Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 598955 Details for
Bug 841334
[abrt] kde-workspace-4.8.4-1.fc17: updateSplashImage: Process /usr/bin/ksplashx was killed by signal 11 (SIGSEGV)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 10.47 KB, created by
mark gress
on 2012-07-18 17:40:51 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
mark gress
Created:
2012-07-18 17:40:51 UTC
Size:
10.47 KB
patch
obsolete
>[New LWP 2012] >Core was generated by `ksplashx BeefyMiracle --pid'. >Program terminated with signal 11, Segmentation fault. >#0 0x08058a23 in updateSplashImage (img=..., x_pos=0, y_pos=0) at /usr/src/debug/kde-workspace-4.8.4/ksplash/ksplashx/splash.cpp:835 >835 /usr/src/debug/kde-workspace-4.8.4/ksplash/ksplashx/splash.cpp: No such file or directory. > >Thread 1 (LWP 2012): >#0 0x08058a23 in updateSplashImage (img=..., x_pos=0, y_pos=0) at /usr/src/debug/kde-workspace-4.8.4/ksplash/ksplashx/splash.cpp:835 > x = <optimized out> > s = <optimized out> > d = <optimized out> > y = <optimized out> > pix = <optimized out> > gc = <optimized out> >#1 0x0805a32d in runSplash (them=0xbff00c4f "BeefyMiracle", t=false, p=4) at /usr/src/debug/kde-workspace-4.8.4/ksplash/ksplashx/splash.cpp:1048 > geom = {x1 = 0, y1 = 0, x2 = 1599, y2 = 1199} > img = {data = 0x8bd1bc8} > i = <optimized out> > screens = 1 > line = "BACKGROUND_IMAGE 0 0 beefy-miracle.png\000\000\374\027\000\000\374\027\000\000\004\000\000\000\001\000\000\000\004\000\000\000\024\000\000\000\003\000\000\000GNU\000\r\261\b[o_&h\031\231\277\207b\347\067K\270\027\223\225C\000\000\000\022\000\000\000\020\000\000\000\t\000\000\000\300i\270\344Q\241@a\002\061D\270>\000\000\030\003\201\201\000\320\200A\340\nP\000\000 \as\000\216&d\205\022\004\"P\034\210US\004&2\264\000\000@B\370\000F)\004\300\r\v\230\006\000\000\022\000\000\000\024\000\000\000\027\000\000\000\000\000\000\000\030\000\000\000\031\000\000\000\032", '\000' <repeats 15 times>, "\034\000\000\000\035\000\000\000#\000\000\000$\000\000\000\000\000\000\000"... > y = 0 > screen_ref = "\000\000" > window_ref = "\000\000" > number = 0 > x_rel = 0 > buf = "beefy-miracle.png\000\204L\b\000\000\000 \235\274\b \000\000\000\000\000\000\000\064\360\357\277\000\000\000\000(\304\063L\000\000\000\000\020\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000 \000\000\000\020\231 L\250\374\273\b\310\374\273\b\236%\204L\364\217\205L(\237\274\b\254\361\357\277P\374\273\b\034$\204L\250\374\273\b\310\374\273\b\000\000\000\000\364\217\205LP\374\273\b\030\361\357\277\t\000\000\000\364\277\063L \304\063L\000\000\000\000P\374\273\b\177e Lt\374\273\b \235\274\b\331\004\204L\025[ L\364\217\205L \235\274\b\000\000\000\000g(\204L\b\000\000\000 \235\274\b \000\000\000\177e L\000\000\000\000\000\000\000\000(\304\063L\000\000\000\000\020\000\000\000P\304\063L\b\000\000\000\006", '\000' <repeats 23 times>, "\006\000\000\000\070\000\000\000[\000\000\000"... > w = 0 > y_rel = 0 > frames = 0 > delay = 0 > image_ref = "\000\000" > x = 0 > h = 0 > repeat = 0 > items = <optimized out> > handled = true > desc_h = 1536 > datafile = 0x8bca0e8 > stat_buf = {st_dev = 2049, __pad1 = 0, __st_ino = 24807, st_mode = 33188, st_nlink = 1, st_uid = 0, st_gid = 0, st_rdev = 0, __pad2 = 0, st_size = 290, st_blksize = 4096, st_blocks = 8, st_atim = {tv_sec = 1338683749, tv_nsec = 967251649}, st_mtim = {tv_sec = 1328793107, tv_nsec = 0}, st_ctim = {tv_sec = 1337719588, tv_nsec = 336689374}, st_ino = 24807} > tmp = "/usr/share/kde4/apps/ksplash/Themes/BeefyMiracle/Theme.rc", '\000' <repeats 120 times>, "\020\000\000v\002\000\000\304\257\030L\000\000\000\000\000\200s\267\f\351\357\277\304\257\030L\000\200s\267\211\031\027L`P\307L\000\000\000\000\004\000\000\000\022\b\000\000\003\000\000\000\000P\002\000v\002\000\000\262' L\b\000\000\000v\002\000\000\000\000\000\000\000\233s\267\304\257\030L\000\320\304L4\360\357\277\177\356\357\277T\"\307\000\001\000\000\000\177\356\357\277\020\231 L\000`\307L`P\307L\035.\035L\364\277\063L\364\277\063L\320\356\357\277n\a\205LE9\035L\000\000\000\000n\a\205L\000\000\000\000\000\000\000\000\364\277\063L\360\356\357\277n\a\205LE9\035L\000\000\000\000"... > ratioy = 1.28 > desc_w = 2048 > ratiox = 1.28 >#2 0x0804ab37 in main (argc=3, argv=0xbfeff524) at /usr/src/debug/kde-workspace-4.8.4/ksplash/ksplashx/main.cpp:150 > test = <optimized out> > print_pid = <optimized out> > cpid = 0x804d350 > theme = 0xbff00c4f "BeefyMiracle" > parent_pipe = 4 >From To Syms Read Shared Object Library >0x415614a0 0x41565ce4 Yes /lib/libSM.so.6 >0x4d1df5f0 0x4d1ee574 Yes /lib/libICE.so.6 >0x413e2410 0x41471984 Yes /lib/libX11.so.6 >0x41268880 0x41273154 Yes /lib/libXext.so.6 >0x419a2fa0 0x419b1104 Yes /lib/libXft.so.2 >0x4c7c0a60 0x4c7c192c Yes /lib/libXau.so.6 >0x4f44cea0 0x4f44eb84 Yes /lib/libXdmcp.so.6 >0x4198e260 0x4199a4d4 Yes /lib/libXpm.so.4 >0x4cc7bd60 0x4cc9ac64 Yes /lib/libpng15.so.15 >0x4c39e6e0 0x4c3ab9cc Yes /lib/libz.so.1 >0x410b7860 0x410f10f4 Yes /lib/libjpeg.so.62 >0x410af810 0x410b0254 Yes /lib/libXinerama.so.1 >0x4c6325c0 0x4c6a48a4 Yes /lib/libstdc++.so.6 >0x4c374470 0x4c38e678 Yes /lib/libm.so.6 >0x4c520020 0x4c536b54 Yes /lib/libgcc_s.so.1 >0x4c1a8f20 0x4c2e614c Yes /lib/libc.so.6 >0x410a8080 0x410a9d24 Yes /lib/libuuid.so.1 >0x4c83ff70 0x4c8504a4 Yes /lib/libxcb.so.1 >0x4c35ead0 0x4c35faec Yes /lib/libdl.so.2 >0x4cdfc0e0 0x4ce177d4 Yes /lib/libfontconfig.so.1 >0x4cbb2610 0x4cc21674 Yes /lib/libfreetype.so.6 >0x4127b3c0 0x41281264 Yes /lib/libXrender.so.1 >0x4c16b850 0x4c183ec7 Yes /lib/ld-linux.so.2 >0x4cc4f1b0 0x4cc68434 Yes /lib/libexpat.so.1 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >eax 0x0 0 >ecx 0x1a1a15 1710613 >edx 0x8bd1bc8 146611144 >ebx 0xb5566bd0 -1252627504 >esp 0xbfefe410 0xbfefe410 >ebp 0xb6fe1008 0xb6fe1008 >esi 0x1e1513 1971475 >edi 0xb4b53008 -1263194104 >eip 0x8058a23 0x8058a23 <updateSplashImage(QImage const&, int, int)+115> >eflags 0x10246 [ PF ZF IF RF ] >cs 0x73 115 >ss 0x7b 123 >ds 0x7b 123 >es 0x7b 123 >fs 0x0 0 >gs 0x33 51 >Dump of assembler code for function updateSplashImage(QImage const&, int, int): > 0x080589b0 <+0>: push %ebp > 0x080589b1 <+1>: push %edi > 0x080589b2 <+2>: push %esi > 0x080589b3 <+3>: push %ebx > 0x080589b4 <+4>: lea -0x7c(%esp),%esp > 0x080589b8 <+8>: mov %edx,0x48(%esp) > 0x080589bc <+12>: mov (%eax),%edx > 0x080589be <+14>: mov %eax,0x44(%esp) > 0x080589c2 <+18>: mov %ecx,0x4c(%esp) > 0x080589c6 <+22>: mov 0x8(%edx),%eax > 0x080589c9 <+25>: test %eax,%eax > 0x080589cb <+27>: jle 0x8058a3a <updateSplashImage(QImage const&, int, int)+138> > 0x080589cd <+29>: mov 0x48(%esp),%eax > 0x080589d1 <+33>: mov 0x20(%edx),%edi > 0x080589d4 <+36>: shl $0x2,%eax > 0x080589d7 <+39>: xor %esi,%esi > 0x080589d9 <+41>: mov %eax,0x3c(%esp) > 0x080589dd <+45>: mov 0x8065e94,%eax > 0x080589e2 <+50>: shl $0x2,%ecx > 0x080589e5 <+53>: mov 0x20(%eax),%ebp > 0x080589e8 <+56>: add %ebp,%ecx > 0x080589ea <+58>: mov %ecx,0x40(%esp) > 0x080589ee <+62>: xchg %ax,%ax > 0x080589f0 <+64>: test %edi,%edi > 0x080589f2 <+66>: je 0x8058ae0 <updateSplashImage(QImage const&, int, int)+304> > 0x080589f8 <+72>: test %ebp,%ebp > 0x080589fa <+74>: mov (%edi,%esi,4),%ebx > 0x080589fd <+77>: je 0x8058af0 <updateSplashImage(QImage const&, int, int)+320> > 0x08058a03 <+83>: mov 0x40(%esp),%eax > 0x08058a07 <+87>: mov (%eax,%esi,4),%ecx > 0x08058a0a <+90>: mov 0x4(%edx),%eax > 0x08058a0d <+93>: add 0x3c(%esp),%ecx > 0x08058a11 <+97>: test %eax,%eax > 0x08058a13 <+99>: jle 0x8058a32 <updateSplashImage(QImage const&, int, int)+130> > 0x08058a15 <+101>: xor %eax,%eax > 0x08058a17 <+103>: mov %esi,0x38(%esp) > 0x08058a1b <+107>: nop > 0x08058a1c <+108>: lea 0x0(%esi,%eiz,1),%esi > 0x08058a20 <+112>: mov (%ebx,%eax,4),%esi >=> 0x08058a23 <+115>: mov %esi,(%ecx,%eax,4) > 0x08058a26 <+118>: lea 0x1(%eax),%eax > 0x08058a29 <+121>: cmp 0x4(%edx),%eax > 0x08058a2c <+124>: jl 0x8058a20 <updateSplashImage(QImage const&, int, int)+112> > 0x08058a2e <+126>: mov 0x38(%esp),%esi > 0x08058a32 <+130>: add $0x1,%esi > 0x08058a35 <+133>: cmp 0x8(%edx),%esi > 0x08058a38 <+136>: jl 0x80589f0 <updateSplashImage(QImage const&, int, int)+64> > 0x08058a3a <+138>: mov 0x44(%esp),%edx > 0x08058a3e <+142>: lea 0x58(%esp),%eax > 0x08058a42 <+146>: mov %edx,0x4(%esp) > 0x08058a46 <+150>: mov %eax,(%esp) > 0x08058a49 <+153>: movl $0x0,0x8(%esp) > 0x08058a51 <+161>: call 0x80518f0 <PP::convertFromImage(QImage const&, int)> > 0x08058a56 <+166>: lea -0x4(%esp),%esp > 0x08058a5a <+170>: mov 0x8065214,%eax > 0x08058a5f <+175>: movl $0x0,0x4(%esp) > 0x08058a67 <+183>: mov %eax,(%esp) > 0x08058a6a <+186>: mov 0x58(%esp),%ebx > 0x08058a6e <+190>: call 0x8056440 <qt_xget_temp_gc(int, bool)> > 0x08058a73 <+195>: mov 0x44(%esp),%ecx > 0x08058a77 <+199>: mov 0x48(%esp),%esi > 0x08058a7b <+203>: mov (%ecx),%edx > 0x08058a7d <+205>: mov 0x4c(%esp),%ecx > 0x08058a81 <+209>: mov %esi,0x20(%esp) > 0x08058a85 <+213>: mov %ecx,0x24(%esp) > 0x08058a89 <+217>: mov 0x8(%edx),%ecx > 0x08058a8c <+220>: mov %ecx,0x1c(%esp) > 0x08058a90 <+224>: mov 0x4(%edx),%edx > 0x08058a93 <+227>: mov %eax,0xc(%esp) > 0x08058a97 <+231>: mov 0x8065e98,%eax > 0x08058a9c <+236>: mov %eax,0x8(%esp) > 0x08058aa0 <+240>: mov 0x8065218,%eax > 0x08058aa5 <+245>: mov %edx,0x18(%esp) > 0x08058aa9 <+249>: mov %ebx,0x4(%esp) > 0x08058aad <+253>: movl $0x0,0x14(%esp) > 0x08058ab5 <+261>: movl $0x0,0x10(%esp) > 0x08058abd <+269>: mov %eax,(%esp) > 0x08058ac0 <+272>: call 0x804a190 <XCopyArea@plt> > 0x08058ac5 <+277>: mov 0x8065218,%eax > 0x08058aca <+282>: mov %ebx,0x4(%esp) > 0x08058ace <+286>: mov %eax,(%esp) > 0x08058ad1 <+289>: call 0x804a660 <XFreePixmap@plt> > 0x08058ad6 <+294>: lea 0x7c(%esp),%esp > 0x08058ada <+298>: pop %ebx > 0x08058adb <+299>: pop %esi > 0x08058adc <+300>: pop %edi > 0x08058add <+301>: pop %ebp > 0x08058ade <+302>: ret > 0x08058adf <+303>: nop > 0x08058ae0 <+304>: xor %ebx,%ebx > 0x08058ae2 <+306>: test %ebp,%ebp > 0x08058ae4 <+308>: jne 0x8058a03 <updateSplashImage(QImage const&, int, int)+83> > 0x08058aea <+314>: lea 0x0(%esi),%esi > 0x08058af0 <+320>: xor %ecx,%ecx > 0x08058af2 <+322>: jmp 0x8058a0a <updateSplashImage(QImage const&, int, int)+90> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 841334
: 598955 |
598956