Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- PANIC: try_acquire_read_spinlock(): attempt to acquire lock 0x828cb414 twice on non-SMP system
- Welcome to Kernel Debugging Land...
- Thread 460 "qe" running on CPU 0
- stack trace for thread 460 "qe"
- kernel stack: 0x81eb9000 to 0x81ebd000
- user stack: 0x71a4e000 to 0x72a4e000
- frame caller <image>:function + offset
- 0 81ebcb60 (+ 32) 801407fe <kernel_x86> arch_debug_stack_trace + 0x12
- 1 81ebcb80 (+ 16) 800a0813 <kernel_x86> stack_trace_trampoline(NULL) + 0x0b
- 2 81ebcb90 (+ 12) 801324ee <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
- 3 81ebcb9c (+ 48) 800a237e <kernel_x86> debug_call_with_fault_handler + 0x5a
- 4 81ebcbcc (+ 64) 800a0a2f <kernel_x86> kernel_debugger_loop(0x80183257 "PANIC: ", 0x801651e0 "try_acquire_read_spinlock(): attempt to acquire lock %p twice on non-SMP system", 0x81ebcc78 "���K ��0", int32: 0) + 0x217
- 5 81ebcc0c (+ 48) 800a0dab <kernel_x86> kernel_debugger_internal(0x80183257 "PANIC: ", 0x801651e0 "try_acquire_read_spinlock(): attempt to acquire lock %p twice on non-SMP system", 0x81ebcc78 "���K ��0", int32: 0) + 0x53
- 6 81ebcc3c (+ 48) 800a2706 <kernel_x86> panic + 0x3a
- 7 81ebcc6c (+ 48) 80072eac <kernel_x86> try_acquire_read_spinlock + 0x40
- 8 81ebcc9c (+ 64) 80091f44 <kernel_x86> scheduler_enqueue_in_run_queue + 0x54
- 9 81ebccdc (+ 64) 80055417 <kernel_x86> ConditionVariable<0x801c4ef8>::_NotifyLocked(true, int32: 0) + 0xd7
- 10 81ebcd1c (+ 64) 8005530e <kernel_x86> ConditionVariable<0x801c4ef8>::_Notify(true, int32: 0) + 0x72
- 11 81ebcd5c (+ 64) 8005663c <kernel_x86> BKernel::DPCQueue<0x801c4ee0>::Add(BKernel::DPCCallback*: 0xd2047e64) + 0x118
- 12 81ebcd9c (+ 32) 80087f22 <kernel_x86> BKernel::SignalEvent<0xd2047e60>::Fire(0x0) + 0x42
- 13 81ebcdbc (+ 48) 80088e80 <kernel_x86> BKernel::UserTimer<0xd2046798>::HandleTimer(0x8287fa08) + 0x24
- 14 81ebcdec (+ 64) 8008a9e3 <kernel_x86> BKernel::TeamUserTimeUserTimer<0xd2046798>::Check(0xd205bd28) + 0x4f
- 15 81ebce2c (+ 48) 8008c494 <kernel_x86> user_timer_check_team_user_timers + 0x34
- 16 81ebce5c (+ 208) 80093416 <kernel_x86> reschedule(int32: 2) + 0xcde
- 17 81ebcf2c (+ 48) 800937d1 <kernel_x86> scheduler_reschedule + 0x61
- 18 81ebcf5c (+ 64) 80141e29 <kernel_x86> x86_hardware_interrupt + 0xe1
- 19 81ebcf9c (+ 12) 80134fae <kernel_x86> int_bottom_user + 0x73
- user iframe at 0x81ebcfa8 (end = 0x81ebd000)
- eax 0x7e ebx 0x2616890 ecx 0x72a44df0 edx 0xc5
- esi 0x72a4d0e8 edi 0x127 ebp 0x72a433e0 esp 0x81ebcfdc
- eip 0x25ca5c7 eflags 0x13206 user esp 0x72a433e0
- vector: 0xfb, error code: 0x0
- 20 81ebcfa8 (+ 0) 025ca5c7 <qe> text_move_left_right_visual (nearest) + 0x17f
- 21 72a433e0 (+ 48) 025ca616 <qe> text_move_left_right_visual (nearest) + 0x1ce
- 22 72a43410 (+ 192) 025cd1d5 <qe> display_bol (nearest) + 0x72c
- 23 72a434d0 (+ 80) 025cdc35 <qe> display_eol + 0x3e
- 24 72a43520 (+6240) 025ce415 <qe> text_display + 0x358
- 25 72a44d80 (+ 48) 025cdca4 <qe> display_eol (nearest) + 0xad
- 26 72a44db0 (+33616) 025ca6fa <qe> text_mouse_goto + 0x80
- 27 72a4d100 (+ 64) 025d42b5 <qe> qe_mouse_event + 0x14b
- 28 72a4d140 (+ 48) 025d4700 <qe> qe_handle_event + 0x9f
- 29 72a4d170 (+ 176) 025dfd55 <qe> FrameResized__6QEViewff (nearest) + 0x104c
- 30 72a4d220 (+ 352) 025e0e5c <qe> qe_kill_timer (nearest) + 0x2e3
- 31 72a4d380 (+ 32) 025e0f75 <qe> url_main_loop + 0x3a
- 32 72a4d3a0 (+ 80) 025d5cef <qe> main + 0x34
- 33 72a4d3f0 (+ 48) 025c8a0f <qe> _start + 0x5b
- 34 72a4d420 (+ 48) 0109c046 </boot/system/runtime_loader@0x0108c000> <unknown> + 0x10046
- 35 72a4d450 (+ 0) 61a58250 <commpage> commpage_thread_exit + 0x00
- kdebug> info
- kernel build: Jan 24 2014 08:53:26 (gcc2 2.95.3-haiku-2013_08_15)
- revision: hrev46755
- cpu count: 1
- [1] active time: 18922978, interrupt time: 2445608, irq time: 153472
- pages: 53825 (130800 max)
- sems: 1477 (65536 max)
- ports: 262 (4096 max)
- threads: 200 (4096 max)
- teams: 21 (2048 max)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement