Ticket #10279: bash-71019-debug-01-12-2013-02-53-55.report

File bash-71019-debug-01-12-2013-02-53-55.report, 3.9 KB (added by kallisti5, 8 years ago)
Line 
1Debug information for team /boot/system/bin/bash (71019):
2CPU(s): 8x AMD FX-Series
3Memory: 15.95 GiB total, 675.73 MiB used
4Haiku revision: hrev46452 Nov 27 2013 00:37:42 (BePC)
5
6Active Threads:
7 thread 71020: team 71019 debug task
8 thread 71019: bash (main)
9 state: Exception (Segment violation)
10
11 Frame IP Function Name
12 -----------------------------------------------
13 00000000 0xaa4f20 with_input_from_string + 0
14 Disassembly:
15 with_input_from_string:
16 0x00aa4f20: 55 push %ebp <--
17
18 Frame memory:
19
20 0x6315ba80 0xb11002 parse_and_execute + 0x76
21 0x6315bad0 0xacab08 command_substitute + 0x360
22 0x6315bb30 0xace7c4 param_expand + 0x67c
23 0x6315cd10 0xacf1dd expand_word_internal + 0x735
24 0x6315def0 0xacf77e expand_word_internal + 0xcd6
25 0x6315df40 0xad0cc1 shell_expand_word_list + 0xd1
26 0x6315df80 0xad0f0c expand_word_list_internal + 0x128
27 0x6315dfb0 0xad07c4 expand_words + 0x1c
28 0x6315e000 0xab8634 execute_simple_command + 0x2c8
29 0x6315e060 0xab45c1 execute_command_internal + 0x62d
30 0x6315e0b0 0xab3db1 execute_command + 0x5d
31 0x6315e0e0 0xab7a1e execute_if_command + 0x2e
32 0x6315e130 0xab47eb execute_command_internal + 0x857
33 0x6315e180 0xab3db1 execute_command + 0x5d
34 0x6315e1c0 0xab677a execute_for_command + 0x27e
35 0x6315e210 0xab4713 execute_command_internal + 0x77f
36 0x6315e260 0xb112ca parse_and_execute + 0x33e
37 0x6315e290 0xaad7ee run_one_command + 0xda
38 0x6315e300 0xaac994 main + 0x7e8
39 0x6315e330 0xaa1f76 _start + 0x56
40 0x6315e360 0x24cad80 runtime_loader + 0x130
41 00000000 0x618d1250 commpage_thread_exit + 0
42
43 Registers:
44 eip: 0x00aa4f20
45 esp: 0x6315ba44
46 ebp: 0x6315ba80
47 eax: 0x00b39892
48 ebx: 0x00b51038
49 ecx: 0x00b51cc8
50 edx: 0x00000000
51 esi: 0x00000000
52 edi: 0x02984098
53 cs: 0x001b
54 ds: 0x0023
55 es: 0x0023
56 fs: 0x00f3
57 gs: 0x0023
58 ss: 0x0023
59
60Loaded Images:
61 ID Text Base Text End Data Base Data End Type Name
62 --------------------------------------------------------------------------------
63 683916 0x00a7e000 0x00b50000 0x00b50000 0x00b62000 app /boot/system/bin/bash
64 683919 0x00d89000 0x00e53000 0x00e53000 0x00e9d000 lib /boot/system/lib/libroot.so
65 683918 0x024bb000 0x024d8000 0x024d8000 0x024db000 lib /boot/system/runtime_loader
66 683917 0x618d1000 0x618d9000 0x00000000 0x00000000 system commpage
67
68Areas:
69 ID Base End Size (KiB) Protection Locking Name
70 --------------------------------------------------------------------------------
71 2193768 0x00148000 0x00149000 4 rw-S full _rld_debug_
72 2193769 0x002c6000 0x002d6000 64 rw- full rld heap
73 2193770 0x00a7e000 0x00b50000 840 r-x full bash_seg0ro
74 2193771 0x00b50000 0x00b5f000 60 rw- full bash_seg1rw
75 2193772 0x00b5f000 0x00b62000 12 rw- full bash_seg2rw
76 2193773 0x00d89000 0x00e53000 808 r-x full libroot.so_seg0ro
77 2193774 0x00e53000 0x00e65000 72 rw- full libroot.so_seg1rw
78 2193775 0x00e65000 0x00e9d000 224 rw- full libroot.so_seg2rw
79 2193776 0x024bb000 0x024d8000 116 r-x full runtime_loader_seg0ro
80 2193777 0x024d8000 0x024da000 8 rw- full runtime_loader_seg1rw
81 2193778 0x024da000 0x024db000 4 rw- full runtime_loader_bss1
82 2193779 0x0296a000 0x029ca000 384 rw- full heap
83 2193780 0x618d1000 0x618d9000 32 r-xSk full commpage
84 2193781 0x62098000 0x6209c000 16 rw- full user area
85 2193782 0x6215b000 0x63162000 16412 rw-s full bash_71012_stack
86
87Protection Flags: r - read, w - write, x - execute, s - stack, o - overcommit, c - cloneable, S - shared, k - kernel
88
89Semaphores:
90 ID Count Last Holder Name
91 ------------------------------------------------------------