With kate from kde-unstable arch repo (version 16.03.90), I get a segfault at startup. Reproducible: Always Steps to Reproduce: 1. Install kate from kde-unstable on arch 2. Run kate Actual Results: Segfault Expected Results: Normal startup I've got the coredump file, and here is what is given by gdb: Program terminated with signal SIGSEGV, Segmentation fault. #0 0x0000000000460eaa in KatePluginManager::loadPlugin(KatePluginInfo*) () [Current thread is 1 (Thread 0x7f99c54c6800 (LWP 7899))] (gdb) backtrace #0 0x0000000000460eaa in KatePluginManager::loadPlugin(KatePluginInfo*) () #1 0x0000000000461558 in KatePluginManager::loadConfig(KConfig*) () #2 0x000000000047ce40 in KateSessionManager::loadSession(QExplicitlySharedDataPointer<KateSession> const&) const () #3 0x000000000047e35b in KateSessionManager::activateSession(QExplicitlySharedDataPointer<KateSession>, bool, bool) () #4 0x000000000047e8f6 in KateSessionManager::activateSession(QString const&, bool, bool) () #5 0x000000000047e991 in KateSessionManager::activateAnonymousSession() () #6 0x000000000047efa0 in KateSessionManager::chooseSession() () #7 0x0000000000446de0 in KateApp::startupKate() () #8 0x00000000004471c5 in KateApp::init() () #9 0x000000000043f753 in main ()
Valgrind says "Invalid read of size 8, Address 0x0 is not stack'd, malloc'd or (recently) free'd" (dereferencing a null pointer?): ==11467== Invalid read of size 8 ==11467== at 0x460EAA: KatePluginManager::loadPlugin(KatePluginInfo*) (in /usr/bin/kate) ==11467== by 0x461557: KatePluginManager::loadConfig(KConfig*) (in /usr/bin/kate) ==11467== by 0x47CE3F: KateSessionManager::loadSession(QExplicitlySharedDataPointer<KateSession> const&) const (in /usr/bin/kate) ==11467== by 0x47E35A: KateSessionManager::activateSession(QExplicitlySharedDataPointer<KateSession>, bool, bool) (in /usr/bin/kate) ==11467== by 0x47E8F5: KateSessionManager::activateSession(QString const&, bool, bool) (in /usr/bin/kate) ==11467== by 0x47E990: KateSessionManager::activateAnonymousSession() (in /usr/bin/kate) ==11467== by 0x47EF9F: KateSessionManager::chooseSession() (in /usr/bin/kate) ==11467== by 0x446DDF: KateApp::startupKate() (in /usr/bin/kate) ==11467== by 0x4471C4: KateApp::init() (in /usr/bin/kate) ==11467== by 0x43F752: main (in /usr/bin/kate) ==11467== Address 0x0 is not stack'd, malloc'd or (recently) free'd
Which plugins do you have enabled? And also: could you install debug symbols so valgrind and gdb tell us the line number of the trace?
Maybe related: http://commits.kde.org/kate/0326973a38ea7f96f85430b489480de00f401141 But this changes the order of the mainwindows only, so the plugin manager and session should be unchanged... no direct link visible.
Duplicate of https://bugs.kde.org/show_bug.cgi?id=359685 ==8176== Memcheck, a memory error detector ==8176== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al. ==8176== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info ==8176== Command: kate ==8176== ==8195== Warning: invalid file descriptor 1024 in syscall close() ==8195== Warning: invalid file descriptor 1025 in syscall close() ==8195== Warning: invalid file descriptor 1026 in syscall close() ==8195== Warning: invalid file descriptor 1027 in syscall close() ==8195== Use --log-fd=<number> to select an alternative log fd. ==8195== Warning: invalid file descriptor 1028 in syscall close() ==8195== Warning: invalid file descriptor 1029 in syscall close() ==8176== Syscall param writev(vector[...]) points to uninitialised byte(s) ==8176== at 0x96459BD: ??? (in /lib64/libc-2.22.so) ==8176== by 0xB668D88: _xcb_conn_wait (in /usr/lib64/libxcb.so.1.1.0) ==8176== by 0xB66917C: _xcb_out_send (in /usr/lib64/libxcb.so.1.1.0) ==8176== by 0xB6698D6: _xcb_out_flush_to (in /usr/lib64/libxcb.so.1.1.0) ==8176== by 0xB66A502: wait_for_reply (in /usr/lib64/libxcb.so.1.1.0) ==8176== by 0xB66A580: xcb_wait_for_reply (in /usr/lib64/libxcb.so.1.1.0) ==8176== by 0x13B53479: QXcbConnection::sync() (in /usr/lib64/libQt5XcbQpa.so.5.5.1) ==8176== by 0x13B6E144: QXcbWindow::show() (in /usr/lib64/libQt5XcbQpa.so.5.5.1) ==8176== by 0x7FEC800: QWindow::setVisible(bool) (in /usr/lib64/libQt5Gui.so.5.5.1) ==8176== by 0x7A21FEB: QWidgetPrivate::show_sys() (in /usr/lib64/libQt5Widgets.so.5.5.1) ==8176== by 0x7A2B43D: QWidgetPrivate::show_helper() (in /usr/lib64/libQt5Widgets.so.5.5.1) ==8176== by 0x7A2DFB4: QWidget::setVisible(bool) (in /usr/lib64/libQt5Widgets.so.5.5.1) ==8176== Address 0x1356598a is 4,538 bytes inside a block of size 21,152 alloc'd ==8176== at 0x4C2BF55: calloc (vg_replace_malloc.c:711) ==8176== by 0xB66873B: xcb_connect_to_fd (in /usr/lib64/libxcb.so.1.1.0) ==8176== by 0xB66C470: xcb_connect_to_display_with_auth_info (in /usr/lib64/libxcb.so.1.1.0) ==8176== by 0xB35FCB9: _XConnectXCB (in /usr/lib64/libX11.so.6.3.0) ==8176== by 0xB350831: XOpenDisplay (in /usr/lib64/libX11.so.6.3.0) ==8176== by 0x13B55EC3: QXcbConnection::QXcbConnection(QXcbNativeInterface*, bool, unsigned int, char const*) (in /usr/lib64/libQt5XcbQpa.so.5.5.1) ==8176== by 0x13B5BC8C: QXcbIntegration::QXcbIntegration(QStringList const&, int&, char**) (in /usr/lib64/libQt5XcbQpa.so.5.5.1) ==8176== by 0x402430C: QXcbIntegrationPlugin::create(QString const&, QStringList const&, int&, char**) (in /usr/lib64/qt5/plugins/platforms/libqxcb.so) ==8176== by 0x7FD3E41: QPlatformIntegrationFactory::create(QString const&, QStringList const&, int&, char**, QString const&) (in /usr/lib64/libQt5Gui.so.5.5.1) ==8176== by 0x7FDE4CE: QGuiApplicationPrivate::createPlatformIntegration() (in /usr/lib64/libQt5Gui.so.5.5.1) ==8176== by 0x7FDF4DC: QGuiApplicationPrivate::createEventDispatcher() (in /usr/lib64/libQt5Gui.so.5.5.1) ==8176== by 0x8CB32B3: QCoreApplication::init() (in /usr/lib64/libQt5Core.so.5.5.1) ==8176== ==8176== Invalid read of size 8 ==8176== at 0x45555A: create<KTextEditor::Plugin> (kpluginfactory.h:495) ==8176== by 0x45555A: KatePluginManager::loadPlugin(KatePluginInfo*) (katepluginmanager.cpp:184) ==8176== by 0x455971: KatePluginManager::loadConfig(KConfig*) (katepluginmanager.cpp:123) ==8176== by 0x46C8F9: KateSessionManager::loadSession(QExplicitlySharedDataPointer<KateSession> const&) const (katesessionmanager.cpp:178) ==8176== by 0x46DF1E: KateSessionManager::activateSession(QExplicitlySharedDataPointer<KateSession>, bool, bool) (katesessionmanager.cpp:161) ==8176== by 0x46DFA5: KateSessionManager::activateSession(QString const&, bool, bool) (katesessionmanager.cpp:223) ==8176== by 0x46E03D: KateSessionManager::activateAnonymousSession() (katesessionmanager.cpp:228) ==8176== by 0x46E822: KateSessionManager::chooseSession() (katesessionmanager.cpp:392) ==8176== by 0x442E0F: KateApp::startupKate() (kateapp.cpp:140) ==8176== by 0x44430B: KateApp::init() (kateapp.cpp:92) ==8176== by 0x440B8B: main (main.cpp:435) ==8176== Address 0x0 is not stack'd, malloc'd or (recently) free'd ==8176== ==8176== ==8176== Process terminating with default action of signal 11 (SIGSEGV) ==8176== Access not within mapped region at address 0x0 ==8176== at 0x45555A: create<KTextEditor::Plugin> (kpluginfactory.h:495) ==8176== by 0x45555A: KatePluginManager::loadPlugin(KatePluginInfo*) (katepluginmanager.cpp:184) ==8176== by 0x455971: KatePluginManager::loadConfig(KConfig*) (katepluginmanager.cpp:123) ==8176== by 0x46C8F9: KateSessionManager::loadSession(QExplicitlySharedDataPointer<KateSession> const&) const (katesessionmanager.cpp:178) ==8176== by 0x46DF1E: KateSessionManager::activateSession(QExplicitlySharedDataPointer<KateSession>, bool, bool) (katesessionmanager.cpp:161) ==8176== by 0x46DFA5: KateSessionManager::activateSession(QString const&, bool, bool) (katesessionmanager.cpp:223) ==8176== by 0x46E03D: KateSessionManager::activateAnonymousSession() (katesessionmanager.cpp:228) ==8176== by 0x46E822: KateSessionManager::chooseSession() (katesessionmanager.cpp:392) ==8176== by 0x442E0F: KateApp::startupKate() (kateapp.cpp:140) ==8176== by 0x44430B: KateApp::init() (kateapp.cpp:92) ==8176== by 0x440B8B: main (main.cpp:435) ==8176== If you believe this happened as a result of a stack ==8176== overflow in your program's main thread (unlikely but ==8176== possible), you can try to increase the size of the ==8176== main thread stack using the --main-stacksize= flag. ==8176== The main thread stack size used in this run was 8388608. ==8176== ==8176== HEAP SUMMARY: ==8176== in use at exit: 6,102,950 bytes in 59,966 blocks ==8176== total heap usage: 255,871 allocs, 195,905 frees, 73,728,940 bytes allocated ==8176== ==8176== LEAK SUMMARY: ==8176== definitely lost: 36 bytes in 1 blocks ==8176== indirectly lost: 0 bytes in 0 blocks ==8176== possibly lost: 1,089,052 bytes in 3,898 blocks ==8176== still reachable: 5,013,862 bytes in 56,067 blocks ==8176== of which reachable via heuristic: ==8176== newarray : 5,120 bytes in 23 blocks ==8176== multipleinheritance: 168 bytes in 1 blocks ==8176== suppressed: 0 bytes in 0 blocks ==8176== Rerun with --leak-check=full to see details of leaked memory ==8176== ==8176== For counts of detected and suppressed errors, rerun with: -v ==8176== Use --track-origins=yes to see where uninitialised values come from ==8176== ERROR SUMMARY: 4 errors from 2 contexts (suppressed: 0 from 0) zsh: killed valgrind kate
*** Bug 359685 has been marked as a duplicate of this bug. ***
Possible fix: https://git.reviewboard.kde.org/r/127620/ @Emmanuel: Can you try this fix?
Git commit 78630b2cd063facd50473b5116f773477721dab8 by Dominik Haumann. Committed on 09/04/2016 at 22:00. Pushed by dhaumann into branch 'Applications/16.04'. fix crash when loading plugins that are not properly installed (bug #361517) REVIEW: 127620 M +6 -2 kate/katepluginmanager.cpp M +5 -0 kate/katepluginmanager.h http://commits.kde.org/kate/78630b2cd063facd50473b5116f773477721dab8
Confirmed, it is now fixed for me, thanks
Git commit b260ae7c9de236b320dee28d854caeccd1ff395c by Dominik Haumann. Committed on 09/04/2016 at 22:10. Pushed by dhaumann into branch 'Applications/15.12'. fix crash when loading plugins that are not properly installed (bug #361517) REVIEW: 127620 M +6 -2 kate/katepluginmanager.cpp M +5 -0 kate/katepluginmanager.h http://commits.kde.org/kate/b260ae7c9de236b320dee28d854caeccd1ff395c
Bug fixed here too, thanks guys!