It appears the address of a stack variable has overwritten the return
address for the offending function call. So we have no stack trace.

I wonder if there's a way to catch stack corruption without going so far
as Valgrind...

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1964120

Title:
  gnome-shell crashed with SIGSEGV at ?+a7c called from (Cannot access
  memory at address [in stack])

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/1964120/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to