From owner-freebsd-amd64@freebsd.org Fri Jan 27 23:58:25 2017 Return-Path: Delivered-To: freebsd-amd64@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id DB7A8CC4698 for ; Fri, 27 Jan 2017 23:58:25 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id C06D9646 for ; Fri, 27 Jan 2017 23:58:25 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id v0RNwPPa047054 for ; Fri, 27 Jan 2017 23:58:25 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-amd64@FreeBSD.org Subject: [Bug 216539] page fault in t4iov_attach during boot, on Dell CS23-SH motherboards Date: Fri, 27 Jan 2017 23:58:25 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: asomers@FreeBSD.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter cc Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-amd64@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Porting FreeBSD to the AMD64 platform List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 27 Jan 2017 23:58:26 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D216539 Bug ID: 216539 Summary: page fault in t4iov_attach during boot, on Dell CS23-SH motherboards Product: Base System Version: CURRENT Hardware: amd64 OS: Any Status: New Severity: Affects Some People Priority: --- Component: kern Assignee: freebsd-bugs@FreeBSD.org Reporter: asomers@FreeBSD.org CC: freebsd-amd64@FreeBSD.org CC: freebsd-amd64@FreeBSD.org Dell C23-SH motherboards, on recent versions of stable/11 and head, will pa= nic with a page fault in t4iov_attach if T4-related modules are loaded at boot time. They do not panic if the T4-related modules are loaded later. Notab= ly, these machines don't even have a T4 card installed. Also of note, hw.pci.enable_pcie_hp=3D0 is set in loader.conf to workaround PR211699. A SuperMicro Sandy Bridge-based system with the same loader.conf settings run= ning the same version of head didn't panic. The machine is running FreeBSD 12.0-CURRENT r311461. It's loader.conf contains: kern.geom.label.disk_ident.enable=3D"0" kern.geom.label.gptid.enable=3D"0" kern.geom.label.disk_ident.enable=3D"0" kern.geom.label.gptid.enable=3D"0" zfs_load=3D"YES" if_cxgbe_load=3D"YES" t4_fw_load=3D"YES" t4_tom_load=3D"YES" t5_fw_load=3D"YES" hw.pci.enable_pcie_hp=3D0 And the panic string is: Fatal trap 12: page fault while in kernel mode cpuid =3D 0; apic id =3D 00 fault virtual address =3D 0x0 fault code =3D supervisor read data, page not present instruction pointer =3D 0x20:0xffffffff817b269a stack pointer =3D 0x28:0xffffffff81bb57d0 frame pointer =3D 0x28:0xffffffff81bb5820 code segment =3D base 0x0, limit 0xfffff, type 0x1b =3D DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags =3D interrupt enabled, resume, IOPL =3D 0 current process =3D 0 (swapper) trap number =3D 12 panic: page fault cpuid =3D 0 KDB: stack backtrace: db_trace_self_wrapper() at 0xffffffff803301fb =3D db_trace_self_wrapper+0x2b/frame 0xffffffff81bb5360 vpanic() at 0xffffffff804f3512 =3D vpanic+0x182/frame 0xffffffff81bb53e0 panic() at 0xffffffff804f3383 =3D panic+0x43/frame 0xffffffff81bb5440 trap_fatal() at 0xffffffff808181d1 =3D trap_fatal+0x351/frame 0xffffffff81b= b54a0 trap_pfault() at 0xffffffff808183c3 =3D trap_pfault+0x1e3/frame 0xffffffff81bb5500 trap() at 0xffffffff8081794c =3D trap+0x26c/frame 0xffffffff81bb5710 calltrap() at 0xffffffff807fbc01 =3D calltrap+0x8/frame 0xffffffff81bb5710 --- trap 0xc, rip =3D 0xffffffff817b269a, rsp =3D 0xffffffff81bb57e0, rbp = =3D 0xffffffff81bb5820 --- t4iov_attach() at 0xffffffff817b269a =3D t4iov_attach+0x14a/frame 0xffffffff81bb5820 device_attach() at 0xffffffff80530760 =3D device_attach+0x420/frame 0xffffffff81bb5880 bus_generic_attach() at 0xffffffff8053194d =3D bus_generic_attach+0x2d/frame 0xffffffff81bb58a0 pci_attach() at 0xffffffff80390125 =3D pci_attach+0xd5/frame 0xffffffff81bb= 58e0 device_attach() at 0xffffffff80530760 =3D device_attach+0x420/frame 0xffffffff81bb5940 bus_generic_attach() at 0xffffffff8053194d =3D bus_generic_attach+0x2d/frame 0xffffffff81bb5960 acpi_pcib_acpi_attach() at 0xffffffff8034806a =3D acpi_pcib_acpi_attach+0x3ba/frame 0xffffffff81bb59d0 device_attach() at 0xffffffff80530760 =3D device_attach+0x420/frame 0xffffffff81bb5a30 bus_generic_attach() at 0xffffffff8053194d =3D bus_generic_attach+0x2d/frame 0xffffffff81bb5a50 acpi_attach() at 0xffffffff8033af1f =3D acpi_attach+0xdbf/frame 0xffffffff81bb5b10 device_attach() at 0xffffffff80530760 =3D device_attach+0x420/frame 0xffffffff81bb5b70 bus_generic_attach() at 0xffffffff8053194d =3D bus_generic_attach+0x2d/frame 0xffffffff81bb5b90 nexus_acpi_attach() at 0xffffffff807f7363 =3D nexus_acpi_attach+0x73/frame 0xffffffff81bb5bc0 device_attach() at 0xffffffff80530760 =3D device_attach+0x420/frame 0xffffffff81bb5c20 bus_generic_new_pass() at 0xffffffff80531f89 =3D bus_generic_new_pass+0xe9/= frame 0xffffffff81bb5c50 bus_set_pass() at 0xffffffff8052e3cc =3D bus_set_pass+0x8c/frame 0xffffffff81bb5c80 configure() at 0xffffffff8087eaa9 =3D configure+0x9/frame 0xffffffff81bb5c90 mi_startup() at 0xffffffff8047b3a8 =3D mi_startup+0x118/frame 0xffffffff81b= b5cb0 btext() at 0xffffffff8028802c =3D btext+0x2c Uptime: 1s --=20 You are receiving this mail because: You are on the CC list for the bug.=