Ticket #14400: iprowifi2200_panic_long.log

File iprowifi2200_panic_long.log, 98.0 KB (added by halamix2, 14 months ago)
Line 
1sis19x:07.17.763:init_hardware::SiS19X:init_hardware()
2[iprowifi2200] (iwi) bus_alloc_resource(3, [16], 0x0, 0xffffffff, 0x1,0x2)
3add_memory_type_range(8966, 0xb0204000, 0x20000, 0)
4set MTRRs to:
5 mtrr: 0: base: 0x3f680000, size: 0x80000, type: 0
6 mtrr: 1: base: 0x80000000, size: 0x40000000, type: 0
7 mtrr: 2: base: 0xe0000000, size: 0x20000000, type: 0
8 mtrr: 3: base: 0x80000000, size: 0x80000000, type: 1
9[iprowifi2200] (iwi) bus_alloc_resource(1, [0], 0x0, 0xffffffff, 0x1,0x6)
10ieee80211_sysctl_attach not implemented, yet.
11: [iprowifi2200] 11b rates: 1Mbps 2Mbps 5.5Mbps 11Mbps
12: [iprowifi2200] 11g rates: 1Mbps 2Mbps 5.5Mbps 11Mbps 6Mbps 9Mbps 12Mbps 18Mbps 24Mbps 36Mbps 48Mbps 54Mbps
13[iprowifi2200] (iwi) could not load firmware
14PANIC: cache destroy: still has full slabs
15Welcome to Kernel Debugging Land...
16Thread 264 "net_server" running on CPU 0
17stack trace for thread 264 "net_server"
18 kernel stack: 0x81e49000 to 0x81e4d000
19 user stack: 0x705d3000 to 0x715d3000
20frame caller <image>:function + offset
21 0 81e4c928 (+ 32) 8015065e <kernel_x86> arch_debug_stack_trace + 0x12
22 1 81e4c948 (+ 16) 800aab33 <kernel_x86> stack_trace_trampoline(NULL) + 0x0b
23 2 81e4c958 (+ 12) 80141df2 <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
24 3 81e4c964 (+ 48) 800ac65b <kernel_x86> debug_call_with_fault_handler + 0x5b
25 4 81e4c994 (+ 64) 800aad4f <kernel_x86> kernel_debugger_loop(0x80194d17 "PANIC: ", 0x801a9740 "cache destroy: still has full slabs", 0x81e4ca40 "", int32: 0) + 0x217
26 5 81e4c9d4 (+ 48) 800ab0cb <kernel_x86> kernel_debugger_internal(0x80194d17 "PANIC: ", 0x801a9740 "cache destroy: still has full slabs", 0x81e4ca40 "", int32: 0) + 0x53
27 6 81e4ca04 (+ 48) 800ac9e6 <kernel_x86> panic + 0x3a
28 7 81e4ca34 (+ 48) 8011b1b5 <kernel_x86> delete_object_cache_internal(ObjectCache*: 0x83008400) + 0x4d
29 8 81e4ca64 (+ 64) 8011c243 <kernel_x86> delete_object_cache + 0x247
30 9 81e4caa4 (+ 48) 81bb2706 </boot/system/add-ons/kernel/drivers/dev/net/iprowifi2200> uninit_mbufs + 0x22
3110 81e4cad4 (+ 64) 81ba8d00 </boot/system/add-ons/kernel/drivers/dev/net/iprowifi2200> _fbsd_init_drivers + 0x260
3211 81e4cb14 (+ 48) 81b6fd95 </boot/system/add-ons/kernel/drivers/dev/net/iprowifi2200> __haiku_handle_fbsd_drivers_list + 0x31
3312 81e4cb44 (+ 48) 81b6fdea </boot/system/add-ons/kernel/drivers/dev/net/iprowifi2200> init_driver + 0x22
3413 81e4cb74 (+ 48) 800c924d <kernel_x86> load_driver(_GLOBAL_.N._var_lib_buildbot_workers_haiku_haiku_src_system_kernel_device_manager_legacy_drivers.cppMIWXlc::legacy_driver*: 0xcf51cc50) + 0x139
3514 81e4cba4 (+ 176) 800c9b0b <kernel_x86> add_driver(0xcf52e080 "/boot/system/add-ons/kernel/drivers/dev/net/iprowifi2200", int32: -1) + 0x43f
3615 81e4cc54 (+ 32) 800cbe88 <kernel_x86> legacy_driver_add + 0x14
3716 81e4cc74 (+ 48) 800cb41b <kernel_x86> try_drivers() + 0x8f
3817 81e4cca4 (+ 208) 800cb892 <kernel_x86> probe_for_drivers(0x81e4cdc4 "drivers/dev/net") + 0x426
3918 81e4cd74 (+ 144) 800cc185 <kernel_x86> legacy_driver_probe + 0x18d
4019 81e4ce04 (+ 96) 800c4636 <kernel_x86> scan_for_drivers_if_needed(_GLOBAL_.N._var_lib_buildbot_workers_haiku_haiku_src_system_kernel_device_manager_devfs.cppV2Mczb::devfs_vnode*: 0xcf3d09c8) + 0x122
4120 81e4ce64 (+ 64) 800c669d <kernel_x86> devfs_open_dir(fs_volume*: 0x83166c98, fs_vnode*: 0xcf52c5c0, 0x81e4ced0) + 0x55
4221 81e4cea4 (+ 48) 800fe7ba <kernel_x86> open_dir_vnode(vnode*: 0xcf52c5c0, false) + 0x2e
4322 81e4ced4 (+ 48) 800ff3ac <kernel_x86> dir_open(int32: -1, 0xcf4d4120 "/dev", false) + 0x4c
4423 81e4cf04 (+ 64) 80105044 <kernel_x86> _user_open_dir + 0xbc
4524 81e4cf44 (+ 100) 801449bf <kernel_x86> handle_syscall + 0xdc
46user iframe at 0x81e4cfa8 (end = 0x81e4d000)
47 eax 0x6d ebx 0x1496b44 ecx 0x715d1a9c edx 0x6187b114
48 esi 0x1d463c3 edi 0x715d1cd4 ebp 0x715d1ac8 esp 0x81e4cfdc
49 eip 0x6187b114 eflags 0x203202 user esp 0x715d1a9c
50 vector: 0x63, error code: 0x0
5125 81e4cfa8 (+ 0) 6187b114 <commpage> commpage_syscall + 0x04
5226 715d1ac8 (+ 48) 01387ac1 <libbe.so> __10BDirectoryPCc + 0x55
5327 715d1af8 (+ 560) 01d3b738 <_APP_> NetServer<0x715d2188>::_ConfigureDevices(0x1d463c3 "/dev/net", BMessage*: NULL) + 0x28
5428 715d1d28 (+ 352) 01d3be32 <_APP_> NetServer<0x715d2188>::_BringUpInterfaces(0x2) + 0x26a
5529 715d1e88 (+ 80) 01d391ca <_APP_> NetServer<0x715d2188>::ReadyToRun(0x4) + 0x5e
5630 715d1ed8 (+ 512) 012538b9 <libbe.so> BApplication<0x715d2188>::DispatchMessage(BMessage*: 0x1955eab0, BHandler*: 0x715d2188) + 0x2ed
5731 715d20d8 (+ 64) 0125ff1d <libbe.so> BLooper<0x715d2188>::task_looper(0x715d2188) + 0x211
5832 715d2118 (+ 64) 012523f1 <libbe.so> BApplication<0x715d2188>::Run(0x8) + 0x75
5933 715d2158 (+ 592) 01d3da0f <_APP_> main + 0x93
6034 715d23a8 (+ 48) 01d38aeb <_APP_> _start + 0x5b
6135 715d23d8 (+ 48) 02270e72 </boot/system/runtime_loader@0x0225f000> <unknown> + 0x11e72
6236 715d2408 (+ 0) 6187b250 <commpage> commpage_thread_exit + 0x00
63kdebug> co
64usb_disk: acquire_sem failed while waiting for data transfer: Operation timed out
65usb_disk: read failed: Operation timed out
66file_cache: read pages failed: Operation timed out
67packagefs [467299438: 400] ReadFileData(20335608, 0xcf5f0000, 30931) failed to read data: Operation timed out
68packagefs [467309113: 400] CachedDataReader::_ReadCacheLine(): Failed to read into cache (offset: 38862848, length: 65536), trying uncached read (offset: 38910518, length: 17866)
69PANIC: cache destroy: still has partial slabs
70Welcome to Kernel Debugging Land...
71Thread 264 "net_server" running on CPU 0
72stack trace for thread 264 "net_server"
73 kernel stack: 0x81e49000 to 0x81e4d000
74 user stack: 0x705d3000 to 0x715d3000
75frame caller <image>:function + offset
76 0 81e4c928 (+ 32) 8015065e <kernel_x86> arch_debug_stack_trace + 0x12
77 1 81e4c948 (+ 16) 800aab33 <kernel_x86> stack_trace_trampoline(NULL) + 0x0b
78 2 81e4c958 (+ 12) 80141df2 <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
79 3 81e4c964 (+ 48) 800ac65b <kernel_x86> debug_call_with_fault_handler + 0x5b
80 4 81e4c994 (+ 64) 800aad4f <kernel_x86> kernel_debugger_loop(0x80194d17 "PANIC: ", 0x801a9780 "cache destroy: still has partial slabs", 0x81e4ca40 "", int32: 0) + 0x217
81 5 81e4c9d4 (+ 48) 800ab0cb <kernel_x86> kernel_debugger_internal(0x80194d17 "PANIC: ", 0x801a9780 "cache destroy: still has partial slabs", 0x81e4ca40 "", int32: 0) + 0x53
82 6 81e4ca04 (+ 48) 800ac9e6 <kernel_x86> panic + 0x3a
83 7 81e4ca34 (+ 48) 8011b1cb <kernel_x86> delete_object_cache_internal(ObjectCache*: 0x83008400) + 0x63
84 8 81e4ca64 (+ 64) 8011c243 <kernel_x86> delete_object_cache + 0x247
85 9 81e4caa4 (+ 48) 81bb2706 </boot/system/add-ons/kernel/drivers/dev/net/iprowifi2200> uninit_mbufs + 0x22
8610 81e4cad4 (+ 64) 81ba8d00 </boot/system/add-ons/kernel/drivers/dev/net/iprowifi2200> _fbsd_init_drivers + 0x260
8711 81e4cb14 (+ 48) 81b6fd95 </boot/system/add-ons/kernel/drivers/dev/net/iprowifi2200> __haiku_handle_fbsd_drivers_list + 0x31
8812 81e4cb44 (+ 48) 81b6fdea </boot/system/add-ons/kernel/drivers/dev/net/iprowifi2200> init_driver + 0x22
8913 81e4cb74 (+ 48) 800c924d <kernel_x86> load_driver(_GLOBAL_.N._var_lib_buildbot_workers_haiku_haiku_src_system_kernel_device_manager_legacy_drivers.cppMIWXlc::legacy_driver*: 0xcf51cc50) + 0x139
9014 81e4cba4 (+ 176) 800c9b0b <kernel_x86> add_driver(0xcf52e080 "/boot/system/add-ons/kernel/drivers/dev/net/iprowifi2200", int32: -1) + 0x43f
9115 81e4cc54 (+ 32) 800cbe88 <kernel_x86> legacy_driver_add + 0x14
9216 81e4cc74 (+ 48) 800cb41b <kernel_x86> try_drivers() + 0x8f
9317 81e4cca4 (+ 208) 800cb892 <kernel_x86> probe_for_drivers(0x81e4cdc4 "drivers/dev/net") + 0x426
9418 81e4cd74 (+ 144) 800cc185 <kernel_x86> legacy_driver_probe + 0x18d
9519 81e4ce04 (+ 96) 800c4636 <kernel_x86> scan_for_drivers_if_needed(_GLOBAL_.N._var_lib_buildbot_workers_haiku_haiku_src_system_kernel_device_manager_devfs.cppV2Mczb::devfs_vnode*: 0xcf3d09c8) + 0x122
9620 81e4ce64 (+ 64) 800c669d <kernel_x86> devfs_open_dir(fs_volume*: 0x83166c98, fs_vnode*: 0xcf52c5c0, 0x81e4ced0) + 0x55
9721 81e4cea4 (+ 48) 800fe7ba <kernel_x86> open_dir_vnode(vnode*: 0xcf52c5c0, false) + 0x2e
9822 81e4ced4 (+ 48) 800ff3ac <kernel_x86> dir_open(int32: -1, 0xcf4d4120 "/dev", false) + 0x4c
9923 81e4cf04 (+ 64) 80105044 <kernel_x86> _user_open_dir + 0xbc
10024 81e4cf44 (+ 100) 801449bf <kernel_x86> handle_syscall + 0xdc
101user iframe at 0x81e4cfa8 (end = 0x81e4d000)
102 eax 0x6d ebx 0x1496b44 ecx 0x715d1a9c edx 0x6187b114
103 esi 0x1d463c3 edi 0x715d1cd4 ebp 0x715d1ac8 esp 0x81e4cfdc
104 eip 0x6187b114 eflags 0x203202 user esp 0x715d1a9c
105 vector: 0x63, error code: 0x0
10625 81e4cfa8 (+ 0) 6187b114 <commpage> commpage_syscall + 0x04
10726 715d1ac8 (+ 48) 01387ac1 <libbe.so> __10BDirectoryPCc + 0x55
10827 715d1af8 (+ 560) 01d3b738 <_APP_> NetServer<0x715d2188>::_ConfigureDevices(0x1d463c3 "/dev/net", BMessage*: NULL) + 0x28
10928 715d1d28 (+ 352) 01d3be32 <_APP_> NetServer<0x715d2188>::_BringUpInterfaces(0x2) + 0x26a
11029 715d1e88 (+ 80) 01d391ca <_APP_> NetServer<0x715d2188>::ReadyToRun(0x4) + 0x5e
11130 715d1ed8 (+ 512) 012538b9 <libbe.so> BApplication<0x715d2188>::DispatchMessage(BMessage*: 0x1955eab0, BHandler*: 0x715d2188) + 0x2ed
11231 715d20d8 (+ 64) 0125ff1d <libbe.so> BLooper<0x715d2188>::task_looper(0x715d2188) + 0x211
11332 715d2118 (+ 64) 012523f1 <libbe.so> BApplication<0x715d2188>::Run(0x8) + 0x75
11433 715d2158 (+ 592) 01d3da0f <_APP_> main + 0x93
11534 715d23a8 (+ 48) 01d38aeb <_APP_> _start + 0x5b
11635 715d23d8 (+ 48) 02270e72 </boot/system/runtime_loader@0x0225f000> <unknown> + 0x11e72
11736 715d2408 (+ 0) 6187b250 <commpage> commpage_thread_exit + 0x00
118kdebug> co
119PANIC: cache destroy: still has full slabs
120Welcome to Kernel Debugging Land...
121Thread 264 "net_server" running on CPU 0
122stack trace for thread 264 "net_server"
123 kernel stack: 0x81e49000 to 0x81e4d000
124 user stack: 0x705d3000 to 0x715d3000
125frame caller <image>:function + offset
126 0 81e4c918 (+ 32) 8015065e <kernel_x86> arch_debug_stack_trace + 0x12
127 1 81e4c938 (+ 16) 800aab33 <kernel_x86> stack_trace_trampoline(NULL) + 0x0b
128 2 81e4c948 (+ 12) 80141df2 <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
129 3 81e4c954 (+ 48) 800ac65b <kernel_x86> debug_call_with_fault_handler + 0x5b
130 4 81e4c984 (+ 64) 800aad4f <kernel_x86> kernel_debugger_loop(0x80194d17 "PANIC: ", 0x801a9740 "cache destroy: still has full slabs", 0x81e4ca30 "", int32: 0) + 0x217
131 5 81e4c9c4 (+ 48) 800ab0cb <kernel_x86> kernel_debugger_internal(0x80194d17 "PANIC: ", 0x801a9740 "cache destroy: still has full slabs", 0x81e4ca30 "", int32: 0) + 0x53
132 6 81e4c9f4 (+ 48) 800ac9e6 <kernel_x86> panic + 0x3a
133 7 81e4ca24 (+ 48) 8011b1b5 <kernel_x86> delete_object_cache_internal(ObjectCache*: 0xcf520df0) + 0x4d
134 8 81e4ca54 (+ 64) 8011c243 <kernel_x86> delete_object_cache + 0x247
135 9 81e4ca94 (+ 64) 81bb2715 </boot/system/add-ons/kernel/drivers/dev/net/iprowifi2200> uninit_mbufs + 0x31
13610 81e4cad4 (+ 64) 81ba8d00 </boot/system/add-ons/kernel/drivers/dev/net/iprowifi2200> _fbsd_init_drivers + 0x260
13711 81e4cb14 (+ 48) 81b6fd95 </boot/system/add-ons/kernel/drivers/dev/net/iprowifi2200> __haiku_handle_fbsd_drivers_list + 0x31
13812 81e4cb44 (+ 48) 81b6fdea </boot/system/add-ons/kernel/drivers/dev/net/iprowifi2200> init_driver + 0x22
13913 81e4cb74 (+ 48) 800c924d <kernel_x86> load_driver(_GLOBAL_.N._var_lib_buildbot_workers_haiku_haiku_src_system_kernel_device_manager_legacy_drivers.cppMIWXlc::legacy_driver*: 0xcf51cc50) + 0x139
14014 81e4cba4 (+ 176) 800c9b0b <kernel_x86> add_driver(0xcf52e080 "/boot/system/add-ons/kernel/drivers/dev/net/iprowifi2200", int32: -1) + 0x43f
14115 81e4cc54 (+ 32) 800cbe88 <kernel_x86> legacy_driver_add + 0x14
14216 81e4cc74 (+ 48) 800cb41b <kernel_x86> try_drivers() + 0x8f
14317 81e4cca4 (+ 208) 800cb892 <kernel_x86> probe_for_drivers(0x81e4cdc4 "drivers/dev/net") + 0x426
14418 81e4cd74 (+ 144) 800cc185 <kernel_x86> legacy_driver_probe + 0x18d
14519 81e4ce04 (+ 96) 800c4636 <kernel_x86> scan_for_drivers_if_needed(_GLOBAL_.N._var_lib_buildbot_workers_haiku_haiku_src_system_kernel_device_manager_devfs.cppV2Mczb::devfs_vnode*: 0xcf3d09c8) + 0x122
14620 81e4ce64 (+ 64) 800c669d <kernel_x86> devfs_open_dir(fs_volume*: 0x83166c98, fs_vnode*: 0xcf52c5c0, 0x81e4ced0) + 0x55
14721 81e4cea4 (+ 48) 800fe7ba <kernel_x86> open_dir_vnode(vnode*: 0xcf52c5c0, false) + 0x2e
14822 81e4ced4 (+ 48) 800ff3ac <kernel_x86> dir_open(int32: -1, 0xcf4d4120 "/dev", false) + 0x4c
14923 81e4cf04 (+ 64) 80105044 <kernel_x86> _user_open_dir + 0xbc
15024 81e4cf44 (+ 100) 801449bf <kernel_x86> handle_syscall + 0xdc
151user iframe at 0x81e4cfa8 (end = 0x81e4d000)
152 eax 0x6d ebx 0x1496b44 ecx 0x715d1a9c edx 0x6187b114
153 esi 0x1d463c3 edi 0x715d1cd4 ebp 0x715d1ac8 esp 0x81e4cfdc
154 eip 0x6187b114 eflags 0x203202 user esp 0x715d1a9c
155 vector: 0x63, error code: 0x0
15625 81e4cfa8 (+ 0) 6187b114 <commpage> commpage_syscall + 0x04
15726 715d1ac8 (+ 48) 01387ac1 <libbe.so> __10BDirectoryPCc + 0x55
15827 715d1af8 (+ 560) 01d3b738 <_APP_> NetServer<0x715d2188>::_ConfigureDevices(0x1d463c3 "/dev/net", BMessage*: NULL) + 0x28
15928 715d1d28 (+ 352) 01d3be32 <_APP_> NetServer<0x715d2188>::_BringUpInterfaces(0x2) + 0x26a
16029 715d1e88 (+ 80) 01d391ca <_APP_> NetServer<0x715d2188>::ReadyToRun(0x4) + 0x5e
16130 715d1ed8 (+ 512) 012538b9 <libbe.so> BApplication<0x715d2188>::DispatchMessage(BMessage*: 0x1955eab0, BHandler*: 0x715d2188) + 0x2ed
16231 715d20d8 (+ 64) 0125ff1d <libbe.so> BLooper<0x715d2188>::task_looper(0x715d2188) + 0x211
16332 715d2118 (+ 64) 012523f1 <libbe.so> BApplication<0x715d2188>::Run(0x8) + 0x75
16433 715d2158 (+ 592) 01d3da0f <_APP_> main + 0x93
16534 715d23a8 (+ 48) 01d38aeb <_APP_> _start + 0x5b
16635 715d23d8 (+ 48) 02270e72 </boot/system/runtime_loader@0x0225f000> <unknown> + 0x11e72
16736 715d2408 (+ 0) 6187b250 <commpage> commpage_thread_exit + 0x00
168kdebug> co
169usb_disk: command status wrapper is not valid: 0x53425355
170vm_soft_fault: va 0x0 not covered by area in address space
171vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x24, ip 0x80106247, write 0, user 0, thread 0x197
172PANIC: vm_page_fault: unhandled page fault in kernel space at 0x24, ip 0x80106247
173
174Welcome to Kernel Debugging Land...
175Thread 407 "daemon" running on CPU 0
176stack trace for thread 407 "daemon"
177 kernel stack: 0x824c7000 to 0x824cb000
178 user stack: 0x715c4000 to 0x71604000
179frame caller <image>:function + offset
180 0 824cac74 (+ 32) 8015065e <kernel_x86> arch_debug_stack_trace + 0x12
181 1 824cac94 (+ 16) 800aab33 <kernel_x86> stack_trace_trampoline(NULL) + 0x0b
182 2 824caca4 (+ 12) 80141df2 <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
183 3 824cacb0 (+ 48) 800ac65b <kernel_x86> debug_call_with_fault_handler + 0x5b
184 4 824cace0 (+ 64) 800aad4f <kernel_x86> kernel_debugger_loop(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
185", 0x824cad8c "$", int32: 0) + 0x217
186 5 824cad20 (+ 48) 800ab0cb <kernel_x86> kernel_debugger_internal(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
187", 0x824cad8c "$", int32: 0) + 0x53
188 6 824cad50 (+ 48) 800ac9e6 <kernel_x86> panic + 0x3a
189 7 824cad80 (+ 144) 80126825 <kernel_x86> vm_page_fault + 0x145
190 8 824cae10 (+ 80) 80151f2a <kernel_x86> x86_page_fault_exception + 0x1e2
191 9 824cae60 (+ 12) 801447bc <kernel_x86> int_bottom + 0x3c
192kernel iframe at 0x824cae6c (end = 0x824caebc)
193 eax 0xcf54c3f8 ebx 0xcf54c3f8 ecx 0x0 edx 0x0
194 esi 0x801772c8 edi 0xcf588e60 ebp 0x824caf44 esp 0x824caea0
195 eip 0x80106247 eflags 0x13282
196 vector: 0xe, error code: 0x0
19710 824cae6c (+ 216) 80106247 <kernel_x86> _user_read_stat + 0x143
19811 824caf44 (+ 100) 801449bf <kernel_x86> handle_syscall + 0xdc
199user iframe at 0x824cafa8 (end = 0x824cb000)
200 eax 0x95 ebx 0xa3f810 ecx 0x715ff62c edx 0x61aae114
201 esi 0x75 edi 0x71602394 ebp 0x715ff668 esp 0x824cafdc
202 eip 0x61aae114 eflags 0x3202 user esp 0x715ff62c
203 vector: 0x63, error code: 0x0
20412 824cafa8 (+ 0) 61aae114 <commpage> commpage_syscall + 0x04
20513 715ff668 (+ 144) 0054afd1 <_APP_> __tf12SyslogDaemon (nearest) + 0x81
20614 715ff6f8 (+8416) 0054b53d <_APP_> __tf12SyslogDaemon (nearest) + 0x5ed
20715 716017d8 (+8272) 0054ac36 <_APP_> SyslogDaemon<0x72653cb8>::_Daemon(0x0) + 0xe2
20816 71603828 (+ 48) 0054ac87 <_APP_> SyslogDaemon<0x72653cb8>::_DaemonThread(NULL) + 0x1f
20917 71603858 (+ 48) 00991b1f <libroot.so> _get_next_team_info (nearest) + 0x5f
21018 71603888 (+ 0) 61aae250 <commpage> commpage_thread_exit + 0x00
211kdebug> co
212vm_soft_fault: va 0x0 not covered by area in address space
213vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x24, ip 0x80106247, write 0, user 0, thread 0x197
214PANIC: vm_page_fault: unhandled page fault in kernel space at 0x24, ip 0x80106247
215
216Welcome to Kernel Debugging Land...
217Thread 407 "daemon" running on CPU 0
218stack trace for thread 407 "daemon"
219 kernel stack: 0x824c7000 to 0x824cb000
220 user stack: 0x715c4000 to 0x71604000
221frame caller <image>:function + offset
222 0 824cac74 (+ 32) 8015065e <kernel_x86> arch_debug_stack_trace + 0x12
223 1 824cac94 (+ 16) 800aab33 <kernel_x86> stack_trace_trampoline(NULL) + 0x0b
224 2 824caca4 (+ 12) 80141df2 <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
225 3 824cacb0 (+ 48) 800ac65b <kernel_x86> debug_call_with_fault_handler + 0x5b
226 4 824cace0 (+ 64) 800aad4f <kernel_x86> kernel_debugger_loop(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
227", 0x824cad8c "$", int32: 0) + 0x217
228 5 824cad20 (+ 48) 800ab0cb <kernel_x86> kernel_debugger_internal(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
229", 0x824cad8c "$", int32: 0) + 0x53
230 6 824cad50 (+ 48) 800ac9e6 <kernel_x86> panic + 0x3a
231 7 824cad80 (+ 144) 80126825 <kernel_x86> vm_page_fault + 0x145
232 8 824cae10 (+ 80) 80151f2a <kernel_x86> x86_page_fault_exception + 0x1e2
233 9 824cae60 (+ 12) 801447bc <kernel_x86> int_bottom + 0x3c
234kernel iframe at 0x824cae6c (end = 0x824caebc)
235 eax 0xcf54c3f8 ebx 0xcf54c3f8 ecx 0x0 edx 0x0
236 esi 0x801772c8 edi 0xcf588e60 ebp 0x824caf44 esp 0x824caea0
237 eip 0x80106247 eflags 0x13282
238 vector: 0xe, error code: 0x0
23910 824cae6c (+ 216) 80106247 <kernel_x86> _user_read_stat + 0x143
24011 824caf44 (+ 100) 801449bf <kernel_x86> handle_syscall + 0xdc
241user iframe at 0x824cafa8 (end = 0x824cb000)
242 eax 0x95 ebx 0xa3f810 ecx 0x715ff62c edx 0x61aae114
243 esi 0x75 edi 0x71602394 ebp 0x715ff668 esp 0x824cafdc
244 eip 0x61aae114 eflags 0x3202 user esp 0x715ff62c
245 vector: 0x63, error code: 0x0
24612 824cafa8 (+ 0) 61aae114 <commpage> commpage_syscall + 0x04
24713 715ff668 (+ 144) 0054afd1 <_APP_> __tf12SyslogDaemon (nearest) + 0x81
24814 715ff6f8 (+8416) 0054b53d <_APP_> __tf12SyslogDaemon (nearest) + 0x5ed
24915 716017d8 (+8272) 0054ac36 <_APP_> SyslogDaemon<0x72653cb8>::_Daemon(0x0) + 0xe2
25016 71603828 (+ 48) 0054ac87 <_APP_> SyslogDaemon<0x72653cb8>::_DaemonThread(NULL) + 0x1f
25117 71603858 (+ 48) 00991b1f <libroot.so> _get_next_team_info (nearest) + 0x5f
25218 71603888 (+ 0) 61aae250 <commpage> commpage_thread_exit + 0x00
253kdebug> co
254usb_disk: sending or receiving of the data failed: No error
255usb error control pipe 29: timeout waiting for queued request to complete
256usb error hub 28: vm_soft_fault: va 0x0 not covered by area in address space
257error updating port status
258usb_disk: read failed: General system error
259vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x24, ip 0x80106247, write 0, user 0, thread 0x197
260PANIC: vm_page_fault: unhandled page fault in kernel space at 0x24, ip 0x80106247
261
262Welcome to Kernel Debugging Land...
263Thread 407 "daemon" running on CPU 0
264stack trace for thread 407 "daemon"
265 kernel stack: 0x824c7000 to 0x824cb000
266 user stack: 0x715c4000 to 0x71604000
267frame caller <image>:function + offset
268 0 824cac74 (+ 32) 8015065e <kernel_x86> arch_debug_stack_trace + 0x12
269 1 824cac94 (+ 16) 800aab33 <kernel_x86> stack_trace_trampoline(NULL) + 0x0b
270 2 824caca4 (+ 12) 80141df2 <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
271 3 824cacb0 (+ 48) 800ac65b <kernel_x86> debug_call_with_fault_handler + 0x5b
272 4 824cace0 (+ 64) 800aad4f <kernel_x86> kernel_debugger_loop(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
273", 0x824cad8c "$", int32: 0) + 0x217
274 5 824cad20 (+ 48) 800ab0cb <kernel_x86> kernel_debugger_internal(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
275", 0x824cad8c "$", int32: 0) + 0x53
276 6 824cad50 (+ 48) 800ac9e6 <kernel_x86> panic + 0x3a
277 7 824cad80 (+ 144) 80126825 <kernel_x86> vm_page_fault + 0x145
278 8 824cae10 (+ 80) 80151f2a <kernel_x86> x86_page_fault_exception + 0x1e2
279 9 824cae60 (+ 12) 801447bc <kernel_x86> int_bottom + 0x3c
280kernel iframe at 0x824cae6c (end = 0x824caebc)
281 eax 0xcf54c3f8 ebx 0xcf54c3f8 ecx 0x0 edx 0x0
282 esi 0x801772c8 edi 0xcf588e60 ebp 0x824caf44 esp 0x824caea0
283 eip 0x80106247 eflags 0x13282
284 vector: 0xe, error code: 0x0
28510 824cae6c (+ 216) 80106247 <kernel_x86> _user_read_stat + 0x143
28611 824caf44 (+ 100) 801449bf <kernel_x86> handle_syscall + 0xdc
287user iframe at 0x824cafa8 (end = 0x824cb000)
288 eax 0x95 ebx 0xa3f810 ecx 0x715ff62c edx 0x61aae114
289 esi 0x75 edi 0x71602394 ebp 0x715ff668 esp 0x824cafdc
290 eip 0x61aae114 eflags 0x3202 user esp 0x715ff62c
291 vector: 0x63, error code: 0x0
29212 824cafa8 (+ 0) 61aae114 <commpage> commpage_syscall + 0x04
29313 715ff668 (+ 144) 0054afd1 <_APP_> __tf12SyslogDaemon (nearest) + 0x81
29414 715ff6f8 (+8416) 0054b53d <_APP_> __tf12SyslogDaemon (nearest) + 0x5ed
29515 716017d8 (+8272) 0054ac36 <_APP_> SyslogDaemon<0x72653cb8>::_Daemon(0x0) + 0xe2
29616 71603828 (+ 48) 0054ac87 <_APP_> SyslogDaemon<0x72653cb8>::_DaemonThread(NULL) + 0x1f
29717 71603858 (+ 48) 00991b1f <libroot.so> _get_next_team_info (nearest) + 0x5f
29818 71603888 (+ 0) 61aae250 <commpage> commpage_thread_exit + 0x00
299kdebug> co
300file_cache: read pages failed: General system error
301packagefs [485430841: 400] ReadFileData(20335608, 0xcf5f0000, 30931) failed to read data: General system error
302vm_soft_fault: va 0x0 not covered by area in address space
303usb error control pipe 29: vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x24, ip 0x80106247, write 0, user 0, thread 0x197
304PANIC: vm_page_fault: unhandled page fault in kernel space at 0x24, ip 0x80106247
305
306Welcome to Kernel Debugging Land...
307Thread 407 "daemon" running on CPU 0
308stack trace for thread 407 "daemon"
309 kernel stack: 0x824c7000 to 0x824cb000
310 user stack: 0x715c4000 to 0x71604000
311frame caller <image>:function + offset
312 0 824cac74 (+ 32) 8015065e <kernel_x86> arch_debug_stack_trace + 0x12
313 1 824cac94 (+ 16) 800aab33 <kernel_x86> stack_trace_trampoline(NULL) + 0x0b
314 2 824caca4 (+ 12) 80141df2 <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
315 3 824cacb0 (+ 48) 800ac65b <kernel_x86> debug_call_with_fault_handler + 0x5b
316 4 824cace0 (+ 64) 800aad4f <kernel_x86> kernel_debugger_loop(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
317", 0x824cad8c "$", int32: 0) + 0x217
318 5 824cad20 (+ 48) 800ab0cb <kernel_x86> kernel_debugger_internal(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
319", 0x824cad8c "$", int32: 0) + 0x53
320 6 824cad50 (+ 48) 800ac9e6 <kernel_x86> panic + 0x3a
321 7 824cad80 (+ 144) 80126825 <kernel_x86> vm_page_fault + 0x145
322 8 824cae10 (+ 80) 80151f2a <kernel_x86> x86_page_fault_exception + 0x1e2
323 9 824cae60 (+ 12) 801447bc <kernel_x86> int_bottom + 0x3c
324kernel iframe at 0x824cae6c (end = 0x824caebc)
325 eax 0xcf54c3f8 ebx 0xcf54c3f8 ecx 0x0 edx 0x0
326 esi 0x801772c8 edi 0xcf588e60 ebp 0x824caf44 esp 0x824caea0
327 eip 0x80106247 eflags 0x13282
328 vector: 0xe, error code: 0x0
32910 824cae6c (+ 216) 80106247 <kernel_x86> _user_read_stat + 0x143
33011 824caf44 (+ 100) 801449bf <kernel_x86> handle_syscall + 0xdc
331user iframe at 0x824cafa8 (end = 0x824cb000)
332 eax 0x95 ebx 0xa3f810 ecx 0x715ff62c edx 0x61aae114
333 esi 0x75 edi 0x71602394 ebp 0x715ff668 esp 0x824cafdc
334 eip 0x61aae114 eflags 0x3202 user esp 0x715ff62c
335 vector: 0x63, error code: 0x0
33612 824cafa8 (+ 0) 61aae114 <commpage> commpage_syscall + 0x04
33713 715ff668 (+ 144) 0054afd1 <_APP_> __tf12SyslogDaemon (nearest) + 0x81
33814 715ff6f8 (+8416) 0054b53d <_APP_> __tf12SyslogDaemon (nearest) + 0x5ed
33915 716017d8 (+8272) 0054ac36 <_APP_> SyslogDaemon<0x72653cb8>::_Daemon(0x0) + 0xe2
34016 71603828 (+ 48) 0054ac87 <_APP_> SyslogDaemon<0x72653cb8>::_DaemonThread(NULL) + 0x1f
34117 71603858 (+ 48) 00991b1f <libroot.so> _get_next_team_info (nearest) + 0x5f
34218 71603888 (+ 0) 61aae250 <commpage> commpage_thread_exit + 0x00
343kdebug> co
344timeout waiting for queued request to complete
345vm_soft_fault: va 0x0 not covered by area in address space
346usb error hub 28: vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x0, ip 0x800ea026, write 0, user 0, thread 0x190
347PANIC: vm_page_fault: unhandled page fault in kernel space at 0x0, ip 0x800ea026
348
349Welcome to Kernel Debugging Land...
350Thread 400 "a:392:x-vnd.Haiku-FirstBootProm" running on CPU 0
351stack trace for thread 400 "a:392:x-vnd.Haiku-FirstBootProm"
352 kernel stack: 0x824ed000 to 0x824f1000
353 user stack: 0x70529000 to 0x70569000
354frame caller <image>:function + offset
355 0 824f047c (+ 32) 8015065e <kernel_x86> arch_debug_stack_trace + 0x12
356 1 824f049c (+ 16) 800aab33 <kernel_x86> stack_trace_trampoline(NULL) + 0x0b
357 2 824f04ac (+ 12) 80141df2 <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
358 3 824f04b8 (+ 48) 800ac65b <kernel_x86> debug_call_with_fault_handler + 0x5b
359 4 824f04e8 (+ 64) 800aad4f <kernel_x86> kernel_debugger_loop(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
360", 0x824f0594 "", int32: 0) + 0x217
361 5 824f0528 (+ 48) 800ab0cb <kernel_x86> kernel_debugger_internal(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
362", 0x824f0594 "", int32: 0) + 0x53
363 6 824f0558 (+ 48) 800ac9e6 <kernel_x86> panic + 0x3a
364 7 824f0588 (+ 144) 80126825 <kernel_x86> vm_page_fault + 0x145
365 8 824f0618 (+ 80) 80151f2a <kernel_x86> x86_page_fault_exception + 0x1e2
366 9 824f0668 (+ 12) 801447bc <kernel_x86> int_bottom + 0x3c
367kernel iframe at 0x824f0674 (end = 0x824f06c4)
368 eax 0x0 ebx 0x1364c48 ecx 0x0 edx 0xcf58a400
369 esi 0x0 edi 0xcf5369a8 ebp 0x824f06fc esp 0x824f06a8
370 eip 0x800ea026 eflags 0x13282
371 vector: 0xe, error code: 0x0
37210 824f0674 (+ 136) 800ea026 <kernel_x86> _kern_read + 0xee
37311 824f06fc (+ 64) 80162994 <kernel_x86> pread + 0x28
37412 824f073c (+ 64) 81fd908c <packagefs> BFdIO<0xcdae9c48>::ReadAt(int64: 20335688, 0xcf5f0000, uint32: 0x78d3 (30931)) + 0x34
37513 824f077c (+ 80) 80165027 <kernel_x86> BPositionIO<0xcdae9c48>::ReadAtExactly(int64: 20335688, 0xcf5f0000, uint32: 0x78d3 (30931), NULL) + 0x47
37614 824f07cc (+ 64) 81fcf788 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0xcdae3518>::ReadFileData(uint64: 0x1364bf8, 0xcf5f0000, uint32: 0x78d3 (30931)) + 0x3c
37715 824f080c (+ 64) 81fcf678 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0xcdae3518>::ReadAndDecompressChunkData(uint64: 0x1364bf8, uint32: 0x78d3 (30931), uint32: 0x10000 (65536), 0xcf5f0000) + 0x48
37816 824f084c (+ 80) 81fcfe53 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapReader<0xcdae3518>::ReadAndDecompressChunk(uint32: 0x251 (593), 0xcf5f0000) + 0x12b
37917 824f089c (+ 96) 81fcf5b2 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0xcdae3518>::ReadDataToOutput(int64: 38862848, uint32: 0x10000 (65536), BDataIO*: 0x824f0954) + 0x13a
38018 824f08fc (+ 112) 81fad061 <packagefs> CachedDataReader<0xcdae9c14>::_ReadIntoPages(vm_page*: 0x824f0a08, uint32: 0x0 (0), uint32: 0x10 (16)) + 0xc9
38119 824f096c (+ 272) 81faca51 <packagefs> CachedDataReader<0xcdae9c14>::_ReadCacheLine(int64: 38862848, uint32: 0x10000 (65536), int64: 38910518, uint32: 0x1000 (4096), BDataIO*: 0x824f0b74) + 0x871
38220 824f0a7c (+ 96) 81fac1ba <packagefs> CachedDataReader<0xcdae9c14>::ReadDataToOutput(int64: 38910518, uint32: 0x1000 (4096), BDataIO*: 0x824f0b74) + 0x12e
38321 824f0adc (+ 64) 81fceee1 <packagefs> BPackageKit::BHPKG::PackageDataHeapReader<0xcf51bf98>::ReadDataToOutput(int64: 0, uint32: 0x1000 (4096), BDataIO*: 0x824f0b74) + 0x95
38422 824f0b1c (+ 112) 81fb99f9 <packagefs> PackageFile<0xcdb9c150>::Read(IORequest*: 0x824f0c60) + 0x159
38523 824f0b8c (+ 48) 81fc440a <packagefs> UnpackingLeafNode<0xcf19d4e0>::Read(IORequest*: 0x824f0c60) + 0x56
38624 824f0bbc (+ 48) 81faf924 <packagefs> packagefs_io(fs_volume*: 0x83361120, fs_vnode*: 0xcf51ccf0, NULL, IORequest*: 0x824f0c60) + 0x40
38725 824f0bec (+ 64) 80107924 <kernel_x86> vfs_vnode_io + 0x2c
38826 824f0c2c (+ 224) 800fccfd <kernel_x86> vfs_read_pages + 0x69
38927 824f0d0c (+ 80) 8005ac6a <kernel_x86> VMVnodeCache<0xcf54e380>::Read(int64: 0, generic_io_vec*: 0x824f0dcc, uint32: 0x1 (1), uint32: 0x1 (1), 0x824f0dc4) + 0x3a
39028 824f0d5c (+ 128) 80126c92 <kernel_x86> fault_get_page(PageFaultContext&: 0x824f0e78) + 0x2ce
39129 824f0ddc (+ 208) 80127359 <kernel_x86> vm_soft_fault(VMAddressSpace*: 0xcf3ff840, uint32: 0xb6a000, false, false, true) + 0x2b5
39230 824f0eac (+ 160) 80126795 <kernel_x86> vm_page_fault + 0xb5
39331 824f0f4c (+ 80) 80151f2a <kernel_x86> x86_page_fault_exception + 0x1e2
39432 824f0f9c (+ 12) 8014483e <kernel_x86> int_bottom_user + 0x73
395user iframe at 0x824f0fa8 (end = 0x824f1000)
396 eax 0x0 ebx 0x1cbf630 ecx 0x188a72a0 edx 0xb6a004
397 esi 0x0 edi 0x188a72a0 ebp 0x705679a8 esp 0x824f0fdc
398 eip 0x1c2a346 eflags 0x13246 user esp 0x70567990
399 vector: 0xe, error code: 0x4
40033 824f0fa8 (+ 0) 01c2a346 <libfreetype.so.6> FT_Stream_ReadULong + 0x56
40134 705679a8 (+ 80) 01c5f514 <libfreetype.so.6> TT_RunIns (nearest) + 0x214f8
40235 705679f8 (+ 128) 01c5f804 <libfreetype.so.6> TT_RunIns (nearest) + 0x217e8
40336 70567a78 (+ 64) 01c3f513 <libfreetype.so.6> TT_RunIns (nearest) + 0x14f7
40437 70567ab8 (+ 96) 01c23d21 <libfreetype.so.6> FT_Load_Char (nearest) + 0x461
40538 70567b18 (+ 128) 01c24ea9 <libfreetype.so.6> FT_Open_Face (nearest) + 0x1d9
40639 70567b98 (+ 96) 01c23df5 <libfreetype.so.6> FT_New_Face + 0x45
40740 70567bf8 (+ 112) 0132b378 <_APP_> FontManager<0x18480010>::_AddFont(FontManager::font_directory&: 0x18464e30, BEntry&: 0x70567ca4) + 0x94
40841 70567c68 (+ 192) 0132be05 <_APP_> FontManager<0x18480010>::_ScanFontDirectory(FontManager::font_directory&: 0x18464e30) + 0xc9
40942 70567d28 (+ 48) 0132b2c8 <_APP_> FontManager<0x18480010>::_ScanFonts(0x13bfded) + 0x64
41043 70567d58 (+ 48) 0132c244 <_APP_> FontManager<0x18480010>::GetFamily(0x13bfded "Noto Sans CJK JP") + 0x5c
41144 70567d88 (+ 48) 0132c32f <_APP_> FontManager<0x18480010>::GetStyleByIndex(0x13bfded "Noto Sans CJK JP", int32: 0) + 0x23
41245 70567db8 (+ 112) 012f2c00 <_APP_> GlyphLayoutEngine<0x70567ed0>::_WriteLockAndAcquireFallbackEntry(FontCacheReference&: 0x188b6d70, FontCacheEntry*: 0x70568a3c, ServerFont&: 0x12f0000, true, 0x34 "<???>", int32: 1884716744, FontCacheEntry*: 0x70567e94, FontCacheEntry&: 0x13f3a78) + 0xa8
41346 70567e28 (+ 176) 012f0a5c <_APP_> ServerFont<0x70568a3c>::StringWidth(ServerFont: 0x188bb7d0, 0x34 "<???>", int32: 0, escapement_delta*: 0x13f3a78) + 0x25c
41447 70567ed8 (+3168) 012e4fac <_APP_> ServerApp<0x18486ee8>::_DispatchMessage(int32: 79, BPrivate::LinkReceiver&: 0x1845fed0) + 0x32f8
41548 70568b38 (+ 176) 012e90eb <_APP_> ServerApp<0x18486ee8>::_MessageLooper(0x0) + 0x18f
41649 70568be8 (+ 48) 012d96a4 <_APP_> MessageLooper<0x18486ee8>::_message_thread(NULL) + 0x28
41750 70568c18 (+ 48) 01a60b1f <libroot.so> _get_next_team_info (nearest) + 0x5f
41851 70568c48 (+ 0) 61c5f250 <commpage> commpage_thread_exit + 0x00
419kdebug> co
420vm_soft_fault: va 0x0 not covered by area in address space
421error updating port status
422vm_soft_fault: va 0x0 not covered by area in address space
423vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x0, ip 0x800ea026, write 0, user 0, thread 0x108
424PANIC: vm_page_fault: unhandled page fault in kernel space at 0x0, ip 0x800ea026
425
426Welcome to Kernel Debugging Land...
427Thread 264 "net_server" running on CPU 0
428stack trace for thread 264 "net_server"
429 kernel stack: 0x81e49000 to 0x81e4d000
430 user stack: 0x705d3000 to 0x715d3000
431frame caller <image>:function + offset
432 0 81e4bda4 (+ 32) 8015065e <kernel_x86> arch_debug_stack_trace + 0x12
433 1 81e4bdc4 (+ 16) 800aab33 <kernel_x86> stack_trace_trampoline(NULL) + 0x0b
434 2 81e4bdd4 (+ 12) 80141df2 <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
435 3 81e4bde0 (+ 48) 800ac65b <kernel_x86> debug_call_with_fault_handler + 0x5b
436 4 81e4be10 (+ 64) 800aad4f <kernel_x86> kernel_debugger_loop(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
437", 0x81e4bebc "", int32: 0) + 0x217
438 5 81e4be50 (+ 48) 800ab0cb <kernel_x86> kernel_debugger_internal(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
439", 0x81e4bebc "", int32: 0) + 0x53
440 6 81e4be80 (+ 48) 800ac9e6 <kernel_x86> panic + 0x3a
441 7 81e4beb0 (+ 144) 80126825 <kernel_x86> vm_page_fault + 0x145
442 8 81e4bf40 (+ 80) 80151f2a <kernel_x86> x86_page_fault_exception + 0x1e2
443 9 81e4bf90 (+ 12) 801447bc <kernel_x86> int_bottom + 0x3c
444kernel iframe at 0x81e4bf9c (end = 0x81e4bfec)
445 eax 0x0 ebx 0x159a8b4 ecx 0x0 edx 0x831f3300
446 esi 0x0 edi 0xcde12e78 ebp 0x81e4c024 esp 0x81e4bfd0
447 eip 0x800ea026 eflags 0x213282
448 vector: 0xe, error code: 0x0
44910 81e4bf9c (+ 136) 800ea026 <kernel_x86> _kern_read + 0xee
45011 81e4c024 (+ 64) 80162994 <kernel_x86> pread + 0x28
45112 81e4c064 (+ 64) 81fd908c <packagefs> BFdIO<0x837896b0>::ReadAt(int64: 22653108, 0xcf4e0000, uint32: 0x693a (26938)) + 0x34
45213 81e4c0a4 (+ 80) 80165027 <kernel_x86> BPositionIO<0x837896b0>::ReadAtExactly(int64: 22653108, 0xcf4e0000, uint32: 0x693a (26938), NULL) + 0x47
45314 81e4c0f4 (+ 64) 81fcf788 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0x83780060>::ReadFileData(uint64: 0x159a864, 0xcf4e0000, uint32: 0x693a (26938)) + 0x3c
45415 81e4c134 (+ 64) 81fcf678 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0x83780060>::ReadAndDecompressChunkData(uint64: 0x159a864, uint32: 0x693a (26938), uint32: 0x10000 (65536), 0xcf4e0000) + 0x48
45516 81e4c174 (+ 80) 81fcfe53 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapReader<0x83780060>::ReadAndDecompressChunk(uint32: 0x3f5 (1013), 0xcf4e0000) + 0x12b
45617 81e4c1c4 (+ 96) 81fcf5b2 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0x83780060>::ReadDataToOutput(int64: 66387968, uint32: 0x10000 (65536), BDataIO*: 0x81e4c27c) + 0x13a
45718 81e4c224 (+ 112) 81fad061 <packagefs> CachedDataReader<0x8378967c>::_ReadIntoPages(vm_page*: 0x81e4c330, uint32: 0x0 (0), uint32: 0x10 (16)) + 0xc9
45819 81e4c294 (+ 272) 81faca51 <packagefs> CachedDataReader<0x8378967c>::_ReadCacheLine(int64: 66387968, uint32: 0x10000 (65536), int64: 66387968, uint32: 0xac67 (44135), BDataIO*: 0x81e4c49c) + 0x871
45920 81e4c3a4 (+ 96) 81fac1ba <packagefs> CachedDataReader<0x8378967c>::ReadDataToOutput(int64: 66387968, uint32: 0xac67 (44135), BDataIO*: 0x81e4c49c) + 0x12e
46021 81e4c404 (+ 64) 81fceee1 <packagefs> BPackageKit::BHPKG::PackageDataHeapReader<0xcf522588>::ReadDataToOutput(int64: 4096, uint32: 0x1d000 (118784), BDataIO*: 0x81e4c49c) + 0x95
46122 81e4c444 (+ 112) 81fb99f9 <packagefs> PackageFile<0xcd872480>::Read(IORequest*: 0x81e4c588) + 0x159
46223 81e4c4b4 (+ 48) 81fc440a <packagefs> UnpackingLeafNode<0xcf16bcc8>::Read(IORequest*: 0x81e4c588) + 0x56
46324 81e4c4e4 (+ 48) 81faf924 <packagefs> packagefs_io(fs_volume*: 0x83361120, fs_vnode*: 0xcf534e40, NULL, IORequest*: 0x81e4c588) + 0x40
46425 81e4c514 (+ 64) 80107924 <kernel_x86> vfs_vnode_io + 0x2c
46526 81e4c554 (+ 224) 800fccfd <kernel_x86> vfs_read_pages + 0x69
46627 81e4c634 (+ 784) 80057ace <kernel_x86> read_into_cache(file_cache_ref*: 0xcf536b88, NULL, int64: 4096, int32: 0, uint32: 0x81c0a000, uint32: 0x1c92b (117035), true, vm_page_reservation*: 0x81e4ca08, uint32: 0x0 (0)) + 0x1ee
46728 81e4c944 (+ 208) 8005900c <kernel_x86> cache_io(0xcf536b88, NULL, int64: 118784, uint32: 0x81c26000, 0x81e4cbfc, false) + 0x714
46829 81e4ca14 (+ 96) 80059a42 <kernel_x86> file_cache_read + 0x36
46930 81e4ca74 (+ 80) 81fb9896 <packagefs> PackageFile<0xcd872480>::Read(int64: 0, 0x81c09000, 0x81e4cbfc) + 0xd2
47031 81e4cac4 (+ 64) 81fc43aa <packagefs> UnpackingLeafNode<0xcf16bcc8>::Read(int64: 0, 0x81c09000, 0x81e4cbfc) + 0x5a
47132 81e4cb04 (+ 64) 81fafef3 <packagefs> packagefs_read(fs_volume*: 0x83361120, fs_vnode*: 0xcf534e40, 0xcf54b100, int64: 0, 0x81c09000, 0x81e4cbfc) + 0x43
47233 81e4cb44 (+ 64) 800feddf <kernel_x86> file_read(file_descriptor*: 0xcf54c758, int64: 0, 0x81c09000, 0x81e4cbfc) + 0x67
47334 81e4cb84 (+ 96) 800ea081 <kernel_x86> _kern_read + 0x149
47435 81e4cbe4 (+ 144) 80061bac <kernel_x86> load_kernel_add_on + 0x464
47536 81e4cc74 (+ 48) 800cb406 <kernel_x86> try_drivers() + 0x7a
47637 81e4cca4 (+ 208) 800cb892 <kernel_x86> probe_for_drivers(0x81e4cdc4 "drivers/dev/net") + 0x426
47738 81e4cd74 (+ 144) 800cc185 <kernel_x86> legacy_driver_probe + 0x18d
47839 81e4ce04 (+ 96) 800c4636 <kernel_x86> scan_for_drivers_if_needed(_GLOBAL_.N._var_lib_buildbot_workers_haiku_haiku_src_system_kernel_device_manager_devfs.cppV2Mczb::devfs_vnode*: 0xcf3d09c8) + 0x122
47940 81e4ce64 (+ 64) 800c669d <kernel_x86> devfs_open_dir(fs_volume*: 0x83166c98, fs_vnode*: 0xcf52c5c0, 0x81e4ced0) + 0x55
48041 81e4cea4 (+ 48) 800fe7ba <kernel_x86> open_dir_vnode(vnode*: 0xcf52c5c0, false) + 0x2e
48142 81e4ced4 (+ 48) 800ff3ac <kernel_x86> dir_open(int32: -1, 0xcf4d4120 "/dev", false) + 0x4c
48243 81e4cf04 (+ 64) 80105044 <kernel_x86> _user_open_dir + 0xbc
48344 81e4cf44 (+ 100) 801449bf <kernel_x86> handle_syscall + 0xdc
484user iframe at 0x81e4cfa8 (end = 0x81e4d000)
485 eax 0x6d ebx 0x1496b44 ecx 0x715d1a9c edx 0x6187b114
486 esi 0x1d463c3 edi 0x715d1cd4 ebp 0x715d1ac8 esp 0x81e4cfdc
487 eip 0x6187b114 eflags 0x203202 user esp 0x715d1a9c
488 vector: 0x63, error code: 0x0
48945 81e4cfa8 (+ 0) 6187b114 <commpage> commpage_syscall + 0x04
49046 715d1ac8 (+ 48) 01387ac1 <libbe.so> __10BDirectoryPCc + 0x55
49147 715d1af8 (+ 560) 01d3b738 <_APP_> NetServer<0x715d2188>::_ConfigureDevices(0x1d463c3 "/dev/net", BMessage*: NULL) + 0x28
49248 715d1d28 (+ 352) 01d3be32 <_APP_> NetServer<0x715d2188>::_BringUpInterfaces(0x2) + 0x26a
49349 715d1e88 (+ 80) 01d391ca <_APP_> NetServer<0x715d2188>::ReadyToRun(0x4) + 0x5e
49450 715d1ed8 (+ 512) 012538b9 <libbe.so> BApplication<0x715d2188>::DispatchMessage(BMessage*: 0x1955eab0, BHandler*: 0x715d2188) + 0x2ed
49551 715d20d8 (+ 64) 0125ff1d <libbe.so> BLooper<0x715d2188>::task_looper(0x715d2188) + 0x211
49652 715d2118 (+ 64) 012523f1 <libbe.so> BApplication<0x715d2188>::Run(0x8) + 0x75
49753 715d2158 (+ 592) 01d3da0f <_APP_> main + 0x93
49854 715d23a8 (+ 48) 01d38aeb <_APP_> _start + 0x5b
49955 715d23d8 (+ 48) 02270e72 </boot/system/runtime_loader@0x0225f000> <unknown> + 0x11e72
50056 715d2408 (+ 0) 6187b250 <commpage> commpage_thread_exit + 0x00
501kdebug> co
502vm_soft_fault: va 0x0 not covered by area in address space
503vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x24, ip 0x80106247, write 0, user 0, thread 0x197
504PANIC: vm_page_fault: unhandled page fault in kernel space at 0x24, ip 0x80106247
505
506Welcome to Kernel Debugging Land...
507Thread 407 "daemon" running on CPU 0
508stack trace for thread 407 "daemon"
509 kernel stack: 0x824c7000 to 0x824cb000
510 user stack: 0x715c4000 to 0x71604000
511frame caller <image>:function + offset
512 0 824cac74 (+ 32) 8015065e <kernel_x86> arch_debug_stack_trace + 0x12
513 1 824cac94 (+ 16) 800aab33 <kernel_x86> stack_trace_trampoline(NULL) + 0x0b
514 2 824caca4 (+ 12) 80141df2 <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
515 3 824cacb0 (+ 48) 800ac65b <kernel_x86> debug_call_with_fault_handler + 0x5b
516 4 824cace0 (+ 64) 800aad4f <kernel_x86> kernel_debugger_loop(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
517", 0x824cad8c "$", int32: 0) + 0x217
518 5 824cad20 (+ 48) 800ab0cb <kernel_x86> kernel_debugger_internal(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
519", 0x824cad8c "$", int32: 0) + 0x53
520 6 824cad50 (+ 48) 800ac9e6 <kernel_x86> panic + 0x3a
521 7 824cad80 (+ 144) 80126825 <kernel_x86> vm_page_fault + 0x145
522 8 824cae10 (+ 80) 80151f2a <kernel_x86> x86_page_fault_exception + 0x1e2
523 9 824cae60 (+ 12) 801447bc <kernel_x86> int_bottom + 0x3c
524kernel iframe at 0x824cae6c (end = 0x824caebc)
525 eax 0xcf54c3f8 ebx 0xcf54c3f8 ecx 0x0 edx 0x0
526 esi 0x801772c8 edi 0xcf588e60 ebp 0x824caf44 esp 0x824caea0
527 eip 0x80106247 eflags 0x13282
528 vector: 0xe, error code: 0x0
52910 824cae6c (+ 216) 80106247 <kernel_x86> _user_read_stat + 0x143
53011 824caf44 (+ 100) 801449bf <kernel_x86> handle_syscall + 0xdc
531user iframe at 0x824cafa8 (end = 0x824cb000)
532 eax 0x95 ebx 0xa3f810 ecx 0x715ff62c edx 0x61aae114
533 esi 0x75 edi 0x71602394 ebp 0x715ff668 esp 0x824cafdc
534 eip 0x61aae114 eflags 0x3202 user esp 0x715ff62c
535 vector: 0x63, error code: 0x0
53612 824cafa8 (+ 0) 61aae114 <commpage> commpage_syscall + 0x04
53713 715ff668 (+ 144) 0054afd1 <_APP_> __tf12SyslogDaemon (nearest) + 0x81
53814 715ff6f8 (+8416) 0054b53d <_APP_> __tf12SyslogDaemon (nearest) + 0x5ed
53915 716017d8 (+8272) 0054ac36 <_APP_> SyslogDaemon<0x72653cb8>::_Daemon(0x0) + 0xe2
54016 71603828 (+ 48) 0054ac87 <_APP_> SyslogDaemon<0x72653cb8>::_DaemonThread(NULL) + 0x1f
54117 71603858 (+ 48) 00991b1f <libroot.so> _get_next_team_info (nearest) + 0x5f
54218 71603888 (+ 0) 61aae250 <commpage> commpage_thread_exit + 0x00
543kdebug> co
544vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x0, ip 0x800ea026, write 0, user 0, thread 0x190
545PANIC: vm_page_fault: unhandled page fault in kernel space at 0x0, ip 0x800ea026
546
547Welcome to Kernel Debugging Land...
548Thread 400 "a:392:x-vnd.Haiku-FirstBootProm" running on CPU 0
549stack trace for thread 400 "a:392:x-vnd.Haiku-FirstBootProm"
550 kernel stack: 0x824ed000 to 0x824f1000
551 user stack: 0x70529000 to 0x70569000
552frame caller <image>:function + offset
553 0 824f047c (+ 32) 8015065e <kernel_x86> arch_debug_stack_trace + 0x12
554 1 824f049c (+ 16) 800aab33 <kernel_x86> stack_trace_trampoline(NULL) + 0x0b
555 2 824f04ac (+ 12) 80141df2 <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
556 3 824f04b8 (+ 48) 800ac65b <kernel_x86> debug_call_with_fault_handler + 0x5b
557 4 824f04e8 (+ 64) 800aad4f <kernel_x86> kernel_debugger_loop(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
558", 0x824f0594 "", int32: 0) + 0x217
559 5 824f0528 (+ 48) 800ab0cb <kernel_x86> kernel_debugger_internal(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
560", 0x824f0594 "", int32: 0) + 0x53
561 6 824f0558 (+ 48) 800ac9e6 <kernel_x86> panic + 0x3a
562 7 824f0588 (+ 144) 80126825 <kernel_x86> vm_page_fault + 0x145
563 8 824f0618 (+ 80) 80151f2a <kernel_x86> x86_page_fault_exception + 0x1e2
564 9 824f0668 (+ 12) 801447bc <kernel_x86> int_bottom + 0x3c
565kernel iframe at 0x824f0674 (end = 0x824f06c4)
566 eax 0x0 ebx 0x1364c48 ecx 0x0 edx 0xcf58a400
567 esi 0x0 edi 0xcf5369a8 ebp 0x824f06fc esp 0x824f06a8
568 eip 0x800ea026 eflags 0x13282
569 vector: 0xe, error code: 0x0
57010 824f0674 (+ 136) 800ea026 <kernel_x86> _kern_read + 0xee
57111 824f06fc (+ 64) 80162994 <kernel_x86> pread + 0x28
57212 824f073c (+ 64) 81fd908c <packagefs> BFdIO<0xcdae9c48>::ReadAt(int64: 20335688, 0xcf5f0000, uint32: 0x78d3 (30931)) + 0x34
57313 824f077c (+ 80) 80165027 <kernel_x86> BPositionIO<0xcdae9c48>::ReadAtExactly(int64: 20335688, 0xcf5f0000, uint32: 0x78d3 (30931), NULL) + 0x47
57414 824f07cc (+ 64) 81fcf788 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0xcdae3518>::ReadFileData(uint64: 0x1364bf8, 0xcf5f0000, uint32: 0x78d3 (30931)) + 0x3c
57515 824f080c (+ 64) 81fcf678 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0xcdae3518>::ReadAndDecompressChunkData(uint64: 0x1364bf8, uint32: 0x78d3 (30931), uint32: 0x10000 (65536), 0xcf5f0000) + 0x48
57616 824f084c (+ 80) 81fcfe53 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapReader<0xcdae3518>::ReadAndDecompressChunk(uint32: 0x251 (593), 0xcf5f0000) + 0x12b
57717 824f089c (+ 96) 81fcf5b2 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0xcdae3518>::ReadDataToOutput(int64: 38862848, uint32: 0x10000 (65536), BDataIO*: 0x824f0954) + 0x13a
57818 824f08fc (+ 112) 81fad061 <packagefs> CachedDataReader<0xcdae9c14>::_ReadIntoPages(vm_page*: 0x824f0a08, uint32: 0x0 (0), uint32: 0x10 (16)) + 0xc9
57919 824f096c (+ 272) 81faca51 <packagefs> CachedDataReader<0xcdae9c14>::_ReadCacheLine(int64: 38862848, uint32: 0x10000 (65536), int64: 38910518, uint32: 0x1000 (4096), BDataIO*: 0x824f0b74) + 0x871
58020 824f0a7c (+ 96) 81fac1ba <packagefs> CachedDataReader<0xcdae9c14>::ReadDataToOutput(int64: 38910518, uint32: 0x1000 (4096), BDataIO*: 0x824f0b74) + 0x12e
58121 824f0adc (+ 64) 81fceee1 <packagefs> BPackageKit::BHPKG::PackageDataHeapReader<0xcf51bf98>::ReadDataToOutput(int64: 0, uint32: 0x1000 (4096), BDataIO*: 0x824f0b74) + 0x95
58222 824f0b1c (+ 112) 81fb99f9 <packagefs> PackageFile<0xcdb9c150>::Read(IORequest*: 0x824f0c60) + 0x159
58323 824f0b8c (+ 48) 81fc440a <packagefs> UnpackingLeafNode<0xcf19d4e0>::Read(IORequest*: 0x824f0c60) + 0x56
58424 824f0bbc (+ 48) 81faf924 <packagefs> packagefs_io(fs_volume*: 0x83361120, fs_vnode*: 0xcf51ccf0, NULL, IORequest*: 0x824f0c60) + 0x40
58525 824f0bec (+ 64) 80107924 <kernel_x86> vfs_vnode_io + 0x2c
58626 824f0c2c (+ 224) 800fccfd <kernel_x86> vfs_read_pages + 0x69
58727 824f0d0c (+ 80) 8005ac6a <kernel_x86> VMVnodeCache<0xcf54e380>::Read(int64: 0, generic_io_vec*: 0x824f0dcc, uint32: 0x1 (1), uint32: 0x1 (1), 0x824f0dc4) + 0x3a
58828 824f0d5c (+ 128) 80126c92 <kernel_x86> fault_get_page(PageFaultContext&: 0x824f0e78) + 0x2ce
58929 824f0ddc (+ 208) 80127359 <kernel_x86> vm_soft_fault(VMAddressSpace*: 0xcf3ff840, uint32: 0xb6a000, false, false, true) + 0x2b5
59030 824f0eac (+ 160) 80126795 <kernel_x86> vm_page_fault + 0xb5
59131 824f0f4c (+ 80) 80151f2a <kernel_x86> x86_page_fault_exception + 0x1e2
59232 824f0f9c (+ 12) 8014483e <kernel_x86> int_bottom_user + 0x73
593user iframe at 0x824f0fa8 (end = 0x824f1000)
594 eax 0x0 ebx 0x1cbf630 ecx 0x188a72a0 edx 0xb6a004
595 esi 0x0 edi 0x188a72a0 ebp 0x705679a8 esp 0x824f0fdc
596 eip 0x1c2a346 eflags 0x13246 user esp 0x70567990
597 vector: 0xe, error code: 0x4
59833 824f0fa8 (+ 0) 01c2a346 <libfreetype.so.6> FT_Stream_ReadULong + 0x56
59934 705679a8 (+ 80) 01c5f514 <libfreetype.so.6> TT_RunIns (nearest) + 0x214f8
60035 705679f8 (+ 128) 01c5f804 <libfreetype.so.6> TT_RunIns (nearest) + 0x217e8
60136 70567a78 (+ 64) 01c3f513 <libfreetype.so.6> TT_RunIns (nearest) + 0x14f7
60237 70567ab8 (+ 96) 01c23d21 <libfreetype.so.6> FT_Load_Char (nearest) + 0x461
60338 70567b18 (+ 128) 01c24ea9 <libfreetype.so.6> FT_Open_Face (nearest) + 0x1d9
60439 70567b98 (+ 96) 01c23df5 <libfreetype.so.6> FT_New_Face + 0x45
60540 70567bf8 (+ 112) 0132b378 <_APP_> FontManager<0x18480010>::_AddFont(FontManager::font_directory&: 0x18464e30, BEntry&: 0x70567ca4) + 0x94
60641 70567c68 (+ 192) 0132be05 <_APP_> FontManager<0x18480010>::_ScanFontDirectory(FontManager::font_directory&: 0x18464e30) + 0xc9
60742 70567d28 (+ 48) 0132b2c8 <_APP_> FontManager<0x18480010>::_ScanFonts(0x13bfded) + 0x64
60843 70567d58 (+ 48) 0132c244 <_APP_> FontManager<0x18480010>::GetFamily(0x13bfded "Noto Sans CJK JP") + 0x5c
60944 70567d88 (+ 48) 0132c32f <_APP_> FontManager<0x18480010>::GetStyleByIndex(0x13bfded "Noto Sans CJK JP", int32: 0) + 0x23
61045 70567db8 (+ 112) 012f2c00 <_APP_> GlyphLayoutEngine<0x70567ed0>::_WriteLockAndAcquireFallbackEntry(FontCacheReference&: 0x188b6d70, FontCacheEntry*: 0x70568a3c, ServerFont&: 0x12f0000, true, 0x34 "<???>", int32: 1884716744, FontCacheEntry*: 0x70567e94, FontCacheEntry&: 0x13f3a78) + 0xa8
61146 70567e28 (+ 176) 012f0a5c <_APP_> ServerFont<0x70568a3c>::StringWidth(ServerFont: 0x188bb7d0, 0x34 "<???>", int32: 0, escapement_delta*: 0x13f3a78) + 0x25c
61247 70567ed8 (+3168) 012e4fac <_APP_> ServerApp<0x18486ee8>::_DispatchMessage(int32: 79, BPrivate::LinkReceiver&: 0x1845fed0) + 0x32f8
61348 70568b38 (+ 176) 012e90eb <_APP_> ServerApp<0x18486ee8>::_MessageLooper(0x0) + 0x18f
61449 70568be8 (+ 48) 012d96a4 <_APP_> MessageLooper<0x18486ee8>::_message_thread(NULL) + 0x28
61550 70568c18 (+ 48) 01a60b1f <libroot.so> _get_next_team_info (nearest) + 0x5f
61651 70568c48 (+ 0) 61c5f250 <commpage> commpage_thread_exit + 0x00
617kdebug> co
618usb error control pipe 29: vm_soft_fault: va 0x0 not covered by area in address space
619Last message repeated 2 times.
620timeout waiting for queued request to complete
621vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x24, ip 0x80106247, write 0, user 0, thread 0x197
622PANIC: vm_page_fault: unhandled page fault in kernel space at 0x24, ip 0x80106247
623
624Welcome to Kernel Debugging Land...
625Thread 407 "daemon" running on CPU 0
626stack trace for thread 407 "daemon"
627 kernel stack: 0x824c7000 to 0x824cb000
628 user stack: 0x715c4000 to 0x71604000
629frame caller <image>:function + offset
630 0 824cac74 (+ 32) 8015065e <kernel_x86> arch_debug_stack_trace + 0x12
631 1 824cac94 (+ 16) 800aab33 <kernel_x86> stack_trace_trampoline(NULL) + 0x0b
632 2 824caca4 (+ 12) 80141df2 <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
633 3 824cacb0 (+ 48) 800ac65b <kernel_x86> debug_call_with_fault_handler + 0x5b
634 4 824cace0 (+ 64) 800aad4f <kernel_x86> kernel_debugger_loop(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
635", 0x824cad8c "$", int32: 0) + 0x217
636 5 824cad20 (+ 48) 800ab0cb <kernel_x86> kernel_debugger_internal(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
637", 0x824cad8c "$", int32: 0) + 0x53
638 6 824cad50 (+ 48) 800ac9e6 <kernel_x86> panic + 0x3a
639 7 824cad80 (+ 144) 80126825 <kernel_x86> vm_page_fault + 0x145
640 8 824cae10 (+ 80) 80151f2a <kernel_x86> x86_page_fault_exception + 0x1e2
641 9 824cae60 (+ 12) 801447bc <kernel_x86> int_bottom + 0x3c
642kernel iframe at 0x824cae6c (end = 0x824caebc)
643 eax 0xcf54c3f8 ebx 0xcf54c3f8 ecx 0x0 edx 0x0
644 esi 0x801772c8 edi 0xcf588e60 ebp 0x824caf44 esp 0x824caea0
645 eip 0x80106247 eflags 0x13282
646 vector: 0xe, error code: 0x0
64710 824cae6c (+ 216) 80106247 <kernel_x86> _user_read_stat + 0x143
64811 824caf44 (+ 100) 801449bf <kernel_x86> handle_syscall + 0xdc
649user iframe at 0x824cafa8 (end = 0x824cb000)
650 eax 0x95 ebx 0xa3f810 ecx 0x715ff62c edx 0x61aae114
651 esi 0x75 edi 0x71602394 ebp 0x715ff668 esp 0x824cafdc
652 eip 0x61aae114 eflags 0x3202 user esp 0x715ff62c
653 vector: 0x63, error code: 0x0
65412 824cafa8 (+ 0) 61aae114 <commpage> commpage_syscall + 0x04
65513 715ff668 (+ 144) 0054afd1 <_APP_> __tf12SyslogDaemon (nearest) + 0x81
65614 715ff6f8 (+8416) 0054b53d <_APP_> __tf12SyslogDaemon (nearest) + 0x5ed
65715 716017d8 (+8272) 0054ac36 <_APP_> SyslogDaemon<0x72653cb8>::_Daemon(0x0) + 0xe2
65816 71603828 (+ 48) 0054ac87 <_APP_> SyslogDaemon<0x72653cb8>::_DaemonThread(NULL) + 0x1f
65917 71603858 (+ 48) 00991b1f <libroot.so> _get_next_team_info (nearest) + 0x5f
66018 71603888 (+ 0) 61aae250 <commpage> commpage_thread_exit + 0x00
661kdebug> co
662vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x0, ip 0x800ea026, write 0, user 0, thread 0x108
663PANIC: vm_page_fault: unhandled page fault in kernel space at 0x0, ip 0x800ea026
664
665Welcome to Kernel Debugging Land...
666Thread 264 "net_server" running on CPU 0
667stack trace for thread 264 "net_server"
668 kernel stack: 0x81e49000 to 0x81e4d000
669 user stack: 0x705d3000 to 0x715d3000
670frame caller <image>:function + offset
671 0 81e4bda4 (+ 32) 8015065e <kernel_x86> arch_debug_stack_trace + 0x12
672 1 81e4bdc4 (+ 16) 800aab33 <kernel_x86> stack_trace_trampoline(NULL) + 0x0b
673 2 81e4bdd4 (+ 12) 80141df2 <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
674 3 81e4bde0 (+ 48) 800ac65b <kernel_x86> debug_call_with_fault_handler + 0x5b
675 4 81e4be10 (+ 64) 800aad4f <kernel_x86> kernel_debugger_loop(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
676", 0x81e4bebc "", int32: 0) + 0x217
677 5 81e4be50 (+ 48) 800ab0cb <kernel_x86> kernel_debugger_internal(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
678", 0x81e4bebc "", int32: 0) + 0x53
679 6 81e4be80 (+ 48) 800ac9e6 <kernel_x86> panic + 0x3a
680 7 81e4beb0 (+ 144) 80126825 <kernel_x86> vm_page_fault + 0x145
681 8 81e4bf40 (+ 80) 80151f2a <kernel_x86> x86_page_fault_exception + 0x1e2
682 9 81e4bf90 (+ 12) 801447bc <kernel_x86> int_bottom + 0x3c
683kernel iframe at 0x81e4bf9c (end = 0x81e4bfec)
684 eax 0x0 ebx 0x159a8b4 ecx 0x0 edx 0x831f3300
685 esi 0x0 edi 0xcde12e78 ebp 0x81e4c024 esp 0x81e4bfd0
686 eip 0x800ea026 eflags 0x213282
687 vector: 0xe, error code: 0x0
68810 81e4bf9c (+ 136) 800ea026 <kernel_x86> _kern_read + 0xee
68911 81e4c024 (+ 64) 80162994 <kernel_x86> pread + 0x28
69012 81e4c064 (+ 64) 81fd908c <packagefs> BFdIO<0x837896b0>::ReadAt(int64: 22653108, 0xcf4e0000, uint32: 0x693a (26938)) + 0x34
69113 81e4c0a4 (+ 80) 80165027 <kernel_x86> BPositionIO<0x837896b0>::ReadAtExactly(int64: 22653108, 0xcf4e0000, uint32: 0x693a (26938), NULL) + 0x47
69214 81e4c0f4 (+ 64) 81fcf788 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0x83780060>::ReadFileData(uint64: 0x159a864, 0xcf4e0000, uint32: 0x693a (26938)) + 0x3c
69315 81e4c134 (+ 64) 81fcf678 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0x83780060>::ReadAndDecompressChunkData(uint64: 0x159a864, uint32: 0x693a (26938), uint32: 0x10000 (65536), 0xcf4e0000) + 0x48
69416 81e4c174 (+ 80) 81fcfe53 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapReader<0x83780060>::ReadAndDecompressChunk(uint32: 0x3f5 (1013), 0xcf4e0000) + 0x12b
69517 81e4c1c4 (+ 96) 81fcf5b2 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0x83780060>::ReadDataToOutput(int64: 66387968, uint32: 0x10000 (65536), BDataIO*: 0x81e4c27c) + 0x13a
69618 81e4c224 (+ 112) 81fad061 <packagefs> CachedDataReader<0x8378967c>::_ReadIntoPages(vm_page*: 0x81e4c330, uint32: 0x0 (0), uint32: 0x10 (16)) + 0xc9
69719 81e4c294 (+ 272) 81faca51 <packagefs> CachedDataReader<0x8378967c>::_ReadCacheLine(int64: 66387968, uint32: 0x10000 (65536), int64: 66387968, uint32: 0xac67 (44135), BDataIO*: 0x81e4c49c) + 0x871
69820 81e4c3a4 (+ 96) 81fac1ba <packagefs> CachedDataReader<0x8378967c>::ReadDataToOutput(int64: 66387968, uint32: 0xac67 (44135), BDataIO*: 0x81e4c49c) + 0x12e
69921 81e4c404 (+ 64) 81fceee1 <packagefs> BPackageKit::BHPKG::PackageDataHeapReader<0xcf522588>::ReadDataToOutput(int64: 4096, uint32: 0x1d000 (118784), BDataIO*: 0x81e4c49c) + 0x95
70022 81e4c444 (+ 112) 81fb99f9 <packagefs> PackageFile<0xcd872480>::Read(IORequest*: 0x81e4c588) + 0x159
70123 81e4c4b4 (+ 48) 81fc440a <packagefs> UnpackingLeafNode<0xcf16bcc8>::Read(IORequest*: 0x81e4c588) + 0x56
70224 81e4c4e4 (+ 48) 81faf924 <packagefs> packagefs_io(fs_volume*: 0x83361120, fs_vnode*: 0xcf534e40, NULL, IORequest*: 0x81e4c588) + 0x40
70325 81e4c514 (+ 64) 80107924 <kernel_x86> vfs_vnode_io + 0x2c
70426 81e4c554 (+ 224) 800fccfd <kernel_x86> vfs_read_pages + 0x69
70527 81e4c634 (+ 784) 80057ace <kernel_x86> read_into_cache(file_cache_ref*: 0xcf536b88, NULL, int64: 4096, int32: 0, uint32: 0x81c0a000, uint32: 0x1c92b (117035), true, vm_page_reservation*: 0x81e4ca08, uint32: 0x0 (0)) + 0x1ee
70628 81e4c944 (+ 208) 8005900c <kernel_x86> cache_io(0xcf536b88, NULL, int64: 118784, uint32: 0x81c26000, 0x81e4cbfc, false) + 0x714
70729 81e4ca14 (+ 96) 80059a42 <kernel_x86> file_cache_read + 0x36
70830 81e4ca74 (+ 80) 81fb9896 <packagefs> PackageFile<0xcd872480>::Read(int64: 0, 0x81c09000, 0x81e4cbfc) + 0xd2
70931 81e4cac4 (+ 64) 81fc43aa <packagefs> UnpackingLeafNode<0xcf16bcc8>::Read(int64: 0, 0x81c09000, 0x81e4cbfc) + 0x5a
71032 81e4cb04 (+ 64) 81fafef3 <packagefs> packagefs_read(fs_volume*: 0x83361120, fs_vnode*: 0xcf534e40, 0xcf54b100, int64: 0, 0x81c09000, 0x81e4cbfc) + 0x43
71133 81e4cb44 (+ 64) 800feddf <kernel_x86> file_read(file_descriptor*: 0xcf54c758, int64: 0, 0x81c09000, 0x81e4cbfc) + 0x67
71234 81e4cb84 (+ 96) 800ea081 <kernel_x86> _kern_read + 0x149
71335 81e4cbe4 (+ 144) 80061bac <kernel_x86> load_kernel_add_on + 0x464
71436 81e4cc74 (+ 48) 800cb406 <kernel_x86> try_drivers() + 0x7a
71537 81e4cca4 (+ 208) 800cb892 <kernel_x86> probe_for_drivers(0x81e4cdc4 "drivers/dev/net") + 0x426
71638 81e4cd74 (+ 144) 800cc185 <kernel_x86> legacy_driver_probe + 0x18d
71739 81e4ce04 (+ 96) 800c4636 <kernel_x86> scan_for_drivers_if_needed(_GLOBAL_.N._var_lib_buildbot_workers_haiku_haiku_src_system_kernel_device_manager_devfs.cppV2Mczb::devfs_vnode*: 0xcf3d09c8) + 0x122
71840 81e4ce64 (+ 64) 800c669d <kernel_x86> devfs_open_dir(fs_volume*: 0x83166c98, fs_vnode*: 0xcf52c5c0, 0x81e4ced0) + 0x55
71941 81e4cea4 (+ 48) 800fe7ba <kernel_x86> open_dir_vnode(vnode*: 0xcf52c5c0, false) + 0x2e
72042 81e4ced4 (+ 48) 800ff3ac <kernel_x86> dir_open(int32: -1, 0xcf4d4120 "/dev", false) + 0x4c
72143 81e4cf04 (+ 64) 80105044 <kernel_x86> _user_open_dir + 0xbc
72244 81e4cf44 (+ 100) 801449bf <kernel_x86> handle_syscall + 0xdc
723user iframe at 0x81e4cfa8 (end = 0x81e4d000)
724 eax 0x6d ebx 0x1496b44 ecx 0x715d1a9c edx 0x6187b114
725 esi 0x1d463c3 edi 0x715d1cd4 ebp 0x715d1ac8 esp 0x81e4cfdc
726 eip 0x6187b114 eflags 0x203202 user esp 0x715d1a9c
727 vector: 0x63, error code: 0x0
72845 81e4cfa8 (+ 0) 6187b114 <commpage> commpage_syscall + 0x04
72946 715d1ac8 (+ 48) 01387ac1 <libbe.so> __10BDirectoryPCc + 0x55
73047 715d1af8 (+ 560) 01d3b738 <_APP_> NetServer<0x715d2188>::_ConfigureDevices(0x1d463c3 "/dev/net", BMessage*: NULL) + 0x28
73148 715d1d28 (+ 352) 01d3be32 <_APP_> NetServer<0x715d2188>::_BringUpInterfaces(0x2) + 0x26a
73249 715d1e88 (+ 80) 01d391ca <_APP_> NetServer<0x715d2188>::ReadyToRun(0x4) + 0x5e
73350 715d1ed8 (+ 512) 012538b9 <libbe.so> BApplication<0x715d2188>::DispatchMessage(BMessage*: 0x1955eab0, BHandler*: 0x715d2188) + 0x2ed
73451 715d20d8 (+ 64) 0125ff1d <libbe.so> BLooper<0x715d2188>::task_looper(0x715d2188) + 0x211
73552 715d2118 (+ 64) 012523f1 <libbe.so> BApplication<0x715d2188>::Run(0x8) + 0x75
73653 715d2158 (+ 592) 01d3da0f <_APP_> main + 0x93
73754 715d23a8 (+ 48) 01d38aeb <_APP_> _start + 0x5b
73855 715d23d8 (+ 48) 02270e72 </boot/system/runtime_loader@0x0225f000> <unknown> + 0x11e72
73956 715d2408 (+ 0) 6187b250 <commpage> commpage_thread_exit + 0x00
740kdebug> co
741vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x0, ip 0x800ea026, write 0, user 0, thread 0x190
742PANIC: vm_page_fault: unhandled page fault in kernel space at 0x0, ip 0x800ea026
743
744Welcome to Kernel Debugging Land...
745Thread 400 "a:392:x-vnd.Haiku-FirstBootProm" running on CPU 0
746stack trace for thread 400 "a:392:x-vnd.Haiku-FirstBootProm"
747 kernel stack: 0x824ed000 to 0x824f1000
748 user stack: 0x70529000 to 0x70569000
749frame caller <image>:function + offset
750 0 824f047c (+ 32) 8015065e <kernel_x86> arch_debug_stack_trace + 0x12
751 1 824f049c (+ 16) 800aab33 <kernel_x86> stack_trace_trampoline(NULL) + 0x0b
752 2 824f04ac (+ 12) 80141df2 <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
753 3 824f04b8 (+ 48) 800ac65b <kernel_x86> debug_call_with_fault_handler + 0x5b
754 4 824f04e8 (+ 64) 800aad4f <kernel_x86> kernel_debugger_loop(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
755", 0x824f0594 "", int32: 0) + 0x217
756 5 824f0528 (+ 48) 800ab0cb <kernel_x86> kernel_debugger_internal(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
757", 0x824f0594 "", int32: 0) + 0x53
758 6 824f0558 (+ 48) 800ac9e6 <kernel_x86> panic + 0x3a
759 7 824f0588 (+ 144) 80126825 <kernel_x86> vm_page_fault + 0x145
760 8 824f0618 (+ 80) 80151f2a <kernel_x86> x86_page_fault_exception + 0x1e2
761 9 824f0668 (+ 12) 801447bc <kernel_x86> int_bottom + 0x3c
762kernel iframe at 0x824f0674 (end = 0x824f06c4)
763 eax 0x0 ebx 0x1364c48 ecx 0x0 edx 0xcf58a400
764 esi 0x0 edi 0xcf5369a8 ebp 0x824f06fc esp 0x824f06a8
765 eip 0x800ea026 eflags 0x13282
766 vector: 0xe, error code: 0x0
76710 824f0674 (+ 136) 800ea026 <kernel_x86> _kern_read + 0xee
76811 824f06fc (+ 64) 80162994 <kernel_x86> pread + 0x28
76912 824f073c (+ 64) 81fd908c <packagefs> BFdIO<0xcdae9c48>::ReadAt(int64: 20335688, 0xcf5f0000, uint32: 0x78d3 (30931)) + 0x34
77013 824f077c (+ 80) 80165027 <kernel_x86> BPositionIO<0xcdae9c48>::ReadAtExactly(int64: 20335688, 0xcf5f0000, uint32: 0x78d3 (30931), NULL) + 0x47
77114 824f07cc (+ 64) 81fcf788 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0xcdae3518>::ReadFileData(uint64: 0x1364bf8, 0xcf5f0000, uint32: 0x78d3 (30931)) + 0x3c
77215 824f080c (+ 64) 81fcf678 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0xcdae3518>::ReadAndDecompressChunkData(uint64: 0x1364bf8, uint32: 0x78d3 (30931), uint32: 0x10000 (65536), 0xcf5f0000) + 0x48
77316 824f084c (+ 80) 81fcfe53 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapReader<0xcdae3518>::ReadAndDecompressChunk(uint32: 0x251 (593), 0xcf5f0000) + 0x12b
77417 824f089c (+ 96) 81fcf5b2 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0xcdae3518>::ReadDataToOutput(int64: 38862848, uint32: 0x10000 (65536), BDataIO*: 0x824f0954) + 0x13a
77518 824f08fc (+ 112) 81fad061 <packagefs> CachedDataReader<0xcdae9c14>::_ReadIntoPages(vm_page*: 0x824f0a08, uint32: 0x0 (0), uint32: 0x10 (16)) + 0xc9
77619 824f096c (+ 272) 81faca51 <packagefs> CachedDataReader<0xcdae9c14>::_ReadCacheLine(int64: 38862848, uint32: 0x10000 (65536), int64: 38910518, uint32: 0x1000 (4096), BDataIO*: 0x824f0b74) + 0x871
77720 824f0a7c (+ 96) 81fac1ba <packagefs> CachedDataReader<0xcdae9c14>::ReadDataToOutput(int64: 38910518, uint32: 0x1000 (4096), BDataIO*: 0x824f0b74) + 0x12e
77821 824f0adc (+ 64) 81fceee1 <packagefs> BPackageKit::BHPKG::PackageDataHeapReader<0xcf51bf98>::ReadDataToOutput(int64: 0, uint32: 0x1000 (4096), BDataIO*: 0x824f0b74) + 0x95
77922 824f0b1c (+ 112) 81fb99f9 <packagefs> PackageFile<0xcdb9c150>::Read(IORequest*: 0x824f0c60) + 0x159
78023 824f0b8c (+ 48) 81fc440a <packagefs> UnpackingLeafNode<0xcf19d4e0>::Read(IORequest*: 0x824f0c60) + 0x56
78124 824f0bbc (+ 48) 81faf924 <packagefs> packagefs_io(fs_volume*: 0x83361120, fs_vnode*: 0xcf51ccf0, NULL, IORequest*: 0x824f0c60) + 0x40
78225 824f0bec (+ 64) 80107924 <kernel_x86> vfs_vnode_io + 0x2c
78326 824f0c2c (+ 224) 800fccfd <kernel_x86> vfs_read_pages + 0x69
78427 824f0d0c (+ 80) 8005ac6a <kernel_x86> VMVnodeCache<0xcf54e380>::Read(int64: 0, generic_io_vec*: 0x824f0dcc, uint32: 0x1 (1), uint32: 0x1 (1), 0x824f0dc4) + 0x3a
78528 824f0d5c (+ 128) 80126c92 <kernel_x86> fault_get_page(PageFaultContext&: 0x824f0e78) + 0x2ce
78629 824f0ddc (+ 208) 80127359 <kernel_x86> vm_soft_fault(VMAddressSpace*: 0xcf3ff840, uint32: 0xb6a000, false, false, true) + 0x2b5
78730 824f0eac (+ 160) 80126795 <kernel_x86> vm_page_fault + 0xb5
78831 824f0f4c (+ 80) 80151f2a <kernel_x86> x86_page_fault_exception + 0x1e2
78932 824f0f9c (+ 12) 8014483e <kernel_x86> int_bottom_user + 0x73
790user iframe at 0x824f0fa8 (end = 0x824f1000)
791 eax 0x0 ebx 0x1cbf630 ecx 0x188a72a0 edx 0xb6a004
792 esi 0x0 edi 0x188a72a0 ebp 0x705679a8 esp 0x824f0fdc
793 eip 0x1c2a346 eflags 0x13246 user esp 0x70567990
794 vector: 0xe, error code: 0x4
79533 824f0fa8 (+ 0) 01c2a346 <libfreetype.so.6> FT_Stream_ReadULong + 0x56
79634 705679a8 (+ 80) 01c5f514 <libfreetype.so.6> TT_RunIns (nearest) + 0x214f8
79735 705679f8 (+ 128) 01c5f804 <libfreetype.so.6> TT_RunIns (nearest) + 0x217e8
79836 70567a78 (+ 64) 01c3f513 <libfreetype.so.6> TT_RunIns (nearest) + 0x14f7
79937 70567ab8 (+ 96) 01c23d21 <libfreetype.so.6> FT_Load_Char (nearest) + 0x461
80038 70567b18 (+ 128) 01c24ea9 <libfreetype.so.6> FT_Open_Face (nearest) + 0x1d9
80139 70567b98 (+ 96) 01c23df5 <libfreetype.so.6> FT_New_Face + 0x45
80240 70567bf8 (+ 112) 0132b378 <_APP_> FontManager<0x18480010>::_AddFont(FontManager::font_directory&: 0x18464e30, BEntry&: 0x70567ca4) + 0x94
80341 70567c68 (+ 192) 0132be05 <_APP_> FontManager<0x18480010>::_ScanFontDirectory(FontManager::font_directory&: 0x18464e30) + 0xc9
80442 70567d28 (+ 48) 0132b2c8 <_APP_> FontManager<0x18480010>::_ScanFonts(0x13bfded) + 0x64
80543 70567d58 (+ 48) 0132c244 <_APP_> FontManager<0x18480010>::GetFamily(0x13bfded "Noto Sans CJK JP") + 0x5c
80644 70567d88 (+ 48) 0132c32f <_APP_> FontManager<0x18480010>::GetStyleByIndex(0x13bfded "Noto Sans CJK JP", int32: 0) + 0x23
80745 70567db8 (+ 112) 012f2c00 <_APP_> GlyphLayoutEngine<0x70567ed0>::_WriteLockAndAcquireFallbackEntry(FontCacheReference&: 0x188b6d70, FontCacheEntry*: 0x70568a3c, ServerFont&: 0x12f0000, true, 0x34 "<???>", int32: 1884716744, FontCacheEntry*: 0x70567e94, FontCacheEntry&: 0x13f3a78) + 0xa8
80846 70567e28 (+ 176) 012f0a5c <_APP_> ServerFont<0x70568a3c>::StringWidth(ServerFont: 0x188bb7d0, 0x34 "<???>", int32: 0, escapement_delta*: 0x13f3a78) + 0x25c
80947 70567ed8 (+3168) 012e4fac <_APP_> ServerApp<0x18486ee8>::_DispatchMessage(int32: 79, BPrivate::LinkReceiver&: 0x1845fed0) + 0x32f8
81048 70568b38 (+ 176) 012e90eb <_APP_> ServerApp<0x18486ee8>::_MessageLooper(0x0) + 0x18f
81149 70568be8 (+ 48) 012d96a4 <_APP_> MessageLooper<0x18486ee8>::_message_thread(NULL) + 0x28
81250 70568c18 (+ 48) 01a60b1f <libroot.so> _get_next_team_info (nearest) + 0x5f
81351 70568c48 (+ 0) 61c5f250 <commpage> commpage_thread_exit + 0x00
814kdebug> c
815Ambiguous command "c". Use tab completion or enter "help c" get a list of matching commands.
816kdebug> co
817usb error hub 28: vm_soft_fault: va 0x0 not covered by area in address space
818Last message repeated 3 times.
819error updating port status
820vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x24, ip 0x80106247, write 0, user 0, thread 0x197
821PANIC: vm_page_fault: unhandled page fault in kernel space at 0x24, ip 0x80106247
822
823Welcome to Kernel Debugging Land...
824Thread 407 "daemon" running on CPU 0
825stack trace for thread 407 "daemon"
826 kernel stack: 0x824c7000 to 0x824cb000
827 user stack: 0x715c4000 to 0x71604000
828frame caller <image>:function + offset
829 0 824cac74 (+ 32) 8015065e <kernel_x86> arch_debug_stack_trace + 0x12
830 1 824cac94 (+ 16) 800aab33 <kernel_x86> stack_trace_trampoline(NULL) + 0x0b
831 2 824caca4 (+ 12) 80141df2 <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
832 3 824cacb0 (+ 48) 800ac65b <kernel_x86> debug_call_with_fault_handler + 0x5b
833 4 824cace0 (+ 64) 800aad4f <kernel_x86> kernel_debugger_loop(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
834", 0x824cad8c "$", int32: 0) + 0x217
835 5 824cad20 (+ 48) 800ab0cb <kernel_x86> kernel_debugger_internal(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
836", 0x824cad8c "$", int32: 0) + 0x53
837 6 824cad50 (+ 48) 800ac9e6 <kernel_x86> panic + 0x3a
838 7 824cad80 (+ 144) 80126825 <kernel_x86> vm_page_fault + 0x145
839 8 824cae10 (+ 80) 80151f2a <kernel_x86> x86_page_fault_exception + 0x1e2
840 9 824cae60 (+ 12) 801447bc <kernel_x86> int_bottom + 0x3c
841kernel iframe at 0x824cae6c (end = 0x824caebc)
842 eax 0xcf54c3f8 ebx 0xcf54c3f8 ecx 0x0 edx 0x0
843 esi 0x801772c8 edi 0xcf588e60 ebp 0x824caf44 esp 0x824caea0
844 eip 0x80106247 eflags 0x13282
845 vector: 0xe, error code: 0x0
84610 824cae6c (+ 216) 80106247 <kernel_x86> _user_read_stat + 0x143
84711 824caf44 (+ 100) 801449bf <kernel_x86> handle_syscall + 0xdc
848user iframe at 0x824cafa8 (end = 0x824cb000)
849 eax 0x95 ebx 0xa3f810 ecx 0x715ff62c edx 0x61aae114
850 esi 0x75 edi 0x71602394 ebp 0x715ff668 esp 0x824cafdc
851 eip 0x61aae114 eflags 0x3202 user esp 0x715ff62c
852 vector: 0x63, error code: 0x0
85312 824cafa8 (+ 0) 61aae114 <commpage> commpage_syscall + 0x04
85413 715ff668 (+ 144) 0054afd1 <_APP_> __tf12SyslogDaemon (nearest) + 0x81
85514 715ff6f8 (+8416) 0054b53d <_APP_> __tf12SyslogDaemon (nearest) + 0x5ed
85615 716017d8 (+8272) 0054ac36 <_APP_> SyslogDaemon<0x72653cb8>::_Daemon(0x0) + 0xe2
85716 71603828 (+ 48) 0054ac87 <_APP_> SyslogDaemon<0x72653cb8>::_DaemonThread(NULL) + 0x1f
85817 71603858 (+ 48) 00991b1f <libroot.so> _get_next_team_info (nearest) + 0x5f
85918 71603888 (+ 0) 61aae250 <commpage> commpage_thread_exit + 0x00
860kdebug> co
861vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x0, ip 0x800ea026, write 0, user 0, thread 0x190
862PANIC: vm_page_fault: unhandled page fault in kernel space at 0x0, ip 0x800ea026
863
864Welcome to Kernel Debugging Land...
865Thread 400 "a:392:x-vnd.Haiku-FirstBootProm" running on CPU 0
866stack trace for thread 400 "a:392:x-vnd.Haiku-FirstBootProm"
867 kernel stack: 0x824ed000 to 0x824f1000
868 user stack: 0x70529000 to 0x70569000
869frame caller <image>:function + offset
870 0 824f047c (+ 32) 8015065e <kernel_x86> arch_debug_stack_trace + 0x12
871 1 824f049c (+ 16) 800aab33 <kernel_x86> stack_trace_trampoline(NULL) + 0x0b
872 2 824f04ac (+ 12) 80141df2 <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
873 3 824f04b8 (+ 48) 800ac65b <kernel_x86> debug_call_with_fault_handler + 0x5b
874 4 824f04e8 (+ 64) 800aad4f <kernel_x86> kernel_debugger_loop(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
875", 0x824f0594 "", int32: 0) + 0x217
876 5 824f0528 (+ 48) 800ab0cb <kernel_x86> kernel_debugger_internal(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
877", 0x824f0594 "", int32: 0) + 0x53
878 6 824f0558 (+ 48) 800ac9e6 <kernel_x86> panic + 0x3a
879 7 824f0588 (+ 144) 80126825 <kernel_x86> vm_page_fault + 0x145
880 8 824f0618 (+ 80) 80151f2a <kernel_x86> x86_page_fault_exception + 0x1e2
881 9 824f0668 (+ 12) 801447bc <kernel_x86> int_bottom + 0x3c
882kernel iframe at 0x824f0674 (end = 0x824f06c4)
883 eax 0x0 ebx 0x1364c48 ecx 0x0 edx 0xcf58a400
884 esi 0x0 edi 0xcf5369a8 ebp 0x824f06fc esp 0x824f06a8
885 eip 0x800ea026 eflags 0x13282
886 vector: 0xe, error code: 0x0
88710 824f0674 (+ 136) 800ea026 <kernel_x86> _kern_read + 0xee
88811 824f06fc (+ 64) 80162994 <kernel_x86> pread + 0x28
88912 824f073c (+ 64) 81fd908c <packagefs> BFdIO<0xcdae9c48>::ReadAt(int64: 20335688, 0xcf5f0000, uint32: 0x78d3 (30931)) + 0x34
89013 824f077c (+ 80) 80165027 <kernel_x86> BPositionIO<0xcdae9c48>::ReadAtExactly(int64: 20335688, 0xcf5f0000, uint32: 0x78d3 (30931), NULL) + 0x47
89114 824f07cc (+ 64) 81fcf788 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0xcdae3518>::ReadFileData(uint64: 0x1364bf8, 0xcf5f0000, uint32: 0x78d3 (30931)) + 0x3c
89215 824f080c (+ 64) 81fcf678 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0xcdae3518>::ReadAndDecompressChunkData(uint64: 0x1364bf8, uint32: 0x78d3 (30931), uint32: 0x10000 (65536), 0xcf5f0000) + 0x48
89316 824f084c (+ 80) 81fcfe53 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapReader<0xcdae3518>::ReadAndDecompressChunk(uint32: 0x251 (593), 0xcf5f0000) + 0x12b
89417 824f089c (+ 96) 81fcf5b2 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0xcdae3518>::ReadDataToOutput(int64: 38862848, uint32: 0x10000 (65536), BDataIO*: 0x824f0954) + 0x13a
89518 824f08fc (+ 112) 81fad061 <packagefs> CachedDataReader<0xcdae9c14>::_ReadIntoPages(vm_page*: 0x824f0a08, uint32: 0x0 (0), uint32: 0x10 (16)) + 0xc9
89619 824f096c (+ 272) 81faca51 <packagefs> CachedDataReader<0xcdae9c14>::_ReadCacheLine(int64: 38862848, uint32: 0x10000 (65536), int64: 38910518, uint32: 0x1000 (4096), BDataIO*: 0x824f0b74) + 0x871
89720 824f0a7c (+ 96) 81fac1ba <packagefs> CachedDataReader<0xcdae9c14>::ReadDataToOutput(int64: 38910518, uint32: 0x1000 (4096), BDataIO*: 0x824f0b74) + 0x12e
89821 824f0adc (+ 64) 81fceee1 <packagefs> BPackageKit::BHPKG::PackageDataHeapReader<0xcf51bf98>::ReadDataToOutput(int64: 0, uint32: 0x1000 (4096), BDataIO*: 0x824f0b74) + 0x95
89922 824f0b1c (+ 112) 81fb99f9 <packagefs> PackageFile<0xcdb9c150>::Read(IORequest*: 0x824f0c60) + 0x159
90023 824f0b8c (+ 48) 81fc440a <packagefs> UnpackingLeafNode<0xcf19d4e0>::Read(IORequest*: 0x824f0c60) + 0x56
90124 824f0bbc (+ 48) 81faf924 <packagefs> packagefs_io(fs_volume*: 0x83361120, fs_vnode*: 0xcf51ccf0, NULL, IORequest*: 0x824f0c60) + 0x40
90225 824f0bec (+ 64) 80107924 <kernel_x86> vfs_vnode_io + 0x2c
90326 824f0c2c (+ 224) 800fccfd <kernel_x86> vfs_read_pages + 0x69
90427 824f0d0c (+ 80) 8005ac6a <kernel_x86> VMVnodeCache<0xcf54e380>::Read(int64: 0, generic_io_vec*: 0x824f0dcc, uint32: 0x1 (1), uint32: 0x1 (1), 0x824f0dc4) + 0x3a
90528 824f0d5c (+ 128) 80126c92 <kernel_x86> fault_get_page(PageFaultContext&: 0x824f0e78) + 0x2ce
90629 824f0ddc (+ 208) 80127359 <kernel_x86> vm_soft_fault(VMAddressSpace*: 0xcf3ff840, uint32: 0xb6a000, false, false, true) + 0x2b5
90730 824f0eac (+ 160) 80126795 <kernel_x86> vm_page_fault + 0xb5
90831 824f0f4c (+ 80) 80151f2a <kernel_x86> x86_page_fault_exception + 0x1e2
90932 824f0f9c (+ 12) 8014483e <kernel_x86> int_bottom_user + 0x73
910user iframe at 0x824f0fa8 (end = 0x824f1000)
911 eax 0x0 ebx 0x1cbf630 ecx 0x188a72a0 edx 0xb6a004
912 esi 0x0 edi 0x188a72a0 ebp 0x705679a8 esp 0x824f0fdc
913 eip 0x1c2a346 eflags 0x13246 user esp 0x70567990
914 vector: 0xe, error code: 0x4
91533 824f0fa8 (+ 0) 01c2a346 <libfreetype.so.6> FT_Stream_ReadULong + 0x56
91634 705679a8 (+ 80) 01c5f514 <libfreetype.so.6> TT_RunIns (nearest) + 0x214f8
91735 705679f8 (+ 128) 01c5f804 <libfreetype.so.6> TT_RunIns (nearest) + 0x217e8
91836 70567a78 (+ 64) 01c3f513 <libfreetype.so.6> TT_RunIns (nearest) + 0x14f7
91937 70567ab8 (+ 96) 01c23d21 <libfreetype.so.6> FT_Load_Char (nearest) + 0x461
92038 70567b18 (+ 128) 01c24ea9 <libfreetype.so.6> FT_Open_Face (nearest) + 0x1d9
92139 70567b98 (+ 96) 01c23df5 <libfreetype.so.6> FT_New_Face + 0x45
92240 70567bf8 (+ 112) 0132b378 <_APP_> FontManager<0x18480010>::_AddFont(FontManager::font_directory&: 0x18464e30, BEntry&: 0x70567ca4) + 0x94
92341 70567c68 (+ 192) 0132be05 <_APP_> FontManager<0x18480010>::_ScanFontDirectory(FontManager::font_directory&: 0x18464e30) + 0xc9
92442 70567d28 (+ 48) 0132b2c8 <_APP_> FontManager<0x18480010>::_ScanFonts(0x13bfded) + 0x64
92543 70567d58 (+ 48) 0132c244 <_APP_> FontManager<0x18480010>::GetFamily(0x13bfded "Noto Sans CJK JP") + 0x5c
92644 70567d88 (+ 48) 0132c32f <_APP_> FontManager<0x18480010>::GetStyleByIndex(0x13bfded "Noto Sans CJK JP", int32: 0) + 0x23
92745 70567db8 (+ 112) 012f2c00 <_APP_> GlyphLayoutEngine<0x70567ed0>::_WriteLockAndAcquireFallbackEntry(FontCacheReference&: 0x188b6d70, FontCacheEntry*: 0x70568a3c, ServerFont&: 0x12f0000, true, 0x34 "<???>", int32: 1884716744, FontCacheEntry*: 0x70567e94, FontCacheEntry&: 0x13f3a78) + 0xa8
92846 70567e28 (+ 176) 012f0a5c <_APP_> ServerFont<0x70568a3c>::StringWidth(ServerFont: 0x188bb7d0, 0x34 "<???>", int32: 0, escapement_delta*: 0x13f3a78) + 0x25c
92947 70567ed8 (+3168) 012e4fac <_APP_> ServerApp<0x18486ee8>::_DispatchMessage(int32: 79, BPrivate::LinkReceiver&: 0x1845fed0) + 0x32f8
93048 70568b38 (+ 176) 012e90eb <_APP_> ServerApp<0x18486ee8>::_MessageLooper(0x0) + 0x18f
93149 70568be8 (+ 48) 012d96a4 <_APP_> MessageLooper<0x18486ee8>::_message_thread(NULL) + 0x28
93250 70568c18 (+ 48) 01a60b1f <libroot.so> _get_next_team_info (nearest) + 0x5f
93351 70568c48 (+ 0) 61c5f250 <commpage> commpage_thread_exit + 0x00
934kdebug> co
935vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x0, ip 0x800ea026, write 0, user 0, thread 0x108
936PANIC: vm_page_fault: unhandled page fault in kernel space at 0x0, ip 0x800ea026
937
938Welcome to Kernel Debugging Land...
939Thread 264 "net_server" running on CPU 0
940stack trace for thread 264 "net_server"
941 kernel stack: 0x81e49000 to 0x81e4d000
942 user stack: 0x705d3000 to 0x715d3000
943frame caller <image>:function + offset
944 0 81e4bda4 (+ 32) 8015065e <kernel_x86> arch_debug_stack_trace + 0x12
945 1 81e4bdc4 (+ 16) 800aab33 <kernel_x86> stack_trace_trampoline(NULL) + 0x0b
946 2 81e4bdd4 (+ 12) 80141df2 <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
947 3 81e4bde0 (+ 48) 800ac65b <kernel_x86> debug_call_with_fault_handler + 0x5b
948 4 81e4be10 (+ 64) 800aad4f <kernel_x86> kernel_debugger_loop(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
949", 0x81e4bebc "", int32: 0) + 0x217
950 5 81e4be50 (+ 48) 800ab0cb <kernel_x86> kernel_debugger_internal(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
951", 0x81e4bebc "", int32: 0) + 0x53
952 6 81e4be80 (+ 48) 800ac9e6 <kernel_x86> panic + 0x3a
953 7 81e4beb0 (+ 144) 80126825 <kernel_x86> vm_page_fault + 0x145
954 8 81e4bf40 (+ 80) 80151f2a <kernel_x86> x86_page_fault_exception + 0x1e2
955 9 81e4bf90 (+ 12) 801447bc <kernel_x86> int_bottom + 0x3c
956kernel iframe at 0x81e4bf9c (end = 0x81e4bfec)
957 eax 0x0 ebx 0x159a8b4 ecx 0x0 edx 0x831f3300
958 esi 0x0 edi 0xcde12e78 ebp 0x81e4c024 esp 0x81e4bfd0
959 eip 0x800ea026 eflags 0x213282
960 vector: 0xe, error code: 0x0
96110 81e4bf9c (+ 136) 800ea026 <kernel_x86> _kern_read + 0xee
96211 81e4c024 (+ 64) 80162994 <kernel_x86> pread + 0x28
96312 81e4c064 (+ 64) 81fd908c <packagefs> BFdIO<0x837896b0>::ReadAt(int64: 22653108, 0xcf4e0000, uint32: 0x693a (26938)) + 0x34
96413 81e4c0a4 (+ 80) 80165027 <kernel_x86> BPositionIO<0x837896b0>::ReadAtExactly(int64: 22653108, 0xcf4e0000, uint32: 0x693a (26938), NULL) + 0x47
96514 81e4c0f4 (+ 64) 81fcf788 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0x83780060>::ReadFileData(uint64: 0x159a864, 0xcf4e0000, uint32: 0x693a (26938)) + 0x3c
96615 81e4c134 (+ 64) 81fcf678 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0x83780060>::ReadAndDecompressChunkData(uint64: 0x159a864, uint32: 0x693a (26938), uint32: 0x10000 (65536), 0xcf4e0000) + 0x48
96716 81e4c174 (+ 80) 81fcfe53 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapReader<0x83780060>::ReadAndDecompressChunk(uint32: 0x3f5 (1013), 0xcf4e0000) + 0x12b
96817 81e4c1c4 (+ 96) 81fcf5b2 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0x83780060>::ReadDataToOutput(int64: 66387968, uint32: 0x10000 (65536), BDataIO*: 0x81e4c27c) + 0x13a
96918 81e4c224 (+ 112) 81fad061 <packagefs> CachedDataReader<0x8378967c>::_ReadIntoPages(vm_page*: 0x81e4c330, uint32: 0x0 (0), uint32: 0x10 (16)) + 0xc9
97019 81e4c294 (+ 272) 81faca51 <packagefs> CachedDataReader<0x8378967c>::_ReadCacheLine(int64: 66387968, uint32: 0x10000 (65536), int64: 66387968, uint32: 0xac67 (44135), BDataIO*: 0x81e4c49c) + 0x871
97120 81e4c3a4 (+ 96) 81fac1ba <packagefs> CachedDataReader<0x8378967c>::ReadDataToOutput(int64: 66387968, uint32: 0xac67 (44135), BDataIO*: 0x81e4c49c) + 0x12e
97221 81e4c404 (+ 64) 81fceee1 <packagefs> BPackageKit::BHPKG::PackageDataHeapReader<0xcf522588>::ReadDataToOutput(int64: 4096, uint32: 0x1d000 (118784), BDataIO*: 0x81e4c49c) + 0x95
97322 81e4c444 (+ 112) 81fb99f9 <packagefs> PackageFile<0xcd872480>::Read(IORequest*: 0x81e4c588) + 0x159
97423 81e4c4b4 (+ 48) 81fc440a <packagefs> UnpackingLeafNode<0xcf16bcc8>::Read(IORequest*: 0x81e4c588) + 0x56
97524 81e4c4e4 (+ 48) 81faf924 <packagefs> packagefs_io(fs_volume*: 0x83361120, fs_vnode*: 0xcf534e40, NULL, IORequest*: 0x81e4c588) + 0x40
97625 81e4c514 (+ 64) 80107924 <kernel_x86> vfs_vnode_io + 0x2c
97726 81e4c554 (+ 224) 800fccfd <kernel_x86> vfs_read_pages + 0x69
97827 81e4c634 (+ 784) 80057ace <kernel_x86> read_into_cache(file_cache_ref*: 0xcf536b88, NULL, int64: 4096, int32: 0, uint32: 0x81c0a000, uint32: 0x1c92b (117035), true, vm_page_reservation*: 0x81e4ca08, uint32: 0x0 (0)) + 0x1ee
97928 81e4c944 (+ 208) 8005900c <kernel_x86> cache_io(0xcf536b88, NULL, int64: 118784, uint32: 0x81c26000, 0x81e4cbfc, false) + 0x714
98029 81e4ca14 (+ 96) 80059a42 <kernel_x86> file_cache_read + 0x36
98130 81e4ca74 (+ 80) 81fb9896 <packagefs> PackageFile<0xcd872480>::Read(int64: 0, 0x81c09000, 0x81e4cbfc) + 0xd2
98231 81e4cac4 (+ 64) 81fc43aa <packagefs> UnpackingLeafNode<0xcf16bcc8>::Read(int64: 0, 0x81c09000, 0x81e4cbfc) + 0x5a
98332 81e4cb04 (+ 64) 81fafef3 <packagefs> packagefs_read(fs_volume*: 0x83361120, fs_vnode*: 0xcf534e40, 0xcf54b100, int64: 0, 0x81c09000, 0x81e4cbfc) + 0x43
98433 81e4cb44 (+ 64) 800feddf <kernel_x86> file_read(file_descriptor*: 0xcf54c758, int64: 0, 0x81c09000, 0x81e4cbfc) + 0x67
98534 81e4cb84 (+ 96) 800ea081 <kernel_x86> _kern_read + 0x149
98635 81e4cbe4 (+ 144) 80061bac <kernel_x86> load_kernel_add_on + 0x464
98736 81e4cc74 (+ 48) 800cb406 <kernel_x86> try_drivers() + 0x7a
98837 81e4cca4 (+ 208) 800cb892 <kernel_x86> probe_for_drivers(0x81e4cdc4 "drivers/dev/net") + 0x426
98938 81e4cd74 (+ 144) 800cc185 <kernel_x86> legacy_driver_probe + 0x18d
99039 81e4ce04 (+ 96) 800c4636 <kernel_x86> scan_for_drivers_if_needed(_GLOBAL_.N._var_lib_buildbot_workers_haiku_haiku_src_system_kernel_device_manager_devfs.cppV2Mczb::devfs_vnode*: 0xcf3d09c8) + 0x122
99140 81e4ce64 (+ 64) 800c669d <kernel_x86> devfs_open_dir(fs_volume*: 0x83166c98, fs_vnode*: 0xcf52c5c0, 0x81e4ced0) + 0x55
99241 81e4cea4 (+ 48) 800fe7ba <kernel_x86> open_dir_vnode(vnode*: 0xcf52c5c0, false) + 0x2e
99342 81e4ced4 (+ 48) 800ff3ac <kernel_x86> dir_open(int32: -1, 0xcf4d4120 "/dev", false) + 0x4c
99443 81e4cf04 (+ 64) 80105044 <kernel_x86> _user_open_dir + 0xbc
99544 81e4cf44 (+ 100) 801449bf <kernel_x86> handle_syscall + 0xdc
996user iframe at 0x81e4cfa8 (end = 0x81e4d000)
997 eax 0x6d ebx 0x1496b44 ecx 0x715d1a9c edx 0x6187b114
998 esi 0x1d463c3 edi 0x715d1cd4 ebp 0x715d1ac8 esp 0x81e4cfdc
999 eip 0x6187b114 eflags 0x203202 user esp 0x715d1a9c
1000 vector: 0x63, error code: 0x0
100145 81e4cfa8 (+ 0) 6187b114 <commpage> commpage_syscall + 0x04
100246 715d1ac8 (+ 48) 01387ac1 <libbe.so> __10BDirectoryPCc + 0x55
100347 715d1af8 (+ 560) 01d3b738 <_APP_> NetServer<0x715d2188>::_ConfigureDevices(0x1d463c3 "/dev/net", BMessage*: NULL) + 0x28
100448 715d1d28 (+ 352) 01d3be32 <_APP_> NetServer<0x715d2188>::_BringUpInterfaces(0x2) + 0x26a
100549 715d1e88 (+ 80) 01d391ca <_APP_> NetServer<0x715d2188>::ReadyToRun(0x4) + 0x5e
100650 715d1ed8 (+ 512) 012538b9 <libbe.so> BApplication<0x715d2188>::DispatchMessage(BMessage*: 0x1955eab0, BHandler*: 0x715d2188) + 0x2ed
100751 715d20d8 (+ 64) 0125ff1d <libbe.so> BLooper<0x715d2188>::task_looper(0x715d2188) + 0x211
100852 715d2118 (+ 64) 012523f1 <libbe.so> BApplication<0x715d2188>::Run(0x8) + 0x75
100953 715d2158 (+ 592) 01d3da0f <_APP_> main + 0x93
101054 715d23a8 (+ 48) 01d38aeb <_APP_> _start + 0x5b
101155 715d23d8 (+ 48) 02270e72 </boot/system/runtime_loader@0x0225f000> <unknown> + 0x11e72
101256 715d2408 (+ 0) 6187b250 <commpage> commpage_thread_exit + 0x00
1013kdebug> co
1014vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x0, ip 0x800ea026, write 0, user 0, thread 0x17d
1015PANIC: vm_page_fault: unhandled page fault in kernel space at 0x0, ip 0x800ea026
1016
1017Welcome to Kernel Debugging Land...
1018Thread 381 "notify" running on CPU 0
1019stack trace for thread 381 "notify"
1020 kernel stack: 0x8247f000 to 0x82483000
1021 user stack: 0x70bb9000 to 0x71bb9000
1022frame caller <image>:function + offset
1023 0 824820e4 (+ 32) 8015065e <kernel_x86> arch_debug_stack_trace + 0x12
1024 1 82482104 (+ 16) 800aab33 <kernel_x86> stack_trace_trampoline(NULL) + 0x0b
1025 2 82482114 (+ 12) 80141df2 <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
1026 3 82482120 (+ 48) 800ac65b <kernel_x86> debug_call_with_fault_handler + 0x5b
1027 4 82482150 (+ 64) 800aad4f <kernel_x86> kernel_debugger_loop(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
1028", 0x824821fc "", int32: 0) + 0x217
1029 5 82482190 (+ 48) 800ab0cb <kernel_x86> kernel_debugger_internal(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
1030", 0x824821fc "", int32: 0) + 0x53
1031 6 824821c0 (+ 48) 800ac9e6 <kernel_x86> panic + 0x3a
1032 7 824821f0 (+ 144) 80126825 <kernel_x86> vm_page_fault + 0x145
1033 8 82482280 (+ 80) 80151f2a <kernel_x86> x86_page_fault_exception + 0x1e2
1034 9 824822d0 (+ 12) 801447bc <kernel_x86> int_bottom + 0x3c
1035kernel iframe at 0x824822dc (end = 0x8248232c)
1036 eax 0x0 ebx 0x1c794a1 ecx 0x0 edx 0xcf58e401
1037 esi 0x0 edi 0xcde12e78 ebp 0x82482364 esp 0x82482310
1038 eip 0x800ea026 eflags 0x13282
1039 vector: 0xe, error code: 0x0
104010 824822dc (+ 136) 800ea026 <kernel_x86> _kern_read + 0xee
104111 82482364 (+ 64) 80162994 <kernel_x86> pread + 0x28
104212 824823a4 (+ 64) 81fd908c <packagefs> BFdIO<0x837896b0>::ReadAt(int64: 29856929, 0xcf790000, uint32: 0x6b20 (27424)) + 0x34
104313 824823e4 (+ 80) 80165027 <kernel_x86> BPositionIO<0x837896b0>::ReadAtExactly(int64: 29856929, 0xcf790000, uint32: 0x6b20 (27424), NULL) + 0x47
104414 82482434 (+ 64) 81fcf788 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0x83780060>::ReadFileData(uint64: 0x1c79451, 0xcf790000, uint32: 0x6b20 (27424)) + 0x3c
104515 82482474 (+ 64) 81fcf678 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0x83780060>::ReadAndDecompressChunkData(uint64: 0x1c79451, uint32: 0x6b20 (27424), uint32: 0x10000 (65536), 0xcf790000) + 0x48
104616 824824b4 (+ 80) 81fcfe53 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapReader<0x83780060>::ReadAndDecompressChunk(uint32: 0x515 (1301), 0xcf790000) + 0x12b
104717 82482504 (+ 96) 81fcf5b2 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0x83780060>::ReadDataToOutput(int64: 85262336, uint32: 0x10000 (65536), BDataIO*: 0x824825bc) + 0x13a
104818 82482564 (+ 112) 81fad061 <packagefs> CachedDataReader<0x8378967c>::_ReadIntoPages(vm_page*: 0x82482670, uint32: 0x0 (0), uint32: 0x10 (16)) + 0xc9
104919 824825d4 (+ 272) 81faca51 <packagefs> CachedDataReader<0x8378967c>::_ReadCacheLine(int64: 85262336, uint32: 0x10000 (65536), int64: 85262336, uint32: 0x504 (1284), BDataIO*: 0x824827dc) + 0x871
105020 824826e4 (+ 96) 81fac1ba <packagefs> CachedDataReader<0x8378967c>::ReadDataToOutput(int64: 85262336, uint32: 0x504 (1284), BDataIO*: 0x824827dc) + 0x12e
105121 82482744 (+ 64) 81fceee1 <packagefs> BPackageKit::BHPKG::PackageDataHeapReader<0xcf51be18>::ReadDataToOutput(int64: 0, uint32: 0x1000 (4096), BDataIO*: 0x824827dc) + 0x95
105222 82482784 (+ 112) 81fb99f9 <packagefs> PackageFile<0xcd8f9950>::Read(IORequest*: 0x824828c8) + 0x159
105323 824827f4 (+ 48) 81fc440a <packagefs> UnpackingLeafNode<0xcf1609c8>::Read(IORequest*: 0x824828c8) + 0x56
105424 82482824 (+ 48) 81faf924 <packagefs> packagefs_io(fs_volume*: 0x83361120, fs_vnode*: 0xcf51c750, NULL, IORequest*: 0x824828c8) + 0x40
105525 82482854 (+ 64) 80107924 <kernel_x86> vfs_vnode_io + 0x2c
105626 82482894 (+ 224) 800fccfd <kernel_x86> vfs_read_pages + 0x69
105727 82482974 (+ 784) 80057ace <kernel_x86> read_into_cache(file_cache_ref*: 0xcf54c248, NULL, int64: 0, int32: 0, uint32: 0x71bb6814, uint32: 0x34 (52), true, vm_page_reservation*: 0x82482d48, uint32: 0x0 (0)) + 0x1ee
105828 82482c84 (+ 208) 8005900c <kernel_x86> cache_io(0xcf54c248, NULL, int64: 0, uint32: 0x71bb6814, 0x82482f2c, false) + 0x714
105929 82482d54 (+ 96) 80059a42 <kernel_x86> file_cache_read + 0x36
106030 82482db4 (+ 80) 81fb9896 <packagefs> PackageFile<0xcd8f9950>::Read(int64: 0, 0x71bb6814, 0x82482f2c) + 0xd2
106131 82482e04 (+ 64) 81fc43aa <packagefs> UnpackingLeafNode<0xcf1609c8>::Read(int64: 0, 0x71bb6814, 0x82482f2c) + 0x5a
106232 82482e44 (+ 64) 81fafef3 <packagefs> packagefs_read(fs_volume*: 0x83361120, fs_vnode*: 0xcf51c750, 0xcf3e1c40, int64: 0, 0x71bb6814, 0x82482f2c) + 0x43
106333 82482e84 (+ 64) 800feddf <kernel_x86> file_read(file_descriptor*: 0xcf54c1e8, int64: 0, 0x71bb6814, 0x82482f2c) + 0x67
106434 82482ec4 (+ 80) 800e95e5 <kernel_x86> common_user_io(int32: 8, int64: 0, 0x71bb6814, uint32: 0x34 (52), false) + 0x185
106535 82482f14 (+ 48) 800e9ab0 <kernel_x86> _user_read + 0x28
106636 82482f44 (+ 100) 801449bf <kernel_x86> handle_syscall + 0xdc
1067user iframe at 0x82482fa8 (end = 0x82483000)
1068 eax 0x8e ebx 0x208a51c ecx 0x71bb67bc edx 0x63dd5114
1069 esi 0x71bb7848 edi 0x184d1e90 ebp 0x71bb7c48 esp 0x82482fdc
1070 eip 0x63dd5114 eflags 0x3202 user esp 0x71bb67bc
1071 vector: 0x63, error code: 0x0
107237 82482fa8 (+ 0) 63dd5114 <commpage> commpage_syscall + 0x04
107338 71bb7c48 (+ 80) 02074aa5 </boot/system/runtime_loader@0x0206b000> <unknown> + 0x9aa5
107439 71bb7c98 (+ 48) 02078a66 </boot/system/runtime_loader@0x0206b000> <unknown> + 0xda66
107540 71bb7cc8 (+ 48) 016eb09c <libroot.so> load_add_on + 0x2c
107641 71bb7cf8 (+ 320) 0061289e <libtranslation.so> BTranslatorRoster::Private<0x184e8ca0>::CreateTranslators(entry_ref&: 0x71bb7eb0, 0x71bb7e70, BMessage*: NULL) + 0x13e
107742 71bb7e38 (+ 240) 00612062 <libtranslation.so> BTranslatorRoster::Private<0x184e8ca0>::AddPath(0x184cfbc0 "/boot/system/add-ons/Translators", NULL) + 0x222
107843 71bb7f28 (+ 112) 00611c96 <libtranslation.so> BTranslatorRoster::Private<0x184e8ca0>::AddDefaultPaths(0x184cfec0) + 0xce
107944 71bb7f98 (+ 48) 006159cc <libtranslation.so> BTranslatorRoster<0x184cfec0>::AddTranslators(0x0 "<NULL>") + 0x50
108045 71bb7fc8 (+ 48) 00615915 <libtranslation.so> BTranslatorRoster<0x61d8cc>::Default(0x71bb80b0) + 0xd5
108146 71bb7ff8 (+ 128) 0060ee9f <libtranslation.so> BTranslationUtils<0x71bb80e0>::GetBitmap(BPositionIO*: NULL, BTranslatorRoster*: NULL) + 0x27
108247 71bb8078 (+ 160) 0060ee0b <libtranslation.so> BTranslationUtils<0x71bb8654>::GetBitmap(entry_ref*: NULL, BTranslatorRoster*: 0x71bb81e4) + 0x5b
108348 71bb8118 (+ 128) 019d03eb <_APP_> NotifyApp<0x71bb8528>::_GetBitmap(NotifyApp: 0x71bb8654, entry_ref*: 0x1f0) + 0x23
108449 71bb8198 (+ 224) 019d071a <_APP_> NotifyApp<0x71bb8528>::ReadyToRun(0x184c7ab0) + 0x166
108550 71bb8278 (+ 512) 01c858b9 <libbe.so> BApplication<0x71bb8528>::DispatchMessage(BMessage*: 0x184c7b00, BHandler*: 0x71bb8528) + 0x2ed
108651 71bb8478 (+ 64) 01c91f1d <libbe.so> BLooper<0x71bb8528>::task_looper(0x14) + 0x211
108752 71bb84b8 (+ 64) 01c843f1 <libbe.so> BApplication<0x71bb8528>::Run(0x0) + 0x75
108853 71bb84f8 (+ 400) 019d0a33 <_APP_> main + 0x5b
108954 71bb8688 (+ 48) 019cf7bb <_APP_> _start + 0x5b
109055 71bb86b8 (+ 48) 0207ce72 </boot/system/runtime_loader@0x0206b000> <unknown> + 0x11e72
109156 71bb86e8 (+ 0) 63dd5250 <commpage> commpage_thread_exit + 0x00
1092kdebug> co
1093vm_soft_fault: va 0x0 not covered by area in address space
1094vm_soft_fault: va 0x0 not covered by area in address space
1095vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x0, ip 0x800ea026, write 0, user 0, thread 0x190
1096PANIC: vm_page_fault: unhandled page fault in kernel space at 0x0, ip 0x800ea026
1097
1098Welcome to Kernel Debugging Land...
1099Thread 400 "a:392:x-vnd.Haiku-FirstBootProm" running on CPU 0
1100stack trace for thread 400 "a:392:x-vnd.Haiku-FirstBootProm"
1101 kernel stack: 0x824ed000 to 0x824f1000
1102 user stack: 0x70529000 to 0x70569000
1103frame caller <image>:function + offset
1104 0 824f047c (+ 32) 8015065e <kernel_x86> arch_debug_stack_trace + 0x12
1105 1 824f049c (+ 16) 800aab33 <kernel_x86> stack_trace_trampoline(NULL) + 0x0b
1106 2 824f04ac (+ 12) 80141df2 <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
1107 3 824f04b8 (+ 48) 800ac65b <kernel_x86> debug_call_with_fault_handler + 0x5b
1108 4 824f04e8 (+ 64) 800aad4f <kernel_x86> kernel_debugger_loop(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
1109", 0x824f0594 "", int32: 0) + 0x217
1110 5 824f0528 (+ 48) 800ab0cb <kernel_x86> kernel_debugger_internal(0x80194d17 "PANIC: ", 0x801abba0 "vm_page_fault: unhandled page fault in kernel space at 0x%lx, ip 0x%lx
1111", 0x824f0594 "", int32: 0) + 0x53
1112 6 824f0558 (+ 48) 800ac9e6 <kernel_x86> panic + 0x3a
1113 7 824f0588 (+ 144) 80126825 <kernel_x86> vm_page_fault + 0x145
1114 8 824f0618 (+ 80) 80151f2a <kernel_x86> x86_page_fault_exception + 0x1e2
1115 9 824f0668 (+ 12) 801447bc <kernel_x86> int_bottom + 0x3c
1116kernel iframe at 0x824f0674 (end = 0x824f06c4)
1117 eax 0x0 ebx 0x1364c48 ecx 0x0 edx 0xcf58a400
1118 esi 0x0 edi 0xcf5369a8 ebp 0x824f06fc esp 0x824f06a8
1119 eip 0x800ea026 eflags 0x13282
1120 vector: 0xe, error code: 0x0
112110 824f0674 (+ 136) 800ea026 <kernel_x86> _kern_read + 0xee
112211 824f06fc (+ 64) 80162994 <kernel_x86> pread + 0x28
112312 824f073c (+ 64) 81fd908c <packagefs> BFdIO<0xcdae9c48>::ReadAt(int64: 20335688, 0xcf5f0000, uint32: 0x78d3 (30931)) + 0x34
112413 824f077c (+ 80) 80165027 <kernel_x86> BPositionIO<0xcdae9c48>::ReadAtExactly(int64: 20335688, 0xcf5f0000, uint32: 0x78d3 (30931), NULL) + 0x47
112514 824f07cc (+ 64) 81fcf788 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0xcdae3518>::ReadFileData(uint64: 0x1364bf8, 0xcf5f0000, uint32: 0x78d3 (30931)) + 0x3c
112615 824f080c (+ 64) 81fcf678 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0xcdae3518>::ReadAndDecompressChunkData(uint64: 0x1364bf8, uint32: 0x78d3 (30931), uint32: 0x10000 (65536), 0xcf5f0000) + 0x48
112716 824f084c (+ 80) 81fcfe53 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapReader<0xcdae3518>::ReadAndDecompressChunk(uint32: 0x251 (593), 0xcf5f0000) + 0x12b
112817 824f089c (+ 96) 81fcf5b2 <packagefs> BPackageKit::BHPKG::BPrivate::PackageFileHeapAccessorBase<0xcdae3518>::ReadDataToOutput(int64: 38862848, uint32: 0x10000 (65536), BDataIO*: 0x824f0954) + 0x13a
112918 824f08fc (+ 112) 81fad061 <packagefs> CachedDataReader<0xcdae9c14>::_ReadIntoPages(vm_page*: 0x824f0a08, uint32: 0x0 (0), uint32: 0x10 (16)) + 0xc9
113019 824f096c (+ 272) 81faca51 <packagefs> CachedDataReader<0xcdae9c14>::_ReadCacheLine(int64: 38862848, uint32: 0x10000 (65536), int64: 38910518, uint32: 0x1000 (4096), BDataIO*: 0x824f0b74) + 0x871
113120 824f0a7c (+ 96) 81fac1ba <packagefs> CachedDataReader<0xcdae9c14>::ReadDataToOutput(int64: 38910518, uint32: 0x1000 (4096), BDataIO*: 0x824f0b74) + 0x12e
113221 824f0adc (+ 64) 81fceee1 <packagefs> BPackageKit::BHPKG::PackageDataHeapReader<0xcf51bf98>::ReadDataToOutput(int64: 0, uint32: 0x1000 (4096), BDataIO*: 0x824f0b74) + 0x95
113322 824f0b1c (+ 112) 81fb99f9 <packagefs> PackageFile<0xcdb9c150>::Read(IORequest*: 0x824f0c60) + 0x159
113423 824f0b8c (+ 48) 81fc440a <packagefs> UnpackingLeafNode<0xcf19d4e0>::Read(IORequest*: 0x824f0c60) + 0x56
113524 824f0bbc (+ 48) 81faf924 <packagefs> packagefs_io(fs_volume*: 0x83361120, fs_vnode*: 0xcf51ccf0, NULL, IORequest*: 0x824f0c60) + 0x40
113625 824f0bec (+ 64) 80107924 <kernel_x86> vfs_vnode_io + 0x2c
113726 824f0c2c (+ 224) 800fccfd <kernel_x86> vfs_read_pages + 0x69
113827 824f0d0c (+ 80) 8005ac6a <kernel_x86> VMVnodeCache<0xcf54e380>::Read(int64: 0, generic_io_vec*: 0x824f0dcc, uint32: 0x1 (1), uint32: 0x1 (1), 0x824f0dc4) + 0x3a
113928 824f0d5c (+ 128) 80126c92 <kernel_x86> fault_get_page(PageFaultContext&: 0x824f0e78) + 0x2ce
114029 824f0ddc (+ 208) 80127359 <kernel_x86> vm_soft_fault(VMAddressSpace*: 0xcf3ff840, uint32: 0xb6a000, false, false, true) + 0x2b5
114130 824f0eac (+ 160) 80126795 <kernel_x86> vm_page_fault + 0xb5
114231 824f0f4c (+ 80) 80151f2a <kernel_x86> x86_page_fault_exception + 0x1e2
114332 824f0f9c (+ 12) 8014483e <kernel_x86> int_bottom_user + 0x73
1144user iframe at 0x824f0fa8 (end = 0x824f1000)
1145 eax 0x0 ebx 0x1cbf630 ecx 0x188a72a0 edx 0xb6a004
1146 esi 0x0 edi 0x188a72a0 ebp 0x705679a8 esp 0x824f0fdc
1147 eip 0x1c2a346 eflags 0x13246 user esp 0x70567990
1148 vector: 0xe, error code: 0x4
114933 824f0fa8 (+ 0) 01c2a346 <libfreetype.so.6> FT_Stream_ReadULong + 0x56
115034 705679a8 (+ 80) 01c5f514 <libfreetype.so.6> TT_RunIns (nearest) + 0x214f8
115135 705679f8 (+ 128) 01c5f804 <libfreetype.so.6> TT_RunIns (nearest) + 0x217e8
115236 70567a78 (+ 64) 01c3f513 <libfreetype.so.6> TT_RunIns (nearest) + 0x14f7
115337 70567ab8 (+ 96) 01c23d21 <libfreetype.so.6> FT_Load_Char (nearest) + 0x461
115438 70567b18 (+ 128) 01c24ea9 <libfreetype.so.6> FT_Open_Face (nearest) + 0x1d9
115539 70567b98 (+ 96) 01c23df5 <libfreetype.so.6> FT_New_Face + 0x45
115640 70567bf8 (+ 112) 0132b378 <_APP_> FontManager<0x18480010>::_AddFont(FontManager::font_directory&: 0x18464e30, BEntry&: 0x70567ca4) + 0x94
115741 70567c68 (+ 192) 0132be05 <_APP_> FontManager<0x18480010>::_ScanFontDirectory(FontManager::font_directory&: 0x18464e30) + 0xc9
115842 70567d28 (+ 48) 0132b2c8 <_APP_> FontManager<0x18480010>::_ScanFonts(0x13bfded) + 0x64
115943 70567d58 (+ 48) 0132c244 <_APP_> FontManager<0x18480010>::GetFamily(0x13bfded "Noto Sans CJK JP") + 0x5c
116044 70567d88 (+ 48) 0132c32f <_APP_> FontManager<0x18480010>::GetStyleByIndex(0x13bfded "Noto Sans CJK JP", int32: 0) + 0x23
116145 70567db8 (+ 112) 012f2c00 <_APP_> GlyphLayoutEngine<0x70567ed0>::_WriteLockAndAcquireFallbackEntry(FontCacheReference&: 0x188b6d70, FontCacheEntry*: 0x70568a3c, ServerFont&: 0x12f0000, true, 0x34 "<???>", int32: 1884716744, FontCacheEntry*: 0x70567e94, FontCacheEntry&: 0x13f3a78) + 0xa8
116246 70567e28 (+ 176) 012f0a5c <_APP_> ServerFont<0x70568a3c>::StringWidth(ServerFont: 0x188bb7d0, 0x34 "<???>", int32: 0, escapement_delta*: 0x13f3a78) + 0x25c
116347 70567ed8 (+3168) 012e4fac <_APP_> ServerApp<0x18486ee8>::_DispatchMessage(int32: 79, BPrivate::LinkReceiver&: 0x1845fed0) + 0x32f8
116448 70568b38 (+ 176) 012e90eb <_APP_> ServerApp<0x18486ee8>::_MessageLooper(0x0) + 0x18f
116549 70568be8 (+ 48) 012d96a4 <_APP_> MessageLooper<0x18486ee8>::_message_thread(NULL) + 0x28
116650 70568c18 (+ 48) 01a60b1f <libroot.so> _get_next_team_info (nearest) + 0x5f
116751 70568c48 (+ 0) 61c5f250 <commpage> commpage_thread_exit + 0x00
1168kdebug>