bfs: bfs_open_dir:1588: Not a directory heap_add_area: area 3846 added to small heap 0xccd0c000 - usable range 0x98c07000 - 0x99000000 heap_add_area: area 3968 added to small heap 0xccd0c000 - usable range 0x9a407000 - 0x9a800000 PANIC: Invalid concurrent access to page 0x82927b04 (start), currently accessed by: 6 Welcome to Kernel Debugging Land... Thread 652 "gcc" running on CPU 1 kdebug> bt stack trace for thread 652 "gcc" kernel stack: 0x99b84000 to 0x99b88000 user stack: 0x7efef000 to 0x7ffef000 frame caller :function + offset 0 99b874c8 (+ 48) 8006e52c invoke_command_trampoline(0x99b87560) + 0x001c 1 99b874f8 (+ 12) 800f2ed0 :arch_debug_call_with_fault_handler + 0x001b 2 99b87504 (+ 48) 8006d705 :debug_call_with_fault_handler + 0x0065 3 99b87534 (+ 64) 8006e78a :invoke_debugger_command + 0x00b6 4 99b87574 (+ 64) 8006e5b4 invoke_pipe_segment(debugger_command_pipe*: 0x84140030, int32: 0, 0x0 "") + 0x007c 5 99b875b4 (+ 64) 8006e8e0 :invoke_debugger_command_pipe + 0x008c 6 99b875f4 (+ 48) 800702f4 ExpressionParser<0x99b876a4>::_ParseCommandPipe(0x99b876a0) + 0x023c 7 99b87624 (+ 64) 8006f725 ExpressionParser<0x99b876a4>::EvaluateCommand(0x80144ce0 "bt", 0x99b876a0) + 0x02ad 8 99b87664 (+ 224) 800716f8 :evaluate_debug_command + 0x0080 9 99b87744 (+ 80) 8006c26d kernel_debugger_loop(0x99b87834 "Invalid concurrent access to page 0x82927b04 (start), currently accessed by: 6", int32: 1) + 0x02a1 10 99b87794 (+ 48) 8006c4d6 kernel_debugger_internal(0x99b87834 "Invalid concurrent access to page 0x82927b04 (start), currently accessed by: 6", int32: 1) + 0x0046 11 99b877c4 (+ 48) 8006d8cb :kernel_debugger + 0x0023 12 99b877f4 (+ 192) 8006d89d :panic + 0x0029 13 99b878b4 (+ 96) 800de576 :vm_page_allocate_page + 0x04ea 14 99b87914 (+ 144) 800d1755 :vm_create_anonymous_area + 0x0449 15 99b879a4 (+ 96) 800d8453 :create_area_etc + 0x0047 16 99b87a04 (+ 80) 8005aff7 create_team_user_data(team*: 0x9a496000) + 0x0037 17 99b87a54 (+1248) 8005c1e6 fork_team() + 0x02e2 18 99b87f34 (+ 16) 8005e853 :_user_fork + 0x000b 19 99b87f44 (+ 100) 800f34b2 :handle_syscall + 0x00af user iframe at 0x99b87fa8 (end = 0x99b88000) eax 0x27 ebx 0x2dffe0 ecx 0x7ffeec90 edx 0xffff0114 esi 0x2f8f94 edi 0x18024f18 ebp 0x7ffeecbc esp 0x99b87fdc eip 0xffff0114 eflags 0x246 user esp 0x7ffeec90 vector: 0x63, error code: 0x0 20 99b87fa8 (+ 0) ffff0114 :commpage_syscall + 0x0004 21 7ffeecbc (+ 32) 002b29bc :vfork + 0x0018 22 7ffeecdc (+ 64) 0020d0d9 :pexecute + 0x00d9 23 7ffeed1c (+ 128) 002046ed :xstrerror (nearest) + 0x1a6d 24 7ffeed9c (+ 112) 002074d4 :do_spec (nearest) + 0x02ec 25 7ffeee0c (+ 48) 00207244 :do_spec + 0x005c 26 7ffeee3c (+ 304) 0020b1ea :main + 0x176a 27 7ffeef6c (+ 48) 0020222f :_start + 0x005b 28 7ffeef9c (+ 64) 00105bb6 :unknown + 0x5bb6 29 7ffeefdc (+ 0) 7ffeefec 17725:gcc_main_stack@0x7efef000 + 0xffffec kdebug> cpu 2 invalid CPU index kdebug> cpu 2 0 Welcome to Kernel Debugging Land... Thread 647 "cc1" running on CPU 0 kdebug> bf t stack trace for thread 647 "cc1" kernel stack: 0x99b80000 to 0x99b84000 user stack: 0x7efee000 to 0x7ffee000 frame caller :function + offset 0 99b83b60 (+ 48) 8006e52c invoke_command_trampoline(0x99b83bf8) + 0x001c 1 99b83b90 (+ 12) 800f2ed0 :arch_debug_call_with_fault_handler + 0x001b 2 99b83b9c (+ 48) 8006d705 :debug_call_with_fault_handler + 0x0065 3 99b83bcc (+ 64) 8006e78a :invoke_debugger_command + 0x00b6 4 99b83c0c (+ 64) 8006e5b4 invoke_pipe_segment(debugger_command_pipe*: 0x84140030, int32: 0, 0x0 "") + 0x007c 5 99b83c4c (+ 64) 8006e8e0 :invoke_debugger_command_pipe + 0x008c 6 99b83c8c (+ 48) 800702f4 ExpressionParser<0x99b83d3c>::_ParseCommandPipe(0x99b83d38) + 0x023c 7 99b83cbc (+ 64) 8006f725 ExpressionParser<0x99b83d3c>::EvaluateCommand(0x801454e0 "bt", 0x99b83d38) + 0x02ad 8 99b83cfc (+ 224) 800716f8 :evaluate_debug_command + 0x0080 9 99b83ddc (+ 80) 8006c26d kernel_debugger_loop(0x0 "", int32: 0) + 0x02a1 10 99b83e2c (+ 48) 8006c4d6 kernel_debugger_internal(0x0 "", int32: 0) + 0x0046 11 99b83e5c (+ 64) 8006d551 :debug_trap_cpu_in_kdl + 0x004d 12 99b83e9c (+ 48) 800572e7 process_pending_ici(int32: 0) + 0x00ff 13 99b83ecc (+ 48) 8005730b :smp_intercpu_int_handler + 0x0013 14 99b83efc (+ 48) 800efc76 i386_ici_interrupt(NULL) + 0x0032 15 99b83f2c (+ 64) 80045a82 :int_io_interrupt_handler + 0x006a 16 99b83f6c (+ 48) 800ef0d9 hardware_interrupt(iframe*: 0x99b83fa8) + 0x0071 17 99b83f9c (+ 12) 800f32e6 :int_bottom_user + 0x005a user iframe at 0x99b83fa8 (end = 0x99b84000) eax 0x0 ebx 0x3d805c ecx 0x3f004a edx 0x3f000e esi 0x7ffecb58 edi 0x181a7714 ebp 0x7ffeca5c esp 0x99b83fdc eip 0x342d75 eflags 0x10246 user esp 0x7ffeca34 vector: 0xfd, error code: 0x0 18 99b83fa8 (+ 0) 00342d75 :memory_address_p + 0x003d 19 7ffeca5c (+ 48) 003428c3 :address_operand + 0x0023 20 7ffeca8c (+ 64) 0034b914 :recog_2 + 0x0bb4 21 7ffecacc (+ 64) 00354151 :recog + 0x015d 22 7ffecb0c (+ 80) 00309642 :extended_count (nearest) + 0x14f2 23 7ffecb5c (+ 256) 002fca37 :combine_instructions (nearest) + 0x29c7 24 7ffecc5c (+2832) 002fa364 :combine_instructions + 0x02f4 25 7ffed76c (+ 176) 0022bd7f :rest_of_compilation + 0x0dcf 26 7ffed81c (+ 64) 0039ac1e :finish_function + 0x00f2 27 7ffed85c (+1376) 0038749a :yyparse + 0x0efe 28 7ffeddbc (+ 64) 0022a501 :check_global_declarations (nearest) + 0x0c1d 29 7ffeddfc (+ 368) 0022e406 :main + 0x1572 30 7ffedf6c (+ 48) 00227d1f :_start + 0x005b 31 7ffedf9c (+ 64) 00105bb6 :unknown + 0x5bb6 32 7ffedfdc (+ 0) 7ffedfec 17528:cc1_main_stack@0x7efee000 + 0xffffec kdebug> info kernel build: Jan 11 2010 14:03:51 SVN revision: 35012 cpu count: 2, active times: [1] 27248898 [2] 30598514 pages: 226041 (753600 max) sems: 984 (65536 max) ports: 147 (4096 max) threads: 131 (4096 max) teams: 25 (2048 max) kdebug> running thread id state wait for object cpu pri stack team name 0xcd4ad000 652 running - 1 5 0x99b84000 652 gcc 0xcd4a3000 647 running - 0 5 0x99b80000 647 cc1 kdebug> thread 6 THREAD: 0x81802000 id: 6 (0x6) name: "page scrubber" all_next: 0x00000000 team_next: 0x81801800 q_next: 0x80150590 priority: 1 (next 1, I/O: -1) state: ready next_state: ready cpu: 0x00000000 sig_pending: 0x0 (blocked: 0x0) in_kernel: 1 fault_handler: 0x00000000 args: 0x00000000 0x00000000 entry: 0x800dacf8 team: 0x80fce000, "kernel_team" exit.sem: 17 exit.status: 0x0 (No error) exit.reason: 0x0 exit.signal: 0x0 exit.waiters: kernel_stack_area: 105 kernel_stack_base: 0x807ad000 user_stack_area: -1 user_stack_base: 0x00000000 user_local_storage: 0x00000000 user_thread: 0x00000000 kernel_errno: 0x0 (No error) kernel_time: 32958 user_time: 0 flags: 0x0 architecture dependant section: esp: 0x807b0dd8 ss: 0x00000010 fpu_state at 0x818023d0 kdebug> bt 6 stack trace for thread 6 "page scrubber" kernel stack: 0x807ad000 to 0x807b1000 frame caller :function + offset 0 807b0e34 (+ 48) 80067c07 context_switch(thread*: 0x81802000, thread*: 0x81807800) + 0x003f 1 807b0e64 (+ 96) 80067fb7 reschedule() + 0x036b 2 807b0ec4 (+ 48) 800ef11a hardware_interrupt(iframe*: 0x807b0f00) + 0x00b2 3 807b0ef4 (+ 12) 800f327d :int_bottom + 0x003d kernel iframe at 0x807b0f00 (end = 0x807b0f50) eax 0x200 ebx 0x82927b04 ecx 0x0 edx 0x216 esi 0x8015a170 edi 0x0 ebp 0x807b0fd8 esp 0x807b0f34 eip 0x800db07f eflags 0x10216 vector: 0xfd, error code: 0x0 4 807b0f00 (+ 216) 800db07f page_scrubber(NULL) + 0x0387 5 807b0fd8 (+ 32) 8005f737 _create_kernel_thread_kentry() + 0x001b 6 807b0ff8 (+2139418632) 8005f6d4 thread_kthread_exit() + 0x0000 kdebug> co PANIC: Invalid concurrent access to page 0x82927b04 (check), currently accessed by: 6 Welcome to Kernel Debugging Land... Thread 652 "gcc" running on CPU 0 kdebug> co PANIC: Invalid concurrent access to page 0x82927b04 (check), currently accessed by: 6 Welcome to Kernel Debugging Land... Thread 652 "gcc" running on CPU 0 kdebug> co PANIC: Invalid concurrent access to page 0x82927b04 (end) by current thread, current accessor is: 6 Welcome to Kernel Debugging Land... Thread 652 "gcc" running on CPU 0 kdebug> co bfs: bfs_open_dir:1588: Not a directory