bt stack trace for thread 250 "mountvolume" kernel stack: 0x847a0000 to 0x847a4000 user stack: 0x7efef000 to 0x7ffef000 frame caller :function + offset 0 847a38b8 (+ 48) 800667b4 invoke_command_trampoline(0x847a3950) + 0x001c 1 847a38e8 (+ 12) 800ded9b :arch_debug_call_with_fault_handler + 0x001b 2 847a38f4 (+ 48) 80065650 :debug_call_with_fault_handler + 0x0054 3 847a3924 (+ 64) 80066a0d :invoke_debugger_command + 0x00b9 4 847a3964 (+ 64) 80066839 invoke_pipe_segment(debugger_command_pipe*: 0x843de030, int32: 0, 0x0 "") + 0x0079 5 847a39a4 (+ 64) 80066b78 :invoke_debugger_command_pipe + 0x009c 6 847a39e4 (+ 48) 80068574 ExpressionParser<0x847a3a94>::_ParseCommandPipe(0x847a3a90) + 0x0234 7 847a3a14 (+ 64) 800679ae ExpressionParser<0x847a3a94>::EvaluateCommand(0x80128c60 "bt", 0x847a3a90) + 0x02ba 8 847a3a54 (+ 224) 80069988 :evaluate_debug_command + 0x0080 9 847a3b34 (+ 64) 8006460e kernel_debugger_loop(0x847a3c14 "free(): address 0x815aeb40 already exists in page free list ", int32: 3) + 0x0276 10 847a3b74 (+ 48) 80064862 kernel_debugger_internal(0x847a3c14 "free(): address 0x815aeb40 already exists in page free list ", int32: 3) + 0x0042 11 847a3ba4 (+ 48) 8006574b :kernel_debugger + 0x0023 12 847a3bd4 (+ 192) 8006571d :panic + 0x0029 13 847a3c94 (+ 96) 8003dc7c :heap_free + 0x0198 14 847a3cf4 (+ 96) 8003e4cc heap_realloc(heap_allocator_s*: 0x813ea000, 0x815aeb40, 0x847a3d88, uint32: 0x50 (80)) + 0x024c 15 847a3d54 (+ 128) 8003ee13 :realloc + 0x0077 16 847a3dd4 (+ 48) 80094325 [*** READ FAULT at 0xffffffff, pc: 0x800ecec3 ***] kdebug> running thread id state wait for object cpu pri stack team name 0x854fe000 249 running - 2 10 0x8479c000 249 mountvolume 0x854fb000 250 running - 3 10 0x847a0000 250 mountvolume 0x8546e000 70 running - 0 15 0x80220000 64 messaging command processor 0x854fe800 247 running - 1 10 0x84794000 247 mountvolume kdebug> kdebug>