Dump of context at 0xEFDBD3E0
Trap type: DSI exception
Machine State (raw): 0x0200F030
Machine State (verbose): [ExtInt on] [User] [FPU on] [IAT on] [DAT on]
Instruction pointer: 0x7E4C0C40
Crashed process: OWB (0x65579350)
DSI verbose error description: Access not found in hash or BAT (page fault)
Access was a load operation
0: 7EC45DC8 629A9A40 1A1B5517 00000001 59C3B760 59C3B76C 5D00C298 583A0000
8: 00000002 00000010 FFFFF74C 629DB08C 00000003 650C5020 62B70E64 62B7332C
16: 62B73368 629A9DB8 62B730CC 5972EFB0 00000000 629A9E3C 00000001 00000001
24: 59AE4B58 00000067 629A9AF8 629A9B04 629A9A78 629A9A78 59C3B76C 59C3B760
CR: 24152724 XER: 20001818 CTR: 00000007 LR: 7E4C55D0
DSISR: 40000000 DAR: 00000014
FP0 : FFF80000A2024100 41D2B57D74AD8F2E 0000000000000000 0000000000000000
FP4 : 3FF0000000000000 407F900000000000 0000000000000000 3FF0000000000000
FP8 : 4082B80000000000 408BE80000000000 4330000080000000 3FD8DBA4D6E47DC3
FP12: 4330000080000000 3FE6C79702E6644E 0000000000000000 0000000000000000
FP16: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
FP20: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
FP24: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
FP28: 0000000000000000 0000000000000000 41D2B57D74AD652C 0000000000000000
FPSCR: A2024100
V0 : 00000000000000000000000000000000 FFEDE9E5FFEDE9E5FFEDE9E5FFF0ECE9
V2 : FE01CE31FE01CE31FE01CE31FE01CE31 FE01CE31FE01CE31FE01CE31FE01CE31
V4 : FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
V6 : FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF 23DC0AF519E604FB11EE00FF10EF00FF
V8 : FF24080BFF1A0305FF120101FF110101 FF562D35FF512B32FF48242AFF401F24
V10: FF070101FF070101FF070101FF4F262E 56AA35CB51AF32CE48B82AD640C024DC
V12: FE0102FDFE0102FDFE0102FDFE0107F8 10EF01FE0CF300FF0CF301FE13EC04FB
V14: 001002120414061608180A1A0C1C0E1E 01000100010001000100010001000100
V16: FFB3B3B3FFB3B3B3FFB3B3B3FFB3B3B3 FF110302FF0D0301FF0D0302FF140805
V18: FE01CE31FE01CE31FE01CE31FE01CE31 FE01CE31FE01CE31FE01CE31FE01CE31
V20: 00000000000000000000000000000000 00000000000000000000000000000000
V22: 00000000000000000000000000000000 00000000000000000000000000000000
V24: 00000000000000000000000000000000 00000000000000000000000000000000
V26: 00000000000000000000000000000000 00000000000000000000000000000000
V28: 00000000000000000000000000000000 00000000000000000000000000000000
V30: 00000000000000000000000000000000 00000000000000000000000000000000
VSCR: 00000000 VRSAVE: 00000000
Registers pointing to code:
r0 : module OWB at 0x7EC45DC8 (section 5 @ 0x7F6DA8)
r11: module OWB at 0x629DB08C (section 15 @ 0x6C)
r13: module OWB at 0x650C5020 (section 4 @ 0x0)
r14: module OWB at 0x62B70E64 (section 6 @ 0x16CE44)
r15: module OWB at 0x62B7332C (section 6 @ 0x16F30C)
r16: module OWB at 0x62B73368 (section 6 @ 0x16F348)
r18: module OWB at 0x62B730CC (section 6 @ 0x16F0AC)
ip : module OWB at 0x7E4C0C40 (section 5 @ 0x71C20)
lr : module OWB at 0x7E4C55D0 (section 5 @ 0x765B0)
ctr: unknown (0x00000007)
Stack Backtrace:
(0x629A9A40) module OWB at 0x7E4C0C40 (section 5 @ 0x71C20)
(0x629A9A70) module OWB at 0x7EC45DC8 (section 5 @ 0x7F6DA8)
(0x629A9AA0) module OWB at 0x7E90DE68 (section 5 @ 0x4BEE48)
(0x629A9AC0) module OWB at 0x7E90E964 (section 5 @ 0x4BF944)
(0x629A9AF0) module OWB at 0x7E90EA4C (section 5 @ 0x4BFA2C)
(0x629A9B50) module OWB at 0x7E4D754C (section 5 @ 0x8852C)
(0x629A9BB0) module OWB at 0x7E4DD570 (section 5 @ 0x8E550)
(0x629A9D80) module OWB at 0x7F0D9020 (section 5 @ 0xC8A000)
(0x629A9DB0) module OWB at 0x7F0F4B6C (section 5 @ 0xCA5B4C)
(0x629A9E30) module OWB at 0x7F0DD904 (section 5 @ 0xC8E8E4)
(0x629A9E90) module OWB at 0x7F0DEF7C (section 5 @ 0xC8FF5C)
(0x629A9EC0) module OWB at 0x7E4DECD8 (section 5 @ 0x8FCB8)
(0x629A9FA0) module OWB at 0x7E4DF3F4 (section 5 @ 0x903D4)
(0x629A9FB0) module OWB at 0x7E4E6AD0 (section 5 @ 0x97AB0)
(0x629AA000) module OWB at 0x7E4E6E10 (section 5 @ 0x97DF0)
(0x629AA030) module OWB at 0x7E4A6084 (section 5 @ 0x57064)
(0x629AA040) module OWB at 0x7E458E24 (section 5 @ 0x9E04)
(0x629AAC80) module OWB at 0x7E45ABB8 (section 5 @ 0xBB98)
(0x629AAD10) module Kickstart/newlib.library.kmod at 0x01A48378 (section 0 @ 0x1F3C)
(0x629AAD80) module Kickstart/newlib.library.kmod at 0x01A48FC4 (section 0 @ 0x2B88)
(0x629AAF20) module Kickstart/newlib.library.kmod at 0x01A49188 (section 0 @ 0x2D4C)
(0x629AAF60) OWB:_start()+0x170 (section 1 @ 0x170)
(0x629AAFA0) module Kickstart/dos.library.kmod at 0x0192A0AC (section 0 @ 0x1EA70)
(0x629AAFC0) module Kickstart/kernel at 0x0183CBF0 (section 0 @ 0x3CBF4)
(0x629AAFD0) module Kickstart/kernel at 0x0183CC70 (section 0 @ 0x3CC74)
(0x629AAFE0)
Disassembly of crash site:
7E4C0C30: 81230000 lwz r9,0(r3)
7E4C0C34: 38600001 li r3,1
7E4C0C38: 2F890000 cmpwi cr7,r9,0
7E4C0C3C: 4D9E0020 beqlr- cr7
>7E4C0C40: 80090004 lwz r0,4(r9)
7E4C0C44: 7C030034 cntlzw r3,r0
7E4C0C48: 5463D97E rlwinm r3,r3,27,5,31
7E4C0C4C: 4E800020 blr
7E4C0C50: 2B83007F cmplwi cr7,r3,127
7E4C0C54: 7C6B1B78 mr r11,r3
Stack pointer (0x629A9A40) is inside bounds
Redzone is OK (4)
68k register dump
DATA: 5BC297E8 00000087 00000000 00000000 00000000 00000000 00000000 00000000
ADDR: 00000000 5AFD15D9 00000000 00000000 00000000 00000000 00000000 629A9BD0
Page information:
Page not found
|