If it's repeatable post it here.
What I'm not sure about is how best to deal with these crash on FE Public but not in Beta things.
Atleast as a work arround you can switch off MemGuard.... it's not like you need to run that more than every now and then.
Crash in different places (using memguard 1.15)
- broadblues
- AmigaOS Core Developer
- Posts: 600
- Joined: Sat Jun 18, 2011 2:40 am
- Location: Portsmouth, UK
- Contact:
Re: Crash in different places (using memguard 1.15)
You are right, it's not that i will derange the thread (changed the subject to make it more common though)
Oh and i was using Memguard simply because Thore asked me to do a serial log for a MUI misbehaviour, it's not running 24/7
...but i'm temted to stress the OS a little memguard
Ok, here we go, next reproducable crash with memguard running
1) Open a shell
2) Start memguard (without options)
3) Stay with the cursor inside the shell window and click the right button to bring up the PD menu
4) Choose Project/New Shell
5) Watch the world burn...well, not really
Serial log Number 1
Serial log Number 2
They are the same in the sense of i changed nothing on the setup, i just wanted to show that it's reproducable every time
Oh and i was using Memguard simply because Thore asked me to do a serial log for a MUI misbehaviour, it's not running 24/7
...but i'm temted to stress the OS a little memguard
Ok, here we go, next reproducable crash with memguard running
1) Open a shell
2) Start memguard (without options)
3) Stay with the cursor inside the shell window and click the right button to bring up the PD menu
4) Choose Project/New Shell
5) Watch the world burn...well, not really
Serial log Number 1
Code: Select all
MemGuard 1.15 (2.1.2009) installed.
Dump of context at 0xDFC637C0
Trap type: DSI exception
Machine State (raw): 0x100000000200D030
Machine State (verbose): [Hyper] [ExtInt on] [User] [IAT on] [DAT on]
Instruction pointer: in module kernel+0x0001A638 (0x0201A638)
Crashed process: NewShell (0x5D1DCDD0)
DSI verbose error description: Access not found in hash or BAT (page fault)
Access was a store operation
0: 02038DC0 4F070770 ABADCAFE 60273760 60273FDC 00000000 00000140 4F070AC8
8: 00000000 A9ABADAF A1A3A5A7 7F792B54 35955993 ABADCAFE 00000100 80000003
16: 80000001 02B30000 02B30000 00000000 00000120 02950000 02950000 02806338
24: 02950000 DFFF3B84 02950000 60273FDC 00000000 60273FD0 02973054 DFFF3B40
CR: 95953555 XER: 8000007E CTR: 0201A614 LR: 02030874
DSISR: 42000000 DAR: A1A3A5AB
HID0: 0x8000000000000000 HID1: 0x000000005CE993B1
HID4: 0x4400240000080180 HID5: 0x0000006600000080
V0 : 00000000000000000000000000000000 FF5576B2FF5576B2FF5576B2FF5576B2
V2 : FF5576B2FF5576B2FF5576B2FF5576B2 00000000000000000000000000000000
V4 : AF50A956AE51A857AE51A857AE51A857 FE01AC53FE01AB54FE01AB54FE01AB54
V6 : 00000000010101010202020203030303 FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
V8 : 001002120414061608180A1A0C1C0E1E FFB0ADAAFFAFACA9FFAFACA9FFAFACA9
V10: 01000100010001000100010001000100 00000000000000000000000000000000
V12: 54ABB14E54ABB14E54ABB14E54ABB14E 0C0D0E0F101112131415161718191A1B
V14: FFB0ADAAFFAFACA9FFAFACA9FFAFACA9 FE01758AFE01758AFE01758AFE01758A
V16: 55ABB24E55ABB24E55ABB24E55ABB24E 00000000000000000000000000000000
V18: FF01AD53FF01AC54FF01AC54FF01AC54 AF50A956AE51A857AE51A857AE51A857
V20: 00000000000000000000000000000000 00000000000000000000000000000000
V22: 00000000000000000000000000000000 00000000000000000000000000000000
V24: 00000000000000000000000000000000 00000000000000000000000000000000
V26: 00000000000000000000000000000000 00000000000000000000000000000000
V28: 00000000000000000000000000000000 00000000000000000000000000000000
V30: 00000000000000000000000000000000 00000000000000000000000000000000
VSCR: 00000000 VRSAVE: 00000000
Disassembly of crash site:
0201A628: 7D234B78 mr r3,r9
0201A62C: 91440000 stw r10,0(r4)
0201A630: 81490000 lwz r10,0(r9)
0201A634: 81290004 lwz r9,4(r9)
>0201A638: 912A0004 stw r9,4(r10)
0201A63C: 4E800020 blr
0201A640: 38600000 li r3,0
0201A644: 4E800020 blr
0201A648: 81230000 lwz r9,0(r3)
0201A64C: 81430004 lwz r10,4(r3)
Kernel command line: SERIAL MUNGE DEBUGLEVEL=1
Registers pointing to code:
Code: Select all
MemGuard 1.15 (2.1.2009) installed.
Dump of context at 0xDF88E7C0
Trap type: DSI exception
Machine State (raw): 0x100000000200D030
Machine State (verbose): [Hyper] [ExtInt on] [User] [IAT on] [DAT on]
Instruction pointer: in module kernel+0x0001A638 (0x0201A638)
Crashed process: NewShell (0x4FA65BB0)
DSI verbose error description: Access not found in hash or BAT (page fault)
Access was a store operation
0: 02038DC0 4DA2D770 03FC000C 4FA811B0 4FA81FDC 00000000 00000140 4DA2DAC8
8: 00000000 A9ABADAF A1A3A5A7 7F696B54 24844882 F00000C3 00000100 80000003
16: 80000001 02B30000 02B30000 00000000 00000120 02950000 02950000 02806338
24: 02950000 DFFF3B84 02950000 4FA81FDC 00000000 4FA81FD0 02973054 DFFF3B40
CR: 84842444 XER: 00000070 CTR: 0201A614 LR: 02030874
DSISR: 42000000 DAR: A1A3A5AB
HID0: 0x8000000000000000 HID1: 0x000000005CE993B1
HID4: 0x4400240000080180 HID5: 0x0000006600000080
V0 : 00000000000000000000000000000000 FF999999FF999999FF999999FF999999
V2 : FF5678B6FF5578B5FF577AB8FF577AB9 00000000000000000000000000000000
V4 : 59A6BA4559A6BA4559A6BA4559A6BA45 FE017C83FE017C83FE017C83FE017C83
V6 : 00000000010101010202020203030303 FF000000FF000000FF000000FF000000
V8 : 001002120414061608180A1A0C1C0E1E FF5A7DBBFF5A7DBBFF5A7DBBFF5A7DBB
V10: 01000100010001000100010001000100 FF999999FF999999FF999999FF999999
V12: FF999999FF999999FF999999FF999999 FF999999FF999999FF999999FF999999
V14: FF5A7DBBFF5A7DBBFF5A7DBBFF5A7DBB FE017986FE017986FE017A85FE01CE31
V16: 57A9B94757A9B94757A9B947C13FE51B 00000000000000000000000000000000
V18: FF017D83FF017D83FF017D83FF017D83 59A6BA4559A6BA4559A6BA4559A6BA45
V20: 00000000000000000000000000000000 00000000000000000000000000000000
V22: 00000000000000000000000000000000 00000000000000000000000000000000
V24: 00000000000000000000000000000000 00000000000000000000000000000000
V26: 00000000000000000000000000000000 00000000000000000000000000000000
V28: 00000000000000000000000000000000 00000000000000000000000000000000
V30: 00000000000000000000000000000000 00000000000000000000000000000000
VSCR: 00000000 VRSAVE: 00000000
Disassembly of crash site:
0201A628: 7D234B78 mr r3,r9
0201A62C: 91440000 stw r10,0(r4)
0201A630: 81490000 lwz r10,0(r9)
0201A634: 81290004 lwz r9,4(r9)
>0201A638: 912A0004 stw r9,4(r10)
0201A63C: 4E800020 blr
0201A640: 38600000 li r3,0
0201A644: 4E800020 blr
0201A648: 81230000 lwz r9,0(r3)
0201A64C: 81430004 lwz r10,4(r3)
Kernel command line: SERIAL MUNGE DEBUGLEVEL=1
Registers pointing to code:
People are dying.
Entire ecosystems are collapsing.
We are in the beginning of a mass extinction.
And all you can talk about is money and fairytales of eternal economic growth.
How dare you!
– Greta Thunberg
Entire ecosystems are collapsing.
We are in the beginning of a mass extinction.
And all you can talk about is money and fairytales of eternal economic growth.
How dare you!
– Greta Thunberg
- broadblues
- AmigaOS Core Developer
- Posts: 600
- Joined: Sat Jun 18, 2011 2:40 am
- Location: Portsmouth, UK
- Contact:
Re: Crash in different places (using memguard 1.15)
Not even a spark on beta.
Re: Crash in different places (using memguard 1.15)
I know it's not happening on beta systems, but i wanted to add one last crash.
It's special because it doesn't freeze right away *AND* it caught a memguard hit before the freeze, maybe that helps a little more?
Happens in Shell again (not much i can do outside shell with memguard running anyway)
1) Start the Shell
2) Right-Click to bring up the PD menu
3) Go to Projects/About to load the about window
...the window will come up (somethimes with text inside, sometimes not, depends on how fast the illegal mem accress hits the system i assume)
...i can still move the mouse and type for another few seconds until the system freeze hits in
It's special because it doesn't freeze right away *AND* it caught a memguard hit before the freeze, maybe that helps a little more?
Happens in Shell again (not much i can do outside shell with memguard running anyway)
1) Start the Shell
2) Right-Click to bring up the PD menu
3) Go to Projects/About to load the about window
...the window will come up (somethimes with text inside, sometimes not, depends on how fast the illegal mem accress hits the system i assume)
...i can still move the mouse and type for another few seconds until the system freeze hits in
Code: Select all
MemGuard 1.15 (2.1.2009) installed.
MEMGUARD HIT - "WinFrame 1 Process" (60A9B350)
front wall damaged -- 4CABB2A0 = AllocMem(324, 00011000)
0: 023961BC 4C2652F0 071FE026 02973054 4CABB2A0 00000144 00000043 0026B000
8: FFFFFFFF 7F86198C 00000000 4C15C808 35533395 C3DC07E8 611DD9C0 85002001
16: 615BCA76 00000000 615BC9D0 00008000 61D6F7DC 00000000 4C265958 00000000
24: 02394F94 6FF8C180 02973054 00000000 6FFFF800 6FF3C140 611DDAA0 4CABB2A0
----> 023961BC : "graphics.library.kmod" segment 0000 offset C729C
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F86198C : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 898C
----> 02394F94 : "graphics.library.kmod" segment 0000 offset C6074
----> 02973054 : "kernel" segment 0001 offset 43054
LRa 0239FCEC : "graphics.library.kmod" segment 0000 offset D0DCC
CTRa 7F861914 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 8914
LR 023961D4 : "graphics.library.kmod" segment 0000 offset C72B4
CTR 7F86198C : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 898C
Stack backtrace:
----> 023961D4 : "graphics.library.kmod" segment 0000 offset C72B4
----> 02396314 : "graphics.library.kmod" segment 0000 offset C73F4
----> 021B56CC : "intuition.library.kmod" segment 0000 offset 2A62C
----> 021F1B38 : "intuition.library.kmod" segment 0000 offset 66A98
----> 021B6078 : "intuition.library.kmod" segment 0000 offset 2AFD8
----> 021B630C : "intuition.library.kmod" segment 0000 offset 2B26C
----> 02205098 : "intuition.library.kmod" segment 0000 offset 79FF8
----> 02205320 : "intuition.library.kmod" segment 0000 offset 7A280
----> 7FDE4488 : "CLASSES:window.class" segment 0005 offset 4488
----> 7FDE9DBC : "CLASSES:window.class" segment 0005 offset 9DBC
----> 021AC4E8 : "intuition.library.kmod" segment 0000 offset 21448
----> 021AC68C : "intuition.library.kmod" segment 0000 offset 215EC
----> 02195494 : "intuition.library.kmod" segment 0000 offset A3F4
----> 021950D4 : "intuition.library.kmod" segment 0000 offset A034
----> 7FA7610C : "CLASSES:requester.class" segment 0005 offset 410C
----> 021AC4E8 : "intuition.library.kmod" segment 0000 offset 21448
----> 021AC68C : "intuition.library.kmod" segment 0000 offset 215EC
----> 02195494 : "intuition.library.kmod" segment 0000 offset A3F4
----> 021950D4 : "intuition.library.kmod" segment 0000 offset A034
----> 02102CEC : "console.device.kmod" segment 0000 offset ECAC
----> 02113FF0 : "console.device.kmod" segment 0000 offset 1FFB0
----> 02102230 : "console.device.kmod" segment 0000 offset E1F0
----> 0213AA88 : "dos.library.kmod" segment 0000 offset 255C8
----> 020420AC : "kernel" segment 0000 offset 420AC
----> 020420F4 : "kernel" segment 0000 offset 420F4
Disassembly:
023961D0: 4E800421 bctrl
023961D4: 80010064 lwz r0,100(r1)
023961D8: 8181003C lwz r12,60(r1)
023961DC: 7C0803A6 mtlr r0
023961E0: 83010040 lwz r24,64(r1)
68k context:
DATA: 00000001 00000000 00000000 00000000 00000000 00000000 00000000 00000000
ADDR: 6FFB8000 96FA0A00 00000000 00000000 00000000 00000000 00000000 4C2650A0
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
68k Stack backtrace:
----> 02020580 : "kernel" segment 0000 offset 20580
----> 02020580 : "kernel" segment 0000 offset 20580
----> 7F859020 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 0020
----> 02033244 : "kernel" segment 0000 offset 33244
----> 02A92CA4 : "kernel" segment 0001 offset 162CA4
----> 02A956F0 : "kernel" segment 0001 offset 1656F0
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F85935C : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 035C
68k Disassembly:
4C2650D0: 4C26 5100 mulu.l -(a6),d5
4C2650D4: 0202 0580 andi.b #0x80,d2
4C2650D8: 4FBB B000 chk.w (0,pc,a3.w),d7
4C2650DC: DFBC DC00 7F85 add.l d7,#-0x23ff807b
4C2650E2: 9020 sub.b -(a0),d0
MEMGUARD HIT - [4] "Workbench" (60AD9630)
front wall damaged -- 4CABB2A0 = AllocVecTagList(288, AVT_Type, 00001000, ...)
0: 0212B470 60A8DD10 ABADCAFE 02973054 4CABB2A0 021446BC 021446BC 01505C5F
8: 6290134C 00000000 7F8619C8 0201ED14 02973054 ABADCAFE 02814EFC 18A40586
16: 02B30000 1BED01A8 20000000 00000000 60A8DD40 02B30000 60AD96C4 00000000
24: 00000000 02B30000 6FBB33E0 60AD9630 000003ED 4CABB2A0 00100000 4CABB2A0
----> 0212B470 : "dos.library.kmod" segment 0000 offset 15FB0
----> 02973054 : "kernel" segment 0001 offset 43054
----> 021446BC : "dos.library.kmod" segment 0000 offset 2F1FC
----> 021446BC : "dos.library.kmod" segment 0000 offset 2F1FC
----> 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
----> 0201ED14 : "kernel" segment 0000 offset 1ED14
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02814EFC : "dos.library.kmod" segment 0002 offset 3FDC
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
LRa 0201D11C : "kernel" segment 0000 offset 1D11C
CTRa 7F861BE4 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 8BE4
LR 0212B438 : "dos.library.kmod" segment 0000 offset 15F78
CTR 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
Stack backtrace:
----> 0212B438 : "dos.library.kmod" segment 0000 offset 15F78
----> 0212B3DC : "dos.library.kmod" segment 0000 offset 15F1C
----> 02138F60 : "dos.library.kmod" segment 0000 offset 23AA0
----> 0212F954 : "dos.library.kmod" segment 0000 offset 1A494
----> 7FF1D53C : "LIBS:workbench.library" segment 0005 offset 5C53C
----> 7FF1C6CC : "LIBS:workbench.library" segment 0005 offset 5B6CC
----> 7FF1C988 : "LIBS:workbench.library" segment 0005 offset 5B988
----> 7FEFDDC8 : "LIBS:workbench.library" segment 0005 offset 3CDC8
----> 7FEFFEE0 : "LIBS:workbench.library" segment 0005 offset 3EEE0
----> 0213AA88 : "dos.library.kmod" segment 0000 offset 255C8
----> 020420AC : "kernel" segment 0000 offset 420AC
----> 020420F4 : "kernel" segment 0000 offset 420F4
Disassembly:
0212B434: 4E800421 bctrl
0212B438: 83E10014 lwz r31,20(r1)
0212B43C: 7FE803A6 mtlr r31
0212B440: 83E1000C lwz r31,12(r1)
0212B444: 38210010 addi r1,r1,16
68k context:
DATA: 00000001 00000000 00000000 00000000 00000000 00000000 00000000 00000000
ADDR: 6FFB8000 93B06A00 00000000 00000000 00000000 00000000 00000000 60A8E420
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
68k Stack backtrace:
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F860CF8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 7CF8
----> 0204AC28 : "kernel" segment 0000 offset 4AC28
----> 020260A8 : "kernel" segment 0000 offset 260A8
----> 0201AADC : "kernel" segment 0000 offset 1AADC
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 7F859170 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 0170
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
68k Disassembly:
60A8E430: 60A8 bra.b 0x60a8e3da
60A8E432: EA9C ror.l #5,d4
60A8E434: 60AD bra.b 0x60a8e3e3
60A8E436: 9630 60AE sub.b (0xae,a0,d6.w),d3
60A8E43A: 0000 0297 ori.b #0x97,d0
MEMGUARD HIT - [4] "Workbench" (60AD9630)
front wall damaged -- 4CABB2A0 = AllocVecTagList(288, AVT_Type, 00001000, ...)
0: 0212B470 60A8DD10 ABADCAFE 02973054 4CABB2A0 021446BC 021446BC 01505C5F
8: 6290134C 00000000 7F8619C8 0201ED14 02973054 ABADCAFE 02814EFC 18A40586
16: 02B30000 1BED01A8 20000000 00000000 60A8DD40 02B30000 60AD96C4 00000000
24: 00000000 02B30000 6FBB33E0 60AD9630 000003ED 4CABB2A0 00100000 4CABB2A0
----> 0212B470 : "dos.library.kmod" segment 0000 offset 15FB0
----> 02973054 : "kernel" segment 0001 offset 43054
----> 021446BC : "dos.library.kmod" segment 0000 offset 2F1FC
----> 021446BC : "dos.library.kmod" segment 0000 offset 2F1FC
----> 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
----> 0201ED14 : "kernel" segment 0000 offset 1ED14
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02814EFC : "dos.library.kmod" segment 0002 offset 3FDC
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
LRa 0201D11C : "kernel" segment 0000 offset 1D11C
CTRa 7F861BE4 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 8BE4
LR 0212B438 : "dos.library.kmod" segment 0000 offset 15F78
CTR 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
Stack backtrace:
----> 0212B438 : "dos.library.kmod" segment 0000 offset 15F78
----> 0212B3DC : "dos.library.kmod" segment 0000 offset 15F1C
----> 02138F60 : "dos.library.kmod" segment 0000 offset 23AA0
----> 0212F954 : "dos.library.kmod" segment 0000 offset 1A494
----> 7FF1D53C : "LIBS:workbench.library" segment 0005 offset 5C53C
----> 7FF1C6CC : "LIBS:workbench.library" segment 0005 offset 5B6CC
----> 7FF1C988 : "LIBS:workbench.library" segment 0005 offset 5B988
----> 7FEFDDC8 : "LIBS:workbench.library" segment 0005 offset 3CDC8
----> 7FEFFEE0 : "LIBS:workbench.library" segment 0005 offset 3EEE0
----> 0213AA88 : "dos.library.kmod" segment 0000 offset 255C8
----> 020420AC : "kernel" segment 0000 offset 420AC
----> 020420F4 : "kernel" segment 0000 offset 420F4
Disassembly:
0212B434: 4E800421 bctrl
0212B438: 83E10014 lwz r31,20(r1)
0212B43C: 7FE803A6 mtlr r31
0212B440: 83E1000C lwz r31,12(r1)
0212B444: 38210010 addi r1,r1,16
68k context:
DATA: 00000001 00000000 00000000 00000000 00000000 00000000 00000000 00000000
ADDR: 6FFB8000 93B06A00 00000000 00000000 00000000 00000000 00000000 60A8E420
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
68k Stack backtrace:
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F860CF8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 7CF8
----> 0204AC28 : "kernel" segment 0000 offset 4AC28
----> 020260A8 : "kernel" segment 0000 offset 260A8
----> 0201AADC : "kernel" segment 0000 offset 1AADC
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 7F859170 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 0170
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
68k Disassembly:
60A8E430: 60A8 bra.b 0x60a8e3da
60A8E432: EA9C ror.l #5,d4
60A8E434: 60AD bra.b 0x60a8e3e3
60A8E436: 9630 60AE sub.b (0xae,a0,d6.w),d3
60A8E43A: 0000 0297 ori.b #0x97,d0
MEMGUARD HIT - [4] "Workbench" (60AD9630)
front wall damaged -- 4CABB2A0 = AllocVecTagList(288, AVT_Type, 00001000, ...)
0: 0212B470 60A8DD10 ABADCAFE 02973054 4CABB2A0 021446BC 021446BC 01505C5F
8: 629016B4 00000000 7F8619C8 0201ED14 02973054 ABADCAFE 02814EFC 18A40586
16: 02B30000 00000000 20000000 00000000 60A8DD40 02B30000 60AD96C4 00000000
24: 00000000 02B30000 6FBB33E0 60AD9630 000003ED 4CABB2A0 60A8ED9C 4CABB2A0
----> 0212B470 : "dos.library.kmod" segment 0000 offset 15FB0
----> 02973054 : "kernel" segment 0001 offset 43054
----> 021446BC : "dos.library.kmod" segment 0000 offset 2F1FC
----> 021446BC : "dos.library.kmod" segment 0000 offset 2F1FC
----> 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
----> 0201ED14 : "kernel" segment 0000 offset 1ED14
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02814EFC : "dos.library.kmod" segment 0002 offset 3FDC
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
LRa 0201D11C : "kernel" segment 0000 offset 1D11C
CTRa 7F861BE4 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 8BE4
LR 0212B438 : "dos.library.kmod" segment 0000 offset 15F78
CTR 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
Stack backtrace:
----> 0212B438 : "dos.library.kmod" segment 0000 offset 15F78
----> 0212B3DC : "dos.library.kmod" segment 0000 offset 15F1C
----> 02138F60 : "dos.library.kmod" segment 0000 offset 23AA0
----> 0212F954 : "dos.library.kmod" segment 0000 offset 1A494
----> 7FF1D53C : "LIBS:workbench.library" segment 0005 offset 5C53C
----> 7FF1C6CC : "LIBS:workbench.library" segment 0005 offset 5B6CC
----> 7FF1C988 : "LIBS:workbench.library" segment 0005 offset 5B988
----> 7FEFDDC8 : "LIBS:workbench.library" segment 0005 offset 3CDC8
----> 7FEFFEE0 : "LIBS:workbench.library" segment 0005 offset 3EEE0
----> 0213AA88 : "dos.library.kmod" segment 0000 offset 255C8
----> 020420AC : "kernel" segment 0000 offset 420AC
----> 020420F4 : "kernel" segment 0000 offset 420F4
Disassembly:
0212B434: 4E800421 bctrl
0212B438: 83E10014 lwz r31,20(r1)
0212B43C: 7FE803A6 mtlr r31
0212B440: 83E1000C lwz r31,12(r1)
0212B444: 38210010 addi r1,r1,16
68k context:
DATA: 00000001 00000000 00000000 00000000 00000000 00000000 00000000 00000000
ADDR: 6FFB8000 93B06A00 00000000 00000000 00000000 00000000 00000000 60A8E420
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
68k Stack backtrace:
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F860CF8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 7CF8
----> 0204AC28 : "kernel" segment 0000 offset 4AC28
----> 020260A8 : "kernel" segment 0000 offset 260A8
----> 0201AADC : "kernel" segment 0000 offset 1AADC
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 7F859170 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 0170
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
68k Disassembly:
60A8E430: 60A8 bra.b 0x60a8e3da
60A8E432: EA9C ror.l #5,d4
60A8E434: 60AD bra.b 0x60a8e3e3
60A8E436: 9630 60AE sub.b (0xae,a0,d6.w),d3
60A8E43A: 0000 0297 ori.b #0x97,d0
MEMGUARD HIT - "input.device" (6FF3FA20)
rear wall damaged -- 602737E0 = AllocVec(32, 00010003)
0: 0221F248 6FE91C60 5441A88E 02973054 602737E0 00000014 00000006 00000000
8: 00000000 7F8619C8 00000000 A0000000 3381C599 CC8FAECE 00000000 00000000
16: 00000000 00000001 00000000 8440000C 00000000 00000000 00000001 00000005
24: 00000001 00000029 02B30000 4E5DEE20 00000000 6FF47842 02B30000 4E5DEC40
----> 0221F248 : "intuition.library.kmod" segment 0000 offset 941A8
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
LRa 022D2924 : "graphics.library.kmod" segment 0000 offset 3A04
CTRa 7F861950 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 8950
LR 022DDE04 : "graphics.library.kmod" segment 0000 offset EEE4
CTR 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
Stack backtrace:
----> 022DDE04 : "graphics.library.kmod" segment 0000 offset EEE4
----> 0221F248 : "intuition.library.kmod" segment 0000 offset 941A8
----> 021AD26C : "intuition.library.kmod" segment 0000 offset 221CC
----> 021ACA98 : "intuition.library.kmod" segment 0000 offset 219F8
----> 7FAC25D8 : "MouseBlanker" segment 0005 offset 25D8
----> 7FFB7718 : "LIBS:commodities.library" segment 0005 offset 1718
----> 02188BD0 : "input.device.kmod" segment 0000 offset 0A70
----> 0218A77C : "input.device.kmod" segment 0000 offset 261C
----> 0201F148 : "kernel" segment 0000 offset 1F148
Disassembly:
022DDE00: 4E800421 bctrl
022DDE04: 807EFEC0 lwz r3,-320(r30)
022DDE08: 7FE4FB78 mr r4,r31
022DDE0C: 38A00010 li r5,16
022DDE10: 80010014 lwz r0,20(r1)
68k context:
DATA: 00000001 00000000 00000000 00000000 00000000 00000000 00000000 00000000
ADDR: 6FFB8000 96FCD900 00000000 00000000 00000000 00000000 00000000 6FE91AF0
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
68k Stack backtrace:
----> 0231B7CC : "graphics.library.kmod" segment 0000 offset 4C8AC
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020A2C : "kernel" segment 0000 offset 20A2C
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
----> 7F85EFCC : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 5FCC
----> 61E01020 : "Development:Debugging/Memguard/MemGuard" segment 0006 offset 0020
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 7F8619F4 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89F4
----> 0221F248 : "intuition.library.kmod" segment 0000 offset 941A8
----> 02973054 : "kernel" segment 0001 offset 43054
68k Disassembly:
6FE91B20: 6FE9 ble.b 0x6fe91b0b
6FE91B22: 1970 0000 0000 move.b (0,a0,d0.w),0(a4)
6FE91B28: 02B3 0000 4E5D EE20 andi.l #0x4e5d,(0x20,a3,a6.l*8)
6FE91B30: 3589 3359 move.w a1,([0,a2,0],0)
6FE91B34: CC8F and.l sp,d6
MEMGUARD HIT - [1] "Background CLI" (501D9350)
front wall damaged -- 4CABB2A0 = AllocVecTagList(260, AVT_Type, 00001000, ...)
0: 0212B164 60B50F30 ABADCAFE 02973054 4CABB2A0 132AECA8 00000043 00000000
8: 000001EA 00000008 00000000 4C15C700 7F8619C8 ABADCAFE 00000000 00000000
16: 60B4D04C 00000000 00000000 ABADCAFE 02B30000 40000004 ABADCAFE 00000000
24: ABADCAFE 00000000 02B30000 4E6BBC00 02B30000 0212AD9C 02973054 02973054
----> 0212B164 : "dos.library.kmod" segment 0000 offset 15CA4
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 0212AD9C : "dos.library.kmod" segment 0000 offset 158DC
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02973054 : "kernel" segment 0001 offset 43054
Allocating task was "AmiDock" (61D87350)
LRa 0201D11C : "kernel" segment 0000 offset 1D11C
CTRa 7F861BE4 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 8BE4
LR 0212B180 : "dos.library.kmod" segment 0000 offset 15CC0
CTR 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
Stack backtrace:
----> 0212B180 : "dos.library.kmod" segment 0000 offset 15CC0
----> 0211ED14 : "dos.library.kmod" segment 0000 offset 9854
----> 0211FBB0 : "dos.library.kmod" segment 0000 offset A6F0
----> 0211FB04 : "dos.library.kmod" segment 0000 offset A644
Disassembly:
0212B17C: 4E800421 bctrl
0212B180: 811CCBA4 lwz r8,-13404(r28)
0212B184: 815B0010 lwz r10,16(r27)
0212B188: 80E800AC lwz r7,172(r8)
0212B18C: 7D034378 mr r3,r8
Dump of context at 0xDFC667C0
Trap type: DSI exception
Machine State (raw): 0x100000000200B030
Machine State (verbose): [Hyper] [ExtInt on] [Super] [FPU on] [IAT on] [DAT on]
Instruction pointer: in module kernel+0x0001A638 (0x0201A638)
Crashed process: Workbench (0x601FC330)
DSI verbose error description: Access not found in hash or BAT (page fault)
Access was a store operation
0: 02038DC0 601D26A0 ABADCAFE 60BB7720 60BB7FDC 00000000 00000140 601D29F8
8: 00000000 C9CBCDCF C1C3C5C7 7F83BC24 37333993 ABADCAFE 02973054 6FFB95CC
16: 6FF22AD8 00000000 00000000 00000000 00000120 02950000 02950000 02806338
24: 02950000 DFFF3B84 02950000 60BB7FDC 00000000 60BB7FD0 02973054 DFFF3B40
CR: 97333555 XER: 8000007E CTR: 0201A614 LR: 02030874
DSISR: 42000000 DAR: C1C3C5CB
FP0 : FFF8000082004000 FFEDE9E5FFECE9E4 FFEBEBEBEBEBEBEB FFEBE8E3FFE9E4DF
FP4 : FFFFFFFFFFFFFFFF FAFAFAFAFAFAFAFA FFFFFFFFFFFFFFFF 4050000000000000
FP8 : 4050000000000000 3FF0000000000000 3FF0000000000000 4330000080000000
FP12: 4070000000000000 4330000080000014 0000000000000000 0000000000000000
FP16: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
FP20: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
FP24: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
FP28: 0000000000000000 0000000000000000 0000000000000000 8000000000000000
FPSCR: 82004000
HID0: 0x8000000000000000 HID1: 0x000000005CE993B1
HID4: 0x4400240000080180 HID5: 0x0000006600000080
V0 : 00000000000000000000000000000000 00000000000000000000000000000000
V2 : 01010101FFDBDBDBFFDBDBDBFFDBDBDB 00000000000000000000000000000000
V4 : DA25DA25DA25DA25DA25DA25DA25DA25 FE01DA25FE01DA25FE01DA25FE01DA25
V6 : 00000000010101010202020203030303 FF000000FF000000FF000000FF000000
V8 : 001002120414061608180A1A0C1C0E1E FFDBDBDBFFDBDBDBFFDBDBDBFFDBDBDB
V10: 01000100010001000100010001000100 FF999999FF999999FF999999FF999999
V12: FF999999FF999999FF999999FF999999 00000000000000000000000000000000
V14: FFDBDBDBFFDBDBDBFFDBDBDBFFDBDBDB FE01DA25FE01DA25FE01DA25FE01DA25
V16: DB25DB25DB25DB25DB25DB25DB25DB25 00000000000000000000000000000000
V18: FF01DB25FF01DB25FF01DB25FF01DB25 DA25DA25DA25DA25DA25DA25DA25DA25
V20: 00000000000000000000000000000000 00000000000000000000000000000000
V22: 00000000000000000000000000000000 00000000000000000000000000000000
V24: 00000000000000000000000000000000 00000000000000000000000000000000
V26: 00000000000000000000000000000000 00000000000000000000000000000000
V28: 00000000000000000000000000000000 00000000000000000000000000000000
V30: 00000000000000000000000000000000 00000000000000000000000000000000
VSCR: 00000000 VRSAVE: 00000000
Disassembly of crash site:
0201A628: 7D234B78 mr r3,r9
0201A62C: 91440000 stw r10,0(r4)
0201A630: 81490000 lwz r10,0(r9)
0201A634: 81290004 lwz r9,4(r9)
>0201A638: 912A0004 stw r9,4(r10)
0201A63C: 4E800020 blr
0201A640: 38600000 li r3,0
0201A644: 4E800020 blr
0201A648: 81230000 lwz r9,0(r3)
0201A64C: 81430004 lwz r10,4(r3)
Kernel command line: SERIAL MUNGE DEBUGLEVEL=1
Registers pointing to code:
People are dying.
Entire ecosystems are collapsing.
We are in the beginning of a mass extinction.
And all you can talk about is money and fairytales of eternal economic growth.
How dare you!
– Greta Thunberg
Entire ecosystems are collapsing.
We are in the beginning of a mass extinction.
And all you can talk about is money and fairytales of eternal economic growth.
How dare you!
– Greta Thunberg
- tonyw
- AmigaOS Core Developer
- Posts: 1479
- Joined: Wed Mar 09, 2011 1:36 pm
- Location: Sydney, Australia
Re: Crash in different places (using memguard 1.15)
We don't test regularly with Memguard because it's so old and has not been updated for OS4. (I'm told) the code breaks several OS4 rules and thus is unreliable.
Frankly I would ditch Memguard and enable the debug kernel instead (simply edit Kicklayout from "kernel" to "kernel.debug" and edit the U-Boot/CFE variable "os4_command" to "munge serial debuglevel=1"). Most of the tests in Memguard are built into the debug kernel, so by using that, you are using an up-to-date test program. It's faster, too.
Then run your test again...
Frankly I would ditch Memguard and enable the debug kernel instead (simply edit Kicklayout from "kernel" to "kernel.debug" and edit the U-Boot/CFE variable "os4_command" to "munge serial debuglevel=1"). Most of the tests in Memguard are built into the debug kernel, so by using that, you are using an up-to-date test program. It's faster, too.
Then run your test again...
cheers
tony
tony
Re: Crash in different places (using memguard 1.15)
Ah, understood, i was thinking Memguard could be the culprit here...it would be pretty strange if all those obvious errors has been missed.tonyw wrote:We don't test regularly with Memguard because it's so old and has not been updated for OS4. (I'm told) the code breaks several OS4 rules and thus is unreliable.
Frankly I would ditch Memguard and enable the debug kernel instead (simply edit Kicklayout from "kernel" to "kernel.debug" and edit the U-Boot/CFE variable "os4_command" to "munge serial debuglevel=1"). Most of the tests in Memguard are built into the debug kernel, so by using that, you are using an up-to-date test program. It's faster, too.
Then run your test again...
Thank you, will certainly do and report back
EDIT: No crashes at all
People are dying.
Entire ecosystems are collapsing.
We are in the beginning of a mass extinction.
And all you can talk about is money and fairytales of eternal economic growth.
How dare you!
– Greta Thunberg
Entire ecosystems are collapsing.
We are in the beginning of a mass extinction.
And all you can talk about is money and fairytales of eternal economic growth.
How dare you!
– Greta Thunberg