From owner-freebsd-current Tue Feb 13 0: 6:16 2001 Delivered-To: freebsd-current@freebsd.org Received: from flood.ping.uio.no (flood.ping.uio.no [129.240.78.31]) by hub.freebsd.org (Postfix) with ESMTP id 7CBDC37B491 for ; Tue, 13 Feb 2001 00:06:07 -0800 (PST) Received: (from des@localhost) by flood.ping.uio.no (8.9.3/8.9.3) id JAA94063; Tue, 13 Feb 2001 09:06:06 +0100 (CET) (envelope-from des@ofug.org) X-URL: http://www.ofug.org/~des/ X-Disclaimer: The views expressed in this message do not necessarily coincide with those of any organisation or company with which I am or have been affiliated. To: current@freebsd.org Subject: spacewalk From: Dag-Erling Smorgrav Date: 13 Feb 2001 09:06:05 +0100 Message-ID: Lines: 102 User-Agent: Gnus/5.0802 (Gnus v5.8.2) Emacs/20.4 MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: owner-freebsd-current@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG des@rsa /var/crash% gdb -k GNU gdb 4.18 Copyright 1998 Free Software Foundation, Inc. GDB is free software, covered by the GNU General Public License, and you are welcome to change it and/or distribute copies of it under certain conditions. Type "show copying" to see the conditions. There is absolutely no warranty for GDB. Type "show warranty" for details. This GDB was configured as "i386-unknown-freebsd". (kgdb) exec-file kernel.0 (kgdb) symbol-file symbols.0 Reading symbols from symbols.0...done. (kgdb) core-file vmcore.0 IdlePTD 3190784 initial pcb at 285460 panicstr: from debugger panic messages: --- Fatal trap 12: page fault while in kernel mode cpuid = 1; lapic.id = 01000000 fault virtual address = 0x93d0d5c7 fault code = supervisor write, page not present instruction pointer = 0x8:0xd73bb600 stack pointer = 0x10:0xd73ffef0 frame pointer = 0x10:0xd73ffe8c code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, def32 1, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 464 (sh) panic: from debugger cpuid = 1; lapic.id = 01000000 panic: from debugger cpuid = 1; lapic.id = 01000000 boot() called on cpu#1 Uptime: 12m0s dumping to dev #da/25, offset 1048576 dump 512 511 510 509 508 507 506 505 504 503 502 501 500 499 498 497 496 495 494 493 492 491 490 489 488 487 486 485 484 483 482 481 480 479 478 477 476 475 474 473 472 471 470 469 468 467 466 465 464 463 462 461 460 459 458 457 456 455 454 453 452 451 450 449 448 447 446 445 444 443 442 441 440 439 438 437 436 435 434 433 432 431 430 429 428 427 426 425 424 423 422 421 420 419 418 417 416 415 414 413 412 411 410 409 408 407 406 405 404 403 402 401 400 399 398 397 396 395 394 393 392 391 390 389 388 387 386 385 384 383 382 381 380 379 378 377 376 375 374 373 372 371 370 369 368 367 366 365 364 363 362 361 360 359 358 357 356 355 354 353 352 351 350 349 348 347 346 345 344 343 342 341 340 339 338 337 336 335 334 333 332 331 330 329 328 327 326 325 324 323 322 321 320 319 318 317 316 315 314 313 312 311 310 309 308 307 306 305 304 303 302 301 300 299 298 297 296 295 294 293 292 291 290 289 288 287 286 285 284 283 282 281 280 279 278 277 276 275 274 273 272 271 270 269 268 267 ! 266 265 264 263 262 261 260 259 258 257 256 255 254 253 252 251 250 249 248 247 246 245 244 243 242 241 240 239 238 237 236 235 234 233 232 231 230 229 228 227 226 225 224 223 222 221 220 219 218 217 216 215 214 213 212 211 210 209 208 207 206 205 204 203 202 201 200 199 198 197 196 195 194 193 192 191 190 189 188 187 186 185 184 183 182 181 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 162 161 160 159 158 157 156 155 154 153 152 151 150 149 148 147 146 145 144 143 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 --- #0 dumpsys () at ../../kern/kern_shutdown.c:476 476 if (dumping++) { (kgdb) where #0 dumpsys () at ../../kern/kern_shutdown.c:476 #1 0xc015d4a3 in boot (howto=260) at ../../kern/kern_shutdown.c:319 #2 0xc015d8e9 in panic (fmt=0xc022cbd4 "from debugger") at ../../kern/kern_shutdown.c:569 #3 0xc012dd91 in db_panic (addr=-683952640, have_addr=0, count=1, modif=0xd73ffd60 "") at ../../ddb/db_command.c:433 #4 0xc012dd31 in db_command (last_cmdp=0xc0257a90, cmd_table=0xc02578f0, aux_cmd_tablep=0xc0273818) at ../../ddb/db_command.c:333 #5 0xc012ddf6 in db_command_loop () at ../../ddb/db_command.c:455 #6 0xc012ffc3 in db_trap (type=12, code=0) at ../../ddb/db_trap.c:71 #7 0xc01facbf in kdb_trap (type=12, code=0, regs=0xd73ffeb0) at ../../i386/i386/db_interface.c:164 #8 0xc020ea7c in trap_fatal (frame=0xd73ffeb0, eva=2479936967) at ../../i386/i386/trap.c:990 #9 0xc020e7cd in trap_pfault (frame=0xd73ffeb0, usermode=0, eva=2479936967) at ../../i386/i386/trap.c:909 #10 0xc020ddf4 in trap (frame={tf_fs = 24, tf_es = 16, tf_ds = 16, tf_edi = -738928512, tf_esi = -684120220, tf_ebp = -683671924, tf_isp = -683671844, tf_ebx = 0, tf_edx = -1069539336, tf_ecx = 0, tf_eax = -1071644613, tf_trapno = 12, tf_err = 2, tf_eip = -683952640, tf_cs = 8, tf_eflags = 66178, tf_esp = 1, tf_ss = 0}) at ../../i386/i386/trap.c:456 #11 0xd73bb600 in ?? () ---Type to continue, or q to quit--- #12 0xc01da646 in vm_fault (map=Cannot access memory at address 0xa. ) at ../../vm/vm_page.h:493 Cannot access memory at address 0x2. (kgdb) disassemble 0xc01da614 0xc01da65a Dump of assembler code from 0xc01da614 to 0xc01da65a: 0xc01da614 : call 0xc0162f58 0xc01da619 : add $0x4,%esp 0xc01da61c : mov 0xffffffa8(%ebp),%eax 0xc01da61f : mov %eax,0xffffff9c(%ebp) 0xc01da622 : mov 0xffffffac(%ebp),%eax 0xc01da625 : mov %eax,0xffffffa0(%ebp) 0xc01da628 : mov 0xffffffa4(%ebp),%eax 0xc01da62b : mov %eax,0xffffff98(%ebp) 0xc01da62e : movl $0x0,0xffffffa4(%ebp) 0xc01da635 : mov 0xffffff98(%ebp),%eax 0xc01da638 : testb $0x40,0x2e(%eax) 0xc01da63c : jne 0xc01da64c 0xc01da63e : pushl 0x1c(%eax) 0xc01da641 : call 0xc020af08 0xc01da646 : add $0x4,%esp 0xc01da649 : jmp 0xc01da652 0xc01da64b : nop 0xc01da64c : incl 0xc029d3e4 0xc01da652 : incl 0xc029d3e0 0xc01da658 : mov 0xffffff98(%ebp),%eax This looks like vm_fault.c:572 (the only place in vm_fault.c that calls vm_page_zero_fill, which is an inline function defined around vm_page.h:493 as indicated by gdb). But I can't see how this code can try to jump to or call 0xd73bb600, so I assume it's stack smash job. I'm getting tons of these crashes while doing various things - I even had a panic while saving the core dump shown above! DES -- Dag-Erling Smorgrav - des@ofug.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message