Date: Mon, 19 Feb 2007 20:44:09 -0600 From: Ryan Beasley <ryanb@FreeBSD.org> To: freebsd-hackers@freebsd.org Subject: [panic] RELENG_6_2: many extattr operations -> panic Message-ID: <45DA6079.2020705@FreeBSD.org>
next in thread | raw e-mail | index | archive | help
Hi, all. I recently started using extended attributes to record package origins to files installed with ports/packages. I patched find(1) to examine/test attributes, and periodically search /usr/local for files w/o the special attribute. Today I re-labeled all files in my packages' plists, and the subsequent search w/ my modified find led to a panic. (The combination of these two procedures panics reliably on my laptop.) Kernel is RELENG_6_2 as of ~Jan 6th. Unforunately, kgdb can go back no further than the generic_bcopy(). (It reports "Previous frame inner to this frame (corrupt stack?)".) Any ideas? :) Fatal trap 12: page fault while in kernel mode fault virtual address = 0x365138ab fault code = supervisor read, page not present instruction pointer = 0x20:0xc06b950e stack pointer = 0x28:0xeb8648e8 frame pointer = 0x28:0xeb86491c code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, def32 1, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 77070 (bash) trap number = 12 panic: page fault KDB: stack backtrace: kdb_backtrace(c06f3396,c0746640,c06e6647,eb8647f0,100,...) at kdb_backtrace+0x2e panic(c06e6647,c07071a5,c49379e8,1,1,...) at panic+0xb7 trap_fatal(eb8648a8,365138ab,1,0,d0d68598,...) at trap_fatal+0x33e trap_pfault(eb8648a8,0,365138ab,0,365138ab,...) at trap_pfault+0x242 trap(8,c4dd0028,c7de0028,eb86490c,365138ab,...) at trap+0x350 calltrap() at calltrap+0x5 --- trap 0xc, eip = 0xc06b950e, esp = 0xeb8648e8, ebp = 0xeb86491c --- generic_bcopy(c7ded340,20,2,c06ff4cb,0,...) at generic_bcopy+0x1a ffs_getextattr(eb864988,eb8649d4,c05b92ff,c072f580,eb864988,...) at ffs_getextattr+0xbf VOP_GETEXTATTR_APV(c072f580,eb864988,c47ae000,c444fc20,184,...) at VOP_GETEXTATTR_APV+0x47 vn_extattr_get(c4ddfdd0,8,2,c06ff4cb,eb8649f8,...) at vn_extattr_get+0xaf ufs_getacl(eb864a3c,eb864a68,c06529eb,c072f580,eb864a3c,...) at ufs_getacl+0x98 VOP_GETACL_APV(c072f580,eb864a3c,2,0,0,...) at VOP_GETACL_APV+0x47 ufs_access(eb864aa4,eb864af0,c05175d4,c072f580,eb864aa4,...) at ufs_access+0xbb VOP_ACCESS_APV(c072f580,eb864aa4,c059d508,eb864c0c,eb864ab4,...) at VOP_ACCESS_APV+0x3e exec_check_permissions(eb864bcc,3041,c49d8440,c47ae000,0,...) at exec_check_permissions+0xb4 do_execve(c47ae000,eb864ca8,0,16,c4937860,...) at do_execve+0x1db kern_execve(c47ae000,eb864ca8,0,80eb7a0,80e7800,...) at kern_execve+0x126 execve(c47ae000,eb864d04,c,c47ae000,7,...) at execve+0x4f syscall(3b,3b,bfbf003b,80eb7a0,8116e20,...) at syscall+0x380 Xint0x80_syscall() at Xint0x80_syscall+0x1f -- Ryan Beasley <ryanb@FreeBSD.org>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?45DA6079.2020705>