[MEncoder-users] scaling segfaulting...
John Doe
jdmls at yahoo.com
Tue Jul 27 17:32:39 CEST 2010
From: Carl Eugen Hoyos <cehoyos at ag.or.at>
> > Since it might be related to this specific video... maybe the easiest would
>be
>
> > to try it?
> > http://www.longtailvideo.com/jw/upload/bunny.ogv
> Works fine with your original command line.
> I you still want help:
> Please use the following to build a new binary:
> make distclean && svn up && ./configure --enable-debug && make
> Then start to remove items from your command line as long as the crash is
>still
> reproducible! Then run your executable with gdb as explained (for ffmpeg, you
> have to use "mencoder" where it says "ffmpeg"/"ffmpeg_g") here:
> http://ffmpeg.org/bugreports.html and post the output of "bt full".
Program received signal SIGSEGV, Segmentation fault.
0x0854a312 in hScale_MMX2 (dst=Cannot access memory at address 0xfffffc48
) at swscale_template.c:2095
2095 __asm__ volatile(
Cannot access memory at address 0xfffffc44
Dump of assembler code from 0x854a2f2 to 0x854a332:
0x0854a2f2 <hScale_MMX2+353>: dec %ebp
0x0854a2f3 <hScale_MMX2+354>: sbb $0xf,%al
0x0854a2f5 <hScale_MMX2+356>: out %eax,(%dx)
0x0854a2f6 <hScale_MMX2+357>: call *-0x77(%ebp)
0x0854a2f9 <hScale_MMX2+360>: lds 0xb6(%ebp),%ecx
0x0854a2ff <hScale_MMX2+366>: add %cl,(%edi)
0x0854a301 <hScale_MMX2+368>: mov $0x4,%bh
0x0854a303 <hScale_MMX2+370>: sub (%edi),%cl
0x0854a305 <hScale_MMX2+372>: mov $0x5c,%bh
0x0854a307 <hScale_MMX2+374>: sub (%edx),%al
0x0854a309 <hScale_MMX2+376>: movq (%ecx,%ebp,8),%mm1
0x0854a30d <hScale_MMX2+380>: movq 0x10(%ecx,%ebp,8),%mm3
0x0854a312 <hScale_MMX2+385>: movd (%esi,%eax,1),%mm0
0x0854a316 <hScale_MMX2+389>: movd (%esi,%ebx,1),%mm2
0x0854a31a <hScale_MMX2+393>: punpcklbw %mm7,%mm0
0x0854a31d <hScale_MMX2+396>: punpcklbw %mm7,%mm2
0x0854a320 <hScale_MMX2+399>: pmaddwd %mm1,%mm0
0x0854a323 <hScale_MMX2+402>: pmaddwd %mm2,%mm3
0x0854a326 <hScale_MMX2+405>: movq 0x8(%ecx,%ebp,8),%mm1
0x0854a32b <hScale_MMX2+410>: movq 0x18(%ecx,%ebp,8),%mm5
0x0854a330 <hScale_MMX2+415>: movd 0x4(%esi,%eax,1),%mm4
End of assembler dump.
eax 0x0 0
ecx 0x93fc2d0 155173584
edx 0x92ab5b0 153793968
ebx 0x0 0
esp 0xbfffdce8 0xbfffdce8
ebp 0xfffffc40 0xfffffc40
esi 0xb7c721c0 -1211686464
edi 0x9419d60 155295072
eip 0x854a312 0x854a312 <hScale_MMX2+385>
eflags 0x210207 [ CF PF IF RF ID ]
cs 0x73 115
ss 0x7b 123
ds 0x7b 123
es 0x7b 123
fs 0x0 0
gs 0x33 51
st0 -nan(0xff7eff7eff7eff7e) (raw 0xffffff7eff7eff7eff7e)
st1 -nan(0xff68fd0a18882b06) (raw 0xffffff68fd0a18882b06)
st2 -nan(0xffc5ffc5ffc5ffc5) (raw 0xffffffc5ffc5ffc5ffc5)
st3 -nan(0x61227bb184ffd10) (raw 0xffff061227bb184ffd10)
st4 -nan(0x4000400040004) (raw 0xffff0004000400040004)
st5 -nan(0xffc5ffc5ffc5ffc5) (raw 0xffffffc5ffc5ffc5ffc5)
st6 -inf (raw 0xffff0000000000000000)
st7 -inf (raw 0xffff0000000000000000)
fctrl 0x37f 895
fstat 0x23 35
ftag 0xaaaa 43690
fiseg 0x73 115
fioff 0x83c919b 138187163
foseg 0x7b 123
fooff 0x90d28f0 151857392
fop 0x1c9 457
xmm0 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0},
v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0,
0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0},
uint128 = 0x00000000000000000000000000000000}
xmm1 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0},
v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0,
0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0},
uint128 = 0x00000000000000000000000000000000}
xmm2 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0},
v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0,
0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0},
uint128 = 0x00000000000000000000000000000000}
xmm3 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0},
v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0,
0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0},
uint128 = 0x00000000000000000000000000000000}
xmm4 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0},
v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0,
0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0},
uint128 = 0x00000000000000000000000000000000}
xmm5 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0},
v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0,
0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0},
uint128 = 0x00000000000000000000000000000000}
xmm6 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0},
v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0,
0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0},
uint128 = 0x00000000000000000000000000000000}
xmm7 {v4_float = {0x0, 0x0, 0x0, 0x0}, v2_double = {0x0, 0x0},
v16_int8 = {0x0 <repeats 16 times>}, v8_int16 = {0x0, 0x0, 0x0, 0x0, 0x0,
0x0, 0x0, 0x0}, v4_int32 = {0x0, 0x0, 0x0, 0x0}, v2_int64 = {0x0, 0x0},
uint128 = 0x00000000000000000000000000000000}
mxcsr 0x1fa0 [ PE IM DM ZM OM UM PM ]
mm0 {uint64 = 0xff7eff7eff7eff7e, v2_int32 = {0xff7eff7e,
0xff7eff7e}, v4_int16 = {0xff7e, 0xff7e, 0xff7e, 0xff7e}, v8_int8 = {0x7e,
0xff, 0x7e, 0xff, 0x7e, 0xff, 0x7e, 0xff}}
mm1 {uint64 = 0xff68fd0a18882b06, v2_int32 = {0x18882b06,
0xff68fd0a}, v4_int16 = {0x2b06, 0x1888, 0xfd0a, 0xff68}, v8_int8 = {0x6,
0x2b, 0x88, 0x18, 0xa, 0xfd, 0x68, 0xff}}
mm2 {uint64 = 0xffc5ffc5ffc5ffc5, v2_int32 = {0xffc5ffc5,
0xffc5ffc5}, v4_int16 = {0xffc5, 0xffc5, 0xffc5, 0xffc5}, v8_int8 = {0xc5,
0xff, 0xc5, 0xff, 0xc5, 0xff, 0xc5, 0xff}}
mm3 {uint64 = 0x61227bb184ffd10, v2_int32 = {0x184ffd10,
0x61227bb}, v4_int16 = {0xfd10, 0x184f, 0x27bb, 0x612}, v8_int8 = {0x10,
0xfd, 0x4f, 0x18, 0xbb, 0x27, 0x12, 0x6}}
mm4 {uint64 = 0x4000400040004, v2_int32 = {0x40004, 0x40004},
v4_int16 = {0x4, 0x4, 0x4, 0x4}, v8_int8 = {0x4, 0x0, 0x4, 0x0, 0x4, 0x0,
0x4, 0x0}}
mm5 {uint64 = 0xffc5ffc5ffc5ffc5, v2_int32 = {0xffc5ffc5,
0xffc5ffc5}, v4_int16 = {0xffc5, 0xffc5, 0xffc5, 0xffc5}, v8_int8 = {0xc5,
0xff, 0xc5, 0xff, 0xc5, 0xff, 0xc5, 0xff}}
mm6 {uint64 = 0x0, v2_int32 = {0x0, 0x0}, v4_int16 = {0x0, 0x0,
0x0, 0x0}, v8_int8 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}
mm7 {uint64 = 0x0, v2_int32 = {0x0, 0x0}, v4_int16 = {0x0, 0x0,
0x0, 0x0}, v8_int8 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}
$ cat /proc/cpuinfo
processor : 0
vendor_id : GenuineIntel
cpu family : 15
model : 4
model name : Intel(R) Xeon(TM) CPU 3.00GHz
stepping : 1
cpu MHz : 2800.320
cache size : 1024 KB
physical id : 0
siblings : 2
core id : 0
cpu cores : 1
apicid : 0
fdiv_bug : no
hlt_bug : no
f00f_bug : no
coma_bug : no
fpu : yes
fpu_exception : yes
cpuid level : 5
wp : yes
flags : fpu vme de pse tsc msr pae mce cx8 apic mtrr pge mca cmov pat
pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe lm constant_tsc pni
monitor ds_cpl cid cx16 xtpr
bogomips : 5600.64
processor : 1
vendor_id : GenuineIntel
cpu family : 15
model : 4
model name : Intel(R) Xeon(TM) CPU 3.00GHz
stepping : 1
cpu MHz : 2800.320
cache size : 1024 KB
physical id : 0
siblings : 2
core id : 0
cpu cores : 1
apicid : 1
fdiv_bug : no
hlt_bug : no
f00f_bug : no
coma_bug : no
fpu : yes
fpu_exception : yes
cpuid level : 5
wp : yes
flags : fpu vme de pse tsc msr pae mce cx8 apic mtrr pge mca cmov pat
pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe lm constant_tsc pni
monitor ds_cpl cid cx16 xtpr
bogomips : 5599.45
Thx,
JD
More information about the MEncoder-users
mailing list