On Tue, 2011-05-10 at 01:54 +0200, Samuel Thibault wrote: > The simplest backtrace to analyze would probably be in the "illegal > instruction" case. Also, > > thread apply all info register > > would be helpful too :)
Pasted in below, good luck! Thread 5 (Thread 21895.5): eax 0x10004005 268451845 ecx 0x17fdc54 25156692 edx 0x1000 4096 ebx 0x126fff4 19333108 esp 0x17fdec8 0x17fdec8 ebp 0x17fdefc 0x17fdefc esi 0x77 119 edi 0x0 0 eip 0x10fef4c 0x10fef4c <mach_msg_trap+12> eflags 0x202 [ IF ] cs 0x17 23 ss 0x1f 31 ds 0x1f 31 es 0x1f 31 fs 0x1f 31 gs 0x4b 75 Thread 4 (Thread 21895.4): eax 0x3 3 ecx 0xfffffc00 -1024 edx 0xfffffc00 -1024 ebx 0xffffffff -1 esp 0x15f9510 0x15f9510 ebp 0x15f9568 0x15f9568 esi 0xfb 251 edi 0x9 9 eip 0x8150529 0x8150529 <mark_object+1438> eflags 0x10286 [ PF SF IF RF ] cs 0x17 23 ss 0x1f 31 ds 0x1f 31 es 0x1f 31 fs 0x1f 31 gs 0x4b 75