Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 716785 Details for
Bug 928115
[abrt] xdotool-2.20110530.1-2.fc17: args_main: Process /usr/bin/xdotool was killed by signal 11 (SIGSEGV)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 8.12 KB, created by
Arnon Weinberg
on 2013-03-27 00:04:01 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Arnon Weinberg
Created:
2013-03-27 00:04:01 UTC
Size:
8.12 KB
patch
obsolete
>[New LWP 4521] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `xdotool search --maxdepth 1'. >Program terminated with signal 11, Segmentation fault. >#0 args_main (argc=<optimized out>, argc@entry=4, argv=<optimized out>, argv@entry=0x7fffbaea41d8) at xdotool.c:502 >502 context.xdo->debug = context.debug; > >Thread 1 (Thread 0x7fe5fe478740 (LWP 4521)): >#0 args_main (argc=<optimized out>, argc@entry=4, argv=<optimized out>, argv@entry=0x7fffbaea41d8) at xdotool.c:502 > ret = 0 > opt = <optimized out> > option_index = 53 > usage = 0x409b06 "Usage: %s <cmd> <args>\n" > long_options = {{name = 0x409bc9 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x409bce "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} > context = {xdo = 0x0, prog = 0x7fffbaea64c2 "xdotool", argc = 3, argv = 0x7fffbaea41e0, debug = -1, windows = 0x0, nwindows = 0, window_placeholder = {140736329311434}, last_mouse_x = 4234070, last_mouse_y = 0, last_mouse_screen = 1325080384, have_last_mouse = 0} >#1 0x00000000004037f4 in xdotool_main (argc=4, argv=0x7fffbaea41d8) at xdotool.c:316 > data = {st_dev = 228952508680, st_ino = 140625790352568, st_nlink = 4131212846, st_mode = 4199815, st_uid = 0, st_gid = 4294967295, __pad0 = 0, st_rdev = 0, st_size = 8388608, st_blksize = -1, st_blocks = 228954537568, st_atim = {tv_sec = 140625790358736, tv_nsec = 140736329302528}, st_mtim = {tv_sec = 140736329302528, tv_nsec = 140736329302528}, st_ctim = {tv_sec = 4203033, tv_nsec = 1}, __unused = {4233213, 0, 0}} > stat_ret = -1 >#2 0x000000354ec21735 in __libc_start_main (main=0x4028e0 <main>, argc=4, ubp_av=0x7fffbaea41d8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffbaea41c8) at libc-start.c:226 > result = <optimized out> > unwind_buf = {cancel_jmp_buf = {{jmp_buf = {0, -8341358904053102169, 4204776, 140736329302480, 0, 0, 8341510462002661799, -8334166466554918489}, mask_was_saved = 0}}, priv = {pad = {0x0, 0x0, 0x4097a0, 0x7fffbaea41d8}, data = {prev = 0x0, cleanup = 0x0, canceltype = 4233120}}} > not_first_call = <optimized out> >#3 0x0000000000402911 in _start () >No symbol table info available. >From To Syms Read Shared Object Library >0x00007fe5fe482740 0x00007fe5fe4872ac Yes /lib64/libxdo.so.2 >0x000000354fc055f0 0x000000354fc6ca0c Yes /lib64/libm.so.6 >0x000000354f802260 0x000000354f80554c Yes /lib64/librt.so.1 >0x0000003552c1dea0 0x0000003552ca4260 Yes /lib64/libX11.so.6 >0x0000003560401480 0x0000003560403e48 Yes /lib64/libXtst.so.6 >0x0000003554c00b00 0x0000003554c01438 Yes /lib64/libXinerama.so.1 >0x000000354ec1ef60 0x000000354ed5f7a0 Yes /lib64/libc.so.6 >0x000000354f405790 0x000000354f410494 Yes /lib64/libpthread.so.0 >0x000000354e800b20 0x000000354e81a2e9 Yes /lib64/ld-linux-x86-64.so.2 >0x00000035530099c0 0x00000035530158d8 Yes /lib64/libxcb.so.1 >0x000000354f000ea0 0x000000354f0019e0 Yes /lib64/libdl.so.2 >0x0000003553803700 0x000000355380d7d0 Yes /lib64/libXext.so.6 >0x0000003556002130 0x000000355600bfb4 Yes /lib64/libXi.so.6 >0x0000003552800e80 0x0000003552801bb0 Yes /lib64/libXau.so.6 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0x0 0 >rbx 0x3 3 >rcx 0x42 66 >rdx 0x0 0 >rsi 0x409b25 4234021 >rdi 0x7fffbaea3fd0 140736329301968 >rbp 0x7fffbaea41e0 0x7fffbaea41e0 >rsp 0x7fffbaea3fc0 0x7fffbaea3fc0 >r8 0xffff 65535 >r9 0x0 0 >r10 0x354ec866e0 228955023072 >r11 0x3 3 >r12 0x7fffbaea41d8 140736329302488 >r13 0x4 4 >r14 0xffffffff 4294967295 >r15 0x0 0 >rip 0x4032ab 0x4032ab <args_main+219> >eflags 0x10246 [ PF ZF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >Dump of assembler code for function args_main: > 0x00000000004031d0 <+0>: push %rbp > 0x00000000004031d1 <+1>: mov %rsi,%rbp > 0x00000000004031d4 <+4>: push %rbx > 0x00000000004031d5 <+5>: mov %edi,%ebx > 0x00000000004031d7 <+7>: sub $0x68,%rsp > 0x00000000004031db <+11>: cmp $0x1,%edi > 0x00000000004031de <+14>: jle 0x4032db <args_main+267> > 0x00000000004031e4 <+20>: lea 0xc(%rsp),%r8 > 0x00000000004031e9 <+25>: mov $0x60ee20,%ecx > 0x00000000004031ee <+30>: mov $0x409b1e,%edx > 0x00000000004031f3 <+35>: callq 0x402500 <getopt_long_only@plt> > 0x00000000004031f8 <+40>: cmp $0xffffffff,%eax > 0x00000000004031fb <+43>: je 0x403250 <args_main+128> > 0x00000000004031fd <+45>: cmp $0x68,%eax > 0x0000000000403200 <+48>: je 0x403240 <args_main+112> > 0x0000000000403202 <+50>: cmp $0x76,%eax > 0x0000000000403205 <+53>: je 0x403230 <args_main+96> > 0x0000000000403207 <+55>: mov 0x0(%rbp),%rcx > 0x000000000040320b <+59>: mov 0x20ca66(%rip),%rdi # 0x60fc78 <stderr> > 0x0000000000403212 <+66>: mov $0x409b06,%edx > 0x0000000000403217 <+71>: mov $0x1,%esi > 0x000000000040321c <+76>: xor %eax,%eax > 0x000000000040321e <+78>: callq 0x402830 <__fprintf_chk@plt> > 0x0000000000403223 <+83>: mov $0x1,%edi > 0x0000000000403228 <+88>: callq 0x402820 <exit@plt> > 0x000000000040322d <+93>: nopl (%rax) > 0x0000000000403230 <+96>: xor %edi,%edi > 0x0000000000403232 <+98>: callq 0x403190 <cmd_version> > 0x0000000000403237 <+103>: xor %edi,%edi > 0x0000000000403239 <+105>: callq 0x402820 <exit@plt> > 0x000000000040323e <+110>: xchg %ax,%ax > 0x0000000000403240 <+112>: xor %edi,%edi > 0x0000000000403242 <+114>: callq 0x402a50 <cmd_help> > 0x0000000000403247 <+119>: jmp 0x403237 <args_main+103> > 0x0000000000403249 <+121>: nopl 0x0(%rax) > 0x0000000000403250 <+128>: xor %edi,%edi > 0x0000000000403252 <+130>: sub $0x1,%ebx > 0x0000000000403255 <+133>: callq 0x402690 <xdo_new@plt> > 0x000000000040325a <+138>: mov %rax,0x10(%rsp) > 0x000000000040325f <+143>: mov 0x0(%rbp),%rax > 0x0000000000403263 <+147>: mov $0x409b23,%edi > 0x0000000000403268 <+152>: add $0x8,%rbp > 0x000000000040326c <+156>: mov %ebx,0x20(%rsp) > 0x0000000000403270 <+160>: movq $0x0,0x38(%rsp) > 0x0000000000403279 <+169>: mov %rbp,0x28(%rsp) > 0x000000000040327e <+174>: movl $0x0,0x40(%rsp) > 0x0000000000403286 <+182>: mov %rax,0x18(%rsp) > 0x000000000040328b <+187>: movl $0x0,0x5c(%rsp) > 0x0000000000403293 <+195>: callq 0x402240 <getenv@plt> > 0x0000000000403298 <+200>: mov 0x10(%rsp),%rdx > 0x000000000040329d <+205>: test %rax,%rax > 0x00000000004032a0 <+208>: lea 0x10(%rsp),%rdi > 0x00000000004032a5 <+213>: setne %al > 0x00000000004032a8 <+216>: movzbl %al,%eax >=> 0x00000000004032ab <+219>: mov %eax,0x44(%rdx) > 0x00000000004032ae <+222>: mov %eax,0x30(%rsp) > 0x00000000004032b2 <+226>: callq 0x402ef0 <context_execute> > 0x00000000004032b7 <+231>: mov 0x10(%rsp),%rdi > 0x00000000004032bc <+236>: mov %eax,%ebx > 0x00000000004032be <+238>: callq 0x4023f0 <xdo_free@plt> > 0x00000000004032c3 <+243>: mov 0x38(%rsp),%rdi > 0x00000000004032c8 <+248>: test %rdi,%rdi > 0x00000000004032cb <+251>: je 0x4032d2 <args_main+258> > 0x00000000004032cd <+253>: callq 0x402250 <free@plt> > 0x00000000004032d2 <+258>: add $0x68,%rsp > 0x00000000004032d6 <+262>: mov %ebx,%eax > 0x00000000004032d8 <+264>: pop %rbx > 0x00000000004032d9 <+265>: pop %rbp > 0x00000000004032da <+266>: retq > 0x00000000004032db <+267>: mov (%rsi),%rcx > 0x00000000004032de <+270>: mov 0x20c993(%rip),%rdi # 0x60fc78 <stderr> > 0x00000000004032e5 <+277>: mov $0x409b06,%edx > 0x00000000004032ea <+282>: mov $0x1,%esi > 0x00000000004032ef <+287>: xor %eax,%eax > 0x00000000004032f1 <+289>: callq 0x402830 <__fprintf_chk@plt> > 0x00000000004032f6 <+294>: xor %edi,%edi > 0x00000000004032f8 <+296>: callq 0x402a50 <cmd_help> > 0x00000000004032fd <+301>: jmpq 0x403223 <args_main+83> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 928115
: 716785 |
716786
|
716787
|
716788
|
716789
|
716790
|
716791
|
716792
|
716793
|
716794