vimage kernel broken

Julian Elischer julian at elischer.org
Sat May 24 21:24:30 UTC 2008


On May 24, 2008, at 2:11 PM, Kris Kennaway wrote:

> Julian Elischer wrote:
>> On May 24, 2008, at 8:30 AM, Kris Kennaway wrote:
>>> I tried to boot a kernel taken from the vimage p4 branch, but it  
>>> panics when starting lockd during multiuser boot:
>> this is believable.
>> Particularly as I see you are using IPv6 and I don't have IPv6 test  
>> facilities.
>> nlm? hmm what were you doing?
>
> As mentioned, just booting the system with rpc.lockd enabled in  
> rc.conf.  A kernel with IPv6 compiled in is all that's needed.

I'll see if I can find a smoking gun.

>
>
> Kris
>
>>>
>>>
>>> Kris
>>>
>>> ----
>>> Starting lockd.
>>>
>>>
>>> Fatal trap 12: page fault while in kernel mode
>>> cpuid = 0; apic id = 00
>>> fault virtual address   = 0x0
>>> fault code              = supervisor read, page not present
>>> instruction pointer     = 0x20:0xc08afb8e
>>> stack pointer           = 0x28:0xc6f3f8a8
>>> frame pointer           = 0x28:0xc6f3f8fc
>>> code segment            = base 0x0, limit 0xfffff, type 0x1b
>>>                       = DPL 0, pres 1, def32 1, gran 1
>>> processor eflags        = interrupt enabled, resume, IOPL = 0
>>> current process         = 764 (rpc.lockd)
>>> [thread pid 764 tid 100047 ]
>>> Stopped at      sa6_recoverscope+0x7e:  movl    0(%eax),%edi
>>> db> wh
>>> Tracing pid 764 tid 100047 td 0xc71cbcc0
>>> sa6_recoverscope(c71e0c00,1c,2,0,c82c0c4c,...) at sa6_recoverscope 
>>> +0x7e
>>> in6_sockaddr(0,c6f3f930,1f8,0,0,...) at in6_sockaddr+0x6d
>>> in6_getsockaddr(c833c318,c6f3f98c,c833c318,c6f3f9e8,c6f3f9a0,...)  
>>> at in6_getsockaddr+0x89
>>> in6_mapped_sockaddr 
>>> (c833c318,c6f3f98c,c71cbd64,c0afde50,c6f3f9a0,...) at  
>>> in6_mapped_sockaddr+0x5c
>>> __rpc_socket2sockinfo(c833c318,c6f3f9e8,c0c09db4,4,c0ad9548,...)  
>>> at __rpc_socket2sockinfo+0x28
>>> clnt_dg_create(c833c318,c6f3faa4,186a0,4,0,...) at clnt_dg_create 
>>> +0x3f
>>> nlm_get_rpc(c6f3fc04,1c,2,0,c7080800,...) at nlm_get_rpc+0xb8
>>> nlm_syscall(c71cbcc0,c6f3fcfc,10,c71cbcc0,c0b93370,...) at  
>>> nlm_syscall+0x227
>>> syscall(c6f3fd38) at syscall+0x2a3
>>> Xint0x80_syscall() at Xint0x80_syscall+0x20
>>> --- syscall (154, FreeBSD ELF32, nlm_syscall), eip = 0x280e315b,  
>>> esp = 0xbfbfedbc, ebp = 0xbfbfee88 ---



More information about the freebsd-virtualization mailing list