[Bug 949397] Crash report cannot be processed
Apport retracing service
949397 at bugs.launchpad.net
Wed Mar 7 21:35:02 UTC 2012
Thank you for your report!
However, processing it in order to get sufficient information for the
developers failed (it does not generate a useful symbolic stack trace). This
might be caused by some outdated packages which were installed on your system
at the time of the report:
package python-gobject-cairo does not exist, ignoring
Please upgrade your system to the latest package versions. If you still
encounter the crash, please file a new report.
Thank you for your understanding, and sorry for the inconvenience!
** Attachment removed: "CoreDump.gz"
https://bugs.launchpad.net/bugs/949397/+attachment/2831197/+files/CoreDump.gz
** Tags removed: need-i386-retrace
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to python2.7 in Ubuntu.
https://bugs.launchpad.net/bugs/949397
Title:
python2.7 crashed with SIGSEGV in void WTF::dtoa<true, false, false,
true>()
Status in “python2.7” package in Ubuntu:
Invalid
Bug description:
USC crashes after clicking on "buy.." button.
ProblemType: Crash
DistroRelease: Ubuntu 12.04
Package: python2.7-minimal 2.7.2-13ubuntu5
ProcVersionSignature: Ubuntu 3.2.0-18.28-generic 3.2.9
Uname: Linux 3.2.0-18-generic i686
ApportVersion: 1.94.1-0ubuntu1
Architecture: i386
Date: Wed Mar 7 22:08:30 2012
ExecutablePath: /usr/bin/python2.7
InstallationMedia: Ubuntu 11.10 "Oneiric Ocelot" - Beta i386 (20110904)
ProcCmdline: 00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
ProcEnviron:
SegvAnalysis:
Segfault happened at: 0x1ded0e3 <_ZN3WTF4dtoaILb1ELb0ELb0ELb1EEEvPcdiRbRiRj+963>: mov %dl,(%eax)
PC (0x01ded0e3) ok
source "%dl" ok
destination "(%eax)" (0xbffd0000) not located in a known VMA region (needed writable region)!
SegvReason: writing unknown VMA
Signal: 11
SourcePackage: python2.7
StacktraceTop:
void WTF::dtoa<true, false, false, true>(char*, double, int, bool&, int&, unsigned int&) () from /usr/lib/libjavascriptcoregtk-3.0.so.0
WTF::dtoa(char*, double, bool&, int&, unsigned int&) () from /usr/lib/libjavascriptcoregtk-3.0.so.0
?? () from /usr/lib/libwebkitgtk-3.0.so.0
?? ()
?? ()
Title: python2.7 crashed with SIGSEGV in void WTF::dtoa<true, false, false, true>()
UpgradeStatus: Upgraded to precise on 2012-03-03 (4 days ago)
UserGroups: adm admin cdrom dialout lpadmin plugdev sambashare scanner
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python2.7/+bug/949397/+subscriptions
More information about the foundations-bugs
mailing list