From owner-freebsd-emulation@freebsd.org Sun May 10 22:28:32 2020 Return-Path: Delivered-To: freebsd-emulation@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 56ECF2F5CD3; Sun, 10 May 2020 22:28:32 +0000 (UTC) (envelope-from freebsd@sysctl.cz) Received: from wes1-so1.wedos.net (wes1-so1.wedos.net [46.28.106.15]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 49KzHM154tz3GRb; Sun, 10 May 2020 22:28:30 +0000 (UTC) (envelope-from freebsd@sysctl.cz) Received: from webmail.wedos.net (wes1-wm3.wedos.net [46.28.106.84]) by wes1-so1.wedos.net (Postfix) with ESMTPSA id 49KzHC2Kwyz2Q4; Mon, 11 May 2020 00:28:23 +0200 (CEST) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit Date: Mon, 11 May 2020 00:28:23 +0200 From: freebsd@sysctl.cz To: freebsd-hackers@freebsd.org Cc: Freebsd emulation Subject: Debug linux binary with enable linux emulation Message-ID: <24f30eaa0597d79ddadc10d6f993f2a0@sysctl.cz> X-Sender: freebsd@sysctl.cz User-Agent: Roundcube Webmail/1.2.4 X-Rspamd-Queue-Id: 49KzHM154tz3GRb X-Spamd-Bar: +++ Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of freebsd@sysctl.cz has no SPF policy when checking 46.28.106.15) smtp.mailfrom=freebsd@sysctl.cz X-Spamd-Result: default: False [3.93 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; IP_SCORE(1.12)[ipnet: 46.28.104.0/21(1.70), asn: 197019(3.78), country: CZ(0.09)]; TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[sysctl.cz]; AUTH_NA(1.00)[]; NEURAL_SPAM_MEDIUM(0.92)[0.916,0]; RCPT_COUNT_TWO(0.00)[2]; FROM_NO_DN(0.00)[]; NEURAL_SPAM_LONG(1.00)[0.998,0]; R_SPF_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:197019, ipnet:46.28.104.0/21, country:CZ]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-emulation@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Development of Emulators of other operating systems List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 10 May 2020 22:28:32 -0000 Hi, I tried debug with gdb for linux emulation and have issue with kernel panic. kldload linux64.ko gdb ./Discord or other linux binary Fatal trap 12: page fault while in kernel mode cpuid = 3; apic id = 03 fault virtual address = 0x18 fault code = supervisor read data, page not present instruction pointer = 0x20:0xffffffff82f5b682 stack pointer = 0x28:0xfffffe00691fd980 frame pointer = 0x28:0xfffffe00691fd9e0 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 17392 (fish) trap number = 12 panic: page fault cpuid = 3 time = 1589132677 KDB: stack backtrace: #0 0xffffffff80c1d2f7 at kdb_backtrace+0x67 #1 0xffffffff80bd062d at vpanic+0x19d #2 0xffffffff80bd0483 at panic+0x43 #3 0xffffffff810a7dcc at trap_fatal+0x39c #4 0xffffffff810a7e19 at trap_pfault+0x49 #5 0xffffffff810a740f at trap+0x29f #6 0xffffffff81081bdc at calltrap+0x8 #7 0xffffffff82f503d1 at linux_thread_detach+0x21 #8 0xffffffff80be5acf at thread_suspend_check+0x41f #9 0xffffffff80c32ed9 at ast+0x3b9 #10 0xffffffff810850e9 at doreti_ast+0x1f Uptime: 2h56m24s Dumping 1146 out of 8042 MB:..2%..12%..21%..31%..41%..51%..62%..72%..81%..91%---<>--- Copyright (c) 1992-2019 The FreeBSD Project. GNU gdb (GDB) 9.1 [GDB v9.1 for FreeBSD] Copyright (C) 2020 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-portbld-freebsd12.1". Type "show configuration" for configuration details. For bug reporting instructions, please see: . Find the GDB manual and other documentation resources online at: . For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from /boot/kernel/kernel... (No debugging symbols found in /boot/kernel/kernel) 0xffffffff80c01eda in sched_switch () (kgdb) (kgdb) (kgdb) bt #0 0xffffffff80c01eda in sched_switch () #1 0xffffffff80bdbfa2 in mi_switch () #2 0xffffffff80c2bb75 in sleepq_catch_signals () #3 0xffffffff80c2be64 in sleepq_timedwait_sig () #4 0xffffffff80bdb9a5 in _sleep () #5 0xffffffff80bf1ee3 in umtxq_sleep () #6 0xffffffff80bf1c90 in do_wait () #7 0xffffffff80bef8fe in __umtx_op_wait_uint_private () #8 0xffffffff810a8984 in amd64_syscall () #9 #10 0x000000080974dedc in ?? () Backtrace stopped: Cannot access memory at address 0x7fffffffddc8 I have now kernel without debug symbols. M.