From owner-freebsd-questions@freebsd.org Fri Dec 6 16:39:46 2019 Return-Path: Delivered-To: freebsd-questions@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id AD18B1CFE1B for ; Fri, 6 Dec 2019 16:39:46 +0000 (UTC) (envelope-from chris@cretaforce.gr) Received: from relay4.cretaforce.gr (relay4.cretaforce.gr [195.201.253.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.cretaforce.gr", Issuer "RapidSSL RSA CA 2018" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 47Tywx3CGnz4bg1 for ; Fri, 6 Dec 2019 16:39:44 +0000 (UTC) (envelope-from chris@cretaforce.gr) Received: from server1.cretaforce.gr (server1.cretaforce.gr [138.201.248.69]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.cretaforce.gr", Issuer "RapidSSL RSA CA 2018" (verified OK)) by smtp2.cretaforce.gr (Postfix) with ESMTPS id D7BE71F4CB for ; Fri, 6 Dec 2019 18:39:42 +0200 (EET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cretaforce.gr; s=cretaforce; t=1575650382; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=k6qTbtE9XRBaP3FldUtx096WmAMqS4pHMs1T2LPKl0U=; b=d2g4gPJnyhWzaSfFH4F0qt8OW/kPYMESpYcZS/AsY7C5txWRl1GU/DVSLW7pZgcH87bDPS ULW2uRMNO4fxblO0LQ43kjWt0PViIzUDqe+QLtINEniCq6qPMfEpcmAnIQOgH7qo3QuKIu yB6BIJCNngv5j4WgxtB7VZRV5yPjOI8= Received: from christoss-air.fritz.box (ppp-94-64-150-254.home.otenet.gr [94.64.150.254]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) (Authenticated sender: chris@cretaforce.gr) by server1.cretaforce.gr (Postfix) with ESMTPSA id AA7CF27362 for ; Fri, 6 Dec 2019 18:39:42 +0200 (EET) From: Christos Chatzaras Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3601.0.10\)) Subject: kernel panic Message-Id: <6014CAB6-4827-4D6D-B5DD-A9E901047F69@cretaforce.gr> Date: Fri, 6 Dec 2019 18:39:41 +0200 To: FreeBSD Mailing List X-Mailer: Apple Mail (2.3601.0.10) X-Rspamd-Queue-Id: 47Tywx3CGnz4bg1 X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org; dkim=pass header.d=cretaforce.gr header.s=cretaforce header.b=d2g4gPJn; dmarc=none; spf=pass (mx1.freebsd.org: domain of chris@cretaforce.gr designates 195.201.253.147 as permitted sender) smtp.mailfrom=chris@cretaforce.gr X-Spamd-Result: default: False [-6.05 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[cretaforce.gr:s=cretaforce]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:195.201.253.147]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-questions@freebsd.org]; DMARC_NA(0.00)[cretaforce.gr]; RCPT_COUNT_ONE(0.00)[1]; DWL_DNSWL_LOW(-1.00)[cretaforce.gr.dwl.dnswl.org : 127.0.5.1]; RCVD_COUNT_THREE(0.00)[3]; IP_SCORE(-2.95)[ip: (-9.60), ipnet: 195.201.0.0/16(-3.54), asn: 24940(-1.58), country: DE(-0.01)]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[cretaforce.gr:+]; MV_CASE(0.50)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; RCVD_IN_DNSWL_LOW(-0.10)[147.253.201.195.list.dnswl.org : 127.0.5.1]; RECEIVED_SPAMHAUS_PBL(0.00)[254.150.64.94.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.10]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:24940, ipnet:195.201.0.0/16, country:DE]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_TLS_ALL(0.00)[]; FROM_EQ_ENVFROM(0.00)[] X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 06 Dec 2019 16:39:46 -0000 Today and yesterday I had a server crash. The server runs FreeBSD 12.1 = without the last "FreeBSD-SA-19:25.mcepsc" patch. Today I got this: Dec 6 18:27:18 server36.example.com kernel: Fatal trap 12: page fault = while in kernel mode Dec 6 18:27:18 server36.example.com kernel: cpuid =3D 3; apic id =3D 03 Dec 6 18:27:18 server36.example.com kernel: fault virtual address#011=3D = 0xffffffff82fb8f38 Dec 6 18:27:18 server36.example.com kernel: fault code#011#011=3D = supervisor read data, page not present Dec 6 18:27:18 server36.example.com kernel: instruction pointer#011=3D = 0x20:0xffffffff810954b6 Dec 6 18:27:18 server36.example.com kernel: stack pointer#011 =3D = 0x0:0xfffffe00c3c9f600 Dec 6 18:27:18 server36.example.com kernel: frame pointer#011 =3D = 0x0:0xfffffe00c3c9f6b0 Dec 6 18:27:18 server36.example.com kernel: code segment#011#011=3D = base 0x0, limit 0xfffff, type 0x1b Dec 6 18:27:18 server36.example.com kernel: #011#011#011=3D DPL 0, pres = 1, long 1, def32 0, gran 1 Dec 6 18:27:18 server36.example.com kernel: processor eflags#011=3D = interrupt enabled, resume, IOPL =3D 0 Dec 6 18:27:18 server36.example.com kernel: current process#011#011=3D = 86140 (nginx) Dec 6 18:27:18 server36.example.com kernel: trap number#011#011=3D 12 Dec 6 18:27:18 server36.example.com kernel: panic: page fault Dec 6 18:27:18 server36.example.com kernel: cpuid =3D 3 Dec 6 18:27:18 server36.example.com kernel: time =3D 1575649514 Dec 6 18:27:18 server36.example.com kernel: KDB: stack backtrace: Dec 6 18:27:18 server36.example.com kernel: #0 0xffffffff80c1d207 at = kdb_backtrace+0x67 Dec 6 18:27:18 server36.example.com kernel: #1 0xffffffff80bd053d at = vpanic+0x19d Dec 6 18:27:18 server36.example.com kernel: #2 0xffffffff80bd0393 at = panic+0x43 Dec 6 18:27:18 server36.example.com kernel: #3 0xffffffff810a7d2c at = trap_fatal+0x39c Dec 6 18:27:18 server36.example.com kernel: #4 0xffffffff810a7d79 at = trap_pfault+0x49 Dec 6 18:27:18 server36.example.com kernel: #5 0xffffffff810a736f at = trap+0x29f Dec 6 18:27:18 server36.example.com kernel: #6 0xffffffff8108132c at = calltrap+0x8 Dec 6 18:27:18 server36.example.com kernel: #7 0xffffffff80f0c340 at = vm_fault_hold+0x1b90 Dec 6 18:27:18 server36.example.com kernel: #8 0xffffffff80f0a760 at = vm_fault+0x60 Dec 6 18:27:18 server36.example.com kernel: #9 0xffffffff810a7e94 at = trap_pfault+0x164 Dec 6 18:27:18 server36.example.com kernel: #10 0xffffffff810a74fb at = trap+0x42b Dec 6 18:27:18 server36.example.com kernel: #11 0xffffffff8108132c at = calltrap+0x8 Do you think it's hardware related?