nepomukservicestub crashed with SIGSEGV in pthread_cond_wait@@GLIBC_2.3.2()

Bug #913024 reported by lara hurtado jose
378
This bug affects 89 people
Affects Status Importance Assigned to Milestone
kde-runtime (Ubuntu)
Confirmed
High
Unassigned

Bug Description

el problema surge cada vez que inicio sesion no puedo hacer nada una vez que surja el problema por lo que decidi en terminal (alt+f1) instalar openbox que me permite sobrellevar el problema

ProblemType: Crash
DistroRelease: Ubuntu 12.04
Package: kde-runtime 4:4.7.97-0ubuntu1
ProcVersionSignature: Ubuntu 3.2.0-8.14-generic 3.2.0
Uname: Linux 3.2.0-8-generic i686
ApportVersion: 1.90-0ubuntu1
Architecture: i386
CrashCounter: 1
Date: Fri Jan 6 23:07:30 2012
Disassembly: => 0x0: No se puede acceder a la memoria en la dirección 0x0
ExecutablePath: /usr/bin/nepomukservicestub
InstallationMedia: Ubuntu 11.04 "Natty Narwhal" - Release i386 (20110427.1)
ProcCmdline: /usr/bin/nepomukservicestub nepomukfileindexer
ProcEnviron:
 LANGUAGE=es_MX:es
 PATH=(custom, no user)
 LANG=es_MX.UTF-8
 SHELL=/bin/bash
SegvAnalysis:
 Segfault happened at: 0x0: No se puede acceder a la memoria en la dirección 0x0
 PC (0x00000000) not located in a known VMA region (needed executable region)!
 source "0x0" (0x00000000) not located in a known VMA region (needed readable region)!
SegvReason:
 executing NULL VMA
 reading NULL VMA
Signal: 11
SourcePackage: kde-runtime
StacktraceTop:
 ?? ()
 QObject::~QObject() () from /usr/lib/i386-linux-gnu/libQtCore.so.4
 QObject::~QObject() () from /usr/lib/i386-linux-gnu/libQtCore.so.4
 _start ()
Title: nepomukservicestub crashed with SIGSEGV in QObject::~QObject()
UpgradeStatus: Upgraded to precise on 2012-01-07 (0 days ago)
UserGroups: adm admin cdrom dialout lpadmin plugdev sambashare

Revision history for this message
lara hurtado jose (larahurtadojose) wrote :
Revision history for this message
Apport retracing service (apport) wrote :

StacktraceTop:
 pthread_cond_wait@@GLIBC_2.3.2 () at ../nptl/sysdeps/unix/sysv/linux/i386/i686/../i486/pthread_cond_wait.S:169
 __pthread_cond_wait (cond=0x8e6f948, mutex=0x8e6f930) at forward.c:139
 wait (time=4294967295, this=0x8e6f930) at thread/qwaitcondition_unix.cpp:88
 QWaitCondition::wait (this=0x8eb90d8, mutex=0x8eb90c0, time=4294967295) at thread/qwaitcondition_unix.cpp:160
 QThread::wait (this=0x8e71bb8, time=4294967295) at thread/qthread_unix.cpp:745

Revision history for this message
Apport retracing service (apport) wrote : Stacktrace.txt
Revision history for this message
Apport retracing service (apport) wrote : ThreadStacktrace.txt
Changed in kde-runtime (Ubuntu):
importance: Undecided → Medium
summary: - nepomukservicestub crashed with SIGSEGV in QObject::~QObject()
+ nepomukservicestub crashed with SIGSEGV in
+ pthread_cond_wait@@GLIBC_2.3.2()
tags: removed: need-i386-retrace
Revision history for this message
Launchpad Janitor (janitor) wrote :

Status changed to 'Confirmed' because the bug affects multiple users.

Changed in kde-runtime (Ubuntu):
status: New → Confirmed
visibility: private → public
Changed in kde-runtime (Ubuntu):
importance: Medium → High
Revision history for this message
nockdown (nockdown) wrote :

Output of: lsb_release -rd
Description: Ubuntu 12.04 LTS
Release: 12.04

Output of: apt-cache policy kde-runtime
kde-runtime:
 Installed: 4:4.8.2-0ubuntu2
 Candidate: 4:4.8.2-0ubuntu2
 Version table:
 *** 4:4.8.2-0ubuntu2 0
        500 http://ru.archive.ubuntu.com/ubuntu/ precise/main amd64 Packages
        100 /var/lib/dpkg/status

ApportVersion
2.0.1-0ubuntu7
Architecture
amd64
CrashCounter
1
Date
Tue May 8 13:09:28 2012
Disassembly
=> 0x0: Cannot access memory at address 0x0
DistroRelease
Ubuntu 12.04
ExecutablePath
/usr/bin/nepomukservicestub
InstallationMedia
Kubuntu 12.04 LTS "Precise Pangolin" - Release amd64 (20120423)
Package
kde-runtime 4:4.8.2-0ubuntu2
PackageArchitecture
amd64
ProblemType
Crash
ProcCmdline
/usr/bin/nepomukservicestub nepomukstorage
ProcEnviron
LANG=ru_RU.UTF-8
SHELL=/bin/bash
ProcVersionSignature
Ubuntu 3.2.0-23.36-generic 3.2.14
SegvAnalysis
Segfault happened at: 0x0: Cannot access memory at address 0x0
PC (0x00000000) not located in a known VMA region (needed executable region)!
SegvReason
executing NULL VMA
Signal
11
SourcePackage
kde-runtime
Stacktrace
#0 0x0000000000000000 in ?? ()
No symbol table info available.
Cannot access memory at address 0x7fffc2e076e8
Tags
 precise
ThreadStacktrace
.
Thread 3 (LWP 1703):
#0 0x00007feb37754b03 in ?? ()
No symbol table info available.
Cannot access memory at address 0x7feb254fdc80
Title
nepomukservicestub crashed with SIGSEGV
Uname
Linux 3.2.0-23-generic x86_64
UpgradeStatus
No upgrade log present (probably fresh install)
UserGroups
adm cdrom dip lpadmin plugdev sambashare sudo

Revision history for this message
Ariszló (ariszlo) wrote :

Bug #980110 is marked as a duplicate of this bug so I am commenting here.

KNetAttach crashes at login after a fresh install of Kubuntu 12.04.1.
No more crashes after creating ~/.local/share/contacts directory.
Idea taken from http://ubuntuforums.org/showthread.php?t=1967061

Revision history for this message
McFly81 (christian-lange-81) wrote :

Same problem here, KNetAttach crashes at every login. Directory .local/share/contacts already exists, but it the crashes go on...

Revision history for this message
McFly81 (christian-lange-81) wrote :

forgot to mention:

erhard@erhard-Satellite-L300:~/.local/share/contacts$ lsb_release -rd
Description: Ubuntu 12.04.1 LTS
Release: 12.04
erhard@erhard-Satellite-L300:~/.local/share/contacts$ apt-cache policy kde-runtime
kde-runtime:
  Installiert: 4:4.8.5-0ubuntu0.1
  Kandidat: 4:4.8.5-0ubuntu0.1
  Versionstabelle:
 *** 4:4.8.5-0ubuntu0.1 0
        500 http://de.archive.ubuntu.com/ubuntu/ precise-updates/main amd64 Packages
        100 /var/lib/dpkg/status
     4:4.8.2-0ubuntu2 0
        500 http://de.archive.ubuntu.com/ubuntu/ precise/main amd64 Packages

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.