Ticket #10279: bash-6630-debug-25-12-2013-03-13-53.report

File bash-6630-debug-25-12-2013-03-13-53.report, 21.7 KB (added by kallisti5, 11 years ago)
Line 
1Debug information for team /boot/system/bin/bash (6630):
2CPU(s): 8x AMD FX-Series
3Memory: 15.95 GiB total, 460.81 MiB used
4Haiku revision: hrev46596-dirty [master] Dec 22 (BePC)
5
6Active Threads:
7 thread 6645: team 6630 debug task
8 thread 6630: sh (main)
9 state: Exception (Segment violation)
10
11 Frame IP Function Name
12 -----------------------------------------------
13 0x734fbb10 0xdd6079 yyparse + 0x1c9
14 Disassembly:
15 yyparse:
16 0x00dd5eb0: 55 push %ebp
17 0x00dd5eb1: 89e5 mov %esp, %ebp
18 0x00dd5eb3: 81ec0c080000 sub $0x80c, %esp
19 0x00dd5eb9: 57 push %edi
20 0x00dd5eba: 56 push %esi
21 0x00dd5ebb: 53 push %ebx
22 0x00dd5ebc: e800000000 call 0xdd5ec1
23 0x00dd5ec1: 5b pop %ebx
24 0x00dd5ec2: 81c377e10a00 add $0xae177, %ebx
25 0x00dd5ec8: c7850cf8ffff0000 mov $0x0, 0xfffff80c(%ebp)
26 0x00dd5ed2: 8d8570feffff lea 0xfffffe70(%ebp), %eax
27 0x00dd5ed8: 898524f8ffff mov %eax, 0xfffff824(%ebp)
28 0x00dd5ede: 898520f8ffff mov %eax, 0xfffff820(%ebp)
29 0x00dd5ee4: 8d9530f8ffff lea 0xfffff830(%ebp), %edx
30 0x00dd5eea: 89951cf8ffff mov %edx, 0xfffff81c(%ebp)
31 0x00dd5ef0: 899518f8ffff mov %edx, 0xfffff818(%ebp)
32 0x00dd5ef6: c78514f8ffffc800 mov $0xc8, 0xfffff814(%ebp)
33 0x00dd5f00: c7852cf8ffff0000 mov $0x0, 0xfffff82c(%ebp)
34 0x00dd5f0a: c78528f8ffff0000 mov $0x0, 0xfffff828(%ebp)
35 0x00dd5f14: 8b8370070000 mov 0x770(%ebx), %eax
36 0x00dd5f1a: c70000000000 mov $0x0, (%eax)
37 0x00dd5f20: 8b83100c0000 mov 0xc10(%ebx), %eax
38 0x00dd5f26: c700feffffff mov $0xfffffffe, (%eax)
39 0x00dd5f2c: eb09 jmp 0xdd5f37
40 0x00dd5f2e: 89f6 mov %esi, %esi
41 0x00dd5f30: 838520f8ffff02 add $0x2, 0xfffff820(%ebp)
42 0x00dd5f37: 8b852cf8ffff mov 0xfffff82c(%ebp), %eax
43 0x00dd5f3d: 8b8d20f8ffff mov 0xfffff820(%ebp), %ecx
44 0x00dd5f43: 668901 mov %ax, (%ecx)
45 0x00dd5f46: 8b9514f8ffff mov 0xfffff814(%ebp), %edx
46 0x00dd5f4c: 8b8d24f8ffff mov 0xfffff824(%ebp), %ecx
47 0x00dd5f52: 8d4451fe lea -0x2(%ecx,%edx,2), %eax
48 0x00dd5f56: 3b8520f8ffff cmp 0xfffff820(%ebp), %eax
49 0x00dd5f5c: 0f8712010000 ja 0xdd6074
50 0x00dd5f62: 8bbd20f8ffff mov 0xfffff820(%ebp), %edi
51 0x00dd5f68: 29cf sub %ecx, %edi
52 0x00dd5f6a: 89f8 mov %edi, %eax
53 0x00dd5f6c: d1f8 sar , %eax
54 0x00dd5f6e: 8d7801 lea 0x1(%eax), %edi
55 0x00dd5f71: 81fa0f270000 cmp $0x270f, %edx
56 0x00dd5f77: 0f87871a0000 ja 0xdd7a04
57 0x00dd5f7d: 01d2 add %edx, %edx
58 0x00dd5f7f: 899514f8ffff mov %edx, 0xfffff814(%ebp)
59 0x00dd5f85: 81fa10270000 cmp $0x2710, %edx
60 0x00dd5f8b: 760a jbe 0xdd5f97
61 0x00dd5f8d: c78514f8ffff1027 mov $0x2710, 0xfffff814(%ebp)
62 0x00dd5f97: 8b8524f8ffff mov 0xfffff824(%ebp), %eax
63 0x00dd5f9d: 898508f8ffff mov %eax, 0xfffff808(%ebp)
64 0x00dd5fa3: 83c4f4 add $0xf4, %esp
65 0x00dd5fa6: 8b9514f8ffff mov 0xfffff814(%ebp), %edx
66 0x00dd5fac: 8d0492 lea (%edx,%edx,4), %eax
67 0x00dd5faf: 8d044507000000 lea 0x7(%eax,2), %eax
68 0x00dd5fb6: 50 push %eax
69 0x00dd5fb7: e860e5ffff call 0xdd451c
70 0x00dd5fbc: 89c6 mov %eax, %esi
71 0x00dd5fbe: 83c410 add $0x10, %esp
72 0x00dd5fc1: 85f6 test %esi, %esi
73 0x00dd5fc3: 0f843b1a0000 jz 0xdd7a04
74 0x00dd5fc9: 8d043f lea (%edi,%edi), %eax
75 0x00dd5fcc: 83c4fc add $0xfc, %esp
76 0x00dd5fcf: 50 push %eax
77 0x00dd5fd0: 8b8d24f8ffff mov 0xfffff824(%ebp), %ecx
78 0x00dd5fd6: 51 push %ecx
79 0x00dd5fd7: 56 push %esi
80 0x00dd5fd8: e87fe4ffff call 0xdd445c
81 0x00dd5fdd: 89b524f8ffff mov %esi, 0xfffff824(%ebp)
82 0x00dd5fe3: 8b9514f8ffff mov 0xfffff814(%ebp), %edx
83 0x00dd5fe9: 8d045507000000 lea 0x7(%edx,2), %eax
84 0x00dd5ff0: 24f8 and $0xf8, %al
85 0x00dd5ff2: 01c6 add %eax, %esi
86 0x00dd5ff4: 83c410 add $0x10, %esp
87 0x00dd5ff7: 8d04fd00000000 lea 0x0(%edi,8), %eax
88 0x00dd5ffe: 83c4fc add $0xfc, %esp
89 0x00dd6001: 50 push %eax
90 0x00dd6002: 8b8d1cf8ffff mov 0xfffff81c(%ebp), %ecx
91 0x00dd6008: 51 push %ecx
92 0x00dd6009: 56 push %esi
93 0x00dd600a: e84de4ffff call 0xdd445c
94 0x00dd600f: 89b51cf8ffff mov %esi, 0xfffff81c(%ebp)
95 0x00dd6015: 83c410 add $0x10, %esp
96 0x00dd6018: 8d8570feffff lea 0xfffffe70(%ebp), %eax
97 0x00dd601e: 398508f8ffff cmp %eax, 0xfffff808(%ebp)
98 0x00dd6024: 7412 jz 0xdd6038
99 0x00dd6026: 83c4f4 add $0xf4, %esp
100 0x00dd6029: 8b8508f8ffff mov 0xfffff808(%ebp), %eax
101 0x00dd602f: 50 push %eax
102 0x00dd6030: e8f7edffff call 0xdd4e2c
103 0x00dd6035: 83c410 add $0x10, %esp
104 0x00dd6038: 8b9524f8ffff mov 0xfffff824(%ebp), %edx
105 0x00dd603e: 8d547afe lea -0x2(%edx,%edi,2), %edx
106 0x00dd6042: 899520f8ffff mov %edx, 0xfffff820(%ebp)
107 0x00dd6048: 8b8d1cf8ffff mov 0xfffff81c(%ebp), %ecx
108 0x00dd604e: 8d7cf9f8 lea -0x8(%ecx,%edi,8), %edi
109 0x00dd6052: 89bd18f8ffff mov %edi, 0xfffff818(%ebp)
110 0x00dd6058: 8b9514f8ffff mov 0xfffff814(%ebp), %edx
111 0x00dd605e: 8b8d24f8ffff mov 0xfffff824(%ebp), %ecx
112 0x00dd6064: 8d4451fe lea -0x2(%ecx,%edx,2), %eax
113 0x00dd6068: 3b8520f8ffff cmp 0xfffff820(%ebp), %eax
114 0x00dd606e: 0f8688190000 jbe 0xdd79fc
115 0x00dd6074: 83bd2cf8ffff66 cmp $0x66, 0xfffff82c(%ebp) <--
116
117 Frame memory:
118 [0x734fb2f8] 8@........p..... 38 40 e8 00 00 00 00 00 a0 b9 70 18 00 00 00 00
119 [0x734fb308] ..........Ose... 00 00 00 00 00 00 00 00 90 b7 4f 73 65 b0 e5 00
120 [0x734fb318] ..........Os.... 85 d8 e6 00 00 00 00 00 90 b7 4f 73 c8 00 00 00
121 [0x734fb328] @.Os@.Os..Os..Os 40 b3 4f 73 40 b3 4f 73 80 b9 4f 73 80 b9 4f 73
122 [0x734fb338] ........p.Os.4a. 00 00 00 00 00 00 00 00 70 b3 4f 73 e1 34 61 00
123 [0x734fb348] .+k..........4a. d0 2b 6b 18 00 00 00 00 00 00 00 00 cc 34 61 00
124 [0x734fb358] ."d.h$q.......Os f0 22 64 00 68 24 71 18 07 00 00 00 94 b3 4f 73
125 [0x734fb368] @3........Os.|a. 40 33 de 00 fb 01 00 00 c0 b3 4f 73 09 7c 61 00
126 [0x734fb378] .+k...q...Os.oa. d0 2b 6b 18 d0 05 71 18 b0 b3 4f 73 e6 6f 61 00
127 [0x734fb388] ."d..!q.......a. f0 22 64 00 b0 21 71 18 06 00 00 00 b9 7f 61 00
128 [0x734fb398] ..Z.."d...OsR... fc 1a 5a 00 f0 22 64 00 a0 bc 4f 73 52 98 df 00
129 [0x734fb3a8] ......q...j...Os 00 00 00 00 d0 05 71 18 00 90 6a 18 bc b3 4f 73
130 [0x734fb3b8] ....h$q.@.Ose... 00 00 00 00 68 24 71 18 40 b8 4f 73 65 b0 e5 00
131 [0x734fb3c8] ..p.[...@.Os.... c0 fc 70 18 5b 00 00 00 40 b8 4f 73 ca af e5 00
132 [0x734fb3d8] 8@.. .p.. q..2.. 38 40 e8 00 20 fd 70 18 f0 20 71 18 9c 32 de 00
133 [0x734fb3e8] ........p.Ose... 01 00 00 00 00 00 00 00 70 b8 4f 73 65 b0 e5 00
134 [0x734fb3f8] ..p.{........... e0 fa 70 18 7b 00 00 00 00 00 00 00 00 00 00 00
135 [0x734fb408] ..........Ose... 00 00 00 00 00 00 00 00 90 b8 4f 73 65 b0 e5 00
136 [0x734fb418] P.r./........... 50 1f 72 18 2f 00 00 00 00 00 00 00 b1 af e5 00
137 [0x734fb428] 8@.............. 38 40 e8 00 00 00 00 00 00 00 00 00 00 00 00 00
138 [0x734fb438] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
139 [0x734fb448] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
140 [0x734fb458] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
141 [0x734fb468] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
142 [0x734fb478] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
143 [0x734fb488] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
144 [0x734fb498] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
145 [0x734fb4a8] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
146 [0x734fb4b8] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
147 [0x734fb4c8] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
148 [0x734fb4d8] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
149 [0x734fb4e8] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
150 [0x734fb4f8] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
151 [0x734fb508] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
152 [0x734fb518] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
153 [0x734fb528] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
154 [0x734fb538] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
155 [0x734fb548] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
156 [0x734fb558] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
157 [0x734fb568] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
158 [0x734fb578] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
159 [0x734fb588] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
160 [0x734fb598] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
161 [0x734fb5a8] ........0.Ose... 00 00 00 00 00 00 00 00 30 ba 4f 73 65 b0 e5 00
162 [0x734fb5b8] ..p.[...0.Os.... 08 bb 70 18 5b 00 00 00 30 ba 4f 73 ca af e5 00
163 [0x734fb5c8] 8@....p..%q..... 38 40 e8 00 e0 bb 70 18 a0 25 71 18 00 00 00 00
164 [0x734fb5d8] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
165 [0x734fb5e8] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
166 [0x734fb5f8] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
167 [0x734fb608] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
168 [0x734fb618] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
169 [0x734fb628] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
170 [0x734fb638] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
171 [0x734fb648] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
172 [0x734fb658] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
173 [0x734fb668] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
174 [0x734fb678] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
175 [0x734fb688] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
176 [0x734fb698] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
177 [0x734fb6a8] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
178 [0x734fb6b8] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
179 [0x734fb6c8] ........P.Ose... 00 00 00 00 00 00 00 00 50 bb 4f 73 65 b0 e5 00
180 [0x734fb6d8] ..q.{........... 80 03 71 18 7b 00 00 00 00 00 00 00 00 00 00 00
181 [0x734fb6e8] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
182 [0x734fb6f8] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
183 [0x734fb708] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
184 [0x734fb718] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
185 [0x734fb728] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
186 [0x734fb738] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
187 [0x734fb748] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
188 [0x734fb758] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
189 [0x734fb768] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
190 [0x734fb778] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
191 [0x734fb788] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
192 [0x734fb798] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
193 [0x734fb7a8] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
194 [0x734fb7b8] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
195 [0x734fb7c8] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
196 [0x734fb7d8] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
197 [0x734fb7e8] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
198 [0x734fb7f8] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
199 [0x734fb808] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
200 [0x734fb818] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
201 [0x734fb828] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
202 [0x734fb838] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
203 [0x734fb848] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
204 [0x734fb858] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
205 [0x734fb868] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
206 [0x734fb878] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
207 [0x734fb888] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
208 [0x734fb898] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
209 [0x734fb8a8] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
210 [0x734fb8b8] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
211 [0x734fb8c8] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
212 [0x734fb8d8] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
213 [0x734fb8e8] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
214 [0x734fb8f8] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
215 [0x734fb908] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
216 [0x734fb918] ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
217 [0x734fb928] ..............a. 00 00 00 00 00 00 00 00 00 00 00 00 c8 8d 61 00
218 [0x734fb938] ."d............. f0 22 64 00 00 00 00 00 00 00 00 00 00 00 00 00
219 [0x734fb948] ..........Os..a. 00 00 00 00 00 00 00 00 80 b9 4f 73 c8 8d 61 00
220 [0x734fb958] ."d...........a. f0 22 64 00 00 00 00 00 00 00 00 00 c8 8d 61 00
221 [0x734fb968] ."d.X.p...Os.Va. f0 22 64 00 58 fc 70 18 a0 b9 4f 73 88 56 61 00
222 [0x734fb978] ..p.......Os.4a. d0 e5 70 18 00 00 00 00 00 00 4f 73 e1 34 61 00
223 [0x734fb988] .+k..........4a. d0 2b 6b 18 00 00 00 00 00 00 00 00 cc 34 61 00
224 [0x734fb998] ."d...p......ya. f0 22 64 00 b8 fe 70 18 07 00 00 00 19 79 61 00
225 [0x734fb9a8] ..a.."d...Os.|a. c8 8d 61 00 f0 22 64 00 00 ba 4f 73 09 7c 61 00
226 [0x734fb9b8] .+k...........Os d0 2b 6b 18 04 00 00 00 14 00 00 00 f4 b9 4f 73
227 [0x734fb9c8] .4a..+k......... e1 34 61 00 d0 2b 6b 18 00 00 00 00 00 00 00 00
228 [0x734fb9d8] .4a.."d..$q..... cc 34 61 00 f0 22 64 00 e8 24 71 18 07 00 00 00
229 [0x734fb9e8] ."d...p.....D.Os f0 22 64 00 d0 e5 70 18 fb 01 00 00 44 ba 4f 73
230 [0x734fb9f8] .|a..+k.0.Os.4a. 09 7c 61 00 d0 2b 6b 18 30 ba 4f 73 e1 34 61 00
231 [0x734fba08] .oa.."d..@...... e6 6f 61 00 f0 22 64 00 0c 40 e9 00 05 00 00 00
232 [0x734fba18] ."d...Z.."d..... f0 22 64 00 fc 1a 5a 00 f0 22 64 00 1d 9b e1 00
233 [0x734fba28] ..........q...j. 14 00 00 00 00 00 00 00 d0 05 71 18 00 90 6a 18
234 [0x734fba38] @.Os.....$q.t.Os 40 ba 4f 73 00 00 00 00 e8 24 71 18 74 ba 4f 73
235 [0x734fba48] m}a.8(k......... 6d 7d 61 00 38 28 6b 18 05 00 00 00 c2 d8 e0 00
236 [0x734fba58] )|a.8@...@...... 29 7c 61 00 38 40 e8 00 0c 40 e9 00 a1 d6 e0 00
237 [0x734fba68] ......q...j...Os 00 00 00 00 d0 e5 71 18 00 90 6a 18 a4 ba 4f 73
238 [0x734fba78] ..........Osm}a. 1d 9b e1 00 05 00 00 00 b0 ba 4f 73 6d 7d 61 00
239 [0x734fba88] ....8@...@...... 0a 9b e1 00 38 40 e8 00 0c 40 e9 00 bd c3 e7 00
240 [0x734fba98] 8@....q..@....Os 38 40 e8 00 90 fd 71 18 0c 40 e9 00 e0 ba 4f 73
241 [0x734fbaa8] .{...@....Os.{.. ca 7b dd 00 0c 40 e9 00 e0 ba 4f 73 d3 7b dd 00
242 [0x734fbab8] .$q.......Os0.Z. f0 24 71 18 b8 c3 e7 00 f0 ba 4f 73 30 fc 5a 00
243 [0x734fbac8] ..........Os~Y.. 01 00 00 00 00 00 00 00 18 bb 4f 73 7e 59 e0 00
244 [0x734fbad8] 8@........p.O... 38 40 e8 00 00 00 00 00 a0 b9 70 18 4f 7f dd 00
245 [0x734fbae8] .~...~.. .Os1#Z. b8 7e dd 00 f4 7e dd 00 20 bb 4f 73 31 23 5a 00
246 [0x734fbaf8] ..........Os.#Z. 01 00 00 00 00 00 00 00 18 bb 4f 73 11 23 5a 00
247 [0x734fbb08] 8@...... 38 40 e8 00 00 00 00 00
248 0x734fbb30 0xde1c4e parse_command + 0x7a
249 0x734fbb60 0xe440d3 parse_and_execute + 0x14b
250 0x734fbb90 0xe47961 eval_builtin + 0x59
251 0x734fbbd0 0xdebe7e execute_builtin + 0x176
252 0x734fbc00 0xdec8a4 execute_builtin_or_function + 0xcc
253 0x734fbc60 0xdebad1 execute_simple_command + 0x769
254 0x734fbcc0 0xde75bd execute_command_internal + 0x62d
255 0x734fbd10 0xde92da execute_connection + 0x1f2
256 0x734fbd70 0xde7873 execute_command_internal + 0x8e3
257 0x734fbdc0 0xde6dad execute_command + 0x5d
258 0x734fbe00 0xde928a execute_connection + 0x1a2
259 0x734fbe60 0xde7873 execute_command_internal + 0x8e3
260 0x734fbeb0 0xde6dad execute_command + 0x5d
261 0x734fbee0 0xdeaac4 execute_if_command + 0xd8
262 0x734fbf30 0xde77e7 execute_command_internal + 0x857
263 0x734fbf80 0xde92da execute_connection + 0x1f2
264 0x734fbfe0 0xde7873 execute_command_internal + 0x8e3
265 0x734fc040 0xde7854 execute_command_internal + 0x8c4
266 0x734fc0a0 0xdec463 execute_function + 0x55b
267 0x734fc0e0 0xdec8c8 execute_builtin_or_function + 0xf0
268 0x734fc140 0xdebad1 execute_simple_command + 0x769
269 0x734fc1a0 0xde75bd execute_command_internal + 0x62d
270 0x734fc1f0 0xde92da execute_connection + 0x1f2
271 0x734fc250 0xde7873 execute_command_internal + 0x8e3
272 0x734fc2a0 0xde6dad execute_command + 0x5d
273 0x734fc2e0 0xde928a execute_connection + 0x1a2
274 0x734fc340 0xde7873 execute_command_internal + 0x8e3
275 0x734fc390 0xde6dad execute_command + 0x5d
276 0x734fc3d0 0xde928a execute_connection + 0x1a2
277 0x734fc430 0xde7873 execute_command_internal + 0x8e3
278 0x734fc480 0xde6dad execute_command + 0x5d
279 0x734fc4b0 0xdeaac4 execute_if_command + 0xd8
280 0x734fc500 0xde77e7 execute_command_internal + 0x857
281 0x734fc550 0xde92da execute_connection + 0x1f2
282 0x734fc5b0 0xde7873 execute_command_internal + 0x8e3
283 0x734fc600 0xde6dad execute_command + 0x5d
284 0x734fc640 0xde928a execute_connection + 0x1a2
285 0x734fc6a0 0xde7873 execute_command_internal + 0x8e3
286 0x734fc6f0 0xde6dad execute_command + 0x5d
287 0x734fc730 0xde928a execute_connection + 0x1a2
288 0x734fc790 0xde7873 execute_command_internal + 0x8e3
289 0x734fc7f0 0xde7854 execute_command_internal + 0x8c4
290 0x734fc850 0xdec463 execute_function + 0x55b
291 0x734fc890 0xdec8c8 execute_builtin_or_function + 0xf0
292 0x734fc8f0 0xdebad1 execute_simple_command + 0x769
293 0x734fc950 0xde75bd execute_command_internal + 0x62d
294 0x734fc9a0 0xde6dad execute_command + 0x5d
295 0x734fc9e0 0xde94b5 execute_connection + 0x3cd
296 0x734fca40 0xde7873 execute_command_internal + 0x8e3
297 0x734fcaa0 0xde7854 execute_command_internal + 0x8c4
298 0x734fcaf0 0xde6dad execute_command + 0x5d
299 0x734fcb30 0xde94b5 execute_connection + 0x3cd
300 0x734fcb90 0xde7873 execute_command_internal + 0x8e3
301 0x734fcbe0 0xde6dad execute_command + 0x5d
302 0x734fcc10 0xde1a83 reader_loop + 0x1eb
303 0x734fcc70 0xddfa85 main + 0x8dd
304 0x734fcca0 0xdd4f76 _start + 0x56
305 0x734fccd0 0xec1d68 runtime_loader + 0x130
306 00000000 0x60bdb250 commpage_thread_exit + 0
307
308 Registers:
309 eip: 0x00dd6079
310 esp: 0x734fb2f8
311 ebp: 0x734fbb10
312 eax: 0x37d2bb0e
313 ebx: 0x00e84038
314 ecx: 0x734fb980
315 edx: 0x000000c8
316 esi: 0x00000000
317 edi: 0x1870b9a0
318 cs: 0x001b
319 ds: 0x0023
320 es: 0x0023
321 fs: 0x00eb
322 gs: 0x0023
323 ss: 0x0023
324
325Loaded Images:
326 ID Text Base Text End Data Base Data End Type Name
327 --------------------------------------------------------------------------------
328 49432 0x0056e000 0x00639000 0x00639000 0x00683000 lib /boot/system/lib/libroot.so
329 49431 0x00db1000 0x00e83000 0x00e83000 0x00e95000 app /boot/system/bin/bash
330 49430 0x00eb2000 0x00ecf000 0x00ecf000 0x00ed2000 lib /boot/system/runtime_loader
331 49429 0x60bdb000 0x60be3000 0x00000000 0x00000000 system commpage
332
333Areas:
334 ID Base End Size (KiB) Protection Locking Name
335 --------------------------------------------------------------------------------
336 178164 0x00269000 0x0026a000 4 rw-S full _rld_debug_
337 178163 0x003c2000 0x003d2000 64 rw- full rld heap
338 178168 0x0056e000 0x00639000 812 r-x full libroot.so_seg0ro
339 178169 0x00639000 0x0064b000 72 rw- full libroot.so_seg1rw
340 178170 0x0064b000 0x00683000 224 rw- full libroot.so_seg2rw
341 178165 0x00db1000 0x00e83000 840 r-x full bash_seg0ro
342 178166 0x00e83000 0x00e92000 60 rw- full bash_seg1rw
343 178167 0x00e92000 0x00e95000 12 rw- full bash_seg2rw
344 178160 0x00eb2000 0x00ecf000 116 r-x full runtime_loader_seg0ro
345 178161 0x00ecf000 0x00ed1000 8 rw- full runtime_loader_seg1rw
346 178162 0x00ed1000 0x00ed2000 4 rw- full runtime_loader_bss1
347 178171 0x186a9000 0x18749000 640 rw- full heap
348 178159 0x60bdb000 0x60be3000 32 r-xSk full commpage
349 178157 0x618b3000 0x618b7000 16 rw- full user area
350 178158 0x724f9000 0x734fe000 16404 rw-s full sh_6630_stack
351
352Protection Flags: r - read, w - write, x - execute, s - stack, o - overcommit, c - cloneable, S - shared, k - kernel
353
354Semaphores:
355 ID Count Last Holder Name
356 ------------------------------------------------------------