vimage kernel broken
Julian Elischer
julian at elischer.org
Sat May 24 21:24:30 UTC 2008
On May 24, 2008, at 2:11 PM, Kris Kennaway wrote:
> Julian Elischer wrote:
>> On May 24, 2008, at 8:30 AM, Kris Kennaway wrote:
>>> I tried to boot a kernel taken from the vimage p4 branch, but it
>>> panics when starting lockd during multiuser boot:
>> this is believable.
>> Particularly as I see you are using IPv6 and I don't have IPv6 test
>> facilities.
>> nlm? hmm what were you doing?
>
> As mentioned, just booting the system with rpc.lockd enabled in
> rc.conf. A kernel with IPv6 compiled in is all that's needed.
I'll see if I can find a smoking gun.
>
>
> Kris
>
>>>
>>>
>>> Kris
>>>
>>> ----
>>> Starting lockd.
>>>
>>>
>>> Fatal trap 12: page fault while in kernel mode
>>> cpuid = 0; apic id = 00
>>> fault virtual address = 0x0
>>> fault code = supervisor read, page not present
>>> instruction pointer = 0x20:0xc08afb8e
>>> stack pointer = 0x28:0xc6f3f8a8
>>> frame pointer = 0x28:0xc6f3f8fc
>>> code segment = base 0x0, limit 0xfffff, type 0x1b
>>> = DPL 0, pres 1, def32 1, gran 1
>>> processor eflags = interrupt enabled, resume, IOPL = 0
>>> current process = 764 (rpc.lockd)
>>> [thread pid 764 tid 100047 ]
>>> Stopped at sa6_recoverscope+0x7e: movl 0(%eax),%edi
>>> db> wh
>>> Tracing pid 764 tid 100047 td 0xc71cbcc0
>>> sa6_recoverscope(c71e0c00,1c,2,0,c82c0c4c,...) at sa6_recoverscope
>>> +0x7e
>>> in6_sockaddr(0,c6f3f930,1f8,0,0,...) at in6_sockaddr+0x6d
>>> in6_getsockaddr(c833c318,c6f3f98c,c833c318,c6f3f9e8,c6f3f9a0,...)
>>> at in6_getsockaddr+0x89
>>> in6_mapped_sockaddr
>>> (c833c318,c6f3f98c,c71cbd64,c0afde50,c6f3f9a0,...) at
>>> in6_mapped_sockaddr+0x5c
>>> __rpc_socket2sockinfo(c833c318,c6f3f9e8,c0c09db4,4,c0ad9548,...)
>>> at __rpc_socket2sockinfo+0x28
>>> clnt_dg_create(c833c318,c6f3faa4,186a0,4,0,...) at clnt_dg_create
>>> +0x3f
>>> nlm_get_rpc(c6f3fc04,1c,2,0,c7080800,...) at nlm_get_rpc+0xb8
>>> nlm_syscall(c71cbcc0,c6f3fcfc,10,c71cbcc0,c0b93370,...) at
>>> nlm_syscall+0x227
>>> syscall(c6f3fd38) at syscall+0x2a3
>>> Xint0x80_syscall() at Xint0x80_syscall+0x20
>>> --- syscall (154, FreeBSD ELF32, nlm_syscall), eip = 0x280e315b,
>>> esp = 0xbfbfedbc, ebp = 0xbfbfee88 ---
More information about the freebsd-virtualization
mailing list