From nobody Thu Dec 12 16:53:45 2024 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Y8JT55FwKz5gVdF for ; Thu, 12 Dec 2024 16:53:45 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R10" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Y8JT549P4z4ncR for ; Thu, 12 Dec 2024 16:53:45 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1734022425; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=tSkITfxjEhYkCL6mXmsuCLZ62Tw3G2wEAwhtnHPYoKw=; b=jSKrKjfKNdLGQrIBl4eG1qn0mU/V71izjtaCyWwW6etf+cLlPbna0pIRdKJ0jmE350Wh4D Ab+FLKf0AK4F3IhSciS8+3A+I8pgMPLhfv2HHbJOwjPtn3KrHooGrpVZmtBUHOlH4MooSr fqstPQ577WDFrFuSbhyUVJJjrPu5Gq+5DvacsKDvtFxKo9ZI4o7k6HZid2i9nm+r6V+fAd 6fxs4KBHLg7zJ3S2V7NJ9w6wy227zAE2MT2DSGM0HFM91mDWvGh6zdSEbV10fctAk821So UWmM4xoRPZV2ryHXxhoKni0ifP6CKOfNi8aajLJhSqAfns1uhPc5O+vW807+CQ== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1734022425; a=rsa-sha256; cv=none; b=MU8/iqOxiwdmJIuYHuBSTkI2ITmRaXKpccxP1wekjrwZ35ev28Qp4aBJjw7hlA3pxf+ta3 3pNJbq3V1i0tekuvm/p+wg8tdAlAMFab2PWRR6vIA8VHn0uvNPZdP3qdeYKGuxYf3VkNvc k1lUb8AvcUn7PL9jczhMHWSIjQLdGd9aPnh+/HDoLcXdZmmj3IOat2FwBfqA3BFEPuC3g7 pB3FX6EwZkKXEcU6W+wvr1Lq6N43XusZw6CroRRXbxjxbjB2W//ayX3VQ3ijwgHzDIH7Wm T9uEcPixT0CYJzhqBdjmVjTGei1scUl6f2gS4QM8RSU5/f45G2BCcWn3XqnknA== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4Y8JT53g7Kz10tZ for ; Thu, 12 Dec 2024 16:53:45 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 4BCGrjSi053004 for ; Thu, 12 Dec 2024 16:53:45 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 4BCGrjh9053002 for bugs@FreeBSD.org; Thu, 12 Dec 2024 16:53:45 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 282156] page fault while in kernel mode after 14.0-Release to 14.1-Release upgrade Date: Thu, 12 Dec 2024 16:53:45 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 14.1-RELEASE X-Bugzilla-Keywords: crash, regression X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: rmacklem@FreeBSD.org X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@FreeBSD.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D282156 --- Comment #13 from Rick Macklem --- (In reply to tfagart from comment #10) Just to bring you up to date w.r.t. my investigation... The packet trace showed that the crash was generated by a callback that the FreeBSD NFS client does not support. I hacked a NFS server to generate these callbacks and I did not get a crash. It worked the way the code appeared to be written, which was replied NFS4ERR_NOTSUPP. (Someday I should implement this callback, but I do not think the lack of it is causing the crash.) Since the crash address is d0 (208) is seems likely that it is a NULL pointer referencing a structure with a field at offset 208. Going through the structures that are used by svc_run(), the only one I could find with a field at offset 208 was SVCPOOL (the field is sp_groupcount). xprt_register() uses this and acquires the SVCPOOL pointer from xp_pool. --> My current best explanation for the crash is that, somehow, xp_pool is set NULL, but I haven't figured out how that could happen yet. xp_pool is set in svc_vc_create_backchannel(), which is called during TCP connection creation (in newnfs_connect()) with nfscbd_pool as argument. One thought is that nfscbd_pool doesn't get initialized soon enough, but that initialization happens inside the client modules modevent() via svcpool_create() and is never set back to NULL. I'll keep looking to see if I can figure out how xp_pool might get set to NULL and maybe come up with a patch that includes some sanity checking for you to try. I will also take a look, but I do not think anything in svc.c changed between 14.0 and 14.1 (which is where the svc_run() code lives). --=20 You are receiving this mail because: You are the assignee for the bug.=