From owner-freebsd-bugs@freebsd.org Fri Oct 16 14:37:14 2015 Return-Path: Delivered-To: freebsd-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 503C6A16211 for ; Fri, 16 Oct 2015 14:37:14 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 3D665E93 for ; Fri, 16 Oct 2015 14:37:14 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id t9GEbEWn028493 for ; Fri, 16 Oct 2015 14:37:14 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-bugs@FreeBSD.org Subject: [Bug 203820] kernel panic when trying to unload vmm(4) Date: Fri, 16 Oct 2015 14:37:14 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 10.2-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: ilavsky.martin@gmail.com X-Bugzilla-Status: New X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-bugs@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 16 Oct 2015 14:37:14 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=203820 Bug ID: 203820 Summary: kernel panic when trying to unload vmm(4) Product: Base System Version: 10.2-RELEASE Hardware: amd64 OS: Any Status: New Severity: Affects Some People Priority: --- Component: kern Assignee: freebsd-bugs@FreeBSD.org Reporter: ilavsky.martin@gmail.com Executing: # kldunload vmm issues kernel panic with the message: panic: general protection fault Fatal trap 9: general protection fault while in kernel mode cpuid = 2; instruction pointer = 0x20:0xffffffff821f542b instruction pointer = 0x20:0xffffffff821f542b stack pointer = 0x28:0xfffffe082cdb6800 stack pointer = 0x28:0xfffffe082cdb1800 frame pointer = 0x28:0xfffffe082cdb6830 frame pointer = 0x28:0xfffffe082cdb1830 code segment = base 0x0, limit 0xfffff, type 0x1b code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = processor eflags = resume, resume, IOPL = 0 IOPL = 0 current process = 11 (idle: cpu7) current process = 11 (idle: cpu6) trap number = 9 trap number = 9 panic: general protection fault cpuid = 7 KDB: stack backtrace: #0 0xffffffff80996d90 at kdb_backtrace+0x60 #1 0xffffffff8095a946 at vpanic+0x126 #2 0xffffffff8095a813 at panic+0x43 #3 0xffffffff80d98b1b at trap_fatal+0x36b #4 0xffffffff80d9879c at trap+0x75c #5 0xffffffff80d7e832 at calltrap+0x8 #6 0xffffffff809a372c at smp_rendezvous_action+0xbc #7 0xffffffff80d7fc49 at Xrendezvous+0x89 #8 0xffffffff8037de1a at acpi_cpu_idle+0x15a #9 0xffffffff80d8238f at cpu_idle_acpi+0x3f #10 0xffffffff80d82430 at cpu_idle+0x90 #11 0xffffffff809872e5 at sched_idletd+0x1d5 #12 0xffffffff809243aa at fork_exit+0x9a #13 0xffffffff80d7ed6e at fork_trampoline+0xe Uptime: 12h9m9s No bhyve VM is running nor defined on the system. FreeBSD version: 10.2-RELEASE-p5 r289315 (svn) Custom kernel, diff between GENERIC and mine: (/usr/src/sys/amd64/conf)# diff GENERIC TRIVEVERKY 22c22 < ident GENERIC --- > ident TRIVEVERKY 366a367,390 > > > ### > # custom add ons > > # AES support > device crypto > device cryptodev > device aesni > > # PF > device pf > device pflog > device pfsync > options ALTQ > options ALTQ_CBQ # Class Bases Queuing (CBQ) > options ALTQ_RED # Random Early Detection (RED) > options ALTQ_RIO # RED In/Out > options ALTQ_HFSC # Hierarchical Packet Scheduler (HFSC) > options ALTQ_PRIQ # Priority Queuing (PRIQ) > options ALTQ_NOPCC # Required for SMP build > > # CPU temp > device coretemp (/usr/src/sys/amd64/conf)# Dump is available. Can be reproduced with: # kldload vmm # kldunload vmm /etc/make.conf STRIP= CFLAGS+=-fno-omit-frame-pointer NO_PROFILE=true WITHOUT_X=yes WITH_X=NO ENABLE_GUI=NO OPTIONS_UNSET=X11 WITH_PKGNG=yes DEFAULT_VERSIONS+=perl5=5.20 /boot/loader.conf zfs_load=YES vfs.root.mountfrom="zfs:rpool/ROOT/10.2" dtraceall_load=YES boot_multicons="YES" console="vidconsole,comconsole" comconsole_speed="115200" loader_logo="beastiebw" Hardware: motherboard: S1200BTS CPU: Intel(R) Xeon(R) CPU E3-1240 V2 @ 3.40GHz RAM: 32GB ECC KVR16E11/8I -- You are receiving this mail because: You are the assignee for the bug.