From owner-freebsd-bugs@freebsd.org Thu Jan 10 07:09:19 2019 Return-Path: Delivered-To: freebsd-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 266A114A17E4 for ; Thu, 10 Jan 2019 07:09:19 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 9C34B6DCB2 for ; Thu, 10 Jan 2019 07:09:18 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 59EAB14A17E3; Thu, 10 Jan 2019 07:09:18 +0000 (UTC) Delivered-To: bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3761C14A17E2 for ; Thu, 10 Jan 2019 07:09:18 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id CB3986DCB0 for ; Thu, 10 Jan 2019 07:09:17 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id EF3971A64D for ; Thu, 10 Jan 2019 07:09:16 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id x0A79GIk012522 for ; Thu, 10 Jan 2019 07:09:16 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id x0A79Ge9012519 for bugs@FreeBSD.org; Thu, 10 Jan 2019 07:09:16 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 234296] FreeBSD 12.0-STABLE r342216 Fatal trap 12 Date: Thu, 10 Jan 2019 07:09:16 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 12.0-STABLE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: chernov_victor@list.ru X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 10 Jan 2019 07:09:19 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D234296 --- Comment #6 from Victor --- same problem on another server 12.0-STABLE FreeBSD 12.0-STABLE r342878 OFFICE_GW amd64 kgdb /boot/kernel/kernel /var/crash/vmcore.6 GNU gdb (GDB) 8.2 [GDB v8.2 for FreeBSD] Copyright (C) 2018 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-portbld-freebsd12.0". Type "show configuration" for configuration details. For bug reporting instructions, please see: . Find the GDB manual and other documentation resources online at: . For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from /boot/kernel/kernel...Reading symbols from /usr/lib/debug//boot/kernel/kernel.debug...done. done. Unread portion of the kernel message buffer: kernel trap 9 with interrupts disabled Fatal trap 9: general protection fault while in kernel mode cpuid =3D 0; apic id =3D 00 instruction pointer =3D 0x20:0xffffffff8053ee2f stack pointer =3D 0x28:0xfffffe0025d8a770 frame pointer =3D 0x28:0xfffffe0025d8a7e0 code segment =3D base 0x0, limit 0xfffff, type 0x1b =3D DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags =3D resume, IOPL =3D 0 current process =3D 11 (idle: cpu0) trap number =3D 9 panic: general protection fault cpuid =3D 0 time =3D 1547100690 KDB: stack backtrace: #0 0xffffffff8056da27 at kdb_backtrace+0x67 #1 0xffffffff80525313 at vpanic+0x1a3 #2 0xffffffff80525163 at panic+0x43 #3 0xffffffff808287df at trap_fatal+0x35f #4 0xffffffff80827c4d at trap+0x6d #5 0xffffffff808051c5 at calltrap+0x8 #6 0xffffffff80836db8 at handleevents+0x1a8 #7 0xffffffff80837621 at timercb+0x2a1 #8 0xffffffff8082d219 at hpet_intr_single+0x1b9 #9 0xffffffff8082d2be at hpet_intr+0x8e #10 0xffffffff804ea32e at intr_event_handle+0xbe #11 0xffffffff8086c1a8 at intr_execute_handlers+0x58 #12 0xffffffff808722b4 at lapic_handle_intr+0x44 #13 0xffffffff80806359 at Xapic_isr1+0xd9 #14 0xffffffff80375417 at acpi_cpu_idle+0x2e7 #15 0xffffffff80868e8f at cpu_idle_acpi+0x3f #16 0xffffffff80868f47 at cpu_idle+0xa7 #17 0xffffffff80557c95 at sched_idletd+0x515 Uptime: 19h45m31s Dumping 1359 out of 4069 MB:..2%..11%..21%..31%..41%..51%..61%..71%..81%..9= 1% __curthread () at ./machine/pcpu.h:230 230 __asm("movq %%gs:%P1,%0" : "=3Dr" (td) : "n" (OFFSETOF_CURTHREAD)); (kgdb) where #0 __curthread () at ./machine/pcpu.h:230 #1 doadump (textdump=3D) at /usr/src/sys/kern/kern_shutdown= .c:366 #2 0xffffffff80524efb in kern_reboot (howto=3D260) at /usr/src/sys/kern/kern_shutdown.c:446 #3 0xffffffff80525373 in vpanic (fmt=3D, ap=3D0xfffffe0025d= 8a520) at /usr/src/sys/kern/kern_shutdown.c:872 #4 0xffffffff80525163 in panic (fmt=3D) at /usr/src/sys/kern/kern_shutdown.c:799 #5 0xffffffff808287df in trap_fatal (frame=3D0xfffffe0025d8a6b0, eva=3D0) = at /usr/src/sys/amd64/amd64/trap.c:929 #6 0xffffffff80827c4d in trap (frame=3D0xfffffe0025d8a6b0) at /usr/src/sys/amd64/amd64/trap.c:217 #7 #8 0xffffffff8053ee2f in callout_process (now=3D305509015149479) at /usr/src/sys/kern/kern_timeout.c:510 #9 0xffffffff80836db8 in handleevents (now=3D305509015149479, fake=3D0) at /usr/src/sys/kern/kern_clocksource.c:213 #10 0xffffffff80837621 in timercb (et=3D, arg=3D) at /usr/src/sys/kern/kern_clocksource.c:357 #11 0xffffffff8082d219 in hpet_intr_single (arg=3D0xfffffe00003670b0) at /usr/src/sys/dev/acpica/acpi_hpet.c:309 #12 0xffffffff8082d2be in hpet_intr (arg=3D0xfffffe0000367000) at /usr/src/sys/dev/acpica/acpi_hpet.c:327 #13 0xffffffff804ea32e in intr_event_handle (ie=3D0xfffff80002088b00, frame=3D0xfffffe0025d8a9a0) at /usr/src/sys/kern/kern_intr.c:1225 #14 0xffffffff8086c1a8 in intr_execute_handlers (isrc=3D0xfffff800021fde48, frame=3D0xfffffe0025d8a9a0) at /usr/src/sys/x86/x86/intr_machdep.c:358 #15 0xffffffff808722b4 in lapic_handle_intr (vector=3D, frame=3D0x115dbe7e8ecf4) at /usr/src/sys/x86/x86/local_apic.c:1293 #16 #17 acpi_cpu_c1 () at /usr/src/sys/x86/x86/cpu_machdep.c:140 #18 0xffffffff80375417 in acpi_cpu_idle (sbt=3D) at /usr/src/sys/dev/acpica/acpi_cpu.c:1187 #19 0xffffffff80868e8f in cpu_idle_acpi (sbt=3D56223337) at /usr/src/sys/x86/x86/cpu_machdep.c:433 #20 0xffffffff80868f47 in cpu_idle (busy=3D0) at /usr/src/sys/x86/x86/cpu_machdep.c:581 #21 0xffffffff80557c95 in sched_idletd (dummy=3D) at /usr/src/sys/kern/sched_ule.c:2829 #22 0xffffffff804e76a3 in fork_exit (callout=3D0xffffffff80557780 , arg=3D0x0, frame=3D0xfffffe0025d8ac00) at /usr/src/sys/kern/kern_fork.c:1059 #23 (kgdb) --=20 You are receiving this mail because: You are the assignee for the bug.=