Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

/usr/bin/mercury-browser: line 69: 35076 Segmentation fault (core dumped) /usr/lib/mercury/mercury $MERCURY_USER_FLAGS $@ #171

Open
mytricker0 opened this issue Apr 5, 2024 · 2 comments

Comments

@mytricker0
Copy link

mytricker0 commented Apr 5, 2024

/usr/bin/mercury-browser: line 69: 35076 Segmentation fault (core dumped) /usr/lib/mercury/mercury $MERCURY_USER_FLAGS $@

the browser opens and crashes right avay. I tried to deactivate all my extensions but it still crashes

@Alex313031
Copy link
Owner

@mytricker0 Are you using the right version for your CPU?

@mytricker0
Copy link
Author

I'm back again as this problem was solved for some time then reapered:
I installed the SSE4 version:
here is the output of lscpu

─░▒▓ ∅ ~/Desktop/Ovi/client                INT ✘  4m 2s  15:35:26 ▓▒░
╰─ lscpu
Architecture:            x86_64
  CPU op-mode(s):        32-bit, 64-bit
  Address sizes:         48 bits physical, 48 bits virtual
  Byte Order:            Little Endian
CPU(s):                  16
  On-line CPU(s) list:   0-15
Vendor ID:               AuthenticAMD
  Model name:            AMD Ryzen 7 5700X 8-Core Processor
    CPU family:          25
    Model:               33
    Thread(s) per core:  2
    Core(s) per socket:  8
    Socket(s):           1
    Stepping:            2
    Frequency boost:     disabled
    CPU max MHz:         4935,9370
    CPU min MHz:         2200,0000
    BogoMIPS:            7200.25
    Flags:               fpu vme de pse tsc msr pae mce cx8 apic sep mtrr p
                         ge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht
                          syscall nx mmxext fxsr_opt pdpe1gb rdtscp lm cons
                         tant_tsc rep_good nopl nonstop_tsc cpuid extd_apic
                         id aperfmperf rapl pni pclmulqdq monitor ssse3 fma
                          cx16 sse4_1 sse4_2 x2apic movbe popcnt aes xsave 
                         avx f16c rdrand lahf_lm cmp_legacy svm extapic cr8
                         _legacy abm sse4a misalignsse 3dnowprefetch osvw i
                         bs skinit wdt tce topoext perfctr_core perfctr_nb 
                         bpext perfctr_llc mwaitx cpb cat_l3 cdp_l3 hw_psta
                         te ssbd mba ibrs ibpb stibp vmmcall fsgsbase bmi1 
                         avx2 smep bmi2 erms invpcid cqm rdt_a rdseed adx s
                         map clflushopt clwb sha_ni xsaveopt xsavec xgetbv1
                          xsaves cqm_llc cqm_occup_llc cqm_mbm_total cqm_mb
                         m_local clzero irperf xsaveerptr rdpru wbnoinvd ar
                         at npt lbrv svm_lock nrip_save tsc_scale vmcb_clea
                         n flushbyasid decodeassists pausefilter pfthreshol
                         d avic v_vmsave_vmload vgif v_spec_ctrl umip pku o
                         spke vaes vpclmulqdq rdpid overflow_recov succor s
                         mca fsrm
Virtualization features: 
  Virtualization:        AMD-V
Caches (sum of all):     
  L1d:                   256 KiB (8 instances)
  L1i:                   256 KiB (8 instances)
  L2:                    4 MiB (8 instances)
  L3:                    32 MiB (1 instance)
NUMA:                    
  NUMA node(s):          1
  NUMA node0 CPU(s):     0-15
Vulnerabilities:         
  Gather data sampling:  Not affected
  Itlb multihit:         Not affected
  L1tf:                  Not affected
  Mds:                   Not affected
  Meltdown:              Not affected
  Mmio stale data:       Not affected
  Retbleed:              Not affected
  Spec rstack overflow:  Vulnerable: Safe RET, no microcode
  Spec store bypass:     Mitigation; Speculative Store Bypass disabled via 
                         prctl
  Spectre v1:            Mitigation; usercopy/swapgs barriers and __user po
                         inter sanitization
  Spectre v2:            Mitigation; Retpolines; IBPB conditional; IBRS_FW;
                          STIBP always-on; RSB filling; PBRSB-eIBRS Not aff
                         ected; BHI Not affected
  Srbds:                 Not affected
  Tsx async abort:       Not affected

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants