Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 929516 Details for
Bug 1132923
[abrt] xorg-x11-server-Xorg: OsAbort(): Xorg.bin killed by SIGABRT
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 14.78 KB, created by
Stefan Ringel
on 2014-08-22 10:32:37 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Stefan Ringel
Created:
2014-08-22 10:32:37 UTC
Size:
14.78 KB
patch
obsolete
>[New LWP 1156] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `/usr/libexec/Xorg.bin :0 -background none -noreset -verbose 3 -logfile /dev/nul'. >Program terminated with signal SIGABRT, Aborted. >#0 0x0000003a8b435cc7 in raise () from /lib64/libc.so.6 > >Thread 1 (Thread 0x7fecf29929c0 (LWP 1156)): >#0 0x0000003a8b435cc7 in raise () from /lib64/libc.so.6 >No symbol table info available. >#1 0x0000003a8b43792a in abort () from /lib64/libc.so.6 >No symbol table info available. >#2 0x000000000059e2be in OsAbort () >No symbol table info available. >#3 0x0000000000479ddc in ddxGiveUp () >No symbol table info available. >#4 0x00000000005a3c52 in AbortServer () >No symbol table info available. >#5 0x00000000005a4abd in FatalError () >No symbol table info available. >#6 0x000000000059bc0c in OsSigHandler () >No symbol table info available. >#7 <signal handler called> >No symbol table info available. >#8 0x0000003a8b49eab0 in __memcpy_sse2_unaligned () from /lib64/libc.so.6 >No symbol table info available. >#9 0x00007fecf12ca4ee in exaMemcpyBox.isra.2 () from /usr/lib64/xorg/modules/libexa.so >No symbol table info available. >#10 0x00007fecf12ca9b3 in exaCopyDirty () from /usr/lib64/xorg/modules/libexa.so >No symbol table info available. >#11 0x00007fecf12cd02f in exaPrepareAccessReg_mixed () from /usr/lib64/xorg/modules/libexa.so >No symbol table info available. >#12 0x00007fecf12d6bab in ExaCheckComposite () from /usr/lib64/xorg/modules/libexa.so >No symbol table info available. >#13 0x00007fecf12d396d in exaComposite () from /usr/lib64/xorg/modules/libexa.so >No symbol table info available. >#14 0x00007fecf12d3df3 in exaComposite () from /usr/lib64/xorg/modules/libexa.so >No symbol table info available. >#15 0x000000000051e684 in damageComposite () >No symbol table info available. >#16 0x00007fecf12d13b1 in exaGlyphs () from /usr/lib64/xorg/modules/libexa.so >No symbol table info available. >#17 0x000000000051e925 in damageGlyphs () >No symbol table info available. >#18 0x0000000000514907 in ProcRenderCompositeGlyphs () >No symbol table info available. >#19 0x0000000000438fe7 in Dispatch () >No symbol table info available. >#20 0x000000000043d176 in dix_main () >No symbol table info available. >#21 0x0000003a8b4200e0 in __libc_start_main () from /lib64/libc.so.6 >No symbol table info available. >#22 0x000000000042761e in _start () >No symbol table info available. >From To Syms Read Shared Object Library >0x0000003a9da07920 0x0000003a9da32094 Yes (*) /lib64/libdbus-1.so.3 >0x0000003c15003990 0x0000003c1500afaa Yes (*) /lib64/libudev.so.1 >0x0000003a8d006500 0x0000003a8d01952b Yes (*) /lib64/libselinux.so.1 >0x0000003a9c467ec0 0x0000003a9c55a1df Yes (*) /lib64/libcrypto.so.10 >0x0000003a8bc00ed0 0x0000003a8bc01ade Yes (*) /lib64/libdl.so.2 >0x0000003a8e8015a0 0x0000003a8e808007 Yes (*) /lib64/libunwind.so.8 >0x0000003a8f802340 0x0000003a8f806845 Yes (*) /lib64/libpciaccess.so.0 >0x0000003a91c03210 0x0000003a91c08b28 Yes (*) /lib64/libdrm.so.2 >0x0000003a9c80a370 0x0000003a9c894050 Yes (*) /lib64/libpixman-1.so.0 >0x0000003a8e008ef0 0x0000003a8e02722f Yes (*) /lib64/libXfont.so.1 >0x0000003a90000ec0 0x0000003a90001bf9 Yes (*) /lib64/libXau.so.6 >0x0000003c18805070 0x0000003c1881b0af Yes (*) /lib64/libsystemd.so.0 >0x0000003a97800990 0x0000003a97800c4c Yes (*) /lib64/libxshmfence.so.1 >0x0000003a8f401390 0x0000003a8f402ce8 Yes (*) /lib64/libXdmcp.so.6 >0x0000003a8ec02970 0x0000003a8ec08174 Yes (*) /lib64/libaudit.so.1 >0x0000003a8c405610 0x0000003a8c476d01 Yes (*) /lib64/libm.so.6 >0x0000003a8b41f4f0 0x0000003a8b56fc94 Yes (*) /lib64/libc.so.6 >0x0000003a8b805ac0 0x0000003a8b8125c1 Yes (*) /lib64/libpthread.so.0 >0x0000003a8dc022f0 0x0000003a8dc055b7 Yes (*) /lib64/librt.so.1 >0x0000003c15e09420 0x0000003c15e348f0 Yes (*) /lib64/libdw.so.1 >0x0000003a8d402af0 0x0000003a8d4129d5 Yes (*) /lib64/libgcc_s.so.1 >0x0000003a8cc016f0 0x0000003a8cc4f7a5 Yes (*) /lib64/libpcre.so.1 >0x0000003a8c802f30 0x0000003a8c818d72 Yes (*) /lib64/liblzma.so.5 >0x0000003a8b000b10 0x0000003a8b01c7a0 Yes (*) /lib64/ld-linux-x86-64.so.2 >0x0000003a8c002200 0x0000003a8c00e729 Yes (*) /lib64/libz.so.1 >0x0000003a9100eea0 0x0000003a9107d5a2 Yes (*) /lib64/libfreetype.so.6 >0x0000003a8d801650 0x0000003a8d803582 Yes (*) /lib64/libfontenc.so.1 >0x0000003a9e208600 0x0000003a9e2a8d48 Yes (*) /lib64/libgcrypt.so.20 >0x0000003a9de00db0 0x0000003a9de015f5 Yes (*) /lib64/libgpg-error.so.0 >0x0000003a8f003a90 0x0000003a8f013171 Yes (*) /lib64/libresolv.so.2 >0x0000003c15a02ae0 0x0000003c15a10a6a Yes (*) /lib64/libelf.so.1 >0x0000003a8e401760 0x0000003a8e40d462 Yes (*) /lib64/libbz2.so.1 >0x0000003a90405500 0x0000003a90426d87 Yes (*) /lib64/libpng16.so.16 >0x00007fecf26ce810 0x00007fecf26ef194 Yes (*) /usr/lib64/xorg/modules/extensions/libglx.so >0x0000003a9201a060 0x0000003a92076ef2 Yes (*) /lib64/libGL.so.1 >0x0000003a90c03e00 0x0000003a90c1c249 Yes (*) /lib64/libexpat.so.1 >0x0000003a96809900 0x0000003a9681332e Yes (*) /lib64/libglapi.so.0 >0x0000003a90803770 0x0000003a9080d54f Yes (*) /lib64/libXext.so.6 >0x0000003a96400c40 0x0000003a9640156b Yes (*) /lib64/libXdamage.so.1 >0x0000003a918015f0 0x0000003a91803926 Yes (*) /lib64/libXfixes.so.3 >0x0000003a95c00600 0x0000003a95c0071b Yes (*) /lib64/libX11-xcb.so.1 >0x00007fecf2377fd0 0x00007fecf240061c Yes (*) /lib64/libX11.so.6 >0x0000003a9520a020 0x0000003a95211bb5 Yes (*) /lib64/libxcb-glx.so.0 >0x0000003a92401920 0x0000003a92402a45 Yes (*) /lib64/libxcb-dri2.so.0 >0x0000003a97400d50 0x0000003a974014f3 Yes (*) /lib64/libxcb-dri3.so.0 >0x0000003a94e00c50 0x0000003a94e01428 Yes (*) /lib64/libxcb-present.so.0 >0x0000003a92c02060 0x0000003a92c03fc9 Yes (*) /lib64/libxcb-sync.so.1 >0x0000003a8fc09bd0 0x0000003a8fc181d5 Yes (*) /lib64/libxcb.so.1 >0x0000003a91401010 0x0000003a914039a8 Yes (*) /lib64/libXxf86vm.so.1 >0x00007fecf212dbe0 0x00007fecf214f057 Yes (*) /usr/lib64/xorg/modules/drivers/nouveau_drv.so >0x00007fecf1f22a70 0x00007fecf1f25a0d Yes (*) /lib64/libdrm_nouveau.so.2 >0x00007fecf14e2800 0x00007fecf14fcb42 Yes (*) /usr/lib64/xorg/modules/libfb.so >0x00007fecf12c7360 0x00007fecf12d7192 Yes (*) /usr/lib64/xorg/modules/libexa.so >0x00007fecf10c2980 0x00007fecf10c2daa Yes (*) /usr/lib64/xorg/modules/libshadowfb.so >0x00007fecf059b4a0 0x00007fecf0af7619 Yes (*) /usr/lib64/dri/nouveau_dri.so >0x00007fecf1ca5ec0 0x00007fecf1cae454 Yes (*) /lib64/libdrm_radeon.so.1 >0x00007fecf1a9d870 0x00007fecf1aa1fbc Yes (*) /lib64/libffi.so.6 >0x0000003aa320ce40 0x0000003aa3218fb8 Yes (*) /lib64/libtinfo.so.5 >0x00007feceed89d50 0x00007fecefb549ff Yes (*) /usr/lib64/llvm/libLLVM-3.4.so >0x00007fecf17e89b0 0x00007fecf185514f Yes (*) /lib64/libstdc++.so.6 >0x00007fecee8bb750 0x00007fecee8c216d Yes (*) /usr/lib64/xorg/modules/input/evdev_drv.so >0x0000003ab8c00ff0 0x0000003ab8c035a1 Yes (*) /lib64/libmtdev.so.1 >0x0000003ab8009eb0 0x0000003ab800f156 Yes (*) /lib64/libevdev.so.2 >0x00007fecee6ad290 0x00007fecee6b43e3 Yes (*) /lib64/libnss_files.so.2 >0x00007fecee4a3820 0x00007fecee4a7cfd Yes (*) /lib64/libnss_sss.so.2 >(*): Shared library is missing debugging information. >$1 = 0x0 >No symbol table is loaded. Use the "file" command. >rax 0x0 0 >rbx 0x1 1 >rcx 0xffffffffffffffff -1 >rdx 0x6 6 >rsi 0x484 1156 >rdi 0x484 1156 >rbp 0x7fff3def7170 0x7fff3def7170 >rsp 0x7fff3def6fe8 0x7fff3def6fe8 >r8 0x7fecf29929c0 140655659133376 >r9 0xc25dc0 12737984 >r10 0x8 8 >r11 0x3206 12806 >r12 0x17cc 6092 >r13 0x1800 6144 >r14 0x0 0 >r15 0x0 0 >rip 0x3a8b435cc7 0x3a8b435cc7 <raise+55> >eflags 0x3206 [ PF IF #12 #13 ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >st0 0 (raw 0x00000000000000000000) >st1 0 (raw 0x00000000000000000000) >st2 0 (raw 0x00000000000000000000) >st3 0 (raw 0x00000000000000000000) >st4 0 (raw 0x00000000000000000000) >st5 0 (raw 0x00000000000000000000) >st6 0 (raw 0x00000000000000000000) >st7 0 (raw 0x00000000000000000000) >fctrl 0x37f 895 >fstat 0x0 0 >ftag 0xffff 65535 >fiseg 0x0 0 >fioff 0x0 0 >foseg 0x0 0 >fooff 0x0 0 >fop 0x0 0 >xmm0 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0, 0x0, 0xff, 0xff, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int16 = {0x0, 0xffff, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0xffff0000, 0xff0000, 0x0, 0x0}, v2_int64 = {0xff0000ffff0000, 0x0}, uint128 = 0x000000000000000000ff0000ffff0000} >xmm1 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x25 <repeats 16 times>}, v8_int16 = {0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525, 0x2525}, v4_int32 = {0x25252525, 0x25252525, 0x25252525, 0x25252525}, v2_int64 = {0x2525252525252525, 0x2525252525252525}, uint128 = 0x25252525252525252525252525252525} >xmm2 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0, 0x0, 0x0, 0x0, 0xff, 0xff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int16 = {0x0, 0x0, 0xffff, 0x0, 0x0, 0x1, 0x0, 0x0}, v4_int32 = {0x0, 0xffff, 0x10000, 0x0}, v2_int64 = {0xffff00000000, 0x10000}, uint128 = 0x00000000000100000000ffff00000000} >xmm3 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm4 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int16 = {0x0, 0xff, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0xff0000, 0xff0000, 0x0, 0x0}, v2_int64 = {0xff000000ff0000, 0x0}, uint128 = 0x000000000000000000ff000000ff0000} >xmm5 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm6 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm7 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm8 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm9 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm10 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm11 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm12 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xff, 0x0}, v8_int16 = {0xff00, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0xff}, v4_int32 = {0xff00, 0x0, 0xff0000, 0xff0000}, v2_int64 = {0xff00, 0xff000000ff0000}, uint128 = 0x00ff000000ff0000000000000000ff00} >xmm13 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm14 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >xmm15 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} >mxcsr 0x1fa0 [ PE IM DM ZM OM UM PM ] >Dump of assembler code for function raise: > 0x0000003a8b435c90 <+0>: mov %fs:0x2d4,%ecx > 0x0000003a8b435c98 <+8>: mov %fs:0x2d0,%esi > 0x0000003a8b435ca0 <+16>: test %esi,%esi > 0x0000003a8b435ca2 <+18>: jne 0x3a8b435cd8 <raise+72> > 0x0000003a8b435ca4 <+20>: mov $0xba,%eax > 0x0000003a8b435ca9 <+25>: syscall > 0x0000003a8b435cab <+27>: mov %eax,%ecx > 0x0000003a8b435cad <+29>: mov %eax,%fs:0x2d0 > 0x0000003a8b435cb5 <+37>: mov %eax,%esi > 0x0000003a8b435cb7 <+39>: movslq %edi,%rdx > 0x0000003a8b435cba <+42>: movslq %esi,%rsi > 0x0000003a8b435cbd <+45>: movslq %ecx,%rdi > 0x0000003a8b435cc0 <+48>: mov $0xea,%eax > 0x0000003a8b435cc5 <+53>: syscall >=> 0x0000003a8b435cc7 <+55>: cmp $0xfffffffffffff000,%rax > 0x0000003a8b435ccd <+61>: ja 0x3a8b435cf0 <raise+96> > 0x0000003a8b435ccf <+63>: repz retq > 0x0000003a8b435cd1 <+65>: nopl 0x0(%rax) > 0x0000003a8b435cd8 <+72>: test %ecx,%ecx > 0x0000003a8b435cda <+74>: jg 0x3a8b435cb7 <raise+39> > 0x0000003a8b435cdc <+76>: mov %ecx,%edx > 0x0000003a8b435cde <+78>: neg %edx > 0x0000003a8b435ce0 <+80>: and $0x7fffffff,%ecx > 0x0000003a8b435ce6 <+86>: cmove %esi,%edx > 0x0000003a8b435ce9 <+89>: mov %edx,%ecx > 0x0000003a8b435ceb <+91>: jmp 0x3a8b435cb7 <raise+39> > 0x0000003a8b435ced <+93>: nopl (%rax) > 0x0000003a8b435cf0 <+96>: mov 0x38b149(%rip),%rdx # 0x3a8b7c0e40 > 0x0000003a8b435cf7 <+103>: neg %eax > 0x0000003a8b435cf9 <+105>: mov %eax,%fs:(%rdx) > 0x0000003a8b435cfc <+108>: mov $0xffffffff,%eax > 0x0000003a8b435d01 <+113>: retq >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1132923
: 929516 |
929517
|
929518
|
929519
|
929520
|
929521
|
929522
|
929523
|
929524