(%rip),%rcx # 0x7fac21bd9050 <__PRETTY_FUNCTION__.12020> > 0x00007fac21bbc177 <+295>: lea 0x174a6(%rip),%rsi # 0x7fac21bd3624 > 0x00007fac21bbc17e <+302>: lea 0x174dc(%rip),%rdi # 0x7fac21bd3661 > 0x00007fac21bbc185 <+309>: mov $0x822,%edx > 0x00007fac21bbc18a <+314>: callq 0x7fac21bc3b90 <log_assert_failed_return> > 0x00007fac21bbc18f <+319>: mov $0xffffffea,%eax > 0x00007fac21bbc194 <+324>: jmpq 0x7fac21bbc0eb <sd_journal_enumerate_data+155> > 0x00007fac21bbc199 <+329>: nopl 0x0(%rax) > 0x00007fac21bbc1a0 <+336>: lea 0x1cea9(%rip),%rcx # 0x7fac21bd9050 <__PRETTY_FUNCTION__.12020> > 0x00007fac21bbc1a7 <+343>: lea 0x17476(%rip),%rsi # 0x7fac21bd3624 > 0x00007fac21bbc1ae <+350>: lea 0x17d7a(%rip),%rdi # 0x7fac21bd3f2f > 0x00007fac21bbc1b5 <+357>: mov $0x823,%edx > 0x00007fac21bbc1ba <+362>: callq 0x7fac21bc3b90 <log_assert_failed_return> > 0x00007fac21bbc1bf <+367>: mov $0xfffffff6,%eax > 0x00007fac21bbc1c4 <+372>: jmpq 0x7fac21bbc0eb <sd_journal_enumerate_data+155> > 0x00007fac21bbc1c9 <+377>: nopl 0x0(%rax) > 0x00007fac21bbc1d0 <+384>: lea 0x1ce79(%rip),%rcx # 0x7fac21bd9050 <__PRETTY_FUNCTION__.12020> > 0x00007fac21bbc1d7 <+391>: lea 0x17446(%rip),%rsi # 0x7fac21bd3624 > 0x00007fac21bbc1de <+398>: lea 0x176d1(%rip),%rdi # 0x7fac21bd38b6 > 0x00007fac21bbc1e5 <+405>: mov $0x824,%edx > 0x00007fac21bbc1ea <+410>: callq 0x7fac21bc3b90 <log_assert_failed_return> > 0x00007fac21bbc1ef <+415>: mov $0xffffffea,%eax > 0x00007fac21bbc1f4 <+420>: jmpq 0x7fac21bbc0eb <sd_journal_enumerate_data+155> > 0x00007fac21bbc1f9 <+425>: nopl 0x0(%rax) > 0x00007fac21bbc200 <+432>: lea 0x1ce49(%rip),%rcx # 0x7fac21bd9050 <__PRETTY_FUNCTION__.12020> > 0x00007fac21bbc207 <+439>: lea 0x17416(%rip),%rsi # 0x7fac21bd3624 > 0x00007fac21bbc20e <+446>: lea 0x17e4f(%rip),%rdi # 0x7fac21bd4064 > 0x00007fac21bbc215 <+453>: mov $0x825,%edx > 0x00007fac21bbc21a <+458>: callq 0x7fac21bc3b90 <log_assert_failed_return> > 0x00007fac21bbc21f <+463>: mov $0xffffffea,%eax > 0x00007fac21bbc224 <+468>: jmpq 0x7fac21bbc0eb <sd_journal_enumerate_data+155> > 0x00007fac21bbc229 <+473>: mov $0xffffff9d,%eax > 0x00007fac21bbc22e <+478>: jmpq 0x7fac21bbc0eb <sd_journal_enumerate_data+155> > 0x00007fac21bbc233 <+483>: callq 0x7fac21baea80 <__stack_chk_fail@plt> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1151847
: 946098 |
946099
|
946100
|
946101
|
946102
|
946103
|
946104
|
946105
|
946106
|
946107
|
946108