From nobody Tue Feb 1 19:13:32 2022 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 433E319831C1 for ; Tue, 1 Feb 2022 19:13:33 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4JpF2h4Hg8z4kr8 for ; Tue, 1 Feb 2022 19:13:32 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4AB5816812 for ; Tue, 1 Feb 2022 19:13:32 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 211JDWRN024382 for ; Tue, 1 Feb 2022 19:13:32 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from bugzilla@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 211JDWIU024381 for bugs@FreeBSD.org; Tue, 1 Feb 2022 19:13:32 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: bugzilla set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 261338] [PATCH] kernel panic "bad pte" under heavy CPU load on 12.2 and 12.3 (i386) Date: Tue, 01 Feb 2022 19:13:32 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 12.3-RELEASE X-Bugzilla-Keywords: panic, patch X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: commit-hook@FreeBSD.org X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1643742813; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=kpjNO5zt4xyTSoAvh2uqMYy4Y5+dvRfbRn5vzbqBXIk=; b=y1odYKy6udDEhYxAGD9aWzn9Bsnlb8G5StQOSZjHIdvF2ubwYysF8iSu6V2TRbqX/JRFio po4Sw3OnFnFSFUMGASVR+EfMuYubtu5J+2zVZrHV23O+iO4+MdcK1Kt8A6n2nC8NUY7BEd pH1HxIDl+AKawmrlKaN2lLhSl6J7t5eai42ng2Ry3f1d+zt5Nk+hPbeUYYsndQfV+5tNsP lm6TliVXYhpsY+AJJUaeSK2wxt5XMADNX6P6r5h8vZz0yT1ox3lNIqKZic1vx89NytFg9X gX0JZWmsTtKEJfkplRvydasEB+3He+b9Nh2tGtOx0NKxVfZlj55m857t750hrA== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1643742813; a=rsa-sha256; cv=none; b=Cbp4O9bkJ2am5goyfAciUZfcnLQ6z+jlTFfD6jq4FTuDcb+eY9/zmha2RYYPNy2Ze9un2+ bPPHqeUl6jaUI4Jl5aIQ2U13Zo7zHZ7K7iGNjF+YMT83D2V5c30PO1+GxLZc1Rfnq6+Kw9 399I+ePNmylWGM0EC/kJ57HVaoHEvrkAvsJUVxadqlRIjRxw0NNIuAn59EjygNwWpJVrHX vbuPT5PVhUNZ/ovFkwLWFsJRaIkDTJIROnpGjW9yOw49h/2SzuwxYiiTRdxhQHkL63bP9j glwBF1Hw9S5BQiFRfOH83JwrZr70Q8q3bHBXFsLAJb6YL3hj4M/bnTaif8FnWQ== ARC-Authentication-Results: i=1; mx1.freebsd.org; none X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D261338 --- Comment #34 from commit-hook@FreeBSD.org --- A commit in branch releng/12.2 references this bug: URL: https://cgit.FreeBSD.org/src/commit/?id=3D1e71fa9e4150431d665ab9a82251aada6= 933cf4a commit 1e71fa9e4150431d665ab9a82251aada6933cf4a Author: Andriy Gapon AuthorDate: 2022-01-25 10:34:08 +0000 Commit: Gordon Tetlow CommitDate: 2022-02-01 17:50:43 +0000 smp_targeted_tlb_shootdown has to pin the CPU on i386 This should fix a regression in 1820ca215461 which happened because pmap -> shootdown contracts on amd64 and i386 diverged. On amd64 the pmap code always pins the CPU before calling the shootdown code and expects it to unpin on return. On i386 the pmap code either has pins and unpins around the shootdown calls or does not pin at all. This change should account for that difference. In main and stable/13 the contracts are also different, but the shootdown code is split into the i386 and amd64 variants and each variant is tailored towards the platform's pmap. PR: 261338 Reported by: Dmitry K. Debugged by: Dmitry K. Tested by: Dmitry K. Fixes: 1820ca215461 MFC r368649 / 3fd989da by kib: amd64 pmap: fix PCID mode invalidations Reviewed by: kib X-Pointyhat to: avg Differential Revision: https://reviews.freebsd.org/D33980 (cherry picked from commit e0cc1ce7c0866d6a5c42ef09cfca9582c4a8343c) Approved by: so Security: FreeBSD-EN-22:08.i386 sys/x86/x86/mp_x86.c | 4 ++++ 1 file changed, 4 insertions(+) --=20 You are receiving this mail because: You are the assignee for the bug.=