variety crashed with SIGSEGV in std::_Rb_tree<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::pair<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > >, std::_Select1st<std::pair<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > >, std::less<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > >, std::allocator<std::pair<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > > >::_M_get_insert_hint_unique_pos()

Bug #1603364 reported by CrystalMageX
10
This bug affects 1 person
Affects Status Importance Assigned to Milestone
variety (Ubuntu)
New
Undecided
Unassigned

Bug Description

Variety randomly crashed in the background.

$ lsb_release -rd
Description: Ubuntu Yakkety Yak (development branch)
Release: 16.10

$ apt-cache policy variety
variety:
  Installed: 0.6.0-1
  Candidate: 0.6.0-1
  Version table:
 *** 0.6.0-1 500
        500 http://archive.ubuntu.mirror.rafal.ca/ubuntu yakkety/universe amd64 Packages
        500 http://archive.ubuntu.mirror.rafal.ca/ubuntu yakkety/universe i386 Packages
        100 /var/lib/dpkg/status

What I expected to happen: Nothing to crash.
What happened instead: It crashed.

Reproduction step: Wait until it crashes randomly.

ProblemType: Crash
DistroRelease: Ubuntu 16.10
Package: variety 0.6.0-1
ProcVersionSignature: Ubuntu 4.4.0-30.49-generic 4.4.13
Uname: Linux 4.4.0-30-generic x86_64
ApportVersion: 2.20.2-0ubuntu1
Architecture: amd64
CurrentDesktop: KDE
Date: Thu Jul 14 04:48:55 2016
ExecutablePath: /usr/bin/variety
InterpreterPath: /usr/bin/python2.7
PackageArchitecture: all
ProcCmdline: /usr/bin/python /usr/bin/variety
SegvAnalysis:
 Segfault happened at: 0x7fddcfcb5b51 <__memcmp_sse4_1+5265>: movdqu -0x1e(%rdi),%xmm2
 PC (0x7fddcfcb5b51) ok
 source "-0x1e(%rdi)" (0x00000008) not located in a known VMA region (needed readable region)!
 destination "%xmm2" ok
 Stack memory exhausted (SP below stack segment)
SegvReason: reading NULL VMA
Signal: 11
SourcePackage: variety
Title: variety crashed with SIGSEGV in std::_Rb_tree<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::pair<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > >, std::_Select1st<std::pair<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > >, std::less<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > >, std::allocator<std::pair<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > > >::_M_get_insert_hint_unique_pos()
UpgradeStatus: Upgraded to yakkety on 2016-07-07 (8 days ago)
UserGroups: libvirt libvirtd sudo systemd-journal wireshark

Revision history for this message
CrystalMageX (crystalmagex) wrote :
Revision history for this message
Apport retracing service (apport) wrote : This bug is a duplicate

Thank you for taking the time to report this crash and helping to make this software better. This particular crash has already been reported and is a duplicate of bug #1552179, so is being marked as such. Please look at the other bug report to see if there is any missing information that you can provide, or to see if there is a workaround for the bug. Additionally, any further discussion regarding the bug should occur in the other report. Please continue to report any other bugs you may find.

information type: Private → Public
tags: removed: need-amd64-retrace
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.