From nobody Sat Dec 18 22:16:48 2021 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id D7A4118FE6C1 for ; Sat, 18 Dec 2021 22:27:35 +0000 (UTC) (envelope-from pmc@citylink.dinoex.sub.org) Received: from uucp.dinoex.org (uucp.dinoex.org [IPv6:2a0b:f840::12]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "uucp.dinoex.sub.de", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4JGgTL4DmYz3qpL for ; Sat, 18 Dec 2021 22:27:34 +0000 (UTC) (envelope-from pmc@citylink.dinoex.sub.org) Received: from uucp.dinoex.sub.de (uucp.dinoex.org [185.220.148.12]) by uucp.dinoex.org (8.17.1/8.17.1) with ESMTPS id 1BIMR4Zb030182 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO) for ; Sat, 18 Dec 2021 23:27:04 +0100 (CET) (envelope-from pmc@citylink.dinoex.sub.org) X-MDaemon-Deliver-To: X-Authentication-Warning: uucp.dinoex.sub.de: Host uucp.dinoex.org [185.220.148.12] claimed to be uucp.dinoex.sub.de Received: (from uucp@localhost) by uucp.dinoex.sub.de (8.17.1/8.17.1/Submit) with UUCP id 1BIMR4S3030181 for freebsd-stable@freebsd.org; Sat, 18 Dec 2021 23:27:04 +0100 (CET) (envelope-from pmc@citylink.dinoex.sub.org) Received: from gate.intra.daemon.contact (gate-e [192.168.98.2]) by citylink.dinoex.sub.de (8.16.1/8.16.1) with ESMTP id 1BIMGqTn063373 for ; Sat, 18 Dec 2021 23:16:52 +0100 (CET) (envelope-from peter@gate.intra.daemon.contact) Received: from gate.intra.daemon.contact (gate-e [192.168.98.2]) by gate.intra.daemon.contact (8.16.1/8.16.1) with ESMTPS id 1BIMGm43063364 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO) for ; Sat, 18 Dec 2021 23:16:49 +0100 (CET) (envelope-from peter@gate.intra.daemon.contact) Received: (from peter@localhost) by gate.intra.daemon.contact (8.16.1/8.16.1/Submit) id 1BIMGmw3063363 for freebsd-stable@freebsd.org; Sat, 18 Dec 2021 23:16:48 +0100 (CET) (envelope-from peter) Date: Sat, 18 Dec 2021 23:16:48 +0100 From: Peter To: freebsd-stable@freebsd.org Subject: Re: 12.3:[ZFS pointer corruption] kernel crash exporting FreeBSD src repo Message-ID: References: List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Milter: Spamilter (Reciever: uucp.dinoex.sub.de; Sender-ip: 185.220.148.12; Sender-helo: uucp.dinoex.sub.de;) X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (uucp.dinoex.org [185.220.148.12]); Sat, 18 Dec 2021 23:27:07 +0100 (CET) X-Rspamd-Queue-Id: 4JGgTL4DmYz3qpL X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of pmc@citylink.dinoex.sub.org designates 2a0b:f840::12 as permitted sender) smtp.mailfrom=pmc@citylink.dinoex.sub.org X-Spamd-Result: default: False [-3.30 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_SPF_ALLOW(-0.20)[+mx]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; HAS_XAW(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-1.000]; RCVD_COUNT_THREE(0.00)[4]; TO_DN_NONE(0.00)[]; NEURAL_HAM_SHORT(-1.00)[-1.000]; DMARC_NA(0.00)[sub.org]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:205376, ipnet:2a0b:f840::/32, country:DE]; RCVD_TLS_LAST(0.00)[] X-ThisMailContainsUnwantedMimeParts: N On Mon, Dec 13, 2021 at 08:34:13PM +0100, Peter wrote: ! I have a filesystem with the FreeBSD src repo clone. ! ! When I do ! > git checkout-index -a --prefix=/new-filesystem/ ! in 5 of 6 cases I get a kernel crash. ! ! Fatal trap 12: page fault while in kernel mode ! cpuid = 19; apic id = 19 ! fault virtual address = 0x410 ! fault code = supervisor read data, page not present ! instruction pointer = 0x20:0xffffffff808e9815 ! stack pointer = 0x28:0xfffffe00e667bf50 ! frame pointer = 0x28:0xfffffe00e667bff0 ! code segment = base 0x0, limit 0xfffff, type 0x1b ! = DPL 0, pres 1, long 1, def32 0, gran 1 ! processor eflags = interrupt enabled, resume, IOPL = 0 ! current process = 18330 (git) ! trap number = 12 This one did finally turn out to be a known issue in the cam component. It had haunted me already back in 2016, and made me disassemble the whole machine, replace it with a newer (and then turning out to be much worse) machine with lots of other issues, and I couldn't figure what the problem actually is - it was not obvious when and why it had appeared and I thought it to be hardware related. Anyway, with another two changes to newer hardware (this time hopefully to the better) I thought the issue had disappeared. No, it hasn't - it just comes in a different disguise: now it creates bogus data in ZFS (back then the crashes appeared within the cam component). But the remedy/workaround is the same: changing the cam options. cheerio, PMc