devfs: reload driver "ice1712" (4, 11255) devfs: reload driver "emuxki" (4, 11257) emuxki: init_hardware() slab memory manager: created area 0xd1801000 (7330) slab memory manager: created area 0xd4001000 (7340) ps2: strange mouse data, x-delta -256, trying resync ps2: strange mouse data, x/y overflow, trying resync ps2: bad mouse data, trying resync ps2: strange mouse data, y-delta 116, trying resync ps2: bad mouse data, trying resync ps2: strange mouse data, y-delta 116, trying resync ps2: bad mouse data, trying resync slab memory manager: created area 0xd4801000 (7782) vm_soft_fault: va 0x0 not covered by area in address space vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0xc, ip 0x8951d6, write 0, user 1, thread 0x58d vm_page_fault: thread "pthread func" (1421) in team "template.test" (1418) tried to read address 0xc, ip 0x8951d6 ("template.test_seg0ro" +0xd61d6) debug_server: Thread 1421 entered the debugger: Segment violation stack trace, current PC 0x8951d6 html/template.(*Error).Error + 0x36: vm_soft_fault: va 0x0 not covered by area in address space vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x76, ip 0x801335c3, write 0, user 0, thread 0x58f register_domain(9, unix) debug_server: Killing team 1418 (/tmp/go-build715127384/html/template/_test/template.test -test.) debug_server: TeamDebugHandler::Init(): Failed to get info for team 1418: Operation on invalid team debug_server: KillTeam(): Error getting info for team 1418: Operation on invalid team debug_server: Killing team 1418 () runtime_loader: Cannot open file /usr/bin/perl: No such file or directory vm_soft_fault: va 0x0 not covered by area in address space vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x7, ip 0x1e78384, write 0, user 1, thread 0x748 vm_page_fault: thread "pthread func" (1864) in team "exec.test" (1864) tried to read address 0x7, ip 0x1e78384 ("exec.test_seg0ro" +0x109384) debug_server: Thread 1864 entered the debugger: Segment violation stack trace, current PC 0x1e78384 runtime.asmsysvicall6 + 0x34: (0x7123239c) 0x128c3c (mmap area + 0xbc3c) (0x1e77525) 0x8b000000 slab memory manager: created area 0xd5001000 (64865) vm_soft_fault: va 0x0 not covered by area in address space vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x0, ip 0x81f5c9, write 1, user 1, thread 0x7e0 vm_page_fault: thread "main" (2016) in team "main" (2016) tried to write address 0x0, ip 0x81f5c9 ("main_seg0ro" +0x3c5c9) debug_server: Thread 2016 entered the debugger: Segment violation stack trace, current PC 0x81f5c9 main.test + 0x159: PANIC: acquire_spinlock(): Failed to acquire spinlock 0xd0b48bb8 for a long time! Welcome to Kernel Debugging Land... Thread 2044 "pthread func" running on CPU 1 stack trace for thread 2044 "pthread func" kernel stack: 0x8023e000 to 0x80242000 user stack: 0x7122d000 to 0x7126d000 frame caller :function + offset 0 80241d10 (+ 32) 80141942 arch_debug_stack_trace + 0x12 1 80241d30 (+ 16) 800a187f stack_trace_trampoline(NULL) + 0x0b 2 80241d40 (+ 12) 8013367e arch_debug_call_with_fault_handler + 0x1b 3 80241d4c (+ 48) 800a33ea debug_call_with_fault_handler + 0x5a 4 80241d7c (+ 64) 800a1a9b kernel_debugger_loop(0x80184777 "PANIC: ", 0x80165e20 "acquire_spinlock(): Failed to acquire spinlock %p for a long time!", 0x80241e28 "▒▒▒▒L$▒04▒▒▒", int32: 1) + 0x217 5 80241dbc (+ 48) 800a1e17 kernel_debugger_internal(0x80184777 "PANIC: ", 0x80165e20 "acquire_spinlock(): Failed to acquire spinlock %p for a long time!", 0x80241e28 "▒▒▒▒L$▒04▒▒▒", int32: 1) + 0x53 6 80241dec (+ 48) 800a3772 panic + 0x3a 7 80241e1c (+ 48) 80073453 acquire_spinlock + 0x57 8 80241e4c (+ 224) 80093319 reschedule(int32: 2) + 0x129 9 80241f2c (+ 48) 800942a1 scheduler_reschedule + 0x61 10 80241f5c (+ 64) 80142f6d x86_hardware_interrupt + 0xe1 11 80241f9c (+ 12) 801360be int_bottom_user + 0x73 user iframe at 0x80241fa8 (end = 0x80242000) eax 0xb4d67bdb ebx 0x10b98400 ecx 0x10bc6350 edx 0x8350 esi 0x10b9876c edi 0x186a0 ebp 0x11010b5c esp 0x80241fdc eip 0x1acbfe4 eflags 0x13206 user esp 0x18cda8 vector: 0xfb, error code: 0x0 12 80241fa8 (+ 0) 01acbfe4 main (nearest) + 0x75e94 11010b5c -- read fault kdebug> running thread id state wait for object cpu pri stack team name 0xd0ab4320 2042 running - 0 10 0x82223000 2041 pthread func 0xd0ab0020 2044 running - 1 10 0x8023e000 2041 pthread func kdebug> thread 2042 THREAD: 0xd0ab4320 id: 2042 (0x7fa) serial_number: 2042 name: "pthread func" hash_next: 0x00000000 team_next: 0xd435f740 priority: 10 (I/O: -1) state: running cpu: 0x801be5c0 (0) sig_pending: 0x0 (blocked: 0x0, before sigsuspend(): 0x0) in_kernel: 1 fault_handler: 0x00000000 team: 0xd0b48a08, "pprof.test" exit.sem: 14441 exit.status: 0x0 (No error) exit.waiters: kernel_stack_area: 72597 kernel_stack_base: 0x82223000 user_stack_area: 72598 user_stack_base: 0x7128f000 user_local_storage: 0x712cf000 user_thread: 0x611e0040 kernel_errno: 0x0 (No error) kernel_time: 516 user_time: 91 flags: 0x0 architecture dependant section: esp: 0x82226cb8 ss: 0x82870010 fpu_state at 0xd0ab4510 scheduler data: priority_penalty: 0 additional_penalty: 6 (44496) effective_priority: 4 time_used: 404 us (quantum: 3800 us) stolen_time: 0 us quantum_start: 696343224 us needed_load: 24% went_sleep: 696343150 went_sleep_active: 154891140 core: 0 kdebug> thread 2044 THREAD: 0xd0ab0020 id: 2044 (0x7fc) serial_number: 2044 name: "pthread func" hash_next: 0x82a4eec0 team_next: 0xd435fb70 priority: 10 (I/O: -1) state: running cpu: 0x801be7e4 (1) sig_pending: 0x0 (blocked: 0x0, before sigsuspend(): 0x0) in_kernel: 1 fault_handler: 0x00000000 team: 0xd0b48a08, "pprof.test" exit.sem: 14450 exit.status: 0x0 (No error) exit.waiters: kernel_stack_area: 72602 kernel_stack_base: 0x8023e000 user_stack_area: 72603 user_stack_base: 0x7122d000 user_local_storage: 0x7126d000 user_thread: 0x611e00c0 kernel_errno: 0x0 (No error) kernel_time: 358 user_time: 1884 flags: 0x0 architecture dependant section: esp: 0x80241fa4 ss: 0x00000010 fpu_state at 0xd0ab0210 scheduler data: priority_penalty: 8 additional_penalty: 0 (44478) effective_priority: 2 time_used: 2039 us (quantum: 4400 us) stolen_time: 12 us quantum_start: 696342067 us needed_load: 99% went_sleep: 0 went_sleep_active: 0 core: 1 kdebug> spinlock 0xd0b48bb8 spinlock 0xd0b48bb8: locked from 0x00000000 kdebug> sc 2042 stack trace for thread 2042 "pthread func" kernel stack: 0x82223000 to 0x82227000 user stack: 0x7128f000 to 0x712cf000 frame caller :function + offset 0 82226b84 (+ 48) 80073e22 process_pending_ici(int32: 0) + 0xd6 1 82226bb4 (+ 48) 80073461 acquire_spinlock + 0x65 2 82226be4 (+ 64) 8007855e BKernel::Team<0xd0b48a08>::CPUTime(BKernel::Team: 0x6c00, true) + 0x6e 3 82226c24 (+ 80) 8008aba8 BKernel::TeamTimeUserTimer<0xd0c2d468>::_Update(false) + 0x7c 4 82226c74 (+ 48) 8008a953 BKernel::TeamTimeUserTimer<0xd0c2d468>::Update(BKernel::Thread*: NULL) + 0x67 5 82226ca4 (+ 48) 8008cda6 user_timer_continue_cpu_timers + 0x52 6 82226cd4 (+ 64) 8009311e thread_resumes(BKernel::Thread*: 0xd0ab4320) + 0xa6 7 82226d14 (+ 240) 80094206 reschedule(int32: 6) + 0x1016 8 82226e04 (+ 48) 800942a1 scheduler_reschedule + 0x61 9 82226e34 (+ 96) 80086382 thread_block_with_timeout + 0x1ae 10 82226e94 (+ 80) 80082ee6 common_snooze_etc(int64: 696343159, int32: 0, uint32: 0x15 (21), NULL) + 0x9e 11 82226ee4 (+ 96) 80087480 _user_snooze_etc + 0xac 12 82226f44 (+ 100) 8013623f handle_syscall + 0xdc user iframe at 0x82226fa8 (end = 0x82227000) eax 0xb9 ebx 0xc13d6c ecx 0x712ce834 edx 0x6203a114 esi 0x14 edi 0x0 ebp 0x712ce860 esp 0x82226fdc eip 0x6203a114 eflags 0x3202 user esp 0x712ce834 vector: 0x63, error code: 0x0 13 82226fa8 (+ 0) 6203a114 commpage_syscall + 0x04 14 712ce860 (+ 48) 00bdbbab usleep + 0x31 15 712ce890 (+ 12) 01a561b8 main (nearest) + 0x68 16 712ce89c (+ 0) 10b78290 72591:mmap area@0x10b60000 + 0x18290 17 01a55355 (+ 0) 8b000000 fc0d8b64 -- read fault kdebug> sc 2044 stack trace for thread 2044 "pthread func" kernel stack: 0x8023e000 to 0x80242000 user stack: 0x7122d000 to 0x7126d000 frame caller :function + offset 0 80241b00 (+ 48) 800a44d0 invoke_command_trampoline(0x80241b98) + 0x1c 1 80241b30 (+ 12) 8013367e arch_debug_call_with_fault_handler + 0x1b 2 80241b3c (+ 48) 800a33ea debug_call_with_fault_handler + 0x5a 3 80241b6c (+ 64) 800a4729 invoke_debugger_command + 0xb9 4 80241bac (+ 64) 800a4555 invoke_pipe_segment(debugger_command_pipe*: 0xcce38030, int32: 0, 0x0 "") + 0x79 5 80241bec (+ 64) 800a4894 invoke_debugger_command_pipe + 0x9c 6 80241c2c (+ 48) 800a67d4 ExpressionParser<0x80241cdc>::_ParseCommandPipe(0x80241cd8) + 0x234 7 80241c5c (+ 64) 800a59f4 ExpressionParser<0x80241cdc>::EvaluateCommand(0x801b76c0 "sc 2044", 0x80241cd8) + 0x2d0 8 80241c9c (+ 224) 800a7e20 evaluate_debug_command + 0x80 9 80241d7c (+ 64) 800a1baa kernel_debugger_loop(0x80184777 "PANIC: ", 0x80165e20 "acquire_spinlock(): Failed to acquire spinlock %p for a long time!", 0x80241e28 "▒▒▒▒L$▒04▒▒▒", int32: 1) + 0x326 10 80241dbc (+ 48) 800a1e17 kernel_debugger_internal(0x80184777 "PANIC: ", 0x80165e20 "acquire_spinlock(): Failed to acquire spinlock %p for a long time!", 0x80241e28 "▒▒▒▒L$▒04▒▒▒", int32: 1) + 0x53 11 80241dec (+ 48) 800a3772 panic + 0x3a 12 80241e1c (+ 48) 80073453 acquire_spinlock + 0x57 13 80241e4c (+ 224) 80093319 reschedule(int32: 2) + 0x129 14 80241f2c (+ 48) 800942a1 scheduler_reschedule + 0x61 15 80241f5c (+ 64) 80142f6d x86_hardware_interrupt + 0xe1 16 80241f9c (+ 12) 801360be int_bottom_user + 0x73 user iframe at 0x80241fa8 (end = 0x80242000) eax 0xb4d67bdb ebx 0x10b98400 ecx 0x10bc6350 edx 0x8350 esi 0x10b9876c edi 0x186a0 ebp 0x11010b5c esp 0x80241fdc eip 0x1acbfe4 eflags 0x13206 user esp 0x18cda8 vector: 0xfb, error code: 0x0 17 80241fa8 (+ 0) 01acbfe4 main (nearest) + 0x75e94 11010b5c -- read fault