Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 14 Apr 2017 16:56:09 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-bugs@FreeBSD.org
Subject:   [Bug 218663] atal trap 12: APU2C4: CURRENT (r316857): Fatal trap 12: page fault while in kernel mode (syslogd)
Message-ID:  <bug-218663-8@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=218663

            Bug ID: 218663
           Summary: atal trap 12: APU2C4: CURRENT (r316857): Fatal trap
                    12: page fault while in kernel mode (syslogd)
           Product: Base System
           Version: CURRENT
          Hardware: amd64
                OS: Any
            Status: New
          Severity: Affects Some People
          Priority: ---
         Component: kern
          Assignee: freebsd-bugs@FreeBSD.org
          Reporter: ohartmann@walstatt.org

CURRENT as of r316857, fails to boot kernel on PCengines APU 2C4 with the error
shown below. r316717 runs fine (exact same ports, exact same config).

It seems the kernel to be the culprit, I can easily swap the kernel rr316857
with its according userland (also r316857) with the kernel r316717 and
everything is fine.


[...]
Steering write from 0 kBps to 300000 kBps
WARNING: WITNESS option enabled, expect reduced performance.
Trying to mount root from ufs:/dev/ufs/dsks1a [ro]...
uhub1: 4 ports with 4 removable, self powered
uhub0: 2 ports with 2 removable, self powered
ugen1.2: <vendor 0x0438 product 0x7900> at usbus1
uhub2 on uhub0
uhub2: <vendor 0x0438 product 0x7900, class 9/0, rev 2.00/0.18, addr 2> on
usbus1
uhub2: 4 ports with 4 removable, self powered
lock order reversal:
 1st 0xfffffe00f7039010 bufwait (bufwait)
@ /pool/sources/CURRENT/src/sys/kern/vfs_bio.c:3499 2nd 0xfffff80003177800
dirhash
(dirhash) @ /pool/sources/CURRENT/src/sys/ufs/ufs/ufs_dirhash.c:281 stack
backtrace:
#0 0xffffffff80641960 at witness_debugger+0x70
#1 0xffffffff80641853 at witness_checkorder+0xe23
#2 0xffffffff805e7e5a at _sx_xlock+0x5a
#3 0xffffffff8090b09d at ufsdirhash_add+0x3d
#4 0xffffffff8090de01 at ufs_direnter+0x491
#5 0xffffffff80916f5e at ufs_makeinode+0x61e
#6 0xffffffff80912c94 at ufs_create+0x34
#7 0xffffffff809d88d0 at VOP_CREATE_APV+0xd0
#8 0xffffffff806b9cc8 at vn_open_cred+0x2a8
#9 0xffffffff806b31ce at kern_openat+0x1fe
#10 0xffffffff8096fd42 at amd64_syscall+0x4c2
#11 0xffffffff80952fcb at Xfast_syscall+0xfb
lock order reversal:
 1st 0xfffff8000453db78 ufs (ufs) @
/pool/sources/CURRENT/src/sys/kern/vfs_mount.c:1277
 2nd 0xfffff8000453d7c8 devfs (devfs)
@ /pool/sources/CURRENT/src/sys/ufs/ffs/ffs_vfsops.c:1405 stack backtrace:
#0 0xffffffff80641960 at witness_debugger+0x70
#1 0xffffffff80641853 at witness_checkorder+0xe23
#2 0xffffffff805b7bde at lockmgr_lock_fast_path+0x1ce
#3 0xffffffff809da896 at VOP_LOCK1_APV+0xd6
#4 0xffffffff806ba3da at _vn_lock+0x6a
#5 0xffffffff80901923 at ffs_flushfiles+0x93
#6 0xffffffff80903f3b at ffs_unmount+0x7b
#7 0xffffffff806a3401 at dounmount+0x5c1
#8 0xffffffff806a2dbf at sys_unmount+0x30f
#9 0xffffffff8096fd42 at amd64_syscall+0x4c2
#10 0xffffffff80952fcb at Xfast_syscall+0xfb
Link state changed to up
igb1: link state changed to UP
igb1.100: link state changed to UP
igb1.2: link state changed to UP
igb1.66: link state changed to UP
igb1.111: link state changed to UP
igb1.10: link state changed to UP
Link state changed to up
igb0: link state changed to UP
tun0: link state changed to UP
igb0: link state changed to DOWN
link state changed to down
Bump sched buckets to 64 (was 0)
Link state changed to up
Kernel page fault with the following non-sleepable locks held:
shared rw bpf interface lock (bpf interface lock) r = 0 (0xfffff80002ff4028)
locked
@ /pool/sources/CURRENT/src/sys/net/bpf.c:2206 shared rw udpinp (udpinp) r = 0
(0xfffff800127f5c98) locked @
/pool/sources/CURRENT/src/sys/netinet/udp_usrreq.c:1140
stack backtrace: #0 0xffffffff80641960 at witness_debugger+0x70
#1 0xffffffff80642d8e at witness_warn+0x45e
#2 0xffffffff8096f563 at trap_pfault+0x53
#3 0xffffffff8096ed5e at trap+0x24e
#4 0xffffffff80952ce3 at calltrap+0x8
#5 0xffffffff806fc253 at iflib_txq_drain+0x1383
#6 0xffffffff806feda0 at drain_ring_lockless+0xc0
#7 0xffffffff806feb6e at ifmp_ring_enqueue+0x32e
#8 0xffffffff806fda90 at iflib_if_transmit+0xb0
#9 0xffffffff806dfb00 at ether_output+0x730
#10 0xffffffff80761ae6 at arprequest+0x426
#11 0xffffffff80761f41 at arpresolve_full+0x3d1
#12 0xffffffff807621ac at arpresolve+0x10c
#13 0xffffffff806df8b1 at ether_output+0x4e1
#14 0xffffffff80785c36 at ip_output+0x14e6
#15 0xffffffff8080ddd1 at udp_send+0xab1
#16 0xffffffff80676c44 at sosend_dgram+0x3e4
#17 0xffffffff8067d3a9 at kern_sendit+0x229


Fatal trap 12: page fault while in kernel mode
cpuid = 2; apic id = 02
fault virtual address   = 0xfffff8001282fb00
fault code              = supervisor read instruction, protection violation
instruction pointer     = 0x20:0xfffff8001282fb00
stack pointer           = 0x28:0xfffffe012d2aef48
frame pointer           = 0x28:0xfffffe012d2aefb0
code segment            = base 0x0, limit 0xfffff, type 0x1b
                        = DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags        = interrupt enabled, resume, IOPL = 0
current process         = 941 (syslogd)
[ thread pid 941 tid 100084 ]
Stopped at      0xfffff8001282fb00
db> bt
Tracing pid 941 tid 100084 td 0xfffff80004520000
??() at 0xfffff8001282fb00
bpf_mtap() at bpf_mtap+0x1ab/frame 0xfffffe012d2aefb0
iflib_txq_drain() at iflib_txq_drain+0x1383/frame 0xfffffe012d2af130
drain_ring_lockless() at drain_ring_lockless+0xc0/frame 0xfffffe012d2af190
ifmp_ring_enqueue() at ifmp_ring_enqueue+0x32e/frame 0xfffffe012d2af200
iflib_if_transmit() at iflib_if_transmit+0xb0/frame 0xfffffe012d2af240
ether_output() at ether_output+0x730/frame 0xfffffe012d2af2e0
arprequest() at arprequest+0x426/frame 0xfffffe012d2af3e0
arpresolve_full() at arpresolve_full+0x3d1/frame 0xfffffe012d2af460
arpresolve() at arpresolve+0x10c/frame 0xfffffe012d2af4d0
ether_output() at ether_output+0x4e1/frame 0xfffffe012d2af570
ip_output() at ip_output+0x14e6/frame 0xfffffe012d2af6b0
udp_send() at udp_send+0xab1/frame 0xfffffe012d2af780
sosend_dgram() at sosend_dgram+0x3e4/frame 0xfffffe012d2af7f0
kern_sendit() at kern_sendit+0x229/frame 0xfffffe012d2af890
sendit() at sendit+0x1a7/frame 0xfffffe012d2af8e0
sys_sendto() at sys_sendto+0x4d/frame 0xfffffe012d2af930
amd64_syscall() at amd64_syscall+0x4c2/frame 0xfffffe012d2afab0
Xfast_syscall() at Xfast_syscall+0xfb/frame 0xfffffe012d2afab0
syscall (133, FreeBSD ELF64, sys_sendto), rip = 0x800b8a5fa, rsp =
0x7fffffffd6b8,
rbp = 0x7fffffffdcc0 ---

-- 
You are receiving this mail because:
You are the assignee for the bug.


Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-218663-8>