From nobody Tue Oct 19 01:34:17 2021 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 0D94B17F1CA2 for ; Tue, 19 Oct 2021 01:34:18 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4HYGVx59Hkz4dK9 for ; Tue, 19 Oct 2021 01:34:17 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 907D6342D for ; Tue, 19 Oct 2021 01:34:17 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 19J1YHWt029935 for ; Tue, 19 Oct 2021 01:34:17 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 19J1YHaV029934 for bugs@FreeBSD.org; Tue, 19 Oct 2021 01:34:17 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 259218] Fatal trap 12: page fault while in kernel mode Date: Tue, 19 Oct 2021 01:34:17 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: dclarke@blastwave.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D259218 --- Comment #9 from Dennis Clarke --- Finally I can follow up here.=20 The kernel ( and buildworld ) were done with another machine and then I was able to move the hard disk back to the troublesome VIA Eden Esther motherboard. After letting the machine boot : esther#=20 esther# uname -apKU FreeBSD esther 14.0-CURRENT FreeBSD 14.0-CURRENT #0 main-n250102-d95c0a12a2= d: Mon Oct 18 05:58:15 GMT 2021=20=20=20=20 root@esther:/usr/obj/usr/src/i386.i386/sys/GENERIC i386 i386 1400038 14000= 38 esther#=20 I left it to sit idle for a good long while and of course we caught a panic and even a coredump. esther#=20 esther# ls -lap /var/crash/ total 109816 drwxr-x--- 2 root wheel 512 Oct 18 18:24 ./ drwxr-xr-x 24 root wheel 512 Oct 18 19:20 ../ -rw-r--r-- 1 root wheel 2 Oct 18 18:24 bounds -rw-r--r-- 1 root wheel 84 Oct 18 18:24 core.txt.0 -rw------- 1 root wheel 516 Oct 18 18:24 info.0 lrwxr-xr-x 1 root wheel 6 Oct 18 18:24 info.last -> info.0 -rw-r--r-- 1 root wheel 5 Oct 7 21:44 minfree -rw------- 1 root wheel 121741312 Oct 18 18:24 vmcore.0 lrwxr-xr-x 1 root wheel 8 Oct 18 18:24 vmcore.last -> vmcore.0 esther#=20 Regardless lets get what you asked for :=20 esther# cd esther# setenv TERM 'dumb' esther# gdb -q /usr/obj/usr/src/i386.i386/sys/GENERIC/kernel.full=20 Reading symbols from /usr/obj/usr/src/i386.i386/sys/GENERIC/kernel.full... (gdb) list *random_nehemiah_read+0x60 0x1404240 is in random_nehemiah_read (/usr/src/sys/dev/random/nehemiah.c:69= ). 64 { 65 uint32_t retval =3D 0; 66 uint32_t rate =3D 0; 67=20=20=20=20=20=20 68 #ifdef __GNUCLIKE_ASM 69 __asm __volatile( 70 "movl $0,%%edx\n\t" 71 "xstore" 72 : "=3Da" (retval), "+d" (rate), "+D" (buf) 73 : (gdb)=20 for the sake of looking at more lines :=20 (gdb) list - 54 .rs_source =3D RANDOM_PURE_NEHEMIAH, 55 .rs_read =3D random_nehemiah_read 56 }; 57=20=20=20=20=20=20 58 static struct fpu_kern_ctx *fpu_ctx_save; 59=20=20=20=20=20=20 60 /* This H/W source never stores more than 8 bytes in one go */ 61 /* ARGSUSED */ 62 static __inline size_t 63 VIA_RNG_store(void *buf) (gdb) list 64 { 65 uint32_t retval =3D 0; 66 uint32_t rate =3D 0; 67=20=20=20=20=20=20 68 #ifdef __GNUCLIKE_ASM 69 __asm __volatile( 70 "movl $0,%%edx\n\t" 71 "xstore" 72 : "=3Da" (retval), "+d" (rate), "+D" (buf) 73 : (gdb) list 74 : "memory" 75 ); 76 #endif 77 if (rate =3D=3D 0) 78 return (retval&0x1f); 79 return (0); 80 } 81=20=20=20=20=20=20 82 static void 83 random_nehemiah_init(void) (gdb) quit esther#=20 Hope this helps however I can xz compress that coredump and=20 upload it however I worry that a coredump will contain security data such as a root password. --=20 You are receiving this mail because: You are the assignee for the bug.=