[Bug 259164] FreeBSD 13.0-STABLE mpd5-5.9 panic
- In reply to: bugzilla-noreply_a_freebsd.org: "[Bug 259164] FreeBSD 13.0-STABLE mpd5-5.9 panic"
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Fri, 05 Nov 2021 13:12:00 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=259164 --- Comment #2 from Anatoliy Nebrat <tolich.net@gmail.com> --- FreeBSD 13.0-STABLE #2 stable/13-n247718-00595201ad4: Wed Oct 20 19:39:49 EEST 2021 Fatal trap 12: page fault while in kernel mode cpuid = 2; apic id = 04 fault virtual address = 0x50 fault code = supervisor read data, page not present instruction pointer = 0x20:0xffffffff82b74968 stack pointer = 0x28:0xfffffe00d2974a90 frame pointer = 0x28:0xfffffe00d2974b10 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 47936 (mpd5) trap number = 12 panic: page fault cpuid = 2 time = 1636114816 KDB: stack backtrace: #0 0xffffffff80c76b75 at kdb_backtrace+0x65 #1 0xffffffff80c28a47 at vpanic+0x187 #2 0xffffffff80c288b3 at panic+0x43 #3 0xffffffff810b3447 at trap_fatal+0x387 #4 0xffffffff810b349f at trap_pfault+0x4f #5 0xffffffff810b2b1a at trap+0x26a #6 0xffffffff81089a78 at calltrap+0x8 #7 0xffffffff82b744e6 at ng_snd_item+0x1c6 #8 0xffffffff82b6f63f at ngd_send+0x10f #9 0xffffffff80cc8f7a at sosend_generic+0x62a #10 0xffffffff80cc94f0 at sosend+0x50 #11 0xffffffff80cd02fe at kern_sendit+0x20e #12 0xffffffff80cd0707 at sendit+0x1e7 #13 0xffffffff80cd050d at sys_sendto+0x4d #14 0xffffffff810b3d3c at amd64_syscall+0x10c #15 0xffffffff8108a38b at fast_syscall_common+0xf8 Uptime: 15d11h40m31s Dumping 1709 out of 8123 MB:..1%..11%..21%..31%..41%..51%..61%..71%..81%..91% __curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:55 55 __asm("movq %%gs:%P1,%0" : "=r" (td) : "n" (offsetof(struct pcpu, (kgdb) #0 __curthread () at /usr/src/sys/amd64/include/pcpu_aux.h:55 #1 doadump (textdump=<optimized out>) at /usr/src/sys/kern/kern_shutdown.c:399 #2 0xffffffff80c28646 in kern_reboot (howto=260) at /usr/src/sys/kern/kern_shutdown.c:487 #3 0xffffffff80c28ab6 in vpanic (fmt=0xffffffff811ae3d0 "%s", ap=<optimized out>) at /usr/src/sys/kern/kern_shutdown.c:920 #4 0xffffffff80c288b3 in panic (fmt=<unavailable>) at /usr/src/sys/kern/kern_shutdown.c:844 #5 0xffffffff810b3447 in trap_fatal (frame=0xfffffe00d29749d0, eva=80) at /usr/src/sys/amd64/amd64/trap.c:941 #6 0xffffffff810b349f in trap_pfault (frame=frame@entry=0xfffffe00d29749d0, usermode=false, signo=<optimized out>, signo@entry=0x0, ucode=<optimized out>, ucode@entry=0x0) at /usr/src/sys/amd64/amd64/trap.c:760 #7 0xffffffff810b2b1a in trap (frame=0xfffffe00d29749d0) at /usr/src/sys/amd64/amd64/trap.c:438 #8 <signal handler called> #9 0xffffffff82b74968 in ng_apply_item (node=node@entry=0xfffff80029035800, item=item@entry=0xfffff80042c40100, rw=0) at /usr/src/sys/netgraph/ng_base.c:2402 #10 0xffffffff82b744e6 in ng_snd_item (item=item@entry=0xfffff80042c40100, flags=flags@entry=0) at /usr/src/sys/netgraph/ng_base.c:2324 #11 0xffffffff82b6f63f in ngd_send (so=<optimized out>, flags=<optimized out>, m=0x0, addr=<optimized out>, control=0x0, td=<optimized out>) at /usr/src/sys/netgraph/ng_socket.c:480 #12 0xffffffff80cc8f7a in sosend_generic (so=0xfffff80042cb6760, addr=0xfffff80201d0fec0, uio=<optimized out>, top=0xfffff80215de3900, control=0x0, flags=0, td=0xfffffe00d2382020) at /usr/src/sys/kern/uipc_socket.c:1753 #13 0xffffffff80cc94f0 in sosend (so=0xfffff80029035800, so@entry=0xfffff80042cb6760, addr=0xfffff80042c40100, uio=0x0, uio@entry=0xfffffe00d2974cd8, top=0xffffffffffffffff, top@entry=0x0, control=control@entry=0x0, flags=331884416, flags@entry=0, td=0xfffffe00d2382020) at /usr/src/sys/kern/uipc_socket.c:1803 #14 0xffffffff80cd02fe in kern_sendit (td=<optimized out>, td@entry=0xfffffe00d2382020, s=7, mp=<optimized out>, mp@entry=0xfffffe00d2974dc0, flags=0, control=0x0, segflg=segflg@entry=UIO_USERSPACE) at /usr/src/sys/kern/uipc_syscalls.c:790 #15 0xffffffff80cd0707 in sendit (td=0xfffffe00d2382020, s=1120141568, mp=mp@entry=0xfffffe00d2974dc0, flags=-1) at /usr/src/sys/kern/uipc_syscalls.c:715 #16 0xffffffff80cd050d in sys_sendto (td=0xfffff80029035800, uap=<optimized out>) at /usr/src/sys/kern/uipc_syscalls.c:833 #17 0xffffffff810b3d3c in syscallenter (td=0xfffffe00d2382020) at /usr/src/sys/amd64/amd64/../../kern/subr_syscall.c:189 #18 amd64_syscall (td=0xfffffe00d2382020, traced=0) at /usr/src/sys/amd64/amd64/trap.c:1182 #19 <signal handler called> #20 0x00000008008c139a in ?? () Backtrace stopped: Cannot access memory at address 0x7fffdfffdbe8 (kgdb) -- You are receiving this mail because: You are the assignee for the bug.