From nobody Fri Nov 3 03:05:21 2023 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SM5GB2XSFz4yXHW for ; Fri, 3 Nov 2023 03:05:22 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4SM5GB1N0Sz4Kst for ; Fri, 3 Nov 2023 03:05:22 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1698980722; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=cUufbx8ffmVrmSuL3ZoNVZ+RwvL8Qi+O+aYDXmtPybE=; b=w2hR9b3/f7571J+wLY/snoNShjvEu6Jjkzvoc+iVZyji3HNGoO3YDtrvLyC9J2766k/LMg OPBo91feAvpoc80FZ1g7JAWKHxjFT7oFcAa7bMOgdtrqIU3Bp9yNa1aUJpzOiPLlqeOJzX zOTC4QGpOuX5sFDaOT0IufMGYKij1MYn+GMAjuQNyVHrZEfbN+p2zPI+ZyCaNAHEO3/L4z zIHXIslErq0C1iu9IUGptjg6my5YcZbvkrTFTT6aAux/gJeFvwkA0p2eA0zak/0S0gCGVi xRrbRACuLhLcjleTqbRkjor+63hZpvyODJFWYPo1PIVqN1O28w3ERPt+wEKCkA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1698980722; a=rsa-sha256; cv=none; b=oOYKrm5U8ndYNSCRCXCvAMJsfDFbGowLLJwHQnWZokXo4ZRDJ+COqq4SQe9rkFUDtlDVsO g7rQDY+UY44rtgfXr9t1QNumcjD9X/Wp6ZGowYNoEjEp/tN9sg6eX68RJ3gjOmbYdEw5fB iJSvubUL7XE2pxusizGpuV4ddZMj6D25oZLm0pp6W066MaM/a69PSgFk1ejJzDnoMzxiSK p6JhPEyxO/58zVALGvQxIwcSjmX3NwwlmGgoCs0i0YK/nMfzVbTQbhgufvAeHrajU7F08K 1kQ08/VonfR8Ngn6jxHNQ34JhBfXUf5Rq4cu+9c40Tad1ZeTwcY+a7O2x09W5g== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4SM5GB0Q6SzwG6 for ; Fri, 3 Nov 2023 03:05:22 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 3A335M0W072855 for ; Fri, 3 Nov 2023 03:05:22 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 3A335MMR072854 for bugs@FreeBSD.org; Fri, 3 Nov 2023 03:05:22 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 274375] page fault while load kernel module virtio Date: Fri, 03 Nov 2023 03:05:21 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 15.0-CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: zlei@FreeBSD.org X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D274375 --- Comment #3 from Zhenlei Huang --- ** UPDATE ** With 14.0-RC3 I am able to get the line number of sdt.ko. Fatal trap 12: page fault while in kernel mode cpuid =3D 2; apic id =3D 04 fault virtual address =3D 0x0 fault code =3D supervisor read data, page not present instruction pointer =3D 0x20:0xffffffff82e3a134 stack pointer =3D 0x28:0xfffffe00b0540920 frame pointer =3D 0x28:0xfffffe00b0540950 code segment =3D base 0x0, limit 0xfffff, type 0x1b =3D DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags =3D interrupt enabled, resume, IOPL =3D 0 current process =3D 29038 (kldload) rdi: fffff8002ce880e0 rsi: fffffe00b0540928 rdx: 0000000000000000 rcx: ffffffff82e9d470 r8: 0000000000000004 r9: 00000000000000f3 rax: 0000000000000000 rbx: fffffe00b0540974 rbp: fffffe00b0540950 r10: 0000000000000002 r11: ffffffffffffff90 r12: fffff8000a0d8000 r13: fffffe00b0540974 r14: fffff8000a1e5c40 r15: ffffffff82e9d468 trap number =3D 12 panic: page fault cpuid =3D 2 time =3D 1698979988 KDB: stack backtrace: #0 0xffffffff80b9002d at kdb_backtrace+0x5d #1 0xffffffff80b43132 at vpanic+0x132 #2 0xffffffff80b42ff3 at panic+0x43 #3 0xffffffff8100c85c at trap_fatal+0x40c #4 0xffffffff8100c8af at trap_pfault+0x4f #5 0xffffffff80fe3818 at calltrap+0x8 #6 0xffffffff80b0f73c at linker_file_unload+0xcc #7 0xffffffff810bfa78 at link_elf_load_file+0x198 #8 0xffffffff80b0efb3 at linker_load_module+0x9e3 #9 0xffffffff80b10cba at kern_kldload+0x16a #10 0xffffffff80b10ddc at sys_kldload+0x5c #11 0xffffffff8100d119 at amd64_syscall+0x109 #12 0xffffffff80fe412b at fast_syscall_common+0xf8 Uptime: 1m14s Dumping 452 out of 8100 MB:..4%..11%..22%..32%..43%..54%..61%..71%..82%..92% (kgdb) #0 __curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:57 #1 doadump (textdump=3D) at /usr/src/sys/kern/kern_shutdown.c:405 #2 0xffffffff80b42cc7 in kern_reboot (howto=3D260) at /usr/src/sys/kern/kern_shutdown.c:526 #3 0xffffffff80b4319f in vpanic (fmt=3D0xffffffff81136b3b "%s",=20 ap=3Dap@entry=3D0xfffffe00b0540770) at /usr/src/sys/kern/kern_shutdown.= c:970 #4 0xffffffff80b42ff3 in panic (fmt=3D) at /usr/src/sys/kern/kern_shutdown.c:894 #5 0xffffffff8100c85c in trap_fatal (frame=3D0xfffffe00b0540860, eva=3D0) at /usr/src/sys/amd64/amd64/trap.c:952 #6 0xffffffff8100c8af in trap_pfault (frame=3D0xfffffe00b0540860,=20 usermode=3Dfalse, signo=3D, ucode=3D) at /usr/src/sys/amd64/amd64/trap.c:760 #7 #8 0xffffffff82e3a134 in sdt_kld_unload_try (arg=3D,=20 lf=3D, error=3D0xfffffe00b0540974) at /usr/src/sys/cddl/dev/sdt/sdt.c:343 #9 0xffffffff80b0f73c in linker_file_unload ( file=3Dfile@entry=3D0xfffff8003d292180, flags=3Dflags@entry=3D1) at /usr/src/sys/kern/kern_linker.c:673 #10 0xffffffff810bfa78 in link_elf_load_file (cls=3D,=20 filename=3D, result=3D) at /usr/src/sys/kern/link_elf_obj.c:1241 #11 0xffffffff80b0efb3 in LINKER_LOAD_FILE ( cls=3D0xffffffff817560a8 , result=3D0xfffffe00b0540c00,= =20 filename=3D) at ./linker_if.h:214 #12 linker_load_file (filename=3D, result=3D) at /usr/src/sys/kern/kern_linker.c:459 #13 linker_load_module (kldname=3Dkldname@entry=3D0xfffff8000a0c3800 "virti= o.ko",=20 modname=3Dmodname@entry=3D0x0, parent=3Dparent@entry=3D0x0,=20 verinfo=3Dverinfo@entry=3D0x0, lfpp=3Dlfpp@entry=3D0xfffffe00b0540d90) at /usr/src/sys/kern/kern_linker.c:2203 #14 0xffffffff80b10cba in kern_kldload (td=3Dtd@entry=3D0xfffffe00b1522720,= =20 file=3Dfile@entry=3D0xfffff8000a0c3800 "virtio.ko",=20 fileid=3Dfileid@entry=3D0xfffffe00b0540de4) at /usr/src/sys/kern/kern_linker.c:1162 #15 0xffffffff80b10ddc in sys_kldload (td=3D0xfffffe00b1522720,=20 uap=3D) at /usr/src/sys/kern/kern_linker.c:1185 #16 0xffffffff8100d119 in syscallenter (td=3D0xfffffe00b1522720) at /usr/src/sys/amd64/amd64/../../kern/subr_syscall.c:187 #17 amd64_syscall (td=3D0xfffffe00b1522720, traced=3D0) at /usr/src/sys/amd64/amd64/trap.c:1197 #18 #19 0x00002ab829148b3a in ?? () Backtrace stopped: Cannot access memory at address 0x2ab8285939b8 (kgdb) --=20 You are receiving this mail because: You are the assignee for the bug.=