another layer of stack trace mystery revealed: Xm.c:622
0x00007ffff72427d9 in _XtWindowedAncestor (object=0x3364613466377830) at
../../src/Intrinsic.c:787
(gdb) bt
#0 0x00007ffff72427d9 in _XtWindowedAncestor (object=0x3364613466377830) at
../../src/Intrinsic.c:787
#1 0x00007ffff72430d1 in XtWindowOfObject (object=<optimized out>) at
../../src/Intrinsic.c:700
#2 0x00007ffff7aa3248 in _XmEventDispatcher (event=0x7fffffffe2e0) at Xm.c:622
#3 0x00007ffff723c499 in XtDispatchEvent (event=0x7fffffffe2e0) at
../../src/Event.c:1423
#4 0x00000000004204fd in process_next_event () at ddd.C:3247
#5 0x00000000004e2dcd in ddd_main_loop () at mainloop.C:120
#6 0x000000000040db4f in main (argc=<optimized out>, argv=<optimized out>) at
ddd.C:3175
Related: calling XtIsWidget(object) from within ddd, at the point of the
crash.... causes a crash in the *current* running instance of ddd(ie not
the one being debugged).
Sure seems like the crash is actually happening at _XtCheckSubclassFlag() from
XtIsWidget(object) where it's checking object->core.widget_class->core_class,
which is not defined.
(gdb) print object->core
$2 = {self = 0x0, widget_class = 0x37, parent = 0x5900d0
<HandleTipEvent(Widget, XtPointer, XEvent*, Boolean*)>, xrm_name = 0,
being_destroyed = 0 '\000', destroy_callbacks = 0xf259, constraints = 0x51, x =
6, y = 0, width = 36, height = 0, border_width = 23328, managed = -13 '\363',
sensitive = 0 '\000', ancestor_sensitive = 0 '\000', event_table =
0x656372756f73, tm = {translations = 0x3766666666373030, proc_table =
0x6920396437323432, current_state = 0x6e695774585f206e, lastEventTime =
7164735956647898980}, accelerators = 0x6f2820726f747365, border_pixel =
8660489653526555234, border_pixmap = 81, popup_list = 0x240000000c, num_popups
= 15948656, name = 0x6d6f635f63657865 <error: Cannot access memory at address
0x6d6f635f63657865>, screen = 0x63006300646e616d, colormap =
1876372909337502510, window = 8372021752999980826, depth = 1970103656,
background_pixel = 3414964798904951919, background_pixmap =
3328491577862678892, visible = 81 'Q', mapped_when_managed = 0 '\000'}
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1354961
Title:
segfault in 0x00007ffff725a7dd in _XtWindowedAncestor () from
/usr/lib/x86_64-linux-gnu/libXt.so.6
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ddd/+bug/1354961/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs