From owner-freebsd-bugs@freebsd.org Sat Aug 24 18:38:54 2019 Return-Path: Delivered-To: freebsd-bugs@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id B34F0C6B45 for ; Sat, 24 Aug 2019 18:38:54 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 46G6VQ4NYTz3yy8 for ; Sat, 24 Aug 2019 18:38:54 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 947EBC6B44; Sat, 24 Aug 2019 18:38:54 +0000 (UTC) Delivered-To: bugs@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 943F2C6B43 for ; Sat, 24 Aug 2019 18:38:54 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46G6VQ3MH4z3yy7 for ; Sat, 24 Aug 2019 18:38:54 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 549AA941C for ; Sat, 24 Aug 2019 18:38:54 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id x7OIcsL4061767 for ; Sat, 24 Aug 2019 18:38:54 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id x7OIcsLr061766 for bugs@FreeBSD.org; Sat, 24 Aug 2019 18:38:54 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 240060] Fatal trap 12: page fault while in kernel mode: Cannot access memory at address 0x7fffffffe8a8 Date: Sat, 24 Aug 2019 18:38:54 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 12.0-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: freebsd@sysctl.cz X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 24 Aug 2019 18:38:54 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D240060 --- Comment #3 from Martin Filla --- It is suspicion on small stack overflow #0 __curthread () at ./machine/pcpu.h:234 #1 doadump (textdump=3D) at /usr/src/sys/kern/kern_shutdown= .c:366 #2 0xffffffff80b9b09b in kern_reboot (howto=3D260) at /usr/src/sys/kern/kern_shutdown.c:446 #3 0xffffffff80b9b513 in vpanic (fmt=3D, ap=3D0xfffffe006a2= 903b0) at /usr/src/sys/kern/kern_shutdown.c:872 #4 0xffffffff80b9b303 in panic (fmt=3D) at /usr/src/sys/kern/kern_shutdown.c:799 #5 0xffffffff81074bff in trap_fatal (frame=3D0xfffffe006a2905a0, eva=3D104= 0) at /usr/src/sys/amd64/amd64/trap.c:929 #6 0xffffffff81074c59 in trap_pfault (frame=3D0xfffffe006a2905a0, usermode= =3D0) at /usr/src/sys/amd64/amd64/trap.c:765 #7 0xffffffff8107427e in trap (frame=3D0xfffffe006a2905a0) at /usr/src/sys/amd64/amd64/trap.c:441 #8 #9 __mtx_lock_sleep (c=3D0xfffff8000ab50750, v=3D) at /usr/src/sys/kern/kern_mutex.c:565 #10 0xffffffff80ba6813 in _sleep (ident=3D0xfffffe004d5a2138, lock=3D0xfffff8000ab50738, priority=3D108, wmesg=3D0xffffffff8123a845 "-", = sbt=3D0, pr=3D0, flags=3D256) at /usr/src/sys/kern/kern_synch.c:226 #11 0xffffffff80bfa339 in TQ_SLEEP (t=3D, tq=3D, p=3D,=20 m=3D, pri=3D, wm=3D) at /usr/src/sys/kern/subr_taskqueue.c:124 #12 taskqueue_drain (queue=3D0xfffff8000ab50700, task=3D0xfffffe004d5a2138)= at /usr/src/sys/kern/subr_taskqueue.c:573 #13 0xffffffff80cfee78 in ieee80211_draintask (ic=3D0xfffffe004d5a2020, tas= k=3D0x4) at /usr/src/sys/net80211/ieee80211_var.h:794 #14 ieee80211_waitfor_parent (ic=3D0xfffffe004d5a2020) at /usr/src/sys/net80211/ieee80211_proto.c:1440 #15 0xffffffff80ce4a82 in ieee80211_ioctl (ifp=3D0xfffff800b1cae800, cmd=3D, data=3D) at /usr/src/sys/net80211/ieee80211_ioctl.c:3535 #16 0xffffffff80c9ab6a in ifhwioctl (cmd=3D, ifp=3D, data=3D0xfffffe006a290a10 "wlan0", td=3D) at /usr/src/sys/net/if.c:2704 #17 0xffffffff80c9c0ff in ifioctl (so=3D0xfffff8023523b000, cmd=3D214960769= 6, data=3D, td=3D0xfffff80217205000) at /usr/src/sys/net/if.c:3= 124 #18 0xffffffff80c04e9d in fo_ioctl (fp=3D, com=3D, active_cred=3D0xfffff80217205000, td=3D, data=3D) at /usr/src/sys/sys/file.h:330 #19 kern_ioctl (td=3D0xfffff80217205000, fd=3D4, com=3D2149607696, data=3D0xffffffff82112320 "") at /usr/src/sys/kern/sys_generic= .c:800 #20 0xffffffff80c04bbe in sys_ioctl (td=3D0xfffff80217205000, uap=3D0xfffff802172053c0) at /usr/src/sys/kern/sys_generic.c:712 #21 0xffffffff810756d9 in syscallenter (td=3D) at /usr/src/sys/amd64/amd64/../../kern/subr_syscall.c:135 #22 amd64_syscall (td=3D0xfffff80217205000, traced=3D0) at /usr/src/sys/amd64/amd64/trap.c:1076 #23 #24 0x00000008008d911a in ?? () Backtrace stopped: Cannot access memory at address 0x7fffffffe8a8 (kgdb) list 1455 * 1456 * Return 0 if we're ok, 1 if the channel needs to be reset. 1457 * 1458 * See PR kern/202502. 1459 */ 1460 static int 1461 ieee80211_start_check_reset_chan(struct ieee80211vap *vap) 1462 { 1463 struct ieee80211com *ic =3D vap->iv_ic; (kgdb) frame 14 #14 ieee80211_waitfor_parent (ic=3D0xfffffe004d5a2020) at /usr/src/sys/net80211/ieee80211_proto.c:1440 1440 ieee80211_draintask(ic, &ic->ic_parent_task); (kgdb) frame 13 #13 0xffffffff80cfee78 in ieee80211_draintask (ic=3D0xfffffe004d5a2020, tas= k=3D0x4) at /usr/src/sys/net80211/ieee80211_var.h:794 794 taskqueue_drain(ic->ic_tq, task); (kgdb) frame 14 #14 ieee80211_waitfor_parent (ic=3D0xfffffe004d5a2020) at /usr/src/sys/net80211/ieee80211_proto.c:1440 1440 ieee80211_draintask(ic, &ic->ic_parent_task); (kgdb) print &ic->ic_parent_task $15 =3D (struct task *) 0xfffffe004d5a2138 --=20 You are receiving this mail because: You are the assignee for the bug.=