GEOM panic due to unreadable MODE2 CD?

From: Ulrich Spörlein <uspoerlein_at_gmail.com>
Date: Thu, 12 Feb 2009 20:16:49 +0100
Hi,

Got this interessting (?) panic, when my 8.0 test machine booted up.
There was an old VCD in the tray and after several minutes of trying to
read this CD (I think it's the Zpool tasting) I ejected the CD ->
instant panic

Entropy harvesting: interrupts ethernet point_to_point kickstart.
/dev/ad0s2a: 4539 files, 91325 used, 35514 free (2658 frags, 4107 blocks, 2.1% fragmentation)
/dev/ad0s2d: 4157 files, 128842 used, 122253 free (2677 frags, 14947 blocks, 1.1% fragmentation)
/dev/ad0s2f: 26708 files, 451167 used, 3609896 free (18472 frags, 448928 blocks, 0.5% fragmentation)
/dev/ad0s2g: 293102 files, 2127805 used, 9143762 free (56602 frags, 1135895 blocks, 0.5% fragmentation)
This module (opensolaris) contains code covered by the
Common Development and Distribution License (CDDL)
see http://opensolaris.org/os/licensing/opensolaris_license/
WARNING: ZFS is considered to be an experimental feature in FreeBSD.
ZFS filesystem version 13
ZFS storage pool version 13
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
GEOM_LABEL: Label for provider acd0t01 is iso9660/FOO_BAR.
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
acd0: FAILURE - READ_BIG ILLEGAL REQUEST asc=0x64 ascq=0x00
panic: wrong length 131072 for sectorsize 2352
cpuid = 0
KDB: stack backtrace:
db_trace_self_wrapper(c07ffd0a,c2f21bec,c056eb40,c08299ce,0,...) at db_trace_self_wrapper+0x26
kdb_backtrace(c08299ce,0,c07f47df,c2f21bf8,0,...) at kdb_backtrace+0x29
panic(c07f47df,20000,0,930,4b,...) at panic+0x114
g_io_request(c33b3cf0,c3714980,0,2,800,...) at g_io_request+0x1a8
g_slice_start(c378f120,0,800,0,a,...) at g_slice_start+0x279
g_io_schedule_down(c317c480,0,c07f4ab3,74,0,...) at g_io_schedule_down+0x26e
g_down_procbody(0,c2f21d38,c07f8981,32d,c3141000,...) at g_down_procbody+0x8d
fork_exit(c051902f,0,c2f21d38) at fork_exit+0xb8
fork_trampoline() at fork_trampoline+0x8
--- trap 0, eip = 0, esp = 0xc2f21d70, ebp = 0 ---
KDB: enter: panic
[thread pid 4 tid 100009 ]
Stopped at      kdb_enter+0x3a: movl    $0,kdb_why

I think I can reproduce this at will. Anyone feeling like taking this
up?

Cheers,
Ulrich Spörlein
-- 
None are more hopelessly enslaved than those who falsely believe they are free
-- Johann Wolfgang von Goethe
Received on Thu Feb 12 2009 - 18:16:54 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:39:42 UTC