Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 696718 Details for
Bug 910644
[abrt] setroubleshoot-3.0.35-1.fc13: memcpy: Process /usr/bin/seapplet was killed by signal 11 (SIGSEGV)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 8.77 KB, created by
The Celt
on 2013-02-13 05:33:24 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
The Celt
Created:
2013-02-13 05:33:24 UTC
Size:
8.77 KB
patch
obsolete
>[New Thread 2791] >warning: section .tbcs not found in /var/cache/abrt-di/usr/lib/debug/.build-id/bb/09993c5e108d59af8b844becbac35a28c000a0.debug >Core was generated by `/usr/bin/seapplet'. >Program terminated with signal 11, Segmentation fault. >#0 __memcpy_ia32 () at ../sysdeps/i386/i686/memcpy.S:75 >75 ../sysdeps/i386/i686/memcpy.S: No such file or directory. > in ../sysdeps/i386/i686/memcpy.S > >Thread 1 (Thread 2791): >#0 __memcpy_ia32 () at ../sysdeps/i386/i686/memcpy.S:75 >No locals. >#1 0x0856ba40 in ?? () >No symbol table info available. >#2 0x00dee6bf in _xgeGetExtensionVersion (dpy=0x85508f8, info=0xafe184a0) > at Xge.c:184 > rep = {repType = 0 '\000', RepType = 14 '\016', sequenceNumber = > 2134, length = 35, majorVersion = 58368, minorVersion = 222, pad00 = > 14624384, pad01 = 0, pad02 = 0, pad03 = 3219227912, pad04 = 13248767} > req = <value optimized out> > vers = <value optimized out> >#3 _xgeCheckExtInit (dpy=0x85508f8, info=0xafe184a0) at Xge.c:147 > data = <value optimized out> >#4 0x00dee834 in xgeExtRegister (dpy=0x8560e00, offset=148, callbacks= > 0x39ebce0) at Xge.c:307 > newExt = <value optimized out> > xge_data = <value optimized out> > info = 0x856d6d8 >#5 0x00deede7 in XextAddDisplay (extinfo=0x39ebd14, dpy=0x8560e00, > ext_name=<value optimized out>, hooks=0x39ebce0, nevents=2, data=0x0) > at extutil.c:128 > i = <value optimized out> > j = <value optimized out> > dpyinfo = 0x856d720 >#6 0x039e53d0 in XRRFindDisplay (dpy=<value optimized out>) at Xrandr.c:232 > dpyinfo = 0x0 > xrri = <value optimized out> > i = <value optimized out> > numscreens = <value optimized out> >#7 0x039e58c2 in XRRQueryExtension (dpy=<value optimized out>, > event_base_return=<value optimized out>, > error_base_return=<value optimized out>) at Xrandr.c:289 > info = <value optimized out> >#8 0x00629914 in IA__gdk_display_open (display_name=0x0) > at gdkdisplay-x11.c:186 > xdisplay = 0x8560e00 > display = 0x856c0b0 [GdkDisplayX11] > display_x11 = 0x856c0b0 [GdkDisplayX11] > attr = {title = 0x0, event_mask = -1075739080, x = 11551794, y = > 9702198, width = 0, height = 4, wclass = 11615245, visual = 0x0, > colormap = 0x0, window_type = 3219228280, cursor = 0xb28048, > wmclass_name = 0x0, wmclass_class = 0xa583a0 "", > override_redirect = 5, type_hint = 12370504} > argc = <value optimized out> > argv = {0x5f4c00 "\211\006\353\260\215\266"} > sm_client_id = <value optimized out> > class_hint = <value optimized out> > pid = <value optimized out> > i = <value optimized out> > ignore = 0 > maj = <value optimized out> > min = <value optimized out> >#9 0x005f4c95 in IA__gdk_display_open_default_libgtk_only () at gdk.c:324 > display = 0x0 > __PRETTY_FUNCTION__ = "IA__gdk_display_open_default_libgtk_only" >#10 0x04a61b92 in IA__gtk_init_check (argc=0xbfe18920, argv=0xbfe1874c) > at gtkmain.c:962 >No locals. >#11 0x04a61bd5 in IA__gtk_init (argc=0xbfe18920, argv=0xbfe1874c) > at gtkmain.c:1006 >No locals. >#12 0x0804998f in main (argc=1, argv=0xbfe189c4) at seapplet.c:417 > alert = {trayIcon = 0xa583d0, notify = 0x0, need_bubble = 0, > redFile = 0x944e71 "\272", yellowFile = 0x0} > local_id = 0x0 > home = <value optimized out> > ctr = 0 > window = <value optimized out> > err = {name = 0xbfe18838 "X\210\341\277\336)\224", message = > 0x94238b "\213U\224\213M\230\205\300\211E\360tk\213\203\304\376\377\377\213", dummy1 = 0, dummy2 = 0, dummy3 = 0, dummy4 = 0, dummy5 = 0, padding1 = > 0x951270} > conn = <value optimized out> > conn2 = <value optimized out> >From To Syms Read Shared Object Library >0x002626c0 0x00265ac8 Yes /usr/lib/libnotify.so.1 >0x0496a810 0x04c49788 Yes /usr/lib/libgtk-x11-2.0.so.0 >0x005f44f0 0x0065a6c8 Yes /usr/lib/libgdk-x11-2.0.so.0 >0x00475480 0x00482ad8 Yes /usr/lib/libatk-1.0.so.0 >0x002b18d0 0x00322c68 Yes /lib/libgio-2.0.so.0 >0x0069d510 0x006b8918 Yes /usr/lib/libpangoft2-1.0.so.0 >0x004522e0 0x00464e18 Yes /usr/lib/libgdk_pixbuf-2.0.so.0 >0x00493440 0x00498558 Yes /usr/lib/libpangocairo-1.0.so.0 >0x004a5210 0x004ff688 Yes /usr/lib/libcairo.so.2 >0x0059f210 0x005c13e8 Yes /usr/lib/libpango-1.0.so.0 >0x001513c0 0x001ba7a8 Yes /usr/lib/libfreetype.so.6 >0x00211f60 0x0022dcc8 Yes /usr/lib/libfontconfig.so.1 >0x00df5c30 0x00df6d88 Yes /lib/libgmodule-2.0.so.0 >0x415cc720 0x415de8c8 Yes /usr/lib/libdbus-glib-1.so.2 >0x00106220 0x00132598 Yes /lib/libdbus-1.so.3 >0x00a615e0 0x00a6d518 Yes /lib/libpthread.so.0 >0x00c187d0 0x00c446f8 Yes /lib/libgobject-2.0.so.0 >0x00bf0f40 0x00bf26b8 Yes /lib/libgthread-2.0.so.0 >0x00ac3880 0x00ac7678 Yes /lib/librt.so.1 >0x00ade590 0x00b6a478 Yes /lib/libglib-2.0.so.0 >0x0027fa50 0x002871f8 Yes /lib/libauparse.so.0 >0x00bd3210 0x00be4b48 Yes /lib/libselinux.so.1 >0x008e6aa0 0x00a051f4 Yes /lib/libc.so.6 >0x00c92370 0x00d23908 Yes /usr/lib/libX11.so.6 >0x02bc0e70 0x02bc33a8 Yes /usr/lib/libXfixes.so.3 >0x00a7d470 0x00a97968 Yes /lib/libm.so.6 >0x00de46e0 0x00deeef8 Yes /usr/lib/libXext.so.6 >0x039da2c0 0x039e0178 Yes /usr/lib/libXrender.so.1 >0x00dfb780 0x00dfc258 Yes /usr/lib/libXinerama.so.1 >0x00246780 0x00250608 Yes /usr/lib/libXi.so.6 >0x039e5150 0x039e9c38 Yes /usr/lib/libXrandr.so.2 >0x039cee40 0x039d4448 Yes /usr/lib/libXcursor.so.1 >0x00273890 0x00274488 Yes /usr/lib/libXcomposite.so.1 >0x002787c0 0x00279248 Yes /usr/lib/libXdamage.so.1 >0x00aa6a60 0x00aa7a88 Yes /lib/libdl.so.2 >0x00bf9650 0x00c07ec8 Yes /lib/libresolv.so.2 >0x00aae620 0x00ab98e8 Yes /lib/libz.so.1 >0x001e76f0 0x002036d8 Yes /usr/lib/libpng12.so.0 >0x00528b40 0x00580a68 Yes /usr/lib/libpixman-1.so.0 >0x00dba040 0x00dd2ef8 Yes /lib/libexpat.so.1 >0x008ae830 0x008c60bf Yes /lib/ld-linux.so.2 >0x0035baf0 0x00361788 Yes /lib/libaudit.so.1 >0x00c5fe80 0x00c6e608 Yes /usr/lib/libxcb.so.1 >0x00c79a00 0x00c7a7f8 Yes /usr/lib/libXau.so.6 >0x0028fa00 0x00297968 Yes /lib/libnss_files.so.2 >$1 = 0x0 >$2 = 0x0 >eax 0x0 0 >ecx 0x8 8 >edx 0x8560e00 139857408 >ebx 0xdb3044 14364740 >esp 0xbfe18428 0xbfe18428 >ebp 0xbfe18478 0xbfe18478 >esi 0x85508f8 139790584 >edi 0xafe184a0 -1344174944 >eip 0x948c36 0x948c36 <__memcpy_ia32+70> >eflags 0x10246 [ PF ZF IF RF ] >cs 0x73 115 >ss 0x7b 123 >ds 0x7b 123 >es 0x7b 123 >fs 0x0 0 >gs 0x33 51 >Dump of assembler code for function __memcpy_ia32: > 0x00948bf0 <+0>: mov %edi,%eax > 0x00948bf2 <+2>: mov 0x4(%esp),%edi > 0x00948bf6 <+6>: mov %esi,%edx > 0x00948bf8 <+8>: mov 0x8(%esp),%esi > 0x00948bfc <+12>: mov %edi,%ecx > 0x00948bfe <+14>: xor %esi,%ecx > 0x00948c00 <+16>: and $0x3,%ecx > 0x00948c03 <+19>: mov 0xc(%esp),%ecx > 0x00948c07 <+23>: cld > 0x00948c08 <+24>: jne 0x948c46 <__memcpy_ia32+86> > 0x00948c0a <+26>: cmp $0x3,%ecx > 0x00948c0d <+29>: jbe 0x948c46 <__memcpy_ia32+86> > 0x00948c0f <+31>: test $0x3,%esi > 0x00948c15 <+37>: je 0x948c2d <__memcpy_ia32+61> > 0x00948c17 <+39>: movsb %ds:(%esi),%es:(%edi) > 0x00948c18 <+40>: dec %ecx > 0x00948c19 <+41>: test $0x3,%esi > 0x00948c1f <+47>: je 0x948c2d <__memcpy_ia32+61> > 0x00948c21 <+49>: movsb %ds:(%esi),%es:(%edi) > 0x00948c22 <+50>: dec %ecx > 0x00948c23 <+51>: test $0x3,%esi > 0x00948c29 <+57>: je 0x948c2d <__memcpy_ia32+61> > 0x00948c2b <+59>: movsb %ds:(%esi),%es:(%edi) > 0x00948c2c <+60>: dec %ecx > 0x00948c2d <+61>: push %eax > 0x00948c2e <+62>: mov %ecx,%eax > 0x00948c30 <+64>: shr $0x2,%ecx > 0x00948c33 <+67>: and $0x3,%eax >=> 0x00948c36 <+70>: rep movsl %ds:(%esi),%es:(%edi) > 0x00948c38 <+72>: mov %eax,%ecx > 0x00948c3a <+74>: rep movsb %ds:(%esi),%es:(%edi) > 0x00948c3c <+76>: pop %eax > 0x00948c3d <+77>: mov %eax,%edi > 0x00948c3f <+79>: mov %edx,%esi > 0x00948c41 <+81>: mov 0x4(%esp),%eax > 0x00948c45 <+85>: ret > 0x00948c46 <+86>: shr %ecx > 0x00948c48 <+88>: jae 0x948c4b <__memcpy_ia32+91> > 0x00948c4a <+90>: movsb %ds:(%esi),%es:(%edi) > 0x00948c4b <+91>: shr %ecx > 0x00948c4d <+93>: jae 0x948c51 <__memcpy_ia32+97> > 0x00948c4f <+95>: movsw %ds:(%esi),%es:(%edi) > 0x00948c51 <+97>: rep movsl %ds:(%esi),%es:(%edi) > 0x00948c53 <+99>: jmp 0x948c3d <__memcpy_ia32+77> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 910644
: 696718