I know it's not happening on beta systems, but i wanted to add one last crash.
It's special because it doesn't freeze right away *AND* it caught a memguard hit before the freeze, maybe that helps a little more?
Happens in Shell again (not much i can do outside shell with memguard running anyway)
1) Start the Shell
2) Right-Click to bring up the PD menu
3) Go to Projects/About to load the about window
...the window will come up (somethimes with text inside, sometimes not, depends on how fast the illegal mem accress hits the system i assume)
...i can still move the mouse and type for another few seconds until the system freeze hits in
Code: Select all
MemGuard 1.15 (2.1.2009) installed.
MEMGUARD HIT - "WinFrame 1 Process" (60A9B350)
front wall damaged -- 4CABB2A0 = AllocMem(324, 00011000)
0: 023961BC 4C2652F0 071FE026 02973054 4CABB2A0 00000144 00000043 0026B000
8: FFFFFFFF 7F86198C 00000000 4C15C808 35533395 C3DC07E8 611DD9C0 85002001
16: 615BCA76 00000000 615BC9D0 00008000 61D6F7DC 00000000 4C265958 00000000
24: 02394F94 6FF8C180 02973054 00000000 6FFFF800 6FF3C140 611DDAA0 4CABB2A0
----> 023961BC : "graphics.library.kmod" segment 0000 offset C729C
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F86198C : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 898C
----> 02394F94 : "graphics.library.kmod" segment 0000 offset C6074
----> 02973054 : "kernel" segment 0001 offset 43054
LRa 0239FCEC : "graphics.library.kmod" segment 0000 offset D0DCC
CTRa 7F861914 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 8914
LR 023961D4 : "graphics.library.kmod" segment 0000 offset C72B4
CTR 7F86198C : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 898C
Stack backtrace:
----> 023961D4 : "graphics.library.kmod" segment 0000 offset C72B4
----> 02396314 : "graphics.library.kmod" segment 0000 offset C73F4
----> 021B56CC : "intuition.library.kmod" segment 0000 offset 2A62C
----> 021F1B38 : "intuition.library.kmod" segment 0000 offset 66A98
----> 021B6078 : "intuition.library.kmod" segment 0000 offset 2AFD8
----> 021B630C : "intuition.library.kmod" segment 0000 offset 2B26C
----> 02205098 : "intuition.library.kmod" segment 0000 offset 79FF8
----> 02205320 : "intuition.library.kmod" segment 0000 offset 7A280
----> 7FDE4488 : "CLASSES:window.class" segment 0005 offset 4488
----> 7FDE9DBC : "CLASSES:window.class" segment 0005 offset 9DBC
----> 021AC4E8 : "intuition.library.kmod" segment 0000 offset 21448
----> 021AC68C : "intuition.library.kmod" segment 0000 offset 215EC
----> 02195494 : "intuition.library.kmod" segment 0000 offset A3F4
----> 021950D4 : "intuition.library.kmod" segment 0000 offset A034
----> 7FA7610C : "CLASSES:requester.class" segment 0005 offset 410C
----> 021AC4E8 : "intuition.library.kmod" segment 0000 offset 21448
----> 021AC68C : "intuition.library.kmod" segment 0000 offset 215EC
----> 02195494 : "intuition.library.kmod" segment 0000 offset A3F4
----> 021950D4 : "intuition.library.kmod" segment 0000 offset A034
----> 02102CEC : "console.device.kmod" segment 0000 offset ECAC
----> 02113FF0 : "console.device.kmod" segment 0000 offset 1FFB0
----> 02102230 : "console.device.kmod" segment 0000 offset E1F0
----> 0213AA88 : "dos.library.kmod" segment 0000 offset 255C8
----> 020420AC : "kernel" segment 0000 offset 420AC
----> 020420F4 : "kernel" segment 0000 offset 420F4
Disassembly:
023961D0: 4E800421 bctrl
023961D4: 80010064 lwz r0,100(r1)
023961D8: 8181003C lwz r12,60(r1)
023961DC: 7C0803A6 mtlr r0
023961E0: 83010040 lwz r24,64(r1)
68k context:
DATA: 00000001 00000000 00000000 00000000 00000000 00000000 00000000 00000000
ADDR: 6FFB8000 96FA0A00 00000000 00000000 00000000 00000000 00000000 4C2650A0
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
68k Stack backtrace:
----> 02020580 : "kernel" segment 0000 offset 20580
----> 02020580 : "kernel" segment 0000 offset 20580
----> 7F859020 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 0020
----> 02033244 : "kernel" segment 0000 offset 33244
----> 02A92CA4 : "kernel" segment 0001 offset 162CA4
----> 02A956F0 : "kernel" segment 0001 offset 1656F0
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F85935C : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 035C
68k Disassembly:
4C2650D0: 4C26 5100 mulu.l -(a6),d5
4C2650D4: 0202 0580 andi.b #0x80,d2
4C2650D8: 4FBB B000 chk.w (0,pc,a3.w),d7
4C2650DC: DFBC DC00 7F85 add.l d7,#-0x23ff807b
4C2650E2: 9020 sub.b -(a0),d0
MEMGUARD HIT - [4] "Workbench" (60AD9630)
front wall damaged -- 4CABB2A0 = AllocVecTagList(288, AVT_Type, 00001000, ...)
0: 0212B470 60A8DD10 ABADCAFE 02973054 4CABB2A0 021446BC 021446BC 01505C5F
8: 6290134C 00000000 7F8619C8 0201ED14 02973054 ABADCAFE 02814EFC 18A40586
16: 02B30000 1BED01A8 20000000 00000000 60A8DD40 02B30000 60AD96C4 00000000
24: 00000000 02B30000 6FBB33E0 60AD9630 000003ED 4CABB2A0 00100000 4CABB2A0
----> 0212B470 : "dos.library.kmod" segment 0000 offset 15FB0
----> 02973054 : "kernel" segment 0001 offset 43054
----> 021446BC : "dos.library.kmod" segment 0000 offset 2F1FC
----> 021446BC : "dos.library.kmod" segment 0000 offset 2F1FC
----> 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
----> 0201ED14 : "kernel" segment 0000 offset 1ED14
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02814EFC : "dos.library.kmod" segment 0002 offset 3FDC
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
LRa 0201D11C : "kernel" segment 0000 offset 1D11C
CTRa 7F861BE4 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 8BE4
LR 0212B438 : "dos.library.kmod" segment 0000 offset 15F78
CTR 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
Stack backtrace:
----> 0212B438 : "dos.library.kmod" segment 0000 offset 15F78
----> 0212B3DC : "dos.library.kmod" segment 0000 offset 15F1C
----> 02138F60 : "dos.library.kmod" segment 0000 offset 23AA0
----> 0212F954 : "dos.library.kmod" segment 0000 offset 1A494
----> 7FF1D53C : "LIBS:workbench.library" segment 0005 offset 5C53C
----> 7FF1C6CC : "LIBS:workbench.library" segment 0005 offset 5B6CC
----> 7FF1C988 : "LIBS:workbench.library" segment 0005 offset 5B988
----> 7FEFDDC8 : "LIBS:workbench.library" segment 0005 offset 3CDC8
----> 7FEFFEE0 : "LIBS:workbench.library" segment 0005 offset 3EEE0
----> 0213AA88 : "dos.library.kmod" segment 0000 offset 255C8
----> 020420AC : "kernel" segment 0000 offset 420AC
----> 020420F4 : "kernel" segment 0000 offset 420F4
Disassembly:
0212B434: 4E800421 bctrl
0212B438: 83E10014 lwz r31,20(r1)
0212B43C: 7FE803A6 mtlr r31
0212B440: 83E1000C lwz r31,12(r1)
0212B444: 38210010 addi r1,r1,16
68k context:
DATA: 00000001 00000000 00000000 00000000 00000000 00000000 00000000 00000000
ADDR: 6FFB8000 93B06A00 00000000 00000000 00000000 00000000 00000000 60A8E420
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
68k Stack backtrace:
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F860CF8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 7CF8
----> 0204AC28 : "kernel" segment 0000 offset 4AC28
----> 020260A8 : "kernel" segment 0000 offset 260A8
----> 0201AADC : "kernel" segment 0000 offset 1AADC
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 7F859170 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 0170
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
68k Disassembly:
60A8E430: 60A8 bra.b 0x60a8e3da
60A8E432: EA9C ror.l #5,d4
60A8E434: 60AD bra.b 0x60a8e3e3
60A8E436: 9630 60AE sub.b (0xae,a0,d6.w),d3
60A8E43A: 0000 0297 ori.b #0x97,d0
MEMGUARD HIT - [4] "Workbench" (60AD9630)
front wall damaged -- 4CABB2A0 = AllocVecTagList(288, AVT_Type, 00001000, ...)
0: 0212B470 60A8DD10 ABADCAFE 02973054 4CABB2A0 021446BC 021446BC 01505C5F
8: 6290134C 00000000 7F8619C8 0201ED14 02973054 ABADCAFE 02814EFC 18A40586
16: 02B30000 1BED01A8 20000000 00000000 60A8DD40 02B30000 60AD96C4 00000000
24: 00000000 02B30000 6FBB33E0 60AD9630 000003ED 4CABB2A0 00100000 4CABB2A0
----> 0212B470 : "dos.library.kmod" segment 0000 offset 15FB0
----> 02973054 : "kernel" segment 0001 offset 43054
----> 021446BC : "dos.library.kmod" segment 0000 offset 2F1FC
----> 021446BC : "dos.library.kmod" segment 0000 offset 2F1FC
----> 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
----> 0201ED14 : "kernel" segment 0000 offset 1ED14
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02814EFC : "dos.library.kmod" segment 0002 offset 3FDC
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
LRa 0201D11C : "kernel" segment 0000 offset 1D11C
CTRa 7F861BE4 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 8BE4
LR 0212B438 : "dos.library.kmod" segment 0000 offset 15F78
CTR 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
Stack backtrace:
----> 0212B438 : "dos.library.kmod" segment 0000 offset 15F78
----> 0212B3DC : "dos.library.kmod" segment 0000 offset 15F1C
----> 02138F60 : "dos.library.kmod" segment 0000 offset 23AA0
----> 0212F954 : "dos.library.kmod" segment 0000 offset 1A494
----> 7FF1D53C : "LIBS:workbench.library" segment 0005 offset 5C53C
----> 7FF1C6CC : "LIBS:workbench.library" segment 0005 offset 5B6CC
----> 7FF1C988 : "LIBS:workbench.library" segment 0005 offset 5B988
----> 7FEFDDC8 : "LIBS:workbench.library" segment 0005 offset 3CDC8
----> 7FEFFEE0 : "LIBS:workbench.library" segment 0005 offset 3EEE0
----> 0213AA88 : "dos.library.kmod" segment 0000 offset 255C8
----> 020420AC : "kernel" segment 0000 offset 420AC
----> 020420F4 : "kernel" segment 0000 offset 420F4
Disassembly:
0212B434: 4E800421 bctrl
0212B438: 83E10014 lwz r31,20(r1)
0212B43C: 7FE803A6 mtlr r31
0212B440: 83E1000C lwz r31,12(r1)
0212B444: 38210010 addi r1,r1,16
68k context:
DATA: 00000001 00000000 00000000 00000000 00000000 00000000 00000000 00000000
ADDR: 6FFB8000 93B06A00 00000000 00000000 00000000 00000000 00000000 60A8E420
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
68k Stack backtrace:
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F860CF8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 7CF8
----> 0204AC28 : "kernel" segment 0000 offset 4AC28
----> 020260A8 : "kernel" segment 0000 offset 260A8
----> 0201AADC : "kernel" segment 0000 offset 1AADC
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 7F859170 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 0170
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
68k Disassembly:
60A8E430: 60A8 bra.b 0x60a8e3da
60A8E432: EA9C ror.l #5,d4
60A8E434: 60AD bra.b 0x60a8e3e3
60A8E436: 9630 60AE sub.b (0xae,a0,d6.w),d3
60A8E43A: 0000 0297 ori.b #0x97,d0
MEMGUARD HIT - [4] "Workbench" (60AD9630)
front wall damaged -- 4CABB2A0 = AllocVecTagList(288, AVT_Type, 00001000, ...)
0: 0212B470 60A8DD10 ABADCAFE 02973054 4CABB2A0 021446BC 021446BC 01505C5F
8: 629016B4 00000000 7F8619C8 0201ED14 02973054 ABADCAFE 02814EFC 18A40586
16: 02B30000 00000000 20000000 00000000 60A8DD40 02B30000 60AD96C4 00000000
24: 00000000 02B30000 6FBB33E0 60AD9630 000003ED 4CABB2A0 60A8ED9C 4CABB2A0
----> 0212B470 : "dos.library.kmod" segment 0000 offset 15FB0
----> 02973054 : "kernel" segment 0001 offset 43054
----> 021446BC : "dos.library.kmod" segment 0000 offset 2F1FC
----> 021446BC : "dos.library.kmod" segment 0000 offset 2F1FC
----> 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
----> 0201ED14 : "kernel" segment 0000 offset 1ED14
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02814EFC : "dos.library.kmod" segment 0002 offset 3FDC
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
LRa 0201D11C : "kernel" segment 0000 offset 1D11C
CTRa 7F861BE4 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 8BE4
LR 0212B438 : "dos.library.kmod" segment 0000 offset 15F78
CTR 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
Stack backtrace:
----> 0212B438 : "dos.library.kmod" segment 0000 offset 15F78
----> 0212B3DC : "dos.library.kmod" segment 0000 offset 15F1C
----> 02138F60 : "dos.library.kmod" segment 0000 offset 23AA0
----> 0212F954 : "dos.library.kmod" segment 0000 offset 1A494
----> 7FF1D53C : "LIBS:workbench.library" segment 0005 offset 5C53C
----> 7FF1C6CC : "LIBS:workbench.library" segment 0005 offset 5B6CC
----> 7FF1C988 : "LIBS:workbench.library" segment 0005 offset 5B988
----> 7FEFDDC8 : "LIBS:workbench.library" segment 0005 offset 3CDC8
----> 7FEFFEE0 : "LIBS:workbench.library" segment 0005 offset 3EEE0
----> 0213AA88 : "dos.library.kmod" segment 0000 offset 255C8
----> 020420AC : "kernel" segment 0000 offset 420AC
----> 020420F4 : "kernel" segment 0000 offset 420F4
Disassembly:
0212B434: 4E800421 bctrl
0212B438: 83E10014 lwz r31,20(r1)
0212B43C: 7FE803A6 mtlr r31
0212B440: 83E1000C lwz r31,12(r1)
0212B444: 38210010 addi r1,r1,16
68k context:
DATA: 00000001 00000000 00000000 00000000 00000000 00000000 00000000 00000000
ADDR: 6FFB8000 93B06A00 00000000 00000000 00000000 00000000 00000000 60A8E420
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
68k Stack backtrace:
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F860CF8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 7CF8
----> 0204AC28 : "kernel" segment 0000 offset 4AC28
----> 020260A8 : "kernel" segment 0000 offset 260A8
----> 0201AADC : "kernel" segment 0000 offset 1AADC
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 7F859170 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 0170
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
----> 02020202 : "kernel" segment 0000 offset 20202
68k Disassembly:
60A8E430: 60A8 bra.b 0x60a8e3da
60A8E432: EA9C ror.l #5,d4
60A8E434: 60AD bra.b 0x60a8e3e3
60A8E436: 9630 60AE sub.b (0xae,a0,d6.w),d3
60A8E43A: 0000 0297 ori.b #0x97,d0
MEMGUARD HIT - "input.device" (6FF3FA20)
rear wall damaged -- 602737E0 = AllocVec(32, 00010003)
0: 0221F248 6FE91C60 5441A88E 02973054 602737E0 00000014 00000006 00000000
8: 00000000 7F8619C8 00000000 A0000000 3381C599 CC8FAECE 00000000 00000000
16: 00000000 00000001 00000000 8440000C 00000000 00000000 00000001 00000005
24: 00000001 00000029 02B30000 4E5DEE20 00000000 6FF47842 02B30000 4E5DEC40
----> 0221F248 : "intuition.library.kmod" segment 0000 offset 941A8
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
LRa 022D2924 : "graphics.library.kmod" segment 0000 offset 3A04
CTRa 7F861950 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 8950
LR 022DDE04 : "graphics.library.kmod" segment 0000 offset EEE4
CTR 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
Stack backtrace:
----> 022DDE04 : "graphics.library.kmod" segment 0000 offset EEE4
----> 0221F248 : "intuition.library.kmod" segment 0000 offset 941A8
----> 021AD26C : "intuition.library.kmod" segment 0000 offset 221CC
----> 021ACA98 : "intuition.library.kmod" segment 0000 offset 219F8
----> 7FAC25D8 : "MouseBlanker" segment 0005 offset 25D8
----> 7FFB7718 : "LIBS:commodities.library" segment 0005 offset 1718
----> 02188BD0 : "input.device.kmod" segment 0000 offset 0A70
----> 0218A77C : "input.device.kmod" segment 0000 offset 261C
----> 0201F148 : "kernel" segment 0000 offset 1F148
Disassembly:
022DDE00: 4E800421 bctrl
022DDE04: 807EFEC0 lwz r3,-320(r30)
022DDE08: 7FE4FB78 mr r4,r31
022DDE0C: 38A00010 li r5,16
022DDE10: 80010014 lwz r0,20(r1)
68k context:
DATA: 00000001 00000000 00000000 00000000 00000000 00000000 00000000 00000000
ADDR: 6FFB8000 96FCD900 00000000 00000000 00000000 00000000 00000000 6FE91AF0
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
68k Stack backtrace:
----> 0231B7CC : "graphics.library.kmod" segment 0000 offset 4C8AC
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02020A2C : "kernel" segment 0000 offset 20A2C
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
----> 7F85EFCC : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 5FCC
----> 61E01020 : "Development:Debugging/Memguard/MemGuard" segment 0006 offset 0020
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
----> 00000001 : "Development:Debugging/Memguard/MemGuard" segment 0000 offset 0000
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 7F8619F4 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89F4
----> 0221F248 : "intuition.library.kmod" segment 0000 offset 941A8
----> 02973054 : "kernel" segment 0001 offset 43054
68k Disassembly:
6FE91B20: 6FE9 ble.b 0x6fe91b0b
6FE91B22: 1970 0000 0000 move.b (0,a0,d0.w),0(a4)
6FE91B28: 02B3 0000 4E5D EE20 andi.l #0x4e5d,(0x20,a3,a6.l*8)
6FE91B30: 3589 3359 move.w a1,([0,a2,0],0)
6FE91B34: CC8F and.l sp,d6
MEMGUARD HIT - [1] "Background CLI" (501D9350)
front wall damaged -- 4CABB2A0 = AllocVecTagList(260, AVT_Type, 00001000, ...)
0: 0212B164 60B50F30 ABADCAFE 02973054 4CABB2A0 132AECA8 00000043 00000000
8: 000001EA 00000008 00000000 4C15C700 7F8619C8 ABADCAFE 00000000 00000000
16: 60B4D04C 00000000 00000000 ABADCAFE 02B30000 40000004 ABADCAFE 00000000
24: ABADCAFE 00000000 02B30000 4E6BBC00 02B30000 0212AD9C 02973054 02973054
----> 0212B164 : "dos.library.kmod" segment 0000 offset 15CA4
----> 02973054 : "kernel" segment 0001 offset 43054
----> 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 02B30000 : "graphics.library.kmod" segment 0001 offset 1760
----> 0212AD9C : "dos.library.kmod" segment 0000 offset 158DC
----> 02973054 : "kernel" segment 0001 offset 43054
----> 02973054 : "kernel" segment 0001 offset 43054
Allocating task was "AmiDock" (61D87350)
LRa 0201D11C : "kernel" segment 0000 offset 1D11C
CTRa 7F861BE4 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 8BE4
LR 0212B180 : "dos.library.kmod" segment 0000 offset 15CC0
CTR 7F8619C8 : "Development:Debugging/Memguard/MemGuard" segment 0005 offset 89C8
Stack backtrace:
----> 0212B180 : "dos.library.kmod" segment 0000 offset 15CC0
----> 0211ED14 : "dos.library.kmod" segment 0000 offset 9854
----> 0211FBB0 : "dos.library.kmod" segment 0000 offset A6F0
----> 0211FB04 : "dos.library.kmod" segment 0000 offset A644
Disassembly:
0212B17C: 4E800421 bctrl
0212B180: 811CCBA4 lwz r8,-13404(r28)
0212B184: 815B0010 lwz r10,16(r27)
0212B188: 80E800AC lwz r7,172(r8)
0212B18C: 7D034378 mr r3,r8
Dump of context at 0xDFC667C0
Trap type: DSI exception
Machine State (raw): 0x100000000200B030
Machine State (verbose): [Hyper] [ExtInt on] [Super] [FPU on] [IAT on] [DAT on]
Instruction pointer: in module kernel+0x0001A638 (0x0201A638)
Crashed process: Workbench (0x601FC330)
DSI verbose error description: Access not found in hash or BAT (page fault)
Access was a store operation
0: 02038DC0 601D26A0 ABADCAFE 60BB7720 60BB7FDC 00000000 00000140 601D29F8
8: 00000000 C9CBCDCF C1C3C5C7 7F83BC24 37333993 ABADCAFE 02973054 6FFB95CC
16: 6FF22AD8 00000000 00000000 00000000 00000120 02950000 02950000 02806338
24: 02950000 DFFF3B84 02950000 60BB7FDC 00000000 60BB7FD0 02973054 DFFF3B40
CR: 97333555 XER: 8000007E CTR: 0201A614 LR: 02030874
DSISR: 42000000 DAR: C1C3C5CB
FP0 : FFF8000082004000 FFEDE9E5FFECE9E4 FFEBEBEBEBEBEBEB FFEBE8E3FFE9E4DF
FP4 : FFFFFFFFFFFFFFFF FAFAFAFAFAFAFAFA FFFFFFFFFFFFFFFF 4050000000000000
FP8 : 4050000000000000 3FF0000000000000 3FF0000000000000 4330000080000000
FP12: 4070000000000000 4330000080000014 0000000000000000 0000000000000000
FP16: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
FP20: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
FP24: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
FP28: 0000000000000000 0000000000000000 0000000000000000 8000000000000000
FPSCR: 82004000
HID0: 0x8000000000000000 HID1: 0x000000005CE993B1
HID4: 0x4400240000080180 HID5: 0x0000006600000080
V0 : 00000000000000000000000000000000 00000000000000000000000000000000
V2 : 01010101FFDBDBDBFFDBDBDBFFDBDBDB 00000000000000000000000000000000
V4 : DA25DA25DA25DA25DA25DA25DA25DA25 FE01DA25FE01DA25FE01DA25FE01DA25
V6 : 00000000010101010202020203030303 FF000000FF000000FF000000FF000000
V8 : 001002120414061608180A1A0C1C0E1E FFDBDBDBFFDBDBDBFFDBDBDBFFDBDBDB
V10: 01000100010001000100010001000100 FF999999FF999999FF999999FF999999
V12: FF999999FF999999FF999999FF999999 00000000000000000000000000000000
V14: FFDBDBDBFFDBDBDBFFDBDBDBFFDBDBDB FE01DA25FE01DA25FE01DA25FE01DA25
V16: DB25DB25DB25DB25DB25DB25DB25DB25 00000000000000000000000000000000
V18: FF01DB25FF01DB25FF01DB25FF01DB25 DA25DA25DA25DA25DA25DA25DA25DA25
V20: 00000000000000000000000000000000 00000000000000000000000000000000
V22: 00000000000000000000000000000000 00000000000000000000000000000000
V24: 00000000000000000000000000000000 00000000000000000000000000000000
V26: 00000000000000000000000000000000 00000000000000000000000000000000
V28: 00000000000000000000000000000000 00000000000000000000000000000000
V30: 00000000000000000000000000000000 00000000000000000000000000000000
VSCR: 00000000 VRSAVE: 00000000
Disassembly of crash site:
0201A628: 7D234B78 mr r3,r9
0201A62C: 91440000 stw r10,0(r4)
0201A630: 81490000 lwz r10,0(r9)
0201A634: 81290004 lwz r9,4(r9)
>0201A638: 912A0004 stw r9,4(r10)
0201A63C: 4E800020 blr
0201A640: 38600000 li r3,0
0201A644: 4E800020 blr
0201A648: 81230000 lwz r9,0(r3)
0201A64C: 81430004 lwz r10,4(r3)
Kernel command line: SERIAL MUNGE DEBUGLEVEL=1
Registers pointing to code: