Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 605007 Details for
Bug 848934
[abrt] xorg-x11-server-Xorg-1.12.2-4.fc17: __GI___libc_current_sigrtmin: Process /usr/bin/Xorg was killed by signal 6 (SIGABRT)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 5.46 KB, created by
Sjoerd Mullender
on 2012-08-16 20:51:33 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Sjoerd Mullender
Created:
2012-08-16 20:51:33 UTC
Size:
5.46 KB
patch
obsolete
>warning: core file may not match specified executable file. >[New LWP 2912] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `/bin/X :1 -auth /var/run/lightdm/root/:1 -nolisten tcp vt7 -novtswitch'. >Program terminated with signal 6, Aborted. >#0 0x00007fa842fc4925 in __GI___libc_current_sigrtmin () at ../nptl/sysdeps/unix/sysv/linux/allocrtsig.c:33 >33 } > >Thread 1 (Thread 0x7fa843e628c0 (LWP 2912)): >#0 0x00007fa842fc4925 in __GI___libc_current_sigrtmin () at ../nptl/sysdeps/unix/sysv/linux/allocrtsig.c:33 >No locals. >#1 0x00007fa842fc60d8 in __GI_qsort_r (b=<error reading variable: Cannot access memory at address 0xffffffffffffff98>, n=<error reading variable: Cannot access memory at address 0xffffffffffffff80>, s=1, cmp=0x18, arg=<optimized out>) at msort.c:190 > phys_pages = 253042 > pagesize = 4096 > save = <optimized out> > size = 0 > tmp = 0x0 > p = <error reading variable p (Cannot access memory at address 0xffffffffffffffa0)> >Backtrace stopped: previous frame inner to this frame (corrupt stack?) >From To Syms Read Shared Object Library >0x00000039e3202ef0 0x00000039e320a2d6 Yes /lib64/libudev.so.0 >0x00000039cfa5ca00 0x00000039cfb24528 Yes /lib64/libcrypto.so.10 >0x00007fa843a64ea0 0x00007fa843a659e0 Yes /lib64/libdl.so.2 >0x00000039d2602320 0x00000039d2606520 Yes /lib64/libpciaccess.so.0 >0x00007fa84384d790 0x00007fa843858494 Yes /lib64/libpthread.so.0 >0x00000039d9a08d80 0x00000039d9a72eec Yes /lib64/libpixman-1.so.0 >0x00000039d3e090c0 0x00000039d3e27fe0 Yes /lib64/libXfont.so.1 >0x00000039d2e00e80 0x00000039d2e01bb0 Yes /lib64/libXau.so.6 >0x00000039d5201350 0x00000039d5202d6c Yes /lib64/libXdmcp.so.6 >0x00000039dc2028c0 0x00000039dc208060 Yes /lib64/libaudit.so.1 >0x00007fa8435525f0 0x00007fa8435b9a4c Yes /lib64/libm.so.6 >0x00007fa843347260 0x00007fa84334a54c Yes /lib64/librt.so.1 >0x00007fa842facf60 0x00007fa8430ed780 Yes /lib64/libc.so.6 >0x00000039d2201f50 0x00000039d220e648 Yes /lib64/libz.so.1 >0x00007fa843c68b20 0x00007fa843c82319 Yes /lib64/ld-linux-x86-64.so.2 > No /usr/lib64/freetype-freeworld/libfreetype.so.6 >0x00000039d3601610 0x00000039d3603440 Yes /lib64/libfontenc.so.1 >0x00000039d42029d0 0x00000039d4212148 Yes /lib64/libgcc_s.so.1 >0x00007fa842d75360 0x00007fa842d883a8 Yes /usr/lib64/xorg/modules/extensions/libextmod.so >0x00007fa842b36fc0 0x00007fa842b47768 Yes /lib64/libselinux.so.1 >0x00007fa84292c180 0x00007fa84292e924 Yes /usr/lib64/xorg/modules/extensions/libdbe.so >0x00007fa8426c9aa0 0x00007fa842705b64 Yes /usr/lib64/xorg/modules/extensions/libglx.so >0x00007fa8424b9500 0x00007fa8424bd64c Yes /usr/lib64/xorg/modules/extensions/librecord.so >0x00007fa8422b0080 0x00007fa8422b5568 Yes /usr/lib64/xorg/modules/extensions/libdri.so >0x00000039de603080 0x00000039de607c44 Yes /lib64/libdrm.so.2 >0x00007fa8420a8680 0x00007fa8420ab11c Yes /usr/lib64/xorg/modules/extensions/libdri2.so >0x00007fa841e76a30 0x00007fa841e9b5e8 Yes /usr/lib64/xorg/modules/drivers/nouveau_drv.so >0x00007fa841c6c8c0 0x00007fa841c6eeb8 Yes /lib64/libdrm_nouveau.so.1 >0x00007fa841a66240 0x00007fa841a68e08 Yes /usr/lib64/xorg/modules/drivers/vesa_drv.so >0x00007fa841860230 0x00007fa841861b9c Yes /usr/lib64/xorg/modules/drivers/fbdev_drv.so >0x00007fa84165a5a0 0x00007fa84165bf58 Yes /usr/lib64/xorg/modules/libfbdevhw.so >0x00007fa84143b380 0x00007fa841453634 Yes /usr/lib64/xorg/modules/libfb.so >0x00007fa841221570 0x00007fa84123165c Yes /usr/lib64/xorg/modules/libexa.so >0x00007fa841016ca0 0x00007fa84101c55c Yes /usr/lib64/xorg/modules/libshadowfb.so >0x00007fa84079fe60 0x00007fa840a98b0c Yes /usr/lib64/dri/nouveau_dri.so >0x00000039d4601950 0x00000039d46060ec Yes /lib64/libffi.so.5 >0x00000039d7203dd0 0x00000039d721cccc Yes /lib64/libexpat.so.1 >0x00007fa83f382350 0x00007fa83ffad5e0 Yes /usr/lib64/llvm/libLLVM-3.0.so >0x00000039d765baf0 0x00000039d76c13ab Yes /lib64/libstdc++.so.6 >0x00007fa83e3d6130 0x00007fa83e3dc688 Yes /usr/lib64/xorg/modules/input/evdev_drv.so >0x00007fa83e1b2fb0 0x00007fa83e1b5480 Yes /lib64/libmtdev.so.1 >0x00007fa83dfa3660 0x00007fa83dfae0cc Yes /usr/lib64/xorg/modules/input/synaptics_drv.so >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0x0 0 >rbx 0x1 1 >rcx 0xffffffffffffffff -1 >rdx 0x6 6 >rsi 0xb60 2912 >rdi 0xb60 2912 >rbp 0x0 0x0 >rsp 0x7fff220adf58 0x7fff220adf58 >r8 0x1 1 >r9 0x0 0 >r10 0x8 8 >r11 0x3206 12806 >r12 0x1006290 16802448 >r13 0x0 0 >r14 0x60 96 >r15 0x18 24 >rip 0x7fa842fc4925 0x7fa842fc4925 <__GI___libc_current_sigrtmin+5> >eflags 0x3206 [ PF IF #12 #13 ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >Dump of assembler code for function __GI___libc_current_sigrtmin: > 0x00007fa842fc4920 <+0>: mov 0x37974a(%rip),%eax # 0x7fa84333e070 <current_rtmin> > 0x00007fa842fc4926 <+6>: retq >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 848934
: 605007 |
605008
|
605009