From owner-freebsd-ppc@freebsd.org Fri Mar 29 20:25:39 2019 Return-Path: Delivered-To: freebsd-ppc@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 312271551A24 for ; Fri, 29 Mar 2019 20:25:39 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2610:1c1:1:6074::16:84]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id C90258090F for ; Fri, 29 Mar 2019 20:25:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by freefall.freebsd.org (Postfix) id A055914940; Fri, 29 Mar 2019 20:25:38 +0000 (UTC) Delivered-To: powerpc@localmail.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [96.47.72.80]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (Client CN "mx1.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by freefall.freebsd.org (Postfix) with ESMTPS id 9D2F81493F for ; Fri, 29 Mar 2019 20:25:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4DDB58090D for ; Fri, 29 Mar 2019 20:25:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 78F8E13580 for ; Fri, 29 Mar 2019 20:25:37 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id x2TKPbIq049503 for ; Fri, 29 Mar 2019 20:25:37 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id x2TKPb8v049502 for powerpc@FreeBSD.org; Fri, 29 Mar 2019 20:25:37 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: powerpc@FreeBSD.org Subject: [Bug 232387] head -r339076: system crash in vnet_epair_init during kern_jail_set in a kyua test on powerpc64 Date: Fri, 29 Mar 2019 20:25:37 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: vimage X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: marklmi26-fbsd@yahoo.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: powerpc@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-Rspamd-Queue-Id: C90258090F X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.99 / 15.00]; local_wl_from(0.00)[freebsd.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.99)[-0.992,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: freebsd-ppc@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Porting FreeBSD to the PowerPC List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 29 Mar 2019 20:25:39 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D232387 --- Comment #14 from Mark Millard --- I finally have a system-clang devel/powerpc64-binutils based build that I've tested ( head -r345558 based, ELFv1 ABI ). Again I'm off experimental futures. This was with a non-debug kernel. This too fails. Running just: kyua test -k /usr/tests/Kyuafile sys/netipsec/tunnel/aes_cbc_128_hmac_sha1 is sufficient for the crash to happen but it fails when a full Kyua test gets there. Again a data storage interrupt: ( Be warned: hand typed from a picture.) exception =3D 0x300 (data storage interrupt) virtual address=3D 0x860ce198 dsisr =3D 0x42000000 srr0 =3D 0xc0000000007b51a4 (0x7b51a4) srr1 =3D 0x9000000000009032 current msr =3D 0x9000000000009032 lr =3D 0xc0000000007184a8 (0x7184a8) frame =3D 0xe00000008ecb0dd0 curthread =3D 0xc00000000ad6c580 pid =3D 28966, comm =3D ifconfig Panic: data storage interrupt trap cpuid=3D 2 time =3D 1553886317 The frmae, curthread, pid, cpuid, and time can vary. The backtrace information is better this time. Be warned: hand typed from a picture. The example is from a full kyua run. KDB: stack backtrace: 0xe000000008eb0b00: at vpanic+0x1d8 0xe000000008eb0bb0: at panic+0x44 0xe000000008eb0be0: at trap_fatal+0x2f4 0xe000000008eb0c70: at trap+0x698 0xe000000008eb0d50: at powerpc_interrupt+0x1a0 0xe000000008eb0da0: at kernel DSI write trap @ 0x860ce198 by lock_init+0x140: srr1 =3D 0x9000000000009032 r1 =3D 0xe00000008ecb1050 cr =3D 0x22880f488 xer =3D 0 ctr =3D 0xc000000000718438 r2 =3D 0xc000000001370000 sr =3D 0x42000000 frame=3D 0xe00000008ecb0dd0 0xe00000008ecb1050: at __set_sysctl_set_sym_sysctl___net_link_epair_netisr_maxqlen+0x4 0xe00000008ecb1080: at epair_modeevent+0xbc 0xe00000008ecb1140: at module_register_init+0x130 0xe00000008ecb11f0: at linker_load_module+0xd88 0xe00000008ecb1620: at kern_kldload+0x8c 0xe00000008ecb1690: at sys_kldload+0x8c 0xe00000008ecb16e0: at trap+0xb28 0xe00000008ecb17c0: at powerpc_interrupt+0x1a0 0xe00000008ecb1810: at user SC trap by 0x810182da8: srr1 =3D 0x900000000200f032 r1 =3D 0x3fffffffffffcf10 cr =3D 0x24002200 xer =3D 0x20000000 ctr =3D 0x810182da0 r2 =3D 0x81033b900 frame=3D 0xe00000008ecb1840 Note: The 'at __set_sysctl_set_sym_sysctl___net_link_eapir_netisr_maxqlen+0= x4' at other times has shown text such as 'at 0xffffffc'. The kernel stack addresses (0xe000 prefixes) can vary. Otherwise the backtraces agree so far as I've noticed. --=20 You are receiving this mail because: You are the assignee for the bug.=