GENERIC HEAD from Dec 22 11:17 UTC, vmcore.193

GDB: no debug ports present
KDB: debugger backends: ddb
KDB: current backend: ddb
Copyright (c) 1992-2007 The FreeBSD Project.
Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
        The Regents of the University of California. All rights reserved.
FreeBSD is a registered trademark of The FreeBSD Foundation.
FreeBSD 8.0-CURRENT #0: Sun Dec 23 17:52:28 CET 2007
    pho@crashbox.osted.lan:/usr/src/sys/i386/compile/PHO
WARNING: WITNESS option enabled, expect reduced performance.
Timecounter "i8254" frequency 1193182 Hz quality 0
CPU: Intel(R) XEON(TM) CPU 1.80GHz (1799.80-MHz 686-class CPU)
  Origin = "GenuineIntel"  Id = 0xf24  Stepping = 4
  Features=0x3febfbff<FPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,CLFLUSH,DTS,ACPI,MMX,FXSR,SSE,SSE2,SS,HTT,TM>
  Logical CPUs per core: 2
real memory  = 1073676288 (1023 MB)
avail memory = 1036521472 (988 MB)
:
Trying to mount root from ufs:/dev/ad0s1a
WARNING: / was not properly dismounted
fxp0: link state changed to UP
linux: pid 1703 (syscall): syscall truncate64 not implemented
linux: pid 2002 (syscall): syscall setfsuid not implemented
linux: pid 2014 (syscall): syscall setfsgid not implemented
linux: pid 2028 (syscall): syscall pivot_root not implemented
linux: pid 2040 (syscall): syscall mincore not implemented
linux_sys_futex: unknown op 163937231
linux_sys_futex: unknown op 1214039465
:
linux_sys_futex: unknown op 551137334
linux_sys_futex: unknown op 736315305
linux_sys_futex: unknown op 647210883
linux: pid 2500 (syscall): syscall fadvise64 not implemented
linux: pid 2551 (syscall): syscall lookup_dcookie not implemented
linux: pid 2565 (syscall): syscall epoll_create not implemented
linux: pid 2577 (syscall): syscall epoll_ctl not implemented
linux: pid 2591 (syscall): syscall epoll_wait not implemented
linux: pid 2603 (syscall): syscall remap_file_pages not implemented
linux: pid 2754 (syscall): syscall fstatfs64 not implemented
linux: pid 2795 (syscall): syscall fadvise64_64 not implemented
linux: pid 2821 (syscall): syscall mbind not implemented
linux: pid 2837 (syscall): syscall get_mempolicy not implemented
linux: pid 2862 (syscall): syscall set_mempolicy not implemented
linux: pid 2957 (syscall): syscall kexec_load not implemented
linux: pid 2969 (syscall): syscall waitid not implemented
linux: pid 2995 (syscall): syscall add_key not implemented
linux: pid 3009 (syscall): syscall request_key not implemented
linux: pid 3021 (syscall): syscall keyctl not implemented
linux: pid 3035 (syscall): syscall ioprio_set not implemented
linux: pid 3047 (syscall): syscall ioprio_get not implemented
linux: pid 3061 (syscall): syscall inotify_init not implemented
linux: pid 3076 (syscall): syscall inotify_add_watch not implemented
linux: pid 3090 (syscall): syscall inotify_rm_watch not implemented
linux: pid 3102 (syscall): syscall migrate_pages not implemented
panic: kmem_malloc(4096): kmem_map too small: 335544320 total allocated
cpuid = 3
KDB: enter: panic
[thread pid 3116 tid 100123 ]
Stopped at      kdb_enter+0x32: leave
db> where
Tracing pid 3116 tid 100123 td 0xc48b9220
kdb_enter(c0b08706,3,c0b2a878,e6a60aec,3,...) at kdb_enter+0x32
panic(c0b2a878,1000,14000000,e6a60b2c,c1474088,...) at panic+0x124
kmem_malloc(c147108c,1000,2,e6a60b90,c096c0b0,...) at kmem_malloc+0x215
page_alloc(c146d5a0,1000,e6a60b83,2,c146d5a0,...) at page_alloc+0x27
slab_zalloc(c075664c,c1474a08,8,c0b29c70,752,...) at slab_zalloc+0xc0
uma_zone_slab(c1474a08,0,c0b29c70,752,7c8,...) at uma_zone_slab+0x144
uma_zalloc_arg(c146d5a0,0,2,2,301c938b,...) at uma_zalloc_arg+0x573
malloc(400,c0bbdde0,2,0,c483f804,...) at malloc+0xd2
linux_openat(c48b9220,e6a60cfc,e6a60cf8,e6a60d1c,c4c09f68,...) at linux_openat+0x25
syscall(e6a60d38) at syscall+0x2b3
Xint0x80_syscall() at Xint0x80_syscall+0x20
--- syscall (295, Linux ELF, linux_openat), eip = 0x28126b32, esp = 0xbfbfeb4c, ebp = 0xbfbfebb8 ---
db> call doadump
Physical memory: 1011 MB
Dumping 435 MB: 420 404 388 372 356 340 324 308 292 276 260 244 228 212 196 180 164 148 132 116 100 84 68 52 36 20 4
Dump complete
= 0xf
db> call boot 0
KDB: stack backtrace:
db_trace_self_wrapper(c0b0b52f,e6a607e4,c076b7c0,c0c2bdc0,0,...) at db_trace_self_wrapper+0x26
kdb_backtrace(c0c2bdc0,0,c0b09065,18e,e6a607fc,...) at kdb_backtrace+0x29
mi_switch(1,0,c0b0a0dc,9c5,3,...) at mi_switch+0x120
sched_bind(c48b9220,0,c0b085c4,10e,0,...) at sched_bind+0x8a
boot(c0bf3d20,c0bf3d2a,c0490527,c0bf3d20,c0bf3550,...) at boot+0x47
db_fncall(e6a60958,0,46,e6a608c4,c0491080,...) at db_fncall+0x149
db_command_loop(c078c702,ffffffc0,0,2,0,...) at db_command_loop+0x2f5
db_trap(3,0,7,3,c48b9220,...) at db_trap+0xc5
kdb_trap(3,0,e6a60a6c,c48b9220,c483f804,...) at kdb_trap+0x96
trap(e6a60a6c) at trap+0x5ab
calltrap() at calltrap+0x6
--- trap 0x3, eip = 0xc078c702, esp = 0xe6a60aac, ebp = 0xe6a60ab4 ---
kdb_enter(c0b08706,3,c0b2a878,e6a60aec,3,...) at kdb_enter+0x32
panic(c0b2a878,1000,14000000,e6a60b2c,c1474088,...) at panic+0x124
kmem_malloc(c147108c,1000,2,e6a60b90,c096c0b0,...) at kmem_malloc+0x215
page_alloc(c146d5a0,1000,e6a60b83,2,c146d5a0,...) at page_alloc+0x27
slab_zalloc(c075664c,c1474a08,8,c0b29c70,752,...) at slab_zalloc+0xc0
uma_zone_slab(c1474a08,0,c0b29c70,752,7c8,...) at uma_zone_slab+0x144
uma_zalloc_arg(c146d5a0,0,2,2,301c938b,...) at uma_zalloc_arg+0x573
malloc(400,c0bbdde0,2,0,c483f804,...) at malloc+0xd2
linux_openat(c48b9220,e6a60cfc,e6a60cf8,e6a60d1c,c4c09f68,...) at linux_openat+0x25
syscall(e6a60d38) at syscall+0x2b3
Xint0x80_syscall() at Xint0x80_syscall+0x20
--- syscall (295, Linux ELF, linux_openat), eip = 0x28126b32, esp = 0xbfbfeb4c, ebp = 0xbfbfebb8 ---
db> c
Uptime: 1h14m53s
Automatic reboot in 15 seconds - press a key on the console to abort
KDB: stack backtrace:
db_trace_self_wrapper(c0b0b52f,e46f5c00,c07dea53,0,e46f5c00,...) at db_trace_self_wrapper+0x26
kdb_backtrace(0,e46f5c00,c0a80b55,e46f5c10,c441d414,...) at kdb_backtrace+0x29
vfs_badlock(c0bc9040,e46f5c10,c0bf1cc0,c441d414,0) at vfs_badlock+0x23
assert_vop_locked(c441d414,c0b13f4c) at assert_vop_locked+0x50
vop_lock_post(e46f5c6c,0,1002,1002,c441d414,...) at vop_lock_post+0x36
VOP_LOCK1_APV(c0bc9040,e46f5c6c,c0b14bf2,327,c441d4e8,...) at VOP_LOCK1_APV+0xc1
_vn_lock(c441d414,1002,c4299440,c0b13cfd,681,...) at _vn_lock+0xf8
sched_sync(0,e46f5d38,c0b04f77,30c,c429c000,...) at sched_sync+0x508
fork_exit(c07e2900,0,e46f5d38) at fork_exit+0xb8
fork_trampoline() at fork_trampoline+0x8
--- trap 0, eip = 0, esp = 0xe46f5d70, ebp = 0 ---
VOP_LOCK: 0xc441d414 is not locked but should be
KDB: enter: lock violation
[thread pid 26 tid 100044 ]
Stopped at      kdb_enter+0x32: leave
db> c

(kgdb) l *linux_openat+0x25
0xc4c00215 is in linux_openat (/usr/src/sys/modules/linux/../../compat/linux/linux_file.c:258).
253     {
254             char *newpath, *oldpath, *freebuf = NULL, *path;
255             int error;
256
257             oldpath = malloc(MAXPATHLEN, M_TEMP, M_WAITOK);
258             error = copyinstr(args->filename, oldpath, MAXPATHLEN, NULL);
259
260     #ifdef DEBUG
261             if (ldebug(openat))
262                     printf(ARGS(openat, "%i, %s, 0x%x, 0x%x"), args->dfd,

--
Test scenario: Linux syscall with randum arguments