Crash in different places (using memguard 1.15)

A forum for general AmigaOS 4.x support questions that are not platform-specific

Re: Crash in input.device (using memguard 1.15)

Postby broadblues » Tue Jan 03, 2017 5:43 pm

If it's repeatable post it here.

What I'm not sure about is how best to deal with these crash on FE Public but not in Beta things.

Atleast as a work arround you can switch off MemGuard.... it's not like you need to run that more than every now and then.
User avatar
broadblues
Beta Tester
Beta Tester
 
Posts: 391
Joined: Sat Jun 18, 2011 3:40 am
Location: Portsmouth, UK

Re: Crash in different places (using memguard 1.15)

Postby Raziel » Tue Jan 03, 2017 5:54 pm

You are right, it's not that i will derange the thread (changed the subject to make it more common though)

Oh and i was using Memguard simply because Thore asked me to do a serial log for a MUI misbehaviour, it's not running 24/7 ;-)
...but i'm temted to stress the OS a little memguard :-D

Ok, here we go, next reproducable crash with memguard running

1) Open a shell
2) Start memguard (without options)
3) Stay with the cursor inside the shell window and click the right button to bring up the PD menu
4) Choose Project/New Shell
5) Watch the world burn...well, not really :-)

Serial log Number 1
Code: Select all
MemGuard 1.15 (2.1.2009) installed.
Dump of context at 0xDFC637C0
Trap type: DSI exception
Machine State (raw): 0x100000000200D030
Machine State (verbose): [Hyper] [ExtInt on] [User] [IAT on] [DAT on]
Instruction pointer: in module kernel+0x0001A638 (0x0201A638)
Crashed process: NewShell (0x5D1DCDD0)
DSI verbose error description: Access not found in hash or BAT (page fault)
Access was a store operation
 0: 02038DC0 4F070770 ABADCAFE 60273760 60273FDC 00000000 00000140 4F070AC8
 8: 00000000 A9ABADAF A1A3A5A7 7F792B54 35955993 ABADCAFE 00000100 80000003
16: 80000001 02B30000 02B30000 00000000 00000120 02950000 02950000 02806338
24: 02950000 DFFF3B84 02950000 60273FDC 00000000 60273FD0 02973054 DFFF3B40
CR: 95953555   XER: 8000007E  CTR: 0201A614  LR: 02030874
DSISR: 42000000  DAR: A1A3A5AB
HID0: 0x8000000000000000  HID1: 0x000000005CE993B1
HID4: 0x4400240000080180  HID5: 0x0000006600000080

V0 : 00000000000000000000000000000000 FF5576B2FF5576B2FF5576B2FF5576B2
V2 : FF5576B2FF5576B2FF5576B2FF5576B2 00000000000000000000000000000000
V4 : AF50A956AE51A857AE51A857AE51A857 FE01AC53FE01AB54FE01AB54FE01AB54
V6 : 00000000010101010202020203030303 FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
V8 : 001002120414061608180A1A0C1C0E1E FFB0ADAAFFAFACA9FFAFACA9FFAFACA9
V10: 01000100010001000100010001000100 00000000000000000000000000000000
V12: 54ABB14E54ABB14E54ABB14E54ABB14E 0C0D0E0F101112131415161718191A1B
V14: FFB0ADAAFFAFACA9FFAFACA9FFAFACA9 FE01758AFE01758AFE01758AFE01758A
V16: 55ABB24E55ABB24E55ABB24E55ABB24E 00000000000000000000000000000000
V18: FF01AD53FF01AC54FF01AC54FF01AC54 AF50A956AE51A857AE51A857AE51A857
V20: 00000000000000000000000000000000 00000000000000000000000000000000
V22: 00000000000000000000000000000000 00000000000000000000000000000000
V24: 00000000000000000000000000000000 00000000000000000000000000000000
V26: 00000000000000000000000000000000 00000000000000000000000000000000
V28: 00000000000000000000000000000000 00000000000000000000000000000000
V30: 00000000000000000000000000000000 00000000000000000000000000000000
VSCR: 00000000 VRSAVE: 00000000

Disassembly of crash site:
 0201A628: 7D234B78   mr                r3,r9
 0201A62C: 91440000   stw               r10,0(r4)
 0201A630: 81490000   lwz               r10,0(r9)
 0201A634: 81290004   lwz               r9,4(r9)
>0201A638: 912A0004   stw               r9,4(r10)
 0201A63C: 4E800020   blr
 0201A640: 38600000   li                r3,0
 0201A644: 4E800020   blr
 0201A648: 81230000   lwz               r9,0(r3)
 0201A64C: 81430004   lwz               r10,4(r3)

Kernel command line: SERIAL MUNGE DEBUGLEVEL=1

Registers pointing to code:


Serial log Number 2
Code: Select all
MemGuard 1.15 (2.1.2009) installed.
Dump of context at 0xDF88E7C0
Trap type: DSI exception
Machine State (raw): 0x100000000200D030
Machine State (verbose): [Hyper] [ExtInt on] [User] [IAT on] [DAT on]
Instruction pointer: in module kernel+0x0001A638 (0x0201A638)
Crashed process: NewShell (0x4FA65BB0)
DSI verbose error description: Access not found in hash or BAT (page fault)
Access was a store operation
 0: 02038DC0 4DA2D770 03FC000C 4FA811B0 4FA81FDC 00000000 00000140 4DA2DAC8
 8: 00000000 A9ABADAF A1A3A5A7 7F696B54 24844882 F00000C3 00000100 80000003
16: 80000001 02B30000 02B30000 00000000 00000120 02950000 02950000 02806338
24: 02950000 DFFF3B84 02950000 4FA81FDC 00000000 4FA81FD0 02973054 DFFF3B40
CR: 84842444   XER: 00000070  CTR: 0201A614  LR: 02030874
DSISR: 42000000  DAR: A1A3A5AB
HID0: 0x8000000000000000  HID1: 0x000000005CE993B1
HID4: 0x4400240000080180  HID5: 0x0000006600000080

V0 : 00000000000000000000000000000000 FF999999FF999999FF999999FF999999
V2 : FF5678B6FF5578B5FF577AB8FF577AB9 00000000000000000000000000000000
V4 : 59A6BA4559A6BA4559A6BA4559A6BA45 FE017C83FE017C83FE017C83FE017C83
V6 : 00000000010101010202020203030303 FF000000FF000000FF000000FF000000
V8 : 001002120414061608180A1A0C1C0E1E FF5A7DBBFF5A7DBBFF5A7DBBFF5A7DBB
V10: 01000100010001000100010001000100 FF999999FF999999FF999999FF999999
V12: FF999999FF999999FF999999FF999999 FF999999FF999999FF999999FF999999
V14: FF5A7DBBFF5A7DBBFF5A7DBBFF5A7DBB FE017986FE017986FE017A85FE01CE31
V16: 57A9B94757A9B94757A9B947C13FE51B 00000000000000000000000000000000
V18: FF017D83FF017D83FF017D83FF017D83 59A6BA4559A6BA4559A6BA4559A6BA45
V20: 00000000000000000000000000000000 00000000000000000000000000000000
V22: 00000000000000000000000000000000 00000000000000000000000000000000
V24: 00000000000000000000000000000000 00000000000000000000000000000000
V26: 00000000000000000000000000000000 00000000000000000000000000000000
V28: 00000000000000000000000000000000 00000000000000000000000000000000
V30: 00000000000000000000000000000000 00000000000000000000000000000000
VSCR: 00000000 VRSAVE: 00000000

Disassembly of crash site:
 0201A628: 7D234B78   mr                r3,r9
 0201A62C: 91440000   stw               r10,0(r4)
 0201A630: 81490000   lwz               r10,0(r9)
 0201A634: 81290004   lwz               r9,4(r9)
>0201A638: 912A0004   stw               r9,4(r10)
 0201A63C: 4E800020   blr
 0201A640: 38600000   li                r3,0
 0201A644: 4E800020   blr
 0201A648: 81230000   lwz               r9,0(r3)
 0201A64C: 81430004   lwz               r10,4(r3)

Kernel command line: SERIAL MUNGE DEBUGLEVEL=1

Registers pointing to code:


They are the same in the sense of i changed nothing on the setup, i just wanted to show that it's reproducable every time
If slaughterhouses had glass walls, everyone would be a vegetarian. ~ Sir Paul McCartney
-
Did everything just taste purple for a second? ~ Philip J. Fry
-
Ain't got no cash, ain't got no style, ladies vomit when I smile. ~ Dr. John Zoidberg
User avatar
Raziel
 
Posts: 722
Joined: Sat Jun 18, 2011 5:00 pm
Location: A haunted Castle somewhere in the Bavarian Mountains

Re: Crash in different places (using memguard 1.15)

Postby broadblues » Tue Jan 03, 2017 9:28 pm

Not even a spark on beta.
User avatar
broadblues
Beta Tester
Beta Tester
 
Posts: 391
Joined: Sat Jun 18, 2011 3:40 am
Location: Portsmouth, UK

Re: Crash in different places (using memguard 1.15)

Postby Raziel » Wed Jan 04, 2017 12:40 am

I know it's not happening on beta systems, but i wanted to add one last crash.

It's special because it doesn't freeze right away *AND* it caught a memguard hit before the freeze, maybe that helps a little more?

Happens in Shell again (not much i can do outside shell with memguard running anyway)

1) Start the Shell
2) Right-Click to bring up the PD menu
3) Go to Projects/About to load the about window

...the window will come up (somethimes with text inside, sometimes not, depends on how fast the illegal mem accress hits the system i assume)
...i can still move the mouse and type for another few seconds until the system freeze hits in

Code: Select all
MemGuard 1.15 (2.1.2009) installed.

MEMGUARD HIT - "WinFrame 1 Process" (60A9B350)
front wall damaged -- 4CABB2A0 = AllocMem(324, 00011000)
 0: 023961BC 4C2652F0 071FE026 02973054 4CABB2A0 00000144 00000043 0026B000
 8: FFFFFFFF 7F86198C 00000000 4C15C808 35533395 C3DC07E8 611DD9C0 85002001
16: 615BCA76 00000000 615BC9D0 00008000 61D6F7DC 00000000 4C265958 00000000
24: 02394F94 6FF8C180 02973054 00000000 6FFFF800 6FF3C140 611DDAA0 4CABB2A0
----> 023961BC : "graphics.library.kmod" segment 0000 offset C729C
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F86198C : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 898C
----> 02394F94 : "graphics.library.kmod" segment 0000 offset C6074
----> 02973054 : "kernel" segment 0001 offset 43054
LRa   0239FCEC : "graphics.library.kmod" segment 0000 offset D0DCC
CTRa  7F861914 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 8914
LR    023961D4 : "graphics.library.kmod" segment 0000 offset C72B4
CTR   7F86198C : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 898C

Stack backtrace:
----> 023961D4 : "graphics.library.kmod" segment 0000 offset C72B4
----> 02396314 : "graphics.library.kmod" segment 0000 offset C73F4
----> 021B56CC : "intuition.library.kmod" segment 0000 offset 2A62C
----> 021F1B38 : "intuition.library.kmod" segment 0000 offset 66A98
----> 021B6078 : "intuition.library.kmod" segment 0000 offset 2AFD8
----> 021B630C : "intuition.library.kmod" segment 0000 offset 2B26C
----> 02205098 : "intuition.library.kmod" segment 0000 offset 79FF8
----> 02205320 : "intuition.library.kmod" segment 0000 offset 7A280
----> 7FDE4488 : "CLASSES:window.class" segment 0005 offset 4488
----> 7FDE9DBC : "CLASSES:window.class" segment 0005 offset 9DBC
----> 021AC4E8 : "intuition.library.kmod" segment 0000 offset 21448
----> 021AC68C : "intuition.library.kmod" segment 0000 offset 215EC
----> 02195494 : "intuition.library.kmod" segment 0000 offset A3F4
----> 021950D4 : "intuition.library.kmod" segment 0000 offset A034
----> 7FA7610C : "CLASSES:requester.class" segment 0005 offset 410C
----> 021AC4E8 : "intuition.library.kmod" segment 0000 offset 21448
----> 021AC68C : "intuition.library.kmod" segment 0000 offset 215EC
----> 02195494 : "intuition.library.kmod" segment 0000 offset A3F4
----> 021950D4 : "intuition.library.kmod" segment 0000 offset A034
----> 02102CEC : "console.device.kmod" segment 0000 offset ECAC
----> 02113FF0 : "console.device.kmod" segment 0000 offset 1FFB0
----> 02102230 : "console.device.kmod" segment 0000 offset E1F0
----> 0213AA88 : "dos.library.kmod" segment 0000 offset 255C8
----> 020420AC : "kernel" segment 0000 offset 420AC
----> 020420F4 : "kernel" segment 0000 offset 420F4

Disassembly:
 023961D0: 4E800421     bctrl
 023961D4: 80010064     lwz     r0,100(r1)
 023961D8: 8181003C     lwz     r12,60(r1)
 023961DC: 7C0803A6     mtlr    r0
 023961E0: 83010040     lwz     r24,64(r1)

68k context:
DATA: 00000001 00000000 00000000 00000000 00000000 00000000 00000000 00000000
ADDR: 6FFB8000 96FA0A00 00000000 00000000 00000000 00000000 00000000 4C2650A0
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000

68k Stack backtrace:
----> 02020580 : "kernel" segment 0000 offset 20580
----> 02020580 : "kernel" segment 0000 offset 20580
----> 7F859020 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 0020
----> 02033244 : "kernel" segment 0000 offset 33244
----> 02A92CA4 : "kernel" segment 0001 offset 162CA4
----> 02A956F0 : "kernel" segment 0001 offset 1656F0
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F85935C : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 035C

68k Disassembly:
 4C2650D0: 4C26 5100            mulu.l  -(a6),d5
 4C2650D4: 0202 0580            andi.b  #0x80,d2
 4C2650D8: 4FBB B000            chk.w   (0,pc,a3.w),d7
 4C2650DC: DFBC DC00 7F85       add.l   d7,#-0x23ff807b
 4C2650E2: 9020                 sub.b   -(a0),d0

MEMGUARD HIT - [4] "Workbench" (60AD9630)
front wall damaged -- 4CABB2A0 = AllocVecTagList(288, AVT_Type, 00001000, ...)
 0: 0212B470 60A8DD10 ABADCAFE 02973054 4CABB2A0 021446BC 021446BC 01505C5F
 8: 6290134C 00000000 7F8619C8 0201ED14 02973054 ABADCAFE 02814EFC 18A40586
16: 02B30000 1BED01A8 20000000 00000000 60A8DD40 02B30000 60AD96C4 00000000
24: 00000000 02B30000 6FBB33E0 60AD9630 000003ED 4CABB2A0 00100000 4CABB2A0
----> 0212B470 : "dos.library.kmod" segment 0000 offset 15FB0
----> 02973054 : "kernel" segment 0001 offset 43054
----> 021446BC : "dos.library.kmod" segment 0000 offset 2F1FC
----> 021446BC : "dos.library.kmod" segment 0000 offset 2F1FC
----> 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
----> 0201ED14 : "kernel" segment 0000 offset 1ED14
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02814EFC : "dos.library.kmod" segment 0002 offset 3FDC
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
LRa   0201D11C : "kernel" segment 0000 offset 1D11C
CTRa  7F861BE4 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 8BE4
LR    0212B438 : "dos.library.kmod" segment 0000 offset 15F78
CTR   7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8

Stack backtrace:
----> 0212B438 : "dos.library.kmod" segment 0000 offset 15F78
----> 0212B3DC : "dos.library.kmod" segment 0000 offset 15F1C
----> 02138F60 : "dos.library.kmod" segment 0000 offset 23AA0
----> 0212F954 : "dos.library.kmod" segment 0000 offset 1A494
----> 7FF1D53C : "LIBS:workbench.library" segment 0005 offset 5C53C
----> 7FF1C6CC : "LIBS:workbench.library" segment 0005 offset 5B6CC
----> 7FF1C988 : "LIBS:workbench.library" segment 0005 offset 5B988
----> 7FEFDDC8 : "LIBS:workbench.library" segment 0005 offset 3CDC8
----> 7FEFFEE0 : "LIBS:workbench.library" segment 0005 offset 3EEE0
----> 0213AA88 : "dos.library.kmod" segment 0000 offset 255C8
----> 020420AC : "kernel" segment 0000 offset 420AC
----> 020420F4 : "kernel" segment 0000 offset 420F4

Disassembly:
 0212B434: 4E800421     bctrl
 0212B438: 83E10014     lwz     r31,20(r1)
 0212B43C: 7FE803A6     mtlr    r31
 0212B440: 83E1000C     lwz     r31,12(r1)
 0212B444: 38210010     addi    r1,r1,16

68k context:
DATA: 00000001 00000000 00000000 00000000 00000000 00000000 00000000 00000000
ADDR: 6FFB8000 93B06A00 00000000 00000000 00000000 00000000 00000000 60A8E420
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000

68k Stack backtrace:
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F860CF8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 7CF8
----> 0204AC28 : "kernel" segment 0000 offset 4AC28
----> 020260A8 : "kernel" segment 0000 offset 260A8
----> 0201AADC : "kernel" segment 0000 offset 1AADC
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 7F859170 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 0170
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202

68k Disassembly:
 60A8E430: 60A8                 bra.b   0x60a8e3da
 60A8E432: EA9C                 ror.l   #5,d4
 60A8E434: 60AD                 bra.b   0x60a8e3e3
 60A8E436: 9630 60AE            sub.b   (0xae,a0,d6.w),d3
 60A8E43A: 0000 0297            ori.b   #0x97,d0

MEMGUARD HIT - [4] "Workbench" (60AD9630)
front wall damaged -- 4CABB2A0 = AllocVecTagList(288, AVT_Type, 00001000, ...)
 0: 0212B470 60A8DD10 ABADCAFE 02973054 4CABB2A0 021446BC 021446BC 01505C5F
 8: 6290134C 00000000 7F8619C8 0201ED14 02973054 ABADCAFE 02814EFC 18A40586
16: 02B30000 1BED01A8 20000000 00000000 60A8DD40 02B30000 60AD96C4 00000000
24: 00000000 02B30000 6FBB33E0 60AD9630 000003ED 4CABB2A0 00100000 4CABB2A0
----> 0212B470 : "dos.library.kmod" segment 0000 offset 15FB0
----> 02973054 : "kernel" segment 0001 offset 43054
----> 021446BC : "dos.library.kmod" segment 0000 offset 2F1FC
----> 021446BC : "dos.library.kmod" segment 0000 offset 2F1FC
----> 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
----> 0201ED14 : "kernel" segment 0000 offset 1ED14
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02814EFC : "dos.library.kmod" segment 0002 offset 3FDC
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
LRa   0201D11C : "kernel" segment 0000 offset 1D11C
CTRa  7F861BE4 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 8BE4
LR    0212B438 : "dos.library.kmod" segment 0000 offset 15F78
CTR   7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8

Stack backtrace:
----> 0212B438 : "dos.library.kmod" segment 0000 offset 15F78
----> 0212B3DC : "dos.library.kmod" segment 0000 offset 15F1C
----> 02138F60 : "dos.library.kmod" segment 0000 offset 23AA0
----> 0212F954 : "dos.library.kmod" segment 0000 offset 1A494
----> 7FF1D53C : "LIBS:workbench.library" segment 0005 offset 5C53C
----> 7FF1C6CC : "LIBS:workbench.library" segment 0005 offset 5B6CC
----> 7FF1C988 : "LIBS:workbench.library" segment 0005 offset 5B988
----> 7FEFDDC8 : "LIBS:workbench.library" segment 0005 offset 3CDC8
----> 7FEFFEE0 : "LIBS:workbench.library" segment 0005 offset 3EEE0
----> 0213AA88 : "dos.library.kmod" segment 0000 offset 255C8
----> 020420AC : "kernel" segment 0000 offset 420AC
----> 020420F4 : "kernel" segment 0000 offset 420F4

Disassembly:
 0212B434: 4E800421     bctrl
 0212B438: 83E10014     lwz     r31,20(r1)
 0212B43C: 7FE803A6     mtlr    r31
 0212B440: 83E1000C     lwz     r31,12(r1)
 0212B444: 38210010     addi    r1,r1,16

68k context:
DATA: 00000001 00000000 00000000 00000000 00000000 00000000 00000000 00000000
ADDR: 6FFB8000 93B06A00 00000000 00000000 00000000 00000000 00000000 60A8E420
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000

68k Stack backtrace:
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F860CF8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 7CF8
----> 0204AC28 : "kernel" segment 0000 offset 4AC28
----> 020260A8 : "kernel" segment 0000 offset 260A8
----> 0201AADC : "kernel" segment 0000 offset 1AADC
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 7F859170 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 0170
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202

68k Disassembly:
 60A8E430: 60A8                 bra.b   0x60a8e3da
 60A8E432: EA9C                 ror.l   #5,d4
 60A8E434: 60AD                 bra.b   0x60a8e3e3
 60A8E436: 9630 60AE            sub.b   (0xae,a0,d6.w),d3
 60A8E43A: 0000 0297            ori.b   #0x97,d0

MEMGUARD HIT - [4] "Workbench" (60AD9630)
front wall damaged -- 4CABB2A0 = AllocVecTagList(288, AVT_Type, 00001000, ...)
 0: 0212B470 60A8DD10 ABADCAFE 02973054 4CABB2A0 021446BC 021446BC 01505C5F
 8: 629016B4 00000000 7F8619C8 0201ED14 02973054 ABADCAFE 02814EFC 18A40586
16: 02B30000 00000000 20000000 00000000 60A8DD40 02B30000 60AD96C4 00000000
24: 00000000 02B30000 6FBB33E0 60AD9630 000003ED 4CABB2A0 60A8ED9C 4CABB2A0
----> 0212B470 : "dos.library.kmod" segment 0000 offset 15FB0
----> 02973054 : "kernel" segment 0001 offset 43054
----> 021446BC : "dos.library.kmod" segment 0000 offset 2F1FC
----> 021446BC : "dos.library.kmod" segment 0000 offset 2F1FC
----> 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
----> 0201ED14 : "kernel" segment 0000 offset 1ED14
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02814EFC : "dos.library.kmod" segment 0002 offset 3FDC
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
LRa   0201D11C : "kernel" segment 0000 offset 1D11C
CTRa  7F861BE4 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 8BE4
LR    0212B438 : "dos.library.kmod" segment 0000 offset 15F78
CTR   7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8

Stack backtrace:
----> 0212B438 : "dos.library.kmod" segment 0000 offset 15F78
----> 0212B3DC : "dos.library.kmod" segment 0000 offset 15F1C
----> 02138F60 : "dos.library.kmod" segment 0000 offset 23AA0
----> 0212F954 : "dos.library.kmod" segment 0000 offset 1A494
----> 7FF1D53C : "LIBS:workbench.library" segment 0005 offset 5C53C
----> 7FF1C6CC : "LIBS:workbench.library" segment 0005 offset 5B6CC
----> 7FF1C988 : "LIBS:workbench.library" segment 0005 offset 5B988
----> 7FEFDDC8 : "LIBS:workbench.library" segment 0005 offset 3CDC8
----> 7FEFFEE0 : "LIBS:workbench.library" segment 0005 offset 3EEE0
----> 0213AA88 : "dos.library.kmod" segment 0000 offset 255C8
----> 020420AC : "kernel" segment 0000 offset 420AC
----> 020420F4 : "kernel" segment 0000 offset 420F4

Disassembly:
 0212B434: 4E800421     bctrl
 0212B438: 83E10014     lwz     r31,20(r1)
 0212B43C: 7FE803A6     mtlr    r31
 0212B440: 83E1000C     lwz     r31,12(r1)
 0212B444: 38210010     addi    r1,r1,16

68k context:
DATA: 00000001 00000000 00000000 00000000 00000000 00000000 00000000 00000000
ADDR: 6FFB8000 93B06A00 00000000 00000000 00000000 00000000 00000000 60A8E420
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000

68k Stack backtrace:
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F860CF8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 7CF8
----> 0204AC28 : "kernel" segment 0000 offset 4AC28
----> 020260A8 : "kernel" segment 0000 offset 260A8
----> 0201AADC : "kernel" segment 0000 offset 1AADC
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 7F859170 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 0170
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202

68k Disassembly:
 60A8E430: 60A8                 bra.b   0x60a8e3da
 60A8E432: EA9C                 ror.l   #5,d4
 60A8E434: 60AD                 bra.b   0x60a8e3e3
 60A8E436: 9630 60AE            sub.b   (0xae,a0,d6.w),d3
 60A8E43A: 0000 0297            ori.b   #0x97,d0

MEMGUARD HIT - "input.device" (6FF3FA20)
rear wall damaged -- 602737E0 = AllocVec(32, 00010003)
 0: 0221F248 6FE91C60 5441A88E 02973054 602737E0 00000014 00000006 00000000
 8: 00000000 7F8619C8 00000000 A0000000 3381C599 CC8FAECE 00000000 00000000
16: 00000000 00000001 00000000 8440000C 00000000 00000000 00000001 00000005
24: 00000001 00000029 02B30000 4E5DEE20 00000000 6FF47842 02B30000 4E5DEC40
----> 0221F248 : "intuition.library.kmod" segment 0000 offset 941A8
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
LRa   022D2924 : "graphics.library.kmod" segment 0000 offset 3A04
CTRa  7F861950 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 8950
LR    022DDE04 : "graphics.library.kmod" segment 0000 offset EEE4
CTR   7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8

Stack backtrace:
----> 022DDE04 : "graphics.library.kmod" segment 0000 offset EEE4
----> 0221F248 : "intuition.library.kmod" segment 0000 offset 941A8
----> 021AD26C : "intuition.library.kmod" segment 0000 offset 221CC
----> 021ACA98 : "intuition.library.kmod" segment 0000 offset 219F8
----> 7FAC25D8 : "MouseBlanker" segment 0005 offset 25D8
----> 7FFB7718 : "LIBS:commodities.library" segment 0005 offset 1718
----> 02188BD0 : "input.device.kmod" segment 0000 offset 0A70
----> 0218A77C : "input.device.kmod" segment 0000 offset 261C
----> 0201F148 : "kernel" segment 0000 offset 1F148

Disassembly:
 022DDE00: 4E800421     bctrl
 022DDE04: 807EFEC0     lwz     r3,-320(r30)
 022DDE08: 7FE4FB78     mr      r4,r31
 022DDE0C: 38A00010     li      r5,16
 022DDE10: 80010014     lwz     r0,20(r1)

68k context:
DATA: 00000001 00000000 00000000 00000000 00000000 00000000 00000000 00000000
ADDR: 6FFB8000 96FCD900 00000000 00000000 00000000 00000000 00000000 6FE91AF0
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000

68k Stack backtrace:
----> 0231B7CC : "graphics.library.kmod" segment 0000 offset 4C8AC
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020A2C : "kernel" segment 0000 offset 20A2C
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
----> 7F85EFCC : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 5FCC
----> 61E01020 : "Development:Debugging/Memguard/MemGuard" segment 0006 offset 0020
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 7F8619F4 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89F4
----> 0221F248 : "intuition.library.kmod" segment 0000 offset 941A8
----> 02973054 : "kernel" segment 0001 offset 43054

68k Disassembly:
 6FE91B20: 6FE9                 ble.b   0x6fe91b0b
 6FE91B22: 1970 0000 0000       move.b  (0,a0,d0.w),0(a4)
 6FE91B28: 02B3 0000 4E5D EE20  andi.l  #0x4e5d,(0x20,a3,a6.l*8)
 6FE91B30: 3589 3359            move.w  a1,([0,a2,0],0)
 6FE91B34: CC8F                 and.l   sp,d6

MEMGUARD HIT - [1] "Background CLI" (501D9350)
front wall damaged -- 4CABB2A0 = AllocVecTagList(260, AVT_Type, 00001000, ...)
 0: 0212B164 60B50F30 ABADCAFE 02973054 4CABB2A0 132AECA8 00000043 00000000
 8: 000001EA 00000008 00000000 4C15C700 7F8619C8 ABADCAFE 00000000 00000000
16: 60B4D04C 00000000 00000000 ABADCAFE 02B30000 40000004 ABADCAFE 00000000
24: ABADCAFE 00000000 02B30000 4E6BBC00 02B30000 0212AD9C 02973054 02973054
----> 0212B164 : "dos.library.kmod" segment 0000 offset 15CA4
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 0212AD9C : "dos.library.kmod" segment 0000 offset 158DC
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02973054 : "kernel" segment 0001 offset 43054
Allocating task was "AmiDock" (61D87350)
LRa   0201D11C : "kernel" segment 0000 offset 1D11C
CTRa  7F861BE4 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 8BE4
LR    0212B180 : "dos.library.kmod" segment 0000 offset 15CC0
CTR   7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8

Stack backtrace:
----> 0212B180 : "dos.library.kmod" segment 0000 offset 15CC0
----> 0211ED14 : "dos.library.kmod" segment 0000 offset 9854
----> 0211FBB0 : "dos.library.kmod" segment 0000 offset A6F0
----> 0211FB04 : "dos.library.kmod" segment 0000 offset A644

Disassembly:
 0212B17C: 4E800421     bctrl
 0212B180: 811CCBA4     lwz     r8,-13404(r28)
 0212B184: 815B0010     lwz     r10,16(r27)
 0212B188: 80E800AC     lwz     r7,172(r8)
 0212B18C: 7D034378     mr      r3,r8

Dump of context at 0xDFC667C0
Trap type: DSI exception
Machine State (raw): 0x100000000200B030
Machine State (verbose): [Hyper] [ExtInt on] [Super] [FPU on] [IAT on] [DAT on]
Instruction pointer: in module kernel+0x0001A638 (0x0201A638)
Crashed process: Workbench (0x601FC330)
DSI verbose error description: Access not found in hash or BAT (page fault)
Access was a store operation
 0: 02038DC0 601D26A0 ABADCAFE 60BB7720 60BB7FDC 00000000 00000140 601D29F8
 8: 00000000 C9CBCDCF C1C3C5C7 7F83BC24 37333993 ABADCAFE 02973054 6FFB95CC
16: 6FF22AD8 00000000 00000000 00000000 00000120 02950000 02950000 02806338
24: 02950000 DFFF3B84 02950000 60BB7FDC 00000000 60BB7FD0 02973054 DFFF3B40
CR: 97333555   XER: 8000007E  CTR: 0201A614  LR: 02030874
DSISR: 42000000  DAR: C1C3C5CB

FP0 : FFF8000082004000 FFEDE9E5FFECE9E4 FFEBEBEBEBEBEBEB FFEBE8E3FFE9E4DF
FP4 : FFFFFFFFFFFFFFFF FAFAFAFAFAFAFAFA FFFFFFFFFFFFFFFF 4050000000000000
FP8 : 4050000000000000 3FF0000000000000 3FF0000000000000 4330000080000000
FP12: 4070000000000000 4330000080000014 0000000000000000 0000000000000000
FP16: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
FP20: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
FP24: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
FP28: 0000000000000000 0000000000000000 0000000000000000 8000000000000000
FPSCR: 82004000
HID0: 0x8000000000000000  HID1: 0x000000005CE993B1
HID4: 0x4400240000080180  HID5: 0x0000006600000080

V0 : 00000000000000000000000000000000 00000000000000000000000000000000
V2 : 01010101FFDBDBDBFFDBDBDBFFDBDBDB 00000000000000000000000000000000
V4 : DA25DA25DA25DA25DA25DA25DA25DA25 FE01DA25FE01DA25FE01DA25FE01DA25
V6 : 00000000010101010202020203030303 FF000000FF000000FF000000FF000000
V8 : 001002120414061608180A1A0C1C0E1E FFDBDBDBFFDBDBDBFFDBDBDBFFDBDBDB
V10: 01000100010001000100010001000100 FF999999FF999999FF999999FF999999
V12: FF999999FF999999FF999999FF999999 00000000000000000000000000000000
V14: FFDBDBDBFFDBDBDBFFDBDBDBFFDBDBDB FE01DA25FE01DA25FE01DA25FE01DA25
V16: DB25DB25DB25DB25DB25DB25DB25DB25 00000000000000000000000000000000
V18: FF01DB25FF01DB25FF01DB25FF01DB25 DA25DA25DA25DA25DA25DA25DA25DA25
V20: 00000000000000000000000000000000 00000000000000000000000000000000
V22: 00000000000000000000000000000000 00000000000000000000000000000000
V24: 00000000000000000000000000000000 00000000000000000000000000000000
V26: 00000000000000000000000000000000 00000000000000000000000000000000
V28: 00000000000000000000000000000000 00000000000000000000000000000000
V30: 00000000000000000000000000000000 00000000000000000000000000000000
VSCR: 00000000 VRSAVE: 00000000

Disassembly of crash site:
 0201A628: 7D234B78   mr                r3,r9
 0201A62C: 91440000   stw               r10,0(r4)
 0201A630: 81490000   lwz               r10,0(r9)
 0201A634: 81290004   lwz               r9,4(r9)
>0201A638: 912A0004   stw               r9,4(r10)
 0201A63C: 4E800020   blr
 0201A640: 38600000   li                r3,0
 0201A644: 4E800020   blr
 0201A648: 81230000   lwz               r9,0(r3)
 0201A64C: 81430004   lwz               r10,4(r3)

Kernel command line: SERIAL MUNGE DEBUGLEVEL=1

Registers pointing to code:
If slaughterhouses had glass walls, everyone would be a vegetarian. ~ Sir Paul McCartney
-
Did everything just taste purple for a second? ~ Philip J. Fry
-
Ain't got no cash, ain't got no style, ladies vomit when I smile. ~ Dr. John Zoidberg
User avatar
Raziel
 
Posts: 722
Joined: Sat Jun 18, 2011 5:00 pm
Location: A haunted Castle somewhere in the Bavarian Mountains

Re: Crash in different places (using memguard 1.15)

Postby tonyw » Wed Jan 04, 2017 1:07 am

We don't test regularly with Memguard because it's so old and has not been updated for OS4. (I'm told) the code breaks several OS4 rules and thus is unreliable.

Frankly I would ditch Memguard and enable the debug kernel instead (simply edit Kicklayout from "kernel" to "kernel.debug" and edit the U-Boot/CFE variable "os4_command" to "munge serial debuglevel=1"). Most of the tests in Memguard are built into the debug kernel, so by using that, you are using an up-to-date test program. It's faster, too.

Then run your test again...
cheers
tony
User avatar
tonyw
AmigaOS Core Developer
AmigaOS Core Developer
 
Posts: 1174
Joined: Wed Mar 09, 2011 2:36 pm
Location: Sydney, Australia

Re: Crash in different places (using memguard 1.15)

Postby Raziel » Wed Jan 04, 2017 10:20 am

tonyw wrote:We don't test regularly with Memguard because it's so old and has not been updated for OS4. (I'm told) the code breaks several OS4 rules and thus is unreliable.

Frankly I would ditch Memguard and enable the debug kernel instead (simply edit Kicklayout from "kernel" to "kernel.debug" and edit the U-Boot/CFE variable "os4_command" to "munge serial debuglevel=1"). Most of the tests in Memguard are built into the debug kernel, so by using that, you are using an up-to-date test program. It's faster, too.

Then run your test again...

Ah, understood, i was thinking Memguard could be the culprit here...it would be pretty strange if all those obvious errors has been missed.

Thank you, will certainly do and report back


EDIT: No crashes at all :-)
If slaughterhouses had glass walls, everyone would be a vegetarian. ~ Sir Paul McCartney
-
Did everything just taste purple for a second? ~ Philip J. Fry
-
Ain't got no cash, ain't got no style, ladies vomit when I smile. ~ Dr. John Zoidberg
User avatar
Raziel
 
Posts: 722
Joined: Sat Jun 18, 2011 5:00 pm
Location: A haunted Castle somewhere in the Bavarian Mountains

Previous

Return to General AmigaOS

Who is online

Users browsing this forum: No registered users and 2 guests