running nmap -sU -F -T Aggressive -vv
CPU 0 Unable to handle kernel paging request at virtual address 0000000000000008, epc == ffffffff81373c20, ra == ffffffff813d8ecc
Oops[#1]:
Cpu 0
$ 0 : 0000000000000000 0000000010108ce1 0000000000000008 0000000030000000 $ 4 : a8000000bd09fc80 0000000000000008 0000000000000000 a8000000bbcebbc0 $ 8 : 0000000000000040 0000000000000002 a8000000bbcebc40 a8000000bbcebd58
$12 : ffffffff81555a68 0000000000008c00 ffffffff8152c000 000000012006d4d0
$16 : 0000000000000000 a8000000bd09fc80 0000000000000008 a8000000beb88680 $20 : 0000000000000000 0000000000000002 0000000000000040 a8000000beb88734
$24 : 0000000000000004 ffffffff813b9c48
$28 : a8000000bbce8000 a8000000bbcebb80 a8000000beb88720 ffffffff813d8ecc Hi : 0000000000000000 Lo : 000000000b71b000 epc : ffffffff81373c20 skb_copy_and_csum_datagram_iovec+0x28/0x170
Tainted: P
ra : ffffffff813d8ecc udp_recvmsg+0x144/0x3d0
Status: 10108ce3 KX SX UX KERNEL EXL IE
Cause : 00800008
BadVA : 0000000000000008
PrId : 000d0003
Modules linked in: fuse nfsd exportfs lockd nfs_acl sunrpc
nmadvantechfwa(P) binfmt_misc sctp ip_tables ip6_tables loop isofs nls_base tipc zlib_inflate e1000 rfps(P) fp_shm_linux(P) rfpvi vnb(P)
fptun(P) gpio6 cavium_ethernet ds1374_wdt
Process nfsd (pid: 4839, threadinfo=a8000000bbce8000,
task=a8000000d145d3c0)
Stack : a8000000bbcebe50 0000000000000000 a8000000bd09fc80 0000000000000000 a8000000bbcebe50 a8000000beb88680 ffffffff813d8ecc ffffffff813d8e6c
ffffffff8116b868 a8000000bbcebbc8 a8000000bbcebbc8 a8000000bbcebd80
a8000000bad58028 a8000000bbcebad0 a8000000bbcebe50 0000000000000000 a8000000bbcebe50 0000000000000042 a8000000bbcebce8 a8000000bdb99580 ffffffff81153780 0000000000000082 a8000000be34d600 ffffffff8136b8fc
00000010bad3e008 0000000000002711 a8000000c114fc80 ffffffff81369d60 0000000000000000 a8000000bad58170 0000004200000000 a8000000c114fc80 a8000000bb9df880 0000000000000000 a8000000bbcebe50 0000000000000074 0000000000000000 0000000000000000 a8000000bbcebc90 0000000000000001 ...
Call Trace:
[ffffffff81373c20] skb_copy_and_csum_datagram_iovec+0x28/0x170
[ffffffff813d8ecc] udp_recvmsg+0x144/0x3d0 [ffffffff8136b8fc] sock_common_recvmsg+0x34/0x50 [ffffffff81369d60] sock_recvmsg+0x148/0x1e0 [ffffffff8136a250] kernel_recvmsg+0x28/0x40 [c00000000027a9c4] svc_udp_recvfrom+0x1ac/0x728 [sunrpc] [c000000000279bbc] svc_recv+0x3cc/0x818 [sunrpc] [c000000000350344] nfsd+0x1e4/0x820 [nfsd] [ffffffff8111ee58] kernel_thread_helper+0x10/0x18
N/A
1. Unzip this patch under [install_dir]/updates
2. From the [install_dir]/updates directory, run the command
"../maintenance/mtool/mtool_linux"
3. Follow the instructions for installing the point patch.
4. This is a source only patch so you will have to rebuild the linux kernel. This can be done by executing the command "make -C build
linux.distclean" followed by "make -C build linux.rebuild"
5. Upload the kernel into the target and boot it up.