From owner-freebsd-hackers Fri Nov 15 10:13:00 1996 Return-Path: owner-hackers Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id KAA04885 for hackers-outgoing; Fri, 15 Nov 1996 10:13:00 -0800 (PST) Received: from phaeton.artisoft.com (phaeton.Artisoft.COM [198.17.250.211]) by freefall.freebsd.org (8.7.5/8.7.3) with SMTP id KAA04833 for ; Fri, 15 Nov 1996 10:12:32 -0800 (PST) Received: (from terry@localhost) by phaeton.artisoft.com (8.6.11/8.6.9) id KAA26424; Fri, 15 Nov 1996 10:58:52 -0700 From: Terry Lambert Message-Id: <199611151758.KAA26424@phaeton.artisoft.com> Subject: Re: Sockets question... To: bde@zeta.org.au (Bruce Evans) Date: Fri, 15 Nov 1996 10:58:51 -0700 (MST) Cc: bde@zeta.org.au, jgreco@brasil.moneng.mei.com, terry@lambert.org, hackers@FreeBSD.ORG, jdp@polstra.com, scrappy@ki.net In-Reply-To: <199611151754.EAA20990@godzilla.zeta.org.au> from "Bruce Evans" at Nov 16, 96 04:54:32 am X-Mailer: ELM [version 2.4 PL24] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-hackers@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk > Oops, pass the pointy hat. This is a non-example since i forgot to > increase the read size and forget to tell you to invoke it with > /kernel as stdin. Increasing the read size to 0x20000 gives > more interesting behaviour: > > on system 1 with 32MB RAM: the kernel panics with a double fault This is, I think, expected behaviour for a page which is not present but for which a kmem mapping exists. This happens because the /kernel file is mapped to /dev/kmem. If you try this with a different file (one without an established mapping), what happens? > on system 2 with 8MB RAM: read returns -1. > > I have seen a similar panic for writing from a bad address like > 0xfffffc00 but I couldn't duplicate the problem and I thought it had > something to do with a fixed vm bug. Or an unfixed one. 8-(. Terry Lambert terry@lambert.org --- Any opinions in this posting are my own and not those of my present or previous employers.