another layer of stack trace mystery revealed:  Xm.c:622

0x00007ffff72427d9 in _XtWindowedAncestor (object=0x3364613466377830) at 
../../src/Intrinsic.c:787
(gdb) bt
#0  0x00007ffff72427d9 in _XtWindowedAncestor (object=0x3364613466377830) at 
../../src/Intrinsic.c:787
#1  0x00007ffff72430d1 in XtWindowOfObject (object=<optimized out>) at 
../../src/Intrinsic.c:700
#2  0x00007ffff7aa3248 in _XmEventDispatcher (event=0x7fffffffe2e0) at Xm.c:622
#3  0x00007ffff723c499 in XtDispatchEvent (event=0x7fffffffe2e0) at 
../../src/Event.c:1423
#4  0x00000000004204fd in process_next_event () at ddd.C:3247
#5  0x00000000004e2dcd in ddd_main_loop () at mainloop.C:120
#6  0x000000000040db4f in main (argc=<optimized out>, argv=<optimized out>) at 
ddd.C:3175

Related: calling XtIsWidget(object) from within ddd, at the point of the
crash.... causes a crash in the *current* running instance of ddd(ie not
the one being debugged).

Sure seems like the crash is actually happening at _XtCheckSubclassFlag() from 
XtIsWidget(object) where it's checking object->core.widget_class->core_class, 
which is not defined.
 
(gdb) print object->core
$2 = {self = 0x0, widget_class = 0x37, parent = 0x5900d0 
<HandleTipEvent(Widget, XtPointer, XEvent*, Boolean*)>, xrm_name = 0, 
being_destroyed = 0 '\000', destroy_callbacks = 0xf259, constraints = 0x51, x = 
6, y = 0, width = 36, height = 0, border_width = 23328, managed = -13 '\363', 
sensitive = 0 '\000', ancestor_sensitive = 0 '\000', event_table = 
0x656372756f73, tm = {translations = 0x3766666666373030, proc_table = 
0x6920396437323432, current_state = 0x6e695774585f206e, lastEventTime = 
7164735956647898980}, accelerators = 0x6f2820726f747365, border_pixel = 
8660489653526555234, border_pixmap = 81, popup_list = 0x240000000c, num_popups 
= 15948656, name = 0x6d6f635f63657865 <error: Cannot access memory at address 
0x6d6f635f63657865>, screen = 0x63006300646e616d, colormap = 
1876372909337502510, window = 8372021752999980826, depth = 1970103656, 
background_pixel = 3414964798904951919, background_pixmap = 
3328491577862678892, visible = 81 'Q', mapped_when_managed = 0 '\000'}

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1354961

Title:
  segfault in 0x00007ffff725a7dd in _XtWindowedAncestor () from
  /usr/lib/x86_64-linux-gnu/libXt.so.6

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ddd/+bug/1354961/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to