Bug 1001722

Summary: [abrt] qemu-system-cris-1.6.0-4.fc21: output_type_enum: Process /usr/bin/qemu-system-cris was killed by signal 11 (SIGSEGV)
Product: [Fedora] Fedora Reporter: piio <bugzilla>
Component: qemuAssignee: Fedora Virtualization Maintainers <virt-maint>
Status: CLOSED INSUFFICIENT_DATA QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: rawhideCC: amit.shah, berrange, cfergeau, crobinso, dwmw2, itamar, pbonzini, rjones, scottt.tw, virt-maint
Target Milestone: ---   
Target Release: ---   
Hardware: i686   
OS: Unspecified   
Whiteboard: abrt_hash:958a2fb8999a04ae1196957521d5da0538a4d31c
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-08-30 23:12:50 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Attachments:
Description Flags
File: backtrace
none
File: cgroup
none
File: core_backtrace
none
File: dso_list
none
File: environ
none
File: exploitable
none
File: limits
none
File: maps
none
File: open_fds
none
File: proc_pid_status
none
File: var_log_messages none

Description piio 2013-08-27 15:10:19 UTC
Version-Release number of selected component:
qemu-system-cris-1.6.0-4.fc21

Additional info:
reporter:       libreport-2.1.6
backtrace_rating: 4
cmdline:        /usr/bin/qemu-system-cris -S -no-user-config -nodefaults -nographic -M none -qmp unix:/var/lib/libvirt/qemu/capabilities.monitor.sock,server,nowait -pidfile /var/lib/libvirt/qemu/capabilities.pidfile -daemonize
crash_function: output_type_enum
executable:     /usr/bin/qemu-system-cris
kernel:         3.11.0-0.rc5.git3.2.fc20.i686+PAE
runlevel:       N 5
uid:            107

Truncated backtrace:
Thread no. 1 (10 frames)
 #0 output_type_enum
 #1 visit_type_enum
 #2 visit_type_TpmTypeList
 #3 qmp_marshal_input_query_tpm_types
 #4 handle_qmp_command
 #5 json_message_process_token
 #6 json_lexer_feed_char
 #7 json_lexer_feed
 #8 json_message_parser_feed
 #9 monitor_control_read

Comment 1 piio 2013-08-27 15:10:26 UTC
Created attachment 791052 [details]
File: backtrace

Comment 2 piio 2013-08-27 15:10:32 UTC
Created attachment 791053 [details]
File: cgroup

Comment 3 piio 2013-08-27 15:10:38 UTC
Created attachment 791054 [details]
File: core_backtrace

Comment 4 piio 2013-08-27 15:10:44 UTC
Created attachment 791055 [details]
File: dso_list

Comment 5 piio 2013-08-27 15:10:50 UTC
Created attachment 791056 [details]
File: environ

Comment 6 piio 2013-08-27 15:10:55 UTC
Created attachment 791057 [details]
File: exploitable

Comment 7 piio 2013-08-27 15:11:02 UTC
Created attachment 791058 [details]
File: limits

Comment 8 piio 2013-08-27 15:11:10 UTC
Created attachment 791059 [details]
File: maps

Comment 9 piio 2013-08-27 15:11:15 UTC
Created attachment 791060 [details]
File: open_fds

Comment 10 piio 2013-08-27 15:11:21 UTC
Created attachment 791061 [details]
File: proc_pid_status

Comment 11 piio 2013-08-27 15:11:26 UTC
Created attachment 791062 [details]
File: var_log_messages

Comment 12 Cole Robinson 2013-08-30 23:12:50 UTC
Strange, must come from libvirt probing. Unfortunately the backtrace isn't too useful, so closing INSUFFICIENT_DATA