Ticket #12532: kernel_debugger-596-debug-10-04-2016-10-56-04.report

File kernel_debugger-596-debug-10-04-2016-10-56-04.report, 6.8 KB (added by bonefish, 8 years ago)

kernel_debugger debug report

Line 
1Debug information for team /boot/system/bin/kernel_debugger (596):
2CPU(s): 1x Intel Celeron
3Memory: 2.00 GiB total, 163.44 MiB used
4Haiku revision: hrev50194 Apr 9 2016 01:08:18 (BePC)
5
6Active Threads:
7 thread 597: team 596 debug task
8 thread 596: kernel_debugger (main)
9 state: Exception (Segment violation)
10
11 Frame IP Function Name
12 -----------------------------------------------
13 0x72353c5c 0x6e6e6b _kern_resize_area + 0xb
14 Disassembly:
15 _kern_resize_area:
16 0x006e6e60: b8c6000000 mov $0xc6, %eax
17 0x006e6e65: 8b1500000000 mov 0x0, %edx
18 0x006e6e6b: 03520c add 0xc(%edx), %edx <--
19
20 Frame memory:
21 [0x72353c40] ;.m.........\<5r 3b fb 6d 00 00 00 00 00 00 00 01 00 5c 3c 35 72
22 [0x72353c50] .....I{.l{y. b0 e6 15 01 c0 49 7b 00 6c 7b 79 00
23 0x72353cb4 0x75e84a BPrivate::hoardSbrk(long) + 0x146
24 0x72353cd4 0x76223f malloc + 0x5e
25 0x72353cf4 0x1148783 _GLOBAL(int16, , bool, , , , , , , int32, int32, , int8, , int8, int8) + 0x53
26 0x72353cfc 0x1158c46 /boot/system/lib/libsupc++.so + 0x17c46
27 0x72353d08 0x1148035 /boot/system/lib/libsupc++.so + 0x7035
28 0x72353d58 0x1e6e9ba init_dependencies(image_t*, bool) + 0x77
29 0x72353da8 0x1e6efa1 load_program + 0xb4
30 0x72353dd8 0x1e7739d runtime_loader + 0xe2
31 00000000 0x60bcc250 commpage_thread_exit + 0
32
33 Registers:
34 eip: 0x006e6e6b
35 esp: 0x72353c40
36 ebp: 0x72353c5c
37 eax: 0x000000c6
38 ebx: 0x00797b6c
39 ecx: 0x00000001
40 edx: 0x00000000
41 esi: 0x00000000
42 edi: 0x00010000
43 cs: 0x001b
44 ds: 0x0023
45 es: 0x0023
46 fs: 0x0063
47 gs: 0x0023
48 ss: 0x0023
49 st0: 0
50 st1: 0
51 st2: 0
52 st3: 0
53 st4: 0
54 st5: 0
55 st6: 6.38e+05
56 st7: 1.46e+15
57 mm0: {0, 0, 0, 0}
58 mm1: {0, 0, 0, 0}
59 mm2: {0, 0, 0, 0}
60 mm3: {0, 0, 0, 0}
61 mm4: {0, 0, 0, 0}
62 mm5: {0, 0, 0, 0}
63 mm6: {0, 0, 0x1000, 0x9bcc}
64 mm7: {0x6000, 0xfe4e, 0xe88a, 0xa603}
65 xmm0: {0, 0, 0, 0, 0, 0, 0, 0}
66 xmm1: {0, 0, 0, 0, 0, 0, 0, 0}
67 xmm2: {0, 0, 0, 0, 0, 0, 0, 0}
68 xmm3: {0, 0, 0, 0, 0, 0, 0, 0}
69 xmm4: {0, 0, 0, 0, 0, 0, 0, 0}
70 xmm5: {0, 0, 0, 0, 0, 0, 0, 0}
71 xmm6: {0, 0, 0, 0, 0, 0, 0, 0}
72 xmm7: {0, 0, 0, 0, 0, 0, 0, 0}
73
74Loaded Images:
75 ID Text Base Text End Data Base Data End Type Name
76 --------------------------------------------------------------------------------
77 4534 0x006b9000 0x00794000 0x00794000 0x007d5000 lib /boot/system/lib/libroot.so
78 4535 0x00a7c000 0x00a94000 0x00a94000 0x00a95000 lib /boot/system/lib/libgcc_s.so.1
79 4533 0x01141000 0x0115d000 0x0115d000 0x0115f000 lib /boot/system/lib/libsupc++.so
80 4531 0x01e66000 0x01e82000 0x01e82000 0x01e83000 lib /boot/system/runtime_loader
81 4532 0x026f5000 0x026f6000 0x026f6000 0x026f7000 app /boot/system/bin/kernel_debugger
82 4530 0x60bcc000 0x60bd4000 0x00000000 0x00000000 system commpage
83
84Areas:
85 ID Base End Size (KiB) Protection Locking Name
86 --------------------------------------------------------------------------------
87 12502 0x002d2000 0x002d3000 4 rw-S full _rld_debug_
88 12507 0x006b9000 0x00794000 876 r-x full libroot.so_seg0ro
89 12508 0x00794000 0x0079e000 40 rw- full libroot.so_seg1rw
90 12509 0x0079e000 0x007d5000 220 rw- full libroot.so_seg2rw
91 12501 0x008c8000 0x008d8000 64 rw- full rld heap
92 12510 0x00a7c000 0x00a94000 96 r-x full libgcc_s.so.1_seg0ro
93 12511 0x00a94000 0x00a95000 4 rw- full libgcc_s.so.1_seg1rw
94 12505 0x01141000 0x0115d000 112 r-x full libsupc++.so_seg0ro
95 12506 0x0115d000 0x0115f000 8 rw- full libsupc++.so_seg1rw
96 12499 0x01e66000 0x01e82000 112 r-x full runtime_loader_seg0ro
97 12500 0x01e82000 0x01e83000 4 rw- full runtime_loader_seg1rw
98 12503 0x026f5000 0x026f6000 4 r-x full kernel_debugger_seg0ro
99 12504 0x026f6000 0x026f7000 4 rw- full kernel_debugger_seg1rw
100 12498 0x60bcc000 0x60bd4000 32 r-xSk full commpage
101 12496 0x6144b000 0x6144f000 16 rw- full user area
102 12497 0x71350000 0x72356000 16408 rw-s full kernel_debugger_596_stack
103
104Protection Flags: r - read, w - write, x - execute, s - stack, o - overcommit, c - cloneable, S - shared, k - kernel
105
106Semaphores:
107 ID Count Last Holder Name
108 ------------------------------------------------------------
109
110