1 | cont
|
---|
2 | bfs: could not read inode: 180455
|
---|
3 | bfs: bfs_lookup:560: I/O error
|
---|
4 | usb_disk: acquire_sem failed while waiting for data transfer
|
---|
5 | usb_disk: read fails with 0x80000009
|
---|
6 | reading page from cache 0x8124a000 returned: Operation timed out!
|
---|
7 | vm_page_fault: vm_soft_fault returned error 'Operation timed out' on fault at 0x4aa573, ip 0x10845a, write 0, user 1, thread 0x58
|
---|
8 | vm_page_fault: thread "Tracker" (88) in team "Tracker" (88) tried to read address 0x4aa573, ip 0x10845a ("runtime_loader_seg0ro" +0x845a)
|
---|
9 | stack trace:
|
---|
10 | 0x00102218 (runtime_loader_seg0ro + 0x2218)
|
---|
11 | 0x0010248a (runtime_loader_seg0ro + 0x248a)
|
---|
12 | 0x001025ed (runtime_loader_seg0ro + 0x25ed)
|
---|
13 | 0x00109bc6 (runtime_loader_seg0ro + 0x9bc6)
|
---|
14 | 0x00109d05 (runtime_loader_seg0ro + 0x9d05)
|
---|
15 | 0x00102979 (runtime_loader_seg0ro + 0x2979)
|
---|
16 | 0x0010349bps2: possibly a hot plugin of input/keyboard/at/0
|
---|
17 | (runtime_loader_seg0ro + 0x349b)
|
---|
18 | 0x001039de (runtime_loader_seg0ro + 0x39de)
|
---|
19 | 0x001008de (runtime_loader_seg0ro + 0x8de)
|
---|
20 | 0x7ffeefec (Tracker_main_stack + 0xffffec)
|
---|
21 | vm_soft_fault: va 0x0 not covered by area in address space
|
---|
22 | vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x0, ip 0x800cdbdc, write 0, user 0, thread 0x58
|
---|
23 | usb_disk: acquire_sem failed while waiting for data transfer
|
---|
24 | usb_disk: read fails with 0x80000009
|
---|
25 | reading page from cache 0x811f60f0 returned: Operation timed out!
|
---|
26 | vm_page_fault: vm_soft_fault returned error 'Operation timed out' on fault at 0x204000, ip 0x203ffb, write 0, user 1, thread 0x3e
|
---|
27 | vm_page_fault: thread "kernel listener" (62) in team "debug_server" (51) tried to read address 0x204000, ip 0x203ffb ("debug_server_seg0ro" +0x3ffb)
|
---|
28 | stack trace:
|
---|
29 | 0x00205c43 (debug_server_seg0ro + 0x5c43)
|
---|
30 | 0x00205a13 (debug_server_seg0ro + 0x5a13)
|
---|
31 | 0x0022f9b8 (libroot.so_seg0ro + 0x259b8)
|
---|
32 | 0x7003ffec (kernel listener_62_stack + 0x3ffec)
|
---|
33 | vm_soft_fault: va 0x0 not covered by area in address space
|
---|
34 | vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x0, ip 0x800cdbdc, write 0, user 0, thread 0x3e
|
---|
35 | ps2: possibly a hot plugin of input/keyboard/at/0
|
---|
36 | ps2: possibly a hot plugin of input/keyboard/at/0
|
---|
37 | usb_disk: acquire_sem failed while waiting for data transfer
|
---|
38 | usb_disk: acquire_sem failed while waiting for data transfer
|
---|
39 | usb_disk: write fails with 0x80000009
|
---|
40 | ps2: possibly a hot plugin of input/keyboard/at/0
|
---|
41 | Last message repeated 3 times.
|
---|
42 | usb_disk: acquire_sem failed while waiting for data transfer
|
---|
43 | usb_disk: read fails with 0x80000009
|
---|
44 | PANIC: could not read block 180455: bytesRead: -1, error: Operation timed out
|
---|
45 |
|
---|
46 | Welcome to Kernel Debugging Land...
|
---|
47 | Thread 85 "daemon" running on CPU 0
|
---|
48 | kdebug> bt
|
---|
49 | stack trace for thread 85 "daemon"
|
---|
50 | kernel stack: 0x827d0000 to 0x827d4000
|
---|
51 | user stack: 0x70000000 to 0x70040000
|
---|
52 | frame caller <image>:function + offset
|
---|
53 | 0 827d3834 (+ 48) 8005bd3d <kernel_x86>:invoke_debugger_command + 0x00f5
|
---|
54 | 1 827d3864 (+ 64) 8005bb2d <kernel_x86> invoke_pipe_segment(debugger_command_pipe*: [34m0x80122a60[0m, int32: [34m0[0m, [34m0x0[0m [31m"<NULL>"[0m) + 0x0079
|
---|
55 | 2 827d38a4 (+ 64) 8005beb4 <kernel_x86>:invoke_debugger_command_pipe + 0x009c
|
---|
56 | 3 827d38e4 (+ 48) 8005d43c <kernel_x86> ExpressionParser<[32m0x827d3998[0m>::_ParseCommandPipe([34m0x827d3994[0m) + 0x0234
|
---|
57 | 4 827d3914 (+ 64) 8005c876 <kernel_x86> ExpressionParser<[32m0x827d3998[0m>::EvaluateCommand([34m0x801128a0[0m [36m"bt"[0m, [34m0x827d3994[0m) + 0x02ba
|
---|
58 | 5 827d3954 (+ 224) 8005e864 <kernel_x86>:evaluate_debug_command + 0x0088
|
---|
59 | 6 827d3a34 (+ 64) 80059c52 <kernel_x86> kernel_debugger_loop() + 0x01ae
|
---|
60 | 7 827d3a74 (+ 32) 8005aabd <kernel_x86>:kernel_debugger + 0x004d
|
---|
61 | 8 827d3a94 (+ 192) 8005aa65 <kernel_x86>:panic + 0x0029
|
---|
62 | 9 827d3b54 (+ 112) 8002d43d <kernel_x86> get_cached_block(block_cache*: [34m0x811c6078[0m, int64: [34m180455[0m, [34m0x827d3c0b[0m, [34mtrue[0m) + 0x0149
|
---|
63 | 10 827d3bc4 (+ 80) 80030732 <kernel_x86>:block_cache_get_etc + 0x004e
|
---|
64 | 11 827d3c14 (+ 64) 807dee09 <bfs> CachedBlock<[32m0x827d3ca4[0m>::SetTo(int64: [34m180455[0m) + 0x0065
|
---|
65 | 12 827d3c54 (+ 96) 807da55b <bfs> bfs_get_vnode(fs_volume*: [34m0x811829a0[0m, int64: [34m180455[0m, fs_vnode*: [34m0x8123be9c[0m, [34m0x827d3cf8[0m, [34m0x827d3cfc[0m, [34mfalse[0m) + 0x0117
|
---|
66 | 13 827d3cb4 (+ 80) 800910b4 <kernel_x86> get_vnode(int32: [34m3[0m, int64: [34m180455[0m, vnode*: [34m0x827d3db0[0m, [34mtrue[0m, int32: [34m0[0m) + 0x0168
|
---|
67 | 14 827d3d04 (+ 96) 800926fb <kernel_x86> lookup_dir_entry(vnode*: [34m0x811de660[0m, [34m0x819cf10a[0m [36m"log"[0m, vnode*: [34m0x827d3db0[0m) + 0x023b
|
---|
68 | 15 827d3d64 (+ 80) 80092937 <kernel_x86> vnode_path_to_vnode(vnode*: [34m0x811a1044[0m, [34m0x819cf101[0m [36m"boot"[0m, [34mtrue[0m, int32: [34m0[0m, io_context*: [34m0x811e4e00[0m, vnode*: [34m0x827d3ea0[0m, NULL) + 0x0173
|
---|
69 | 16 827d3db4 (+ 48) 80092c29 <kernel_x86> vnode_path_to_vnode(vnode*: [34m0x811a1044[0m, [34m0x819cf101[0m [36m"boot"[0m, [34mtrue[0m, int32: [34m0[0m, [34mfalse[0m, vnode*: [34m0x827d3ea0[0m, NULL) + 0x0049
|
---|
70 | 17 827d3de4 (+ 64) 80092d28 <kernel_x86> path_to_vnode([34m0x819cf100[0m [36m"/boot"[0m, [34mtrue[0m, vnode*: [34m0x827d3ea0[0m, NULL, [34mfalse[0m) + 0x00f8
|
---|
71 | 18 827d3e24 (+ 64) 80093568 <kernel_x86> fd_and_path_to_vnode(int32: [34m-1[0m, [34m0x819cf100[0m [36m"/boot"[0m, [34mtrue[0m, vnode*: [34m0x827d3ea0[0m, NULL, [34mfalse[0m) + 0x0064
|
---|
72 | 19 827d3e64 (+ 64) 800991b1 <kernel_x86> common_path_read_stat(int32: [34m-1[0m, [34m0x819cf100[0m [36m"/boot"[0m, [34mtrue[0m, stat*: [34m0x827d3efc[0m, [34mfalse[0m) + 0x0031
|
---|
73 | 20 827d3ea4 (+ 160) 8009e5a3 <kernel_x86>:_user_read_stat + 0x00eb
|
---|
74 | 21 827d3f44 (+ 100) 800ce142 <kernel_x86>:handle_syscall + 0x00af
|
---|
75 | user iframe at 0x827d3fa8 (end = 0x827d4000)
|
---|
76 | eax 0x88 ebx 0x50e580 ecx 0x7003a940 edx 0xffff0104
|
---|
77 | esi 0x7003aa08 edi 0xd ebp 0x7003a97c esp 0x827d3fdc
|
---|
78 | eip 0xffff0104 eflags 0x203 user esp 0x7003a940
|
---|
79 | vector: 0x63, error code: 0x0
|
---|
80 | 22 827d3fa8 (+ 0) ffff0104 <commpage>:commpage_syscall + 0x0004
|
---|
81 | 23 7003a97c (+1168) 0047fa50 <libroot.so>:get_driver_settings (nearest) + 0x00f0
|
---|
82 | 24 7003ae0c (+2896) 0047ff8c <libroot.so>:find_directory + 0x04f0
|
---|
83 | 25 7003b95c (+1088) 00383f1c <libbe.so> directory_which::find_directory(BPath*: [34m0x7dc[0m, [34mtrue[0m, BVolume*: [34m0x70030001[0m) + 0x0070
|
---|
84 | 26 7003bd9c (+ 176) 00203390 <_APP_>:__tf12SyslogDaemon (nearest) + 0x00ec
|
---|
85 | 27 7003be4c (+8416) 00203895 <_APP_>:__tf12SyslogDaemon (nearest) + 0x05f1
|
---|
86 | 28 7003df2c (+8272) 0020311a <_APP_> SyslogDaemon<[32m0x7ffeee2c[0m>::Daemon([34m0x0[0m, int8: [34m0[0m) + 0x00d2
|
---|
87 | 29 7003ff7c (+ 48) 0020316b <_APP_> SyslogDaemon<[32m0x7ffeee2c[0m>::daemon_thread(NULL) + 0x001f
|
---|
88 | 30 7003ffac (+ 48) 004829b8 <libroot.so>:_get_next_team_info (nearest) + 0x005c
|
---|
89 | 31 7003ffdc (+ 0) 7003ffec 3905:daemon_85_stack@0x70000000 + 0x3ffec
|
---|
90 | kdebug> sc
|
---|
91 | stack trace for thread 85 "daemon"
|
---|
92 | kernel stack: 0x827d0000 to 0x827d4000
|
---|
93 | user stack: 0x70000000 to 0x70040000
|
---|
94 | frame caller <image>:function + offset
|
---|
95 | 0 827d3834 (+ 48) 8005bd3d <kernel_x86>:invoke_debugger_command + 0x00f5
|
---|
96 | 1 827d3864 (+ 64) 8005bb2d <kernel_x86> invoke_pipe_segment(debugger_command_pipe*: [34m0x80122a60[0m, int32: [34m0[0m, [34m0x0[0m [31m"<NULL>"[0m) + 0x0079
|
---|
97 | 2 827d38a4 (+ 64) 8005beb4 <kernel_x86>:invoke_debugger_command_pipe + 0x009c
|
---|
98 | 3 827d38e4 (+ 48) 8005d43c <kernel_x86> ExpressionParser<[32m0x827d3998[0m>::_ParseCommandPipe([34m0x827d3994[0m) + 0x0234
|
---|
99 | 4 827d3914 (+ 64) 8005c876 <kernel_x86> ExpressionParser<[32m0x827d3998[0m>::EvaluateCommand([34m0x80112ca0[0m [36m"sc"[0m, [34m0x827d3994[0m) + 0x02ba
|
---|
100 | 5 827d3954 (+ 224) 8005e864 <kernel_x86>:evaluate_debug_command + 0x0088
|
---|
101 | 6 827d3a34 (+ 64) 80059c52 <kernel_x86> kernel_debugger_loop() + 0x01ae
|
---|
102 | 7 827d3a74 (+ 32) 8005aabd <kernel_x86>:kernel_debugger + 0x004d
|
---|
103 | 8 827d3a94 (+ 192) 8005aa65 <kernel_x86>:panic + 0x0029
|
---|
104 | 9 827d3b54 (+ 112) 8002d43d <kernel_x86> get_cached_block(block_cache*: [34m0x811c6078[0m, int64: [34m180455[0m, [34m0x827d3c0b[0m, [34mtrue[0m) + 0x0149
|
---|
105 | 10 827d3bc4 (+ 80) 80030732 <kernel_x86>:block_cache_get_etc + 0x004e
|
---|
106 | 11 827d3c14 (+ 64) 807dee09 <bfs> CachedBlock<[32m0x827d3ca4[0m>::SetTo(int64: [34m180455[0m) + 0x0065
|
---|
107 | 12 827d3c54 (+ 96) 807da55b <bfs> bfs_get_vnode(fs_volume*: [34m0x811829a0[0m, int64: [34m180455[0m, fs_vnode*: [34m0x8123be9c[0m, [34m0x827d3cf8[0m, [34m0x827d3cfc[0m, [34mfalse[0m) + 0x0117
|
---|
108 | 13 827d3cb4 (+ 80) 800910b4 <kernel_x86> get_vnode(int32: [34m3[0m, int64: [34m180455[0m, vnode*: [34m0x827d3db0[0m, [34mtrue[0m, int32: [34m0[0m) + 0x0168
|
---|
109 | 14 827d3d04 (+ 96) 800926fb <kernel_x86> lookup_dir_entry(vnode*: [34m0x811de660[0m, [34m0x819cf10a[0m [36m"log"[0m, vnode*: [34m0x827d3db0[0m) + 0x023b
|
---|
110 | 15 827d3d64 (+ 80) 80092937 <kernel_x86> vnode_path_to_vnode(vnode*: [34m0x811a1044[0m, [34m0x819cf101[0m [36m"boot"[0m, [34mtrue[0m, int32: [34m0[0m, io_context*: [34m0x811e4e00[0m, vnode*: [34m0x827d3ea0[0m, NULL) + 0x0173
|
---|
111 | 16 827d3db4 (+ 48) 80092c29 <kernel_x86> vnode_path_to_vnode(vnode*: [34m0x811a1044[0m, [34m0x819cf101[0m [36m"boot"[0m, [34mtrue[0m, int32: [34m0[0m, [34mfalse[0m, vnode*: [34m0x827d3ea0[0m, NULL) + 0x0049
|
---|
112 | 17 827d3de4 (+ 64) 80092d28 <kernel_x86> path_to_vnode([34m0x819cf100[0m [36m"/boot"[0m, [34mtrue[0m, vnode*: [34m0x827d3ea0[0m, NULL, [34mfalse[0m) + 0x00f8
|
---|
113 | 18 827d3e24 (+ 64) 80093568 <kernel_x86> fd_and_path_to_vnode(int32: [34m-1[0m, [34m0x819cf100[0m [36m"/boot"[0m, [34mtrue[0m, vnode*: [34m0x827d3ea0[0m, NULL, [34mfalse[0m) + 0x0064
|
---|
114 | 19 827d3e64 (+ 64) 800991b1 <kernel_x86> common_path_read_stat(int32: [34m-1[0m, [34m0x819cf100[0m [36m"/boot"[0m, [34mtrue[0m, stat*: [34m0x827d3efc[0m, [34mfalse[0m) + 0x0031
|
---|
115 | 20 827d3ea4 (+ 160) 8009e5a3 <kernel_x86>:_user_read_stat + 0x00eb
|
---|
116 | 21 827d3f44 (+ 100) 800ce142 <kernel_x86>:handle_syscall + 0x00af
|
---|
117 | user iframe at 0x827d3fa8 (end = 0x827d4000)
|
---|
118 | eax 0x88 ebx 0x50e580 ecx 0x7003a940 edx 0xffff0104
|
---|
119 | esi 0x7003aa08 edi 0xd ebp 0x7003a97c esp 0x827d3fdc
|
---|
120 | eip 0xffff0104 eflags 0x203 user esp 0x7003a940
|
---|
121 | vector: 0x63, error code: 0x0
|
---|
122 | 22 827d3fa8 (+ 0) ffff0104 <commpage>:commpage_syscall + 0x0004
|
---|
123 | 23 7003a97c (+1168) 0047fa50 <libroot.so>:get_driver_settings (nearest) + 0x00f0
|
---|
124 | 24 7003ae0c (+2896) 0047ff8c <libroot.so>:find_directory + 0x04f0
|
---|
125 | 25 7003b95c (+1088) 00383f1c <libbe.so> directory_which::find_directory(BPath*: [34m0x7dc[0m, [34mtrue[0m, BVolume*: [34m0x70030001[0m) + 0x0070
|
---|
126 | 26 7003bd9c (+ 176) 00203390 <_APP_>:__tf12SyslogDaemon (nearest) + 0x00ec
|
---|
127 | 27 7003be4c (+8416) 00203895 <_APP_>:__tf12SyslogDaemon (nearest) + 0x05f1
|
---|
128 | 28 7003df2c (+8272) 0020311a <_APP_> SyslogDaemon<[32m0x7ffeee2c[0m>::Daemon([34m0x0[0m, int8: [34m0[0m) + 0x00d2
|
---|
129 | 29 7003ff7c (+ 48) 0020316b <_APP_> SyslogDaemon<[32m0x7ffeee2c[0m>::daemon_thread(NULL) + 0x001f
|
---|
130 | 30 7003ffac (+ 48) 004829b8 <libroot.so>:_get_next_team_info (nearest) + 0x005c
|
---|
131 | 31 7003ffdc (+ 0) 7003ffec 3905:daemon_85_stack@0x70000000 + 0x3ffec
|
---|
132 | kdebug>
|
---|