Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 616974 Details for
Bug 680498
[abrt] mesa-demos-7.10-4.20101028.fc15: CreateProgram: Process /usr/lib64/mesa/multitex was killed by signal 6 (SIGABRT)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 6.90 KB, created by
monts
on 2012-09-25 11:17:35 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
monts
Created:
2012-09-25 11:17:35 UTC
Size:
6.90 KB
patch
obsolete
>[New LWP 6345] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `./multitex'. >Program terminated with signal 6, Aborted. >#0 0x0000003360635925 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:64 >64 return INLINE_SYSCALL (tgkill, 3, pid, selftid, sig); > >Thread 1 (Thread 0x7f6f35e8f800 (LWP 6345)): >#0 0x0000003360635925 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:64 > resultvar = 0 > pid = 6345 > selftid = 6345 >#1 0x00000033606370d8 in __GI_abort () at abort.c:91 > save_stage = 2 > act = {__sigaction_handler = {sa_handler = 0x7fffc99d6db5, sa_sigaction = 0x7fffc99d6db5}, sa_mask = {__val = {220661766701, 4211395, 326, 1, 220660433121, 1, 206158430240, 11972462704, 4, 140736575915872, 0, 0, 0, 220661766507, 140115603152896, 220661776776}}, sa_flags = 4211406, sa_restorer = 0x4044b0 <__PRETTY_FUNCTION__.17521>} > sigs = {__val = {32, 0 <repeats 15 times>}} >#2 0x000000336062e6a2 in __assert_fail_base (fmt=0x3360778188 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n", assertion=assertion@entry=0x4042ce "vertShader", file=file@entry=0x4042c3 "multitex.c", line=line@entry=326, function=function@entry=0x4044b0 "CreateProgram") at assert.c:94 > str = 0xedfcc0 "" > total = 4096 >#3 0x000000336062e752 in __GI___assert_fail (assertion=assertion@entry=0x4042ce "vertShader", file=file@entry=0x4042c3 "multitex.c", line=line@entry=326, function=function@entry=0x4044b0 "CreateProgram") at assert.c:103 >No locals. >#4 0x00000000004023e6 in CreateProgram (fragProgFile=0x4042b5 "multitex.frag", vertProgFile=0x4042a7 "multitex.vert", uniforms=<optimized out>) at multitex.c:326 > vertShader = 0 > fragShader = <optimized out> > program = <optimized out> > uniforms = 0x606220 >#5 InitPrograms () at multitex.c:365 >No locals. >#6 InitGL () at multitex.c:384 >No locals. >#7 main (argc=1, argv=<optimized out>) at multitex.c:409 >No locals. >From To Syms Read Shared Object Library > No /usr/lib64/libXft-infinality/libXft.so.2 > No /usr/lib64/freetype-infinality/libfreetype.so.6 >0x0000003001417940 0x000000300142887c Yes /lib64/libglut.so.3 >0x0000003001034400 0x0000003001062c08 Yes /lib64/libGLEW.so.1.6 >0x0000003000c04880 0x0000003000c57018 Yes /lib64/libGLU.so.1 >0x000000300081ade0 0x0000003000861bb0 Yes /lib64/libGL.so.1 >0x0000003360e055f0 0x0000003360e6ca4c Yes /lib64/libm.so.6 >0x000000336061ef60 0x000000336075f780 Yes /lib64/libc.so.6 >0x000000336a205ef0 0x000000336a21f6fc Yes /lib64/libfontconfig.so.1 >0x0000003368601a70 0x00000033686079e0 Yes /lib64/libXrender.so.1 >0x0000003362e1dea0 0x0000003362ea4260 Yes /lib64/libX11.so.6 >0x0000003363603700 0x000000336360d7d0 Yes /lib64/libXext.so.6 >0x0000003364602130 0x000000336460bfb4 Yes /lib64/libXi.so.6 >0x0000003365600f60 0x00000033656039ac Yes /lib64/libXxf86vm.so.1 >0x000000300045bb50 0x00000030004c105b Yes (*) /lib64/libstdc++.so.6 >0x00000030000029d0 0x0000003000012138 Yes (*) /lib64/libgcc_s.so.1 >0x0000003964c0e8c0 0x0000003964c22058 Yes /lib64/libglapi.so.0 >0x0000003365a00b90 0x0000003365a0159c Yes /lib64/libXdamage.so.1 >0x0000003363e014f0 0x0000003363e03cf8 Yes /lib64/libXfixes.so.3 >0x00000033662005c0 0x00000033662006dc Yes /lib64/libX11-xcb.so.1 >0x0000003366e09f70 0x0000003366e101b8 Yes /lib64/libxcb-glx.so.0 >0x0000003362a099c0 0x0000003362a15878 Yes /lib64/libxcb.so.1 >0x0000003365e03130 0x0000003365e07f04 Yes /lib64/libdrm.so.2 >0x0000003360a05790 0x0000003360a10494 Yes /lib64/libpthread.so.0 >0x0000003361200ea0 0x00000033612019e0 Yes /lib64/libdl.so.2 >0x0000003360200b20 0x000000336021a319 Yes /lib64/ld-linux-x86-64.so.2 >0x0000003367203dd0 0x000000336721cccc Yes /lib64/libexpat.so.1 >0x0000003361e05fc0 0x0000003361e16768 Yes /lib64/libselinux.so.1 >0x0000003363200e80 0x0000003363201bb0 Yes /lib64/libXau.so.6 >0x0000003361602260 0x000000336160554c Yes /lib64/librt.so.1 >0x00007f6f358f6870 0x00007f6f35b2d3ac Yes /usr/lib64/dri/i915_dri.so >0x00007f6f356adc40 0x00007f6f356bfdf8 Yes /lib64/libdrm_intel.so.1 >0x0000003361a02320 0x0000003361a06520 Yes /usr/lib64/libpciaccess.so.0 >(*): Shared library is missing debugging information. >$1 = 0x7f6f34c0e000 "" >No symbol "__glib_assert_msg" in current context. >rax 0x0 0 >rbx 0x7f6f34c0e000 140115603152896 >rcx 0xffffffffffffffff -1 >rdx 0x6 6 >rsi 0x18c9 6345 >rdi 0x18c9 6345 >rbp 0x3360778188 0x3360778188 >rsp 0x7fffc99d46c8 0x7fffc99d46c8 >r8 0xfefefefefefefeff -72340172838076673 >r9 0xfefefefeffecfbff -72340172822479873 >r10 0x8 8 >r11 0x206 518 >r12 0x4042ce 4211406 >r13 0x4044b0 4211888 >r14 0x0 0 >r15 0x0 0 >rip 0x3360635925 0x3360635925 <__GI_raise+53> >eflags 0x206 [ PF IF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >Dump of assembler code for function __GI_raise: > 0x00000033606358f0 <+0>: mov %fs:0x2d4,%eax > 0x00000033606358f8 <+8>: mov %fs:0x2d0,%esi > 0x0000003360635900 <+16>: test %esi,%esi > 0x0000003360635902 <+18>: jne 0x3360635930 <__GI_raise+64> > 0x0000003360635904 <+20>: mov $0xba,%eax > 0x0000003360635909 <+25>: syscall > 0x000000336063590b <+27>: mov %eax,%esi > 0x000000336063590d <+29>: mov %eax,%fs:0x2d0 > 0x0000003360635915 <+37>: movslq %edi,%rdx > 0x0000003360635918 <+40>: movslq %esi,%rsi > 0x000000336063591b <+43>: movslq %eax,%rdi > 0x000000336063591e <+46>: mov $0xea,%eax > 0x0000003360635923 <+51>: syscall >=> 0x0000003360635925 <+53>: cmp $0xfffffffffffff000,%rax > 0x000000336063592b <+59>: ja 0x336063593f <__GI_raise+79> > 0x000000336063592d <+61>: repz retq > 0x000000336063592f <+63>: nop > 0x0000003360635930 <+64>: test %eax,%eax > 0x0000003360635932 <+66>: jg 0x3360635915 <__GI_raise+37> > 0x0000003360635934 <+68>: test $0x7fffffff,%eax > 0x0000003360635939 <+73>: je 0x3360635950 <__GI_raise+96> > 0x000000336063593b <+75>: neg %eax > 0x000000336063593d <+77>: jmp 0x3360635915 <__GI_raise+37> > 0x000000336063593f <+79>: mov 0x37a4ea(%rip),%rdx # 0x33609afe30 > 0x0000003360635946 <+86>: neg %eax > 0x0000003360635948 <+88>: mov %eax,%fs:(%rdx) > 0x000000336063594b <+91>: or $0xffffffffffffffff,%rax > 0x000000336063594f <+95>: retq > 0x0000003360635950 <+96>: mov %esi,%eax > 0x0000003360635952 <+98>: jmp 0x3360635915 <__GI_raise+37> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 680498
:
481052
| 616974