gnomes applets crash on login

Bug #149326 reported by dzef
8
Affects Status Importance Assigned to Milestone
at-spi (Ubuntu)
Invalid
Medium
Unassigned

Bug Description

Crash after an update

ProblemType: Crash
Architecture: i386
Date: Fri Oct 5 10:39:51 2007
DistroRelease: Ubuntu 7.10
ExecutablePath: /usr/bin/gnome-mount
NonfreeKernelModules: cdrom
Package: gnome-mount 0.6-1ubuntu3
PackageArchitecture: i386
ProcCmdline: /usr/bin/gnome-mount --unmount --hal-udi=/org/freedesktop/Hal/devices/volume_label_Pro_Evolution_Soccer_6
ProcCwd: /home/xavier
ProcEnviron:
 PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games
 LANG=fr_FR.UTF-8
 SHELL=/bin/bash
Signal: 11
SourcePackage: gnome-mount
Stacktrace:
 #0 0xb759c508 in XInternAtom () from /usr/lib/libX11.so.6
 #1 0xb731e8ff in ?? () from /usr/lib/gtk-2.0/modules/libatk-bridge.so
 #2 0x00000000 in ?? ()
StacktraceTop:
 XInternAtom () from /usr/lib/libX11.so.6
 ?? () from /usr/lib/gtk-2.0/modules/libatk-bridge.so
 ?? ()
ThreadStacktrace:
 .
 Thread 1 (process 5851):
 #0 0xb759c508 in XInternAtom () from /usr/lib/libX11.so.6
 #1 0xb731e8ff in ?? () from /usr/lib/gtk-2.0/modules/libatk-bridge.so
 #2 0x00000000 in ?? ()
Title: gnome-mount crashed with SIGSEGV in XInternAtom()
Uname: Linux jeux-internet 2.6.22-12-generic #1 SMP Sun Sep 23 18:11:30 GMT 2007 i686 GNU/Linux
UserGroups: adm admin audio cdrom dialout dip floppy lpadmin netdev plugdev powerdev scanner video
SegvAnalysis:
 Segfault happened at: 0xb759c508 <XInternAtom+40>: mov 0x4d0(%edi),%eax
 PC (0xb759c508) ok
 source "0x4d0(%edi)" (0x000004d0) not located in a known VMA region (needed readable region)!
 destination "%eax" ok
SegvReason: reading NULL VMA

Tags: apport-crash
Revision history for this message
dzef (gnaudiux) wrote :
Revision history for this message
Apport retracing service (apport) wrote : Symbolic stack trace

StacktraceTop:spi_atk_bridge_get_registry () at bridge.c:389
spi_atk_bridge_do_registration () at bridge.c:272
atk_bridge_init (argc=0xb7efeb90, argv=0xb7efeb94) at bridge.c:244
default_display_notify_cb (display_manager=0x806c240)
IA__g_cclosure_marshal_VOID__PARAM (closure=0x80644d8, return_value=0x0, n_param_values=2,

Revision history for this message
Apport retracing service (apport) wrote : Symbolic threaded stack trace
Revision history for this message
Apport retracing service (apport) wrote : Stack trace with source code
Kees Cook (kees)
description: updated
Revision history for this message
Charlie Kravetz (cjkgeek) wrote :

Thank you for taking the time to report this bug and helping to make Ubuntu better. We are sorry that we do not always have the capacity to look at all reported bugs in a timely manner. There have been many changes in Ubuntu since that time you reported the bug and your problem may have been fixed with some of the updates. Could test the current Ubuntu development version? It would help us greatly if you could test with it so we can work on getting it fixed in the next release of Ubuntu. You can find out more about the development release at http://www.ubuntu.com/testing/ . If you can test it, and it is still an issue, we would appreciate if you could upload updated logs by running apport-collect 149326.

Changed in at-spi (Ubuntu):
status: New → Incomplete
Revision history for this message
Charlie Kravetz (cjkgeek) wrote :

We'd like to figure out what's causing this bug for you, but we haven't heard back from you in a while. Could you please provide the requested information? Thanks!

Revision history for this message
Charlie Kravetz (cjkgeek) wrote :

We are closing this bug report because it lacks the information we need to investigate the problem, as described in the previous comments. Please reopen it if you can give us the missing information, and don't hesitate to submit bug reports in the future. To reopen the bug report you can click on the current status, under the Status column, and change the Status back to "New". Thanks again!

Changed in at-spi (Ubuntu):
status: Incomplete → Invalid
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.