Date: Wed, 26 Apr 2023 20:39:41 +0200 From: =?UTF-8?B?S29ucmFkIFNld2nFgsWCby1Kb3Blaw==?= <kjopek@gmail.com> To: freebsd-hackers@freebsd.org Subject: FreeBSD 14.0-CURRENT breakage on BeagleBone Black Message-ID: <CAGgez=Jio8a6X6nS-k1E5pJR0LVSXxA4XpDBL6vXCXd1NoxAGA@mail.gmail.com>
next in thread | raw e-mail | index | archive | help
[-- Attachment #1 --]
Hi,
I found the following problem with
FreeBSD-14.0-CURRENT-arm-armv7-f369f10dd812-262341:
ti_sysc0: <TI SYSC Interconnect> on ofwbus0
panic: Assertion size > 0 failed at /usr/src/sys/kern/subr_vmem.c:1332
cpuid = 0
time = 1
KDB: stack backtrace:
db_trace_self() at db_trace_self
pc = 0xc05ebebc lr = 0xc007a694 (db_trace_self_wrapper+0x30)
sp = 0xc0f14a80 fp = 0xc0f14b98
db_trace_self_wrapper() at db_trace_self_wrapper+0x30
pc = 0xc007a694 lr = 0xc02eb258 (vpanic+0x140)
sp = 0xc0f14ba0 fp = 0xc0f14bc0
r4 = 0x00000100 r5 = 0x00000000
r6 = 0xc078f773 r7 = 0xc0b1aea8
vpanic() at vpanic+0x140
pc = 0xc02eb258 lr = 0xc02eb038 (doadump)
sp = 0xc0f14bc8 fp = 0xc0f14bcc
r4 = 0x00000000 r5 = 0xc2074000
r6 = 0x00000000 r7 = 0xc0f14c38
r8 = 0xc0b8d700 r9 = 0x00000002
r10 = 0xc0f14c14
doadump() at doadump
pc = 0xc02eb038 lr = 0xc035afd0 (vmem_xalloc)
sp = 0xc0f14bd4 fp = 0xc0f14c08
r4 = 0xc0f14c14 r5 = 0xc0f14bcc
r6 = 0xc02eb038 r10 = 0xc0f14bd4
vmem_xalloc() at vmem_xalloc
pc = 0xc035afd0 lr = 0xc05b2078 (kmem_malloc_domainset+0x9c)
sp = 0xc0f14c10 fp = 0xc0f14c58
r4 = 0xc00489fc r5 = 0xc0e2d108
r6 = 0xc0f14c04 r7 = 0x00000000
r8 = 0xc2074000 r9 = 0x00000000
r10 = 0xc0f14c38
kmem_malloc_domainset() at kmem_malloc_domainset+0x9c
pc = 0xc05b2078 lr = 0xc02c42dc (malloc_large+0x2c)
sp = 0xc0f14c60 fp = 0xc0f14c70
r4 = 0xc0914adc r5 = 0xc076b7d0
r6 = 0x00000000 r7 = 0x00000002
r8 = 0x00000dbc r9 = 0xd1406028
r10 = 0x00000dbc
malloc_large() at malloc_large+0x2c
pc = 0xc02c42dc lr = 0xc06c2b54 (ti_sysc_attach+0x1c0)
sp = 0xc0f14c78 fp = 0xc0f14cc8
r4 = 0xd1406000 r5 = 0xc076b7d0
r6 = 0xffffffff r7 = 0xd1406030
ti_sysc_attach() at ti_sysc_attach+0x1c0
pc = 0xc06c2b54 lr = 0xc032a868 (device_attach+0x4f0)
sp = 0xc0f14cd0 fp = 0xc0f14d18
r4 = 0xd0061280 r5 = 0xd0061500
r6 = 0x2f2c9d22 r7 = 0x00000000
r8 = 0xc0b921a4 r9 = 0xc07ccf8c
r10 = 0xd13c03a0
device_attach() at device_attach+0x4f0
pc = 0xc032a868 lr = 0xc032a2dc (device_probe_and_attach+0x8c)
sp = 0xc0f14d20 fp = 0xc0f14d38
r4 = 0xd0061280 r5 = 0xc2786ac0
r6 = 0x5e4a6f28 r7 = 0xffffffff
r8 = 0x00000000 r9 = 0xc07ccf8c
r10 = 0xd13c0580
device_probe_and_attach() at device_probe_and_attach+0x8c
pc = 0xc032a2dc lr = 0xc032bcd0 (bus_generic_attach+0x1c)
sp = 0xc0f14d40 fp = 0xc0f14d48
r4 = 0xd0061280 r5 = 0x00000000
r6 = 0xc0f14d58 r10 = 0xd13c0580
bus_generic_attach() at bus_generic_attach+0x1c
pc = 0xc032bcd0 lr = 0xc00e48a4 (ofwbus_attach+0xb0)
sp = 0xc0f14d50 fp = 0xc0f14d88
r4 = 0xd0061500 r10 = 0xd13c0580
ofwbus_attach() at ofwbus_attach+0xb0
pc = 0xc00e48a4 lr = 0xc032a868 (device_attach+0x4f0)
sp = 0xc0f14d90 fp = 0xc0f14dd8
r4 = 0xd0061500 r5 = 0xd0061780
r6 = 0x2e74e503 r7 = 0x00000000
r8 = 0xc0b921a4 r10 = 0xd13c0580
device_attach() at device_attach+0x4f0
pc = 0xc032a868 lr = 0xc032a2dc (device_probe_and_attach+0x8c)
sp = 0xc0f14de0 fp = 0xc0f14df8
r4 = 0xd0061500 r5 = 0xc2786ac0
r6 = 0x5e4a6f28 r7 = 0x00000000
r8 = 0xc0b28a2c r9 = 0xc0b28a30
r10 = 0xc0b0a554
device_probe_and_attach() at device_probe_and_attach+0x8c
pc = 0xc032a2dc lr = 0xc032c744 (bus_generic_new_pass+0xb4)
sp = 0xc0f14e00 fp = 0xc0f14e18
r4 = 0xd0061500 r5 = 0xc090aa60
r6 = 0xc08e50ac r10 = 0xc0b0a554
bus_generic_new_pass() at bus_generic_new_pass+0xb4
pc = 0xc032c744 lr = 0xc032c790 (bus_generic_new_pass+0x100)
sp = 0xc0f14e20 fp = 0xc0f14e38
r4 = 0xd0061780 r5 = 0xc090aa60
r6 = 0xd0061e80 r7 = 0x00000000
r8 = 0xc0b28a2c r10 = 0xc0b0a554
bus_generic_new_pass() at bus_generic_new_pass+0x100
pc = 0xc032c790 lr = 0xc0327808 (bus_set_pass+0x54)
sp = 0xc0f14e40 fp = 0xc0f14e58
r4 = 0x7fffffff r5 = 0xc090aa60
r6 = 0xd0061e80 r7 = 0xc2788460
r8 = 0xc0b28a2c r10 = 0xc0b0a554
bus_set_pass() at bus_set_pass+0x54
pc = 0xc0327808 lr = 0xc0273818 (mi_startup+0x2b0)
sp = 0xc0f14e60 fp = 0xc0f14e88
r4 = 0xc0b0a558 r5 = 0x0fffffff
r6 = 0xc279f364 r7 = 0xc08de8dc
r8 = 0x00000000 r9 = 0x03800000
mi_startup() at mi_startup+0x2b0
pc = 0xc0273818 lr = 0xc0000344 (btext+0x144)
sp = 0xc0f14e90 fp = 0x00000000
r4 = 0xc0000480 r5 = 0xc0bc8000
r6 = 0x00000004 r7 = 0x00c52078
r8 = 0xc0e45000 r9 = 0x9cf02958
r10 = 0x00000000
btext() at btext+0x144
pc = 0xc0000344 lr = 0xc0000344 (btext+0x144)
sp = 0xc0f14e90 fp = 0x00000000
KDB: enter: panic
[ thread pid 0 tid 100000 ]
Stopped at kdb_enter+0x54: ldrb r15, [r15, r15, ror r15]!
db>
Looks like assertion failed on invalid request of memory.
If anyone™ wants more debug info - I can deliver any required output.
Regards,
Konrad Sewiłło-Jopek
[-- Attachment #2 --]
<div dir="ltr"><div>Hi,</div><div><br></div><div>I found the following problem with FreeBSD-14.0-CURRENT-arm-armv7-f369f10dd812-262341:<br><br>ti_sysc0: <TI SYSC Interconnect> on ofwbus0<br>panic: Assertion size > 0 failed at /usr/src/sys/kern/subr_vmem.c:1332<br>cpuid = 0<br>time = 1<br>KDB: stack backtrace:<br>db_trace_self() at db_trace_self<br> pc = 0xc05ebebc lr = 0xc007a694 (db_trace_self_wrapper+0x30)<br> sp = 0xc0f14a80 fp = 0xc0f14b98<br>db_trace_self_wrapper() at db_trace_self_wrapper+0x30<br> pc = 0xc007a694 lr = 0xc02eb258 (vpanic+0x140)<br> sp = 0xc0f14ba0 fp = 0xc0f14bc0<br> r4 = 0x00000100 r5 = 0x00000000<br> r6 = 0xc078f773 r7 = 0xc0b1aea8<br>vpanic() at vpanic+0x140<br> pc = 0xc02eb258 lr = 0xc02eb038 (doadump)<br> sp = 0xc0f14bc8 fp = 0xc0f14bcc<br> r4 = 0x00000000 r5 = 0xc2074000<br> r6 = 0x00000000 r7 = 0xc0f14c38<br> r8 = 0xc0b8d700 r9 = 0x00000002<br> r10 = 0xc0f14c14<br>doadump() at doadump<br> pc = 0xc02eb038 lr = 0xc035afd0 (vmem_xalloc)<br> sp = 0xc0f14bd4 fp = 0xc0f14c08<br> r4 = 0xc0f14c14 r5 = 0xc0f14bcc<br> r6 = 0xc02eb038 r10 = 0xc0f14bd4<br>vmem_xalloc() at vmem_xalloc<br> pc = 0xc035afd0 lr = 0xc05b2078 (kmem_malloc_domainset+0x9c)<br> sp = 0xc0f14c10 fp = 0xc0f14c58<br> r4 = 0xc00489fc r5 = 0xc0e2d108<br> r6 = 0xc0f14c04 r7 = 0x00000000<br> r8 = 0xc2074000 r9 = 0x00000000<br> r10 = 0xc0f14c38<br>kmem_malloc_domainset() at kmem_malloc_domainset+0x9c<br> pc = 0xc05b2078 lr = 0xc02c42dc (malloc_large+0x2c)<br> sp = 0xc0f14c60 fp = 0xc0f14c70<br> r4 = 0xc0914adc r5 = 0xc076b7d0<br> r6 = 0x00000000 r7 = 0x00000002<br> r8 = 0x00000dbc r9 = 0xd1406028<br> r10 = 0x00000dbc<br>malloc_large() at malloc_large+0x2c<br> pc = 0xc02c42dc lr = 0xc06c2b54 (ti_sysc_attach+0x1c0)<br> sp = 0xc0f14c78 fp = 0xc0f14cc8<br> r4 = 0xd1406000 r5 = 0xc076b7d0<br> r6 = 0xffffffff r7 = 0xd1406030<br>ti_sysc_attach() at ti_sysc_attach+0x1c0<br> pc = 0xc06c2b54 lr = 0xc032a868 (device_attach+0x4f0)<br> sp = 0xc0f14cd0 fp = 0xc0f14d18<br> r4 = 0xd0061280 r5 = 0xd0061500<br> r6 = 0x2f2c9d22 r7 = 0x00000000<br> r8 = 0xc0b921a4 r9 = 0xc07ccf8c<br> r10 = 0xd13c03a0<br>device_attach() at device_attach+0x4f0<br> pc = 0xc032a868 lr = 0xc032a2dc (device_probe_and_attach+0x8c)<br> sp = 0xc0f14d20 fp = 0xc0f14d38<br> r4 = 0xd0061280 r5 = 0xc2786ac0<br> r6 = 0x5e4a6f28 r7 = 0xffffffff<br> r8 = 0x00000000 r9 = 0xc07ccf8c<br> r10 = 0xd13c0580<br>device_probe_and_attach() at device_probe_and_attach+0x8c<br> pc = 0xc032a2dc lr = 0xc032bcd0 (bus_generic_attach+0x1c)<br> sp = 0xc0f14d40 fp = 0xc0f14d48<br> r4 = 0xd0061280 r5 = 0x00000000<br> r6 = 0xc0f14d58 r10 = 0xd13c0580<br>bus_generic_attach() at bus_generic_attach+0x1c<br> pc = 0xc032bcd0 lr = 0xc00e48a4 (ofwbus_attach+0xb0)<br> sp = 0xc0f14d50 fp = 0xc0f14d88<br> r4 = 0xd0061500 r10 = 0xd13c0580<br>ofwbus_attach() at ofwbus_attach+0xb0<br> pc = 0xc00e48a4 lr = 0xc032a868 (device_attach+0x4f0)<br> sp = 0xc0f14d90 fp = 0xc0f14dd8<br> r4 = 0xd0061500 r5 = 0xd0061780<br> r6 = 0x2e74e503 r7 = 0x00000000<br> r8 = 0xc0b921a4 r10 = 0xd13c0580<br>device_attach() at device_attach+0x4f0<br> pc = 0xc032a868 lr = 0xc032a2dc (device_probe_and_attach+0x8c)<br> sp = 0xc0f14de0 fp = 0xc0f14df8<br> r4 = 0xd0061500 r5 = 0xc2786ac0<br> r6 = 0x5e4a6f28 r7 = 0x00000000<br> r8 = 0xc0b28a2c r9 = 0xc0b28a30<br> r10 = 0xc0b0a554<br>device_probe_and_attach() at device_probe_and_attach+0x8c<br> pc = 0xc032a2dc lr = 0xc032c744 (bus_generic_new_pass+0xb4)<br> sp = 0xc0f14e00 fp = 0xc0f14e18<br> r4 = 0xd0061500 r5 = 0xc090aa60<br> r6 = 0xc08e50ac r10 = 0xc0b0a554<br>bus_generic_new_pass() at bus_generic_new_pass+0xb4<br> pc = 0xc032c744 lr = 0xc032c790 (bus_generic_new_pass+0x100)<br> sp = 0xc0f14e20 fp = 0xc0f14e38<br> r4 = 0xd0061780 r5 = 0xc090aa60<br> r6 = 0xd0061e80 r7 = 0x00000000<br> r8 = 0xc0b28a2c r10 = 0xc0b0a554<br>bus_generic_new_pass() at bus_generic_new_pass+0x100<br> pc = 0xc032c790 lr = 0xc0327808 (bus_set_pass+0x54)<br> sp = 0xc0f14e40 fp = 0xc0f14e58<br> r4 = 0x7fffffff r5 = 0xc090aa60<br> r6 = 0xd0061e80 r7 = 0xc2788460<br> r8 = 0xc0b28a2c r10 = 0xc0b0a554<br>bus_set_pass() at bus_set_pass+0x54<br> pc = 0xc0327808 lr = 0xc0273818 (mi_startup+0x2b0)<br> sp = 0xc0f14e60 fp = 0xc0f14e88<br> r4 = 0xc0b0a558 r5 = 0x0fffffff<br> r6 = 0xc279f364 r7 = 0xc08de8dc<br> r8 = 0x00000000 r9 = 0x03800000<br>mi_startup() at mi_startup+0x2b0<br> pc = 0xc0273818 lr = 0xc0000344 (btext+0x144)<br> sp = 0xc0f14e90 fp = 0x00000000<br> r4 = 0xc0000480 r5 = 0xc0bc8000<br> r6 = 0x00000004 r7 = 0x00c52078<br> r8 = 0xc0e45000 r9 = 0x9cf02958<br> r10 = 0x00000000<br>btext() at btext+0x144<br> pc = 0xc0000344 lr = 0xc0000344 (btext+0x144)<br> sp = 0xc0f14e90 fp = 0x00000000<br>KDB: enter: panic<br>[ thread pid 0 tid 100000 ]<br>Stopped at kdb_enter+0x54: ldrb r15, [r15, r15, ror r15]!<br>db> <br></div><div><br></div><div>Looks like assertion failed on invalid request of memory.<br></div><div>If anyone™ wants more debug info - I can deliver any required output.<br></div><div><br></div><div>Regards,<br></div><div><div><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div>Konrad Sewiłło-Jopek</div></div></div></div></div></div>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAGgez=Jio8a6X6nS-k1E5pJR0LVSXxA4XpDBL6vXCXd1NoxAGA>
