Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 10 Jun 2024 18:16:52 +0000
From:      bugzilla-noreply@freebsd.org
To:        bugs@FreeBSD.org
Subject:   [Bug 279650] Linux module crash
Message-ID:  <bug-279650-227@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D279650

            Bug ID: 279650
           Summary: Linux module crash
           Product: Base System
           Version: 15.0-CURRENT
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: kern
          Assignee: bugs@FreeBSD.org
          Reporter: rbranco@suse.com

To reproduce:

https://download.freebsd.org/snapshots/VM-IMAGES/15.0-CURRENT/amd64/2024060=
6/FreeBSD-15.0-CURRENT-amd64-zfs-20240606-9c5d7e4a0c02-270625.qcow2.xz

echo linux_enable=3DYES >> /etc/rc.conf
service linux start

---


Fatal trap 12: page fault while in kernel mode
cpuid =3D 0; apic id =3D 00
fault virtual address   =3D 0xffffffff830808bf
fault code              =3D supervisor write data, protection violation
instruction pointer     =3D 0x20:0xffffffff83077701
stack pointer           =3D 0x28:0xfffffe0104bcba00
frame pointer           =3D 0x28:0xfffffe0104bcba40
code segment            =3D base 0x0, limit 0xfffff, type 0x1b
                        =3D DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags        =3D interrupt enabled, resume, IOPL =3D 0
current process         =3D 116 (kldload)
rdi: ffffffff830808b8 rsi: 00000000000000c0 rdx: 0000000000000100
rcx: ffffffff83081950  r8: ffffffff83081978  r9: 0000000000000000
rax: 00000000000001d0 rbx: fffff8001354c480 rbp: fffffe0104bcba40
r10: 0000000000010000 r11: 0000000000000001 r12: ffffffff83080b90
r13: fffff800135711e0 r14: fffff800032df480 r15: ffffffff830886d0
trap number             =3D 12
panic: page fault
cpuid =3D 0
time =3D 1718042175
KDB: stack backtrace:
db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe0104bcb=
6d0
vpanic() at vpanic+0x13f/frame 0xfffffe0104bcb800
panic() at panic+0x43/frame 0xfffffe0104bcb860
trap_fatal() at trap_fatal+0x40b/frame 0xfffffe0104bcb8c0
trap_pfault() at trap_pfault+0xa0/frame 0xfffffe0104bcb930
calltrap() at calltrap+0x8/frame 0xfffffe0104bcb930
--- trap 0xc, rip =3D 0xffffffff83077701, rsp =3D 0xfffffe0104bcba00, rbp =
=3D
0xfffffe0104bcba40 ---
elf64_linux_vdso_fixup() at elf64_linux_vdso_fixup+0xf1/frame
0xfffffe0104bcba40
linux_vdso_install() at linux_vdso_install+0x5f/frame 0xfffffe0104bcba80
linker_load_module() at linker_load_module+0xc23/frame 0xfffffe0104bcbd80
kern_kldload() at kern_kldload+0x16e/frame 0xfffffe0104bcbdd0
sys_kldload() at sys_kldload+0x5c/frame 0xfffffe0104bcbe00
amd64_syscall() at amd64_syscall+0x158/frame 0xfffffe0104bcbf30
fast_syscall_common() at fast_syscall_common+0xf8/frame 0xfffffe0104bcbf30
--- syscall (304, FreeBSD ELF64, kldload), rip =3D 0x17c6d1d37da, rsp =3D
0x17c6bca0038, rbp =3D 0x17c6bca05b0 ---
KDB: enter: panic

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-279650-227>