From owner-freebsd-bugs@freebsd.org Sat Apr 27 02:32:29 2019 Return-Path: Delivered-To: freebsd-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id BE68E15822E7 for ; Sat, 27 Apr 2019 02:32:28 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 4B2376AC3B for ; Sat, 27 Apr 2019 02:32:28 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 0F10815822E5; Sat, 27 Apr 2019 02:32:28 +0000 (UTC) Delivered-To: bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id DF0E015822E4 for ; Sat, 27 Apr 2019 02:32:27 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 789FD6AC36 for ; Sat, 27 Apr 2019 02:32:27 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 9625B1B0CD for ; Sat, 27 Apr 2019 02:32:26 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id x3R2WQZ5045463 for ; Sat, 27 Apr 2019 02:32:26 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id x3R2WQ57045462 for bugs@FreeBSD.org; Sat, 27 Apr 2019 02:32:26 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 237590] powerpc64 PowerMac11,2 and 7,2 context, -r330614 and later (including -r345758): "ofwdump -ap" crashes the system; probable -r330610 "cause" Date: Sat, 27 Apr 2019 02:32:25 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: marklmi26-fbsd@yahoo.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: short_desc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 27 Apr 2019 02:32:29 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D237590 Mark Millard changed: What |Removed |Added ---------------------------------------------------------------------------- Summary|powerpc64 PowerMac11,2 and |powerpc64 PowerMac11,2 and |7,2 context, -r330614 and |7,2 context, -r330614 and |later (including -r345758): |later (including -r345758): |"ofwdump -ap" crashes the |"ofwdump -ap" crashes the |system, unable to sleep |system; probable -r330610 |cpus; probable -r330610 |"cause" |"cause" | --- Comment #2 from Mark Millard --- (In reply to Mark Millard from comment #1) >From looking at the code the message about timeout stopping cpus is from kdbtrap and does not of itself seem to be part of the original problem. Attempting a bt at the ddb> prompt gets its own fatal kernel trap but some of the exception information is possibly of interest. Typed from a screen picture (this is from -r330614): exception =3D 0x300 (data storage interrupt) virtual address=3D 0xffffffffffb7f400 dsisr =3D 0x40000000 srr0 =3D 0x9b2194 (0x9b2194) srr1 =3D 0x9000000000001032 lr =3D 0x9b254c (0x9b254c) curthread =3D 0xc0000000024fb000 pid =3D 12, comm =3D swi4: clock (0) The stack backtrace itself listed: 0x0000000f95460: kernel DSI read trap @ 0xffffffffffb7f400 by .db_backtrace+0x40 [Multiple attempts got the same as the above.] That matches of 0x9b2194 for srr0: 00000000009b2154 <.db_backtrace> mflr r0 00000000009b2158 <.db_backtrace+0x4> std r28,-32(r1) 00000000009b215c <.db_backtrace+0x8> std r29,-24(r1) 00000000009b2160 <.db_backtrace+0xc> std r30,-16(r1) 00000000009b2164 <.db_backtrace+0x10> std r31,-8(r1) 00000000009b2168 <.db_backtrace+0x14> std r0,16(r1) 00000000009b216c <.db_backtrace+0x18> stdu r1,-144(r1) 00000000009b2170 <.db_backtrace+0x1c> mr r31,r1 00000000009b2174 <.db_backtrace+0x20> mr r28,r5 00000000009b2178 <.db_backtrace+0x24> ld r9,-20736(r2) 00000000009b217c <.db_backtrace+0x28> lwz r0,0(r9) 00000000009b2180 <.db_backtrace+0x2c> cmpwi cr7,r0,0 00000000009b2184 <.db_backtrace+0x30> bne cr7,00000000009b24e0 <.db_backtrace+0x38c> 00000000009b2188 <.db_backtrace+0x34> cmpldi cr7,r4,4095 00000000009b218c <.db_backtrace+0x38> ble cr7,00000000009b24e0 <.db_backtrace+0x38c> 00000000009b2190 <.db_backtrace+0x3c> mr r30,r4 00000000009b2194 <.db_backtrace+0x40> ld r30,0(r30) . . . Which is from: static int db_backtrace(struct thread *td, db_addr_t fp, int count) { db_addr_t stackframe, lr, *args; boolean_t kernel_only =3D TRUE; boolean_t full =3D FALSE; #if 0 . . . #endif stackframe =3D fp; while (!db_pager_quit) { if (stackframe < PAGE_SIZE) break; /* * Locate the next frame by grabbing the backchain ptr * from frame[0] */ stackframe =3D *(db_addr_t *)stackframe; . . . That establishes that the 0xffffffffffb7f400 value is from what the code expects was a stack location holding a backchain pointer. --=20 You are receiving this mail because: You are the assignee for the bug.=