GENERIC HEAD from Dec 22 11:17 UTC, vmcore.193 GDB: no debug ports present KDB: debugger backends: ddb KDB: current backend: ddb Copyright (c) 1992-2007 The FreeBSD Project. Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994 The Regents of the University of California. All rights reserved. FreeBSD is a registered trademark of The FreeBSD Foundation. FreeBSD 8.0-CURRENT #0: Sun Dec 23 17:52:28 CET 2007 pho@crashbox.osted.lan:/usr/src/sys/i386/compile/PHO WARNING: WITNESS option enabled, expect reduced performance. Timecounter "i8254" frequency 1193182 Hz quality 0 CPU: Intel(R) XEON(TM) CPU 1.80GHz (1799.80-MHz 686-class CPU) Origin = "GenuineIntel" Id = 0xf24 Stepping = 4 Features=0x3febfbff<FPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,CLFLUSH,DTS,ACPI,MMX,FXSR,SSE,SSE2,SS,HTT,TM> Logical CPUs per core: 2 real memory = 1073676288 (1023 MB) avail memory = 1036521472 (988 MB) : Trying to mount root from ufs:/dev/ad0s1a WARNING: / was not properly dismounted fxp0: link state changed to UP linux: pid 1703 (syscall): syscall truncate64 not implemented linux: pid 2002 (syscall): syscall setfsuid not implemented linux: pid 2014 (syscall): syscall setfsgid not implemented linux: pid 2028 (syscall): syscall pivot_root not implemented linux: pid 2040 (syscall): syscall mincore not implemented linux_sys_futex: unknown op 163937231 linux_sys_futex: unknown op 1214039465 : linux_sys_futex: unknown op 551137334 linux_sys_futex: unknown op 736315305 linux_sys_futex: unknown op 647210883 linux: pid 2500 (syscall): syscall fadvise64 not implemented linux: pid 2551 (syscall): syscall lookup_dcookie not implemented linux: pid 2565 (syscall): syscall epoll_create not implemented linux: pid 2577 (syscall): syscall epoll_ctl not implemented linux: pid 2591 (syscall): syscall epoll_wait not implemented linux: pid 2603 (syscall): syscall remap_file_pages not implemented linux: pid 2754 (syscall): syscall fstatfs64 not implemented linux: pid 2795 (syscall): syscall fadvise64_64 not implemented linux: pid 2821 (syscall): syscall mbind not implemented linux: pid 2837 (syscall): syscall get_mempolicy not implemented linux: pid 2862 (syscall): syscall set_mempolicy not implemented linux: pid 2957 (syscall): syscall kexec_load not implemented linux: pid 2969 (syscall): syscall waitid not implemented linux: pid 2995 (syscall): syscall add_key not implemented linux: pid 3009 (syscall): syscall request_key not implemented linux: pid 3021 (syscall): syscall keyctl not implemented linux: pid 3035 (syscall): syscall ioprio_set not implemented linux: pid 3047 (syscall): syscall ioprio_get not implemented linux: pid 3061 (syscall): syscall inotify_init not implemented linux: pid 3076 (syscall): syscall inotify_add_watch not implemented linux: pid 3090 (syscall): syscall inotify_rm_watch not implemented linux: pid 3102 (syscall): syscall migrate_pages not implemented panic: kmem_malloc(4096): kmem_map too small: 335544320 total allocated cpuid = 3 KDB: enter: panic [thread pid 3116 tid 100123 ] Stopped at kdb_enter+0x32: leave db> where Tracing pid 3116 tid 100123 td 0xc48b9220 kdb_enter(c0b08706,3,c0b2a878,e6a60aec,3,...) at kdb_enter+0x32 panic(c0b2a878,1000,14000000,e6a60b2c,c1474088,...) at panic+0x124 kmem_malloc(c147108c,1000,2,e6a60b90,c096c0b0,...) at kmem_malloc+0x215 page_alloc(c146d5a0,1000,e6a60b83,2,c146d5a0,...) at page_alloc+0x27 slab_zalloc(c075664c,c1474a08,8,c0b29c70,752,...) at slab_zalloc+0xc0 uma_zone_slab(c1474a08,0,c0b29c70,752,7c8,...) at uma_zone_slab+0x144 uma_zalloc_arg(c146d5a0,0,2,2,301c938b,...) at uma_zalloc_arg+0x573 malloc(400,c0bbdde0,2,0,c483f804,...) at malloc+0xd2 linux_openat(c48b9220,e6a60cfc,e6a60cf8,e6a60d1c,c4c09f68,...) at linux_openat+0x25 syscall(e6a60d38) at syscall+0x2b3 Xint0x80_syscall() at Xint0x80_syscall+0x20 --- syscall (295, Linux ELF, linux_openat), eip = 0x28126b32, esp = 0xbfbfeb4c, ebp = 0xbfbfebb8 --- db> call doadump Physical memory: 1011 MB Dumping 435 MB: 420 404 388 372 356 340 324 308 292 276 260 244 228 212 196 180 164 148 132 116 100 84 68 52 36 20 4 Dump complete = 0xf db> call boot 0 KDB: stack backtrace: db_trace_self_wrapper(c0b0b52f,e6a607e4,c076b7c0,c0c2bdc0,0,...) at db_trace_self_wrapper+0x26 kdb_backtrace(c0c2bdc0,0,c0b09065,18e,e6a607fc,...) at kdb_backtrace+0x29 mi_switch(1,0,c0b0a0dc,9c5,3,...) at mi_switch+0x120 sched_bind(c48b9220,0,c0b085c4,10e,0,...) at sched_bind+0x8a boot(c0bf3d20,c0bf3d2a,c0490527,c0bf3d20,c0bf3550,...) at boot+0x47 db_fncall(e6a60958,0,46,e6a608c4,c0491080,...) at db_fncall+0x149 db_command_loop(c078c702,ffffffc0,0,2,0,...) at db_command_loop+0x2f5 db_trap(3,0,7,3,c48b9220,...) at db_trap+0xc5 kdb_trap(3,0,e6a60a6c,c48b9220,c483f804,...) at kdb_trap+0x96 trap(e6a60a6c) at trap+0x5ab calltrap() at calltrap+0x6 --- trap 0x3, eip = 0xc078c702, esp = 0xe6a60aac, ebp = 0xe6a60ab4 --- kdb_enter(c0b08706,3,c0b2a878,e6a60aec,3,...) at kdb_enter+0x32 panic(c0b2a878,1000,14000000,e6a60b2c,c1474088,...) at panic+0x124 kmem_malloc(c147108c,1000,2,e6a60b90,c096c0b0,...) at kmem_malloc+0x215 page_alloc(c146d5a0,1000,e6a60b83,2,c146d5a0,...) at page_alloc+0x27 slab_zalloc(c075664c,c1474a08,8,c0b29c70,752,...) at slab_zalloc+0xc0 uma_zone_slab(c1474a08,0,c0b29c70,752,7c8,...) at uma_zone_slab+0x144 uma_zalloc_arg(c146d5a0,0,2,2,301c938b,...) at uma_zalloc_arg+0x573 malloc(400,c0bbdde0,2,0,c483f804,...) at malloc+0xd2 linux_openat(c48b9220,e6a60cfc,e6a60cf8,e6a60d1c,c4c09f68,...) at linux_openat+0x25 syscall(e6a60d38) at syscall+0x2b3 Xint0x80_syscall() at Xint0x80_syscall+0x20 --- syscall (295, Linux ELF, linux_openat), eip = 0x28126b32, esp = 0xbfbfeb4c, ebp = 0xbfbfebb8 --- db> c Uptime: 1h14m53s Automatic reboot in 15 seconds - press a key on the console to abort KDB: stack backtrace: db_trace_self_wrapper(c0b0b52f,e46f5c00,c07dea53,0,e46f5c00,...) at db_trace_self_wrapper+0x26 kdb_backtrace(0,e46f5c00,c0a80b55,e46f5c10,c441d414,...) at kdb_backtrace+0x29 vfs_badlock(c0bc9040,e46f5c10,c0bf1cc0,c441d414,0) at vfs_badlock+0x23 assert_vop_locked(c441d414,c0b13f4c) at assert_vop_locked+0x50 vop_lock_post(e46f5c6c,0,1002,1002,c441d414,...) at vop_lock_post+0x36 VOP_LOCK1_APV(c0bc9040,e46f5c6c,c0b14bf2,327,c441d4e8,...) at VOP_LOCK1_APV+0xc1 _vn_lock(c441d414,1002,c4299440,c0b13cfd,681,...) at _vn_lock+0xf8 sched_sync(0,e46f5d38,c0b04f77,30c,c429c000,...) at sched_sync+0x508 fork_exit(c07e2900,0,e46f5d38) at fork_exit+0xb8 fork_trampoline() at fork_trampoline+0x8 --- trap 0, eip = 0, esp = 0xe46f5d70, ebp = 0 --- VOP_LOCK: 0xc441d414 is not locked but should be KDB: enter: lock violation [thread pid 26 tid 100044 ] Stopped at kdb_enter+0x32: leave db> c (kgdb) l *linux_openat+0x25 0xc4c00215 is in linux_openat (/usr/src/sys/modules/linux/../../compat/linux/linux_file.c:258). 253 { 254 char *newpath, *oldpath, *freebuf = NULL, *path; 255 int error; 256 257 oldpath = malloc(MAXPATHLEN, M_TEMP, M_WAITOK); 258 error = copyinstr(args->filename, oldpath, MAXPATHLEN, NULL); 259 260 #ifdef DEBUG 261 if (ldebug(openat)) 262 printf(ARGS(openat, "%i, %s, 0x%x, 0x%x"), args->dfd, -- Test scenario: Linux syscall with randum arguments