Debug information for team /BeOS 5 Pro Edition/beos/apps/DiskProbe (1014): CPU(s): 8x AMD FX-Series Memory: 15.95 GiB total, 514.02 MiB used Haiku revision: hrev46660 Jan 11 2014 19:28:48 (BePC) Active Threads: thread 1015: team 1014 debug task thread 1014: DiskProbe (main) state: Exception (Segment violation) Frame IP Function Name ----------------------------------------------- 0x71f93f10 0x1967735 find_symbol(image_t*, SymbolLookupInfo&) + 0x65 Disassembly: find_symbol(image_t*, SymbolLookupInfo&): 0x019676d0: 55 push %ebp 0x019676d1: 89e5 mov %esp, %ebp 0x019676d3: 83ec1c sub $0x1c, %esp 0x019676d6: 57 push %edi 0x019676d7: 56 push %esi 0x019676d8: 53 push %ebx 0x019676d9: e800000000 call 0x19676de 0x019676de: 5b pop %ebx 0x019676df: 81c3821d0100 add $0x11d82, %ebx 0x019676e5: 8b4508 mov 0x8(%ebp), %eax 0x019676e8: 83b84c04000000 cmp $0x0, 0x44c(%eax) 0x019676ef: 7507 jnz 0x19676f8 0x019676f1: 31c0 xor %eax, %eax 0x019676f3: e9a4010000 jmp 0x196789c 0x019676f8: c745fc00000000 mov $0x0, -0x4(%ebp) 0x019676ff: c745f800000000 mov $0x0, -0x8(%ebp) 0x01967706: 8b5508 mov 0x8(%ebp), %edx 0x01967709: 8bb250040000 mov 0x450(%edx), %esi 0x0196770f: 8b4d0c mov 0xc(%ebp), %ecx 0x01967712: 8b5108 mov 0x8(%ecx), %edx 0x01967715: 89d0 mov %edx, %eax 0x01967717: 31d2 xor %edx, %edx 0x01967719: f736 div (%esi) 0x0196771b: 8b549608 mov 0x8(%esi,%edx,4), %edx 0x0196771f: e962010000 jmp 0x1967886 0x01967724: 8b45f4 mov -0xc(%ebp), %eax 0x01967727: c1e004 shl $0x4, %eax 0x0196772a: 89c7 mov %eax, %edi 0x0196772c: 8b5508 mov 0x8(%ebp), %edx 0x0196772f: 03ba54040000 add 0x454(%edx), %edi 0x01967735: 66837f0e00 cmpw $0x0, 0xe(%edi) <-- Frame memory: [0x71f93ee8] `...H?.q..*..p.. 60 94 97 01 48 3f f9 71 04 a0 2a 00 00 70 00 00 [0x71f93ef8] ......*.p?.q.... 03 00 00 00 04 a0 2a 00 70 3f f9 71 cc 00 00 00 [0x71f93f08] ........ 00 00 00 00 00 00 00 00 0x71f93f60 0x1966528 analyze_image_haiku_version_and_abi(int32, image_t*, Elf32_Ehdr&, int32, char*, uint32) + 0x54 0x71f953f0 0x1967468 load_image(char*, image_type, char*, char*, image_t*) + 0x5c8 0x71f95450 0x196504c load_program + 0x40 0x71f95480 0x196aee5 runtime_loader + 0x101 00000000 0x604c8250 commpage_thread_exit + 0 Registers: eip: 0x01967735 esp: 0x71f93ee8 ebp: 0x71f93f10 eax: 0x00000cc0 ebx: 0x01979460 ecx: 0x71f93f48 edx: 0x002aa004 esi: 0x02638094 edi: 0x0263a078 cs: 0x001b ds: 0x0023 es: 0x0023 fs: 0x00fb gs: 0x0023 ss: 0x0023 Loaded Images: ID Text Base Text End Data Base Data End Type Name -------------------------------------------------------------------------------- 3939 0x0195b000 0x01978000 0x01978000 0x0197b000 lib /boot/system/runtime_loader 3938 0x604c8000 0x604d0000 0x00000000 0x00000000 system commpage Areas: ID Base End Size (KiB) Protection Locking Name -------------------------------------------------------------------------------- 12047 0x00273000 0x00274000 4 rw-S full _rld_debug_ 12046 0x002aa000 0x002ba000 64 rw- full rld heap 12043 0x0195b000 0x01978000 116 r-x full runtime_loader_seg0ro 12044 0x01978000 0x0197a000 8 rw- full runtime_loader_seg1rw 12045 0x0197a000 0x0197b000 4 rw- full runtime_loader_bss1 12048 0x02638000 0x0265c000 144 rw-rw- full DiskProbe_seg0ro 12049 0x0265c000 0x02663000 28 rw- full DiskProbe_seg1rw 12042 0x604c8000 0x604d0000 32 r-xSk full commpage 12039 0x61859000 0x6185d000 16 rw- full user area 12041 0x70f96000 0x71f97000 16388 rw-s full DiskProbe_1014_stack Protection Flags: r - read, w - write, x - execute, s - stack, o - overcommit, c - cloneable, S - shared, k - kernel Semaphores: ID Count Last Holder Name ------------------------------------------------------------