From owner-freebsd-bugs@freebsd.org Mon Nov 30 15:01:16 2020 Return-Path: Delivered-To: freebsd-bugs@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 4948247ECD3 for ; Mon, 30 Nov 2020 15:01:16 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4Cl7j81S5jz3lW2 for ; Mon, 30 Nov 2020 15:01:16 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 31D7E47EC6C; Mon, 30 Nov 2020 15:01:16 +0000 (UTC) Delivered-To: bugs@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 319A347F081 for ; Mon, 30 Nov 2020 15:01:16 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Cl7j80rpgz3lW1 for ; Mon, 30 Nov 2020 15:01:16 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 1073625490 for ; Mon, 30 Nov 2020 15:01:16 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 0AUF1FAE009645 for ; Mon, 30 Nov 2020 15:01:15 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 0AUF1F4s009643 for bugs@FreeBSD.org; Mon, 30 Nov 2020 15:01:15 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 251483] after upgrading from 12.1 to 12.2 the mfi driver crashes during boot Date: Mon, 30 Nov 2020 15:01:16 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 12.2-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: cstamas+fbsdbz@digitus.itk.ppke.hu X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 30 Nov 2020 15:01:16 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D251483 Bug ID: 251483 Summary: after upgrading from 12.1 to 12.2 the mfi driver crashes during boot Product: Base System Version: 12.2-RELEASE Hardware: amd64 OS: Any Status: New Severity: Affects Some People Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: cstamas+fbsdbz@digitus.itk.ppke.hu Hi, I have a Dell R740 server with PERC H330 Mini card in HBA mode. The install was done using 12.1 and today I upgraded to 12.2 with freebsd-update. The kernel crashes now during boot. (I attached the captured serial logs below.) Following the recommendation from the friendly folks on #freebsdhelp I was = able to boot up the system by setting hw.mfi.mrsas_enable=3D"1" in the bootloader. This is = not ideal at the moment as ZFS complains about difference in configured vs. native blocksizes. ZFS filesystem version: 5 ZFS storage pool version: features support (5000) Timecounters tick every 1.000 msec lo0: bpf attached vlan: initialized, using hash tables with chaining tcp_init: net.inet.tcp.tcbhashsize auto tuned to 1048576 IPsec: Initialized Security Association Processing. hptnr: no controller detected. hptrr: no controller detected. hpt27xx: no controller detected. ahcich0: AHCI reset... ugen0.1: <0x8086 XHCI root HUB> at usbus0 mfisyspd0 numa-domain 0 on mfi0 mfisyspd0: 7630885MB (15628053168 sectors) SYSPD volume (deviceid: 0) mfisyspd0: SYSPD volume attached GEOM: new disk mfisyspd0 ahcich0: SATA connect timeout time=3D10000us status=3D00000000 ahcich0: AHCI reset: device not found ahcich1: AHCI reset... uhub0: <0x8086 XHCI root HUB, class 9/0, rev 3.00/1.00, addr 1> on usbus0 ahcich1: SATA connect timeout time=3D10000us status=3D00000000 ahcich1: AHCI reset: device not found mfisyspd1 numa-domain 0 on mfi0 ahcich2: AHCI reset... mfi0: DJA NA XXX SYSPDIO Fatal trap 12: page fault while in kernel mode cpuid =3D 14; apic id =3D 14 fault virtual address =3D 0x0 fault code =3D supervisor read data, page not present instruction pointer =3D 0x20:0xffffffff806d040b stack pointer =3D 0x28:0xfffffe00faad61c0 frame pointer =3D 0x28:0xfffffe00faad61f0 code segment =3D base 0x0, limit 0xfffff, type 0x1b =3D DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags =3D interrupt enabled, resume, IOPL =3D 0 current process =3D 13 (g_down) trap number =3D 12 panic: page fault cpuid =3D 14 time =3D 1 KDB: stack backtrace: #0 0xffffffff80c0a8f5 at kdb_backtrace+0x65 #1 0xffffffff80bbeb1b at vpanic+0x17b #2 0xffffffff80bbe993 at panic+0x43 #3 0xffffffff8108f911 at trap_fatal+0x391 #4 0xffffffff8108f96f at trap_pfault+0x4f #5 0xffffffff8108efb6 at trap+0x286 #6 0xffffffff81066f38 at calltrap+0x8 #7 0xffffffff806c92b8 at mfi_send_frame+0x28 #8 0xffffffff806c91a9 at mfi_data_cb+0x359 #9 0xffffffff80c00382 at bus_dmamap_load_bio+0xb2 #10 0xffffffff806c8cce at mfi_mapcmd+0xae #11 0xffffffff806c802b at mfi_startio+0xdb #12 0xffffffff806ce3d9 at mfi_syspd_strategy+0x99 #13 0xffffffff80b07d85 at g_disk_start+0x325 #14 0xffffffff80b0bd49 at g_io_schedule_down+0x169 #15 0xffffffff80b0c57c at g_down_procbody+0x6c #16 0xffffffff80b8044e at fork_exit+0x7e #17 0xffffffff81067f6e at fork_trampoline+0xe Uptime: 1s these kernels work fine: Jul 27 12:55:31 backup20vh kernel: FreeBSD 12.1-RELEASE r354233 GENERIC amd= 64 Sep 2 15:56:28 backup20vh kernel: FreeBSD 12.1-RELEASE-p8 GENERIC amd64 Nov 30 14:49:50 backup20vh kernel: FreeBSD 12.1-RELEASE-p10 GENERIC amd64 Nov 30 15:03:10 backup20vh kernel: FreeBSD 12.1-RELEASE-p10 GENERIC amd64 this is the one with the issue: Nov 30 14:29:59 backup20vh kernel: FreeBSD 12.2-RELEASE r366954 GENERIC amd= 64 Regards, cstamas --=20 You are receiving this mail because: You are the assignee for the bug.=