1 | Welcome to kernel debugger output!
|
---|
2 | Haiku revision: hrev52295+132
|
---|
3 | CPU 0: type 0 family 6 extended_family 0 model 6 extended_model 0 stepping 3, string 'GenuineIntel'
|
---|
4 | CPU 0: vendor 'Intel' model name 'QEMU Virtual CPU version 2.5+'
|
---|
5 | No CPU topology information available.
|
---|
6 | CPU 0: apic id 0, package 0, core 0, smt 0
|
---|
7 | CPU 0: features: fpu de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clfsh mmx fxsr sse sse2 sse3 cx16 x2apic hypervisor syscall nx long
|
---|
8 | reserve_io_interrupt_vectors: reserved 16 vectors starting from 0
|
---|
9 | mark_page_range_in_use(0x0, 0x100): start page is before free list
|
---|
10 | mark_page_range_in_use(0x0, 0xa0): start page is before free list
|
---|
11 | add_memory_type_range(3, 0x0, 0xa0000, 6)
|
---|
12 | add_memory_type_range(92, 0xfd000000, 0x300000, 0)
|
---|
13 | PANIC: Unexpected exception "General Protection Exception" occurred in kernel mode! Error code: 0x0
|
---|
14 |
|
---|
15 | Welcome to Kernel Debugging Land...
|
---|
16 | Thread 1 "idle thread 1" running on CPU 0
|
---|
17 | stack trace for thread 1 "idle thread 1"
|
---|
18 | kernel stack: 0xffffffff81001000 to 0xffffffff81005000
|
---|
19 | frame caller <image>:function + offset
|
---|
20 | 0 ffffffff810049c8 (+ 24) ffffffff8013fb3c <kernel_x86_64> arch_debug_call_with_fault_handler + 0x16
|
---|
21 | 1 ffffffff810049e0 (+ 80) ffffffff800a78a8 <kernel_x86_64> debug_call_with_fault_handler + 0x68
|
---|
22 | 2 ffffffff81004a30 (+ 96) ffffffff800a9251 <kernel_x86_64> kernel_debugger_loop(char const*, char const*, __va_list_tag*, intkdebug>
|
---|
23 | kdebug> bt
|
---|
24 | stack trace for thread 1 "idle thread 1"
|
---|
25 | kernel stack: 0xffffffff81001000 to 0xffffffff81005000
|
---|
26 | frame caller <image>:function + offset
|
---|
27 | 0 ffffffff81004708 (+ 32) ffffffff800aa849 <kernel_x86_64> invoke_command_trampoline(void*) + 0x19
|
---|
28 | 1 ffffffff81004728 (+ 24) ffffffff8013fb3c <kernel_x86_64> arch_debug_call_with_fault_handler + 0x16
|
---|
29 | 2 ffffffff81004740 (+ 80) ffffffff800a78a8 <kernel_x86_64> debug_call_with_fault_handler + 0x68
|
---|
30 | 3 ffffffff81004790 (+ 96) ffffffff800aaadf <kernel_x86_64> invoke_debugger_command + 0xef
|
---|
31 | 4 ffffffff810047f0 (+ 64) ffffffff800aac56 <kernel_x86_64> invoke_pipe_segment(debugger_command_pipe*, int, char*) + 0xf6
|
---|
32 | 5 ffffffff81004830 (+ 80) ffffffff800aad5c <kernel_x86_64> invoke_debugger_command_pipe + 0xac
|
---|
33 | 6 ffffffff81004880 (+ 96) ffffffff800af550 <kernel_x86_64> ExpressionParser::_ParseCommandPipe(int&) + 0x120
|
---|
34 | 7 ffffffff810048e0 (+ 96) ffffffff800b4f4e <kernel_x86_64> ExpressionParser::EvaluateCommand(char const*, int&) + 0x30e
|
---|
35 | 8 ffffffff81004940 (+ 240) ffffffff800b79ae <kernel_x86_64> evaluate_debug_command + 0x11e
|
---|
36 | 9 ffffffff81004a30 (+ 96) ffffffff800a9310 <kernel_x86_64> kernel_debugger_loop(char const*, char const*, __va_list_tag*, int
|
---|
37 | [*** READ/WRITE FAULT (?), pc: 0xffffffff818ae7ec ***]
|
---|
38 | kdebug>
|
---|