Ticket #10974: bash-65857-debug-19-06-2014-18-50-13.report

File bash-65857-debug-19-06-2014-18-50-13.report, 4.0 KB (added by jessicah, 10 years ago)

might not be related... but attaching in case it is

Line 
1Debug information for team /boot/system/bin/bash (65857):
2CPU(s): 4x Intel Core™ i3-4010U
3Memory: 3.93 GiB total, 326.04 MiB used
4Haiku revision: hrev47342-5-gbb311ce [imap.pm] (BePC)
5
6Active Threads:
7 thread 65858: team 65857 debug task
8 thread 65857: sh (main)
9 state: Exception (Segment violation)
10
11 Frame IP Function Name
12 -----------------------------------------------
13 0x723e06f8 0x1b03833 _IO_file_sync + 0x3
14 Disassembly:
15 _IO_file_sync:
16 0x01b03830: 55 push %ebp
17 0x01b03831: 89e5 mov %esp, %ebp
18 0x01b03833: 83ec0c sub $0xc, %esp <--
19
20 Frame memory:
21 [0x723e06cc] Qi...~.......... 51 69 b0 01 00 7e b8 01 01 00 00 00 b6 01 00 00
22 [0x723e06dc] .i..8.......d... 1a 69 b0 01 38 80 d8 01 01 00 00 00 64 91 b8 01
23 [0x723e06ec] ........hC.. d2 a9 d1 01 f8 17 0e 18 68 43 0b 18
24 0x723e0748 0x1d1aa8a do_redirection_internal + 0x41e
25 0x723e0778 0x1d19dbc do_redirections + 0x60
26 0x723e07a8 0x1cf0b9c execute_disk_command + 0x198
27 0x723e0808 0x1cefc52 execute_simple_command + 0x8ea
28 0x723e0868 0x1ceb5bd execute_command_internal + 0x62d
29 0x723e08b8 0x1ceadad execute_command + 0x5d
30 0x723e08f8 0x1ced434 execute_connection + 0x34c
31 0x723e0958 0x1ceb873 execute_command_internal + 0x8e3
32 0x723e09a8 0x1ceadad execute_command + 0x5d
33 0x723e09d8 0x1ceea1a execute_if_command + 0x2e
34 0x723e0a28 0x1ceb7e7 execute_command_internal + 0x857
35 0x723e0a78 0x1ceadad execute_command + 0x5d
36 0x723e0aa8 0x1ce5a83 reader_loop + 0x1eb
37 0x723e0b08 0x1ce3a85 main + 0x8dd
38 0x723e0b38 0x1cd8f76 _start + 0x56
39 0x723e0b68 0xac23b4 runtime_loader + 0x130
40 00000000 0x6177b250 commpage_thread_exit + 0
41
42 Registers:
43 eip: 0x01b03833
44 esp: 0x723e06cc
45 ebp: 0x723e06f8
46 eax: 0x01b0382f
47 ebx: 0x01b820e1
48 ecx: 0x00000000
49 edx: 0x00000001
50 esi: 0x01b87e00
51 edi: 0x01b89164
52 cs: 0x001b
53 ds: 0x0023
54 es: 0x0023
55 fs: 0x0063
56 gs: 0x0023
57 ss: 0x0023
58
59Loaded Images:
60 ID Text Base Text End Data Base Data End Type Name
61 --------------------------------------------------------------------------------
62 492382 0x00ab1000 0x00ad0000 0x00ad0000 0x00ad3000 lib /boot/system/runtime_loader
63 492383 0x01aad000 0x01b78000 0x01b78000 0x01bc3000 lib /boot/system/lib/libroot.so
64 492380 0x01cb5000 0x01d87000 0x01d87000 0x01d99000 app /boot/system/bin/bash
65 492381 0x6177b000 0x61783000 0x00000000 0x00000000 system commpage
66
67Areas:
68 ID Base End Size (KiB) Protection Locking Name
69 --------------------------------------------------------------------------------
70 1804743 0x00445000 0x00446000 4 rw-S full _rld_debug_
71 1804744 0x00549000 0x00559000 64 rw- full rld heap
72 1804745 0x00ab1000 0x00ad0000 124 r-x full runtime_loader_seg0ro
73 1804746 0x00ad0000 0x00ad2000 8 rw- full runtime_loader_seg1rw
74 1804747 0x00ad2000 0x00ad3000 4 rw- full runtime_loader_bss1
75 1804748 0x01aad000 0x01b78000 812 r-x full libroot.so_seg0ro
76 1804749 0x01b78000 0x01b8b000 76 rw- full libroot.so_seg1rw
77 1804750 0x01b8b000 0x01bc3000 224 rw- full libroot.so_seg2rw
78 1804751 0x01cb5000 0x01d87000 840 r-x full bash_seg0ro
79 1804752 0x01d87000 0x01d96000 60 rw- full bash_seg1rw
80 1804753 0x01d96000 0x01d99000 12 rw- full bash_seg2rw
81 1804754 0x180a7000 0x180f7000 320 rw- full heap
82 1804755 0x60172000 0x60176000 16 rw- full user area
83 1804756 0x6177b000 0x61783000 32 r-xSk full commpage
84 1804757 0x713dd000 0x723e2000 16404 rw-s full sh_65806_stack
85
86Protection Flags: r - read, w - write, x - execute, s - stack, o - overcommit, c - cloneable, S - shared, k - kernel
87
88Semaphores:
89 ID Count Last Holder Name
90 ------------------------------------------------------------