From owner-freebsd-hackers@FreeBSD.ORG Thu Jul 24 16:46:18 2014 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 1A3A4FAB for ; Thu, 24 Jul 2014 16:46:18 +0000 (UTC) Received: from mx2.ord1.rackspace.com (mx2.ord1.rackspace.com [173.203.4.136]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (Client CN "IronPort Appliance Demo Certificate", Issuer "IronPort Appliance Demo Certificate" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id AB04423A8 for ; Thu, 24 Jul 2014 16:46:17 +0000 (UTC) X-SBRS: None X-SenderGroup: RELAYLIST-US X-MailFlowPolicy: $RELAYED-US X-IronPort-AV: E=McAfee;i="5600,1067,7471"; a="327755385" X-IronPort-AV: E=Sophos;i="5.01,489,1400043600"; d="scan'208";a="327755385" Received: from ord1exh01.rackspace.corp ([10.12.120.25]) by mx2.ord1.rackspace.com with ESMTP/TLS/AES128-SHA; 24 Jul 2014 11:46:11 -0500 Received: from rstark.munix.us (10.1.69.56) by smtpout.rackspace.com (10.12.120.25) with Microsoft SMTP Server (TLS) id 14.3.123.3; Thu, 24 Jul 2014 11:46:11 -0500 Message-ID: <53D13853.1090802@rackspace.com> Date: Thu, 24 Jul 2014 11:46:11 -0500 From: Ryan Stark User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:24.0) Gecko/20100101 Thunderbird/24.6.0 MIME-Version: 1.0 To: Subject: Request for assistance with kernel panic in FreeBSD-10.0-p7 References: <53ADC58C.901@rackspace.com> <53ADDD99.5080001@freebsd.org> <53ADE88B.4060308@rackspace.com> In-Reply-To: <53ADE88B.4060308@rackspace.com> X-Enigmail-Version: 1.6 Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: 7bit X-Originating-IP: [10.1.69.56] X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 24 Jul 2014 16:46:18 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Hello Hackers, Seems I was a little enthusiastic in my last report that all issues were resolved, as I have continued to experience sporadic panics when upgrading ports on my FreeBSD workstation. I would appreciate any assistance or pointers in helping me narrow done what is causing these panics and if there is a way to resolve them. /var/log/messages right before reboot: Jul 23 10:20:18 rstark kernel: Fatal trap 12: page fault while in kernel mode Jul 23 10:20:18 rstark kernel: cpuid = 1; apic id = 02 Jul 23 10:20:18 rstark kernel: fault virtual address = 0xfffff9d0f000e020 Jul 23 10:20:18 rstark kernel: fault code = supervisor read data, page not present Jul 23 10:20:18 rstark kernel: instruction pointer = 0x20:0xffffffff80c870d2 Jul 23 10:20:18 rstark kernel: stack pointer = 0x28:0xfffffe0466b497f0 Jul 23 10:20:18 rstark kernel: frame pointer = 0x28:0xfffffe0466b498d0 Jul 23 10:20:18 rstark kernel: code segment = base 0x0, limit 0xfffff, type 0x1b Jul 23 10:20:18 rstark kernel: = DPL 0, pres 1, long 1, def32 0, gran 1 Jul 23 10:20:18 rstark kernel: processor eflags = interrupt enabled, resume, IOPL = 0 Jul 23 10:20:18 rstark kernel: current process = 66419 (sed) Jul 23 10:20:18 rstark kernel: trap number = 12 Jul 23 10:20:18 rstark kernel: panic: page fault Jul 23 10:20:18 rstark kernel: cpuid = 1 Jul 23 10:20:18 rstark kernel: KDB: stack backtrace: Jul 23 10:20:18 rstark kernel: #0 0xffffffff808e7e90 at kdb_backtrace+0x60 Jul 23 10:20:18 rstark kernel: #1 0xffffffff808af975 at panic+0x155 Jul 23 10:20:18 rstark kernel: #2 0xffffffff80c8e832 at trap_fatal+0x3a2 Jul 23 10:20:18 rstark kernel: #3 0xffffffff80c8eb09 at trap_pfault+0x2c9 Jul 23 10:20:18 rstark kernel: #4 0xffffffff80c8e296 at trap+0x5e6 Jul 23 10:20:18 rstark kernel: #5 0xffffffff80c75532 at calltrap+0x8 Jul 23 10:20:18 rstark kernel: #6 0xffffffff80b10660 at vmspace_exit+0xa0 Jul 23 10:20:18 rstark kernel: #7 0xffffffff8087c76f at exit1+0x65f Jul 23 10:20:18 rstark kernel: #8 0xffffffff8087c10e at sys_sys_exit+0xe Jul 23 10:20:18 rstark kernel: #9 0xffffffff80c8f127 at amd64_syscall+0x357 Jul 23 10:20:18 rstark kernel: #10 0xffffffff80c7581b at Xfast_syscall+0xfb Jul 23 10:20:18 rstark kernel: Uptime: 1d1h57m1s Jul 23 10:20:18 rstark kernel: Dumping 3817 out of 16282 MB:..1%..11%..21%..31%..41%..51%..61%..71%..81%..91% uname -a FreeBSD rstark.munix.us 10.0-RELEASE-p7 FreeBSD 10.0-RELEASE-p7 #1 r268805: Thu Jul 17 15:41:46 CDT 2014 root@rstark.munix.us:/usr/obj/usr/src/sys/GENERIC amd64 Debugging run: [root@rstark /usr/obj/usr/src/sys/GENERIC]# kgdb kernel.debug /var/crash/vmcore.8 GNU gdb 6.1.1 [FreeBSD] Copyright 2004 Free Software Foundation, Inc. GDB is free software, covered by the GNU General Public License, and you are welcome to change it and/or distribute copies of it under certain conditions. Type "show copying" to see the conditions. There is absolutely no warranty for GDB. Type "show warranty" for details. This GDB was configured as "amd64-marcel-freebsd"... Unread portion of the kernel message buffer: Fatal trap 12: page fault while in kernel mode cpuid = 1; apic id = 02 fault virtual address = 0xfffff9d0f000e020 fault code = supervisor read data, page not present instruction pointer = 0x20:0xffffffff80c870d2 stack pointer = 0x28:0xfffffe0466b497f0 frame pointer = 0x28:0xfffffe0466b498d0 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 66419 (sed) trap number = 12 panic: page fault cpuid = 1 KDB: stack backtrace: #0 0xffffffff808e7e90 at kdb_backtrace+0x60 #1 0xffffffff808af975 at panic+0x155 #2 0xffffffff80c8e832 at trap_fatal+0x3a2 #3 0xffffffff80c8eb09 at trap_pfault+0x2c9 #4 0xffffffff80c8e296 at trap+0x5e6 #5 0xffffffff80c75532 at calltrap+0x8 #6 0xffffffff80b10660 at vmspace_exit+0xa0 #7 0xffffffff8087c76f at exit1+0x65f #8 0xffffffff8087c10e at sys_sys_exit+0xe #9 0xffffffff80c8f127 at amd64_syscall+0x357 #10 0xffffffff80c7581b at Xfast_syscall+0xfb Uptime: 1d1h57m1s Dumping 3817 out of 16282 MB:..1%..11%..21%..31%..41%..51%..61%..71%..81%..91% Reading symbols from /boot/kernel/fdescfs.ko.symbols...done. Loaded symbols for /boot/kernel/fdescfs.ko.symbols Reading symbols from /boot/kernel/linprocfs.ko.symbols...done. Loaded symbols for /boot/kernel/linprocfs.ko.symbols Reading symbols from /boot/kernel/linux.ko.symbols...done. Loaded symbols for /boot/kernel/linux.ko.symbols Reading symbols from /boot/kernel/linsysfs.ko.symbols...done. Loaded symbols for /boot/kernel/linsysfs.ko.symbols Reading symbols from /boot/kernel/zfs.ko.symbols...done. Loaded symbols for /boot/kernel/zfs.ko.symbols Reading symbols from /boot/kernel/opensolaris.ko.symbols...done. Loaded symbols for /boot/kernel/opensolaris.ko.symbols Reading symbols from /boot/kernel/geom_eli.ko.symbols...done. Loaded symbols for /boot/kernel/geom_eli.ko.symbols Reading symbols from /boot/kernel/crypto.ko.symbols...done. Loaded symbols for /boot/kernel/crypto.ko.symbols Reading symbols from /boot/kernel/aesni.ko.symbols...done. Loaded symbols for /boot/kernel/aesni.ko.symbols Reading symbols from /boot/modules/nvidia.ko...done. Loaded symbols for /boot/modules/nvidia.ko Reading symbols from /boot/kernel/sem.ko.symbols...done. Loaded symbols for /boot/kernel/sem.ko.symbols Reading symbols from /boot/kernel/pty.ko.symbols...done. Loaded symbols for /boot/kernel/pty.ko.symbols Reading symbols from /boot/kernel/ums.ko.symbols...done. Loaded symbols for /boot/kernel/ums.ko.symbols Reading symbols from /boot/kernel/uhid.ko.symbols...done. Loaded symbols for /boot/kernel/uhid.ko.symbols Reading symbols from /boot/kernel/pflog.ko.symbols...done. Loaded symbols for /boot/kernel/pflog.ko.symbols Reading symbols from /boot/kernel/pf.ko.symbols...done. Loaded symbols for /boot/kernel/pf.ko.symbols #0 doadump (textdump=) at pcpu.h:219 219 __asm("movq %%gs:%1,%0" : "=r" (td) (kgdb) backtrace #0 doadump (textdump=) at pcpu.h:219 #1 0xffffffff808af5f0 in kern_reboot (howto=260) at /usr/src/sys/kern/kern_shutdown.c:447 #2 0xffffffff808af9b4 in panic (fmt=) at /usr/src/sys/kern/kern_shutdown.c:754 #3 0xffffffff80c8e832 in trap_fatal (frame=, eva=) at /usr/src/sys/amd64/amd64/trap.c:882 #4 0xffffffff80c8eb09 in trap_pfault (frame=0xfffffe0466b49740, usermode=0) at /usr/src/sys/amd64/amd64/trap.c:699 #5 0xffffffff80c8e296 in trap (frame=0xfffffe0466b49740) at /usr/src/sys/amd64/amd64/trap.c:463 #6 0xffffffff80c75532 in calltrap () at /usr/src/sys/amd64/amd64/exception.S:232 #7 0xffffffff80c870d2 in pmap_remove_pages (pmap=0xfffff800129a39f8) at /usr/src/sys/amd64/amd64/pmap.c:555 #8 0xffffffff80b10660 in vmspace_exit (td=0xfffff803ef7c7920) at /usr/src/sys/vm/vm_map.c:399 #9 0xffffffff8087c76f in exit1 (td=0xfffff803ef7c7920, rv=) at /usr/src/sys/kern/kern_exit.c:321 #10 0xffffffff8087c10e in sys_sys_exit (td=, uap=) at /usr/src/sys/kern/kern_exit.c:121 #11 0xffffffff80c8f127 in amd64_syscall (td=0xfffff803ef7c7920, traced=0) at subr_syscall.c:134 #12 0xffffffff80c7581b in Xfast_syscall () at /usr/src/sys/amd64/amd64/exception.S:391 #13 0x00000008008f431a in ?? () Previous frame inner to this frame (corrupt stack?) Current language: auto; currently minimal (kgdb) list *0xffffffff80c870d2 0xffffffff80c870d2 is in pmap_remove_pages (/usr/src/sys/amd64/amd64/pmap.c:5187). 5182 inuse &= ~bitmask; 5183 5184 pte = pmap_pdpe(pmap, pv->pv_va); 5185 ptepde = *pte; 5186 pte = pmap_pdpe_to_pde(pte, pv->pv_va); 5187 tpte = *pte; 5188 if ((tpte & (PG_PS | PG_V)) == PG_V) { 5189 superpage = FALSE; 5190 ptepde = tpte; 5191 pte = (pt_entry_t *)PHYS_TO_DMAP(tpte & Not quite sure how to proceed. Thanks in advance for any pointers or assistance! - -- Ryan Stark -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iQIcBAEBCgAGBQJT0ThSAAoJEOuHL951PlCy63kP/3qvcZUpYnggcqwUpQv7+/QR aUBcudwOf+bGgHSheqNnCUvA3GKZRVnRXx8cJKCpGEy2Y9IPqxRhJBAB3ARAgrTI WBuJAKkGWVgLiBNL8dTFNJ99vc5U8NcELy03TPe3LrXZb31ch1fKXwc+MnL4giwn co4s3q7a+1kUs77WT85szGwqJSWKBUcHpj64bUwzr9PO+au4eJ+K32u9vJ4Mtr84 2Ch1C7WNwRhw8+rGDLPgwJoGXwmQqaVMnSfWWPxSoJ1pI0F1rfuQk550P0/bTcSW XSWCxQWgQ8XQUQ5XUrZcDKAsjCT1/WGHvb5kzmnt12ZZNfEyOGPNEnAammtJFSP9 NfHvFb/H5iSFEQ95p1qQFhg2vmAqKpPVOgnZ7gtOoHHiWkinpO7HwJNBLae8K2Om KQB5X81OF7gvXYJNuWjWiBLDFOAnQuKMQTqq9sdNF8OqZOtEXLRa+Uq7L612X82y ptNvOHQ/144Jr9O8/puutZqKjgiUwEkkcAPFR/9eCA65PVH/n55KwBTaUvs75clP lZCkQqIn7x5vMO8yZTCORKOg1p+I85OeeJZcJiWRhOqvdYcKyfCDOL3fpN+AablW /FBKyITrnF0PhqBM13xjP8UihYwFFuQq+9xG0u+6o00TUaW14Rm2K2wqSZkE30ES dEZn2ioHc1Zz7okuDXSx =1y4Q -----END PGP SIGNATURE-----