Bug 716652 - [abrt] gvfs-archive-1.4.3-9.el6: Process /usr/libexec/gvfsd-archive was killed by signal 6 (SIGABRT)
Summary: [abrt] gvfs-archive-1.4.3-9.el6: Process /usr/libexec/gvfsd-archive was kille...
Keywords:
Status: CLOSED INSUFFICIENT_DATA
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: gvfs
Version: 6.0
Hardware: x86_64
OS: Unspecified
medium
medium
Target Milestone: rc
: ---
Assignee: Tomáš Bžatek
QA Contact: Desktop QE
URL:
Whiteboard: abrt_hash:081582011dbd59d08ba66ef0002...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-06-26 02:48 UTC by Red Hat Case Diagnostics
Modified: 2018-11-14 11:51 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-10-05 22:22:12 UTC
Target Upstream Version:


Attachments (Terms of Use)
File: backtrace (6.90 KB, text/plain)
2011-06-26 02:48 UTC, Red Hat Case Diagnostics
no flags Details

Description Red Hat Case Diagnostics 2011-06-26 02:48:02 UTC
This description generated by Andreas from an ABRT report
architecture: x86_64
cmdline: /usr/libexec/gvfsd-archive file=/home/amit/rhel-server-6.1-x86_64-dvd.iso
component: gvfs
executable: /usr/libexec/gvfsd-archive
kernel: 2.6.32-71.el6.x86_64
package: gvfs-archive-1.4.3-9.el6
reason: Process /usr/libexec/gvfsd-archive was killed by signal 6 (SIGABRT)
release: Red Hat Enterprise Linux Server release 6.0 (Santiago)
time: 1309055371
uid: 501
backtrace: [New Thread 32406]
[New Thread 32405]
Core was generated by `/usr/libexec/gvfsd-archive file=/home/amit/rhel-server-6.1-x86_64-dvd.iso'.
Program terminated with signal 6, Aborted.
#0  0x000000328e6329a5 in raise () from /lib64/libc.so.6

Thread 2 (Thread 32405):
#0  0x000000328e6d7e33 in poll () from /lib64/libc.so.6
No symbol table info available.
#1  0x000000329023c655 in ?? () from /lib64/libglib-2.0.so.0
No symbol table info available.
#2  0x000000329023cd55 in g_main_loop_run () from /lib64/libglib-2.0.so.0
No symbol table info available.
#3  0x00000000004090fe in ?? ()
No symbol table info available.
#4  0x000000000040938c in ?? ()
No symbol table info available.
#5  0x000000328e61ec5d in __libc_start_main () from /lib64/libc.so.6
No symbol table info available.
#6  0x00000000004077f9 in ?? ()
No symbol table info available.
#7  0x00007fff312d2178 in ?? ()
No symbol table info available.
#8  0x000000000000001c in ?? ()
No symbol table info available.
#9  0x0000000000000002 in ?? ()
No symbol table info available.
#10 0x00007fff312d2a9f in ?? ()
No symbol table info available.
#11 0x00007fff312d2aba in ?? ()
No symbol table info available.
#12 0x0000000000000000 in ?? ()
No symbol table info available.

Thread 1 (Thread 32406):
#0  0x000000328e6329a5 in raise () from /lib64/libc.so.6
No symbol table info available.
#1  0x000000328e634185 in abort () from /lib64/libc.so.6
No symbol table info available.
#2  0x000000329025ea7f in g_assertion_message () from /lib64/libglib-2.0.so.0
No symbol table info available.
#3  0x000000329025f020 in g_assertion_message_expr ()
   from /lib64/libglib-2.0.so.0
No symbol table info available.
#4  0x0000000000407aa7 in ?? ()
No symbol table info available.
#5  0x0000003291a0dacf in g_object_unref () from /lib64/libgobject-2.0.so.0
No symbol table info available.
#6  0x000000000040eda7 in ?? ()
No symbol table info available.
#7  0x0000003291a0dacf in g_object_unref () from /lib64/libgobject-2.0.so.0
No symbol table info available.
#8  0x000000329026360b in ?? () from /lib64/libglib-2.0.so.0
No symbol table info available.
#9  0x0000003290262074 in ?? () from /lib64/libglib-2.0.so.0
No symbol table info available.
#10 0x000000328ea077e1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#11 0x000000328e6e153d in clone () from /lib64/libc.so.6
No symbol table info available.
From                To                  Syms Read   Shared Object Library
0x0000003929008e30  0x0000003929012a98  Yes (*)     /usr/lib64/libgvfscommon.so.0
0x0000003290a01590  0x0000003290a029e8  Yes (*)     /lib64/libgthread-2.0.so.0
0x0000003298618950  0x000000329867ac48  Yes (*)     /lib64/libgio-2.0.so.0
0x0000003291a08970  0x0000003291a31f78  Yes (*)     /lib64/libgobject-2.0.so.0
0x0000003294201080  0x0000003294201fc8  Yes (*)     /lib64/libgmodule-2.0.so.0
0x000000328fe07090  0x000000328fe2e4c8  Yes (*)     /lib64/libdbus-1.so.3
0x000000328ea05640  0x000000328ea10ec8  Yes (*)     /lib64/libpthread.so.0
0x000000328f602140  0x000000328f6055a8  Yes (*)     /lib64/librt.so.1
0x0000003936604730  0x000000393660f708  Yes (*)     /usr/lib64/libgnome-keyring.so.0
0x0000003290213470  0x000000329028a188  Yes (*)     /lib64/libglib-2.0.so.0
0x000000392a009ac0  0x000000392a0344f8  Yes (*)     /usr/lib64/libarchive.so.2
0x0000003932400e10  0x0000003932401688  Yes (*)     /lib64/libutil.so.1
0x000000328e61e9a0  0x000000328e72b840  Yes (*)     /lib64/libc.so.6
0x000000328e200de0  0x000000328e201998  Yes (*)     /lib64/libdl.so.2
0x00000032906038c0  0x0000003290612558  Yes (*)     /lib64/libresolv.so.2
0x000000328ee05610  0x000000328ee15708  Yes (*)     /lib64/libselinux.so.1
0x000000328de00af0  0x000000328de18924  Yes (*)     /lib64/ld-linux-x86-64.so.2
0x0000003930601d30  0x0000003930605c08  Yes (*)     /lib64/libacl.so.1
0x0000003930a01350  0x0000003930a03428  Yes (*)     /lib64/libattr.so.1
0x000000329325c900  0x0000003293320d08  Yes (*)     /usr/lib64/libcrypto.so.10
0x00000032996025d0  0x0000003299616978  Yes (*)     /usr/lib64/liblzma.so.0
0x0000003297601630  0x000000329760dcc8  Yes (*)     /lib64/libbz2.so.1
0x000000329922c600  0x0000003299307f88  Yes (*)     /usr/lib64/libxml2.so.2
0x000000328fa01ef0  0x000000328fa0d1a8  Yes (*)     /lib64/libz.so.1
0x000000328f203ea0  0x000000328f243fa8  Yes (*)     /lib64/libm.so.6
0x00007f4b3f7d8940  0x00007f4b3f7f1358  Yes (*)     /usr/lib64/gio/modules/libgvfsdbus.so
0x0000003c97c02880  0x0000003c97c0a788  Yes (*)     /lib64/libudev.so.0
0x00007f4b3f3bdb70  0x00007f4b3f3c95b8  Yes (*)     /usr/lib64/gio/modules/libgioremote-volume-monitor.so
0x00007f4b3f1af110  0x00007f4b3f1b70b8  Yes (*)     /lib64/libnss_files.so.2
(*): Shared library is missing debugging information.
$1 = 0x0
No symbol table is loaded.  Use the "file" command.
rax            0x0	0
rbx            0x7f4b38006090	139961038823568
rcx            0xffffffffffffffff	-1
rdx            0x6	6
rsi            0x7e96	32406
rdi            0x7e95	32405
rbp            0x41a046	0x41a046
rsp            0x7f4b403f9b08	0x7f4b403f9b08
r8             0x0	0
r9             0x12	18
r10            0x8	8
r11            0x206	518
r12            0x41a2d0	4301520
r13            0x7f4b38018410	139961038898192
r14            0x7f4b403f9c70	139961177185392
r15            0x3	3
rip            0x328e6329a5	0x328e6329a5 <raise+53>
eflags         0x206	[ PF IF ]
cs             0x33	51
ss             0x2b	43
ds             0x0	0
es             0x0	0
fs             0x0	0
gs             0x0	0
Dump of assembler code for function raise:
   0x000000328e632970 <+0>:	mov    %fs:0x2d4,%eax
   0x000000328e632978 <+8>:	mov    %fs:0x2d0,%esi
   0x000000328e632980 <+16>:	test   %esi,%esi
   0x000000328e632982 <+18>:	jne    0x328e6329b0 <raise+64>
   0x000000328e632984 <+20>:	mov    $0xba,%eax
   0x000000328e632989 <+25>:	syscall 
   0x000000328e63298b <+27>:	mov    %eax,%esi
   0x000000328e63298d <+29>:	mov    %eax,%fs:0x2d0
   0x000000328e632995 <+37>:	movslq %edi,%rdx
   0x000000328e632998 <+40>:	movslq %esi,%rsi
   0x000000328e63299b <+43>:	movslq %eax,%rdi
   0x000000328e63299e <+46>:	mov    $0xea,%eax
   0x000000328e6329a3 <+51>:	syscall 
=> 0x000000328e6329a5 <+53>:	cmp    $0xfffffffffffff000,%rax
   0x000000328e6329ab <+59>:	ja     0x328e6329bf <raise+79>
   0x000000328e6329ad <+61>:	repz retq 
   0x000000328e6329af <+63>:	nop
   0x000000328e6329b0 <+64>:	test   %eax,%eax
   0x000000328e6329b2 <+66>:	jg     0x328e632995 <raise+37>
   0x000000328e6329b4 <+68>:	test   $0x7fffffff,%eax
   0x000000328e6329b9 <+73>:	jne    0x328e6329cf <raise+95>
   0x000000328e6329bb <+75>:	mov    %esi,%eax
   0x000000328e6329bd <+77>:	jmp    0x328e632995 <raise+37>
   0x000000328e6329bf <+79>:	mov    0x3465da(%rip),%rdx        # 0x328e978fa0
   0x000000328e6329c6 <+86>:	neg    %eax
   0x000000328e6329c8 <+88>:	mov    %eax,%fs:(%rdx)
   0x000000328e6329cb <+91>:	or     $0xffffffffffffffff,%eax
   0x000000328e6329ce <+94>:	retq   
   0x000000328e6329cf <+95>:	neg    %eax
   0x000000328e6329d1 <+97>:	jmp    0x328e632995 <raise+37>
End of assembler dump.

Comment 2 Red Hat Case Diagnostics 2011-06-26 02:48:37 UTC
Created attachment 509945 [details]
File: backtrace

Comment 5 Tomáš Bžatek 2011-07-22 17:13:35 UTC
Can you please provide proper backtrace with full debugging symbols? Also repro steps would be needed, perhaps it's a duplicate of bug 645630.

Comment 6 Jeremy West 2011-10-05 22:22:12 UTC
Closing this bug, since the associated customer case has closed.  Please feel free to re-open this if new information becomes available.


Note You need to log in before you can comment on or make changes to this bug.