I downloaded and compiled the source, to get an unstripped image. I still don't have a good recipe for reproducing this. It seems to happen more if I'm using more than one frame (with \C-x5)
Here's the resulting backtrace: #0 0xa000000000010720 in __kernel_syscall_via_break () #1 0x2000000000bc5680 in kill () from /lib/libc.so.6.1 #2 0x400000000008e350 in fatal_error_signal (sig=11) at emacs.c:642 #3 <signal handler called> #4 0x4000000000145530 in extent_list_at (el=<value optimized out>, pos=145, endp=0) at extents.c:808 #5 0x4000000000149f20 in soe_move (obj=<value optimized out>, pos=2765) at extents.c:1482 #6 0x400000000015e360 in extent_find_end_of_run (obj=6917529027652936672, pos=2765, outside_accessible=<value optimized out>) at extents.c:2533 #7 0x400000000015ee90 in extent_fragment_update (w=0x6000000000b71e60, ef=0x6000000000c81700, pos=<value optimized out>, last_glyph=2305843009234029984) at extents.c:2789 #8 0x4000000000267d90 in create_text_block (w=0x6000000000b71e60, dl=0x60000000009de760, bi_start_pos=871, prop=0x60000fffffd4b0a0, type=<value optimized out>) at redisplay.c:2213 #9 0x4000000000270fc0 in generate_display_line (w=0x6000000000b71e60, dl=0x60000000009de760, bounds=<value optimized out>, start_pos=871, prop=0x60000fffffd4b0a0, type=1) at redisplay.c:853 #10 0x4000000000275e10 in regenerate_window (w=0x6000000000b71e60, start_pos=871, point=<value optimized out>, type=1) at redisplay.c:5367 #11 0x400000000027edc0 in redisplay_window (window=6917529027653082720, skip_selected=<value optimized out>) at redisplay.c:6301 #12 0x4000000000281150 in redisplay_frame (f=0x6000000000b71bf0, preemption_check=<value optimized out>) at redisplay.c:6595 #13 0x4000000000281e30 in redisplay_device (d=0x60000000002bef70, automatic=1) at redisplay.c:6679 #14 0x40000000002828a0 in redisplay () at redisplay.c:6766 #15 0x4000000000142570 in Fnext_event (event=6917529027651357064, prompt=<value optimized out>) at event-stream.c:2179 #16 0x400000000004ee00 in Fcommand_loop_1 () at cmdloop.c:574 #17 0x40000000000a14d0 in condition_case_1 (handlers=<value optimized out>, bfun=Cannot access memory at address 0x8 ) at eval.c:1652 #18 0x400000000004f6d0 in command_loop_2 (dummy=6917529027641248504) at cmdloop.c:256 #19 0x4000000000093700 in internal_catch (tag=2305843009233636432, func=Cannot access memory at address 0x8) at eval.c:1318 #20 0x4000000000050130 in initial_command_loop (load_me=<value optimized out>) at cmdloop.c:305 #21 0x400000000008ca40 in xemacs_21_4_21_ia64_unknown_linux (argc=1, argv=0x60000fffffd4bbb8, envp=0x60000fffffd4bbc8, restart=0) at emacs.c:2460 #22 0x400000000008d9e0 in main (argc=1, argv=0x60000fffffd4bbb8, envp=0x60000fffffd4bbc8) at emacs.c:2829 -- Dr Peter Chubb http://www.gelato.unsw.edu.au peterc AT gelato.unsw.edu.au http://www.ertos.nicta.com.au ERTOS within National ICT Australia -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]