From owner-freebsd-bugs@freebsd.org Sat May 5 01:09:48 2018 Return-Path: Delivered-To: freebsd-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5C6C2FBEFA8 for ; Sat, 5 May 2018 01:09:48 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id E5BDB82EC9 for ; Sat, 5 May 2018 01:09:47 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id A6710FBEF9F; Sat, 5 May 2018 01:09:47 +0000 (UTC) Delivered-To: bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 7F74EFBEF9E for ; Sat, 5 May 2018 01:09:47 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 14A3B82EA4 for ; Sat, 5 May 2018 01:09:47 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 4C9BB18875 for ; Sat, 5 May 2018 01:09:46 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id w4519klk018968 for ; Sat, 5 May 2018 01:09:46 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id w4519kjI018967 for bugs@FreeBSD.org; Sat, 5 May 2018 01:09:46 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 227982] [511] panic: vm_fault_hold: fault on nofault entry, addr: 0xfffffe00ed517000 Date: Sat, 05 May 2018 01:09:46 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: eadler@FreeBSD.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 05 May 2018 01:09:48 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D227982 Bug ID: 227982 Summary: [511] panic: vm_fault_hold: fault on nofault entry, addr: 0xfffffe00ed517000 Product: Base System Version: CURRENT Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: eadler@FreeBSD.org local crash id: integrity_test:data how to repro: kyua test sys/geom/class/eli/integrity_test:data Unread portion of the kernel message buffer: [511] GEOM_ELI: md15.eli: Failed to authenticate 512 bytes of data at offset 15360. [511] GEOM_ELI: md15.eli: Failed to authenticate 512 bytes of data at offset 15872. [511] GEOM_ELI: md15.eli: Failed to authenticate 512 bytes of data at offset 15872. [511] panic: vm_fault_hold: fault on nofault entry, addr: 0xfffffe00ed517000 [511] cpuid =3D 16 [511] time =3D 1525477726 [511] KDB: stack backtrace: [511] db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe00ef939c90 [511] vpanic() at vpanic+0x1a3/frame 0xfffffe00ef939cf0 [511] panic() at panic+0x43/frame 0xfffffe00ef939d50 [511] vm_fault_hold() at vm_fault_hold+0x237d/frame 0xfffffe00ef939e80 [511] vm_fault() at vm_fault+0x75/frame 0xfffffe00ef939ec0 [511] trap_pfault() at trap_pfault+0x171/frame 0xfffffe00ef939f10 [511] trap() at trap+0x2ff/frame 0xfffffe00ef93a020 [511] calltrap() at calltrap+0x8/frame 0xfffffe00ef93a020 [511] --- trap 0xc, rip =3D 0xffffffff8451b169, rsp =3D 0xfffffe00ef93a0f0,= rbp =3D 0xfffffe00ef93a120 --- [511] ccp_collect_iv() at ccp_collect_iv+0x169/frame 0xfffffe00ef93a120 [511] ccp_do_blkcipher() at ccp_do_blkcipher+0xf3/frame 0xfffffe00ef93a1e0 [511] ccp_authenc() at ccp_authenc+0x63/frame 0xfffffe00ef93a230 [511] ccp_process() at ccp_process+0xa1c/frame 0xfffffe00ef93a8b0 [511] crypto_dispatch() at crypto_dispatch+0x1d0/frame 0xfffffe00ef93a8e0 [511] g_eli_auth_run() at g_eli_auth_run+0x531/frame 0xfffffe00ef93aa00 [511] g_eli_worker() at g_eli_worker+0x14c/frame 0xfffffe00ef93aa70 [511] fork_exit() at fork_exit+0x84/frame 0xfffffe00ef93aab0 [511] fork_trampoline() at fork_trampoline+0xe/frame 0xfffffe00ef93aab0 [511] --- trap 0, rip =3D 0, rsp =3D 0, rbp =3D 0 --- [511] KDB: enter: panic (kgdb) bt #0 __curthread () at ./machine/pcpu.h:231 #1 doadump (textdump=3D0x1) at /usr/src/sys/kern/kern_shutdown.c:365 #2 0xffffffff8043821c in db_fncall_generic (addr=3D, rv=3D, nargs=3D, args=3D) at /usr/src/sys/ddb/db_command.c:609 #3 db_fncall (dummy1=3D, dummy2=3D, dummy3=3D, dummy4=3D) at /usr/src/sys/ddb/db_command.c:657 #4 0xffffffff80437d59 in db_command (last_cmdp=3D, cmd_table=3D, dopager=3D) at /usr/src/sys/ddb/db_command.c:481 #5 0xffffffff80437ad4 in db_command_loop () at /usr/src/sys/ddb/db_command.c:534 #6 0xffffffff8043ad0f in db_trap (type=3D, code=3D) at /usr/src/sys/ddb/db_main.c:250 #7 0xffffffff80bb3913 in kdb_trap (type=3D0x3, code=3D0xffff0ff0, tf=3D) at /usr/src/sys/kern/subr_kdb.c:697 #8 0xffffffff81031c05 in trap (frame=3D0xfffffe00ef939bc0) at /usr/src/sys/amd64/amd64/trap.c:550 #9 #10 kdb_enter (why=3D0xffffffff812c2f0c "panic", msg=3D) at /usr/src/sys/kern/subr_kdb.c:479 #11 0xffffffff80b6dee0 in vpanic (fmt=3D, ap=3D0xfffffe00ef9= 39d30) at /usr/src/sys/kern/kern_shutdown.c:851 #12 0xffffffff80b6df73 in panic (fmt=3D0xffffffff81df03b8 "\213\214(\201\377\377\377\377") at /usr/src/sys/kern/kern_shutdown.c:789 #13 0xffffffff80e9882d in vm_fault_hold (map=3D0xfffff80003006000, vaddr=3D, fault_type=3D, fault_flags=3D, m_hold=3D0x0) at /usr/src/sys/vm/vm_fault.c:563 #14 0xffffffff80e96465 in vm_fault (map=3D0xfffff80003006000, vaddr=3D, fault_type=3D0x1, fault_flags=3D0x0) at /usr/src/sys/vm/vm_fault.c:514 #15 0xffffffff81032501 in trap_pfault (frame=3D0xfffffe00ef93a030, usermode=3D) at /usr/src/sys/amd64/amd64/trap.c:730 #16 0xffffffff81031bcf in trap (frame=3D0xfffffe00ef93a030) at /usr/src/sys/amd64/amd64/trap.c:413 #17 #18 ccp_byteswap (data=3D, len=3D) at /usr/src/sys/crypto/ccp/ccp_hardware.c:1320 #19 ccp_collect_iv (s=3D0xfffffe00ed5425c0, crp=3D0xfffff801e2f0cc40, crd=3D0xfffff801e2f0ccc0) at /usr/src/sys/crypto/ccp/ccp_hardware.c:1395 #20 0xffffffff84518e73 in ccp_do_blkcipher (qp=3D0xfffff800040e49c8, s=3D0xfffffe00ed5425c0, crp=3D, crd=3D0xfffff801e2f0ccc0, cctx=3D0xfffffe00ef93a1f0) at /usr/src/sys/crypto/ccp/ccp_hardware.c:1521 #21 0xffffffff8451a0e3 in ccp_authenc (qp=3D0xfffff800040e49c8, s=3D0xfffffe00ed5425c0, crp=3D0xfffff801e2f0cc40, crda=3D0xfffff801e2f0cd38, crde=3D0xfffff801e2f0ccc0) at /usr/src/sys/crypto/ccp/ccp_hardware.c:1738 #22 0xffffffff8451773c in ccp_process (dev=3D, crp=3D0xfffff801e2f0cc40, hint=3D) at /usr/src/sys/crypto/ccp/ccp.c:706 #23 0xffffffff80e046a0 in crypto_dispatch (crp=3D0xfffff801e2f0cc40) at /usr/src/sys/opencrypto/crypto.c:929 #24 0xffffffff845795e1 in g_eli_auth_run (wr=3D0xfffff80030a69f40, bp=3D) at /usr/src/sys/geom/eli/g_eli_integrity.c:536 #25 0xffffffff84574c8c in g_eli_worker (arg=3D) at /usr/src/sys/geom/eli/g_eli.c:542 #26 0xffffffff80b2dab4 in fork_exit (callout=3D0xffffffff84574b40 , arg=3D0xfffff80030a69f40, frame=3D0xfffffe00ef93aac0) at /usr/src/sys/kern/kern_fork.c:1039 #27 (kgdb) frame Stack level 18, frame at 0xfffffe00ef93a130: rip =3D 0xffffffff8451b169 in ccp_byteswap (/usr/src/sys/crypto/ccp/ccp_hardware.c:1320); saved rip =3D 0xffffffff8451= 8e73 inlined into frame 19, caller of frame at 0xfffffe00ef93a0f0 source language c. Arglist at unknown address. Locals at unknown address, Previous frame's sp at 0xfffffe00ef93a0e0 Saved registers: rax at 0xfffffe00ef93a060, rbx at 0xfffffe00ef93a068, rcx at 0xfffffe00ef93a048, rdx at 0xfffffe00ef93a040, rsi at 0xfffffe00ef93a038, r= di at 0xfffffe00ef93a030, rbp at 0xfffffe00ef93a070, r8 at 0xfffffe00ef93a050,= r9 at 0xfffffe00ef93a058, r10 at 0xfffffe00ef93a078, r11 at 0xfffffe00ef93a080, r12 at 0xfffffe00ef93a088, r13 at 0xfffffe00ef93a090, r14 at 0xfffffe00ef93a098, r15 at 0xfffffe00ef93a0a0, rip at 0xfffffe00ef93a0c8, eflags at 0xfffffe00ef93a0d8, cs at 0xfffffe00ef93a0d0, ss at 0xfffffe00ef93a0e8 data =3D len =3D i =3D 0x2a738 t =3D 0xde (kgdb) up #19 ccp_collect_iv (s=3D0xfffffe00ed5425c0, crp=3D0xfffff801e2f0cc40, crd=3D0xfffff801e2f0ccc0) at /usr/src/sys/crypto/ccp/ccp_hardware.c:1395 1395 ccp_byteswap(s->blkcipher.iv, s->blkcipher.iv_len); (kgdb) p *s $1 =3D { active =3D 0x0, cipher_first =3D 0x1, pending =3D 0xb594c446, mode =3D 99254362, queue =3D 0x8f1585f2, { hmac =3D { auth_hash =3D 0xb9d3aa07d61f1878, hash_len =3D 0x440efbde, partial_digest_len =3D 0x1e4e1d87, auth_mode =3D 0x10000000, mk_size =3D 0x10000000, ipad =3D "", opad =3D "\320<\342o\270\272Z\344", '\066' , "V)|\a\035\034@\364\272\070\274h\254\070\346\066?xU\366\315\002\350\v\304\2= 15\356\016\035p\317\253\314\233\004D\335\212\326\210\263\316\262\220\216K= =3Du}\276\267c\340\307\253\234" }, gmac =3D { hash_len =3D 0xd61f1878, final_block =3D "\a\252\323\271\336\373\016D\207\035N\036" } }, blkcipher =3D { cipher_mode =3D 0x58856ba, cipher_type =3D 0x8e30d0d2, key_len =3D 0x0, iv_len =3D 0x1000000, enckey =3D "", iv =3D "" } } (kgdb) p *crp $3 =3D { crp_next =3D { tqe_next =3D 0xdeadc0dedeadc0de, tqe_prev =3D 0xdeadc0dedeadc0de }, crp_task =3D { ta_link =3D { stqe_next =3D 0xdeadc0dedeadc0de }, ta_pending =3D 0xc0de, ta_priority =3D 0xdead, ta_func =3D 0xdeadc0dedeadc0de, ta_context =3D 0xdeadc0dedeadc0de }, crp_sid =3D 0x100000100000068, crp_ilen =3D 0x200, crp_olen =3D 0x1e0, crp_etype =3D 0x0, crp_flags =3D 0x40, { crp_buf =3D 0xfffff801e2f0c800 "", crp_mbuf =3D 0xfffff801e2f0c800, crp_uio =3D 0xfffff801e2f0c800 }, crp_opaque =3D 0xfffff80007b31000, crp_desc =3D 0xfffff801e2f0cd38, crp_callback =3D 0xffffffff84579ac0 , crp_tstamp =3D { sec =3D 0xdeadc0dedeadc0de, frac =3D 0xdeadc0dedeadc0de }, crp_seq =3D 0xdeadc0de, crp_retw_id =3D 0x8 } (kgdb) p *crd $4 =3D { crd_skip =3D 0x20, crd_len =3D 0x1e0, crd_inject =3D 0xdeadc0de, crd_flags =3D 0x16, CRD_INI =3D { cri_alg =3D 0xb, cri_klen =3D 0x80, cri_mlen =3D 0xdeadc0de, cri_key =3D 0xfffff801b3c90d00 "D\374\360:8\031M\272\320V-\372\326 \377\230\a:\366\342\341", cri_iv =3D "\263fi\277\022T\n", cri_next =3D 0xdeadc0dedeadc0de }, crd_next =3D 0x0 } (kgdb) fram Stack level 19, frame at 0xfffffe00ef93a130: rip =3D 0xffffffff8451b169 in ccp_collect_iv (/usr/src/sys/crypto/ccp/ccp_hardware.c:1395); saved rip =3D 0xffffffff8451= 8e73 called by frame at 0xfffffe00ef93a1f0, caller of frame at 0xfffffe00ef93a1= 30 source language c. Arglist at 0xfffffe00ef93a120, args: s=3D0xfffffe00ed5425c0, crp=3D0xfffff801e2f0cc40, crd=3D0xfffff801e2f0ccc0 Locals at 0xfffffe00ef93a120, Previous frame's sp is 0xfffffe00ef93a130 Saved registers: rbx at 0xfffffe00ef93a0f8, rbp at 0xfffffe00ef93a120, r12 at 0xfffffe00ef93a100, r13 at 0xfffffe00ef93a108, r14 at 0xfffffe00ef93a110, r= 15 at 0xfffffe00ef93a118, rip at 0xfffffe00ef93a128 s =3D 0xfffffe00ed5425c0 crp =3D 0xfffff801e2f0cc40 crd =3D 0xfffff801e2f0ccc0 No locals. --=20 You are receiving this mail because: You are the assignee for the bug.=