KERN: vm_soft_fault: va 0x455c0000 not covered by area in address space KERN: vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x455c0473, ip 0x455c0473, write 0, user 1, thread 0x1b40 KERN: vm_page_fault: thread "sh" (6976) in team "sh" (6976) tried to execute address 0x455c0473, ip 0x455c0473 ("???" +0x455c0473) KERN: PANIC: vm_page_fault: thread "sh" (6976) in team "sh" (6976) tried to execute address 0x455c0473, ip 0x455c0473 ("???" +0x455c0473) KERN: KERN: Welcome to Kernel Debugging Land... KERN: Thread 6976 "sh" running on CPU 6 KERN: stack trace for thread 6976 "sh" KERN: kernel stack: 0x81fd1000 to 0x81fd5000 KERN: user stack: 0x722c6000 to 0x732c6000 KERN: frame caller :function + offset KERN: 0 81fd4d90 (+ 32) 8013659e arch_debug_stack_trace + 0x12 KERN: 1 81fd4db0 (+ 16) 80094ad7 stack_trace_trampoline(NULL) + 0x0b KERN: 2 81fd4dc0 (+ 12) 80128b32 arch_debug_call_with_fault_handler + 0x1b KERN: 3 81fd4dcc (+ 48) 8009657a debug_call_with_fault_handler + 0x5e KERN: 4 81fd4dfc (+ 64) 80094cf7 kernel_debugger_loop(0x80175c77 "PANIC: ", 0x8018c4c0 "vm_page_fault: thread "%s" (%ld) in team "%s" (%ld) tried to %s address %#lx, ip %#lx ("%s" +%#lx) KERN: ", 0x81fd4ea8 "聅, int32: 6) + 0x21b KERN: 5 81fd4e3c (+ 48) 8009505b kernel_debugger_internal(0x80175c77 "PANIC: ", 0x8018c4c0 "vm_page_fault: thread "%s" (%ld) in team "%s" (%ld) tried to %s address %#lx, ip %#lx ("%s" +%#lx) KERN: ", 0x81fd4ea8 "聅, int32: 6) + 0x53 KERN: 6 81fd4e6c (+ 48) 80096906 panic + 0x36 KERN: 7 81fd4e9c (+ 176) 8010d3ef vm_page_fault + 0x2bf KERN: 8 81fd4f4c (+ 80) 80137ddb x86_page_fault_exception + 0x18b KERN: 9 81fd4f9c (+ 12) 8012b65e int_bottom_user + 0x6f KERN: user iframe at 0x81fd4fa8 (end = 0x81fd5000) KERN: eax 0x732c4b7e ebx 0x166e038 ecx 0x732c49f0 edx 0xc8 KERN: esi 0x0 edi 0x182749a0 ebp 0x732c4b80 esp 0x81fd4fdc KERN: eip 0x455c0473 eflags 0x13217 user esp 0x732c4365 KERN: vector: 0xe, error code: 0x14 KERN: 10 81fd4fa8 (+ 0) 455c0473 KERN: 11 732c4b80 (+29516) 015cbc53 <_APP_> parse_command + 0x7f KERN: 732cbecc -- read fault KERN: kdebug> mapping 0x455c0473 page directory: 0xfb945000 (PDPT[1]) KERN: page directory entry 42 (0xfb945150): 0x0 KERN: access: executable KERN: caching: KERN: flags: KERN: kdebug> mapping 0x455c0473 6976 page directory: 0xfb945000 (PDPT[1]) KERN: page directory entry 42 (0xfb945150): 0x0 KERN: access: executable KERN: caching: KERN: flags: KERN: kdebug> mapping 0x455c0473 page directory: 0xfb945000 (PDPT[1]) KERN: page directory entry 42 (0xfb945150): 0x0 KERN: access: executable KERN: caching: KERN: flags: KERN: kdebug> continue KERN: debug_server: Thread 6976 entered the debugger: Segment violation KERN: stack trace, current PC 0x455c0473 : KERN: (0x732c4b80) 0x15cbc53 parse_command + 0x7f KERN: vm_soft_fault: va 0x732cb000 not covered by area in address space KERN: vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x732cbecc, ip 0x80128a77, write 0, user 0, thread 0x1b4f KERN: vm_soft_fault: va 0x455c0000 not covered by area in address space KERN: vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x455c0473, ip 0x80128a80, write 0, user 0, thread 0x1b4f KERN: vm_soft_fault: va 0x732cb000 not covered by area in address space KERN: vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x732cbecc, ip 0x80128a77, write 0, user 0, thread 0x1b4f