Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 589150 Details for
Bug 828252
[abrt] pcmanfm-0.9.10-2.fc17: g_type_check_value: Process /usr/bin/pcmanfm was killed by signal 11 (SIGSEGV)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 11.26 KB, created by
terry0197
on 2012-06-04 13:16:17 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
terry0197
Created:
2012-06-04 13:16:17 UTC
Size:
11.26 KB
patch
obsolete
>[New LWP 963] >warning: .dynamic section for "/lib/libgmodule-2.0.so.0" is not at the expected address (wrong library or version mismatch?) >warning: .dynamic section for "/lib/libgthread-2.0.so.0" is not at the expected address (wrong library or version mismatch?) >warning: .dynamic section for "/lib/libgio-2.0.so.0" is not at the expected address (wrong library or version mismatch?) >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib/libthread_db.so.1". >warning: File "/var/cache/abrt-di/usr/lib/debug/usr/lib/libxcb.so.1.1.0.debug" has a different build-id, file skipped >warning: the debug information found in "/var/cache/abrt-di/usr/lib/debug/usr/lib/libxcb.so.1.1.0.debug" does not match "/lib/libxcb.so.1" (CRC mismatch). > >warning: the debug information found in "/var/cache/abrt-di/usr/lib/debug//usr/lib/libxcb.so.1.1.0.debug" does not match "/lib/libxcb.so.1" (CRC mismatch). > >warning: the debug information found in "/var/cache/abrt-di/usr/lib/debug/usr/lib//libxcb.so.1.1.0.debug" does not match "/lib/libxcb.so.1" (CRC mismatch). > >warning: the debug information found in "/var/cache/abrt-di/usr/lib/debug//usr/lib/gio/modules/libdconfsettings.so.debug" does not match "/usr/lib/gio/modules/libdconfsettings.so" (CRC mismatch). > >warning: the debug information found in "/var/cache/abrt-di/usr/lib/debug/usr/lib/gio/modules/libdconfsettings.so.debug" does not match "/usr/lib/gio/modules/libdconfsettings.so" (CRC mismatch). > >Core was generated by `pcmanfm --desktop --profile LXDE'. >Program terminated with signal 11, Segmentation fault. >#0 0x00838383 in g_type_check_value (value=0x7400ff4) at gtype.c:4139 >4139 gtype.c: No such file or directory. > >Thread 1 (Thread 0xb76f3880 (LWP 963)): >#0 0x00838383 in g_type_check_value (value=0x7400ff4) at gtype.c:4139 >No locals. >#1 0x00000000 in ?? () >No symbol table info available. >From To Syms Read Shared Object Library >0x003fc470 0x00416678 Yes /lib/libm.so.6 >0x004d5410 0x00564984 Yes /lib/libX11.so.6 >0x001e3c78 0x001e4d74 Yes /lib/libgmodule-2.0.so.0 >0x00d107a0 0x00d36cc8 Yes /lib/libfm-gtk.so.1 >0x00d95bd0 0x01081ee4 Yes /lib/libgtk-x11-2.0.so.0 >0x00760b80 0x0076fda4 Yes /lib/libfm.so.1 >0x002b06b0 0x0031aab4 Yes /lib/libgdk-x11-2.0.so.0 >0x008906a0 0x0089ded0 Yes /lib/libatk-1.0.so.0 >0x001ed4c0 0x0020bdf0 Yes /lib/libpangoft2-1.0.so.0 >0x00a12630 0x00a17c94 Yes /lib/libpangocairo-1.0.so.0 >0x0021ccc0 0x00233cb4 Yes /lib/libgdk_pixbuf-2.0.so.0 >0x00601250 0x00688f04 Yes /lib/libcairo.so.2 >0x00bcb2a0 0x00bedab4 Yes /lib/libpango-1.0.so.0 >0x00c60610 0x00ccf674 Yes /lib/libfreetype.so.6 >0x0090e0e0 0x009297d4 Yes /lib/libfontconfig.so.1 >0x0023d4a8 0x0023d690 Yes /lib/libgthread-2.0.so.0 >0x00241920 0x0024545c Yes /lib/librt.so.1 >0x00a616f0 0x00b34b74 Yes /lib/libgio-2.0.so.0 >0x0080eb10 0x00840114 Yes /lib/libgobject-2.0.so.0 >0x0024aba0 0x0024c600 Yes /lib/libmenu-cache.so.1 >0x072eeb50 0x0738e7d4 Yes /lib/libglib-2.0.so.0 >0x008ec6a0 0x008f7e60 Yes /lib/libpthread.so.0 >0x03fa3f20 0x040e114c Yes /lib/libc.so.6 >0x00a1c850 0x00a34ec7 Yes /lib/ld-linux.so.2 >0x00256f70 0x002674a4 Yes (*) /lib/libxcb.so.1 >0x00271ad0 0x00272aec Yes /lib/libdl.so.2 >0x00277fb0 0x00286f44 Yes /lib/libelf.so.1 >0x0098df70 0x009903cc Yes /lib/libXfixes.so.3 >0x0035a880 0x00365154 Yes /lib/libXext.so.6 >0x00ba23c0 0x00ba8264 Yes /lib/libXrender.so.1 >0x003bd810 0x003be254 Yes /lib/libXinerama.so.1 >0x0036b8f0 0x00375f24 Yes /lib/libXi.so.6 >0x007831e0 0x007879dc Yes /lib/libXrandr.so.2 >0x0028ef60 0x00294484 Yes /lib/libXcursor.so.1 >0x0037a910 0x0037b3bc Yes /lib/libXcomposite.so.1 >0x0037e850 0x0037f214 Yes /lib/libXdamage.so.1 >0x00385d60 0x003a4c64 Yes /lib/libpng15.so.15 >0x006b6650 0x00739414 Yes /lib/libpixman-1.so.0 >0x003c26e0 0x003cf9cc Yes /lib/libz.so.1 >0x004251b0 0x0043e434 Yes /lib/libexpat.so.1 >0x003b0090 0x003b3794 Yes /lib/libffi.so.5 >0x0046d8e0 0x0047fd94 Yes /lib/libselinux.so.1 >0x003d96b0 0x003e7e94 Yes /lib/libresolv.so.2 >0x003b7a60 0x003b892c Yes /lib/libXau.so.6 >0x00452a40 0x00459e7c Yes /lib/libnss_files.so.2 >0x0048da90 0x004b4874 Yes /usr/lib/gtk-2.0/2.10.0/engines/libclearlooks.so >0x012325c0 0x012a48a4 Yes /lib/libstdc++.so.6 >0x007ad020 0x007c3b54 Yes /lib/libgcc_s.so.1 >0x007ce320 0x007e9224 Yes /usr/lib/gio/modules/libgvfsdbus.so >0x00791ce0 0x0079cc64 Yes /lib/libgvfscommon.so.0 >0x00858a90 0x0087aa04 Yes /lib/libbluray.so.1 >0x00944710 0x00973958 Yes /lib/libdbus-1.so.3 >0x003f0a90 0x003f1540 Yes /lib/libutil.so.1 >0x066aae00 0x06795e40 Yes /lib/libxml2.so.2 >0x007f5bf0 0x007ffa68 Yes /usr/lib/gio/modules/libgioremote-volume-monitor.so >0x0045fe40 0x00463484 Yes (*) /usr/lib/gio/modules/libdconfsettings.so >(*): Shared library is missing debugging information. >$1 = 0x0 >$2 = 0x0 >eax 0x8 8 >ecx 0x0 0 >edx 0x0 0 >ebx 0x854ff4 8736756 >esp 0xbfd16af0 0xbfd16af0 >ebp 0x855780 0x855780 >esi 0x970e5a0 158393760 >edi 0x94c1098 155979928 >eip 0x838383 0x838383 <g_type_check_value+19> >eflags 0x210206 [ PF IF RF ID ] >cs 0x73 115 >ss 0x7b 123 >ds 0x7b 123 >es 0x7b 123 >fs 0x0 0 >gs 0x33 51 >Dump of assembler code for function g_type_check_value: > 0x00838370 <+0>: push %ebp > 0x00838371 <+1>: xor %eax,%eax > 0x00838373 <+3>: push %edi > 0x00838374 <+4>: push %esi > 0x00838375 <+5>: push %ebx > 0x00838376 <+6>: call 0x80ede4 <__x86.get_pc_thunk.bx> > 0x0083837b <+11>: add $0x1cc79,%ebx > 0x00838381 <+17>: lea -0x2c(%esp),%esp > 0x00838385 <+21>: mov 0x40(%esp),%edx > 0x00838389 <+25>: test %edx,%edx > 0x0083838b <+27>: je 0x838462 <g_type_check_value+242> > 0x00838391 <+33>: mov (%edx),%esi > 0x00838393 <+35>: cmp $0x3fc,%esi > 0x00838399 <+41>: ja 0x838470 <g_type_check_value+256> > 0x0083839f <+47>: shr $0x2,%esi > 0x008383a2 <+50>: mov 0x38c(%ebx,%esi,4),%esi > 0x008383a9 <+57>: test %esi,%esi > 0x008383ab <+59>: je 0x838484 <g_type_check_value+276> > 0x008383b1 <+65>: testb $0x8,0xe(%esi) > 0x008383b5 <+69>: mov $0x1,%eax > 0x008383ba <+74>: jne 0x838462 <g_type_check_value+242> > 0x008383c0 <+80>: lea 0x78c(%ebx),%ebp > 0x008383c6 <+86>: mov %ebp,(%esp) > 0x008383c9 <+89>: call 0x80e6d0 <g_rw_lock_reader_lock@plt> > 0x008383ce <+94>: mov 0x14(%esi),%eax > 0x008383d1 <+97>: test %eax,%eax > 0x008383d3 <+99>: je 0x8383ef <g_type_check_value+127> > 0x008383d5 <+101>: lock orl $0x0,(%esp) > 0x008383da <+106>: mov (%esi),%eax > 0x008383dc <+108>: test %eax,%eax > 0x008383de <+110>: je 0x8383ef <g_type_check_value+127> > 0x008383e0 <+112>: mov 0x14(%esi),%eax > 0x008383e3 <+115>: mov (%eax),%eax > 0x008383e5 <+117>: mov (%eax),%eax > 0x008383e7 <+119>: test %eax,%eax > 0x008383e9 <+121>: jne 0x838496 <g_type_check_value+294> > 0x008383ef <+127>: movzbl 0xc(%esi),%eax > 0x008383f3 <+131>: cmpl $0x8,0x28(%esi,%eax,4) > 0x008383f8 <+136>: jne 0x838450 <g_type_check_value+224> > 0x008383fa <+138>: mov 0xc(%esi),%edi > 0x008383fd <+141>: shr $0x8,%edi > 0x00838400 <+144>: and $0x1ff,%edi > 0x00838406 <+150>: je 0x838450 <g_type_check_value+224> > 0x00838408 <+152>: mov 0x24(%esi),%esi > 0x0083840b <+155>: xor %eax,%eax > 0x0083840d <+157>: jmp 0x838420 <g_type_check_value+176> > 0x0083840f <+159>: nop > 0x00838410 <+160>: and $0xfffffffc,%ecx > 0x00838413 <+163>: testb $0x4,0xe(%ecx) > 0x00838417 <+167>: jne 0x83843d <g_type_check_value+205> > 0x00838419 <+169>: lea 0x1(%eax),%eax > 0x0083841c <+172>: cmp %edi,%eax > 0x0083841e <+174>: jae 0x838450 <g_type_check_value+224> > 0x00838420 <+176>: mov (%esi,%eax,4),%edx > 0x00838423 <+179>: cmp $0x3fc,%edx > 0x00838429 <+185>: mov %edx,%ecx > 0x0083842b <+187>: ja 0x838410 <g_type_check_value+160> > 0x0083842d <+189>: shr $0x2,%ecx > 0x00838430 <+192>: mov 0x38c(%ebx,%ecx,4),%ecx > 0x00838437 <+199>: testb $0x4,0xe(%ecx) > 0x0083843b <+203>: je 0x838419 <g_type_check_value+169> > 0x0083843d <+205>: cmp $0x3fc,%edx > 0x00838443 <+211>: jbe 0x838478 <g_type_check_value+264> > 0x00838445 <+213>: mov %edx,%esi > 0x00838447 <+215>: and $0xfffffffc,%esi > 0x0083844a <+218>: test %esi,%esi > 0x0083844c <+220>: jne 0x8383ce <g_type_check_value+94> > 0x0083844e <+222>: xchg %ax,%ax > 0x00838450 <+224>: xor %eax,%eax > 0x00838452 <+226>: mov %ebp,(%esp) > 0x00838455 <+229>: mov %eax,0x1c(%esp) > 0x00838459 <+233>: call 0x80e8b0 <g_rw_lock_reader_unlock@plt> > 0x0083845e <+238>: mov 0x1c(%esp),%eax > 0x00838462 <+242>: lea 0x2c(%esp),%esp > 0x00838466 <+246>: pop %ebx > 0x00838467 <+247>: pop %esi > 0x00838468 <+248>: pop %edi > 0x00838469 <+249>: pop %ebp > 0x0083846a <+250>: ret > 0x0083846b <+251>: nop > 0x0083846c <+252>: lea 0x0(%esi,%eiz,1),%esi > 0x00838470 <+256>: and $0xfffffffc,%esi > 0x00838473 <+259>: jmp 0x8383a9 <g_type_check_value+57> > 0x00838478 <+264>: shr $0x2,%edx > 0x0083847b <+267>: mov 0x38c(%ebx,%edx,4),%esi > 0x00838482 <+274>: jmp 0x83844a <g_type_check_value+218> > 0x00838484 <+276>: lea 0x78c(%ebx),%ebp > 0x0083848a <+282>: mov %ebp,(%esp) > 0x0083848d <+285>: call 0x80e6d0 <g_rw_lock_reader_lock@plt> > 0x00838492 <+290>: xor %eax,%eax > 0x00838494 <+292>: jmp 0x838452 <g_type_check_value+226> > 0x00838496 <+294>: mov 0x1c(%esi),%eax > 0x00838499 <+297>: mov 0x7bc(%ebx),%edi > 0x0083849f <+303>: test %eax,%eax > 0x008384a1 <+305>: je 0x8384d0 <g_type_check_value+352> > 0x008384a3 <+307>: test %edi,%edi > 0x008384a5 <+309>: je 0x8384d0 <g_type_check_value+352> > 0x008384a7 <+311>: mov (%eax),%edx > 0x008384a9 <+313>: test %edx,%edx > 0x008384ab <+315>: je 0x8384d0 <g_type_check_value+352> > 0x008384ad <+317>: mov 0x4(%eax),%esi > 0x008384b0 <+320>: sub $0x8,%esi > 0x008384b3 <+323>: jmp 0x8384bd <g_type_check_value+333> > 0x008384b5 <+325>: sub %eax,%edx > 0x008384b7 <+327>: mov %ecx,%esi > 0x008384b9 <+329>: test %edx,%edx > 0x008384bb <+331>: je 0x8384d0 <g_type_check_value+352> > 0x008384bd <+333>: lea 0x1(%edx),%eax > 0x008384c0 <+336>: shr %eax > 0x008384c2 <+338>: lea (%esi,%eax,8),%ecx > 0x008384c5 <+341>: cmp (%ecx),%edi > 0x008384c7 <+343>: je 0x8384da <g_type_check_value+362> > 0x008384c9 <+345>: ja 0x8384b5 <g_type_check_value+325> > 0x008384cb <+347>: lea -0x1(%eax),%edx > 0x008384ce <+350>: jmp 0x8384b9 <g_type_check_value+329> > 0x008384d0 <+352>: mov $0x1,%eax > 0x008384d5 <+357>: jmp 0x838452 <g_type_check_value+226> > 0x008384da <+362>: mov 0x4(%ecx),%eax > 0x008384dd <+365>: shr $0x5,%eax > 0x008384e0 <+368>: xor $0x1,%eax > 0x008384e3 <+371>: and $0x1,%eax > 0x008384e6 <+374>: jmp 0x838452 <g_type_check_value+226> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 828252
: 589150 |
589151