Comment # 12
on bug 98604
from Dieter Nützel
(In reply to Michel Dänzer from comment #11) > Can you get a backtrace of a crash with gdb? Hello Michel, no backtrace of a crash, but I could attach gdb on running konqueror process. BBC weather side need JAVA. Hope this help, too. /opt/mesa> konqueror & [2] 10181 /opt/mesa> Vector smash protection is enabled. openjdk version "1.8.0_111" OpenJDK Runtime Environment (IcedTea 3.2.0) (suse-33.1-x86_64) OpenJDK 64-Bit Server VM (build 25.111-b14, mixed mode) konqueror(10181)/kio (KIOJob) KIO::TransferJob::slotData: mimeType() not emitted when sending first data!; job URL = "" href="http://s.update.rubiconproject.com/2/873648/analytics.js?si=52926&di=www.bbc.com&ap=&ti=6cada3a9-2f5f-48b1-861f-31fc282cc43f&dt=8736481428691810142000">http://s.update.rubiconproject.com/2/873648/analytics.js?si=52926&di=www.bbc.com&ap=&ti=6cada3a9-2f5f-48b1-861f-31fc282cc43f&dt=8736481428691810142000") data size = 0 konqueror(10181)/kio (KIOJob) KIO::TransferJob::slotData: mimeType() not emitted when sending first data!; job URL = "" href="http://ps.eyeota.net/match/bounce/?bid=i0r4o4v&uid=LAuIY6Hs">http://ps.eyeota.net/match/bounce/?bid=i0r4o4v&uid=LAuIY6Hs") data size = 0 (gdb) bt full #0 0x00007faaa40fe2bd in poll () at ../sysdeps/unix/syscall-template.S:81 #1 0x00007faa9f4a5402 in _xcb_conn_wait () at /usr/lib64/libxcb.so.1 #2 0x00007faa9f4a7209 in xcb_wait_for_special_event () at /usr/lib64/libxcb.so.1 #3 0x00007fa9e961e4a6 in dri3_wait_present_events (scrn=scrn@entry=0x2e2f090) at vl/vl_winsys_dri3.c:183 ev = <optimized out> #4 0x00007fa9e961f3bc in vl_dri3_screen_texture_from_drawable (vscreen=0x2e2f090, drawable=<optimized out>) at vl/vl_winsys_dri3.c:558 scrn = 0x2e2f090 buffer = <optimized out> #5 0x00007fa9e961b119 in vlVdpPresentationQueueDisplay (presentation_queue=<optimized out>, surface=5, clip_width=0, clip_height=0, earliest_presentation_time=0) at presentation.c:234 dump_window = 0 pq = 0x2f0ab60 surf = 0x4198340 pipe = 0x2ef3fe0 tex = <optimized out> surf_templ = {reference = {count = 0}, texture = 0x400000000, context = 0x100000000, format = PIPE_FORMAT_NONE, width = 0, height = 0, writable = 0, u = {tex = {level = 3, first_layer = 0, last_layer = 0}, buf = {first_element = 3, last_element = 0}}} surf_draw = <optimized out> src_rect = {x0 = 1, x1 = 16809983, y0 = 68781024, y1 = 0} dst_clip = {x0 = 68780956, x1 = 0, y0 = 68780992, y1 = 0} dirty_area = <optimized out> compositor = 0x2e2ef48 cstate = 0x2f0ab70 vscreen = 0x2e2f090 #6 0x00007faa2efc37f3 in () at /usr/lib64/browser-plugins/libflashplayer.so #7 0x00007faa2ed522e9 in () at /usr/lib64/browser-plugins/libflashplayer.so #8 0x00007faa2ed524ed in () at /usr/lib64/browser-plugins/libflashplayer.so #9 0x00007faa2ed4fc5c in () at /usr/lib64/browser-plugins/libflashplayer.so #10 0x00007faa2eca69a9 in () at /usr/lib64/browser-plugins/libflashplayer.so #11 0x00007faa2ec2c390 in () at /usr/lib64/browser-plugins/libflashplayer.so #12 0x00007faa2f1c472f in () at /usr/lib64/browser-plugins/libflashplayer.so #13 0x00007faa2f1c57ec in () at /usr/lib64/browser-plugins/libflashplayer.so #14 0x00007faa2f12b191 in () at /usr/lib64/browser-plugins/libflashplayer.so #15 0x000015aebcff63f6 in () #16 0x00000dd1873ddb78 in () #17 0x00000dd1873ddae0 in () #18 0x00001be706c23128 in () #19 0x00001be706c23061 in () #20 0x0000000000000000 in () (gdb) info registers all rax 0xfffffffffffffdfc -516 rbx 0x2f00bb0 49286064 rcx 0x7faaa40fe2bd 140370873672381 rdx 0xffffffff 4294967295 rsi 0x1 1 rdi 0x7fffb0fac080 140736162611328 rbp 0x29b7e60 0x29b7e60 rsp 0x7fffb0fac070 0x7fffb0fac070 r8 0x0 0 r9 0x94 148 r10 0x0 0 r11 0x293 659 r12 0x29b7e78 43744888 r13 0x0 0 r14 0x0 0 r15 0x7fffb0fac080 140736162611328 rip 0x7faaa40fe2bd 0x7faaa40fe2bd <poll+45> eflags 0x293 [ CF AF SF IF ] cs 0x33 51 ss 0x2b 43 ds 0x0 0 es 0x0 0 fs 0x0 0 gs 0x0 0 st0 -nan(0x0fe2b2b2b) (raw 0xffff00000000fe2b2b2b) st1 -nan(0x2c002b002b002b) (raw 0xffff002c002b002b002b) st2 -nan(0xd300d300d300d30) (raw 0xffff0d300d300d300d30) st3 -inf (raw 0xffff0000000000000000) st4 -nan(0x10000ff00ff00ff0) (raw 0xffff10000ff00ff00ff0) st5 -inf (raw 0xffff0000000000000000) st6 0 (raw 0x00000000000000000000) st7 0 (raw 0x00000000000000000000) fctrl 0x37f 895 fstat 0x20 32 ftag 0xffff 65535 fiseg 0x7faa 32682 fioff 0x29bf75ed 700413421 foseg 0x7fff 32767 fooff 0xb0fabb38 -1325745352 fop 0x55c 1372 xmm0 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} xmm1 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} xmm2 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x18, 0x0, 0x1, 0x0, 0x3, 0x43, 0xed, 0x8, 0x48, 0x76, 0x64, 0x2, 0xb1, 0x4, 0x0, 0x0}, v8_int16 = {0x18, 0x1, 0x4303, 0x8ed, 0x7648, 0x264, 0x4b1, 0x0}, v4_int32 = {0x10018, 0x8ed4303, 0x2647648, 0x4b1}, v2_int64 = {0x8ed430300010018, 0x4b102647648}, uint128 = 0x000004b10264764808ed430300010018} xmm3 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x77, 0x0, 0xe0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x1, 0xc4, 0x2, 0xf6, 0x1, 0xc4, 0x2}, v8_int16 = {0x77, 0x5e0, 0x0, 0x0, 0x1f6, 0x2c4, 0x1f6, 0x2c4}, v4_int32 = {0x5e00077, 0x0, 0x2c401f6, 0x2c401f6}, v2_int64 = {0x5e00077, 0x2c401f602c401f6}, uint128 = 0x02c401f602c401f60000000005e00077} xmm4 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x10, 0x0, 0x1, 0x0, 0x1c, 0x0, 0xed, 0x8, 0xb1, 0x4, 0x0, 0x0, 0x72, 0x0, 0x0, 0x0}, v8_int16 = {0x10, 0x1, 0x1c, 0x8ed, 0x4b1, 0x0, 0x72, 0x0}, v4_int32 = {0x10010, 0x8ed001c, 0x4b1, 0x72}, v2_int64 = {0x8ed001c00010010, 0x72000004b1}, uint128 = 0x00000072000004b108ed001c00010010} xmm5 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} xmm6 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} xmm7 {v4_float = {0x1, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0, 0x0, 0x80, 0x3f, 0x0 <repeats 12 times>}, v8_int16 = {0x0, 0x3f80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x3f800000, 0x0, 0x0, 0x0}, v2_int64 = {0x3f800000, 0x0}, uint128 = 0x0000000000000000000000003f800000} xmm8 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} xmm9 {v4_float = {0x1, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0, 0x0, 0x80, 0x3f, 0x0 <repeats 12 times>}, v8_int16 = {0x0, 0x3f80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x3f800000, 0x0, 0x0, 0x0}, v2_int64 = {0x3f800000, 0x0}, uint128 = 0x0000000000000000000000003f800000} xmm10 {v4_float = {0x1, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0, 0x0, 0x80, 0x3f, 0x0 <repeats 12 times>}, v8_int16 = {0x0, 0x3f80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x3f800000, 0x0, 0x0, 0x0}, v2_int64 = {0x3f800000, 0x0}, uint128 = 0x0000000000000000000000003f800000} xmm11 {v4_float = {0x1, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0, 0x0, 0x80, 0x3f, 0x0 <repeats 12 times>}, v8_int16 = {0x0, 0x3f80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x3f800000, 0x0, 0x0, 0x0}, v2_int64 = {0x3f800000, 0x0}, uint128 = 0x0000000000000000000000003f800000} xmm12 {v4_float = {0x1, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0, 0x0, 0x80, 0x3f, 0x0 <repeats 12 times>}, v8_int16 = {0x0, 0x3f80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x3f800000, 0x0, 0x0, 0x0}, v2_int64 = {0x3f800000, 0x0}, uint128 = 0x0000000000000000000000003f800000} xmm13 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} xmm14 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} xmm15 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0}, v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0}, uint128 = 0x00000000000000000000000000000000} mxcsr 0x1fa7 [ IE DE ZE PE IM DM ZM OM UM PM ] After this I have SysRq running KDE desktop: [40631.027856] sysrq: SysRq : SAK [40631.027895] tty tty7: SAK: killed process 24471 (Xorg): by session [40631.028084] tty tty7: SAK: killed process 24471 (Xorg): by controlling tty [40631.028088] tty tty7: SAK: killed process 24472 (radeon_cs:0): by controlling tty [40631.028090] tty tty7: SAK: killed process 24475 (InputThread): by controlling tty
You are receiving this mail because:
- You are the assignee for the bug.
_______________________________________________ dri-devel mailing list dri-devel@xxxxxxxxxxxxxxxxxxxxx https://lists.freedesktop.org/mailman/listinfo/dri-devel