[systemd-bugs] [Bug 75854] New: systemd --user process segfaults randomly
bugzilla-daemon at freedesktop.org
bugzilla-daemon at freedesktop.org
Thu Mar 6 13:36:26 PST 2014
https://bugs.freedesktop.org/show_bug.cgi?id=75854
Priority: medium
Bug ID: 75854
Assignee: systemd-bugs at lists.freedesktop.org
Summary: systemd --user process segfaults randomly
QA Contact: systemd-bugs at lists.freedesktop.org
Severity: normal
Classification: Unclassified
OS: Linux (All)
Reporter: abdo.roig at gmail.com
Hardware: x86-64 (AMD64)
Status: NEW
Version: unspecified
Component: general
Product: systemd
I'm using systemd --user rather heavily to manage my processes. Since I updated
from 208 to 210 on Arch Linux, I experience sporadic segfaults on the user
instance, which I can't reproduce for now, only wait for it to happen again.
>From a coredump and an unstripped binary compiled a posteriory, I managed get a
partial stack trace, which I attach below. I'm not certain why there is still
missing debug data...
Is there anything else I can get from that coredump?
Core was generated by `/usr/lib/systemd/systemd --user'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0 0x000000000048101e in get_user_creds (username=0x251b2f0, uid=0x3dd,
gid=0x7fffa11d002f, home=0x0, shell=0x7fffa11dec10) at src/shared/util.c:4217
4217 if (p)
(gdb) bt full
#0 0x000000000048101e in get_user_creds (username=0x251b2f0, uid=0x3dd,
gid=0x7fffa11d002f, home=0x0, shell=0x7fffa11dec10) at src/shared/util.c:4217
p = 0x0
u = 0
__PRETTY_FUNCTION__ = "get_user_creds"
__PRETTY_FUNCTION__ = "get_user_creds"
#1 0x00007fffa11dec10 in ?? ()
No symbol table info available.
#2 0x00007fffa11dec10 in ?? ()
No symbol table info available.
#3 0x0000000000000010 in ?? ()
No symbol table info available.
#4 0x000000000248d1b0 in ?? ()
No symbol table info available.
#5 0x000000000042322c in socket_add_default_dependencies (s=0x0) at
src/core/socket.c:286
r = <optimized out>
#6 socket_add_extras (s=0x0) at src/core/socket.c:356
u = 0x0
r = <optimized out>
__PRETTY_FUNCTION__ = "socket_add_extras"
#7 socket_load.9848 (u=<optimized out>) at src/core/socket.c:412
r = <optimized out>
__PRETTY_FUNCTION__ = "socket_load"
__PRETTY_FUNCTION__ = "socket_load"
#8 0x00000000024ca280 in ?? ()
No symbol table info available.
#9 0x0000000000000011 in ?? ()
No symbol table info available.
#10 0x0000000000000001 in ?? ()
No symbol table info available.
#11 0x00000000000003dd in ?? ()
No symbol table info available.
#12 0x0000000000000000 in ?? ()
No symbol table info available.
--
You are receiving this mail because:
You are the QA Contact for the bug.
You are the assignee for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freedesktop.org/archives/systemd-bugs/attachments/20140306/546dc8bb/attachment.html>
More information about the systemd-bugs
mailing list