Ticket #15781: Kernel.log

File Kernel.log, 2.7 KB (added by alpopa, 5 years ago)
Line 
1Welcome to kernel debugger output!
2Haiku revision: hrev52295+132
3CPU 0: type 0 family 6 extended_family 0 model 6 extended_model 0 stepping 3, string 'GenuineIntel'
4CPU 0: vendor 'Intel' model name 'QEMU Virtual CPU version 2.5+'
5No CPU topology information available.
6CPU 0: apic id 0, package 0, core 0, smt 0
7CPU 0: features: fpu de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clfsh mmx fxsr sse sse2 sse3 cx16 x2apic hypervisor syscall nx long
8reserve_io_interrupt_vectors: reserved 16 vectors starting from 0
9mark_page_range_in_use(0x0, 0x100): start page is before free list
10mark_page_range_in_use(0x0, 0xa0): start page is before free list
11add_memory_type_range(3, 0x0, 0xa0000, 6)
12add_memory_type_range(92, 0xfd000000, 0x300000, 0)
13PANIC: Unexpected exception "General Protection Exception" occurred in kernel mode! Error code: 0x0
14
15Welcome to Kernel Debugging Land...
16Thread 1 "idle thread 1" running on CPU 0
17stack trace for thread 1 "idle thread 1"
18 kernel stack: 0xffffffff81001000 to 0xffffffff81005000
19frame caller <image>:function + offset
20 0 ffffffff810049c8 (+ 24) ffffffff8013fb3c <kernel_x86_64> arch_debug_call_with_fault_handler + 0x16
21 1 ffffffff810049e0 (+ 80) ffffffff800a78a8 <kernel_x86_64> debug_call_with_fault_handler + 0x68
22 2 ffffffff81004a30 (+ 96) ffffffff800a9251 <kernel_x86_64> kernel_debugger_loop(char const*, char const*, __va_list_tag*, intkdebug>
23kdebug> bt
24stack trace for thread 1 "idle thread 1"
25 kernel stack: 0xffffffff81001000 to 0xffffffff81005000
26frame caller <image>:function + offset
27 0 ffffffff81004708 (+ 32) ffffffff800aa849 <kernel_x86_64> invoke_command_trampoline(void*) + 0x19
28 1 ffffffff81004728 (+ 24) ffffffff8013fb3c <kernel_x86_64> arch_debug_call_with_fault_handler + 0x16
29 2 ffffffff81004740 (+ 80) ffffffff800a78a8 <kernel_x86_64> debug_call_with_fault_handler + 0x68
30 3 ffffffff81004790 (+ 96) ffffffff800aaadf <kernel_x86_64> invoke_debugger_command + 0xef
31 4 ffffffff810047f0 (+ 64) ffffffff800aac56 <kernel_x86_64> invoke_pipe_segment(debugger_command_pipe*, int, char*) + 0xf6
32 5 ffffffff81004830 (+ 80) ffffffff800aad5c <kernel_x86_64> invoke_debugger_command_pipe + 0xac
33 6 ffffffff81004880 (+ 96) ffffffff800af550 <kernel_x86_64> ExpressionParser::_ParseCommandPipe(int&) + 0x120
34 7 ffffffff810048e0 (+ 96) ffffffff800b4f4e <kernel_x86_64> ExpressionParser::EvaluateCommand(char const*, int&) + 0x30e
35 8 ffffffff81004940 (+ 240) ffffffff800b79ae <kernel_x86_64> evaluate_debug_command + 0x11e
36 9 ffffffff81004a30 (+ 96) ffffffff800a9310 <kernel_x86_64> kernel_debugger_loop(char const*, char const*, __va_list_tag*, int
37[*** READ/WRITE FAULT (?), pc: 0xffffffff818ae7ec ***]
38kdebug>