Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 937376 Details for
Bug 1141575
[abrt] unison240-gtk: camlMain__catch_all_1055(): unison-gtk-2.40 killed by SIGSEGV
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 14.76 KB, created by
Jaša Bartelj
on 2014-09-14 21:51:27 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Jaša Bartelj
Created:
2014-09-14 21:51:27 UTC
Size:
14.76 KB
patch
obsolete
>warning: core file may not match specified executable file. >[New LWP 10511] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `unison -server'. >Program terminated with signal SIGSEGV, Segmentation fault. >#0 0x0000000000460caf in camlMain__catch_all_1055 () > >Thread 1 (Thread 0x7fccee7fe980 (LWP 10511)): >#0 0x0000000000460caf in camlMain__catch_all_1055 () >No symbol table info available. >#1 0x0000000000461497 in camlMain__init_1027 () >No symbol table info available. >#2 0x0000000000461675 in camlMain__Body_1088 () >No symbol table info available. >#3 0x000000000042cd63 in camlLinkgtk2__entry () >No symbol table info available. >#4 0x0000000000425789 in caml_program () >No symbol table info available. >#5 0x000000000060e28e in caml_start_program () >No symbol table info available. >#6 0x000000000060e44d in __libc_csu_init () >No symbol table info available. >#7 0x00000031ff0200e0 in __libc_start_main () from /lib64/libc.so.6 >No symbol table info available. >#8 0x0000000000424ba6 in _start () >No symbol table info available. >From To Syms Read Shared Object Library >0x0000003fe5e696b0 0x0000003fe60fbc3e Yes (*) /lib64/libgtk-x11-2.0.so.0 >0x0000003fe661e640 0x0000003fe667e7a3 Yes (*) /lib64/libgdk-x11-2.0.so.0 >0x0000003fe5a048b0 0x0000003fe5a095a6 Yes (*) /lib64/libpangocairo-1.0.so.0 >0x000000320c40b0a0 0x000000320c417683 Yes (*) /lib64/libatk-1.0.so.0 >0x000000320c8134c0 0x000000320c8cd0ad Yes (*) /lib64/libcairo.so.2 >0x0000003207807380 0x000000320781ae00 Yes (*) /lib64/libgdk_pixbuf-2.0.so.0 >0x0000003203033d80 0x00000032031071ab Yes (*) /lib64/libgio-2.0.so.0 >0x0000003fe56072a0 0x0000003fe560f79b Yes (*) /lib64/libpangoft2-1.0.so.0 >0x000000320d80cde0 0x000000320d82c1f6 Yes (*) /lib64/libpango-1.0.so.0 >0x000000320240ae40 0x000000320243b186 Yes (*) /lib64/libgobject-2.0.so.0 >0x000000320181a620 0x00000032018b6269 Yes (*) /lib64/libglib-2.0.so.0 >0x0000003206406cc0 0x0000003206424d3d Yes (*) /lib64/libfontconfig.so.1 >0x000000320480eea0 0x000000320487d5a2 Yes (*) /lib64/libfreetype.so.6 >0x000000321a000f10 0x000000321a0017f5 Yes (*) /lib64/libutil.so.1 >0x0000003200005610 0x0000003200076d01 Yes (*) /lib64/libm.so.6 >0x00000031ff400ed0 0x00000031ff401ade Yes (*) /lib64/libdl.so.2 >0x00000031ff01f4f0 0x00000031ff16f8d4 Yes (*) /lib64/libc.so.6 >0x0000003202c01190 0x0000003202c02075 Yes (*) /lib64/libgmodule-2.0.so.0 >0x000000320381dfd0 0x00000032038a661c Yes (*) /lib64/libX11.so.6 >0x0000003207c015f0 0x0000003207c03926 Yes (*) /lib64/libXfixes.so.3 >0x00000031ff805ac0 0x00000031ff8125c1 Yes (*) /lib64/libpthread.so.0 >0x0000003205801b70 0x0000003205807a45 Yes (*) /lib64/libXrender.so.1 >0x0000003207000bb0 0x0000003207001524 Yes (*) /lib64/libXinerama.so.1 >0x0000003207402230 0x000000320740c857 Yes (*) /lib64/libXi.so.6 >0x0000003206801c00 0x00000032068075a9 Yes (*) /lib64/libXrandr.so.2 >0x000000320a002ab0 0x000000320a0075b7 Yes (*) /lib64/libXcursor.so.1 >0x000000320e000cd0 0x000000320e0016e5 Yes (*) /lib64/libXcomposite.so.1 >0x000000320a400c40 0x000000320a40156b Yes (*) /lib64/libXdamage.so.1 >0x0000003204403770 0x000000320440d54f Yes (*) /lib64/libXext.so.6 >0x0000003206c006b0 0x0000003206c0082a Yes (*) /lib64/libgthread-2.0.so.0 >0x0000003fe5206ee0 0x0000003fe523c109 Yes (*) /lib64/libharfbuzz.so.0 >0x000000320f40a370 0x000000320f494050 Yes (*) /lib64/libpixman-1.so.0 >0x000000320c0069f0 0x000000320c01be09 Yes (*) /lib64/libEGL.so.1 >0x0000003203405500 0x0000003203426d87 Yes (*) /lib64/libpng16.so.16 >0x000000320d400df0 0x000000320d401903 Yes (*) /lib64/libxcb-shm.so.0 >0x000000320cc03610 0x000000320cc06a8a Yes (*) /lib64/libxcb-render.so.0 >0x0000003203c09bd0 0x0000003203c181d5 Yes (*) /lib64/libxcb.so.1 >0x00000031ffc02200 0x00000031ffc0e729 Yes (*) /lib64/libz.so.1 >0x000000320a81a100 0x000000320a877192 Yes (*) /lib64/libGL.so.1 >0x00000032014022f0 0x00000032014055b7 Yes (*) /lib64/librt.so.1 >0x0000003202001870 0x0000003202005fbc Yes (*) /lib64/libffi.so.6 >0x0000003200c06500 0x0000003200c1952b Yes (*) /lib64/libselinux.so.1 >0x0000003201003a90 0x0000003201013171 Yes (*) /lib64/libresolv.so.2 >0x0000003204c03e00 0x0000003204c1c249 Yes (*) /lib64/libexpat.so.1 >0x0000003202801760 0x000000320280d462 Yes (*) /lib64/libbz2.so.1 >0x00000031fec00b10 0x00000031fec1c7a0 Yes (*) /lib64/ld-linux-x86-64.so.2 >0x0000003fe4e02710 0x0000003fe4e165e8 Yes (*) /lib64/libgraphite2.so.3 >0x0000003208400600 0x000000320840071b Yes (*) /lib64/libX11-xcb.so.1 >0x0000003208c01920 0x0000003208c02a45 Yes (*) /lib64/libxcb-dri2.so.0 >0x000000320e802830 0x000000320e804c05 Yes (*) /lib64/libxcb-xfixes.so.0 >0x000000320f801020 0x000000320f801bc5 Yes (*) /lib64/libxcb-shape.so.0 >0x000000320ec02930 0x000000320ec08154 Yes (*) /lib64/libgbm.so.1 >0x000000320d004f80 0x000000320d0093bf Yes (*) /lib64/libwayland-client.so.0 >0x000000320e4061e0 0x000000320e40bbbf Yes (*) /lib64/libwayland-server.so.0 >0x000000320ac09920 0x000000320ac1336e Yes (*) /lib64/libglapi.so.0 >0x000000320b003210 0x000000320b008b28 Yes (*) /lib64/libdrm.so.2 >0x0000003204000ec0 0x0000003204001bf9 Yes (*) /lib64/libXau.so.6 >0x000000320880a020 0x0000003208811bb5 Yes (*) /lib64/libxcb-glx.so.0 >0x000000320b400d50 0x000000320b4014f3 Yes (*) /lib64/libxcb-dri3.so.0 >0x0000003209c00c50 0x0000003209c01428 Yes (*) /lib64/libxcb-present.so.0 >0x0000003209802060 0x0000003209803fc9 Yes (*) /lib64/libxcb-sync.so.1 >0x000000320bc00990 0x000000320bc00c4c Yes (*) /lib64/libxshmfence.so.1 >0x0000003206001010 0x00000032060039a8 Yes (*) /lib64/libXxf86vm.so.1 >0x00000032008016f0 0x000000320084f7a5 Yes (*) /lib64/libpcre.so.1 >0x0000003200402f30 0x0000003200418d72 Yes (*) /lib64/liblzma.so.5 >0x0000003fe4602af0 0x0000003fe46129d5 Yes (*) /lib64/libgcc_s.so.1 >(*): Shared library is missing debugging information. >$1 = 0x0 >$2 = 0x0 >rax 0x7fccee6ce570 140518150169968 >rbx 0x1 1 >rcx 0x2e747369 779383657 >rdx 0x73696c20676e696c 8316297073346373996 >rsi 0x7fccee6ce6b2 140518150170290 >rdi 0x5b4550 5981520 >rbp 0x616a13 0x616a13 >rsp 0x7fffde9f2520 0x7fffde9f2520 >r8 0x7fccee6ce570 140518150169968 >r9 0x31ff15bee0 214733012704 >r10 0x7fffde9f2410 140736928359440 >r11 0x31ff1944d0 214733243600 >r12 0x59a031 5873713 >r13 0x7fccee6ce818 140518150170648 >r14 0x7fffde9f25a0 140736928359840 >r15 0x7fccee6ce568 140518150169960 >rip 0x460caf 0x460caf <camlMain__catch_all_1055+47> >eflags 0x10206 [ PF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >st0 0 (raw 0x00000000000000000000) >st1 0 (raw 0x00000000000000000000) >st2 0 (raw 0x00000000000000000000) >st3 0 (raw 0x00000000000000000000) >st4 0 (raw 0x00000000000000000000) >st5 0 (raw 0x00000000000000000000) >st6 0 (raw 0x00000000000000000000) >st7 0 (raw 0x00000000000000000000) >fctrl 0x37f 895 >fstat 0x0 0 >ftag 0xffff 65535 >fiseg 0x0 0 >fioff 0x0 0 >foseg 0x0 0 >fooff 0x0 0 >fop 0x0 0 >xmm0 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x8000000000000000, 0x8000000000000000}, v16_int8 = {0x46, 0x61, 0x74, 0x61, 0x6c, 0x20, 0x65, 0x72, 0x72, 0x6f, 0x72, 0x3a, 0x20, 0x50, 0x72, 0x6f}, v8_int16 = {0x6146, 0x6174, 0x206c, 0x7265, 0x6f72, 0x3a72, 0x5020, 0x6f72}, v4_int32 = {0x61746146, 0x7265206c, 0x3a726f72, 0x6f725020}, v2_int64 = {0x7265206c61746146, 0x6f7250203a726f72}, uint128 = 0x6f7250203a726f727265206c61746146} >xmm1 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x8000000000000000, 0x8000000000000000}, v16_int8 = {0x72, 0x6f, 0x72, 0x3a, 0x20, 0x50, 0x72, 0x6f, 0x74, 0x6f, 0x63, 0x6f, 0x6c, 0x20, 0x65, 0x72}, v8_int16 = {0x6f72, 0x3a72, 0x5020, 0x6f72, 0x6f74, 0x6f63, 0x206c, 0x7265}, v4_int32 = {0x3a726f72, 0x6f725020, 0x6f636f74, 0x7265206c}, v2_int64 = {0x6f7250203a726f72, 0x7265206c6f636f74}, uint128 = 0x7265206c6f636f746f7250203a726f72} >xmm2 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x8000000000000000, 0x8000000000000000}, v16_int8 = {0x74, 0x6f, 0x63, 0x6f, 0x6c, 0x20, 0x65, 0x72, 0x72, 0x6f, 0x72, 0x3a, 0x20, 0x63, 0x6f, 0x72}, v8_int16 = {0x6f74, 0x6f63, 0x206c, 0x7265, 0x6f72, 0x3a72, 0x6320, 0x726f}, v4_int32 = {0x6f636f74, 0x7265206c, 0x3a726f72, 0x726f6320}, v2_int64 = {0x7265206c6f636f74, 0x726f63203a726f72}, uint128 = 0x726f63203a726f727265206c6f636f74} >xmm3 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x8000000000000000, 0x8000000000000000}, v16_int8 = {0x72, 0x75, 0x70, 0x74, 0x65, 0x64, 0x20, 0x6d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, 0x20, 0x72}, v8_int16 = {0x7572, 0x7470, 0x6465, 0x6d20, 0x7365, 0x6173, 0x6567, 0x7220}, v4_int32 = {0x74707572, 0x6d206465, 0x61737365, 0x72206567}, v2_int64 = {0x6d20646574707572, 0x7220656761737365}, uint128 = 0x72206567617373656d20646574707572} >xmm4 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x8000000000000000}, v16_int8 = {0x65, 0x63, 0x65, 0x69, 0x76, 0x65, 0x64, 0x3b, 0xa, 0x69, 0x66, 0x20, 0x69, 0x74, 0x20, 0x68}, v8_int16 = {0x6365, 0x6965, 0x6576, 0x3b64, 0x690a, 0x2066, 0x7469, 0x6820}, v4_int32 = {0x69656365, 0x3b646576, 0x2066690a, 0x68207469}, v2_int64 = {0x3b64657669656365, 0x682074692066690a}, uint128 = 0x682074692066690a3b64657669656365} >xmm5 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x8000000000000000, 0x8000000000000000}, v16_int8 = {0x61, 0x70, 0x70, 0x65, 0x6e, 0x73, 0x20, 0x74, 0x6f, 0x20, 0x79, 0x6f, 0x75, 0x20, 0x69, 0x6e}, v8_int16 = {0x7061, 0x6570, 0x736e, 0x7420, 0x206f, 0x6f79, 0x2075, 0x6e69}, v4_int32 = {0x65707061, 0x7420736e, 0x6f79206f, 0x6e692075}, v2_int64 = {0x7420736e65707061, 0x6e6920756f79206f}, uint128 = 0x6e6920756f79206f7420736e65707061} >xmm6 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x8000000000000000, 0x8000000000000000}, v16_int8 = {0x20, 0x61, 0x20, 0x72, 0x65, 0x70, 0x65, 0x61, 0x74, 0x61, 0x62, 0x6c, 0x65, 0x20, 0x77, 0x61}, v8_int16 = {0x6120, 0x7220, 0x7065, 0x6165, 0x6174, 0x6c62, 0x2065, 0x6177}, v4_int32 = {0x72206120, 0x61657065, 0x6c626174, 0x61772065}, v2_int64 = {0x6165706572206120, 0x617720656c626174}, uint128 = 0x617720656c6261746165706572206120} >xmm7 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x8000000000000000, 0x0}, v16_int8 = {0x79, 0x2c, 0x20, 0xa, 0x70, 0x6c, 0x65, 0x61, 0x73, 0x65, 0x20, 0x70, 0x6f, 0x73, 0x74, 0x20}, v8_int16 = {0x2c79, 0xa20, 0x6c70, 0x6165, 0x6573, 0x7020, 0x736f, 0x2074}, v4_int32 = {0xa202c79, 0x61656c70, 0x70206573, 0x2074736f}, v2_int64 = {0x61656c700a202c79, 0x2074736f70206573}, uint128 = 0x2074736f7020657361656c700a202c79} >xmm8 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x8000000000000000, 0x0}, v16_int8 = {0x61, 0x20, 0x72, 0x65, 0x70, 0x6f, 0x72, 0x74, 0x20, 0x6f, 0x6e, 0x20, 0x74, 0x68, 0x65, 0x20}, v8_int16 = {0x2061, 0x6572, 0x6f70, 0x7472, 0x6f20, 0x206e, 0x6874, 0x2065}, v4_int32 = {0x65722061, 0x74726f70, 0x206e6f20, 0x20656874}, v2_int64 = {0x74726f7065722061, 0x20656874206e6f20}, uint128 = 0x20656874206e6f2074726f7065722061} >xmm9 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x8000000000000000, 0x8000000000000000}, v16_int8 = {0x75, 0x6e, 0x69, 0x73, 0x6f, 0x6e, 0x2d, 0x75, 0x73, 0x65, 0x72, 0x73, 0x20, 0x6d, 0x61, 0x69}, v8_int16 = {0x6e75, 0x7369, 0x6e6f, 0x752d, 0x6573, 0x7372, 0x6d20, 0x6961}, v4_int32 = {0x73696e75, 0x752d6e6f, 0x73726573, 0x69616d20}, v2_int64 = {0x752d6e6f73696e75, 0x69616d2073726573}, uint128 = 0x69616d2073726573752d6e6f73696e75} >xmm10 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm11 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm12 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0}, v8_int16 = {0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xff, 0x0}, v4_int32 = {0x0, 0xff, 0x0, 0xff}, v2_int64 = {0xff00000000, 0xff00000000}, uint128 = 0x000000ff00000000000000ff00000000} >xmm13 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm14 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm15 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >mxcsr 0x1fa0 [ PE IM DM ZM OM UM PM ] >Dump of assembler code for function camlMain__catch_all_1055: > 0x0000000000460c80 <+0>: sub $0x18,%rsp > 0x0000000000460c84 <+4>: mov %rax,%rbx > 0x0000000000460c87 <+7>: callq 0x460cc4 <camlMain__catch_all_1055+68> > 0x0000000000460c8c <+12>: mov %rax,(%rsp) > 0x0000000000460c90 <+16>: lea 0x46b419(%rip),%rax # 0x8cc0b0 > 0x0000000000460c97 <+23>: callq 0x4be750 <camlUtil__msg_1225> > 0x0000000000460c9c <+28>: mov %rax,0x8(%rsp) > 0x0000000000460ca1 <+33>: mov (%rsp),%rax > 0x0000000000460ca5 <+37>: callq 0x46bbf0 <camlUicommon__exn2string_1124> > 0x0000000000460caa <+42>: mov 0x8(%rsp),%rbx >=> 0x0000000000460caf <+47>: mov (%rbx),%rdi > 0x0000000000460cb2 <+50>: callq *%rdi > 0x0000000000460cb4 <+52>: mov $0x3,%rax > 0x0000000000460cbb <+59>: add $0x18,%rsp > 0x0000000000460cbf <+63>: jmpq 0x593750 <camlPervasives__exit_1336> > 0x0000000000460cc4 <+68>: push %r14 > 0x0000000000460cc6 <+70>: mov %rsp,%r14 > 0x0000000000460cc9 <+73>: mov $0x1,%rax > 0x0000000000460cd0 <+80>: mov (%rbx),%rdi > 0x0000000000460cd3 <+83>: callq *%rdi > 0x0000000000460cd5 <+85>: pop %r14 > 0x0000000000460cd7 <+87>: add $0x8,%rsp > 0x0000000000460cdb <+91>: add $0x18,%rsp > 0x0000000000460cdf <+95>: retq >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1141575
: 937376 |
937377
|
937378
|
937379
|
937380
|
937381
|
937382
|
937383
|
937384
|
937385
|
937386