From owner-freebsd-bugs@freebsd.org Fri Apr 14 16:56:09 2017 Return-Path: Delivered-To: freebsd-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 72D08D3EAFE for ; Fri, 14 Apr 2017 16:56:09 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 62460BC0 for ; Fri, 14 Apr 2017 16:56:09 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id v3EGu9PQ056479 for ; Fri, 14 Apr 2017 16:56:09 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-bugs@FreeBSD.org Subject: [Bug 218663] atal trap 12: APU2C4: CURRENT (r316857): Fatal trap 12: page fault while in kernel mode (syslogd) Date: Fri, 14 Apr 2017 16:56:09 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: ohartmann@walstatt.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 14 Apr 2017 16:56:09 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D218663 Bug ID: 218663 Summary: atal trap 12: APU2C4: CURRENT (r316857): Fatal trap 12: page fault while in kernel mode (syslogd) Product: Base System Version: CURRENT Hardware: amd64 OS: Any Status: New Severity: Affects Some People Priority: --- Component: kern Assignee: freebsd-bugs@FreeBSD.org Reporter: ohartmann@walstatt.org CURRENT as of r316857, fails to boot kernel on PCengines APU 2C4 with the e= rror shown below. r316717 runs fine (exact same ports, exact same config). It seems the kernel to be the culprit, I can easily swap the kernel rr316857 with its according userland (also r316857) with the kernel r316717 and everything is fine. [...] Steering write from 0 kBps to 300000 kBps WARNING: WITNESS option enabled, expect reduced performance. Trying to mount root from ufs:/dev/ufs/dsks1a [ro]... uhub1: 4 ports with 4 removable, self powered uhub0: 2 ports with 2 removable, self powered ugen1.2: at usbus1 uhub2 on uhub0 uhub2: on usbus1 uhub2: 4 ports with 4 removable, self powered lock order reversal: 1st 0xfffffe00f7039010 bufwait (bufwait) @ /pool/sources/CURRENT/src/sys/kern/vfs_bio.c:3499 2nd 0xfffff80003177800 dirhash (dirhash) @ /pool/sources/CURRENT/src/sys/ufs/ufs/ufs_dirhash.c:281 stack backtrace: #0 0xffffffff80641960 at witness_debugger+0x70 #1 0xffffffff80641853 at witness_checkorder+0xe23 #2 0xffffffff805e7e5a at _sx_xlock+0x5a #3 0xffffffff8090b09d at ufsdirhash_add+0x3d #4 0xffffffff8090de01 at ufs_direnter+0x491 #5 0xffffffff80916f5e at ufs_makeinode+0x61e #6 0xffffffff80912c94 at ufs_create+0x34 #7 0xffffffff809d88d0 at VOP_CREATE_APV+0xd0 #8 0xffffffff806b9cc8 at vn_open_cred+0x2a8 #9 0xffffffff806b31ce at kern_openat+0x1fe #10 0xffffffff8096fd42 at amd64_syscall+0x4c2 #11 0xffffffff80952fcb at Xfast_syscall+0xfb lock order reversal: 1st 0xfffff8000453db78 ufs (ufs) @ /pool/sources/CURRENT/src/sys/kern/vfs_mount.c:1277 2nd 0xfffff8000453d7c8 devfs (devfs) @ /pool/sources/CURRENT/src/sys/ufs/ffs/ffs_vfsops.c:1405 stack backtrace: #0 0xffffffff80641960 at witness_debugger+0x70 #1 0xffffffff80641853 at witness_checkorder+0xe23 #2 0xffffffff805b7bde at lockmgr_lock_fast_path+0x1ce #3 0xffffffff809da896 at VOP_LOCK1_APV+0xd6 #4 0xffffffff806ba3da at _vn_lock+0x6a #5 0xffffffff80901923 at ffs_flushfiles+0x93 #6 0xffffffff80903f3b at ffs_unmount+0x7b #7 0xffffffff806a3401 at dounmount+0x5c1 #8 0xffffffff806a2dbf at sys_unmount+0x30f #9 0xffffffff8096fd42 at amd64_syscall+0x4c2 #10 0xffffffff80952fcb at Xfast_syscall+0xfb Link state changed to up igb1: link state changed to UP igb1.100: link state changed to UP igb1.2: link state changed to UP igb1.66: link state changed to UP igb1.111: link state changed to UP igb1.10: link state changed to UP Link state changed to up igb0: link state changed to UP tun0: link state changed to UP igb0: link state changed to DOWN link state changed to down Bump sched buckets to 64 (was 0) Link state changed to up Kernel page fault with the following non-sleepable locks held: shared rw bpf interface lock (bpf interface lock) r =3D 0 (0xfffff80002ff40= 28) locked @ /pool/sources/CURRENT/src/sys/net/bpf.c:2206 shared rw udpinp (udpinp) r = =3D 0 (0xfffff800127f5c98) locked @ /pool/sources/CURRENT/src/sys/netinet/udp_usrreq.c:1140 stack backtrace: #0 0xffffffff80641960 at witness_debugger+0x70 #1 0xffffffff80642d8e at witness_warn+0x45e #2 0xffffffff8096f563 at trap_pfault+0x53 #3 0xffffffff8096ed5e at trap+0x24e #4 0xffffffff80952ce3 at calltrap+0x8 #5 0xffffffff806fc253 at iflib_txq_drain+0x1383 #6 0xffffffff806feda0 at drain_ring_lockless+0xc0 #7 0xffffffff806feb6e at ifmp_ring_enqueue+0x32e #8 0xffffffff806fda90 at iflib_if_transmit+0xb0 #9 0xffffffff806dfb00 at ether_output+0x730 #10 0xffffffff80761ae6 at arprequest+0x426 #11 0xffffffff80761f41 at arpresolve_full+0x3d1 #12 0xffffffff807621ac at arpresolve+0x10c #13 0xffffffff806df8b1 at ether_output+0x4e1 #14 0xffffffff80785c36 at ip_output+0x14e6 #15 0xffffffff8080ddd1 at udp_send+0xab1 #16 0xffffffff80676c44 at sosend_dgram+0x3e4 #17 0xffffffff8067d3a9 at kern_sendit+0x229 Fatal trap 12: page fault while in kernel mode cpuid =3D 2; apic id =3D 02 fault virtual address =3D 0xfffff8001282fb00 fault code =3D supervisor read instruction, protection violati= on instruction pointer =3D 0x20:0xfffff8001282fb00 stack pointer =3D 0x28:0xfffffe012d2aef48 frame pointer =3D 0x28:0xfffffe012d2aefb0 code segment =3D base 0x0, limit 0xfffff, type 0x1b =3D DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags =3D interrupt enabled, resume, IOPL =3D 0 current process =3D 941 (syslogd) [ thread pid 941 tid 100084 ] Stopped at 0xfffff8001282fb00 db> bt Tracing pid 941 tid 100084 td 0xfffff80004520000 ??() at 0xfffff8001282fb00 bpf_mtap() at bpf_mtap+0x1ab/frame 0xfffffe012d2aefb0 iflib_txq_drain() at iflib_txq_drain+0x1383/frame 0xfffffe012d2af130 drain_ring_lockless() at drain_ring_lockless+0xc0/frame 0xfffffe012d2af190 ifmp_ring_enqueue() at ifmp_ring_enqueue+0x32e/frame 0xfffffe012d2af200 iflib_if_transmit() at iflib_if_transmit+0xb0/frame 0xfffffe012d2af240 ether_output() at ether_output+0x730/frame 0xfffffe012d2af2e0 arprequest() at arprequest+0x426/frame 0xfffffe012d2af3e0 arpresolve_full() at arpresolve_full+0x3d1/frame 0xfffffe012d2af460 arpresolve() at arpresolve+0x10c/frame 0xfffffe012d2af4d0 ether_output() at ether_output+0x4e1/frame 0xfffffe012d2af570 ip_output() at ip_output+0x14e6/frame 0xfffffe012d2af6b0 udp_send() at udp_send+0xab1/frame 0xfffffe012d2af780 sosend_dgram() at sosend_dgram+0x3e4/frame 0xfffffe012d2af7f0 kern_sendit() at kern_sendit+0x229/frame 0xfffffe012d2af890 sendit() at sendit+0x1a7/frame 0xfffffe012d2af8e0 sys_sendto() at sys_sendto+0x4d/frame 0xfffffe012d2af930 amd64_syscall() at amd64_syscall+0x4c2/frame 0xfffffe012d2afab0 Xfast_syscall() at Xfast_syscall+0xfb/frame 0xfffffe012d2afab0 syscall (133, FreeBSD ELF64, sys_sendto), rip =3D 0x800b8a5fa, rsp =3D 0x7fffffffd6b8, rbp =3D 0x7fffffffdcc0 --- --=20 You are receiving this mail because: You are the assignee for the bug.=