[Bug 261233] Frequent kernel panics during disk access after upgrading from 12.2-RELEASE-p7 to 12.2-p12 or 12.3 on i386

From: <bugzilla-noreply_at_freebsd.org>
Date: Thu, 20 Jan 2022 11:06:52 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=261233

Richard Frewin <Richard@FrewinIT.uk> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |Richard@FrewinIT.uk

--- Comment #8 from Richard Frewin <Richard@FrewinIT.uk> ---
Just a +1 for this.

Upgraded from kernel 12.2-RELEASE-p7 to 12.2-RELEASE-p12 with freebsd-update on
several systems both amd64 and i386.  Some of the i386 systems now panic under
disk load (backups!).  These are otherwise very lightly loaded web servers or
firewalls.

Is this related to Bug 261338 ?

Example panics from three systems (cut-and-paste from dmesg) below:

Fatal trap 12: page fault while in kernel mode
cpuid = 0; apic id = 00
fault virtual address   = 0x0
fault code              = supervisor read, page not present
instruction pointer     = 0x20:0x0
stack pointer           = 0x28:0x1b2de880
frame pointer           = 0x28:0x1b2de8bc
code segment            = base 0x0, limit 0xfffff, type 0x1b
                        = DPL 0, pres 1, def32 1, gran 1
processor eflags        = interrupt enabled, resume, IOPL = 0
current process         = 836 (bacula-fd)
trap number             = 12
panic: page fault
cpuid = 0
time = 1642636089
KDB: stack backtrace:
#0 0x10327ae at kdb_backtrace+0x4e
#1 0xfed128 at vpanic+0x118
#2 0xfed004 at panic+0x14
#3 0x154bfd5 at trap_fatal+0x335
#4 0x154c013 at trap_pfault+0x33
#5 0x154b71f at trap+0x36f
#6 0xffc0319d at PTDpde+0x41a5
#7 0x1534905 at copyout+0xa5
#8 0x154d0f9 at uiomove_fromphys+0x159
#9 0x12c3483 at ffs_read+0x3d3
#10 0x157b77d at VOP_READ_APV+0x5d
#11 0x10b980a at vn_read+0x18a
#12 0x10b95da at vn_io_fault_doio+0x3a
#13 0x10b7232 at vn_io_fault1+0x162
#14 0x10b548b at vn_io_fault+0x1cb
#15 0x104c580 at dofileread+0x70
#16 0x104c1d8 at sys_read+0x78
#17 0x154c7b9 at syscall+0x3e9
Uptime: 23h37m45s
Physical memory: 2009 MB


Fatal trap 12: page fault while in kernel mode
cpuid = 0; apic id = 00
fault virtual address   = 0x0
fault code              = supervisor read, page not present
instruction pointer     = 0x20:0x0
stack pointer           = 0x28:0x1afd6880
frame pointer           = 0x28:0x1afd68bc
code segment            = base 0x0, limit 0xfffff, type 0x1b
                        = DPL 0, pres 1, def32 1, gran 1
processor eflags        = interrupt enabled, resume, IOPL = 0
current process         = 2134 (bacula-fd)
trap number             = 12
panic: page fault
cpuid = 0
time = 1642547014
KDB: stack backtrace:
#0 0x10327ae at kdb_backtrace+0x4e
#1 0xfed128 at vpanic+0x118
#2 0xfed004 at panic+0x14
#3 0x154bfd5 at trap_fatal+0x335
#4 0x154c013 at trap_pfault+0x33
#5 0x154b71f at trap+0x36f
#6 0xffc0319d at PTDpde+0x41a5
#7 0x1534905 at copyout+0xa5
#8 0x154d0f9 at uiomove_fromphys+0x159
#9 0x12c3483 at ffs_read+0x3d3
#10 0x157b77d at VOP_READ_APV+0x5d
#11 0x10b980a at vn_read+0x18a
#12 0x10b95da at vn_io_fault_doio+0x3a
#13 0x10b7232 at vn_io_fault1+0x162
#14 0x10b548b at vn_io_fault+0x1cb
#15 0x104c580 at dofileread+0x70
#16 0x104c1d8 at sys_read+0x78
#17 0x154c7b9 at syscall+0x3e9
Uptime: 1d2h4m47s


Fatal trap 12: page fault while in kernel mode
cpuid = 0; apic id = 00
fault virtual address   = 0x0
fault code              = supervisor read, page not present
instruction pointer     = 0x20:0x0
stack pointer           = 0x28:0x1df3a8d4
frame pointer           = 0x28:0x1df3a90c
code segment            = base 0x0, limit 0xfffff, type 0x1b
                        = DPL 0, pres 1, def32 1, gran 1
processor eflags        = interrupt enabled, resume, IOPL = 0
current process         = 932 (bacula-fd)
trap number             = 12
panic: page fault
cpuid = 0
time = 1642636048
KDB: stack backtrace:
#0 0x10327ae at kdb_backtrace+0x4e
#1 0xfed128 at vpanic+0x118
#2 0xfed004 at panic+0x14
#3 0x154bfd5 at trap_fatal+0x335
#4 0x154c013 at trap_pfault+0x33
#5 0x154b71f at trap+0x36f
#6 0xffc0319d at PTDpde+0x41a5
#7 0x12c33ce at ffs_read+0x31e
#8 0x157b77d at VOP_READ_APV+0x5d
#9 0x10b980a at vn_read+0x18a
#10 0x10b95da at vn_io_fault_doio+0x3a
#11 0x10b7232 at vn_io_fault1+0x162
#12 0x10b548b at vn_io_fault+0x1cb
#13 0x104c580 at dofileread+0x70
#14 0x104c1d8 at sys_read+0x78
#15 0x154c7b9 at syscall+0x3e9
#16 0xffc033e7 at PTDpde+0x43ef
Uptime: 23h37m42s
Physical memory: 3026 MB

-- 
You are receiving this mail because:
You are the assignee for the bug.