Details
-
Improvement
-
Resolution: Done
-
Major - P3
-
None
-
None
-
None
-
None
Description
Currently there is very little useful information on segfault:
Wed Dec 21 19:49:21 Invalid access at address: 0x2aaaab9c6ad0
|
Wed Dec 21 19:49:21 Got signal: 11 (Segmentation fault).
|
Wed Dec 21 19:49:21 Backtrace:
|
0xb4c164 0xb50b2c 0x2aaaaacd5540 0x2aaaab9c6ad0
|
/mnt/home/buildbot/slave/Linux_64bit/mongo/mongod(_ZN5mongo10abruptQuitEi+0x3d4) [0xb4c164]
|
/mnt/home/buildbot/slave/Linux_64bit/mongo/mongod(_ZN5mongo24abruptQuitWithAddrSignalEiP7siginfoPv+0x22c) [0xb50b2c]
|
/lib64/libpthread.so.0 [0x2aaaaacd5540]
|
/lib64/libc.so.6 [0x2aaaab9c6ad0]
|
It seems that the address printed after "Invalid access at address" is the address of the instruction pointer in the thread that received the segfault signal. It would be nice to have the address that was actually faulted on, as well as the stack trace of the thread that triggered the segfault instead of the one that received the signal.
Attachments
Issue Links
- related to
-
SERVER-4544 "unable to connect to mongo program on port 31000" in auth2.js test
-
- Closed
-