Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 08 Apr 2022 15:49:09 +0000
From:      bugzilla-noreply@freebsd.org
To:        bugs@FreeBSD.org
Subject:   [Bug 262894] Kernel Panic (page fault) with 13.1-BETA2 in g_eli & httpd
Message-ID:  <bug-262894-227-pcZcDSkca5@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-262894-227@https.bugs.freebsd.org/bugzilla/>
References:  <bug-262894-227@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D262894

--- Comment #16 from Krautmaster <mathias.kraut@gmx.de> ---
by fault  booted the wrong Kernel (nightly update) yesterday again, and just
now O got the same geli issue with the same faulty address.

Fatal trap 12: page fault while in kernel mode
cpuid =3D 4; apic id =3D 04
fault virtual address   =3D 0xfffff80e00000004
fault code              =3D supervisor read data, page not present
instruction pointer     =3D 0x20:0xffffffff80f1cd7d
stack pointer           =3D 0x28:0xfffffe014e59ec00
frame pointer           =3D 0x28:0xfffffe014e59eca0
code segment            =3D base 0x0, limit 0xfffff, type 0x1b
                        =3D DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags        =3D interrupt enabled, resume, IOPL =3D 0
current process         =3D 2705 (g_eli[4] gptid/e567)
trap number             =3D 12
panic: page fault
cpuid =3D 4
time =3D 1649430252
KDB: stack backtrace:
db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe014e59e=
9c0
vpanic() at vpanic+0x17f/frame 0xfffffe014e59ea10
panic() at panic+0x43/frame 0xfffffe014e59ea70
trap_fatal() at trap_fatal+0x385/frame 0xfffffe014e59ead0
trap_pfault() at trap_pfault+0x4f/frame 0xfffffe014e59eb30
calltrap() at calltrap+0x8/frame 0xfffffe014e59eb30
--- trap 0xc, rip =3D 0xffffffff80f1cd7d, rsp =3D 0xfffffe014e59ec00, rbp =
=3D
0xfffffe014e59eca0 ---
aesni_crypt_xts() at aesni_crypt_xts+0x17d/frame 0xfffffe014e59eca0
aesni_decrypt_xts() at aesni_decrypt_xts+0xe/frame 0xfffffe014e59ecc0
aesni_cipher_crypt() at aesni_cipher_crypt+0x2f1/frame 0xfffffe014e59ed70
aesni_process() at aesni_process+0x159/frame 0xfffffe014e59edc0
crypto_dispatch() at crypto_dispatch+0x118/frame 0xfffffe014e59edf0
g_eli_crypto_run() at g_eli_crypto_run+0x178/frame 0xfffffe014e59ee90
g_eli_worker() at g_eli_worker+0x328/frame 0xfffffe014e59eef0
fork_exit() at fork_exit+0x7e/frame 0xfffffe014e59ef30
fork_trampoline() at fork_trampoline+0xe/frame 0xfffffe014e59ef30
--- trap 0x80af60b4, rip =3D 0, rsp =3D 0, rbp =3D 0 ---
KDB: enter: panic

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-262894-227-pcZcDSkca5>