Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 684099 Details for
Bug 902237
[abrt] xscreensaver-gl-extras-5.20-3.fc18: brw_update_renderbuffer_surface: Process /usr/libexec/xscreensaver/antinspect was killed by signal 11 (SIGSEGV)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 25.11 KB, created by
duyulong
on 2013-01-21 08:28:03 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
duyulong
Created:
2013-01-21 08:28:03 UTC
Size:
25.11 KB
patch
obsolete
>[New LWP 3019] >warning: .dynamic section for "/lib/libGLU.so.1" is not at the expected address (wrong library or version mismatch?) >warning: .dynamic section for "/lib/libXt.so.6" is not at the expected address (wrong library or version mismatch?) >warning: .dynamic section for "/lib/libstdc++.so.6" is not at the expected address (wrong library or version mismatch?) >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib/libthread_db.so.1". >Core was generated by `antinspect -root'. >Program terminated with signal 11, Segmentation fault. >#0 brw_update_renderbuffer_surface (brw=0x8bb96e0, rb=0x8da3e48, unit=0) at brw_wm_surface_state.c:1109 >1109 region = irb->mt->region; > >Thread 1 (Thread 0xb7706780 (LWP 3019)): >#0 brw_update_renderbuffer_surface (brw=0x8bb96e0, rb=0x8da3e48, unit=0) at brw_wm_surface_state.c:1109 > intel = 0x8bb96e0 > ctx = 0x8bb96e0 > irb = 0x8da3e48 > mt = 0x0 > region = <optimized out> > surf = <optimized out> > tile_x = 3074565289 > tile_y = 3077582848 > format = 0 > rb_format = MESA_FORMAT_ARGB8888 > __FUNCTION__ = "brw_update_renderbuffer_surface" >#1 0xb768f7b3 in brw_update_renderbuffer_surfaces (brw=0x8bb96e0) at brw_wm_surface_state.c:1205 > intel = 0x8bb96e0 > ctx = 0x8bb96e0 > i = 0 >#2 0xb7678945 in brw_upload_state (brw=brw@entry=0x8bb96e0) at brw_state_upload.c:498 > atom = <optimized out> > ctx = 0x8bb96e0 > intel = 0x8bb96e0 > state = 0x8bceadc > i = 12 > dirty_count = 0 >#3 0xb766498f in brw_try_draw_prims (max_index=2, min_index=0, ib=0x0, nr_prims=1, prim=0x8c2ccf0, arrays=0x8bb96e0, ctx=0x8bb96e0) at brw_draw.c:493 > estimated_max_prim_size = 4096 > brw = 0x8bb96e0 > retval = <optimized out> > i = 0 > intel = 0x8bb96e0 > fail_next = false >#4 brw_draw_prims (ctx=0x8bb96e0, prim=0x8c2ccf0, nr_prims=1, ib=0x0, index_bounds_valid=1 '\001', min_index=0, max_index=2, tfb_vertcount=0x0) at brw_draw.c:589 > arrays = 0x8bb96e0 >#5 0xb73de12c in vbo_exec_vtx_flush (exec=exec@entry=0x8c2c8a4, keepUnmapped=1 '\001') at ../../../src/mesa/vbo/vbo_exec_draw.c:408 > ctx = 0x8bb96e0 >#6 0xb73d2767 in vbo_exec_FlushVertices_internal (exec=0x8c2c8a4, unmap=<optimized out>) at ../../../src/mesa/vbo/vbo_exec_api.c:551 >No locals. >#7 0xb73db66f in vbo_exec_FlushVertices (ctx=0x8bb96e0, flags=1) at ../../../src/mesa/vbo/vbo_exec_api.c:1322 > exec = <optimized out> >#8 0xb7350c7d in _mesa_Rotatef (angle=120, x=0, y=1, z=0) at ../../../src/mesa/main/matrix.c:409 > ctx = 0x8bb96e0 >#9 0x41057f71 in glRotatef (angle=angle@entry=120, x=x@entry=0, y=y@entry=1, z=z@entry=0) at ../../../src/mapi/glapi/glapi_mapi_tmp.h:3511 > _tbl = 0x0 > _func = <optimized out> >#10 0x0804ca04 in draw_antinspect_strip (mi=0x8b964c8) at ../../../hacks/glx/antinspect.c:430 > i = <optimized out> > mp = 0x8bb2008 > j = <optimized out> > mono = 0 > ro = 2 >#11 draw_antinspect (mi=0x8b964c8) at ../../../hacks/glx/antinspect.c:694 > mp = 0x8bb2008 > display = 0x8b9adf0 > window = 71304968 >#12 0x0804e08e in xlockmore_draw (dpy=0x8b9adf0, window=71304968, closure=0x8b964c8) at ../../../hacks/xlockmore.c:497 > mi = 0x8b964c8 > orig_pause = 20000 > this_pause = 0 >#13 0x0804acb1 in run_screenhack_table (ft=0x805b2c0 <antinspect_xscreensaver_function_table>, window2=0, window=71304968, dpy=0x8b9adf0) at ../../hacks/screenhack.c:553 > delay = <optimized out> > delay2 = <optimized out> > closure = 0x8b964c8 > fpst2 = 0x0 > init_cb = <optimized out> > fps_cb = 0x804f560 <xlockmore_gl_compute_fps> > fpst = 0x0 > closure2 = <optimized out> >#14 main (argc=1, argv=0xbf872d64) at ../../hacks/screenhack.c:921 > ft = 0x805b2c0 <antinspect_xscreensaver_function_table> > xgwa = {x = 0, y = 0, width = 1280, height = 1024, border_width = 0, depth = 24, visual = 0x8ba48c8, root = 189, class = 1, bit_gravity = 0, win_gravity = 1, backing_store = 0, backing_planes = 4294967295, backing_pixel = 0, save_under = 0, colormap = 71304967, map_installed = 1, map_state = 2, all_event_masks = 79, your_event_mask = 0, do_not_propagate_mask = 0, override_redirect = 1, screen = 0x8b972a0} > toplevel = 0x8b961b0 > dpy = 0x8b9adf0 > window = 71304968 > window2 = 0 > toplevel2 = <optimized out> > app = <optimized out> > root_p = -1081660596 > on_window = <optimized out> > event = {type = 1281465732, xany = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, window = 3077616280}, xkey = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, window = 3077616280, root = 3077616264, subwindow = 1279950848, time = 0, x = 1281728512, y = 1281729568, x_root = 16, y_root = 2, state = 1280444225, keycode = 16, same_screen = 16}, xbutton = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, window = 3077616280, root = 3077616264, subwindow = 1279950848, time = 0, x = 1281728512, y = 1281729568, x_root = 16, y_root = 2, state = 1280444225, button = 16, same_screen = 16}, xmotion = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, window = 3077616280, root = 3077616264, subwindow = 1279950848, time = 0, x = 1281728512, y = 1281729568, x_root = 16, y_root = 2, state = 1280444225, is_hint = 16 '\020', same_screen = 16}, xcrossing = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, window = 3077616280, root = 3077616264, subwindow = 1279950848, time = 0, x = 1281728512, y = 1281729568, x_root = 16, y_root = 2, mode = 1280444225, detail = 16, same_screen = 16, focus = 2, state = 1280451229}, xfocus = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, window = 3077616280, mode = -1217351032, detail = 1279950848}, xexpose = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, window = 3077616280, x = -1217351032, y = 1279950848, width = 0, height = 1281728512, count = 1281729568}, xgraphicsexpose = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, drawable = 3077616280, x = -1217351032, y = 1279950848, width = 0, height = 1281728512, count = 1281729568, major_code = 16, minor_code = 2}, xnoexpose = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, drawable = 3077616280, major_code = -1217351032, minor_code = 1279950848}, xvisibility = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, window = 3077616280, state = -1217351032}, xcreatewindow = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, parent = 3077616280, window = 3077616264, x = 1279950848, y = 0, width = 1281728512, height = 1281729568, border_width = 16, override_redirect = 2}, xdestroywindow = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, event = 3077616280, window = 3077616264}, xunmap = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, event = 3077616280, window = 3077616264, from_configure = 1279950848}, xmap = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, event = 3077616280, window = 3077616264, override_redirect = 1279950848}, xmaprequest = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, parent = 3077616280, window = 3077616264}, xreparent = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, event = 3077616280, window = 3077616264, parent = 1279950848, x = 0, y = 1281728512, override_redirect = 1281729568}, xconfigure = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, event = 3077616280, window = 3077616264, x = 1279950848, y = 0, width = 1281728512, height = 1281729568, border_width = 16, above = 2, override_redirect = 1280444225}, xgravity = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, event = 3077616280, window = 3077616264, x = 1279950848, y = 0}, xresizerequest = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, window = 3077616280, width = -1217351032, height = 1279950848}, xconfigurerequest = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, parent = 3077616280, window = 3077616264, x = 1279950848, y = 0, width = 1281728512, height = 1281729568, border_width = 16, above = 2, detail = 1280444225, value_mask = 16}, xcirculate = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, event = 3077616280, window = 3077616264, place = 1279950848}, xcirculaterequest = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, parent = 3077616280, window = 3077616264, place = 1279950848}, xproperty = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, window = 3077616280, atom = 3077616264, time = 1279950848, state = 0}, xselectionclear = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, window = 3077616280, selection = 3077616264, time = 1279950848}, xselectionrequest = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, owner = 3077616280, requestor = 3077616264, selection = 1279950848, target = 0, property = 1281728512, time = 1281729568}, xselection = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, requestor = 3077616280, selection = 3077616264, target = 1279950848, property = 0, time = 1281728512}, xcolormap = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, window = 3077616280, colormap = 3077616264, new = 1279950848, state = 0}, xclient = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, window = 3077616280, message_type = 3077616264, format = 1279950848, data = {b = "\000\000\000\000\000\240eL \244eL\020\000\000\000\002\000\000", s = {0, 0, -24576, 19557, -23520, 19557, 16, 0, 2, 0}, l = {0, 1281728512, 1281729568, 16, 2}}}, xmapping = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, window = 3077616280, request = -1217351032, first_keycode = 1279950848, count = 0}, xerror = {type = 1281465732, display = 0x0, resourceid = 0, serial = 0, error_code = 152 '\230', request_code = 178 '\262', minor_code = 112 'p'}, xkeymap = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, window = 3077616280, key_vector = "\210\262p\267\000\200JL\000\000\000\000\000\240eL \244eL\020\000\000\000\002\000\000\000A\aRL"}, xgeneric = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, extension = -1217351016, evtype = -1217351032}, xcookie = {type = 1281465732, serial = 0, send_event = 0, display = 0x0, extension = -1217351016, evtype = -1217351032, cookie = 1279950848, data = 0x0}, pad = {1281465732, 0, 0, 0, -1217351016, -1217351032, 1279950848, 0, 1281728512, 1281729568, 16, 2, 1280444225, 16, 16, 2, 1280451229, 1281728512, 1282831564, 16, 1280444554, 16, 1280464689, 0}} > dont_clear = -56 '\310' > version = "AntInspect: from the XScreenSaver 5.20-3.fc18 distribution (30-Oct-2012.)\000\000\000\020\000\000 \020", '\000' <repeats 19 times>, "\020\000\000\000\020", '\000' <repeats 59 times>, "\020\000\000\377", '\000' <repeats 29 times>, "wL\001\000\000\000l\376vL\363\237ML\036\000\000\000l\337\270L\002\000\000\000a\234\004\b\304\243eLf\241ML\000\260\005\b\222k\005\b\002\000\000\000d-\207\277p-\207\277" >From To Syms Read Shared Object Library >0x410204e0 0x4106b934 Yes /lib/libGL.so.1 >0x410a1000 0x41106eb4 Yes /lib/libGLU.so.1 >0x4cd69b90 0x4cd6c710 Yes /lib/libXxf86vm.so.1 >0x4c6646b0 0x4c66feb0 Yes /lib/libpthread.so.0 >0x4f4594a0 0x4f45dce4 Yes /lib/libSM.so.6 >0x4f470630 0x4f47e714 Yes /lib/libICE.so.6 >0x4efabbc0 0x4efe9764 Yes /lib/libXt.so.6 >0x4cbce410 0x4cc5d944 Yes /lib/libX11.so.6 >0x4c6886e0 0x4c6973c4 Yes /lib/libXmu.so.6 >0x4cd43880 0x4cd4e174 Yes /lib/libXext.so.6 >0x4c6ab460 0x4c6d45bc Yes /lib/libm.so.6 >0x4c4bf0b0 0x4c602fbc Yes /lib/libc.so.6 >0x4d078820 0x4d08df40 Yes /lib/libglapi.so.0 >0x4e731850 0x4e732214 Yes /lib/libXdamage.so.1 >0x4d0aaf70 0x4d0ad40c Yes /lib/libXfixes.so.3 >0x4d04f430 0x4d04f584 Yes /lib/libX11-xcb.so.1 >0x4e3790f0 0x4e3828e4 Yes /lib/libxcb-glx.so.0 >0x4cb97f70 0x4cba8514 Yes /lib/libxcb.so.1 >0x41091680 0x41097784 Yes /lib/libdrm.so.2 >0x4c67cad0 0x4c67dafc Yes /lib/libdl.so.2 >0x4c7539f0 0x4c766ac4 Yes /lib/libselinux.so.1 >0x4caeaf60 0x4cb5d1b4 Yes /lib/libstdc++.so.6 >0x4c791040 0x4c7a7c24 Yes /lib/libgcc_s.so.1 >0x4c485850 0x4c49df7c Yes /lib/ld-linux.so.2 >0x4e797f20 0x4e799b14 Yes /lib/libuuid.so.1 >0x4cbb4a60 0x4cbb5954 Yes /lib/libXau.so.6 >0x41001920 0x4100543c Yes /lib/librt.so.1 >0x4c6ea4a0 0x4c733d74 Yes /lib/libpcre.so.1 >0xb7646050 0xb76e0d34 Yes /usr/lib/dri/i965_dri.so >0xb72d89e0 0xb74f96a4 Yes /lib/libdricore9.0.1.so.1 >0x4cdbe1b0 0x4cdd7434 Yes /lib/libexpat.so.1 >0xb727c090 0xb72916c4 Yes /lib/libdrm_intel.so.1 >0x4c77e980 0x4c783ee4 Yes /lib/libpciaccess.so.0 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >eax 0x0 0 >ecx 0xbf872708 -1081661688 >edx 0xbf87270c -1081661684 >ebx 0xb7703000 -1217384448 >esp 0xbf8726a0 0xbf8726a0 >ebp 0x8da3e48 0x8da3e48 >esi 0x0 0 >edi 0x8bb96e0 146511584 >eip 0xb768fe54 0xb768fe54 <brw_update_renderbuffer_surface+116> >eflags 0x10246 [ PF ZF IF RF ] >cs 0x73 115 >ss 0x7b 123 >ds 0x7b 123 >es 0x7b 123 >fs 0x0 0 >gs 0x33 51 >Dump of assembler code for function brw_update_renderbuffer_surface: > 0xb768fde0 <+0>: push %ebp > 0xb768fde1 <+1>: push %edi > 0xb768fde2 <+2>: push %esi > 0xb768fde3 <+3>: push %ebx > 0xb768fde4 <+4>: call 0xb7646940 <__x86.get_pc_thunk.bx> > 0xb768fde9 <+9>: add $0x73217,%ebx > 0xb768fdef <+15>: lea -0x8c(%esp),%esp > 0xb768fdf6 <+22>: mov 0xa4(%esp),%eax > 0xb768fdfd <+29>: mov 0xa0(%esp),%edi > 0xb768fe04 <+36>: test %eax,%eax > 0xb768fe06 <+38>: je 0xb768fe1c <brw_update_renderbuffer_surface+60> > 0xb768fe08 <+40>: mov 0xa4(%esp),%edx > 0xb768fe0f <+47>: cmpl $0x12345678,0x18(%edx) > 0xb768fe16 <+54>: je 0xb76900a0 <brw_update_renderbuffer_surface+704> > 0xb768fe1c <+60>: xor %ebp,%ebp > 0xb768fe1e <+62>: mov 0x5c(%ebp),%eax > 0xb768fe21 <+65>: mov 0x54(%ebp),%ecx > 0xb768fe24 <+68>: mov 0x38(%ebp),%edx > 0xb768fe27 <+71>: test %eax,%eax > 0xb768fe29 <+73>: mov %ecx,0x50(%esp) > 0xb768fe2d <+77>: mov %edx,0x4c(%esp) > 0xb768fe31 <+81>: je 0xb768fe40 <brw_update_renderbuffer_surface+96> > 0xb768fe33 <+83>: cmpb $0x0,0x153f5(%edi) > 0xb768fe3a <+90>: je 0xb76900b8 <brw_update_renderbuffer_surface+728> > 0xb768fe40 <+96>: lea 0x6c(%esp),%edx > 0xb768fe44 <+100>: lea 0x68(%esp),%ecx > 0xb768fe48 <+104>: mov 0x50(%esp),%eax > 0xb768fe4c <+108>: mov %edx,0x5c(%esp) > 0xb768fe50 <+112>: mov %ecx,0x58(%esp) >=> 0xb768fe54 <+116>: mov 0x1b4(%eax),%eax > 0xb768fe5a <+122>: movl $0x20,0xc(%esp) > 0xb768fe62 <+130>: mov %eax,0x48(%esp) > 0xb768fe66 <+134>: mov 0xa8(%esp),%eax > 0xb768fe6d <+141>: add $0x57a0,%eax > 0xb768fe72 <+146>: movl $0x18,0x8(%esp) > 0xb768fe7a <+154>: mov %eax,0x54(%esp) > 0xb768fe7e <+158>: movl $0xf000200,0x4(%esp) > 0xb768fe86 <+166>: mov %edi,(%esp) > 0xb768fe89 <+169>: lea 0x10(%edi,%eax,4),%eax > 0xb768fe8d <+173>: mov %eax,0x10(%esp) > 0xb768fe91 <+177>: call 0xb7675f50 <brw_state_batch> > 0xb768fe96 <+182>: cmpl $0x30,0x4c(%esp) > 0xb768fe9b <+187>: mov %eax,%esi > 0xb768fe9d <+189>: je 0xb7690060 <brw_update_renderbuffer_surface+640> > 0xb768fea3 <+195>: mov 0x4c(%esp),%ecx > 0xb768fea7 <+199>: cmpb $0x0,0x16200(%edi,%ecx,1) > 0xb768feaf <+207>: mov 0x15f84(%edi,%ecx,4),%edx > 0xb768feb6 <+214>: je 0xb76901b2 <brw_update_renderbuffer_surface+978> > 0xb768febc <+220>: shl $0x12,%edx > 0xb768febf <+223>: or $0x20000000,%edx > 0xb768fec5 <+229>: mov %edx,(%esi) > 0xb768fec7 <+231>: mov 0x58(%esp),%ecx > 0xb768fecb <+235>: mov 0x5c(%esp),%edx > 0xb768fecf <+239>: mov %ecx,0x4(%esp) > 0xb768fed3 <+243>: mov %edx,0x8(%esp) > 0xb768fed7 <+247>: mov %ebp,(%esp) > 0xb768feda <+250>: call 0xb764dfc0 <intel_renderbuffer_tile_offsets> > 0xb768fedf <+255>: mov 0x48(%esp),%ebp > 0xb768fee3 <+259>: mov 0x0(%ebp),%edx > 0xb768fee6 <+262>: mov 0xa4(%esp),%ebp > 0xb768feed <+269>: add 0x8(%edx),%eax > 0xb768fef0 <+272>: mov 0xa4(%esp),%edx > 0xb768fef7 <+279>: mov %eax,0x4(%esi) > 0xb768fefa <+282>: mov 0x24(%ebp),%ecx > 0xb768fefd <+285>: sub $0x1,%ecx > 0xb768ff00 <+288>: shl $0x6,%ecx > 0xb768ff03 <+291>: mov 0x28(%edx),%edx > 0xb768ff06 <+294>: mov %edx,0x44(%esp) > 0xb768ff0a <+298>: sub $0x1,%edx > 0xb768ff0d <+301>: shl $0x13,%edx > 0xb768ff10 <+304>: or %ecx,%edx > 0xb768ff12 <+306>: xor %ecx,%ecx > 0xb768ff14 <+308>: mov %edx,0x8(%esi) > 0xb768ff17 <+311>: mov 0x48(%esp),%edx > 0xb768ff1b <+315>: mov 0x20(%edx),%edx > 0xb768ff1e <+318>: mov %edx,0x40(%esp) > 0xb768ff22 <+322>: sub $0x1,%edx > 0xb768ff25 <+325>: cmp $0x1,%edx > 0xb768ff28 <+328>: jbe 0xb76900a8 <brw_update_renderbuffer_surface+712> > 0xb768ff2e <+334>: mov 0x48(%esp),%ebp > 0xb768ff32 <+338>: mov 0x8(%ebp),%edx > 0xb768ff35 <+341>: imul 0x14(%ebp),%edx > 0xb768ff39 <+345>: mov $0xfffffff8,%ebp > 0xb768ff3e <+350>: shl $0x3,%edx > 0xb768ff41 <+353>: add %ebp,%edx > 0xb768ff43 <+355>: mov 0x50(%esp),%ebp > 0xb768ff47 <+359>: or %ecx,%edx > 0xb768ff49 <+361>: mov 0x68(%esp),%ecx > 0xb768ff4d <+365>: mov %edx,0xc(%esi) > 0xb768ff50 <+368>: mov 0x50(%esp),%edx > 0xb768ff54 <+372>: cmpl $0x2,0x28(%edx) > 0xb768ff58 <+376>: sbb %edx,%edx > 0xb768ff5a <+378>: shr $0x2,%ecx > 0xb768ff5d <+381>: not %edx > 0xb768ff5f <+383>: shl $0x19,%ecx > 0xb768ff62 <+386>: and $0x20,%edx > 0xb768ff65 <+389>: mov %edx,0x10(%esi) > 0xb768ff68 <+392>: mov 0x6c(%esp),%edx > 0xb768ff6c <+396>: shr %edx > 0xb768ff6e <+398>: shl $0x14,%edx > 0xb768ff71 <+401>: or %ecx,%edx > 0xb768ff73 <+403>: cmpl $0x4,0xc(%ebp) > 0xb768ff77 <+407>: mov $0x1000000,%ecx > 0xb768ff7c <+412>: mov $0x0,%ebp > 0xb768ff81 <+417>: cmovne %ebp,%ecx > 0xb768ff84 <+420>: or %ecx,%edx > 0xb768ff86 <+422>: mov %edx,0x14(%esi) > 0xb768ff89 <+425>: cmpl $0x5,0xc168(%edi) > 0xb768ff90 <+432>: jg 0xb7690010 <brw_update_renderbuffer_surface+560> > 0xb768ff92 <+434>: cmpb $0x0,0xf9d(%edi) > 0xb768ff99 <+441>: jne 0xb768ffb8 <brw_update_renderbuffer_surface+472> > 0xb768ff9b <+443>: movzbl 0xa8(%esp),%ecx > 0xb768ffa3 <+451>: mov $0x1,%edx > 0xb768ffa8 <+456>: shl %cl,%edx > 0xb768ffaa <+458>: test %edx,0xe90(%edi) > 0xb768ffb0 <+464>: je 0xb768ffb8 <brw_update_renderbuffer_surface+472> > 0xb768ffb2 <+466>: orl $0x2000,(%esi) > 0xb768ffb8 <+472>: mov 0xa8(%esp),%ecx > 0xb768ffbf <+479>: cmpb $0x0,0xe40(%edi,%ecx,4) > 0xb768ffc7 <+487>: jne 0xb768ffcf <brw_update_renderbuffer_surface+495> > 0xb768ffc9 <+489>: orl $0x10000,(%esi) > 0xb768ffcf <+495>: mov 0xa8(%esp),%ecx > 0xb768ffd6 <+502>: cmpb $0x0,0xe41(%edi,%ecx,4) > 0xb768ffde <+510>: jne 0xb768ffe6 <brw_update_renderbuffer_surface+518> > 0xb768ffe0 <+512>: orl $0x8000,(%esi) > 0xb768ffe6 <+518>: mov 0xa8(%esp),%ecx > 0xb768ffed <+525>: cmpb $0x0,0xe42(%edi,%ecx,4) > 0xb768fff5 <+533>: jne 0xb768fffd <brw_update_renderbuffer_surface+541> > 0xb768fff7 <+535>: orl $0x4000,(%esi) > 0xb768fffd <+541>: mov 0xc0(%edi),%edx > 0xb7690003 <+547>: mov 0x40(%edx),%edx > 0xb7690006 <+550>: test %edx,%edx > 0xb7690008 <+552>: jne 0xb7690080 <brw_update_renderbuffer_surface+672> > 0xb769000a <+554>: orl $0x20000,(%esi) > 0xb7690010 <+560>: mov 0x48(%esp),%ebp > 0xb7690014 <+564>: mov 0x0(%ebp),%edx > 0xb7690017 <+567>: movl $0x2,0x14(%esp) > 0xb769001f <+575>: movl $0x2,0x10(%esp) > 0xb7690027 <+583>: sub 0x8(%edx),%eax > 0xb769002a <+586>: mov %edx,0x8(%esp) > 0xb769002e <+590>: mov 0x54(%esp),%edx > 0xb7690032 <+594>: mov %eax,0xc(%esp) > 0xb7690036 <+598>: mov 0x10(%edi,%edx,4),%eax > 0xb769003a <+602>: add $0x4,%eax > 0xb769003d <+605>: mov %eax,0x4(%esp) > 0xb7690041 <+609>: mov 0xc184(%edi),%eax > 0xb7690047 <+615>: mov %eax,(%esp) > 0xb769004a <+618>: call 0xb76454e0 <drm_intel_bo_emit_reloc@plt> > 0xb769004f <+623>: lea 0x8c(%esp),%esp > 0xb7690056 <+630>: pop %ebx > 0xb7690057 <+631>: pop %esi > 0xb7690058 <+632>: pop %edi > 0xb7690059 <+633>: pop %ebp > 0xb769005a <+634>: ret > 0xb769005b <+635>: nop > 0xb769005c <+636>: lea 0x0(%esi,%eiz,1),%esi > 0xb7690060 <+640>: cmpb $0x1,0xfad(%edi) > 0xb7690067 <+647>: sbb %edx,%edx > 0xb7690069 <+649>: and $0xfffc0000,%edx > 0xb769006f <+655>: add $0x23040000,%edx > 0xb7690075 <+661>: jmp 0xb768fec5 <brw_update_renderbuffer_surface+229> > 0xb769007a <+666>: lea 0x0(%esi),%esi > 0xb7690080 <+672>: mov 0xa8(%esp),%ecx > 0xb7690087 <+679>: cmpb $0x0,0xe43(%edi,%ecx,4) > 0xb769008f <+687>: jne 0xb7690010 <brw_update_renderbuffer_surface+560> > 0xb7690095 <+693>: orl $0x20000,(%esi) > 0xb769009b <+699>: jmp 0xb7690010 <brw_update_renderbuffer_surface+560> > 0xb76900a0 <+704>: lea (%edx),%ebp > 0xb76900a2 <+706>: jmp 0xb768fe1e <brw_update_renderbuffer_surface+62> > 0xb76900a7 <+711>: nop > 0xb76900a8 <+712>: mov -0x15b84(%ebx,%edx,4),%ecx > 0xb76900af <+719>: jmp 0xb768ff2e <brw_update_renderbuffer_surface+334> > 0xb76900b4 <+724>: lea 0x0(%esi,%eiz,1),%esi > 0xb76900b8 <+728>: lea 0x6c(%esp),%ecx > 0xb76900bc <+732>: lea 0x68(%esp),%edx > 0xb76900c0 <+736>: mov %ecx,0x8(%esp) > 0xb76900c4 <+740>: mov %edx,0x4(%esp) > 0xb76900c8 <+744>: mov %ebp,(%esp) > 0xb76900cb <+747>: mov %ecx,0x5c(%esp) > 0xb76900cf <+751>: mov %edx,0x58(%esp) > 0xb76900d3 <+755>: call 0xb764dfc0 <intel_renderbuffer_tile_offsets> > 0xb76900d8 <+760>: mov 0x68(%esp),%eax > 0xb76900dc <+764>: test %eax,%eax > 0xb76900de <+766>: jne 0xb76900f0 <brw_update_renderbuffer_surface+784> > 0xb76900e0 <+768>: mov 0x6c(%esp),%eax > 0xb76900e4 <+772>: test %eax,%eax > 0xb76900e6 <+774>: jne 0xb76900f0 <brw_update_renderbuffer_surface+784> > 0xb76900e8 <+776>: mov 0x54(%ebp),%eax > 0xb76900eb <+779>: jmp 0xb768fe54 <brw_update_renderbuffer_surface+116> > 0xb76900f0 <+784>: mov 0x5c(%ebp),%esi > 0xb76900f3 <+787>: lea 0x7c(%esp),%eax > 0xb76900f7 <+791>: mov %esi,(%esp) > 0xb76900fa <+794>: mov %eax,0xc(%esp) > 0xb76900fe <+798>: lea 0x78(%esp),%eax > 0xb7690102 <+802>: mov %eax,0x8(%esp) > 0xb7690106 <+806>: lea 0x74(%esp),%eax > 0xb769010a <+810>: mov %eax,0x4(%esp) > 0xb769010e <+814>: call 0xb764f480 <intel_miptree_get_dimensions_for_image> > 0xb7690113 <+819>: mov 0x7c(%esp),%edx > 0xb7690117 <+823>: mov 0x3c(%esi),%eax > 0xb769011a <+826>: mov %edx,0x1c(%esp) > 0xb769011e <+830>: mov 0x78(%esp),%edx > 0xb7690122 <+834>: mov %edx,0x18(%esp) > 0xb7690126 <+838>: mov 0x74(%esp),%edx > 0xb769012a <+842>: mov %edx,0x14(%esp) > 0xb769012e <+846>: movl $0x0,0x28(%esp) > 0xb7690136 <+854>: movl $0x0,0x24(%esp) > 0xb769013e <+862>: movl $0x1,0x20(%esp) > 0xb7690146 <+870>: mov %eax,0x10(%esp) > 0xb769014a <+874>: mov %eax,0xc(%esp) > 0xb769014e <+878>: mov 0x8(%esi),%eax > 0xb7690151 <+881>: mov %eax,0x8(%esp) > 0xb7690155 <+885>: mov 0x5c(%ebp),%eax > 0xb7690158 <+888>: mov 0x38(%eax),%eax > 0xb769015b <+891>: mov 0x20(%eax),%eax > 0xb769015e <+894>: mov %edi,(%esp) > 0xb7690161 <+897>: mov %eax,0x4(%esp) > 0xb7690165 <+901>: call 0xb764f1e0 <intel_miptree_create> > 0xb769016a <+906>: mov %eax,0x8(%esp) > 0xb769016e <+910>: mov %esi,0x4(%esp) > 0xb7690172 <+914>: mov %edi,(%esp) > 0xb7690175 <+917>: mov %eax,0x70(%esp) > 0xb7690179 <+921>: call 0xb764f790 <intel_miptree_copy_teximage> > 0xb769017e <+926>: mov 0x68(%esi),%eax > 0xb7690181 <+929>: mov %eax,0x4(%esp) > 0xb7690185 <+933>: lea 0x54(%ebp),%eax > 0xb7690188 <+936>: mov %eax,(%esp) > 0xb769018b <+939>: call 0xb764ee10 <intel_miptree_reference> > 0xb7690190 <+944>: mov %ebp,(%esp) > 0xb7690193 <+947>: call 0xb764dcc0 <intel_renderbuffer_set_draw_offset> > 0xb7690198 <+952>: lea 0x70(%esp),%eax > 0xb769019c <+956>: mov %eax,(%esp) > 0xb769019f <+959>: call 0xb764ecc0 <intel_miptree_release> > 0xb76901a4 <+964>: mov 0x54(%ebp),%ecx > 0xb76901a7 <+967>: mov %ecx,0x50(%esp) > 0xb76901ab <+971>: lea (%ecx),%eax > 0xb76901ad <+973>: jmp 0xb768fe54 <brw_update_renderbuffer_surface+116> > 0xb76901b2 <+978>: mov 0x4c(%esp),%ecx > 0xb76901b6 <+982>: mov %edx,0x3c(%esp) > 0xb76901ba <+986>: mov %ecx,(%esp) > 0xb76901bd <+989>: call 0xb7645370 <_mesa_get_format_name@plt> > 0xb76901c2 <+994>: mov %eax,0xc(%esp) > 0xb76901c6 <+998>: mov %edi,(%esp) > 0xb76901c9 <+1001>: lea -0x15b60(%ebx),%eax > 0xb76901cf <+1007>: mov %eax,0x8(%esp) > 0xb76901d3 <+1011>: lea -0x19f64(%ebx),%eax > 0xb76901d9 <+1017>: mov %eax,0x4(%esp) > 0xb76901dd <+1021>: call 0xb7645f50 <_mesa_problem@plt> > 0xb76901e2 <+1026>: mov 0x3c(%esp),%edx > 0xb76901e6 <+1030>: jmp 0xb768febc <brw_update_renderbuffer_surface+220> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 902237
: 684099 |
684100
|
684101
|
684102
|
684103
|
684104
|
684105
|
684106
|
684107
|
684108