Ticket #10075: lame-5136-debug-08-10-2013-15-19-44.report

File lame-5136-debug-08-10-2013-15-19-44.report, 4.4 KB (added by ttcoder, 6 years ago)

LAME crashes in some termcap-related code

Line 
1Debug information for team /boot/system/cache/tmp/common/bin/lame (5136):
2CPU(s): 2x AMD A4 5300
3Memory: 1.45 Gio total, 289.41 Mio used
4Haiku revision: hrev46188 Oct 8 2013 00:41:05 (BePC)
5
6Active Threads:
7 thread 5137: team 5136 debug task
8 thread 5136: lame (main)
9 state: Exception (Segment violation)
10
11 Frame IP Function Name
12 -----------------------------------------------
13 0x61a1b790 0x8d68b4 _nc_capcmp + 0x38
14 Disassembly:
15 _nc_capcmp:
16 0x008d687c: 55 push %ebp
17 0x008d687d: 89e5 mov %esp, %ebp
18 0x008d687f: 56 push %esi
19 0x008d6880: 53 push %ebx
20 0x008d6881: e800000000 call 0x8d6886
21 0x008d6886: 5b pop %ebx
22 0x008d6887: 81c36aac0100 add $0x1ac6a, %ebx
23 0x008d688d: 8b7508 mov 0x8(%ebp), %esi
24 0x008d6890: 8b4d0c mov 0xc(%ebp), %ecx
25 0x008d6893: 85f6 test %esi, %esi
26 0x008d6895: 750c jnz 0x8d68a3
27 0x008d6897: 85c9 test %ecx, %ecx
28 0x008d6899: 0f848f000000 jz 0x8d692e
29 0x008d689f: 85f6 test %esi, %esi
30 0x008d68a1: 7404 jz 0x8d68a7
31 0x008d68a3: 85c9 test %ecx, %ecx
32 0x008d68a5: 750d jnz 0x8d68b4
33 0x008d68a7: b801000000 mov $0x1, %eax
34 0x008d68ac: e99d000000 jmp 0x8d694e
35 0x008d68b1: 8d7600 lea 0x0(%esi), %esi
36 0x008d68b4: 803e24 cmpb $0x24, (%esi) <--
37
38 Frame memory:
39 [0x61a1b788] ....|..a f0 14 8f 00 7c cd a1 61
40 0x61a1ccf0 0x8d6fa8 postprocess_termcap + 0x5c8
41 0x61a1cd40 0x8d6848 _nc_parse_entry + 0x7a8
42 0x61a1cf80 0x8d31dc _nc_read_entry_source + 0x110
43 0x61a1e770 0x8d241c _nc_read_termcap_entry + 0x270
44 0x61a1eba0 0x8cef64 grab_entry + 0x54
45 0x61a1ebe0 0x8cf40f _nc_setupterm + 0x193
46 0x61a1ec20 0x8cd891 tgetent + 0x21
47 0x61a1f460 0x880a69 apply_termcap_settings + 0x3d
48 0x61a1f4a0 0x880cea frontend_open_console + 0x5e
49 0x61a52720 0x880155 main + 0xf5
50 0x61a52750 0x87ec22 _start + 0x56
51 0x61a52780 0x9f757c runtime_loader + 0x130
52 00000000 0x60894250 commpage_thread_exit + 0
53
54 Registers:
55 eip: 0x008d68b4
56 esp: 0x61a1b788
57 ebp: 0x61a1b790
58 eax: 0xffffffff
59 ebx: 0x008f14f0
60 ecx: 0x008ecbb7
61 edx: 0x01743710
62 esi: 0xffffffff
63 edi: 0x61a1cbe4
64 cs: 0x001b
65 ds: 0x0023
66 es: 0x0023
67 fs: 0x006b
68 gs: 0x0023
69 ss: 0x0023
70
71Loaded Images:
72 ID Text Base Text End Data Base Data End Type Name
73 --------------------------------------------------------------------------------
74 8855 0x0086f000 0x008f1000 0x008f1000 0x0092e000 app /boot/system/cache/tmp/common/bin/lame
75 8854 0x009e8000 0x00a05000 0x00a05000 0x00a08000 lib /boot/system/runtime_loader
76 8856 0x00e1a000 0x00ee0000 0x00ee0000 0x00f2a000 lib /boot/system/lib/libroot.so
77 8853 0x60894000 0x6089c000 0x00000000 0x00000000 system commpage
78
79Areas:
80 ID Base End Size (KiB) Protection Locking Name
81 --------------------------------------------------------------------------------
82 38445 0x004dd000 0x004de000 4 rw-S full _rld_debug_
83 38444 0x0077c000 0x0078c000 64 rw- full rld heap
84 38446 0x0086f000 0x008f1000 520 r-x full lame_seg0ro
85 38447 0x008f1000 0x008fd000 48 rw- full lame_seg1rw
86 38448 0x008fd000 0x0092e000 196 rw- full lame_seg2rw
87 38441 0x009e8000 0x00a05000 116 r-x full runtime_loader_seg0ro
88 38442 0x00a05000 0x00a06000 4 rw- full runtime_loader_seg1rw
89 38443 0x00a06000 0x00a08000 8 rw- full runtime_loader_bss1
90 38449 0x00e1a000 0x00ee0000 792 r-x full libroot.so_seg0ro
91 38450 0x00ee0000 0x00ef2000 72 rw- full libroot.so_seg1rw
92 38451 0x00ef2000 0x00f2a000 224 rw- full libroot.so_seg2rw
93 38452 0x0171b000 0x0191b000 2048 rw- full heap
94 38440 0x60894000 0x6089c000 32 r-xSk full commpage
95 38438 0x60905000 0x60909000 16 rw- full user area
96 38439 0x60a4f000 0x61a55000 16408 rw-s full lame_5136_stack
97
98Protection Flags: r - read, w - write, x - execute, s - stack, o - overcommit, c - cloneable, S - shared, k - kernel
99
100Semaphores:
101 ID Count Last Holder Name
102 ------------------------------------------------------------