Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 19 Feb 2007 20:44:09 -0600
From:      Ryan Beasley <ryanb@FreeBSD.org>
To:        freebsd-hackers@freebsd.org
Subject:   [panic] RELENG_6_2:  many extattr operations -> panic
Message-ID:  <45DA6079.2020705@FreeBSD.org>

next in thread | raw e-mail | index | archive | help
Hi, all.

I recently started using extended attributes to record package origins
to files installed with ports/packages.  I patched find(1) to
examine/test attributes, and periodically search /usr/local for files
w/o the special attribute.

Today I re-labeled all files in my packages' plists, and the subsequent
search w/ my modified find led to a panic.  (The combination of these
two procedures panics reliably on my laptop.)

Kernel is RELENG_6_2 as of ~Jan 6th.

Unforunately, kgdb can go back no further than the generic_bcopy().  (It
reports "Previous frame inner to this frame (corrupt stack?)".)

Any ideas?  :)

Fatal trap 12: page fault while in kernel mode
fault virtual address	= 0x365138ab
fault code		= supervisor read, page not present
instruction pointer	= 0x20:0xc06b950e
stack pointer	        = 0x28:0xeb8648e8
frame pointer	        = 0x28:0xeb86491c
code segment		= base 0x0, limit 0xfffff, type 0x1b
			= DPL 0, pres 1, def32 1, gran 1
processor eflags	= interrupt enabled, resume, IOPL = 0
current process		= 77070 (bash)
trap number		= 12
panic: page fault
KDB: stack backtrace:
kdb_backtrace(c06f3396,c0746640,c06e6647,eb8647f0,100,...) at
kdb_backtrace+0x2e
panic(c06e6647,c07071a5,c49379e8,1,1,...) at panic+0xb7
trap_fatal(eb8648a8,365138ab,1,0,d0d68598,...) at trap_fatal+0x33e
trap_pfault(eb8648a8,0,365138ab,0,365138ab,...) at trap_pfault+0x242
trap(8,c4dd0028,c7de0028,eb86490c,365138ab,...) at trap+0x350
calltrap() at calltrap+0x5
--- trap 0xc, eip = 0xc06b950e, esp = 0xeb8648e8, ebp = 0xeb86491c ---
generic_bcopy(c7ded340,20,2,c06ff4cb,0,...) at generic_bcopy+0x1a
ffs_getextattr(eb864988,eb8649d4,c05b92ff,c072f580,eb864988,...) at
ffs_getextattr+0xbf
VOP_GETEXTATTR_APV(c072f580,eb864988,c47ae000,c444fc20,184,...) at
VOP_GETEXTATTR_APV+0x47
vn_extattr_get(c4ddfdd0,8,2,c06ff4cb,eb8649f8,...) at vn_extattr_get+0xaf
ufs_getacl(eb864a3c,eb864a68,c06529eb,c072f580,eb864a3c,...) at
ufs_getacl+0x98
VOP_GETACL_APV(c072f580,eb864a3c,2,0,0,...) at VOP_GETACL_APV+0x47
ufs_access(eb864aa4,eb864af0,c05175d4,c072f580,eb864aa4,...) at
ufs_access+0xbb
VOP_ACCESS_APV(c072f580,eb864aa4,c059d508,eb864c0c,eb864ab4,...) at
VOP_ACCESS_APV+0x3e
exec_check_permissions(eb864bcc,3041,c49d8440,c47ae000,0,...) at
exec_check_permissions+0xb4
do_execve(c47ae000,eb864ca8,0,16,c4937860,...) at do_execve+0x1db
kern_execve(c47ae000,eb864ca8,0,80eb7a0,80e7800,...) at kern_execve+0x126
execve(c47ae000,eb864d04,c,c47ae000,7,...) at execve+0x4f
syscall(3b,3b,bfbf003b,80eb7a0,8116e20,...) at syscall+0x380
Xint0x80_syscall() at Xint0x80_syscall+0x1f

-- 
Ryan Beasley <ryanb@FreeBSD.org>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?45DA6079.2020705>