1 | Debug information for team /BeOS 5 Pro Edition/beos/apps/DiskProbe (1014):
|
---|
2 | CPU(s): 8x AMD FX-Series
|
---|
3 | Memory: 15.95 GiB total, 514.02 MiB used
|
---|
4 | Haiku revision: hrev46660 Jan 11 2014 19:28:48 (BePC)
|
---|
5 |
|
---|
6 | Active Threads:
|
---|
7 | thread 1015: team 1014 debug task
|
---|
8 | thread 1014: DiskProbe (main)
|
---|
9 | state: Exception (Segment violation)
|
---|
10 |
|
---|
11 | Frame IP Function Name
|
---|
12 | -----------------------------------------------
|
---|
13 | 0x71f93f10 0x1967735 find_symbol(image_t*, SymbolLookupInfo&) + 0x65
|
---|
14 | Disassembly:
|
---|
15 | find_symbol(image_t*, SymbolLookupInfo&):
|
---|
16 | 0x019676d0: 55 push %ebp
|
---|
17 | 0x019676d1: 89e5 mov %esp, %ebp
|
---|
18 | 0x019676d3: 83ec1c sub $0x1c, %esp
|
---|
19 | 0x019676d6: 57 push %edi
|
---|
20 | 0x019676d7: 56 push %esi
|
---|
21 | 0x019676d8: 53 push %ebx
|
---|
22 | 0x019676d9: e800000000 call 0x19676de
|
---|
23 | 0x019676de: 5b pop %ebx
|
---|
24 | 0x019676df: 81c3821d0100 add $0x11d82, %ebx
|
---|
25 | 0x019676e5: 8b4508 mov 0x8(%ebp), %eax
|
---|
26 | 0x019676e8: 83b84c04000000 cmp $0x0, 0x44c(%eax)
|
---|
27 | 0x019676ef: 7507 jnz 0x19676f8
|
---|
28 | 0x019676f1: 31c0 xor %eax, %eax
|
---|
29 | 0x019676f3: e9a4010000 jmp 0x196789c
|
---|
30 | 0x019676f8: c745fc00000000 mov $0x0, -0x4(%ebp)
|
---|
31 | 0x019676ff: c745f800000000 mov $0x0, -0x8(%ebp)
|
---|
32 | 0x01967706: 8b5508 mov 0x8(%ebp), %edx
|
---|
33 | 0x01967709: 8bb250040000 mov 0x450(%edx), %esi
|
---|
34 | 0x0196770f: 8b4d0c mov 0xc(%ebp), %ecx
|
---|
35 | 0x01967712: 8b5108 mov 0x8(%ecx), %edx
|
---|
36 | 0x01967715: 89d0 mov %edx, %eax
|
---|
37 | 0x01967717: 31d2 xor %edx, %edx
|
---|
38 | 0x01967719: f736 div (%esi)
|
---|
39 | 0x0196771b: 8b549608 mov 0x8(%esi,%edx,4), %edx
|
---|
40 | 0x0196771f: e962010000 jmp 0x1967886
|
---|
41 | 0x01967724: 8b45f4 mov -0xc(%ebp), %eax
|
---|
42 | 0x01967727: c1e004 shl $0x4, %eax
|
---|
43 | 0x0196772a: 89c7 mov %eax, %edi
|
---|
44 | 0x0196772c: 8b5508 mov 0x8(%ebp), %edx
|
---|
45 | 0x0196772f: 03ba54040000 add 0x454(%edx), %edi
|
---|
46 | 0x01967735: 66837f0e00 cmpw $0x0, 0xe(%edi) <--
|
---|
47 |
|
---|
48 | Frame memory:
|
---|
49 | [0x71f93ee8] `...H?.q..*..p.. 60 94 97 01 48 3f f9 71 04 a0 2a 00 00 70 00 00
|
---|
50 | [0x71f93ef8] ......*.p?.q.... 03 00 00 00 04 a0 2a 00 70 3f f9 71 cc 00 00 00
|
---|
51 | [0x71f93f08] ........ 00 00 00 00 00 00 00 00
|
---|
52 | 0x71f93f60 0x1966528 analyze_image_haiku_version_and_abi(int32, image_t*, Elf32_Ehdr&, int32, char*, uint32) + 0x54
|
---|
53 | 0x71f953f0 0x1967468 load_image(char*, image_type, char*, char*, image_t*) + 0x5c8
|
---|
54 | 0x71f95450 0x196504c load_program + 0x40
|
---|
55 | 0x71f95480 0x196aee5 runtime_loader + 0x101
|
---|
56 | 00000000 0x604c8250 commpage_thread_exit + 0
|
---|
57 |
|
---|
58 | Registers:
|
---|
59 | eip: 0x01967735
|
---|
60 | esp: 0x71f93ee8
|
---|
61 | ebp: 0x71f93f10
|
---|
62 | eax: 0x00000cc0
|
---|
63 | ebx: 0x01979460
|
---|
64 | ecx: 0x71f93f48
|
---|
65 | edx: 0x002aa004
|
---|
66 | esi: 0x02638094
|
---|
67 | edi: 0x0263a078
|
---|
68 | cs: 0x001b
|
---|
69 | ds: 0x0023
|
---|
70 | es: 0x0023
|
---|
71 | fs: 0x00fb
|
---|
72 | gs: 0x0023
|
---|
73 | ss: 0x0023
|
---|
74 |
|
---|
75 | Loaded Images:
|
---|
76 | ID Text Base Text End Data Base Data End Type Name
|
---|
77 | --------------------------------------------------------------------------------
|
---|
78 | 3939 0x0195b000 0x01978000 0x01978000 0x0197b000 lib /boot/system/runtime_loader
|
---|
79 | 3938 0x604c8000 0x604d0000 0x00000000 0x00000000 system commpage
|
---|
80 |
|
---|
81 | Areas:
|
---|
82 | ID Base End Size (KiB) Protection Locking Name
|
---|
83 | --------------------------------------------------------------------------------
|
---|
84 | 12047 0x00273000 0x00274000 4 rw-S full _rld_debug_
|
---|
85 | 12046 0x002aa000 0x002ba000 64 rw- full rld heap
|
---|
86 | 12043 0x0195b000 0x01978000 116 r-x full runtime_loader_seg0ro
|
---|
87 | 12044 0x01978000 0x0197a000 8 rw- full runtime_loader_seg1rw
|
---|
88 | 12045 0x0197a000 0x0197b000 4 rw- full runtime_loader_bss1
|
---|
89 | 12048 0x02638000 0x0265c000 144 rw-rw- full DiskProbe_seg0ro
|
---|
90 | 12049 0x0265c000 0x02663000 28 rw- full DiskProbe_seg1rw
|
---|
91 | 12042 0x604c8000 0x604d0000 32 r-xSk full commpage
|
---|
92 | 12039 0x61859000 0x6185d000 16 rw- full user area
|
---|
93 | 12041 0x70f96000 0x71f97000 16388 rw-s full DiskProbe_1014_stack
|
---|
94 |
|
---|
95 | Protection Flags: r - read, w - write, x - execute, s - stack, o - overcommit, c - cloneable, S - shared, k - kernel
|
---|
96 |
|
---|
97 | Semaphores:
|
---|
98 | ID Count Last Holder Name
|
---|
99 | ------------------------------------------------------------
|
---|