<html>
<head>
<base href="https://bugs.freedesktop.org/" />
</head>
<body>
<p>
<div>
<b><a class="bz_bug_link
bz_status_NEW "
title="NEW --- - [regression?][nv34] adobe flash + firefox -> DATA_ERROR"
href="https://bugs.freedesktop.org/show_bug.cgi?id=73358#c7">Comment # 7</a>
on <a class="bz_bug_link
bz_status_NEW "
title="NEW --- - [regression?][nv34] adobe flash + firefox -> DATA_ERROR"
href="https://bugs.freedesktop.org/show_bug.cgi?id=73358">bug 73358</a>
from <span class="vcard"><a class="email" href="mailto:imirkin@alum.mit.edu" title="Ilia Mirkin <imirkin@alum.mit.edu>"> <span class="fn">Ilia Mirkin</span></a>
</span></b>
<pre>What are 10.3 and 11.1 references to? Flash?
FWIW
subc 7 class 0x0697 mthd 0x0208 data 0x00000120
decodes to
$ lookup -a 34 -d NV01_SUBCHAN -- -v obj-class NV34_3D 208 120
RT_FORMAT => { COLOR = 0 | ZETA = Z16 | TYPE = LINEAR | LOG2_WIDTH = 0 |
LOG2_HEIGHT = 0 }
Based on the fact that COLOR isn't set, something highly illegal is happening.
I don't see any paths that would leave COLOR unset, unless somehow an illegal
format was being used. And since the process in question is plugin-container,
that means that opengl is being used (otherwise you'd see Xorg as the process
or something).
It'd be fantastic if you could get an apitrace of this. I don't know if
apitrace follows exec'd processes, but I hope it does. If not, at the very
least an ltrace may prove useful (restricted to opengl, of course).</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are the assignee for the bug.</li>
</ul>
</body>
</html>