Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 24 Jul 2014 11:46:11 -0500
From:      Ryan Stark <rstark@rackspace.com>
To:        <freebsd-hackers@freebsd.org>
Subject:   Request for assistance with kernel panic in FreeBSD-10.0-p7
Message-ID:  <53D13853.1090802@rackspace.com>
In-Reply-To: <53ADE88B.4060308@rackspace.com>
References:  <53ADC58C.901@rackspace.com> <53ADDD99.5080001@freebsd.org> <53ADE88B.4060308@rackspace.com>

next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Hello Hackers,


Seems I was a little enthusiastic in my last report that all issues were
resolved, as I have continued to experience sporadic panics when
upgrading ports on my FreeBSD workstation.  I would appreciate any
assistance or pointers in helping me narrow done what is causing these
panics and if there is a way to resolve them.

/var/log/messages right before reboot:


Jul 23 10:20:18 rstark kernel: Fatal trap 12: page fault while in kernel
mode
Jul 23 10:20:18 rstark kernel: cpuid = 1; apic id = 02
Jul 23 10:20:18 rstark kernel: fault virtual address    = 0xfffff9d0f000e020
Jul 23 10:20:18 rstark kernel: fault code               = supervisor
read data, page not present
Jul 23 10:20:18 rstark kernel: instruction pointer      =
0x20:0xffffffff80c870d2
Jul 23 10:20:18 rstark kernel: stack pointer            =
0x28:0xfffffe0466b497f0
Jul 23 10:20:18 rstark kernel: frame pointer            =
0x28:0xfffffe0466b498d0
Jul 23 10:20:18 rstark kernel: code segment             = base 0x0,
limit 0xfffff, type 0x1b
Jul 23 10:20:18 rstark kernel: = DPL 0, pres 1, long 1, def32 0, gran 1
Jul 23 10:20:18 rstark kernel: processor eflags = interrupt enabled,
resume, IOPL = 0
Jul 23 10:20:18 rstark kernel: current process          = 66419 (sed)
Jul 23 10:20:18 rstark kernel: trap number              = 12
Jul 23 10:20:18 rstark kernel: panic: page fault
Jul 23 10:20:18 rstark kernel: cpuid = 1
Jul 23 10:20:18 rstark kernel: KDB: stack backtrace:
Jul 23 10:20:18 rstark kernel: #0 0xffffffff808e7e90 at kdb_backtrace+0x60
Jul 23 10:20:18 rstark kernel: #1 0xffffffff808af975 at panic+0x155
Jul 23 10:20:18 rstark kernel: #2 0xffffffff80c8e832 at trap_fatal+0x3a2
Jul 23 10:20:18 rstark kernel: #3 0xffffffff80c8eb09 at trap_pfault+0x2c9
Jul 23 10:20:18 rstark kernel: #4 0xffffffff80c8e296 at trap+0x5e6
Jul 23 10:20:18 rstark kernel: #5 0xffffffff80c75532 at calltrap+0x8
Jul 23 10:20:18 rstark kernel: #6 0xffffffff80b10660 at vmspace_exit+0xa0
Jul 23 10:20:18 rstark kernel: #7 0xffffffff8087c76f at exit1+0x65f
Jul 23 10:20:18 rstark kernel: #8 0xffffffff8087c10e at sys_sys_exit+0xe
Jul 23 10:20:18 rstark kernel: #9 0xffffffff80c8f127 at amd64_syscall+0x357
Jul 23 10:20:18 rstark kernel: #10 0xffffffff80c7581b at Xfast_syscall+0xfb
Jul 23 10:20:18 rstark kernel: Uptime: 1d1h57m1s
Jul 23 10:20:18 rstark kernel: Dumping 3817 out of 16282
MB:..1%..11%..21%..31%..41%..51%..61%..71%..81%..91%


uname -a

FreeBSD rstark.munix.us 10.0-RELEASE-p7 FreeBSD 10.0-RELEASE-p7 #1
r268805: Thu Jul 17 15:41:46 CDT 2014
root@rstark.munix.us:/usr/obj/usr/src/sys/GENERIC  amd64

Debugging run:


[root@rstark /usr/obj/usr/src/sys/GENERIC]# kgdb kernel.debug
/var/crash/vmcore.8
GNU gdb 6.1.1 [FreeBSD]
Copyright 2004 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain
conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB.  Type "show warranty" for details.
This GDB was configured as "amd64-marcel-freebsd"...

Unread portion of the kernel message buffer:


Fatal trap 12: page fault while in kernel mode
cpuid = 1; apic id = 02
fault virtual address   = 0xfffff9d0f000e020
fault code              = supervisor read data, page not present
instruction pointer     = 0x20:0xffffffff80c870d2
stack pointer           = 0x28:0xfffffe0466b497f0
frame pointer           = 0x28:0xfffffe0466b498d0
code segment            = base 0x0, limit 0xfffff, type 0x1b
                        = DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags        = interrupt enabled, resume, IOPL = 0
current process         = 66419 (sed)
trap number             = 12
panic: page fault
cpuid = 1
KDB: stack backtrace:
#0 0xffffffff808e7e90 at kdb_backtrace+0x60
#1 0xffffffff808af975 at panic+0x155
#2 0xffffffff80c8e832 at trap_fatal+0x3a2
#3 0xffffffff80c8eb09 at trap_pfault+0x2c9
#4 0xffffffff80c8e296 at trap+0x5e6
#5 0xffffffff80c75532 at calltrap+0x8
#6 0xffffffff80b10660 at vmspace_exit+0xa0
#7 0xffffffff8087c76f at exit1+0x65f
#8 0xffffffff8087c10e at sys_sys_exit+0xe
#9 0xffffffff80c8f127 at amd64_syscall+0x357
#10 0xffffffff80c7581b at Xfast_syscall+0xfb
Uptime: 1d1h57m1s
Dumping 3817 out of 16282
MB:..1%..11%..21%..31%..41%..51%..61%..71%..81%..91%

Reading symbols from /boot/kernel/fdescfs.ko.symbols...done.
Loaded symbols for /boot/kernel/fdescfs.ko.symbols
Reading symbols from /boot/kernel/linprocfs.ko.symbols...done.
Loaded symbols for /boot/kernel/linprocfs.ko.symbols
Reading symbols from /boot/kernel/linux.ko.symbols...done.
Loaded symbols for /boot/kernel/linux.ko.symbols
Reading symbols from /boot/kernel/linsysfs.ko.symbols...done.
Loaded symbols for /boot/kernel/linsysfs.ko.symbols
Reading symbols from /boot/kernel/zfs.ko.symbols...done.
Loaded symbols for /boot/kernel/zfs.ko.symbols
Reading symbols from /boot/kernel/opensolaris.ko.symbols...done.
Loaded symbols for /boot/kernel/opensolaris.ko.symbols
Reading symbols from /boot/kernel/geom_eli.ko.symbols...done.
Loaded symbols for /boot/kernel/geom_eli.ko.symbols
Reading symbols from /boot/kernel/crypto.ko.symbols...done.
Loaded symbols for /boot/kernel/crypto.ko.symbols
Reading symbols from /boot/kernel/aesni.ko.symbols...done.
Loaded symbols for /boot/kernel/aesni.ko.symbols
Reading symbols from /boot/modules/nvidia.ko...done.
Loaded symbols for /boot/modules/nvidia.ko
Reading symbols from /boot/kernel/sem.ko.symbols...done.
Loaded symbols for /boot/kernel/sem.ko.symbols
Reading symbols from /boot/kernel/pty.ko.symbols...done.
Loaded symbols for /boot/kernel/pty.ko.symbols
Reading symbols from /boot/kernel/ums.ko.symbols...done.
Loaded symbols for /boot/kernel/ums.ko.symbols
Reading symbols from /boot/kernel/uhid.ko.symbols...done.
Loaded symbols for /boot/kernel/uhid.ko.symbols
Reading symbols from /boot/kernel/pflog.ko.symbols...done.
Loaded symbols for /boot/kernel/pflog.ko.symbols
Reading symbols from /boot/kernel/pf.ko.symbols...done.
Loaded symbols for /boot/kernel/pf.ko.symbols
#0  doadump (textdump=<value optimized out>) at pcpu.h:219
219             __asm("movq %%gs:%1,%0" : "=r" (td)


(kgdb) backtrace
#0  doadump (textdump=<value optimized out>) at pcpu.h:219
#1  0xffffffff808af5f0 in kern_reboot (howto=260)
    at /usr/src/sys/kern/kern_shutdown.c:447
#2  0xffffffff808af9b4 in panic (fmt=<value optimized out>)
    at /usr/src/sys/kern/kern_shutdown.c:754
#3  0xffffffff80c8e832 in trap_fatal (frame=<value optimized out>,
    eva=<value optimized out>) at /usr/src/sys/amd64/amd64/trap.c:882
#4  0xffffffff80c8eb09 in trap_pfault (frame=0xfffffe0466b49740, usermode=0)
    at /usr/src/sys/amd64/amd64/trap.c:699
#5  0xffffffff80c8e296 in trap (frame=0xfffffe0466b49740)
    at /usr/src/sys/amd64/amd64/trap.c:463
#6  0xffffffff80c75532 in calltrap ()
    at /usr/src/sys/amd64/amd64/exception.S:232
#7  0xffffffff80c870d2 in pmap_remove_pages (pmap=0xfffff800129a39f8)
    at /usr/src/sys/amd64/amd64/pmap.c:555
#8  0xffffffff80b10660 in vmspace_exit (td=0xfffff803ef7c7920)
    at /usr/src/sys/vm/vm_map.c:399
#9  0xffffffff8087c76f in exit1 (td=0xfffff803ef7c7920,
    rv=<value optimized out>) at /usr/src/sys/kern/kern_exit.c:321
#10 0xffffffff8087c10e in sys_sys_exit (td=<value optimized out>,
    uap=<value optimized out>) at /usr/src/sys/kern/kern_exit.c:121
#11 0xffffffff80c8f127 in amd64_syscall (td=0xfffff803ef7c7920, traced=0)
    at subr_syscall.c:134
#12 0xffffffff80c7581b in Xfast_syscall ()
    at /usr/src/sys/amd64/amd64/exception.S:391
#13 0x00000008008f431a in ?? ()
Previous frame inner to this frame (corrupt stack?)
Current language:  auto; currently minimal

(kgdb) list *0xffffffff80c870d2
0xffffffff80c870d2 is in pmap_remove_pages
(/usr/src/sys/amd64/amd64/pmap.c:5187).
5182                                    inuse &= ~bitmask;
5183
5184                                    pte = pmap_pdpe(pmap, pv->pv_va);
5185                                    ptepde = *pte;
5186                                    pte = pmap_pdpe_to_pde(pte,
pv->pv_va);
5187                                    tpte = *pte;
5188                                    if ((tpte & (PG_PS | PG_V)) ==
PG_V) {
5189                                            superpage = FALSE;
5190                                            ptepde = tpte;
5191                                            pte = (pt_entry_t
*)PHYS_TO_DMAP(tpte &



Not quite sure how to proceed. Thanks in advance for any pointers or
assistance!

- -- 
Ryan Stark
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQIcBAEBCgAGBQJT0ThSAAoJEOuHL951PlCy63kP/3qvcZUpYnggcqwUpQv7+/QR
aUBcudwOf+bGgHSheqNnCUvA3GKZRVnRXx8cJKCpGEy2Y9IPqxRhJBAB3ARAgrTI
WBuJAKkGWVgLiBNL8dTFNJ99vc5U8NcELy03TPe3LrXZb31ch1fKXwc+MnL4giwn
co4s3q7a+1kUs77WT85szGwqJSWKBUcHpj64bUwzr9PO+au4eJ+K32u9vJ4Mtr84
2Ch1C7WNwRhw8+rGDLPgwJoGXwmQqaVMnSfWWPxSoJ1pI0F1rfuQk550P0/bTcSW
XSWCxQWgQ8XQUQ5XUrZcDKAsjCT1/WGHvb5kzmnt12ZZNfEyOGPNEnAammtJFSP9
NfHvFb/H5iSFEQ95p1qQFhg2vmAqKpPVOgnZ7gtOoHHiWkinpO7HwJNBLae8K2Om
KQB5X81OF7gvXYJNuWjWiBLDFOAnQuKMQTqq9sdNF8OqZOtEXLRa+Uq7L612X82y
ptNvOHQ/144Jr9O8/puutZqKjgiUwEkkcAPFR/9eCA65PVH/n55KwBTaUvs75clP
lZCkQqIn7x5vMO8yZTCORKOg1p+I85OeeJZcJiWRhOqvdYcKyfCDOL3fpN+AablW
/FBKyITrnF0PhqBM13xjP8UihYwFFuQq+9xG0u+6o00TUaW14Rm2K2wqSZkE30ES
dEZn2ioHc1Zz7okuDXSx
=1y4Q
-----END PGP SIGNATURE-----



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?53D13853.1090802>