KERN: Keyboard Requested Halt. KERN: Welcome to Kernel Debugging Land... KERN: Thread 2 "idle thread 2" running on CPU 0 KERN: kdebug> bt 748stack trace for thread 748 "w>Terminal 1: mesa: vim" KERN: kernel stack: 0x8236a000 to 0x8236e000 KERN: user stack: 0x704df000 to 0x7051f000 KERN: frame caller :function + offset KERN: 0 8236d70c (+ 112) 8008e662 reschedule() + 0x552 KERN: 1 8236d77c (+ 96) 800514d4 ConditionVariableEntry<0x8236d81c>::Wait(uint32: 0x20 (32), int64: 0) + 0x23c KERN: 2 8236d7dc (+ 96) 80065341 read_port_etc + 0x175 KERN: 3 8236d83c (+1440) 800a1c7a debug_debugger_message::thread_hit_debug_event_internal(0x8, int32: -2110333292, true, 0x6e720001) + 0x38e KERN: 4 8236dddc (+ 96) 800a1f82 debug_debugger_message::thread_hit_debug_event(0x8, int32: -2110333292, true) + 0x2e KERN: 5 8236de3c (+ 48) 800a202e debug_debugger_message::thread_hit_serious_debug_event(0x8, int32: -2110333292) + 0x2a KERN: 6 8236de6c (+ 80) 800a2249 user_debug_exception_occurred + 0x45 KERN: 7 8236debc (+ 144) 8010d222 vm_page_fault + 0x262 KERN: 8 8236df4c (+ 80) 80137bdb x86_page_fault_exception + 0x18b KERN: 9 8236df9c (+ 12) 8012b45e int_bottom_user + 0x6f KERN: user iframe at 0x8236dfa8 (end = 0x8236e000) KERN: eax 0x5277696e ebx 0x2009f5c ecx 0x200f160 edx 0x191c9e18 KERN: esi 0x19167d40 edi 0x0 ebp 0x7051de30 esp 0x8236dfdc KERN: eip 0x1fe6ce6 eflags 0x13286 user esp 0x7051dce4 KERN: vector: 0xe, error code: 0x6 KERN: 10 8236dfa8 (+ 0) 01fe6ce6 <_APP_> TermView<0x191c9e18>::_UpdateSIGWINCH(0x193d1a70) + 0x02 KERN: 11 7051de30 (+ 48) 01865b8b BLooper<0x19167d40>::DispatchMessage(BMessage*: 0x193d1a70, BHandler*: 0x191c9e18) + 0x5b KERN: 12 7051de60 (+ 512) 01941b31 BWindow<0x19167d40>::DispatchMessage(BMessage*: 0x193d1a70, BHandler*: 0x191c9e18) + 0x1975 KERN: 13 7051e060 (+ 96) 01945f34 BWindow<0x19167d40>::task_looper(0x0) + 0x270 KERN: 14 7051e0c0 (+ 48) 01866fbf BLooper<0x19167d40>::_task0_(NULL) + 0x3f KERN: 15 7051e0f0 (+ 48) 01af0d0f _get_next_team_info (nearest) + 0x5f KERN: 16 7051e120 (+ 0) 614c6250 commpage_thread_exit + 0x00 KERN: kdebug> in KERN: in16 in32 in8 in_context inb info ins ints inw kdebug> in_context 748usage: in_context ... KERN: Executes a command in the context of a given thread. KERN: kdebug> in_context 748 dis -b 100x01fe6ce6: e583 in $0x83, %eax KERN: 0x01fe6ce8: ec in %dx, %al KERN: 0x01fe6ce9: 105653 adc %dl, 0x53(%esi) KERN: 0x01fe6cec: e800000000 call 0x1fe6cf1 KERN: 0x01fe6cf1: 5b pop %ebx KERN: 0x01fe6cf2: 81c36b560200 add $0x2566b, %ebx KERN: 0x01fe6cf8: 8b7508 mov 0x8(%ebp), %esi KERN: 0x01fe6cfb: 80be4901000000 cmpb $0x0, 0x149(%esi) KERN: 0x01fe6d02: 7424 jz 0x1fe6d28 KERN: 0x01fe6d04: 83c4fc add $0xfc, %esp KERN: kdebug> mapping 0x01fe6ce6 748page directory: 0xe11d8000 (PDPT[0]) KERN: page directory entry 15 (0xe11d8078): 0x310d4027 KERN: access: present writable user executable KERN: caching: KERN: flags: accessed KERN: page table: 0x310d4000 KERN: page table entry 486 (phys: 0x310d4f30): 0x311b0025 KERN: access: present user executable global KERN: caching: KERN: flags: accessed KERN: address: 0x311b0000 KERN: kdebug> exithda: Unsolicited response: 00000081/00000010 KERN: hda: Unsolicited response: 00000001/00000010 KERN: hda: sensed pin widget 27, 0