KERN: slab memory manager: created area 0xd9801000 (9913) KERN: vm_soft_fault: va 0x3030000 not covered by area in address space KERN: vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x3030303, ip 0x1ba8267, write 0, user 1, thread 0x377 KERN: vm_page_fault: thread "lyx" (887) in team "lyx" (887) tried to read address 0x3030303, ip 0x1ba8267 ("lyx_seg0ro" +0x2ef267) KERN: debug_server: Thread 887 entered the debugger: Segment violation KERN: stack trace, current PC 0x1ba8267 _ZN5boost9re_detail12perl_matcherIN9__gnu_cxx17__normal_iteratorIPKcSsEESaINS_9sub_matchIS6_EEENS_12regex_traitsIcNS_16cpp_regex_traitsIcEEEEE16match_all_statesEv + 0x55: KERN: (0x71a56ea8) 0x1ba84e9 _ZN5boost9re_detail12perl_matcherIN9__gnu_cxx17__normal_iteratorIPKcSsEESaINS_9sub_matchIS6_EEENS_12regex_traitsIcNS_16cpp_regex_traitsIcEEEEE12match_prefixEv + 0x1c7 KERN: (0x71a56ee8) 0x1d0e8e1 _ZN5boost9re_detail12perl_matcherIN9__gnu_cxx17__normal_iteratorIPKcSsEESaINS_9sub_matchIS6_EEENS_12regex_traitsIcNS_16cpp_regex_traitsIcEEEEE9match_impEv + 0x26d KERN: (0x71a56f28) 0x1d0eb58 _ZN5boost11regex_matchIN9__gnu_cxx17__normal_iteratorIPKcSsEESaINS_9sub_matchIS5_EEEcNS_12regex_traitsIcNS_16cpp_regex_traitsIcEEEEEEbT_SD_RNS_13match_resultsISD_T0_EERKNS_11basic_regexIT1_T2_EENS_15regex_constants12_match_flagsE + 0x15e KERN: (0x71a56fe8) 0x23ced17 _ZN3lyx7support22replaceEnvironmentPathERKSs + 0x35c KERN: (0x71a57488) 0x23d07f7 _ZN3lyx7support10fileSearchERKSsS2_S2_NS0_11search_modeE + 0x23 KERN: (0x71a57528) 0x23ebe34 _ZN3lyx7support12_GLOBAL__N_110isBuildDirERKNS0_8FileNameERKSsRS2_ + 0x1e9 KERN: (0x71a575e8) 0x23f1133 _ZN3lyx7support7PackageC2ERKSsS3_S3_ + 0x102d KERN: (0x71a58058) 0x23f3602 _ZN3lyx7support12init_packageERKSsS2_S2_ + 0x25 KERN: (0x71a580d8) 0x1d49a24 _ZN3lyx3LyX4execERiPPc + 0x5a KERN: (0x71a58448) 0x1b81b29 main + 0x58 KERN: (0x71a58498) 0x1b81992 _start + 0x52 KERN: (0x71a584d8) 0x1675b44 runtime_loader + 0x134 KERN: slab memory manager: created area 0xda001000 (10095) KERN: vm_soft_fault: va 0x6bf25000 not covered by area in address space KERN: vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x6bf2566a, ip 0x1f843f5, write 0, user 1, thread 0x37b KERN: vm_page_fault: thread "worker" (891) in team "Debugger" (890) tried to read address 0x6bf2566a, ip 0x1f843f5 ("Debugger_seg0ro" +0x1b83f5) KERN: debug_server: Thread 891 entered the debugger: Segment violation KERN: stack trace, current PC 0x1f843f5 next_argument__FPCc + 0x31: KERN: (0x71bc5b28) 0x1f84564 get_next_argument_internal__FPUlPCcPcUlPlPUlb + 0x7c KERN: (0x71bc5b78) 0x1f84973 get_next_argument_gcc2__FPUlPCcPcUlPlPUl + 0x3b KERN: (0x71bc5bb8) 0x1f83de2 get_next_argument__FPUlPCcPcUlPlPUl + 0x76 KERN: (0x71bc5bf8) 0x1f83c6e Demangle__9DemanglerRC7BString + 0x346 KERN: (0x71bc6058) 0x1ede105 GetFunctionsFromSymbols__22SpecificImageDebugInfoRCt11BObjectList1Z10SymbolInfoRt11BObjectList1Z17FunctionDebugInfoP17DebuggerInterfaceRC9ImageInfoP22SpecificImageDebugInfo + 0xb1 KERN: (0x71bc60b8) 0x1ec34b8 GetFunctions__22DebuggerImageDebugInfoRCt11BObjectList1Z10SymbolInfoRt11BObjectList1Z17FunctionDebugInfo + 0x30 KERN: (0x71bc60f8) 0x1edc56b FinishInit__14ImageDebugInfoP17DebuggerInterface + 0xc3 KERN: (0x71bc6198) 0x1edf873 LoadImageDebugInfo__13TeamDebugInfoRC9ImageInfoP13LocatableFileR26ImageDebugInfoLoadingStateRP14ImageDebugInfo + 0x1cf KERN: (0x71bc61e8) 0x1ef38e3 Do__21LoadImageDebugInfoJob + 0x8f KERN: (0x71bc6268) 0x1f7186a _ProcessJobs__6Worker + 0x1f2 KERN: (0x71bc62a8) 0x1f71585 _WorkerLoop__6Worker + 0x21 KERN: (0x71bc62e8) 0x1f7155b _WorkerLoopEntry__6WorkerPv + 0x1f KERN: (0x71bc6318) 0x271365f thread_entry + 0x23 KERN: vm_soft_fault: va 0xafdb2000 not covered by area in address space KERN: vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0xafdb2060, ip 0x251f26c, write 0, user 1, thread 0x3dc KERN: vm_page_fault: thread "lyx" (988) in team "lyx" (988) tried to read address 0xafdb2060, ip 0x251f26c ("???" +0x251f26c) KERN: debug_server: Thread 988 entered the debugger: Segment violation KERN: stack trace, current PC 0x251f26c _ZN5boost9re_detail12perl_matcherIN9__gnu_cxx17__normal_iteratorIPKcSsEESaINS_9sub_matchIS6_EEENS_12regex_traitsIcNS_16cpp_regex_traitsIcEEEEE16match_all_statesEv + 0x5a: KERN: (0x736cc3e8) 0x251f4e9 _ZN5boost9re_detail12perl_matcherIN9__gnu_cxx17__normal_iteratorIPKcSsEESaINS_9sub_matchIS6_EEENS_12regex_traitsIcNS_16cpp_regex_traitsIcEEEEE12match_prefixEv + 0x1c7 KERN: (0x736cc428) 0x26858e1 _ZN5boost9re_detail12perl_matcherIN9__gnu_cxx17__normal_iteratorIPKcSsEESaINS_9sub_matchIS6_EEENS_12regex_traitsIcNS_16cpp_regex_traitsIcEEEEE9match_impEv + 0x26d KERN: (0x736cc468) 0x2685b58 _ZN5boost11regex_matchIN9__gnu_cxx17__normal_iteratorIPKcSsEESaINS_9sub_matchIS5_EEEcNS_12regex_traitsIcNS_16cpp_regex_traitsIcEEEEEEbT_SD_RNS_13match_resultsISD_T0_EERKNS_11basic_regexIT1_T2_EENS_15regex_constants12_match_flagsE + 0x15e KERN: (0x736cc528) 0x2d45d17 _ZN3lyx7support22replaceEnvironmentPathERKSs + 0x35c KERN: (0x736cc9c8) 0x2d477f7 _ZN3lyx7support10fileSearchERKSsS2_S2_NS0_11search_modeE + 0x23 KERN: (0x736cca68) 0x2d62e34 _ZN3lyx7support12_GLOBAL__N_110isBuildDirERKNS0_8FileNameERKSsRS2_ + 0x1e9 KERN: (0x736ccb28) 0x2d68133 _ZN3lyx7support7PackageC2ERKSsS3_S3_ + 0x102d KERN: (0x736cd598) 0x2d6a602 _ZN3lyx7support12init_packageERKSsS2_S2_ + 0x25 KERN: (0x736cd618) 0x26c0a24 _ZN3lyx3LyX4execERiPPc + 0x5a KERN: (0x736cd988) 0x24f8b29 main + 0x58 KERN: (0x736cd9d8) 0x24f8992 _start + 0x52 KERN: (0x736cda18) 0xf1eb44 runtime_loader + 0x134 KERN: vm_soft_fault: va 0x6ccf0000 not covered by area in address space KERN: vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x6ccf0d2a, ip 0x24fa3f5, write 0, user 1, thread 0x3e0 KERN: vm_page_fault: thread "worker" (992) in team "Debugger" (991) tried to read address 0x6ccf0d2a, ip 0x24fa3f5 ("Debugger_seg0ro" +0x1b83f5) KERN: debug_server: Thread 992 entered the debugger: Segment violation KERN: stack trace, current PC 0x24fa3f5 next_argument__FPCc + 0x31: KERN: (0x71d8e838) 0x24fa564 get_next_argument_internal__FPUlPCcPcUlPlPUlb + 0x7c KERN: (0x71d8e888) 0x24fa973 get_next_argument_gcc2__FPUlPCcPcUlPlPUl + 0x3b KERN: (0x71d8e8c8) 0x24f9de2 get_next_argument__FPUlPCcPcUlPlPUl + 0x76 KERN: (0x71d8e908) 0x24f9c6e Demangle__9DemanglerRC7BString + 0x346 KERN: (0x71d8ed68) 0x2454105 GetFunctionsFromSymbols__22SpecificImageDebugInfoRCt11BObjectList1Z10SymbolInfoRt11BObjectList1Z17FunctionDebugInfoP17DebuggerInterfaceRC9ImageInfoP22SpecificImageDebugInfo + 0xb1 KERN: (0x71d8edc8) 0x24394b8 GetFunctions__22DebuggerImageDebugInfoRCt11BObjectList1Z10SymbolInfoRt11BObjectList1Z17FunctionDebugInfo + 0x30 KERN: (0x71d8ee08) 0x245256b FinishInit__14ImageDebugInfoP17DebuggerInterface + 0xc3 KERN: (0x71d8eea8) 0x2455873 LoadImageDebugInfo__13TeamDebugInfoRC9ImageInfoP13LocatableFileR26ImageDebugInfoLoadingStateRP14ImageDebugInfo + 0x1cf KERN: (0x71d8eef8) 0x24698e3 Do__21LoadImageDebugInfoJob + 0x8f KERN: (0x71d8ef78) 0x24e786a _ProcessJobs__6Worker + 0x1f2 KERN: (0x71d8efb8) 0x24e7585 _WorkerLoop__6Worker + 0x21 KERN: (0x71d8eff8) 0x24e755b _WorkerLoopEntry__6WorkerPv + 0x1f KERN: (0x71d8f028) 0x1c5d65f thread_entry + 0x23 KERN: vm_soft_fault: va 0xa528d000 not covered by area in address space KERN: vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0xa528d058, ip 0x22fa26c, write 0, user 1, thread 0x3f7 KERN: vm_page_fault: thread "lyx" (1015) in team "lyx" (1015) tried to read address 0xa528d058, ip 0x22fa26c ("???" +0x22fa26c) KERN: debug_server: Thread 1015 entered the debugger: Segment violation KERN: stack trace, current PC 0x22fa26c _ZN5boost9re_detail12perl_matcherIN9__gnu_cxx17__normal_iteratorIPKcSsEESaINS_9sub_matchIS6_EEENS_12regex_traitsIcNS_16cpp_regex_traitsIcEEEEE16match_all_statesEv + 0x5a: KERN: (0x7343c318) 0x22fa4e9 _ZN5boost9re_detail12perl_matcherIN9__gnu_cxx17__normal_iteratorIPKcSsEESaINS_9sub_matchIS6_EEENS_12regex_traitsIcNS_16cpp_regex_traitsIcEEEEE12match_prefixEv + 0x1c7 KERN: (0x7343c358) 0x24608e1 _ZN5boost9re_detail12perl_matcherIN9__gnu_cxx17__normal_iteratorIPKcSsEESaINS_9sub_matchIS6_EEENS_12regex_traitsIcNS_16cpp_regex_traitsIcEEEEE9match_impEv + 0x26d KERN: (0x7343c398) 0x2460b58 _ZN5boost11regex_matchIN9__gnu_cxx17__normal_iteratorIPKcSsEESaINS_9sub_matchIS5_EEEcNS_12regex_traitsIcNS_16cpp_regex_traitsIcEEEEEEbT_SD_RNS_13match_resultsISD_T0_EERKNS_11basic_regexIT1_T2_EENS_15regex_constants12_match_flagsE + 0x15e KERN: (0x7343c458) 0x2b20d17 _ZN3lyx7support22replaceEnvironmentPathERKSs + 0x35c KERN: (0x7343c8f8) 0x2b227f7 _ZN3lyx7support10fileSearchERKSsS2_S2_NS0_11search_modeE + 0x23 KERN: (0x7343c998) 0x2b3de34 _ZN3lyx7support12_GLOBAL__N_110isBuildDirERKNS0_8FileNameERKSsRS2_ + 0x1e9 KERN: (0x7343ca58) 0x2b43133 _ZN3lyx7support7PackageC2ERKSsS3_S3_ + 0x102d KERN: (0x7343d4c8) 0x2b45602 _ZN3lyx7support12init_packageERKSsS2_S2_ + 0x25 KERN: (0x7343d548) 0x249ba24 _ZN3lyx3LyX4execERiPPc + 0x5a KERN: (0x7343d8b8) 0x22d3b29 main + 0x58 KERN: (0x7343d908) 0x22d3992 _start + 0x52 KERN: (0x7343d948) 0x1ee7b44 runtime_loader + 0x134 KERN: vm_soft_fault: va 0x6d033000 not covered by area in address space KERN: vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x6d033aca, ip 0x11b83f5, write 0, user 1, thread 0x41f KERN: vm_page_fault: thread "worker" (1055) in team "Debugger" (1054) tried to read address 0x6d033aca, ip 0x11b83f5 ("Debugger_seg0ro" +0x1b83f5) KERN: debug_server: Thread 1055 entered the debugger: Segment violation KERN: stack trace, current PC 0x11b83f5 next_argument__FPCc + 0x31: KERN: (0x7034b408) 0x11b8564 get_next_argument_internal__FPUlPCcPcUlPlPUlb + 0x7c KERN: (0x7034b458) 0x11b8973 get_next_argument_gcc2__FPUlPCcPcUlPlPUl + 0x3b KERN: (0x7034b498) 0x11b7de2 get_next_argument__FPUlPCcPcUlPlPUl + 0x76 KERN: (0x7034b4d8) 0x11b7c6e Demangle__9DemanglerRC7BString + 0x346 KERN: (0x7034b938) 0x1112105 GetFunctionsFromSymbols__22SpecificImageDebugInfoRCt11BObjectList1Z10SymbolInfoRt11BObjectList1Z17FunctionDebugInfoP17DebuggerInterfaceRC9ImageInfoP22SpecificImageDebugInfo + 0xb1 KERN: (0x7034b998) 0x10f74b8 GetFunctions__22DebuggerImageDebugInfoRCt11BObjectList1Z10SymbolInfoRt11BObjectList1Z17FunctionDebugInfo + 0x30 KERN: (0x7034b9d8) 0x111056b FinishInit__14ImageDebugInfoP17DebuggerInterface + 0xc3 KERN: (0x7034ba78) 0x1113873 LoadImageDebugInfo__13TeamDebugInfoRC9ImageInfoP13LocatableFileR26ImageDebugInfoLoadingStateRP14ImageDebugInfo + 0x1cf KERN: (0x7034bac8) 0x11278e3 Do__21LoadImageDebugInfoJob + 0x8f KERN: (0x7034bb48) 0x11a586a _ProcessJobs__6Worker + 0x1f2 KERN: (0x7034bb88) 0x11a5585 _WorkerLoop__6Worker + 0x21 KERN: (0x7034bbc8) 0x11a555b _WorkerLoopEntry__6WorkerPv + 0x1f KERN: (0x7034bbf8) 0x1a9965f thread_entry + 0x23 KERN: vm_soft_fault: va 0xac00000 not covered by area in address space KERN: vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0xac00040, ip 0xac00040, write 0, user 1, thread 0x42e KERN: vm_page_fault: thread "lyx" (1070) in team "lyx" (1070) tried to execute address 0xac00040, ip 0xac00040 ("???" +0xac00040) KERN: debug_server: Thread 1070 entered the debugger: Segment violation KERN: stack trace, current PC 0xac00040 : KERN: (0x7258f628) 0x24de4e9 _ZN5boost9re_detail12perl_matcherIN9__gnu_cxx17__normal_iteratorIPKcSsEESaINS_9sub_matchIS6_EEENS_12regex_traitsIcNS_16cpp_regex_traitsIcEEEEE12match_prefixEv + 0x1c7 KERN: (0x7258f668) 0x26448e1 _ZN5boost9re_detail12perl_matcherIN9__gnu_cxx17__normal_iteratorIPKcSsEESaINS_9sub_matchIS6_EEENS_12regex_traitsIcNS_16cpp_regex_traitsIcEEEEE9match_impEv + 0x26d KERN: (0x7258f6a8) 0x2644b58 _ZN5boost11regex_matchIN9__gnu_cxx17__normal_iteratorIPKcSsEESaINS_9sub_matchIS5_EEEcNS_12regex_traitsIcNS_16cpp_regex_traitsIcEEEEEEbT_SD_RNS_13match_resultsISD_T0_EERKNS_11basic_regexIT1_T2_EENS_15regex_constants12_match_flagsE + 0x15e KERN: (0x7258f768) 0x2d04d17 _ZN3lyx7support22replaceEnvironmentPathERKSs + 0x35c KERN: (0x7258fc08) 0x2d067f7 _ZN3lyx7support10fileSearchERKSsS2_S2_NS0_11search_modeE + 0x23 KERN: (0x7258fca8) 0x2d21e34 _ZN3lyx7support12_GLOBAL__N_110isBuildDirERKNS0_8FileNameERKSsRS2_ + 0x1e9 KERN: (0x7258fd68) 0x2d27133 _ZN3lyx7support7PackageC2ERKSsS3_S3_ + 0x102d KERN: (0x725907d8) 0x2d29602 _ZN3lyx7support12init_packageERKSsS2_S2_ + 0x25 KERN: (0x72590858) 0x267fa24 _ZN3lyx3LyX4execERiPPc + 0x5a KERN: (0x72590bc8) 0x24b7b29 main + 0x58 KERN: (0x72590c18) 0x24b7992 _start + 0x52 KERN: (0x72590c58) 0x93cb44 runtime_loader + 0x134 KERN: vm_soft_fault: va 0x6b705000 not covered by area in address space KERN: vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x6b70524a, ip 0xceb3f5, write 0, user 1, thread 0x432 KERN: vm_page_fault: thread "worker" (1074) in team "Debugger" (1073) tried to read address 0x6b70524a, ip 0xceb3f5 ("Debugger_seg0ro" +0x1b83f5) KERN: debug_server: Thread 1074 entered the debugger: Segment violation KERN: stack trace, current PC 0xceb3f5 next_argument__FPCc + 0x31: KERN: (0x711b6d38) 0xceb564 get_next_argument_internal__FPUlPCcPcUlPlPUlb + 0x7c KERN: (0x711b6d88) 0xceb973 get_next_argument_gcc2__FPUlPCcPcUlPlPUl + 0x3b KERN: (0x711b6dc8) 0xceade2 get_next_argument__FPUlPCcPcUlPlPUl + 0x76 KERN: (0x711b6e08) 0xceac6e Demangle__9DemanglerRC7BString + 0x346 KERN: (0x711b7268) 0xc45105 GetFunctionsFromSymbols__22SpecificImageDebugInfoRCt11BObjectList1Z10SymbolInfoRt11BObjectList1Z17FunctionDebugInfoP17DebuggerInterfaceRC9ImageInfoP22SpecificImageDebugInfo + 0xb1 KERN: (0x711b72c8) 0xc2a4b8 GetFunctions__22DebuggerImageDebugInfoRCt11BObjectList1Z10SymbolInfoRt11BObjectList1Z17FunctionDebugInfo + 0x30 KERN: (0x711b7308) 0xc4356b FinishInit__14ImageDebugInfoP17DebuggerInterface + 0xc3 KERN: (0x711b73a8) 0xc46873 LoadImageDebugInfo__13TeamDebugInfoRC9ImageInfoP13LocatableFileR26ImageDebugInfoLoadingStateRP14ImageDebugInfo + 0x1cf KERN: (0x711b73f8) 0xc5a8e3 Do__21LoadImageDebugInfoJob + 0x8f KERN: (0x711b7478) 0xcd886a _ProcessJobs__6Worker + 0x1f2 KERN: (0x711b74b8) 0xcd8585 _WorkerLoop__6Worker + 0x21 KERN: (0x711b74f8) 0xcd855b _WorkerLoopEntry__6WorkerPv + 0x1f KERN: (0x711b7528) 0x1a0d65f thread_entry + 0x23 KERN: libnetwork.so running in R5 compatibility mode. KERN: vm_soft_fault: va 0x4605b000 not covered by area in address space KERN: vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x4605b858, ip 0x28e626c, write 0, user 1, thread 0x652 KERN: vm_page_fault: thread "lyx" (1618) in team "lyx" (1618) tried to read address 0x4605b858, ip 0x28e626c ("lyx_seg0ro" +0x2ef26c) KERN: debug_server: Thread 1618 entered the debugger: Segment violation KERN: stack trace, current PC 0x28e626c _ZN5boost9re_detail12perl_matcherIN9__gnu_cxx17__normal_iteratorIPKcSsEESaINS_9sub_matchIS6_EEENS_12regex_traitsIcNS_16cpp_regex_traitsIcEEEEE16match_all_statesEv + 0x5a: KERN: (0x7310c758) 0x28e64e9 _ZN5boost9re_detail12perl_matcherIN9__gnu_cxx17__normal_iteratorIPKcSsEESaINS_9sub_matchIS6_EEENS_12regex_traitsIcNS_16cpp_regex_traitsIcEEEEE12match_prefixEv + 0x1c7 KERN: (0x7310c798) 0x2a4c8e1 _ZN5boost9re_detail12perl_matcherIN9__gnu_cxx17__normal_iteratorIPKcSsEESaINS_9sub_matchIS6_EEENS_12regex_traitsIcNS_16cpp_regex_traitsIcEEEEE9match_impEv + 0x26d KERN: (0x7310c7d8) 0x2a4cb58 _ZN5boost11regex_matchIN9__gnu_cxx17__normal_iteratorIPKcSsEESaINS_9sub_matchIS5_EEEcNS_12regex_traitsIcNS_16cpp_regex_traitsIcEEEEEEbT_SD_RNS_13match_resultsISD_T0_EERKNS_11basic_regexIT1_T2_EENS_15regex_constants12_match_flagsE + 0x15e KERN: (0x7310c898) 0x310cd17 _ZN3lyx7support22replaceEnvironmentPathERKSs + 0x35c KERN: (0x7310cd38) 0x310e7f7 _ZN3lyx7support10fileSearchERKSsS2_S2_NS0_11search_modeE + 0x23 KERN: (0x7310cdd8) 0x3129e34 _ZN3lyx7support12_GLOBAL__N_110isBuildDirERKNS0_8FileNameERKSsRS2_ + 0x1e9 KERN: (0x7310ce98) 0x312f133 _ZN3lyx7support7PackageC2ERKSsS3_S3_ + 0x102d KERN: (0x7310d908) 0x3131602 _ZN3lyx7support12init_packageERKSsS2_S2_ + 0x25 KERN: (0x7310d988) 0x2a87a24 _ZN3lyx3LyX4execERiPPc + 0x5a KERN: (0x7310dcf8) 0x28bfb29 main + 0x58 KERN: (0x7310dd48) 0x28bf992 _start + 0x52 KERN: (0x7310dd88) 0x15b0b44 runtime_loader + 0x134 KERN: vm_soft_fault: va 0x6d51c000 not covered by area in address space KERN: vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x6d51ca7a, ip 0x1fcf3f5, write 0, user 1, thread 0x657 KERN: vm_page_fault: thread "worker" (1623) in team "Debugger" (1622) tried to read address 0x6d51ca7a, ip 0x1fcf3f5 ("Debugger_seg0ro" +0x1b83f5) KERN: debug_server: Thread 1623 entered the debugger: Segment violation KERN: stack trace, current PC 0x1fcf3f5 next_argument__FPCc + 0x31: KERN: (0x70a1f408) 0x1fcf564 get_next_argument_internal__FPUlPCcPcUlPlPUlb + 0x7c KERN: (0x70a1f458) 0x1fcf973 get_next_argument_gcc2__FPUlPCcPcUlPlPUl + 0x3b KERN: (0x70a1f498) 0x1fcede2 get_next_argument__FPUlPCcPcUlPlPUl + 0x76 KERN: (0x70a1f4d8) 0x1fcec6e Demangle__9DemanglerRC7BString + 0x346 KERN: (0x70a1f938) 0x1f29105 GetFunctionsFromSymbols__22SpecificImageDebugInfoRCt11BObjectList1Z10SymbolInfoRt11BObjectList1Z17FunctionDebugInfoP17DebuggerInterfaceRC9ImageInfoP22SpecificImageDebugInfo + 0xb1 KERN: (0x70a1f998) 0x1f0e4b8 GetFunctions__22DebuggerImageDebugInfoRCt11BObjectList1Z10SymbolInfoRt11BObjectList1Z17FunctionDebugInfo + 0x30 KERN: (0x70a1f9d8) 0x1f2756b FinishInit__14ImageDebugInfoP17DebuggerInterface + 0xc3 KERN: (0x70a1fa78) 0x1f2a873 LoadImageDebugInfo__13TeamDebugInfoRC9ImageInfoP13LocatableFileR26ImageDebugInfoLoadingStateRP14ImageDebugInfo + 0x1cf KERN: (0x70a1fac8) 0x1f3e8e3 Do__21LoadImageDebugInfoJob + 0x8f KERN: (0x70a1fb48) 0x1fbc86a _ProcessJobs__6Worker + 0x1f2 KERN: (0x70a1fb88) 0x1fbc585 _WorkerLoop__6Worker + 0x21 KERN: (0x70a1fbc8) 0x1fbc55b _WorkerLoopEntry__6WorkerPv + 0x1f KERN: (0x70a1fbf8) 0x1d2665f thread_entry + 0x23 KERN: vm_soft_fault: va 0x0 not covered by area in address space KERN: vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x0, ip 0x0, write 0, user 1, thread 0x66c KERN: vm_page_fault: thread "lyx" (1644) in team "lyx" (1644) tried to execute address 0x0, ip 0x0 ("???" +0x0) KERN: debug_server: Thread 1644 entered the debugger: Segment violation KERN: stack trace, current PC (nil) : KERN: (0x71eac5f8) 0x14e84e9 _ZN5boost9re_detail12perl_matcherIN9__gnu_cxx17__normal_iteratorIPKcSsEESaINS_9sub_matchIS6_EEENS_12regex_traitsIcNS_16cpp_regex_traitsIcEEEEE12match_prefixEv + 0x1c7 KERN: (0x71eac638) 0x164e8e1 _ZN5boost9re_detail12perl_matcherIN9__gnu_cxx17__normal_iteratorIPKcSsEESaINS_9sub_matchIS6_EEENS_12regex_traitsIcNS_16cpp_regex_traitsIcEEEEE9match_impEv + 0x26d KERN: (0x71eac678) 0x164eb58 _ZN5boost11regex_matchIN9__gnu_cxx17__normal_iteratorIPKcSsEESaINS_9sub_matchIS5_EEEcNS_12regex_traitsIcNS_16cpp_regex_traitsIcEEEEEEbT_SD_RNS_13match_resultsISD_T0_EERKNS_11basic_regexIT1_T2_EENS_15regex_constants12_match_flagsE + 0x15e KERN: (0x71eac738) 0x1d0ed17 _ZN3lyx7support22replaceEnvironmentPathERKSs + 0x35c KERN: (0x71eacbd8) 0x1d107f7 _ZN3lyx7support10fileSearchERKSsS2_S2_NS0_11search_modeE + 0x23 KERN: (0x71eacc78) 0x1d2be34 _ZN3lyx7support12_GLOBAL__N_110isBuildDirERKNS0_8FileNameERKSsRS2_ + 0x1e9 KERN: (0x71eacd38) 0x1d31133 _ZN3lyx7support7PackageC2ERKSsS3_S3_ + 0x102d KERN: (0x71ead7a8) 0x1d33602 _ZN3lyx7support12init_packageERKSsS2_S2_ + 0x25 KERN: (0x71ead828) 0x1689a24 _ZN3lyx3LyX4execERiPPc + 0x5a KERN: (0x71eadb98) 0x14c1b29 main + 0x58 KERN: (0x71eadbe8) 0x14c1992 _start + 0x52 KERN: (0x71eadc28) 0xefdb44 runtime_loader + 0x134 KERN: bfs: bfs_access:1516: Permission denied Last message repeated 1 time KERN: runtime_loader: Cannot open file libresolv.so: No such file or directory KERN: runtime_loader: Cannot open file libresolv: No such file or directory KERN: runtime_loader: Cannot open file resolv.so: No such file or directory KERN: runtime_loader: Cannot open file resolv: No such file or directory KERN: vm_soft_fault: va 0x6d876000 not covered by area in address space KERN: vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x6d876e3a, ip 0x9e03f5, write 0, user 1, thread 0x671 KERN: vm_page_fault: thread "worker" (1649) in team "Debugger" (1648) tried to read address 0x6d876e3a, ip 0x9e03f5 ("Debugger_seg0ro" +0x1b83f5) KERN: debug_server: Thread 1649 entered the debugger: Segment violation KERN: stack trace, current PC 0x9e03f5 next_argument__FPCc + 0x31: KERN: (0x7035e2f8) 0x9e0564 get_next_argument_internal__FPUlPCcPcUlPlPUlb + 0x7c KERN: (0x7035e348) 0x9e0973 get_next_argument_gcc2__FPUlPCcPcUlPlPUl + 0x3b KERN: (0x7035e388) 0x9dfde2 get_next_argument__FPUlPCcPcUlPlPUl + 0x76 KERN: (0x7035e3c8) 0x9dfc6e Demangle__9DemanglerRC7BString + 0x346 KERN: (0x7035e828) 0x93a105 GetFunctionsFromSymbols__22SpecificImageDebugInfoRCt11BObjectList1Z10SymbolInfoRt11BObjectList1Z17FunctionDebugInfoP17DebuggerInterfaceRC9ImageInfoP22SpecificImageDebugInfo + 0xb1 KERN: (0x7035e888) 0x91f4b8 GetFunctions__22DebuggerImageDebugInfoRCt11BObjectList1Z10SymbolInfoRt11BObjectList1Z17FunctionDebugInfo + 0x30 KERN: (0x7035e8c8) 0x93856b FinishInit__14ImageDebugInfoP17DebuggerInterface + 0xc3 KERN: (0x7035e968) 0x93b873 LoadImageDebugInfo__13TeamDebugInfoRC9ImageInfoP13LocatableFileR26ImageDebugInfoLoadingStateRP14ImageDebugInfo + 0x1cf KERN: (0x7035e9b8) 0x94f8e3 Do__21LoadImageDebugInfoJob + 0x8f KERN: (0x7035ea38) 0x9cd86a _ProcessJobs__6Worker + 0x1f2 KERN: (0x7035ea78) 0x9cd585 _WorkerLoop__6Worker + 0x21 KERN: (0x7035eab8) 0x9cd55b _WorkerLoopEntry__6WorkerPv + 0x1f KERN: (0x7035eae8) 0x21e965f thread_entry + 0x23 KERN: slab memory manager: created area 0xda801000 (24955) KERN: bfs: bfs_access:1516: Permission denied Last message repeated 1 time KERN: runtime_loader: Cannot open file libresolv.so: No such file or directory KERN: runtime_loader: Cannot open file libresolv: No such file or directory KERN: runtime_loader: Cannot open file resolv.so: No such file or directory KERN: runtime_loader: Cannot open file resolv: No such file or directory KERN: bfs: bfs_access:1516: Permission denied Last message repeated 1 time KERN: runtime_loader: Cannot open file libresolv.so: No such file or directory KERN: runtime_loader: Cannot open file libresolv: No such file or directory KERN: runtime_loader: Cannot open file resolv.so: No such file or directory KERN: runtime_loader: Cannot open file resolv: No such file or directory