From owner-freebsd-current@FreeBSD.ORG Mon Nov 19 14:29:57 2012 Return-Path: Delivered-To: freebsd-current@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 33A55E5A; Mon, 19 Nov 2012 14:29:57 +0000 (UTC) (envelope-from ianf@clue.co.za) Received: from zcs04.jnb1.cloudseed.co.za (zcs04.jnb1.cloudseed.co.za [41.154.0.161]) by mx1.freebsd.org (Postfix) with ESMTP id 7DD528FC08; Mon, 19 Nov 2012 14:29:55 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by zcs04.jnb1.cloudseed.co.za (Postfix) with ESMTP id B83342A82C1D; Mon, 19 Nov 2012 16:29:48 +0200 (SAST) X-Virus-Scanned: amavisd-new at zcs04.jnb1.cloudseed.co.za Received: from zcs04.jnb1.cloudseed.co.za ([127.0.0.1]) by localhost (zcs04.jnb1.cloudseed.co.za [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K3gdJ8UOHr7M; Mon, 19 Nov 2012 16:29:48 +0200 (SAST) Received: from clue.co.za (unknown [41.154.88.19]) by zcs04.jnb1.cloudseed.co.za (Postfix) with ESMTPSA id D7DC22A82C15; Mon, 19 Nov 2012 16:29:47 +0200 (SAST) Received: from localhost ([127.0.0.1] helo=clue.co.za) by clue.co.za with esmtp (Exim 4.80 (FreeBSD)) (envelope-from ) id 1TaSM6-000I0A-DW; Mon, 19 Nov 2012 16:29:46 +0200 To: Gleb Smirnoff , freebsd-current@FreeBSD.org From: Ian FREISLICH Subject: Re: netisr panic? In-Reply-To: References: <20121117213754.GI38060@FreeBSD.org> X-Attribution: BOFH Date: Mon, 19 Nov 2012 16:29:46 +0200 Message-Id: X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Nov 2012 14:29:57 -0000 Ian FREISLICH wrote: > Gleb Smirnoff wrote: > > On Sat, Nov 17, 2012 at 05:07:54PM +0200, Ian FREISLICH wrote: > > I> I have this consistently with: > > I> > > I> FreeBSD firewall2.jnb1.gp-online.net 10.0-CURRENT FreeBSD 10.0-CURRENT # 30 > r243156: Fri Nov 16 20:12:33 SAST 2012 ianf@firewall2.jnb1.gp-online.net :/ > usr/obj/usr/src/sys/FIREWALL amd64 > > > > Pretty sure this is a new version of wrong byte order panic, which > > no longer can happen in HEAD. > > > > Can you please try this patch? > > It survived the night, which it hasn't managed before. I'll keep you posted. Jubilation short lived: Fatal trap 12: page fault while in kernel mode cpuid = 0; apic id = 00 fault virtual address = 0xc fault code = supervisor read data, page not present instruction pointer = 0x20:0xffffffff8050f494 stack pointer = 0x28:0xffffff84637a19d0 frame pointer = 0x28:0xffffff84637a1a10 code segment = base 0x0, limit 0xfffff, type 0x1b Fatal trap 12: page fault while in kernel mode = DPL 0, pres 1, long 1, def32 0, gran 1 cpuid = 7; apic id = 07 processor eflags = fault virtual address = 0xc interrupt enabled, fault code = supervisor read data, page not present resume, IOPL = 0 instruction pointer = 0x20:0xffffffff8050f494 stack pointer = 0x28:0xffffff846386c9d0 current process = 11 (irq261: igb0:que 0) frame pointer = 0x28:0xffffff846386ca10 trap number = 12 code segment = base 0x0, limit 0xfffff, type 0x1b panic: page fault cpuid = 0 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x2a panic() at panic+0x1ce trap_fatal() at trap_fatal+0x290 trap_pfault() at trap_pfault+0x21f trap() at trap+0x2b4 calltrap() at calltrap+0x8 --- trap 0xc, rip = 0xffffffff8050f494, rsp = 0xffffff84637a19d0, rbp = 0xffffff84637a1a10 --- ether_nh_input() at ether_nh_input+0x94 netisr_dispatch_src() at netisr_dispatch_src+0x212 igb_rxeof() at igb_rxeof+0x384 igb_msix_que() at igb_msix_que+0xfa intr_event_execute_handlers() at intr_event_execute_handlers+0xfd ithread_loop() at ithread_loop+0x9e fork_exit() at fork_exit+0x11e fork_trampoline() at fork_trampoline+0xe --- trap 0, rip = 0, rsp = 0xffffff84637a1cb0, rbp = 0 --- Uptime: 19h5m45s Dumping 2654 out of 16368 MB:..1%..11%..21%..31%..41%..51%..61%..71%..81%..91% #0 doadump (textdump=1) at /usr/src/sys/kern/kern_shutdown.c:266 266 if (textdump && textdump_pending) { (kgdb) #0 doadump (textdump=1) at /usr/src/sys/kern/kern_shutdown.c:266 #1 0xffffffff8044ae64 in kern_reboot (howto=260) at /usr/src/sys/kern/kern_shutdown.c:449 #2 0xffffffff8044b3e7 in panic (fmt=0x1
) at /usr/src/sys/kern/kern_shutdown.c:637 #3 0xffffffff80605b30 in trap_fatal (frame=0xc, eva=) at /usr/src/sys/amd64/amd64/trap.c:872 #4 0xffffffff80605e9f in trap_pfault (frame=0xffffff84637a1920, usermode=0) at /usr/src/sys/amd64/amd64/trap.c:789 #5 0xffffffff80606254 in trap (frame=0xffffff84637a1920) at /usr/src/sys/amd64/amd64/trap.c:463 #6 0xffffffff805efecf in calltrap () at /usr/src/sys/amd64/amd64/exception.S:228 #7 0xffffffff8050f494 in ether_nh_input (m=0xfffffe004f3bde00) at /usr/src/sys/net/if_ethersubr.c:484 #8 0xffffffff8051a562 in netisr_dispatch_src (proto=9, source=, m=) at /usr/src/sys/net/netisr.c:1013 #9 0xffffffff80318844 in igb_rxeof (que=0xfffffe000a183a00, count=499, done=0x0) at /usr/src/sys/dev/e1000/if_igb.c:4688 #10 0xffffffff8032183a in igb_msix_que (arg=) at /usr/src/sys/dev/e1000/if_igb.c:1596 #11 0xffffffff8042082d in intr_event_execute_handlers ( p=, ie=0xfffffe000a109e00) at /usr/src/sys/kern/kern_intr.c:1272 #12 0xffffffff8042205e in ithread_loop (arg=0xfffffe000a1a16e0) at /usr/src/sys/kern/kern_intr.c:1285 #13 0xffffffff8041d48e in fork_exit ( callout=0xffffffff80421fc0 , arg=0xfffffe000a1a16e0, frame=0xffffff84637a1c00) at /usr/src/sys/kern/kern_fork.c:995 #14 0xffffffff805f038e in fork_trampoline () at /usr/src/sys/amd64/amd64/exception.S:602 #15 0x0000000000000000 in ?? () -- Meditating Guru Ian Freislich