Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 925783 Details for
Bug 1128781
[abrt] xdotool: args_main(): xdotool killed by SIGSEGV
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 8.71 KB, created by
blachniom
on 2014-08-11 14:26:30 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
blachniom
Created:
2014-08-11 14:26:30 UTC
Size:
8.71 KB
patch
obsolete
>[New LWP 5270] >warning: Can't read pathname for load map: Unknown error -1. >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `xdotool getdisplaygeometry'. >Program terminated with signal SIGSEGV, Segmentation fault. >#0 args_main (argc=<optimized out>, argc@entry=2, argv=<optimized out>, argv@entry=0x7fff90b76b78) at xdotool.c:502 >502 context.xdo->debug = context.debug; > >Thread 1 (Thread 0x7f3770773740 (LWP 5270)): >#0 args_main (argc=<optimized out>, argc@entry=2, argv=<optimized out>, argv@entry=0x7fff90b76b78) at xdotool.c:502 > ret = 0 > opt = <optimized out> > option_index = 0 > usage = 0x409f66 "Usage: %s <cmd> <args>\n" > long_options = {{name = 0x409fb6 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x409fbb "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} > context = {xdo = 0x0, prog = 0x7fff90b77725 "xdotool", argc = 1, argv = 0x7fff90b76b80, debug = -1867027592, windows = 0x0, nwindows = 0, window_placeholder = {262725853429}, last_mouse_x = 4294967136, last_mouse_y = 4294967295, last_mouse_screen = -1867024595, have_last_mouse = 0} >#1 0x0000000000403844 in xdotool_main (argc=2, argv=0x7fff90b76b78) at xdotool.c:316 > data = {st_dev = 262735494048, st_ino = 262733329088, st_nlink = 262735494048, st_mode = 729939968, st_uid = 61, st_gid = 0, __pad0 = 0, st_rdev = 262722950336, st_size = 140735621327408, st_blksize = 140735621327392, st_blocks = 4131212846, st_atim = {tv_sec = 6360143, tv_nsec = 4294967295}, st_mtim = {tv_sec = 2, tv_nsec = 262724977088}, st_ctim = {tv_sec = 139876088972512, tv_nsec = 262722949480}, __unused = {0, 1, 4234349}} >#2 0x0000003d2ba21d65 in __libc_start_main (main=0x402950 <main>, argc=2, argv=0x7fff90b76b78, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fff90b76b68) at libc-start.c:285 > result = <optimized out> > unwind_buf = {cancel_jmp_buf = {{jmp_buf = {0, -2439097625180688165, 4204888, 140735621327728, 0, 0, 2439179475084849371, -2423848207329972005}, mask_was_saved = 0}}, priv = {pad = {0x0, 0x0, 0x409c20 <__libc_csu_init>, 0x7fff90b76b78}, data = {prev = 0x0, cleanup = 0x0, canceltype = 4234272}}} > not_first_call = <optimized out> >#3 0x0000000000402981 in _start () >No symbol table info available. >From To Syms Read Shared Object Library >0x0000003d2ca037b0 0x0000003d2ca08864 Yes /usr/lib64/libxdo.so.2 >0x0000003d2c605890 0x0000003d2c674bb8 Yes /usr/lib64/libm.so.6 >0x0000003d2d6022d0 0x0000003d2d6050bc Yes /usr/lib64/librt.so.1 >0x0000003d2f21df60 0x0000003d2f2a4f1c Yes /usr/lib64/libX11.so.6 >0x0000003d46a014c0 0x0000003d46a03e58 Yes /usr/lib64/libXtst.so.6 >0x0000003d33e00bb0 0x0000003d33e01510 Yes /usr/lib64/libXinerama.so.1 >0x0000003d2ba1f560 0x0000003d2bb60bb4 Yes /usr/lib64/libc.so.6 >0x0000003d2c2059f0 0x0000003d2c211614 Yes /usr/lib64/libpthread.so.0 >0x0000003d2ee09a00 0x0000003d2ee176c8 Yes /usr/lib64/libxcb.so.1 >0x0000003d2be00ed0 0x0000003d2be019d0 Yes /usr/lib64/libdl.so.2 >0x0000003d2fe03760 0x0000003d2fe0d460 Yes /usr/lib64/libXext.so.6 >0x00007f3770778240 0x00007f37707825f8 Yes /usr/lib64/libXi.so.6 >0x0000003d2b600b10 0x0000003d2b619c70 Yes /lib64/ld-linux-x86-64.so.2 >0x0000003d2ea00ee0 0x0000003d2ea01bfc Yes /usr/lib64/libXau.so.6 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0x0 0 >rbx 0x1 1 >rcx 0xf83 3971 >rdx 0x0 0 >rsi 0x22 34 >rdi 0x7fff90b76950 140735621327184 >rbp 0x7fff90b76b80 0x7fff90b76b80 >rsp 0x7fff90b76940 0x7fff90b76940 >r8 0x7f3770773740 139876086789952 >r9 0x1 1 >r10 0x7fff90b76700 140735621326592 >r11 0x3d2ba38aa0 262725143200 >r12 0x7fff90b76b78 140735621327736 >r13 0x2 2 >r14 0xffffffff 4294967295 >r15 0x0 0 >rip 0x4032eb 0x4032eb <args_main+235> >eflags 0x10246 [ PF ZF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >Dump of assembler code for function args_main: > 0x0000000000403200 <+0>: push %rbp > 0x0000000000403201 <+1>: mov %rsi,%rbp > 0x0000000000403204 <+4>: push %rbx > 0x0000000000403205 <+5>: mov %edi,%ebx > 0x0000000000403207 <+7>: sub $0x78,%rsp > 0x000000000040320b <+11>: mov %fs:0x28,%rax > 0x0000000000403214 <+20>: mov %rax,0x68(%rsp) > 0x0000000000403219 <+25>: xor %eax,%eax > 0x000000000040321b <+27>: cmp $0x1,%edi > 0x000000000040321e <+30>: jle 0x40332b <args_main+299> > 0x0000000000403224 <+36>: lea 0xc(%rsp),%r8 > 0x0000000000403229 <+41>: mov $0x60f3a0,%ecx > 0x000000000040322e <+46>: mov $0x409f7e,%edx > 0x0000000000403233 <+51>: callq 0x402560 <getopt_long_only@plt> > 0x0000000000403238 <+56>: cmp $0xffffffff,%eax > 0x000000000040323b <+59>: je 0x403290 <args_main+144> > 0x000000000040323d <+61>: cmp $0x68,%eax > 0x0000000000403240 <+64>: je 0x403280 <args_main+128> > 0x0000000000403242 <+66>: cmp $0x76,%eax > 0x0000000000403245 <+69>: jne 0x403258 <args_main+88> > 0x0000000000403247 <+71>: xor %edi,%edi > 0x0000000000403249 <+73>: callq 0x4031c0 <cmd_version> > 0x000000000040324e <+78>: xor %edi,%edi > 0x0000000000403250 <+80>: callq 0x402890 <exit@plt> > 0x0000000000403255 <+85>: nopl (%rax) > 0x0000000000403258 <+88>: mov 0x20d271(%rip),%rdi # 0x6104d0 <stderr> > 0x000000000040325f <+95>: mov 0x0(%rbp),%rcx > 0x0000000000403263 <+99>: mov $0x409f66,%edx > 0x0000000000403268 <+104>: mov $0x1,%esi > 0x000000000040326d <+109>: xor %eax,%eax > 0x000000000040326f <+111>: callq 0x4028a0 <__fprintf_chk@plt> > 0x0000000000403274 <+116>: mov $0x1,%edi > 0x0000000000403279 <+121>: callq 0x402890 <exit@plt> > 0x000000000040327e <+126>: xchg %ax,%ax > 0x0000000000403280 <+128>: xor %edi,%edi > 0x0000000000403282 <+130>: callq 0x402ab0 <cmd_help> > 0x0000000000403287 <+135>: xor %edi,%edi > 0x0000000000403289 <+137>: callq 0x402890 <exit@plt> > 0x000000000040328e <+142>: xchg %ax,%ax > 0x0000000000403290 <+144>: xor %edi,%edi > 0x0000000000403292 <+146>: sub $0x1,%ebx > 0x0000000000403295 <+149>: add $0x8,%rbp > 0x0000000000403299 <+153>: callq 0x402700 <xdo_new@plt> > 0x000000000040329e <+158>: mov %rax,0x10(%rsp) > 0x00000000004032a3 <+163>: mov -0x8(%rbp),%rax > 0x00000000004032a7 <+167>: mov $0x409f83,%edi > 0x00000000004032ac <+172>: mov %ebx,0x20(%rsp) > 0x00000000004032b0 <+176>: mov %rbp,0x28(%rsp) > 0x00000000004032b5 <+181>: movq $0x0,0x38(%rsp) > 0x00000000004032be <+190>: movl $0x0,0x40(%rsp) > 0x00000000004032c6 <+198>: mov %rax,0x18(%rsp) > 0x00000000004032cb <+203>: movl $0x0,0x5c(%rsp) > 0x00000000004032d3 <+211>: callq 0x4022a0 <getenv@plt> > 0x00000000004032d8 <+216>: mov 0x10(%rsp),%rdx > 0x00000000004032dd <+221>: test %rax,%rax > 0x00000000004032e0 <+224>: lea 0x10(%rsp),%rdi > 0x00000000004032e5 <+229>: setne %al > 0x00000000004032e8 <+232>: movzbl %al,%eax >=> 0x00000000004032eb <+235>: mov %eax,0x44(%rdx) > 0x00000000004032ee <+238>: mov %eax,0x30(%rsp) > 0x00000000004032f2 <+242>: callq 0x402ee0 <context_execute> > 0x00000000004032f7 <+247>: mov 0x10(%rsp),%rdi > 0x00000000004032fc <+252>: mov %eax,%ebx > 0x00000000004032fe <+254>: callq 0x402450 <xdo_free@plt> > 0x0000000000403303 <+259>: mov 0x38(%rsp),%rdi > 0x0000000000403308 <+264>: test %rdi,%rdi > 0x000000000040330b <+267>: je 0x403312 <args_main+274> > 0x000000000040330d <+269>: callq 0x4022b0 <free@plt> > 0x0000000000403312 <+274>: mov 0x68(%rsp),%rcx > 0x0000000000403317 <+279>: xor %fs:0x28,%rcx > 0x0000000000403320 <+288>: mov %ebx,%eax > 0x0000000000403322 <+290>: jne 0x403355 <args_main+341> > 0x0000000000403324 <+292>: add $0x78,%rsp > 0x0000000000403328 <+296>: pop %rbx > 0x0000000000403329 <+297>: pop %rbp > 0x000000000040332a <+298>: retq > 0x000000000040332b <+299>: mov (%rsi),%rcx > 0x000000000040332e <+302>: mov 0x20d19b(%rip),%rdi # 0x6104d0 <stderr> > 0x0000000000403335 <+309>: mov $0x409f66,%edx > 0x000000000040333a <+314>: mov $0x1,%esi > 0x000000000040333f <+319>: callq 0x4028a0 <__fprintf_chk@plt> > 0x0000000000403344 <+324>: xor %edi,%edi > 0x0000000000403346 <+326>: callq 0x402ab0 <cmd_help> > 0x000000000040334b <+331>: mov $0x1,%edi > 0x0000000000403350 <+336>: callq 0x402890 <exit@plt> > 0x0000000000403355 <+341>: callq 0x402440 <__stack_chk_fail@plt> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1128781
: 925783 |
925784
|
925785
|
925786
|
925787
|
925788
|
925789
|
925790
|
925791
|
925792
|
925793