Note: This bug is displayed in read-only format because
the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
DescriptionRed Hat Case Diagnostics
2011-06-26 02:48:02 UTC
This description generated by Andreas from an ABRT report
architecture: x86_64
cmdline: /usr/libexec/gvfsd-archive file=/home/amit/rhel-server-6.1-x86_64-dvd.iso
component: gvfs
executable: /usr/libexec/gvfsd-archive
kernel: 2.6.32-71.el6.x86_64
package: gvfs-archive-1.4.3-9.el6
reason: Process /usr/libexec/gvfsd-archive was killed by signal 6 (SIGABRT)
release: Red Hat Enterprise Linux Server release 6.0 (Santiago)
time: 1309055371
uid: 501
backtrace: [New Thread 32406]
[New Thread 32405]
Core was generated by `/usr/libexec/gvfsd-archive file=/home/amit/rhel-server-6.1-x86_64-dvd.iso'.
Program terminated with signal 6, Aborted.
#0 0x000000328e6329a5 in raise () from /lib64/libc.so.6
Thread 2 (Thread 32405):
#0 0x000000328e6d7e33 in poll () from /lib64/libc.so.6
No symbol table info available.
#1 0x000000329023c655 in ?? () from /lib64/libglib-2.0.so.0
No symbol table info available.
#2 0x000000329023cd55 in g_main_loop_run () from /lib64/libglib-2.0.so.0
No symbol table info available.
#3 0x00000000004090fe in ?? ()
No symbol table info available.
#4 0x000000000040938c in ?? ()
No symbol table info available.
#5 0x000000328e61ec5d in __libc_start_main () from /lib64/libc.so.6
No symbol table info available.
#6 0x00000000004077f9 in ?? ()
No symbol table info available.
#7 0x00007fff312d2178 in ?? ()
No symbol table info available.
#8 0x000000000000001c in ?? ()
No symbol table info available.
#9 0x0000000000000002 in ?? ()
No symbol table info available.
#10 0x00007fff312d2a9f in ?? ()
No symbol table info available.
#11 0x00007fff312d2aba in ?? ()
No symbol table info available.
#12 0x0000000000000000 in ?? ()
No symbol table info available.
Thread 1 (Thread 32406):
#0 0x000000328e6329a5 in raise () from /lib64/libc.so.6
No symbol table info available.
#1 0x000000328e634185 in abort () from /lib64/libc.so.6
No symbol table info available.
#2 0x000000329025ea7f in g_assertion_message () from /lib64/libglib-2.0.so.0
No symbol table info available.
#3 0x000000329025f020 in g_assertion_message_expr ()
from /lib64/libglib-2.0.so.0
No symbol table info available.
#4 0x0000000000407aa7 in ?? ()
No symbol table info available.
#5 0x0000003291a0dacf in g_object_unref () from /lib64/libgobject-2.0.so.0
No symbol table info available.
#6 0x000000000040eda7 in ?? ()
No symbol table info available.
#7 0x0000003291a0dacf in g_object_unref () from /lib64/libgobject-2.0.so.0
No symbol table info available.
#8 0x000000329026360b in ?? () from /lib64/libglib-2.0.so.0
No symbol table info available.
#9 0x0000003290262074 in ?? () from /lib64/libglib-2.0.so.0
No symbol table info available.
#10 0x000000328ea077e1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#11 0x000000328e6e153d in clone () from /lib64/libc.so.6
No symbol table info available.
From To Syms Read Shared Object Library
0x0000003929008e30 0x0000003929012a98 Yes (*) /usr/lib64/libgvfscommon.so.0
0x0000003290a01590 0x0000003290a029e8 Yes (*) /lib64/libgthread-2.0.so.0
0x0000003298618950 0x000000329867ac48 Yes (*) /lib64/libgio-2.0.so.0
0x0000003291a08970 0x0000003291a31f78 Yes (*) /lib64/libgobject-2.0.so.0
0x0000003294201080 0x0000003294201fc8 Yes (*) /lib64/libgmodule-2.0.so.0
0x000000328fe07090 0x000000328fe2e4c8 Yes (*) /lib64/libdbus-1.so.3
0x000000328ea05640 0x000000328ea10ec8 Yes (*) /lib64/libpthread.so.0
0x000000328f602140 0x000000328f6055a8 Yes (*) /lib64/librt.so.1
0x0000003936604730 0x000000393660f708 Yes (*) /usr/lib64/libgnome-keyring.so.0
0x0000003290213470 0x000000329028a188 Yes (*) /lib64/libglib-2.0.so.0
0x000000392a009ac0 0x000000392a0344f8 Yes (*) /usr/lib64/libarchive.so.2
0x0000003932400e10 0x0000003932401688 Yes (*) /lib64/libutil.so.1
0x000000328e61e9a0 0x000000328e72b840 Yes (*) /lib64/libc.so.6
0x000000328e200de0 0x000000328e201998 Yes (*) /lib64/libdl.so.2
0x00000032906038c0 0x0000003290612558 Yes (*) /lib64/libresolv.so.2
0x000000328ee05610 0x000000328ee15708 Yes (*) /lib64/libselinux.so.1
0x000000328de00af0 0x000000328de18924 Yes (*) /lib64/ld-linux-x86-64.so.2
0x0000003930601d30 0x0000003930605c08 Yes (*) /lib64/libacl.so.1
0x0000003930a01350 0x0000003930a03428 Yes (*) /lib64/libattr.so.1
0x000000329325c900 0x0000003293320d08 Yes (*) /usr/lib64/libcrypto.so.10
0x00000032996025d0 0x0000003299616978 Yes (*) /usr/lib64/liblzma.so.0
0x0000003297601630 0x000000329760dcc8 Yes (*) /lib64/libbz2.so.1
0x000000329922c600 0x0000003299307f88 Yes (*) /usr/lib64/libxml2.so.2
0x000000328fa01ef0 0x000000328fa0d1a8 Yes (*) /lib64/libz.so.1
0x000000328f203ea0 0x000000328f243fa8 Yes (*) /lib64/libm.so.6
0x00007f4b3f7d8940 0x00007f4b3f7f1358 Yes (*) /usr/lib64/gio/modules/libgvfsdbus.so
0x0000003c97c02880 0x0000003c97c0a788 Yes (*) /lib64/libudev.so.0
0x00007f4b3f3bdb70 0x00007f4b3f3c95b8 Yes (*) /usr/lib64/gio/modules/libgioremote-volume-monitor.so
0x00007f4b3f1af110 0x00007f4b3f1b70b8 Yes (*) /lib64/libnss_files.so.2
(*): Shared library is missing debugging information.
$1 = 0x0
No symbol table is loaded. Use the "file" command.
rax 0x0 0
rbx 0x7f4b38006090 139961038823568
rcx 0xffffffffffffffff -1
rdx 0x6 6
rsi 0x7e96 32406
rdi 0x7e95 32405
rbp 0x41a046 0x41a046
rsp 0x7f4b403f9b08 0x7f4b403f9b08
r8 0x0 0
r9 0x12 18
r10 0x8 8
r11 0x206 518
r12 0x41a2d0 4301520
r13 0x7f4b38018410 139961038898192
r14 0x7f4b403f9c70 139961177185392
r15 0x3 3
rip 0x328e6329a5 0x328e6329a5 <raise+53>
eflags 0x206 [ PF IF ]
cs 0x33 51
ss 0x2b 43
ds 0x0 0
es 0x0 0
fs 0x0 0
gs 0x0 0
Dump of assembler code for function raise:
0x000000328e632970 <+0>: mov %fs:0x2d4,%eax
0x000000328e632978 <+8>: mov %fs:0x2d0,%esi
0x000000328e632980 <+16>: test %esi,%esi
0x000000328e632982 <+18>: jne 0x328e6329b0 <raise+64>
0x000000328e632984 <+20>: mov $0xba,%eax
0x000000328e632989 <+25>: syscall
0x000000328e63298b <+27>: mov %eax,%esi
0x000000328e63298d <+29>: mov %eax,%fs:0x2d0
0x000000328e632995 <+37>: movslq %edi,%rdx
0x000000328e632998 <+40>: movslq %esi,%rsi
0x000000328e63299b <+43>: movslq %eax,%rdi
0x000000328e63299e <+46>: mov $0xea,%eax
0x000000328e6329a3 <+51>: syscall
=> 0x000000328e6329a5 <+53>: cmp $0xfffffffffffff000,%rax
0x000000328e6329ab <+59>: ja 0x328e6329bf <raise+79>
0x000000328e6329ad <+61>: repz retq
0x000000328e6329af <+63>: nop
0x000000328e6329b0 <+64>: test %eax,%eax
0x000000328e6329b2 <+66>: jg 0x328e632995 <raise+37>
0x000000328e6329b4 <+68>: test $0x7fffffff,%eax
0x000000328e6329b9 <+73>: jne 0x328e6329cf <raise+95>
0x000000328e6329bb <+75>: mov %esi,%eax
0x000000328e6329bd <+77>: jmp 0x328e632995 <raise+37>
0x000000328e6329bf <+79>: mov 0x3465da(%rip),%rdx # 0x328e978fa0
0x000000328e6329c6 <+86>: neg %eax
0x000000328e6329c8 <+88>: mov %eax,%fs:(%rdx)
0x000000328e6329cb <+91>: or $0xffffffffffffffff,%eax
0x000000328e6329ce <+94>: retq
0x000000328e6329cf <+95>: neg %eax
0x000000328e6329d1 <+97>: jmp 0x328e632995 <raise+37>
End of assembler dump.
Comment 2Red Hat Case Diagnostics
2011-06-26 02:48:37 UTC