Le 21/04/12 14:50, Jean-Yves Migeon a écrit :
The machine did not drop into ddb, it simply rebooted. Unfortunately
it did not leave a core dump behind, so I don't have much to look at
just yet. When I get home later today, I will try to get more info.
BTW, this occurred while running the ATF
On 21.04.12 19:38, Jean-Yves Migeon wrote:
Le 21/04/12 16:31, Jean-Yves Migeon a écrit :
Okay, thanks for the report. So this rules out Virtual Box, it seems to
happen on native amd64 too.
I am taking a look right now.
This seems to be a bug in the trap handling code. The signal is caught
Le 21/04/12 19:47, Christoph Egger a écrit :
rip 0x0 and rsp 0x50202 look really abnormal to me. I'll have a look in
FreeBSD, that's probably a group of exceptions that have to be handled
differently.
rip 0x0 often means that a function pointer has been called which is
NULL.
Christoph
I just tested with a new updated kernel.
It no longer crashes. Instead, it reports an expected failure:
x86 architecture does not correctly report the
address where the unaligned access occurred:
/build/netbsd-local/src/tests/lib/libc/gen/t_siginfo.c:427:
Le 21/04/12 23:25, Christos Zoulas a écrit :
In article4f930a8c.6040...@free.fr,
Jean-Yves Migeonjeanyves.mig...@free.fr wrote:
Le 21/04/12 20:52, Christos Zoulas a écrit :
Module Name:src
Committed By: christos
Date: Sat Apr 21 18:52:37 UTC 2012
Modified Files:
On Apr 22, 12:00am, jeanyves.mig...@free.fr (Jean-Yves Migeon) wrote:
-- Subject: Re: CVS commit: src/sys/arch/amd64/amd64
| It's the other way around; the bug was rather harmless in VMs (kills the
| process with a SIGILL), while it force-reboot the host on a native platform.
I had the real
On 4/21/12 10:58 AM, Takeshi Nakayama wrote:
Pull up following revision(s) (requested by spz in ticket #1750):
crypto/dist/openssl/crypto/mem.cpatch
crypto/dist/openssl/crypto/asn1/a_d2i_fp.c patch
crypto/dist/openssl/crypto/buffer/buffer.c patch