Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 848733 Details for
Bug 1051817
[abrt] xpaint: regionButtonPress(): xpaint killed by SIGABRT
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 16.17 KB, created by
ertanerbek
on 2014-01-11 20:01:50 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
ertanerbek
Created:
2014-01-11 20:01:50 UTC
Size:
16.17 KB
patch
obsolete
>[New LWP 2882] >warning: Could not load shared library symbols for /lib64/libX11.so.6. >Do you need "set solib-search-path" or "set sysroot"? >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `xpaint'. >Program terminated with signal SIGABRT, Aborted. >#0 0x0000003e01235c59 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:56 >56 return INLINE_SYSCALL (tgkill, 3, pid, selftid, sig); > >Thread 1 (Thread 0x7f35b0a87780 (LWP 2882)): >#0 0x0000003e01235c59 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:56 > resultvar = 0 > pid = 2882 > selftid = 2882 >#1 0x0000003e01237368 in __GI_abort () at abort.c:89 > save_stage = 2 > act = {__sigaction_handler = {sa_handler = 0x2030303030303030, sa_sigaction = 0x2030303030303030}, sa_mask = {__val = {3617833271296669744, 2314885634318218036, 2314885530818453536, 2314885530818453536, 7017504812681277216, 8389765640510335075, 7074987242010079075, 3979267143105785907, 3617623261189452852, 3907209557741876793, 3257846563067999590, 7161113932591424876, 3703708260523402600, 3472337303596196405, 3486407556412681520, 140736498293453}}, sa_flags = 51, sa_restorer = 0x7fffc4fcdad0} > sigs = {__val = {32, 0 <repeats 15 times>}} >#2 0x0000003e01275da4 in __libc_message (do_abort=do_abort@entry=2, fmt=fmt@entry=0x3e0137b0a1 "*** %s ***: %s terminated\n") at ../sysdeps/posix/libc_fatal.c:175 > ap = {{gp_offset = 32, fp_offset = 5242982, overflow_arg_area = 0x7fffc4fcdae0, reg_save_area = 0x7fffc4fcda70}} > fd = 2 > on_2 = <optimized out> > list = <optimized out> > nlist = <optimized out> > cp = <optimized out> > written = <optimized out> >#3 0x0000003e01306bd7 in __GI___fortify_fail (msg=msg@entry=0x3e0137b089 "stack smashing detected") at fortify_fail.c:31 >No locals. >#4 0x0000003e01306ba0 in __stack_chk_fail () at stack_chk_fail.c:28 >No locals. >#5 0x000000000047c012 in regionButtonPress (w=0x2823a90, pw=0x27ab270, event=0x7fffc4fcdf40, junk=<optimized out>) at PaintRegion.c:1052 > zoom = <optimized out> > prev_time = 287167 > value = 3 '\003' >#6 0x0000003e1c4221e4 in XtDispatchEventToWidget (widget=widget@entry=0x2823a90, event=event@entry=0x7fffc4fcdf40) at Event.c:882 > i = 0 > proc = {0x47be00 <regionButtonPress>, 0x7fffc4fcdca0, 0x26ab880, 0x3e1c42d317 <_XtWaitForSomething+2215>} > closure = {0x27ab270, 0x1026ca200, 0x7fffc4fcdc1f, 0x7fffc4fcdca0} > numprocs = 1 > p = <optimized out> > was_dispatched = <optimized out> > call_tm = 0 '\000' > cont_to_disp = 1 '\001' > mask = <optimized out> > app = <optimized out> >#7 0x0000003e1c422950 in _XtDefaultDispatcher (event=0x7fffc4fcdf40) at Event.c:1367 > mask = 4 > dspWidget = 0x2823a90 > was_filtered = <optimized out> > widget = 0x2823a90 > grabType = remap > pdi = 0x26d42d0 > grabList = 0x0 > was_dispatched = 0 '\000' > app = <optimized out> >#8 0x0000003e1c422a29 in XtDispatchEvent (event=event@entry=0x7fffc4fcdf40) at Event.c:1423 > was_dispatched = <optimized out> > safe = <optimized out> > dispatch_level = 1 > starting_count = 0 > pd = <optimized out> > time = <optimized out> > dispatch = <optimized out> > app = 0x26ab880 >#9 0x00000000004124b5 in main (argc=1, argv=0x7fffc4fce2a8) at main.c:1152 > dpy = 0x26c8e70 > toplevel = 0x26d4e40 > xpTitle = "XPaint 2.9.9\000\000\000\000\000\000\000" > i = 1 > j = 62 > event = {type = 4, xany = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, window = 50336805}, xkey = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, window = 50336805, root = 155, subwindow = 0, time = 287167, x = 72, y = 73, x_root = 425, y_root = 473, state = 0, keycode = 1, same_screen = 1}, xbutton = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, window = 50336805, root = 155, subwindow = 0, time = 287167, x = 72, y = 73, x_root = 425, y_root = 473, state = 0, button = 1, same_screen = 1}, xmotion = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, window = 50336805, root = 155, subwindow = 0, time = 287167, x = 72, y = 73, x_root = 425, y_root = 473, state = 0, is_hint = 1 '\001', same_screen = 1}, xcrossing = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, window = 50336805, root = 155, subwindow = 0, time = 287167, x = 72, y = 73, x_root = 425, y_root = 473, mode = 0, detail = 1, same_screen = 1, focus = 0, state = 0}, xfocus = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, window = 50336805, mode = 155, detail = 0}, xexpose = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, window = 50336805, x = 155, y = 0, width = 0, height = 0, count = 287167}, xgraphicsexpose = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, drawable = 50336805, x = 155, y = 0, width = 0, height = 0, count = 287167, major_code = 0, minor_code = 72}, xnoexpose = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, drawable = 50336805, major_code = 155, minor_code = 0}, xvisibility = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, window = 50336805, state = 155}, xcreatewindow = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, parent = 50336805, window = 155, x = 0, y = 0, width = 287167, height = 0, border_width = 72, override_redirect = 73}, xdestroywindow = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, event = 50336805, window = 155}, xunmap = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, event = 50336805, window = 155, from_configure = 0}, xmap = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, event = 50336805, window = 155, override_redirect = 0}, xmaprequest = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, parent = 50336805, window = 155}, xreparent = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, event = 50336805, window = 155, parent = 0, x = 287167, y = 0, override_redirect = 72}, xconfigure = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, event = 50336805, window = 155, x = 0, y = 0, width = 287167, height = 0, border_width = 72, above = 2031519531433, override_redirect = 0}, xgravity = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, event = 50336805, window = 155, x = 0, y = 0}, xresizerequest = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, window = 50336805, width = 155, height = 0}, xconfigurerequest = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, parent = 50336805, window = 155, x = 0, y = 0, width = 287167, height = 0, border_width = 72, above = 2031519531433, detail = 0, value_mask = 1}, xcirculate = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, event = 50336805, window = 155, place = 0}, xcirculaterequest = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, parent = 50336805, window = 155, place = 0}, xproperty = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, window = 50336805, atom = 155, time = 0, state = 287167}, xselectionclear = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, window = 50336805, selection = 155, time = 0}, xselectionrequest = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, owner = 50336805, requestor = 155, selection = 0, target = 287167, property = 313532612680, time = 2031519531433}, xselection = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, requestor = 50336805, selection = 155, target = 0, property = 287167, time = 313532612680}, xcolormap = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, window = 50336805, colormap = 155, new = 0, state = 0}, xclient = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, window = 50336805, message_type = 155, format = 0, data = {b = "\277a\004\000\000\000\000\000H\000\000\000I\000\000\000\251\001\000", s = {25023, 4, 0, 0, 72, 0, 73, 0, 425, 0}, l = {287167, 313532612680, 2031519531433, 4294967296, 1}}}, xmapping = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, window = 50336805, request = 155, first_keycode = 0, count = 0}, xerror = {type = 4, display = 0xae60, resourceid = 0, serial = 40668784, error_code = 37 '%', request_code = 20 '\024', minor_code = 0 '\000'}, xkeymap = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, window = 50336805, key_vector = "\233", '\000' <repeats 15 times>, "\277a\004\000\000\000\000\000H\000\000\000I\000\000"}, xgeneric = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, extension = 50336805, evtype = 0}, xcookie = {type = 4, serial = 44640, send_event = 0, display = 0x26c8e70, extension = 50336805, evtype = 0, cookie = 155, data = 0x0}, pad = {4, 44640, 0, 40668784, 50336805, 155, 0, 287167, 313532612680, 2031519531433, 4294967296, 1, 0 <repeats 12 times>}} > xc = {pixel = 16777120, red = 65535, green = 65535, blue = 41120, flags = 7 '\a', pad = 0 '\000'} > args = {{name = 0x0, value = 266300693128}, {name = 0x7fffc4fcdf30 "P\342\377\304\377\177", value = 140736498294560}, {name = 0x821e8e0d <Address 0x821e8e0d out of bounds>, value = 266308395161}, {name = 0xa33c485 <Address 0xa33c485 out of bounds>, value = 139868573856976}, {name = 0x7fffc4ffe250 "*", value = 266300692224}} > rdb = 0x26815f0 > isIcon = 0 '\000' > valid = -60 '\304' > temp = 0x26aac70 > desiredVisual = <optimized out> > opened = 0 > mode = <optimized out> > vis = {visual = 0x0, visualid = 0, screen = 0, depth = 32767, class = 12719872, red_mask = 139868573839400, green_mask = 4305506402, blue_mask = 1, colormap_size = -1330984152, bits_per_rgb = 32565} > image = <optimized out> > depth = <optimized out> > desiredDepth = <optimized out> > tempargc = 1 > tempargv = <optimized out> > phrase = "24\000\304\377\177\000\000\260\341\374\304\377\177\000\000\000\000\000\000\000\000\000\000\005", '\000' <repeats 15 times>, "\250\341\374\304\377\177\000\000\200\341\374\304\377\177\000\000\000\000\000\000\000\000\000\000\340\341\374\304\377\177\000\000\210\032\302\000>\000\000\000\000\027\302\000>\000\000\000\317\235\240\000>", '\000' <repeats 11 times>, "\340\341\374\304\377\177", '\000' <repeats 17 times> > app_def_file = <optimized out> > desiredVisualID = <optimized out> >From To Syms Read Shared Object Library >0x0000003e01600ed0 0x0000003e016019d0 Yes /lib64/libdl.so.2 >0x0000003e07e030e0 0x0000003e07e0e674 Yes /lib64/libXpm.so.4 > No /lib64/libX11.so.6 >0x0000003e02205890 0x0000003e02274bb8 Yes /lib64/libm.so.6 >0x0000003e07a06750 0x0000003e07a1419c Yes /lib64/libXmu.so.6 >0x0000003e06203760 0x0000003e0620d460 Yes /lib64/libXext.so.6 >0x0000003e08a06ca0 0x0000003e08a23fcc Yes /lib64/libfontconfig.so.1 >0x0000003e03a041f0 0x0000003e03a1180c Yes /lib64/libXft.so.2 >0x0000003e00e082c0 0x0000003e00e43d24 Yes /lib64/libtiff.so.5 >0x0000003e12a04200 0x0000003e12a3ac90 Yes /lib64/libjpeg.so.62 >0x0000003e14a050b0 0x0000003e14a1d1f4 Yes /lib64/libopenjpeg.so.1 >0x0000003e05e05680 0x0000003e05e26e68 Yes /lib64/libpng16.so.16 >0x0000003e01e02210 0x0000003e01e0e930 Yes /lib64/libz.so.1 >0x0000003e02616d70 0x0000003e026484d0 Yes /lib64/libXaw3dxft.so.8 >0x0000003e1c4131b0 0x0000003e1c44f22c Yes /lib64/libXt.so.6 >0x0000003e0121f560 0x0000003e01360cc4 Yes /lib64/libc.so.6 >0x0000003e00a00b10 0x0000003e00a19cb0 Yes /lib64/ld-linux-x86-64.so.2 >0x0000003e05609a00 0x0000003e056176c8 Yes /lib64/libxcb.so.1 >0x0000003e06a0d320 0x0000003e06a790c4 Yes /lib64/libfreetype.so.6 >0x0000003e07203e00 0x0000003e0721ccdc Yes /lib64/libexpat.so.1 >0x0000003e01a059f0 0x0000003e01a11614 Yes /lib64/libpthread.so.0 >0x0000003e08201b70 0x0000003e08207be8 Yes /lib64/libXrender.so.1 >0x0000003e18601060 0x0000003e18607bb0 Yes /lib64/libjbig.so.2.0 >0x0000003e17e01c20 0x0000003e17e05c44 Yes /lib64/libSM.so.6 >0x0000003e18204f30 0x0000003e182121ec Yes /lib64/libICE.so.6 >0x0000003e05a00ee0 0x0000003e05a01bfc Yes /lib64/libXau.so.6 >0x0000003e0ba01510 0x0000003e0ba02b84 Yes /lib64/libuuid.so.1 >0x0000003e0f202ab0 0x0000003e0f207690 Yes /lib64/libXcursor.so.1 >0x0000003e092015f0 0x0000003e09203948 Yes /lib64/libXfixes.so.3 >0x00007f35b07d41e0 0x00007f35b07db4a4 Yes /lib64/libnss_files.so.2 >0x0000003e03602af0 0x0000003e03612218 Yes /lib64/libgcc_s.so.1 >$1 = 0x7f35b09f5000 "" >No symbol "__glib_assert_msg" in current context. >rax 0x0 0 >rbx 0x33 51 >rcx 0xffffffffffffffff -1 >rdx 0x6 6 >rsi 0xb42 2882 >rdi 0xb42 2882 >rbp 0x7fffc4fcdad0 0x7fffc4fcdad0 >rsp 0x7fffc4fcd7b8 0x7fffc4fcd7b8 >r8 0x3e013733e0 266308367328 >r9 0x431d40 4398400 >r10 0x8 8 >r11 0x206 518 >r12 0x7fffc4fcd940 140736498293056 >r13 0x5 5 >r14 0x33 51 >r15 0x5 5 >rip 0x3e01235c59 0x3e01235c59 <__GI_raise+57> >eflags 0x206 [ PF IF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >st0 *value not available* >st1 *value not available* >st2 *value not available* >st3 *value not available* >st4 *value not available* >st5 *value not available* >st6 *value not available* >st7 *value not available* >fctrl *value not available* >fstat *value not available* >ftag *value not available* >fiseg *value not available* >fioff *value not available* >foseg *value not available* >fooff *value not available* >fop *value not available* >xmm0 *value not available* >xmm1 *value not available* >xmm2 *value not available* >xmm3 *value not available* >xmm4 *value not available* >xmm5 *value not available* >xmm6 *value not available* >xmm7 *value not available* >xmm8 *value not available* >xmm9 *value not available* >xmm10 *value not available* >xmm11 *value not available* >xmm12 *value not available* >xmm13 *value not available* >xmm14 *value not available* >xmm15 *value not available* >mxcsr *value not available* >Dump of assembler code for function __GI_raise: > 0x0000003e01235c20 <+0>: mov %fs:0x2d4,%eax > 0x0000003e01235c28 <+8>: mov %eax,%ecx > 0x0000003e01235c2a <+10>: mov %fs:0x2d0,%esi > 0x0000003e01235c32 <+18>: test %esi,%esi > 0x0000003e01235c34 <+20>: jne 0x3e01235c68 <__GI_raise+72> > 0x0000003e01235c36 <+22>: mov $0xba,%eax > 0x0000003e01235c3b <+27>: syscall > 0x0000003e01235c3d <+29>: mov %eax,%ecx > 0x0000003e01235c3f <+31>: mov %eax,%fs:0x2d0 > 0x0000003e01235c47 <+39>: mov %eax,%esi > 0x0000003e01235c49 <+41>: movslq %edi,%rdx > 0x0000003e01235c4c <+44>: movslq %esi,%rsi > 0x0000003e01235c4f <+47>: movslq %ecx,%rdi > 0x0000003e01235c52 <+50>: mov $0xea,%eax > 0x0000003e01235c57 <+55>: syscall >=> 0x0000003e01235c59 <+57>: cmp $0xfffffffffffff000,%rax > 0x0000003e01235c5f <+63>: ja 0x3e01235c7a <__GI_raise+90> > 0x0000003e01235c61 <+65>: repz retq > 0x0000003e01235c63 <+67>: nopl 0x0(%rax,%rax,1) > 0x0000003e01235c68 <+72>: test %eax,%eax > 0x0000003e01235c6a <+74>: jg 0x3e01235c49 <__GI_raise+41> > 0x0000003e01235c6c <+76>: mov %eax,%ecx > 0x0000003e01235c6e <+78>: neg %ecx > 0x0000003e01235c70 <+80>: test $0x7fffffff,%eax > 0x0000003e01235c75 <+85>: cmove %esi,%ecx > 0x0000003e01235c78 <+88>: jmp 0x3e01235c49 <__GI_raise+41> > 0x0000003e01235c7a <+90>: mov 0x3821b7(%rip),%rdx # 0x3e015b7e38 > 0x0000003e01235c81 <+97>: neg %eax > 0x0000003e01235c83 <+99>: mov %eax,%fs:(%rdx) > 0x0000003e01235c86 <+102>: or $0xffffffffffffffff,%rax > 0x0000003e01235c8a <+106>: retq >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1051817
: 848733 |
848734
|
848735
|
848736
|
848737
|
848738
|
848739
|
848740
|
848741
|
848742