1 | Welcome to kernel debugger output!
|
---|
2 | Haiku revision: hrevr1alpha4-44702
|
---|
3 | CPU 0: type 0 family 6 extended_family 0 model 10 extended_model 2 stepping 7, string 'GenuineIntel'
|
---|
4 | CPU 0: vendor 'Intel' model name 'Intel(R) Core(TM) i3-2350M CPU @ 2.30GHz'
|
---|
5 | CPU 0: features: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clfsh ds mmx fxsr sse sse2 ss sse3 pclmulqdq vmx ssse3 cx16 pcid sse4_1 sse4_2 x2apic popcnt xsave avx hypervisor dts arat pln ecmd ptm aperfmperf epb
|
---|
6 | reserve_io_interrupt_vectors: reserved 16 vectors starting from 0
|
---|
7 | reserve_io_interrupt_vectors: reserved 2 vectors starting from 98
|
---|
8 | using 32 bit paging (PAE not needed)
|
---|
9 | mark_page_range_in_use(0x0, 0x100): start page is before free list
|
---|
10 | mark_page_range_in_use(0x0, 0xa0): start page is before free list
|
---|
11 | add_memory_type_range(4, 0x0, 0xa0000, 6)
|
---|
12 | add_memory_type_range(5, 0xe0000, 0x20000, 6)
|
---|
13 | add_memory_type_range(84, 0xd0000000, 0x300000, 0)
|
---|
14 | PANIC: could not read block 327778: bytesRead: -1, error: Invalid Argument
|
---|
15 |
|
---|
16 | Welcome to Kernel Debugging Land...
|
---|
17 | Thread 419 "add poses" running on CPU 1
|
---|
18 | stack trace for thread 419 "add poses"
|
---|
19 | kernel stack: 0x807ac000 to 0x807b0000
|
---|
20 | user stack: 0x7817a000 to 0x781ba000
|
---|
21 | frame caller <image>:function + offset
|
---|
22 | 0 807afad8 (+ 32) 8012599a <kernel_x86>:arch_debug_stack_trace + 0x0012
|
---|
23 | 1 807afaf8 (+ 16) 80091e8f <kernel_x86> stack_trace_trampoline(NULL) + 0x000b
|
---|
24 | 2 807afb08 (+ 12) 8012ae06 <kernel_x86>:arch_debug_call_with_fault_handler + 0x001b
|
---|
25 | 3 807afb14 (+ 48) 8009391e <kernel_x86>:debug_call_with_fault_handler + 0x005e
|
---|
26 | 4 807afb44 (+ 64) 800920af <kernel_x86> kernel_debugger_loop([34m0x8016f7d7[0m [36m"PANIC: "[0m, [34m0x80149020[0m [36m"could not read block %Ld: bytesRead: %ld, error: %s
|
---|
27 | "[0m, [34m0x807afbf0[0m [36m"b"[0m, int32: [34m1[0m) + 0x021b
|
---|
28 | 5 807afb84 (+ 48) 80092413 <kernel_x86> kernel_debugger_internal([34m0x8016f7d7[0m [36m"PANIC: "[0m, [34m0x80149020[0m [36m"could not read block %Ld: bytesRead: %ld, error: %s
|
---|
29 | "[0m, [34m0x807afbf0[0m [36m"b"[0m, int32: [34m1[0m) + 0x0053
|
---|
30 | 6 807afbb4 (+ 48) 80093c98 <kernel_x86>:panic + 0x0024
|
---|
31 | 7 807afbe4 (+ 112) 80047730 <kernel_x86> get_cached_block(block_cache*: [34m0xd801df10[0m, int64: [34m327778[0m, [34m0x807afc9b[0m, [34mtrue[0m) + 0x0264
|
---|
32 | 8 807afc54 (+ 80) 8004b436 <kernel_x86>:block_cache_get_etc + 0x004e
|
---|
33 | 9 807afca4 (+ 48) 8004b4e8 <kernel_x86>:block_cache_get + 0x0020
|
---|
34 | 10 807afcd4 (+ 352) 81caa255 <iso9660> ISOReadDirEnt(iso9660_volume*: [34m0xcf10c808[0m, dircookie*: [34m0xd8020a98[0m, dirent*: [34m0xd8d7c000[0m, uint32: [34m0x2800[0m ([34m10240[0m)) + 0x00dd
|
---|
35 | 11 807afe34 (+ 48) 81cac038 <iso9660> fs_read_dir(fs_volume*: [34m0xd8020d98[0m, fs_vnode*: [34m0xd8070158[0m, [34m0xd8020a98[0m, dirent*: [34m0xd8d7c000[0m, uint32: [34m0x2800[0m ([34m10240[0m), [34m0x807aff30[0m) + 0x0030
|
---|
36 | 12 807afe64 (+ 64) 800dff1f <kernel_x86> dir_read(io_context*: [34m0xcf1e2108[0m, vnode*: [34m0xd8070158[0m, [34m0xd8020a98[0m, dirent*: [34m0xd8d7c000[0m, uint32: [34m0x2800[0m ([34m10240[0m), [34m0x807aff30[0m) + 0x004b
|
---|
37 | 13 807afea4 (+ 64) 800dfd37 <kernel_x86> dir_read(io_context*: [34m0xcf1e2108[0m, file_descriptor*: [34m0xd80674f0[0m, dirent*: [34m0xd8d7c000[0m, uint32: [34m0x2800[0m ([34m10240[0m), [34m0x807aff30[0m) + 0x002b
|
---|
38 | 14 807afee4 (+ 96) 800cbddf <kernel_x86>:_user_read_dir + 0x012b
|
---|
39 | 15 807aff44 (+ 100) 8012c070 <kernel_x86>:handle_syscall + 0x00cd
|
---|
40 | user iframe at 0x807affa8 (end = 0x807b0000)
|
---|
41 | eax 0x8f ebx 0x4ec914 ecx 0x781b9a10 edx 0xffff0114
|
---|
42 | esi 0x181b5700 edi 0x1812cd40 ebp 0x781b9a3c esp 0x807affdc
|
---|
43 | eip 0xffff0114 eflags 0x3246 user esp 0x781b9a10
|
---|
44 | vector: 0x63, error code: 0x0
|
---|
45 | 16 807affa8 (+ 0) ffff0114 <commpage>:commpage_syscall + 0x0004
|
---|
46 | 17 781b9a3c (+ 48) 005c6208 <libtracker.so> BPrivate::CachedEntryIterator<[32m0x1812cd10[0m>::GetNextDirents(dirent*: [34m0x781b9b68[0m, uint32: [34m0x400[0m ([34m1024[0m), int32: [34m1[0m) + 0x0078
|
---|
47 | 18 781b9a6c (+1344) 0062d192 <libtracker.so> BPrivate::BPoseView<[32m0x1810e888[0m>::AddPosesTask(NULL) + 0x036a
|
---|
48 | 19 781b9fac (+ 48) 007206e3 <libroot.so>:_get_next_team_info (nearest) + 0x005f
|
---|
49 | 20 781b9fdc (+ 0) 781b9fec 15535:add poses_419_stack@0x7817a000 + 0x3ffec
|
---|
50 | kdebug> bt
|
---|
51 | stack trace for thread 419 "add poses"
|
---|
52 | kernel stack: 0x807ac000 to 0x807b0000
|
---|
53 | user stack: 0x7817a000 to 0x781ba000
|
---|
54 | frame caller <image>:function + offset
|
---|
55 | 0 807af8c8 (+ 48) 80094988 <kernel_x86> invoke_command_trampoline([34m0x807af960[0m) + 0x001c
|
---|
56 | 1 807af8f8 (+ 12) 8012ae06 <kernel_x86>:arch_debug_call_with_fault_handler + 0x001b
|
---|
57 | 2 807af904 (+ 48) 8009391e <kernel_x86>:debug_call_with_fault_handler + 0x005e
|
---|
58 | 3 807af934 (+ 64) 80094be1 <kernel_x86>:invoke_debugger_command + 0x00b9
|
---|
59 | 4 807af974 (+ 64) 80094a0d <kernel_x86> invoke_pipe_segment(debugger_command_pipe*: [34m0xcce38030[0m, int32: [34m0[0m, [34m0x0[0m [31m"<NULL>"[0m) + 0x0079
|
---|
60 | 5 807af9b4 (+ 64) 80094d4c <kernel_x86>:invoke_debugger_command_pipe + 0x009c
|
---|
61 | 6 807af9f4 (+ 48) 800969d4 <kernel_x86> ExpressionParser<[32m0x807afaa4[0m>::_ParseCommandPipe([34m0x807afaa0[0m) + 0x0234
|
---|
62 | 7 807afa24 (+ 64) 80095bf4 <kernel_x86> ExpressionParser<[32m0x807afaa4[0m>::EvaluateCommand([34m0x8019ef60[0m [36m"bt"[0m, [34m0x807afaa0[0m) + 0x02d0
|
---|
63 | 8 807afa64 (+ 224) 80098020 <kernel_x86>:evaluate_debug_command + 0x0080
|
---|
64 | 9 807afb44 (+ 64) 800921be <kernel_x86> kernel_debugger_loop([34m0x8016f7d7[0m [36m"PANIC: "[0m, [34m0x80149020[0m [36m"could not read block %Ld: bytesRead: %ld, error: %s
|
---|
65 | "[0m, [34m0x807afbf0[0m [36m"b"[0m, int32: [34m1[0m) + 0x032a
|
---|
66 | 10 807afb84 (+ 48) 80092413 <kernel_x86> kernel_debugger_internal([34m0x8016f7d7[0m [36m"PANIC: "[0m, [34m0x80149020[0m [36m"could not read block %Ld: bytesRead: %ld, error: %s
|
---|
67 | "[0m, [34m0x807afbf0[0m [36m"b"[0m, int32: [34m1[0m) + 0x0053
|
---|
68 | 11 807afbb4 (+ 48) 80093c98 <kernel_x86>:panic + 0x0024
|
---|
69 | 12 807afbe4 (+ 112) 80047730 <kernel_x86> get_cached_block(block_cache*: [34m0xd801df10[0m, int64: [34m327778[0m, [34m0x807afc9b[0m, [34mtrue[0m) + 0x0264
|
---|
70 | 13 807afc54 (+ 80) 8004b436 <kernel_x86>:block_cache_get_etc + 0x004e
|
---|
71 | 14 807afca4 (+ 48) 8004b4e8 <kernel_x86>:block_cache_get + 0x0020
|
---|
72 | 15 807afcd4 (+ 352) 81caa255 <iso9660> ISOReadDirEnt(iso9660_volume*: [34m0xcf10c808[0m, dircookie*: [34m0xd8020a98[0m, dirent*: [34m0xd8d7c000[0m, uint32: [34m0x2800[0m ([34m10240[0m)) + 0x00dd
|
---|
73 | 16 807afe34 (+ 48) 81cac038 <iso9660> fs_read_dir(fs_volume*: [34m0xd8020d98[0m, fs_vnode*: [34m0xd8070158[0m, [34m0xd8020a98[0m, dirent*: [34m0xd8d7c000[0m, uint32: [34m0x2800[0m ([34m10240[0m), [34m0x807aff30[0m) + 0x0030
|
---|
74 | 17 807afe64 (+ 64) 800dff1f <kernel_x86> dir_read(io_context*: [34m0xcf1e2108[0m, vnode*: [34m0xd8070158[0m, [34m0xd8020a98[0m, dirent*: [34m0xd8d7c000[0m, uint32: [34m0x2800[0m ([34m10240[0m), [34m0x807aff30[0m) + 0x004b
|
---|
75 | 18 807afea4 (+ 64) 800dfd37 <kernel_x86> dir_read(io_context*: [34m0xcf1e2108[0m, file_descriptor*: [34m0xd80674f0[0m, dirent*: [34m0xd8d7c000[0m, uint32: [34m0x2800[0m ([34m10240[0m), [34m0x807aff30[0m) + 0x002b
|
---|
76 | 19 807afee4 (+ 96) 800cbddf <kernel_x86>:_user_read_dir + 0x012b
|
---|
77 | 20 807aff44 (+ 100) 8012c070 <kernel_x86>:handle_syscall + 0x00cd
|
---|
78 | user iframe at 0x807affa8 (end = 0x807b0000)
|
---|
79 | eax 0x8f ebx 0x4ec914 ecx 0x781b9a10 edx 0xffff0114
|
---|
80 | esi 0x181b5700 edi 0x1812cd40 ebp 0x781b9a3c esp 0x807affdc
|
---|
81 | eip 0xffff0114 eflags 0x3246 user esp 0x781b9a10
|
---|
82 | vector: 0x63, error code: 0x0
|
---|
83 | 21 807affa8 (+ 0) ffff0114 <commpage>:commpage_syscall + 0x0004
|
---|
84 | 22 781b9a3c (+ 48) 005c6208 <libtracker.so> BPrivate::CachedEntryIterator<[32m0x1812cd10[0m>::GetNextDirents(dirent*: [34m0x781b9b68[0m, uint32: [34m0x400[0m ([34m1024[0m), int32: [34m1[0m) + 0x0078
|
---|
85 | 23 781b9a6c (+1344) 0062d192 <libtracker.so> BPrivate::BPoseView<[32m0x1810e888[0m>::AddPosesTask(NULL) + 0x036a
|
---|
86 | 24 781b9fac (+ 48) 007206e3 <libroot.so>:_get_next_team_info (nearest) + 0x005f
|
---|
87 | 25 781b9fdc (+ 0) 781b9fec 15535:add poses_419_stack@0x7817a000 + 0x3ffec
|
---|
88 | kdebug>
|
---|