https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=219655

--- Comment #18 from Peter TKATCHENKO <pe...@flytrace.com> ---
The patch cannot be applied 'as is' on 14.2 kernel. I modified it a bit,
applied and rebuilt the GENERIC kernel. Unfortunately, the kernel panics on
boot:

Fatal trap 12: page fault while in kernel mode
cpuid = 2; apic id = 02
fault virtual address  = 0x28
fault code             = supervisor read data, page not present
instruction pointer    = 0x20:0xffffffff80be2e44
stack pointer          = 0x28:0xfffffe00cdbb7d00
frame pointer          = 0x28:0xfffffe00cdbb7d50
code segment           = base 0x0, limit 0xfffff, type 0x1b
                       = DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags       = interrupt enabled, resume, IOPL = 0
current process                = 155 (ip6addrctl)
rdi: fffff80006d57c00 rsi: ffffffff818d56d8 rdx: ffffffff811da680
rcx: 0000000000000000  r8: 0000000000320000  r9: 0000000000000000
rax: 0000000000000000 rbx: fffff800134df400 rbp: fffffe00cdbb7d50
r10: 0000000000000000 r11: 0000000000000400 r12: fffff80006f2b000
r13: 0000000000000000 r14: fffff800030cd4c0 r15: fffff800134df510
trap number            = 12
panic: page fault
cpuid = 2
time = 1735911923
KDB: stack backtrace:
#0 0xffffffff80b8c89d at kdb_backtrace+0x5d
#1 0xffffffff80b3ec01 at vpanic+0x131
#2 0xffffffff80b3eac3 at panic+0x43
#3 0xffffffff81026a0b at trap_fatal+0x40b
#4 0xffffffff81026a56 at trap_pfault+0x46
#5 0xffffffff80ffd408 at calltrap+0x8
#6 0xffffffff80be2a5a at socreate+0xba
#7 0xffffffff80bed1b0 at kern_socket+0xb0
#8 0xffffffff810272c5 at amd64_syscall+0x115
#9 0xffffffff80ffdd1b at fast_syscall_common+0xf8

-- 
You are receiving this mail because:
You are the assignee for the bug.

Reply via email to