Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 941625 Details for
Bug 1147016
[abrt] xscreensaver-gl-extras: intelClear(): dangerball killed by SIGSEGV
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 18.71 KB, created by
jfilipe
on 2014-09-26 15:10:44 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
jfilipe
Created:
2014-09-26 15:10:44 UTC
Size:
18.71 KB
patch
obsolete
>[New LWP 31157] >warning: .dynamic section for "/lib/libGLU.so.1" is not at the expected address (wrong library or version mismatch?) >warning: .dynamic section for "/lib/libXt.so.6" is not at the expected address (wrong library or version mismatch?) >warning: .dynamic section for "/lib/libXmu.so.6" is not at the expected address (wrong library or version mismatch?) >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib/libthread_db.so.1". >Core was generated by `dangerball -window-id 123732020 -delay 30000 -speed 0.05 -count 30'. >Program terminated with signal SIGSEGV, Segmentation fault. >#0 intelClear (ctx=0xb76ea01c, mask=18) at intel_clear.c:155 >155 if (irb->tiling == I915_TILING_Y || tri_mask & BUFFER_BIT_STENCIL) > >Thread 1 (Thread 0xb76e3a00 (LWP 31157)): >#0 intelClear (ctx=0xb76ea01c, mask=18) at intel_clear.c:155 > irb = 0x0 > intel = 0xb76ea01c > colorMask = 4294967295 > tri_mask = 0 > blit_mask = 2 > swrast_mask = 0 > fb = 0xa0febc0 > irb = <optimized out> > i = <optimized out> >#1 0xb7199c3b in _mesa_Clear (mask=<optimized out>) at main/clear.c:201 > bufferMask = 18 > ctx = <optimized out> >#2 0x4b914846 in glClear (mask=mask@entry=16640) at ../../../src/mapi/glapi/glapi_mapi_tmp.h:2882 >No locals. >#3 0x0804b95a in draw_ball (mi=0x9f3dda0) at ../../../hacks/glx/dangerball.c:326 > bp = <optimized out> > dpy = <optimized out> > window = <optimized out> > c2 = <optimized out> > bspec = {1, 1, 1, 1} > sspec = {0, 0, 0, 1} > bcolor = {0, 0, 0, 1} > scolor = {0, 0, 0, 1} >#4 0x0804e0e8 in xlockmore_draw (dpy=0x9f45090, window=123732020, closure=0x9f3dda0) at ../../../hacks/xlockmore.c:488 > mi = 0x9f3dda0 > orig_pause = 30000 > this_pause = 0 >#5 0x0804aac0 in run_screenhack_table (ft=0x805c2a0 <dangerball_xscreensaver_function_table>, window2=0, window=123732020, dpy=0x9f45090) at ../../hacks/screenhack.c:553 > delay = <optimized out> > delay2 = <optimized out> > closure = 0x9f3dda0 > fpst2 = 0x0 > init_cb = <optimized out> > fps_cb = 0x804f690 <xlockmore_gl_compute_fps> > fpst = 0x0 > closure2 = <optimized out> >#6 main (argc=1, argv=0xbfeb1de4) at ../../hacks/screenhack.c:925 > ft = 0x805c2a0 <dangerball_xscreensaver_function_table> > xgwa = {x = 0, y = 0, width = 1280, height = 1024, border_width = 0, depth = 24, visual = 0x9f41418, root = 132, class = 1, bit_gravity = 1, win_gravity = 1, backing_store = 0, backing_planes = 4294967295, backing_pixel = 0, save_under = 0, colormap = 32, map_installed = 1, map_state = 2, all_event_masks = 6479999, your_event_mask = 131073, do_not_propagate_mask = 0, override_redirect = 1, screen = 0x9f44c10} > toplevel = 0x9f55fa8 > dpy = 0x9f45090 > window = 123732020 > window2 = 0 > toplevel2 = <optimized out> > app = 0x9f408f0 > root_p = <optimized out> > on_window = <optimized out> > event = {type = 1252249600, xany = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, window = 4026532034}, xkey = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, window = 4026532034, root = 33060, subwindow = 1, time = 0, x = 0, y = 0, x_root = 0, y_root = 0, state = 0, keycode = 0, same_screen = 1024}, xbutton = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, window = 4026532034, root = 33060, subwindow = 1, time = 0, x = 0, y = 0, x_root = 0, y_root = 0, state = 0, button = 0, same_screen = 1024}, xmotion = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, window = 4026532034, root = 33060, subwindow = 1, time = 0, x = 0, y = 0, x_root = 0, y_root = 0, state = 0, is_hint = 0 '\000', same_screen = 1024}, xcrossing = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, window = 4026532034, root = 33060, subwindow = 1, time = 0, x = 0, y = 0, x_root = 0, y_root = 0, mode = 0, detail = 0, same_screen = 1024, focus = 0, state = 0}, xfocus = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, window = 4026532034, mode = 33060, detail = 1}, xexpose = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, window = 4026532034, x = 33060, y = 1, width = 0, height = 0, count = 0}, xgraphicsexpose = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, drawable = 4026532034, x = 33060, y = 1, width = 0, height = 0, count = 0, major_code = 0, minor_code = 0}, xnoexpose = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, drawable = 4026532034, major_code = 33060, minor_code = 1}, xvisibility = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, window = 4026532034, state = 33060}, xcreatewindow = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, parent = 4026532034, window = 33060, x = 1, y = 0, width = 0, height = 0, border_width = 0, override_redirect = 0}, xdestroywindow = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, event = 4026532034, window = 33060}, xunmap = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, event = 4026532034, window = 33060, from_configure = 1}, xmap = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, event = 4026532034, window = 33060, override_redirect = 1}, xmaprequest = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, parent = 4026532034, window = 33060}, xreparent = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, event = 4026532034, window = 33060, parent = 1, x = 0, y = 0, override_redirect = 0}, xconfigure = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, event = 4026532034, window = 33060, x = 1, y = 0, width = 0, height = 0, border_width = 0, above = 0, override_redirect = 0}, xgravity = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, event = 4026532034, window = 33060, x = 1, y = 0}, xresizerequest = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, window = 4026532034, width = 33060, height = 1}, xconfigurerequest = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, parent = 4026532034, window = 33060, x = 1, y = 0, width = 0, height = 0, border_width = 0, above = 0, detail = 0, value_mask = 0}, xcirculate = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, event = 4026532034, window = 33060, place = 1}, xcirculaterequest = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, parent = 4026532034, window = 33060, place = 1}, xproperty = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, window = 4026532034, atom = 33060, time = 1, state = 0}, xselectionclear = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, window = 4026532034, selection = 33060, time = 1}, xselectionrequest = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, owner = 4026532034, requestor = 33060, selection = 1, target = 0, property = 0, time = 0}, xselection = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, requestor = 4026532034, selection = 33060, target = 1, property = 0, time = 0}, xcolormap = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, window = 4026532034, colormap = 33060, new = 1, state = 0}, xclient = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, window = 4026532034, message_type = 33060, format = 1, data = {b = '\000' <repeats 19 times>, s = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0}, l = {0, 0, 0, 0, 0}}}, xmapping = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, window = 4026532034, request = 33060, first_keycode = 1, count = 0}, xerror = {type = 1252249600, display = 0x3, resourceid = 0, serial = 0, error_code = 194 '\302', request_code = 0 '\000', minor_code = 0 '\000'}, xkeymap = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, window = 4026532034, key_vector = "$\201\000\000\001", '\000' <repeats 26 times>}, xgeneric = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, extension = -268435262, evtype = 33060}, xcookie = {type = 1252249600, serial = 3, send_event = 0, display = 0x0, extension = -268435262, evtype = 33060, cookie = 1, data = 0x0}, pad = {1252249600, 3, 0, 0, -268435262, 33060, 1, 0, 0, 0, 0, 0, 0, 0, 1024, 0, 0, 1411734040, 6559451, 1411734040, 6559451, 1411734040, 6559451, -268435262}} > dont_clear = <optimized out> > version = "DangerBall: from the XScreenSaver 5.29-1.fc20 distribution (09-Jun-2014)\000\000\000\330\034\353\277\252q\216J\000\000\000\000\000\000\000\000\377\377\377\377\000\000\000\000P8\272J\307;\272J\000\000\000\000\000\300\272J\b\320\363\t\000\000\000\000\330\034\353\277\370E\271J\b\320\363\t\330\034\353\277\n\000\000\000\b\320\363\t\000\000\000\000\000\000\000\000b8\272J\324\034\353\277\006\000\000\000p\321\363\tx\000\000\000\000\372\315\250\030\035\353\277\034\035\353\277\031E\271J\330\274\217J\000\300\272J\001"... >From To Syms Read Shared Object Library >0x4b8dd7c0 0x4b9276e4 Yes /lib/libGL.so.1 >0x4e739fc0 0x4e793aa4 Yes /lib/libGLU.so.1 >0x4b87abf0 0x4b87d7a4 Yes /lib/libXxf86vm.so.1 >0x4aa97860 0x4aaa3c80 Yes /lib/libpthread.so.0 >0x4b0414a0 0x4b045a64 Yes /lib/libSM.so.6 >0x4b04e630 0x4b05c3e4 Yes /lib/libICE.so.6 >0x4dc79bc0 0x4dcb74d4 Yes /lib/libXt.so.6 >0x4ae30460 0x4aec0374 Yes /lib/libX11.so.6 >0x4b999960 0x4b9a84f4 Yes /lib/libXmu.so.6 >0x4af5c890 0x4af673b4 Yes /lib/libXext.so.6 >0x4aa47690 0x4aa75cc8 Yes /lib/libm.so.6 >0x4a89a3d0 0x4a9df4ec Yes /lib/libc.so.6 >0x4b9657f0 0x4b978104 Yes /lib/libglapi.so.0 >0x4b94c8b0 0x4b94d274 Yes /lib/libXdamage.so.1 >0x4b00e000 0x4b010324 Yes /lib/libXfixes.so.3 >0x4b875430 0x4b875584 Yes /lib/libX11-xcb.so.1 >0x4b89e150 0x4b8a9374 Yes /lib/libxcb-glx.so.0 >0x4b8b4340 0x4b8b5c94 Yes /lib/libxcb-dri2.so.0 >0x4accaf70 0x4acdd084 Yes /lib/libxcb.so.1 >0x4b8bd6c0 0x4b8c3f64 Yes /lib/libdrm.so.2 >0x4aa8cad0 0x4aa8d9bc Yes /lib/libdl.so.2 >0x4ab8ec70 0x4aba3174 Yes /lib/libselinux.so.1 >0x4ac15790 0x4ac86794 Yes /lib/libstdc++.so.6 >0x4aacb0c0 0x4aae06a4 Yes /lib/libgcc_s.so.1 >0x4a860880 0x4a87923c Yes /lib/ld-linux.so.2 >0x4af78f20 0x4af7ab44 Yes /lib/libuuid.so.1 >0x4acbda70 0x4acbe944 Yes /lib/libXau.so.6 >0x4ab13f80 0x4ab62374 Yes /lib/libpcre.so.1 >0x4aaea2c0 0x4ab040f4 Yes /lib/liblzma.so.5 >0x4b1e0840 0x4b1eaab4 Yes /lib/libudev.so.1 >0x4ab80950 0x4ab83e1c Yes /lib/librt.so.1 >0xb7175d10 0xb758a844 Yes /usr/lib/dri/i915_dri.so >0xb713c140 0xb71514a4 Yes /lib/libdrm_intel.so.1 >0xb7133370 0xb7136c34 Yes /lib/libdrm_nouveau.so.2 >0xb71246b0 0xb712d9c4 Yes /lib/libdrm_radeon.so.1 >0x4b0171b0 0x4b02fc64 Yes /lib/libexpat.so.1 >0x4abba980 0x4abbff74 Yes /lib/libpciaccess.so.0 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >eax 0x0 0 >ecx 0x10 16 >edx 0xa0fedc0 168816064 >ebx 0xb76a2000 -1217781760 >esp 0xbfeb1940 0xbfeb1940 >ebp 0x0 0x0 >esi 0x12 18 >edi 0x2 2 >eip 0xb73e7844 0xb73e7844 <intelClear+436> >eflags 0x10246 [ PF ZF IF RF ] >cs 0x73 115 >ss 0x7b 123 >ds 0x7b 123 >es 0x7b 123 >fs 0x0 0 >gs 0x33 51 >Dump of assembler code for function intelClear: > 0xb73e7690 <+0>: push %ebp > 0xb73e7691 <+1>: push %edi > 0xb73e7692 <+2>: push %esi > 0xb73e7693 <+3>: push %ebx > 0xb73e7694 <+4>: call 0xb7179580 <__x86.get_pc_thunk.bx> > 0xb73e7699 <+9>: add $0x2ba967,%ebx > 0xb73e769f <+15>: lea -0x2c(%esp),%esp > 0xb73e76a3 <+19>: mov 0x40(%esp),%eax > 0xb73e76a7 <+23>: mov 0x44(%esp),%esi > 0xb73e76ab <+27>: test $0x5,%esi > 0xb73e76b1 <+33>: mov 0x1010(%eax),%eax > 0xb73e76b7 <+39>: mov %eax,0x1c(%esp) > 0xb73e76bb <+43>: mov 0x40(%esp),%eax > 0xb73e76bf <+47>: mov 0xc8(%eax),%eax > 0xb73e76c5 <+53>: mov %eax,0x18(%esp) > 0xb73e76c9 <+57>: je 0xb73e76d6 <intelClear+70> > 0xb73e76cb <+59>: mov 0x40(%esp),%eax > 0xb73e76cf <+63>: movb $0x1,0x46898(%eax) > 0xb73e76d6 <+70>: mov 0x18(%esp),%edx > 0xb73e76da <+74>: xor %ecx,%ecx > 0xb73e76dc <+76>: movl $0x0,0x14(%esp) > 0xb73e76e4 <+84>: mov $0x1,%edi > 0xb73e76e9 <+89>: lea 0x0(%esi,%eiz,1),%esi > 0xb73e76f0 <+96>: mov %edi,%eax > 0xb73e76f2 <+98>: shl %cl,%eax > 0xb73e76f4 <+100>: test %esi,%eax > 0xb73e76f6 <+102>: je 0xb73e7713 <intelClear+131> > 0xb73e76f8 <+104>: mov 0x108(%edx),%ebp > 0xb73e76fe <+110>: test %ebp,%ebp > 0xb73e7700 <+112>: je 0xb73e770b <intelClear+123> > 0xb73e7702 <+114>: cmpl $0x12345678,0x18(%ebp) > 0xb73e7709 <+121>: je 0xb73e7713 <intelClear+131> > 0xb73e770b <+123>: or %eax,0x14(%esp) > 0xb73e770f <+127>: not %eax > 0xb73e7711 <+129>: and %eax,%esi > 0xb73e7713 <+131>: add $0x1,%ecx > 0xb73e7716 <+134>: add $0x20,%edx > 0xb73e7719 <+137>: cmp $0x10,%ecx > 0xb73e771c <+140>: jne 0xb73e76f0 <intelClear+96> > 0xb73e771e <+142>: mov 0x14(%esp),%eax > 0xb73e7722 <+146>: test %eax,%eax > 0xb73e7724 <+148>: jne 0xb73e78be <intelClear+558> > 0xb73e772a <+154>: mov %esi,%ebp > 0xb73e772c <+156>: xor %edi,%edi > 0xb73e772e <+158>: and $0xff8f,%ebp > 0xb73e7734 <+164>: cmpl $0xffffffff,0x1c(%esp) > 0xb73e7739 <+169>: je 0xb73e7898 <intelClear+520> > 0xb73e773f <+175>: mov 0x40(%esp),%eax > 0xb73e7743 <+179>: mov %eax,(%esp) > 0xb73e7746 <+182>: call 0xb73f9b10 <old_intel_prepare_render> > 0xb73e774b <+187>: test $0x20,%esi > 0xb73e7751 <+193>: jne 0xb73e7860 <intelClear+464> > 0xb73e7757 <+199>: test $0x10,%esi > 0xb73e775d <+205>: jne 0xb73e7830 <intelClear+416> > 0xb73e7763 <+211>: test $0x30,%esi > 0xb73e7769 <+217>: je 0xb73e7782 <intelClear+242> > 0xb73e776b <+219>: mov %esi,%eax > 0xb73e776d <+221>: mov $0xffffffff,%edx > 0xb73e7772 <+226>: and $0xff8f,%eax > 0xb73e7777 <+231>: bsf %eax,%eax > 0xb73e777a <+234>: cmove %edx,%eax > 0xb73e777d <+237>: add $0x1,%eax > 0xb73e7780 <+240>: jne 0xb73e77a0 <intelClear+272> > 0xb73e7782 <+242>: mov %edi,%ecx > 0xb73e7784 <+244>: not %ecx > 0xb73e7786 <+246>: and %esi,%ecx > 0xb73e7788 <+248>: or %ebp,%ecx > 0xb73e778a <+250>: test %edi,%edi > 0xb73e778c <+252>: jne 0xb73e77c2 <intelClear+306> > 0xb73e778e <+254>: test %ecx,%ecx > 0xb73e7790 <+256>: jne 0xb73e77ed <intelClear+349> > 0xb73e7792 <+258>: lea 0x2c(%esp),%esp > 0xb73e7796 <+262>: pop %ebx > 0xb73e7797 <+263>: pop %esi > 0xb73e7798 <+264>: pop %edi > 0xb73e7799 <+265>: pop %ebp > 0xb73e779a <+266>: ret > 0xb73e779b <+267>: nop > 0xb73e779c <+268>: lea 0x0(%esi,%eiz,1),%esi > 0xb73e77a0 <+272>: mov %eax,%ecx > 0xb73e77a2 <+274>: mov $0x1,%edx > 0xb73e77a7 <+279>: sub $0x1,%ecx > 0xb73e77aa <+282>: shl %cl,%edx > 0xb73e77ac <+284>: mov %edx,%eax > 0xb73e77ae <+286>: not %edx > 0xb73e77b0 <+288>: and %edi,%eax > 0xb73e77b2 <+290>: and %edx,%edi > 0xb73e77b4 <+292>: mov %edi,%ecx > 0xb73e77b6 <+294>: or %eax,%ebp > 0xb73e77b8 <+296>: not %ecx > 0xb73e77ba <+298>: and %esi,%ecx > 0xb73e77bc <+300>: or %ebp,%ecx > 0xb73e77be <+302>: test %edi,%edi > 0xb73e77c0 <+304>: je 0xb73e778e <intelClear+254> > 0xb73e77c2 <+306>: mov %edi,%edx > 0xb73e77c4 <+308>: lea -0x111744(%ebx),%eax > 0xb73e77ca <+314>: mov %ecx,0x14(%esp) > 0xb73e77ce <+318>: call 0xb73e75d0 <debug_mask> > 0xb73e77d3 <+323>: mov 0x40(%esp),%eax > 0xb73e77d7 <+327>: mov %edi,0x4(%esp) > 0xb73e77db <+331>: mov %eax,(%esp) > 0xb73e77de <+334>: call 0xb73eddc0 <old_intelClearWithBlit> > 0xb73e77e3 <+339>: mov 0x14(%esp),%ecx > 0xb73e77e7 <+343>: or %eax,%ecx > 0xb73e77e9 <+345>: test %ecx,%ecx > 0xb73e77eb <+347>: je 0xb73e7792 <intelClear+258> > 0xb73e77ed <+349>: mov %ecx,%edx > 0xb73e77ef <+351>: lea -0xa4782(%ebx),%eax > 0xb73e77f5 <+357>: mov %ecx,0x14(%esp) > 0xb73e77f9 <+361>: call 0xb73e75d0 <debug_mask> > 0xb73e77fe <+366>: mov 0x40(%esp),%eax > 0xb73e7802 <+370>: mov 0x14(%esp),%ecx > 0xb73e7806 <+374>: cmpl $0x1,0x4(%eax) > 0xb73e780a <+378>: mov %ecx,0x4(%esp) > 0xb73e780e <+382>: je 0xb73e78a9 <intelClear+537> > 0xb73e7814 <+388>: mov 0x40(%esp),%eax > 0xb73e7818 <+392>: mov %eax,(%esp) > 0xb73e781b <+395>: call 0xb7325930 <_mesa_meta_glsl_Clear> > 0xb73e7820 <+400>: lea 0x2c(%esp),%esp > 0xb73e7824 <+404>: pop %ebx > 0xb73e7825 <+405>: pop %esi > 0xb73e7826 <+406>: pop %edi > 0xb73e7827 <+407>: pop %ebp > 0xb73e7828 <+408>: ret > 0xb73e7829 <+409>: lea 0x0(%esi,%eiz,1),%esi > 0xb73e7830 <+416>: mov 0x18(%esp),%eax > 0xb73e7834 <+420>: movl $0x4,0x4(%esp) > 0xb73e783c <+428>: mov %eax,(%esp) > 0xb73e783f <+431>: call 0xb74177e0 <old_intel_get_rb_region> >=> 0xb73e7844 <+436>: cmpl $0x2,0x18(%eax) > 0xb73e7848 <+440>: je 0xb73e7852 <intelClear+450> > 0xb73e784a <+442>: test $0x20,%ebp > 0xb73e7850 <+448>: je 0xb73e78a1 <intelClear+529> > 0xb73e7852 <+450>: or $0x10,%ebp > 0xb73e7855 <+453>: jmp 0xb73e7763 <intelClear+211> > 0xb73e785a <+458>: lea 0x0(%esi),%esi > 0xb73e7860 <+464>: mov 0x18(%esp),%eax > 0xb73e7864 <+468>: movl $0x5,0x4(%esp) > 0xb73e786c <+476>: mov %eax,(%esp) > 0xb73e786f <+479>: call 0xb74177e0 <old_intel_get_rb_region> > 0xb73e7874 <+484>: test %eax,%eax > 0xb73e7876 <+486>: je 0xb73e7757 <intelClear+199> > 0xb73e787c <+492>: cmpl $0x2,0x18(%eax) > 0xb73e7880 <+496>: je 0xb73e788f <intelClear+511> > 0xb73e7882 <+498>: mov 0x40(%esp),%eax > 0xb73e7886 <+502>: cmpb $0xff,0x2194(%eax) > 0xb73e788d <+509>: je 0xb73e78b6 <intelClear+550> > 0xb73e788f <+511>: or $0x20,%ebp > 0xb73e7892 <+514>: jmp 0xb73e7757 <intelClear+199> > 0xb73e7897 <+519>: nop > 0xb73e7898 <+520>: mov %ebp,%edi > 0xb73e789a <+522>: xor %ebp,%ebp > 0xb73e789c <+524>: jmp 0xb73e773f <intelClear+175> > 0xb73e78a1 <+529>: or $0x10,%edi > 0xb73e78a4 <+532>: jmp 0xb73e7763 <intelClear+211> > 0xb73e78a9 <+537>: mov %eax,(%esp) > 0xb73e78ac <+540>: call 0xb7325540 <_mesa_meta_Clear> > 0xb73e78b1 <+545>: jmp 0xb73e7792 <intelClear+258> > 0xb73e78b6 <+550>: or $0x20,%edi > 0xb73e78b9 <+553>: jmp 0xb73e7757 <intelClear+199> > 0xb73e78be <+558>: mov 0x14(%esp),%edi > 0xb73e78c2 <+562>: lea -0xc0e7c(%ebx),%eax > 0xb73e78c8 <+568>: mov %edi,%edx > 0xb73e78ca <+570>: call 0xb73e75d0 <debug_mask> > 0xb73e78cf <+575>: mov 0x40(%esp),%eax > 0xb73e78d3 <+579>: mov %edi,0x4(%esp) > 0xb73e78d7 <+583>: mov %eax,(%esp) > 0xb73e78da <+586>: call 0xb72caf40 <_swrast_Clear> > 0xb73e78df <+591>: jmp 0xb73e772a <intelClear+154> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1147016
: 941625 |
941626
|
941627
|
941628
|
941629
|
941630
|
941631
|
941633
|
941634
|
941635
|
941636