Devuan bug report logs - #751
xserver-xorg-core 21.1.7-1: I can reliably kill the server after some clicks in the root window.

version graph

Package: fvwm; Maintainer for fvwm is (unknown); Source for fvwm is src:fvwm.

Affects: fvwm

Reported by: Stefan Schippers <stefan.schippers@gmail.com>

Date: Tue, 14 Mar 2023 13:56:02 UTC

Severity: critical

Tags: debian

Merged with 746

Fixed in version 1:2.7.0-2

Done: Mark Hindley <mark@hindley.org.uk>

Forwarded to https://bugs.debian.org/1034054

Full log


Message #10 received at 751@bugs.devuan.org (full text, mbox, reply):

Received: (at 751) by bugs.devuan.org; 14 Mar 2023 14:58:54 +0000
Return-Path: <stefan.schippers@gmail.com>
Delivered-To: bugs@devuan.org
Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Tue, 14 Mar 2023 14:58:54 +0000 (UTC)
Received: from email.devuan.org
	by email.devuan.org with LMTP
	id 30cqO4uLEGT7LAAAmSBk0A
	(envelope-from <stefan.schippers@gmail.com>)
	for <bugs@devuan.org>; Tue, 14 Mar 2023 14:58:19 +0000
Received: by email.devuan.org (Postfix, from userid 109)
	id D724166E; Tue, 14 Mar 2023 14:58:19 +0000 (UTC)
X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org
X-Spam-Level: 
X-Spam-Status: No, score=0.2 required=5.0 tests=DKIM_INVALID,DKIM_SIGNED,
	FREEMAIL_FROM,SPF_PASS autolearn=no autolearn_force=no version=3.4.6
Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=2a00:1450:4864:20::532; helo=mail-ed1-x532.google.com; envelope-from=stefan.schippers@gmail.com; receiver=<UNKNOWN> 
Received: from mail-ed1-x532.google.com (mail-ed1-x532.google.com [IPv6:2a00:1450:4864:20::532])
	by email.devuan.org (Postfix) with ESMTPS id 964B52A8
	for <751@bugs.devuan.org>; Tue, 14 Mar 2023 14:58:04 +0000 (UTC)
Received: by mail-ed1-x532.google.com with SMTP id o12so63173082edb.9
        for <751@bugs.devuan.org>; Tue, 14 Mar 2023 07:58:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112; t=1678805877;
        h=content-transfer-encoding:subject:from:content-language:to
         :user-agent:mime-version:date:message-id:from:to:cc:subject:date
         :message-id:reply-to;
        bh=49OIzMxcodcFb4zJJivxHpR5wQQBvfn638cjRtvTpAI=;
        b=mnc45a0j36Tu3IS9ih2fABG9fvlUUsAasu/4o47UH9e4hXJN1cMA++HB59TmvJHdvQ
         +5U7NIoFoDFJ7LizzfQOeF75H5IomUpZwf7/ByhnFE04wBlsCS9teEOEXmn1tpawWilS
         G7rmR7Bd3BTpaPRECKD5DROcLDyOCSEjRfSAQA+RHu3I/NTC8UzW/jcFtwuUk5XFIOI5
         D5eBk+lOSexitid/WppkPeIJ2ePKo9vO8g8g/gCA2R0neh1SamVPuA7P03o/MMrO3H0k
         hZv5O7MeDK0HPsmaquW4Gna4sXUgtOmjTbPzvOS+vdLSCulXx/ceBWB9Wp9xJwVAZQHN
         j5KA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112; t=1678805877;
        h=content-transfer-encoding:subject:from:content-language:to
         :user-agent:mime-version:date:message-id:x-gm-message-state:from:to
         :cc:subject:date:message-id:reply-to;
        bh=49OIzMxcodcFb4zJJivxHpR5wQQBvfn638cjRtvTpAI=;
        b=Ul1fQr6rXYmK0pMHewqvPS67B3Ph9L+2z0I3WjtSQpj9HLgF59uWSOVEQu3V6QHOdW
         kMRlzTwAKHxP8SUQjC2G8FHm6iX20hzKWgaJYeLoUrmNWDa8Lcz4aFDrI0+QZQpKtlTH
         20XttkEMhIDr+UTNm1cU38456Wz0/7SKwYzP4zlrnkt89GqFOJPxDxphsn9hWhYqp5Vt
         d7EmVzgIRVM3rUy2PAsTGOLCP7iEXI3QljcfUZbHQkT6QgcjyLvjPQT2+9QrqhfuMUQm
         b2YSFSakXEFVYSrQ6NjK7Ljz+IpTEGvb9n8qIOSi+m9JWrgOOopXRRzrEcFSVcBTEsYp
         Yqng==
X-Gm-Message-State: AO0yUKXKlTtzc6qAPbh4At0rY+DNGcXOtvH0TXj97Rk7fnezv2+UpKaP
	Yp9EKy9BGuaoo7u+3SNsa64OUAMSKOs=
X-Google-Smtp-Source: AK7set+f0n0bnReG09fQNS89XeDZWM5pFUSCVPd+Ph6dAxiT1N36wXQS2fpAqPnpZqKobbqInRBhpA==
X-Received: by 2002:a17:907:6746:b0:8f1:4bef:b0e7 with SMTP id qm6-20020a170907674600b008f14befb0e7mr2849731ejc.1.1678805877289;
        Tue, 14 Mar 2023 07:57:57 -0700 (PDT)
Received: from [192.168.0.84] ([31.188.184.172])
        by smtp.gmail.com with ESMTPSA id f8-20020a170906138800b008e3e2b6a9adsm1254778ejc.94.2023.03.14.07.57.54
        for <751@bugs.devuan.org>
        (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
        Tue, 14 Mar 2023 07:57:55 -0700 (PDT)
Message-ID: <b918bdc0-fc30-9491-53cb-770ee1bf556d@gmail.com>
Date: Tue, 14 Mar 2023 15:57:53 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
 Thunderbird/102.8.0
To: 751@bugs.devuan.org
Content-Language: en-US
From: Stefan Schippers <stefan.schippers@gmail.com>
Subject: Update: crash due to fvwm window manager crash
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Package: xserver-xorg-core


The bug seems not related to xorg but to the fvwm window manager crash. I ran the window manager with gdb and was able to reliably make it crash by some mouse activity.


(gdb) run
Starting program: /usr/bin/fvwm
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
[Detaching after fork from child process 4851]
[Detaching after vfork from child process 4864]
Warning: Arg --fvwm-icons is obsolete and ignored
Python module python-xdg not found.fvwm: ../../src/xcb_io.c:626: _XAllocID: Assertion `ret != inval_id' failed.

Program received signal SIGABRT, Aborted.
__pthread_kill_implementation (threadid=<optimized out>, signo=signo@entry=6, no_tid=no_tid@entry=0) at ./nptl/pthread_kill.c:44
44      ./nptl/pthread_kill.c: No such file or directory.
(gdb) bt
#0  __pthread_kill_implementation (threadid=<optimized out>, signo=signo@entry=6, no_tid=no_tid@entry=0) at ./nptl/pthread_kill.c:44
#1  0x00007ffff6ca9d2f in __pthread_kill_internal (signo=6, threadid=<optimized out>) at ./nptl/pthread_kill.c:78
#2  0x00007ffff6c5aef2 in __GI_raise (sig=sig@entry=6) at ../sysdeps/posix/raise.c:26
#3  0x00007ffff6c45472 in __GI_abort () at ./stdlib/abort.c:79
#4  0x00007ffff6c45395 in __assert_fail_base
    (fmt=0x7ffff6db9a70 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n", assertion=assertion@entry=0x7ffff7b75b2a "ret != inval_id", file=file@entry=0x7ffff7b75a9b "../../src/xcb_io.c", line=line@entry=626, function=function@entry=0x7ffff7b75ef0 "_XAllocID") at ./assert/assert.c:92
#5  0x00007ffff6c53df2 in __GI___assert_fail (assertion=0x7ffff7b75b2a "ret != inval_id", file=0x7ffff7b75a9b "../../src/xcb_io.c", line=626, function=0x7ffff7b75ef0 "_XAllocID") at ./assert/assert.c:101
#6  0x00007ffff7b02443 in  () at /usr/lib/x86_64-linux-gnu/libX11.so.6
#7  0x00007ffff7e56558 in XRenderCreatePicture () at /usr/lib/x86_64-linux-gnu/libXrender.so.1
#8  0x00007ffff7f9e5b6 in  () at /usr/lib/x86_64-linux-gnu/libXft.so.2
#9  0x00007ffff7f9ec95 in XftDrawGlyphs () at /usr/lib/x86_64-linux-gnu/libXft.so.2
#10 0x00007ffff7f9f2ad in XftDrawStringUtf8 () at /usr/lib/x86_64-linux-gnu/libXft.so.2
#11 0x00005555555ff843 in  ()
#12 0x00005555555e6dfb in  ()
#13 0x00005555555a5fff in  ()
#14 0x00005555555a7ba4 in  ()
#15 0x0000555555588dba in  ()
#16 0x000055555558c4eb in  ()
#17 0x000055555558c66c in  ()
#18 0x0000555555600189 in  ()
#19 0x000055555560020f in  ()
#20 0x00007ffff7add9da in XCheckIfEvent () at /usr/lib/x86_64-linux-gnu/libX11.so.6
#21 0x0000555555600b62 in  ()
#22 0x0000555555600cb7 in  ()
#23 0x000055555558d58a in  ()
#24 0x00005555555bfb2f in  ()
#25 0x00005555555a92ca in  ()
#26 0x00005555555a9bf4 in  ()
#27 0x00005555555c7f29 in  ()
#28 0x0000555555589d43 in  ()
#29 0x000055555558c4eb in  ()
#30 0x000055555558c5e4 in  ()
#31 0x00005555555674f7 in  ()
#32 0x00007ffff6c4618a in __libc_start_call_main (main=main@entry=0x555555565a90, argc=argc@entry=1, argv=argv@entry=0x7fffffffe4d8) at ../sysdeps/nptl/libc_start_call_main.h:58
#33 0x00007ffff6c46245 in __libc_start_main_impl (main=0x555555565a90, argc=1, argv=0x7fffffffe4d8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe4c8) at ../csu/libc-start.c:381
#34 0x0000555555568631 in  ()
(gdb)


Send a report that this bug log contains spam.


Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.

Devuan Bugs Owner <owner@bugs.devuan.org>.
Last modified: Sun Nov 24 06:49:49 2024;