The stack trace is
0x08056366 in ?? ()
... (3 more times, with different addresses that I'm not going to type out)
0xb7881cda in g_cclosure_marshal_VOID__OBJECT () from /usr/lib/libgobject-2.0.so.0
g_closure_invoke () from /usr/lib/libgobject-2.0.so.0
I hit this on a clean boot of the Intrepid alpha5 desktop i386 livecd. (from a USB drive with isoscan/ filename= ...)
It looks identical to Steve's original report, except mine receives the segv in g_main_ context_ prepare( ).
I also get segvs in fast-user- switcher- applet whenever I click on it. /bugs.launchpad .net/ubuntu/ +source/ fast-user- switch- applet/ +bug/262532
It looks like
https:/
The stack trace is marshal_ VOID__OBJECT () from /usr/lib/ libgobject- 2.0.so. 0 libgobject- 2.0.so. 0
0x08056366 in ?? ()
... (3 more times, with different addresses that I'm not going to type out)
0xb7881cda in g_cclosure_
g_closure_invoke () from /usr/lib/