Ticket #10279: bash-52196-debug-16-12-2013-04-16-50.report

File bash-52196-debug-16-12-2013-04-16-50.report, 6.7 KB (added by kallisti5, 8 years ago)
Line 
1Debug information for team /boot/system/bin/bash (52196):
2CPU(s): 8x AMD FX-Series
3Memory: 15.95 GiB total, 737.09 MiB used
4Haiku revision: hrev46545 Dec 15 2013 07:21:27 (BePC)
5
6Active Threads:
7 thread 52207: team 52196 debug task
8 thread 52196: sh (main)
9 state: Exception (Invalid opcode exception)
10
11 Frame IP Function Name
12 -----------------------------------------------
13 0x7271c580 0x196c10e copy_word_list + 0x16
14 Disassembly:
15 copy_word_list:
16 0x0196c0f8: 55 push %ebp
17 0x0196c0f9: 89e5 mov %esp, %ebp
18 0x0196c0fb: 83ec10 sub $0x10, %esp
19 0x0196c0fe: 56 push %esi
20 0x0196c0ff: 53 push %ebx
21 0x0196c100: e800000000 call 0x196c105
22 0x0196c105: 5b pop %ebx
23 0x0196c106: 81c333ef0800 add $0x8ef33, %ebx
24 0x0196c10c: 8b7508 mov 0x8(%ebp), %esi <--
25
26 Frame memory:
27 [0x7271c544] .........l...... 15 ae 97 01 00 95 08 18 b0 6c 01 18 0d 00 00 00
28 [0x7271c554] ....8........0.. f2 ad 97 01 38 b0 9f 01 ff ff ff ff 1d 30 04 18
29 [0x7271c564] l...8....U....qr 6c bb 95 01 38 b0 9f 01 d0 55 07 18 a0 c5 71 72
30 [0x7271c574] "...#..."... 22 00 00 00 23 00 00 00 22 00 00 00
31 0x7271c5b0 0x197a7c4 expand_words + 0x1c
32 0x7271c600 0x1962634 execute_simple_command + 0x2c8
33 0x7271c660 0x195e5c1 execute_command_internal + 0x62d
34 0x7271c6b0 0x19602de execute_connection + 0x1f2
35 0x7271c710 0x195e877 execute_command_internal + 0x8e3
36 0x7271c760 0x195ddb1 execute_command + 0x5d
37 0x7271c7a0 0x196028e execute_connection + 0x1a2
38 0x7271c800 0x195e877 execute_command_internal + 0x8e3
39 0x7271c850 0x195ddb1 execute_command + 0x5d
40 0x7271c890 0x196028e execute_connection + 0x1a2
41 0x7271c8f0 0x195e877 execute_command_internal + 0x8e3
42 0x7271c940 0x195ddb1 execute_command + 0x5d
43 0x7271c970 0x1961ac8 execute_if_command + 0xd8
44 0x7271c9c0 0x195e7eb execute_command_internal + 0x857
45 0x7271ca10 0x19602de execute_connection + 0x1f2
46 0x7271ca70 0x195e877 execute_command_internal + 0x8e3
47 0x7271cad0 0x195e858 execute_command_internal + 0x8c4
48 0x7271cb30 0x1963467 execute_function + 0x55b
49 0x7271cb70 0x19638cc execute_builtin_or_function + 0xf0
50 0x7271cbd0 0x1962ad5 execute_simple_command + 0x769
51 0x7271cc30 0x195e5c1 execute_command_internal + 0x62d
52 0x7271cc80 0x19602de execute_connection + 0x1f2
53 0x7271cce0 0x195e877 execute_command_internal + 0x8e3
54 0x7271cd30 0x195ddb1 execute_command + 0x5d
55 0x7271cd70 0x196028e execute_connection + 0x1a2
56 0x7271cdd0 0x195e877 execute_command_internal + 0x8e3
57 0x7271ce20 0x195ddb1 execute_command + 0x5d
58 0x7271ce60 0x196028e execute_connection + 0x1a2
59 0x7271cec0 0x195e877 execute_command_internal + 0x8e3
60 0x7271cf10 0x195ddb1 execute_command + 0x5d
61 0x7271cf50 0x196028e execute_connection + 0x1a2
62 0x7271cfb0 0x195e877 execute_command_internal + 0x8e3
63 0x7271d000 0x195ddb1 execute_command + 0x5d
64 0x7271d030 0x1961ac8 execute_if_command + 0xd8
65 0x7271d080 0x195e7eb execute_command_internal + 0x857
66 0x7271d0d0 0x19602de execute_connection + 0x1f2
67 0x7271d130 0x195e877 execute_command_internal + 0x8e3
68 0x7271d180 0x195ddb1 execute_command + 0x5d
69 0x7271d1c0 0x196028e execute_connection + 0x1a2
70 0x7271d220 0x195e877 execute_command_internal + 0x8e3
71 0x7271d270 0x195ddb1 execute_command + 0x5d
72 0x7271d2b0 0x196028e execute_connection + 0x1a2
73 0x7271d310 0x195e877 execute_command_internal + 0x8e3
74 0x7271d360 0x195ddb1 execute_command + 0x5d
75 0x7271d3a0 0x196028e execute_connection + 0x1a2
76 0x7271d400 0x195e877 execute_command_internal + 0x8e3
77 0x7271d460 0x195e858 execute_command_internal + 0x8c4
78 0x7271d4c0 0x1963467 execute_function + 0x55b
79 0x7271d500 0x19638cc execute_builtin_or_function + 0xf0
80 0x7271d560 0x1962ad5 execute_simple_command + 0x769
81 0x7271d5c0 0x195e5c1 execute_command_internal + 0x62d
82 0x7271d610 0x195ddb1 execute_command + 0x5d
83 0x7271d650 0x19604b9 execute_connection + 0x3cd
84 0x7271d6b0 0x195e877 execute_command_internal + 0x8e3
85 0x7271d710 0x195e858 execute_command_internal + 0x8c4
86 0x7271d760 0x195ddb1 execute_command + 0x5d
87 0x7271d7a0 0x19604b9 execute_connection + 0x3cd
88 0x7271d800 0x195e877 execute_command_internal + 0x8e3
89 0x7271d850 0x195ddb1 execute_command + 0x5d
90 0x7271d880 0x1958a87 reader_loop + 0x1eb
91 0x7271d8e0 0x1956a89 main + 0x8dd
92 0x7271d910 0x194bf76 _start + 0x56
93 0x7271d940 0x23b5d80 runtime_loader + 0x130
94 00000000 0x60949250 commpage_thread_exit + 0
95
96 Registers:
97 eip: 0x0196c10e
98 esp: 0x7271c544
99 ebp: 0x7271c580
100 eax: 0x18089500
101 ebx: 0x019f6038
102 ecx: 0x18072af0
103 edx: 0x18072af0
104 esi: 0x0000001f
105 edi: 0x1804301d
106 cs: 0x001b
107 ds: 0x0023
108 es: 0x0023
109 fs: 0x00db
110 gs: 0x0023
111 ss: 0x0023
112
113Loaded Images:
114 ID Text Base Text End Data Base Data End Type Name
115 --------------------------------------------------------------------------------
116 567924 0x0141b000 0x014e6000 0x014e6000 0x01530000 lib /boot/system/lib/libroot.so
117 567923 0x01928000 0x019fa000 0x019fa000 0x01a0c000 app /boot/system/bin/bash
118 567922 0x023a6000 0x023c3000 0x023c3000 0x023c6000 lib /boot/system/runtime_loader
119 567921 0x60949000 0x60951000 0x00000000 0x00000000 system commpage
120
121Areas:
122 ID Base End Size (KiB) Protection Locking Name
123 --------------------------------------------------------------------------------
124 1825462 0x00146000 0x00147000 4 rw-S full _rld_debug_
125 1825461 0x00464000 0x00474000 64 rw- full rld heap
126 1825466 0x0141b000 0x014e6000 812 r-x full libroot.so_seg0ro
127 1825467 0x014e6000 0x014f8000 72 rw- full libroot.so_seg1rw
128 1825468 0x014f8000 0x01530000 224 rw- full libroot.so_seg2rw
129 1825463 0x01928000 0x019fa000 840 r-x full bash_seg0ro
130 1825464 0x019fa000 0x01a09000 60 rw- full bash_seg1rw
131 1825465 0x01a09000 0x01a0c000 12 rw- full bash_seg2rw
132 1825458 0x023a6000 0x023c3000 116 r-x full runtime_loader_seg0ro
133 1825459 0x023c3000 0x023c5000 8 rw- full runtime_loader_seg1rw
134 1825460 0x023c5000 0x023c6000 4 rw- full runtime_loader_bss1
135 1825469 0x18010000 0x180b0000 640 rw- full heap
136 1825455 0x606a6000 0x606aa000 16 rw- full user area
137 1825457 0x60949000 0x60951000 32 r-xSk full commpage
138 1825456 0x7171a000 0x7271f000 16404 rw-s full sh_52196_stack
139
140Protection Flags: r - read, w - write, x - execute, s - stack, o - overcommit, c - cloneable, S - shared, k - kernel
141
142Semaphores:
143 ID Count Last Holder Name
144 ------------------------------------------------------------