Note: This bug is displayed in read-only format because
the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Description of problem: Squid crash assembler dump- Core was generated by `(squid) -f /etc/squid/squid.conf'. Program terminated with signal 6, Aborted. #0 0x00007fb2680355e5 in raise () from /lib64/libc.so.6 Thread 1 (Thread 0x7fb26a78c7e0 (LWP 27629)): #0 0x00007fb2680355e5 in raise () from /lib64/libc.so.6 No symbol table info available. #1 0x00007fb268036dc5 in abort () from /lib64/libc.so.6 No symbol table info available. #2 0x00007fb26a8bd355 in xassert () No symbol table info available. #3 0x00007fb26a8c7e40 in file_write () No symbol table info available. #4 0x00007fb26a9ac51d in UFSSwapDir::logEntry(StoreEntry const&, int) const () No symbol table info available. #5 0x00007fb26a9b3a7d in RebuildState::rebuildFromSwapLog() () No symbol table info available. #6 0x00007fb26a9b5ad9 in RebuildState::RebuildStep(void*) () No symbol table info available. #7 0x00007fb26a9731f4 in AsyncCall::make() () No symbol table info available. #8 0x00007fb26a97581b in AsyncCallQueue::fireNext() () No symbol table info available. #9 0x00007fb26a9759b0 in AsyncCallQueue::fire() () No symbol table info available. #10 0x00007fb26a8d2043 in EventLoop::runOnce() () No symbol table info available. #11 0x00007fb26a8d2178 in EventLoop::run() () No symbol table info available. #12 0x00007fb26a920c95 in SquidMain(int, char**) () No symbol table info available. #13 0x00007fb26a921263 in main () No symbol table info available. From To Syms Read Shared Object Library 0x00007fb26a3821a0 0x00007fb26a385558 Yes (*) /lib64/librt.so.1 0x00007fb26a168790 0x00007fb26a174198 Yes (*) /lib64/libpthread.so.0 0x00007fb269f2cc00 0x00007fb269f319a8 Yes (*) /lib64/libcrypt.so.1 0x00007fb269c05830 0x00007fb269ce2df8 Yes (*) /usr/lib64/libxml2.so.2 0x00007fb2699b4cd0 0x00007fb2699cdc88 Yes /lib64/libexpat.so.1.5.2 0x00007fb26975d2f0 0x00007fb269798508 Yes (*) /usr/lib64/libssl.so.10 0x00007fb2693cacc0 0x00007fb2694bfb48 Yes (*) /usr/lib64/libcrypto.so.10 0x00007fb26914c070 0x00007fb2691599f8 Yes (*) /lib64/libnsl.so.1 0x00007fb268f45330 0x00007fb268f46ca8 Yes /lib64/libcap.so.2.16 0x00007fb268d40de0 0x00007fb268d41998 Yes (*) /lib64/libdl.so.2 0x00007fb268b39370 0x00007fb268b3d758 Yes /usr/lib64/libltdl.so.7.2.1 0x00007fb2688873f0 0x00007fb2688f4396 Yes (*) /usr/lib64/libstdc++.so.6 0x00007fb2685b0e70 0x00007fb2685f0fb8 Yes (*) /lib64/libm.so.6 0x00007fb268399910 0x00007fb2683a9f78 Yes (*) /lib64/libgcc_s.so.1 0x00007fb268021a60 0x00007fb26814320c Yes (*) /lib64/libc.so.6 0x00007fb26a588b00 0x00007fb26a5a20cb Yes (*) /lib64/ld-linux-x86-64.so.2 0x00007fb267e00a90 0x00007fb267e011c8 Yes /lib64/libfreebl3.so 0x00007fb267bec120 0x00007fb267bf73a8 Yes /lib64/libz.so.1.2.3 0x00007fb2679b0c90 0x00007fb2679de7f8 Yes (*) /lib64/libgssapi_krb5.so.2 0x00007fb2676da540 0x00007fb2677545e8 Yes (*) /lib64/libkrb5.so.3 0x00007fb2674bc3f0 0x00007fb2674bcfc8 Yes (*) /lib64/libcom_err.so.2 0x00007fb2672933d0 0x00007fb2672ac5a8 Yes (*) /lib64/libk5crypto.so.3 0x00007fb26708b380 0x00007fb26708d458 Yes /lib64/libattr.so.1.1.0 0x00007fb266e81a40 0x00007fb266e870d8 Yes (*) /lib64/libkrb5support.so.0 0x00007fb266c7cbf0 0x00007fb266c7d1d8 Yes /lib64/libkeyutils.so.1.3 0x00007fb266a65930 0x00007fb266a74a98 Yes (*) /lib64/libresolv.so.2 0x00007fb266848950 0x00007fb266858e38 Yes (*) /lib64/libselinux.so.1 0x00007fb2666371f0 0x00007fb26663f6e8 Yes (*) /lib64/libnss_files.so.2 0x00007fb266430000 0x00007fb266433488 Yes (*) /lib64/libnss_dns.so.2 (*): Shared library is missing debugging information. $1 = 0x0 No symbol "__glib_assert_msg" in current context. rax 0x0 0 rbx 0x7fb26aa250e7 140404269928679 rcx 0xffffffffffffffff -1 rdx 0x6 6 rsi 0x6bed 27629 rdi 0x6bed 27629 rbp 0x7fb26b371ff0 0x7fb26b371ff0 rsp 0x7ffd28d80ad8 0x7ffd28d80ad8 r8 0xffffffff 4294967295 r9 0x632e6b736964203a 7146767802117136442 r10 0x8 8 r11 0x206 518 r12 0x7fb26b371ff0 140404279681008 r13 0x179 377 r14 0x7fb265e2de90 140404190273168 r15 0x0 0 rip 0x7fb2680355e5 0x7fb2680355e5 <raise+53> eflags 0x206 [ PF IF ] cs 0x33 51 ss 0x2b 43 ds 0x0 0 es 0x0 0 fs 0x0 0 gs 0x0 0 st0 -nan(0x000000034) (raw 0xffff0000000000000034) st1 -nan(0x00000000c) (raw 0xffff000000000000000c) st2 -nan(0xf83854b17639d000) (raw 0xfffff83854b17639d000) st3 -nan(0x1f83854b17639d) (raw 0xffff001f83854b17639d) st4 0 (raw 0x00000000000000000000) st5 0 (raw 0x00000000000000000000) st6 0 (raw 0x00000000000000000000) st7 -nan(0x000000001) (raw 0xffff0000000000000001) fctrl 0x37f 895 fstat 0x0 0 ftag 0xffff 65535 fiseg 0x0 0 fioff 0x0 0 foseg 0x0 0 fooff 0x0 0 fop 0x0 0 mxcsr 0x1fa1 [ IE PE IM DM ZM OM UM PM ] ymm0 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0 <repeats 26 times>}, v16_int16 = {0x0, 0x0, 0xff00, 0x0 <repeats 13 times>}, v8_int32 = {0x0, 0xff00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xff0000000000, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000ff0000000000, 0x00000000000000000000000000000000}} ymm1 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x25 <repeats 16 times>, 0x0 <repeats 16 times>}, v16_int16 = {0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x25252525, 0x25252525, 0x25252525, 0x25252525, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x2525252525252525, 0x2525252525252525, 0x0, 0x0}, v2_int128 = {0x25252525252525252525252525252525, 0x00000000000000000000000000000000}} ymm2 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} ymm3 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x8000000000000000, 0x0, 0x0}, v32_int8 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x0 <repeats 16 times>}, v16_int16 = {0x0, 0x0, 0x0, 0x0, 0xffff, 0xffff, 0xffff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x0, 0x0, 0xffffffff, 0xffffffff, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0xffffffffffffffff, 0x0, 0x0}, v2_int128 = {0xffffffffffffffff0000000000000000, 0x00000000000000000000000000000000}} ymm4 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0xb2, 0x53, 0x98, 0x7b, 0x1c, 0xb7, 0x43, 0xbe, 0x0 <repeats 24 times>}, v16_int16 = {0x53b2, 0x7b98, 0xb71c, 0xbe43, 0x0 <repeats 12 times>}, v8_int32 = {0x7b9853b2, 0xbe43b71c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xbe43b71c7b9853b2, 0x0, 0x0, 0x0}, v2_int128 = {0x0000000000000000be43b71c7b9853b2, 0x00000000000000000000000000000000}} ymm5 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0xf4, 0x5, 0x89, 0xe2, 0xc0, 0xf8, 0x36, 0xbe, 0x0 <repeats 24 times>}, v16_int16 = {0x5f4, 0xe289, 0xf8c0, 0xbe36, 0x0 <repeats 12 times>}, v8_int32 = {0xe28905f4, 0xbe36f8c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xbe36f8c0e28905f4, 0x0, 0x0, 0x0}, v2_int128 = {0x0000000000000000be36f8c0e28905f4, 0x00000000000000000000000000000000}} ymm6 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0xbc, 0x6b, 0xf7, 0xb0, 0xd9, 0x25, 0x29, 0xbe, 0x0 <repeats 24 times>}, v16_int16 = {0x6bbc, 0xb0f7, 0x25d9, 0xbe29, 0x0 <repeats 12 times>}, v8_int32 = {0xb0f76bbc, 0xbe2925d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xbe2925d9b0f76bbc, 0x0, 0x0, 0x0}, v2_int128 = {0x0000000000000000be2925d9b0f76bbc, 0x00000000000000000000000000000000}} ymm7 {v8_float = {0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x1000000, 0x0, 0x0, 0x0}, v32_int8 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, 0x41, 0x0 <repeats 24 times>}, v16_int16 = {0x0, 0x0, 0x0, 0x4170, 0x0 <repeats 12 times>}, v8_int32 = {0x0, 0x41700000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x4170000000000000, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000004170000000000000, 0x00000000000000000000000000000000}} ymm8 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x8000000000000000, 0x8000000000000000, 0x0, 0x0}, v32_int8 = {0x0, 0x0, 0x0, 0x0, 0xff <repeats 12 times>, 0x0 <repeats 16 times>}, v16_int16 = {0x0, 0x0, 0xffff, 0xffff, 0xffff, 0xffff, 0xffff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x0, 0xffffffff, 0xffffffff, 0xffffffff, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xffffffff00000000, 0xffffffffffffffff, 0x0, 0x0}, v2_int128 = {0xffffffffffffffffffffffff00000000, 0x00000000000000000000000000000000}} ymm9 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 12 times>, 0x20, 0x20, 0x20, 0x20, 0x0 <repeats 16 times>}, v16_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2020, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x0, 0x0, 0x0, 0x20202020, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x2020202000000000, 0x0, 0x0}, v2_int128 = {0x20202020000000000000000000000000, 0x00000000000000000000000000000000}} ymm10 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x8000000000000000, 0x0, 0x0}, v32_int8 = {0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x0 <repeats 16 times>}, v16_int16 = {0x0, 0x0, 0xff, 0x0, 0xffff, 0xffff, 0xffff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x0, 0xff, 0xffffffff, 0xffffffff, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xff00000000, 0xffffffffffffffff, 0x0, 0x0}, v2_int128 = {0xffffffffffffffff000000ff00000000, 0x00000000000000000000000000000000}} ymm11 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x44, 0x65, 0xbe, 0xff, 0x7b, 0x60, 0x72, 0x3d, 0x0 <repeats 24 times>}, v16_int16 = {0x6544, 0xffbe, 0x607b, 0x3d72, 0x0 <repeats 12 times>}, v8_int32 = {0xffbe6544, 0x3d72607b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x3d72607bffbe6544, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000003d72607bffbe6544, 0x00000000000000000000000000000000}} ymm12 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x18, 0xdc, 0x77, 0x62, 0x5e, 0x95, 0xbe, 0x3e, 0x0 <repeats 24 times>}, v16_int16 = {0xdc18, 0x6277, 0x955e, 0x3ebe, 0x0 <repeats 12 times>}, v8_int32 = {0x6277dc18, 0x3ebe955e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x3ebe955e6277dc18, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000003ebe955e6277dc18, 0x00000000000000000000000000000000}} ymm13 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x9a, 0xfd, 0x4d, 0xaa, 0xf7, 0x88, 0xbd, 0x3b, 0x0 <repeats 24 times>}, v16_int16 = {0xfd9a, 0xaa4d, 0x88f7, 0x3bbd, 0x0 <repeats 12 times>}, v8_int32 = {0xaa4dfd9a, 0x3bbd88f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x3bbd88f7aa4dfd9a, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000003bbd88f7aa4dfd9a, 0x00000000000000000000000000000000}} ymm14 {v8_float = {0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0xd, 0x0, 0x0, 0x0}, v32_int8 = {0x80, 0x22, 0xc9, 0x8e, 0xef, 0x56, 0x2a, 0x40, 0x0 <repeats 24 times>}, v16_int16 = {0x2280, 0x8ec9, 0x56ef, 0x402a, 0x0 <repeats 12 times>}, v8_int32 = {0x8ec92280, 0x402a56ef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x402a56ef8ec92280, 0x0, 0x0, 0x0}, v2_int128 = {0x0000000000000000402a56ef8ec92280, 0x00000000000000000000000000000000}} ymm15 {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x00000000000000000000000000000000, 0x00000000000000000000000000000000}} Dump of assembler code for function raise: 0x00007fb2680355b0 <+0>: mov %fs:0x2d4,%eax 0x00007fb2680355b8 <+8>: mov %fs:0x2d0,%esi 0x00007fb2680355c0 <+16>: test %esi,%esi 0x00007fb2680355c2 <+18>: jne 0x7fb2680355f0 <raise+64> 0x00007fb2680355c4 <+20>: mov $0xba,%eax 0x00007fb2680355c9 <+25>: syscall 0x00007fb2680355cb <+27>: mov %eax,%esi 0x00007fb2680355cd <+29>: mov %eax,%fs:0x2d0 0x00007fb2680355d5 <+37>: movslq %edi,%rdx 0x00007fb2680355d8 <+40>: movslq %esi,%rsi 0x00007fb2680355db <+43>: movslq %eax,%rdi 0x00007fb2680355de <+46>: mov $0xea,%eax 0x00007fb2680355e3 <+51>: syscall => 0x00007fb2680355e5 <+53>: cmp $0xfffffffffffff000,%rax 0x00007fb2680355eb <+59>: ja 0x7fb2680355ff <raise+79> 0x00007fb2680355ed <+61>: repz retq 0x00007fb2680355ef <+63>: nop 0x00007fb2680355f0 <+64>: test %eax,%eax 0x00007fb2680355f2 <+66>: jg 0x7fb2680355d5 <raise+37> 0x00007fb2680355f4 <+68>: test $0x7fffffff,%eax 0x00007fb2680355f9 <+73>: jne 0x7fb26803560f <raise+95> 0x00007fb2680355fb <+75>: mov %esi,%eax 0x00007fb2680355fd <+77>: jmp 0x7fb2680355d5 <raise+37> 0x00007fb2680355ff <+79>: mov 0x35b9a2(%rip),%rdx # 0x7fb268390fa8 0x00007fb268035606 <+86>: neg %eax 0x00007fb268035608 <+88>: mov %eax,%fs:(%rdx) 0x00007fb26803560b <+91>: or $0xffffffffffffffff,%eax 0x00007fb26803560e <+94>: retq 0x00007fb26803560f <+95>: neg %eax 0x00007fb268035611 <+97>: jmp 0x7fb2680355d5 <raise+37> End of assembler dump. Version-Release number of selected component (if applicable): squid-3.1.23-20.testing2.el6.x86_64.rpm How reproducible: Once Steps to Reproduce: NA Actual results: NA Expected results: NA Additional info: