From owner-freebsd-stable@FreeBSD.ORG Thu May 24 05:16:36 2007 Return-Path: X-Original-To: freebsd-stable@freebsd.org Delivered-To: freebsd-stable@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 7F0D616A400 for ; Thu, 24 May 2007 05:16:36 +0000 (UTC) (envelope-from kasahara@nc.kyushu-u.ac.jp) Received: from elvenbow.cc.kyushu-u.ac.jp (elvenbow.nc.kyushu-u.ac.jp [133.5.6.4]) by mx1.freebsd.org (Postfix) with ESMTP id CF5E213C45A for ; Thu, 24 May 2007 05:16:35 +0000 (UTC) (envelope-from kasahara@nc.kyushu-u.ac.jp) Received: from localhost (kasahara@localhost [IPv6:::1]) by elvenbow.cc.kyushu-u.ac.jp (8.14.1/8.14.1) with ESMTP id l4O4rJtJ004111 for ; Thu, 24 May 2007 13:53:19 +0900 (JST) (envelope-from kasahara@nc.kyushu-u.ac.jp) Date: Thu, 24 May 2007 13:52:54 +0900 (JST) Message-Id: <20070524.135254.-1235896398.kasahara@nc.kyushu-u.ac.jp> To: freebsd-stable@freebsd.org From: Yoshiaki Kasahara X-Fingerprint: CDA2 B6B6 6796 0DD3 9D80 2602 E909 4623 A15E A074 X-URL: http://www.nc.kyushu-u.ac.jp/~kasahara/ X-Mailer: Mew version 5.2.50 on Emacs 23.0.51 / Mule 5.0 (SAKAKI) Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Subject: kernel panic on 6-STABLE with ipv6? X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 24 May 2007 05:16:36 -0000 Hello, With curiosity, today I tried to enable ipv6 in avahi-daemon.conf (I don't really understand what avahi-daemon does, though) and start the daemon using rc.d script, then I hit a kernel panic. I updated the tree and build world yesterday before the trial (because I wanted Intel HDA support, but it was another story). # uname -a FreeBSD elvenbow.cc.kyushu-u.ac.jp 6.2-STABLE FreeBSD 6.2-STABLE #0: Wed May 23 20:27:20 JST 2007 root@elvenbow.cc.kyushu-u.ac.jp:/usr/obj/usr/src/sys/ELVENBOW amd64 The output of kgdb with stack backtrace follows: ------ # kgdb /usr/obj/usr/src/sys/ELVENBOW/kernel.debug vmcore.3 kgdb: kvm_nlist(_stopped_cpus): kgdb: kvm_nlist(_stoppcbs): [GDB will not be able to debug user-mode threads: /usr/lib/libthread_db.so: Undefined symbol "ps_pglobal_lookup"] GNU gdb 6.1.1 [FreeBSD] Copyright 2004 Free Software Foundation, Inc. GDB is free software, covered by the GNU General Public License, and you are welcome to change it and/or distribute copies of it under certain conditions. Type "show copying" to see the conditions. There is absolutely no warranty for GDB. Type "show warranty" for details. This GDB was configured as "amd64-marcel-freebsd". Unread portion of the kernel message buffer: Fatal trap 12: page fault while in kernel mode fault virtual address = 0xffffff015057d198 fault code = supervisor read data, page not present instruction pointer = 0x8:0xffffffff80508175 stack pointer = 0x10:0xffffffffb75af7c0 frame pointer = 0x10:0xffffff007857d100 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 2670 (avahi-daemon) trap number = 12 panic: page fault Uptime: 14m43s Dumping 2045 MB (2 chunks) chunk 0: 1MB (159 pages) ... ok chunk 1: 2046MB (523567 pages) 2030 2014 1998 1982 1966 1950 1934 1918 1902 1886 1870 1854 1838 1822 1806 1790 1774 1758 1742 1726 1710 1694 1678 1662 1646 1630 1614 1598 1582 1566 1550 1534 1518 1502 1486 1470 1454 1438 1422 1406 1390 1374 1358 1342 1326 1310 1294 1278 1262 1246 1230 1214 1198 1182 1166 1150 1134 1118 1102 1086 1070 1054 1038 1022 1006 990 974 958 942 926 910 894 878 862 846 830 814 798 782 766 750 734 718 702 686 670 654 638 622 606 590 574 558 542 526 510 494 478 462 446 430 414 398 382 366 350 334 318 302 286 270 254 238 222 206 190 174 158 142 126 110 94 78 62 46 30 14 #0 doadump () at pcpu.h:172 172 pcpu.h: No such file or directory. in pcpu.h (kgdb) where #0 doadump () at pcpu.h:172 #1 0x0000000000000004 in ?? () #2 0xffffffff8041da53 in boot (howto=260) at /usr/src/sys/kern/kern_shutdown.c:409 #3 0xffffffff8041e056 in panic (fmt=0xffffff0059884980 "\bJ ") at /usr/src/sys/kern/kern_shutdown.c:565 #4 0xffffffff8063ecd1 in trap_fatal (frame=0xffffff0059884980, eva=18446742975690328584) at /usr/src/sys/amd64/amd64/trap.c:668 #5 0xffffffff8063f042 in trap_pfault (frame=0xffffffffb75af710, usermode=0) at /usr/src/sys/amd64/amd64/trap.c:580 #6 0xffffffff8063f2f3 in trap (frame= {tf_rdi = -1093868727912, tf_rsi = 3623878728, tf_rdx = -1097492606640, tf_rcx = 671088564, tf_r8 = 3623878728, tf_r9 = 0, tf_rax = 3623878725, tf_rbx = -1093868727912, tf_rbp = -1097492606720, tf_r10 = 0, tf_r11 = 1, tf_r12 = -1218774912, tf_r13 = 17, tf_r14 = 0, tf_r15 = -1097492606720, tf_trapno = 12, tf_addr = -1093868727912, tf_flags = -2142209856, tf_err = 0, tf_rip = -2142207627, tf_cs = 8, tf_rflags = 66070, tf_rsp = -1218775088, tf_ss = 16}) at /usr/src/sys/amd64/amd64/trap.c:353 #7 0xffffffff806297bb in calltrap () at /usr/src/sys/amd64/amd64/exception.S:168 #8 0xffffffff80508175 in ip6_setpktopts (control=0xffffff007857d100, opt=0xffffffffb75af880, stickyopt=0xffffff015057d198, priv=0, uproto=17) at /usr/src/sys/netinet6/ip6_output.c:2992 #9 0xffffffff80517911 in udp6_output (in6p=0xffffff005bb03980, m=0xffffff007853c800, addr6=0xffffffffb75af880, control=0xffffff007857d100, td=0xffffff0059884980) at /usr/src/sys/netinet6/udp6_output.c:170 #10 0xffffffff80519607 in udp6_send (so=0xffffff00529df000, flags=0, m=0xffffff007853c800, addr=0xffffff0001031c20, control=0xffffff007857d100, td=0xffffff0059884980) at /usr/src/sys/netinet6/udp6_usrreq.c:794 #11 0xffffffff80461f0c in sosend (so=0xffffff00529df000, addr=0xffffff0001031c20, uio=0xffffffffb75afa70, top=0xffffff007853c800, control=0xffffff007857d100, flags=0, td=0xffffff0059884980) at /usr/src/sys/kern/uipc_socket.c:836 #12 0xffffffff80469968 in kern_sendit (td=0xffffff0059884980, s=16, mp=0xffffffffb75afb30, flags=0, control=0xffffff007857d100, segflg=52) at /usr/src/sys/kern/uipc_syscalls.c:772 #13 0xffffffff8046ad57 in sendit (td=0xffffff0059884980, s=16, mp=0xffffffffb75afb30, flags=0) at /usr/src/sys/kern/uipc_syscalls.c:712 #14 0xffffffff8046af56 in sendmsg (td=0xffffff0059884980, uap=0xffffffffb75afbc0) at /usr/src/sys/kern/uipc_syscalls.c:920 #15 0xffffffff8063fb31 in syscall (frame= {tf_rdi = 16, tf_rsi = 140737488348864, tf_rdx = 0, tf_rcx = 0, tf_r8 = 0, tf_r9 = 0, tf_rax = 28, tf_rbx = 16, tf_rbp = 140737488348864, tf_r10 = 0, tf_r11 = 582, tf_r12 = 0, tf_r13 = 5436220, tf_r14 = 1, tf_r15 = 140737488348912, tf_trapno = 12, tf_addr = 5537800, tf_flags = 12, tf_err = 2, tf_rip = 34374036316, tf_cs = 43, tf_rflags = 518, tf_rsp = 140737488348744, tf_ss = 35}) at /usr/src/sys/amd64/amd64/trap.c:803 #16 0xffffffff80629958 in Xfast_syscall () at /usr/src/sys/amd64/amd64/exception.S:270 #17 0x0000000800da2b5c in ?? () Previous frame inner to this frame (corrupt stack?) ------ Please request additional information if needed... Regards, -- Yoshiaki Kasahara Research Institute for Information Technology, Kyushu University kasahara@nc.kyushu-u.ac.jp