DB2 10.1 FP4 DB2START gives error - windows

I installed DB2 10.1 FP4 on Windows server 2012 R2 successfully.
When I try to start database using db2start I am getting below error.
DB2 : The service has returned a service-specific error code.
SQL1042C An unexpected system error occurred. SQLSTATE=58004
db2diag.log has below error.
2015-05-14-16.34.51.630000+540 I95881F1126 LEVEL: Error
PID : 4728 TID : 4996 PROC : db2syscs.exe
INSTANCE: DB2 NODE : 000
HOSTNAME: <Machine name>
EDUID : 4996 EDUNAME: db2sysc
FUNCTION: DB2 Common, Cryptography, cryptDynamicLoadGSKitCrypto, probe:998
MESSAGE : ECF=0x90000076=-1879048074=ECF_LIB_CANNOT_LOAD
Cannot load the specified library
DATA #1 : unsigned integer, 4 bytes
70
DATA #2 : String, 48 bytes
D:\PROGRA~1\IBM\SQLLIB\bin\icc64\gsk8iccs_64.dll
CALLSTCK:
[0] 0x00007FF93D9642A4 pdOSSeLoggingCallback + 0x134
[1] 0x00007FF93EF1033E ossLog + 0x15E
[2] 0x00007FF93EF1023B ossLog + 0x5B
[3] 0x00007FF91D8E75ED cryptDynamicLoadGSKitCrypto + 0x65D
[4] 0x00007FF91D8E6724 cryptContextRealInit + 0x144
[5] 0x00007FF91D8E6337 cryptContextInit + 0x117
[6] 0x00007FF91C9002E5 sqloRunInstance + 0x1C5
[7] 0x00007FF691442700 0x00007FF691442700 + 0x0
[8] 0x00007FF691441974 0x00007FF691441974 + 0x0
[9] 0x00007FF946B516AD BaseThreadInitThunk + 0xD
[10] 0x00007FF946D04629 RtlUserThreadStart + 0x1D
2015-05-14-16.34.51.834000+540 I97009F922 LEVEL: Error
PID : 4728 TID : 4996 PROC : db2syscs.exe
INSTANCE: DB2 NODE : 000
HOSTNAME: <Machine name>
EDUID : 4996 EDUNAME: db2sysc
FUNCTION: DB2 Common, Cryptography, cryptContextInit, probe:105
MESSAGE : ECF=0x90000076=-1879048074=ECF_LIB_CANNOT_LOAD
Cannot load the specified library
DATA #1 : Hex integer, 4 bytes
0x90000076
CALLSTCK:
[0] 0x00007FF93D9642A4 pdOSSeLoggingCallback + 0x134
[1] 0x00007FF93EF1033E ossLog + 0x15E
[2] 0x00007FF93EF1023B ossLog + 0x5B
[3] 0x00007FF91D8E63D5 cryptContextInit + 0x1B5
[4] 0x00007FF91C9002E5 sqloRunInstance + 0x1C5
[5] 0x00007FF691442700 0x00007FF691442700 + 0x0
[6] 0x00007FF691441974 0x00007FF691441974 + 0x0
[7] 0x00007FF946B516AD BaseThreadInitThunk + 0xD
[8] 0x00007FF946D04629 RtlUserThreadStart + 0x1D
2015-05-14-16.34.51.834000+540 I97933F426 LEVEL: Severe
PID : 4728 TID : 4996 PROC : db2syscs.exe
INSTANCE: DB2 NODE : 000
HOSTNAME: <Machine name>
EDUID : 4996 EDUNAME: db2sysc
FUNCTION: DB2 UDB, oper system services, sqloRunInstance, probe:50
MESSAGE : ECF=0x90000076=-1879048074=ECF_LIB_CANNOT_LOAD
Cannot load the specified library
2015-05-14-16.34.51.834000+540 I98361F529 LEVEL: Severe
PID : 4728 TID : 4996 PROC : db2syscs.exe
INSTANCE: DB2 NODE : 000
HOSTNAME: <Machine name>
EDUID : 4996 EDUNAME: db2sysc
FUNCTION: DB2 UDB, base sys utilities, DB2main, probe:2263
MESSAGE : SQL1042C An unexpected system error occurred.
Any help is appreciate.

Related

Library not loaded: #rpath/Toast.framework/Toast when debugging flutter app

Today when I start debugging the flutter(v2.10.3) app with android studio in macOS 12.5 with M1 chip, shows error like this:
-------------------------------------
Translated Report (Full Report Below)
-------------------------------------
Incident Identifier: 6F929B73-3F57-461A-BC03-F534D610C50E
CrashReporter Key: 4B9AAD75-30E1-0E03-1197-562F10CD6CAA
Hardware Model: MacBookPro18,1
Process: Runner [20899]
Path: /Users/USER/Library/Developer/CoreSimulator/Devices/911ED020-A317-4E0E-AA48-A2369DD9EED8/data/Containers/Bundle/Application/CA725FC8-C3B4-4FC1-91DD-77DE7A74CC3F/Runner.app/Runner
Identifier: com.earth.dolphin
Version: 1.0.0 (1.0.0)
Code Type: ARM-64 (Native)
Role: Foreground
Parent Process: launchd_sim [17981]
Coalition: com.apple.CoreSimulator.SimDevice.911ED020-A317-4E0E-AA48-A2369DD9EED8 [4058]
Responsible Process: SimulatorTrampoline [17866]
Date/Time: 2022-07-30 12:28:46.6656 +0800
Launch Time: 2022-07-30 12:28:46.6099 +0800
OS Version: macOS 12.5 (21G72)
Release Type: User
Report Version: 104
Exception Type: EXC_CRASH (SIGABRT)
Exception Codes: 0x0000000000000000, 0x0000000000000000
Exception Note: EXC_CORPSE_NOTIFY
Termination Reason: DYLD 1 Library missing
Library not loaded: #rpath/Toast.framework/Toast
Referenced from: /Users/USER/Library/Developer/CoreSimulator/Devices/911ED020-A317-4E0E-AA48-A2369DD9EED8/data/Containers/Bundle/Application/CA725FC8-C3B4-4FC1-91DD-77DE7A74CC3F/Runner.app/Runner
Reason: tried: '/Applications/Xcode.app/Contents/Developer/Platforms/iPhoneOS.platform/Library/Developer/CoreSimulator/Profiles/Runtimes/iOS.simruntime/Contents/Resources/RuntimeRoot/usr/lib/swift/Toast.framework/Toast' (no such file), '/usr/lib/swift/Toast.framework/Toast' (no such file), '/Users/xiaoqiangjiang/Library/Developer/CoreSimulator/Devices/911ED020-A317-4E0E-AA48-A2369DD9EED8/data/Containers/Bundle/Application/CA725FC8-C3B4-4FC1-91DD-77DE7A74CC3F/Runner.app/Frameworks/Toast.framework/Toast' (no such file), '/Users/xiaoqiangjiang/Library/Developer/CoreSimulator/Devices/911ED020-A317-4E0E-AA48-A2369DD9EED8/data/Containers/Bundle/Application/CA725FC8-C3B4-4FC1-91DD-77DE7A74CC3F/Runner.app/Frameworks/Toast.framework/Toast' (no such file), '/Users
(terminated at launch; ignore backtrace)
Triggered by Thread: 0
Thread 0 Crashed:
0 dyld 0x1046efe98 __abort_with_payload + 8
1 dyld 0x1046f7024 abort_with_payload_wrapper_internal + 104
2 dyld 0x1046f7058 abort_with_payload + 16
3 dyld_sim 0x1045d411c abort_with_payload + 40
4 dyld_sim 0x1045a54f4 dyld4::halt(char const*) + 324
5 dyld_sim 0x1045a19d4 dyld4::prepare(dyld4::APIs&, dyld3::MachOAnalyzer const*) + 2468
6 dyld_sim 0x1045a1bf4 _dyld_sim_prepare + 376
7 dyld 0x1046aa4c4 dyld4::prepareSim(dyld4::RuntimeState&, char const*) + 1052
8 dyld 0x1046a9274 dyld4::prepare(dyld4::APIs&, dyld3::MachOAnalyzer const*) + 248
9 dyld 0x1046a906c start + 488
Thread 0 crashed with ARM Thread State (64-bit):
x0: 0x0000000000000006 x1: 0x0000000000000001 x2: 0x000000016b9747a0 x3: 0x00000000000000ee
x4: 0x000000016b9743a0 x5: 0x0000000000000000 x6: 0x0000000000000000 x7: 0x0000000000000000
x8: 0x0000000000000020 x9: 0x0000000000000010 x10: 0x0000000000000000 x11: 0x207972617262694c
x12: 0x0000000000000027 x13: 0x0000000000000032 x14: 0x000000000013bc60 x15: 0x0000000000000000
x16: 0x0000000000000209 x17: 0x00000000000fde70 x18: 0x0000000000000000 x19: 0x0000000000000000
x20: 0x000000016b9743a0 x21: 0x00000000000000ee x22: 0x000000016b9747a0 x23: 0x0000000000000001
x24: 0x0000000000000006 x25: 0x000000016b975108 x26: 0x00000001045f00c8 x27: 0x0000000000000000
x28: 0x000000016b975038 fp: 0x000000016b974360 lr: 0x00000001046f7024
sp: 0x000000016b974320 pc: 0x00000001046efe98 cpsr: 0x00001000
far: 0x0000000104624000 esr: 0x56000080 Address size fault
Binary Images:
0x1046a4000 - 0x104703fff dyld (*) <75627683-a780-32ad-ae34-cf86dd23a26b> /usr/lib/dyld
0x1045a0000 - 0x1045dbfff dyld_sim (*) <67298116-bb18-3438-b22e-8d2b9d4618e9> /Applications/Xcode.app/Contents/Developer/Platforms/iPhoneOS.platform/Library/Developer/CoreSimulator/Profiles/Runtimes/iOS.simruntime/Contents/Resources/RuntimeRoot/usr/lib/dyld_sim
Error Formulating Crash Report:
dyld_process_snapshot_get_shared_cache failed
EOF
-----------
Full Report
-----------
{"app_name":"Runner","timestamp":"2022-07-30 12:28:46.00 +0800","app_version":"1.0.0","slice_uuid":"791b909c-b70e-34e2-9813-fc2da9cfbed7","build_version":"1.0.0","platform":7,"bundleID":"com.earth.dolphin","share_with_app_devs":0,"is_first_party":0,"bug_type":"309","os_version":"macOS 12.5 (21G72)","incident_id":"6F929B73-3F57-461A-BC03-F534D610C50E","name":"Runner"}
{
"uptime" : 6400,
"procLaunch" : "2022-07-30 12:28:46.6099 +0800",
"procRole" : "Foreground",
"version" : 2,
"userID" : 501,
"deployVersion" : 210,
"modelCode" : "MacBookPro18,1",
"procStartAbsTime" : 155477543631,
"coalitionID" : 4058,
"osVersion" : {
"train" : "macOS 12.5",
"build" : "21G72",
"releaseType" : "User"
},
"captureTime" : "2022-07-30 12:28:46.6656 +0800",
"incident" : "6F929B73-3F57-461A-BC03-F534D610C50E",
"bug_type" : "309",
"pid" : 20899,
"procExitAbsTime" : 155477977313,
"translated" : false,
"cpuType" : "ARM-64",
"procName" : "Runner",
"procPath" : "\/Users\/USER\/Library\/Developer\/CoreSimulator\/Devices\/911ED020-A317-4E0E-AA48-A2369DD9EED8\/data\/Containers\/Bundle\/Application\/CA725FC8-C3B4-4FC1-91DD-77DE7A74CC3F\/Runner.app\/Runner",
"bundleInfo" : {"CFBundleShortVersionString":"1.0.0","CFBundleVersion":"1.0.0","CFBundleIdentifier":"com.earth.dolphin"},
"storeInfo" : {"deviceIdentifierForVendor":"240CB839-BD26-57B4-8B0B-8DD4C99F160A","thirdParty":true},
"parentProc" : "launchd_sim",
"parentPid" : 17981,
"coalitionName" : "com.apple.CoreSimulator.SimDevice.911ED020-A317-4E0E-AA48-A2369DD9EED8",
"crashReporterKey" : "4B9AAD75-30E1-0E03-1197-562F10CD6CAA",
"responsiblePid" : 17866,
"responsibleProc" : "SimulatorTrampoline",
"sleepWakeUUID" : "FEBE014E-816D-4438-913C-962DA1859BCB",
"sip" : "enabled",
"isCorpse" : 1,
"exception" : {"codes":"0x0000000000000000, 0x0000000000000000","rawCodes":[0,0],"type":"EXC_CRASH","signal":"SIGABRT"},
"termination" : {"code":1,"flags":518,"namespace":"DYLD","indicator":"Library missing","details":["(terminated at launch; ignore backtrace)"],"reasons":["Library not loaded: #rpath\/Toast.framework\/Toast","Referenced from: \/Users\/USER\/Library\/Developer\/CoreSimulator\/Devices\/911ED020-A317-4E0E-AA48-A2369DD9EED8\/data\/Containers\/Bundle\/Application\/CA725FC8-C3B4-4FC1-91DD-77DE7A74CC3F\/Runner.app\/Runner","Reason: tried: '\/Applications\/Xcode.app\/Contents\/Developer\/Platforms\/iPhoneOS.platform\/Library\/Developer\/CoreSimulator\/Profiles\/Runtimes\/iOS.simruntime\/Contents\/Resources\/RuntimeRoot\/usr\/lib\/swift\/Toast.framework\/Toast' (no such file), '\/usr\/lib\/swift\/Toast.framework\/Toast' (no such file), '\/Users\/xiaoqiangjiang\/Library\/Developer\/CoreSimulator\/Devices\/911ED020-A317-4E0E-AA48-A2369DD9EED8\/data\/Containers\/Bundle\/Application\/CA725FC8-C3B4-4FC1-91DD-77DE7A74CC3F\/Runner.app\/Frameworks\/Toast.framework\/Toast' (no such file), '\/Users\/xiaoqiangjiang\/Library\/Developer\/CoreSimulator\/Devices\/911ED020-A317-4E0E-AA48-A2369DD9EED8\/data\/Containers\/Bundle\/Application\/CA725FC8-C3B4-4FC1-91DD-77DE7A74CC3F\/Runner.app\/Frameworks\/Toast.framework\/Toast' (no such file), '\/Users"]},
"extMods" : {"caller":{"thread_create":0,"thread_set_state":0,"task_for_pid":0},"system":{"thread_create":0,"thread_set_state":0,"task_for_pid":0},"targeted":{"thread_create":0,"thread_set_state":0,"task_for_pid":0},"warnings":0},
"faultingThread" : 0,
"threads" : [{"triggered":true,"id":134213,"threadState":{"x":[{"value":6},{"value":1},{"value":6100043680},{"value":238},{"value":6100042656},{"value":0},{"value":0},{"value":0},{"value":32},{"value":16},{"value":0},{"value":2340027244252129612},{"value":39},{"value":50},{"value":1293408},{"value":0},{"value":521},{"value":1039984},{"value":0},{"value":0},{"value":6100042656},{"value":238},{"value":6100043680},{"value":1},{"value":6},{"value":6100046088},{"value":4368302280,"symbolLocation":0,"symbol":"gProcessInfo"},{"value":0},{"value":6100045880}],"flavor":"ARM_THREAD_STATE64","lr":{"value":4369379364},"cpsr":{"value":4096},"fp":{"value":6100042592},"sp":{"value":6100042528},"esr":{"value":1442840704,"description":" Address size fault"},"pc":{"value":4369350296,"matchesCrashFrame":1},"far":{"value":4368515072}},"frames":[{"imageOffset":310936,"symbol":"__abort_with_payload","symbolLocation":8,"imageIndex":0},{"imageOffset":340004,"symbol":"abort_with_payload_wrapper_internal","symbolLocation":104,"imageIndex":0},{"imageOffset":340056,"symbol":"abort_with_payload","symbolLocation":16,"imageIndex":0},{"imageOffset":213276,"symbol":"abort_with_payload","symbolLocation":40,"imageIndex":1},{"imageOffset":21748,"symbol":"dyld4::halt(char const*)","symbolLocation":324,"imageIndex":1},{"imageOffset":6612,"symbol":"dyld4::prepare(dyld4::APIs&, dyld3::MachOAnalyzer const*)","symbolLocation":2468,"imageIndex":1},{"imageOffset":7156,"symbol":"_dyld_sim_prepare","symbolLocation":376,"imageIndex":1},{"imageOffset":25796,"symbol":"dyld4::prepareSim(dyld4::RuntimeState&, char const*)","symbolLocation":1052,"imageIndex":0},{"imageOffset":21108,"symbol":"dyld4::prepare(dyld4::APIs&, dyld3::MachOAnalyzer const*)","symbolLocation":248,"imageIndex":0},{"imageOffset":20588,"symbol":"start","symbolLocation":488,"imageIndex":0}]}],
"usedImages" : [
{
"source" : "P",
"arch" : "arm64e",
"base" : 4369039360,
"size" : 393216,
"uuid" : "75627683-a780-32ad-ae34-cf86dd23a26b",
"path" : "\/usr\/lib\/dyld",
"name" : "dyld"
},
{
"source" : "P",
"arch" : "arm64",
"base" : 4367974400,
"size" : 245760,
"uuid" : "67298116-bb18-3438-b22e-8d2b9d4618e9",
"path" : "\/Applications\/Xcode.app\/Contents\/Developer\/Platforms\/iPhoneOS.platform\/Library\/Developer\/CoreSimulator\/Profiles\/Runtimes\/iOS.simruntime\/Contents\/Resources\/RuntimeRoot\/usr\/lib\/dyld_sim",
"name" : "dyld_sim"
}
],
"vmSummary" : "ReadOnly portion of Libraries: Total=4912K resident=0K(0%) swapped_out_or_unallocated=4912K(100%)\nWritable regions: Total=10.0M written=0K(0%) resident=0K(0%) swapped_out=0K(0%) unallocated=10.0M(100%)\n\n VIRTUAL REGION \nREGION TYPE SIZE COUNT (non-coalesced) \n=========== ======= ======= \nSTACK GUARD 56.0M 1 \nStack 8176K 1 \nVM_ALLOCATE 16K 1 \n__DATA 112K 5 \n__DATA_CONST 384K 4 \n__LINKEDIT 1728K 5 \n__TEXT 3200K 4 \ndyld private memory 2048K 2 \n=========== ======= ======= \nTOTAL 71.3M 23 \n",
"legacyInfo" : {
"threadTriggered" : {
}
},
"trialInfo" : {
"rollouts" : [
{
"rolloutId" : "5fb4245a1bbfe8005e33a1e1",
"factorPackIds" : {
},
"deploymentId" : 240000015
},
{
"rolloutId" : "61af99aeda72d16a4beb7756",
"factorPackIds" : {
"SIRI_DIALOG_ASSETS" : "62b9afba7e9ada388efffaa0"
},
"deploymentId" : 240000271
}
],
"experiments" : [
]
},
"reportNotes" : [
"dyld_process_snapshot_get_shared_cache failed"
]
}
Model: MacBookPro18,1, BootROM 7459.141.1, proc 10:8:2 processors, 32 GB, SMC
Graphics: Apple M1 Pro, Apple M1 Pro, Built-In
Display: Color LCD, 3456 x 2234 Retina, Main, MirrorOff, Online
Display: dolphin’s MacBook Pro, 3840 x 2160 (2160p/4K UHD 1 - Ultra High Definition), MirrorOff
Memory Module: LPDDR5
AirPort: Wi-Fi, wl0: Apr 6 2022 05:55:54 version 20.90.45.0.8.7.118 FWID 01-e7138ff2
Bluetooth: Version (null), 0 services, 0 devices, 0 incoming serial ports
Network Service: Wi-Fi, AirPort, en0
USB Device: USB31Bus
USB Device: USB31Bus
USB Device: USB31Bus
Thunderbolt Bus: MacBook Pro, Apple Inc.
Thunderbolt Bus: MacBook Pro, Apple Inc.
Thunderbolt Bus: MacBook Pro, Apple Inc.
The flutter app start on iPhone XR emulator and suddenly exists. I did not change the project code recently, why did this happen? what should I do to fixed this problem? The android studio version is:
Android Studio Chipmunk | 2021.2.1 Patch 1
Build #AI-212.5712.43.2112.8609683, built on May 19, 2022
Runtime version: 11.0.12+0-b1504.28-7817840 aarch64
VM: OpenJDK 64-Bit Server VM by JetBrains s.r.o.
macOS 12.5
GC: G1 Young Generation, G1 Old Generation
Memory: 2280M
Cores: 10
Registry: external.system.auto.import.disabled=true
Non-Bundled Plugins: Dart (212.5744), org.moe.community (1.4.10), com.thoughtworks.gauge (212.4746.52), org.jetbrains.kotlin (212-1.7.10-release-333-AS5457.46), io.flutter (69.0.2)
Finally I found upgrade the ruby-macho version greater than 2.5.1 could fix this problem:
➜ ios git:(main) ✗ sudo gem install ruby-macho
Password:
Fetching ruby-macho-3.0.0.gem
Successfully installed ruby-macho-3.0.0
Parsing documentation for ruby-macho-3.0.0
Installing ri documentation for ruby-macho-3.0.0
Done installing documentation for ruby-macho after 0 seconds
1 gem installed
more information could fetch from here: https://github.com/flutter/flutter/issues/92896

Cmd+Q crash on SwiftUI MacOS Monterrey App

After distributing a SwiftUI App to some testers they report a crash when exiting the App with keyboard (CMD+Q). I have tried to replicate the same behavior but I am not able to reproduce it, even with the same OS version. It only crashes when exiting through command, if they go through menu -> Exit App it works fine. I have tried to create another menu item to exit and the result is the same, so apparently is something related to the command itself.
The App is distributed outside the Mac App Store with Developer ID and I have replicated the same behavior in another App I used to test some SwiftUI layouts. This App was stripped from every feature but a Hello World Swift UI View and it kept crashing.
Here is the stack trace:
-------------------------------------
Translated Report (Full Report Below)
-------------------------------------
Process: TBBT SwiftUI [32839]
Path: /private/var/folders/*/TBBT SwiftUI.app/Contents/MacOS/TBBT SwiftUI
Identifier: es.rodrigo.TBBT-SwiftUII
Version: 1.0 (1)
Code Type: ARM-64 (Native)
Parent Process: launchd [1]
User ID: 502
Date/Time: 2022-03-25 12:35:57.9606 +0100
OS Version: macOS 12.2.1 (21D62)
Report Version: 12
Anonymous UUID: B5863DFC-2F6F-8EEC-A27D-4C1EBA1A58CB
Time Awake Since Boot: 19000 seconds
System Integrity Protection: enabled
Crashed Thread: 0 Dispatch queue: com.apple.main-thread
Exception Type: EXC_BAD_ACCESS (SIGSEGV)
Exception Codes: KERN_INVALID_ADDRESS at 0x0000000000000010
Exception Codes: 0x0000000000000001, 0x0000000000000010
Exception Note: EXC_CORPSE_NOTIFY
Termination Reason: Namespace SIGNAL, Code 11 Segmentation fault: 11
Terminating Process: exc handler [32839]
VM Region Info: 0x10 is not in any region. Bytes before following region: 4338548720
REGION TYPE START - END [ VSIZE] PRT/MAX SHRMOD REGION DETAIL
UNUSED SPACE AT START
--->
__TEXT 102990000-102994000 [ 16K] r-x/r-x SM=COW .../TBBT SwiftUI
Application Specific Information:
objc_msgSend() selector name: copy
Thread 0 Crashed:: Dispatch queue: com.apple.main-thread
0 libobjc.A.dylib 0x1ab5a8320 objc_msgSend + 32
1 AppKit 0x1ae4f3960 -[NSMenu _populateFromSidebandUpdatersOfSign:withEventRef:] + 84
2 AppKit 0x1ae4f35a4 -[NSMenu _populateWithEventRef:] + 124
3 AppKit 0x1ae61ae94 -[NSCarbonMenuImpl _carbonPopulateEvent:handlerCallRef:] + 372
4 AppKit 0x1ae61ab70 NSSLMMenuEventHandler + 728
5 HIToolbox 0x1b4357418 DispatchEventToHandlers(EventTargetRec*, OpaqueEventRef*, HandlerCallRec*) + 1116
6 HIToolbox 0x1b4356884 SendEventToEventTargetInternal(OpaqueEventRef*, OpaqueEventTargetRef*, HandlerCallRec*) + 356
7 HIToolbox 0x1b4356714 SendEventToEventTargetWithOptions + 44
8 HIToolbox 0x1b43a8a64 SendMenuPopulate(MenuData*, OpaqueEventTargetRef*, unsigned int, double, unsigned int, OpaqueEventRef*, unsigned char, unsigned char*) + 356
9 HIToolbox 0x1b43a8804 PopulateMenu(MenuData*, OpaqueEventTargetRef*, CheckMenuData*, unsigned int, double) + 128
10 HIToolbox 0x1b43a7f34 Check1MenuForKeyEvent(MenuData*, CheckMenuData*) + 192
11 HIToolbox 0x1b43a7ac4 CheckMenusForKeyEvent(MenuData*, CheckMenuData*) + 576
12 HIToolbox 0x1b43a781c _IsMenuKeyEvent(MenuData*, OpaqueEventRef*, unsigned int, MenuData**, unsigned short*) + 656
13 HIToolbox 0x1b43a7554 IsMenuKeyEvent + 136
14 AppKit 0x1ae7d5fc8 +[NSCarbonMenuImpl _menuItemWithKeyEquivalentMatchingEventRef:inMenu:includingDisabledItems:] + 204
15 AppKit 0x1ae61a718 _NSFindMenuItemMatchingCommandKeyEvent + 208
16 AppKit 0x1ae635f24 -[NSMenu performKeyEquivalent:] + 376
17 AppKit 0x1aeaaa65c routeKeyEquivalent + 580
18 AppKit 0x1ae4abd30 -[NSApplication(NSEvent) sendEvent:] + 1176
19 AppKit 0x1ae765010 -[NSApplication _handleEvent:] + 76
20 AppKit 0x1ae32d9dc -[NSApplication run] + 636
21 AppKit 0x1ae2ff088 NSApplicationMain + 1064
22 SwiftUI 0x1d02494c4 specialized runApp(_:) + 148
23 SwiftUI 0x1d0d73a40 runApp<A>(_:) + 260
24 SwiftUI 0x1d0803658 static App.main() + 128
25 TBBT SwiftUI 0x102993534 static TBBT_SwiftUIApp.$main() + 24 (TBBT_SwiftUIApp.swift:10) [inlined]
26 TBBT SwiftUI 0x102993534 main + 36
27 dyld 0x102be90f4 start + 520
Thread 1:
0 libsystem_pthread.dylib 0x1ab718010 start_wqthread + 0
Thread 2:
0 libsystem_pthread.dylib 0x1ab718010 start_wqthread + 0
Thread 3:
0 libsystem_pthread.dylib 0x1ab718010 start_wqthread + 0
Thread 4:: com.apple.NSEventThread
0 libsystem_kernel.dylib 0x1ab6e1954 mach_msg_trap + 8
1 libsystem_kernel.dylib 0x1ab6e1d00 mach_msg + 76
2 CoreFoundation 0x1ab7e8ed8 __CFRunLoopServiceMachPort + 372
3 CoreFoundation 0x1ab7e7390 __CFRunLoopRun + 1212
4 CoreFoundation 0x1ab7e6734 CFRunLoopRunSpecific + 600
5 AppKit 0x1ae4a9fb0 _NSEventThread + 196
6 libsystem_pthread.dylib 0x1ab71d240 _pthread_start + 148
7 libsystem_pthread.dylib 0x1ab718024 thread_start + 8
Thread 5:
0 libsystem_pthread.dylib 0x1ab718010 start_wqthread + 0
Thread 0 crashed with ARM Thread State (64-bit):
x0: 0x00006000027400b4 x1: 0x00000001f5c92979 x2: 0x000000016d46e7a0 x3: 0x000000016d46e7e0
x4: 0x0000000000000010 x5: 0x0000000000000000 x6: 0x000000016d46dd94 x7: 0x000000016d46dd88
x8: 0x000060000323d080 x9: 0x0000000000000001 x10: 0x6ae16000027400b4 x11: 0x0000000000000004
x12: 0x00000000c3000002 x13: 0x0000000000000000 x14: 0x00000000c3000004 x15: 0x0000000000000000
x16: 0x0000000000000000 x17: 0x000000020614d138 x18: 0x0000000110033940 x19: 0x000060000274c8c0
x20: 0x00000001f5c92979 x21: 0x000060000274de80 x22: 0x0000000000000000 x23: 0x00003872f316d080
x24: 0x00000002048079fc x25: 0x0000000000000009 x26: 0x000000016d46ebc0 x27: 0x0000000000000001
x28: 0x0000000000000002 fp: 0x000000016d46ea90 lr: 0x00000001ae4f3960
sp: 0x000000016d46ea60 pc: 0x00000001ab5a8320 cpsr: 0x20001000
far: 0x0000000000000010 esr: 0x92000006 (Data Abort) byte read Translation fault
Binary Images:
0x1ab5a2000 - 0x1ab5ddfff libobjc.A.dylib (*) <2eb32e1d-90cb-3256-8681-9034085a06a6> /usr/lib/libobjc.A.dylib
0x1ae2fb000 - 0x1af1b1fff com.apple.AppKit (6.9) <8701760d-31b6-37eb-be77-ffb39921dd22> /System/Library/Frameworks/AppKit.framework/Versions/C/AppKit
0x1b434c000 - 0x1b467bfff com.apple.HIToolbox (2.1.1) <b5a3fe9a-833b-3697-ac9c-1e9e8eb11bac> /System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/HIToolbox.framework/Versions/A/HIToolbox
0x1d01b7000 - 0x1d119efff com.apple.SwiftUI (3.3.1) <b5f32ad6-34b1-31d5-bdb5-60ac30e963e6> /System/Library/Frameworks/SwiftUI.framework/Versions/A/SwiftUI
0x102990000 - 0x102993fff es.rodrigo.TBBT-SwiftUII (1.0) <0d402cc9-0796-39c6-b71d-9e9a1dbfd998> /private/var/folders/*/TBBT SwiftUI.app/Contents/MacOS/TBBT SwiftUI
0x102be4000 - 0x102c43fff dyld (*) <d21a73ea-79cd-36eb-8ac9-2c5cf5181a27> /usr/lib/dyld
0x1ab716000 - 0x1ab722fff libsystem_pthread.dylib (*) <f7b2eccf-e6f1-3109-ae81-9028c0b8332a> /usr/lib/system/libsystem_pthread.dylib
0x1ab6e0000 - 0x1ab715fff libsystem_kernel.dylib (*) <384945e6-dd71-37e5-9a3d-84fff14a1e60> /usr/lib/system/libsystem_kernel.dylib
0x1ab764000 - 0x1abca7fff com.apple.CoreFoundation (6.9) <35473de6-c433-332c-aee0-013fd5f6d4fd> /System/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundation
0x0 - 0xffffffffffffffff ??? (*) <00000000-0000-0000-0000-000000000000> ???
External Modification Summary:
Calls made by other processes targeting this process:
task_for_pid: 0
thread_create: 0
thread_set_state: 0
Calls made by this process:
task_for_pid: 0
thread_create: 0
thread_set_state: 0
Calls made by all processes on this machine:
task_for_pid: 21
thread_create: 1
thread_set_state: 760
VM Region Summary:
ReadOnly portion of Libraries: Total=997.9M resident=0K(0%) swapped_out_or_unallocated=997.9M(100%)
Writable regions: Total=1.6G written=0K(0%) resident=0K(0%) swapped_out=0K(0%) unallocated=1.6G(100%)
VIRTUAL REGION
REGION TYPE SIZE COUNT (non-coalesced)
=========== ======= =======
Accelerate framework 384K 3
Activity Tracing 256K 1
CG backing stores 2944K 8
CG image 96K 3
ColorSync 576K 25
CoreAnimation 256K 11
CoreGraphics 48K 3
CoreUI image data 1136K 8
Foundation 48K 2
Kernel Alloc Once 32K 1
MALLOC 305.8M 52
MALLOC guard page 192K 10
MALLOC_MEDIUM (reserved) 960.0M 8 reserved VM address space (unallocated)
MALLOC_NANO (reserved) 384.0M 1 reserved VM address space (unallocated)
STACK GUARD 56.1M 6
Stack 10.6M 6
VM_ALLOCATE 1.0G 15
__AUTH 2401K 250
__AUTH_CONST 17.9M 427
__DATA 11.5M 412
__DATA_CONST 15.1M 433
__DATA_DIRTY 1533K 163
__FONT_DATA 4K 1
__LINKEDIT 575.9M 4
__OBJC_CONST 2565K 201
__OBJC_RO 82.1M 1
__OBJC_RW 3104K 1
__TEXT 422.0M 449
__UNICODE 588K 1
dyld private memory 1024K 1
mapped file 158.7M 23
shared memory 992K 19
=========== ======= =======
TOTAL 3.9G 2549
TOTAL, minus reserved VM space 2.6G 2549
-----------
Full Report
-----------
{"app_name":"TBBT SwiftUI","timestamp":"2022-03-25 12:35:58.00 +0100","app_version":"1.0","slice_uuid":"0d402cc9-0796-39c6-b71d-9e9a1dbfd998","build_version":"1","platform":1,"bundleID":"es.rodrigo.TBBT-SwiftUII","share_with_app_devs":0,"is_first_party":0,"bug_type":"309","os_version":"macOS 12.2.1 (21D62)","incident_id":"829399C8-38C2-49C9-87F9-E011CF03D34A","name":"TBBT SwiftUI"}
{
"uptime" : 19000,
"procLaunch" : "2022-03-25 12:35:45.7386 +0100",
"procRole" : "Foreground",
"version" : 2,
"userID" : 502,
"deployVersion" : 210,
"modelCode" : "MacBookPro17,1",
"procStartAbsTime" : 462229239163,
"coalitionID" : 3069,
"osVersion" : {
"train" : "macOS 12.2.1",
"build" : "21D62",
"releaseType" : "User"
},
"captureTime" : "2022-03-25 12:35:57.9606 +0100",
"incident" : "829399C8-38C2-49C9-87F9-E011CF03D34A",
"bug_type" : "309",
"pid" : 32839,
"procExitAbsTime" : 462522162289,
"translated" : false,
"cpuType" : "ARM-64",
"procName" : "TBBT SwiftUI",
"procPath" : "\/private\/var\/folders\/*\/TBBT SwiftUI.app\/Contents\/MacOS\/TBBT SwiftUI",
"bundleInfo" : {"CFBundleShortVersionString":"1.0","CFBundleVersion":"1","CFBundleIdentifier":"es.rodrigo.TBBT-SwiftUII"},
"storeInfo" : {"deviceIdentifierForVendor":"AEE05FD5-64A2-50DC-989B-3C01A08912AB","thirdParty":true},
"parentProc" : "launchd",
"parentPid" : 1,
"coalitionName" : "es.rodrigo.TBBT-SwiftUII",
"crashReporterKey" : "B5863DFC-2F6F-8EEC-A27D-4C1EBA1A58CB",
"sip" : "enabled",
"vmRegionInfo" : "0x10 is not in any region. Bytes before following region: 4338548720\n REGION TYPE START - END [ VSIZE] PRT\/MAX SHRMOD REGION DETAIL\n UNUSED SPACE AT START\n---> \n __TEXT 102990000-102994000 [ 16K] r-x\/r-x SM=COW ...\/TBBT SwiftUI",
"isCorpse" : 1,
"exception" : {"codes":"0x0000000000000001, 0x0000000000000010","rawCodes":[1,16],"type":"EXC_BAD_ACCESS","signal":"SIGSEGV","subtype":"KERN_INVALID_ADDRESS at 0x0000000000000010"},
"termination" : {"flags":0,"code":11,"namespace":"SIGNAL","indicator":"Segmentation fault: 11","byProc":"exc handler","byPid":32839},
"vmregioninfo" : "0x10 is not in any region. Bytes before following region: 4338548720\n REGION TYPE START - END [ VSIZE] PRT\/MAX SHRMOD REGION DETAIL\n UNUSED SPACE AT START\n---> \n __TEXT 102990000-102994000 [ 16K] r-x\/r-x SM=COW ...\/TBBT SwiftUI",
"asi" : {"objc":["objc_msgSend() selector name: copy"]},
"extMods" : {"caller":{"thread_create":0,"thread_set_state":0,"task_for_pid":0},"system":{"thread_create":1,"thread_set_state":760,"task_for_pid":21},"targeted":{"thread_create":0,"thread_set_state":0,"task_for_pid":0},"warnings":0},
"faultingThread" : 0,
"threads" : [{"triggered":true,"id":254335,"threadState":{"x":[{"value":105553157423284},{"value":8418568569,"objc-selector":"copy"},{"value":6128330656},{"value":6128330720},{"value":16},{"value":0},{"value":6128328084},{"value":6128328072},{"value":105553168945280},{"value":1},{"value":7701542390937682100},{"value":4},{"value":3271557122},{"value":0},{"value":3271557124},{"value":0},{"value":0},{"value":8691962168},{"value":4563614016},{"value":105553157474496},{"value":8418568569,"objc-selector":"copy"},{"value":105553157480064},{"value":0},{"value":62066355785856},{"value":8665463292,"symbolLocation":4,"symbol":"_MergedGlobals"},{"value":9},{"value":6128331712},{"value":1},{"value":2}],"flavor":"ARM_THREAD_STATE64","lr":{"value":7219394912},"cpsr":{"value":536875008},"fp":{"value":6128331408},"sp":{"value":6128331360},"esr":{"value":2449473542,"description":"(Data Abort) byte read Translation fault"},"pc":{"value":7169803040,"matchesCrashFrame":1},"far":{"value":16}},"queue":"com.apple.main-thread","frames":[{"imageOffset":25376,"symbol":"objc_msgSend","symbolLocation":32,"imageIndex":0},{"imageOffset":2066784,"symbol":"-[NSMenu _populateFromSidebandUpdatersOfSign:withEventRef:]","symbolLocation":84,"imageIndex":1},{"imageOffset":2065828,"symbol":"-[NSMenu _populateWithEventRef:]","symbolLocation":124,"imageIndex":1},{"imageOffset":3276436,"symbol":"-[NSCarbonMenuImpl _carbonPopulateEvent:handlerCallRef:]","symbolLocation":372,"imageIndex":1},{"imageOffset":3275632,"symbol":"NSSLMMenuEventHandler","symbolLocation":728,"imageIndex":1},{"imageOffset":46104,"symbol":"DispatchEventToHandlers(EventTargetRec*, OpaqueEventRef*, HandlerCallRec*)","symbolLocation":1116,"imageIndex":2},{"imageOffset":43140,"symbol":"SendEventToEventTargetInternal(OpaqueEventRef*, OpaqueEventTargetRef*, HandlerCallRec*)","symbolLocation":356,"imageIndex":2},{"imageOffset":42772,"symbol":"SendEventToEventTargetWithOptions","symbolLocation":44,"imageIndex":2},{"imageOffset":379492,"symbol":"SendMenuPopulate(MenuData*, OpaqueEventTargetRef*, unsigned int, double, unsigned int, OpaqueEventRef*, unsigned char, unsigned char*)","symbolLocation":356,"imageIndex":2},{"imageOffset":378884,"symbol":"PopulateMenu(MenuData*, OpaqueEventTargetRef*, CheckMenuData*, unsigned int, double)","symbolLocation":128,"imageIndex":2},{"imageOffset":376628,"symbol":"Check1MenuForKeyEvent(MenuData*, CheckMenuData*)","symbolLocation":192,"imageIndex":2},{"imageOffset":375492,"symbol":"CheckMenusForKeyEvent(MenuData*, CheckMenuData*)","symbolLocation":576,"imageIndex":2},{"imageOffset":374812,"symbol":"_IsMenuKeyEvent(MenuData*, OpaqueEventRef*, unsigned int, MenuData**, unsigned short*)","symbolLocation":656,"imageIndex":2},{"imageOffset":374100,"symbol":"IsMenuKeyEvent","symbolLocation":136,"imageIndex":2},{"imageOffset":5091272,"symbol":"+[NSCarbonMenuImpl _menuItemWithKeyEquivalentMatchingEventRef:inMenu:includingDisabledItems:]","symbolLocation":204,"imageIndex":1},{"imageOffset":3274520,"symbol":"_NSFindMenuItemMatchingCommandKeyEvent","symbolLocation":208,"imageIndex":1},{"imageOffset":3387172,"symbol":"-[NSMenu performKeyEquivalent:]","symbolLocation":376,"imageIndex":1},{"imageOffset":8058460,"symbol":"routeKeyEquivalent","symbolLocation":580,"imageIndex":1},{"imageOffset":1772848,"symbol":"-[NSApplication(NSEvent) sendEvent:]","symbolLocation":1176,"imageIndex":1},{"imageOffset":4628496,"symbol":"-[NSApplication _handleEvent:]","symbolLocation":76,"imageIndex":1},{"imageOffset":207324,"symbol":"-[NSApplication run]","symbolLocation":636,"imageIndex":1},{"imageOffset":16520,"symbol":"NSApplicationMain","symbolLocation":1064,"imageIndex":1},{"imageOffset":599236,"symbol":"specialized runApp(_:)","symbolLocation":148,"imageIndex":3},{"imageOffset":12307008,"symbol":"runApp<A>(_:)","symbolLocation":260,"imageIndex":3},{"imageOffset":6604376,"symbol":"static App.main()","symbolLocation":128,"imageIndex":3},{"symbol":"static TBBT_SwiftUIApp.$main()","inline":true,"imageIndex":4,"imageOffset":13620,"symbolLocation":24,"sourceLine":10,"sourceFile":"TBBT_SwiftUIApp.swift"},{"imageOffset":13620,"sourceFile":"Demo.swift","symbol":"main","symbolLocation":36,"imageIndex":4},{"imageOffset":20724,"symbol":"start","symbolLocation":520,"imageIndex":5}]},{"id":254377,"frames":[{"imageOffset":8208,"symbol":"start_wqthread","symbolLocation":0,"imageIndex":6}]},{"id":254380,"frames":[{"imageOffset":8208,"symbol":"start_wqthread","symbolLocation":0,"imageIndex":6}]},{"id":254387,"frames":[{"imageOffset":8208,"symbol":"start_wqthread","symbolLocation":0,"imageIndex":6}]},{"id":254394,"name":"com.apple.NSEventThread","frames":[{"imageOffset":6484,"symbol":"mach_msg_trap","symbolLocation":8,"imageIndex":7},{"imageOffset":7424,"symbol":"mach_msg","symbolLocation":76,"imageIndex":7},{"imageOffset":544472,"symbol":"__CFRunLoopServiceMachPort","symbolLocation":372,"imageIndex":8},{"imageOffset":537488,"symbol":"__CFRunLoopRun","symbolLocation":1212,"imageIndex":8},{"imageOffset":534324,"symbol":"CFRunLoopRunSpecific","symbolLocation":600,"imageIndex":8},{"imageOffset":1765296,"symbol":"_NSEventThread","symbolLocation":196,"imageIndex":1},{"imageOffset":29248,"symbol":"_pthread_start","symbolLocation":148,"imageIndex":6},{"imageOffset":8228,"symbol":"thread_start","symbolLocation":8,"imageIndex":6}]},{"id":254531,"frames":[{"imageOffset":8208,"symbol":"start_wqthread","symbolLocation":0,"imageIndex":6}]}],
"usedImages" : [
{
"source" : "P",
"arch" : "arm64e",
"base" : 7169777664,
"size" : 245760,
"uuid" : "2eb32e1d-90cb-3256-8681-9034085a06a6",
"path" : "\/usr\/lib\/libobjc.A.dylib",
"name" : "libobjc.A.dylib"
},
{
"source" : "P",
"arch" : "arm64e",
"base" : 7217328128,
"CFBundleShortVersionString" : "6.9",
"CFBundleIdentifier" : "com.apple.AppKit",
"size" : 15429632,
"uuid" : "8701760d-31b6-37eb-be77-ffb39921dd22",
"path" : "\/System\/Library\/Frameworks\/AppKit.framework\/Versions\/C\/AppKit",
"name" : "AppKit",
"CFBundleVersion" : "2113.30.116"
},
{
"source" : "P",
"arch" : "arm64e",
"base" : 7318323200,
"CFBundleShortVersionString" : "2.1.1",
"CFBundleIdentifier" : "com.apple.HIToolbox",
"size" : 3342336,
"uuid" : "b5a3fe9a-833b-3697-ac9c-1e9e8eb11bac",
"path" : "\/System\/Library\/Frameworks\/Carbon.framework\/Versions\/A\/Frameworks\/HIToolbox.framework\/Versions\/A\/HIToolbox",
"name" : "HIToolbox"
},
{
"source" : "P",
"arch" : "arm64e",
"base" : 7786426368,
"CFBundleShortVersionString" : "3.3.1",
"CFBundleIdentifier" : "com.apple.SwiftUI",
"size" : 16678912,
"uuid" : "b5f32ad6-34b1-31d5-bdb5-60ac30e963e6",
"path" : "\/System\/Library\/Frameworks\/SwiftUI.framework\/Versions\/A\/SwiftUI",
"name" : "SwiftUI",
"CFBundleVersion" : "3.3.1"
},
{
"source" : "P",
"arch" : "arm64",
"base" : 4338548736,
"CFBundleShortVersionString" : "1.0",
"CFBundleIdentifier" : "es.rodrigo.TBBT-SwiftUII",
"size" : 16384,
"uuid" : "0d402cc9-0796-39c6-b71d-9e9a1dbfd998",
"path" : "\/private\/var\/folders\/*\/TBBT SwiftUI.app\/Contents\/MacOS\/TBBT SwiftUI",
"name" : "TBBT SwiftUI",
"CFBundleVersion" : "1"
},
{
"source" : "P",
"arch" : "arm64e",
"base" : 4340989952,
"size" : 393216,
"uuid" : "d21a73ea-79cd-36eb-8ac9-2c5cf5181a27",
"path" : "\/usr\/lib\/dyld",
"name" : "dyld"
},
{
"source" : "P",
"arch" : "arm64e",
"base" : 7171301376,
"size" : 53248,
"uuid" : "f7b2eccf-e6f1-3109-ae81-9028c0b8332a",
"path" : "\/usr\/lib\/system\/libsystem_pthread.dylib",
"name" : "libsystem_pthread.dylib"
},
{
"source" : "P",
"arch" : "arm64e",
"base" : 7171080192,
"size" : 221184,
"uuid" : "384945e6-dd71-37e5-9a3d-84fff14a1e60",
"path" : "\/usr\/lib\/system\/libsystem_kernel.dylib",
"name" : "libsystem_kernel.dylib"
},
{
"source" : "P",
"arch" : "arm64e",
"base" : 7171620864,
"CFBundleShortVersionString" : "6.9",
"CFBundleIdentifier" : "com.apple.CoreFoundation",
"size" : 5521408,
"uuid" : "35473de6-c433-332c-aee0-013fd5f6d4fd",
"path" : "\/System\/Library\/Frameworks\/CoreFoundation.framework\/Versions\/A\/CoreFoundation",
"name" : "CoreFoundation",
"CFBundleVersion" : "1856.107"
},
{
"size" : 0,
"source" : "A",
"base" : 0,
"uuid" : "00000000-0000-0000-0000-000000000000"
}
],
"sharedCache" : {
"base" : 7168131072,
"size" : 3091218432,
"uuid" : "296eb28e-6aeb-3129-8fa6-feb92261a4eb"
},
"vmSummary" : "ReadOnly portion of Libraries: Total=997.9M resident=0K(0%) swapped_out_or_unallocated=997.9M(100%)\nWritable regions: Total=1.6G written=0K(0%) resident=0K(0%) swapped_out=0K(0%) unallocated=1.6G(100%)\n\n VIRTUAL REGION \nREGION TYPE SIZE COUNT (non-coalesced) \n=========== ======= ======= \nAccelerate framework 384K 3 \nActivity Tracing 256K 1 \nCG backing stores 2944K 8 \nCG image 96K 3 \nColorSync 576K 25 \nCoreAnimation 256K 11 \nCoreGraphics 48K 3 \nCoreUI image data 1136K 8 \nFoundation 48K 2 \nKernel Alloc Once 32K 1 \nMALLOC 305.8M 52 \nMALLOC guard page 192K 10 \nMALLOC_MEDIUM (reserved) 960.0M 8 reserved VM address space (unallocated)\nMALLOC_NANO (reserved) 384.0M 1 reserved VM address space (unallocated)\nSTACK GUARD 56.1M 6 \nStack 10.6M 6 \nVM_ALLOCATE 1.0G 15 \n__AUTH 2401K 250 \n__AUTH_CONST 17.9M 427 \n__DATA 11.5M 412 \n__DATA_CONST 15.1M 433 \n__DATA_DIRTY 1533K 163 \n__FONT_DATA 4K 1 \n__LINKEDIT 575.9M 4 \n__OBJC_CONST 2565K 201 \n__OBJC_RO 82.1M 1 \n__OBJC_RW 3104K 1 \n__TEXT 422.0M 449 \n__UNICODE 588K 1 \ndyld private memory 1024K 1 \nmapped file 158.7M 23 \nshared memory 992K 19 \n=========== ======= ======= \nTOTAL 3.9G 2549 \nTOTAL, minus reserved VM space 2.6G 2549 \n",
"legacyInfo" : {
"threadTriggered" : {
"queue" : "com.apple.main-thread"
}
},
"trialInfo" : {
"rollouts" : [
{
"rolloutId" : "60da5e84ab0ca017dace9abf",
"factorPackIds" : {
},
"deploymentId" : 240000008
},
{
"rolloutId" : "607844aa04477260f58a8077",
"factorPackIds" : {
"SIRI_MORPHUN_ASSETS" : "6103050cbfe6dc472e1c982a"
},
"deploymentId" : 240000066
},
{
"rolloutId" : "602ad4dac86151000cf27e46",
"factorPackIds" : {
"SIRI_DICTATION_ASSETS" : "61fb0e87c773c43cde3bb80e"
},
"deploymentId" : 240000303
},
{
"rolloutId" : "5ffde50ce2aacd000d47a95f",
"factorPackIds" : {
},
"deploymentId" : 240000123
},
{
"rolloutId" : "601d9415f79519000ccd4b69",
"factorPackIds" : {
"SIRI_TEXT_TO_SPEECH" : "622657ce37186c771d5404ad"
},
"deploymentId" : 240000416
},
{
"rolloutId" : "5fc94383418129005b4e9ae0",
"factorPackIds" : {
},
"deploymentId" : 240000287
}
],
"experiments" : [
]
}
}

How to resolve code line from Mbed crash dump on Windows 10?

An Mbed code is throwing the crash dump below and I wish to find the line corresponding to the given PC. I'm on Windows though, so the simple "addr2line" is not available. I tried addr2line with Ubuntu shell on Windows, but it gives ??:?
What is the best tool on Windows 10 to perform address-to-line resolution from ARM ELF?
++ MbedOS Fault Handler ++
FaultType: HardFault
Context:
R0: 0
R1: 2000A0C8
R2: 1
R3: 14
R4: 20007854
R5: 2000A0
R6: 68
R7: 0
R8: 0
R9: 0
R10: 0
R11: 0
R12: 29FC1
SP : 2000A8B8
LR : 2C007
PC : 2000A0C8
xPSR : 0
PSP : 2000A898
MSP : 2003FFC0
CPUID: 410FC241
HFSR : 40000000
MMFSR: 0
BFSR : 0
UFSR : 2
DFSR : 0
AFSR : 0
Mode : Thread
Priv : Privileged
Stack: PSP
-- MbedOS Fault Handler --

Interpreting Section object in kernel dump

I'm trying to track down issues with a 3thParty application. The path currently being investigated is to look into a Section object that get's created in each process: rpsPdf10.mutex.
If the name of the object is any indication for it's intended usage, I'm not sure why they choose a Section object and use it as a Mutex but that's likely largely irrelevant.
Using LiveKd I've issued following command's trying to get detailed info of the Section object
0: kd>!process 0 0 3thParty.exe
...
PROCESS fffffa800ea80060
SessionId: 0 Cid: 0a00 Peb: fffdf000 ParentCid: 014c
DirBase: 99349000 ObjectTable: fffff8a004448bf0 HandleCount: 338.
Image: 3thParty.exe
...
0: kd> !handle 0 7 fffffa800ea80060
...
08 fffff8a012e26710 Section rpsPdf10.mutex
...
0: kd> !object fffff8a012e26710
Object: fffff8a012e26710 Type: (fffffa800cd7cea0) Section
ObjectHeader: fffff8a012e266e0 (new version)
HandleCount: 38 PointerCount: 39
Directory Object: fffff8a00a980080 Name: rpsPdf10.mutex
0: kd> dt nt!_FILE_OBJECT fffff8a012e26710
+0x000 Type : 0n256
+0x002 Size : 0n0
+0x008 DeviceObject : 0x000000000008dfb0 _DEVICE_OBJECT
+0x010 Vpb : 0xfffffa80c0000001 _VPB
+0x018 FsContext : (null)
+0x020 FsContext2 : 0xfffffa8000000034 Void
+0x028 SectionObjectPointer : 0xfffff8a0102d7820 _SECTION_OBJECT_POINTERS
+0x030 PrivateCacheMap : 0x0000000000001000 Void
+0x038 FinalStatus : 0n73728
+0x040 RelatedFileObject : 0x63536153030a040c _FILE_OBJECT
+0x048 LockOperation : 0x74 't'
+0x049 DeletePending : 0 ''
+0x04a ReadAccess : 0x65 'e'
+0x04b WriteAccess : 0 ''
+0x04c DeleteAccess : 0x73 's'
+0x04d SharedRead : 0 ''
+0x04e SharedWrite : 0x74 't'
The string 't' 'e' 's' 't' in the output definitely sticks out so
either I'm following a wrong path -> tx to Blabb, this is certain. It's not a fileobject but the question remains how to find out more information about the Section object. It's still curious and/or a rather unfortunate coincidence that following the section and control area pointers I derived from the fileobject info do seem correct?!
or there's something wrong with the Section object
or ... ?
tldr;
Following the _SECTION_OBJECT_POINTERS of the _FILE_OBJECT structure above, I arrive at a
NumberOfMappedViews of 0x26 (= HandleCount: 38)
NumberOfUserReferences of 0x27 (= PointerCount: 39)
so for the moment I assume the path I've followed is correct.
0: kd> dt nt!_SECTION_OBJECT_POINTERS 0xfffff8a0102d7820
+0x000 DataSectionObject : 0xfffffa800fbed900 Void
+0x008 SharedCacheMap : 0x0008000000000001 Void
+0x010 ImageSectionObject : 0x0000000000000001 Void
0: kd> dt nt!_CONTROL_AREA 0xfffffa800fbed900
+0x000 Segment : 0xfffff8a0102d7820 _SEGMENT
+0x008 DereferenceList : _LIST_ENTRY [ 0x0000000000000000 - 0x0000000000000000 ]
+0x018 NumberOfSectionReferences : 1
+0x020 NumberOfPfnReferences : 0
+0x028 NumberOfMappedViews : 0x26
+0x030 NumberOfUserReferences : 0x27
Edit
The object header looks like this
0: kd> dt nt!_OBJECT_HEADER fffff8a012e266e0
+0x000 PointerCount : 0n39
+0x008 HandleCount : 0n38
+0x008 NextToFree : 0x00000000`00000026 Void
+0x010 Lock : _EX_PUSH_LOCK
+0x018 TypeIndex : 0x21 '!'
+0x019 TraceFlags : 0 ''
+0x01a InfoMask : 0xa ''
+0x01b Flags : 0 ''
+0x020 ObjectCreateInfo : 0xfffffa80`0e505140 _OBJECT_CREATE_INFORMATION
+0x020 QuotaBlockCharged : 0xfffffa80`0e505140 Void
+0x028 SecurityDescriptor : 0xfffff8a0`1ba076a8 Void
+0x030 Body : _QUAD
Edit 2
following #blabb's answer adjusting for architecture
0: kd> ? #$proc
Evaluate expression: -6047068061600 = fffffa80`0ea80060
0: kd> dx (char *)#$proc->ImageFileName
(char *)#$proc->ImageFileName : 0xfffffa800ea80340 : [Type: char *] : "3thParty.exe"
0: kd> !handle 0 0 #$proc section
...
0474: Object: fffff8a012e26710 GrantedAccess: 000f0007
...
0: kd> !object fffff8a012e26710
Object: fffff8a012e26710 Type: (fffffa800cd7cea0) Section
ObjectHeader: fffff8a012e266e0 (new version)
HandleCount: 38 PointerCount: 39
Directory Object: fffff8a00a980080 Name: rpsPdf10.mutex
0: kd> ?? (unsigned long) (#FIELD_OFFSET(nt!_OBJECT_HEADER, Body))
unsigned long 0x30
0: kd> dt nt!_object_header 0xfffff8a012e26710-0x30
+0x000 PointerCount : 0n39
+0x008 HandleCount : 0n38
+0x008 NextToFree : 0x00000000`00000026 Void
+0x010 Lock : _EX_PUSH_LOCK
+0x018 TypeIndex : 0x21 '!'
+0x019 TraceFlags : 0 ''
+0x01a InfoMask : 0xa ''
+0x01b Flags : 0 ''
+0x020 ObjectCreateInfo : 0xfffffa80`0e505140 _OBJECT_CREATE_INFORMATION
+0x020 QuotaBlockCharged : 0xfffffa80`0e505140 Void
+0x028 SecurityDescriptor : 0xfffff8a0`1ba076a8 Void
+0x030 Body : _QUAD
0: kd> x nt!ObTypeIndexTable
fffff800`01a70c00 nt!ObTypeIndexTable = <no type information>
0: kd> dt -r1 nt!_SECTION_OBJECT 0xfffff8a012e26710
+0x000 StartingVa : 0x00000022`00000100 Void
+0x008 EndingVa : 0x00000000`0008dfb0 Void
+0x010 Parent : 0xfffffa80`c0000001 Void
+0x018 LeftChild : (null)
+0x020 RightChild : 0xfffffa80`00000034 Void
+0x028 Segment : 0xfffff8a0`102d7820 _SEGMENT_OBJECT
+0x000 BaseAddress : 0xfffffa80`0fbed900 Void
+0x008 TotalNumberOfPtes : 1
+0x010 SizeOfSegment : _LARGE_INTEGER 0x1
+0x018 NonExtendedPtes : 0x1000
+0x01c ImageCommitment : 0
+0x020 ControlArea : (null)
+0x028 Subsection : (null)
+0x030 MmSectionFlags : 0xfffffa80`10987b10 _MMSECTION_FLAGS
+0x038 MmSubSectionFlags : 0x00000000`03400000 _MMSUBSECTION_FLAGS
0: kd> dc 0xfffff8a012e26710-0x30-0x50
fffff8a0`12e26690 030c0408 f4636553 0e1a02e0 fffffa80 ....Sec.........
fffff8a0`12e266a0 00000048 000000b8 0000001c fffffa80 H...............
fffff8a0`12e266b0 0e505140 fffffa80 00000000 00000000 #QP.............
fffff8a0`12e266c0 0a980080 fffff8a0 001c001c 00000000 ................
fffff8a0`12e266d0 10eb8770 fffff8a0 00000000 00000008 p...............
fffff8a0`12e266e0 00000027 00000000 00000026 00000000 '.......&.......
fffff8a0`12e266f0 00000000 00000000 000a0021 fffff8a0 ........!.......
fffff8a0`12e26700 0e505140 fffffa80 1ba076a8 fffff8a0 #QP......v......
0: kd> !pool 0xfffff8a012e26710-0x30-0x50 2
Pool page fffff8a012e26690 region is Paged pool
*fffff8a012e26690 size: c0 previous size: 80 (Allocated) *Sect (Protected)
Pooltag Sect : Section objects
This is a 32 bit machine running windows 7
Commands used are architecture agnostic but pointer arithmetic are arch dependent
Current process
kd> ? #$proc
Evaluate expression: -2061895528 = 8519f898
Process Name From EPROCESS->ImageFileName
kd> dx (char *)#$proc->ImageFileName
(char *)#$proc->ImageFileName : 0xffffffff8519fa04 : "windbg.exe" [Type: char *]
lets Search For Some Section Handles in this process
the TypeName is CaseSensitive
kd> !handle 0 3 #$proc Section
Searching for handles of type Section
PROCESS 8519f898 SessionId: 1 Cid: 0138 Peb: 7ffd8000 ParentCid: 0d04
DirBase: 7e257560 ObjectTable: b91a3520 HandleCount: 254.
Image: windbg.exe
Handle table at b91a3520 with 254 entries in use
00c0: Object: 9a10bc58 GrantedAccess: 00000004 Entry: 9945b180
Object: 9a10bc58 Type: (84eb6040) Section
ObjectHeader: 9a10bc40 (new version)
HandleCount: 6 PointerCount: 6
!handle 0 3 flag dumps object specific information which can be reverified using !object {object address}
kd> !object 9a10bc58
Object: 9a10bc58 Type: (84eb6040) Section
ObjectHeader: 9a10bc40 (new version)
HandleCount: 6 PointerCount: 6
each object has an objectheader in 32 bit it is 18 bytes prior to object address that is sizeof(nt!_OBJECT_HEADER- sizeof(obheader->Body)) body is embedded in HEADER as the last member and is variable sized
kd> ?? (unsigned long ) (#FIELD_OFFSET(nt!_OBJECT_HEADER , Body))
unsigned long 0x18
_OBJECT_HEADER is as follows (though sizes haven't changed there are differences between new version header and old version header)
kd> dt nt!_object_header 9a10bc58-0x18
+0x000 PointerCount : 0n6
+0x004 HandleCount : 0n6
+0x004 NextToFree : 0x00000006 Void
+0x008 Lock : _EX_PUSH_LOCK
+0x00c TypeIndex : 0x21 '!'
+0x00d TraceFlags : 0 ''
+0x00e InfoMask : 0x8 ''
+0x00f Flags : 0 ''
+0x010 ObjectCreateInfo : 0x82f7aa00 _OBJECT_CREATE_INFORMATION
+0x010 QuotaBlockCharged : 0x82f7aa00 Void
+0x014 SecurityDescriptor : (null)
+0x018 Body : _QUAD
the old version header had _OBJECT_TYPE directly in the header
the new version is an index into an array
here the type index is 0x21
the array of Type is at
kd> x nt!ObTypeIndexTable
82f88580 nt!ObTypeIndexTable = <no type information>
you can write a script like this to dump all the types
function log(instr)
{
host.diagnostics.debugLog(instr + "\n");
}
function exec (cmdstr)
{
return host.namespace.Debugger.Utility.Control.ExecuteCommand(cmdstr);
}
function dumptypeindex()
{
var cpob = host.createPointerObject
var titab = exec("x nt!ObTypeIndexTable").First().substr(0,8)
var obtype = cpob(host.parseInt64(titab , 16),"nt","_OBJECT_TYPE **")
var i = 2
while(obtype[i] !=0 )
{
log("index = "+i+"\t"+ host.memory.readWideString(obtype[i].Name.Buffer))
i++
}
}
executing this script would yield the types as follows
kd> .scriptload c:\wdscr\dumptypeindex.js
JavaScript script successfully loaded from 'c:\dumptypeindex.js'
kd> dx #$scriptContents.dumptypeindex()
index = 2 Type
index = 3 Directory
index = 4 SymbolicLink
index = 5 Token
index = 6 Job
index = 7 Process
index = 8 Thread
index = 9 UserApcReserve
index = 10 IoCompletionReserve
index = 11 DebugObject
index = 12 Event
index = 13 EventPair
index = 14 Mutant
index = 15 Callback
index = 16 Semaphore
index = 17 Timer
index = 18 Profile
index = 19 KeyedEvent
index = 20 WindowStation
index = 21 Desktop
index = 22 TpWorkerFactory
index = 23 Adapter
index = 24 Controller
index = 25 Device
index = 26 Driver
index = 27 IoCompletion
index = 28 File
index = 29 TmTm
index = 30 TmTxȂ؃扏楄
index = 31 TmRm
index = 32 TmEn
index = 33 Section
index = 34 Session
index = 35 Key
index = 36 ALPC Port
index = 37 PowerRequest
index = 38 WmiGuid
index = 39 EtwRegistration
index = 40 EtwConsumer
index = 41 FilterConnectionPort
index = 42 FilterCommunicationPort
index = 43 PcwObject
notice 0x21 = 0n33 = Section
given that we have a Section
we can dump the Section Object
kd> dt -r1 nt!_SECTION_OBJECT 9a10bc58
+0x000 StartingVa : 0x90f87b44 Void
+0x004 EndingVa : 0x82efb58a Void
+0x008 Parent : 0xc0802000 Void
+0x00c LeftChild : (null)
+0x010 RightChild : 0xc0c0a280 Void
+0x014 Segment : 0x995ed8d8 _SEGMENT_OBJECT
+0x000 BaseAddress : 0x86b65740 Void
+0x004 TotalNumberOfPtes : 0xdf
+0x008 SizeOfSegment : _LARGE_INTEGER 0x000000df`00080000
+0x010 NonExtendedPtes : 0xdf000
+0x014 ImageCommitment : 0
+0x018 ControlArea : (null)
+0x01c Subsection : (null)
+0x020 MmSectionFlags : 0x869f52a8 _MMSECTION_FLAGS
+0x024 MmSubSectionFlags : 0x02ea0000 _MMSUBSECTION_FLAGS
an object is preceded by object header which is preceded by the pool_header
kd> dc 9a10bc58-0x18-0x18
9a10bc28 060b0204 f4636553 00000720 00000070 ....Sec. ...p...
9a10bc38 00000000 00000000 00000006 00000006 ................
9a10bc48 00000000 00080021 82f7aa00 00000000 ....!...........
9a10bc58 90f87b44 82efb58a c0802000 00000000 D{....... ......
9a10bc68 c0c0a280 995ed8d8 000df000 00000000 ......^.........
9a10bc78 00012000 00000004 0670020b 6666744e . ........p.Ntff
9a10bc88 00f00702 00000a48 0000c0fe 00020000 ....H...........
9a10bc98 00000000 00000002 00000000 00000000 ................
notice the Sec tag Sect is used by SectionObjects
d> !pool 9a10bc58-0x18-0x18 2
Pool page 9a10bc28 region is Paged pool
*9a10bc28 size: 58 previous size: 20 (Allocated) *Sect (Protected)
Pooltag Sect : Section objects

Dump All VAD of a process in Windows

I wanna get some memory dump of a specific process.
I've found each windows process contain VadRoot in a EPROCESS.
I used windbg to get some information of this structure...
kd> dt nt!_MMVAD fffffa801b7011d0
+0x000 u1 : <unnamed-tag>
+0x008 LeftChild : (null)
+0x010 RightChild : (null)
+0x018 StartingVpn : 0x7fefe440
+0x020 EndingVpn : 0x7fefe4b0
+0x028 u : <unnamed-tag>
+0x030 PushLock : _EX_PUSH_LOCK
+0x038 u5 : <unnamed-tag>
+0x040 u2 : <unnamed-tag>
+0x048 Subsection : 0xfffffa80`19f62640 _SUBSECTION
+0x048 MappedSubsection : 0xfffffa80`19f62640 _MSUBSECTION
+0x050 FirstPrototypePte : 0xfffff8a0`00b3ac28 _MMPTE
+0x058 LastContiguousPte : 0xffffffff`fffffffc _MMPTE
+0x060 ViewLinks : _LIST_ENTRY [ 0xfffffa80`1b7a38c0 - 0xfffffa80`1aa6d6a0 ]
+0x070 VadsProcess : 0xfffffa80`1b7e8941 _EPROCESS
Its Win7 64bit.
I guess StartingVpn: 0x7fefe440 has contain the memory contents of this block.
But is that a virtual address? or physical address? i don't know
what it stands for...
Thanks.
locate process
lkd> !process 0 0 explorer.exe
PROCESS 8a1908d0 ...... Image: explorer.exe
set process context
lkd> .process /p /r 8a1908d0
view reqd module
lkd> lm m explorer
start end module name
01000000 010ff000 Explorer (deferred)
get the vadroot for a virtual address in the current process context
lkd> !vad explorer 1
VAD # 8a120ed0
Start VPN 1000 End VPN 10fe Control Area 8a81ab80
FirstProtoPte e23e9048 LastPte fffffffc Commit Charge 3 (3.)
Secured.Flink 0 Blink 0 Banked/Extend 0
File Offset 0
ImageMap ViewShare EXECUTE_WRITECOPY
ReadOnly
ControlArea # 8a81ab80
Segment e23e9008 Flink 00000000 Blink 00000000
Section Ref 1 Pfn Ref 4d Mapped Views 1
User Ref 2 WaitForDel 0 Flush Count 0
File Object 8ab28240 ModWriteCount 0 System Views 0
Flags (90000a0) Image File HadUserReference Accessed
\WINDOWS\explorer.exe
Segment # e23e9008
ControlArea 8a81ab80 BasedAddress 01000000
Total Ptes ff
WriteUserRef 0 SizeOfSegment ff000
Committed 0 PTE Template 8a81ac3000000420
Based Addr 1000000 Image Base 0
Image Commit 2 Image Info e23e9840
ProtoPtes e23e9048
Reload command: .reload explorer.exe=01000000,ff000
dump all the vads for a current process context
lkd> !vad 8a120ed0 0
VAD level start end commit
8a03b1d8 ( 3) e50 e51 0 Mapped READONLY Pagefile-backed section
8a6fe240 ( 4) e60 e6f 0 Mapped READWRITE Pagefile-backed section
................................
89c86600 ( 5) ff0 ff0 1 Private READWRITE
8a120ed0 ( 0) 1000 10fe 3 Mapped Exe EXECUTE_WRITECOPY \WINDOWS\explorer.exe
.................................
8a87bb18 ( 7) 26d0 2733 0 Mapped READWRITE \Documents and Settings\Admin\Local Settings\History\History.IE5\index.dat
8a74b420 ( 0) 3e1c0 3ec52 10 Mapped Exe EXECUTE_WRITECOPY \WINDOWS\system32\ieframe.dll
8abfa398 ( 1) 7ffde 7ffde 1 Private READWRITE
Total VADs: 1231, average level: 5, maximum depth: 4294967295
VAD is short for virtual address descriptor and VPN is short for virtual page number. So it's a virtual address, not a physical address.
It needs to be translated to a physical address using PTEs (page table entry).
Given a user mode address I found with a user mode debugging session:
0:032> !address
[...]
+ 7ff`fffdc000 7ff`fffde000 0`00002000 MEM_PRIVATE MEM_COMMIT PAGE_READWRITE TEB [~1; 13ec.10fc]
0:032> dd 7ff`fffde000 L8
000007ff`fffde000 00000000 00000000 00240000 00000000
000007ff`fffde010 0022b000 00000000 00000000 00000000
I can do this in a kernel debugging session using LiveKd (SysInternals):
0: kd> !process 0 0 explorer.exe
PROCESS fffffa8012ce5b10
SessionId: 1 Cid: 13ec Peb: 7fffffd6000 ParentCid: 13c0
DirBase: 3029e8000 ObjectTable: fffff8a006139d60 HandleCount: 1078.
Image: explorer.exe
0: kd> .process /p /r fffffa8012ce5b10
Implicit process is now fffffa80`12ce5b10
Loading User Symbols
[...]
0: kd> !vtop 0 7fffffde000
Amd64VtoP: Virt 000007ff`fffde000, pagedir 00000003`029e8000
Amd64VtoP: PML4E 00000003`029e8078
Amd64VtoP: PDPE 00000003`00ebcff8
Amd64VtoP: PDE 00000003`0203dff8
Amd64VtoP: PTE 00000003`01ebeef0
Amd64VtoP: Mapped phys 00000002`ff44f000
Virtual address 7fffffde000 translates to physical address 2ff44f000.
0: kd> dd /p 2ff44f000 L8
00000002`ff44f000 00000000 00000000 00240000 00000000
00000002`ff44f010 0022b000 00000000 00000000 00000000
Note how the content of the virtual address (dd) is identical to the physical address (dd /p).

Resources