Re: CURRENT (r316844): Fatal trap 12: page fault while in kernel mode (syslogd)

From: O. Hartmann <ohartmann_at_walstatt.org>
Date: Fri, 14 Apr 2017 18:58:27 +0200
Am Fri, 14 Apr 2017 10:02:03 -0600
Alan Somers <asomers_at_freebsd.org> schrieb:

> On Fri, Apr 14, 2017 at 9:53 AM, O. Hartmann <o.hartmann_at_walstatt.org> wrote:
> > I just updated today CURRENT's tree sources for nanoBSD to r316844 and recompiled an
> > image I use for an PCengines APU 2C4. The APU now crashes with the error shown below.
> >
> > r316717 is all right and boots and works as expected.
> >
> > Just now, I depend on the box, so debugging kernel with more info is underway, but in
> > due time.
> >
> > Kind regards,
> >
> > Oliver
> >
> > [...]
> > uhub2: <vendor 0x0438 product 0x7900, class 9/0, rev 2.00/0.18, addr 2> on usbus1
> > uhub2: 4 ports with 4 removable, self powered
> > Link state changed to up
> > igb0: link state changed to UP
> > Link state changed to up
> > igb1: link state changed to UP
> > igb1.100: link state changed to UP
> > igb1.2: link state changed to UP
> > igb1.66: link state changed to UP
> > igb1.111: link state changed to UP
> > igb1.10: link state changed to UP
> > tun0: link state changed to UP
> > link state changed to down
> > igb0: link state changed to DOWN
> > Bump sched buckets to 64 (was 0)
> > Link state changed to up
> >
> >
> > Fatal trap 12: page fault while in kernel mode
> > cpuid = 0; apic id = 00
> > fault virtual address   = 0xfffff80012231600
> > fault code              = supervisor read instruction, protection violation
> > instruction pointer     = 0x20:0xfffff80012231600
> > stack pointer           = 0x28:0xfffffe012cdc1f58
> > frame pointer           = 0x28:0xfffffe012cdc1fc0
> > code segment            = base 0x0, limit 0xfffff, type 0x1b
> >                         = DPL 0, pres 1, long 1, def32 0, gran 1
> > processor eflags        = interrupt enabled, resume, IOPL = 0
> > current process         = 941 (syslogd)
> > trap number             = 12
> > panic: page fault
> > cpuid = 1
> > time = 1492182471
> > Uptime: 16s
> > PCEngines apu2
> > coreboot build 20160311  
> 
> At a minimum, you need to include a backtrace with a bug report like this.
> 
> -Alan

Just sent a PR:
Bug 218663

and added the backtrace as required:

[...]
Link state changed to up
Kernel page fault with the following non-sleepable locks held:
shared rw bpf interface lock (bpf interface lock) r = 0 (0xfffff80002ff4028) locked
_at_ /pool/sources/CURRENT/src/sys/net/bpf.c:2206 shared rw udpinp (udpinp) r = 0
(0xfffff800127f5c98) locked _at_ /pool/sources/CURRENT/src/sys/netinet/udp_usrreq.c:1140
stack backtrace: #0 0xffffffff80641960 at witness_debugger+0x70
#1 0xffffffff80642d8e at witness_warn+0x45e
#2 0xffffffff8096f563 at trap_pfault+0x53
#3 0xffffffff8096ed5e at trap+0x24e
#4 0xffffffff80952ce3 at calltrap+0x8
#5 0xffffffff806fc253 at iflib_txq_drain+0x1383
#6 0xffffffff806feda0 at drain_ring_lockless+0xc0
#7 0xffffffff806feb6e at ifmp_ring_enqueue+0x32e
#8 0xffffffff806fda90 at iflib_if_transmit+0xb0
#9 0xffffffff806dfb00 at ether_output+0x730
#10 0xffffffff80761ae6 at arprequest+0x426
#11 0xffffffff80761f41 at arpresolve_full+0x3d1
#12 0xffffffff807621ac at arpresolve+0x10c
#13 0xffffffff806df8b1 at ether_output+0x4e1
#14 0xffffffff80785c36 at ip_output+0x14e6
#15 0xffffffff8080ddd1 at udp_send+0xab1
#16 0xffffffff80676c44 at sosend_dgram+0x3e4
#17 0xffffffff8067d3a9 at kern_sendit+0x229


Fatal trap 12: page fault while in kernel mode
cpuid = 2; apic id = 02
fault virtual address   = 0xfffff8001282fb00
fault code              = supervisor read instruction, protection violation
instruction pointer     = 0x20:0xfffff8001282fb00
stack pointer           = 0x28:0xfffffe012d2aef48
frame pointer           = 0x28:0xfffffe012d2aefb0
code segment            = base rx0, limit 0xfffff, type 0x1b
                        = DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags        = interrupt enabled, resume, IOPL = 0
current process         = 941 (syslogd)
[ thread pid 941 tid 100084 ]
Stopped at      0xfffff8001282fb00
db> bt
Tracing pid 941 tid 100084 td 0xfffff80004520000
??() at 0xfffff8001282fb00
bpf_mtap() at bpf_mtap+0x1ab/frame 0xfffffe012d2aefb0
iflib_txq_drain() at iflib_txq_drain+0x1383/frame 0xfffffe012d2af130
drain_ring_lockless() at drain_ring_lockless+0xc0/frame 0xfffffe012d2af190
ifmp_ring_enqueue() at ifmp_ring_enqueue+0x32e/frame 0xfffffe012d2af200
iflib_if_transmit() at iflib_if_transmit+0xb0/frame 0xfffffe012d2af240
ether_output() at ether_output+0x730/frame 0xfffffe012d2af2e0
arprequest() at arprequest+0x426/frame 0xfffffe012d2af3e0
arpresolve_full() at arpresolve_full+0x3d1/frame 0xfffffe012d2af460
arpresolve() at arpresolve+0x10c/frame 0xfffffe012d2af4d0
ether_output() at ether_output+0x4e1/frame 0xfffffe012d2af570
ip_output() at ip_output+0x14e6/frame 0xfffffe012d2af6b0
udp_send() at udp_send+0xab1/frame 0xfffffe012d2af780
sosend_dgram() at sosend_dgram+0x3e4/frame 0xfffffe012d2af7f0
kern_sendit() at kern_sendit+0x229/frame 0xfffffe012d2af890
sendit() at sendit+0x1a7/frame 0xfffffe012d2af8e0
sys_sendto() at sys_sendto+0x4d/frame 0xfffffe012d2af930
amd64_syscall() at amd64_syscall+0x4c2/frame 0xfffffe012d2afab0
Xfast_syscall() at Xfast_syscall+0xfb/frame 0xfffffe012d2afab0
syscall (133, FreeBSD ELF64, sys_sendto), rip = 0x800b8a5fa, rsp = 0x7fffffffd6b8,
rbp = 0x7fffffffdcc0 ---

-- 
O. Hartmann

Ich widerspreche der Nutzung oder Übermittlung meiner Daten für
Werbezwecke oder für die Markt- oder Meinungsforschung (§ 28 Abs. 4 BDSG).

Received on Fri Apr 14 2017 - 14:58:42 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:41:11 UTC