Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 697130 Details for
Bug 911007
[abrt] xscreensaver-extras-5.20-3.fc18: PutPixel32: Process /usr/libexec/xscreensaver/bumps was killed by signal 11 (SIGSEGV)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 12.47 KB, created by
Brian Fleury
on 2013-02-14 08:26:05 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Brian Fleury
Created:
2013-02-14 08:26:05 UTC
Size:
12.47 KB
patch
obsolete
>[New LWP 2490] >Core was generated by `bumps -window-id 67109190 -delay 30000 -duration 120'. >Program terminated with signal 11, Segmentation fault. >#0 PutPixel32 (pData=0x7feb5e20bffc "", pixel=0) at ../../hacks/bumps.c:149 >149 ../../hacks/bumps.c: No such file or directory. > >Thread 1 (LWP 2490): >#0 PutPixel32 (pData=0x7feb5e20bffc "", pixel=0) at ../../hacks/bumps.c:149 >No locals. >#1 0x0000000000404090 in Execute (pBumps=0x21f8e00) at ../../hacks/bumps.c:592 > nLightYPos = 28 > iScreenY = 91 > pDOffset = 0x7feb5e20bffc "" > nY = <optimized out> > iLightY = 47 > pBOffset = 0x220a21c > nX = <optimized out> > nColor = <optimized out> > nLightOffsetFar = 48 > nLightXPos = 42 > iScreenX = 105 > iLightX = <optimized out> >#2 bumps_draw (dpy=0x30, window=<optimized out>, closure=0x21f8e00) at ../../hacks/bumps.c:694 > Bumps = 0x21f8e00 >#3 0x0000000000402e6d in run_screenhack_table (ft=0x60b3e0 <bumps_xscreensaver_function_table>, window2=0, window=67109190, dpy=0x21e51c0) at ../../hacks/screenhack.c:553 > delay = <optimized out> > delay2 = <optimized out> > closure = 0x21f8e00 > fpst2 = 0x0 > init_cb = <optimized out> > fps_cb = 0x405010 <screenhack_do_fps> > fpst = 0x0 > closure2 = <optimized out> >#4 main (argc=1, argv=<optimized out>) at ../../hacks/screenhack.c:921 > ft = 0x60b3e0 <bumps_xscreensaver_function_table> > xgwa = {x = 24, y = 11, width = 151, height = 123, border_width = 0, depth = 24, visual = 0x21f09b0, root = 350, class = 1, bit_gravity = 0, win_gravity = 1, backing_store = 0, backing_planes = 4294967295, backing_pixel = 0, save_under = 0, colormap = 67109189, map_installed = 0, map_state = 2, all_event_masks = 4358144, your_event_mask = 131073, do_not_propagate_mask = 0, override_redirect = 0, screen = 0x21dfa50} > toplevel = 0x21f8e00 > dpy = 0x21e51c0 > window = 67109190 > window2 = 0 > toplevel2 = <optimized out> > app = <optimized out> > root_p = <optimized out> > on_window = <optimized out> > event = {type = 1576993824, xany = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, window = 140733193388033}, xkey = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, window = 140733193388033, root = 1700966438, subwindow = 140736764305776, time = 0, x = 1, y = 0, x_root = 1577033155, y_root = 32747, state = 38, keycode = 0, same_screen = -724049584}, xbutton = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, window = 140733193388033, root = 1700966438, subwindow = 140736764305776, time = 0, x = 1, y = 0, x_root = 1577033155, y_root = 32747, state = 38, button = 0, same_screen = -724049584}, xmotion = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, window = 140733193388033, root = 1700966438, subwindow = 140736764305776, time = 0, x = 1, y = 0, x_root = 1577033155, y_root = 32747, state = 38, is_hint = 0 '\000', same_screen = -724049584}, xcrossing = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, window = 140733193388033, root = 1700966438, subwindow = 140736764305776, time = 0, x = 1, y = 0, x_root = 1577033155, y_root = 32747, mode = 38, detail = 0, same_screen = -724049584, focus = 32767, state = 26577600}, xfocus = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, window = 140733193388033, mode = 1700966438, detail = 0}, xexpose = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, window = 140733193388033, x = 1700966438, y = 0, width = -724049552, height = 32767, count = 0}, xgraphicsexpose = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, drawable = 140733193388033, x = 1700966438, y = 0, width = -724049552, height = 32767, count = 0, major_code = 0, minor_code = 1}, xnoexpose = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, drawable = 140733193388033, major_code = 1700966438, minor_code = 0}, xvisibility = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, window = 140733193388033, state = 1700966438}, xcreatewindow = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, parent = 140733193388033, window = 1700966438, x = -724049552, y = 32767, width = 0, height = 0, border_width = 1, override_redirect = 0}, xdestroywindow = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, event = 140733193388033, window = 1700966438}, xunmap = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, event = 140733193388033, window = 1700966438, from_configure = -724049552}, xmap = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, event = 140733193388033, window = 1700966438, override_redirect = -724049552}, xmaprequest = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, parent = 140733193388033, window = 1700966438}, xreparent = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, event = 140733193388033, window = 1700966438, parent = 140736764305776, x = 0, y = 0, override_redirect = 1}, xconfigure = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, event = 140733193388033, window = 1700966438, x = -724049552, y = 32767, width = 0, height = 0, border_width = 1, above = 140648871075267, override_redirect = 38}, xgravity = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, event = 140733193388033, window = 1700966438, x = -724049552, y = 32767}, xresizerequest = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, window = 140733193388033, width = 1700966438, height = 0}, xconfigurerequest = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, parent = 140733193388033, window = 1700966438, x = -724049552, y = 32767, width = 0, height = 0, border_width = 1, above = 140648871075267, detail = 38, value_mask = 140736764305744}, xcirculate = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, event = 140733193388033, window = 1700966438, place = -724049552}, xcirculaterequest = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, parent = 140733193388033, window = 1700966438, place = -724049552}, xproperty = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, window = 140733193388033, atom = 1700966438, time = 140736764305776, state = 0}, xselectionclear = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, window = 140733193388033, selection = 1700966438, time = 140736764305776}, xselectionrequest = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, owner = 140733193388033, requestor = 1700966438, selection = 140736764305776, target = 0, property = 1, time = 140648871075267}, xselection = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, requestor = 140733193388033, selection = 1700966438, target = 140736764305776, property = 0, time = 1}, xcolormap = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, window = 140733193388033, colormap = 1700966438, new = -724049552, state = 32767}, xclient = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, window = 140733193388033, message_type = 1700966438, format = -724049552, data = {b = "\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\303\235\377]", s = {0, 0, 0, 0, 1, 0, 0, 0, -25149, 24063}, l = {0, 1, 140648871075267, 38, 140736764305744}}}, xmapping = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, window = 140733193388033, request = 1700966438, first_keycode = 0, count = -724049552}, xerror = {type = 1576993824, display = 0x7feb5e210fc8, resourceid = 140736764305632, serial = 140648871073476, error_code = 1 '\001', request_code = 0 '\000', minor_code = 0 '\000'}, xkeymap = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, window = 140733193388033, key_vector = "&\260be\000\000\000\000p\341\327\324\377\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000"}, xgeneric = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, extension = 1, evtype = 32767}, xcookie = {type = 1576993824, serial = 140648873267144, send_event = -724049696, display = 0x7feb5dff96c4 <check_match+308>, extension = 1, evtype = 32767, cookie = 1700966438, data = 0x7fffd4d7e170}, pad = {140648871035936, 140648873267144, 140736764305632, 140648871073476, 140733193388033, 1700966438, 140736764305776, 0, 1, 140648871075267, 38, 140736764305744, 26577600, 140736764838240, 140648871034880, 140648871036860, 140648871035792, 140648871073476, 140736764305608, 4131212846, 140736764305888, 8, 14, 140648871075536}} > dont_clear = <optimized out> > version = "Bumps: from the XScreenSaver 5.20-3.fc18 distribution (30-Oct-2012.)\000\000\000\000\250\"!^\353\177", '\000' <repeats 18 times>"\330, \001\340\324\377\177\000\000\070(!^\353\177", '\000' <repeats 11 times>, "&!^\353\177\000\000\340\341\327\324\377\177\000\000\300\341\327\324\377\177\000\000x\343\327\324\377\177\000\000\000\367 ^\353\177\000\000.N=\366\000\000\000\000z\024@\000\000\000\000\000\377\377\377\377", '\000' <repeats 28 times>"\220, \177\263\\\353\177\000\000\220I!^\353\177\000\000x\343\327\324\377\177\000\000x\343\327\324\377\177\000\000x\343\327\324\377\177\000\000\250\"!^\353\177" >From To Syms Read Shared Object Library >0x00007feb5dde9c20 0x00007feb5ddedd38 Yes /lib64/libSM.so.6 >0x00007feb5dbccf30 0x00007feb5dbda59c Yes /lib64/libICE.so.6 >0x00007feb5d9731b0 0x00007feb5d9af2bc Yes /lib64/libXt.so.6 >0x00007feb5d63dee0 0x00007feb5d6c4280 Yes /lib64/libX11.so.6 >0x00007feb5d4067c0 0x00007feb5d41410c Yes /lib64/libXmu.so.6 >0x00007feb5d1eb740 0x00007feb5d1f5810 Yes /lib64/libXext.so.6 >0x00007feb5cee55b0 0x00007feb5cf4fd68 Yes /lib64/libm.so.6 >0x00007feb5cb471a0 0x00007feb5cc887a0 Yes /lib64/libc.so.6 >0x00007feb5c921510 0x00007feb5c922a8c Yes /lib64/libuuid.so.1 >0x00007feb5c709a00 0x00007feb5c7158f8 Yes /lib64/libxcb.so.1 >0x00007feb5c4f8ed0 0x00007feb5c4f99f0 Yes /lib64/libdl.so.2 >0x00007feb5dff0b20 0x00007feb5e00a3f9 Yes /lib64/ld-linux-x86-64.so.2 >0x00007feb5c2f0eb0 0x00007feb5c2f1bcc Yes /lib64/libXau.so.6 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0x6a 106 >rbx 0x5b 91 >rcx 0x20 32 >rdx 0x21db370 35500912 >rsi 0x0 0 >rdi 0x7feb5e20bffc 140648873246716 >rbp 0xffffffffffffffc6 0xffffffffffffffc6 >rsp 0x7fffd4d7dd08 0x7fffd4d7dd08 >r8 0x15 21 >r9 0x0 0 >r10 0x0 0 >r11 0x246 582 >r12 0x7feb5e20bffc 140648873246716 >r13 0x220a21c 35693084 >r14 0x69 105 >r15 0x21f8e00 35622400 >rip 0x403820 0x403820 <PutPixel32> >eflags 0x10206 [ PF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >Dump of assembler code for function PutPixel32: >=> 0x0000000000403820 <+0>: mov %rsi,(%rdi) > 0x0000000000403823 <+3>: retq >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 911007
: 697130 |
697131
|
697132
|
697133
|
697134
|
697135
|
697136
|
697137
|
697138
|
697139
|
697140