https://bugs.kde.org/show_bug.cgi?id=478865

--- Comment #3 from Derek Graham <derekagraha...@icloud.com> ---
           PID: 65235 (kwin_wayland)
           UID: 1000 (dgraham)
           GID: 1001 (dgraham)
        Signal: 11 (SEGV)
     Timestamp: Thu 2023-12-21 22:23:43 CST (1h 31min ago)
  Command Line: /usr/bin/kwin_wayland --wayland-fd 7 --socket wayland-0
--xwayland-fd 8 --xwayland-fd 9 --xwayland-display :0 --xwayland-xauthority
/run/user/1000/xauth_DAFtxC --xwayland
    Executable: /usr/bin/kwin_wayland
 Control Group:
/user.slice/user-1000.slice/user@1000.service/session.slice/plasma-kwin_wayland.service
          Unit: user@1000.service
     User Unit: plasma-kwin_wayland.service
         Slice: user-1000.slice
     Owner UID: 1000 (dgraham)
       Boot ID: c0e7b59540204a49a096d559db1ee3eb
    Machine ID: 1aa718c232084f139d062a89c4e98d0e
      Hostname: Mulder
       Storage:
/var/lib/systemd/coredump/core.kwin_wayland.1000.c0e7b59540204a49a096d559db1ee3eb.65235.1703219023000000.zst
(inaccessible)
       Message: Process 65235 (kwin_wayland) of user 1000 dumped core.

                Stack trace of thread 65235:
                #0  0x00007f22ede1d16c n/a (libKF6ConfigCore.so.6 + 0x2c16c)
                #1  0x00007f22ede51e39 n/a (libKF6ConfigCore.so.6 + 0x60e39)
                #2  0x00007f22ede4948e _ZN19KCoreConfigSkeletonD2Ev
(libKF6ConfigCore.so.6 + 0x5848e)
                #3  0x00007f22e5d5fc08 n/a (oxygen6.so + 0xc6c08)
                #4  0x00007f22ec05ecc6 n/a (libc.so.6 + 0x40cc6)
                #5  0x00007f22ec05ee10 exit (libc.so.6 + 0x40e10)
                #6  0x00007f22ec045cd7 n/a (libc.so.6 + 0x27cd7)
                #7  0x00007f22ec045d8a __libc_start_main (libc.so.6 + 0x27d8a)
                #8  0x00005621272317a5 n/a (kwin_wayland + 0x5c7a5)

                Stack trace of thread 65264:
                #0  0x00007f22ec12c73d syscall (libc.so.6 + 0x10e73d)
                #1  0x00007f22ec7a629a _ZN14QMetaCallEventD2Ev (libQt6Core.so.6
+ 0x1a629a)
                #2  0x00007f22ec7a62bd _ZN14QMetaCallEventD0Ev (libQt6Core.so.6
+ 0x1a62bd)
                #3  0x00007f22ec762e05
_ZN23QCoreApplicationPrivate16sendPostedEventsEP7QObjectiP11QThreadData
(libQt6Core.so.6 + 0x162e05)
                #4  0x00007f22ec99ead4 n/a (libQt6Core.so.6 + 0x39ead4)
                #5  0x00007f22eafb9f69 n/a (libglib-2.0.so.0 + 0x59f69)
                #6  0x00007f22eb018367 n/a (libglib-2.0.so.0 + 0xb8367)
                #7  0x00007f22eafb8162 g_main_context_iteration
(libglib-2.0.so.0 + 0x58162)
                #8  0x00007f22ec99d074
_ZN20QEventDispatcherGlib13processEventsE6QFlagsIN10QEventLoop17ProcessEventsFlagEE
(libQt6Core.so.6 + 0x39d074)
                #9  0x00007f22ec76cf5e
_ZN10QEventLoop4execE6QFlagsINS_17ProcessEventsFlagEE (libQt6Core.so.6 +
0x16cf5e)
                #10 0x00007f22ec84a13f _ZN7QThread4execEv (libQt6Core.so.6 +
0x24a13f)
                #11 0x00007f22ed48995f n/a (libQt6DBus.so.6 + 0x2f95f)
                #12 0x00007f22ec8c9e63 n/a (libQt6Core.so.6 + 0x2c9e63)
                #13 0x00007f22ec0aa9eb n/a (libc.so.6 + 0x8c9eb)
                #14 0x00007f22ec12e7cc n/a (libc.so.6 + 0x1107cc)
                ELF object binary architecture: AMD x86-64

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to