Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 948907 Details for
Bug 1155127
[abrt] bind-utils: gssapi_destroy_signverify_ctx(): nsupdate killed by SIGBUS
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 14.59 KB, created by
Anry Lytvynov
on 2014-10-21 12:20:13 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Anry Lytvynov
Created:
2014-10-21 12:20:13 UTC
Size:
14.59 KB
patch
obsolete
>[New LWP 7933] >[New LWP 7931] >[New LWP 7932] >[New LWP 7930] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `/usr/bin/nsupdate -g'. >Program terminated with signal SIGBUS, Bus error. >#0 0x0000003ad137264f in gssapi_destroy_signverify_ctx () from /lib64/libdns.so.104 > >Thread 4 (Thread 0x7f3e33b31800 (LWP 7930)): >#0 0x0000003021034cb7 in sigsuspend () from /lib64/libc.so.6 >No symbol table info available. >#1 0x0000003ad0a3d03c in isc.app_ctxrun () from /lib64/libisc.so.95 >No symbol table info available. >#2 0x0000000000404e59 in main () >No symbol table info available. > >Thread 3 (Thread 0x7f3e332ee700 (LWP 7932)): >#0 0x000000302180c590 in pthread_cond_wait@@GLIBC_2.3.2 () from /lib64/libpthread.so.0 >No symbol table info available. >#1 0x0000003ad0a39d9f in run () from /lib64/libisc.so.95 >No symbol table info available. >#2 0x000000302180752a in start_thread () from /lib64/libpthread.so.0 >No symbol table info available. >#3 0x000000302110077d in clone () from /lib64/libc.so.6 >No symbol table info available. > >Thread 2 (Thread 0x7f3e33aef700 (LWP 7931)): >#0 0x0000003021100d83 in epoll_wait () from /lib64/libc.so.6 >No symbol table info available. >#1 0x0000003ad0a47b6e in watcher () from /lib64/libisc.so.95 >No symbol table info available. >#2 0x000000302180752a in start_thread () from /lib64/libpthread.so.0 >No symbol table info available. >#3 0x000000302110077d in clone () from /lib64/libc.so.6 >No symbol table info available. > >Thread 1 (Thread 0x7f3e32aed700 (LWP 7933)): >#0 0x0000003ad137264f in gssapi_destroy_signverify_ctx () from /lib64/libdns.so.104 >No symbol table info available. >#1 0x0000003ad136d4f5 in dst_context_create4 () from /lib64/libdns.so.104 >No symbol table info available. >#2 0x0000003ad13204a0 in dns_tsig_sign () from /lib64/libdns.so.104 >No symbol table info available. >#3 0x0000003ad1279134 in dns_message_renderend () from /lib64/libdns.so.104 >No symbol table info available. >#4 0x0000003ad12f6a55 in req_render () from /lib64/libdns.so.104 >No symbol table info available. >#5 0x0000003ad12f874a in dns_request_createvia3 () from /lib64/libdns.so.104 >No symbol table info available. >#6 0x00000000004085d7 in send_update () >No symbol table info available. >#7 0x0000000000409fd2 in recvgss () >No symbol table info available. >#8 0x0000003ad0a35ecb in run () from /lib64/libisc.so.95 >No symbol table info available. >#9 0x000000302180752a in start_thread () from /lib64/libpthread.so.0 >No symbol table info available. >#10 0x000000302110077d in clone () from /lib64/libc.so.6 >No symbol table info available. >From To Syms Read Shared Object Library >0x0000003ad22033f0 0x0000003ad220ec1c Yes (*) /lib64/liblwres.so.91 >0x0000003ad1228ad0 0x0000003ad137a552 Yes (*) /lib64/libdns.so.104 >0x0000003ad1e02c90 0x0000003ad1e09a08 Yes (*) /lib64/libbind9.so.90 >0x0000003ad160ee70 0x0000003ad1616af5 Yes (*) /lib64/libisccfg.so.90 >0x0000003ad1a02520 0x0000003ad1a05f0a Yes (*) /lib64/libisccc.so.90 >0x0000003ad0a10830 0x0000003ad0a4f5c5 Yes (*) /lib64/libisc.so.95 >0x0000003ad680bf50 0x0000003ad683d792 Yes (*) /lib64/libgssapi_krb5.so.2 >0x0000003ad5424720 0x0000003ad5489436 Yes (*) /lib64/libkrb5.so.3 >0x0000003ad4c047c0 0x0000003ad4c22b6a Yes (*) /lib64/libk5crypto.so.3 >0x000000302fe01570 0x000000302fe02163 Yes (*) /lib64/libcom_err.so.2 >0x0000003ad5068240 0x0000003ad515b38f Yes (*) /lib64/libcrypto.so.10 >0x000000303ae01670 0x000000303ae02f96 Yes (*) /lib64/libcap.so.2 >0x0000003021805a20 0x0000003021811e01 Yes (*) /lib64/libpthread.so.0 >0x0000003ad0e2e870 0x0000003ad0f1039e Yes (*) /lib64/libxml2.so.2 >0x0000003022002200 0x000000302200e729 Yes (*) /lib64/libz.so.1 >0x0000003021c055c0 0x0000003021c76b91 Yes (*) /lib64/libm.so.6 >0x0000003021400ed0 0x0000003021401ace Yes (*) /lib64/libdl.so.2 >0x000000302101f4f0 0x000000302116aca4 Yes (*) /lib64/libc.so.6 >0x0000003ad6c036a0 0x0000003ad6c0a7f0 Yes (*) /lib64/libkrb5support.so.0 >0x0000003031201570 0x0000003031202194 Yes (*) /lib64/libkeyutils.so.1 >0x0000003023003a40 0x0000003023012ba1 Yes (*) /lib64/libresolv.so.2 >0x0000003020c00b10 0x0000003020c1b6d0 Yes (*) /lib64/ld-linux-x86-64.so.2 >0x0000003037c013d0 0x0000003037c034aa Yes (*) /lib64/libattr.so.1 >0x0000003022402f30 0x0000003022418d72 Yes (*) /lib64/liblzma.so.5 >0x0000003ad0606530 0x0000003ad06195ba Yes (*) /lib64/libselinux.so.1 >0x00000030228016f0 0x000000302284f7a5 Yes (*) /lib64/libpcre.so.1 >0x00007f3e320c6240 0x00007f3e320cd2d3 Yes (*) /lib64/libnss_files.so.2 >0x00007f3e31ec0eb0 0x00007f3e31ec1bcc Yes (*) /usr/lib64/krb5/plugins/libkrb5/sssd_krb5_locator_plugin.so >(*): Shared library is missing debugging information. >$1 = 0x0 >No symbol table is loaded. Use the "file" command. >rax 0x3ad1372640 252618155584 >rbx 0x7f3e2c0088c0 139905002932416 >rcx 0x0 0 >rdx 0x7f3e2c006910 139905002924304 >rsi 0x0 0 >rdi 0x7f3e2c0088c0 139905002932416 >rbp 0x1000000000000 0x1000000000000 >rsp 0x7f3e32aec0d0 0x7f3e32aec0d0 >r8 0x0 0 >r9 0x7f3e32aec188 139905115013512 >r10 0x2 2 >r11 0x12c 300 >r12 0x7f3e32aec188 139905115013512 >r13 0x1fec010 33472528 >r14 0x1 1 >r15 0x3ad15d4b00 252620655360 >rip 0x3ad137264f 0x3ad137264f <gssapi_destroy_signverify_ctx+15> >eflags 0x10206 [ PF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >st0 0 (raw 0x00000000000000000000) >st1 0 (raw 0x00000000000000000000) >st2 0 (raw 0x00000000000000000000) >st3 0 (raw 0x00000000000000000000) >st4 0 (raw 0x00000000000000000000) >st5 0 (raw 0x00000000000000000000) >st6 0 (raw 0x00000000000000000000) >st7 0 (raw 0x00000000000000000000) >fctrl 0x37f 895 >fstat 0x0 0 >ftag 0xffff 65535 >fiseg 0x0 0 >fioff 0x0 0 >foseg 0x0 0 >fooff 0x0 0 >fop 0x0 0 >mxcsr 0x1f80 [ IM DM ZM OM UM PM ] >ymm0 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm1 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x8000000000000000, 0x0, 0x0}, v32_int8 = {0x6, 0x6f, 0x66, 0x66, 0x69, 0x63, 0x65, 0x9, 0x69, 0x6e, 0x74, 0x65, 0x6c, 0x73, 0x65, 0x72, 0x0 <repeats 16 times>}, v16_int16 = {0x6f06, 0x6666, 0x6369, 0x965, 0x6e69, 0x6574, 0x736c, 0x7265, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x66666f06, 0x9656369, 0x65746e69, 0x7265736c, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x965636966666f06, 0x7265736c65746e69, 0x0, 0x0}, v2_int128 = {0x7265736c65746e690965636966666f06, 0x00000000000000000000000000000000}} >ymm2 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm3 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm4 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm5 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm6 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x8000000000000000, 0x8000000000000000, 0x0, 0x0}, v32_int8 = {0x33, 0x8, 0x73, 0x69, 0x67, 0x2d, 0x7a, 0x65, 0x75, 0x73, 0x6, 0x6f, 0x66, 0x66, 0x69, 0x63, 0x0 <repeats 16 times>}, v16_int16 = {0x833, 0x6973, 0x2d67, 0x657a, 0x7375, 0x6f06, 0x6666, 0x6369, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x69730833, 0x657a2d67, 0x6f067375, 0x63696666, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x657a2d6769730833, 0x636966666f067375, 0x0, 0x0}, v2_int128 = {0x636966666f067375657a2d6769730833, 0x00000000000000000000000000000000}} >ymm7 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x8000000000000000, 0x0, 0x0, 0x0}, v32_int8 = {0x65, 0x9, 0x69, 0x6e, 0x74, 0x65, 0x6c, 0x73, 0x65, 0x72, 0x76, 0x3, 0x63, 0x6f, 0x6d, 0x0 <repeats 17 times>}, v16_int16 = {0x965, 0x6e69, 0x6574, 0x736c, 0x7265, 0x376, 0x6f63, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x6e690965, 0x736c6574, 0x3767265, 0x6d6f63, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x736c65746e690965, 0x6d6f6303767265, 0x0, 0x0}, v2_int128 = {0x006d6f6303767265736c65746e690965, 0x00000000000000000000000000000000}} >ymm8 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0xbe <repeats 16 times>, 0x0 <repeats 16 times>}, v16_int16 = {0xbebe, 0xbebe, 0xbebe, 0xbebe, 0xbebe, 0xbebe, 0xbebe, 0xbebe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0xbebebebe, 0xbebebebe, 0xbebebebe, 0xbebebebe, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xbebebebebebebebe, 0xbebebebebebebebe, 0x0, 0x0}, v2_int128 = {0xbebebebebebebebebebebebebebebebe, 0x00000000000000000000000000000000}} >ymm9 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm10 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0, 0x0, 0x0, 0x0, 0xff, 0x0 <repeats 27 times>}, v16_int16 = {0x0, 0x0, 0xff, 0x0 <repeats 13 times>}, v8_int32 = {0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xff00000000, 0x0, 0x0, 0x0}, v2_int128 = {0x0000000000000000000000ff00000000, 0x00000000000000000000000000000000}} >ymm11 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0, 0x0, 0x0, 0x0, 0xff, 0x0 <repeats 27 times>}, v16_int16 = {0x0, 0x0, 0xff, 0x0 <repeats 13 times>}, v8_int32 = {0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xff00000000, 0x0, 0x0, 0x0}, v2_int128 = {0x0000000000000000000000ff00000000, 0x00000000000000000000000000000000}} >ymm12 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} >ymm13 {v8_float = {0x0, 0x0, 0x94000000, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x10, 0x26, 0x93, 0x9b, 0x62, 0xca, 0x5, 0x19, 0x1b, 0xe8, 0x65, 0xd8, 0xc0, 0xcc, 0x2c, 0x12, 0x0 <repeats 16 times>}, v16_int16 = {0x2610, 0x9b93, 0xca62, 0x1905, 0xe81b, 0xd865, 0xccc0, 0x122c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x9b932610, 0x1905ca62, 0xd865e81b, 0x122cccc0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x1905ca629b932610, 0x122cccc0d865e81b, 0x0, 0x0}, v2_int128 = {0x122cccc0d865e81b1905ca629b932610, 0x00000000000000000000000000000000}} >ymm14 {v8_float = {0xfffff76a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x8000000000000000, 0x8000000000000000, 0x0, 0x0}, v32_int8 = {0xaa, 0x69, 0x9, 0xc5, 0x51, 0xa9, 0x15, 0xeb, 0x56, 0x66, 0x24, 0x87, 0xd6, 0xff, 0x23, 0x5c, 0x0 <repeats 16 times>}, v16_int16 = {0x69aa, 0xc509, 0xa951, 0xeb15, 0x6656, 0x8724, 0xffd6, 0x5c23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0xc50969aa, 0xeb15a951, 0x87246656, 0x5c23ffd6, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xeb15a951c50969aa, 0x5c23ffd687246656, 0x0, 0x0}, v2_int128 = {0x5c23ffd687246656eb15a951c50969aa, 0x00000000000000000000000000000000}} >ymm15 {v8_float = {0x7, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x2aa3a441d2, 0x0, 0x0}, v32_int8 = {0x20, 0x2d, 0xe9, 0x40, 0x4e, 0x5b, 0x4e, 0x1d, 0x6e, 0x20, 0xe9, 0x20, 0xd2, 0x51, 0x45, 0x42, 0x0 <repeats 16 times>}, v16_int16 = {0x2d20, 0x40e9, 0x5b4e, 0x1d4e, 0x206e, 0x20e9, 0x51d2, 0x4245, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x40e92d20, 0x1d4e5b4e, 0x20e9206e, 0x424551d2, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x1d4e5b4e40e92d20, 0x424551d220e9206e, 0x0, 0x0}, v2_int128 = {0x424551d220e9206e1d4e5b4e40e92d20, 0x00000000000000000000000000000000}} >Dump of assembler code for function gssapi_destroy_signverify_ctx: > 0x0000003ad1372640 <+0>: push %rbp > 0x0000003ad1372641 <+1>: push %rbx > 0x0000003ad1372642 <+2>: sub $0x8,%rsp > 0x0000003ad1372646 <+6>: mov 0x20(%rdi),%rbp > 0x0000003ad137264a <+10>: test %rbp,%rbp > 0x0000003ad137264d <+13>: je 0x3ad1372687 <gssapi_destroy_signverify_ctx+71> >=> 0x0000003ad137264f <+15>: cmpq $0x0,0x0(%rbp) > 0x0000003ad1372654 <+20>: mov %rdi,%rbx > 0x0000003ad1372657 <+23>: je 0x3ad1372661 <gssapi_destroy_signverify_ctx+33> > 0x0000003ad1372659 <+25>: mov %rbp,%rdi > 0x0000003ad137265c <+28>: callq 0x3ad1228780 <isc_buffer_free@plt> > 0x0000003ad1372661 <+33>: mov 0x10(%rbx),%rdi > 0x0000003ad1372665 <+37>: lea 0x32d9e(%rip),%rcx # 0x3ad13a540a > 0x0000003ad137266c <+44>: mov $0x60,%r8d > 0x0000003ad1372672 <+50>: mov $0x8,%edx > 0x0000003ad1372677 <+55>: mov %rbp,%rsi > 0x0000003ad137267a <+58>: callq 0x3ad1226a80 <isc___mem_put@plt> > 0x0000003ad137267f <+63>: movq $0x0,0x20(%rbx) > 0x0000003ad1372687 <+71>: add $0x8,%rsp > 0x0000003ad137268b <+75>: pop %rbx > 0x0000003ad137268c <+76>: pop %rbp > 0x0000003ad137268d <+77>: retq >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1155127
: 948907 |
948908
|
948909
|
948910
|
948911
|
948912
|
948913
|
948914
|
948915
|
948916
|
948917