Date: Fri, 14 Apr 2017 16:56:09 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-bugs@FreeBSD.org Subject: [Bug 218663] atal trap 12: APU2C4: CURRENT (r316857): Fatal trap 12: page fault while in kernel mode (syslogd) Message-ID: <bug-218663-8@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=218663 Bug ID: 218663 Summary: atal trap 12: APU2C4: CURRENT (r316857): Fatal trap 12: page fault while in kernel mode (syslogd) Product: Base System Version: CURRENT Hardware: amd64 OS: Any Status: New Severity: Affects Some People Priority: --- Component: kern Assignee: freebsd-bugs@FreeBSD.org Reporter: ohartmann@walstatt.org CURRENT as of r316857, fails to boot kernel on PCengines APU 2C4 with the error shown below. r316717 runs fine (exact same ports, exact same config). It seems the kernel to be the culprit, I can easily swap the kernel rr316857 with its according userland (also r316857) with the kernel r316717 and everything is fine. [...] Steering write from 0 kBps to 300000 kBps WARNING: WITNESS option enabled, expect reduced performance. Trying to mount root from ufs:/dev/ufs/dsks1a [ro]... uhub1: 4 ports with 4 removable, self powered uhub0: 2 ports with 2 removable, self powered ugen1.2: <vendor 0x0438 product 0x7900> at usbus1 uhub2 on uhub0 uhub2: <vendor 0x0438 product 0x7900, class 9/0, rev 2.00/0.18, addr 2> on usbus1 uhub2: 4 ports with 4 removable, self powered lock order reversal: 1st 0xfffffe00f7039010 bufwait (bufwait) @ /pool/sources/CURRENT/src/sys/kern/vfs_bio.c:3499 2nd 0xfffff80003177800 dirhash (dirhash) @ /pool/sources/CURRENT/src/sys/ufs/ufs/ufs_dirhash.c:281 stack backtrace: #0 0xffffffff80641960 at witness_debugger+0x70 #1 0xffffffff80641853 at witness_checkorder+0xe23 #2 0xffffffff805e7e5a at _sx_xlock+0x5a #3 0xffffffff8090b09d at ufsdirhash_add+0x3d #4 0xffffffff8090de01 at ufs_direnter+0x491 #5 0xffffffff80916f5e at ufs_makeinode+0x61e #6 0xffffffff80912c94 at ufs_create+0x34 #7 0xffffffff809d88d0 at VOP_CREATE_APV+0xd0 #8 0xffffffff806b9cc8 at vn_open_cred+0x2a8 #9 0xffffffff806b31ce at kern_openat+0x1fe #10 0xffffffff8096fd42 at amd64_syscall+0x4c2 #11 0xffffffff80952fcb at Xfast_syscall+0xfb lock order reversal: 1st 0xfffff8000453db78 ufs (ufs) @ /pool/sources/CURRENT/src/sys/kern/vfs_mount.c:1277 2nd 0xfffff8000453d7c8 devfs (devfs) @ /pool/sources/CURRENT/src/sys/ufs/ffs/ffs_vfsops.c:1405 stack backtrace: #0 0xffffffff80641960 at witness_debugger+0x70 #1 0xffffffff80641853 at witness_checkorder+0xe23 #2 0xffffffff805b7bde at lockmgr_lock_fast_path+0x1ce #3 0xffffffff809da896 at VOP_LOCK1_APV+0xd6 #4 0xffffffff806ba3da at _vn_lock+0x6a #5 0xffffffff80901923 at ffs_flushfiles+0x93 #6 0xffffffff80903f3b at ffs_unmount+0x7b #7 0xffffffff806a3401 at dounmount+0x5c1 #8 0xffffffff806a2dbf at sys_unmount+0x30f #9 0xffffffff8096fd42 at amd64_syscall+0x4c2 #10 0xffffffff80952fcb at Xfast_syscall+0xfb Link state changed to up igb1: link state changed to UP igb1.100: link state changed to UP igb1.2: link state changed to UP igb1.66: link state changed to UP igb1.111: link state changed to UP igb1.10: link state changed to UP Link state changed to up igb0: link state changed to UP tun0: link state changed to UP igb0: link state changed to DOWN link state changed to down Bump sched buckets to 64 (was 0) Link state changed to up Kernel page fault with the following non-sleepable locks held: shared rw bpf interface lock (bpf interface lock) r = 0 (0xfffff80002ff4028) locked @ /pool/sources/CURRENT/src/sys/net/bpf.c:2206 shared rw udpinp (udpinp) r = 0 (0xfffff800127f5c98) locked @ /pool/sources/CURRENT/src/sys/netinet/udp_usrreq.c:1140 stack backtrace: #0 0xffffffff80641960 at witness_debugger+0x70 #1 0xffffffff80642d8e at witness_warn+0x45e #2 0xffffffff8096f563 at trap_pfault+0x53 #3 0xffffffff8096ed5e at trap+0x24e #4 0xffffffff80952ce3 at calltrap+0x8 #5 0xffffffff806fc253 at iflib_txq_drain+0x1383 #6 0xffffffff806feda0 at drain_ring_lockless+0xc0 #7 0xffffffff806feb6e at ifmp_ring_enqueue+0x32e #8 0xffffffff806fda90 at iflib_if_transmit+0xb0 #9 0xffffffff806dfb00 at ether_output+0x730 #10 0xffffffff80761ae6 at arprequest+0x426 #11 0xffffffff80761f41 at arpresolve_full+0x3d1 #12 0xffffffff807621ac at arpresolve+0x10c #13 0xffffffff806df8b1 at ether_output+0x4e1 #14 0xffffffff80785c36 at ip_output+0x14e6 #15 0xffffffff8080ddd1 at udp_send+0xab1 #16 0xffffffff80676c44 at sosend_dgram+0x3e4 #17 0xffffffff8067d3a9 at kern_sendit+0x229 Fatal trap 12: page fault while in kernel mode cpuid = 2; apic id = 02 fault virtual address = 0xfffff8001282fb00 fault code = supervisor read instruction, protection violation instruction pointer = 0x20:0xfffff8001282fb00 stack pointer = 0x28:0xfffffe012d2aef48 frame pointer = 0x28:0xfffffe012d2aefb0 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 941 (syslogd) [ thread pid 941 tid 100084 ] Stopped at 0xfffff8001282fb00 db> bt Tracing pid 941 tid 100084 td 0xfffff80004520000 ??() at 0xfffff8001282fb00 bpf_mtap() at bpf_mtap+0x1ab/frame 0xfffffe012d2aefb0 iflib_txq_drain() at iflib_txq_drain+0x1383/frame 0xfffffe012d2af130 drain_ring_lockless() at drain_ring_lockless+0xc0/frame 0xfffffe012d2af190 ifmp_ring_enqueue() at ifmp_ring_enqueue+0x32e/frame 0xfffffe012d2af200 iflib_if_transmit() at iflib_if_transmit+0xb0/frame 0xfffffe012d2af240 ether_output() at ether_output+0x730/frame 0xfffffe012d2af2e0 arprequest() at arprequest+0x426/frame 0xfffffe012d2af3e0 arpresolve_full() at arpresolve_full+0x3d1/frame 0xfffffe012d2af460 arpresolve() at arpresolve+0x10c/frame 0xfffffe012d2af4d0 ether_output() at ether_output+0x4e1/frame 0xfffffe012d2af570 ip_output() at ip_output+0x14e6/frame 0xfffffe012d2af6b0 udp_send() at udp_send+0xab1/frame 0xfffffe012d2af780 sosend_dgram() at sosend_dgram+0x3e4/frame 0xfffffe012d2af7f0 kern_sendit() at kern_sendit+0x229/frame 0xfffffe012d2af890 sendit() at sendit+0x1a7/frame 0xfffffe012d2af8e0 sys_sendto() at sys_sendto+0x4d/frame 0xfffffe012d2af930 amd64_syscall() at amd64_syscall+0x4c2/frame 0xfffffe012d2afab0 Xfast_syscall() at Xfast_syscall+0xfb/frame 0xfffffe012d2afab0 syscall (133, FreeBSD ELF64, sys_sendto), rip = 0x800b8a5fa, rsp = 0x7fffffffd6b8, rbp = 0x7fffffffdcc0 --- -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-218663-8>
