Crash in different places (using memguard 1.15)

A forum for general AmigaOS 4.x support questions that are not platform-specific

Re: Crash in input.device (using memguard 1.15)

Postby broadblues » Tue Jan 03, 2017 5:43 pm

If it's repeatable post it here.

What I'm not sure about is how best to deal with these crash on FE Public but not in Beta things.

Atleast as a work arround you can switch off MemGuard.... it's not like you need to run that more than every now and then.
User avatar
broadblues
AmigaOS Core Developer
AmigaOS Core Developer
 
Posts: 481
Joined: Sat Jun 18, 2011 3:40 am
Location: Portsmouth, UK

Re: Crash in different places (using memguard 1.15)

Postby Raziel » Tue Jan 03, 2017 5:54 pm

You are right, it's not that i will derange the thread (changed the subject to make it more common though)

Oh and i was using Memguard simply because Thore asked me to do a serial log for a MUI misbehaviour, it's not running 24/7 ;-)
...but i'm temted to stress the OS a little memguard :-D

Ok, here we go, next reproducable crash with memguard running

1) Open a shell
2) Start memguard (without options)
3) Stay with the cursor inside the shell window and click the right button to bring up the PD menu
4) Choose Project/New Shell
5) Watch the world burn...well, not really :-)

Serial log Number 1
Code: Select all
MemGuard 1.15 (2.1.2009) installed.
Dump of context at 0xDFC637C0
Trap type: DSI exception
Machine State (raw): 0x100000000200D030
Machine State (verbose): [Hyper] [ExtInt on] [User] [IAT on] [DAT on]
Instruction pointer: in module kernel+0x0001A638 (0x0201A638)
Crashed process: NewShell (0x5D1DCDD0)
DSI verbose error description: Access not found in hash or BAT (page fault)
Access was a store operation
 0: 02038DC0 4F070770 ABADCAFE 60273760 60273FDC 00000000 00000140 4F070AC8
 8: 00000000 A9ABADAF A1A3A5A7 7F792B54 35955993 ABADCAFE 00000100 80000003
16: 80000001 02B30000 02B30000 00000000 00000120 02950000 02950000 02806338
24: 02950000 DFFF3B84 02950000 60273FDC 00000000 60273FD0 02973054 DFFF3B40
CR: 95953555   XER: 8000007E  CTR: 0201A614  LR: 02030874
DSISR: 42000000  DAR: A1A3A5AB
HID0: 0x8000000000000000  HID1: 0x000000005CE993B1
HID4: 0x4400240000080180  HID5: 0x0000006600000080

V0 : 00000000000000000000000000000000 FF5576B2FF5576B2FF5576B2FF5576B2
V2 : FF5576B2FF5576B2FF5576B2FF5576B2 00000000000000000000000000000000
V4 : AF50A956AE51A857AE51A857AE51A857 FE01AC53FE01AB54FE01AB54FE01AB54
V6 : 00000000010101010202020203030303 FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
V8 : 001002120414061608180A1A0C1C0E1E FFB0ADAAFFAFACA9FFAFACA9FFAFACA9
V10: 01000100010001000100010001000100 00000000000000000000000000000000
V12: 54ABB14E54ABB14E54ABB14E54ABB14E 0C0D0E0F101112131415161718191A1B
V14: FFB0ADAAFFAFACA9FFAFACA9FFAFACA9 FE01758AFE01758AFE01758AFE01758A
V16: 55ABB24E55ABB24E55ABB24E55ABB24E 00000000000000000000000000000000
V18: FF01AD53FF01AC54FF01AC54FF01AC54 AF50A956AE51A857AE51A857AE51A857
V20: 00000000000000000000000000000000 00000000000000000000000000000000
V22: 00000000000000000000000000000000 00000000000000000000000000000000
V24: 00000000000000000000000000000000 00000000000000000000000000000000
V26: 00000000000000000000000000000000 00000000000000000000000000000000
V28: 00000000000000000000000000000000 00000000000000000000000000000000
V30: 00000000000000000000000000000000 00000000000000000000000000000000
VSCR: 00000000 VRSAVE: 00000000

Disassembly of crash site:
 0201A628: 7D234B78   mr                r3,r9
 0201A62C: 91440000   stw               r10,0(r4)
 0201A630: 81490000   lwz               r10,0(r9)
 0201A634: 81290004   lwz               r9,4(r9)
>0201A638: 912A0004   stw               r9,4(r10)
 0201A63C: 4E800020   blr
 0201A640: 38600000   li                r3,0
 0201A644: 4E800020   blr
 0201A648: 81230000   lwz               r9,0(r3)
 0201A64C: 81430004   lwz               r10,4(r3)

Kernel command line: SERIAL MUNGE DEBUGLEVEL=1

Registers pointing to code:


Serial log Number 2
Code: Select all
MemGuard 1.15 (2.1.2009) installed.
Dump of context at 0xDF88E7C0
Trap type: DSI exception
Machine State (raw): 0x100000000200D030
Machine State (verbose): [Hyper] [ExtInt on] [User] [IAT on] [DAT on]
Instruction pointer: in module kernel+0x0001A638 (0x0201A638)
Crashed process: NewShell (0x4FA65BB0)
DSI verbose error description: Access not found in hash or BAT (page fault)
Access was a store operation
 0: 02038DC0 4DA2D770 03FC000C 4FA811B0 4FA81FDC 00000000 00000140 4DA2DAC8
 8: 00000000 A9ABADAF A1A3A5A7 7F696B54 24844882 F00000C3 00000100 80000003
16: 80000001 02B30000 02B30000 00000000 00000120 02950000 02950000 02806338
24: 02950000 DFFF3B84 02950000 4FA81FDC 00000000 4FA81FD0 02973054 DFFF3B40
CR: 84842444   XER: 00000070  CTR: 0201A614  LR: 02030874
DSISR: 42000000  DAR: A1A3A5AB
HID0: 0x8000000000000000  HID1: 0x000000005CE993B1
HID4: 0x4400240000080180  HID5: 0x0000006600000080

V0 : 00000000000000000000000000000000 FF999999FF999999FF999999FF999999
V2 : FF5678B6FF5578B5FF577AB8FF577AB9 00000000000000000000000000000000
V4 : 59A6BA4559A6BA4559A6BA4559A6BA45 FE017C83FE017C83FE017C83FE017C83
V6 : 00000000010101010202020203030303 FF000000FF000000FF000000FF000000
V8 : 001002120414061608180A1A0C1C0E1E FF5A7DBBFF5A7DBBFF5A7DBBFF5A7DBB
V10: 01000100010001000100010001000100 FF999999FF999999FF999999FF999999
V12: FF999999FF999999FF999999FF999999 FF999999FF999999FF999999FF999999
V14: FF5A7DBBFF5A7DBBFF5A7DBBFF5A7DBB FE017986FE017986FE017A85FE01CE31
V16: 57A9B94757A9B94757A9B947C13FE51B 00000000000000000000000000000000
V18: FF017D83FF017D83FF017D83FF017D83 59A6BA4559A6BA4559A6BA4559A6BA45
V20: 00000000000000000000000000000000 00000000000000000000000000000000
V22: 00000000000000000000000000000000 00000000000000000000000000000000
V24: 00000000000000000000000000000000 00000000000000000000000000000000
V26: 00000000000000000000000000000000 00000000000000000000000000000000
V28: 00000000000000000000000000000000 00000000000000000000000000000000
V30: 00000000000000000000000000000000 00000000000000000000000000000000
VSCR: 00000000 VRSAVE: 00000000

Disassembly of crash site:
 0201A628: 7D234B78   mr                r3,r9
 0201A62C: 91440000   stw               r10,0(r4)
 0201A630: 81490000   lwz               r10,0(r9)
 0201A634: 81290004   lwz               r9,4(r9)
>0201A638: 912A0004   stw               r9,4(r10)
 0201A63C: 4E800020   blr
 0201A640: 38600000   li                r3,0
 0201A644: 4E800020   blr
 0201A648: 81230000   lwz               r9,0(r3)
 0201A64C: 81430004   lwz               r10,4(r3)

Kernel command line: SERIAL MUNGE DEBUGLEVEL=1

Registers pointing to code:


They are the same in the sense of i changed nothing on the setup, i just wanted to show that it's reproducable every time
If slaughterhouses had glass walls, everyone would be a vegetarian. ~ Sir Paul McCartney
-
Did everything just taste purple for a second? ~ Philip J. Fry
-
Ain't got no cash, ain't got no style, ladies vomit when I smile. ~ Dr. John Zoidberg
User avatar
Raziel
 
Posts: 770
Joined: Sat Jun 18, 2011 5:00 pm
Location: A haunted Castle somewhere in the Bavarian Mountains

Re: Crash in different places (using memguard 1.15)

Postby broadblues » Tue Jan 03, 2017 9:28 pm

Not even a spark on beta.
User avatar
broadblues
AmigaOS Core Developer
AmigaOS Core Developer
 
Posts: 481
Joined: Sat Jun 18, 2011 3:40 am
Location: Portsmouth, UK

Re: Crash in different places (using memguard 1.15)

Postby Raziel » Wed Jan 04, 2017 12:40 am

I know it's not happening on beta systems, but i wanted to add one last crash.

It's special because it doesn't freeze right away *AND* it caught a memguard hit before the freeze, maybe that helps a little more?

Happens in Shell again (not much i can do outside shell with memguard running anyway)

1) Start the Shell
2) Right-Click to bring up the PD menu
3) Go to Projects/About to load the about window

...the window will come up (somethimes with text inside, sometimes not, depends on how fast the illegal mem accress hits the system i assume)
...i can still move the mouse and type for another few seconds until the system freeze hits in

Code: Select all
MemGuard 1.15 (2.1.2009) installed.

MEMGUARD HIT - "WinFrame 1 Process" (60A9B350)
front wall damaged -- 4CABB2A0 = AllocMem(324, 00011000)
 0: 023961BC 4C2652F0 071FE026 02973054 4CABB2A0 00000144 00000043 0026B000
 8: FFFFFFFF 7F86198C 00000000 4C15C808 35533395 C3DC07E8 611DD9C0 85002001
16: 615BCA76 00000000 615BC9D0 00008000 61D6F7DC 00000000 4C265958 00000000
24: 02394F94 6FF8C180 02973054 00000000 6FFFF800 6FF3C140 611DDAA0 4CABB2A0
----> 023961BC : "graphics.library.kmod" segment 0000 offset C729C
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F86198C : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 898C
----> 02394F94 : "graphics.library.kmod" segment 0000 offset C6074
----> 02973054 : "kernel" segment 0001 offset 43054
LRa   0239FCEC : "graphics.library.kmod" segment 0000 offset D0DCC
CTRa  7F861914 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 8914
LR    023961D4 : "graphics.library.kmod" segment 0000 offset C72B4
CTR   7F86198C : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 898C

Stack backtrace:
----> 023961D4 : "graphics.library.kmod" segment 0000 offset C72B4
----> 02396314 : "graphics.library.kmod" segment 0000 offset C73F4
----> 021B56CC : "intuition.library.kmod" segment 0000 offset 2A62C
----> 021F1B38 : "intuition.library.kmod" segment 0000 offset 66A98
----> 021B6078 : "intuition.library.kmod" segment 0000 offset 2AFD8
----> 021B630C : "intuition.library.kmod" segment 0000 offset 2B26C
----> 02205098 : "intuition.library.kmod" segment 0000 offset 79FF8
----> 02205320 : "intuition.library.kmod" segment 0000 offset 7A280
----> 7FDE4488 : "CLASSES:window.class" segment 0005 offset 4488
----> 7FDE9DBC : "CLASSES:window.class" segment 0005 offset 9DBC
----> 021AC4E8 : "intuition.library.kmod" segment 0000 offset 21448
----> 021AC68C : "intuition.library.kmod" segment 0000 offset 215EC
----> 02195494 : "intuition.library.kmod" segment 0000 offset A3F4
----> 021950D4 : "intuition.library.kmod" segment 0000 offset A034
----> 7FA7610C : "CLASSES:requester.class" segment 0005 offset 410C
----> 021AC4E8 : "intuition.library.kmod" segment 0000 offset 21448
----> 021AC68C : "intuition.library.kmod" segment 0000 offset 215EC
----> 02195494 : "intuition.library.kmod" segment 0000 offset A3F4
----> 021950D4 : "intuition.library.kmod" segment 0000 offset A034
----> 02102CEC : "console.device.kmod" segment 0000 offset ECAC
----> 02113FF0 : "console.device.kmod" segment 0000 offset 1FFB0
----> 02102230 : "console.device.kmod" segment 0000 offset E1F0
----> 0213AA88 : "dos.library.kmod" segment 0000 offset 255C8
----> 020420AC : "kernel" segment 0000 offset 420AC
----> 020420F4 : "kernel" segment 0000 offset 420F4

Disassembly:
 023961D0: 4E800421     bctrl
 023961D4: 80010064     lwz     r0,100(r1)
 023961D8: 8181003C     lwz     r12,60(r1)
 023961DC: 7C0803A6     mtlr    r0
 023961E0: 83010040     lwz     r24,64(r1)

68k context:
DATA: 00000001 00000000 00000000 00000000 00000000 00000000 00000000 00000000
ADDR: 6FFB8000 96FA0A00 00000000 00000000 00000000 00000000 00000000 4C2650A0
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000

68k Stack backtrace:
----> 02020580 : "kernel" segment 0000 offset 20580
----> 02020580 : "kernel" segment 0000 offset 20580
----> 7F859020 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 0020
----> 02033244 : "kernel" segment 0000 offset 33244
----> 02A92CA4 : "kernel" segment 0001 offset 162CA4
----> 02A956F0 : "kernel" segment 0001 offset 1656F0
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F85935C : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 035C

68k Disassembly:
 4C2650D0: 4C26 5100            mulu.l  -(a6),d5
 4C2650D4: 0202 0580            andi.b  #0x80,d2
 4C2650D8: 4FBB B000            chk.w   (0,pc,a3.w),d7
 4C2650DC: DFBC DC00 7F85       add.l   d7,#-0x23ff807b
 4C2650E2: 9020                 sub.b   -(a0),d0

MEMGUARD HIT - [4] "Workbench" (60AD9630)
front wall damaged -- 4CABB2A0 = AllocVecTagList(288, AVT_Type, 00001000, ...)
 0: 0212B470 60A8DD10 ABADCAFE 02973054 4CABB2A0 021446BC 021446BC 01505C5F
 8: 6290134C 00000000 7F8619C8 0201ED14 02973054 ABADCAFE 02814EFC 18A40586
16: 02B30000 1BED01A8 20000000 00000000 60A8DD40 02B30000 60AD96C4 00000000
24: 00000000 02B30000 6FBB33E0 60AD9630 000003ED 4CABB2A0 00100000 4CABB2A0
----> 0212B470 : "dos.library.kmod" segment 0000 offset 15FB0
----> 02973054 : "kernel" segment 0001 offset 43054
----> 021446BC : "dos.library.kmod" segment 0000 offset 2F1FC
----> 021446BC : "dos.library.kmod" segment 0000 offset 2F1FC
----> 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
----> 0201ED14 : "kernel" segment 0000 offset 1ED14
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02814EFC : "dos.library.kmod" segment 0002 offset 3FDC
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
LRa   0201D11C : "kernel" segment 0000 offset 1D11C
CTRa  7F861BE4 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 8BE4
LR    0212B438 : "dos.library.kmod" segment 0000 offset 15F78
CTR   7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8

Stack backtrace:
----> 0212B438 : "dos.library.kmod" segment 0000 offset 15F78
----> 0212B3DC : "dos.library.kmod" segment 0000 offset 15F1C
----> 02138F60 : "dos.library.kmod" segment 0000 offset 23AA0
----> 0212F954 : "dos.library.kmod" segment 0000 offset 1A494
----> 7FF1D53C : "LIBS:workbench.library" segment 0005 offset 5C53C
----> 7FF1C6CC : "LIBS:workbench.library" segment 0005 offset 5B6CC
----> 7FF1C988 : "LIBS:workbench.library" segment 0005 offset 5B988
----> 7FEFDDC8 : "LIBS:workbench.library" segment 0005 offset 3CDC8
----> 7FEFFEE0 : "LIBS:workbench.library" segment 0005 offset 3EEE0
----> 0213AA88 : "dos.library.kmod" segment 0000 offset 255C8
----> 020420AC : "kernel" segment 0000 offset 420AC
----> 020420F4 : "kernel" segment 0000 offset 420F4

Disassembly:
 0212B434: 4E800421     bctrl
 0212B438: 83E10014     lwz     r31,20(r1)
 0212B43C: 7FE803A6     mtlr    r31
 0212B440: 83E1000C     lwz     r31,12(r1)
 0212B444: 38210010     addi    r1,r1,16

68k context:
DATA: 00000001 00000000 00000000 00000000 00000000 00000000 00000000 00000000
ADDR: 6FFB8000 93B06A00 00000000 00000000 00000000 00000000 00000000 60A8E420
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000

68k Stack backtrace:
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F860CF8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 7CF8
----> 0204AC28 : "kernel" segment 0000 offset 4AC28
----> 020260A8 : "kernel" segment 0000 offset 260A8
----> 0201AADC : "kernel" segment 0000 offset 1AADC
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 7F859170 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 0170
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202

68k Disassembly:
 60A8E430: 60A8                 bra.b   0x60a8e3da
 60A8E432: EA9C                 ror.l   #5,d4
 60A8E434: 60AD                 bra.b   0x60a8e3e3
 60A8E436: 9630 60AE            sub.b   (0xae,a0,d6.w),d3
 60A8E43A: 0000 0297            ori.b   #0x97,d0

MEMGUARD HIT - [4] "Workbench" (60AD9630)
front wall damaged -- 4CABB2A0 = AllocVecTagList(288, AVT_Type, 00001000, ...)
 0: 0212B470 60A8DD10 ABADCAFE 02973054 4CABB2A0 021446BC 021446BC 01505C5F
 8: 6290134C 00000000 7F8619C8 0201ED14 02973054 ABADCAFE 02814EFC 18A40586
16: 02B30000 1BED01A8 20000000 00000000 60A8DD40 02B30000 60AD96C4 00000000
24: 00000000 02B30000 6FBB33E0 60AD9630 000003ED 4CABB2A0 00100000 4CABB2A0
----> 0212B470 : "dos.library.kmod" segment 0000 offset 15FB0
----> 02973054 : "kernel" segment 0001 offset 43054
----> 021446BC : "dos.library.kmod" segment 0000 offset 2F1FC
----> 021446BC : "dos.library.kmod" segment 0000 offset 2F1FC
----> 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
----> 0201ED14 : "kernel" segment 0000 offset 1ED14
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02814EFC : "dos.library.kmod" segment 0002 offset 3FDC
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
LRa   0201D11C : "kernel" segment 0000 offset 1D11C
CTRa  7F861BE4 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 8BE4
LR    0212B438 : "dos.library.kmod" segment 0000 offset 15F78
CTR   7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8

Stack backtrace:
----> 0212B438 : "dos.library.kmod" segment 0000 offset 15F78
----> 0212B3DC : "dos.library.kmod" segment 0000 offset 15F1C
----> 02138F60 : "dos.library.kmod" segment 0000 offset 23AA0
----> 0212F954 : "dos.library.kmod" segment 0000 offset 1A494
----> 7FF1D53C : "LIBS:workbench.library" segment 0005 offset 5C53C
----> 7FF1C6CC : "LIBS:workbench.library" segment 0005 offset 5B6CC
----> 7FF1C988 : "LIBS:workbench.library" segment 0005 offset 5B988
----> 7FEFDDC8 : "LIBS:workbench.library" segment 0005 offset 3CDC8
----> 7FEFFEE0 : "LIBS:workbench.library" segment 0005 offset 3EEE0
----> 0213AA88 : "dos.library.kmod" segment 0000 offset 255C8
----> 020420AC : "kernel" segment 0000 offset 420AC
----> 020420F4 : "kernel" segment 0000 offset 420F4

Disassembly:
 0212B434: 4E800421     bctrl
 0212B438: 83E10014     lwz     r31,20(r1)
 0212B43C: 7FE803A6     mtlr    r31
 0212B440: 83E1000C     lwz     r31,12(r1)
 0212B444: 38210010     addi    r1,r1,16

68k context:
DATA: 00000001 00000000 00000000 00000000 00000000 00000000 00000000 00000000
ADDR: 6FFB8000 93B06A00 00000000 00000000 00000000 00000000 00000000 60A8E420
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000

68k Stack backtrace:
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F860CF8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 7CF8
----> 0204AC28 : "kernel" segment 0000 offset 4AC28
----> 020260A8 : "kernel" segment 0000 offset 260A8
----> 0201AADC : "kernel" segment 0000 offset 1AADC
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 7F859170 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 0170
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202

68k Disassembly:
 60A8E430: 60A8                 bra.b   0x60a8e3da
 60A8E432: EA9C                 ror.l   #5,d4
 60A8E434: 60AD                 bra.b   0x60a8e3e3
 60A8E436: 9630 60AE            sub.b   (0xae,a0,d6.w),d3
 60A8E43A: 0000 0297            ori.b   #0x97,d0

MEMGUARD HIT - [4] "Workbench" (60AD9630)
front wall damaged -- 4CABB2A0 = AllocVecTagList(288, AVT_Type, 00001000, ...)
 0: 0212B470 60A8DD10 ABADCAFE 02973054 4CABB2A0 021446BC 021446BC 01505C5F
 8: 629016B4 00000000 7F8619C8 0201ED14 02973054 ABADCAFE 02814EFC 18A40586
16: 02B30000 00000000 20000000 00000000 60A8DD40 02B30000 60AD96C4 00000000
24: 00000000 02B30000 6FBB33E0 60AD9630 000003ED 4CABB2A0 60A8ED9C 4CABB2A0
----> 0212B470 : "dos.library.kmod" segment 0000 offset 15FB0
----> 02973054 : "kernel" segment 0001 offset 43054
----> 021446BC : "dos.library.kmod" segment 0000 offset 2F1FC
----> 021446BC : "dos.library.kmod" segment 0000 offset 2F1FC
----> 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
----> 0201ED14 : "kernel" segment 0000 offset 1ED14
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02814EFC : "dos.library.kmod" segment 0002 offset 3FDC
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
LRa   0201D11C : "kernel" segment 0000 offset 1D11C
CTRa  7F861BE4 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 8BE4
LR    0212B438 : "dos.library.kmod" segment 0000 offset 15F78
CTR   7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8

Stack backtrace:
----> 0212B438 : "dos.library.kmod" segment 0000 offset 15F78
----> 0212B3DC : "dos.library.kmod" segment 0000 offset 15F1C
----> 02138F60 : "dos.library.kmod" segment 0000 offset 23AA0
----> 0212F954 : "dos.library.kmod" segment 0000 offset 1A494
----> 7FF1D53C : "LIBS:workbench.library" segment 0005 offset 5C53C
----> 7FF1C6CC : "LIBS:workbench.library" segment 0005 offset 5B6CC
----> 7FF1C988 : "LIBS:workbench.library" segment 0005 offset 5B988
----> 7FEFDDC8 : "LIBS:workbench.library" segment 0005 offset 3CDC8
----> 7FEFFEE0 : "LIBS:workbench.library" segment 0005 offset 3EEE0
----> 0213AA88 : "dos.library.kmod" segment 0000 offset 255C8
----> 020420AC : "kernel" segment 0000 offset 420AC
----> 020420F4 : "kernel" segment 0000 offset 420F4

Disassembly:
 0212B434: 4E800421     bctrl
 0212B438: 83E10014     lwz     r31,20(r1)
 0212B43C: 7FE803A6     mtlr    r31
 0212B440: 83E1000C     lwz     r31,12(r1)
 0212B444: 38210010     addi    r1,r1,16

68k context:
DATA: 00000001 00000000 00000000 00000000 00000000 00000000 00000000 00000000
ADDR: 6FFB8000 93B06A00 00000000 00000000 00000000 00000000 00000000 60A8E420
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000

68k Stack backtrace:
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F860CF8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 7CF8
----> 0204AC28 : "kernel" segment 0000 offset 4AC28
----> 020260A8 : "kernel" segment 0000 offset 260A8
----> 0201AADC : "kernel" segment 0000 offset 1AADC
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 7F859170 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 0170
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202

68k Disassembly:
 60A8E430: 60A8                 bra.b   0x60a8e3da
 60A8E432: EA9C                 ror.l   #5,d4
 60A8E434: 60AD                 bra.b   0x60a8e3e3
 60A8E436: 9630 60AE            sub.b   (0xae,a0,d6.w),d3
 60A8E43A: 0000 0297            ori.b   #0x97,d0

MEMGUARD HIT - "input.device" (6FF3FA20)
rear wall damaged -- 602737E0 = AllocVec(32, 00010003)
 0: 0221F248 6FE91C60 5441A88E 02973054 602737E0 00000014 00000006 00000000
 8: 00000000 7F8619C8 00000000 A0000000 3381C599 CC8FAECE 00000000 00000000
16: 00000000 00000001 00000000 8440000C 00000000 00000000 00000001 00000005
24: 00000001 00000029 02B30000 4E5DEE20 00000000 6FF47842 02B30000 4E5DEC40
----> 0221F248 : "intuition.library.kmod" segment 0000 offset 941A8
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
LRa   022D2924 : "graphics.library.kmod" segment 0000 offset 3A04
CTRa  7F861950 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 8950
LR    022DDE04 : "graphics.library.kmod" segment 0000 offset EEE4
CTR   7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8

Stack backtrace:
----> 022DDE04 : "graphics.library.kmod" segment 0000 offset EEE4
----> 0221F248 : "intuition.library.kmod" segment 0000 offset 941A8
----> 021AD26C : "intuition.library.kmod" segment 0000 offset 221CC
----> 021ACA98 : "intuition.library.kmod" segment 0000 offset 219F8
----> 7FAC25D8 : "MouseBlanker" segment 0005 offset 25D8
----> 7FFB7718 : "LIBS:commodities.library" segment 0005 offset 1718
----> 02188BD0 : "input.device.kmod" segment 0000 offset 0A70
----> 0218A77C : "input.device.kmod" segment 0000 offset 261C
----> 0201F148 : "kernel" segment 0000 offset 1F148

Disassembly:
 022DDE00: 4E800421     bctrl
 022DDE04: 807EFEC0     lwz     r3,-320(r30)
 022DDE08: 7FE4FB78     mr      r4,r31
 022DDE0C: 38A00010     li      r5,16
 022DDE10: 80010014     lwz     r0,20(r1)

68k context:
DATA: 00000001 00000000 00000000 00000000 00000000 00000000 00000000 00000000
ADDR: 6FFB8000 96FCD900 00000000 00000000 00000000 00000000 00000000 6FE91AF0
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000

68k Stack backtrace:
----> 0231B7CC : "graphics.library.kmod" segment 0000 offset 4C8AC
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020A2C : "kernel" segment 0000 offset 20A2C
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
----> 7F85EFCC : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 5FCC
----> 61E01020 : "Development:Debugging/Memguard/MemGuard" segment 0006 offset 0020
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 7F8619F4 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89F4
----> 0221F248 : "intuition.library.kmod" segment 0000 offset 941A8
----> 02973054 : "kernel" segment 0001 offset 43054

68k Disassembly:
 6FE91B20: 6FE9                 ble.b   0x6fe91b0b
 6FE91B22: 1970 0000 0000       move.b  (0,a0,d0.w),0(a4)
 6FE91B28: 02B3 0000 4E5D EE20  andi.l  #0x4e5d,(0x20,a3,a6.l*8)
 6FE91B30: 3589 3359            move.w  a1,([0,a2,0],0)
 6FE91B34: CC8F                 and.l   sp,d6

MEMGUARD HIT - [1] "Background CLI" (501D9350)
front wall damaged -- 4CABB2A0 = AllocVecTagList(260, AVT_Type, 00001000, ...)
 0: 0212B164 60B50F30 ABADCAFE 02973054 4CABB2A0 132AECA8 00000043 00000000
 8: 000001EA 00000008 00000000 4C15C700 7F8619C8 ABADCAFE 00000000 00000000
16: 60B4D04C 00000000 00000000 ABADCAFE 02B30000 40000004 ABADCAFE 00000000
24: ABADCAFE 00000000 02B30000 4E6BBC00 02B30000 0212AD9C 02973054 02973054
----> 0212B164 : "dos.library.kmod" segment 0000 offset 15CA4
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 0212AD9C : "dos.library.kmod" segment 0000 offset 158DC
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02973054 : "kernel" segment 0001 offset 43054
Allocating task was "AmiDock" (61D87350)
LRa   0201D11C : "kernel" segment 0000 offset 1D11C
CTRa  7F861BE4 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 8BE4
LR    0212B180 : "dos.library.kmod" segment 0000 offset 15CC0
CTR   7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8

Stack backtrace:
----> 0212B180 : "dos.library.kmod" segment 0000 offset 15CC0
----> 0211ED14 : "dos.library.kmod" segment 0000 offset 9854
----> 0211FBB0 : "dos.library.kmod" segment 0000 offset A6F0
----> 0211FB04 : "dos.library.kmod" segment 0000 offset A644

Disassembly:
 0212B17C: 4E800421     bctrl
 0212B180: 811CCBA4     lwz     r8,-13404(r28)
 0212B184: 815B0010     lwz     r10,16(r27)
 0212B188: 80E800AC     lwz     r7,172(r8)
 0212B18C: 7D034378     mr      r3,r8

Dump of context at 0xDFC667C0
Trap type: DSI exception
Machine State (raw): 0x100000000200B030
Machine State (verbose): [Hyper] [ExtInt on] [Super] [FPU on] [IAT on] [DAT on]
Instruction pointer: in module kernel+0x0001A638 (0x0201A638)
Crashed process: Workbench (0x601FC330)
DSI verbose error description: Access not found in hash or BAT (page fault)
Access was a store operation
 0: 02038DC0 601D26A0 ABADCAFE 60BB7720 60BB7FDC 00000000 00000140 601D29F8
 8: 00000000 C9CBCDCF C1C3C5C7 7F83BC24 37333993 ABADCAFE 02973054 6FFB95CC
16: 6FF22AD8 00000000 00000000 00000000 00000120 02950000 02950000 02806338
24: 02950000 DFFF3B84 02950000 60BB7FDC 00000000 60BB7FD0 02973054 DFFF3B40
CR: 97333555   XER: 8000007E  CTR: 0201A614  LR: 02030874
DSISR: 42000000  DAR: C1C3C5CB

FP0 : FFF8000082004000 FFEDE9E5FFECE9E4 FFEBEBEBEBEBEBEB FFEBE8E3FFE9E4DF
FP4 : FFFFFFFFFFFFFFFF FAFAFAFAFAFAFAFA FFFFFFFFFFFFFFFF 4050000000000000
FP8 : 4050000000000000 3FF0000000000000 3FF0000000000000 4330000080000000
FP12: 4070000000000000 4330000080000014 0000000000000000 0000000000000000
FP16: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
FP20: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
FP24: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
FP28: 0000000000000000 0000000000000000 0000000000000000 8000000000000000
FPSCR: 82004000
HID0: 0x8000000000000000  HID1: 0x000000005CE993B1
HID4: 0x4400240000080180  HID5: 0x0000006600000080

V0 : 00000000000000000000000000000000 00000000000000000000000000000000
V2 : 01010101FFDBDBDBFFDBDBDBFFDBDBDB 00000000000000000000000000000000
V4 : DA25DA25DA25DA25DA25DA25DA25DA25 FE01DA25FE01DA25FE01DA25FE01DA25
V6 : 00000000010101010202020203030303 FF000000FF000000FF000000FF000000
V8 : 001002120414061608180A1A0C1C0E1E FFDBDBDBFFDBDBDBFFDBDBDBFFDBDBDB
V10: 01000100010001000100010001000100 FF999999FF999999FF999999FF999999
V12: FF999999FF999999FF999999FF999999 00000000000000000000000000000000
V14: FFDBDBDBFFDBDBDBFFDBDBDBFFDBDBDB FE01DA25FE01DA25FE01DA25FE01DA25
V16: DB25DB25DB25DB25DB25DB25DB25DB25 00000000000000000000000000000000
V18: FF01DB25FF01DB25FF01DB25FF01DB25 DA25DA25DA25DA25DA25DA25DA25DA25
V20: 00000000000000000000000000000000 00000000000000000000000000000000
V22: 00000000000000000000000000000000 00000000000000000000000000000000
V24: 00000000000000000000000000000000 00000000000000000000000000000000
V26: 00000000000000000000000000000000 00000000000000000000000000000000
V28: 00000000000000000000000000000000 00000000000000000000000000000000
V30: 00000000000000000000000000000000 00000000000000000000000000000000
VSCR: 00000000 VRSAVE: 00000000

Disassembly of crash site:
 0201A628: 7D234B78   mr                r3,r9
 0201A62C: 91440000   stw               r10,0(r4)
 0201A630: 81490000   lwz               r10,0(r9)
 0201A634: 81290004   lwz               r9,4(r9)
>0201A638: 912A0004   stw               r9,4(r10)
 0201A63C: 4E800020   blr
 0201A640: 38600000   li                r3,0
 0201A644: 4E800020   blr
 0201A648: 81230000   lwz               r9,0(r3)
 0201A64C: 81430004   lwz               r10,4(r3)

Kernel command line: SERIAL MUNGE DEBUGLEVEL=1

Registers pointing to code:
If slaughterhouses had glass walls, everyone would be a vegetarian. ~ Sir Paul McCartney
-
Did everything just taste purple for a second? ~ Philip J. Fry
-
Ain't got no cash, ain't got no style, ladies vomit when I smile. ~ Dr. John Zoidberg
User avatar
Raziel
 
Posts: 770
Joined: Sat Jun 18, 2011 5:00 pm
Location: A haunted Castle somewhere in the Bavarian Mountains

Re: Crash in different places (using memguard 1.15)

Postby tonyw » Wed Jan 04, 2017 1:07 am

We don't test regularly with Memguard because it's so old and has not been updated for OS4. (I'm told) the code breaks several OS4 rules and thus is unreliable.

Frankly I would ditch Memguard and enable the debug kernel instead (simply edit Kicklayout from "kernel" to "kernel.debug" and edit the U-Boot/CFE variable "os4_command" to "munge serial debuglevel=1"). Most of the tests in Memguard are built into the debug kernel, so by using that, you are using an up-to-date test program. It's faster, too.

Then run your test again...
cheers
tony
User avatar
tonyw
AmigaOS Core Developer
AmigaOS Core Developer
 
Posts: 1260
Joined: Wed Mar 09, 2011 2:36 pm
Location: Sydney, Australia

Re: Crash in different places (using memguard 1.15)

Postby Raziel » Wed Jan 04, 2017 10:20 am

tonyw wrote:We don't test regularly with Memguard because it's so old and has not been updated for OS4. (I'm told) the code breaks several OS4 rules and thus is unreliable.

Frankly I would ditch Memguard and enable the debug kernel instead (simply edit Kicklayout from "kernel" to "kernel.debug" and edit the U-Boot/CFE variable "os4_command" to "munge serial debuglevel=1"). Most of the tests in Memguard are built into the debug kernel, so by using that, you are using an up-to-date test program. It's faster, too.

Then run your test again...

Ah, understood, i was thinking Memguard could be the culprit here...it would be pretty strange if all those obvious errors has been missed.

Thank you, will certainly do and report back


EDIT: No crashes at all :-)
If slaughterhouses had glass walls, everyone would be a vegetarian. ~ Sir Paul McCartney
-
Did everything just taste purple for a second? ~ Philip J. Fry
-
Ain't got no cash, ain't got no style, ladies vomit when I smile. ~ Dr. John Zoidberg
User avatar
Raziel
 
Posts: 770
Joined: Sat Jun 18, 2011 5:00 pm
Location: A haunted Castle somewhere in the Bavarian Mountains

Previous

Return to General AmigaOS

Who is online

Users browsing this forum: Yahoo [Bot] and 3 guests