Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 637488 Details for
Bug 872812
[abrt] ghostscript-9.05-4.fc17: gsapi_new_instance: Process /usr/bin/gs was killed by signal 11 (SIGSEGV)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 5.95 KB, created by
franzman72
on 2012-11-03 13:29:22 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
franzman72
Created:
2012-11-03 13:29:22 UTC
Size:
5.95 KB
patch
obsolete
>[New LWP 1653] >warning: .dynamic section for "/lib/libjasper.so.1" is not at the expected address (wrong library or version mismatch?) >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib/libthread_db.so.1". >Core was generated by `/usr/bin/gs -dQUIET -dPARANOIDSAFER -dNOPAUSE -dBATCH -dNOINTERPOLATE -dNOMEDIA'. >Program terminated with signal 11, Segmentation fault. >#0 gsapi_new_instance (pinstance=pinstance@entry=0xbfced108, caller_handle=caller_handle@entry=0x0) at psi/iapi.c:59 >59 { > >Thread 1 (Thread 0xb6e71740 (LWP 1653)): >#0 gsapi_new_instance (pinstance=pinstance@entry=0xbfced108, caller_handle=caller_handle@entry=0x0) at psi/iapi.c:59 > mem = 0x0 > minst = 0x0 >#1 0x080486ec in main (argc=14, argv=0xbfced1c4) at psi/dxmainc.c:82 > exit_status = <optimized out> > code = 1 > code1 = <optimized out> > instance = <optimized out> > exit_code = 1114484573 >From To Syms Read Shared Object Library >0xb6f6ad20 0xb72b28a4 Yes /lib/libgs.so.9 >0x426bff20 0x4280002c Yes /lib/libc.so.6 >0x43f20cb0 0x43f562c4 Yes /lib/liblcms2.so.2 >0x46516050 0x4654c850 Yes /lib/libjasper.so.1 >0x4383ae50 0x4386f554 Yes /lib/libtiff.so.3 >0x43374860 0x433aebc4 Yes /lib/libjpeg.so.62 >0xb6ed27e0 0xb6ee6ef4 Yes /lib/libcupsimage.so.2 >0xb6e83540 0xb6ebe0c4 Yes /lib/libcups.so.2 >0x41531e90 0x41562434 Yes /lib/libgssapi_krb5.so.2 >0x41459af0 0x414dcde4 Yes /lib/libkrb5.so.3 >0x43730b40 0x4374b224 Yes /lib/libk5crypto.so.3 >0x41442f20 0x41443ca4 Yes /lib/libcom_err.so.2 >0x428686a0 0x42873e60 Yes /lib/libpthread.so.0 >0x43be29c0 0x43be7c7c Yes /lib/libcrypt.so.1 >0x42884470 0x4289e678 Yes /lib/libm.so.6 >0x42c66d60 0x42c85c64 Yes /lib/libpng15.so.15 >0x428ae6e0 0x428bba7c Yes /lib/libz.so.1 >0x4285dad0 0x4285eaec Yes /lib/libdl.so.2 >0x42fce0e0 0x42fe97e4 Yes /lib/libfontconfig.so.1 >0x42bc3610 0x42c32674 Yes /lib/libfreetype.so.6 >0x42911020 0x42927b64 Yes /lib/libgcc_s.so.1 >0x42686850 0x4269eec7 Yes /lib/ld-linux.so.2 >0x43769610 0x4376fa94 Yes /lib/libavahi-common.so.3 >0x4100f960 0x41019494 Yes /lib/libavahi-client.so.3 >0x43e02c50 0x43e8f124 Yes /lib/libgnutls.so.26 >0x43d16470 0x43d6d7f8 Yes /lib/libgcrypt.so.11 >0x43d956b0 0x43d95ce0 Yes /lib/libgpg-error.so.0 >0x43468ee0 0x4346e724 Yes /lib/libkrb5support.so.0 >0x43728d30 0x43729a7c Yes /lib/libkeyutils.so.1 >0x428f66b0 0x42904e94 Yes /lib/libresolv.so.2 >0x4638ab00 0x463be784 Yes /lib/libfreebl3.so >0x42fa11b0 0x42fba434 Yes /lib/libexpat.so.1 >0x421d27e0 0x422020b4 Yes /lib/libdbus-1.so.3 >0x428c6920 0x428ca45c Yes /lib/librt.so.1 >0x43960300 0x4396c1b4 Yes /lib/libtasn1.so.3 >0x4394ce40 0x439565b4 Yes /lib/libp11-kit.so.0 >0x428d48e0 0x428e6d94 Yes /lib/libselinux.so.1 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >eax 0xbfced108 -1076965112 >ecx 0xbfced1c4 -1076964924 >edx 0x80486c0 134514368 >ebx 0x8049cec 134520044 >esp 0xbfced0ec 0xbfced0ec >ebp 0xbfced128 0xbfced128 >esi 0x0 0 >edi 0x0 0 >eip 0xb6fe6b40 0xb6fe6b40 <gsapi_new_instance> >eflags 0x10292 [ AF SF IF RF ] >cs 0x73 115 >ss 0x7b 123 >ds 0x7b 123 >es 0x7b 123 >fs 0x0 0 >gs 0x33 51 >Dump of assembler code for function gsapi_new_instance: >=> 0xb6fe6b40 <+0>: lea -0x1c(%esp),%esp > 0xb6fe6b44 <+4>: mov %edi,0x18(%esp) > 0xb6fe6b48 <+8>: mov 0x20(%esp),%edi > 0xb6fe6b4c <+12>: mov %ebx,0x10(%esp) > 0xb6fe6b50 <+16>: mov %esi,0x14(%esp) > 0xb6fe6b54 <+20>: call 0xb6f6d688 <__x86.get_pc_thunk.bx> > 0xb6fe6b59 <+25>: add $0x4fb49b,%ebx > 0xb6fe6b5f <+31>: test %edi,%edi > 0xb6fe6b61 <+33>: je 0xb6fe6c00 <gsapi_new_instance+192> > 0xb6fe6b67 <+39>: mov 0x2aaeb4(%ebx),%eax > 0xb6fe6b6d <+45>: test %eax,%eax > 0xb6fe6b6f <+47>: jg 0xb6fe6c00 <gsapi_new_instance+192> > 0xb6fe6b75 <+53>: add $0x1,%eax > 0xb6fe6b78 <+56>: mov %eax,0x2aaeb4(%ebx) > 0xb6fe6b7e <+62>: call 0xb6f5f710 <gs_malloc_init@plt> > 0xb6fe6b83 <+67>: test %eax,%eax > 0xb6fe6b85 <+69>: mov %eax,%esi > 0xb6fe6b87 <+71>: je 0xb6fe6c00 <gsapi_new_instance+192> > 0xb6fe6b89 <+73>: mov %eax,(%esp) > 0xb6fe6b8c <+76>: call 0xb6f63da0 <gs_main_alloc_instance@plt> > 0xb6fe6b91 <+81>: test %eax,%eax > 0xb6fe6b93 <+83>: je 0xb6fe6bef <gsapi_new_instance+175> > 0xb6fe6b95 <+85>: mov 0x60(%esi),%edx > 0xb6fe6b98 <+88>: mov %eax,0x3c(%edx) > 0xb6fe6b9b <+91>: mov 0x60(%esi),%eax > 0xb6fe6b9e <+94>: mov 0x24(%esp),%edx > 0xb6fe6ba2 <+98>: mov %edx,0x20(%eax) > 0xb6fe6ba5 <+101>: mov 0x60(%esi),%eax > 0xb6fe6ba8 <+104>: movl $0x0,0x24(%eax) > 0xb6fe6baf <+111>: mov 0x60(%esi),%eax > 0xb6fe6bb2 <+114>: movl $0x0,0x28(%eax) > 0xb6fe6bb9 <+121>: mov 0x60(%esi),%eax > 0xb6fe6bbc <+124>: movl $0x0,0x2c(%eax) > 0xb6fe6bc3 <+131>: mov 0x60(%esi),%eax > 0xb6fe6bc6 <+134>: movl $0x0,0x30(%eax) > 0xb6fe6bcd <+141>: mov 0x60(%esi),%eax > 0xb6fe6bd0 <+144>: movl $0x0,0x34(%eax) > 0xb6fe6bd7 <+151>: mov 0x60(%esi),%eax > 0xb6fe6bda <+154>: mov %eax,(%edi) > 0xb6fe6bdc <+156>: xor %eax,%eax > 0xb6fe6bde <+158>: mov 0x10(%esp),%ebx > 0xb6fe6be2 <+162>: mov 0x14(%esp),%esi > 0xb6fe6be6 <+166>: mov 0x18(%esp),%edi > 0xb6fe6bea <+170>: lea 0x1c(%esp),%esp > 0xb6fe6bee <+174>: ret > 0xb6fe6bef <+175>: mov %esi,(%esp) > 0xb6fe6bf2 <+178>: call 0xb6f5fb50 <gs_malloc_release@plt> > 0xb6fe6bf7 <+183>: mov %esi,%esi > 0xb6fe6bf9 <+185>: lea 0x0(%edi,%eiz,1),%edi > 0xb6fe6c00 <+192>: mov $0xffffff9c,%eax > 0xb6fe6c05 <+197>: jmp 0xb6fe6bde <gsapi_new_instance+158> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 872812
:
637485
|
637486
|
637487
| 637488 |
637489
|
637490
|
637491
|
637492
|
637493
|
637494
|
637495