From owner-freebsd-current@freebsd.org Tue Apr 12 22:32:02 2016 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id D5F9EB0EA87 for ; Tue, 12 Apr 2016 22:32:02 +0000 (UTC) (envelope-from paulw@fisheyehq.com) Received: from smtprelay.hostedemail.com (smtprelay0079.hostedemail.com [216.40.44.79]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id AB9D11A76 for ; Tue, 12 Apr 2016 22:32:01 +0000 (UTC) (envelope-from paulw@fisheyehq.com) Received: from smtprelay.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by smtpgrave04.hostedemail.com (Postfix) with ESMTP id CB4EDB1BDE for ; Tue, 12 Apr 2016 13:02:48 +0000 (UTC) Received: from filter.hostedemail.com (unknown [216.40.38.60]) by smtprelay05.hostedemail.com (Postfix) with ESMTP id 13B6C26920A; Tue, 12 Apr 2016 13:02:42 +0000 (UTC) X-Session-Marker: 7061756C77406669736865796568712E636F6D X-Spam-Summary: 50, 0, 0, , d41d8cd98f00b204, paulw@fisheyehq.com, :::, RULES_HIT:10:41:355:379:421:541:542:599:800:960:966:967:973:988:989:1042:1155:1160:1260:1277:1311:1313:1314:1345:1359:1437:1515:1516:1518:1534:1543:1593:1594:1711:1730:1747:1777:1792:1801:1981:2194:2196:2199:2200:2393:2525:2553:2560:2563:2682:2685:2693:2859:2861:2933:2937:2939:2942:2945:2947:2951:2954:3022:3138:3139:3140:3141:3142:3355:3622:3865:3866:3867:3868:3870:3871:3872:3874:3934:3936:3938:3941:3944:3947:3950:3953:3956:3959:4184:4250:4321:4385:4605:5007:6117:6119:7903:7974:8829:8957:8985:9025:10004:10400:10848:11026:11232:11658:11914:12043:12517:12519:12555:12663:12740:13439:14096:14097:14180:14181:14721:21060:21080:21366:30012:30022:30054:30080:30083:30090:30091, 0, RBL:none, CacheIP:none, Bayesian:0.5, 0.5, 0.5, Netcheck:none, DomainCache:0, MSF:not bulk, SPF:fn, MSBL:0, DNSBL:none, Custom_rules:0:0:0, LFtime:3, LUA_SUMMARY:none X-HE-Tag: stick22_177812ce5660f X-Filterd-Recvd-Size: 4477 Received: from DESKTOPBP64BFH (host-212-159-139-150.static.as13285.net [212.159.139.150]) (Authenticated sender: paulw@fisheyehq.com) by omf08.hostedemail.com (Postfix) with ESMTPA; Tue, 12 Apr 2016 13:02:41 +0000 (UTC) From: "Paul Wootton" To: "'Konstantin Belousov'" Cc: References: <17ea940319f36a803594bd00940efe4f@fisheyehq.com> <20160412075534.GC18263@kib.kiev.ua> In-Reply-To: <20160412075534.GC18263@kib.kiev.ua> Subject: RE: Kernel trap when booting inside VirtualBox Date: Tue, 12 Apr 2016 14:02:42 +0100 Organization: Fisheye Message-ID: <000301d194bb$9aa42960$cfec7c20$@com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Office Outlook 12.0 Thread-Index: AdGUkLTNQ3nmdE/TR6y/FaaCtOOgcgAKpfcA Content-Language: en-gb X-Antivirus: avast! (VPS 160412-0, 12/04/2016), Outbound message X-Antivirus-Status: Clean X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 12 Apr 2016 22:32:02 -0000 On Tue, Apr 12, 2016 at 08:56AM, Konstantin Belousov wrote: >On Tue, Apr 12, 2016 at 07:14:47AM +0100, paulw@fisheyehq.com wrote: >> Hi, >> >> Has anyone else got an issue with running FreeBSD SVN r297810 inside a >> VirtualBox session? >> >> I installed 10.3, booting under EFI on my second harddrive (Windows in >> on the first drive). FreeBSD would boot correctly from UEFI boot or from >> inside VirtualBox. I SVNed up to head (r297810), compiled and installed >> it. >> It will now boot correctly from UEFI boot, but kernel traps very early >> on when booted from VirtualBox. >> >> As a side note, I am using booting from zfs. >> I am starting FreeBSD by calling boot1.efi from inside EFIShell (from >> both UEFI boot and VirtualBox) >> >> Has anyone else seen this? Is it my setup? >> >> real memory = 4831838208 (4608 MB) >> avail memory = 4096802816 (3907 MB) >> Event timer "LAPIC" quality 400 >> APIC APIC Table: >> Random: unblocking device. >> Loapic0 irqs 0-23 on motherboard Kernel trap 1 with >> interrupts disabled >> >> >> Fatal trap 1: privileged instruction fault while in kernel mode cpuid = >> 0: apic id = 00 >> instruction pointer = 0x20:0xffffffff80fed419 >> stack pointer = 0x28:0xffffffff824d9c00 >> frame pointer = 0x28:0xffffffff824d9c80 >> code segment = base 0x0, Limit 0xfffff, type 0x1b >> = DPL 0, pres 1, long 1, def32 0, gran 1 >> Processor eflags = resume, IOPL = 0 >> Current process = 0 (swapper) >> [ thread pid 0 tid 100000 ] >> Stopped as native_lapic_setup+0x99: lesl %edx,%esp >> db>bt >> Tracing pis 0 tid 100000 td 0xffffffff81d351b0 >> native_lapic_setup() at native_lapic_setup+0x99/frame 0xffffffff8249c80 >> apic_setup_io() at apic_setup_io+0x53/frame 0xffffffff824d9c90 >> mi_startup() at mi_startup+0x118/frame 0xffffffff824d9cb0 >> btext() at btext+0x2c >> db> >> >Was the panic text above trascribed from the screen manually ? > >Anyway, please do 'kgdb kernel.debug' for your HEAD kernel, and >send me the disassemble of the native_lapic_setup function. Yeah, I typed the panic out by hand " Dump of assembler code for function native_lapic_setup: 0xffffffff80fd1320 : add %al,(%rax) 0xffffffff80fd1322 : add %al,(%rax) 0xffffffff80fd1324 : add %al,(%rax) 0xffffffff80fd1326 : add %al,(%rax) 0xffffffff80fd1328 : add %al,(%rax) ... ... 0xffffffff80fd1880 : add %al,(%rax) 0xffffffff80fd1882 : add %al,(%rax) 0xffffffff80fd1884 : add %al,(%rax) 0xffffffff80fd1886 : add %al,(%rax) End of assembler dump " Every line is the same instruction, add %al,(%rax) I downloaded an ISO of r294499 and that booted correctly inside VBox. I SVNed down to r294499, compiled and that did not boot. Did a disassembley and it's the same as above. I downloaded an ISO of r297692 and that booted correctly. So it's got to be either my kernel conf or my enviroment Im going to try and compile a generic kernel and see if that works Paul --- This email has been checked for viruses by Avast antivirus software. https://www.avast.com/antivirus