Welcome to kernel debugger output! Haiku revision: hrevr1alpha4-44702 CPU 0: type 0 family 6 extended_family 0 model 10 extended_model 2 stepping 7, string 'GenuineIntel' CPU 0: vendor 'Intel' model name 'Intel(R) Core(TM) i3-2350M CPU @ 2.30GHz' CPU 0: features: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clfsh ds mmx fxsr sse sse2 ss sse3 pclmulqdq vmx ssse3 cx16 pcid sse4_1 sse4_2 x2apic popcnt xsave avx hypervisor dts arat pln ecmd ptm aperfmperf epb reserve_io_interrupt_vectors: reserved 16 vectors starting from 0 reserve_io_interrupt_vectors: reserved 2 vectors starting from 98 using 32 bit paging (PAE not needed) mark_page_range_in_use(0x0, 0x100): start page is before free list mark_page_range_in_use(0x0, 0xa0): start page is before free list add_memory_type_range(4, 0x0, 0xa0000, 6) add_memory_type_range(5, 0xe0000, 0x20000, 6) add_memory_type_range(84, 0xd0000000, 0x300000, 0) PANIC: could not read block 327778: bytesRead: -1, error: Invalid Argument Welcome to Kernel Debugging Land... Thread 419 "add poses" running on CPU 1 stack trace for thread 419 "add poses" kernel stack: 0x807ac000 to 0x807b0000 user stack: 0x7817a000 to 0x781ba000 frame caller :function + offset 0 807afad8 (+ 32) 8012599a :arch_debug_stack_trace + 0x0012 1 807afaf8 (+ 16) 80091e8f stack_trace_trampoline(NULL) + 0x000b 2 807afb08 (+ 12) 8012ae06 :arch_debug_call_with_fault_handler + 0x001b 3 807afb14 (+ 48) 8009391e :debug_call_with_fault_handler + 0x005e 4 807afb44 (+ 64) 800920af kernel_debugger_loop(0x8016f7d7 "PANIC: ", 0x80149020 "could not read block %Ld: bytesRead: %ld, error: %s ", 0x807afbf0 "b", int32: 1) + 0x021b 5 807afb84 (+ 48) 80092413 kernel_debugger_internal(0x8016f7d7 "PANIC: ", 0x80149020 "could not read block %Ld: bytesRead: %ld, error: %s ", 0x807afbf0 "b", int32: 1) + 0x0053 6 807afbb4 (+ 48) 80093c98 :panic + 0x0024 7 807afbe4 (+ 112) 80047730 get_cached_block(block_cache*: 0xd801df10, int64: 327778, 0x807afc9b, true) + 0x0264 8 807afc54 (+ 80) 8004b436 :block_cache_get_etc + 0x004e 9 807afca4 (+ 48) 8004b4e8 :block_cache_get + 0x0020 10 807afcd4 (+ 352) 81caa255 ISOReadDirEnt(iso9660_volume*: 0xcf10c808, dircookie*: 0xd8020a98, dirent*: 0xd8d7c000, uint32: 0x2800 (10240)) + 0x00dd 11 807afe34 (+ 48) 81cac038 fs_read_dir(fs_volume*: 0xd8020d98, fs_vnode*: 0xd8070158, 0xd8020a98, dirent*: 0xd8d7c000, uint32: 0x2800 (10240), 0x807aff30) + 0x0030 12 807afe64 (+ 64) 800dff1f dir_read(io_context*: 0xcf1e2108, vnode*: 0xd8070158, 0xd8020a98, dirent*: 0xd8d7c000, uint32: 0x2800 (10240), 0x807aff30) + 0x004b 13 807afea4 (+ 64) 800dfd37 dir_read(io_context*: 0xcf1e2108, file_descriptor*: 0xd80674f0, dirent*: 0xd8d7c000, uint32: 0x2800 (10240), 0x807aff30) + 0x002b 14 807afee4 (+ 96) 800cbddf :_user_read_dir + 0x012b 15 807aff44 (+ 100) 8012c070 :handle_syscall + 0x00cd user iframe at 0x807affa8 (end = 0x807b0000) eax 0x8f ebx 0x4ec914 ecx 0x781b9a10 edx 0xffff0114 esi 0x181b5700 edi 0x1812cd40 ebp 0x781b9a3c esp 0x807affdc eip 0xffff0114 eflags 0x3246 user esp 0x781b9a10 vector: 0x63, error code: 0x0 16 807affa8 (+ 0) ffff0114 :commpage_syscall + 0x0004 17 781b9a3c (+ 48) 005c6208 BPrivate::CachedEntryIterator<0x1812cd10>::GetNextDirents(dirent*: 0x781b9b68, uint32: 0x400 (1024), int32: 1) + 0x0078 18 781b9a6c (+1344) 0062d192 BPrivate::BPoseView<0x1810e888>::AddPosesTask(NULL) + 0x036a 19 781b9fac (+ 48) 007206e3 :_get_next_team_info (nearest) + 0x005f 20 781b9fdc (+ 0) 781b9fec 15535:add poses_419_stack@0x7817a000 + 0x3ffec kdebug> bt stack trace for thread 419 "add poses" kernel stack: 0x807ac000 to 0x807b0000 user stack: 0x7817a000 to 0x781ba000 frame caller :function + offset 0 807af8c8 (+ 48) 80094988 invoke_command_trampoline(0x807af960) + 0x001c 1 807af8f8 (+ 12) 8012ae06 :arch_debug_call_with_fault_handler + 0x001b 2 807af904 (+ 48) 8009391e :debug_call_with_fault_handler + 0x005e 3 807af934 (+ 64) 80094be1 :invoke_debugger_command + 0x00b9 4 807af974 (+ 64) 80094a0d invoke_pipe_segment(debugger_command_pipe*: 0xcce38030, int32: 0, 0x0 "") + 0x0079 5 807af9b4 (+ 64) 80094d4c :invoke_debugger_command_pipe + 0x009c 6 807af9f4 (+ 48) 800969d4 ExpressionParser<0x807afaa4>::_ParseCommandPipe(0x807afaa0) + 0x0234 7 807afa24 (+ 64) 80095bf4 ExpressionParser<0x807afaa4>::EvaluateCommand(0x8019ef60 "bt", 0x807afaa0) + 0x02d0 8 807afa64 (+ 224) 80098020 :evaluate_debug_command + 0x0080 9 807afb44 (+ 64) 800921be kernel_debugger_loop(0x8016f7d7 "PANIC: ", 0x80149020 "could not read block %Ld: bytesRead: %ld, error: %s ", 0x807afbf0 "b", int32: 1) + 0x032a 10 807afb84 (+ 48) 80092413 kernel_debugger_internal(0x8016f7d7 "PANIC: ", 0x80149020 "could not read block %Ld: bytesRead: %ld, error: %s ", 0x807afbf0 "b", int32: 1) + 0x0053 11 807afbb4 (+ 48) 80093c98 :panic + 0x0024 12 807afbe4 (+ 112) 80047730 get_cached_block(block_cache*: 0xd801df10, int64: 327778, 0x807afc9b, true) + 0x0264 13 807afc54 (+ 80) 8004b436 :block_cache_get_etc + 0x004e 14 807afca4 (+ 48) 8004b4e8 :block_cache_get + 0x0020 15 807afcd4 (+ 352) 81caa255 ISOReadDirEnt(iso9660_volume*: 0xcf10c808, dircookie*: 0xd8020a98, dirent*: 0xd8d7c000, uint32: 0x2800 (10240)) + 0x00dd 16 807afe34 (+ 48) 81cac038 fs_read_dir(fs_volume*: 0xd8020d98, fs_vnode*: 0xd8070158, 0xd8020a98, dirent*: 0xd8d7c000, uint32: 0x2800 (10240), 0x807aff30) + 0x0030 17 807afe64 (+ 64) 800dff1f dir_read(io_context*: 0xcf1e2108, vnode*: 0xd8070158, 0xd8020a98, dirent*: 0xd8d7c000, uint32: 0x2800 (10240), 0x807aff30) + 0x004b 18 807afea4 (+ 64) 800dfd37 dir_read(io_context*: 0xcf1e2108, file_descriptor*: 0xd80674f0, dirent*: 0xd8d7c000, uint32: 0x2800 (10240), 0x807aff30) + 0x002b 19 807afee4 (+ 96) 800cbddf :_user_read_dir + 0x012b 20 807aff44 (+ 100) 8012c070 :handle_syscall + 0x00cd user iframe at 0x807affa8 (end = 0x807b0000) eax 0x8f ebx 0x4ec914 ecx 0x781b9a10 edx 0xffff0114 esi 0x181b5700 edi 0x1812cd40 ebp 0x781b9a3c esp 0x807affdc eip 0xffff0114 eflags 0x3246 user esp 0x781b9a10 vector: 0x63, error code: 0x0 21 807affa8 (+ 0) ffff0114 :commpage_syscall + 0x0004 22 781b9a3c (+ 48) 005c6208 BPrivate::CachedEntryIterator<0x1812cd10>::GetNextDirents(dirent*: 0x781b9b68, uint32: 0x400 (1024), int32: 1) + 0x0078 23 781b9a6c (+1344) 0062d192 BPrivate::BPoseView<0x1810e888>::AddPosesTask(NULL) + 0x036a 24 781b9fac (+ 48) 007206e3 :_get_next_team_info (nearest) + 0x005f 25 781b9fdc (+ 0) 781b9fec 15535:add poses_419_stack@0x7817a000 + 0x3ffec kdebug>