KERN: vm_soft_fault: va 0x0 not covered by area in address space KERN: vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x2, ip 0x1c7ea4a, write 0, user 1, thread 0x2163 KERN: vm_page_fault: thread "cc1" (8547) in team "cc1" (8547) tried to read address 0x2, ip 0x1c7ea4a ("cc1_seg0ro" +0xd8a4a) KERN: debug_server: Thread 8547 entered the debugger: Segment violation KERN: stack trace, current PC 0x1c7ea4a fold_rtx + 0x50a: KERN: (0x71580940) 0x1c85d60 cse_basic_block + 0x2b8 KERN: (0x71584860) 0x1c859f4 cse_main + 0x274 KERN: (0x715878d0) 0x1bd1531 rest_of_compilation + 0x655 KERN: (0x71587980) 0x1d3cbee finish_function + 0xf2 KERN: (0x715879c0) 0x1d2ad9e yyparse + 0xf52 KERN: (0x71587f10) 0x1bd043d compile_file + 0xa55 KERN: (0x71587f50) 0x1bd431f main + 0x157b KERN: (0x715880c0) 0x1bcdca7 _start + 0x5b KERN: (0x715880f0) 0xe89d82 runtime_loader + 0x132 KERN: Keyboard Requested Halt. KERN: Welcome to Kernel Debugging Land... KERN: Thread 8 "idle thread 8" running on CPU 0 KERN: kdebug> bt 8547stack trace for thread 8547 "cc1" KERN: kernel stack: 0xdeb1b000 to 0xdeb1f000 KERN: user stack: 0x70589000 to 0x71589000 KERN: frame caller :function + offset KERN: 0 deb1e70c (+ 112) 8008eba2 reschedule() + 0x552 KERN: 1 deb1e77c (+ 96) 80051a14 ConditionVariableEntry<^[[32m0xdeb1e81c^[[0m>::Wait(uint32: ^[[34m0x20^[[0m (^[[34m32^[[0m), int64: ^[[34m0^[[0m) + 0x23c KERN: 2 deb1e7dc (+ 96) 80065881 read_port_etc + 0x175 KERN: 3 deb1e83c (+1440) 800a21ba debug_debugger_message::thread_hit_debug_event_internal(^[[34m0x8^[[0m, int32: ^[[34m-558764396^[[0m, ^[[34mtrue^[[0m, ^[[34m0x6e720001^[[0m) + 0x38e KERN: 4 deb1eddc (+ 96) 800a24c2 debug_debugger_message::thread_hit_debug_event(^[[34m0x8^[[0m, int32: ^[[34m-558764396^[[0m, ^[[34mtrue^[[0m) + 0x2e KERN: 5 deb1ee3c (+ 48) 800a256e debug_debugger_message::thread_hit_serious_debug_event(^[[34m0x8^[[0m, int32: ^[[34m-558764396^[[0m) + 0x2a KERN: 6 deb1ee6c (+ 80) 800a2789 user_debug_exception_occurred + 0x45 KERN: 7 deb1eebc (+ 144) 8010d762 vm_page_fault + 0x262 KERN: 8 deb1ef4c (+ 80) 8013811b x86_page_fault_exception + 0x18b KERN: 9 deb1ef9c (+ 12) 8012b99e int_bottom_user + 0x6f KERN: user iframe at 0xdeb1efa8 (end = 0xdeb1f000) KERN: eax 0x18b7ba88 ebx 0x1d7a33c ecx 0x0 edx 0x0 KERN: esi 0x18b7ba70 edi 0x18b7ba64 ebp 0x71580940 esp 0xdeb1efdc KERN: eip 0x1c7ea4a eflags 0x13207 user esp 0x7158079c KERN: vector: 0xe, error code: 0x4 KERN: 10 deb1efa8 (+ 0) 01c7ea4a simplify_ternary_operation (nearest) + 0x766 KERN: 11 71580940 (+16160) 01c85d60 cse_main (nearest) + 0x5e0 KERN: 12 71584860 (+12400) 01c859f4 cse_main + 0x274 KERN: 13 715878d0 (+ 176) 01bd1531 rest_of_compilation + 0x655 KERN: 14 71587980 (+ 64) 01d3cbee finish_function + 0xf2 KERN: 15 715879c0 (+1360) 01d2ad9e yyparse + 0xf52 KERN: 16 71587f10 (+ 64) 01bd043d check_global_declarations (nearest) + 0xc01 KERN: 17 71587f50 (+ 368) 01bd431f main + 0x157b KERN: 18 715880c0 (+ 48) 01bcdca7 _start + 0x5b KERN: 19 715880f0 (+ 48) 00e89d82 + 0xfd82 KERN: 20 71588120 (+ 0) 60b2a250 commpage_thread_exit + 0x00 KERN: kdebug> in_context 8547 dis -b 01^[[1D^[[1D^[[1D^[[1D100x01c7ea34: f7e6 mul %esi KERN: 0x01c7ea36: 89d1 mov %edx, %ecx KERN: 0x01c7ea38: 89f0 mov %esi, %eax KERN: 0x01c7ea3a: 29c8 sub %ecx, %eax KERN: 0x01c7ea3c: d1e8 shr , %eax KERN: 0x01c7ea3e: 01c1 add %eax, %ecx KERN: 0x01c7ea40: eb2a jmp 0x1c7ea6c KERN: 0x01c7ea42: 89f6 mov %esi, %esi KERN: 0x01c7ea44: 8b55e8 mov -0x18(%ebp), %edx KERN: 0x01c7ea47: 83c4f8 add $0xf8, %esp KERN: ^[[34m0x01c7ea4a: 0fbe4202 movsxb 0x2(%edx), %eax KERN: ^[[m0x01c7ea4e: 50 push %eax KERN: 0x01c7ea4f: 52 push %edx KERN: 0x01c7ea50: e85b9cffff call 0x1c786b0 KERN: 0x01c7ea55: 89c6 mov %eax, %esi KERN: 0x01c7ea57: ba85104208 mov $0x8421085, %edx KERN: 0x01c7ea5c: 89d0 mov %edx, %eax KERN: 0x01c7ea5e: f7e6 mul %esi KERN: 0x01c7ea60: 83c410 add $0x10, %esp KERN: 0x01c7ea63: 89f0 mov %esi, %eax KERN: kdebug> mapping 0x01c7ea4e^[[1D^[[1Da 85547^[[1D^[[1D^[[1D^[[1D^[[1D^[[1D47page directory: 0x93dae000 (PDPT[0]) KERN: page directory entry 14 (0x93dae070): 0x5a869027 KERN: access: present writable user executable KERN: caching: KERN: flags: accessed KERN: page table: 0x5a869000 KERN: page table entry 126 (phys: 0x5a8693f0): 0x57a11025 KERN: access: present user executable global KERN: caching: KERN: flags: accessed KERN: address: 0x57a11000 KERN: kdebug> mapping 0x01c7ea4a 8547^[[K^[[1D^[[1D^[[1D^[[1D^[[1D^[[1D^[[6D7 8547^[[5Dpage directory: 0x93dae000 (PDPT[0]) KERN: page directory entry 14 (0x93dae070): 0x5a869027 KERN: access: present writable user executable KERN: caching: KERN: flags: accessed KERN: page table: 0x5a869000 KERN: page table entry 126 (phys: 0x5a8693f0): 0x57a11025 KERN: access: present user executable global KERN: caching: KERN: flags: accessed KERN: address: 0x57a11000 KERN: kdebug> mapping 0x01c7ea47 8547^[[K^[[1D^[[1D^[[1D^[[1D^[[1D^[[1D^[[6De 8547^[[5Dpage directory: 0x93dae000 (PDPT[0]) KERN: page directory entry 14 (0x93dae070): 0x5a869027 KERN: access: present writable user executable KERN: caching: KERN: flags: accessed KERN: page table: 0x5a869000 KERN: page table entry 126 (phys: 0x5a8693f0): 0x57a11025 KERN: access: present user executable global KERN: caching: KERN: flags: accessed KERN: address: 0x57a11000