Bug 2224635

Summary: [abrt] davfs2: ne_path_escapef(): mount.davfs killed by SIGSEGV
Product: [Fedora] Fedora Reporter: Petr Michalek <petr.michalek>
Component: davfs2Assignee: Felix Schwarz <fschwarz>
Status: NEW --- QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 38CC: fschwarz, petr.michalek
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Unspecified   
URL: https://retrace.fedoraproject.org/faf/reports/bthash/e9fcc46d003dbd2eec5642265ccb5c6f6666149
Whiteboard: abrt_hash:6fc106480279f8f8738308525fe06f47539564ce;VARIANT_ID=workstation;
Fixed In Version: Doc Type: ---
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
File: maps
none
File: backtrace
none
File: core_backtrace
none
File: exploitable
none
File: cpuinfo
none
File: dso_list
none
File: os_info
none
File: limits
none
File: proc_pid_status none

Description Petr Michalek 2023-07-21 18:23:01 UTC
Description of problem:
Mount.davfs2 crashed after some time of non-use and subsequent attempt to reuse the mounted davfs directory.

Remount possible after "fusermount -u /mountpoint" and deletion cache dir in .davfs2 directory.

Version-Release number of selected component:
davfs2-1.7.0-2.fc38

Additional info:
reporter:       libreport-2.17.11
journald_cursor: s=e664e98ea35d42e0b73b7804344a7483;i=104f58;b=01030dfc96504d7a95c1ae75e329dfac;m=86e4c2debe;t=5fc4884aee90e;x=7987ee354390ef17
uid:            1000
rootdir:        /
runlevel:       N 5
backtrace_rating: 4
type:           CCpp
crash_function: ne_path_escapef
reason:         mount.davfs killed by SIGSEGV
kernel:         6.2.15-300.fc38.x86_64
package:        davfs2-1.7.0-2.fc38
executable:     /usr/sbin/mount.davfs

Truncated backtrace:
Thread no. 1 (6 frames)
 #0 ne_path_escapef at /usr/src/debug/neon-0.32.5-1.fc38.x86_64/src/ne_uri.c:497
 #1 ne_path_escape at /usr/src/debug/neon-0.32.5-1.fc38.x86_64/src/ne_uri.c:484
 #2 dav_get_collection.constprop.0 at /usr/src/debug/davfs2-1.7.0-2.fc38.x86_64/src/webdav.c:712
 #3 dav_lookup.constprop.0 at /usr/src/debug/davfs2-1.7.0-2.fc38.x86_64/src/cache.c:1029
 #4 fuse_lookup at /usr/src/debug/davfs2-1.7.0-2.fc38.x86_64/src/dav_fuse.c:617
 #5 dav_fuse_loop at /usr/src/debug/davfs2-1.7.0-2.fc38.x86_64/src/dav_fuse.c:238

Comment 1 Petr Michalek 2023-07-21 18:23:04 UTC
Created attachment 1976980 [details]
File: maps

Comment 2 Petr Michalek 2023-07-21 18:23:06 UTC
Created attachment 1976981 [details]
File: backtrace

Comment 3 Petr Michalek 2023-07-21 18:23:08 UTC
Created attachment 1976982 [details]
File: core_backtrace

Comment 4 Petr Michalek 2023-07-21 18:23:09 UTC
Created attachment 1976983 [details]
File: exploitable

Comment 5 Petr Michalek 2023-07-21 18:23:10 UTC
Created attachment 1976984 [details]
File: cpuinfo

Comment 6 Petr Michalek 2023-07-21 18:23:11 UTC
Created attachment 1976985 [details]
File: dso_list

Comment 7 Petr Michalek 2023-07-21 18:23:13 UTC
Created attachment 1976986 [details]
File: os_info

Comment 8 Petr Michalek 2023-07-21 18:23:14 UTC
Created attachment 1976987 [details]
File: limits

Comment 9 Petr Michalek 2023-07-21 18:23:15 UTC
Created attachment 1976988 [details]
File: proc_pid_status