Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Attachment 692883 Details for
Bug 907555
[abrt] synergy-1.4.10-1: count_bits: Process /usr/bin/synergys was killed by signal 11 (SIGSEGV)
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh92 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 43.04 KB, created by
GS
on 2013-02-04 17:24:53 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
GS
Created:
2013-02-04 17:24:53 UTC
Size:
43.04 KB
patch
obsolete
>[New LWP 4924] >[New LWP 4926] >[New LWP 4925] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `/usr/bin/synergys -f --no-tray --debug NOTE --name GSTROSNIDER-DESKTOP -c /tmp/'. >Program terminated with signal 11, Segmentation fault. >#0 count_bits (ptr=<optimized out>, len=<optimized out>) at XExtInt.c:465 >465 XExtInt.c: No such file or directory. > >Thread 3 (Thread 0x7f15e1c2a700 (LWP 4925)): >#0 do_sigwait (sig=0x7f15e1c29e4c, set=<optimized out>) at ../sysdeps/unix/sysv/linux/sigwait.c:64 > ret = <optimized out> > tmpset = {__val = {0 <repeats 16 times>}} >#1 __sigwait (set=<optimized out>, sig=0x7f15e1c29e4c) at ../sysdeps/unix/sysv/linux/sigwait.c:99 > oldtype = 0 > result = -4 >#2 0x00000000004433e6 in CArchMultithreadPosix::threadSignalHandler(void*) () >No symbol table info available. >#3 0x0000003227e07d15 in start_thread (arg=0x7f15e1c2a700) at pthread_create.c:308 > __res = <optimized out> > pd = 0x7f15e1c2a700 > now = <optimized out> > unwind_buf = {cancel_jmp_buf = {{jmp_buf = {139731958671104, 1091033174916965734, 0, 215407005696, 139731958671104, 4526512, -1076391778523306650, 1099000512251536742}, mask_was_saved = 0}}, priv = {pad = {0x0, 0x0, 0x0, 0x0}, data = {prev = 0x0, cleanup = 0x0, canceltype = 0}}} > not_first_call = 0 > pagesize_m1 = <optimized out> > sp = <optimized out> > freesize = <optimized out> >#4 0x00000032276f246d in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:114 >No locals. > >Thread 2 (Thread 0x7f15e1429700 (LWP 4926)): >#0 0x00000032276e998d in poll () at ../sysdeps/unix/syscall-template.S:81 >No locals. >#1 0x00000000004453d0 in CArchNetworkBSD::pollSocket(IArchNetwork::CPollEntry*, int, double) () >No symbol table info available. >#2 0x00000000004ad837 in CSocketMultiplexer::serviceThread(void*) () >No symbol table info available. >#3 0x00000000004b3c69 in CThread::threadFunc(void*) () >No symbol table info available. >#4 0x00000000004426b8 in CArchMultithreadPosix::doThreadFunc(CArchThreadImpl*) () >No symbol table info available. >#5 0x0000000000442798 in CArchMultithreadPosix::threadFunc(void*) () >No symbol table info available. >#6 0x0000003227e07d15 in start_thread (arg=0x7f15e1429700) at pthread_create.c:308 > __res = <optimized out> > pd = 0x7f15e1429700 > now = <optimized out> > unwind_buf = {cancel_jmp_buf = {{jmp_buf = {139731950278400, 1091033174916965734, 0, 215407005696, 139731950278400, 4526512, -1076392878571805338, 1099000512251536742}, mask_was_saved = 0}}, priv = {pad = {0x0, 0x0, 0x0, 0x0}, data = {prev = 0x0, cleanup = 0x0, canceltype = 0}}} > not_first_call = 0 > pagesize_m1 = <optimized out> > sp = <optimized out> > freesize = <optimized out> >#7 0x00000032276f246d in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:114 >No locals. > >Thread 1 (Thread 0x7f15e1c2b780 (LWP 4924)): >#0 count_bits (ptr=<optimized out>, len=<optimized out>) at XExtInt.c:465 > i = <optimized out> > x = <optimized out> > bits = <optimized out> >#1 copyRawEvent (cookie_in=<optimized out>, cookie_out=<optimized out>) at XExtInt.c:1411 > len = <optimized out> > bits = -18080 > in = 0x0 > out = <optimized out> > ptr = <optimized out> >#2 XInputCopyCookie (out=0x7fff28df6d50, in=0x7fff28df6e40, dpy=<optimized out>) at XExtInt.c:1487 >No locals. >#3 XInputCopyCookie (dpy=<optimized out>, in=0x7fff28df6e40, out=0x7fff28df6d50) at XExtInt.c:1436 > info = <optimized out> >#4 0x000000322be44bda in _XCopyEventCookie (dpy=dpy@entry=0x2712cc0, in=in@entry=0x7fff28df6e40, out=out@entry=0x7fff28df6d50) at XlibInt.c:855 > ret = 0 > extension = <optimized out> >#5 0x000000322be34417 in XPeekEvent (dpy=0x2712cc0, event=0x7fff28df6e40) at PeekEvent.c:48 > copy = {type = 35, xany = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, window = 73014444163}, xkey = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, window = 73014444163, root = 0, subwindow = 0, time = 40971240, x = 555287297, y = 298, x_root = 8192, y_root = 0, state = 8192, keycode = 0, same_screen = 0}, xbutton = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, window = 73014444163, root = 0, subwindow = 0, time = 40971240, x = 555287297, y = 298, x_root = 8192, y_root = 0, state = 8192, button = 0, same_screen = 0}, xmotion = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, window = 73014444163, root = 0, subwindow = 0, time = 40971240, x = 555287297, y = 298, x_root = 8192, y_root = 0, state = 8192, is_hint = 0 '\000', same_screen = 0}, xcrossing = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, window = 73014444163, root = 0, subwindow = 0, time = 40971240, x = 555287297, y = 298, x_root = 8192, y_root = 0, mode = 8192, detail = 0, same_screen = 0, focus = 0, state = 41070072}, xfocus = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, window = 73014444163, mode = 0, detail = 0}, xexpose = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, window = 73014444163, x = 0, y = 0, width = 0, height = 0, count = 40971240}, xgraphicsexpose = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, drawable = 73014444163, x = 0, y = 0, width = 0, height = 0, count = 40971240, major_code = 0, minor_code = 555287297}, xnoexpose = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, drawable = 73014444163, major_code = 0, minor_code = 0}, xvisibility = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, window = 73014444163, state = 0}, xcreatewindow = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, parent = 73014444163, window = 0, x = 0, y = 0, width = 40971240, height = 0, border_width = 555287297, override_redirect = 298}, xdestroywindow = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, event = 73014444163, window = 0}, xunmap = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, event = 73014444163, window = 0, from_configure = 0}, xmap = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, event = 73014444163, window = 0, override_redirect = 0}, xmaprequest = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, parent = 73014444163, window = 0}, xreparent = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, event = 73014444163, window = 0, parent = 0, x = 40971240, y = 0, override_redirect = 555287297}, xconfigure = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, event = 73014444163, window = 0, x = 0, y = 0, width = 40971240, height = 0, border_width = 555287297, above = 8192, override_redirect = 8192}, xgravity = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, event = 73014444163, window = 0, x = 0, y = 0}, xresizerequest = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, window = 73014444163, width = 0, height = 0}, xconfigurerequest = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, parent = 73014444163, window = 0, x = 0, y = 0, width = 40971240, height = 0, border_width = 555287297, above = 8192, detail = 8192, value_mask = 0}, xcirculate = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, event = 73014444163, window = 0, place = 0}, xcirculaterequest = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, parent = 73014444163, window = 0, place = 0}, xproperty = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, window = 73014444163, atom = 0, time = 0, state = 40971240}, xselectionclear = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, window = 73014444163, selection = 0, time = 0}, xselectionrequest = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, owner = 73014444163, requestor = 0, selection = 0, target = 40971240, property = 1280455541505, time = 8192}, xselection = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, requestor = 73014444163, selection = 0, target = 0, property = 40971240, time = 1280455541505}, xcolormap = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, window = 73014444163, colormap = 0, new = 0, state = 0}, xclient = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, window = 73014444163, message_type = 0, format = 0, data = {b = "\350+q\002\000\000\000\000\001\003\031!*\001\000\000\000 \000", s = {11240, 625, 0, 0, 769, 8473, 298, 0, 8192, 0}, l = {40971240, 1280455541505, 8192, 8192, 0}}}, xmapping = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, window = 73014444163, request = 0, first_keycode = 0, count = 0}, xerror = {type = 35, display = 0x121fc4, resourceid = 0, serial = 40971456, error_code = 131 '\203', request_code = 0 '\000', minor_code = 0 '\000'}, xkeymap = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, window = 73014444163, key_vector = '\000' <repeats 16 times>"\350, +q\002\000\000\000\000\001\003\031!*\001\000"}, xgeneric = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, extension = 131, evtype = 17}, xcookie = {type = 35, serial = 1187780, send_event = 0, display = 0x2712cc0, extension = 131, evtype = 17, cookie = 0, data = 0x0}, pad = {35, 1187780, 0, 40971456, 73014444163, 0, 0, 40971240, 1280455541505, 8192, 8192, 0, 41070072, 7236920, 4874112, 4838668, 140733879119360, 214748364800, 0, 140733879119320, 140733879119320, 0, 35184372088832, 215484665521}} >#6 0x0000000000452d3b in CXWindowsScreen::refreshKeyboard(_XEvent*) () >No symbol table info available. >#7 0x0000000000458003 in CXWindowsScreen::handleSystemEvent(CEvent const&, void*) () >No symbol table info available. >#8 0x00000000004a37b8 in CEventQueue::dispatchEvent(CEvent const&) () >No symbol table info available. >#9 0x00000000004a3725 in CEventQueue::loop() () >No symbol table info available. >#10 0x000000000044e7f6 in CServerApp::mainLoop() () >No symbol table info available. >#11 0x000000000044be79 in CServerApp::runInner(int, char**, ILogOutputter*, int (*)(int, char**)) () >No symbol table info available. >#12 0x000000000044a756 in CApp::run(int, char**) () >No symbol table info available. >#13 0x0000000000440775 in main () >No symbol table info available. >From To Syms Read Shared Object Library >0x0000003227e05790 0x0000003227e104b4 Yes /lib64/libpthread.so.0 >0x0000003240e01c20 0x0000003240e05d38 Yes /lib64/libSM.so.6 >0x000000323fe04f30 0x000000323fe1259c Yes /lib64/libICE.so.6 >0x000000323c6014b0 0x000000323c603e98 Yes /lib64/libXtst.so.6 >0x000000322be1dee0 0x000000322bea4280 Yes /lib64/libX11.so.6 >0x000000322d603740 0x000000322d60d810 Yes /lib64/libXext.so.6 >0x0000003230e00b40 0x0000003230e01458 Yes /lib64/libXinerama.so.1 >0x000000322f601b70 0x000000322f607768 Yes /lib64/libXrandr.so.2 >0x000000322ee02160 0x000000322ee0bfc4 Yes /lib64/libXi.so.6 >0x000000322b65bb80 0x000000322b6c10bb Yes /lib64/libstdc++.so.6 >0x00000032286055b0 0x000000322866fd68 Yes /lib64/libm.so.6 >0x0000003229602a40 0x0000003229612168 Yes /lib64/libgcc_s.so.1 >0x000000322761f1a0 0x0000003227760940 Yes /lib64/libc.so.6 >0x0000003227200b20 0x000000322721a3d9 Yes /lib64/ld-linux-x86-64.so.2 >0x000000322ea01510 0x000000322ea02a8c Yes /lib64/libuuid.so.1 >0x000000322ca09a00 0x000000322ca158f8 Yes /lib64/libxcb.so.1 >0x0000003227a00ed0 0x0000003227a019f0 Yes /lib64/libdl.so.2 >0x000000322fe01ab0 0x000000322fe07a00 Yes /lib64/libXrender.so.1 >0x000000322c200eb0 0x000000322c201bcc Yes /lib64/libXau.so.6 >0x0000003234e02ab0 0x0000003234e076ec Yes /lib64/libXcursor.so.1 >0x000000322f201530 0x000000322f203da8 Yes /lib64/libXfixes.so.3 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0x322ee07d94 215534828948 >rbx 0x2712cc0 40971456 >rcx 0xffffffffffffb960 -18080 >rdx 0x11 17 >rsi 0x2712cc0 40971456 >rdi 0x272deb0 41082544 >rbp 0x7fff28df6e40 0x7fff28df6e40 >rsp 0x7fff28df6ce0 0x7fff28df6ce0 >r8 0x2714c10 40979472 >r9 0x133c 4924 >r10 0x0 0 >r11 0x0 0 >r12 0x7fff28df6d50 140733879119184 >r13 0x0 0 >r14 0x6e6d38 7236920 >r15 0x4a5f80 4874112 >rip 0x322ee07d98 0x322ee07d98 <XInputCopyCookie+392> >eflags 0x10203 [ CF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >Dump of assembler code for function XInputCopyCookie: > 0x000000322ee07c10 <+0>: push %r15 > 0x000000322ee07c12 <+2>: push %r14 > 0x000000322ee07c14 <+4>: push %r13 > 0x000000322ee07c16 <+6>: push %r12 > 0x000000322ee07c18 <+8>: mov %rdx,%r12 > 0x000000322ee07c1b <+11>: push %rbp > 0x000000322ee07c1c <+12>: mov %rsi,%rbp > 0x000000322ee07c1f <+15>: push %rbx > 0x000000322ee07c20 <+16>: sub $0x18,%rsp > 0x000000322ee07c24 <+20>: callq 0x322ee07110 <XInput_find_display> > 0x000000322ee07c29 <+25>: mov 0x10(%rax),%rax > 0x000000322ee07c2d <+29>: mov 0x20(%rbp),%edx > 0x000000322ee07c30 <+32>: cmp 0x4(%rax),%edx > 0x000000322ee07c33 <+35>: jne 0x322ee07ce0 <XInputCopyCookie+208> > 0x000000322ee07c39 <+41>: mov 0x0(%rbp),%rax > 0x000000322ee07c3d <+45>: mov %rax,(%r12) > 0x000000322ee07c41 <+49>: mov 0x8(%rbp),%rax > 0x000000322ee07c45 <+53>: mov %rax,0x8(%r12) > 0x000000322ee07c4a <+58>: mov 0x10(%rbp),%rax > 0x000000322ee07c4e <+62>: mov %rax,0x10(%r12) > 0x000000322ee07c53 <+67>: mov 0x18(%rbp),%rax > 0x000000322ee07c57 <+71>: mov %rax,0x18(%r12) > 0x000000322ee07c5c <+76>: mov 0x20(%rbp),%rax > 0x000000322ee07c60 <+80>: mov %rax,0x20(%r12) > 0x000000322ee07c65 <+85>: mov 0x28(%rbp),%rax > 0x000000322ee07c69 <+89>: movq $0x0,0x30(%r12) > 0x000000322ee07c72 <+98>: mov %rax,0x28(%r12) > 0x000000322ee07c77 <+103>: movl $0x0,0x28(%r12) > 0x000000322ee07c80 <+112>: mov 0x24(%rbp),%edx > 0x000000322ee07c83 <+115>: cmp $0x15,%edx > 0x000000322ee07c86 <+118>: jbe 0x322ee07cc8 <XInputCopyCookie+184> > 0x000000322ee07c88 <+120>: lea 0x4599(%rip),%rsi # 0x322ee0c228 > 0x000000322ee07c8f <+127>: mov $0x1,%edi > 0x000000322ee07c94 <+132>: xor %eax,%eax > 0x000000322ee07c96 <+134>: callq 0x322ee020d0 <__printf_chk@plt> > 0x000000322ee07c9b <+139>: mov 0x24(%rbp),%edx > 0x000000322ee07c9e <+142>: lea 0x45ab(%rip),%rsi # 0x322ee0c250 > 0x000000322ee07ca5 <+149>: mov $0x1,%edi > 0x000000322ee07caa <+154>: xor %eax,%eax > 0x000000322ee07cac <+156>: callq 0x322ee020d0 <__printf_chk@plt> > 0x000000322ee07cb1 <+161>: add $0x18,%rsp > 0x000000322ee07cb5 <+165>: xor %eax,%eax > 0x000000322ee07cb7 <+167>: pop %rbx > 0x000000322ee07cb8 <+168>: pop %rbp > 0x000000322ee07cb9 <+169>: pop %r12 > 0x000000322ee07cbb <+171>: pop %r13 > 0x000000322ee07cbd <+173>: pop %r14 > 0x000000322ee07cbf <+175>: pop %r15 > 0x000000322ee07cc1 <+177>: retq > 0x000000322ee07cc2 <+178>: nopw 0x0(%rax,%rax,1) > 0x000000322ee07cc8 <+184>: lea 0x4765(%rip),%rax # 0x322ee0c434 > 0x000000322ee07ccf <+191>: mov %edx,%ecx > 0x000000322ee07cd1 <+193>: movslq (%rax,%rcx,4),%rcx > 0x000000322ee07cd5 <+197>: add %rcx,%rax > 0x000000322ee07cd8 <+200>: jmpq *%rax > 0x000000322ee07cda <+202>: nopw 0x0(%rax,%rax,1) > 0x000000322ee07ce0 <+208>: lea 0x44e1(%rip),%rsi # 0x322ee0c1c8 > 0x000000322ee07ce7 <+215>: mov $0x1,%edi > 0x000000322ee07cec <+220>: xor %eax,%eax > 0x000000322ee07cee <+222>: callq 0x322ee020d0 <__printf_chk@plt> > 0x000000322ee07cf3 <+227>: add $0x18,%rsp > 0x000000322ee07cf7 <+231>: xor %eax,%eax > 0x000000322ee07cf9 <+233>: pop %rbx > 0x000000322ee07cfa <+234>: pop %rbp > 0x000000322ee07cfb <+235>: pop %r12 > 0x000000322ee07cfd <+237>: pop %r13 > 0x000000322ee07cff <+239>: pop %r14 > 0x000000322ee07d01 <+241>: pop %r15 > 0x000000322ee07d03 <+243>: retq > 0x000000322ee07d04 <+244>: mov $0x60,%edi > 0x000000322ee07d09 <+249>: mov 0x30(%rbp),%rbx > 0x000000322ee07d0d <+253>: callq 0x322ee02090 <malloc@plt> > 0x000000322ee07d12 <+258>: test %rax,%rax > 0x000000322ee07d15 <+261>: mov %rax,0x30(%r12) > 0x000000322ee07d1a <+266>: je 0x322ee07c9b <XInputCopyCookie+139> > 0x000000322ee07d20 <+272>: mov (%rbx),%rdx > 0x000000322ee07d23 <+275>: mov %rdx,(%rax) > 0x000000322ee07d26 <+278>: mov 0x8(%rbx),%rdx > 0x000000322ee07d2a <+282>: mov %rdx,0x8(%rax) > 0x000000322ee07d2e <+286>: mov 0x10(%rbx),%rdx > 0x000000322ee07d32 <+290>: mov %rdx,0x10(%rax) > 0x000000322ee07d36 <+294>: mov 0x18(%rbx),%rdx > 0x000000322ee07d3a <+298>: mov %rdx,0x18(%rax) > 0x000000322ee07d3e <+302>: mov 0x20(%rbx),%rdx > 0x000000322ee07d42 <+306>: mov %rdx,0x20(%rax) > 0x000000322ee07d46 <+310>: mov 0x28(%rbx),%rdx > 0x000000322ee07d4a <+314>: mov %rdx,0x28(%rax) > 0x000000322ee07d4e <+318>: mov 0x30(%rbx),%rdx > 0x000000322ee07d52 <+322>: mov %rdx,0x30(%rax) > 0x000000322ee07d56 <+326>: mov 0x38(%rbx),%rdx > 0x000000322ee07d5a <+330>: mov %rdx,0x38(%rax) > 0x000000322ee07d5e <+334>: mov 0x40(%rbx),%rdx > 0x000000322ee07d62 <+338>: mov %rdx,0x40(%rax) > 0x000000322ee07d66 <+342>: mov 0x48(%rbx),%rdx > 0x000000322ee07d6a <+346>: mov %rdx,0x48(%rax) > 0x000000322ee07d6e <+350>: mov 0x50(%rbx),%rdx > 0x000000322ee07d72 <+354>: mov %rdx,0x50(%rax) > 0x000000322ee07d76 <+358>: mov 0x58(%rbx),%rdx > 0x000000322ee07d7a <+362>: mov %rdx,0x58(%rax) > 0x000000322ee07d7e <+366>: xchg %ax,%ax > 0x000000322ee07d80 <+368>: add $0x18,%rsp > 0x000000322ee07d84 <+372>: mov $0x1,%eax > 0x000000322ee07d89 <+377>: pop %rbx > 0x000000322ee07d8a <+378>: pop %rbp > 0x000000322ee07d8b <+379>: pop %r12 > 0x000000322ee07d8d <+381>: pop %r13 > 0x000000322ee07d8f <+383>: pop %r14 > 0x000000322ee07d91 <+385>: pop %r15 > 0x000000322ee07d93 <+387>: retq > 0x000000322ee07d94 <+388>: mov 0x30(%rbp),%r13 >=> 0x000000322ee07d98 <+392>: mov 0x40(%r13),%esi > 0x000000322ee07d9c <+396>: mov 0x48(%r13),%r8 > 0x000000322ee07da0 <+400>: test %esi,%esi > 0x000000322ee07da2 <+402>: je 0x322ee084f8 <XInputCopyCookie+2280> > 0x000000322ee07da8 <+408>: xor %edx,%edx > 0x000000322ee07daa <+410>: xor %ecx,%ecx > 0x000000322ee07dac <+412>: nopl 0x0(%rax) > 0x000000322ee07db0 <+416>: movzbl (%r8,%rdx,1),%eax > 0x000000322ee07db5 <+421>: test %al,%al > 0x000000322ee07db7 <+423>: je 0x322ee07dcd <XInputCopyCookie+445> > 0x000000322ee07db9 <+425>: nopl 0x0(%rax) > 0x000000322ee07dc0 <+432>: mov $0x1,%edi > 0x000000322ee07dc5 <+437>: and %eax,%edi > 0x000000322ee07dc7 <+439>: add %edi,%ecx > 0x000000322ee07dc9 <+441>: shr %al > 0x000000322ee07dcb <+443>: jne 0x322ee07dc0 <XInputCopyCookie+432> > 0x000000322ee07dcd <+445>: add $0x1,%rdx > 0x000000322ee07dd1 <+449>: cmp %edx,%esi > 0x000000322ee07dd3 <+451>: ja 0x322ee07db0 <XInputCopyCookie+416> > 0x000000322ee07dd5 <+453>: mov %ecx,%eax > 0x000000322ee07dd7 <+455>: movslq %ecx,%r14 > 0x000000322ee07dda <+458>: mov %ecx,%r15d > 0x000000322ee07ddd <+461>: shl $0x4,%eax > 0x000000322ee07de0 <+464>: lea 0x60(%rax,%rsi,1),%edi > 0x000000322ee07de4 <+468>: movslq %edi,%rdi > 0x000000322ee07de7 <+471>: callq 0x322ee02090 <malloc@plt> > 0x000000322ee07dec <+476>: test %rax,%rax > 0x000000322ee07def <+479>: mov %rax,%rbx > 0x000000322ee07df2 <+482>: mov %rax,0x30(%r12) > 0x000000322ee07df7 <+487>: je 0x322ee07c9b <XInputCopyCookie+139> > 0x000000322ee07dfd <+493>: lea 0x60(%rax),%rdi > 0x000000322ee07e01 <+497>: mov 0x0(%r13),%rax > 0x000000322ee07e05 <+501>: lea 0x0(,%r15,8),%r12d > 0x000000322ee07e0d <+509>: shl $0x3,%r14 > 0x000000322ee07e11 <+513>: movslq %r12d,%r12 > 0x000000322ee07e14 <+516>: mov %rax,(%rbx) > 0x000000322ee07e17 <+519>: mov 0x8(%r13),%rax > 0x000000322ee07e1b <+523>: mov %rax,0x8(%rbx) > 0x000000322ee07e1f <+527>: mov 0x10(%r13),%rax > 0x000000322ee07e23 <+531>: mov %rax,0x10(%rbx) > 0x000000322ee07e27 <+535>: mov 0x18(%r13),%rax > 0x000000322ee07e2b <+539>: mov %rax,0x18(%rbx) > 0x000000322ee07e2f <+543>: mov 0x20(%r13),%rax > 0x000000322ee07e33 <+547>: mov %rax,0x20(%rbx) > 0x000000322ee07e37 <+551>: mov 0x28(%r13),%rax > 0x000000322ee07e3b <+555>: mov %rax,0x28(%rbx) > 0x000000322ee07e3f <+559>: mov 0x30(%r13),%rax > 0x000000322ee07e43 <+563>: mov %rax,0x30(%rbx) > 0x000000322ee07e47 <+567>: mov 0x38(%r13),%rax > 0x000000322ee07e4b <+571>: mov %rax,0x38(%rbx) > 0x000000322ee07e4f <+575>: mov 0x40(%r13),%rax > 0x000000322ee07e53 <+579>: mov %rax,0x40(%rbx) > 0x000000322ee07e57 <+583>: mov 0x48(%r13),%rax > 0x000000322ee07e5b <+587>: movslq 0x40(%rbx),%rdx > 0x000000322ee07e5f <+591>: mov %rax,0x48(%rbx) > 0x000000322ee07e63 <+595>: mov 0x50(%r13),%rax > 0x000000322ee07e67 <+599>: lea (%rdi,%rdx,1),%rbp > 0x000000322ee07e6b <+603>: mov %rax,0x50(%rbx) > 0x000000322ee07e6f <+607>: mov 0x58(%r13),%rax > 0x000000322ee07e73 <+611>: mov %rdi,0x48(%rbx) > 0x000000322ee07e77 <+615>: add %rbp,%r12 > 0x000000322ee07e7a <+618>: mov %rax,0x58(%rbx) > 0x000000322ee07e7e <+622>: mov 0x48(%r13),%rsi > 0x000000322ee07e82 <+626>: callq 0x322ee02060 <memcpy@plt> > 0x000000322ee07e87 <+631>: mov %rbp,0x50(%rbx) > 0x000000322ee07e8b <+635>: mov 0x50(%r13),%rsi > 0x000000322ee07e8f <+639>: mov %r14,%rdx > 0x000000322ee07e92 <+642>: mov %rbp,%rdi > 0x000000322ee07e95 <+645>: callq 0x322ee02060 <memcpy@plt> > 0x000000322ee07e9a <+650>: mov %r12,0x58(%rbx) > 0x000000322ee07e9e <+654>: mov 0x58(%r13),%rsi > 0x000000322ee07ea2 <+658>: mov %r14,%rdx > 0x000000322ee07ea5 <+661>: mov %r12,%rdi > 0x000000322ee07ea8 <+664>: callq 0x322ee02060 <memcpy@plt> > 0x000000322ee07ead <+669>: jmpq 0x322ee07d80 <XInputCopyCookie+368> > 0x000000322ee07eb2 <+674>: mov $0x48,%edi > 0x000000322ee07eb7 <+679>: mov 0x30(%rbp),%rbx > 0x000000322ee07ebb <+683>: callq 0x322ee02090 <malloc@plt> > 0x000000322ee07ec0 <+688>: test %rax,%rax > 0x000000322ee07ec3 <+691>: mov %rax,0x30(%r12) > 0x000000322ee07ec8 <+696>: je 0x322ee07c9b <XInputCopyCookie+139> > 0x000000322ee07ece <+702>: mov (%rbx),%rdx > 0x000000322ee07ed1 <+705>: mov %rdx,(%rax) > 0x000000322ee07ed4 <+708>: mov 0x8(%rbx),%rdx > 0x000000322ee07ed8 <+712>: mov %rdx,0x8(%rax) > 0x000000322ee07edc <+716>: mov 0x10(%rbx),%rdx > 0x000000322ee07ee0 <+720>: mov %rdx,0x10(%rax) > 0x000000322ee07ee4 <+724>: mov 0x18(%rbx),%rdx > 0x000000322ee07ee8 <+728>: mov %rdx,0x18(%rax) > 0x000000322ee07eec <+732>: mov 0x20(%rbx),%rdx > 0x000000322ee07ef0 <+736>: mov %rdx,0x20(%rax) > 0x000000322ee07ef4 <+740>: mov 0x28(%rbx),%rdx > 0x000000322ee07ef8 <+744>: mov %rdx,0x28(%rax) > 0x000000322ee07efc <+748>: mov 0x30(%rbx),%rdx > 0x000000322ee07f00 <+752>: mov %rdx,0x30(%rax) > 0x000000322ee07f04 <+756>: mov 0x38(%rbx),%rdx > 0x000000322ee07f08 <+760>: mov %rdx,0x38(%rax) > 0x000000322ee07f0c <+764>: mov 0x40(%rbx),%rdx > 0x000000322ee07f10 <+768>: mov %rdx,0x40(%rax) > 0x000000322ee07f14 <+772>: jmpq 0x322ee07d80 <XInputCopyCookie+368> > 0x000000322ee07f19 <+777>: mov 0x30(%rbp),%rbx > 0x000000322ee07f1d <+781>: movslq 0x34(%rbx),%rax > 0x000000322ee07f21 <+785>: lea (%rax,%rax,4),%rax > 0x000000322ee07f25 <+789>: lea 0x40(,%rax,4),%rdi > 0x000000322ee07f2d <+797>: callq 0x322ee02090 <malloc@plt> > 0x000000322ee07f32 <+802>: test %rax,%rax > 0x000000322ee07f35 <+805>: mov %rax,0x30(%r12) > 0x000000322ee07f3a <+810>: je 0x322ee07c9b <XInputCopyCookie+139> > 0x000000322ee07f40 <+816>: mov (%rbx),%rdx > 0x000000322ee07f43 <+819>: lea 0x40(%rax),%rdi > 0x000000322ee07f47 <+823>: mov %rdx,(%rax) > 0x000000322ee07f4a <+826>: mov 0x8(%rbx),%rdx > 0x000000322ee07f4e <+830>: mov %rdx,0x8(%rax) > 0x000000322ee07f52 <+834>: mov 0x10(%rbx),%rdx > 0x000000322ee07f56 <+838>: mov %rdx,0x10(%rax) > 0x000000322ee07f5a <+842>: mov 0x18(%rbx),%rdx > 0x000000322ee07f5e <+846>: mov %rdx,0x18(%rax) > 0x000000322ee07f62 <+850>: mov 0x20(%rbx),%rdx > 0x000000322ee07f66 <+854>: mov %rdx,0x20(%rax) > 0x000000322ee07f6a <+858>: mov 0x28(%rbx),%rdx > 0x000000322ee07f6e <+862>: mov %rdx,0x28(%rax) > 0x000000322ee07f72 <+866>: mov 0x30(%rbx),%rdx > 0x000000322ee07f76 <+870>: mov %rdi,0x38(%rax) > 0x000000322ee07f7a <+874>: mov %rdx,0x30(%rax) > 0x000000322ee07f7e <+878>: movslq 0x34(%rbx),%rax > 0x000000322ee07f82 <+882>: mov 0x38(%rbx),%rsi > 0x000000322ee07f86 <+886>: lea (%rax,%rax,4),%rdx > 0x000000322ee07f8a <+890>: shl $0x2,%rdx > 0x000000322ee07f8e <+894>: callq 0x322ee02060 <memcpy@plt> > 0x000000322ee07f93 <+899>: jmpq 0x322ee07d80 <XInputCopyCookie+368> > 0x000000322ee07f98 <+904>: mov 0x30(%rbp),%rbx > 0x000000322ee07f9c <+908>: mov 0x88(%rbx),%edi > 0x000000322ee07fa2 <+914>: add $0xb8,%edi > 0x000000322ee07fa8 <+920>: movslq %edi,%rdi > 0x000000322ee07fab <+923>: callq 0x322ee02090 <malloc@plt> > 0x000000322ee07fb0 <+928>: test %rax,%rax > 0x000000322ee07fb3 <+931>: mov %rax,0x30(%r12) > 0x000000322ee07fb8 <+936>: je 0x322ee07c9b <XInputCopyCookie+139> > 0x000000322ee07fbe <+942>: mov %rbx,%rsi > 0x000000322ee07fc1 <+945>: mov $0x17,%ecx > 0x000000322ee07fc6 <+950>: mov %rax,%rdi > 0x000000322ee07fc9 <+953>: rep movsq %ds:(%rsi),%es:(%rdi) > 0x000000322ee07fcc <+956>: lea 0xb8(%rax),%r8 > 0x000000322ee07fd3 <+963>: movslq 0x88(%rax),%rdx > 0x000000322ee07fda <+970>: mov %r8,0x90(%rax) > 0x000000322ee07fe1 <+977>: mov %r8,%rdi > 0x000000322ee07fe4 <+980>: mov 0x90(%rbx),%rsi > 0x000000322ee07feb <+987>: callq 0x322ee02060 <memcpy@plt> > 0x000000322ee07ff0 <+992>: jmpq 0x322ee07d80 <XInputCopyCookie+368> > 0x000000322ee07ff5 <+997>: mov 0x30(%rbp),%r13 > 0x000000322ee07ff9 <+1001>: mov 0x90(%r13),%esi > 0x000000322ee08000 <+1008>: mov 0x98(%r13),%r8 > 0x000000322ee08007 <+1015>: test %esi,%esi > 0x000000322ee08009 <+1017>: je 0x322ee084e1 <XInputCopyCookie+2257> > 0x000000322ee0800f <+1023>: xor %edx,%edx > 0x000000322ee08011 <+1025>: xor %ebx,%ebx > 0x000000322ee08013 <+1027>: nopl 0x0(%rax,%rax,1) > 0x000000322ee08018 <+1032>: movzbl (%r8,%rdx,1),%eax > 0x000000322ee0801d <+1037>: test %al,%al > 0x000000322ee0801f <+1039>: je 0x322ee08033 <XInputCopyCookie+1059> > 0x000000322ee08021 <+1041>: nopl 0x0(%rax) > 0x000000322ee08028 <+1048>: mov %eax,%ecx > 0x000000322ee0802a <+1050>: and $0x1,%ecx > 0x000000322ee0802d <+1053>: add %ecx,%ebx > 0x000000322ee0802f <+1055>: shr %al > 0x000000322ee08031 <+1057>: jne 0x322ee08028 <XInputCopyCookie+1048> > 0x000000322ee08033 <+1059>: add $0x1,%rdx > 0x000000322ee08037 <+1063>: cmp %edx,%esi > 0x000000322ee08039 <+1065>: ja 0x322ee08018 <XInputCopyCookie+1032> > 0x000000322ee0803b <+1067>: mov 0x80(%r13),%r9d > 0x000000322ee08042 <+1074>: xor %edx,%edx > 0x000000322ee08044 <+1076>: xor %ecx,%ecx > 0x000000322ee08046 <+1078>: add %esi,%r9d > 0x000000322ee08049 <+1081>: add $0xf0,%r9d > 0x000000322ee08050 <+1088>: movzbl (%r8,%rdx,1),%eax > 0x000000322ee08055 <+1093>: test %al,%al > 0x000000322ee08057 <+1095>: je 0x322ee0806d <XInputCopyCookie+1117> > 0x000000322ee08059 <+1097>: nopl 0x0(%rax) > 0x000000322ee08060 <+1104>: mov $0x1,%edi > 0x000000322ee08065 <+1109>: and %eax,%edi > 0x000000322ee08067 <+1111>: add %edi,%ecx > 0x000000322ee08069 <+1113>: shr %al > 0x000000322ee0806b <+1115>: jne 0x322ee08060 <XInputCopyCookie+1104> > 0x000000322ee0806d <+1117>: add $0x1,%rdx > 0x000000322ee08071 <+1121>: cmp %edx,%esi > 0x000000322ee08073 <+1123>: ja 0x322ee08050 <XInputCopyCookie+1088> > 0x000000322ee08075 <+1125>: shl $0x3,%ecx > 0x000000322ee08078 <+1128>: lea 0x20(%rcx,%r9,1),%edi > 0x000000322ee0807d <+1133>: movslq %edi,%rdi > 0x000000322ee08080 <+1136>: callq 0x322ee02090 <malloc@plt> > 0x000000322ee08085 <+1141>: test %rax,%rax > 0x000000322ee08088 <+1144>: mov %rax,%r14 > 0x000000322ee0808b <+1147>: mov %rax,0x30(%r12) > 0x000000322ee08090 <+1152>: je 0x322ee07c9b <XInputCopyCookie+139> > 0x000000322ee08096 <+1158>: mov %r14,%rdi > 0x000000322ee08099 <+1161>: mov %r13,%rsi > 0x000000322ee0809c <+1164>: mov $0x19,%ecx > 0x000000322ee080a1 <+1169>: rep movsq %ds:(%rsi),%es:(%rdi) > 0x000000322ee080a4 <+1172>: lea 0xc8(%rax),%rax > 0x000000322ee080ab <+1179>: movslq 0x80(%r13),%rbp > 0x000000322ee080b2 <+1186>: movslq 0x80(%r14),%rdx > 0x000000322ee080b9 <+1193>: mov %rax,%rdi > 0x000000322ee080bc <+1196>: mov %rax,0x88(%r14) > 0x000000322ee080c3 <+1203>: mov 0x88(%r13),%rsi > 0x000000322ee080ca <+1210>: add %rax,%rbp > 0x000000322ee080cd <+1213>: callq 0x322ee02060 <memcpy@plt> > 0x000000322ee080d2 <+1218>: movslq 0x90(%r13),%r12 > 0x000000322ee080d9 <+1225>: movslq 0x90(%r14),%rdx > 0x000000322ee080e0 <+1232>: mov %rbp,%rdi > 0x000000322ee080e3 <+1235>: mov %rbp,0x98(%r14) > 0x000000322ee080ea <+1242>: mov 0x98(%r13),%rsi > 0x000000322ee080f1 <+1249>: add %rbp,%r12 > 0x000000322ee080f4 <+1252>: callq 0x322ee02060 <memcpy@plt> > 0x000000322ee080f9 <+1257>: mov %r12,0xa0(%r14) > 0x000000322ee08100 <+1264>: mov 0xa0(%r13),%rsi > 0x000000322ee08107 <+1271>: movslq %ebx,%rdx > 0x000000322ee0810a <+1274>: shl $0x3,%rdx > 0x000000322ee0810e <+1278>: mov %r12,%rdi > 0x000000322ee08111 <+1281>: callq 0x322ee02060 <memcpy@plt> > 0x000000322ee08116 <+1286>: jmpq 0x322ee07d80 <XInputCopyCookie+368> > 0x000000322ee0811b <+1291>: mov 0x30(%rbp),%r13 > 0x000000322ee0811f <+1295>: mov 0x3c(%r13),%eax > 0x000000322ee08123 <+1299>: test %eax,%eax > 0x000000322ee08125 <+1301>: lea 0x48(,%rax,8),%r15d > 0x000000322ee0812d <+1309>: jle 0x322ee081cb <XInputCopyCookie+1467> > 0x000000322ee08133 <+1315>: xor %r14d,%r14d > 0x000000322ee08136 <+1318>: xor %ebx,%ebx > 0x000000322ee08138 <+1320>: jmp 0x322ee0816c <XInputCopyCookie+1372> > 0x000000322ee0813a <+1322>: nopw 0x0(%rax,%rax,1) > 0x000000322ee08140 <+1328>: jle 0x322ee081b0 <XInputCopyCookie+1440> > 0x000000322ee08142 <+1330>: cmp $0x2,%edx > 0x000000322ee08145 <+1333>: je 0x322ee081a0 <XInputCopyCookie+1424> > 0x000000322ee08147 <+1335>: cmp $0x3,%edx > 0x000000322ee0814a <+1338>: je 0x322ee08190 <XInputCopyCookie+1408> > 0x000000322ee0814c <+1340>: lea 0x40a5(%rip),%rsi # 0x322ee0c1f8 > 0x000000322ee08153 <+1347>: mov $0x1,%edi > 0x000000322ee08158 <+1352>: xor %eax,%eax > 0x000000322ee0815a <+1354>: callq 0x322ee020d0 <__printf_chk@plt> > 0x000000322ee0815f <+1359>: add $0x1,%ebx > 0x000000322ee08162 <+1362>: add $0x8,%r14 > 0x000000322ee08166 <+1366>: cmp 0x3c(%r13),%ebx > 0x000000322ee0816a <+1370>: jge 0x322ee081cb <XInputCopyCookie+1467> > 0x000000322ee0816c <+1372>: mov 0x40(%r13),%rax > 0x000000322ee08170 <+1376>: mov (%rax,%r14,1),%rax > 0x000000322ee08174 <+1380>: mov (%rax),%edx > 0x000000322ee08176 <+1382>: cmp $0x1,%edx > 0x000000322ee08179 <+1385>: jne 0x322ee08140 <XInputCopyCookie+1328> > 0x000000322ee0817b <+1387>: mov 0x8(%rax),%edi > 0x000000322ee0817e <+1390>: callq 0x322ee070d0 <sizeDeviceClassType> > 0x000000322ee08183 <+1395>: add %eax,%r15d > 0x000000322ee08186 <+1398>: jmp 0x322ee0815f <XInputCopyCookie+1359> > 0x000000322ee08188 <+1400>: nopl 0x0(%rax,%rax,1) > 0x000000322ee08190 <+1408>: add $0x20,%r15d > 0x000000322ee08194 <+1412>: jmp 0x322ee0815f <XInputCopyCookie+1359> > 0x000000322ee08196 <+1414>: nopw %cs:0x0(%rax,%rax,1) > 0x000000322ee081a0 <+1424>: add $0x38,%r15d > 0x000000322ee081a4 <+1428>: jmp 0x322ee0815f <XInputCopyCookie+1359> > 0x000000322ee081a6 <+1430>: nopw %cs:0x0(%rax,%rax,1) > 0x000000322ee081b0 <+1440>: test %edx,%edx > 0x000000322ee081b2 <+1442>: jne 0x322ee0814c <XInputCopyCookie+1340> > 0x000000322ee081b4 <+1444>: mov 0x8(%rax),%eax > 0x000000322ee081b7 <+1447>: shl $0x2,%eax > 0x000000322ee081ba <+1450>: test $0x4,%al > 0x000000322ee081bc <+1452>: je 0x322ee081c4 <XInputCopyCookie+1460> > 0x000000322ee081be <+1454>: and $0xfffffff8,%eax > 0x000000322ee081c1 <+1457>: add $0x8,%eax > 0x000000322ee081c4 <+1460>: lea 0x18(%r15,%rax,1),%r15d > 0x000000322ee081c9 <+1465>: jmp 0x322ee0815f <XInputCopyCookie+1359> > 0x000000322ee081cb <+1467>: movslq %r15d,%rdi > 0x000000322ee081ce <+1470>: callq 0x322ee02090 <malloc@plt> > 0x000000322ee081d3 <+1475>: test %rax,%rax > 0x000000322ee081d6 <+1478>: mov %rax,%r8 > 0x000000322ee081d9 <+1481>: mov %rax,0x30(%r12) > 0x000000322ee081de <+1486>: je 0x322ee07c9b <XInputCopyCookie+139> > 0x000000322ee081e4 <+1492>: mov 0x0(%r13),%rdx > 0x000000322ee081e8 <+1496>: lea 0x48(%rax),%rax > 0x000000322ee081ec <+1500>: xor %r12d,%r12d > 0x000000322ee081ef <+1503>: xor %r14d,%r14d > 0x000000322ee081f2 <+1506>: mov %rdx,(%r8) > 0x000000322ee081f5 <+1509>: mov 0x8(%r13),%rdx > 0x000000322ee081f9 <+1513>: mov %rdx,0x8(%r8) > 0x000000322ee081fd <+1517>: mov 0x10(%r13),%rdx > 0x000000322ee08201 <+1521>: mov %rdx,0x10(%r8) > 0x000000322ee08205 <+1525>: mov 0x18(%r13),%rdx > 0x000000322ee08209 <+1529>: mov %rdx,0x18(%r8) > 0x000000322ee0820d <+1533>: mov 0x20(%r13),%rdx > 0x000000322ee08211 <+1537>: mov %rdx,0x20(%r8) > 0x000000322ee08215 <+1541>: mov 0x28(%r13),%rdx > 0x000000322ee08219 <+1545>: mov %rdx,0x28(%r8) > 0x000000322ee0821d <+1549>: mov 0x30(%r13),%rdx > 0x000000322ee08221 <+1553>: mov %rdx,0x30(%r8) > 0x000000322ee08225 <+1557>: mov 0x38(%r13),%rdx > 0x000000322ee08229 <+1561>: mov %rax,0x40(%r8) > 0x000000322ee0822d <+1565>: mov %rdx,0x38(%r8) > 0x000000322ee08231 <+1569>: mov 0x3c(%r8),%ebx > 0x000000322ee08235 <+1573>: mov 0x3c(%r13),%ecx > 0x000000322ee08239 <+1577>: shl $0x3,%ebx > 0x000000322ee0823c <+1580>: movslq %ebx,%rbx > 0x000000322ee0823f <+1583>: add %rax,%rbx > 0x000000322ee08242 <+1586>: test %ecx,%ecx > 0x000000322ee08244 <+1588>: jg 0x322ee082ba <XInputCopyCookie+1706> > 0x000000322ee08246 <+1590>: jmpq 0x322ee07d80 <XInputCopyCookie+368> > 0x000000322ee0824b <+1595>: nopl 0x0(%rax,%rax,1) > 0x000000322ee08250 <+1600>: jle 0x322ee083f0 <XInputCopyCookie+2016> > 0x000000322ee08256 <+1606>: cmp $0x2,%edx > 0x000000322ee08259 <+1609>: nopl 0x0(%rax) > 0x000000322ee08260 <+1616>: je 0x322ee08398 <XInputCopyCookie+1928> > 0x000000322ee08266 <+1622>: cmp $0x3,%edx > 0x000000322ee08269 <+1625>: jne 0x322ee082a8 <XInputCopyCookie+1688> > 0x000000322ee0826b <+1627>: lea 0x20(%rbx),%rax > 0x000000322ee0826f <+1631>: test %rbx,%rbx > 0x000000322ee08272 <+1634>: mov $0x0,%edx > 0x000000322ee08277 <+1639>: cmove %rdx,%rax > 0x000000322ee0827b <+1643>: mov 0x0(%rbp),%rdx > 0x000000322ee0827f <+1647>: mov %rdx,(%rbx) > 0x000000322ee08282 <+1650>: mov 0x8(%rbp),%rdx > 0x000000322ee08286 <+1654>: mov %rdx,0x8(%rbx) > 0x000000322ee0828a <+1658>: mov 0x10(%rbp),%rdx > 0x000000322ee0828e <+1662>: mov %rdx,0x10(%rbx) > 0x000000322ee08292 <+1666>: mov 0x18(%rbp),%rdx > 0x000000322ee08296 <+1670>: mov %rdx,0x18(%rbx) > 0x000000322ee0829a <+1674>: mov 0x40(%r8),%rdx > 0x000000322ee0829e <+1678>: mov %rbx,(%rdx,%r12,1) > 0x000000322ee082a2 <+1682>: mov %rax,%rbx > 0x000000322ee082a5 <+1685>: nopl (%rax) > 0x000000322ee082a8 <+1688>: add $0x1,%r14d > 0x000000322ee082ac <+1692>: add $0x8,%r12 > 0x000000322ee082b0 <+1696>: cmp 0x3c(%r13),%r14d > 0x000000322ee082b4 <+1700>: jge 0x322ee07d80 <XInputCopyCookie+368> > 0x000000322ee082ba <+1706>: mov 0x40(%r13),%rax > 0x000000322ee082be <+1710>: mov (%rax,%r12,1),%rbp > 0x000000322ee082c2 <+1714>: mov 0x0(%rbp),%edx > 0x000000322ee082c5 <+1717>: cmp $0x1,%edx > 0x000000322ee082c8 <+1720>: jne 0x322ee08250 <XInputCopyCookie+1600> > 0x000000322ee082ca <+1722>: mov 0x8(%rbp),%edx > 0x000000322ee082cd <+1725>: lea 0xe(%rdx),%esi > 0x000000322ee082d0 <+1728>: mov %edx,%eax > 0x000000322ee082d2 <+1730>: add $0x7,%eax > 0x000000322ee082d5 <+1733>: cmovs %esi,%eax > 0x000000322ee082d8 <+1736>: sar $0x3,%eax > 0x000000322ee082db <+1739>: lea 0x6(%rax),%esi > 0x000000322ee082de <+1742>: add $0x3,%eax > 0x000000322ee082e1 <+1745>: cmovs %esi,%eax > 0x000000322ee082e4 <+1748>: sar $0x2,%eax > 0x000000322ee082e7 <+1751>: lea 0x0(,%rax,4),%esi > 0x000000322ee082ee <+1758>: test $0x4,%sil > 0x000000322ee082f2 <+1762>: je 0x322ee082fa <XInputCopyCookie+1770> > 0x000000322ee082f4 <+1764>: and $0xfffffff8,%esi > 0x000000322ee082f7 <+1767>: add $0x8,%esi > 0x000000322ee082fa <+1770>: add %edx,%eax > 0x000000322ee082fc <+1772>: test %rbx,%rbx > 0x000000322ee082ff <+1775>: lea 0x0(,%rax,8),%r15d > 0x000000322ee08307 <+1783>: je 0x322ee08451 <XInputCopyCookie+2113> > 0x000000322ee0830d <+1789>: mov 0x0(%rbp),%rax > 0x000000322ee08311 <+1793>: lea 0x28(%rbx),%rdi > 0x000000322ee08315 <+1797>: movslq %esi,%rsi > 0x000000322ee08318 <+1800>: lea (%rdi,%rsi,1),%r9 > 0x000000322ee0831c <+1804>: mov %rax,(%rbx) > 0x000000322ee0831f <+1807>: mov 0x8(%rbp),%rax > 0x000000322ee08323 <+1811>: mov %rax,0x8(%rbx) > 0x000000322ee08327 <+1815>: mov 0x10(%rbp),%rax > 0x000000322ee0832b <+1819>: mov %rax,0x10(%rbx) > 0x000000322ee0832f <+1823>: mov 0x18(%rbp),%rax > 0x000000322ee08333 <+1827>: mov %rdi,0x20(%rbx) > 0x000000322ee08337 <+1831>: mov %rax,0x18(%rbx) > 0x000000322ee0833b <+1835>: movslq 0x18(%rbx),%rdx > 0x000000322ee0833f <+1839>: mov 0x20(%rbp),%rsi > 0x000000322ee08343 <+1843>: mov %r8,(%rsp) > 0x000000322ee08347 <+1847>: mov %r9,0x8(%rsp) > 0x000000322ee0834c <+1852>: callq 0x322ee02060 <memcpy@plt> > 0x000000322ee08351 <+1857>: mov 0x8(%rsp),%r9 > 0x000000322ee08356 <+1862>: movslq %r15d,%rax > 0x000000322ee08359 <+1865>: mov (%rsp),%r8 > 0x000000322ee0835d <+1869>: mov %rbx,%r15 > 0x000000322ee08360 <+1872>: lea (%r9,%rax,1),%rbx > 0x000000322ee08364 <+1876>: movslq 0x8(%r15),%rdx > 0x000000322ee08368 <+1880>: mov %r9,0x10(%r15) > 0x000000322ee0836c <+1884>: mov %r9,%rdi > 0x000000322ee0836f <+1887>: mov 0x10(%rbp),%rsi > 0x000000322ee08373 <+1891>: shl $0x3,%rdx > 0x000000322ee08377 <+1895>: mov %r8,(%rsp) > 0x000000322ee0837b <+1899>: callq 0x322ee02060 <memcpy@plt> > 0x000000322ee08380 <+1904>: mov (%rsp),%r8 > 0x000000322ee08384 <+1908>: mov 0x40(%r8),%rax > 0x000000322ee08388 <+1912>: mov %r15,(%rax,%r12,1) > 0x000000322ee0838c <+1916>: jmpq 0x322ee082a8 <XInputCopyCookie+1688> > 0x000000322ee08391 <+1921>: nopl 0x0(%rax) > 0x000000322ee08398 <+1928>: lea 0x38(%rbx),%rax > 0x000000322ee0839c <+1932>: test %rbx,%rbx > 0x000000322ee0839f <+1935>: mov $0x0,%edx > 0x000000322ee083a4 <+1940>: cmove %rdx,%rax > 0x000000322ee083a8 <+1944>: mov 0x0(%rbp),%rdx > 0x000000322ee083ac <+1948>: mov %rdx,(%rbx) > 0x000000322ee083af <+1951>: mov 0x8(%rbp),%rdx > 0x000000322ee083b3 <+1955>: mov %rdx,0x8(%rbx) > 0x000000322ee083b7 <+1959>: mov 0x10(%rbp),%rdx > 0x000000322ee083bb <+1963>: mov %rdx,0x10(%rbx) > 0x000000322ee083bf <+1967>: mov 0x18(%rbp),%rdx > 0x000000322ee083c3 <+1971>: mov %rdx,0x18(%rbx) > 0x000000322ee083c7 <+1975>: mov 0x20(%rbp),%rdx > 0x000000322ee083cb <+1979>: mov %rdx,0x20(%rbx) > 0x000000322ee083cf <+1983>: mov 0x28(%rbp),%rdx > 0x000000322ee083d3 <+1987>: mov %rdx,0x28(%rbx) > 0x000000322ee083d7 <+1991>: mov 0x30(%rbp),%rdx > 0x000000322ee083db <+1995>: mov %rdx,0x30(%rbx) > 0x000000322ee083df <+1999>: mov 0x40(%r8),%rdx > 0x000000322ee083e3 <+2003>: mov %rbx,(%rdx,%r12,1) > 0x000000322ee083e7 <+2007>: mov %rax,%rbx > 0x000000322ee083ea <+2010>: jmpq 0x322ee082a8 <XInputCopyCookie+1688> > 0x000000322ee083ef <+2015>: nop > 0x000000322ee083f0 <+2016>: test %edx,%edx > 0x000000322ee083f2 <+2018>: jne 0x322ee082a8 <XInputCopyCookie+1688> > 0x000000322ee083f8 <+2024>: movslq 0x8(%rbp),%rax > 0x000000322ee083fc <+2028>: lea 0x0(,%rax,4),%edx > 0x000000322ee08403 <+2035>: test $0x4,%dl > 0x000000322ee08406 <+2038>: je 0x322ee0840e <XInputCopyCookie+2046> > 0x000000322ee08408 <+2040>: and $0xfffffff8,%edx > 0x000000322ee0840b <+2043>: add $0x8,%edx > 0x000000322ee0840e <+2046>: test %rbx,%rbx > 0x000000322ee08411 <+2049>: je 0x322ee084b3 <XInputCopyCookie+2211> > 0x000000322ee08417 <+2055>: mov 0x0(%rbp),%rsi > 0x000000322ee0841b <+2059>: lea 0x18(%rbx),%rdi > 0x000000322ee0841f <+2063>: movslq %edx,%rdx > 0x000000322ee08422 <+2066>: mov %rbx,%r15 > 0x000000322ee08425 <+2069>: mov %rsi,(%rbx) > 0x000000322ee08428 <+2072>: mov 0x8(%rbp),%rsi > 0x000000322ee0842c <+2076>: mov %rsi,0x8(%rbx) > 0x000000322ee08430 <+2080>: mov 0x10(%rbp),%rsi > 0x000000322ee08434 <+2084>: mov %rsi,0x10(%rbx) > 0x000000322ee08438 <+2088>: lea (%rdi,%rdx,1),%rbx > 0x000000322ee0843c <+2092>: mov %rdi,0x10(%r15) > 0x000000322ee08440 <+2096>: lea 0x0(,%rax,4),%rdx > 0x000000322ee08448 <+2104>: mov 0x10(%rbp),%rsi > 0x000000322ee0844c <+2108>: jmpq 0x322ee08377 <XInputCopyCookie+1895> > 0x000000322ee08451 <+2113>: mov 0x0(%rbp),%rax > 0x000000322ee08455 <+2117>: xor %edi,%edi > 0x000000322ee08457 <+2119>: xor %r15d,%r15d > 0x000000322ee0845a <+2122>: mov %rax,0x0 > 0x000000322ee08462 <+2130>: mov 0x8(%rbp),%rax > 0x000000322ee08466 <+2134>: mov %rax,0x8 > 0x000000322ee0846e <+2142>: mov 0x10(%rbp),%rax > 0x000000322ee08472 <+2146>: mov %rax,0x10 > 0x000000322ee0847a <+2154>: mov 0x18(%rbp),%rax > 0x000000322ee0847e <+2158>: movq $0x0,0x20 > 0x000000322ee0848a <+2170>: mov %rax,0x18 > 0x000000322ee08492 <+2178>: movslq 0x18,%rdx > 0x000000322ee0849a <+2186>: mov 0x20(%rbp),%rsi > 0x000000322ee0849e <+2190>: mov %r8,(%rsp) > 0x000000322ee084a2 <+2194>: callq 0x322ee02060 <memcpy@plt> > 0x000000322ee084a7 <+2199>: xor %r9d,%r9d > 0x000000322ee084aa <+2202>: mov (%rsp),%r8 > 0x000000322ee084ae <+2206>: jmpq 0x322ee08364 <XInputCopyCookie+1876> > 0x000000322ee084b3 <+2211>: mov 0x0(%rbp),%rdx > 0x000000322ee084b7 <+2215>: xor %r15d,%r15d > 0x000000322ee084ba <+2218>: xor %edi,%edi > 0x000000322ee084bc <+2220>: mov %rdx,0x0 > 0x000000322ee084c4 <+2228>: mov 0x8(%rbp),%rdx > 0x000000322ee084c8 <+2232>: mov %rdx,0x8 > 0x000000322ee084d0 <+2240>: mov 0x10(%rbp),%rdx > 0x000000322ee084d4 <+2244>: mov %rdx,0x10 > 0x000000322ee084dc <+2252>: jmpq 0x322ee0843c <XInputCopyCookie+2092> > 0x000000322ee084e1 <+2257>: mov 0x80(%r13),%r9d > 0x000000322ee084e8 <+2264>: xor %ecx,%ecx > 0x000000322ee084ea <+2266>: xor %ebx,%ebx > 0x000000322ee084ec <+2268>: add $0xf0,%r9d > 0x000000322ee084f3 <+2275>: jmpq 0x322ee08078 <XInputCopyCookie+1128> > 0x000000322ee084f8 <+2280>: xor %eax,%eax > 0x000000322ee084fa <+2282>: xor %r15d,%r15d > 0x000000322ee084fd <+2285>: xor %r14d,%r14d > 0x000000322ee08500 <+2288>: jmpq 0x322ee07de0 <XInputCopyCookie+464> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 907555
: 692883 |
692884
|
692885
|
692886
|
692887
|
692888
|
692889
|
692890
|
692891
|
692892
|
692893