1 | Debug information for team /BeOS 5 Pro Edition/beos/apps/Chart (918):
|
---|
2 | CPU(s): 8x AMD FX-Series
|
---|
3 | Memory: 15.95 GiB total, 512.54 MiB used
|
---|
4 | Haiku revision: hrev46660 Jan 11 2014 19:28:48 (BePC)
|
---|
5 |
|
---|
6 | Active Threads:
|
---|
7 | thread 919: team 918 debug task
|
---|
8 | thread 918: Chart (main)
|
---|
9 | state: Exception (Segment violation)
|
---|
10 |
|
---|
11 | Frame IP Function Name
|
---|
12 | -----------------------------------------------
|
---|
13 | 0x72f7f920 0xb30735 find_symbol(image_t*, SymbolLookupInfo&) + 0x65
|
---|
14 | Disassembly:
|
---|
15 | find_symbol(image_t*, SymbolLookupInfo&):
|
---|
16 | 0x00b306d0: 55 push %ebp
|
---|
17 | 0x00b306d1: 89e5 mov %esp, %ebp
|
---|
18 | 0x00b306d3: 83ec1c sub $0x1c, %esp
|
---|
19 | 0x00b306d6: 57 push %edi
|
---|
20 | 0x00b306d7: 56 push %esi
|
---|
21 | 0x00b306d8: 53 push %ebx
|
---|
22 | 0x00b306d9: e800000000 call 0xb306de
|
---|
23 | 0x00b306de: 5b pop %ebx
|
---|
24 | 0x00b306df: 81c3821d0100 add $0x11d82, %ebx
|
---|
25 | 0x00b306e5: 8b4508 mov 0x8(%ebp), %eax
|
---|
26 | 0x00b306e8: 83b84c04000000 cmp $0x0, 0x44c(%eax)
|
---|
27 | 0x00b306ef: 7507 jnz 0xb306f8
|
---|
28 | 0x00b306f1: 31c0 xor %eax, %eax
|
---|
29 | 0x00b306f3: e9a4010000 jmp 0xb3089c
|
---|
30 | 0x00b306f8: c745fc00000000 mov $0x0, -0x4(%ebp)
|
---|
31 | 0x00b306ff: c745f800000000 mov $0x0, -0x8(%ebp)
|
---|
32 | 0x00b30706: 8b5508 mov 0x8(%ebp), %edx
|
---|
33 | 0x00b30709: 8bb250040000 mov 0x450(%edx), %esi
|
---|
34 | 0x00b3070f: 8b4d0c mov 0xc(%ebp), %ecx
|
---|
35 | 0x00b30712: 8b5108 mov 0x8(%ecx), %edx
|
---|
36 | 0x00b30715: 89d0 mov %edx, %eax
|
---|
37 | 0x00b30717: 31d2 xor %edx, %edx
|
---|
38 | 0x00b30719: f736 div (%esi)
|
---|
39 | 0x00b3071b: 8b549608 mov 0x8(%esi,%edx,4), %edx
|
---|
40 | 0x00b3071f: e962010000 jmp 0xb30886
|
---|
41 | 0x00b30724: 8b45f4 mov -0xc(%ebp), %eax
|
---|
42 | 0x00b30727: c1e004 shl $0x4, %eax
|
---|
43 | 0x00b3072a: 89c7 mov %eax, %edi
|
---|
44 | 0x00b3072c: 8b5508 mov 0x8(%ebp), %edx
|
---|
45 | 0x00b3072f: 03ba54040000 add 0x454(%edx), %edi
|
---|
46 | 0x00b30735: 66837f0e00 cmpw $0x0, 0xe(%edi) <--
|
---|
47 |
|
---|
48 | Frame memory:
|
---|
49 | [0x72f7f8f8] `$..X..r..P.F%.. 60 24 b4 00 58 f9 f7 72 04 b0 50 00 46 25 b3 00
|
---|
50 | [0x72f7f908] `..rX..r....L... 60 f9 f7 72 58 f9 f7 72 01 00 00 00 4c 00 00 00
|
---|
51 | [0x72f7f918] ........ 00 00 00 00 00 00 00 00
|
---|
52 | 0x72f7f970 0xb2f528 analyze_image_haiku_version_and_abi(int32, image_t*, Elf32_Ehdr&, int32, char*, uint32) + 0x54
|
---|
53 | 0x72f80e00 0xb30468 load_image(char*, image_type, char*, char*, image_t*) + 0x5c8
|
---|
54 | 0x72f80e60 0xb2e04c load_program + 0x40
|
---|
55 | 0x72f80e90 0xb33ee5 runtime_loader + 0x101
|
---|
56 | 00000000 0x606c7250 commpage_thread_exit + 0
|
---|
57 |
|
---|
58 | Registers:
|
---|
59 | eip: 0x00b30735
|
---|
60 | esp: 0x72f7f8f8
|
---|
61 | ebp: 0x72f7f920
|
---|
62 | eax: 0x000004c0
|
---|
63 | ebx: 0x00b42460
|
---|
64 | ecx: 0x72f7f958
|
---|
65 | edx: 0x0050b004
|
---|
66 | esi: 0x01786094
|
---|
67 | edi: 0x017870b8
|
---|
68 | cs: 0x001b
|
---|
69 | ds: 0x0023
|
---|
70 | es: 0x0023
|
---|
71 | fs: 0x00e3
|
---|
72 | gs: 0x0023
|
---|
73 | ss: 0x0023
|
---|
74 |
|
---|
75 | Loaded Images:
|
---|
76 | ID Text Base Text End Data Base Data End Type Name
|
---|
77 | --------------------------------------------------------------------------------
|
---|
78 | 3807 0x00b24000 0x00b41000 0x00b41000 0x00b44000 lib /boot/system/runtime_loader
|
---|
79 | 3806 0x606c7000 0x606cf000 0x00000000 0x00000000 system commpage
|
---|
80 |
|
---|
81 | Areas:
|
---|
82 | ID Base End Size (KiB) Protection Locking Name
|
---|
83 | --------------------------------------------------------------------------------
|
---|
84 | 11465 0x00357000 0x00358000 4 rw-S full _rld_debug_
|
---|
85 | 11464 0x0050b000 0x0051b000 64 rw- full rld heap
|
---|
86 | 11461 0x00b24000 0x00b41000 116 r-x full runtime_loader_seg0ro
|
---|
87 | 11462 0x00b41000 0x00b43000 8 rw- full runtime_loader_seg1rw
|
---|
88 | 11463 0x00b43000 0x00b44000 4 rw- full runtime_loader_bss1
|
---|
89 | 11466 0x01786000 0x0179d000 92 rw-rw- full Chart_seg0ro
|
---|
90 | 11467 0x0179d000 0x017a1000 16 rw- full Chart_seg1rw
|
---|
91 | 11468 0x017a1000 0x017a4000 12 rw- full Chart_seg2rw
|
---|
92 | 11460 0x606c7000 0x606cf000 32 r-xSk full commpage
|
---|
93 | 11457 0x60783000 0x60787000 16 rw- full user area
|
---|
94 | 11459 0x71f81000 0x72f82000 16388 rw-s full Chart_918_stack
|
---|
95 |
|
---|
96 | Protection Flags: r - read, w - write, x - execute, s - stack, o - overcommit, c - cloneable, S - shared, k - kernel
|
---|
97 |
|
---|
98 | Semaphores:
|
---|
99 | ID Count Last Holder Name
|
---|
100 | ------------------------------------------------------------
|
---|